Search
Now showing items 1091-1100 of 1103
Business process reengineering in UAE public sector: A town planning case study
(
Emerald Group Publishing Limited
, 2007 , Article)
Purpose - To reengineer the applications' processes of the land department of Al-Ain Municipality and to develop an electronic version of the reengineered processes. Design/methodology/approach - The research approach used ...
Wireless application deploying cell broadcast, and bulk SMS/MMS
(
International Business Information Management Association, IBIMA
, 2009 , Conference Paper)
Cell broadcast is a mobile technology that allows messages to be broadcast to all mobile handsets and similar devices within a designated geographical area. The broadcast range can be varied, from a single cell to the ...
MB-C: Check-in mobile application using barcodes
(
International Business Information Management Association, IBIMA
, 2008 , Conference Paper)
This project involves the design and development of a mobile application, called Mobile Bar-Code (MB-C) that uses the bar-code concept in the process of check-in to the provider's venue or facility. The MB-C integrates ...
Selecting Web services with security compliances: A managerial perspective
(
dblp computer science bibliography
, 2007 , Conference Paper)
This paper proposes a framework of a decision support system (DSS) for the assessment process of selecting Web services with security compliances consistent with the enterprise business goal. The proposed DSS framework is ...
Security-oriented service composition and evolution
(
IEEE
, 2006 , Conference Paper)
This paper introduces a framework for security-oriented software service composition and evolution. Key building blocks of the framework are a semantic model for specifying the security objectives and properties at the ...
SecCom: A prototype for integrating security-aware components
(
Springer Verlag
, 2009 , Conference Paper)
This paper addresses information security from systems development point of view. This paper presents a prototype demonstrating how security-aware software components can be composed with other remote objects in terms of ...
Managing optimality in multi-sensor data fusion consistency using intersection and largest ellipsoid algorithms
(
Nova Science Publishers, Inc.
, 2009 , Book chapter)
The purpose of this chapter is to provide a theoretical and practical framework to tackle the target tracking problem known as the track-to-track correlation problem. When static (e.g. radars) or dynamic (e.g. AWACs) sensors ...
Text summarization based on conceptual data classification
(
IGI Global
, 2008 , Book chapter)
In this paper, we present an original approach for text summarization using conceptual data classification. We show how a given text can be summarized without losing meaningful knowledge and without using any semantic or ...
Highly accurate solutions of a laminar square duct flow in a transverse magnetic field with heat transfer using spectral method
(
The American Society of Mechanical Engineers (ASME)
, 2005 , Article)
A liquid metal forced-convection fully developed laminar flow inside a square duct, whose surfaces are electrically insulated and subjected to a constant temperature in a transverse magnetic field, is solved numerically ...
Numerical solutions of two heat transfer limits of MFM square duct flow using MatLab program
(
Taylor & Francis
, 2009 , Article)
The heat transfer of a magneto-fluid-dynamics (MFM) laminar flow in an electricallyinsulated square duct subjected to two boundary condition limits of constant heat flux and constant wall temperature is examined numerically. ...