mecs-press

Displaying 1-40 of 810 results

  • White Papers // May 2015

    Evaluation of Load Balancing Performance of Parallel Processing Linear Time-Delay Systems

    Time delays in system states or control may result into unacceptable system operation or uncertainty in specialized technical systems like aircraft control, plant control, robotics etc. The issue of robustness, controllability, traceability, flexible management, reliability and safety of such systems with time-delays, has been one of the primary research focuses...

    Provided By mecs-press

  • White Papers // May 2015

    Increasing ERP Implementation Success Ratio by Focusing on Data Quality & User Participation

    ERP systems projects have been spread widely across many organizations in general and Small and Medium Enterprises (SMEs) in particular. Regrettably, failures were the results for most of the ERP implementations. As a result of that, Critical Failure and Success Factors (CFFs & CSFs) have been identified with the help...

    Provided By mecs-press

  • White Papers // May 2015

    Integration of Heterogeneous Cloud Storages through an Intermediate WCF Service

    Many organizations provide computing resources or services to the client like hardware, software, storage etc. Storage is one of important service that is popular and commonly used today and it provides storage space online to store the data. Service providers give a storage space to consumers on the basis of...

    Provided By mecs-press

  • White Papers // Apr 2015

    Adaptive Inverse Model of Nonlinear Systems

    In this paper, the authors propose Nonlinear Adaptive Filter-Bank (NAFB) based algorithm for inverse modeling of nonlinear systems. Inverse modeling has been an important component for sensor linearization, adaptive control and channel equalization in communication system and active noise control. Under practical situations, the plant/system behaves nonlinearly which can be...

    Provided By mecs-press

  • White Papers // Apr 2015

    Multi-Objective Task Scheduling in the Cloud Computing based on the Patrice Swarm Optimization

    Cloud computing is the latest emerging trend in distributed computing, where shared resources are provided to end-users in an on demand fashion that brings many advantages, including data ubiquity, flexibility of access, high availability of resources and flexibility. In this type of systems many challenges are existed that the task...

    Provided By mecs-press

  • White Papers // Apr 2015

    Development of the Model of Dynamic Storage Distribution in Data Processing Centers

    In this paper, the authors review dynamic distribution of storage resources among the users in data processing centers. The process of changing memory usage state was revealed to be the process of Markov. The paper proposes the development of stochastic model of the memory and computing usage distribution and the...

    Provided By mecs-press

  • White Papers // Apr 2015

    A New Approach for Dynamic Virtual Machine Consolidation in Cloud Data Centers

    Cloud computing environments have introduced a new model of computing by shifting the location of computing infrastructure to the Internet network to reduce the cost associated with the management of hardware and software resources. The cloud model uses virtualization technology to effectively consolidate Virtual Machines (VMs) into Physical Machines (PMs)...

    Provided By mecs-press

  • White Papers // Apr 2015

    Scrutable Mobile Client-Side Personalization

    Personalization has become an essential feature of mobile services of different domains. On the other hand, users have conflicting needs of personalized experience and privacy. This leads to the question of how to maximize the user's experience of personalized mobile services while keeping privacy. One possible solution is to provide...

    Provided By mecs-press

  • White Papers // Mar 2015

    Feature Extraction or Feature Selection for Text Classification: A Case Study on Phishing Email Detection

    Dimensionality reduction is generally performed when high dimensional data like text are classified. This can be done either by using feature extraction techniques or by using feature selection techniques. This paper analyses which dimension reduction technique is better for classifying text data like emails. Email classification is difficult due to...

    Provided By mecs-press

  • White Papers // Mar 2015

    An Experimental Study of K Algorithm

    Machine Learning techniques are taking place in all areas of everyone lives, to help them to make decisions. There are a large number of algorithms available for multiple purposes and appropriate for specific data types. That is why it is required to pay special attention to decide which is the...

    Provided By mecs-press

  • White Papers // Mar 2015

    An Analysis of RDF Storage Models and Query Optimization Techniques

    The Web provides access to substantial amount of information. Metadata that means data about data enables the discovery of such information. When the metadata is effectively used, it increases the usefulness of the original data/resource and facilitates the resource discovery. Resource Description Framework (RDF) is a basis for handling these...

    Provided By mecs-press

  • White Papers // Mar 2015

    Microcontroller based Home Security and Load Controlling using GSM Technology

    Home automation referred to as 'Intelligent home' or 'Automated home', indicates the automation of daily tasks with electrical devices used in homes. This could be the control of lights or more complex chores such as remote viewing of the house interiors for surveillance purposes. The emerging concept of smart homes...

    Provided By mecs-press

  • White Papers // Mar 2015

    Matlab-based Computer-Aided-Design Algorithm for Designing Stepped-Impedance Resonator Low-Pass Filters in Microstrip Technology

    An accurate MATLAB-based CAD (Computer Aided Design) algorithm for quickly designing microstrip-based Stepped-Impedance Resonator (SIR) low-pass filter is reported. The algorithm uses a circuit-theory approach to implement speedy computations, compared to the time-consuming computations involved in using electromagnetic theory. The accuracy of the proposed algorithm is verified for two widely-different...

    Provided By mecs-press

  • White Papers // Mar 2015

    Hypervisors' Guest Isolation Capacity Evaluation in the Private Cloud using SIAGR Framework

    Hypervisor vendors do claim that they have negated virtualization overhead compared to a native system. They also state that complete guest isolation is achieved while running multiple guest Operating Systems (OSs) on their hypervisors. But in a virtualization environment which is a combination of hardware, hypervisor and Virtual Machines (VMs)...

    Provided By mecs-press

  • White Papers // Mar 2015

    Delay Scheduling Based Replication Scheme for Hadoop Distributed File System

    The data generated and processed by modern computing systems burgeon rapidly. MapReduce is an important programming model for large scale data intensive applications. Hadoop is a popular open source implementation of MapReduce and Google File System (GFS). The scalability and fault-tolerance feature of Hadoop makes it as a standard for...

    Provided By mecs-press

  • White Papers // Mar 2015

    A Novel Quaternary Full Adder Cell Based on Nanotechnology

    Binary logic circuits are limited by the requirement of interconnections. A feasible solution is to transmit more information over a signal line and utilizing Multiple-Valued Logic (MVL). This paper presents a novel high performance quaternary full adder cell based on Carbon NanoTube Field Effect Transistor (CNTFET). The proposed Quaternary full...

    Provided By mecs-press

  • White Papers // Feb 2015

    Optimized Speech Compression Algorithm Based on Wavelets Techniques and its Real Time Implementation on DSP

    This paper presents an optimized speech compression algorithm using discrete wavelet transform, and its real time implementation on fixed-point Digital Signal Processor (DSP). The optimized speech compression algorithm presents the advantages to ensure low complexity, low bit rate and achieve high speech coding efficiency and this by adding a Voice...

    Provided By mecs-press

  • White Papers // Jan 2015

    PD Controller Structures: Comparison and Selection for an Electromechanical System

    Many different PD controller modeling, configurations and control algorithms have been developed. These methods differ in their theoretical basis and performance under the changes of system conditions. In the present paper, the authors review the methods used in the design of PD control systems. They highlight the main difficulties and...

    Provided By mecs-press

  • White Papers // Jan 2015

    A Web 2.0 Supported Business Process Management Environment for Collaborative Research

    Collaborative research includes research activities conducted by a group of people working at different locations and has become a hot issue due to the effects of globalization and advances in Information Technology (IT). This paper is to design, develop, implement and evaluate an IT environment to better manage the standard...

    Provided By mecs-press

  • White Papers // Jan 2015

    Enable Better and Timelier Decision-Making Using Real-Time Business Intelligence System

    Today's businesses need support when making decisions. Business intelligence (BI) helps businesses to make decisions based on good pre-analysis and documented data and enables information to be presented when and where the decisions need to be made. Real Time Business Intelligence (RTBI) presents numbers in real time, providing the decision...

    Provided By mecs-press

  • White Papers // Jan 2015

    A Comprehensive Survey on Cloud Computing

    Cloud computing is an innovation ideas that helps in reducing the computing cost. Cloud computing offers better computing through improved utilization and reduced administration and infrastructure costs. Cloud computing is the long-held dream of computing as a utility. Cloud computing is the combination of Software as a Service (SaaS) and...

    Provided By mecs-press

  • White Papers // Jan 2015

    Intelligent Adaptive Gain Backstepping Technique

    In this paper, the authors presented intelligent adaptive backstepping control as robust control for continuum robot. This paper is to design a Proportional-Derivative (PD) fuzzy system to compensate the system model uncertainties. It is focused on the design tuning gain adaptive methodology according to high quality partly nonlinear methodology. Conventional...

    Provided By mecs-press

  • White Papers // Jan 2015

    A Swarm Intelligence based Model for Mobile Cloud Computing

    Mobile Computing (MC) provides multi services and a lot of advantages for millions of users across the world over the internet. Millions of business customers have leveraged cloud computing services through mobile devices to get what is called Mobile Cloud Computing (MCC). MCC aims at using cloud computing techniques for...

    Provided By mecs-press

  • White Papers // Jan 2015

    OpenMP Dual Population Genetic Algorithm for Solving Constrained Optimization Problems

    Dual population genetic algorithm is an effective optimization algorithm that provides additional diversity to the main population. It deals with the premature convergence problem as well as the diversity problem associated with genetic algorithm. But dual population introduces additional search space that increases time required to find an optimal solution....

    Provided By mecs-press

  • White Papers // Jan 2015

    A Novel Testing Model for SOA Based Services

    SOA (Service-Oriented Architecture) filled the gap between software and commercial enterprise. SOA integrates multiple web services. The authors bear to secure the caliber of web services that gives guarantee about what network services work and their output results. There is close to work has to be performed for an automatic...

    Provided By mecs-press

  • White Papers // Jan 2015

    Using Wavelet-Based Contourlet Transform Illumination Normalization for Face Recognition

    Evidently, the results of a face recognition system can be influenced by image illumination conditions. Regarding this, the authors proposed a system using wavelet-based contourlet transform normalization as an efficient method to enhance the lighting conditions of a face image. Particularly, this method can sharpen a face image and enhance...

    Provided By mecs-press

  • White Papers // Dec 2014

    Modeling the Scheduling Problem of Identical Parallel Machines with Load Balancing by Time Petri Nets

    The optimal resources allocation to tasks was the primary objective of the research dealing with scheduling problems. These problems are characterized by their complexity, known as NP-hard in most cases. Currently with the evolution of technology, classical methods are inadequate because they degrade system performance (inflexibility, inefficient resources using policy,...

    Provided By mecs-press

  • White Papers // Dec 2014

    Simulation Studies of Silica and High K Oxide Contained MOS Circuits (45nm, 32nm and 22nm) for Power Dissipation Reduction

    Advances in semiconductor technology lead to the advancements in integrated circuits which have enhanced performance, reliability, cost effective, low power consumption, etc. To build a complex digital circuitry, millions of transistors are to be embedded onto a single chip to increase the performance and to improve the reliability of the...

    Provided By mecs-press

  • White Papers // Dec 2014

    A New OWL2 based Approach for Relational Database Description

    Now-a-days, the scientific community is more and more interested by the mediation problem within Peer-To-Peer (P2P) systems and by data sources migration within the semantic web. Data integration and interoperability become a necessity to meet the need for information exchange between heterogeneous information systems. They reflects the ability of an...

    Provided By mecs-press

  • White Papers // Dec 2014

    Comparative Analysis of Various SRAM Cells with Low Power, High Read Stability and Low Area

    SRAMs are very important part of today's movable devices like laptops and mobile phones. Different SRAM cells of different number of transistors have their own respective advantages and drawbacks. In this paper, an attempt has been made to reduce the leakage power by adding some transistors. Each SRAM cell provides...

    Provided By mecs-press

  • White Papers // Dec 2014

    A Light-Weight Symmetric Encryption Algorithm Based on Feistel Cryptosystem Structure

    WSNs is usually deployed in opening wireless environment, its data is easy to be intercepted by attackers. It is necessary to adopt some encryption measurements to protect data of WSNs. But the battery capacity, CPU performance and RAM capacity of WSNs sensors are all limited; the complex encryption algorithm is...

    Provided By mecs-press

  • White Papers // Dec 2014

    Mean Response Time Approximation for HTTP Transactions over Transport Protocols

    In this paper, the authors address mean response time that end-users experience when using the Internet. HTTP (Hyper Text Transfer Protocol) is a widely used transfer protocol to retrieve web objects in the Internet. Generally, HTTP uses TCP (Transmission Control Protocol) in a transport layer. But it is known that...

    Provided By mecs-press

  • White Papers // Dec 2014

    An Improvement Over a Server-Less RFID Authentication Protocol

    With the increased Radio Frequency IDentification (RFID) applications different authentication schemes have been proposed in order to meet the required properties. In this paper, the authors analyze the security of a server-less RFID authentication protocol which is proposed in 2014. The researcher proposed an improvement over Hoque protocol to overcome...

    Provided By mecs-press

  • White Papers // Dec 2014

    Performance Evaluation of Distributed Protocols Using Different Levels of Heterogeneity Models in Wireless Sensor Networks

    Most of the protocols for enhancing the lifetime of Wireless Sensor Networks (WSNs) are of a homogeneous nature in which all sensors have equal amount of energy level. In this paper, the authors study the effect of heterogeneity on the homogeneous protocols. The ALBPS and ADEEPS are the two important...

    Provided By mecs-press

  • White Papers // Dec 2014

    Design of a Web Interface for Fractional Chaotic Systems

    There exists a great number of works related to chaotic systems investigated by many researchers, especially about Lorenz chaotic system. If the order of differentiation of variables is fractional, the systems are called fractional chaotic systems. In this paper, a web-based interface is designed for fractional composition of five different...

    Provided By mecs-press

  • White Papers // Dec 2014

    Analysis and Comparison of Access Control Policies Validation Mechanisms

    Validation and verification of security policies is a critical and important task to ensure that access control policies are error free. The two most common problems present in access control policies are: inconsistencies and incompleteness. In order to detect such problems, various access control policy validation mechanisms are proposed by...

    Provided By mecs-press

  • White Papers // Dec 2014

    TSSR: A Proposed Tool for Secure Software Requirement Management

    In this paper, the authors provide a unified framework in which entire design of the project can be captured right from the beginning of the software development. This paper discusses about the requirements which should be included in the development of the requirement management tools. As the requirements, criteria which...

    Provided By mecs-press

  • White Papers // Dec 2014

    Video Quality Analysis of Distributed Video Coding in Wireless Multimedia Sensor Networks

    Multimedia communications in wireless sensor networks is a very challenging task. Video coding with high computational complexity and great contribution to the energy consumption of nodes and video transmission over erroneous wireless channel are the main reasons of these challenges. Distributed video coding has high potential for being deployed in...

    Provided By mecs-press

  • White Papers // Dec 2014

    An Empirical Study on Testing of SOA based Services

    Service-Oriented Architecture (SOA) removed the gap between software and business. Today, there is a business transformation among enterprises and they adopt a service based Information Technology (IT) model. So, testing is necessary for SOA based applications. This paper investigates different type of approaches and techniques that address the testing problems...

    Provided By mecs-press

  • White Papers // Dec 2014

    Evaluating the Maintainability of a Software System by using Fuzzy Logic Approach

    Maintainability is an important quality attribute for almost every quality model. Maintainability of the software is considered as most expensive phase in software development life cycle as it consumes almost major part of the total effort allocated to the software system. Maintainability evaluation is complex due to its imprecise output....

    Provided By mecs-press

  • White Papers // Oct 2009

    Modeling and Analysis on a DTN Based Wireless Sensor Network Topology Control

    Wireless Sensor Networks (WSNs) have unlimited and extensive potential application in different areas. Due to WSNs' work environments and nodes behavior, intermitted network connection may occur frequently, which lead packets delay and lose in the process of data transmission. Most related works on WSNs, seldom consider how to address the...

    Provided By mecs-press

  • White Papers // Nov 2010

    Low-Power Wireless Pressure Transmitter and Net of Oil-Well Based on Zigbee

    The paper introduced a low-power wireless pressure transmitter for measure pressure and temperature of oil-well. To avoid wiring cables onsite, ZICM2410 was adopted to construct Wireless Sensor Network (WSN), and powered by Li-Ion battery. To reduce the power consumption, MSP430F477 and other low-power chips were used to construct the hardware,...

    Provided By mecs-press

  • White Papers // Oct 2009

    Research of Intrusion Detection Technology and Its Formal Modeling

    The intrusion detection technology is one of the most important dynamic security technologies, which can be used in the critical security system construction and the basic service protection. Apparently, applying formal specification to the procedure of developing an intrusion detection system can fulfill their security requirement and win the confidence...

    Provided By mecs-press

  • White Papers // Nov 2010

    Performance Analysis of Spatial Reused Bandwidth Reservation in Ad Hoc Networks

    In this paper, an approach for spatial reused bandwidth reservation in ad hoc networks is proposed. Resource reservation in wireless networks is an essential component that is needed to support multimedia and real-time applications, such as audio/video conferencing. On the other hand, directional antenna technology provides the capability for considerable...

    Provided By mecs-press

  • White Papers // Nov 2010

    A Wireless Video Transmission Scheme Based on MAC-Independent Opportunistic Routing & Encoding Protocol

    It is a tremendous challenge to transmit real-time video streams over wireless sensor network because of the poor wireless communication conditions and the high requirements of video transmission. The opportunistic routing protocol can take advantage of the broadcast nature of wireless communication and can improve transfer throughput significantly. But the...

    Provided By mecs-press

  • White Papers // Apr 2011

    A Proxy Based Framework for Efficient Range Query Processing in a Cellular Network

    Within the last decade, the continuous development of mobile technology has motivated an intense research in mobile data services. Among these services, location-based services and location-dependant queries have attracted a lot of attention from the software industry as well as from researchers. Although a number of locations based service methods...

    Provided By mecs-press

  • White Papers // May 2011

    A Cost-Aware Resource Selection for Dataintensive Applications in Cloud-Oriented Data Centers

    As a kind of large-scale user-oriented data-intensive computing, cloud computing allows users to utilize on-demand computation, storage, data and services from around the world in a pay-as-you-go model. In cloud environment, applications need access to mass datasets that may each be replicated on different resources (or data centers). Mass data...

    Provided By mecs-press

  • White Papers // Apr 2011

    Mixed QoS Controlled Wireless Streaming Media Transmission Strategy

    Streaming media applications is currently limited by high bandwidth requirements. It is a challenging problem to provide the required Quality of Service (QoS) for the efficient transmission of video data under the varying network conditions such as the time-varying packet loss and fluctuating bandwidth. On Internet the most important part...

    Provided By mecs-press

  • White Papers // Feb 2011

    A WMPLS Based Multicast Mechanism in Mobile Ad Hoc Network

    Merging MPLS into multicast routing protocol in mobile ad hoc network is an elegant method to enhance the network performance and an efficient solution for multicast scalability and control overhead problems. Based on the Wireless MPLS technology, the mechanism and evaluation of a new multicast protocol, the Label Switching Multicast...

    Provided By mecs-press

  • White Papers // Dec 2010

    Semantic Management Information Modeling Based on Theory of Concept Lattices

    With the development of future Internet, it is of great significance to study how to realize unified management information modeling, in order to avoid a lot of repetitive work and standardize information modeling in network management domain. This paper discusses the problem from the ontology point of view and introduces...

    Provided By mecs-press

  • White Papers // Mar 2012

    Developing E-Business Strategies Curriculum Case Study in the Information Systems Department

    E-Business Strategies (EBS) is an elective course in the Information Systems Department, Faculty of Computing & Information Technology at King Abdulaziz University, Jeddah. In this course, students learn many concepts regarding e-business, such as strategies, models, relationships and so on. Also, they improve their leadership skills, such as analyzing the...

    Provided By mecs-press

  • White Papers // Mar 2012

    Learning the Related Mathematics to Cryptography by Interactive Way

    Cryptography is a complex area in the computer science field due to the complexity of the mathematics involved. The main goal of this paper is to discuss how the authors can take an advantage of the online interactive tools to facilitate this complex topic. These interactive tools can enhance the...

    Provided By mecs-press

  • White Papers // Mar 2012

    Improve Teaching Method of Data Mining Course

    It is clearly perceived that most of theoretical information, the authors teach to students are lost after graduation, mostly because abstract information do not last in students' minds much longer than the final exams, as they are not related to practical aspects and uses. Though labs are useful, they are...

    Provided By mecs-press

  • White Papers // Mar 2012

    Gender Differences on Information Literacy of Science and Engineering Undergraduates

    Information Literacy (IL) forms the basis of lifelong learning and plays very important role for students majoring in science and engineering. As far as higher education concerned, gender differences to may influence students' academic achievements. In order to evaluate the gender differences on information literacy of undergraduates, the authors surveyed...

    Provided By mecs-press

  • White Papers // Mar 2012

    Robust Algorithm for Face Detection in Color Images

    Robust Algorithm is presented for frontal face detection in color images. Face detection is an important task in facial analysis systems in order to have a priori localized faces in a given image. Applications such as face tracking, facial expression recognition, gesture recognition, etc., for example, have a pre-requisite that...

    Provided By mecs-press

  • White Papers // Mar 2012

    Issues of Technical Support for e-Learning Systems in Higher Education Institutions

    Information and Communication Technologies (ICTs) have provided several tools to facilitate higher education. However, their effective use demands technical expertise to achieve the required academic goals. The university constituents (teachers, students and administrators) are given e-Training but this is not enough. Every e-Learning system establishes a basic 'Infrastructure' of computers,...

    Provided By mecs-press

  • White Papers // Mar 2012

    Undergraduate Program in Network Engineering and Security - A Feasibility Study

    In this paper, a feasibility study for initiating a new undergraduate program in network engineering and security is presented. The paper was based on surveying and analyzing the current and projected future market demand for specialized network engineering graduates. The results of this paper concluded that the demand for such...

    Provided By mecs-press

  • White Papers // Mar 2012

    Adoption of Employment-Oriented Experience Training Program to Improve Undergraduates Employment Competence

    To enhance undergraduates employment competitive advantages, communication and expression capability and team cooperation ability in engineering practice experiences, an experience training program is adopted to cultivate compound international talents of software development required by software companies. For the training program, knowledge spans and integration extent of teaching contents, implementation flow...

    Provided By mecs-press

  • White Papers // Feb 2012

    Element-Based Computational Model

    A variation on the data-flow model is proposed to use for developing parallel architectures. While the model is a data driven model it has significant differences to the data-flow model. The proposed model has an evaluation cycle of processing elements (encapsulated data) that is similar to the instruction cycle of...

    Provided By mecs-press

  • White Papers // Feb 2012

    Perceived Gender Classification From Face Images

    Perceiving human faces and modeling the distinctive features of human faces that contribute most towards face recognition are some of the challenges faced by computer vision and psychophysics researchers. There are many methods have been proposed in the literature for the facial features and gender classification. However, all of them...

    Provided By mecs-press

  • White Papers // Feb 2012

    A Frame of Intrusion Detection Learning System Utilizing Radial Basis Function

    The process of monitoring the events that occur in a computer system or network and analyzing them for signs of intrusion is known as Intrusion Detection System (IDS). Detection ability of most of the IDS are limited to known attack patterns; hence, new signatures for novel attacks can be troublesome,...

    Provided By mecs-press

  • White Papers // Feb 2012

    Using Virtual Security Lab in Teaching Cryptography

    Teaching Information Security for undergraduate students requires a safe hand-on environment for practicing. This paper focuses on using a virtual lab for two modules in cryptography concepts. At the end, a survey was conducted on a group of students at the Information Systems Department at the King Abdulaziz University to...

    Provided By mecs-press

  • White Papers // Feb 2012

    Finding Vulnerabilities in Rich Internet Applications (Flex/AS3) Using Static Techniques

    The number and the importance of Rich Internet Applications (RIA) have increased rapidly over the last years. At the same time, the quantity and impact of security vulnerabilities in such Rich Internet Applications (RIA) have increasing as well. Since manual code reviews are time consuming, error prone and costly and...

    Provided By mecs-press

  • White Papers // Feb 2012

    Development of Electronic Passport Scheme for Cryptographic Security and Face, Fingerprint Biometrics Using ASP.Net

    Biometric passports is to prevent the illegal entry of traveler into a specific country and limit the use of counterfeit documents by more accurate identification of an individual. The e-passport, as it is sometimes called, represents a bold initiative in the deployment of two new technologies: Cryptography security and biometrics...

    Provided By mecs-press

  • White Papers // Aug 2011

    Stability of Anti-Periodic Solutions for Certain Shunting Inhibitory Cellular Neural Networks

    In this paper, the existence and exponential stability of anti-periodic solutions for Shunting Inhibitory Cellular Neural Networks (SICNNs) with continuously distributed delays are considered by constructing suitable Lyapunov fuctions and applying some critical analysis techniques. The authors' result remove restrictive conditions of the global Lipschitz and bounded conditions of activation...

    Provided By mecs-press

  • White Papers // Aug 2011

    H-RBAC: A Hierarchical Access Control Model for SaaS Systems

    SaaS is a new way to deploy software as a hosted service and accessed over the Internet which means the customers don't need to maintain the software code and data on their own servers. So it's more important for SaaS systems to take security issues into account. Access control is...

    Provided By mecs-press

  • White Papers // Dec 2012

    Fault Tolerant Message Efficient Coordinator Election Algorithm in High Traffic Bidirectional Ring Network

    Now-a-days use of distributed systems such as internet and cloud computing is growing dramatically. Coordinator existence in these systems is crucial due to processes coordinating and consistency requirement as well. However the growth makes their election algorithm even more complicated. Too many algorithms are proposed in this area, but the...

    Provided By mecs-press

  • White Papers // Jan 2013

    Rigorous Progress on Algorithms Based Routing and Wavelength Assignment in Trans-Egypt Network (TEGYNET) Management

    In simple Wavelength-Division Multiplexed (WDM) networks, a connection must be established along a route using a common wavelength on all of the links along the route. The introduction of wavelength converters into WDM cross connects increases the hardware cost and complexity. Given a set of connection requests, the routing and...

    Provided By mecs-press

  • White Papers // Jan 2013

    Hybrid Model for Location Privacy in Wireless Ad-Hoc Networks

    In the today's fast growing world, use of internet is increasing popularly and at the same time Location-Based Services (LBS) are also getting more popular. LBS providers require user's current locations to answer their location-based queries. The primary objective of the present work is to develop a system which preserves...

    Provided By mecs-press

  • White Papers // Jan 2013

    Effective Congestion Avoidance Scheme for Mobile Ad Hoc Networks

    Mobile nodes are organized randomly without any access point in Mobile Ad hoc NETworks (MANETs). Due to the mobility of nodes, the network congestion occurs. So many congestion control mechanisms were proposed to avoid the congestion avoidance or reducing the congestion status. In this research work, the authors proposed to...

    Provided By mecs-press

  • White Papers // Jan 2013

    Performance Comparison and Evaluation of Different Multipath Routing Protocols Based on Various Scenario and Traffic Patterns for Mobile AD Hoc Networks

    A MANET is an interconnection of mobile devices by wireless links forming a dynamic topology without much physical network infrastructure such as routers, servers, access points/cables or centralized administration. The multipath routing protocols establish efficient communication within the network by discovering multiple routes between a pair of source and destination...

    Provided By mecs-press

  • White Papers // Jan 2013

    Performance Evaluation of Security-Throughput Tradeoff with Channel Adaptive Encryption

    With the ever increasing volume of information over wireless medium, security has assumed an important dimension. The security of transmitted data over a wireless channel aims at protecting the data from unauthorized intrusion. Wireless network security is achieved using cryptographic primitives. Some properties that give encryption mechanism their cryptographic strength...

    Provided By mecs-press

  • White Papers // Jan 2013

    An Efficient Novel Key Management Scheme for Enhancing User Authentication in A WSN

    The Wireless Sensor Networks are energy constrained and are normally low cost and low power devices. These nodes are deployed over a specific area for specific goals. Due to energy and memory constraints, secure communication among these sensors is challenging management issue. In order to ensure security, proper connectivity among...

    Provided By mecs-press

  • White Papers // Feb 2013

    Integrated Safety Mechanisms Based on Security Risks Minimization for the Distributed Computer Systems

    Today, there are known the basic principles of decision-making on the safety control of distributed computer systems in the face of uncertainty and risk. However, in this area there are no practical methods for the quantitative risk analysis and assessment, taking into account the dynamic changes of security threats, which...

    Provided By mecs-press

  • White Papers // Feb 2013

    Selection of Next Generation Anti-Virus against Virus Attacks in Networks Using AHP

    Defending against virus attacks in network is a vital part of network security. With the rapid evolution of viruses, its defense mechanism has also been evolved over the years. But given the diversity and complexity of virus propagation and its attack behavior, no defense mechanism is equipped fully to protect...

    Provided By mecs-press

  • White Papers // Mar 2013

    Reinforcement Swap Attack Against Directed Diffusion in Wireless Sensor Networks

    In this paper, the authors introduce a new attack, Reinforcement Swap Attack, against Directed Diffusion based WSNs, which exploits the vulnerabilities of Directed Diffusion specifications. Its main idea is the disruption of configuration information, such as routing information to misuse route establishment along the network. Their approach is to swap...

    Provided By mecs-press

  • White Papers // Mar 2013

    A Framework for Real-Time Resource Allocation in IP Multimedia Subsystem Network

    IMS (IP Multimedia Subsystem) is designed to provide multiple-services and can be accessed from any access network. With the advent of new multimedia services; user requirement also changed and required delay tolerant services from the service providers. The new multimedia services demands the restrictions on network parameters and this can...

    Provided By mecs-press

  • White Papers // Mar 2013

    Comparative Analysis of AODV, OLSR, TORA, DSR and DSDV Routing Protocols in Mobile Ad-Hoc Networks

    Mobile Ad-Hoc NETworks (MANETs) are autonomous and decentralized wireless systems. Mobile Ad hoc Network is a collection of mobile nodes in which the wireless links are frequently broken down due to mobility and dynamic infrastructure. Routing is a significant issue and challenge in ad hoc networks. Many Routing protocols have...

    Provided By mecs-press

  • White Papers // Mar 2013

    User's Profile Replication Tree and On Demand Replica Update in Wireless Communication

    Replication strategy is mostly useful for replicating the called mobile user's profile at selected locations where some caller mobile users have higher calling rate. It plays important role in personal communication services (PCS) in order to reduce call setup cost and call setup time. In prior replication schemes, replicated sites...

    Provided By mecs-press

  • White Papers // Apr 2013

    Formal Verification of Congestion Control Algorithm in VANETs

    A Vehicular Ad-Hoc NETworks (VANETs) is the technology that uses moving cars as nodes in a network to create a mobile network. VANETs turn every participating car into a wireless router, allowing cars of each other to connect and create a network with a wide range. VANETs are developed for...

    Provided By mecs-press