mecs-press

Displaying 1-40 of 810 results

  • White Papers // May 2015

    Evaluation of Load Balancing Performance of Parallel Processing Linear Time-Delay Systems

    Time delays in system states or control may result into unacceptable system operation or uncertainty in specialized technical systems like aircraft control, plant control, robotics etc. The issue of robustness, controllability, traceability, flexible management, reliability and safety of such systems with time-delays, has been one of the primary research focuses...

    Provided By mecs-press

  • White Papers // May 2015

    Increasing ERP Implementation Success Ratio by Focusing on Data Quality & User Participation

    ERP systems projects have been spread widely across many organizations in general and Small and Medium Enterprises (SMEs) in particular. Regrettably, failures were the results for most of the ERP implementations. As a result of that, Critical Failure and Success Factors (CFFs & CSFs) have been identified with the help...

    Provided By mecs-press

  • White Papers // May 2015

    Integration of Heterogeneous Cloud Storages through an Intermediate WCF Service

    Many organizations provide computing resources or services to the client like hardware, software, storage etc. Storage is one of important service that is popular and commonly used today and it provides storage space online to store the data. Service providers give a storage space to consumers on the basis of...

    Provided By mecs-press

  • White Papers // Apr 2015

    Adaptive Inverse Model of Nonlinear Systems

    In this paper, the authors propose Nonlinear Adaptive Filter-Bank (NAFB) based algorithm for inverse modeling of nonlinear systems. Inverse modeling has been an important component for sensor linearization, adaptive control and channel equalization in communication system and active noise control. Under practical situations, the plant/system behaves nonlinearly which can be...

    Provided By mecs-press

  • White Papers // Apr 2015

    Multi-Objective Task Scheduling in the Cloud Computing based on the Patrice Swarm Optimization

    Cloud computing is the latest emerging trend in distributed computing, where shared resources are provided to end-users in an on demand fashion that brings many advantages, including data ubiquity, flexibility of access, high availability of resources and flexibility. In this type of systems many challenges are existed that the task...

    Provided By mecs-press

  • White Papers // Apr 2015

    Development of the Model of Dynamic Storage Distribution in Data Processing Centers

    In this paper, the authors review dynamic distribution of storage resources among the users in data processing centers. The process of changing memory usage state was revealed to be the process of Markov. The paper proposes the development of stochastic model of the memory and computing usage distribution and the...

    Provided By mecs-press

  • White Papers // Apr 2015

    A New Approach for Dynamic Virtual Machine Consolidation in Cloud Data Centers

    Cloud computing environments have introduced a new model of computing by shifting the location of computing infrastructure to the Internet network to reduce the cost associated with the management of hardware and software resources. The cloud model uses virtualization technology to effectively consolidate Virtual Machines (VMs) into Physical Machines (PMs)...

    Provided By mecs-press

  • White Papers // Apr 2015

    Scrutable Mobile Client-Side Personalization

    Personalization has become an essential feature of mobile services of different domains. On the other hand, users have conflicting needs of personalized experience and privacy. This leads to the question of how to maximize the user's experience of personalized mobile services while keeping privacy. One possible solution is to provide...

    Provided By mecs-press

  • White Papers // Mar 2015

    A Novel Quaternary Full Adder Cell Based on Nanotechnology

    Binary logic circuits are limited by the requirement of interconnections. A feasible solution is to transmit more information over a signal line and utilizing Multiple-Valued Logic (MVL). This paper presents a novel high performance quaternary full adder cell based on Carbon NanoTube Field Effect Transistor (CNTFET). The proposed Quaternary full...

    Provided By mecs-press

  • White Papers // Mar 2015

    Feature Extraction or Feature Selection for Text Classification: A Case Study on Phishing Email Detection

    Dimensionality reduction is generally performed when high dimensional data like text are classified. This can be done either by using feature extraction techniques or by using feature selection techniques. This paper analyses which dimension reduction technique is better for classifying text data like emails. Email classification is difficult due to...

    Provided By mecs-press

  • White Papers // Mar 2015

    An Experimental Study of K Algorithm

    Machine Learning techniques are taking place in all areas of everyone lives, to help them to make decisions. There are a large number of algorithms available for multiple purposes and appropriate for specific data types. That is why it is required to pay special attention to decide which is the...

    Provided By mecs-press

  • White Papers // Mar 2015

    An Analysis of RDF Storage Models and Query Optimization Techniques

    The Web provides access to substantial amount of information. Metadata that means data about data enables the discovery of such information. When the metadata is effectively used, it increases the usefulness of the original data/resource and facilitates the resource discovery. Resource Description Framework (RDF) is a basis for handling these...

    Provided By mecs-press

  • White Papers // Mar 2015

    Hypervisors' Guest Isolation Capacity Evaluation in the Private Cloud using SIAGR Framework

    Hypervisor vendors do claim that they have negated virtualization overhead compared to a native system. They also state that complete guest isolation is achieved while running multiple guest Operating Systems (OSs) on their hypervisors. But in a virtualization environment which is a combination of hardware, hypervisor and Virtual Machines (VMs)...

    Provided By mecs-press

  • White Papers // Mar 2015

    Delay Scheduling Based Replication Scheme for Hadoop Distributed File System

    The data generated and processed by modern computing systems burgeon rapidly. MapReduce is an important programming model for large scale data intensive applications. Hadoop is a popular open source implementation of MapReduce and Google File System (GFS). The scalability and fault-tolerance feature of Hadoop makes it as a standard for...

    Provided By mecs-press

  • White Papers // Mar 2015

    Microcontroller based Home Security and Load Controlling using GSM Technology

    Home automation referred to as 'Intelligent home' or 'Automated home', indicates the automation of daily tasks with electrical devices used in homes. This could be the control of lights or more complex chores such as remote viewing of the house interiors for surveillance purposes. The emerging concept of smart homes...

    Provided By mecs-press

  • White Papers // Mar 2015

    Matlab-based Computer-Aided-Design Algorithm for Designing Stepped-Impedance Resonator Low-Pass Filters in Microstrip Technology

    An accurate MATLAB-based CAD (Computer Aided Design) algorithm for quickly designing microstrip-based Stepped-Impedance Resonator (SIR) low-pass filter is reported. The algorithm uses a circuit-theory approach to implement speedy computations, compared to the time-consuming computations involved in using electromagnetic theory. The accuracy of the proposed algorithm is verified for two widely-different...

    Provided By mecs-press

  • White Papers // Feb 2015

    Optimized Speech Compression Algorithm Based on Wavelets Techniques and its Real Time Implementation on DSP

    This paper presents an optimized speech compression algorithm using discrete wavelet transform, and its real time implementation on fixed-point Digital Signal Processor (DSP). The optimized speech compression algorithm presents the advantages to ensure low complexity, low bit rate and achieve high speech coding efficiency and this by adding a Voice...

    Provided By mecs-press

  • White Papers // Jan 2015

    A Novel Testing Model for SOA Based Services

    SOA (Service-Oriented Architecture) filled the gap between software and commercial enterprise. SOA integrates multiple web services. The authors bear to secure the caliber of web services that gives guarantee about what network services work and their output results. There is close to work has to be performed for an automatic...

    Provided By mecs-press

  • White Papers // Jan 2015

    Using Wavelet-Based Contourlet Transform Illumination Normalization for Face Recognition

    Evidently, the results of a face recognition system can be influenced by image illumination conditions. Regarding this, the authors proposed a system using wavelet-based contourlet transform normalization as an efficient method to enhance the lighting conditions of a face image. Particularly, this method can sharpen a face image and enhance...

    Provided By mecs-press

  • White Papers // Jan 2015

    PD Controller Structures: Comparison and Selection for an Electromechanical System

    Many different PD controller modeling, configurations and control algorithms have been developed. These methods differ in their theoretical basis and performance under the changes of system conditions. In the present paper, the authors review the methods used in the design of PD control systems. They highlight the main difficulties and...

    Provided By mecs-press

  • White Papers // Jan 2015

    A Web 2.0 Supported Business Process Management Environment for Collaborative Research

    Collaborative research includes research activities conducted by a group of people working at different locations and has become a hot issue due to the effects of globalization and advances in Information Technology (IT). This paper is to design, develop, implement and evaluate an IT environment to better manage the standard...

    Provided By mecs-press

  • White Papers // Jan 2015

    Enable Better and Timelier Decision-Making Using Real-Time Business Intelligence System

    Today's businesses need support when making decisions. Business intelligence (BI) helps businesses to make decisions based on good pre-analysis and documented data and enables information to be presented when and where the decisions need to be made. Real Time Business Intelligence (RTBI) presents numbers in real time, providing the decision...

    Provided By mecs-press

  • White Papers // Jan 2015

    A Comprehensive Survey on Cloud Computing

    Cloud computing is an innovation ideas that helps in reducing the computing cost. Cloud computing offers better computing through improved utilization and reduced administration and infrastructure costs. Cloud computing is the long-held dream of computing as a utility. Cloud computing is the combination of Software as a Service (SaaS) and...

    Provided By mecs-press

  • White Papers // Jan 2015

    Intelligent Adaptive Gain Backstepping Technique

    In this paper, the authors presented intelligent adaptive backstepping control as robust control for continuum robot. This paper is to design a Proportional-Derivative (PD) fuzzy system to compensate the system model uncertainties. It is focused on the design tuning gain adaptive methodology according to high quality partly nonlinear methodology. Conventional...

    Provided By mecs-press

  • White Papers // Jan 2015

    A Swarm Intelligence based Model for Mobile Cloud Computing

    Mobile Computing (MC) provides multi services and a lot of advantages for millions of users across the world over the internet. Millions of business customers have leveraged cloud computing services through mobile devices to get what is called Mobile Cloud Computing (MCC). MCC aims at using cloud computing techniques for...

    Provided By mecs-press

  • White Papers // Jan 2015

    OpenMP Dual Population Genetic Algorithm for Solving Constrained Optimization Problems

    Dual population genetic algorithm is an effective optimization algorithm that provides additional diversity to the main population. It deals with the premature convergence problem as well as the diversity problem associated with genetic algorithm. But dual population introduces additional search space that increases time required to find an optimal solution....

    Provided By mecs-press

  • White Papers // Dec 2014

    A Light-Weight Symmetric Encryption Algorithm Based on Feistel Cryptosystem Structure

    WSNs is usually deployed in opening wireless environment, its data is easy to be intercepted by attackers. It is necessary to adopt some encryption measurements to protect data of WSNs. But the battery capacity, CPU performance and RAM capacity of WSNs sensors are all limited; the complex encryption algorithm is...

    Provided By mecs-press

  • White Papers // Dec 2014

    Mean Response Time Approximation for HTTP Transactions over Transport Protocols

    In this paper, the authors address mean response time that end-users experience when using the Internet. HTTP (Hyper Text Transfer Protocol) is a widely used transfer protocol to retrieve web objects in the Internet. Generally, HTTP uses TCP (Transmission Control Protocol) in a transport layer. But it is known that...

    Provided By mecs-press

  • White Papers // Dec 2014

    An Improvement Over a Server-Less RFID Authentication Protocol

    With the increased Radio Frequency IDentification (RFID) applications different authentication schemes have been proposed in order to meet the required properties. In this paper, the authors analyze the security of a server-less RFID authentication protocol which is proposed in 2014. The researcher proposed an improvement over Hoque protocol to overcome...

    Provided By mecs-press

  • White Papers // Dec 2014

    Performance Evaluation of Distributed Protocols Using Different Levels of Heterogeneity Models in Wireless Sensor Networks

    Most of the protocols for enhancing the lifetime of Wireless Sensor Networks (WSNs) are of a homogeneous nature in which all sensors have equal amount of energy level. In this paper, the authors study the effect of heterogeneity on the homogeneous protocols. The ALBPS and ADEEPS are the two important...

    Provided By mecs-press

  • White Papers // Dec 2014

    Design of a Web Interface for Fractional Chaotic Systems

    There exists a great number of works related to chaotic systems investigated by many researchers, especially about Lorenz chaotic system. If the order of differentiation of variables is fractional, the systems are called fractional chaotic systems. In this paper, a web-based interface is designed for fractional composition of five different...

    Provided By mecs-press

  • White Papers // Dec 2014

    Analysis and Comparison of Access Control Policies Validation Mechanisms

    Validation and verification of security policies is a critical and important task to ensure that access control policies are error free. The two most common problems present in access control policies are: inconsistencies and incompleteness. In order to detect such problems, various access control policy validation mechanisms are proposed by...

    Provided By mecs-press

  • White Papers // Dec 2014

    TSSR: A Proposed Tool for Secure Software Requirement Management

    In this paper, the authors provide a unified framework in which entire design of the project can be captured right from the beginning of the software development. This paper discusses about the requirements which should be included in the development of the requirement management tools. As the requirements, criteria which...

    Provided By mecs-press

  • White Papers // Dec 2014

    Video Quality Analysis of Distributed Video Coding in Wireless Multimedia Sensor Networks

    Multimedia communications in wireless sensor networks is a very challenging task. Video coding with high computational complexity and great contribution to the energy consumption of nodes and video transmission over erroneous wireless channel are the main reasons of these challenges. Distributed video coding has high potential for being deployed in...

    Provided By mecs-press

  • White Papers // Dec 2014

    An Empirical Study on Testing of SOA based Services

    Service-Oriented Architecture (SOA) removed the gap between software and business. Today, there is a business transformation among enterprises and they adopt a service based Information Technology (IT) model. So, testing is necessary for SOA based applications. This paper investigates different type of approaches and techniques that address the testing problems...

    Provided By mecs-press

  • White Papers // Dec 2014

    Evaluating the Maintainability of a Software System by using Fuzzy Logic Approach

    Maintainability is an important quality attribute for almost every quality model. Maintainability of the software is considered as most expensive phase in software development life cycle as it consumes almost major part of the total effort allocated to the software system. Maintainability evaluation is complex due to its imprecise output....

    Provided By mecs-press

  • White Papers // Dec 2014

    A Proposed Process Model for Requirements Engineering using Delphi Techniques for Prioritisation

    Requirements Engineering (RE) addresses the first software development step and lays the foundation for a successful system. Consequently, ability to identify problems and suggestions for improvements in the RE process opens up significant potential for increasing the success of software projects. Since RE process is naturally collaborative in nature, the...

    Provided By mecs-press

  • White Papers // Dec 2014

    An Algorithm for Static Tracing of Message Passing Interface Programs Using Data Flow Analysis

    Message Passing Interface (MPI) is a well know paradigm that is widely used in coding explicit parallel programs. MPI programs exchange data among parallel processes using communication routines. Program execution trace depends on the way that its processes are communicated together. For the same program, there are a lot of...

    Provided By mecs-press

  • White Papers // Dec 2014

    Efficient FPGA Hardware Implementation of Secure Hash Function SHA-2

    The hash function has been studied by designers with the goal to improve its performances in terms of area, frequency and throughput. The hash function is used in many embedded systems to provide security. It is become the default choice for security services in numerous applications. In this paper, the...

    Provided By mecs-press

  • White Papers // Dec 2014

    Teaching Programming Courses Online using Cloud System: Practices and Future Challenges

    Acceptance of cloud systems as the future has given way to a large number of cloud application installations. They have their presence across domains be it banking, gaming, education and others. A cloud based solution brings down the cost of ownership and maintenance for the host organization. For the users...

    Provided By mecs-press

  • White Papers // Feb 2011

    A WMPLS Based Multicast Mechanism in Mobile Ad Hoc Network

    Merging MPLS into multicast routing protocol in mobile ad hoc network is an elegant method to enhance the network performance and an efficient solution for multicast scalability and control overhead problems. Based on the Wireless MPLS technology, the mechanism and evaluation of a new multicast protocol, the Label Switching Multicast...

    Provided By mecs-press

  • White Papers // Nov 2010

    Low-Power Wireless Pressure Transmitter and Net of Oil-Well Based on Zigbee

    The paper introduced a low-power wireless pressure transmitter for measure pressure and temperature of oil-well. To avoid wiring cables onsite, ZICM2410 was adopted to construct Wireless Sensor Network (WSN), and powered by Li-Ion battery. To reduce the power consumption, MSP430F477 and other low-power chips were used to construct the hardware,...

    Provided By mecs-press

  • White Papers // Oct 2009

    Research of Intrusion Detection Technology and Its Formal Modeling

    The intrusion detection technology is one of the most important dynamic security technologies, which can be used in the critical security system construction and the basic service protection. Apparently, applying formal specification to the procedure of developing an intrusion detection system can fulfill their security requirement and win the confidence...

    Provided By mecs-press

  • White Papers // Nov 2010

    Performance Analysis of Spatial Reused Bandwidth Reservation in Ad Hoc Networks

    In this paper, an approach for spatial reused bandwidth reservation in ad hoc networks is proposed. Resource reservation in wireless networks is an essential component that is needed to support multimedia and real-time applications, such as audio/video conferencing. On the other hand, directional antenna technology provides the capability for considerable...

    Provided By mecs-press

  • White Papers // Nov 2010

    A Wireless Video Transmission Scheme Based on MAC-Independent Opportunistic Routing & Encoding Protocol

    It is a tremendous challenge to transmit real-time video streams over wireless sensor network because of the poor wireless communication conditions and the high requirements of video transmission. The opportunistic routing protocol can take advantage of the broadcast nature of wireless communication and can improve transfer throughput significantly. But the...

    Provided By mecs-press

  • White Papers // Apr 2011

    A Proxy Based Framework for Efficient Range Query Processing in a Cellular Network

    Within the last decade, the continuous development of mobile technology has motivated an intense research in mobile data services. Among these services, location-based services and location-dependant queries have attracted a lot of attention from the software industry as well as from researchers. Although a number of locations based service methods...

    Provided By mecs-press

  • White Papers // May 2011

    A Cost-Aware Resource Selection for Dataintensive Applications in Cloud-Oriented Data Centers

    As a kind of large-scale user-oriented data-intensive computing, cloud computing allows users to utilize on-demand computation, storage, data and services from around the world in a pay-as-you-go model. In cloud environment, applications need access to mass datasets that may each be replicated on different resources (or data centers). Mass data...

    Provided By mecs-press

  • White Papers // Apr 2011

    Mixed QoS Controlled Wireless Streaming Media Transmission Strategy

    Streaming media applications is currently limited by high bandwidth requirements. It is a challenging problem to provide the required Quality of Service (QoS) for the efficient transmission of video data under the varying network conditions such as the time-varying packet loss and fluctuating bandwidth. On Internet the most important part...

    Provided By mecs-press

  • White Papers // Oct 2009

    Modeling and Analysis on a DTN Based Wireless Sensor Network Topology Control

    Wireless Sensor Networks (WSNs) have unlimited and extensive potential application in different areas. Due to WSNs' work environments and nodes behavior, intermitted network connection may occur frequently, which lead packets delay and lose in the process of data transmission. Most related works on WSNs, seldom consider how to address the...

    Provided By mecs-press

  • White Papers // Dec 2010

    Semantic Management Information Modeling Based on Theory of Concept Lattices

    With the development of future Internet, it is of great significance to study how to realize unified management information modeling, in order to avoid a lot of repetitive work and standardize information modeling in network management domain. This paper discusses the problem from the ontology point of view and introduces...

    Provided By mecs-press

  • White Papers // Mar 2012

    Developing E-Business Strategies Curriculum Case Study in the Information Systems Department

    E-Business Strategies (EBS) is an elective course in the Information Systems Department, Faculty of Computing & Information Technology at King Abdulaziz University, Jeddah. In this course, students learn many concepts regarding e-business, such as strategies, models, relationships and so on. Also, they improve their leadership skills, such as analyzing the...

    Provided By mecs-press

  • White Papers // Mar 2012

    Learning the Related Mathematics to Cryptography by Interactive Way

    Cryptography is a complex area in the computer science field due to the complexity of the mathematics involved. The main goal of this paper is to discuss how the authors can take an advantage of the online interactive tools to facilitate this complex topic. These interactive tools can enhance the...

    Provided By mecs-press

  • White Papers // Mar 2012

    Improve Teaching Method of Data Mining Course

    It is clearly perceived that most of theoretical information, the authors teach to students are lost after graduation, mostly because abstract information do not last in students' minds much longer than the final exams, as they are not related to practical aspects and uses. Though labs are useful, they are...

    Provided By mecs-press

  • White Papers // Mar 2012

    Gender Differences on Information Literacy of Science and Engineering Undergraduates

    Information Literacy (IL) forms the basis of lifelong learning and plays very important role for students majoring in science and engineering. As far as higher education concerned, gender differences to may influence students' academic achievements. In order to evaluate the gender differences on information literacy of undergraduates, the authors surveyed...

    Provided By mecs-press

  • White Papers // Mar 2012

    Robust Algorithm for Face Detection in Color Images

    Robust Algorithm is presented for frontal face detection in color images. Face detection is an important task in facial analysis systems in order to have a priori localized faces in a given image. Applications such as face tracking, facial expression recognition, gesture recognition, etc., for example, have a pre-requisite that...

    Provided By mecs-press

  • White Papers // Mar 2012

    Issues of Technical Support for e-Learning Systems in Higher Education Institutions

    Information and Communication Technologies (ICTs) have provided several tools to facilitate higher education. However, their effective use demands technical expertise to achieve the required academic goals. The university constituents (teachers, students and administrators) are given e-Training but this is not enough. Every e-Learning system establishes a basic 'Infrastructure' of computers,...

    Provided By mecs-press

  • White Papers // Mar 2012

    Undergraduate Program in Network Engineering and Security - A Feasibility Study

    In this paper, a feasibility study for initiating a new undergraduate program in network engineering and security is presented. The paper was based on surveying and analyzing the current and projected future market demand for specialized network engineering graduates. The results of this paper concluded that the demand for such...

    Provided By mecs-press

  • White Papers // Mar 2012

    Adoption of Employment-Oriented Experience Training Program to Improve Undergraduates Employment Competence

    To enhance undergraduates employment competitive advantages, communication and expression capability and team cooperation ability in engineering practice experiences, an experience training program is adopted to cultivate compound international talents of software development required by software companies. For the training program, knowledge spans and integration extent of teaching contents, implementation flow...

    Provided By mecs-press

  • White Papers // Oct 2009

    Reducing Multicast Redundancy and Latency in Multi-Interface Multi-Channel Wireless Mesh Networks

    In wireless mesh networks, each node can be equipped with multiple network interface cards tuned to different channels. In this paper, the authors study the problem of collision-free multicast in multi-interface multi-channel wireless mesh networks. The concept of interface redundancy is proposed as a new criterion for the multicast/broadcast redundancy...

    Provided By mecs-press

  • White Papers // Feb 2012

    Element-Based Computational Model

    A variation on the data-flow model is proposed to use for developing parallel architectures. While the model is a data driven model it has significant differences to the data-flow model. The proposed model has an evaluation cycle of processing elements (encapsulated data) that is similar to the instruction cycle of...

    Provided By mecs-press

  • White Papers // Feb 2012

    Perceived Gender Classification From Face Images

    Perceiving human faces and modeling the distinctive features of human faces that contribute most towards face recognition are some of the challenges faced by computer vision and psychophysics researchers. There are many methods have been proposed in the literature for the facial features and gender classification. However, all of them...

    Provided By mecs-press

  • White Papers // Feb 2012

    A Frame of Intrusion Detection Learning System Utilizing Radial Basis Function

    The process of monitoring the events that occur in a computer system or network and analyzing them for signs of intrusion is known as Intrusion Detection System (IDS). Detection ability of most of the IDS are limited to known attack patterns; hence, new signatures for novel attacks can be troublesome,...

    Provided By mecs-press

  • White Papers // Feb 2012

    Using Virtual Security Lab in Teaching Cryptography

    Teaching Information Security for undergraduate students requires a safe hand-on environment for practicing. This paper focuses on using a virtual lab for two modules in cryptography concepts. At the end, a survey was conducted on a group of students at the Information Systems Department at the King Abdulaziz University to...

    Provided By mecs-press

  • White Papers // Feb 2012

    Finding Vulnerabilities in Rich Internet Applications (Flex/AS3) Using Static Techniques

    The number and the importance of Rich Internet Applications (RIA) have increased rapidly over the last years. At the same time, the quantity and impact of security vulnerabilities in such Rich Internet Applications (RIA) have increasing as well. Since manual code reviews are time consuming, error prone and costly and...

    Provided By mecs-press

  • White Papers // Feb 2012

    Development of Electronic Passport Scheme for Cryptographic Security and Face, Fingerprint Biometrics Using ASP.Net

    Biometric passports is to prevent the illegal entry of traveler into a specific country and limit the use of counterfeit documents by more accurate identification of an individual. The e-passport, as it is sometimes called, represents a bold initiative in the deployment of two new technologies: Cryptography security and biometrics...

    Provided By mecs-press

  • White Papers // Aug 2011

    Stability of Anti-Periodic Solutions for Certain Shunting Inhibitory Cellular Neural Networks

    In this paper, the existence and exponential stability of anti-periodic solutions for Shunting Inhibitory Cellular Neural Networks (SICNNs) with continuously distributed delays are considered by constructing suitable Lyapunov fuctions and applying some critical analysis techniques. The authors' result remove restrictive conditions of the global Lipschitz and bounded conditions of activation...

    Provided By mecs-press

  • White Papers // Aug 2011

    H-RBAC: A Hierarchical Access Control Model for SaaS Systems

    SaaS is a new way to deploy software as a hosted service and accessed over the Internet which means the customers don't need to maintain the software code and data on their own servers. So it's more important for SaaS systems to take security issues into account. Access control is...

    Provided By mecs-press

  • White Papers // May 2014

    A Survey for Replica Placement Techniques in Data Grid Environment

    In data grids, data replication on variant nodes can change some problems such as response time and availability. Also, in data replication, there are some challenges to finding the best replica efficiently in relation to performance and location of physical storage systems. In this paper, various replica placement strategies are...

    Provided By mecs-press

  • White Papers // Jun 2014

    Studies on ICT Usage in the Academic CampusUsing Educational Data Mining

    In the era of competition, change and complexity, innovation in teaching and learning practices in higher education sector has become unavoidable criteria. One of the biggest challenges that higher education system faces today is to assess the services provided through Information and Communication Technology (ICT) facilities installed in the campus....

    Provided By mecs-press

  • White Papers // Jun 2014

    Mathematical Modeling and Analysis of Network Service Failure in DataCentre

    World has become a global village. With the advent of technology, the concept of cloud computing has evolved a lot. Cloud computing offers various benefits in terms of storage, computation, cost and flexibility. It focuses on delivering combination of technological components such as applications, platforms, infrastructure, security and web hosted...

    Provided By mecs-press

  • White Papers // Jun 2014

    AnAutomatic Approach to Detect Software Anomalies in Cloud Computing Using Pragmatic Bayes Approach

    Software detection of anomalies is a vital element of operations in data centers and service clouds. Statistical Process Control (SPC) cloud charts sense routine anomalies and their root causes are identified based on the differential profiling strategy. By automating the tasks, most of the manual overhead incurred in detecting the...

    Provided By mecs-press

  • White Papers // Jun 2014

    A Harmony Search Algorithm with Multi-pitch Adjustment Rate for Symbolic Time Series Data Representation

    The representation task in time series data mining has been a critical issue because the direct manipulation of continuous, high-dimensional data is extremely difficult to complete efficiently. One time series representation approach is a symbolic representation called the Symbolic Aggregate approXimation (SAX). The main function of SAX is to find...

    Provided By mecs-press

  • White Papers // Jun 2014

    Router-based Content-aware Data Redirection for Future CDN Systems

    Delivery of data-enriched applications has become a top priority on the Internet, and Internet users are demanding faster and higher-quality services. Cater such requirements, Content Delivery Networks (CDNs) were introduced. However, the growth rate of information on the Internet requires infrastructural modifications to keep the consistency while maintaining quality of...

    Provided By mecs-press

  • White Papers // Feb 2014

    Classification via Clustering for Anonymization Data

    Due to the exponential growth of hardware technology particularly in the field of electronic data storage media and processing such data, has raised serious issues related in order to protect the individual privacy like ethical, philosophical and legal. Data mining techniques are employed to ensure the privacy. Privacy Preserving Data...

    Provided By mecs-press

  • White Papers // Aug 2014

    SysProp: A Web-Based Data Backup, Synchronization and System Administration

    From the inception of computer based computing, preventing data loss or data corruption is considered as one of the difficult challenges. In early days, data reliability had been increased by replicating data in multiple disks, which were attached with the same system and later located inside the same network. Later,...

    Provided By mecs-press

  • White Papers // Aug 2014

    Effect of Maintenance on Computer Network Reliability

    At the time of the new information technologies, computer networks are inescapable in any large organization, where they are organized so as to form powerful internal means of communication. In a context of dependability, the reliability parameter proves to be fundamental to evaluate the performances of such systems. In this...

    Provided By mecs-press

  • White Papers // Aug 2014

    Direction-of-Arrival Estimation for Stratospheric Platforms Mobile Stations

    In this paper, the authors present a new approach for localizing mobile phone users using the promising technique of Stratospheric Platform (SP) flying at altitudes 17-22 km high and a suitable Direction-Of-Arrival technique (DOA). The proposed technique provides information about accurate locations for mobile stations - through high resolution DOA...

    Provided By mecs-press

  • White Papers // Aug 2014

    Integrity Analysis of Multimedia File Transmission Between Mobile Phones

    Mobile forensics deals with evidence from mobile devices. Data recovered from the mobile devices are helpful in investigation to solve criminal cases. It is crucial to preserve the integrity of these data. According to research carried out, it has been noted that not all data extracted from mobile phones have...

    Provided By mecs-press

  • White Papers // Aug 2014

    Congestion Control in WMSNs by Reducing Congestion and Free Resources to Set Accurate Rates and Priority

    In this paper, the authors focus on mechanism for reducing congestion in the network by free resources to set accurate rates and priority data needs. If two nodes send their packets in the shortest path to the parent node in a crowded place, a source node must prioritize the data...

    Provided By mecs-press

  • White Papers // Aug 2014

    C2DF: High Rate DDOS Filtering Method in Cloud Computing

    Distributed Denial Of Service (DDOS) attacks have become one of the main threats in cloud environment. A DDOS attack can make large scale of damages to resources and access of the resources to genuine cloud users. Old-established defending system cannot be easily applied in cloud computing due to their relatively...

    Provided By mecs-press