Scientific Research

Displaying 41-80 of 746 results

  • White Papers // Jul 2014

    Cloud Computing and Big Data: A Review of Current Service Models and Hardware Perspectives

    Big data applications are pervading more and more aspects of the people life, encompassing commercial and scientific uses at increasing rates as they move towards exascale analytics. Examples of big data applications include storing and accessing user data in commercial clouds, mining of social data, and analysis of large-scale simulations...

    Provided By Scientific Research

  • White Papers // Jul 2014

    Tree-Based Revocation for Certificateless Authentication in Vehicular Ad-Hoc Networks

    In this paper, the authors propose authentication based on identity as a way to increase the efficiency and security of communications in vehicular ad-hoc networks. When using identity-based cryptography to achieve certificate-less authentication, membership revocation is not a trivial problem. Thus, in order to improve the performance of revocation in...

    Provided By Scientific Research

  • White Papers // Jul 2014

    Adaptive Mobile Applications to Dynamic Context

    As mobile devices continue to become more resource-rich in terms of their processing power, memory, and display, they can support sophisticated applications ranging from browsing and messaging to navigation and gaming. Context-aware computing is a mobile computing paradigm in which applications can discover and take advantage of contextual information, such...

    Provided By Scientific Research

  • White Papers // Jul 2014

    Regression Testing in Developer Environment for Absence of Code Coverage

    The techniques of test case prioritization schedule the execution order of test cases to attain respective target, such as enhanced level of forecasting the fault. The requirement of the prioritization can be viewed as the en-route for deriving an order of relation on a given set of test cases which...

    Provided By Scientific Research

  • White Papers // Jul 2014

    Fine-Grained Work Element Standardization for Project Effort Estimation

    Traditional project effort estimation utilizes development models that span the entire project life cycle and thus culminates estimation errors. This paper is the first attempt to break each project activity down to smaller work elements. There are eight work elements, each of which is being defined and symbolized with visually...

    Provided By Scientific Research

  • White Papers // Jul 2014

    FOTool: Modelling Indigenous Community Cultures in Sarawak

    Formal-Object Tool (FOTool) is a software modeling approach that integrates formal specification and object oriented model. FOTool integrates the rigour of formal methods and the ease of use of Object Oriented (OO) techniques. The idea of FOTool is to provide an easy interface by allowing the application developer to develop...

    Provided By Scientific Research

  • White Papers // Jul 2014

    Open-Access Framework for Efficient Object-Oriented Development of Video Analysis Software

    The increasing use of digital video everyday in a multitude of electronic devices, including mobile phones, tablets and laptops, poses the need for quick development of cross-platform video software. However current approaches to this direction usually require a long learning curve and their development lacks standardization. This results in software...

    Provided By Scientific Research

  • White Papers // Jul 2014

    Security and Audit Trail Capabilities of a Facilitated Interface Used to Populate a Database System With Text and Graphical Data Using Widely Available Software

    In this paper, the authors described techniques used to capture, store, and retrieve narrative data forms from a database using widely available off the shelf software. This concept makes use of the security and versioning features of database architecture together with those of image-supported electronic document information capture. They present...

    Provided By Scientific Research

  • White Papers // Jul 2014

    Requirement Change Management in Global Software Environment Using Cloud Computing

    The successful implementation of any software project depends upon the requirements. Change in requirements at any stage during the life cycle of software development is taken as a healthy process. However, making out this change in a co-located environment is somewhat easier than the distributed environment where stakeholders are scattered...

    Provided By Scientific Research

  • White Papers // Jul 2014

    Formal Methods for Commercial Applications Issues vs. Solutions

    It was advocated that in 21st century, most of software will be developed with benefits of formal methods. The benefits include faults found in earlier stage of software development, automating, checking the certain properties and minimizing rework. In spite of their recognition in academic world and these claimed advantages, formal...

    Provided By Scientific Research

  • White Papers // Jul 2014

    Software Frameworks, Architectural and Design Patterns

    Software systems can be among the most complex constructions in engineering disciplines and can span into years of development. Most software systems though implement in part what has already been built and tend to follow known or nearly known architectures. Although most software systems are not of the size of...

    Provided By Scientific Research

  • White Papers // Jul 2014

    Refining Use/Misuse/Mitigation Use Cases for Security Requirements

    The authors investigate security at the same time as the functional requirements by refining and integrating use, misuse, and mitigation use cases. Security requirements rely on the interactions among normal system execution (use cases), attacks (misuse cases), and necessary security strategies (mitigation use cases), but previous approaches only use a...

    Provided By Scientific Research

  • White Papers // Jul 2014

    Design of Reconfigurable Band Notches Antenna for Cognitive Radio Applications

    In this paper, an antenna with reconfigurable band notches, for cognitive radio applications, is proposed. The antenna can be operated as ultra wideband, and is reconfigurable in terms of the ability to select a notched band in the SRR resonant frequency. The reconfigurable band notches are induced using a band-stop...

    Provided By Scientific Research

  • White Papers // Jul 2014

    An Efficient Billing Scheme for Trusted Nodes Using Fuzzy Logic in Wireless Sensor Networks

    Extending the lifetime of the Wireless Sensor Networks (WSNs), where recharging sensors is not always possible, has been a major concern for researchers for the past decade. In this paper, the authors study the cooperation between nodes in wireless sensor networks in forwarding packets to others, and they propose a...

    Provided By Scientific Research

  • White Papers // Jul 2014

    Dual Band MIMO Antenna Composed of Two Low Profile Unbalanced Fed Inverted L Antennas for Wireless Communications

    The dual band antennas have been investigated with the development of wireless communication systems in recent years. Most of these dual or multiple band antennas have an omnidirectional radiation pattern. A low profile dual-band Multiple-Input-Multiple-Output (MIMO) antenna system is proposed. The proposed MIMO antenna consists of two low profiles unbalanced...

    Provided By Scientific Research

  • White Papers // Jul 2014

    Keystroke Authentication on Enhanced Needleman Alignment Algorithm

    An important point for computer systems is the identification of users for authentication. One of these identification methods is keystroke dynamics. The keystroke dynamics is a biometric measurement in terms of keystroke press duration and keystroke latency. However, several problems are arisen like the similarity between users and identification accuracy....

    Provided By Scientific Research

  • White Papers // Jul 2014

    Semantic Recognition of a Data Structure in Big-Data

    Data governance is a subject that is becoming increasingly important in business and government. In fact, good governance data allows improved interactions between employees of one or more organizations. Data quality represents a great challenge because the cost of non-quality can be very high. Therefore, the use of data quality...

    Provided By Scientific Research

  • White Papers // Jun 2014

    Connectivity-Based Data Gathering with Path-Constrained Mobile Sink in Wireless Sensor Networks

    The design of an effective and robust data gathering algorithm is crucial to the overall performance of Wireless Sensor Networks (WSN). However, using traditional routing algorithms for data gathering is energy-inefficient for sensor nodes with limited power resources and multi-hop communication protocols. Data gathering with mobile sinks provided an effective...

    Provided By Scientific Research

  • White Papers // Jun 2014

    Analysis of Hops Length in Wireless Sensor Networks

    Wireless sensor networks are provided with a limited source of power. The lifetime of such networks is an overwhelming matter in most network applications. This lifetime depends strongly on how efficiently such energy is distributed over the nodes especially during transmitting and receiving data. Each node may route messages to...

    Provided By Scientific Research

  • White Papers // Jun 2014

    Differentially-Keyed IR-UWB Signals for MA with Differential-Detection Receiver

    Non-coherent communication receivers (differential-detectors) have simple design, however, they always incur Bit Error Rate (BER) performance loss up to 3dB compared to coherent receivers. In this paper, a differential-detector is proposed for Impulse Radio Ultra WideBand (IR-UWB) communication systems. The system employs bit-level Differential Phase Shift Keying (DPSK) combined with...

    Provided By Scientific Research

  • White Papers // Jun 2014

    Performance of WSNs Under the Effect of Collisions and Interference

    In this paper, the authors propose a methodology for calculating the energy consumed by a Wireless Sensor Network (WSN) as well as its throughput under the effect of a jamming node modeling interference to account for collisions and retransmissions. Accordingly, the proposed methodology takes into consideration retransmissions and data dropped...

    Provided By Scientific Research

  • White Papers // Jun 2014

    Smart Location-Based Mobile Shopping Android Application

    In the paper, a smart location-based mobile shopping application for Android devices is proposed. The Geo-position of the user's mobile device is utilized to produce location information in shopping application. The flow of the application is that user searches a product, and then SAGO identifies the location and searches the...

    Provided By Scientific Research

  • White Papers // Jun 2014

    Reliability Estimation of Services Oriented Systems Using Adaptive Neuro Fuzzy Inference System

    In order to make system reliable, it should inhibit guarantee for basic service, data flow, composition of services, and the complete workflow. In Service-Oriented Architecture (SOA), the entire software system consists of an interacting group of autonomous services. Some soft computing approaches have been developed for estimating the reliability of...

    Provided By Scientific Research

  • White Papers // Jun 2014

    An Analytical Framework for Disconnection Prediction in Wireless Networks

    The stability and reliability of links in wireless networks is dependent on a number of factors such as the topology of the area, inter-base station or inter-mobile station distances, weather conditions and so on. Link instability in wireless networks has a negative impact on the data throughput and thus, the...

    Provided By Scientific Research

  • White Papers // Jun 2014

    Apple's Lion vs Microsoft's Windows 7: Comparing Built-In Protection Against ICMP Flood Attacks

    With the increase in the number of computers connected to Internet, the number of Distributed Denial of Service (DDoS) attacks has also been increasing. A DDoS attack consumes the computing resources of a computer or a server, by degrading its computing performance or by preventing legitimate users from accessing its...

    Provided By Scientific Research

  • White Papers // Jun 2014

    Iterative Soft Decoding of Multiple Description Image over Wireless Channel

    Motivated by recent results in multiple description images coding over wireless networks, the authors propose a scheme for transmission of multiple descriptions through hybrid packet loss and additive white Gaussian noise channel. Each description is coded into multiple bit-streams by applying SPIHT coding on wavelet trees along spatial orientations and...

    Provided By Scientific Research

  • White Papers // Jun 2014

    Practical Security Approaches Against Border Gateway Protocol (BGP) Session Hijacking Attacks Between Autonomous Systems

    The Border Gateway Protocol (BGP) is the default inter domain routing protocol used on the internet for exchanging information between autonomous systems. Available literature suggests that BGP is vulnerable to session hijacking attacks. There are a number of proposals aimed at improving BGP security which have not been fully implemented....

    Provided By Scientific Research

  • White Papers // Jun 2014

    A Survey of SQL Injection Attack Detection and Prevention

    Structured Query Language Injection Attack (SQLIA) is the most exposed to attack on the Internet. From this attack, the attacker can take control of the database therefore be able to interpolate the data from the database server for the website. Hence, the big challenge became to secure such website against...

    Provided By Scientific Research

  • White Papers // Jun 2014

    Computer Aided Call for Tenders: A Tool for Software Bidding

    Under a broad comprehension of software engineering, it is preferred the term software life cycle instead of just software production. The reason is that cycle starts at software conception and stops when the software is relegated. Given contemporary companies' market strategies of focusing on their competitive advantages, most of them...

    Provided By Scientific Research

  • White Papers // Jun 2014

    Multilayer Authentication for Communication Systems Based on Physical-Layer Attributes

    In this paper, a multilayer security solution is introduced, in order to accord the required end-to-end security blanket to the heterogeneous networks by considering the properties used by authentication at the physical-layer in transport-layer authentication. In particular, after achieving an authentication level based on the estimated Channel Impulse Response (CIR)...

    Provided By Scientific Research

  • White Papers // Jun 2014

    Creation of Virtual Wi-Fi Access Point and Secured Wi-Fi Pairing, through NFC

    The growing ubiquity of Wi-Fi networks combined with the integration of low-cost Wi-Fi chipsets in all devices makes Wi-Fi as the wireless technology the most used for accessing to internet. This means that the development of a Wi-Fi strategy has become an imperative for almost all operators worldwide. In this...

    Provided By Scientific Research

  • White Papers // Jun 2014

    Multi-Cultural Dynamics on Social Networks Under External Random Perturbations

    In this paper, the authors deal with the development of multi-cultural network-centric dynamic models under the influence of personal intra- and inter-members, as well as community. Each individual member of a society is influenced by the user interactions with fellow members of the family, neighborhood, region and the universe. The...

    Provided By Scientific Research

  • White Papers // May 2014

    Analysis of Different Call Admission Control Strategies and Its Impact on the Performance of LTE-Advanced Networks

    The Call Admission Control (CAC) optimizes the use of allocated channels against offered traffic maintaining the required Quality of Service (QoS). Provisioning QoS to user at cell-edge is a challenge where there is limitation in cell resources due to Inter-Cell Interference (ICI). Soft Frequency Reuse is ICI mitigation scheme that...

    Provided By Scientific Research

  • White Papers // May 2014

    On the Development of Realistic Cross Layer Communication Protocol for Wireless Sensor Networks

    Traditional protocols in Wireless Sensor Networks (WSNs) follow the strict layering techniques which lead to the degradation in performance of the QoS (Quality of Service) parameters. Battery powered tiny sensor nodes with constraints of energy and guaranteed time require the efficient communication protocols with innovative and optimized approach to attain...

    Provided By Scientific Research

  • White Papers // May 2014

    Cognitive Software Engineering: A Research Framework and Roadmap

    The work of software engineers is inherently cognitive. Integral to their duties is understanding and developing several artifacts. Each one is based on a specific model and a given level of abstraction. What distinguishes software engineering is the logical complexity of some artifacts (especially programs), the high dependency among them,...

    Provided By Scientific Research

  • White Papers // May 2014

    Challenges for Software Engineering in Automation

    In this paper, the authors give an introduction to the essential challenges of software engineering and requirements that software has to fulfill in the domain of automation. Besides, the functional characteristics, specific constraints and circumstances are considered for deriving requirements concerning usability, the technical process, the automation functions, used platform...

    Provided By Scientific Research

  • White Papers // May 2014

    A Survey of Concepts Location Enhancement for Program Comprehension and Maintenance

    When correcting a fault, adding a new concept or feature, or adapting a system to conform to a new platform, software engineers must first find the relevant parts of the code that correspond to a particular change. This is termed as concept or feature location process. Several techniques have been...

    Provided By Scientific Research

  • White Papers // May 2014

    Community Detection in Dynamic Social Networks

    There are many community detection algorithms for discovering communities in networks, but very few deal with networks that change structure. The SCANs (Structural Clustering Algorithm for Networks) algorithm is one of these algorithms that detect communities in static networks. To make SCAN more effective for the dynamic social networks that...

    Provided By Scientific Research

  • White Papers // May 2014

    Bandwidth Constrained Priority-Based Routing Algorithm for Mobile Ad Hoc Networks

    A Mobile Ad hoc NETwork (MANET) is a dynamically formed self-configured network by an autonomous system of mobile nodes connected by wireless links. With the advancements of wireless technology, the necessity of Quality of Service (QoS) is increasing rapidly. Developing QoS constraint routing protocol for MANETs is still a challenging...

    Provided By Scientific Research

  • White Papers // May 2014

    Application of Machine-Learning Based Prediction Techniques in Wireless Networks

    Wireless networks are key enablers of ubiquitous communication. With the evolution of networking technologies and the need for these to inter-operate and dynamically adapt to user requirements, intelligent networks are the need of the hour. Use of machine learning techniques allows these networks to adapt to changing environments and enables...

    Provided By Scientific Research