Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Decision making (2)
- AFDMA (1)
- Analytic hierarchy process (1)
- Analytic network process (1)
- Application software (1)
-
- Bandwidth (1)
- Bismuth (1)
- Certficateless authentication (1)
- Climatic changes – Study and teaching (Elementary) (1)
- Communication networks (1)
- Component (1)
- Computer industry (1)
- Computer science (1)
- Computers (1)
- Crosstalk (1)
- Data analysis (1)
- Data mining (1)
- Education (1)
- Electromagnetic interference (1)
- Engineering profession (1)
- Frequency allocation (1)
- Fuzzy logic (1)
- Fuzzy sets (1)
- Hospitality industry – Energy conservation (1)
- Hospitality industry – Environmental aspects (1)
- Hospitals (1)
- Identity-based encryption (1)
- Information systems (1)
- Information technology (1)
- Integrated circuit interconnections (1)
Articles 1 - 11 of 11
Full-Text Articles in Physical Sciences and Mathematics
Software Engineering: Security Characterization For Evaluation Of Software Architectures Using Atam, Asad Raza, Haider Abbas, Louise Yngstrom, Ahmed Hemani
Software Engineering: Security Characterization For Evaluation Of Software Architectures Using Atam, Asad Raza, Haider Abbas, Louise Yngstrom, Ahmed Hemani
International Conference on Information and Communication Technologies
Significant technological advancement in the current electronic era has influenced the work processes of private and government business entities. E-Government is one such area where almost every country is emphasizing and automating their work processes. Software architecture is the integral constituent of any software system with not only cumbersome modeling and development but require heedful evaluation. Considering this aspect we have highlighted in this paper, security evaluation of an ongoing e-society project ESAM using Architectural Tradeoff Analysis Method (ATAM). ESAM is a Web based system intended to provide e-services to the Swedish community residents. ATAM is primarily used for architectural …
Wireless Networks: Certificateless Id-Based Authentication Using Threshold Signature For P2p Manets, Aasia Samreen, Seema Ansari
Wireless Networks: Certificateless Id-Based Authentication Using Threshold Signature For P2p Manets, Aasia Samreen, Seema Ansari
International Conference on Information and Communication Technologies
As far as the security of MANET (mobile and ad hoc network) is concerned, it depends upon the secure authentication especially for P2P MANETs. Identity based encryption was introduced to construct Public Key without requiring a certificate. Therefore, certificateless authentication combined with threshold digital signature and efficient key generation using identities such as IP address, are the challenging issues in front of researchers. In this paper we have addressed the problem of identity based secure authentication employing well-known RSA algorithm and secret sharing to generate threshold signature on a message.
Software Engineering: An Open Source Service Oriented Mobile Business Intelligence Tool (Mbit), Bushra Sajjad, A. Mir, A. Khawar, F. Bashir, A. Tariq
Software Engineering: An Open Source Service Oriented Mobile Business Intelligence Tool (Mbit), Bushra Sajjad, A. Mir, A. Khawar, F. Bashir, A. Tariq
International Conference on Information and Communication Technologies
Corporate executives require relevant and intelligent business information in real-time to take strategic decisions. They require the freedom to access this information anywhere and anytime. There is a need to extend this functionality beyond the office and on the fingertips of the decision makers. Mobile Business Intelligence Tool (MBIT) aims to provide these features in a flexible and cost-efficient manner. This paper describes the detailed architecture of MBIT to overcome the limitations of existing mobile business intelligence tools. Further, a detailed implementation framework is presented to realize the design. This research highlights the benefits of using service oriented architecture to …
Application Of Ict Ii: Analytic Network Process Applied To R&D Project Selection, Murad Habib, Raza Khan, Javaid L. Piracha
Application Of Ict Ii: Analytic Network Process Applied To R&D Project Selection, Murad Habib, Raza Khan, Javaid L. Piracha
International Conference on Information and Communication Technologies
Research and development (R&D) project selection is a complex decision-making process. Risks and uncertainties are also associated with the investments and returns of R&D projects. This research paper illustrates an application of ANP (analytic network process). The analytic network process (ANP) is presented as a potentially valuable method to support the selection of projects in a research and development (R&D) environment. The AHP (analytic hierarchy process) is employed to break down large unstructured decision problems into manageable and measurable components. The ANP, as the general form of AHP, is powerful to deal with complex decisions where interdependence exists in a …
Wireless Networks: Automated Frequency Distribution, Management & Assignment (Afdma) In Ieee 802.16, Khurram Shehzad, A. Ali, F. Rasool, R. M. Hashmi, A. Zubair, R. L. Ali
Wireless Networks: Automated Frequency Distribution, Management & Assignment (Afdma) In Ieee 802.16, Khurram Shehzad, A. Ali, F. Rasool, R. M. Hashmi, A. Zubair, R. L. Ali
International Conference on Information and Communication Technologies
Frequency is amongst the most exclusive and most costly resources in wireless communication networks, especially, while considering the demands of broadband wireless access (BWA). In BWA, the management of frequency distribution and its effective utilization is of utmost importance. This research explores possible ways to ensure the most effective allocation of bandwidth resources and their best possible utilization on need basis. The model for static frequency allocation has been optimized and the dynamic frequency management has been calculated while dividing the users in different user classes on the basis of their needs and requirements. The effect of ping-pong handovers has …
Application Of Ict Iii: Use Of Information And Mobile Computing Technologies In Healthcare Facilities Of Saudi Arabia, Abdul Ahad Siddiqi, Munir Ahmed, Yasser M. Alginahi, Abdulrahman Alharby
Application Of Ict Iii: Use Of Information And Mobile Computing Technologies In Healthcare Facilities Of Saudi Arabia, Abdul Ahad Siddiqi, Munir Ahmed, Yasser M. Alginahi, Abdulrahman Alharby
International Conference on Information and Communication Technologies
Information technology forms an important part of the healthcare solution. Accurate and up-to-date information is essential to continuous quality improvement in any organization, and particularly so in an area as complex as healthcare. Therefore, diverse information systems must be integrated across the healthcare enterprise. The knowledge base in the medical field is large, complex, and growing rapidly. It includes scientific knowledge, as well as familiarity with the day-to-day business of providing healthcare. It is crucial to identify the processes in the healthcare sector that would most benefit from the support of information technology. This study is focused on the analysis …
Networks - I: Networks-On-Chip: Challenges, Trends And Mechanisms For Enhancements, Omer Tayan
Networks - I: Networks-On-Chip: Challenges, Trends And Mechanisms For Enhancements, Omer Tayan
International Conference on Information and Communication Technologies
The rate of increase of silicon capacity in integrated circuits (IC) will enable system integration of several billion transistors to reside on a single chip in the near future. Future system-on-chip (SoC) systems must therefore integrate up to several hundreds of cores within a single chip, and SoC designs will employ on-chip communication networks (NoCs) as a result. This paper discusses the problems with many current SoC systems, surveys the challenges and trends facing future SoC designs and proposes a mechanism for enhancing NoC strategies of the future by enhancing memory management and utilization techniques within an NoC.
Artificial Intelligence – I: Subjective Decision Making Using Type-2 Fuzzy Logic Advisor, Owais Malik
Artificial Intelligence – I: Subjective Decision Making Using Type-2 Fuzzy Logic Advisor, Owais Malik
International Conference on Information and Communication Technologies
In this paper, we present and compare two-stage type-2 fuzzy logic advisor (FLA) for subjective decision making in the domain of students' performance evaluation. We test our proposed model for evaluating students' performance in our computer science and engineering department at HBCC/KFUPM in two domains namely cooperating training and capstone/senior project assessment where we find these FLAs very useful and promising. In our proposed model, the assessment criteria for different components of cooperative training and senior project are transformed into linguistic labels and evaluation information is extracted into the form of IF-THEN rules from the experts. These rules are modeled …
Going Green Makes Cents!, Anthony Caldwell, Logan Fountain, Tiffany Snider
Going Green Makes Cents!, Anthony Caldwell, Logan Fountain, Tiffany Snider
Undergraduate Research Conference
No abstract provided.
The Green Business Revolution, Jacob Martin, Penny Mcclendon, Brian Watson, Jimanna Watson
The Green Business Revolution, Jacob Martin, Penny Mcclendon, Brian Watson, Jimanna Watson
Undergraduate Research Conference
No abstract provided.
Afternoon Concurrent Track 3: Green Curricula At Unlv, Thomas Jones, Ken Teeters, Barbara St. Pierre Schneider, Nancy Menzel, Lori Candela, Yu Xu, Sally Miller, Scott Nowicki
Afternoon Concurrent Track 3: Green Curricula At Unlv, Thomas Jones, Ken Teeters, Barbara St. Pierre Schneider, Nancy Menzel, Lori Candela, Yu Xu, Sally Miller, Scott Nowicki
Education for a Global Future: 21st Century Challenges in Sustainability & Climate Change Education
AFTERNOON CONCURRENT TRACK 3: GREEN CURRICULA AT UNLV Moderator Carolyn Yucha Student Union Room 213 Tom Jones, Ken Teeters – Incorporating Sustainability into a Hospitality Management Curriculum Abstract: For the past 15 years, faculty members in the Harrah College of Hotel Administration who teach Facilities Management (HMD 395) have incorporated a sustainability management component in this required course. The concepts of sustainability and global climate change are introduced through readings and multi-media. The concept of Triple Bottom Line is presented and is applied to almost every component in the course. Students are assigned a variety of semester-long service-learning projects that …