The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper introduces a new innovation for the analytical model to improve the throughput performance and energy efficiency for ideal channel conditions by the integration which challenges both fountain code and Markov chain modeling. In this context, the energy consumption is a critical resource that can be saved by minimizing the number of transmissions to be performed in the network. Channel contention...
ITIL is one of the most used frameworks for IT service management. Implementing ITIL processes through an organization is not an easy task and present many difficulties. This paper explores the ITIL implementation's challenges and tries to experiment how Business Process Management Systems can help organization overtake those challenges.
This paper presents a new innovation network architecture for the analytical model by the integration which challenges both fountain code and Markov chain modeling to improve the throughput performance for ideal channel conditions. In this context, the collision result in corrupted packets and the following MAC layer retransmissions consume extra energy. Channel contention is a serious problem in...
In the healthcare context, decisions are crucial. Therefore Decision Support Systems must ensure a high level of dependability. In order to justify the required dependability level, its requirements must be addressed seriously during the system life cycle. To overcome this issue, our approach is based on Model Driven Architecture to model dependability requirements from the earlier stages of decision...
In today's distributed organizations, there is a huge need of establishing a collaborative environment where multiple users can cooperate to achieve common goals. This paper proposes a lightweight approach for automatic and transparent collaboration workflow environment, supporting generic collaboration scenario. The interesting aspect of our work is the fact that collaboration designer needs just...
Today, One of the most important performance measures in the new burst traffic gets to 3G and 4G systems is the End-to-End jitter. However, in order to study and analyze Jitter, many works and models have been devoted to estimate and evaluate this parameter. In this paper, analytical formulas for jitter of interrupted Poisson traffic (IPP) and MMPP-2 are presented. We provide Jitter approximation...
Wireless sensor networks are an emerging technology for low-cost that are becoming involved in almost every field of life, due to the advancement in wireless technologies and reductions in size. Idle listening is disastrous in WSNs based on the fact that nodes in this mode consume the same magnitude of power as in receiving. Overhearing means that nodes decode packets are destined to others. Collisions...
Managing security is one of the main stakes in the cooperation of an inter-organizational workflow. Several approaches were adopted on this sense. Within the framework of the cooperation we proposed a multi-layered distributed architecture to specify, verify, and connect partners to cooperate. This management architecture WF consists of four levels: modeling level, specification level, cooperation...
The exponential growth of the web and the use of social networks in our area, gave birth to a new concept called digital identity, it's all digital traces that can be left in the internet such as photos and various comments. However, these digital identities are exposed to many dangers such as phishing, fraud, cyber-crime and identity theft. However, with an interconnected world, it is important to...
Nowadays Cloud Computing occupies an advanced place in the field of service-oriented technologies. The cloud provides a flexible environment for customers to host and process their information through an outsourced infrastructure. This information was habitually located on local servers. Many applications dealing with massive data is routed to the cloud. Data Warehouse (DW) also benefit from this...
Web Services (WS) enable access to remote applications over the Internet. Composition thereof gives rise to more complex services by integrating applications over borders of companies, institutions, and countries. But such compositions fail if they cannot dynamically adapt to change in such an ever changing environment.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.