The Design of Database System for Portfolio of Computer and Information...
This paper aims to the design of database system for portfolio of computer and information technology department and to test the performance systems for portfolio of computer and information technology...
View ArticleComparison of Multiple IaaS Cloud Platform Solutions
Currently, several solution cloud computing IaaS (Infrastructure as a Service) exists. Administrators, developers and users need to choose the best environment for them. The availability of free open...
View ArticleAlgorithmic Vertical Handoff Decision and Merit Network Selection Across...
Next generation wireless networks must be able to coordinate services between heterogeneous networks through multi-mode mobile terminals. Such heterogeneity poses a challenge to seamless handover since...
View ArticleA Partnering Approach to Extending the Business Base Through Cooperation With...
Partnering both opens up and blurs the boundaries between organizations, and even expands them. Firms ought to shape their cooperation with other entities in accordance with their changing needs. A...
View ArticleCorporate Risk Management in SMEs
Risks as part of human (corporate) activities have their roots in the uncertainty of future events and result in possible negative differences in the attainment of company goals. With the increasing...
View ArticleA Systems Process Management Approach to the Development of Information...
This paper presents a review of business process modelling for information systems development. As a result of the review carried out an approach to modelling processes in Small to Medium Sized...
View ArticleInformation Flow Modeling to Provide Sustainable Cooperation Between...
Just as all educational institutions try to complement and customize their study programs and various training modules to meet current and future demand, managers in various fields constantly have to...
View ArticlePerformance Comparison of Spreading Codes in Linear Multi-User Detectors for...
Direct Sequence Code Division Multiple Access (DS-CDMA) system is well known wireless technology. This system suffers from MAI (Multiple Access Interference) caused by Direct Sequence users. Multi-User...
View ArticleUtility Based Load Balancing with Grid Computing Approach
Grid Computing is a high performance computing environment that allows sharing of geographically distributed resources across multiple administrative domains and used to solve large scale computational...
View ArticleGoing Green Business Excellence
There is no doubt about sustainable environmental future and environmental excellence. Environmental Excellence means more than corporate responsibility; it is now a priority issue that global business...
View ArticleClient-Independence as the Critical Step Towards a New Level of Cloud Computing
It is nowadays impossible to examine the modern world without picturing it as an information society. Among the most promising directions in current applicative computer science is the development of...
View ArticleA Technique of Formal Security Modeling in Autonomic Cloud Computing Environment
As clouds are complex, large-scale, and heterogeneous distributed systems management of their resources is a challenging task. It requires co-optimization at multiple layers (infrastructure, platform,...
View ArticleThe Improved Hierarchical Clustering Algorithm by a P System with Active...
In this paper, an improved hierarchical clustering algorithm by a P system with active membranes is proposed which provides new ideas and methods for cluster analysis. The membrane system has great...
View ArticleThe DBSCAN Clustering Algorithm by a P System With Active Membranes
The great characteristic of the P system with active membranes is that not only the objects evolve but also the membrane structure. Using the possibility to change membrane structure, it can be used in...
View ArticleCache Access Pattern Based Algorithm for Performance Improvement of Cache...
Buffer caches are created in main memory and managed by the operating system to avoid the latencies associated with the accesses made by the system call to the secondary storage devices. Changes in...
View Article