SDIWC Digital Library
The aim of SDIWC digital library is to deliver a free full text access to published papers of SDIWC and other organizations. If you want to include the papers of your conference or journal, please contact us. The inclusion is Free.
The Third International Conference on Digital Enterprise and Information Systems (DEIS2015)
-
A Churn-prevented Bandwidth Allocation Algorithm for Dynamic Demands In IaaS Cloud
In current IaaS datacnters, the network bandwidth resource is shared across tenants in a best-effort manner. In this way, tenants are interfered by each other, which leads to unpredictable ...Authors: Jilei Yang, Hui Xie, Jiayun Li
Year Published: 2015 | 1-10 | DEIS2015 -
Analysis of VDI Workload Characteristics
Scale of a VDI system is an important but very difficult issue in its construction. This is caused by several key features of VDI system such as IO storms, dominant small random writes, and ...Authors: Jeongsook Park, Youngchul Kim, Youngkyun Kim
Year Published: 2015 | 11-17 | DEIS2015 -
Increasing the Saturated Output RF Power for RF Amplifiers Using a Passive Technique
This paper presents a design and an implementation of a special technique to increase the saturated output RF power of semiconductor RF amplifiers using passive components. This approach allows using ...Authors: Basim ALkhateeb, Anwar Al-Assaf, Ahmad ALMousa , Adnan Ishtay
Year Published: 2015 | 18-28 | DEIS2015 -
Traffic Measurement and Analysis in Cellular Data Charging System
In recent years, the development of 3G/4G networks makes people pay more attention to the traffic accounting in data-based charging cellular networks. Although this charging system has been worked ...Authors: Piao Yong, Liu Xiaolan, Li Jiayun
Year Published: 2015 | 29-37 | DEIS2015 -
A Rule-based Detection Mechanism against Distributed Denial of Service Attacks
We have designed a novel flow detection that is a software module on a router/server that inspects the aggregate of arrival packets in a timely manner. The flow detection has established an ...Authors: Chin-Ling Chen, Hsin-Chiao Chen
Year Published: 2015 | 38-45 | DEIS2015 -
An Analysis Method of NAC Configuration Conflict Based on Ontology
Network Access Control policy might be configured in terms of firewalls, proxys, intrusion prevention systems and user-access policies. These policies may interoperate in the sense that the access ...Authors: Wencan Tong, Xiaoyan Liang, Xiaojian Li,Jiejie Zhao and Xuemei Liang
Year Published: 2015 | 46-53 | DEIS2015 -
Study on Twitter as a Complex Network
In the last years, complex networks have become an increasingly relevant research topic due to the large number of fields of application. Particularly, complex networks are specially significant in ...Authors: Javier Villazon-Terrazas, Sofia Aparicio, Gonzalo Alvarez
Year Published: 2015 | 54-62 | DEIS2015 -
Agile Methods for Software Engineering Students Project: A Proposed Hybrid Methodology
Agile methods’ principles and practices are nowadays becoming more and more useful in the software industry. For most software engineering students, traditional software development methods have ...Authors: Abdulwahab L, Abdalla A. Abdalla, Bashir S. Galadanci, Marshal Algudah and Murtala M
Year Published: 2015 | 63-69 | DEIS2015 -
Cognitive Effects of Visualization on Learning Data Structure and Algorithms
Education has the explicit task in society of developing cognition. This study has explored the cognition effects in four different aspects: The first is the psychological implications and effects of ...Authors: Junaid Akram, Luping Fang
Year Published: 2015 | 70-78 | DEIS2015 -
Integrity of RFID-enable HMSC Networks
In recent years, application and integration of RFID-related technologies and systems have been widely expanding particularly in supply chain and logistics sectors. For instance, there has been a ...Authors: Ahmed Mohammed, Qian Wang
Year Published: 2015 | 79-86 | DEIS2015 -
The Role of Electronic Leadership in Crisis Management Practices of National Companies: A Research into Virtual, E-Commerce, Industrial Businesses and Public Sector
The global, financial and economic crises are the cases where the events suddenly and unexpectedly taking place at the international level lead to results that have crucial effects on country?s ...Authors: Adnan Celik, Ilhami Kaygusuz
Year Published: 2015 | 87-97 | DEIS2015 -
A Novel Segmentation Approach for Brain Tumor in MRI
Brain MRI image segmentation is one of the most important applications of image segmentation technique, and is an important part of clinical diagnostic tools. Segmented image can help physicians to ...Authors: Yong Wei, H. Keith Brown, Junfeng Qu
Year Published: 2015 | 98-103 | DEIS2015 -
Detection and Categorization of Errors by Novice Programmers in a First Year Java Programming Class: A Comparative Analysis
The increasing demand for Information Technology (IT) professionals including Java programmers is rising and hence the pressure on IT institutions to train more and more students in this technical ...Authors: Murtala Mohammed, Abdulwahab Lawan, Bashir S. Galadanci, Mijinyawa M.K
Year Published: 2015 | 104-112 | DEIS2015