WSDOT

Displaying 1-40 of 329 results

  • White Papers // Jun 2013

    A Technique of Formal Security Modeling in Autonomic Cloud Computing Environment

    As clouds are complex, large-scale, and heterogeneous distributed systems management of their resources is a challenging task. It requires co-optimization at multiple layers (infrastructure, platform, and application) exhibiting autonomic properties. Autonomic systems exhibit the ability of self-monitoring, self-repairing, and self-optimizing by constantly sensing them and tuning their performance. The notions...

    Provided By WSDOT

  • White Papers // Jun 2013

    Client-Independence as the Critical Step Towards a New Level of Cloud Computing

    It is nowadays impossible to examine the modern world without picturing it as an information society. Among the most promising directions in current applicative computer science is the development of cloud computing, as a novel way of computer usage. As a natural progress of time-share systems from the 1960s to...

    Provided By WSDOT

  • White Papers // Mar 2013

    Utility Based Load Balancing with Grid Computing Approach

    Grid Computing is a high performance computing environment that allows sharing of geographically distributed resources across multiple administrative domains and used to solve large scale computational demands. In the grid environment, users can access the resources transparently without knowing where they are physically located. The commonly used load balancing policies...

    Provided By WSDOT

  • White Papers // Mar 2013

    Going Green Business Excellence

    There is no doubt about sustainable environmental future and environmental excellence. Environmental Excellence means more than corporate responsibility; it is now a priority issue that global business needs to integrate into its green business policy and strategy. Environmental Excellence strategies now feature in boardroom discussions across the world. Top management...

    Provided By WSDOT

  • White Papers // Feb 2013

    Performance Comparison of Spreading Codes in Linear Multi-User Detectors for DS-CDMA System

    Direct Sequence Code Division Multiple Access (DS-CDMA) system is well known wireless technology. This system suffers from MAI (Multiple Access Interference) caused by Direct Sequence users. Multi-User Detection schemes were introduced to detect the users' data in presence of MAI. Linear Multi-user Detectors and conventional Matched Filter (MF) are simulated...

    Provided By WSDOT

  • White Papers // Jan 2013

    Information Flow Modeling to Provide Sustainable Cooperation Between Educational Institutions and Entrepreneurs

    Just as all educational institutions try to complement and customize their study programs and various training modules to meet current and future demand, managers in various fields constantly have to care for their employees, so it is important to realize that one must learn all the time, continuing to acquire...

    Provided By WSDOT

  • White Papers // Jan 2013

    A Partnering Approach to Extending the Business Base Through Cooperation With Competitors (coopetition) - Is It an Option for SMEs?

    Partnering both opens up and blurs the boundaries between organizations, and even expands them. Firms ought to shape their cooperation with other entities in accordance with their changing needs. A particular group of such entities is competitors. The question therefore arises whether partnering in relations with competitors (co-opetition) is suitable...

    Provided By WSDOT

  • White Papers // Jan 2013

    A Systems Process Management Approach to the Development of Information Systems in Small to Medium Sized Enterprises (SMEs)

    This paper presents a review of business process modelling for information systems development. As a result of the review carried out an approach to modelling processes in Small to Medium Sized Enterprises (SMEs) is proposed. The proposed methodology is simple enough to be attractive for SMEs but also complex enough...

    Provided By WSDOT

  • White Papers // Jan 2013

    Corporate Risk Management in SMEs

    Risks as part of human (corporate) activities have their roots in the uncertainty of future events and result in possible negative differences in the attainment of company goals. With the increasing complexity of the business environment (e.g. globalization) and dominance of uncertainty (e.g. crises), the knowledge of their own success-critical...

    Provided By WSDOT

  • White Papers // Jan 2013

    Algorithmic Vertical Handoff Decision and Merit Network Selection Across Heterogeneous Wireless Networks

    Next generation wireless networks must be able to coordinate services between heterogeneous networks through multi-mode mobile terminals. Such heterogeneity poses a challenge to seamless handover since each access network has different operations. In this paper, the policies of multiple metrics for handoff to permit connectivity across UMTS and WLAN/WiMAX are...

    Provided By WSDOT

  • White Papers // Dec 2012

    Comparison of Multiple IaaS Cloud Platform Solutions

    Currently, several solution cloud computing IaaS (Infrastructure as a Service) exists. Administrators, developers and users need to choose the best environment for them. The availability of free open source Cloud platforms is essential to further drive the proliferation of private and hybrid Cloud computing environments. In this paper, the authors...

    Provided By WSDOT

  • White Papers // Nov 2012

    The Design of Database System for Portfolio of Computer and Information Technology Department

    This paper aims to the design of database system for portfolio of computer and information technology department and to test the performance systems for portfolio of computer and information technology department. The design found that database system can be used to development. The development process followed the SDLC theory. The...

    Provided By WSDOT

  • White Papers // Nov 2012

    Performance Analysis and Comparison of Spreading Codes in Linear Multi-User Detectors for DS-CDMA System

    The tremendous increase in demand for wireless services has caused a search for techniques to improve the capacity of current digital communication systems. To bring this vision for future, the current state of wireless technology is necessary for major improvements. Direct Sequence Code Division Multiple Access (DS-CDMA) system is very...

    Provided By WSDOT

  • White Papers // Nov 2012

    Performance and Capacity Analysis of MIMO System at 5 GHz and 60GHz in Indoor Environment

    The MilliMeter Wave (MMW) band much useful for wireless indoor communications as it offers a large amount of license free spectrum. Blockage by walls and furniture limits the range indoors, the link range for indoors being 10m and outdoors 100m in the case of spatial reuse. The idea of dual-band...

    Provided By WSDOT

  • White Papers // Nov 2012

    Capacity of MIMO System in the Presence of Directional Interferences

    Capacity of Multiple Input Multiple Output (MIMO) system degrades significantly in the presence of interferences, especially in the presence of strong directional interferences in military communication scenario. In this paper, the capacity of a MIMO system with directional interferences is investigated. The focus is on the case where the Channel...

    Provided By WSDOT

  • White Papers // Oct 2012

    The Role of Service Level Agreements in NGN Security Management Systems

    Security is an important part of every software development process. Main aspects affecting the degree of software dependability include the expertise for secure product development, quality of development tools, the level of testing procedures completed before releasing the product and the matured practices followed throughout the development cycle. Communication requirements...

    Provided By WSDOT

  • White Papers // Oct 2012

    Performance Testing of Cloud Storage While Using Spatial Data

    Cloud computing changes the way users access the ICT systems, which means resources (computers, infrastructures, data storage and applications) and the way of managing and delivering computing technologies, services and solutions. This paper deals with the meaning of the cloud computing technologies in nowadays GIS and their role in the...

    Provided By WSDOT

  • White Papers // Oct 2012

    Governing Information System Security: Review of Approaches to Information System Security Assurance and Auditing

    Over the past decade information system security issues has been treated mainly from technology perspective. That model of information security management was reactive, mainly technologically driven and rarely aligned to business needs. This paper goes a step further and considers it from the governance view, mainly aligning it with the...

    Provided By WSDOT

  • White Papers // Oct 2012

    The Effect of Interference on Bluetooth Data Exchange Over WLAN

    The paper focuses on studying Bluetooth Wireless Personal Area Network (WPAN) and Wireless Local Area Network (WLAN) technologies to make Bluetooth data exchange over WLAN applicable. In particular, it addresses the problem of using WLAN coverage area to exchange data between two Bluetooth devices connected to different piconets. To achieve...

    Provided By WSDOT

  • White Papers // Oct 2012

    The RAM-Based Web Proxy Servers

    The conventional web proxy servers use hard disk as their primary cache storage. However, as disks use mechanical operations, they are typically the slowest component of the servers. Though, in the last decade, various solutions have been proposed to improve the proxy performance, disks are still the performance bottleneck. Consider...

    Provided By WSDOT

  • White Papers // Oct 2012

    An SLM Based PAPR Reduction Method Using New Volterra Predistorter Model in the OFDM System

    Orthogonal Frequency Division Multiplexing (OFDM) is a strong candidate for future wireless communication because it is marked by its higher frequency multiplicity and greater immunity to multipath fading. However, the main drawback of OFDM is high Peak-to-Average Power Ratio (PAPR), which leads to power inefficiency and requires expensive High Power...

    Provided By WSDOT

  • White Papers // Sep 2012

    Human Resource Management and the Performance of Selected Small and Medium Manufacturing Enterprises

    Despite many studies on human resource management can be found in the literature, until recently, studies on the moderating effects of this factor on the relationship between innovation and firm performance are hardly existent. In filling the literature gap, this study attempts to address the questions of how HRM practices...

    Provided By WSDOT

  • White Papers // Sep 2012

    New Business Model of T-DMB Enabled Education in Universitas Islam Sultan Agung Semarang

    The digital convergence between telecommunication and broadcasting is an emerging sector that drives a new business concept. Terrestrial-Digital Multimedia Broadcasting (T-DMB) is one of the convergence technology that potential to overcome the educational shortages by delivering the educational contents efficiently, effectively, widely and potential to expand the educational opportunities to...

    Provided By WSDOT

  • White Papers // Sep 2012

    Innovative Management in Cost Management Strategies

    This paper examines the links between organizational culture and job cost management strategy to create value through the creation of cost-effectiveness and efficiency. The study examines the possible relationship between the two dimensions of organizational culture that is, organizational innovation and leadership in innovation, value orientation and the role of...

    Provided By WSDOT

  • White Papers // Sep 2012

    Foreign Exchange Risk Management in SME in the Czech Republic

    The paper is focused on the topic of currency risk management. Many companies are facing the problem of hedging foreign exchange risk under the exigent circumstances of current financial crisis. The Czech economy is relatively open and export-oriented, which gives wide range for currency risk and potential losses. The aim...

    Provided By WSDOT

  • White Papers // Sep 2012

    Knowledge Level of Professional Accountants in Financial Reporting Measurement

    This paper provides an analysis focusing on knowledge of professional accountants in the area of accounting measurement and perceptions in relation to a series of transformation processes taking place at national and international level. The employed research methodology relies on implementing a questionnaire survey. Paper documents relatively good knowledge of...

    Provided By WSDOT

  • White Papers // Sep 2012

    OptimalSQM: Optimal Software Quality Management Repository Is a Software Testing Center of Excellence

    A Software companies are often challenged with providing QA and testing of their software in an effective and efficient manner. In this paper, the authors will present their OptimalSQM Framework solution based on their Business Intelligent Simulation Architecture (BISA) design with integrated Software expert tools (Profit eXpert, Planer eXpert, Risk...

    Provided By WSDOT

  • White Papers // Sep 2012

    The Impact of Advanced Technologies on Communication and the Company Efficiency in Intercultural Management

    The phenomenon of pervasive use of advanced technologies in the current global world brings new challenges and opportunities regarding business communication and the company efficiency. The use of these technologies creates dramatically different environment in which business communication occurs and getting to know these conditions will help to increase any...

    Provided By WSDOT

  • White Papers // Sep 2012

    Improving Connectivity and Resilience Using ECC Based Key Predistribution for Deployment Knowledge Based WSN

    Wireless sensor networks consist of small nodes with sensing, computation and communication capabilities, often deployed in remote inaccessible areas to interact with the environment and forward the measured event to the base station, thus posing several possibilities of physical attacks. Hence security becomes an important issue in wireless sensor networks....

    Provided By WSDOT

  • White Papers // Sep 2012

    Secure Communication Method Using Invitation Process in Mobile Ad Hoc Networks

    The importance of security in mobile ad hoc networks has been recognized for many years, and many secure routing methods have been proposed in this field. This paper discusses major security attacks in mobile ad hoc networks and focused on resource exhaustion attacks as the most important security issue. The...

    Provided By WSDOT

  • White Papers // Aug 2012

    QoS Based OVPN Connection Set Up and Performance Analysis

    Due to high demand of Optical Virtual Private Network (OVPN) connection setup with guaranteed Quality of Service (QoS) requirement, it is necessary to provide such application by the provider network. In order to support this the authors propose a QoS based OVPN connection set up mechanism over WDM network to...

    Provided By WSDOT

  • White Papers // Aug 2012

    Adaptive Three-Layer Weighted Links Routing Protocol for Secure Transmission Over Optical Networks

    Bandwidth, latency and data security are the three major factors that affect the Quality of Service (QoS) for any computer network. Different applications running on a network have different requirements of these three factors, and dealing with all applications types in a similar manner is an inefficient approach. This paper...

    Provided By WSDOT

  • White Papers // Jul 2012

    A Novel QoS Aware RWA With Dedicated Path Protection Consideration for All Optical Networks

    In all optical networks, signals has to travel over long distances and Physical Layer Impairments (PLI) accumulate as regeneration capability is not available. During transmission, Quality of Service (QoS) of signals as measured by their Bit Error Rates (BER) is degraded due to propagation in the fibers, amplifier noise, and...

    Provided By WSDOT

  • White Papers // Jul 2012

    Real Time Position Location & Tracking (PL&T) Using Prediction Filter and Integrated Zone Finding in OFDM Channel

    The nature of pre-determined and on-demand mobile network fabrics can be exploited for Position Real time Location Tracking (PL&T) of radios and sensors (nodes) for Global Positioning System (GPS) denied or GPS-free systems. This issue is addressed by a novel system of integrating zone finding and triangulation method for determining...

    Provided By WSDOT

  • White Papers // Jul 2012

    Enhanced Energy Efficient Privacy Provisioning in WSN

    Privacy provisioning along with the core functionality of WSN including routing of the sensed data through predetermined optimized routes to the base station which produces pronounced traffic near the sink node adding up to the revelation of either location of direction of location of base station is one of the...

    Provided By WSDOT

  • White Papers // Jun 2012

    Design of a Quasi-Cyclic LDPC Decoder Using Generic Data Packing Scheme

    This paper proposed a generic data packing scheme for quasi-cyclic LDPC codes decoder which has two advantages. Firstly, in this scheme no shift network is needed, it greatly reduces the area of the LDPC decoder. Secondly, in this scheme, all the messages in a row can be accessed from memories...

    Provided By WSDOT

  • White Papers // Jun 2012

    Encoding Schemes for Memory Efficient Quasi Cyclic Low Density Parity Check Codes

    Low Density Parity Check (LDPC) codes have attracted current researchers due to their excellent performance and capability of parallel decoding. One major criticism concerning LDPC codes has been their apparent high encoding complexity and memory inefficient nature due to large parity check matrix. This led the researchers to move into...

    Provided By WSDOT

  • White Papers // May 2012

    Business Intelligence Approaches

    Business Intelligence (BI) is unanimous considered the art of gaining business advantage from data; therefore BI systems and infrastructures must integrate disparate data sources into a single coherent framework for real-time reporting and detailed analysis within the extended enterprise. Also the solution to a business problem is a process that...

    Provided By WSDOT

  • White Papers // May 2012

    Reduced Complexity Max Norm Based PAPR Optimization in OFDM Systems

    Orthogonal Frequency Division Multiplexing (OFDM) is a suitable multicarrier modulation scheme for high speed broadband communication systems. OFDM provides bandwidth efficiency and robustness against multipath fading channels, but is sensitive to nonlinear effects due to the high Peak-to-Average Power Ratio (PAPR) of the transmitted signal. The reduction in PAPR is...

    Provided By WSDOT

  • White Papers // May 2012

    A Two State Proactive Transport Protocol for Satellite Based Networks

    In satellite-based networks, current TCP Protocols have lower throughput performance mainly due to the effect of long propagation delays and high link error rates. In this paper, a new congestion control protocol for satellite-based networks is proposed. The protocol uses a proactive approach and is composed of novel ideas like...

    Provided By WSDOT

  • White Papers // Dec 2009

    Rotary-Code: Efficient MDS Array Codes for RAID-6 Disk Arrays

    Low encoding/decoding complexity is essential for practical RAID-6 storage systems. In this paper, the authors describe a new coding scheme, which they call Rotary-code, for RAID-6 disk arrays. They construct Rotary-code based on a bit matrix-vector product similar to the Reed-Solomon coding, and provide the geometry encoding method and detailed...

    Provided By WSDOT

  • White Papers // Feb 2010

    Relation Between Successfulness of Birthday Attack on Digital Signature and Hash Function Irregularity

    In many network communications it is crucial to be able to authenticate both the contents and the origin of a message. Digital signatures based on public key schemas are used for such authentication. In order to provide message authentication the signature must depend on the contents of the message being...

    Provided By WSDOT

  • White Papers // Feb 2010

    The Detailed Evaluation Criteria for Designation of Critical Information Infrastructure in the Field of Broadcasting and Communication

    Increasing to dependency on information infrastructures involves various threats to cyber incidents. Most of nations or organizations work on protect to not only infrastructure but also information infrastructure. Korea established Critical Information Infrastructure Protection Act in 2001 that include 5 evaluation criteria for designation of National CII. This research makes...

    Provided By WSDOT

  • White Papers // Feb 2010

    RAMEPS: A Goal-Ontology Approach to Analyse the Requirements for Data Warehouse Systems

    The Data Warehouse (DW) systems design involves several tasks such as defining the DW schemas and the ETL processes specifications, and these have been extensively studied and practiced for many years. However, the problems in heterogeneous data integration are still far from being resolved due to the complexity of ETL...

    Provided By WSDOT

  • White Papers // Mar 2010

    Business Activity Monitoring System Design Framework Integrated With Process-Based Performance Measurement Model

    Recently, strong interests in the real-time performance management are increasing to gain competitive advantages in the rapidly changing business environment. For better business performance or continuous process improvement of an enterprise, real-time measurement and analysis of the performance of managerial activities is essential. Business Activity Monitoring (BAM) which provides real-time...

    Provided By WSDOT

  • White Papers // Apr 2010

    Vitality Detection in Fingerprint Identification

    The fingerprint liveness detection refers to the inspection of the finger characteristics to ensure whether the input finger is live or artificial. A number of fingerprint identification systems are used widely and implemented at various important places such as border and immigration services. However, it is not declared by the...

    Provided By WSDOT

  • White Papers // Apr 2010

    Towards a Possibilistic Processing of Missing Values Under Complex Conditions

    To estimate the missing values of an attribute in the records of a dataset, all the information provided by the other attributes and the knowledge databases must be considered. However, the information elements could be imperfect (imprecise, possibilistic, probabilistic, etc.) and could have different measuring scales (quantitative, qualitative, ordinal, etc.)...

    Provided By WSDOT

  • White Papers // May 2010

    New Outlier Detection Method Based on Fuzzy Clustering

    In this paper, a new efficient method for outlier detection is proposed. The proposed method is based on fuzzy clustering techniques. The c-means algorithm is first performed, then small clusters are determined and considered as outlier clusters. Other outliers are then determined based on computing differences between objective function values...

    Provided By WSDOT

  • White Papers // May 2010

    A Parallel Algorithm to Compute Data Synopsis

    Business Intelligence systems are based on traditional OLAP, data mining, and approximate query processing. Generally, these activities allow to extract information and knowledge from large volumes of data and to support decisional makers as concerns strategic choices to be taken in order to improve the business processes of the Information...

    Provided By WSDOT

  • White Papers // Jun 2010

    A Multi Purpose Web-Based Contractual Management System

    A web-based multi-purpose contractual management system can provide support to contractual process workflows for different types of contractual process of unilateral, bilateral or multilateral contracts. These processes can be done on-line i.e. Web-based without the need for all actors to be synchronously present with respect to both time and space....

    Provided By WSDOT

  • White Papers // Jun 2010

    Secure Multi Party Computation Algorithm Based on Infinite Product Series

    Now-a-days, data mining has been extremely interested; because of its ability to give the companies a better view for strategic decisions. In case of, contribution of several companies for a shared data mining, there is a big problem: confidentially of data. Here, the companies are avoided passing their data to...

    Provided By WSDOT

  • White Papers // Jan 2010

    Visualization of the Packet Flows using Self Organizing Maps

    Recently, the spread of the Internet makes familiar to the incident concerning the Internet, such as a DoS attack and a DDoS attack. Some methods which detect the abnormal traffics in the network using the information from headers and payloads of IP-packets transmitted in the networks are proposed. In this...

    Provided By WSDOT

  • White Papers // Mar 2008

    Mining Strong Positive and Negative Sequential Patterns

    In data mining field, sequential pattern mining can be applied in divers applications such as basket analysis, web access patterns analysis, and quality control in manufactory engineering, etc. Many methods have been proposed for mining sequential patterns. However, conventional methods only consider the occurrences of itemsets in customer sequences. The...

    Provided By WSDOT

  • White Papers // Mar 2008

    Fast Mining of Closed Sequential Patterns

    This paper propose a novel algorithm for mining closed frequent sequences, a scalable, condensed and lossless structure of complete frequent sequences that can be mined from a sequence database. This algorithm, FMCSP, has applied several optimization methods, such as equivalence class, to alleviate the needs of searching space and run...

    Provided By WSDOT

  • White Papers // Mar 2008

    A Data Centered Approach for Cache Partitioning in Embedded Real-Time Database System

    Embedded real-time databases become a basic part of the embedded systems in many using environments. Caches are used for reducing the gap between processor and off-chip memory. But caches introduce unpredictability in general real-time systems. Although several cache partitioning approaches have been purposed to tackle this problem, there is no...

    Provided By WSDOT

  • White Papers // Apr 2008

    Preventing Conflict Situations During Authorization

    Access control to information systems is a fundamental management responsibility. Access control determines which resource in a system a legitimate user can access. A sophisticated and complex control implies structured authorizations. The complexity of security administration appears to be among most challenging problems in managing large networks. Role-Based Access Control...

    Provided By WSDOT

  • White Papers // Apr 2008

    A Comprehensive Taxonomy of DDoS Attacks and Defense Mechanism Applying in a Smart Classification

    A Distributed Denial of Service (DDoS) attack uses multiple machines operating in concern to attack a network or site. It is the most important security problem for IT managers. These attacks are very simple organized for intruders and hence so disruptive. The detection and defense of this attack has specific...

    Provided By WSDOT

  • White Papers // May 2008

    Incorporating the Biometric Voice Technology Into the e-Government Systems to Enhance the User Verification

    Many courtiers around the world have started their e-government programs. E-government portals will be increasingly used by the citizens of many countries to access a set of services. Currently, the use of the e-government portals arises many challenges; one of these challenges is the security issues. E-government portals security is...

    Provided By WSDOT

  • White Papers // May 2008

    Smart Card Based Solution for Non-Repudiation in GSM WAP Applications

    In this paper, the authors present security issues and architectures for mobile applications and GSM infrastructure. They also introduces the solution for avoiding denial of service from WAP applications using WIM features. The first section contains the structure of GSM network from voice and data point of view. The security...

    Provided By WSDOT

  • White Papers // Jun 2008

    The Strategy Based on Game Theory for Cross-Organizational Business Process Reengineering in Supply Chain

    Many enterprises with their own benefits are involved in cross-organizational business process reengineering in supply chain, which is different from BPR within one enterprise. The enterprises have rights to take part in the cross-organizational BPR project or not, in this way, their activities under the benefits will affect the progress...

    Provided By WSDOT

  • White Papers // Apr 2009

    A Framework and Implementation of Information Content Reasoning in a Database

    Databases' capability is limited in terms of inference. Especially, when users explore information beyond the scope of data within databases, the databases normally cannot provide the information. The underlying reason of the problem is that queries are answered based on a direct match between a query and data (up to...

    Provided By WSDOT

  • White Papers // Apr 2009

    A Novel Approach ForMissing Data Processing Based on Compounded PSO Clustering

    Incomplete and noisy data significantly distort data mining results. Therefore, taking care of missing values or noisy data becomes extremely crucial in data mining. Recent researches start to exploit data clustering techniques to estimate missing values. Obviously the quality of clustering analysis significantly influences the performance of missing data estimation....

    Provided By WSDOT

  • White Papers // Apr 2009

    Supporting Architectural Design Decisions Through Risk Identification Architecture Pattern (RIAP) Model

    Web projects tend to have a high possibility of loss or failure compared to traditional projects. For this reason, risk management is becoming more emphasized and systemized in Web projects so as to improve the quality of difficult decisions that normally encompass a higher level of risk exposures. Software architecture...

    Provided By WSDOT

  • White Papers // May 2009

    On the Parallelism of I/O Scheduling Algorithms in MEMS-Based Large Storage Systems

    MEMS-based storage is being developed as a new storage media that has several salient characteristics such as high-parallelism, high density, and low-power consumption. Because physical structures of MEMS-based storage is different from those of hard disks, new software management techniques for MEMS-based storage are needed. Specifically, MEMS-based storage has thousands...

    Provided By WSDOT

  • White Papers // May 2009

    Database Analysis Models Used for Studying the Residential Assemble Market

    Optimism or pessimism, certainty or uncertainty, price evolution all these are key words concerning the residential assemblies market of Romania. The authors find data about the residential rating and about the parameters of project evaluation. Some basic rules and snares in real estate transactions are presented. In this paper, they...

    Provided By WSDOT

  • White Papers // Sep 2009

    Considering Application Domain Ontologies for Data Mining

    The dramatically explosion of data and the growing number of different data sources are exposing researchers to a new challenge - how to acquire, maintain and share knowledge from large databases in the context of rapidly applied and evolving research. This paper describes a research of an ontological approach for...

    Provided By WSDOT

  • White Papers // Sep 2009

    Nonce-Aware Encryption

    Two different goals for encryptions have been considered: INDistinguishability (IND) and Non-Malleability (NM). IND requires that it be infeasible for an adversary to distinguish between the ciphertexts of any two messages, even if the two original messages are given. NM requires that an adversary given a challenge ciphertext be unable...

    Provided By WSDOT

  • White Papers // Sep 2009

    The Factors Influencing Individual's Behavior on Privacy Protection

    Individual's behavior on privacy protecting is affected by not only the personal psychological factors, but also the external influences. However, the latter was always ignored in previous researches. For investigating how the external as well as internal factors simultaneously affected one's privacy concern on privacy protection and restrained related behavior,...

    Provided By WSDOT

  • White Papers // Nov 2009

    Improved Mining of Software Complexity Data on Evolutionary Filtered Training Sets

    With the evolution of information technology and software systems, software reliability has become one of the most important topics of software engineering. As the dependency of society on software systems increase, so increases also the importance of efficient software fault prediction. In this paper the authors present a new approach...

    Provided By WSDOT

  • White Papers // Nov 2009

    A Simultaneous Application of Combinatorial Testing and Virtualization as a Method for Software Testing

    The authors propose in this paper a general framework for an integrated End-to-End Testing of IT Architecture and Applications using the simultaneous application of combinatorial testing and virtualization. Combinatorial testing methods are often applied in cases of the configuration testing. The combinatorial approach to software testing uses models, particularly an...

    Provided By WSDOT

  • White Papers // Feb 2008

    Using System Dynamics for Managing Risks in Information Systems

    Each and every security oriented activity in information systems has to start with the basics, which is risk management. Although risk management is a well established and known discipline in many other areas, its direct translation to information systems is not an easy and straightforward because of specifics of contemporary...

    Provided By WSDOT

  • White Papers // Feb 2008

    Mining Long High Utility Itemsets in Transaction Databases

    Existing algorithms for utility mining are column enumeration based, adopt an Apriori-like candidate set generation-and-test approach, and thus are inadequate on datasets with high dimensions or long patterns. To solve the problem, this paper proposes a hybrid model and a row enumeration based algorithm, i.e., inter-transaction, to discover high utility...

    Provided By WSDOT

  • White Papers // Mar 2008

    Warehouse Redesign to Satisfy Tight Supply Chain Management Constraints

    The picking process is a critical supply chain component for many companies. A proper warehouse configuration, storage policy, trays replenishment policy, and other factors are also important to reduce not only the delivery time, but also increase productivity while maintaining quality factors at competitive costs. This paper presents an integrated...

    Provided By WSDOT

  • White Papers // Dec 2008

    Using Data Mining to Provide Recommendation Service

    This research introduces personalized recommendation service into library services. Using the borrowing record of the library as basis, the association rules of data mining technique are used to look for book association by focusing on reader's borrowing mode, personal interest and trait in order to simplify the complexity of recommendation...

    Provided By WSDOT

  • White Papers // Dec 2008

    Improving Query Performance in Virtual Data Warehouses

    In order to improve the quality of Business Intelligence Systems in an organization the authors can choose to build the system using BI techniques such as OLAP and data warehousing or by using traditional reports based on SQL queries. The cost and developing time for BI tools is greater than...

    Provided By WSDOT

  • White Papers // Dec 2008

    Project Management Stage Mutations within Agile Methodological Framework Process Transformations

    Projects are living entities. They are born with the project idea and end with the project termination. The time in between can last for many years, in most of the cases, requiring continuous implementation and management effort. Over the time project changes on requirements change the implementation process and in...

    Provided By WSDOT

  • White Papers // Dec 2008

    UML Data Models From an ORM (Object-Role Modeling) Perspective Data Modeling at Conceptual Level

    This paper provides an overview of Object-Role Modeling (ORM), a fact-oriented method for performing information analysis at the conceptual level. It provides both a graphical and textual languages and a procedure which guides the use of the languages. The paper is structured in two main parts. The first part presents...

    Provided By WSDOT

  • White Papers // May 2008

    Structured Data Representation Using Ruby Syntax

    This paper describes Ribbon (Ruby Instructions Becoming Basic Object Notation), a new representation written in a text-based data format using Ruby syntax. The design principle of Ribbon is good readability and simplicity of structured data representation. An important feature of Ribbon is an executable representation. Once Ribbon-related definitions are loaded...

    Provided By WSDOT

  • White Papers // Jun 2008

    The Design and Implementation of Background Pass-Go Scheme Towards Security Threats

    Currently, access to computer systems is often based on the use of alpha-numeric. The textual passwords or alpha-numeric passwords have been the basis of authentication systems for centuries. Similarly, it had also been the major attraction for crackers and attackers. However, users tend to face difficulty in remembering a password...

    Provided By WSDOT

  • White Papers // Jun 2008

    Ontology Based Framework for Data Integration

    One of the most complex issues of the data integration is the case where there are multiple sources for the same data element. It is not easy to generate and maintain the integrated scheme. In this paper, the authors describe a framework which encompasses the entire data integration process. The...

    Provided By WSDOT