Scientific Research

Displaying 1-40 of 746 results

  • White Papers // Jan 2014

    Simulation Study Based on Somewhat Homomorphic Encryption

    The researcher, put forward the concept of a fully homomorphic encryption, namely under the condition of not unlocking to various operations of crypto-graph, the results from the decrypted plaintext and operation results of the same accordingly. At present paper, homomorphic encryption scheme is most focusing on algorithm efficiency and security...

    Provided By Scientific Research

  • White Papers // Jan 2014

    An Algorithm and Data Process Scheme for Indoor Location Based on Mobile Devices

    Limited by the sampling capacity of the mobile devices, many real-time indoor location systems have such problems as low accuracy, large variance, and non-smooth movement of the estimated position. A new positioning algorithm and a new processing method for sampled data are proposed. Firstly, a positioning algorithm is de-signed based...

    Provided By Scientific Research

  • White Papers // Jan 2014

    Performance Analysis of RFID Framed Slotted Aloha Anti-Collision Protocol

    In this paper, the authors develop a novel mathematical model to estimate the probability distribution function of the number of tags discovered after a certain number of interrogation rounds. In addition, the pdfs of the number of rounds needed to discover all the tags are also calculated. The estimation of...

    Provided By Scientific Research

  • White Papers // Oct 2013

    Performance Analysis of an Autoconfiguration Addressing Protocol for Ad Hoc Networks

    A Mobile Ad hoc NETwork (MANET) is a group of mobile nodes which cooperatively and spontaneously form an IP-based network with no centralized administration. Autoconfiguration protocols are important in maintaining Mobile Ad hoc NETworks (MANETs). In this paper, the authors present an auto configuration protocol called the One-Step Addressing (OSA)...

    Provided By Scientific Research

  • White Papers // Oct 2013

    Track Paging an Optimal Method for Minimizing Paging and Signaling Cost in Mobile IP

    Mobile IP is an Internet standards protocol, which enhances the existing Internet Protocol (IP) to accommodate mobility. In mobile IP protocol, to find the exact location of mobile node for transferring incoming packets to them has a lot of signaling cost. So increasing the performance and decreasing the signaling cost...

    Provided By Scientific Research

  • White Papers // Jul 2014

    Regression Testing in Developer Environment for Absence of Code Coverage

    The techniques of test case prioritization schedule the execution order of test cases to attain respective target, such as enhanced level of forecasting the fault. The requirement of the prioritization can be viewed as the en-route for deriving an order of relation on a given set of test cases which...

    Provided By Scientific Research

  • White Papers // Jun 2014

    Computer Aided Call for Tenders: A Tool for Software Bidding

    Under a broad comprehension of software engineering, it is preferred the term software life cycle instead of just software production. The reason is that cycle starts at software conception and stops when the software is relegated. Given contemporary companies' market strategies of focusing on their competitive advantages, most of them...

    Provided By Scientific Research

  • White Papers // Jun 2014

    Reliability Estimation of Services Oriented Systems Using Adaptive Neuro Fuzzy Inference System

    In order to make system reliable, it should inhibit guarantee for basic service, data flow, composition of services, and the complete workflow. In Service-Oriented Architecture (SOA), the entire software system consists of an interacting group of autonomous services. Some soft computing approaches have been developed for estimating the reliability of...

    Provided By Scientific Research

  • White Papers // Jul 2014

    Fine-Grained Work Element Standardization for Project Effort Estimation

    Traditional project effort estimation utilizes development models that span the entire project life cycle and thus culminates estimation errors. This paper is the first attempt to break each project activity down to smaller work elements. There are eight work elements, each of which is being defined and symbolized with visually...

    Provided By Scientific Research

  • White Papers // May 2014

    Cognitive Software Engineering: A Research Framework and Roadmap

    The work of software engineers is inherently cognitive. Integral to their duties is understanding and developing several artifacts. Each one is based on a specific model and a given level of abstraction. What distinguishes software engineering is the logical complexity of some artifacts (especially programs), the high dependency among them,...

    Provided By Scientific Research

  • White Papers // May 2014

    Tests Management in CALIPSOneo: A MDE Solution

    Testing in software engineering is one of the most important phases although, unfortunately, it cannot be always successfully fulfilled due to time constraints. In most cases, the development phase takes more time than it was estimated, entailing negative effects on the testing phase. The delay increases even more in Research...

    Provided By Scientific Research

  • White Papers // May 2014

    Using Database Management System to Generate, Manage and Secure Personal Identification Numbers (PIN)

    A number of problems are associated with the generation, management and security of PINs, a subset of password. The PINs may be recharge card used by GSM operators or for authentication in ATM. The problems associated with the use of these PINs range from scratching off any of the recharge...

    Provided By Scientific Research

  • White Papers // May 2014

    Challenges for Software Engineering in Automation

    In this paper, the authors give an introduction to the essential challenges of software engineering and requirements that software has to fulfill in the domain of automation. Besides, the functional characteristics, specific constraints and circumstances are considered for deriving requirements concerning usability, the technical process, the automation functions, used platform...

    Provided By Scientific Research

  • White Papers // May 2014

    A Survey of Concepts Location Enhancement for Program Comprehension and Maintenance

    When correcting a fault, adding a new concept or feature, or adapting a system to conform to a new platform, software engineers must first find the relevant parts of the code that correspond to a particular change. This is termed as concept or feature location process. Several techniques have been...

    Provided By Scientific Research

  • White Papers // May 2014

    A New Analysis Concept in Applying Software Reliability Growth Models and Tool Implementation: The SafeMan

    In recent years, many software development organizations have been assessing and analyzing their software product's reliability/quality and judging whether the software product is releasable by using Software Reliability Growth Models (SRGMs) at the final stage of software development. The usage of SRGMs originates in the advantage that various reliability analysis...

    Provided By Scientific Research

  • White Papers // May 2014

    An Application of Paraconsistent Annotated Logic for Design Software Testing Strategies

    Now-a-days, application model systems for decision-making based on non-classical logic such as paraconsistent logic are used successfully in the treatment of uncertainties. The method presented in this paper is based on the fundamental concepts of Paraconsistent Annotated Logic with annotation of 2 values (PAL2v). In this paper, two algorithms based...

    Provided By Scientific Research

  • White Papers // May 2014

    Assessing a Model-Driven Web-Application Engineering Approach

    Model-Driven Engineering (MDE) by reframing software development as the transformation of high-level models, promises lots of gains to Software Engineering in terms of productivity, quality and reusability. Although a number of empirical studies have established the reality of these gains, there are still lots of reluctances toward the adoption of...

    Provided By Scientific Research

  • White Papers // May 2014

    Optimizing Query Results Integration Process Using an Extended Fuzzy C-Means Algorithm

    Cleaning duplicate data is a major problem that persists even though many works have been done to solve it, due to the exponential growth of data amount treated and the necessity to use scalable and speed algorithms. This problem depends on the type and quality of data, and differs according...

    Provided By Scientific Research

  • White Papers // Aug 2014

    An Improved Framework for Requirement Change Management in Global Software Development

    In this paper, an improved framework for Requirement Change Management in Global Software Development (RCM-GSD) has been presented. The objective is to manage the change in requirement specifically in global software development in an appropriate manner. The proposed framework RCM-GSD follows the required processes of RCM and reduces the concerns...

    Provided By Scientific Research

  • White Papers // Aug 2014

    Extracting SOA Candidate Software Services from an Organization's Object Oriented Models

    Class diagrams and use case models are system models that are used to analyze, design and model object oriented systems. In this era of agile computing, service-oriented architecture has become increasingly popular for achieving efficient and agile business solutions that can maintain changes demanded by the business world. This paper...

    Provided By Scientific Research

  • White Papers // Jul 2014

    FOTool: Modelling Indigenous Community Cultures in Sarawak

    Formal-Object Tool (FOTool) is a software modeling approach that integrates formal specification and object oriented model. FOTool integrates the rigour of formal methods and the ease of use of Object Oriented (OO) techniques. The idea of FOTool is to provide an easy interface by allowing the application developer to develop...

    Provided By Scientific Research

  • White Papers // Aug 2014

    Object-Component Development of Application and Systems Theory and Practice

    The Object-Componet Development (OCD) is a variety of the compositional programmings, where a role of elements of assembling is warmed by objects, interfaces and components. For developing application systems, the theory of design of subject domain based on Frege object theory is developed, together with the presentation of their functions...

    Provided By Scientific Research

  • White Papers // Jul 2014

    Open-Access Framework for Efficient Object-Oriented Development of Video Analysis Software

    The increasing use of digital video everyday in a multitude of electronic devices, including mobile phones, tablets and laptops, poses the need for quick development of cross-platform video software. However current approaches to this direction usually require a long learning curve and their development lacks standardization. This results in software...

    Provided By Scientific Research

  • White Papers // Jul 2014

    Security and Audit Trail Capabilities of a Facilitated Interface Used to Populate a Database System With Text and Graphical Data Using Widely Available Software

    In this paper, the authors described techniques used to capture, store, and retrieve narrative data forms from a database using widely available off the shelf software. This concept makes use of the security and versioning features of database architecture together with those of image-supported electronic document information capture. They present...

    Provided By Scientific Research

  • White Papers // Jul 2014

    Requirement Change Management in Global Software Environment Using Cloud Computing

    The successful implementation of any software project depends upon the requirements. Change in requirements at any stage during the life cycle of software development is taken as a healthy process. However, making out this change in a co-located environment is somewhat easier than the distributed environment where stakeholders are scattered...

    Provided By Scientific Research

  • White Papers // Jul 2014

    Cloud Computing and Big Data: A Review of Current Service Models and Hardware Perspectives

    Big data applications are pervading more and more aspects of the people life, encompassing commercial and scientific uses at increasing rates as they move towards exascale analytics. Examples of big data applications include storing and accessing user data in commercial clouds, mining of social data, and analysis of large-scale simulations...

    Provided By Scientific Research

  • White Papers // Jul 2014

    Formal Methods for Commercial Applications Issues vs. Solutions

    It was advocated that in 21st century, most of software will be developed with benefits of formal methods. The benefits include faults found in earlier stage of software development, automating, checking the certain properties and minimizing rework. In spite of their recognition in academic world and these claimed advantages, formal...

    Provided By Scientific Research

  • White Papers // Jul 2014

    Software Frameworks, Architectural and Design Patterns

    Software systems can be among the most complex constructions in engineering disciplines and can span into years of development. Most software systems though implement in part what has already been built and tend to follow known or nearly known architectures. Although most software systems are not of the size of...

    Provided By Scientific Research

  • White Papers // Jul 2014

    Refining Use/Misuse/Mitigation Use Cases for Security Requirements

    The authors investigate security at the same time as the functional requirements by refining and integrating use, misuse, and mitigation use cases. Security requirements rely on the interactions among normal system execution (use cases), attacks (misuse cases), and necessary security strategies (mitigation use cases), but previous approaches only use a...

    Provided By Scientific Research

  • White Papers // Dec 2008

    Towards Automatic Transformation from UML Model to FSM Model for Web Applications

    The need for automatic testing of large-scale web applications suggests the use of model-based testing technology. Among various modeling languages, UML is widely spread and used for its simplicity, understandability and ease of use. But rigorous analysis for UML model is difficult due to its lack of precise semantics. On...

    Provided By Scientific Research

  • White Papers // Dec 2008

    Two-Tier GCT Based Approach for Attack Detection

    The frequent attacks on network infrastructure, using various forms of denial of service attacks, have led to an increased need for developing new techniques for analyzing network traffic. If efficient analysis tools were available, it could become possible to detect the attacks and to take action to weaken those attacks...

    Provided By Scientific Research

  • White Papers // Dec 2008

    Development of an Improved GUI Automation Test System Based on Event-Flow Graph

    A more automated Graphic User Interface (GUI) test model, which is based on the event-flow graph, is proposed. In the model, a user interface automation API tool is first used to carry out reverse engineering for a GUI test sample so as to obtain the event-flow graph. Then two approaches...

    Provided By Scientific Research

  • White Papers // Dec 2008

    A New Communication Framework for Networked Mobile Games

    The game industry is growing very rapidly with a speed of \"A near doubling in size in a two-year period\". The mobile devices, especially cell phones, are getting popular and have been a solid part of the people daily life. This paper introduces a two-layer UDP datagram-based communication framework for...

    Provided By Scientific Research

  • White Papers // Dec 2008

    Designing and Verifying Communication Protocols Using Model Driven Architecture and Spin Model Checker

    The need of communication protocols in today's environment increases as much as the network explores. Many new kinds of protocols, e.g. for information sharing, security, etc., are being developed day-to-day which often leads to rapid, premature developments. Many protocols have not scaled to satisfy important properties like deadlock and livelock...

    Provided By Scientific Research

  • White Papers // Dec 2008

    Eliciting Theory About a Retirement Process

    The software community has been so much focused on creating and improving development and evolution processes, so that it has completely forgotten retirement. Today, there are no retirement process models whatsoever despite the fact that many software organizations desperately need guidelines for retiring their old software systems. In this paper,...

    Provided By Scientific Research

  • White Papers // Aug 2014

    Trust Evaluation Based on Node's Characteristics and Neighbouring Nodes' Recommendations for WSN

    In Wireless Sensor Networks (WSNs), the traditional cryptographic mechanisms for security require higher consumption of resources such as large memory, high processing speed and communication bandwidth. Also, they cannot detect faulty, malicious and selfish nodes which lead to the breakdown of network during packet routing. Hence, cryptographic security mechanisms are...

    Provided By Scientific Research

  • White Papers // Aug 2014

    Review of the State of Art of Tunable Impulse Ultra-Wideband Technology as Integrator for Wireless Sensing and Identifications Short-Range Networks

    Impulse based ultra wideband technology has been the motivation of many recent researches with the potential of many applications to be researched. The uniqueness of the physical characteristics of the generated signal combined with the high flexibility of for different data rates at the physical layer design level have been...

    Provided By Scientific Research

  • White Papers // Jul 2014

    Mobility Conscious Medium Access Control Scheme for Wireless Sensor Networks: A Conceptual Approach

    Mobility in Wireless Sensor Network (WSN) presents distinctive challenges in Medium Access Control (MAC) scheme. Numerous MAC protocols for sensor networks assume that sensor nodes are static and focus primarily on energy efficiency. This paper seeks to develop an improved mobility conscious medium access control scheme for wireless sensor networks...

    Provided By Scientific Research

  • White Papers // Jun 2014

    Connectivity-Based Data Gathering with Path-Constrained Mobile Sink in Wireless Sensor Networks

    The design of an effective and robust data gathering algorithm is crucial to the overall performance of Wireless Sensor Networks (WSN). However, using traditional routing algorithms for data gathering is energy-inefficient for sensor nodes with limited power resources and multi-hop communication protocols. Data gathering with mobile sinks provided an effective...

    Provided By Scientific Research

  • White Papers // Jun 2014

    Analysis of Hops Length in Wireless Sensor Networks

    Wireless sensor networks are provided with a limited source of power. The lifetime of such networks is an overwhelming matter in most network applications. This lifetime depends strongly on how efficiently such energy is distributed over the nodes especially during transmitting and receiving data. Each node may route messages to...

    Provided By Scientific Research