Palma, Ricardo R.
The book is full of concepts and application models that can lead us to better understand how this paradigm shift application development of "Software Factory" can help SMEs. It shows how slowly is bypassing the traditional scheme based on the competitive advantage of logistics contributed during the first decade of this century to replace it with a more general concept and vision of not only financial but economic results with the integrated development model established in the "Supply Chain Management".
Strube, Alexandre Otto
This work describes a novel way to select the best computer node out of a pool of available potentially heterogeneous computing nodes for the execution of computational tasks. This is a very basic and difficult problem of computer science and computing centres tried to get around it by using only homogeneous compute clusters. Usually this fails as like any technical equipment, clusters get extended, adapted or repaired over time, and you end up with a heterogeneous configuration.
In wireless mobile ad hoc networks, packet delivery is achieved through two closely related network-layer operations: ad hoc routing and packet forwarding. As a result any security solution should encompass the protection of both. Protecting the network layer operations such as routing the control messages and data packet forwarding, from malicious attacks is an important and challenging issue in both wired and wireless mobile networks and the issue becomes even more challenging in the case of wireless mobile ad hoc network. Malicious nodes may disrupt routing algorithms by transmitting a false hop count; by dropping data packets and by routing...
Rangarajan, K.; Kumaravel, A.; Nalini, T.
The ability to afford decision makers with both accurate and timely consolidated information as well as rapid query response times is the fundamental requirement for the success of a Data Warehouse. To provide fast access, a data warehouse stores materialized views of the sources of its data. As a result, a data warehouse needs to be maintained to keep its contents consistent with the contents of its data sources. Incremental maintenance is generally regarded as a more efficient way to maintain materialized views in a data warehouse The view has to be maintained to reflect the updates done against the...
Aroge, T. K.; Isinkaye, F. O.
The protection and enforcement of intellectual property rights for digital media has become an important issue in many countries of the world. There is increase in the popularity and accessibility of the Internet to record, edit, replicate and broadcast multimedia content which has necessitated a high demand to protect digital information against illegal uses, manipulations and distributions. Digital watermarking technique which is the process used to embed proprietary information into multimedia digital signal provides a robust solution to this problem. This paper reviews different aspects and techniques of digital watermarking for protecting digital contents. It also explores different application areas...
Akinbode, O. P.; Longe, O. L.; Amosa, B.M.G.
To improve chronic illness care, patients must be empowered and engaged in health self-management. However, only half of all patients with chronic illness comply with treatment programme. The self-regulation model needs practical tools to help patients adopt this selfcentered approach for long-term care. This research work considered a Mobile-phone based Patient Compliance System (MPCS) that can reduce the time-consuming and error-prone processes of existing self-regulation practice to facilitate self-reporting, non-compliance detection, and compliance reminder among patients in Nigeria. The uniqueness of this work is to apply social behavior theories to engineer the MPCS to positively influence patients' compliance behaviors, including...
Wolff, Francis G.; McIntyre, David R.; Johnston, David A.
Delivery of the same data content to many clients simultaneously over the Internet continues to be a challenging problem. Multicasting using a single tree structure for data distribution has been shown to be an effective methodology for distribution of data. Using the tree structure to distribute data relieves the source node from the burden of trying to unicast to each client and is efficient because the data delivery burden is distributed over all the participating client nodes. Using multiple tree multicasting further distributes the transmission burden over more participating client nodes and it improves the efficiency of the data distribution....
Rufai, M. M.; Adigun, J. O.; Yekini, N. A.
This research paper uses the terms "tools" to include the computer hardware, software, and connectivity put together under the title Information and Communication Technology (ICT). Authors of this research work considered Indicators of declining quality and wastage in the education system to include; high drop-out and Failure rates, rampant examination malpractices, poor reading and writing skills among students at all levels. The focus of this paper is on how qualitative education can be guaranteed in African schools through the use of ICT to reduce failure rates in examinations. This research work uses the extent to which the graduates of an...
Leiva, Lucas; Acosta, Nelson
Vision based applications are present anywhere. A special market is industry, allowing to improve product quality and to reduce manufacturing costs. The vision systems applied to industries are known as machine vision systems. These systems must meet time constraints to operate in real time. Generally the production lines are more and more fasters, and the time to process and bring a response is minimal. For this reasons, dedicated architectures are emplaced. In this work a review of several commercial systems is presented, as well a proposed architecture is depicted. The architecture is concern as a customizable platform, avoiding having knowledge...