The Schwa

Displaying 41-80 of 87 results

  • White Papers // Aug 2012

    Software Architecture- Evolution and Evaluation

    The growth of various software architectural frameworks and models provides a standard governing structure for different types of organizations. Selection of a suitable framework for a particular environment needs much more detailed information in various aspects and a reference guide of features should be provided. This paper brings out the...

    Provided By The Schwa

  • White Papers // Aug 2012

    Techniques to Improve the GPS Precision

    The accuracy of a standard market receiver GPS (Global Positioning System) is near 10-15 meters the 95% of the times. To reach a sub-metric level of accuracy some techniques must be used. This paper describes some of these procedures to improve the positioning accuracy by using a low-cost GPS in...

    Provided By The Schwa

  • White Papers // Aug 2012

    An Enhanced MPLS-TE for Transferring Multimedia Packets

    Multi-Protocol Label Switching is useful in managing multimedia traffic when some links are too congested; MPLS Traffic Engineering is a growing implementation in today's service provider networks. In this paper, the authors propose an improvement of MPLS-TE called EMPLS-TE, it is based on a modification of operation of Forwarding Equivalence...

    Provided By The Schwa

  • White Papers // Aug 2012

    A New Algorithm for Data Compression Optimization

    People tend to store a lot of files inside theirs storage. When the storage nears it limit, they then try to reduce those files size to minimum by using data compression software. In this paper, the authors propose a new algorithm for data compression, called J-Bit Encoding (JBE). This algorithm...

    Provided By The Schwa

  • White Papers // Aug 2012

    Monte Carlo Based Non-Linear Mixture Model of Earth Observation Satellite Imagery Pixel Data

    Monte Carlo based non-linear mixel (mixed pixel) model of visible to near infrared radiometer of earth observation satellite imagery is proposed. Through comparative studies with actual real earth observation satellite imagery data between conventional linear mixel model and the proposed non-linear mixel model, it is found that the proposed mixel...

    Provided By The Schwa

  • White Papers // Aug 2012

    E-commerce Smartphone Application

    Mobile and e-commerce applications are tools for accessing the Internet and for buying products and services. These applications are constantly evolving due to the high rate of technological advances being made. This paper provides a new perspective on the types of applications that can be used. It describes and analyses...

    Provided By The Schwa

  • White Papers // Jul 2012

    Smart Grids: A New Framework for Efficient Power Management in Datacenter Networks

    The energy demand in the enterprise market segment demands a supply format that accommodates all generation and storage options with active participation by end users in demand response. Basically, with today's High Power Computing (HPC), a highly reliable, scalable, and cost effective energy solution that will satisfy power demands and...

    Provided By The Schwa

  • White Papers // Jul 2012

    FHC-NCTSR: Node Centric Trust Based Secure Hybrid Routing Protocol for Ad Hoc Networks

    To effectively support communication in such a dynamic networking environment as the ad hoc networks, the routing mechanisms should adapt to secure and trusted route discovery and service quality in data transmission. In this context, the paper proposed a routing protocol called Node Centric Trust based Secure Hybrid Routing Protocol...

    Provided By The Schwa

  • White Papers // Jul 2012

    Improving the Rate of Convergence of Blind Adaptive Equalization for Fast Varying Digital Communication Systems

    The recent digital transmission systems impose the application of channel equalizers with bandwidth efficiency, which mitigates the bottleneck of inter-symbol interference for high-speed data transmission-over communication channels. This leads to the exploration of blind equalization techniques that do not require the use of a training sequence. Blind equalization techniques however...

    Provided By The Schwa

  • White Papers // Jul 2012

    Throughput Analysis of IEEE 802.11b Wireless LAN With One Access Point Using Opnet Simulator

    This paper analyzes the throughput performance of IEEE 802.11b Wireless Local Area Network (WLAN) with one access point. The IEEE 802.11b is a wireless protocol standard. In this paper, a wireless network was established which has one access point. OPNET IT Guru Simulator (Academic edition) was used to simulate the...

    Provided By The Schwa

  • White Papers // Jul 2012

    BPM, Agile, and Virtualization Combine to Create Effective Solutions

    The rate of change in business and government is accelerating. A number of techniques for addressing that change have emerged independently to provide for automated solutions in this environment. This paper will examine three of the most popular of these technologies - business process management, the agile software development movement,...

    Provided By The Schwa

  • White Papers // Jul 2012

    Evaluation of Spectral Efficiency, System Capacity and Interference Effects on CDMA Communication System

    Wireless communication technology have been developed based on exploring new mobile communications frequency bands, reasonable use of frequency resources and minimization, portability and multifunction's of mobile stations. The technology of wireless communications with duplex transmission is one of the fastest expanding in the world today. A very effective solution in...

    Provided By The Schwa

  • White Papers // Jul 2012

    Modeling of Traffic Accident Reporting System Through UML Using GIS

    Now-a-days vehicles are increasing day by day in town and cities roads. It is a well-known problem to manage traffics on the roads in towns and cities. A lot of accident occurs on the road due to careless driving and Technical faults in vehicles. The main problem of traffic authorities...

    Provided By The Schwa

  • White Papers // Jul 2012

    Segment, Track, Extract, Recognize and Convert Sign Language Videos to Voice/Text

    This paper summarizes various algorithms used to design a sign language recognition system. Sign language is the language used by deaf people to communicate among themselves and with normal people. The authors designed a real time sign language recognition system that can recognize gestures of sign language from videos under...

    Provided By The Schwa

  • White Papers // Jul 2012

    RFID: The Big Player in the Libraries of the Future

    This paper suggest the idea of developing an automatic Radio Frequency IDentification (RFID)-based system for library search and to observe the current literature to define whether current technology and developed RFID-based systems are supportive for building that. To fully understand its key points, implementations, risks, and benefits, the fundamentals of...

    Provided By The Schwa

  • White Papers // Jul 2012

    Automated Biometric Voice-Based Access Control in Automatic Teller Machine (ATM)

    An automatic teller machine requires a user to pass an identity test before any transaction can be granted. The current method available for access control in ATM is based on smartcard. Efforts were made to conduct an interview with structured questions among the ATM users and the result proofed that...

    Provided By The Schwa

  • White Papers // Jul 2012

    Power Analysis Attacks on ECC: A Major Security Threat

    Wireless Sensor Networks (WSNs) are largely deployed in different sectors and applications, and Elliptic Curve Cryptography (ECC) is proven to be the most feasible PKC for WSN security. ECC is believed to provide same level of security such as RSA with a much shorter key length, and thus they seem...

    Provided By The Schwa

  • White Papers // Jul 2012

    A Survey on Resource Allocation Strategies in Cloud Computing

    Cloud computing has become a new age technology that has got huge potentials in enterprises and markets. Clouds can make it possible to access applications and associated data from anywhere. Companies are able to rent resources from cloud for storage and other computational purposes so that their infrastructure cost can...

    Provided By The Schwa

  • White Papers // Jul 2012

    Cluster-Based Communication Protocol for Load-Balancing in Wireless Sensor Networks

    One of the main problems in wireless sensor networks is information collection. How the sensor nodes can send efficiently the sensed information to the sink since their number is very large and their resources are limited? Clustering provides a logical view, much more effective than the physical view, which extends...

    Provided By The Schwa

  • White Papers // Jul 2012

    An Application of Intuitionistic Fuzzy in Routing Networks

    Routing is an important functional aspect of networks to transport packets from source to destination. A router sets up optimized paths among the different nodes in the network. In this paper the authors proposed a new type of routing algorithm which includes exchange of routing information for small amount of...

    Provided By The Schwa

  • White Papers // Jul 2012

    An SMS-SQL Based On-Board System to Manage and Query a Database

    Technological advances of recent years have facilitated the use of embedded systems. They are part of the everyday life. Thanks to them, electronic devices are increasingly present in the people lives in many forms: mobile phones, music players and managers have become the essential of modern life. Access to information...

    Provided By The Schwa

  • White Papers // Jul 2012

    A Study of FR Video Quality Assessment of Real Time Video Stream

    To assess the real-time transmission video's quality, this paper presents a approach which used FR Video Quality Assessment (VQA) model to satisfy the objective and subjective measurement requirement. If the user wants to get the reference video in the measuring terminal and to make a assessment, there are two problems...

    Provided By The Schwa

  • White Papers // Jul 2012

    A Comparative Study of White Box, Black Box and Grey Box Testing Techniques

    Software testing is the process to uncover requirement, design and coding errors in the program. It is used to identify the correctness, completeness, security and quality of software products against a specification. Software testing is the process used to measure the quality of developed computer software. It exhibits all mistakes,...

    Provided By The Schwa

  • White Papers // Jul 2012

    A Study on OFDM in Mobile Ad Hoc Network

    Orthogonal Frequency Division Multiplexing (OFDM) is the physical layer in emerging wireless local area networks that are also being targeted for ad hoc networking. OFDM can be also exploited in ad hoc networks to improve the energy performance of mobile devices. It is important in wireless networks because it can...

    Provided By The Schwa

  • White Papers // Jun 2012

    Defect Diagnosis in Rotors Systems by Vibrations Data Collectors Using Trending Software

    Vibration measurements have been used to reliably diagnose performance problems in machinery and related mechanical products. A vibration data collector can be used effectively to measure and analyze the machinery vibration content in gearboxes, engines, turbines, fans, compressors, pumps and bearings. Ideally, a machine will have little or no vibration,...

    Provided By The Schwa

  • White Papers // Jun 2012

    2D Satellite Image Registration Using Transform Based and Correlation Based Methods

    Image registration is the process of geometrically aligning one image to another image of the same scene taken from different viewpoints or by different sensors. It is a fundamental image processing technique and is very useful in integrating information from different sensors, finding changes in images taken at different times...

    Provided By The Schwa

  • White Papers // Jun 2012

    Test Case Generation For Concurrent Object-Oriented Systems Using Combinational UML Models

    Software testing is an important phase of software development to ensure the quality and reliability of the software. Due to some limitations of code based testing method, the researcher has been taken a new method to work upon UML model based testing. It is found that different UML model is...

    Provided By The Schwa

  • White Papers // Jun 2012

    A Novel Approach for Troubleshooting Microprocessor Based Systems Using an Object Oriented Expert System

    The paper presents an object oriented fault diagnostic expert system framework which analyses observations from the unit under test when fault occurs and infers the causes of failures. The frame work is characterized by two basic features. The first includes a fault diagnostic strategy which utilizes the fault classification and...

    Provided By The Schwa

  • White Papers // Jun 2012

    Countermeasure for Round Trip Delay Which Occurs in Between Satellite and Ground With Software Network Accelerator

    Countermeasure for round trip delay which occurs in between satellite and ground with network accelerator is investigated together with operating system dependency on effectiveness of accelerator. Also disaster relief data transmission experiments are conducted for mitigation of disaster together with acceleration of disaster related data transmission between local government and...

    Provided By The Schwa

  • White Papers // Jun 2012

    Energy Efficient Clustering and Cluster Head Rotation Scheme for Wireless Sensor Networks

    Wireless sensor nodes are highly energy constrained devices. They have limited battery life due to various constraints of sensor nodes such as size and cost, etc. Moreover, most of the Wireless Sensor Network (WSN) applications render it impossible to charge or replace the battery of sensor nodes. Therefore, optimal use...

    Provided By The Schwa

  • White Papers // Jun 2012

    Creating a Complete Model of an Intrusion Detection System Effective on the LAN

    The Intrusion Detection Systems (IDS) are now an essential component in the structure of network security. The logs of connections and network activity, with a large amount of information, can be used to detect intrusions. Despite the development of new technologies of information and communication following the advent of the...

    Provided By The Schwa

  • White Papers // Jun 2012

    Prioritizing Test Cases Using Business Criticality Test Value

    Software maintenance is an important and costly activity of the software development lifecycle. Regression testing is the process of validating modifications introduced in a system during software maintenance. It is very inefficient to re-execute every test case in regression testing for small changes. This issue of retesting of software systems...

    Provided By The Schwa

  • White Papers // Jun 2012

    Data Normalization and Integration in Robotic Systems Using Web Services Technologies

    The robotics is one of the most active areas. The authors also need to join a large number of disciplines to create robots. With these premises, one problem is the management of information from multiple heterogeneous sources. Each component, hardware or software, produces data with different nature: temporal frequencies, processing...

    Provided By The Schwa

  • White Papers // Mar 2012

    Building Trust In Cloud Using Public Key Infrastructure

    Cloud services have grown very quickly over the past couple of years, giving consumers and companies the chance to put services, resources and infrastructures in the hands of a provider. There are big security concerns when using cloud services. With the emergence of cloud computing, Public Key Infrastructure (PKI) technology...

    Provided By The Schwa

  • White Papers // Mar 2012

    Performance Evaluation of Adaptive Virtual Machine Load Balancing Algorithm

    The conception of Cloud computing has not only reshaped the field of distributed systems but also extend businesses potential. Load balancing is a core and challenging issue in Cloud Computing. How to use Cloud computing resources efficiently and gain the maximum profits with efficient load balancing algorithm is one of...

    Provided By The Schwa

  • White Papers // Feb 2012

    Effective Security Architecture for Virtualized Data Center Networks

    This paper presents a candidate scheme for effective security policy that defines the requirements that will facilitate protection of network resources from internal and external security threats. Also, it ensures data privacy and integrity in a Virtualized Data Center Network (VDCN). An integration of Open Flow Software Defined Networking (OFSDN)...

    Provided By The Schwa

  • White Papers // Feb 2012

    Self-Regulating Message Throughput in Enterprise Messaging Servers - A Feedback Control Solution

    Enterprise Messaging is a very popular message exchange concept in asynchronous distributed computing environments. The Enterprise Messaging Servers are heavily used in building business critical Enterprise applications such as Internet based Order processing systems, pricing distribution of B2B, geographically dispersed enterprise applications. It is always desirable that Messaging Servers exhibit...

    Provided By The Schwa

  • White Papers // Feb 2012

    Data Warehouse Requirements Analysis Framework: Business-Object Based Approach

    Detailed requirements analysis plays a key role towards the design of successful Data Warehouse (DW) system. The requirements analysis specifications are used as the prime input for the construction of conceptual level multidimensional data model. This paper has proposed a Business Object based requirements analysis framework for DW system which...

    Provided By The Schwa

  • White Papers // Feb 2012

    The Relationships of Soft Systems Methodology (SSM), Business Process Modeling and EGovernment

    E-Government has emerged in several countries. Because of many aspects that must be considered, and because of there are exist some soft components in e-Government, then the Soft Systems Methodology (SSM) can be considered to use in e-Government systems development process. On the other hand, business process modeling is essential...

    Provided By The Schwa

  • White Papers // Jan 2012

    Enhancing Business Intelligence in a Smarter Computing Environment Through Cost Analysis

    The paper aims at improving Business Intelligence in a smarter computing environment through cost analysis. Smarter computing is a new approach to designing IT infrastructures to create new opportunities like creating new business models, find new ways of delivering technology-based services, and generate new insights from IT to fuel innovation...

    Provided By The Schwa

  • White Papers // Oct 2012

    A Study on Security Within Public Transit Vehicles

    In public transit vehicles, security is the major concern for the passengers. Surveillance systems provide the security by providing surveillance cameras in the vehicles and a storage that maintains the data. The applications that allow monitoring the data in surveillance systems of public transit vehicles will provide different features to...

    Provided By The Schwa

  • White Papers // Oct 2012

    An Emergency System for Succoring Children Using Mobile GIS

    The large numbers of sick children in different diseases are very dreaded, and when there isn't succor at the proper time and in the type the sick child need it that makes them lose child. This paper suggested an emergency system for succoring sick child locally when he required that,...

    Provided By The Schwa

  • White Papers // Aug 2012

    An Enhanced MPLS-TE for Transferring Multimedia Packets

    Multi-Protocol Label Switching is useful in managing multimedia traffic when some links are too congested; MPLS Traffic Engineering is a growing implementation in today's service provider networks. In this paper, the authors propose an improvement of MPLS-TE called EMPLS-TE, it is based on a modification of operation of Forwarding Equivalence...

    Provided By The Schwa

  • White Papers // Aug 2012

    A New Algorithm for Data Compression Optimization

    People tend to store a lot of files inside theirs storage. When the storage nears it limit, they then try to reduce those files size to minimum by using data compression software. In this paper, the authors propose a new algorithm for data compression, called J-Bit Encoding (JBE). This algorithm...

    Provided By The Schwa

  • White Papers // Aug 2012

    Monte Carlo Based Non-Linear Mixture Model of Earth Observation Satellite Imagery Pixel Data

    Monte Carlo based non-linear mixel (mixed pixel) model of visible to near infrared radiometer of earth observation satellite imagery is proposed. Through comparative studies with actual real earth observation satellite imagery data between conventional linear mixel model and the proposed non-linear mixel model, it is found that the proposed mixel...

    Provided By The Schwa

  • White Papers // Aug 2012

    E-commerce Smartphone Application

    Mobile and e-commerce applications are tools for accessing the Internet and for buying products and services. These applications are constantly evolving due to the high rate of technological advances being made. This paper provides a new perspective on the types of applications that can be used. It describes and analyses...

    Provided By The Schwa

  • White Papers // Aug 2012

    Integration of Data Mining Within a Strategic Knowledge Management Framework

    In today's globally interconnected economy, knowledge is recognised as a valuable intangible asset and source of competitive advantage for firms operating in both established and emerging industries. Within these contexts Knowledge Management (KM) manifests as set of organising principles and heuristics which shape management routines, structures, technologies and cultures within...

    Provided By The Schwa

  • White Papers // Aug 2012

    Software Architecture- Evolution and Evaluation

    The growth of various software architectural frameworks and models provides a standard governing structure for different types of organizations. Selection of a suitable framework for a particular environment needs much more detailed information in various aspects and a reference guide of features should be provided. This paper brings out the...

    Provided By The Schwa

  • White Papers // Sep 2012

    A Hybrid Evolutionary Functional Link Artificial Neural Network for Data Mining and Classification

    This paper presents a specific structure of neural network as the Functional Link Artificial Neural Network (FLANN). This technique has been employed for classification tasks of data mining. In fact, there are a few studies that used this tool for solving classification problems. In this paper, the authors propose a...

    Provided By The Schwa

  • White Papers // Aug 2012

    Techniques to Improve the GPS Precision

    The accuracy of a standard market receiver GPS (Global Positioning System) is near 10-15 meters the 95% of the times. To reach a sub-metric level of accuracy some techniques must be used. This paper describes some of these procedures to improve the positioning accuracy by using a low-cost GPS in...

    Provided By The Schwa

  • White Papers // Jan 2013

    Cloud Computing for Solving E-Learning Problems

    The integration of information and communication technologies in education according to the global trend occupied a great interest in the Arab world through E-Learning techniques and put it into the form of services within Services Oriented Architecture Technique (SOA), and mixing its input and outputs within the components of the...

    Provided By The Schwa

  • White Papers // Dec 2012

    Passing VBR in Mobile Ad Hoc Networks for effective live video Streaming

    Mobile Ad hoc NETworks (often referred to as MANETs) consist of wireless hosts that communicate with each other in the absence of a fixed infrastructure. This technique can be used effectively in disaster management, intellectual conference and also in the battlefield environments. It has the significant attention in the recent...

    Provided By The Schwa

  • White Papers // Dec 2012

    Optimal Itinerary Planning for Mobile Multiple Agents in WSN

    Multi mobile agents based on data collection and aggregations have proved their effective in Wireless Sensor Networks (WSN). However, the way in which these agents are deployed must be intelligently planned and should be adapted to the characteristics of wireless sensor networks. While most existing studies are based on the...

    Provided By The Schwa

  • White Papers // Dec 2012

    The Virtual Enterprise Network based on IPSec VPN Solutions and Management

    Informational society construction can't be realized without research and investment projects in Information and Communication Technologies (ICT). In the 21st century, all enterprises have a local area network, a virtual private network, an Intranet and Internet, servers and workstations for operations, administration and management working together for the same objective:...

    Provided By The Schwa

  • White Papers // Oct 2012

    Challenges of Future R&D in Mobile Communications

    This paper provides a survey for the main challenges of future Research and Development (R&D) for Next Generation mobile Networks (NGNs). It addresses software and hardware re-configurability with focus on reconfigurable coupling and interworking amongst heterogeneous wireless access networks. It also explores the promising technologies for NGNs such as nanotechnology,...

    Provided By The Schwa

  • White Papers // Nov 2012

    MDSA: Modified Distributed Storage Algorithm for Wireless Sensor Networks

    In this paper, the authors propose a Modified Distributed Storage Algorithm for wireless sensor networks (MDSA). Wireless Sensor Networks, as it is well known, suffer of power limitation, small memory capacity, and limited processing capabilities. Therefore, every node may disappear temporarily or permanently from the network due to many different...

    Provided By The Schwa

  • White Papers // Oct 2012

    A Distributed Method to Localization for Mobile Sensor Networks Based on the Convex Hull

    There has been recently a trend of exploiting the heterogeneity in WSNs and the mobility of either the sensor nodes or the sink nodes to facilitate data dissemination in WSNs. Recently, there has been much focus on mobile sensor networks, and the authors have even seen the development of small-profile...

    Provided By The Schwa

  • White Papers // Oct 2012

    Defending Polymorphic Worms in Computer Network using Honeypot

    Polymorphic worms are a major threat to internet infrastructure security. In this mechanism the authors are using gate-translator, double honeypot, sticky honeypot, internal translator and antivirus of Cloud AV, which attracts polymorphic worms. They are proposing an algorithm to detect and remove polymorphic worms and innocuous traffic related packets. Worms...

    Provided By The Schwa

  • White Papers // Oct 2012

    High Performance Speed Sensorless Control of Three-Phase Induction Motor Based on Cloud Computing

    Induction motor is a cast of alternating current motor where charge endures allotted to the rotor close-at-hand deputation of conductive charge. These motors are broadly applied in industrial claim due to they are arduous along with adhere no contacts. The speed controller of deltoid phase induction motor is applied to...

    Provided By The Schwa

  • White Papers // Oct 2012

    Secured Wireless Communication using Fuzzy Logic based High Speed Public-Key Cryptography (FLHSPKC)

    In this paper secured wireless communication using Fuzzy Logic based High Speed Public-Key Cryptography (FLHSPKC) has been proposed by satisfying the major issues likes computational safety, power management and restricted usage of memory in wireless communication. Wireless Sensor Network (WSN) has several major constraints likes' inadequate source of energy, restricted...

    Provided By The Schwa

  • White Papers // Oct 2012

    A Newer User Authentication, File Encryption and Distributed Server Based Cloud Computing Security Architecture

    The cloud computing platform gives people the opportunity for sharing resources, services and information among the people of the whole world. In private cloud system, information is shared among the persons who are in that cloud. For this, security or personal information hiding process hampers. In this paper the authors...

    Provided By The Schwa

  • White Papers // Oct 2012

    Request Analysis and Dynamic Queuing System for VANETs

    Vehicular Ad hoc NETwork (VANET) is a kind of mobile ad hoc network using the capabilities of wireless communication for Vehicle-to-Vehicle and Vehicle-to-Roadside communication to provide safety and comfort to vehicles in transportation system. People in vehicles want to access data of their interest from Road Side Unit (RSU). RSU...

    Provided By The Schwa

  • White Papers // Dec 2012

    Low Cost Approach to Real-Time Vehicle to Vehicle Communication Using Parallel CPU and GPU Processing

    This paper proposes a novel Vehicle to Vehicle (V2V) communication system for collision avoidance which merges four different wireless devices (GPS, Wi-Fi, ZigBee and 3G) with a low power embedded Single Board Computer (SBC) in order to increase processing speed while maintaining a low cost. The three major technical challenges...

    Provided By The Schwa

  • White Papers // Oct 2011

    Comparison of Workflow Scheduling Algorithms in Cloud Computing

    Cloud computing has gained popularity in recent times. Cloud computing is internet based computing, whereby shared resources, software and information are provided to computers and other devices on demand, like a public utility. Cloud computing is technology that uses the internet and central remote servers to maintain data and applications....

    Provided By The Schwa

  • White Papers // Aug 2011

    Control Systems Application in Java Based Enterprise and Cloud Environments - A Survey

    The classical feedback control systems have been a successful theory in many engineering applications like electrical power, process, and manufacturing industries. For more than a decade there is active research in exploring feedback control systems applications in computing and some of the results are applied to the commercial software products....

    Provided By The Schwa

  • White Papers // Feb 2012

    Effective Security Architecture for Virtualized Data Center Networks

    This paper presents a candidate scheme for effective security policy that defines the requirements that will facilitate protection of network resources from internal and external security threats. Also, it ensures data privacy and integrity in a Virtualized Data Center Network (VDCN). An integration of Open Flow Software Defined Networking (OFSDN)...

    Provided By The Schwa

  • White Papers // Jun 2013

    Enterprise Architecture Model that Enables to Search for Patterns of Statistical Information

    Enterprise architecture is the stem from which developing of any departmental information system should grow and around which it should revolve. In the paper, a fragment of an enterprise architecture model is built using ArchiMate language. This fragment enables to search for information in enterprises which do not work in...

    Provided By The Schwa

  • White Papers // Jun 2013

    The Quest Towards a Winning Enterprise 2.0 Collaboration Technology Adoption Strategy

    Although Enterprise 2.0 collaboration technologies present enterprises with a significant amount of business benefits; enterprises are still facing challenges in promoting and sustaining end-user adoption. The purpose of this paper is to provide a systematic review on Enterprise 2.0 collaboration technology adoption models, challenges, as well as to provide emerging...

    Provided By The Schwa

  • White Papers // Mar 2012

    Building Trust In Cloud Using Public Key Infrastructure

    Cloud services have grown very quickly over the past couple of years, giving consumers and companies the chance to put services, resources and infrastructures in the hands of a provider. There are big security concerns when using cloud services. With the emergence of cloud computing, Public Key Infrastructure (PKI) technology...

    Provided By The Schwa

  • White Papers // May 2013

    Building Low Cost Cloud Computing Systems

    The actual models of cloud computing are based in megalomaniac hardware solutions, being its implementation and maintenance unaffordable to the majority of service providers. The use of jail services is an alternative to current models of cloud computing based on virtualization. Models based in utilization of jail environments instead of...

    Provided By The Schwa

  • White Papers // Jan 2013

    An Analysis of Security Challenges in Cloud Computing

    Vendors offer a pool of shared resources to their users through the cloud network. Nowadays, shifting to cloud is a very optimal decision as it provides pay-as-user-go services to users. Cloud has boomed high in business and other industries for its advantages like multi-tenancy, resource pooling, storage capacity etc. In...

    Provided By The Schwa

  • White Papers // Feb 2011

    Knowledge-Based System's Modeling for Software Process Model Selection

    This paper depicts the knowledge-based system named as ESPMS (Expert System for Process Model Selection) through various models. A questionnaire was developed to identify important parameters, which were evaluated through domain experts in about all the universities of Pakistan. No exact system was found, which could guide Software Engineers for...

    Provided By The Schwa

  • White Papers // Jan 2013

    A Proposed Integrated Approach for BI and GIS in Health Sector to Support Decision Makers (BIGIS-DSS)

    This paper explores the possibilities of adopting Business Intelligence (BI), and Geographic Information System (GIS) to build a spatial intelligence and predictive analytical approach. The proposed approach will help in solving spatial problem which faces decision makers at health sector. The proposed spatial analytical approach will cover three main health...

    Provided By The Schwa

  • White Papers // Feb 2013

    Coordinated Resource Management Models in Hierarchical Systems

    In response to the trend of efficient global economy, constructing a global logistic model has garnered much attention from the industry. Location selection is an important issue for those international companies that are interested in building a global logistics management system. Infrastructure in Developing Countries are based on the use...

    Provided By The Schwa

  • White Papers // Nov 2011

    The Impact of Competitive Intelligence on Products and Services Innovation in Organizations

    This paper discusses the findings of the study that was aimed at establishing the effect of Competitive Intelligence, hereafter referred to as CI, on product and service innovations. A literature study revealed that CI and innovation are widely studied subjects, but the impact of CI on innovation was not well...

    Provided By The Schwa

  • White Papers // Jun 2011

    Deploying an Application on the Cloud

    Cloud Computing, the impending need of computing as an optimal utility, has the potential to take a gigantic leap in the IT industry, is structured and put to optimal use with regard to the contemporary trends. Developers with innovative ideas need not be apprehensive about non utility of costly resources...

    Provided By The Schwa

  • White Papers // Jul 2011

    An Authorization Mechanism for Access Control of Resources in the Web Services Paradigm

    With the increase in web based enterprise services, there is an increasing trend among business enterprises to migrate to web services platform. Web services paradigm poses a number of new security challenges, which can only be realized by developing effective access control models. The fact that the enterprises allow access...

    Provided By The Schwa

  • White Papers // Feb 2012

    Self-Regulating Message Throughput in Enterprise Messaging Servers - A Feedback Control Solution

    Enterprise Messaging is a very popular message exchange concept in asynchronous distributed computing environments. The Enterprise Messaging Servers are heavily used in building business critical Enterprise applications such as Internet based Order processing systems, pricing distribution of B2B, geographically dispersed enterprise applications. It is always desirable that Messaging Servers exhibit...

    Provided By The Schwa

  • White Papers // Dec 2010

    The Impact of Social Networking Websites to Facilitate the Effectiveness of Viral Marketing

    The Internet and the World Wide Web have become two key components in today's technology based organizations and businesses. As the Internet is becoming more and more popular, it is starting to make a big impact on people's day-today life. As a result of this revolutionary transformation towards the modern...

    Provided By The Schwa

  • White Papers // Jan 2013

    Classifying Personalization Constraints in Digital Business Environments Through Case Study Research

    To aid professionals in the early assessment of possible risks related to personalization activities in marketing as well as to give academics a starting point to discover not only the opportunities but also the risks of personalization, a 'Classification Scheme of Personalization Constraints' is established after the analysis of 24...

    Provided By The Schwa