Scientific Research

Displaying 201-240 of 746 results

  • White Papers // Sep 2013

    RSS Based Bridge Scour Measurement Using Underwater Acoustic Sensor Networks

    Bridge Scour is one of the major causes of bridge failures all around the world and there have been significant efforts for its detection and measurement using different acoustic approaches. In this paper, the authors propose and investigate an effective method to utilize Received Signal Strength (RSS) for measuring scour...

    Provided By Scientific Research

  • White Papers // Sep 2013

    Performance Evaluation of Flows with Diverse Traffic and Transmission Rates in IEEE 802.11 WLAN

    IEEE 802.11 WLAN cannot guarantee the QoS of applications, thus admission control has been proposed as an essential solution to enhance the QoS. Packet delay and throughput are commonly employed as assessment criterions to determine whether a new connection can be admitted into the WLAN. Considering the real network condition,...

    Provided By Scientific Research

  • White Papers // Sep 2013

    Employing Orphan Nodes to Avoid Energy Holes in Wireless Sensor Networks

    When energy consumption by wireless sensor nodes gets off balance, partitions in the network appear because several of the nodes stop functioning. The respective network's lifetime also diminishes. This problem is commonly known as the \"Hot spot\" or \"Energy hole\" phenomenon. To resolve this issue, a Multi-hop Decentralized Cluster-based Routing...

    Provided By Scientific Research

  • White Papers // Sep 2013

    Performance Analysis of Multiband Impulse Radio UWB Communication System Based on PSWF

    To improve the data transmission rate and use spectrum flexibly, a new spectrum allocation method for MultiBand Impulse Radio UWB (MB-IR-UWB) is proposed in this paper, based on the band-limited and orthogonal characteristics of Prolate Spheroidal Wave Function (PSWF). The system model is built and the Bit Error Rate (BER)...

    Provided By Scientific Research

  • White Papers // Sep 2013

    A Routing Protocol for Wireless Sensor Networks with Congestion Control

    In this paper, the authors proposed a novel RED protocol which takes the node's energy into account depending on the length of the data packet. It also proposed a routing protocol for wireless sensor networks with congestion control which imitates the ant colony foraging behavior. Sensor nodes choose routings according...

    Provided By Scientific Research

  • White Papers // Sep 2013

    Adaptive Rate Control for Multi-Antenna Multicast in OFDM Systems

    The authors propose two rate control schemes for multi-antenna multicast in OFDM systems, which aim to maximize the minimum average rate over all users in a multicast group. In their system, they do not require all multicast users to successfully recover the signals received on each subcarrier. In contrast, they...

    Provided By Scientific Research

  • White Papers // Sep 2013

    Component Carrier Selection and Beamforming on Carrier Aggregated Channels in Heterogeneous Networks

    In this paper, component carrier selection and beamforming on carrier aggregated channels in heterogeneous networks are proposed. The scheme jointly selects the component carrier and precoding (i.e. beamforming) vectors with the co-operation of the other cells to deal with the interference between Macro cell and Pico cell. The component carrier...

    Provided By Scientific Research

  • White Papers // Sep 2013

    A Resource Allocation Algorithm of Physical-Layer Security for OFDMA System under Non-ideal Condition

    In this paper, a resource allocation scheme based on physical layer security under non-ideal condition for OFDMA system is introduced. Firstly, the program uses the information security constructing an OFDMA system wiretap channel model under non-ideal condition. Based on this model, artificial noise is generated for secure communications combating passive...

    Provided By Scientific Research

  • White Papers // Sep 2013

    Artificial Noise Based Security Algorithm for Multi-User MIMO System

    The existing physical layer security algorithm, which is based on artificial noise, could affect legitimate receivers negatively when the number of users is no less than sending antennas in multi-user MIMO system. In order to improve security of multi-user MIMO system under this scenario, the authors propose a new multi-user...

    Provided By Scientific Research

  • White Papers // Sep 2013

    A Resource Reuse Scheme of D2D Communication Underlaying LTE Network with Intercell Interference

    With the growing concern on data rates and resource utilization, Device-To-Device (D2D) communication has been raised in 3GPP Long-Term Evolution (LTE) networks. In order to limit severe interference, previous studies mainly focus on intra-cell interference that between cellular links and local D2D links. In this paper, the authors consider both...

    Provided By Scientific Research

  • White Papers // Sep 2013

    A New Family of Optical Codes Based on Complementary Theory for OCDMA System

    A new family of optical codes for Optical Code-Division Multiple Access (OCDMA) systems, named as Optical Complementary Codes (OCCs), is proposed in this paper. The constructions of these codes consist of multiple sub-codes, and the codes have an auto-correlation interference constraint as 0 and a cross-correlation interference constraint as 1....

    Provided By Scientific Research

  • White Papers // Sep 2013

    A Swarm Intelligence Networking Framework for Small Satellite Systems

    Recent development of technologies and methodologies on distributed spacecraft systems enable the small satellite network systems by supporting integrated navigation, communications and control tasks. The distributed sensing data can be communicated and processed autonomously among the network systems. Due to the size, density and dynamic factors of small satellite networks,...

    Provided By Scientific Research

  • White Papers // Sep 2013

    Outage Performance of Cognitive Relay Networks with Best Relay Selection in Nakagami-m Channels

    In this paper, the authors investigate the outage performance of a cognitive relay network considering best relay selection in Nakagami-m fading environment. The secondary user is allowed to use the spectrum when it meets the interference constraints predefined by primary user. Due to deep fading, cognitive source is unable to...

    Provided By Scientific Research

  • White Papers // Sep 2013

    Three-Points Modulator Based on DPLL for Wideband Polar Modulation

    The authors present a nonlinear event-driven model of a digital PLL used in the context of a polar modulation. This modeling has shown that the estimation method of the TDC gain has a big impact on the EVM for wideband modulation and a solution has been proposed which consists to...

    Provided By Scientific Research

  • White Papers // Sep 2013

    A Joint User Selection and Resources Optimization Scheduling Algorithm for CoMP

    Coordinated Multi-Point (CoMP) transmission technology is one of the key techniques in LTE-advanced, which can share the channel and data information in multiple cells, and optimize the whole system performance. In order to optimize the average sector throughput and improve the fairness of resource scheduling, a scheduling algorithm based on...

    Provided By Scientific Research

  • White Papers // Sep 2013

    User Fairness Scheme with Proportional Fair Scheduling in Multi-user MIMO Limited Feedback System

    In Multi-User MIMO (MU-MIMO) downlink system, suitable user selection schemes can improve spatial diversity gain. In most of previous papers, it is always assumed that the Base Station (BS) knows full Channel State Information (CSI) of each user, which does not consider the reality. However, there are only limited feedback...

    Provided By Scientific Research

  • White Papers // Sep 2013

    Pipeline Structure Schnorr-Euchner Sphere Decoding Algorithm

    The authors propose a pipeline structure for Schnorr-Euchner sphere decoding algorithm in this paper. It divides the search tree of the original algorithm into blocks and executes the search from block to block. When one block search of a signal is over, the part in the pipeline structure that processes...

    Provided By Scientific Research

  • White Papers // Sep 2013

    Reduction of the Clipping Noise for OFDM/OQAM System

    Orthogonal Frequency Division Multiplex/Offset QAM (OFDM/OQAM) has been proven to be a promising Multi-Carrier Modulation (MCM) technique for the transmission of signals over multipath fading channels. However, OFDM/OQAM has also the intrinsic disadvantage of high Peak-to-Average-Power Ratio (PAPR) that should be alleviated. This paper focuses on the reduction of the...

    Provided By Scientific Research

  • White Papers // Sep 2013

    Signal Detection Based on Walsh Transform for Spectrum Sensing

    Spectrum sensing is a key technology to improve spectrum efficiency. In this paper, the authors propose a novel signal detection method based on Walsh transform for spectrum sensing. The main idea behind is that the received signal is transformed into another domain by Walsh transform and the test statistic is...

    Provided By Scientific Research

  • White Papers // Sep 2013

    Relay Selection and Power Allocation in Amplify-and-Forward Cognitive Radio Systems Based on Spectrum Sharing

    In this paper, the authors consider a spectrum sharing scheme that is a joint optimization of relay selection and power allocation at the secondary transmitter, which aims to achieve the maximum possible throughput for the secondary user. This paper considers the scenario where the primary user is incapable of supporting...

    Provided By Scientific Research

  • White Papers // Sep 2013

    Digital Radio Broadcasting for Community Radios Using Pseudo-random Codes

    The current AM/FM analog radios are generally considered as a means of entertainment, but are also important in many areas of public life. In this paper, the authors aim to present a digital radio broadcasting system that explores the advantages of pseudo-random codes. In this paper, a transmitter and its...

    Provided By Scientific Research

  • White Papers // Sep 2013

    Resource Allocation and Beamforming Algorithm Based on Interference Avoidance Approach for Device-to-Device Communication Underlaying LTE Cellular Network

    In this paper, the authors consider Device-To-Device (D2D) direct communication underlaying a 3GPP LTE-A network. D2D communication enables new service opportunities, provides high throughput and reliable communication while reducing the base station load. For better total performance, D2D links and cellular links share the same radio resource and the management...

    Provided By Scientific Research

  • White Papers // Sep 2013

    An Enhanced Difference Method for Multi-objective Model of Cellular Base Station Antenna Configurations

    In this paper, the authors propose a fine-grained grid-based multi-objective model which aims at optimizing base station antennas' configurations, such as transmit power, antenna tilt and antenna azimuth, in order to upgrading network performance in cellular networks. As the model is non-convex, non-smooth and discrete and computationally expensive, they use...

    Provided By Scientific Research

  • White Papers // Sep 2013

    Collision Detection and the Design of Fair and Stable MAC Scheme for Wireless Ad Hoc Networks

    Fairness and stability guarantee among TCP flows is very stubborn in wireless ad hoc networks. There is not a MAC protocol that can fulfill this acquirement until now. In this paper, the authors firstly reveal the in-depth causes of the severe TCP unfairness and instability problems in IEEE 802.11-based multihop...

    Provided By Scientific Research

  • White Papers // Sep 2013

    Design and Implementation of Mobile Services Evaluation System

    With the development of mobile network technology, mobile Web services have also been more and more attention, but standard Web protocols are not applicable in a mobile environment, so people began to design more efficient, compact and consume less mobile Web services protocol. In the course of research services protocol,...

    Provided By Scientific Research

  • White Papers // Sep 2013

    Resource Allocation Method of Device-to-Device Communication

    In this paper, the authors study D2D (Device-To-Device) communication underlying LTE-advanced uplink system. Since D2D communication reuses uplink resources with cellular communication in this scenario, it's hard to avoid the inference between D2D users and cellular users. If there is no restriction for D2D communication on using the whole uplink...

    Provided By Scientific Research

  • White Papers // Sep 2013

    Comparisons of Short-Prefix Based Channel Estimation in Single-Carrier Communication Systems

    In this paper, the authors compare the performance between channel estimation based on Compressed Sensing (CS) and time-domain Least Square (LS) for Single-Carrier (SC) communication system. Unlike the conventional channel estimation techniques such as frequency domain LS which is used in the condition that the length of pilot sequence is...

    Provided By Scientific Research

  • White Papers // Sep 2013

    Performance of HARQ in Device-to-Device Communication

    In this paper, the authors study D2D (Device-To-Device) communication underlying LTE-advanced uplink system. Since D2D communication reuses uplink resources with cellular communication in this scenario, it's hard for D2D users to avoid the interference from cellular users while cellular users are communication with eNB (evolved Node B). HARQ (Hybrid Automatic...

    Provided By Scientific Research

  • White Papers // Sep 2013

    Sidelobe Suppression in CR-OFDM System by Adding Extended Data Carriers

    Out-band radiation is a severe problem for Cognitive Radio with OFDM system (CR-OFDM) which is caused by the sidelobe of OFDM signals. Lots of studies have been done on suppressing the sidelobe power and numerous methods have been proposed. In this paper, the authors propose a novel method to minimize...

    Provided By Scientific Research

  • White Papers // Sep 2013

    A 30GHz Wideband CMOS Injection-Locked Frequency Divider for 60GHz Transceiver

    In this paper, a 30GHz wide locking-range (26.2GHz-35.7GHz) directs Injection-Locked Frequency Divider (ILFD), which operating in the MilliMeter-Wave (MMW) band, is presented. The locking range of the ILFD is extended by using differential injection topology. Besides, varactors are used in RLC resonant tank for extending the frequency tuning range. The...

    Provided By Scientific Research

  • White Papers // Sep 2013

    Dynamic K-Best Sphere Decoding Algorithms for MIMO Detection

    Multiple Input Multiple Output (MIMO) technology is of great significance in high data rate wireless communication. The K-Best Sphere Decoding (K-Best SD) algorithm was proposed as a powerful method for MIMO detection that can approach near-optimal performance. However, some extra computational complexity is contained in K-Best SD. In this paper,...

    Provided By Scientific Research

  • White Papers // Sep 2013

    Impulse Radio UWB Signal Detection Based on Compressed Sensing

    The extremely high sampling rate is a challenge for Ultra-WideBand (UWB) communication. In this paper, the authors study the Compressed Sensing (CS) based Impulse Radio UWB (IR-UWB) signal detection and propose an IR-UWB signal detection algorithm based on Compressive Sampling Matching Pursuit (CoSaMP). The proposed algorithm relies on the fact...

    Provided By Scientific Research

  • White Papers // Sep 2013

    Heuristic Channel Estimation Based on Compressive Sensing in LTE Downlink Channel

    Pilot-assisted channel estimation has been investigated to improve the performance of OFDM based LTE systems. LS and MMSE method do not perform excellently because they do not consider the inherent sparse feature of wireless channel. The sparse feature of channel impulse response satisfies the requirement of using Compressive Sensing (CS)...

    Provided By Scientific Research

  • White Papers // Sep 2013

    Two-Step Resource Block Allocation Algorithm for Data Rate Maximization in LTE Downlink Systems

    In this paper, the authors focus on resource block allocation issue in the downlink transmission systems of the Long Term Evolution (LTE). In existing LTE standards, all Allocation Units (AUs) allocated to any user must adopt the same Modulation and Coding Scheme (MCS), which is determined by the AU with...

    Provided By Scientific Research

  • White Papers // Sep 2013

    Cross-layer Resource Allocation on Broadband Power Line Based on Novel QoS-priority Scheduling Function in MAC Layer

    Traditional resource allocation algorithms use the hierarchical system, which does not apply to the bad channel environment in broadband power line communication system. Introducing the idea of cross-layer can improve the utilization of resources and ensure the QoS of services. This paper proposes a cross-layer resource allocation on broadband power...

    Provided By Scientific Research

  • White Papers // Sep 2013

    Modulation for Digital Radio Broadcasting Using Amplitude Autocorrelation of Pseudo Random Noise Codes to Carry Information

    The perception of the environment that surrounds the people and information generated from this perception are rationalized to form their knowledge. The frequency bands used in mobile communications are allocated according to the type of application. With the need for more channels, the frequency spectrum has become a scarce natural...

    Provided By Scientific Research

  • White Papers // Sep 2013

    An Improved Selective Mapping Method for PAPR Reduction in OFDM/OQAM System

    Orthogonal Frequency Division Multiplex/Offset QAM (OFDM/OQAM) has been proven to be a promising Multi-Carrier Modulation (MCM) technique for the transmission of signals over multipath fading channels. However, OFDM/OQAM has also the intrinsic disadvantage of high Peak-to-Average-Power Ratio (PAPR) that should be alleviated. In this paper, a novel SeLective Mapping (SLM)...

    Provided By Scientific Research

  • White Papers // Sep 2013

    Secure Communications for Two-Way Relay Networks Via Relay Chatting

    In this paper, the authors investigate a two-way relay network consisting of two sources, multiple cooperative relays and an eavesdropper. To enhance secure communications, a new relay chatting based on transmission scheme is proposed. Specifically, the proposed scheme selects a best relay that maximize the sum mutual information among the...

    Provided By Scientific Research

  • White Papers // Sep 2013

    Interference Cancellation Algorithm for 2

    Interference Cancellation System (ICS) for 3GPP/LTE system is the broadband cancellation system, which receives forward signal through the donor antenna. The authors proposed new algorithm of received signal with pilot and non-pilot design. Although repeater design needs their project, so in this paper, they discuss about interference cancellation algorithm for...

    Provided By Scientific Research

  • White Papers // Sep 2013

    Distributed Coding Modulation Adaptation Scheme for Relay Channel

    Rate adaptation is an effective approach to achieve high spectrum efficiency under varying channel condition, especially for wireless communication. This paper proposes rate adaptation at receiver for wireless relay system. In this scheme, source node uses a new modulation technology, called Random Projections Code (RPC), to achieve rate adaptation. Both...

    Provided By Scientific Research

  • White Papers // Apr 2014

    Cloud and Open BIM-Based Building Information Interoperability Research

    The emergence of Open BIM effectively improves the interoperability of building information. Besides, cloud technology supports virtualization and QoA (Quality of Assurance) in the case of the distributed system and multi-user collaboration. Based on the cloud and the Open BIM, this paper puts forward the cloud services models and the...

    Provided By Scientific Research

  • White Papers // Feb 2014

    Data Security Issues and Challenges in Cloud Computing: A Conceptual Analysis and Review

    Cloud computing is a set of Information Technology services offered to users over the web on a rented base. Such services enable the organizations to scale-up or scale-down their in-house foundations. Generally, cloud services are provided by a third-party supplier who possesses the arrangement. Cloud computing has many advantages such...

    Provided By Scientific Research

  • White Papers // Jun 2013

    Influences of Cloud Computing on E-Commerce Businesses and Industry

    Cloud computing has been one of the most popular topics on information technology, since it was proposed by Google in 2007. In the past years, cloud computing has become from a theoretical concept into the real applications in different industries such as telecommunication and healthcare. Inevitably, its influences on different...

    Provided By Scientific Research

  • White Papers // Aug 2014

    Job Scheduling for Cloud Computing Using Neural Networks

    Cloud computing aims to maximize the benefit of distributed resources and aggregate them to achieve higher throughput to solve large scale computation problems. In this technology, the customers rent the resources and only pay per use. Job scheduling is one of the biggest issues in cloud computing. Scheduling of users'...

    Provided By Scientific Research

  • White Papers // Oct 2014

    Lightweight Virtualization Cluster How to Overcome Cloud Vendor Lock-In

    To overcome vendor lock-in obstacles in public cloud computing, the capability to define transferable cloud-based services is crucial but has not yet been solved satisfactorily. This is especially true for small and medium sized enterprises being typically not able to operate a vast staff of cloud service and IT experts....

    Provided By Scientific Research

  • White Papers // Feb 2014

    Comparative Study of Traditional Network Marketing and E-Commerce Marketing Based on Cloud Computing

    Cloud computing aims to integrate more than one relatively low-cost computing entity into a perfect system of powerful computing capabilities, and distribute these powerful computing capabilities to end-users by the advanced business model. Traditional network marketing has played an important role in the e-commerce industry, bringing invaluable wealth for online...

    Provided By Scientific Research

  • White Papers // Mar 2013

    HA-SLA: A Hierarchical Autonomic SLA Model for SLA Monitoring in Cloud Computing

    Service Level Agreement (SLA) is a fundamental contract between service consumer and service provider which defined the qualities of agreed service. After SLA contraction, it should be monitored during the service invocations to confirm the service level objectives. Most of SLA structure and monitoring frameworks are brought from SOA and...

    Provided By Scientific Research

  • White Papers // Aug 2014

    The Load Balancing Network Service in Cloud Data Centre Environments Risk and Vulnerability Analysis

    Data centre is the consolidation point for provisioning multiple services that drive an enterprise business processes. A discrete event based process model of a reengineered data centre communication network comprising of four data centre LAN nodes with an inclusion of a virtualization server for creating virtual instances of resources and...

    Provided By Scientific Research

  • White Papers // Aug 2013

    Student Experience and Ubiquitous Learning in Higher Education: Impact of Wireless and Cloud Applications

    Mobile learning apps for Smartphone and tablet computer devices have entered Higher Education (HE) market. While universities are investing in new technologies, they also look into cost reduction strategies, including cloud computing. The authors draw upon a case study of a successful migration to mobile virtual environment and effective use...

    Provided By Scientific Research

  • White Papers // Jan 2014

    Simulation Study Based on Somewhat Homomorphic Encryption

    The researcher, put forward the concept of a fully homomorphic encryption, namely under the condition of not unlocking to various operations of crypto-graph, the results from the decrypted plaintext and operation results of the same accordingly. At present paper, homomorphic encryption scheme is most focusing on algorithm efficiency and security...

    Provided By Scientific Research

  • White Papers // Jan 2014

    An Algorithm and Data Process Scheme for Indoor Location Based on Mobile Devices

    Limited by the sampling capacity of the mobile devices, many real-time indoor location systems have such problems as low accuracy, large variance, and non-smooth movement of the estimated position. A new positioning algorithm and a new processing method for sampled data are proposed. Firstly, a positioning algorithm is de-signed based...

    Provided By Scientific Research

  • White Papers // Jan 2014

    Performance Analysis of RFID Framed Slotted Aloha Anti-Collision Protocol

    In this paper, the authors develop a novel mathematical model to estimate the probability distribution function of the number of tags discovered after a certain number of interrogation rounds. In addition, the pdfs of the number of rounds needed to discover all the tags are also calculated. The estimation of...

    Provided By Scientific Research

  • White Papers // Oct 2013

    Performance Analysis of an Autoconfiguration Addressing Protocol for Ad Hoc Networks

    A Mobile Ad hoc NETwork (MANET) is a group of mobile nodes which cooperatively and spontaneously form an IP-based network with no centralized administration. Autoconfiguration protocols are important in maintaining Mobile Ad hoc NETworks (MANETs). In this paper, the authors present an auto configuration protocol called the One-Step Addressing (OSA)...

    Provided By Scientific Research

  • White Papers // Oct 2013

    Track Paging an Optimal Method for Minimizing Paging and Signaling Cost in Mobile IP

    Mobile IP is an Internet standards protocol, which enhances the existing Internet Protocol (IP) to accommodate mobility. In mobile IP protocol, to find the exact location of mobile node for transferring incoming packets to them has a lot of signaling cost. So increasing the performance and decreasing the signaling cost...

    Provided By Scientific Research

  • White Papers // Jul 2014

    Regression Testing in Developer Environment for Absence of Code Coverage

    The techniques of test case prioritization schedule the execution order of test cases to attain respective target, such as enhanced level of forecasting the fault. The requirement of the prioritization can be viewed as the en-route for deriving an order of relation on a given set of test cases which...

    Provided By Scientific Research

  • White Papers // Jun 2014

    Computer Aided Call for Tenders: A Tool for Software Bidding

    Under a broad comprehension of software engineering, it is preferred the term software life cycle instead of just software production. The reason is that cycle starts at software conception and stops when the software is relegated. Given contemporary companies' market strategies of focusing on their competitive advantages, most of them...

    Provided By Scientific Research

  • White Papers // Jun 2014

    Reliability Estimation of Services Oriented Systems Using Adaptive Neuro Fuzzy Inference System

    In order to make system reliable, it should inhibit guarantee for basic service, data flow, composition of services, and the complete workflow. In Service-Oriented Architecture (SOA), the entire software system consists of an interacting group of autonomous services. Some soft computing approaches have been developed for estimating the reliability of...

    Provided By Scientific Research

  • White Papers // Jul 2014

    Fine-Grained Work Element Standardization for Project Effort Estimation

    Traditional project effort estimation utilizes development models that span the entire project life cycle and thus culminates estimation errors. This paper is the first attempt to break each project activity down to smaller work elements. There are eight work elements, each of which is being defined and symbolized with visually...

    Provided By Scientific Research

  • White Papers // May 2014

    Cognitive Software Engineering: A Research Framework and Roadmap

    The work of software engineers is inherently cognitive. Integral to their duties is understanding and developing several artifacts. Each one is based on a specific model and a given level of abstraction. What distinguishes software engineering is the logical complexity of some artifacts (especially programs), the high dependency among them,...

    Provided By Scientific Research

  • White Papers // May 2014

    Tests Management in CALIPSOneo: A MDE Solution

    Testing in software engineering is one of the most important phases although, unfortunately, it cannot be always successfully fulfilled due to time constraints. In most cases, the development phase takes more time than it was estimated, entailing negative effects on the testing phase. The delay increases even more in Research...

    Provided By Scientific Research

  • White Papers // May 2014

    Using Database Management System to Generate, Manage and Secure Personal Identification Numbers (PIN)

    A number of problems are associated with the generation, management and security of PINs, a subset of password. The PINs may be recharge card used by GSM operators or for authentication in ATM. The problems associated with the use of these PINs range from scratching off any of the recharge...

    Provided By Scientific Research

  • White Papers // May 2014

    Challenges for Software Engineering in Automation

    In this paper, the authors give an introduction to the essential challenges of software engineering and requirements that software has to fulfill in the domain of automation. Besides, the functional characteristics, specific constraints and circumstances are considered for deriving requirements concerning usability, the technical process, the automation functions, used platform...

    Provided By Scientific Research

  • White Papers // May 2014

    A Survey of Concepts Location Enhancement for Program Comprehension and Maintenance

    When correcting a fault, adding a new concept or feature, or adapting a system to conform to a new platform, software engineers must first find the relevant parts of the code that correspond to a particular change. This is termed as concept or feature location process. Several techniques have been...

    Provided By Scientific Research

  • White Papers // May 2014

    A New Analysis Concept in Applying Software Reliability Growth Models and Tool Implementation: The SafeMan

    In recent years, many software development organizations have been assessing and analyzing their software product's reliability/quality and judging whether the software product is releasable by using Software Reliability Growth Models (SRGMs) at the final stage of software development. The usage of SRGMs originates in the advantage that various reliability analysis...

    Provided By Scientific Research

  • White Papers // May 2014

    An Application of Paraconsistent Annotated Logic for Design Software Testing Strategies

    Now-a-days, application model systems for decision-making based on non-classical logic such as paraconsistent logic are used successfully in the treatment of uncertainties. The method presented in this paper is based on the fundamental concepts of Paraconsistent Annotated Logic with annotation of 2 values (PAL2v). In this paper, two algorithms based...

    Provided By Scientific Research

  • White Papers // May 2014

    Assessing a Model-Driven Web-Application Engineering Approach

    Model-Driven Engineering (MDE) by reframing software development as the transformation of high-level models, promises lots of gains to Software Engineering in terms of productivity, quality and reusability. Although a number of empirical studies have established the reality of these gains, there are still lots of reluctances toward the adoption of...

    Provided By Scientific Research

  • White Papers // May 2014

    Optimizing Query Results Integration Process Using an Extended Fuzzy C-Means Algorithm

    Cleaning duplicate data is a major problem that persists even though many works have been done to solve it, due to the exponential growth of data amount treated and the necessity to use scalable and speed algorithms. This problem depends on the type and quality of data, and differs according...

    Provided By Scientific Research

  • White Papers // Aug 2014

    An Improved Framework for Requirement Change Management in Global Software Development

    In this paper, an improved framework for Requirement Change Management in Global Software Development (RCM-GSD) has been presented. The objective is to manage the change in requirement specifically in global software development in an appropriate manner. The proposed framework RCM-GSD follows the required processes of RCM and reduces the concerns...

    Provided By Scientific Research

  • White Papers // Aug 2014

    Extracting SOA Candidate Software Services from an Organization's Object Oriented Models

    Class diagrams and use case models are system models that are used to analyze, design and model object oriented systems. In this era of agile computing, service-oriented architecture has become increasingly popular for achieving efficient and agile business solutions that can maintain changes demanded by the business world. This paper...

    Provided By Scientific Research

  • White Papers // Jul 2014

    FOTool: Modelling Indigenous Community Cultures in Sarawak

    Formal-Object Tool (FOTool) is a software modeling approach that integrates formal specification and object oriented model. FOTool integrates the rigour of formal methods and the ease of use of Object Oriented (OO) techniques. The idea of FOTool is to provide an easy interface by allowing the application developer to develop...

    Provided By Scientific Research

  • White Papers // Aug 2014

    Object-Component Development of Application and Systems Theory and Practice

    The Object-Componet Development (OCD) is a variety of the compositional programmings, where a role of elements of assembling is warmed by objects, interfaces and components. For developing application systems, the theory of design of subject domain based on Frege object theory is developed, together with the presentation of their functions...

    Provided By Scientific Research

  • White Papers // Jul 2014

    Open-Access Framework for Efficient Object-Oriented Development of Video Analysis Software

    The increasing use of digital video everyday in a multitude of electronic devices, including mobile phones, tablets and laptops, poses the need for quick development of cross-platform video software. However current approaches to this direction usually require a long learning curve and their development lacks standardization. This results in software...

    Provided By Scientific Research

  • White Papers // Jul 2014

    Security and Audit Trail Capabilities of a Facilitated Interface Used to Populate a Database System With Text and Graphical Data Using Widely Available Software

    In this paper, the authors described techniques used to capture, store, and retrieve narrative data forms from a database using widely available off the shelf software. This concept makes use of the security and versioning features of database architecture together with those of image-supported electronic document information capture. They present...

    Provided By Scientific Research

  • White Papers // Jul 2014

    Requirement Change Management in Global Software Environment Using Cloud Computing

    The successful implementation of any software project depends upon the requirements. Change in requirements at any stage during the life cycle of software development is taken as a healthy process. However, making out this change in a co-located environment is somewhat easier than the distributed environment where stakeholders are scattered...

    Provided By Scientific Research

  • White Papers // Jul 2014

    Cloud Computing and Big Data: A Review of Current Service Models and Hardware Perspectives

    Big data applications are pervading more and more aspects of the people life, encompassing commercial and scientific uses at increasing rates as they move towards exascale analytics. Examples of big data applications include storing and accessing user data in commercial clouds, mining of social data, and analysis of large-scale simulations...

    Provided By Scientific Research

  • White Papers // Jul 2014

    Formal Methods for Commercial Applications Issues vs. Solutions

    It was advocated that in 21st century, most of software will be developed with benefits of formal methods. The benefits include faults found in earlier stage of software development, automating, checking the certain properties and minimizing rework. In spite of their recognition in academic world and these claimed advantages, formal...

    Provided By Scientific Research

  • White Papers // Jul 2014

    Software Frameworks, Architectural and Design Patterns

    Software systems can be among the most complex constructions in engineering disciplines and can span into years of development. Most software systems though implement in part what has already been built and tend to follow known or nearly known architectures. Although most software systems are not of the size of...

    Provided By Scientific Research

  • White Papers // Jul 2014

    Refining Use/Misuse/Mitigation Use Cases for Security Requirements

    The authors investigate security at the same time as the functional requirements by refining and integrating use, misuse, and mitigation use cases. Security requirements rely on the interactions among normal system execution (use cases), attacks (misuse cases), and necessary security strategies (mitigation use cases), but previous approaches only use a...

    Provided By Scientific Research

  • White Papers // Apr 2013

    A Bootstrapping Approach for Software Reliability Measurement Based on a Discretized NHPP Model

    Discrete software reliability measurement has a proper characteristic for describing a software reliability growth process which depends on a unit of the software fault-detection period, such as the number of test runs, the number of executed test cases. This paper discusses discrete software reliability measurement based on a discretized Non-Homogeneous...

    Provided By Scientific Research

  • White Papers // Mar 2013

    Identification and Check of Inconsistencies between UML Diagrams

    Relationships between Unified Modeling Language (UML) diagrams are complex. The complexity leads to inconsistencies between UML diagrams easily. This paper focus on how to identify and check inconsistencies between UML diagrams. 13 consistency rules are given to identify inconsistencies between the most frequent 6 types of UML diagrams in the...

    Provided By Scientific Research