University of Muenster

Displaying 1-15 of 15 results

  • White Papers // Feb 2014

    Cloud Computing Environment - Security Concern

    Cloud Computing enables universal, on-demand network access to a shared pool of computing resources (e.g., networks, servers, storage, applications, and services) that can be provisioned and released with minimal management effort or service provider interaction. Cloud computing is a way to increase the capacity or add capabilities dynamically without investing...

    Provided By University of Muenster

  • White Papers // Oct 2013

    An Effective Rule Generation for Intrusion Detection System Using Genetics Algorithm

    In today's scenario the security is important in vast growing computer networks, so intrusion detection system is essential task in daily life practices. There are various approaches being utilized for intrusion detection. In this paper, the authors present an intrusion detection system using genetic algorithm for efficiently and effectively to...

    Provided By University of Muenster

  • White Papers // Mar 2013

    Personalized Ontological Framework for Web Information Retrieval

    In proposed system personalized ontology for web information retrieval is introduced: specificity and exhaustively. Specificity describes a subject's focus on a given keyword. Exhaustively restricts a subject's semantic space dealing with the topic. Personalized ontology framework is proposed for knowledge representation and reasoning over behavior of users. This framework learns...

    Provided By University of Muenster

  • White Papers // Feb 2013

    Protection concern in Mobile Cloud Computing- A Survey

    Always it is preferable to use on-demand infrastructure, provided by cloud computing instead of traditional. So the concept of Mobile Cloud Computing (MCC) comes into focus. Mobile cloud computing is a technique or model in which mobile applications are built, powered and hosted using cloud computing technology. In Mobile Cloud...

    Provided By University of Muenster

  • White Papers // Dec 2012

    Barriers of ERP While Implementing ERP: A Literature Review

    An Enterprise Resource Planning (ERP) is an enterprise-wide application software package that integrates all necessary business functions into a single system with a common database. Enterprise Resource Planning (ERP) systems integrate and streamline the business processes of an organization across departmental and geographical borders. In its basic definition, ERP is...

    Provided By University of Muenster

  • White Papers // Jul 2012

    Efficient Scheme for Dynamic Channel Allocation Using Intelligent Agent in Mobile Communication

    The demand for mobile communication has been growing day by day. Resource flexibility is one of the most important issues in the coming generation of mobile communication. Different techniques are required to increase the efficiency & flexibility of the network to deal with new services and to adopt the new...

    Provided By University of Muenster

  • White Papers // Jul 2012

    Enhanced Chinese Remainder Theorem Based Broadcast Authentication in Wireless Networks

    Wireless networks make extensive use of broadcast messages. Many routing activities and network management activities needed in wireless networks must rely on broadcast authentication mechanisms to ensure that data is being originated from a valid source. Without an efficient broadcast authentication algorithm, the transmitting node would have to resort to...

    Provided By University of Muenster

  • White Papers // Jul 2012

    Comparing Transform Domain Techniques and Vector Quantization Techniques for Face Detection and Recognition in Digital Images

    Many face recognition algorithms have been proposed that help faces to be identified on systems. The aim of the paper is to compare the performance of transform domain techniques and Vector Quantization techniques. The system considers the full and partial feature vector sizes of images. In addition to this, the...

    Provided By University of Muenster

  • White Papers // Jun 2012

    Face Detection and Recognition in Digital Images Using Transform Domain Techniques

    Face Recognition is a computer application that is drawing much attention in the computer society in the areas like network security, privacy, video conferencing and content indexing and retrieval. These systems should be able to correctly detect and recognize different faces from the images. Many face recognition algorithms have been...

    Provided By University of Muenster

  • White Papers // Jun 2012

    Location Based Personalization and Prediction of Data Services Using a Learning Algorithm

    This paper outlines a model that enriches the user experience of using Mobile Value Added Services (MVAS). Specifically the location based data services segment of MVAS is taken into consideration for experimentation purposes. The model describes a method to personalize user information related to various data services offered to the...

    Provided By University of Muenster

  • White Papers // Nov 2011

    Preserving Privacy in Data Mining using Data Distortion Approach

    Data mining, the extraction of hidden predictive information from large databases, is nothing but discovering hidden value in the data warehouse. Because of the increasing ability to trace and collect large amount of personal information, privacy preserving in data mining applications has become an important concern. Data distortion is one...

    Provided By University of Muenster

  • White Papers // Apr 2011

    Visualizing Uncertainty in Environmental Work-Flows and Sensor Streams

    Environmental data and models are uncertain by nature. The lack of knowledge about, for example, the magnitude of potential measurement errors may lead to unforeseen consequences. This makes it difficult to assess the data's or model's usefulness for critical applications. The authors present an approach for the visualization of uncertainty...

    Provided By University of Muenster

  • White Papers // Nov 2010

    Preprocessing Selection of Enterprise Resource Planning Application in Small Manufacturing Industry and Its Impact on Business Process Agility

    In today's globalized economy, enterprises are facing ever increasing competitive pressures. A commonly adopted strategy for gaining new adequate technologies and remaining competitive is to acquire needed technology from external sources. In today's business environment, competition between companies and complexity of market network is growing at a fast pace, making...

    Provided By University of Muenster

  • White Papers // Apr 2010

    The Structure And Evolution Of Business-To-Business Marketing: A Citation And Co-Citation Analysis

    The field of Business-To-Business (B2B) Marketing has grown considerably in the last four decades. However the knowledge about its structure and evolution is limited to a small number of studies; especially comprehensive literature reviews that analyze the body of B2B-literature (Webster 1978; Reid & Plank 2000; LaPlaca & Katrichis 2009)....

    Provided By University of Muenster

  • White Papers // Feb 2009

    How To Overcome The Great Financial Crisis - An Asset Exchange Approach

    The reasons for the current financial crisis are analysed and a proposal for financing a bad bank is made. In particular, it is proposed to give the banks in trouble government zero bonds rather than cash in exchange for their toxic assets. The term of the zero bonds is determined...

    Provided By University of Muenster

  • White Papers // Jul 2012

    Efficient Scheme for Dynamic Channel Allocation Using Intelligent Agent in Mobile Communication

    The demand for mobile communication has been growing day by day. Resource flexibility is one of the most important issues in the coming generation of mobile communication. Different techniques are required to increase the efficiency & flexibility of the network to deal with new services and to adopt the new...

    Provided By University of Muenster

  • White Papers // Jul 2012

    Enhanced Chinese Remainder Theorem Based Broadcast Authentication in Wireless Networks

    Wireless networks make extensive use of broadcast messages. Many routing activities and network management activities needed in wireless networks must rely on broadcast authentication mechanisms to ensure that data is being originated from a valid source. Without an efficient broadcast authentication algorithm, the transmitting node would have to resort to...

    Provided By University of Muenster

  • White Papers // Jul 2012

    Comparing Transform Domain Techniques and Vector Quantization Techniques for Face Detection and Recognition in Digital Images

    Many face recognition algorithms have been proposed that help faces to be identified on systems. The aim of the paper is to compare the performance of transform domain techniques and Vector Quantization techniques. The system considers the full and partial feature vector sizes of images. In addition to this, the...

    Provided By University of Muenster

  • White Papers // Jun 2012

    Face Detection and Recognition in Digital Images Using Transform Domain Techniques

    Face Recognition is a computer application that is drawing much attention in the computer society in the areas like network security, privacy, video conferencing and content indexing and retrieval. These systems should be able to correctly detect and recognize different faces from the images. Many face recognition algorithms have been...

    Provided By University of Muenster

  • White Papers // Jun 2012

    Location Based Personalization and Prediction of Data Services Using a Learning Algorithm

    This paper outlines a model that enriches the user experience of using Mobile Value Added Services (MVAS). Specifically the location based data services segment of MVAS is taken into consideration for experimentation purposes. The model describes a method to personalize user information related to various data services offered to the...

    Provided By University of Muenster

  • White Papers // Mar 2013

    Personalized Ontological Framework for Web Information Retrieval

    In proposed system personalized ontology for web information retrieval is introduced: specificity and exhaustively. Specificity describes a subject's focus on a given keyword. Exhaustively restricts a subject's semantic space dealing with the topic. Personalized ontology framework is proposed for knowledge representation and reasoning over behavior of users. This framework learns...

    Provided By University of Muenster

  • White Papers // Feb 2013

    Protection concern in Mobile Cloud Computing- A Survey

    Always it is preferable to use on-demand infrastructure, provided by cloud computing instead of traditional. So the concept of Mobile Cloud Computing (MCC) comes into focus. Mobile cloud computing is a technique or model in which mobile applications are built, powered and hosted using cloud computing technology. In Mobile Cloud...

    Provided By University of Muenster

  • White Papers // Dec 2012

    Barriers of ERP While Implementing ERP: A Literature Review

    An Enterprise Resource Planning (ERP) is an enterprise-wide application software package that integrates all necessary business functions into a single system with a common database. Enterprise Resource Planning (ERP) systems integrate and streamline the business processes of an organization across departmental and geographical borders. In its basic definition, ERP is...

    Provided By University of Muenster

  • White Papers // Nov 2010

    Preprocessing Selection of Enterprise Resource Planning Application in Small Manufacturing Industry and Its Impact on Business Process Agility

    In today's globalized economy, enterprises are facing ever increasing competitive pressures. A commonly adopted strategy for gaining new adequate technologies and remaining competitive is to acquire needed technology from external sources. In today's business environment, competition between companies and complexity of market network is growing at a fast pace, making...

    Provided By University of Muenster

  • White Papers // Oct 2013

    An Effective Rule Generation for Intrusion Detection System Using Genetics Algorithm

    In today's scenario the security is important in vast growing computer networks, so intrusion detection system is essential task in daily life practices. There are various approaches being utilized for intrusion detection. In this paper, the authors present an intrusion detection system using genetic algorithm for efficiently and effectively to...

    Provided By University of Muenster

  • White Papers // Feb 2014

    Cloud Computing Environment - Security Concern

    Cloud Computing enables universal, on-demand network access to a shared pool of computing resources (e.g., networks, servers, storage, applications, and services) that can be provisioned and released with minimal management effort or service provider interaction. Cloud computing is a way to increase the capacity or add capabilities dynamically without investing...

    Provided By University of Muenster

  • White Papers // Nov 2011

    Preserving Privacy in Data Mining using Data Distortion Approach

    Data mining, the extraction of hidden predictive information from large databases, is nothing but discovering hidden value in the data warehouse. Because of the increasing ability to trace and collect large amount of personal information, privacy preserving in data mining applications has become an important concern. Data distortion is one...

    Provided By University of Muenster

  • White Papers // Feb 2009

    How To Overcome The Great Financial Crisis - An Asset Exchange Approach

    The reasons for the current financial crisis are analysed and a proposal for financing a bad bank is made. In particular, it is proposed to give the banks in trouble government zero bonds rather than cash in exchange for their toxic assets. The term of the zero bonds is determined...

    Provided By University of Muenster

  • White Papers // Apr 2011

    Visualizing Uncertainty in Environmental Work-Flows and Sensor Streams

    Environmental data and models are uncertain by nature. The lack of knowledge about, for example, the magnitude of potential measurement errors may lead to unforeseen consequences. This makes it difficult to assess the data's or model's usefulness for critical applications. The authors present an approach for the visualization of uncertainty...

    Provided By University of Muenster

  • White Papers // Apr 2010

    The Structure And Evolution Of Business-To-Business Marketing: A Citation And Co-Citation Analysis

    The field of Business-To-Business (B2B) Marketing has grown considerably in the last four decades. However the knowledge about its structure and evolution is limited to a small number of studies; especially comprehensive literature reviews that analyze the body of B2B-literature (Webster 1978; Reid & Plank 2000; LaPlaca & Katrichis 2009)....

    Provided By University of Muenster