- Filter by:
-
Content Type
-
Topic
-
Aspect aspect-oriented programming is known as a technique for modularizing crosscutting concerns. However, there are no clear rules to help detect and implement aspects in the software development lifecycle. Consequently, class developers face changeability, parallel development and comprehensibility problems, because they must be aware of aspects whenever they develop or...
Download Now -
The development of a computational platform of a communication network for an automation system using the precepts of IEC 61850 has become a great trend in Substation Automation Systems (SASs) research. Recent developments in wireless communication technologies, especially the IEEE802.11 have enabled cost-effective remote control systems with a capability of...
Download Now -
Virtual Machine Optimization Use Dynamic Resource Allocation on Xenserver
Virtual Machines (VMs) as mechanism of virtualization have several problems on resource allocation and optimization. VM needs to be defining to handle the resource need for computation and services. The failure can be happen when the transaction on virtual machines increase without the scalable resource capacities. Virtual machines mostly run...
Download Now -
Multipath Trust Based Framework for Prevention of Blackhole Attack in MANETs
Due to its self-organizing nature the Mobile Ad hoc NETworks (MANETs) are successfully able to provide a great channel for communication anywhere, anytime in absence of any centralized infrastructure and have a huge potential in actual applications like, in the military, rescue and commercial fields. However, due to its dynamic...
Download Now -
Enhanced Data Security Approach for Cloud Environment Based on Various Encryption Techniques
Cloud computing is the future of the next generation architecture of IT solutions, a way to increase the capacity or add capabilities dynamically without investing in new infrastructure, training new personnel, or licensing new software. Like any other technology cloud computing offer many advantages, however it still has some problems....
Download Now -
Review of Web-Browser Communications' Security
The issues of Internet communications' security are considered in the paper. The causes of security violation and the main threats to communications' security were defined. As a result, it became clear that protection against threat of listening, interception, and data alteration is determined by technology of data transmission, while other...
Download Now -
In this paper, the authors present results of the studies aimed at development of new method for formation of signals for cognitive radio communication systems, which would allow increasing spectral efficiency of systems for data transmission as compared to the existing approaches. Signals which are used in cognitive radio communication...
Download Now -
A Report on Reducing Dimensions for Big Data Using Kernel Methods
Big data is very popular word to perform huge data processing; it brings so many opportunities to the academia, industry and society. Big data hold great promise for discovery of patterns and heterogeneities which are not possible with small data. Big data faces many challenges like unique computational and statistical...
Download Now -
A Conceptual Framework for a Multidimensional Model of Talent Management Data Warehouse
The modern business environment and dynamic economic situation has made the workforce and business ethics more versatile and sophisticated. This paper forges a complex business atmosphere that compels industries to compete productively for sustainable growth. Thus, it becomes imperative for organizations to manage their talents (workforce) effectively to achieve sustenance...
Download Now -
Improvement of Performance Intrusion Detection System (IDS) Using Artificial Neural Network Ensemble
The main focus from one of the problems in computer networks is computer security systems because of the high threat of attack from the internet in recent years. Therefore, an Intrusion Detection System (IDS) that monitors the traffic of computer networks and oversight of suspicious activities in a computer network...
Download Now