The Schwa

Displaying 1-40 of 87 results

  • White Papers // Jun 2013

    The Quest Towards a Winning Enterprise 2.0 Collaboration Technology Adoption Strategy

    Although Enterprise 2.0 collaboration technologies present enterprises with a significant amount of business benefits; enterprises are still facing challenges in promoting and sustaining end-user adoption. The purpose of this paper is to provide a systematic review on Enterprise 2.0 collaboration technology adoption models, challenges, as well as to provide emerging...

    Provided By The Schwa

  • White Papers // Jun 2013

    Enterprise Architecture Model that Enables to Search for Patterns of Statistical Information

    Enterprise architecture is the stem from which developing of any departmental information system should grow and around which it should revolve. In the paper, a fragment of an enterprise architecture model is built using ArchiMate language. This fragment enables to search for information in enterprises which do not work in...

    Provided By The Schwa

  • White Papers // May 2013

    Building Low Cost Cloud Computing Systems

    The actual models of cloud computing are based in megalomaniac hardware solutions, being its implementation and maintenance unaffordable to the majority of service providers. The use of jail services is an alternative to current models of cloud computing based on virtualization. Models based in utilization of jail environments instead of...

    Provided By The Schwa

  • White Papers // May 2013

    Secure Medical Images Sharing Over Cloud Computing Environment

    Now-a-days, many applications have been appeared due to the rapid development in the term of telecommunication. One of these applications is the telemedicine where the patients' digital data can transfer between the doctors for farther diagnosis. Therefore, the protection of the exchanged medical data is essential especially when transferring these...

    Provided By The Schwa

  • White Papers // May 2013

    LASyM: A Learning Analytics System for MOOCs

    Now-a-days, the Web has revolutionized the authors' vision as to how deliver courses in a radically transformed and enhanced way. Boosted by Cloud computing, the use of the Web in education has revealed new challenges and looks forward to new aspirations such as MOOCs (Massive Open Online Courses) as a...

    Provided By The Schwa

  • White Papers // Feb 2013

    Coordinated Resource Management Models in Hierarchical Systems

    In response to the trend of efficient global economy, constructing a global logistic model has garnered much attention from the industry. Location selection is an important issue for those international companies that are interested in building a global logistics management system. Infrastructure in Developing Countries are based on the use...

    Provided By The Schwa

  • White Papers // Jan 2013

    Classifying Personalization Constraints in Digital Business Environments Through Case Study Research

    To aid professionals in the early assessment of possible risks related to personalization activities in marketing as well as to give academics a starting point to discover not only the opportunities but also the risks of personalization, a 'Classification Scheme of Personalization Constraints' is established after the analysis of 24...

    Provided By The Schwa

  • White Papers // Jan 2013

    A Proposed Integrated Approach for BI and GIS in Health Sector to Support Decision Makers (BIGIS-DSS)

    This paper explores the possibilities of adopting Business Intelligence (BI), and Geographic Information System (GIS) to build a spatial intelligence and predictive analytical approach. The proposed approach will help in solving spatial problem which faces decision makers at health sector. The proposed spatial analytical approach will cover three main health...

    Provided By The Schwa

  • White Papers // Jan 2013

    An Analysis of Security Challenges in Cloud Computing

    Vendors offer a pool of shared resources to their users through the cloud network. Nowadays, shifting to cloud is a very optimal decision as it provides pay-as-user-go services to users. Cloud has boomed high in business and other industries for its advantages like multi-tenancy, resource pooling, storage capacity etc. In...

    Provided By The Schwa

  • White Papers // Jan 2013

    Cloud Computing for Solving E-Learning Problems

    The integration of information and communication technologies in education according to the global trend occupied a great interest in the Arab world through E-Learning techniques and put it into the form of services within Services Oriented Architecture Technique (SOA), and mixing its input and outputs within the components of the...

    Provided By The Schwa

  • White Papers // Dec 2012

    Passing VBR in Mobile Ad Hoc Networks for effective live video Streaming

    Mobile Ad hoc NETworks (often referred to as MANETs) consist of wireless hosts that communicate with each other in the absence of a fixed infrastructure. This technique can be used effectively in disaster management, intellectual conference and also in the battlefield environments. It has the significant attention in the recent...

    Provided By The Schwa

  • White Papers // Dec 2012

    Low Cost Approach to Real-Time Vehicle to Vehicle Communication Using Parallel CPU and GPU Processing

    This paper proposes a novel Vehicle to Vehicle (V2V) communication system for collision avoidance which merges four different wireless devices (GPS, Wi-Fi, ZigBee and 3G) with a low power embedded Single Board Computer (SBC) in order to increase processing speed while maintaining a low cost. The three major technical challenges...

    Provided By The Schwa

  • White Papers // Dec 2012

    Optimal Itinerary Planning for Mobile Multiple Agents in WSN

    Multi mobile agents based on data collection and aggregations have proved their effective in Wireless Sensor Networks (WSN). However, the way in which these agents are deployed must be intelligently planned and should be adapted to the characteristics of wireless sensor networks. While most existing studies are based on the...

    Provided By The Schwa

  • White Papers // Dec 2012

    The Virtual Enterprise Network based on IPSec VPN Solutions and Management

    Informational society construction can't be realized without research and investment projects in Information and Communication Technologies (ICT). In the 21st century, all enterprises have a local area network, a virtual private network, an Intranet and Internet, servers and workstations for operations, administration and management working together for the same objective:...

    Provided By The Schwa

  • White Papers // Nov 2012

    MDSA: Modified Distributed Storage Algorithm for Wireless Sensor Networks

    In this paper, the authors propose a Modified Distributed Storage Algorithm for wireless sensor networks (MDSA). Wireless Sensor Networks, as it is well known, suffer of power limitation, small memory capacity, and limited processing capabilities. Therefore, every node may disappear temporarily or permanently from the network due to many different...

    Provided By The Schwa

  • White Papers // Oct 2012

    Challenges of Future R&D in Mobile Communications

    This paper provides a survey for the main challenges of future Research and Development (R&D) for Next Generation mobile Networks (NGNs). It addresses software and hardware re-configurability with focus on reconfigurable coupling and interworking amongst heterogeneous wireless access networks. It also explores the promising technologies for NGNs such as nanotechnology,...

    Provided By The Schwa

  • White Papers // Oct 2012

    A Distributed Method to Localization for Mobile Sensor Networks Based on the Convex Hull

    There has been recently a trend of exploiting the heterogeneity in WSNs and the mobility of either the sensor nodes or the sink nodes to facilitate data dissemination in WSNs. Recently, there has been much focus on mobile sensor networks, and the authors have even seen the development of small-profile...

    Provided By The Schwa

  • White Papers // Oct 2012

    Defending Polymorphic Worms in Computer Network using Honeypot

    Polymorphic worms are a major threat to internet infrastructure security. In this mechanism the authors are using gate-translator, double honeypot, sticky honeypot, internal translator and antivirus of Cloud AV, which attracts polymorphic worms. They are proposing an algorithm to detect and remove polymorphic worms and innocuous traffic related packets. Worms...

    Provided By The Schwa

  • White Papers // Oct 2012

    High Performance Speed Sensorless Control of Three-Phase Induction Motor Based on Cloud Computing

    Induction motor is a cast of alternating current motor where charge endures allotted to the rotor close-at-hand deputation of conductive charge. These motors are broadly applied in industrial claim due to they are arduous along with adhere no contacts. The speed controller of deltoid phase induction motor is applied to...

    Provided By The Schwa

  • White Papers // Oct 2012

    Secured Wireless Communication using Fuzzy Logic based High Speed Public-Key Cryptography (FLHSPKC)

    In this paper secured wireless communication using Fuzzy Logic based High Speed Public-Key Cryptography (FLHSPKC) has been proposed by satisfying the major issues likes computational safety, power management and restricted usage of memory in wireless communication. Wireless Sensor Network (WSN) has several major constraints likes' inadequate source of energy, restricted...

    Provided By The Schwa

  • White Papers // Oct 2012

    A Newer User Authentication, File Encryption and Distributed Server Based Cloud Computing Security Architecture

    The cloud computing platform gives people the opportunity for sharing resources, services and information among the people of the whole world. In private cloud system, information is shared among the persons who are in that cloud. For this, security or personal information hiding process hampers. In this paper the authors...

    Provided By The Schwa

  • White Papers // Oct 2012

    Request Analysis and Dynamic Queuing System for VANETs

    Vehicular Ad hoc NETwork (VANET) is a kind of mobile ad hoc network using the capabilities of wireless communication for Vehicle-to-Vehicle and Vehicle-to-Roadside communication to provide safety and comfort to vehicles in transportation system. People in vehicles want to access data of their interest from Road Side Unit (RSU). RSU...

    Provided By The Schwa

  • White Papers // Oct 2012

    Preventing Buffer Overflow Attacks With Reliable and Low Cost System

    Detection of data flow anomalies there are static or dynamic methods to detect data flow anomalies in the software reliability and testing field. Static methods are not suitable in the case due to its slow speed; dynamic methods are not suitable either due to the need for real execution of...

    Provided By The Schwa

  • White Papers // Oct 2012

    Personal Name Aliases on Automatic Discovery From the Web

    In this paper, the authors proposed a lexical-pattern-based approach to extract aliases of a given name. They use a set of names and their aliases as training data to extract lexical patterns that describe numerous ways in which information related to aliases of a name is presented on the web....

    Provided By The Schwa

  • White Papers // Oct 2012

    An Emergency System for Succoring Children Using Mobile GIS

    The large numbers of sick children in different diseases are very dreaded, and when there isn't succor at the proper time and in the type the sick child need it that makes them lose child. This paper suggested an emergency system for succoring sick child locally when he required that,...

    Provided By The Schwa

  • White Papers // Oct 2012

    3D Face Compression and Recognition Using Spherical Wavelet Parametrization

    In this paper an innovative fully automated 3D face compression and recognition system is presented. Several novelties are introduced to make the system performance robust and efficient. These novelties include: first, an automatic pose correction and normalization process by using curvature analysis for nose tip detection and Iterative Closest Point...

    Provided By The Schwa

  • White Papers // Oct 2012

    A Fuzzy Logic-Based Distance Broadcasting Scheme For Mobile Ad Hoc Networks

    An on-demand route discovery method in Mobile Ad hoc NETworks (MANET) uses simple flooding method, whereas a mobile node blindly rebroadcasts received Route REQuest (RREQ) packets until a route to a particular destination is established. Thus, this leads to broadcast storm problem. This paper presents a novel algorithm for broadcasting...

    Provided By The Schwa

  • White Papers // Oct 2012

    Security Analysis of Image Cryptosystem Using Stream Cipher Algorithm With Nonlinear Filtering Function

    In this paper, a new algorithm for encryption image is introduced. This algorithm makes it possible to cipher and decipher images by guaranteeing a maximum security. The algorithm introduced is based on stream cipher with nonlinear filtering function. The Boolean function used in this algorithm is resilient function satisfying all...

    Provided By The Schwa

  • White Papers // Oct 2012

    A Multi-Stage Optimization Model With Minimum Energy Consumption-Wireless Mesh Networks

    Optimization models related with routing, bandwidth utilization and power consumption are developed in the wireless mesh computing environment using the operations research techniques such as maximal flow model, transshipment model and minimax optimizing algorithm. The Path creation algorithm is used to find the multiple paths from source to destination. A...

    Provided By The Schwa

  • White Papers // Oct 2012

    Mutual Exclusion Principle for Multithreaded Web Crawlers

    This paper describes mutual exclusion principle for multithreaded web crawlers. The existing web crawlers use data structures to hold frontier set in local address space. This space could be used to run more crawler threads for faster operation. All crawler threads fetch the URL to crawl from the centralized frontier....

    Provided By The Schwa

  • White Papers // Oct 2012

    A Study on Security Within Public Transit Vehicles

    In public transit vehicles, security is the major concern for the passengers. Surveillance systems provide the security by providing surveillance cameras in the vehicles and a storage that maintains the data. The applications that allow monitoring the data in surveillance systems of public transit vehicles will provide different features to...

    Provided By The Schwa

  • White Papers // Oct 2012

    The Risk Management Strategy of Applying Cloud Computing

    It is inevitable that Cloud Computing will trigger off some loss exposures. Unfortunately, not much of scientific and objective researches had been focused on the identification and evaluation of loss exposures stemming from applications of Cloud Computing. In order to fill this research gap, this study attempts to identify and...

    Provided By The Schwa

  • White Papers // Oct 2012

    A Survey on Models and Query Languages for Temporally Annotated RDF

    In this paper, the authors provide a survey on the models and query languages for temporally annotated RDF. In most of the works, a temporally annotated RDF ontology is essentially a set of RDF triples associated with temporal constraints, where, in the simplest case, a temporal constraint is a validity...

    Provided By The Schwa

  • White Papers // Oct 2012

    An RGB Image Encryption Supported by Wavelet-Based Lossless Compression

    In this paper, the authors have proposed a method for an RGB image encryption supported by lifting scheme based lossless compression. Firstly, they have compressed the input color image using a 2-D integer wavelet transform. Then they have applied lossless predictive coding to achieve additional compression. The compressed image is...

    Provided By The Schwa

  • White Papers // Oct 2012

    Application of Relevance Vector Machines in Real Time Intrusion Detection

    In the recent years, there has been a growing interest in the development of change detection techniques for the analysis of Intrusion Detection. This interest stems from the wide range of applications in which change detection methods can be used. Detecting the changes by observing data collected at different times...

    Provided By The Schwa

  • White Papers // Oct 2012

    Fast DC Mode Prediction Scheme for Intra 4x4 Block in H.264/AVC Video Coding Standard

    In this paper, the researchers proposed a new scheme for DC mode prediction in intra frame for 4X4 block. In this scheme, the upper and left neighboring pixels would be used to predict each of the pixels in the 4X4 block with different weight. The prediction equations for each position...

    Provided By The Schwa

  • White Papers // Oct 2012

    Knowledge Sharing Protocol for Smart Spaces

    In this paper, the authors present a novel Knowledge Sharing Protocol (KSP) for semantic technology empowered ubiquitous computing systems. In particular the protocol is designed for M3 which is a blackboard based semantic interoperability solution for smart spaces. The main difference between the KSP and existing work is that KSP...

    Provided By The Schwa

  • White Papers // Sep 2012

    Growing Cloud Computing Efficiency

    Cloud computing is basically altering the expectation for how and when computing, storage and networking assets should be allocated, managed and devoted. End-users are progressively more sensitive in response time of services they ingest. Service Developers wish for the Service Providers to make sure or give the ability for dynamically...

    Provided By The Schwa

  • White Papers // Sep 2012

    A Hybrid Evolutionary Functional Link Artificial Neural Network for Data Mining and Classification

    This paper presents a specific structure of neural network as the Functional Link Artificial Neural Network (FLANN). This technique has been employed for classification tasks of data mining. In fact, there are a few studies that used this tool for solving classification problems. In this paper, the authors propose a...

    Provided By The Schwa

  • White Papers // Aug 2012

    Techniques to Improve the GPS Precision

    The accuracy of a standard market receiver GPS (Global Positioning System) is near 10-15 meters the 95% of the times. To reach a sub-metric level of accuracy some techniques must be used. This paper describes some of these procedures to improve the positioning accuracy by using a low-cost GPS in...

    Provided By The Schwa

  • White Papers // Jan 2013

    Cloud Computing for Solving E-Learning Problems

    The integration of information and communication technologies in education according to the global trend occupied a great interest in the Arab world through E-Learning techniques and put it into the form of services within Services Oriented Architecture Technique (SOA), and mixing its input and outputs within the components of the...

    Provided By The Schwa

  • White Papers // Dec 2012

    Passing VBR in Mobile Ad Hoc Networks for effective live video Streaming

    Mobile Ad hoc NETworks (often referred to as MANETs) consist of wireless hosts that communicate with each other in the absence of a fixed infrastructure. This technique can be used effectively in disaster management, intellectual conference and also in the battlefield environments. It has the significant attention in the recent...

    Provided By The Schwa

  • White Papers // Dec 2012

    Optimal Itinerary Planning for Mobile Multiple Agents in WSN

    Multi mobile agents based on data collection and aggregations have proved their effective in Wireless Sensor Networks (WSN). However, the way in which these agents are deployed must be intelligently planned and should be adapted to the characteristics of wireless sensor networks. While most existing studies are based on the...

    Provided By The Schwa

  • White Papers // Dec 2012

    The Virtual Enterprise Network based on IPSec VPN Solutions and Management

    Informational society construction can't be realized without research and investment projects in Information and Communication Technologies (ICT). In the 21st century, all enterprises have a local area network, a virtual private network, an Intranet and Internet, servers and workstations for operations, administration and management working together for the same objective:...

    Provided By The Schwa

  • White Papers // Oct 2012

    Challenges of Future R&D in Mobile Communications

    This paper provides a survey for the main challenges of future Research and Development (R&D) for Next Generation mobile Networks (NGNs). It addresses software and hardware re-configurability with focus on reconfigurable coupling and interworking amongst heterogeneous wireless access networks. It also explores the promising technologies for NGNs such as nanotechnology,...

    Provided By The Schwa

  • White Papers // Nov 2012

    MDSA: Modified Distributed Storage Algorithm for Wireless Sensor Networks

    In this paper, the authors propose a Modified Distributed Storage Algorithm for wireless sensor networks (MDSA). Wireless Sensor Networks, as it is well known, suffer of power limitation, small memory capacity, and limited processing capabilities. Therefore, every node may disappear temporarily or permanently from the network due to many different...

    Provided By The Schwa

  • White Papers // Oct 2012

    A Distributed Method to Localization for Mobile Sensor Networks Based on the Convex Hull

    There has been recently a trend of exploiting the heterogeneity in WSNs and the mobility of either the sensor nodes or the sink nodes to facilitate data dissemination in WSNs. Recently, there has been much focus on mobile sensor networks, and the authors have even seen the development of small-profile...

    Provided By The Schwa

  • White Papers // Oct 2012

    Defending Polymorphic Worms in Computer Network using Honeypot

    Polymorphic worms are a major threat to internet infrastructure security. In this mechanism the authors are using gate-translator, double honeypot, sticky honeypot, internal translator and antivirus of Cloud AV, which attracts polymorphic worms. They are proposing an algorithm to detect and remove polymorphic worms and innocuous traffic related packets. Worms...

    Provided By The Schwa

  • White Papers // Oct 2012

    High Performance Speed Sensorless Control of Three-Phase Induction Motor Based on Cloud Computing

    Induction motor is a cast of alternating current motor where charge endures allotted to the rotor close-at-hand deputation of conductive charge. These motors are broadly applied in industrial claim due to they are arduous along with adhere no contacts. The speed controller of deltoid phase induction motor is applied to...

    Provided By The Schwa

  • White Papers // Oct 2012

    Secured Wireless Communication using Fuzzy Logic based High Speed Public-Key Cryptography (FLHSPKC)

    In this paper secured wireless communication using Fuzzy Logic based High Speed Public-Key Cryptography (FLHSPKC) has been proposed by satisfying the major issues likes computational safety, power management and restricted usage of memory in wireless communication. Wireless Sensor Network (WSN) has several major constraints likes' inadequate source of energy, restricted...

    Provided By The Schwa

  • White Papers // Oct 2012

    A Newer User Authentication, File Encryption and Distributed Server Based Cloud Computing Security Architecture

    The cloud computing platform gives people the opportunity for sharing resources, services and information among the people of the whole world. In private cloud system, information is shared among the persons who are in that cloud. For this, security or personal information hiding process hampers. In this paper the authors...

    Provided By The Schwa

  • White Papers // Oct 2012

    Request Analysis and Dynamic Queuing System for VANETs

    Vehicular Ad hoc NETwork (VANET) is a kind of mobile ad hoc network using the capabilities of wireless communication for Vehicle-to-Vehicle and Vehicle-to-Roadside communication to provide safety and comfort to vehicles in transportation system. People in vehicles want to access data of their interest from Road Side Unit (RSU). RSU...

    Provided By The Schwa

  • White Papers // Dec 2012

    Low Cost Approach to Real-Time Vehicle to Vehicle Communication Using Parallel CPU and GPU Processing

    This paper proposes a novel Vehicle to Vehicle (V2V) communication system for collision avoidance which merges four different wireless devices (GPS, Wi-Fi, ZigBee and 3G) with a low power embedded Single Board Computer (SBC) in order to increase processing speed while maintaining a low cost. The three major technical challenges...

    Provided By The Schwa

  • White Papers // Feb 2012

    Effective Security Architecture for Virtualized Data Center Networks

    This paper presents a candidate scheme for effective security policy that defines the requirements that will facilitate protection of network resources from internal and external security threats. Also, it ensures data privacy and integrity in a Virtualized Data Center Network (VDCN). An integration of Open Flow Software Defined Networking (OFSDN)...

    Provided By The Schwa

  • White Papers // Feb 2012

    The Relationships of Soft Systems Methodology (SSM), Business Process Modeling and EGovernment

    E-Government has emerged in several countries. Because of many aspects that must be considered, and because of there are exist some soft components in e-Government, then the Soft Systems Methodology (SSM) can be considered to use in e-Government systems development process. On the other hand, business process modeling is essential...

    Provided By The Schwa

  • White Papers // Feb 2012

    Data Warehouse Requirements Analysis Framework: Business-Object Based Approach

    Detailed requirements analysis plays a key role towards the design of successful Data Warehouse (DW) system. The requirements analysis specifications are used as the prime input for the construction of conceptual level multidimensional data model. This paper has proposed a Business Object based requirements analysis framework for DW system which...

    Provided By The Schwa

  • White Papers // Jan 2012

    Enhancing Business Intelligence in a Smarter Computing Environment Through Cost Analysis

    The paper aims at improving Business Intelligence in a smarter computing environment through cost analysis. Smarter computing is a new approach to designing IT infrastructures to create new opportunities like creating new business models, find new ways of delivering technology-based services, and generate new insights from IT to fuel innovation...

    Provided By The Schwa

  • White Papers // Jun 2012

    Prioritizing Test Cases Using Business Criticality Test Value

    Software maintenance is an important and costly activity of the software development lifecycle. Regression testing is the process of validating modifications introduced in a system during software maintenance. It is very inefficient to re-execute every test case in regression testing for small changes. This issue of retesting of software systems...

    Provided By The Schwa

  • White Papers // Jan 2013

    Classifying Personalization Constraints in Digital Business Environments Through Case Study Research

    To aid professionals in the early assessment of possible risks related to personalization activities in marketing as well as to give academics a starting point to discover not only the opportunities but also the risks of personalization, a 'Classification Scheme of Personalization Constraints' is established after the analysis of 24...

    Provided By The Schwa

  • White Papers // Dec 2010

    The Impact of Social Networking Websites to Facilitate the Effectiveness of Viral Marketing

    The Internet and the World Wide Web have become two key components in today's technology based organizations and businesses. As the Internet is becoming more and more popular, it is starting to make a big impact on people's day-today life. As a result of this revolutionary transformation towards the modern...

    Provided By The Schwa

  • White Papers // Feb 2012

    Self-Regulating Message Throughput in Enterprise Messaging Servers - A Feedback Control Solution

    Enterprise Messaging is a very popular message exchange concept in asynchronous distributed computing environments. The Enterprise Messaging Servers are heavily used in building business critical Enterprise applications such as Internet based Order processing systems, pricing distribution of B2B, geographically dispersed enterprise applications. It is always desirable that Messaging Servers exhibit...

    Provided By The Schwa

  • White Papers // Jul 2011

    An Authorization Mechanism for Access Control of Resources in the Web Services Paradigm

    With the increase in web based enterprise services, there is an increasing trend among business enterprises to migrate to web services platform. Web services paradigm poses a number of new security challenges, which can only be realized by developing effective access control models. The fact that the enterprises allow access...

    Provided By The Schwa

  • White Papers // Jun 2011

    Deploying an Application on the Cloud

    Cloud Computing, the impending need of computing as an optimal utility, has the potential to take a gigantic leap in the IT industry, is structured and put to optimal use with regard to the contemporary trends. Developers with innovative ideas need not be apprehensive about non utility of costly resources...

    Provided By The Schwa

  • White Papers // Nov 2011

    The Impact of Competitive Intelligence on Products and Services Innovation in Organizations

    This paper discusses the findings of the study that was aimed at establishing the effect of Competitive Intelligence, hereafter referred to as CI, on product and service innovations. A literature study revealed that CI and innovation are widely studied subjects, but the impact of CI on innovation was not well...

    Provided By The Schwa

  • White Papers // Feb 2013

    Coordinated Resource Management Models in Hierarchical Systems

    In response to the trend of efficient global economy, constructing a global logistic model has garnered much attention from the industry. Location selection is an important issue for those international companies that are interested in building a global logistics management system. Infrastructure in Developing Countries are based on the use...

    Provided By The Schwa

  • White Papers // Jun 2013

    Enterprise Architecture Model that Enables to Search for Patterns of Statistical Information

    Enterprise architecture is the stem from which developing of any departmental information system should grow and around which it should revolve. In the paper, a fragment of an enterprise architecture model is built using ArchiMate language. This fragment enables to search for information in enterprises which do not work in...

    Provided By The Schwa

  • White Papers // Jun 2013

    The Quest Towards a Winning Enterprise 2.0 Collaboration Technology Adoption Strategy

    Although Enterprise 2.0 collaboration technologies present enterprises with a significant amount of business benefits; enterprises are still facing challenges in promoting and sustaining end-user adoption. The purpose of this paper is to provide a systematic review on Enterprise 2.0 collaboration technology adoption models, challenges, as well as to provide emerging...

    Provided By The Schwa

  • White Papers // Aug 2011

    Control Systems Application in Java Based Enterprise and Cloud Environments - A Survey

    The classical feedback control systems have been a successful theory in many engineering applications like electrical power, process, and manufacturing industries. For more than a decade there is active research in exploring feedback control systems applications in computing and some of the results are applied to the commercial software products....

    Provided By The Schwa

  • White Papers // Jan 2013

    A Proposed Integrated Approach for BI and GIS in Health Sector to Support Decision Makers (BIGIS-DSS)

    This paper explores the possibilities of adopting Business Intelligence (BI), and Geographic Information System (GIS) to build a spatial intelligence and predictive analytical approach. The proposed approach will help in solving spatial problem which faces decision makers at health sector. The proposed spatial analytical approach will cover three main health...

    Provided By The Schwa

  • White Papers // Feb 2011

    Knowledge-Based System's Modeling for Software Process Model Selection

    This paper depicts the knowledge-based system named as ESPMS (Expert System for Process Model Selection) through various models. A questionnaire was developed to identify important parameters, which were evaluated through domain experts in about all the universities of Pakistan. No exact system was found, which could guide Software Engineers for...

    Provided By The Schwa

  • White Papers // Jan 2013

    An Analysis of Security Challenges in Cloud Computing

    Vendors offer a pool of shared resources to their users through the cloud network. Nowadays, shifting to cloud is a very optimal decision as it provides pay-as-user-go services to users. Cloud has boomed high in business and other industries for its advantages like multi-tenancy, resource pooling, storage capacity etc. In...

    Provided By The Schwa

  • White Papers // May 2013

    Building Low Cost Cloud Computing Systems

    The actual models of cloud computing are based in megalomaniac hardware solutions, being its implementation and maintenance unaffordable to the majority of service providers. The use of jail services is an alternative to current models of cloud computing based on virtualization. Models based in utilization of jail environments instead of...

    Provided By The Schwa

  • White Papers // Mar 2012

    Building Trust In Cloud Using Public Key Infrastructure

    Cloud services have grown very quickly over the past couple of years, giving consumers and companies the chance to put services, resources and infrastructures in the hands of a provider. There are big security concerns when using cloud services. With the emergence of cloud computing, Public Key Infrastructure (PKI) technology...

    Provided By The Schwa

  • White Papers // May 2013

    Secure Medical Images Sharing Over Cloud Computing Environment

    Now-a-days, many applications have been appeared due to the rapid development in the term of telecommunication. One of these applications is the telemedicine where the patients' digital data can transfer between the doctors for farther diagnosis. Therefore, the protection of the exchanged medical data is essential especially when transferring these...

    Provided By The Schwa

  • White Papers // Mar 2012

    Performance Evaluation of Adaptive Virtual Machine Load Balancing Algorithm

    The conception of Cloud computing has not only reshaped the field of distributed systems but also extend businesses potential. Load balancing is a core and challenging issue in Cloud Computing. How to use Cloud computing resources efficiently and gain the maximum profits with efficient load balancing algorithm is one of...

    Provided By The Schwa

  • White Papers // May 2013

    LASyM: A Learning Analytics System for MOOCs

    Now-a-days, the Web has revolutionized the authors' vision as to how deliver courses in a radically transformed and enhanced way. Boosted by Cloud computing, the use of the Web in education has revealed new challenges and looks forward to new aspirations such as MOOCs (Massive Open Online Courses) as a...

    Provided By The Schwa

  • White Papers // Oct 2011

    Comparison of Workflow Scheduling Algorithms in Cloud Computing

    Cloud computing has gained popularity in recent times. Cloud computing is internet based computing, whereby shared resources, software and information are provided to computers and other devices on demand, like a public utility. Cloud computing is technology that uses the internet and central remote servers to maintain data and applications....

    Provided By The Schwa

  • White Papers // Jun 2012

    Data Normalization and Integration in Robotic Systems Using Web Services Technologies

    The robotics is one of the most active areas. The authors also need to join a large number of disciplines to create robots. With these premises, one problem is the management of information from multiple heterogeneous sources. Each component, hardware or software, produces data with different nature: temporal frequencies, processing...

    Provided By The Schwa

  • White Papers // Jun 2012

    Defect Diagnosis in Rotors Systems by Vibrations Data Collectors Using Trending Software

    Vibration measurements have been used to reliably diagnose performance problems in machinery and related mechanical products. A vibration data collector can be used effectively to measure and analyze the machinery vibration content in gearboxes, engines, turbines, fans, compressors, pumps and bearings. Ideally, a machine will have little or no vibration,...

    Provided By The Schwa

  • White Papers // Jun 2012

    2D Satellite Image Registration Using Transform Based and Correlation Based Methods

    Image registration is the process of geometrically aligning one image to another image of the same scene taken from different viewpoints or by different sensors. It is a fundamental image processing technique and is very useful in integrating information from different sensors, finding changes in images taken at different times...

    Provided By The Schwa