The Schwa

Displaying 81-87 of 87 results

  • White Papers // Nov 2011

    The Impact of Competitive Intelligence on Products and Services Innovation in Organizations

    This paper discusses the findings of the study that was aimed at establishing the effect of Competitive Intelligence, hereafter referred to as CI, on product and service innovations. A literature study revealed that CI and innovation are widely studied subjects, but the impact of CI on innovation was not well...

    Provided By The Schwa

  • White Papers // Oct 2011

    Comparison of Workflow Scheduling Algorithms in Cloud Computing

    Cloud computing has gained popularity in recent times. Cloud computing is internet based computing, whereby shared resources, software and information are provided to computers and other devices on demand, like a public utility. Cloud computing is technology that uses the internet and central remote servers to maintain data and applications....

    Provided By The Schwa

  • White Papers // Aug 2011

    Control Systems Application in Java Based Enterprise and Cloud Environments - A Survey

    The classical feedback control systems have been a successful theory in many engineering applications like electrical power, process, and manufacturing industries. For more than a decade there is active research in exploring feedback control systems applications in computing and some of the results are applied to the commercial software products....

    Provided By The Schwa

  • White Papers // Jul 2011

    An Authorization Mechanism for Access Control of Resources in the Web Services Paradigm

    With the increase in web based enterprise services, there is an increasing trend among business enterprises to migrate to web services platform. Web services paradigm poses a number of new security challenges, which can only be realized by developing effective access control models. The fact that the enterprises allow access...

    Provided By The Schwa

  • White Papers // Jun 2011

    Deploying an Application on the Cloud

    Cloud Computing, the impending need of computing as an optimal utility, has the potential to take a gigantic leap in the IT industry, is structured and put to optimal use with regard to the contemporary trends. Developers with innovative ideas need not be apprehensive about non utility of costly resources...

    Provided By The Schwa

  • White Papers // Feb 2011

    Knowledge-Based System's Modeling for Software Process Model Selection

    This paper depicts the knowledge-based system named as ESPMS (Expert System for Process Model Selection) through various models. A questionnaire was developed to identify important parameters, which were evaluated through domain experts in about all the universities of Pakistan. No exact system was found, which could guide Software Engineers for...

    Provided By The Schwa

  • White Papers // Dec 2010

    The Impact of Social Networking Websites to Facilitate the Effectiveness of Viral Marketing

    The Internet and the World Wide Web have become two key components in today's technology based organizations and businesses. As the Internet is becoming more and more popular, it is starting to make a big impact on people's day-today life. As a result of this revolutionary transformation towards the modern...

    Provided By The Schwa

  • White Papers // Oct 2012

    Knowledge Sharing Protocol for Smart Spaces

    In this paper, the authors present a novel Knowledge Sharing Protocol (KSP) for semantic technology empowered ubiquitous computing systems. In particular the protocol is designed for M3 which is a blackboard based semantic interoperability solution for smart spaces. The main difference between the KSP and existing work is that KSP...

    Provided By The Schwa

  • White Papers // Jul 2012

    Automated Biometric Voice-Based Access Control in Automatic Teller Machine (ATM)

    An automatic teller machine requires a user to pass an identity test before any transaction can be granted. The current method available for access control in ATM is based on smartcard. Efforts were made to conduct an interview with structured questions among the ATM users and the result proofed that...

    Provided By The Schwa

  • White Papers // Jul 2012

    Power Analysis Attacks on ECC: A Major Security Threat

    Wireless Sensor Networks (WSNs) are largely deployed in different sectors and applications, and Elliptic Curve Cryptography (ECC) is proven to be the most feasible PKC for WSN security. ECC is believed to provide same level of security such as RSA with a much shorter key length, and thus they seem...

    Provided By The Schwa

  • White Papers // Jul 2012

    A Survey on Resource Allocation Strategies in Cloud Computing

    Cloud computing has become a new age technology that has got huge potentials in enterprises and markets. Clouds can make it possible to access applications and associated data from anywhere. Companies are able to rent resources from cloud for storage and other computational purposes so that their infrastructure cost can...

    Provided By The Schwa

  • White Papers // Jul 2012

    Cluster-Based Communication Protocol for Load-Balancing in Wireless Sensor Networks

    One of the main problems in wireless sensor networks is information collection. How the sensor nodes can send efficiently the sensed information to the sink since their number is very large and their resources are limited? Clustering provides a logical view, much more effective than the physical view, which extends...

    Provided By The Schwa

  • White Papers // Jul 2012

    An Application of Intuitionistic Fuzzy in Routing Networks

    Routing is an important functional aspect of networks to transport packets from source to destination. A router sets up optimized paths among the different nodes in the network. In this paper the authors proposed a new type of routing algorithm which includes exchange of routing information for small amount of...

    Provided By The Schwa

  • White Papers // Jul 2012

    An SMS-SQL Based On-Board System to Manage and Query a Database

    Technological advances of recent years have facilitated the use of embedded systems. They are part of the everyday life. Thanks to them, electronic devices are increasingly present in the people lives in many forms: mobile phones, music players and managers have become the essential of modern life. Access to information...

    Provided By The Schwa