Scientific Research

Displaying 241-280 of 766 results

  • White Papers // Sep 2013

    Sidelobe Suppression in CR-OFDM System by Adding Extended Data Carriers

    Out-band radiation is a severe problem for Cognitive Radio with OFDM system (CR-OFDM) which is caused by the sidelobe of OFDM signals. Lots of studies have been done on suppressing the sidelobe power and numerous methods have been proposed. In this paper, the authors propose a novel method to minimize...

    Provided By Scientific Research

  • White Papers // Sep 2013

    Diversity-Multiplexing Tradeoff and Outage Performance for 2

    In this paper, Diversity-Multiplexing Tradeoff (DMT) curve for 2

    Provided By Scientific Research

  • White Papers // Sep 2013

    Joint Power Control and Scheduling for Two-Cell Energy Efficient Broadcasting with Network Coding

    The authors consider the energy minimization problem for a two-cell broadcasting system, where the focus is devising energy efficient joint power control and scheduling algorithms. To improve the retransmission efficiency, linear network coding is applied to broadcast packets. Combined with network coding, an optimal algorithm is proposed, which is based...

    Provided By Scientific Research

  • White Papers // Sep 2013

    Resource Allocation for OFDMA-MIMO Relay Systems with Proportional Fairness Constraints

    In this paper, the authors study resource allocation problem in Orthogonal Frequency Division Multiple Access Multiple-Input Multiple-Output (OFDMA-MIMO) relay systems and formulate the optimal instantaneous resource allocation problem including subcarrier assignment, relay selection and power allocation to maximize system capacity. Based on the assumption that the availability of perfect Channel...

    Provided By Scientific Research

  • White Papers // Sep 2013

    On the Optimization of Real Time Performance of Software Defined Radio on Linux OS

    With the evolution of the communication standards, Software Defined Radio (SDR) is faced with an increasingly important problem to balance more and more complex wireless communication algorithms against relatively limited processing capability of hardware. And, the competition for computing resources exacerbates the problem and increases time-delay of SDR system. This...

    Provided By Scientific Research

  • White Papers // Sep 2013

    The Application of Ontology in Semantic Discovery for GeoData Web Service

    GeoData Web service is an important way to achieve the integration and sharing of heterogeneous geospatial data at present. However, due to the complexity of GeoData and no semantic supporting Web service discovery, it is very hard for data users to accurately find the GeoData Web Service they really want....

    Provided By Scientific Research

  • White Papers // Sep 2013

    Reduction of the Clipping Noise for OFDM/OQAM System

    Orthogonal Frequency Division Multiplex/Offset QAM (OFDM/OQAM) has been proven to be a promising Multi-Carrier Modulation (MCM) technique for the transmission of signals over multipath fading channels. However, OFDM/OQAM has also the intrinsic disadvantage of high Peak-to-Average-Power Ratio (PAPR) that should be alleviated. This paper focuses on the reduction of the...

    Provided By Scientific Research

  • White Papers // Sep 2013

    Signal Detection Based on Walsh Transform for Spectrum Sensing

    Spectrum sensing is a key technology to improve spectrum efficiency. In this paper, the authors propose a novel signal detection method based on Walsh transform for spectrum sensing. The main idea behind is that the received signal is transformed into another domain by Walsh transform and the test statistic is...

    Provided By Scientific Research

  • White Papers // Sep 2013

    Relay Selection and Power Allocation in Amplify-and-Forward Cognitive Radio Systems Based on Spectrum Sharing

    In this paper, the authors consider a spectrum sharing scheme that is a joint optimization of relay selection and power allocation at the secondary transmitter, which aims to achieve the maximum possible throughput for the secondary user. This paper considers the scenario where the primary user is incapable of supporting...

    Provided By Scientific Research

  • White Papers // Sep 2013

    Artificial Noise Based Security Algorithm for Multi-User MIMO System

    The existing physical layer security algorithm, which is based on artificial noise, could affect legitimate receivers negatively when the number of users is no less than sending antennas in multi-user MIMO system. In order to improve security of multi-user MIMO system under this scenario, the authors propose a new multi-user...

    Provided By Scientific Research

  • White Papers // Sep 2013

    A Resource Reuse Scheme of D2D Communication Underlaying LTE Network with Intercell Interference

    With the growing concern on data rates and resource utilization, Device-To-Device (D2D) communication has been raised in 3GPP Long-Term Evolution (LTE) networks. In order to limit severe interference, previous studies mainly focus on intra-cell interference that between cellular links and local D2D links. In this paper, the authors consider both...

    Provided By Scientific Research

  • White Papers // Sep 2013

    A New Family of Optical Codes Based on Complementary Theory for OCDMA System

    A new family of optical codes for Optical Code-Division Multiple Access (OCDMA) systems, named as Optical Complementary Codes (OCCs), is proposed in this paper. The constructions of these codes consist of multiple sub-codes, and the codes have an auto-correlation interference constraint as 0 and a cross-correlation interference constraint as 1....

    Provided By Scientific Research

  • White Papers // Sep 2013

    A Swarm Intelligence Networking Framework for Small Satellite Systems

    Recent development of technologies and methodologies on distributed spacecraft systems enable the small satellite network systems by supporting integrated navigation, communications and control tasks. The distributed sensing data can be communicated and processed autonomously among the network systems. Due to the size, density and dynamic factors of small satellite networks,...

    Provided By Scientific Research

  • White Papers // Sep 2013

    Outage Performance of Cognitive Relay Networks with Best Relay Selection in Nakagami-m Channels

    In this paper, the authors investigate the outage performance of a cognitive relay network considering best relay selection in Nakagami-m fading environment. The secondary user is allowed to use the spectrum when it meets the interference constraints predefined by primary user. Due to deep fading, cognitive source is unable to...

    Provided By Scientific Research

  • White Papers // Sep 2013

    Three-Points Modulator Based on DPLL for Wideband Polar Modulation

    The authors present a nonlinear event-driven model of a digital PLL used in the context of a polar modulation. This modeling has shown that the estimation method of the TDC gain has a big impact on the EVM for wideband modulation and a solution has been proposed which consists to...

    Provided By Scientific Research

  • White Papers // Sep 2013

    A Joint User Selection and Resources Optimization Scheduling Algorithm for CoMP

    Coordinated Multi-Point (CoMP) transmission technology is one of the key techniques in LTE-advanced, which can share the channel and data information in multiple cells, and optimize the whole system performance. In order to optimize the average sector throughput and improve the fairness of resource scheduling, a scheduling algorithm based on...

    Provided By Scientific Research

  • White Papers // Sep 2013

    User Fairness Scheme with Proportional Fair Scheduling in Multi-user MIMO Limited Feedback System

    In Multi-User MIMO (MU-MIMO) downlink system, suitable user selection schemes can improve spatial diversity gain. In most of previous papers, it is always assumed that the Base Station (BS) knows full Channel State Information (CSI) of each user, which does not consider the reality. However, there are only limited feedback...

    Provided By Scientific Research

  • White Papers // Sep 2013

    Pipeline Structure Schnorr-Euchner Sphere Decoding Algorithm

    The authors propose a pipeline structure for Schnorr-Euchner sphere decoding algorithm in this paper. It divides the search tree of the original algorithm into blocks and executes the search from block to block. When one block search of a signal is over, the part in the pipeline structure that processes...

    Provided By Scientific Research

  • White Papers // Sep 2013

    A 30GHz Wideband CMOS Injection-Locked Frequency Divider for 60GHz Transceiver

    In this paper, a 30GHz wide locking-range (26.2GHz-35.7GHz) directs Injection-Locked Frequency Divider (ILFD), which operating in the MilliMeter-Wave (MMW) band, is presented. The locking range of the ILFD is extended by using differential injection topology. Besides, varactors are used in RLC resonant tank for extending the frequency tuning range. The...

    Provided By Scientific Research

  • White Papers // Sep 2013

    Dynamic K-Best Sphere Decoding Algorithms for MIMO Detection

    Multiple Input Multiple Output (MIMO) technology is of great significance in high data rate wireless communication. The K-Best Sphere Decoding (K-Best SD) algorithm was proposed as a powerful method for MIMO detection that can approach near-optimal performance. However, some extra computational complexity is contained in K-Best SD. In this paper,...

    Provided By Scientific Research

  • White Papers // Sep 2013

    Impulse Radio UWB Signal Detection Based on Compressed Sensing

    The extremely high sampling rate is a challenge for Ultra-WideBand (UWB) communication. In this paper, the authors study the Compressed Sensing (CS) based Impulse Radio UWB (IR-UWB) signal detection and propose an IR-UWB signal detection algorithm based on Compressive Sampling Matching Pursuit (CoSaMP). The proposed algorithm relies on the fact...

    Provided By Scientific Research

  • White Papers // Sep 2013

    Heuristic Channel Estimation Based on Compressive Sensing in LTE Downlink Channel

    Pilot-assisted channel estimation has been investigated to improve the performance of OFDM based LTE systems. LS and MMSE method do not perform excellently because they do not consider the inherent sparse feature of wireless channel. The sparse feature of channel impulse response satisfies the requirement of using Compressive Sensing (CS)...

    Provided By Scientific Research

  • White Papers // Aug 2013

    Efficient Routing Using Temporal Distance in Intermittently Connected Mobile Ad-Hoc Networks

    The analysis of real social, biological and technological networks has attracted a lot of attention as technological advances have given the users a wealth of empirical data. For, analysis and investigation time varying graphs are used to understand the relationship, contact duration, repeated occurrence of contact. It is under exploring...

    Provided By Scientific Research

  • White Papers // Aug 2013

    Face Recognition Using Chain Codes

    Face recognition is an active area of biometrics. This paper investigates the use of chain codes as features for recognition purpose. Firstly a segmentation method, based on skin color model was applied, followed by contour detection then the chain codes of the contours were determined. The first difference of chain...

    Provided By Scientific Research

  • White Papers // Aug 2013

    Call Admission Control in HAP W-CDMA Cellular Systems

    Among various radio sources which control different dependencies/functions, in this paper, the authors will talk about the Call Admission Control (CAC), and they are supposed to confine their concentration on W-CDMA which is based on high raised platforms, since during the recent years remarkable amount of attention has been focused...

    Provided By Scientific Research

  • White Papers // Aug 2013

    Smart Street Lighting Control and Monitoring System for Electrical Power Saving by Using VANET

    The huge amount of electrical power of many countries is consumed in lighting the streets. However, vehicles pass with very low rate in specific periods of time and parts of the streets are not occupied by vehicles over time. In this paper, the authors propose a system that automatically switches...

    Provided By Scientific Research

  • White Papers // Aug 2013

    Three-Dimensional Simulations with Fields and Particles in Software and Inflector Designs

    As already pointed out, fields and particles are two the most important modeling paradigms in pure and applied science at all. Particles are primarily used in one of the two ways in large scientific applications. Particles and fields represent two major modeling paradigms in pure and applied science at all....

    Provided By Scientific Research

  • White Papers // Aug 2013

    Data Timed Sending (DTS) Energy Efficient Protocol for Wireless Sensor Networks: Simulation and Testbed Verification

    The Data Timed Sending (DTS) protocol contributes to the energy savings in Wireless Sensor Networks (WSNs) and prolongs the sensor nodes' battery lifetime. DTS saves energy by transmitting short packets, without data payload, from the sensor nodes to the base station or the cluster head according to the Time Division...

    Provided By Scientific Research

  • White Papers // Aug 2013

    Design and Implementation of Remotely Controlled Vehicle Anti-Theft System Via GSM Network

    In this paper, the authors are to build a secured and reliable vehicle anti-theft system which will have the ability to access the vehicle subsystems from a remote location where there is GSM network. And also, the design method involves the interfacing of GSM/GPRS modem module with the vehicle ignition...

    Provided By Scientific Research

  • White Papers // Aug 2013

    Student Experience and Ubiquitous Learning in Higher Education: Impact of Wireless and Cloud Applications

    Mobile learning apps for Smartphone and tablet computer devices have entered Higher Education (HE) market. While universities are investing in new technologies, they also look into cost reduction strategies, including cloud computing. The authors draw upon a case study of a successful migration to mobile virtual environment and effective use...

    Provided By Scientific Research

  • White Papers // Aug 2013

    A Novel Approach for English Phonetic Alphabet in Wireless Communication

    In this paper, a novel approach of English phonetic alphabet applicable to Chinese people was introduced. This novel English phonetic alphabet was specially designed in line with the characteristics of radio telephone frequency communication in China and pronunciation habit and English level of most of Chinese people; which not only...

    Provided By Scientific Research

  • White Papers // Aug 2013

    Applying WIFI QoS Techniques to UMTS Networks

    The last decade the authors have witnessed an unprecedented development of telecommunication technologies. This is not only due to devices capacity improvement, but also due to network performance amelioration. Moreover, new technologies were proposed such as UMTS (3G), giving users more mobility and therefore more freedom. However, this resulted in...

    Provided By Scientific Research

  • White Papers // Aug 2013

    Automated Routing Control System of Local Area Network Segment

    The Local Area Network (LAN) is used for providing data communications between various data communication devices. Automated routing control system supersedes the prior approach to LAN redundancy which provides two or more LANs and each has a Local Area Network (LAN) controller coupled to data communication devices. Devices require some...

    Provided By Scientific Research

  • White Papers // Aug 2013

    Topology Control for Ad-Hoc Networks: A Comprehensive Review for Table Driven and On-Demand Routing Protocols

    Routing on ad-hoc network has become a major research issue among the networking communities due to its increasing complexity and the surge of challenging problems. One major factor contributing to this tendency is that every terminal of an ad-hoc network is also functioning as a network router. In this paper,...

    Provided By Scientific Research

  • White Papers // Aug 2013

    Losses in Wireless ATM Networks

    The broadband service requirements for future generations of mobile communications can be accommodated also by high bandwidth ATM networks. The standardized approach to mobile ATM network handover is a hard backward or forward handover scheme with no guarantees for the integrity of the data stream. These handover functions are detailed...

    Provided By Scientific Research

  • White Papers // Aug 2013

    Improving the Reliability of Unmanned Aircraft System Wireless Communications through Cognitive Radio Technology

    Unmanned Aircraft system networks are a special type of networks where high speeds of the nodes, long distances and radio spectrum scarcity pose a number of challenges. In these networks, the strength of the transmitted/received signals varies due to jamming, multipath propagation, and the changing distance among nodes. High speeds...

    Provided By Scientific Research

  • White Papers // Aug 2013

    Automated Service Management for Semantic IP Multimedia System [S-IMS]

    Next Generation Network (NGN) has drawn great attention by the researchers and telecommunication industries as the future generation in the communication technologies and services. The interest covers all aspects on NGN from the global standards, architecture and services. The management of services provided in the NGN environment has posed great...

    Provided By Scientific Research

  • White Papers // Aug 2013

    FER Performance in the IEEE 802.11 a/g/n Wireless LAN over Fading Channel

    In this paper, the authors explore and compare FER (Frame Error Rate) of a MAC (Medium Access Control) layer in the IEEE 802.11 a/g/n wireless LAN. It is evaluated under the fading wireless channel, using theoretical analysis method. It is analyzed by using the number of stations with both variable...

    Provided By Scientific Research

  • White Papers // Aug 2013

    Transmission over Cognitive Radio Channel with Novel Secure LT Code

    With the increasing of communication applications in recent years, the demand for radio spectral resources has increased significantly. Cognitive radio scenario was proposed to improve spectrum efficiency in wireless communication systems. In cognitive radio network, it is essential that control information is sent securely and reliably. Ensuring the trustworthiness of...

    Provided By Scientific Research

  • White Papers // Aug 2013

    Classification of Selfish and Regular Nodes Based on Reputation Values in MANET Using Adaptive Decision Boundary

    A MANET is a cooperative network in which each node has dual responsibilities of forwarding and routing thus node strength is a major factor because a lesser number of nodes reduce network performance. The existing reputation based methods have limitation due to their stricter punishment strategy because they isolate nodes...

    Provided By Scientific Research

  • White Papers // Jul 2011

    Side-Channel Analysis for Detecting Protocol Tunneling

    Protocol tunneling is widely used to add security and/or privacy to Internet applications. Recent research has exposed side channel vulnerabilities that leak information about tunneled protocols. The authors first discuss the timing side channels that have been found in protocol tunneling tools. They then show how to infer Hidden Markov...

    Provided By Scientific Research

  • White Papers // Jul 2011

    WiFi/WiMAX Seamless Convergence with Adaptive Vertical Handover for Continuity of Internet Access

    The next generation of the wireless networks will consist of several overlapping tiers. Provision of undisrupted communication to mobile users is a challenging task. Handover delay is one of the problematic issues that users are faced in the heterogeneous networks. However, in the case of both the WiMAX and the...

    Provided By Scientific Research

  • White Papers // Jul 2011

    Secured Electronic Voting Protocol Using Biometric Authentication

    In this paper, the authors proposes a new secure e-voting protocol. This new scheme does not require a special voting channel and communication can occur entirely over the existing Internet. This method integrates Internet convenience and cryptology. In the existing protocols either the tallier has to wait for the decryption...

    Provided By Scientific Research

  • White Papers // Jul 2011

    Internet of Things: Services and Applications Categorization

    In this paper, the authors attempt to categorize the services provided by the Internet of Things (IoT) in order to help application developers build upon a base service. First they introduce the four main categories of services and then follow by providing a number of examples of each of the...

    Provided By Scientific Research

  • White Papers // Apr 2011

    Integrating RFIDs and Smart Objects into a Unified Internet of Things Architecture

    The term Internet of Things refers to the networked interconnection of objects of diverse nature, such as electronic devices, sensors, but also physical objects and beings as well as virtual data and environments. Although the basic concept of the Internet of Things sounds simple, its application is difficult and, so...

    Provided By Scientific Research

  • White Papers // Apr 2011

    Developing E-society Cognitive Platform Based on the Social Agent E-learning Goal Oriented

    In this paper, the authors introduce the e-society cognitive approach based on the social agent. The social agent is e-learning oriented. The e-society cognitive platform may consider different fields like e-learning, e-health, e-commerce, e-medicine and e-government. In this paper, they will introduce the e-society platform. The e-society platform supports the...

    Provided By Scientific Research

  • White Papers // Oct 2011

    Advances in Intrusion Detection System for WLAN

    A wireless network is not as secure as compare the wired network because the data is transferred on air so any intruder can use hacking techniques to access that data. Indeed, it is difficult to protect the data and provide the user a secure information system for lifetime. An intrusions...

    Provided By Scientific Research

  • White Papers // Jan 2012

    Cyber-Physical-Social Based Security Architecture for Future Internet of Things

    As the Internet of Things (IoT) is emerging as an attractive paradigm, a typical IoT architecture that U2IoT (Unit IoT and Ubiquitous IoT) model has been presented for the future IoT. Based on the U2IoT model, this paper proposes a cyber-physical-social based security architecture (IPM) to deal with Information, Physical...

    Provided By Scientific Research

  • White Papers // Jul 2011

    Location Based Performance of WiMAX Network for QoS With Optimal Base Stations (BS)

    In this paper, the authors are given concept of their WiMAX (Worldwide Interoperability for Microwave Access) network performance for QoS monitoring and optimization solution for BS (Base Station) with multimedia application. In the communication sector, the optimal objective is to equate quality and cost. Due to its large coverage area,...

    Provided By Scientific Research

  • White Papers // Jan 2012

    A Novel Statistical AOA Model Pertinent to Indoor Geolocation

    A novel statistical Angle-Of-Arrival (AOA) model for indoor geolocation applications is presented. The modeling approach focuses on the arrivals of the multipath components with respect to the Line-Of-Sight (LOS) path which is an important component especially when indoor geolocation applications are considered. The model is particularly important for indoor applications...

    Provided By Scientific Research

  • White Papers // Mar 2013

    An Ad-Hoc Low Cost Wireless Sensor Network for Smart Gas Metering

    The monitoring of power consumption has become of a great interest in recent years as well as the innovative technologies available to realize Wireless Sensor Networks (WSNs) have experienced a great growth. While smart metering technologies for electric energy are already established, as sensors power supply comes directly from power...

    Provided By Scientific Research

  • White Papers // Dec 2012

    Game Analysis of SME Financing

    The SMEs (Small and Medium-sized Enterprises) play important role in the economy. However, the financing problem is a big difficulty, which has plagued the SMEs' development. Information asymmetry is the main reason for the SMEs' gaining funds so hard. The information asymmetry between banks and enterprises is that banks do...

    Provided By Scientific Research

  • White Papers // Jul 2012

    Feedback Reliability Ratio of an Intrusion Detection System

    The behavior and nature of attacks and threats to computer network systems have been evolving rapidly with the advances in computer security technology. At the same time however, computer criminals and other malicious elements find ways and methods to thwart such protective measures and find techniques of penetrating such secure...

    Provided By Scientific Research

  • White Papers // Nov 2012

    QoS Based Framework for Effective Web Services in Cloud Computing

    Enhancements in technology always follow Consumer requirements. Consumer requires best of service with least possible mismatch and on time. Numerous applications available today are based on Web Services and Cloud Computing. Recently, there exist many Web Services with similar functional characteristics. Choosing \"A-right\" Service from group of similar Web Service...

    Provided By Scientific Research

  • White Papers // May 2013

    Framework of User Participation for the Interface Design in the SaaS Layer

    The development of software as a service represents a great advantage for the users of cloud computing, such as users of small, medium or large organizations. All these users possess different characteristics, which must be taken into account as reference for the interface development of a software product. This paper...

    Provided By Scientific Research

  • White Papers // Aug 2012

    The Size, Structure and Characteristics of Finland's ITS Industry

    Intelligent Transport Systems (ITS) are seen as a high-growth segment within the transport sector, as Information and Communication Technologies (ICT) push their way through different industries. ITS products and services has been developed, and its myriad benefits has been introduced which are promising for new business opportunities and investors. Its...

    Provided By Scientific Research

  • White Papers // Feb 2010

    A Literature Review on the Studies of Internet Retailing Management

    This paper reviewed the studies of Internet retailing management. It found that, in general, most of the papers on the topic took focus on Internet retailing strategy and online merchandise management. Specifically, it drawn following conclusions: First, there were six major incentives for firms to adopt Internet retailing, including improving...

    Provided By Scientific Research

  • White Papers // Jun 2013

    OMT-G Modeling and Cloud Implementation of a Reference Database of Addressing in Morocco

    A reference database of addressing is an important resource for urban applications. The efficiency of an addressing sys-tem depends on both data quality and technical architecture. Data must respect a standard model that is flexible to meet different cases in the field. The technical architecture should be service oriented to...

    Provided By Scientific Research

  • White Papers // Jul 2012

    A Study of the Relation Between Market System Evolution and Enterprise Institution Change

    Market system which takes exchange rules as the main body has experienced the evolution from classical market system to modern market system. The basic mark of classical market is free competition. The economic operation was regulated by a single market. However, in modern market system, market mechanism and plan mechanism...

    Provided By Scientific Research

  • White Papers // Mar 2013

    Collaborative Design Theory and Related Key Technology Study Based on Cloud Computing

    Analyzes the main way of product distribution for collaborative design. According to the requirement of manufacturing collaborative design, apply cloud computing in manufacturing collaborative design and come up the concept of product collaborative cloud design. Study the product collaborative design theory based on cloud computing and the general key technology...

    Provided By Scientific Research

  • White Papers // Sep 2011

    Status of the Utilisation of E-Commerce Resources by Small and Medium (SMES) Enterprises in Nigeria

    The major purpose of this paper was to explore the utilization of e-commerce by SMEs in marketing industrial products in Lagos metropolis (Nigeria). Two research questions were answered and two hypotheses tested at 0.05 level of significance. The population for the study consisted of 532 managers of SMEs that are...

    Provided By Scientific Research

  • White Papers // Sep 2012

    Secure Messaging Implementation in OpenSC

    Smartcards are used for a rapidly increasing number of applications including electronic identity, driving licenses, physical access, health care, digital signature, and electronic payments. The use of a specific smartcard in a \"Closed\" environment generally provides a high level of security. In a closed environment no other smartcards are employed...

    Provided By Scientific Research

  • White Papers // Jan 2014

    Investigating Approaches of Data Integrity Preservation for Secure Data Aggregation in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) typically use in-network processing to reduce the communication overhead. Due to the fusion of data items sourced at different nodes into a single one during in-network processing, the sanctity of the aggregated data needs to be ensured. Especially, the data integrity of the aggregated result is...

    Provided By Scientific Research

  • White Papers // Jan 2014

    Comparative Evaluation of Elliptic Curve Cryptography Based Homomorphic Encryption Schemes for a Novel Secure Multiparty Computation

    In this paper, the authors focus on elliptic curve cryptography based approach for Secure Multiparty Computation (SMC) problem. Widespread proliferation of data and the growth of communication technologies have enabled collaborative computations among parties in distributed scenario. Preserving privacy of data owned by parties is crucial in such scenarios. Classical...

    Provided By Scientific Research

  • White Papers // May 2010

    Variability-Based Models for Testability Analysis of Frameworks

    Frameworks are developed to capture the recurring design practices in terms of skeletons of software subsystems/systems. They are designed 'Abstract' and 'Incomplete' and are designed with predefined points of variability, known as hot spots, to be customized later at the time of framework reuse. Frameworks are reusable entities thus demand...

    Provided By Scientific Research

  • White Papers // May 2010

    Mapping UML 2.0 Activities to Zero-Safe Nets

    UML 2.0 Activity Diagrams (ADs) are largely used as a modeling language for flow-oriented behaviors in software and business processes. Unfortunately, their place/transition operational semantics is unable to capture and preserve semantics of the newly defined high-level activities constructs such as interruptible activity region. Particularly, basic Petri nets do not...

    Provided By Scientific Research

  • White Papers // Apr 2010

    Separation of Fault Tolerance and Non-Functional Concerns: Aspect Oriented Patterns and Evaluation

    Dependable computer based systems employing fault tolerance and robust software development techniques demand additional error detection and recovery related tasks. This results in tangling of core functionality with these cross cutting non-functional concerns. In this regard current work identifies these dependability related non-functional and cross-cutting concerns and proposes design and...

    Provided By Scientific Research

  • White Papers // Mar 2010

    Deriving Software Acquisition Process From Maturity Models - An Experience Report

    The researcher's current area of focus is on the derivation of the software acquisition model in use within organizations for Commercial Off The Shelf (COTS) software acquisition using BPM tools. The establishment of an existing practice scenario was an essential component in providing a basis for further research in the...

    Provided By Scientific Research

  • White Papers // May 2010

    A Reference Model for the Analysis and Comparison of MDE Approaches for Web-Application Development

    The emerging Model-Driven Engineering (MDE) paradigm advocates the use of models as first-class citizens in the software development process, while artifacts such as documentation and source-code can be quickly produced from those models by using automated transformations. Even though many MDE-oriented approaches, languages and tools have been developed in the...

    Provided By Scientific Research

  • White Papers // Apr 2012

    Rational Cost Estimation of Dedicated Software Systems

    Dedicated software systems hold a character of individual solutions that entail particular problems with regard to their cost estimation. Thus for many years now objective and reliable approaches to the cost estimation of such systems have been sought out so that they could provide the possibility to make rational investment...

    Provided By Scientific Research

  • White Papers // Apr 2012

    Rank-Me: A Java Tool for Ranking Team Members in Software Bug Repositories

    In this paper, a team member ranking technique is presented for software bug repositories. Member ranking is performed using numbers of attributes available in software bug repositories, and a ranked list of developers is generated who are participating in development of software project. This ranking is generated from the contribution...

    Provided By Scientific Research

  • White Papers // Jan 2012

    Guidelines Based Software Engineering for Developing Software Components

    Software guidelines have been with the user in many forms within software engineering community such as knowledge, experiences, domain expertise, laws, software design principles, rules, design heuristics, hypothesis, experimental results, programming rules, best practices, observations, skills, algorithms have played major role in software development. This paper presents a new discipline...

    Provided By Scientific Research

  • White Papers // Jan 2012

    Efficient Location Services Using Hierarchical Topology of Mobile Ad Hoc Networks

    In this paper, the authors are carried out in two phases. Firstly, they have designed the Cluster-Based Object Location Services (CBOLS) for finding the object location in a cluster based network topology. Secondly, to take the advantages of clustering architecture of Mobile Ad hoc Networks, they have especially designed Object...

    Provided By Scientific Research

  • White Papers // Dec 2011

    A Knowledge Management Framework in Software Requirements Engineering Based on the SECI Model

    Software requirements engineering deals with: elicitation, specification, and validation of software requirements. Furthermore, there is a need to facilitate collaboration amongst stakeholders and analysts. Fewer efforts were deployed to support them in performing their job on a day-to-day basis. To solve this problem, the authors use knowledge management for software...

    Provided By Scientific Research

  • White Papers // Dec 2011

    Automated Testing Framework for ODBC Driver

    At first, the core ideology, advantage and principle of Software Testing Automation Framework (STAF) are presented in this paper. Several automated testing frameworks are summarized and analyzed. In addition, date driven automation test framework is given more attention. Test script is the important composing part of software test automation. Then...

    Provided By Scientific Research

  • White Papers // Nov 2011

    A Suggested Theoretical Framework for Software Project Success

    Current literature on software project management indicates that the majority of software projects either are considered a failure or challenged. These projects are characterized by exceeding budget, exceeding time, and failing to meet customer expectations. The fact that most projects fail highlights the need for research regarding the factors that...

    Provided By Scientific Research

  • White Papers // Nov 2011

    Knowledge Management of Software Productivity and Development Time

    In this paper, the authors identify a set of factors that may be used to forecast software productivity and software development time. Software productivity was measured in function points per person hours, and software development time was measured in number of elapsed days. Using field data on over 130 field...

    Provided By Scientific Research

  • White Papers // Oct 2011

    Using Artificial Neural-Networks in Stochastic Differential Equations Based Software Reliability Growth Modeling

    Due to high cost of fixing failures, safety concerns, and legal liabilities, organizations need to produce software that is highly reliable. Software reliability growth models have been developed by software developers in tracking and measuring the growth of reliability. Most of the software reliability growth models, which have been proposed,...

    Provided By Scientific Research

  • White Papers // Oct 2010

    Software Engineering Principles: Do They Meet Engineering Criteria?

    As a discipline, software engineering is not as mature as other engineering disciplines, and it still lacks consensus on a well-recognized set of fundamental principles. A 2006 analysis surveyed and analyzed 308 separate proposals for principles of software engineering, of which only thirty-four met the criteria to be recognized as...

    Provided By Scientific Research

  • White Papers // Oct 2010

    Software Architecture and Methodology as a Tool for Efficient Software Engineering Process: A Critical Appraisal

    The foundation for any software system is its architecture. Software architecture is a view of the system that includes the system's major components, the behavior of those components as visible to the rest of the system, and the ways in which the components interact and coordinate to achieve the overall...

    Provided By Scientific Research