Scientific Publishing Ltd.

Displaying 1-40 of 97 results

  • White Papers // Oct 2009

    A New Fairness-Oriented Packet Scheduling Scheme with Reduced Channel Feedback for OFDMA Packet Radio Systems

    In this paper, the authors propose a flexible and fairness-oriented packet scheduling approach for 3GPP UTRAN Long Term Evolution (LTE) type packet radio systems, building on the ordinary Proportional Fair (PF) scheduling principle and Channel Quality Indicator (CQI) feedback. Special emphasis is also put on practical feedback reporting mechanisms, including...

    Provided By Scientific Publishing Ltd.

  • White Papers // Oct 2009

    A Hybrid ARQ System with Erasures Correction and Parity Retransmission

    Automatic Repeat reQuest (ARQ) systems with error control are widely used for data transmission over noisy channels. Their performance is usually characterized by two parameters: Throughput Efficiency (TE) and Bit Error Rate (BER). A modified type of Hybrid ARQ system with erasures correction and parity bits retransmission is considered. Performance...

    Provided By Scientific Publishing Ltd.

  • White Papers // Oct 2009

    Load Balanced Routing Mechanisms for Mobile Ad Hoc Networks

    Properties of Mobile Ad-hoc NETworks (MANET) like dynamic topology and decentralized connectivity make routing a challenging task. Moreover, overloaded nodes may deplete their energy in forwarding others packets resulting in unstable network and performance degradation. In this paper, the authors propose load-balancing schemes that distribute the traffic on the basis...

    Provided By Scientific Publishing Ltd.

  • White Papers // Oct 2009

    An Identifier-Based Network Access Control Mechanism Based on Locator/Identifier Split

    Legacy IP address based access control has met many challenges, because the network nodes cannot be identified accurately based on their variable IP addresses. "Locator/Identifier Split" has made it possible to build a network access control mechanism based on the permanent identifier. With the support of "Locator/Identifier Split" routing and...

    Provided By Scientific Publishing Ltd.

  • White Papers // Oct 2009

    Efficient Techniques and Algorithms for Improving Indoor Localization Precision on WLAN Networks Applications

    In this paper, the authors propose efficient techniques that allow the deploying of high precision location applications for indoor scenarios over Wireless Local Area Networks (WLAN). They compare the use of Radio Frequency (RF) power levels and relative time delays based on ray-tracing as detection methods to estimate the localization...

    Provided By Scientific Publishing Ltd.

  • White Papers // Oct 2009

    Optical Network Traffic Control Algorithm Under Variable Loop Delay: A Simulation Approach

    In this paper, the authors present a concept of new architectural model consisting of multiple loop delay to increase the throughput. The simulated behavior of an optical node has been realized by using an n x m optical switch and recirculating optical delay lines. This investigation infers the scaling behaviors...

    Provided By Scientific Publishing Ltd.

  • White Papers // Oct 2009

    Performance Evaluation of Signal Strength Based Handover Algorithms

    Performance evaluation of handover algorithms has been studied for mobile cellular network. Effects of averaging, hysteresis margin and shadow fading are investigated for different handoff algorithms. Probability of outage, handover delay and average number of handovers are considered as performance metrics. Different handover algorithms considered here are based on relative...

    Provided By Scientific Publishing Ltd.

  • White Papers // Oct 2009

    Space-Time-Frequency Coded for Multiband-OFDM Based on IEEE 802.15.3a WPAN

    Ultra WideBand (UWB) systems are the first nomination for future Wireless Personal Area Networks (WPANs). The enormous band with availability provides the potential for very high data rates. The ultra wide bandwidth of UWB enables various WPAN applications such as high-speed Wireless Universal Serial Bus (WUSB) connectivity for personal computers...

    Provided By Scientific Publishing Ltd.

  • White Papers // Feb 2012

    Design of a Performance Measurement Framework for Cloud Computing

    Cloud Computing (CC) is an emerging technology aimed at processing and storing very large amounts of data. It is an internet-based technology in which several distributed computers work together to efficiently process large amounts of information, while ensuring the rapid processing of query results to users. Some CC users prefer...

    Provided By Scientific Publishing Ltd.

  • White Papers // Apr 2013

    Deploying Safety-Critical Applications on Complex Avionics Hardware Architectures

    Aviation electronics (avionics) are sophisticated and distributed systems aboard an airplane. The complexity of these systems is constantly growing as an increasing amount of functionalities is realized in software. Thanks to the performance increase, a hardware unit must no longer be dedicated to a single system function. Multicore processors for...

    Provided By Scientific Publishing Ltd.

  • White Papers // Aug 2012

    Design and Implementation of Electronic Control Trainer with PIC Microcontroller

    In this paper, the author describes the implementation of a PIC microcontroller in a conventional laboratory-type electronic trainer. The work comprises software for the PIC and hardware for the software. The PIC controller uses an EasyPIC-6 board and includes a PC-interfaced programmer for the PIC chip. It has many external...

    Provided By Scientific Publishing Ltd.

  • White Papers // Mar 2012

    A State-of-the-Art Survey on Real-Time Issues in Embedded Systems Virtualization

    Platform virtualization refers to the creation of Virtual Machines (VMs), also called domains, guest OSes, or partitions, running on the physical machine managed by a Virtual Machine Monitor (VMM), also called a hypervisor. Virtualization has gained great acceptance in the server and cloud computing arena. In recent years, it has...

    Provided By Scientific Publishing Ltd.

  • White Papers // Jun 2012

    A Solution for Cross-Docking Operations Planning, Scheduling and Coordination

    Crossdocking is defined as an operational strategy that moves items through consolidation centers or cross docks without putting them into storage. As the need to move inventory faster increases, more logistics managers are turning to crossdocking but the ability to execute such strategy well depends on good planning, dynamic scheduling...

    Provided By Scientific Publishing Ltd.

  • White Papers // Jan 2011

    Effective and Extensive Virtual Private Network

    A Virtual Private Network (VPN) allows the provisioning of private network services for an organization over a public network such as the Internet. In other words a VPN can transform the characteristics of a public which may be non-secure network into those of a private secure network through using encrypted...

    Provided By Scientific Publishing Ltd.

  • White Papers // Dec 2013

    The Necessity of Using Cloud Computing in Monitoring Metropolitan Performance

    Due to the metropolitan area of immense diversity and breadth of their construction activities, the performance of activities at districts level, cannot be precisely evaluated. Therefore, generally, it monitors only the indices which are de-fined for those functions. Furthermore, district-based development policy, and decentralization of governance, necessitates more local autonomy,...

    Provided By Scientific Publishing Ltd.

  • White Papers // Dec 2013

    Use of Dynamical Systems Modeling to Hybrid Cloud Database

    In the paper, an experiment is aimed at clarifying the transfer efficiency of the database in the cloud infrastructure. The system was added to the control unit, which has guided the database search in the local part or in the cloud. It is shown that the time data acquisition remains...

    Provided By Scientific Publishing Ltd.

  • White Papers // Dec 2013

    A Personalized Cloud Services Recommendation Based on Cooperative Relationship Between Services

    A personalized recommendation for cloud services, which is based on usage history and the cooperative relationship of cloud services, is presented. According to service groups, a service group could be defined as several services that were used together by one user at a time, and cooperative relationship between each two...

    Provided By Scientific Publishing Ltd.

  • White Papers // Dec 2013

    Applications of Forensic Science in Private Security

    Private security guards are a necessity at the present time, as a complement of the police departments in order to combat crime and terrorism. Both police forces and private security organizations are greatly helped in their work by the methods of forensic science. Forensic science applies scientific methods to the...

    Provided By Scientific Publishing Ltd.

  • White Papers // Nov 2013

    Research on the Prediction Model for the Security Situation of Metro Station Based on PSO/SVM

    Security situation awareness is a new technology about security. This paper brings it to the assessment of security situation of metro station which serves as a new way to secure the security of passengers as well as the operation of the metro station. This paper sets up an index system...

    Provided By Scientific Publishing Ltd.

  • White Papers // Jul 2013

    A Novel Solution to Handle DDOS Attack in MANET

    Distributed Denial of Service (DDoS) attacks in the networks needs to be prevented or handled if it occurs, as early as possible and before reaching the victim. Dealing with DDoS attacks is difficult due to their properties such as dynamic attack rates, various kinds of targets, big scale of botnet,...

    Provided By Scientific Publishing Ltd.

  • White Papers // Apr 2013

    A Proposal for Mitigating Multiple Black-Hole Attack in Wireless Mesh Networks

    The network layer in wireless mesh networks is responsible for routing packets making it a prime target for intruders and hackers. Black-hole attack is a type of denial-of-service attack which when carried out can disrupt the services of this layer. This paper takes a look at some important detection and...

    Provided By Scientific Publishing Ltd.

  • White Papers // Mar 2010

    Research on Enhancing the Effectiveness of Staff-Training in Private Enterprise

    In 21st century, the enterprise competition is a comprehensive competition based on talent, capital, technology and energy. Especially, among all these elements, talent is the most important one. How to culture and set up the enterprise's own personnel training system is the foundation to improve the business competition strength. Training...

    Provided By Scientific Publishing Ltd.

  • White Papers // Dec 2009

    Dalian High-Tech SMEs Growth Evaluation Based on Catastrophe and Principal Component Projection Method

    In the course of rapid economic development, high-tech Small and Medium Enterprises (SMEs) are gradually playing an important role, which become important support to regional economic growth and science and technology development. So SMEs growth becomes a universal problem. And how to evaluate the SMEs growth becomes an important step,...

    Provided By Scientific Publishing Ltd.

  • White Papers // Jun 2010

    Tabu Search Solution for Resource Confidence Considered Partner Selection Problem in Cross-Enterprise Project

    Cross-enterprise project is the main implementation form in multi enterprises collaborative production environment. Minimizing the risk of failure and tardiness caused by the uncertainty of partner's resources in partner selection is the key problem to ensure success in Cross-enterprise project. In this paper, considering the factors and constraints of sub-project...

    Provided By Scientific Publishing Ltd.

  • White Papers // Mar 2010

    Study of the Instant Incentive Mechanism for Zero-Time Enterprise

    The zero-time enterprise's mission is response to the market and customer needs in \"Zero time\" in order to gain more customers and competitive advantages. To realize zero-time response to market and customers, it should inspire the employees' work enthusiasm and creativity, so that they can do their work conscientiously to...

    Provided By Scientific Publishing Ltd.

  • White Papers // Apr 2013

    A Neural Network and Expert Systems Based Model for Measuring Business Effectiveness of Information Technology Investment

    Today's indispensable bound between Information Technology (IT) and Business bears heavy expectations on IT to enable firms achieve their strategic business goals and drive competitiveness and revenue growth via offered Technology Solutions and Services. To assess achievement level associated with such expectations, mechanisms must exist for determining the relationship between...

    Provided By Scientific Publishing Ltd.

  • White Papers // Apr 2013

    Changing Dynamics of Team Leadership in Global Project Environments

    The dynamics and challenges of managing geographically dispersed project teams is examined in a field investigation of 72 multinational product developments, observed and studied between 2008 and 2012. The findings provide insight into the business processes and leadership style most conducive to cross-functional collaboration and effective project integration throughout the...

    Provided By Scientific Publishing Ltd.

  • White Papers // Jan 2013

    Value Chains and Small Enterprise Development: Theory and Praxis

    Drawing insights from the literature on global value chains and similar approaches, it is argued that adopting a value chain approach could help Micro and Small Enterprises (MSEs) to gain from the benefits of integration into global/local value chains and making them competitive. This paper reviews the theoretical perspectives in...

    Provided By Scientific Publishing Ltd.

  • White Papers // Jan 2013

    On Enterprise Social Responsibility Comprehensive Evaluation Based on Two-Step Fuzzy Evaluation Method

    In order to evaluate the enterprise social responsibility scientifically, this paper constructed an enterprise social responsibility evaluation indexes system composed by five first class indexes (environmental protection, resources utilization, economic benefit, human resources and social contribution and so on) and 18 second indexes. The two-step fuzzy evaluation method was adopted...

    Provided By Scientific Publishing Ltd.

  • White Papers // Aug 2012

    Empirical Analysis of Interactive Control's Effectiveness: A Parent-Subsidiary Company's Interdependence Perspective

    Due to the increasingly complex business environment and the principal-agent relationship, the enterprise group should establish a control system to prevent agency risk. Besides traditional system control, the parent company tends to adopt an interactive control including decentralized decision making, process communication and target incentive to guide and govern the...

    Provided By Scientific Publishing Ltd.

  • White Papers // Jun 2010

    Principal-Agent Theory Based Risk Allocation Model for Virtual Enterprise

    In this paper, the authors consider a risk analysis model for Virtual Enterprise (VE) by exploring the state of the art of the principal-agent theory. In particular, they deal with the problem of allocating the cost of risk between two parties in a VE, namely, the owner and the partner(s)....

    Provided By Scientific Publishing Ltd.

  • White Papers // Oct 2010

    The Analysis on Financial Cooperative Controlling Mechanism of Enterprise Group

    As the core of modern market economy, enterprise group is an advanced form of organization after productive forces reached to a certain stage. For the reason of complexity and specificity of organizational form of enterprise group, the issue of financial cooperative control has been widespread concerned by theorists. Although many...

    Provided By Scientific Publishing Ltd.

  • White Papers // Aug 2010

    BOSD: Business Object Based Flexible Software Development for Enterprises

    The enterprise software need adapt to new requirements from the continuous change management. The recent development methods have increased the flexibility of software. However, previous studies have ignored the stability of business object and the particular business relationships to support the software development. In this paper, a coarse-grained business object...

    Provided By Scientific Publishing Ltd.

  • White Papers // Jul 2010

    The Need to Evaluate Strategy and Tactics Before the Software Development Process Begins

    Experience has shown that poor strategy or bad tactics adopted when planning a software project influence the final quality of that product, even when the whole development process is undertaken with a quality approach. This paper addresses the quality attributes of the strategy and tactics of the software project plan...

    Provided By Scientific Publishing Ltd.

  • White Papers // Sep 2010

    Bid Optimization for Internet Graphical Ad Auction Systems Via Special Ordered Sets

    This paper describes an optimization model for setting bid levels for certain types of advertisements on web pages. This model is non-convex, but the authors are able to obtain optimal or near-optimal solutions rapidly using branch and cut open source software. The financial benefits obtained using the prototype system has...

    Provided By Scientific Publishing Ltd.

  • White Papers // Jul 2012

    Dynamic Model for Planning and Business Optimization

    The growing internationalization of markets, backed by the free movement of capital flows, has redefined the past quarter century's business strategies and tends to continue driving economic and financial integration throughout this century. In this paper, firms that aim to stand out in such markets should use the essence of...

    Provided By Scientific Publishing Ltd.

  • White Papers // Mar 2013

    Forecasting and the Role of Churn in Software-as-a-Service Business Models

    This paper demonstrates a revenue forecasting model for Software-as-a-Service (SaaS) business models. Due to the highly predictable nature of subscriptions, a SaaS business can often project future revenue on the basis of a few key metrics. However, understanding and predicting the churn rate of the subscription base is critical to...

    Provided By Scientific Publishing Ltd.

  • White Papers // Nov 2012

    Contribution to Enterprise Intelligent Systems Architecture: Assumptions, Expectations and a Proposal

    Currently, enterprise intelligent systems are built without expressed assumptions likely to enable harmonizing the field and correctly attributing the intelligence label to enterprise systems within the way they are built. In the present paper, the authors propose three base assumptions for an enterprise intelligent system architecture as related to Cognitive...

    Provided By Scientific Publishing Ltd.

  • White Papers // Jun 2008

    Reverse Logistics Operation Management Based on Virtual Enterprises and Complaint Service Management

    Based on analyzing the difficulties of reverse logistics operation management and discussed the new environment as the economic society developing continuously and discussing the feasibility of virtual enterprise, an operation management mode for reverse logistics based on virtual enterprise is presented in this paper. By analyzing the relationships between complaint...

    Provided By Scientific Publishing Ltd.

  • White Papers // Mar 2009

    Analysis of Service Processes Characteristics Across a Range of Enterprises

    The structure of services processes was explored using a database of 168 service processes that existed within a wide range of enterprises. The results indicate that applications within service science are not limited to the service industry and that service processes have many similar characteristics. The similarities exist across industry...

    Provided By Scientific Publishing Ltd.