The Schwa

Displaying 1-40 of 87 results

  • White Papers // Jun 2013

    The Quest Towards a Winning Enterprise 2.0 Collaboration Technology Adoption Strategy

    Although Enterprise 2.0 collaboration technologies present enterprises with a significant amount of business benefits; enterprises are still facing challenges in promoting and sustaining end-user adoption. The purpose of this paper is to provide a systematic review on Enterprise 2.0 collaboration technology adoption models, challenges, as well as to provide emerging...

    Provided By The Schwa

  • White Papers // Jun 2013

    Enterprise Architecture Model that Enables to Search for Patterns of Statistical Information

    Enterprise architecture is the stem from which developing of any departmental information system should grow and around which it should revolve. In the paper, a fragment of an enterprise architecture model is built using ArchiMate language. This fragment enables to search for information in enterprises which do not work in...

    Provided By The Schwa

  • White Papers // May 2013

    Building Low Cost Cloud Computing Systems

    The actual models of cloud computing are based in megalomaniac hardware solutions, being its implementation and maintenance unaffordable to the majority of service providers. The use of jail services is an alternative to current models of cloud computing based on virtualization. Models based in utilization of jail environments instead of...

    Provided By The Schwa

  • White Papers // May 2013

    Secure Medical Images Sharing Over Cloud Computing Environment

    Now-a-days, many applications have been appeared due to the rapid development in the term of telecommunication. One of these applications is the telemedicine where the patients' digital data can transfer between the doctors for farther diagnosis. Therefore, the protection of the exchanged medical data is essential especially when transferring these...

    Provided By The Schwa

  • White Papers // May 2013

    LASyM: A Learning Analytics System for MOOCs

    Now-a-days, the Web has revolutionized the authors' vision as to how deliver courses in a radically transformed and enhanced way. Boosted by Cloud computing, the use of the Web in education has revealed new challenges and looks forward to new aspirations such as MOOCs (Massive Open Online Courses) as a...

    Provided By The Schwa

  • White Papers // Feb 2013

    Coordinated Resource Management Models in Hierarchical Systems

    In response to the trend of efficient global economy, constructing a global logistic model has garnered much attention from the industry. Location selection is an important issue for those international companies that are interested in building a global logistics management system. Infrastructure in Developing Countries are based on the use...

    Provided By The Schwa

  • White Papers // Jan 2013

    Classifying Personalization Constraints in Digital Business Environments Through Case Study Research

    To aid professionals in the early assessment of possible risks related to personalization activities in marketing as well as to give academics a starting point to discover not only the opportunities but also the risks of personalization, a 'Classification Scheme of Personalization Constraints' is established after the analysis of 24...

    Provided By The Schwa

  • White Papers // Jan 2013

    A Proposed Integrated Approach for BI and GIS in Health Sector to Support Decision Makers (BIGIS-DSS)

    This paper explores the possibilities of adopting Business Intelligence (BI), and Geographic Information System (GIS) to build a spatial intelligence and predictive analytical approach. The proposed approach will help in solving spatial problem which faces decision makers at health sector. The proposed spatial analytical approach will cover three main health...

    Provided By The Schwa

  • White Papers // Jan 2013

    An Analysis of Security Challenges in Cloud Computing

    Vendors offer a pool of shared resources to their users through the cloud network. Nowadays, shifting to cloud is a very optimal decision as it provides pay-as-user-go services to users. Cloud has boomed high in business and other industries for its advantages like multi-tenancy, resource pooling, storage capacity etc. In...

    Provided By The Schwa

  • White Papers // Jan 2013

    Cloud Computing for Solving E-Learning Problems

    The integration of information and communication technologies in education according to the global trend occupied a great interest in the Arab world through E-Learning techniques and put it into the form of services within Services Oriented Architecture Technique (SOA), and mixing its input and outputs within the components of the...

    Provided By The Schwa

  • White Papers // Dec 2012

    Passing VBR in Mobile Ad Hoc Networks for effective live video Streaming

    Mobile Ad hoc NETworks (often referred to as MANETs) consist of wireless hosts that communicate with each other in the absence of a fixed infrastructure. This technique can be used effectively in disaster management, intellectual conference and also in the battlefield environments. It has the significant attention in the recent...

    Provided By The Schwa

  • White Papers // Dec 2012

    Low Cost Approach to Real-Time Vehicle to Vehicle Communication Using Parallel CPU and GPU Processing

    This paper proposes a novel Vehicle to Vehicle (V2V) communication system for collision avoidance which merges four different wireless devices (GPS, Wi-Fi, ZigBee and 3G) with a low power embedded Single Board Computer (SBC) in order to increase processing speed while maintaining a low cost. The three major technical challenges...

    Provided By The Schwa

  • White Papers // Dec 2012

    Optimal Itinerary Planning for Mobile Multiple Agents in WSN

    Multi mobile agents based on data collection and aggregations have proved their effective in Wireless Sensor Networks (WSN). However, the way in which these agents are deployed must be intelligently planned and should be adapted to the characteristics of wireless sensor networks. While most existing studies are based on the...

    Provided By The Schwa

  • White Papers // Dec 2012

    The Virtual Enterprise Network based on IPSec VPN Solutions and Management

    Informational society construction can't be realized without research and investment projects in Information and Communication Technologies (ICT). In the 21st century, all enterprises have a local area network, a virtual private network, an Intranet and Internet, servers and workstations for operations, administration and management working together for the same objective:...

    Provided By The Schwa

  • White Papers // Nov 2012

    MDSA: Modified Distributed Storage Algorithm for Wireless Sensor Networks

    In this paper, the authors propose a Modified Distributed Storage Algorithm for wireless sensor networks (MDSA). Wireless Sensor Networks, as it is well known, suffer of power limitation, small memory capacity, and limited processing capabilities. Therefore, every node may disappear temporarily or permanently from the network due to many different...

    Provided By The Schwa

  • White Papers // Oct 2012

    Challenges of Future R&D in Mobile Communications

    This paper provides a survey for the main challenges of future Research and Development (R&D) for Next Generation mobile Networks (NGNs). It addresses software and hardware re-configurability with focus on reconfigurable coupling and interworking amongst heterogeneous wireless access networks. It also explores the promising technologies for NGNs such as nanotechnology,...

    Provided By The Schwa

  • White Papers // Oct 2012

    A Distributed Method to Localization for Mobile Sensor Networks Based on the Convex Hull

    There has been recently a trend of exploiting the heterogeneity in WSNs and the mobility of either the sensor nodes or the sink nodes to facilitate data dissemination in WSNs. Recently, there has been much focus on mobile sensor networks, and the authors have even seen the development of small-profile...

    Provided By The Schwa

  • White Papers // Oct 2012

    Defending Polymorphic Worms in Computer Network using Honeypot

    Polymorphic worms are a major threat to internet infrastructure security. In this mechanism the authors are using gate-translator, double honeypot, sticky honeypot, internal translator and antivirus of Cloud AV, which attracts polymorphic worms. They are proposing an algorithm to detect and remove polymorphic worms and innocuous traffic related packets. Worms...

    Provided By The Schwa

  • White Papers // Oct 2012

    High Performance Speed Sensorless Control of Three-Phase Induction Motor Based on Cloud Computing

    Induction motor is a cast of alternating current motor where charge endures allotted to the rotor close-at-hand deputation of conductive charge. These motors are broadly applied in industrial claim due to they are arduous along with adhere no contacts. The speed controller of deltoid phase induction motor is applied to...

    Provided By The Schwa

  • White Papers // Oct 2012

    Secured Wireless Communication using Fuzzy Logic based High Speed Public-Key Cryptography (FLHSPKC)

    In this paper secured wireless communication using Fuzzy Logic based High Speed Public-Key Cryptography (FLHSPKC) has been proposed by satisfying the major issues likes computational safety, power management and restricted usage of memory in wireless communication. Wireless Sensor Network (WSN) has several major constraints likes' inadequate source of energy, restricted...

    Provided By The Schwa

  • White Papers // Oct 2012

    A Newer User Authentication, File Encryption and Distributed Server Based Cloud Computing Security Architecture

    The cloud computing platform gives people the opportunity for sharing resources, services and information among the people of the whole world. In private cloud system, information is shared among the persons who are in that cloud. For this, security or personal information hiding process hampers. In this paper the authors...

    Provided By The Schwa

  • White Papers // Oct 2012

    Request Analysis and Dynamic Queuing System for VANETs

    Vehicular Ad hoc NETwork (VANET) is a kind of mobile ad hoc network using the capabilities of wireless communication for Vehicle-to-Vehicle and Vehicle-to-Roadside communication to provide safety and comfort to vehicles in transportation system. People in vehicles want to access data of their interest from Road Side Unit (RSU). RSU...

    Provided By The Schwa

  • White Papers // Oct 2012

    Preventing Buffer Overflow Attacks With Reliable and Low Cost System

    Detection of data flow anomalies there are static or dynamic methods to detect data flow anomalies in the software reliability and testing field. Static methods are not suitable in the case due to its slow speed; dynamic methods are not suitable either due to the need for real execution of...

    Provided By The Schwa

  • White Papers // Oct 2012

    Personal Name Aliases on Automatic Discovery From the Web

    In this paper, the authors proposed a lexical-pattern-based approach to extract aliases of a given name. They use a set of names and their aliases as training data to extract lexical patterns that describe numerous ways in which information related to aliases of a name is presented on the web....

    Provided By The Schwa

  • White Papers // Oct 2012

    An Emergency System for Succoring Children Using Mobile GIS

    The large numbers of sick children in different diseases are very dreaded, and when there isn't succor at the proper time and in the type the sick child need it that makes them lose child. This paper suggested an emergency system for succoring sick child locally when he required that,...

    Provided By The Schwa

  • White Papers // Oct 2012

    3D Face Compression and Recognition Using Spherical Wavelet Parametrization

    In this paper an innovative fully automated 3D face compression and recognition system is presented. Several novelties are introduced to make the system performance robust and efficient. These novelties include: first, an automatic pose correction and normalization process by using curvature analysis for nose tip detection and Iterative Closest Point...

    Provided By The Schwa

  • White Papers // Oct 2012

    The Risk Management Strategy of Applying Cloud Computing

    It is inevitable that Cloud Computing will trigger off some loss exposures. Unfortunately, not much of scientific and objective researches had been focused on the identification and evaluation of loss exposures stemming from applications of Cloud Computing. In order to fill this research gap, this study attempts to identify and...

    Provided By The Schwa

  • White Papers // Oct 2012

    A Survey on Models and Query Languages for Temporally Annotated RDF

    In this paper, the authors provide a survey on the models and query languages for temporally annotated RDF. In most of the works, a temporally annotated RDF ontology is essentially a set of RDF triples associated with temporal constraints, where, in the simplest case, a temporal constraint is a validity...

    Provided By The Schwa

  • White Papers // Oct 2012

    An RGB Image Encryption Supported by Wavelet-Based Lossless Compression

    In this paper, the authors have proposed a method for an RGB image encryption supported by lifting scheme based lossless compression. Firstly, they have compressed the input color image using a 2-D integer wavelet transform. Then they have applied lossless predictive coding to achieve additional compression. The compressed image is...

    Provided By The Schwa

  • White Papers // Oct 2012

    Application of Relevance Vector Machines in Real Time Intrusion Detection

    In the recent years, there has been a growing interest in the development of change detection techniques for the analysis of Intrusion Detection. This interest stems from the wide range of applications in which change detection methods can be used. Detecting the changes by observing data collected at different times...

    Provided By The Schwa

  • White Papers // Oct 2012

    Fast DC Mode Prediction Scheme for Intra 4x4 Block in H.264/AVC Video Coding Standard

    In this paper, the researchers proposed a new scheme for DC mode prediction in intra frame for 4X4 block. In this scheme, the upper and left neighboring pixels would be used to predict each of the pixels in the 4X4 block with different weight. The prediction equations for each position...

    Provided By The Schwa

  • White Papers // Oct 2012

    Knowledge Sharing Protocol for Smart Spaces

    In this paper, the authors present a novel Knowledge Sharing Protocol (KSP) for semantic technology empowered ubiquitous computing systems. In particular the protocol is designed for M3 which is a blackboard based semantic interoperability solution for smart spaces. The main difference between the KSP and existing work is that KSP...

    Provided By The Schwa

  • White Papers // Oct 2012

    A Fuzzy Logic-Based Distance Broadcasting Scheme For Mobile Ad Hoc Networks

    An on-demand route discovery method in Mobile Ad hoc NETworks (MANET) uses simple flooding method, whereas a mobile node blindly rebroadcasts received Route REQuest (RREQ) packets until a route to a particular destination is established. Thus, this leads to broadcast storm problem. This paper presents a novel algorithm for broadcasting...

    Provided By The Schwa

  • White Papers // Oct 2012

    Security Analysis of Image Cryptosystem Using Stream Cipher Algorithm With Nonlinear Filtering Function

    In this paper, a new algorithm for encryption image is introduced. This algorithm makes it possible to cipher and decipher images by guaranteeing a maximum security. The algorithm introduced is based on stream cipher with nonlinear filtering function. The Boolean function used in this algorithm is resilient function satisfying all...

    Provided By The Schwa

  • White Papers // Oct 2012

    A Multi-Stage Optimization Model With Minimum Energy Consumption-Wireless Mesh Networks

    Optimization models related with routing, bandwidth utilization and power consumption are developed in the wireless mesh computing environment using the operations research techniques such as maximal flow model, transshipment model and minimax optimizing algorithm. The Path creation algorithm is used to find the multiple paths from source to destination. A...

    Provided By The Schwa

  • White Papers // Oct 2012

    Mutual Exclusion Principle for Multithreaded Web Crawlers

    This paper describes mutual exclusion principle for multithreaded web crawlers. The existing web crawlers use data structures to hold frontier set in local address space. This space could be used to run more crawler threads for faster operation. All crawler threads fetch the URL to crawl from the centralized frontier....

    Provided By The Schwa

  • White Papers // Oct 2012

    A Study on Security Within Public Transit Vehicles

    In public transit vehicles, security is the major concern for the passengers. Surveillance systems provide the security by providing surveillance cameras in the vehicles and a storage that maintains the data. The applications that allow monitoring the data in surveillance systems of public transit vehicles will provide different features to...

    Provided By The Schwa

  • White Papers // Sep 2012

    Growing Cloud Computing Efficiency

    Cloud computing is basically altering the expectation for how and when computing, storage and networking assets should be allocated, managed and devoted. End-users are progressively more sensitive in response time of services they ingest. Service Developers wish for the Service Providers to make sure or give the ability for dynamically...

    Provided By The Schwa

  • White Papers // Sep 2012

    A Hybrid Evolutionary Functional Link Artificial Neural Network for Data Mining and Classification

    This paper presents a specific structure of neural network as the Functional Link Artificial Neural Network (FLANN). This technique has been employed for classification tasks of data mining. In fact, there are a few studies that used this tool for solving classification problems. In this paper, the authors propose a...

    Provided By The Schwa

  • White Papers // Aug 2012

    Integration of Data Mining Within a Strategic Knowledge Management Framework

    In today's globally interconnected economy, knowledge is recognised as a valuable intangible asset and source of competitive advantage for firms operating in both established and emerging industries. Within these contexts Knowledge Management (KM) manifests as set of organising principles and heuristics which shape management routines, structures, technologies and cultures within...

    Provided By The Schwa

  • White Papers // Jul 2012

    Smart Grids: A New Framework for Efficient Power Management in Datacenter Networks

    The energy demand in the enterprise market segment demands a supply format that accommodates all generation and storage options with active participation by end users in demand response. Basically, with today's High Power Computing (HPC), a highly reliable, scalable, and cost effective energy solution that will satisfy power demands and...

    Provided By The Schwa

  • White Papers // Jul 2012

    FHC-NCTSR: Node Centric Trust Based Secure Hybrid Routing Protocol for Ad Hoc Networks

    To effectively support communication in such a dynamic networking environment as the ad hoc networks, the routing mechanisms should adapt to secure and trusted route discovery and service quality in data transmission. In this context, the paper proposed a routing protocol called Node Centric Trust based Secure Hybrid Routing Protocol...

    Provided By The Schwa

  • White Papers // Jul 2012

    Improving the Rate of Convergence of Blind Adaptive Equalization for Fast Varying Digital Communication Systems

    The recent digital transmission systems impose the application of channel equalizers with bandwidth efficiency, which mitigates the bottleneck of inter-symbol interference for high-speed data transmission-over communication channels. This leads to the exploration of blind equalization techniques that do not require the use of a training sequence. Blind equalization techniques however...

    Provided By The Schwa

  • White Papers // Jul 2012

    Throughput Analysis of IEEE 802.11b Wireless LAN With One Access Point Using Opnet Simulator

    This paper analyzes the throughput performance of IEEE 802.11b Wireless Local Area Network (WLAN) with one access point. The IEEE 802.11b is a wireless protocol standard. In this paper, a wireless network was established which has one access point. OPNET IT Guru Simulator (Academic edition) was used to simulate the...

    Provided By The Schwa

  • White Papers // Jul 2012

    BPM, Agile, and Virtualization Combine to Create Effective Solutions

    The rate of change in business and government is accelerating. A number of techniques for addressing that change have emerged independently to provide for automated solutions in this environment. This paper will examine three of the most popular of these technologies - business process management, the agile software development movement,...

    Provided By The Schwa

  • White Papers // Jul 2012

    A Study of FR Video Quality Assessment of Real Time Video Stream

    To assess the real-time transmission video's quality, this paper presents a approach which used FR Video Quality Assessment (VQA) model to satisfy the objective and subjective measurement requirement. If the user wants to get the reference video in the measuring terminal and to make a assessment, there are two problems...

    Provided By The Schwa

  • White Papers // Jul 2012

    A Comparative Study of White Box, Black Box and Grey Box Testing Techniques

    Software testing is the process to uncover requirement, design and coding errors in the program. It is used to identify the correctness, completeness, security and quality of software products against a specification. Software testing is the process used to measure the quality of developed computer software. It exhibits all mistakes,...

    Provided By The Schwa

  • White Papers // Jul 2012

    A Study on OFDM in Mobile Ad Hoc Network

    Orthogonal Frequency Division Multiplexing (OFDM) is the physical layer in emerging wireless local area networks that are also being targeted for ad hoc networking. OFDM can be also exploited in ad hoc networks to improve the energy performance of mobile devices. It is important in wireless networks because it can...

    Provided By The Schwa

  • White Papers // Jul 2012

    Evaluation of Spectral Efficiency, System Capacity and Interference Effects on CDMA Communication System

    Wireless communication technology have been developed based on exploring new mobile communications frequency bands, reasonable use of frequency resources and minimization, portability and multifunction's of mobile stations. The technology of wireless communications with duplex transmission is one of the fastest expanding in the world today. A very effective solution in...

    Provided By The Schwa

  • White Papers // Jul 2012

    Modeling of Traffic Accident Reporting System Through UML Using GIS

    Now-a-days vehicles are increasing day by day in town and cities roads. It is a well-known problem to manage traffics on the roads in towns and cities. A lot of accident occurs on the road due to careless driving and Technical faults in vehicles. The main problem of traffic authorities...

    Provided By The Schwa

  • White Papers // Jul 2012

    Segment, Track, Extract, Recognize and Convert Sign Language Videos to Voice/Text

    This paper summarizes various algorithms used to design a sign language recognition system. Sign language is the language used by deaf people to communicate among themselves and with normal people. The authors designed a real time sign language recognition system that can recognize gestures of sign language from videos under...

    Provided By The Schwa

  • White Papers // Jul 2012

    RFID: The Big Player in the Libraries of the Future

    This paper suggest the idea of developing an automatic Radio Frequency IDentification (RFID)-based system for library search and to observe the current literature to define whether current technology and developed RFID-based systems are supportive for building that. To fully understand its key points, implementations, risks, and benefits, the fundamentals of...

    Provided By The Schwa

  • White Papers // Jul 2012

    Automated Biometric Voice-Based Access Control in Automatic Teller Machine (ATM)

    An automatic teller machine requires a user to pass an identity test before any transaction can be granted. The current method available for access control in ATM is based on smartcard. Efforts were made to conduct an interview with structured questions among the ATM users and the result proofed that...

    Provided By The Schwa

  • White Papers // Jul 2012

    Power Analysis Attacks on ECC: A Major Security Threat

    Wireless Sensor Networks (WSNs) are largely deployed in different sectors and applications, and Elliptic Curve Cryptography (ECC) is proven to be the most feasible PKC for WSN security. ECC is believed to provide same level of security such as RSA with a much shorter key length, and thus they seem...

    Provided By The Schwa

  • White Papers // Jul 2012

    A Survey on Resource Allocation Strategies in Cloud Computing

    Cloud computing has become a new age technology that has got huge potentials in enterprises and markets. Clouds can make it possible to access applications and associated data from anywhere. Companies are able to rent resources from cloud for storage and other computational purposes so that their infrastructure cost can...

    Provided By The Schwa

  • White Papers // Jul 2012

    Cluster-Based Communication Protocol for Load-Balancing in Wireless Sensor Networks

    One of the main problems in wireless sensor networks is information collection. How the sensor nodes can send efficiently the sensed information to the sink since their number is very large and their resources are limited? Clustering provides a logical view, much more effective than the physical view, which extends...

    Provided By The Schwa

  • White Papers // Jul 2012

    An Application of Intuitionistic Fuzzy in Routing Networks

    Routing is an important functional aspect of networks to transport packets from source to destination. A router sets up optimized paths among the different nodes in the network. In this paper the authors proposed a new type of routing algorithm which includes exchange of routing information for small amount of...

    Provided By The Schwa

  • White Papers // Jul 2012

    An SMS-SQL Based On-Board System to Manage and Query a Database

    Technological advances of recent years have facilitated the use of embedded systems. They are part of the everyday life. Thanks to them, electronic devices are increasingly present in the people lives in many forms: mobile phones, music players and managers have become the essential of modern life. Access to information...

    Provided By The Schwa

  • White Papers // Jun 2012

    Data Normalization and Integration in Robotic Systems Using Web Services Technologies

    The robotics is one of the most active areas. The authors also need to join a large number of disciplines to create robots. With these premises, one problem is the management of information from multiple heterogeneous sources. Each component, hardware or software, produces data with different nature: temporal frequencies, processing...

    Provided By The Schwa

  • White Papers // Jun 2012

    Defect Diagnosis in Rotors Systems by Vibrations Data Collectors Using Trending Software

    Vibration measurements have been used to reliably diagnose performance problems in machinery and related mechanical products. A vibration data collector can be used effectively to measure and analyze the machinery vibration content in gearboxes, engines, turbines, fans, compressors, pumps and bearings. Ideally, a machine will have little or no vibration,...

    Provided By The Schwa

  • White Papers // Jun 2012

    2D Satellite Image Registration Using Transform Based and Correlation Based Methods

    Image registration is the process of geometrically aligning one image to another image of the same scene taken from different viewpoints or by different sensors. It is a fundamental image processing technique and is very useful in integrating information from different sensors, finding changes in images taken at different times...

    Provided By The Schwa

  • White Papers // Jun 2012

    Test Case Generation For Concurrent Object-Oriented Systems Using Combinational UML Models

    Software testing is an important phase of software development to ensure the quality and reliability of the software. Due to some limitations of code based testing method, the researcher has been taken a new method to work upon UML model based testing. It is found that different UML model is...

    Provided By The Schwa

  • White Papers // Jun 2012

    A Novel Approach for Troubleshooting Microprocessor Based Systems Using an Object Oriented Expert System

    The paper presents an object oriented fault diagnostic expert system framework which analyses observations from the unit under test when fault occurs and infers the causes of failures. The frame work is characterized by two basic features. The first includes a fault diagnostic strategy which utilizes the fault classification and...

    Provided By The Schwa

  • White Papers // Jun 2012

    Countermeasure for Round Trip Delay Which Occurs in Between Satellite and Ground With Software Network Accelerator

    Countermeasure for round trip delay which occurs in between satellite and ground with network accelerator is investigated together with operating system dependency on effectiveness of accelerator. Also disaster relief data transmission experiments are conducted for mitigation of disaster together with acceleration of disaster related data transmission between local government and...

    Provided By The Schwa

  • White Papers // Jun 2012

    Energy Efficient Clustering and Cluster Head Rotation Scheme for Wireless Sensor Networks

    Wireless sensor nodes are highly energy constrained devices. They have limited battery life due to various constraints of sensor nodes such as size and cost, etc. Moreover, most of the Wireless Sensor Network (WSN) applications render it impossible to charge or replace the battery of sensor nodes. Therefore, optimal use...

    Provided By The Schwa

  • White Papers // Jun 2012

    Creating a Complete Model of an Intrusion Detection System Effective on the LAN

    The Intrusion Detection Systems (IDS) are now an essential component in the structure of network security. The logs of connections and network activity, with a large amount of information, can be used to detect intrusions. Despite the development of new technologies of information and communication following the advent of the...

    Provided By The Schwa

  • White Papers // Sep 2012

    Growing Cloud Computing Efficiency

    Cloud computing is basically altering the expectation for how and when computing, storage and networking assets should be allocated, managed and devoted. End-users are progressively more sensitive in response time of services they ingest. Service Developers wish for the Service Providers to make sure or give the ability for dynamically...

    Provided By The Schwa

  • White Papers // Jan 2012

    Enhancing Business Intelligence in a Smarter Computing Environment Through Cost Analysis

    The paper aims at improving Business Intelligence in a smarter computing environment through cost analysis. Smarter computing is a new approach to designing IT infrastructures to create new opportunities like creating new business models, find new ways of delivering technology-based services, and generate new insights from IT to fuel innovation...

    Provided By The Schwa

  • White Papers // Jun 2012

    Prioritizing Test Cases Using Business Criticality Test Value

    Software maintenance is an important and costly activity of the software development lifecycle. Regression testing is the process of validating modifications introduced in a system during software maintenance. It is very inefficient to re-execute every test case in regression testing for small changes. This issue of retesting of software systems...

    Provided By The Schwa

  • White Papers // Jan 2013

    Classifying Personalization Constraints in Digital Business Environments Through Case Study Research

    To aid professionals in the early assessment of possible risks related to personalization activities in marketing as well as to give academics a starting point to discover not only the opportunities but also the risks of personalization, a 'Classification Scheme of Personalization Constraints' is established after the analysis of 24...

    Provided By The Schwa

  • White Papers // Dec 2010

    The Impact of Social Networking Websites to Facilitate the Effectiveness of Viral Marketing

    The Internet and the World Wide Web have become two key components in today's technology based organizations and businesses. As the Internet is becoming more and more popular, it is starting to make a big impact on people's day-today life. As a result of this revolutionary transformation towards the modern...

    Provided By The Schwa

  • White Papers // Feb 2012

    Self-Regulating Message Throughput in Enterprise Messaging Servers - A Feedback Control Solution

    Enterprise Messaging is a very popular message exchange concept in asynchronous distributed computing environments. The Enterprise Messaging Servers are heavily used in building business critical Enterprise applications such as Internet based Order processing systems, pricing distribution of B2B, geographically dispersed enterprise applications. It is always desirable that Messaging Servers exhibit...

    Provided By The Schwa

  • White Papers // Jul 2011

    An Authorization Mechanism for Access Control of Resources in the Web Services Paradigm

    With the increase in web based enterprise services, there is an increasing trend among business enterprises to migrate to web services platform. Web services paradigm poses a number of new security challenges, which can only be realized by developing effective access control models. The fact that the enterprises allow access...

    Provided By The Schwa

  • White Papers // Jun 2011

    Deploying an Application on the Cloud

    Cloud Computing, the impending need of computing as an optimal utility, has the potential to take a gigantic leap in the IT industry, is structured and put to optimal use with regard to the contemporary trends. Developers with innovative ideas need not be apprehensive about non utility of costly resources...

    Provided By The Schwa

  • White Papers // Nov 2011

    The Impact of Competitive Intelligence on Products and Services Innovation in Organizations

    This paper discusses the findings of the study that was aimed at establishing the effect of Competitive Intelligence, hereafter referred to as CI, on product and service innovations. A literature study revealed that CI and innovation are widely studied subjects, but the impact of CI on innovation was not well...

    Provided By The Schwa

  • White Papers // Feb 2013

    Coordinated Resource Management Models in Hierarchical Systems

    In response to the trend of efficient global economy, constructing a global logistic model has garnered much attention from the industry. Location selection is an important issue for those international companies that are interested in building a global logistics management system. Infrastructure in Developing Countries are based on the use...

    Provided By The Schwa

  • White Papers // Jan 2013

    A Proposed Integrated Approach for BI and GIS in Health Sector to Support Decision Makers (BIGIS-DSS)

    This paper explores the possibilities of adopting Business Intelligence (BI), and Geographic Information System (GIS) to build a spatial intelligence and predictive analytical approach. The proposed approach will help in solving spatial problem which faces decision makers at health sector. The proposed spatial analytical approach will cover three main health...

    Provided By The Schwa

  • White Papers // Feb 2011

    Knowledge-Based System's Modeling for Software Process Model Selection

    This paper depicts the knowledge-based system named as ESPMS (Expert System for Process Model Selection) through various models. A questionnaire was developed to identify important parameters, which were evaluated through domain experts in about all the universities of Pakistan. No exact system was found, which could guide Software Engineers for...

    Provided By The Schwa

  • White Papers // Jan 2013

    An Analysis of Security Challenges in Cloud Computing

    Vendors offer a pool of shared resources to their users through the cloud network. Nowadays, shifting to cloud is a very optimal decision as it provides pay-as-user-go services to users. Cloud has boomed high in business and other industries for its advantages like multi-tenancy, resource pooling, storage capacity etc. In...

    Provided By The Schwa

  • White Papers // May 2013

    Building Low Cost Cloud Computing Systems

    The actual models of cloud computing are based in megalomaniac hardware solutions, being its implementation and maintenance unaffordable to the majority of service providers. The use of jail services is an alternative to current models of cloud computing based on virtualization. Models based in utilization of jail environments instead of...

    Provided By The Schwa