mecs-press

Displaying 1-40 of 342 results

  • White Papers // Jun 2014

    Router-based Content-aware Data Redirection for Future CDN Systems

    Delivery of data-enriched applications has become a top priority on the Internet, and Internet users are demanding faster and higher-quality services. Cater such requirements, Content Delivery Networks (CDNs) were introduced. However, the growth rate of information on the Internet requires infrastructural modifications to keep the consistency while maintaining quality of...

    Provided By mecs-press

  • White Papers // Jun 2014

    Studies on ICT Usage in the Academic CampusUsing Educational Data Mining

    In the era of competition, change and complexity, innovation in teaching and learning practices in higher education sector has become unavoidable criteria. One of the biggest challenges that higher education system faces today is to assess the services provided through Information and Communication Technology (ICT) facilities installed in the campus....

    Provided By mecs-press

  • White Papers // Jun 2014

    Mathematical Modeling and Analysis of Network Service Failure in DataCentre

    World has become a global village. With the advent of technology, the concept of cloud computing has evolved a lot. Cloud computing offers various benefits in terms of storage, computation, cost and flexibility. It focuses on delivering combination of technological components such as applications, platforms, infrastructure, security and web hosted...

    Provided By mecs-press

  • White Papers // Jun 2014

    AnAutomatic Approach to Detect Software Anomalies in Cloud Computing Using Pragmatic Bayes Approach

    Software detection of anomalies is a vital element of operations in data centers and service clouds. Statistical Process Control (SPC) cloud charts sense routine anomalies and their root causes are identified based on the differential profiling strategy. By automating the tasks, most of the manual overhead incurred in detecting the...

    Provided By mecs-press

  • White Papers // Jun 2014

    A Harmony Search Algorithm with Multi-pitch Adjustment Rate for Symbolic Time Series Data Representation

    The representation task in time series data mining has been a critical issue because the direct manipulation of continuous, high-dimensional data is extremely difficult to complete efficiently. One time series representation approach is a symbolic representation called the Symbolic Aggregate approXimation (SAX). The main function of SAX is to find...

    Provided By mecs-press

  • White Papers // May 2014

    A Survey for Replica Placement Techniques in Data Grid Environment

    In data grids, data replication on variant nodes can change some problems such as response time and availability. Also, in data replication, there are some challenges to finding the best replica efficiently in relation to performance and location of physical storage systems. In this paper, various replica placement strategies are...

    Provided By mecs-press

  • White Papers // Feb 2014

    Classification via Clustering for Anonymization Data

    Due to the exponential growth of hardware technology particularly in the field of electronic data storage media and processing such data, has raised serious issues related in order to protect the individual privacy like ethical, philosophical and legal. Data mining techniques are employed to ensure the privacy. Privacy Preserving Data...

    Provided By mecs-press

  • White Papers // Feb 2014

    Robustness Analysis of Layered Public Transport Networks Due to Edge Overload Breakdown

    The robustness of urban bus-transport networks has important influence on the network performance. This paper proposes the model of layered public bus-transport network which is composed of the logical layer and the physical layer and expounds the relationship between these two layers. The authors map the bus-transport network into two...

    Provided By mecs-press

  • White Papers // Feb 2014

    Public vs Private vs Hybrid vs Community - Cloud Computing: A Critical Review

    These days cloud computing is booming like no other technology. Every organization whether it's small, mid-sized or big, wants to adapt this cutting edge technology for its business. As cloud technology becomes immensely popular among these businesses, the question arises: which cloud model to consider for the users business? There...

    Provided By mecs-press

  • White Papers // Feb 2014

    Enhanced Role Based Access Control Mechanism for Electronic Examination System

    Over the years, e-learning and e-examination has become standard in many institutions of higher learning. It has been observed that examination questions and results can be easily intercepted by invalid users, thus the security of resources shared among valid users is not guaranteed. In order to solve these problems as...

    Provided By mecs-press

  • White Papers // Feb 2014

    Modeling GSM Based Network Communication in Vehicular Network

    Obviously fair communication establishment in every technology increases the efficiency. As the authors know well, vehicles are used in day to day life of every human being to move from one location to another location. If network communication is formed between vehicles, mobile phones and home based telephones, it will...

    Provided By mecs-press

  • White Papers // Feb 2014

    A Hybrid RBF-SVM Ensemble Approach for Data Mining Applications

    One of the major developments in machine learning in the past decade is the ensemble method, which finds highly accurate classifier by combining many moderately accurate component classifiers. This paper addresses using an ensemble of classification methods for data mining applications like intrusion detection, direct marketing, and signature verification. In...

    Provided By mecs-press

  • White Papers // Jan 2014

    Defending Against Malicious Threats in Wireless Sensor Network: A Mathematical Model

    Wireless sensor networks offer a powerful combination of distributed sensing, computing and communication. They lend themselves to countless applications and at the same time constrained by limited battery life, processing capability, memory and bandwidth which makes it soft target of malicious objects such as virus and worms. The authors study...

    Provided By mecs-press

  • White Papers // Jan 2014

    Efficient Analysis of Pattern and Association Rule Mining Approaches

    The process of data mining produces various patterns from a given data source. The most recognized data mining tasks are the process of discovering frequent itemsets, frequent sequential patterns, frequent sequential rules and frequent association rules. Numerous efficient algorithms have been proposed to do the above processes. Frequent pattern mining...

    Provided By mecs-press

  • White Papers // Jan 2014

    An Integrated Agent-Based Architecture and Performance Optimization of VANET using Agent Packet Size Reduction Process

    The advancements of Information Technology have led to many developments that make life easier and faster with high reachability and efficiency. There is a drastic improvement in the area of distributed applications with the advent of mobile agent technology over the usual client/server framework. Applying mobile agent technology in the...

    Provided By mecs-press

  • White Papers // Jan 2014

    Grid Approach with Metadata of Messages in Service Oriented Architecture

    Service orientation architecture is playing a vital role in the middleware and enterprise organizations through its key design principles and there are many benefits of it as well. Loose Coupling between services is one of its design principles that help system or architecture to maintain its efficiency because services are...

    Provided By mecs-press

  • White Papers // Jan 2014

    E-mail Spam Filtering Using Adaptive Genetic Algorithm

    Now-a-days everybody email inbox is full with spam mails. The problem with spam mails is that they are not malicious in nature so generally don't get blocked with firewall or filters etc., however, they are unwanted mails received by any internet users. In 2012, more that 50% emails of the...

    Provided By mecs-press

  • White Papers // Jan 2014

    Strategic Sensor Placement for Intrusion Detection in Network-Based IDS

    Network Intrusion Detection Systems (NIDSs) can be composed of a potentially large number of sensors, which monitor the traffic flowing in the network. Deciding where sensors should be placed and what information they need in order to detect the desired attacks can be a demanding task for network administrators, one...

    Provided By mecs-press

  • White Papers // Jan 2014

    Performance Analysis of Multi Functional Bot System Design Using Microcontroller

    In this paper the authors include performance analysis of a multipurpose microcontroller based system which has various modes to control distinct applications. The paper elucidates how a single chip microcontroller can process different signals and accomplish different tasks. The system discussed in this paper has seven modes. Each mode controls...

    Provided By mecs-press

  • White Papers // Jan 2014

    Implementation of Enhanced Security Algorithms in Mobile Ad hoc Networks

    Mobile ad hoc networks are wireless infrastructure fewer networks can be easily formed or deployed due to its simple infrastructure. Security has become a primary concern in order to provide protected communication between mobile nodes in a hostile environment. The main objective of this work is to enhance the performance...

    Provided By mecs-press

  • White Papers // Jan 2014

    Hybrid Intrusion Detection Using Ensemble of Classification Methods

    One of the major developments in machine learning in the past decade is the ensemble method, which finds highly accurate classifier by combining many moderately accurate component classifiers. In this paper, new ensemble classification methods are proposed for homogeneous ensemble classifiers using bagging and heterogeneous ensemble classifiers using arcing classifier...

    Provided By mecs-press

  • White Papers // Jan 2014

    Minimization of Power Consumption in Mobile Ad hoc Networks

    An ad hoc network is a mobile wireless network that has no fixed access point or centralized infrastructure. Each node in the network functions as a mobile router of data packets for other nodes and should maintain the network routes for long standing which is not possible due to limited...

    Provided By mecs-press

  • White Papers // Jan 2014

    A Novel Mutual RFID Authentication Protocol with Low Complexity and High Security

    Radio Frequency IDentification (RFID) is a method for automated identifying objects. One of the problems of this technology is its security. RFID tags include resource limitation; therefore, the system designers cannot implement complex circuits to enhance their security. Usually the symmetric and asymmetric encryption methods increase resources and cost. Because...

    Provided By mecs-press

  • White Papers // Jan 2014

    Secure and Dynamic Model for Book Searching on Cloud Computing as Mobile Augmented Reality

    Availability of internet on different devices like smart phones like android based, IOs based, windows based and PDA etc. has brought into the evolution of mobile cloud computing, which is a vast side of research nowadays. Internet connectivity has become very easy with the evolution of Wi-Fi; everyone can access...

    Provided By mecs-press

  • White Papers // Jan 2014

    Reference Threshold Calculation for Biometric Authentication

    In biometric systems, reference threshold is defined as a value that can decide the authenticity of a person. Authenticity means whether the person is genuine or intruder. The statistical calculation of various values like reference threshold, FAR (False Acceptance Rate), FRR (False Rejection Rate) is required for real-time automated biometric...

    Provided By mecs-press

  • White Papers // Jan 2014

    Distributed Denial of Service Attacks: A Review

    A Wireless Sensor Network (WSN) is a wireless network consisting of spatially distributed autonomous devices using sensors to monitor physical or environmental conditions.WSN is a flourishing network that has numerous applications and could be used in diverse scenarios. DDoS (Distributed Denial of Service) is an attack where a number of...

    Provided By mecs-press

  • White Papers // Dec 2013

    Spam Mail Detection through Data Mining - A Comparative Performance Analysis

    As web is expanding day by day and people generally rely on web for communication so e-mails are the fastest way to send information from one place to another. Now-a-days all the transactions and all the communication, whether general or of business taking place through e-mails. E-mail is an effective...

    Provided By mecs-press

  • White Papers // Dec 2013

    Energy-Efficient Secure Directed Diffusion Protocol for Wireless Sensor Networks

    In wireless sensor networks, it is crucial to design and employ energy-efficient communication protocols, since nodes are battery-powered and thus their lifetimes are limited. Such constraints combined with a great number of applications used in these networks, pose many challenges (limited energy and low security) to the design and management...

    Provided By mecs-press

  • White Papers // Dec 2013

    FSM Circuits Design for Approximate String Matching in Hardware Based Network Intrusion Detection Systems

    In this paper, the authors present a logical circuits design for approximate content matching implemented as Finite State Machines (FSM). As network speed increases the software based Network Intrusion Detection and Prevention Systems (NIDPS) are lagging behind requirements in throughput of so called deep package inspection - the most exhaustive...

    Provided By mecs-press

  • White Papers // Dec 2013

    Social Network Clustering

    As the users' know, the datasets related to social networks are increasing. There are different procedures to analyze these types of datasets; one of these procedures is clustering which makes communities of social data. Random walk is a process which can find communities in a network, in other words when...

    Provided By mecs-press

  • White Papers // Dec 2013

    A New Fault Detection Method Using End-to-End Data and Sequential Testing for Computer Networks

    Fault localization, a central part of network fault management, is a process of deducing the exact source of a failure from a set of observed failure indications. in the network, end systems and hosts communicate through routers and links connecting them. When a link or a router faces with a...

    Provided By mecs-press

  • White Papers // Dec 2013

    Management of Automotive Engine Based on Stable Fuzzy Technique With Parallel Sliding Mode Optimization

    The Internal Combustion (IC) engine is designed to produce power from the energy that is contained in its fuel. More specifically, its fuel contains chemical energy and together with air, this mixture is burned to output mechanical power. Both fuzzy logic and sliding mode can compensate the steady-state error of...

    Provided By mecs-press

  • White Papers // Dec 2013

    Metrics for Evaluating Pervasive Middleware

    Pervasive computing aims at developing smart environments which enable user to interact with other devices. Pervasive computing includes a middleware to support interoperability, heterogeneity and self-management among different platforms. It provides efficient communications and context awareness among devices. Middleware for pervasive computing provides much more attention to coordinate the devices...

    Provided By mecs-press

  • White Papers // Dec 2013

    Throughput and Delay Analysis of Database Replication Algorithm

    Database management systems are among the most important systems that are driving the information transfer and storage functionality. Recently, (PDDRA) a Pre-fetching based Dynamic Data Replication Algorithm has been published. In the authors' previous paper, modifications to the algorithm have been suggested to minimize the delay in data replication. In...

    Provided By mecs-press

  • White Papers // Nov 2013

    Cloud Computing Ensembles Agile Development Methodologies for Successful Project Development

    In today's IT world combination of AD (Agile Development) and CC (Cloud Computing) is a good recipe for the user needs fulfillment in efficient manners. This combination brings superiority for both worlds, Agile and Cloud. CC opportunities are optimized by AD processes for iterative software releases and getting more frequent...

    Provided By mecs-press

  • White Papers // Nov 2013

    Improving Situational Awareness for Precursory Data Classification using Attribute Rough Set Reduction Approach

    The issue of correlating, integrating and presenting related information to issue early warning to impending natural disasters by categorizing documents with the aid of knowledge-based features leverages information cannot be deduced from the documents alone. This also involves query based search based on machine learning methods that improves the acquisition...

    Provided By mecs-press

  • White Papers // Nov 2013

    Implementation of Palm Print Biometric Identification System Using Ordinal Measures

    Personal identification is one of the most important requirements in all e-commerce and criminal detection applications. In this framework, a novel palm print representation method, namely orthogonal line ordinal features, is proposed. The palm print registration, feature extraction, palm print verification and palm print recognition modules are designed to manage...

    Provided By mecs-press

  • White Papers // Nov 2013

    Goal Structured Requirement Engineering and Traceability Model for Data Warehouses

    Data warehouses are decision support systems that are specifically designed for the business managers and executives for reporting and business analysis. Data warehouse is a database that stores enterprise-wide data that can be used to deduce useful information. Business organizations can achieve a great level of competitive advantage by analyzing...

    Provided By mecs-press

  • White Papers // Nov 2013

    Empirical Analysis of Bagged SVM Classifier for Data Mining Applications

    Data mining is the use of algorithms to extract the information and patterns derived by the knowledge discovery in databases process. Classification maps data into predefined groups or classes. It is often referred to as supervised learning because the classes are determined before examining the data. The feasibility and the...

    Provided By mecs-press

  • White Papers // Nov 2013

    Textual Manipulation for SQL Injection Attacks

    SQL injection attacks try to use string or text manipulations to access illegally websites and their databases. This is since using some symbols or characters in SQL statements may trick the authentication system to incorrectly allow such SQL statements to be processed or executed. In this paper, the authors highlighted...

    Provided By mecs-press