The Schwa

Displaying 41-80 of 87 results

  • White Papers // Aug 2012

    Integration of Data Mining Within a Strategic Knowledge Management Framework

    In today's globally interconnected economy, knowledge is recognised as a valuable intangible asset and source of competitive advantage for firms operating in both established and emerging industries. Within these contexts Knowledge Management (KM) manifests as set of organising principles and heuristics which shape management routines, structures, technologies and cultures within...

    Provided By The Schwa

  • White Papers // Aug 2012

    Software Architecture- Evolution and Evaluation

    The growth of various software architectural frameworks and models provides a standard governing structure for different types of organizations. Selection of a suitable framework for a particular environment needs much more detailed information in various aspects and a reference guide of features should be provided. This paper brings out the...

    Provided By The Schwa

  • White Papers // Aug 2012

    An Enhanced MPLS-TE for Transferring Multimedia Packets

    Multi-Protocol Label Switching is useful in managing multimedia traffic when some links are too congested; MPLS Traffic Engineering is a growing implementation in today's service provider networks. In this paper, the authors propose an improvement of MPLS-TE called EMPLS-TE, it is based on a modification of operation of Forwarding Equivalence...

    Provided By The Schwa

  • White Papers // Aug 2012

    A New Algorithm for Data Compression Optimization

    People tend to store a lot of files inside theirs storage. When the storage nears it limit, they then try to reduce those files size to minimum by using data compression software. In this paper, the authors propose a new algorithm for data compression, called J-Bit Encoding (JBE). This algorithm...

    Provided By The Schwa

  • White Papers // Aug 2012

    Monte Carlo Based Non-Linear Mixture Model of Earth Observation Satellite Imagery Pixel Data

    Monte Carlo based non-linear mixel (mixed pixel) model of visible to near infrared radiometer of earth observation satellite imagery is proposed. Through comparative studies with actual real earth observation satellite imagery data between conventional linear mixel model and the proposed non-linear mixel model, it is found that the proposed mixel...

    Provided By The Schwa

  • White Papers // Aug 2012

    E-commerce Smartphone Application

    Mobile and e-commerce applications are tools for accessing the Internet and for buying products and services. These applications are constantly evolving due to the high rate of technological advances being made. This paper provides a new perspective on the types of applications that can be used. It describes and analyses...

    Provided By The Schwa

  • White Papers // Jul 2012

    Smart Grids: A New Framework for Efficient Power Management in Datacenter Networks

    The energy demand in the enterprise market segment demands a supply format that accommodates all generation and storage options with active participation by end users in demand response. Basically, with today's High Power Computing (HPC), a highly reliable, scalable, and cost effective energy solution that will satisfy power demands and...

    Provided By The Schwa

  • White Papers // Jul 2012

    FHC-NCTSR: Node Centric Trust Based Secure Hybrid Routing Protocol for Ad Hoc Networks

    To effectively support communication in such a dynamic networking environment as the ad hoc networks, the routing mechanisms should adapt to secure and trusted route discovery and service quality in data transmission. In this context, the paper proposed a routing protocol called Node Centric Trust based Secure Hybrid Routing Protocol...

    Provided By The Schwa

  • White Papers // Jul 2012

    Improving the Rate of Convergence of Blind Adaptive Equalization for Fast Varying Digital Communication Systems

    The recent digital transmission systems impose the application of channel equalizers with bandwidth efficiency, which mitigates the bottleneck of inter-symbol interference for high-speed data transmission-over communication channels. This leads to the exploration of blind equalization techniques that do not require the use of a training sequence. Blind equalization techniques however...

    Provided By The Schwa

  • White Papers // Jul 2012

    Throughput Analysis of IEEE 802.11b Wireless LAN With One Access Point Using Opnet Simulator

    This paper analyzes the throughput performance of IEEE 802.11b Wireless Local Area Network (WLAN) with one access point. The IEEE 802.11b is a wireless protocol standard. In this paper, a wireless network was established which has one access point. OPNET IT Guru Simulator (Academic edition) was used to simulate the...

    Provided By The Schwa

  • White Papers // Jul 2012

    BPM, Agile, and Virtualization Combine to Create Effective Solutions

    The rate of change in business and government is accelerating. A number of techniques for addressing that change have emerged independently to provide for automated solutions in this environment. This paper will examine three of the most popular of these technologies - business process management, the agile software development movement,...

    Provided By The Schwa

  • White Papers // Jul 2012

    Evaluation of Spectral Efficiency, System Capacity and Interference Effects on CDMA Communication System

    Wireless communication technology have been developed based on exploring new mobile communications frequency bands, reasonable use of frequency resources and minimization, portability and multifunction's of mobile stations. The technology of wireless communications with duplex transmission is one of the fastest expanding in the world today. A very effective solution in...

    Provided By The Schwa

  • White Papers // Jul 2012

    Modeling of Traffic Accident Reporting System Through UML Using GIS

    Now-a-days vehicles are increasing day by day in town and cities roads. It is a well-known problem to manage traffics on the roads in towns and cities. A lot of accident occurs on the road due to careless driving and Technical faults in vehicles. The main problem of traffic authorities...

    Provided By The Schwa

  • White Papers // Jul 2012

    Segment, Track, Extract, Recognize and Convert Sign Language Videos to Voice/Text

    This paper summarizes various algorithms used to design a sign language recognition system. Sign language is the language used by deaf people to communicate among themselves and with normal people. The authors designed a real time sign language recognition system that can recognize gestures of sign language from videos under...

    Provided By The Schwa

  • White Papers // Jul 2012

    RFID: The Big Player in the Libraries of the Future

    This paper suggest the idea of developing an automatic Radio Frequency IDentification (RFID)-based system for library search and to observe the current literature to define whether current technology and developed RFID-based systems are supportive for building that. To fully understand its key points, implementations, risks, and benefits, the fundamentals of...

    Provided By The Schwa

  • White Papers // Jul 2012

    Automated Biometric Voice-Based Access Control in Automatic Teller Machine (ATM)

    An automatic teller machine requires a user to pass an identity test before any transaction can be granted. The current method available for access control in ATM is based on smartcard. Efforts were made to conduct an interview with structured questions among the ATM users and the result proofed that...

    Provided By The Schwa

  • White Papers // Jul 2012

    Power Analysis Attacks on ECC: A Major Security Threat

    Wireless Sensor Networks (WSNs) are largely deployed in different sectors and applications, and Elliptic Curve Cryptography (ECC) is proven to be the most feasible PKC for WSN security. ECC is believed to provide same level of security such as RSA with a much shorter key length, and thus they seem...

    Provided By The Schwa

  • White Papers // Jul 2012

    A Survey on Resource Allocation Strategies in Cloud Computing

    Cloud computing has become a new age technology that has got huge potentials in enterprises and markets. Clouds can make it possible to access applications and associated data from anywhere. Companies are able to rent resources from cloud for storage and other computational purposes so that their infrastructure cost can...

    Provided By The Schwa

  • White Papers // Jul 2012

    Cluster-Based Communication Protocol for Load-Balancing in Wireless Sensor Networks

    One of the main problems in wireless sensor networks is information collection. How the sensor nodes can send efficiently the sensed information to the sink since their number is very large and their resources are limited? Clustering provides a logical view, much more effective than the physical view, which extends...

    Provided By The Schwa

  • White Papers // Jul 2012

    An Application of Intuitionistic Fuzzy in Routing Networks

    Routing is an important functional aspect of networks to transport packets from source to destination. A router sets up optimized paths among the different nodes in the network. In this paper the authors proposed a new type of routing algorithm which includes exchange of routing information for small amount of...

    Provided By The Schwa

  • White Papers // Jul 2012

    An SMS-SQL Based On-Board System to Manage and Query a Database

    Technological advances of recent years have facilitated the use of embedded systems. They are part of the everyday life. Thanks to them, electronic devices are increasingly present in the people lives in many forms: mobile phones, music players and managers have become the essential of modern life. Access to information...

    Provided By The Schwa

  • White Papers // Jul 2012

    A Study of FR Video Quality Assessment of Real Time Video Stream

    To assess the real-time transmission video's quality, this paper presents a approach which used FR Video Quality Assessment (VQA) model to satisfy the objective and subjective measurement requirement. If the user wants to get the reference video in the measuring terminal and to make a assessment, there are two problems...

    Provided By The Schwa

  • White Papers // Jul 2012

    A Comparative Study of White Box, Black Box and Grey Box Testing Techniques

    Software testing is the process to uncover requirement, design and coding errors in the program. It is used to identify the correctness, completeness, security and quality of software products against a specification. Software testing is the process used to measure the quality of developed computer software. It exhibits all mistakes,...

    Provided By The Schwa

  • White Papers // Jul 2012

    A Study on OFDM in Mobile Ad Hoc Network

    Orthogonal Frequency Division Multiplexing (OFDM) is the physical layer in emerging wireless local area networks that are also being targeted for ad hoc networking. OFDM can be also exploited in ad hoc networks to improve the energy performance of mobile devices. It is important in wireless networks because it can...

    Provided By The Schwa

  • White Papers // Jun 2012

    Defect Diagnosis in Rotors Systems by Vibrations Data Collectors Using Trending Software

    Vibration measurements have been used to reliably diagnose performance problems in machinery and related mechanical products. A vibration data collector can be used effectively to measure and analyze the machinery vibration content in gearboxes, engines, turbines, fans, compressors, pumps and bearings. Ideally, a machine will have little or no vibration,...

    Provided By The Schwa

  • White Papers // Jun 2012

    2D Satellite Image Registration Using Transform Based and Correlation Based Methods

    Image registration is the process of geometrically aligning one image to another image of the same scene taken from different viewpoints or by different sensors. It is a fundamental image processing technique and is very useful in integrating information from different sensors, finding changes in images taken at different times...

    Provided By The Schwa

  • White Papers // Jun 2012

    Test Case Generation For Concurrent Object-Oriented Systems Using Combinational UML Models

    Software testing is an important phase of software development to ensure the quality and reliability of the software. Due to some limitations of code based testing method, the researcher has been taken a new method to work upon UML model based testing. It is found that different UML model is...

    Provided By The Schwa

  • White Papers // Jun 2012

    A Novel Approach for Troubleshooting Microprocessor Based Systems Using an Object Oriented Expert System

    The paper presents an object oriented fault diagnostic expert system framework which analyses observations from the unit under test when fault occurs and infers the causes of failures. The frame work is characterized by two basic features. The first includes a fault diagnostic strategy which utilizes the fault classification and...

    Provided By The Schwa

  • White Papers // Jun 2012

    Countermeasure for Round Trip Delay Which Occurs in Between Satellite and Ground With Software Network Accelerator

    Countermeasure for round trip delay which occurs in between satellite and ground with network accelerator is investigated together with operating system dependency on effectiveness of accelerator. Also disaster relief data transmission experiments are conducted for mitigation of disaster together with acceleration of disaster related data transmission between local government and...

    Provided By The Schwa

  • White Papers // Jun 2012

    Energy Efficient Clustering and Cluster Head Rotation Scheme for Wireless Sensor Networks

    Wireless sensor nodes are highly energy constrained devices. They have limited battery life due to various constraints of sensor nodes such as size and cost, etc. Moreover, most of the Wireless Sensor Network (WSN) applications render it impossible to charge or replace the battery of sensor nodes. Therefore, optimal use...

    Provided By The Schwa

  • White Papers // Jun 2012

    Creating a Complete Model of an Intrusion Detection System Effective on the LAN

    The Intrusion Detection Systems (IDS) are now an essential component in the structure of network security. The logs of connections and network activity, with a large amount of information, can be used to detect intrusions. Despite the development of new technologies of information and communication following the advent of the...

    Provided By The Schwa

  • White Papers // Jun 2012

    Prioritizing Test Cases Using Business Criticality Test Value

    Software maintenance is an important and costly activity of the software development lifecycle. Regression testing is the process of validating modifications introduced in a system during software maintenance. It is very inefficient to re-execute every test case in regression testing for small changes. This issue of retesting of software systems...

    Provided By The Schwa

  • White Papers // Jun 2012

    Data Normalization and Integration in Robotic Systems Using Web Services Technologies

    The robotics is one of the most active areas. The authors also need to join a large number of disciplines to create robots. With these premises, one problem is the management of information from multiple heterogeneous sources. Each component, hardware or software, produces data with different nature: temporal frequencies, processing...

    Provided By The Schwa

  • White Papers // Mar 2012

    Building Trust In Cloud Using Public Key Infrastructure

    Cloud services have grown very quickly over the past couple of years, giving consumers and companies the chance to put services, resources and infrastructures in the hands of a provider. There are big security concerns when using cloud services. With the emergence of cloud computing, Public Key Infrastructure (PKI) technology...

    Provided By The Schwa

  • White Papers // Mar 2012

    Performance Evaluation of Adaptive Virtual Machine Load Balancing Algorithm

    The conception of Cloud computing has not only reshaped the field of distributed systems but also extend businesses potential. Load balancing is a core and challenging issue in Cloud Computing. How to use Cloud computing resources efficiently and gain the maximum profits with efficient load balancing algorithm is one of...

    Provided By The Schwa

  • White Papers // Feb 2012

    Effective Security Architecture for Virtualized Data Center Networks

    This paper presents a candidate scheme for effective security policy that defines the requirements that will facilitate protection of network resources from internal and external security threats. Also, it ensures data privacy and integrity in a Virtualized Data Center Network (VDCN). An integration of Open Flow Software Defined Networking (OFSDN)...

    Provided By The Schwa

  • White Papers // Feb 2012

    The Relationships of Soft Systems Methodology (SSM), Business Process Modeling and EGovernment

    E-Government has emerged in several countries. Because of many aspects that must be considered, and because of there are exist some soft components in e-Government, then the Soft Systems Methodology (SSM) can be considered to use in e-Government systems development process. On the other hand, business process modeling is essential...

    Provided By The Schwa

  • White Papers // Feb 2012

    Data Warehouse Requirements Analysis Framework: Business-Object Based Approach

    Detailed requirements analysis plays a key role towards the design of successful Data Warehouse (DW) system. The requirements analysis specifications are used as the prime input for the construction of conceptual level multidimensional data model. This paper has proposed a Business Object based requirements analysis framework for DW system which...

    Provided By The Schwa

  • White Papers // Feb 2012

    Self-Regulating Message Throughput in Enterprise Messaging Servers - A Feedback Control Solution

    Enterprise Messaging is a very popular message exchange concept in asynchronous distributed computing environments. The Enterprise Messaging Servers are heavily used in building business critical Enterprise applications such as Internet based Order processing systems, pricing distribution of B2B, geographically dispersed enterprise applications. It is always desirable that Messaging Servers exhibit...

    Provided By The Schwa

  • White Papers // Jan 2012

    Enhancing Business Intelligence in a Smarter Computing Environment Through Cost Analysis

    The paper aims at improving Business Intelligence in a smarter computing environment through cost analysis. Smarter computing is a new approach to designing IT infrastructures to create new opportunities like creating new business models, find new ways of delivering technology-based services, and generate new insights from IT to fuel innovation...

    Provided By The Schwa

  • White Papers // Oct 2012

    A Study on Security Within Public Transit Vehicles

    In public transit vehicles, security is the major concern for the passengers. Surveillance systems provide the security by providing surveillance cameras in the vehicles and a storage that maintains the data. The applications that allow monitoring the data in surveillance systems of public transit vehicles will provide different features to...

    Provided By The Schwa

  • White Papers // Oct 2012

    An Emergency System for Succoring Children Using Mobile GIS

    The large numbers of sick children in different diseases are very dreaded, and when there isn't succor at the proper time and in the type the sick child need it that makes them lose child. This paper suggested an emergency system for succoring sick child locally when he required that,...

    Provided By The Schwa

  • White Papers // Aug 2012

    An Enhanced MPLS-TE for Transferring Multimedia Packets

    Multi-Protocol Label Switching is useful in managing multimedia traffic when some links are too congested; MPLS Traffic Engineering is a growing implementation in today's service provider networks. In this paper, the authors propose an improvement of MPLS-TE called EMPLS-TE, it is based on a modification of operation of Forwarding Equivalence...

    Provided By The Schwa

  • White Papers // Aug 2012

    A New Algorithm for Data Compression Optimization

    People tend to store a lot of files inside theirs storage. When the storage nears it limit, they then try to reduce those files size to minimum by using data compression software. In this paper, the authors propose a new algorithm for data compression, called J-Bit Encoding (JBE). This algorithm...

    Provided By The Schwa

  • White Papers // Aug 2012

    Monte Carlo Based Non-Linear Mixture Model of Earth Observation Satellite Imagery Pixel Data

    Monte Carlo based non-linear mixel (mixed pixel) model of visible to near infrared radiometer of earth observation satellite imagery is proposed. Through comparative studies with actual real earth observation satellite imagery data between conventional linear mixel model and the proposed non-linear mixel model, it is found that the proposed mixel...

    Provided By The Schwa

  • White Papers // Aug 2012

    E-commerce Smartphone Application

    Mobile and e-commerce applications are tools for accessing the Internet and for buying products and services. These applications are constantly evolving due to the high rate of technological advances being made. This paper provides a new perspective on the types of applications that can be used. It describes and analyses...

    Provided By The Schwa

  • White Papers // Aug 2012

    Integration of Data Mining Within a Strategic Knowledge Management Framework

    In today's globally interconnected economy, knowledge is recognised as a valuable intangible asset and source of competitive advantage for firms operating in both established and emerging industries. Within these contexts Knowledge Management (KM) manifests as set of organising principles and heuristics which shape management routines, structures, technologies and cultures within...

    Provided By The Schwa

  • White Papers // Aug 2012

    Software Architecture- Evolution and Evaluation

    The growth of various software architectural frameworks and models provides a standard governing structure for different types of organizations. Selection of a suitable framework for a particular environment needs much more detailed information in various aspects and a reference guide of features should be provided. This paper brings out the...

    Provided By The Schwa

  • White Papers // Sep 2012

    A Hybrid Evolutionary Functional Link Artificial Neural Network for Data Mining and Classification

    This paper presents a specific structure of neural network as the Functional Link Artificial Neural Network (FLANN). This technique has been employed for classification tasks of data mining. In fact, there are a few studies that used this tool for solving classification problems. In this paper, the authors propose a...

    Provided By The Schwa

  • White Papers // Jul 2012

    Automated Biometric Voice-Based Access Control in Automatic Teller Machine (ATM)

    An automatic teller machine requires a user to pass an identity test before any transaction can be granted. The current method available for access control in ATM is based on smartcard. Efforts were made to conduct an interview with structured questions among the ATM users and the result proofed that...

    Provided By The Schwa

  • White Papers // Jul 2012

    Power Analysis Attacks on ECC: A Major Security Threat

    Wireless Sensor Networks (WSNs) are largely deployed in different sectors and applications, and Elliptic Curve Cryptography (ECC) is proven to be the most feasible PKC for WSN security. ECC is believed to provide same level of security such as RSA with a much shorter key length, and thus they seem...

    Provided By The Schwa

  • White Papers // Jul 2012

    A Survey on Resource Allocation Strategies in Cloud Computing

    Cloud computing has become a new age technology that has got huge potentials in enterprises and markets. Clouds can make it possible to access applications and associated data from anywhere. Companies are able to rent resources from cloud for storage and other computational purposes so that their infrastructure cost can...

    Provided By The Schwa

  • White Papers // Jul 2012

    Cluster-Based Communication Protocol for Load-Balancing in Wireless Sensor Networks

    One of the main problems in wireless sensor networks is information collection. How the sensor nodes can send efficiently the sensed information to the sink since their number is very large and their resources are limited? Clustering provides a logical view, much more effective than the physical view, which extends...

    Provided By The Schwa

  • White Papers // Jul 2012

    An Application of Intuitionistic Fuzzy in Routing Networks

    Routing is an important functional aspect of networks to transport packets from source to destination. A router sets up optimized paths among the different nodes in the network. In this paper the authors proposed a new type of routing algorithm which includes exchange of routing information for small amount of...

    Provided By The Schwa

  • White Papers // Jul 2012

    An SMS-SQL Based On-Board System to Manage and Query a Database

    Technological advances of recent years have facilitated the use of embedded systems. They are part of the everyday life. Thanks to them, electronic devices are increasingly present in the people lives in many forms: mobile phones, music players and managers have become the essential of modern life. Access to information...

    Provided By The Schwa

  • White Papers // Oct 2012

    Preventing Buffer Overflow Attacks With Reliable and Low Cost System

    Detection of data flow anomalies there are static or dynamic methods to detect data flow anomalies in the software reliability and testing field. Static methods are not suitable in the case due to its slow speed; dynamic methods are not suitable either due to the need for real execution of...

    Provided By The Schwa

  • White Papers // Oct 2012

    Personal Name Aliases on Automatic Discovery From the Web

    In this paper, the authors proposed a lexical-pattern-based approach to extract aliases of a given name. They use a set of names and their aliases as training data to extract lexical patterns that describe numerous ways in which information related to aliases of a name is presented on the web....

    Provided By The Schwa

  • White Papers // Oct 2012

    3D Face Compression and Recognition Using Spherical Wavelet Parametrization

    In this paper an innovative fully automated 3D face compression and recognition system is presented. Several novelties are introduced to make the system performance robust and efficient. These novelties include: first, an automatic pose correction and normalization process by using curvature analysis for nose tip detection and Iterative Closest Point...

    Provided By The Schwa

  • White Papers // Oct 2012

    The Risk Management Strategy of Applying Cloud Computing

    It is inevitable that Cloud Computing will trigger off some loss exposures. Unfortunately, not much of scientific and objective researches had been focused on the identification and evaluation of loss exposures stemming from applications of Cloud Computing. In order to fill this research gap, this study attempts to identify and...

    Provided By The Schwa

  • White Papers // Oct 2012

    A Survey on Models and Query Languages for Temporally Annotated RDF

    In this paper, the authors provide a survey on the models and query languages for temporally annotated RDF. In most of the works, a temporally annotated RDF ontology is essentially a set of RDF triples associated with temporal constraints, where, in the simplest case, a temporal constraint is a validity...

    Provided By The Schwa

  • White Papers // Oct 2012

    An RGB Image Encryption Supported by Wavelet-Based Lossless Compression

    In this paper, the authors have proposed a method for an RGB image encryption supported by lifting scheme based lossless compression. Firstly, they have compressed the input color image using a 2-D integer wavelet transform. Then they have applied lossless predictive coding to achieve additional compression. The compressed image is...

    Provided By The Schwa

  • White Papers // Oct 2012

    Application of Relevance Vector Machines in Real Time Intrusion Detection

    In the recent years, there has been a growing interest in the development of change detection techniques for the analysis of Intrusion Detection. This interest stems from the wide range of applications in which change detection methods can be used. Detecting the changes by observing data collected at different times...

    Provided By The Schwa

  • White Papers // Oct 2012

    Fast DC Mode Prediction Scheme for Intra 4x4 Block in H.264/AVC Video Coding Standard

    In this paper, the researchers proposed a new scheme for DC mode prediction in intra frame for 4X4 block. In this scheme, the upper and left neighboring pixels would be used to predict each of the pixels in the 4X4 block with different weight. The prediction equations for each position...

    Provided By The Schwa

  • White Papers // Oct 2012

    Knowledge Sharing Protocol for Smart Spaces

    In this paper, the authors present a novel Knowledge Sharing Protocol (KSP) for semantic technology empowered ubiquitous computing systems. In particular the protocol is designed for M3 which is a blackboard based semantic interoperability solution for smart spaces. The main difference between the KSP and existing work is that KSP...

    Provided By The Schwa

  • White Papers // Feb 2012

    Effective Security Architecture for Virtualized Data Center Networks

    This paper presents a candidate scheme for effective security policy that defines the requirements that will facilitate protection of network resources from internal and external security threats. Also, it ensures data privacy and integrity in a Virtualized Data Center Network (VDCN). An integration of Open Flow Software Defined Networking (OFSDN)...

    Provided By The Schwa

  • White Papers // Feb 2012

    The Relationships of Soft Systems Methodology (SSM), Business Process Modeling and EGovernment

    E-Government has emerged in several countries. Because of many aspects that must be considered, and because of there are exist some soft components in e-Government, then the Soft Systems Methodology (SSM) can be considered to use in e-Government systems development process. On the other hand, business process modeling is essential...

    Provided By The Schwa

  • White Papers // Feb 2012

    Data Warehouse Requirements Analysis Framework: Business-Object Based Approach

    Detailed requirements analysis plays a key role towards the design of successful Data Warehouse (DW) system. The requirements analysis specifications are used as the prime input for the construction of conceptual level multidimensional data model. This paper has proposed a Business Object based requirements analysis framework for DW system which...

    Provided By The Schwa

  • White Papers // Jan 2012

    Enhancing Business Intelligence in a Smarter Computing Environment Through Cost Analysis

    The paper aims at improving Business Intelligence in a smarter computing environment through cost analysis. Smarter computing is a new approach to designing IT infrastructures to create new opportunities like creating new business models, find new ways of delivering technology-based services, and generate new insights from IT to fuel innovation...

    Provided By The Schwa

  • White Papers // Jun 2012

    Prioritizing Test Cases Using Business Criticality Test Value

    Software maintenance is an important and costly activity of the software development lifecycle. Regression testing is the process of validating modifications introduced in a system during software maintenance. It is very inefficient to re-execute every test case in regression testing for small changes. This issue of retesting of software systems...

    Provided By The Schwa

  • White Papers // Jan 2013

    Classifying Personalization Constraints in Digital Business Environments Through Case Study Research

    To aid professionals in the early assessment of possible risks related to personalization activities in marketing as well as to give academics a starting point to discover not only the opportunities but also the risks of personalization, a 'Classification Scheme of Personalization Constraints' is established after the analysis of 24...

    Provided By The Schwa

  • White Papers // Dec 2010

    The Impact of Social Networking Websites to Facilitate the Effectiveness of Viral Marketing

    The Internet and the World Wide Web have become two key components in today's technology based organizations and businesses. As the Internet is becoming more and more popular, it is starting to make a big impact on people's day-today life. As a result of this revolutionary transformation towards the modern...

    Provided By The Schwa

  • White Papers // Feb 2012

    Self-Regulating Message Throughput in Enterprise Messaging Servers - A Feedback Control Solution

    Enterprise Messaging is a very popular message exchange concept in asynchronous distributed computing environments. The Enterprise Messaging Servers are heavily used in building business critical Enterprise applications such as Internet based Order processing systems, pricing distribution of B2B, geographically dispersed enterprise applications. It is always desirable that Messaging Servers exhibit...

    Provided By The Schwa

  • White Papers // Jul 2011

    An Authorization Mechanism for Access Control of Resources in the Web Services Paradigm

    With the increase in web based enterprise services, there is an increasing trend among business enterprises to migrate to web services platform. Web services paradigm poses a number of new security challenges, which can only be realized by developing effective access control models. The fact that the enterprises allow access...

    Provided By The Schwa

  • White Papers // Jun 2011

    Deploying an Application on the Cloud

    Cloud Computing, the impending need of computing as an optimal utility, has the potential to take a gigantic leap in the IT industry, is structured and put to optimal use with regard to the contemporary trends. Developers with innovative ideas need not be apprehensive about non utility of costly resources...

    Provided By The Schwa

  • White Papers // Nov 2011

    The Impact of Competitive Intelligence on Products and Services Innovation in Organizations

    This paper discusses the findings of the study that was aimed at establishing the effect of Competitive Intelligence, hereafter referred to as CI, on product and service innovations. A literature study revealed that CI and innovation are widely studied subjects, but the impact of CI on innovation was not well...

    Provided By The Schwa

  • White Papers // Feb 2013

    Coordinated Resource Management Models in Hierarchical Systems

    In response to the trend of efficient global economy, constructing a global logistic model has garnered much attention from the industry. Location selection is an important issue for those international companies that are interested in building a global logistics management system. Infrastructure in Developing Countries are based on the use...

    Provided By The Schwa

  • White Papers // Jun 2013

    Enterprise Architecture Model that Enables to Search for Patterns of Statistical Information

    Enterprise architecture is the stem from which developing of any departmental information system should grow and around which it should revolve. In the paper, a fragment of an enterprise architecture model is built using ArchiMate language. This fragment enables to search for information in enterprises which do not work in...

    Provided By The Schwa

  • White Papers // Jun 2013

    The Quest Towards a Winning Enterprise 2.0 Collaboration Technology Adoption Strategy

    Although Enterprise 2.0 collaboration technologies present enterprises with a significant amount of business benefits; enterprises are still facing challenges in promoting and sustaining end-user adoption. The purpose of this paper is to provide a systematic review on Enterprise 2.0 collaboration technology adoption models, challenges, as well as to provide emerging...

    Provided By The Schwa

  • White Papers // Aug 2011

    Control Systems Application in Java Based Enterprise and Cloud Environments - A Survey

    The classical feedback control systems have been a successful theory in many engineering applications like electrical power, process, and manufacturing industries. For more than a decade there is active research in exploring feedback control systems applications in computing and some of the results are applied to the commercial software products....

    Provided By The Schwa

  • White Papers // Jan 2013

    A Proposed Integrated Approach for BI and GIS in Health Sector to Support Decision Makers (BIGIS-DSS)

    This paper explores the possibilities of adopting Business Intelligence (BI), and Geographic Information System (GIS) to build a spatial intelligence and predictive analytical approach. The proposed approach will help in solving spatial problem which faces decision makers at health sector. The proposed spatial analytical approach will cover three main health...

    Provided By The Schwa