Search
Now showing items 71-80 of 85
Business process reengineering in UAE public sector: A town planning case study
(
Emerald Group Publishing Limited
, 2007 , Article)
Purpose - To reengineer the applications' processes of the land department of Al-Ain Municipality and to develop an electronic version of the reengineered processes. Design/methodology/approach - The research approach used ...
Selecting Web services with security compliances: A managerial perspective
(
dblp computer science bibliography
, 2007 , Conference Paper)
This paper proposes a framework of a decision support system (DSS) for the assessment process of selecting Web services with security compliances consistent with the enterprise business goal. The proposed DSS framework is ...
Security-oriented service composition and evolution
(
IEEE
, 2006 , Conference Paper)
This paper introduces a framework for security-oriented software service composition and evolution. Key building blocks of the framework are a semantic model for specifying the security objectives and properties at the ...
SecCom: A prototype for integrating security-aware components
(
Springer Verlag
, 2009 , Conference Paper)
This paper addresses information security from systems development point of view. This paper presents a prototype demonstrating how security-aware software components can be composed with other remote objects in terms of ...
Managing optimality in multi-sensor data fusion consistency using intersection and largest ellipsoid algorithms
(
Nova Science Publishers, Inc.
, 2009 , Book chapter)
The purpose of this chapter is to provide a theoretical and practical framework to tackle the target tracking problem known as the track-to-track correlation problem. When static (e.g. radars) or dynamic (e.g. AWACs) sensors ...
Text summarization based on conceptual data classification
(
IGI Global
, 2008 , Book chapter)
In this paper, we present an original approach for text summarization using conceptual data classification. We show how a given text can be summarized without losing meaningful knowledge and without using any semantic or ...
Fuzzy time-frequency defect classifier for NDT applications
(
IEEE
, 2009 , Conference Paper)
In this paper, a customized classifier is presented for the industry-practiced Nondestructive Evaluation (NDE) protocols using a Hybrid-Fuzzy Inference System (FIS) to classify the and characterize the defects commonly ...
Intelligent sensor network for obstacle avoidance strategy
(
IEEE
, 2005 , Conference Paper)
An obstacle avoidance system was developed for a custom-made Autonomous Navigational Robotic Vehicle (ANROV), based on an intelligent sensor network and fuzzy logic control. Unlike conventional crisp control systems, this ...
Fuzzy blind-spot scanner for automobiles
(
IEEE
, 2009 , Conference Paper)
In this paper, an Intelligent Blind-Spot Sensing system is presented. This system exploits the power of sensor technology using multiple low-cost ultrasonic sensors to monitor the designated blind spots in a vehicle. In ...
Intelligent surround sensing using fuzzy inference system
(
IEEE
, 2005 , Conference Paper)
In this paper, an Intelligent Surround Sensing using Fuzzy Inference System (ISSFIS) that helps to prevent accidents caused by errant lane changes due to blind spots and carelessness of drivers is presented. Sensors such ...