mecs-press

Displaying 1-40 of 378 results

  • White Papers // Sep 2014

    A Smart and Generic Secured Storage Model for Web Based Systems

    Now-a-days, recent developments show that, Cloud computing is a milestone in delivering IT services based on the Internet. Storage as a Service is a type of business model which rents storage space for smaller companies or even for individuals. The vendors are targeting secondary storage by promoting this service which...

    Provided By mecs-press

  • White Papers // Sep 2014

    Trust Metric Based Soft Security in Mobile Pervasive Environment

    In the decentralized and highly dynamic environment like Mobile Pervasive Environments (MPE) trust and security measurement are two major challenging issues for community researchers. So far primarily many of architectural frameworks and models developed and being used. In the vision of pervasive computing where mobile applications are growing immensely with...

    Provided By mecs-press

  • White Papers // Sep 2014

    Hybrid Encryption-Compression Scheme Based on Multiple Parameter Discrete Fractional Fourier Transform with Eigen Vector Decomposition Algorithm

    Encryption along with compression is the process used to secure any multimedia content processing with minimum data storage and transmission. The transforms plays vital role for optimizing any encryption-compression systems. Earlier the original information in the existing security system based on the FRactional Fourier Transform (FRFT) is protected by only...

    Provided By mecs-press

  • White Papers // Sep 2014

    Efficient Clustering Technique for Cooperative Wireless Sensor Network

    The nodes of a Wireless Sensor Network (WSN) collect the data of interest from the deployment area and cooperatively send it to sink in multiple hops. Recently, Virtual Multiple Input Multiple Output (V-MIMO) technique has been introduced in which the node cooperation is extended to form a virtual antenna array...

    Provided By mecs-press

  • White Papers // Sep 2014

    Enhanced Intrusion Detection System for Malicious Node Detection in Mobile Ad hoc Networks using Data Transmission Quality of Nodes

    Mobile Ad hoc NETworks (MANETs) are the new generation of networks that offer unrestricted mobility without any underlying infrastructure. It relies on the cooperation of all the participating nodes. Due to their open nature and lack of infrastructure, security for MANETS has become an intricate problem than the security in...

    Provided By mecs-press

  • White Papers // Sep 2014

    Ternary Tree Based Group Key Agreement for Cognitive Radio MANETs

    In this paper, the authors present an efficient contributory group key agreement protocol for secure communication between the lightweight small devices in cognitive radio mobile ad hoc networks. A Ternary tree based Group ECDH.2 (TGECDH.2) protocol that uses a batch rekeying algorithm during membership change is proposed in this paper....

    Provided By mecs-press

  • White Papers // Sep 2014

    Distributed Monitoring for Wireless Sensor Networks: a Multi-Agent Approach

    In this paper, the authors will present a state of the art in using multi-agent technology for wireless sensor networks where the main goal is the conception of software architecture and the network organization dedicated to optimization, performance analysis, and monitoring. Then, they explore in particular, the issues of topology...

    Provided By mecs-press

  • White Papers // Aug 2014

    HTTP Packet Inspection Policy for Improvising Internal Network Security

    Past few years the use of Internet and its applications has increased to a great extent. There is also an enormous growth in the establishment of computer networks by large, medium and small organizations, for data transfer and information exchange. Due to this huge growth, incidents of cyber-attacks and security...

    Provided By mecs-press

  • White Papers // Aug 2014

    VoIP Performance Analysis over IPv4 and IPv6

    The advance of technology often requires the emergence of complementary technologies, of which the transition from IPv4 to IPv6 presents a significant example. The move of protocol has focused attention on the level of performance for associated technologies. Among the many Internet applications, in contemporary digital communications, VoIP stands apart...

    Provided By mecs-press

  • White Papers // Aug 2014

    Implementation of Risk Management with SCRUM to Achieve CMMI Requirements

    Majority of the software development companies are practicing agile methods to develop high quality products. SCRUM is one of the most widely used agile methods. Capability Maturity Model Integration (CMMI) is one of the quality standards for software companies. In this paper, the authors propose an implementation of risk management...

    Provided By mecs-press

  • White Papers // Aug 2014

    Optimized and Executive Survey of Physical Node Capture Attack in Wireless Sensor Network

    Wireless Sensor Networks (WSNs) are novel large-scale wireless networks that consist of distributed, self organizing, low-power, low-cost, tiny sensor devices to cooperatively collect information through infrastructure less wireless networks. These networks are envisioned to play a crucial role in variety of applications like critical military surveillance applications, forest fire monitoring,...

    Provided By mecs-press

  • White Papers // Aug 2014

    Cellular Automata based Encrypted ECG-hash Code Generation: An Application in Inter-human Biometric Authentication System

    In this modern era, biometrics incorporates various mechanisms to recognize inimitable features of human beings by utilizing their biological and evident features. This paper proposes a novel technique for constructing a resilient and secure biometric recognition system. In this paper, an ECG-hash code of two distinct individuals has been formed...

    Provided By mecs-press

  • White Papers // Aug 2014

    An Improved Trusted Greedy Perimeter Stateless Routing for Wireless Sensor Networks

    In this paper, an improvement over Trusted Greedy Perimeter Stateless Routing (T-GPSR) is presented. T-GPSR employs heuristic weight values to evaluate total trust value of neighboring nodes. However, heuristic assignment of weights provide flexibility but it is not suitable in presence of several security attacks such as grey hole, selfish...

    Provided By mecs-press

  • White Papers // Aug 2014

    OpenFlow Technology: A Journey of Simulation Tools

    In this paper, the authors present a complete guideline for developing OpenFlow infrastructure. OpenFlow is standard network protocol to manage traffic between routers and Ethernet switches. This approach will help to create the next generation virtual network, which provides the solution for network management, flow control of packets, delay optimization...

    Provided By mecs-press

  • White Papers // Aug 2014

    SM-SIP: Seamless Mobility Management for Heterogeneous Wireless Networks

    Next-Generation wireless Networks (NGN) and Internet of Thing (IoT) become two leaders of designing mobile multimedia services. The deployment of these services using heterogeneous wireless networks will be the important factor that leads to profound change in the way that these services are delivered. Also, how these services will be...

    Provided By mecs-press

  • White Papers // Aug 2014

    Artificial Intrusion Detection Techniques: A Survey

    Networking has become the most integral part of the cyber society. Everyone wants to connect themselves with each other. With the advancement of network technology, the authors find this most vulnerable to breach and take information and once information reaches to the wrong hands it can do terrible things. During...

    Provided By mecs-press

  • White Papers // Aug 2014

    C2DF: High Rate DDOS Filtering Method in Cloud Computing

    Distributed Denial Of Service (DDOS) attacks have become one of the main threats in cloud environment. A DDOS attack can make large scale of damages to resources and access of the resources to genuine cloud users. Old-established defending system cannot be easily applied in cloud computing due to their relatively...

    Provided By mecs-press

  • White Papers // Aug 2014

    Congestion Control in WMSNs by Reducing Congestion and Free Resources to Set Accurate Rates and Priority

    In this paper, the authors focus on mechanism for reducing congestion in the network by free resources to set accurate rates and priority data needs. If two nodes send their packets in the shortest path to the parent node in a crowded place, a source node must prioritize the data...

    Provided By mecs-press

  • White Papers // Aug 2014

    Integrity Analysis of Multimedia File Transmission Between Mobile Phones

    Mobile forensics deals with evidence from mobile devices. Data recovered from the mobile devices are helpful in investigation to solve criminal cases. It is crucial to preserve the integrity of these data. According to research carried out, it has been noted that not all data extracted from mobile phones have...

    Provided By mecs-press

  • White Papers // Aug 2014

    Direction-of-Arrival Estimation for Stratospheric Platforms Mobile Stations

    In this paper, the authors present a new approach for localizing mobile phone users using the promising technique of Stratospheric Platform (SP) flying at altitudes 17-22 km high and a suitable Direction-Of-Arrival technique (DOA). The proposed technique provides information about accurate locations for mobile stations - through high resolution DOA...

    Provided By mecs-press

  • White Papers // Aug 2014

    Effect of Maintenance on Computer Network Reliability

    At the time of the new information technologies, computer networks are inescapable in any large organization, where they are organized so as to form powerful internal means of communication. In a context of dependability, the reliability parameter proves to be fundamental to evaluate the performances of such systems. In this...

    Provided By mecs-press

  • White Papers // Aug 2014

    SysProp: A Web-Based Data Backup, Synchronization and System Administration

    From the inception of computer based computing, preventing data loss or data corruption is considered as one of the difficult challenges. In early days, data reliability had been increased by replicating data in multiple disks, which were attached with the same system and later located inside the same network. Later,...

    Provided By mecs-press

  • White Papers // Jul 2014

    A New Classification Scheme for Intrusion Detection Systems

    In today's world, overall global mostly depend on technologies for their information storage and transactions. But this frequent use of online technologies make the data stored exposed to the risk of attacks towards the data in the form of intrusion. In order to save the data from these attacks, the...

    Provided By mecs-press

  • White Papers // Jul 2014

    Optimal Route Based Advanced Algorithm Using Hot Link Split Multi-Path Routing Algorithm

    Present research work describes advancement in standard routing protocol Ad hoc On-demand Distance Vector Routing (AODV) for mobile ad-hoc networks. The author's mechanism sets up multiple optimal paths with the criteria of bandwidth and delay to store multiple optimal paths in the network. At time of link failure, it will...

    Provided By mecs-press

  • White Papers // Jul 2014

    Analysis of Host-Based and Network-Based Intrusion Detection System

    Intrusion Detection Systems (IDS) aim at detecting attacks against computer systems and networks or, in general, against information systems. Its basic aim is to protect the system against malwares and unauthorized access of a network or a system. Intrusion detection is of two type Network-IDS (NIDS) and Host based-IDS (HIDS)....

    Provided By mecs-press

  • White Papers // Jul 2014

    Security, Privacy and Trust Challenges in Cloud Computing and Solutions

    Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction. Cloud computing recently emerged as a promising solution to Information Technology (IT) management. IT managers look...

    Provided By mecs-press

  • White Papers // Jul 2014

    Efficient Group Key Management Using Symmetric Key and Threshold Cryptography for Cluster Based Wireless Sensor Networks

    Research in Wireless Sensor Networks (WSNs) has made a significant progress recently, especially the area of key management, which plays a central role for protecting group communication in sensor networks. In sensor networks, the data are crucial and have to keep secrecy in data communication. To achieve data confidentiality, adversary...

    Provided By mecs-press

  • White Papers // Jun 2014

    AnAutomatic Approach to Detect Software Anomalies in Cloud Computing Using Pragmatic Bayes Approach

    Software detection of anomalies is a vital element of operations in data centers and service clouds. Statistical Process Control (SPC) cloud charts sense routine anomalies and their root causes are identified based on the differential profiling strategy. By automating the tasks, most of the manual overhead incurred in detecting the...

    Provided By mecs-press

  • White Papers // Jun 2014

    A Harmony Search Algorithm with Multi-pitch Adjustment Rate for Symbolic Time Series Data Representation

    The representation task in time series data mining has been a critical issue because the direct manipulation of continuous, high-dimensional data is extremely difficult to complete efficiently. One time series representation approach is a symbolic representation called the Symbolic Aggregate approXimation (SAX). The main function of SAX is to find...

    Provided By mecs-press

  • White Papers // Jun 2014

    Studies on ICT Usage in the Academic CampusUsing Educational Data Mining

    In the era of competition, change and complexity, innovation in teaching and learning practices in higher education sector has become unavoidable criteria. One of the biggest challenges that higher education system faces today is to assess the services provided through Information and Communication Technology (ICT) facilities installed in the campus....

    Provided By mecs-press

  • White Papers // Jun 2014

    Mathematical Modeling and Analysis of Network Service Failure in DataCentre

    World has become a global village. With the advent of technology, the concept of cloud computing has evolved a lot. Cloud computing offers various benefits in terms of storage, computation, cost and flexibility. It focuses on delivering combination of technological components such as applications, platforms, infrastructure, security and web hosted...

    Provided By mecs-press

  • White Papers // Jun 2014

    Router-based Content-aware Data Redirection for Future CDN Systems

    Delivery of data-enriched applications has become a top priority on the Internet, and Internet users are demanding faster and higher-quality services. Cater such requirements, Content Delivery Networks (CDNs) were introduced. However, the growth rate of information on the Internet requires infrastructural modifications to keep the consistency while maintaining quality of...

    Provided By mecs-press

  • White Papers // May 2014

    A Survey for Replica Placement Techniques in Data Grid Environment

    In data grids, data replication on variant nodes can change some problems such as response time and availability. Also, in data replication, there are some challenges to finding the best replica efficiently in relation to performance and location of physical storage systems. In this paper, various replica placement strategies are...

    Provided By mecs-press

  • White Papers // Feb 2014

    Classification via Clustering for Anonymization Data

    Due to the exponential growth of hardware technology particularly in the field of electronic data storage media and processing such data, has raised serious issues related in order to protect the individual privacy like ethical, philosophical and legal. Data mining techniques are employed to ensure the privacy. Privacy Preserving Data...

    Provided By mecs-press

  • White Papers // Feb 2014

    Public vs Private vs Hybrid vs Community - Cloud Computing: A Critical Review

    These days cloud computing is booming like no other technology. Every organization whether it's small, mid-sized or big, wants to adapt this cutting edge technology for its business. As cloud technology becomes immensely popular among these businesses, the question arises: which cloud model to consider for the users business? There...

    Provided By mecs-press

  • White Papers // Feb 2014

    Enhanced Role Based Access Control Mechanism for Electronic Examination System

    Over the years, e-learning and e-examination has become standard in many institutions of higher learning. It has been observed that examination questions and results can be easily intercepted by invalid users, thus the security of resources shared among valid users is not guaranteed. In order to solve these problems as...

    Provided By mecs-press

  • White Papers // Feb 2014

    Modeling GSM Based Network Communication in Vehicular Network

    Obviously fair communication establishment in every technology increases the efficiency. As the authors know well, vehicles are used in day to day life of every human being to move from one location to another location. If network communication is formed between vehicles, mobile phones and home based telephones, it will...

    Provided By mecs-press

  • White Papers // Feb 2014

    A Hybrid RBF-SVM Ensemble Approach for Data Mining Applications

    One of the major developments in machine learning in the past decade is the ensemble method, which finds highly accurate classifier by combining many moderately accurate component classifiers. This paper addresses using an ensemble of classification methods for data mining applications like intrusion detection, direct marketing, and signature verification. In...

    Provided By mecs-press

  • White Papers // Feb 2014

    Robustness Analysis of Layered Public Transport Networks Due to Edge Overload Breakdown

    The robustness of urban bus-transport networks has important influence on the network performance. This paper proposes the model of layered public bus-transport network which is composed of the logical layer and the physical layer and expounds the relationship between these two layers. The authors map the bus-transport network into two...

    Provided By mecs-press

  • White Papers // Jan 2014

    Defending Against Malicious Threats in Wireless Sensor Network: A Mathematical Model

    Wireless sensor networks offer a powerful combination of distributed sensing, computing and communication. They lend themselves to countless applications and at the same time constrained by limited battery life, processing capability, memory and bandwidth which makes it soft target of malicious objects such as virus and worms. The authors study...

    Provided By mecs-press

  • White Papers // Apr 2013

    Location Prediction of Mobility Management Using Soft Computing Techniques in Cellular Network

    This paper describes the neural network technique to solve location management problem. A multilayer neural model is designed to predict the future prediction of the subscriber based on the past predicted information of the subscriber. In this paper, a prediction based location management scheme is proposed for locating a mobile...

    Provided By mecs-press

  • White Papers // Apr 2013

    A Fair Downlink Scheduling Algorithm for 3GPP LTE Networks

    Long Term Evolution (LTE), the standard specified by 3GPP on the way towards the fourth generation mobile networks, is intended to deliver high speed data and multimedia services to next generation mobile users. The Radio Resource Management (RRM) plays a very crucial role in managing limited radio resources to enhance...

    Provided By mecs-press

  • White Papers // Apr 2013

    Password Hardened Biometric: A Complete Solution of Online Security

    In present paper, secure online access to enterprises resources is very important for any organization. To protect valuable data become one of the big challenge for today's business as enterprise customers or clients involved in Business-to-Customer (B2C) and Business-to-Business (B2B) e-commerce need to feel that their transactions are secured from...

    Provided By mecs-press

  • White Papers // Apr 2013

    A Robust Fault Detection Scheme for the Advanced Encryption Standard

    Fault attacks are powerful and efficient cryptanalysis techniques to find the secret key of the Advanced Encryption Standard (AES) algorithm. These attacks are based on injecting faults into the structure of the AES to obtain the confidential information. To protect the AES implementation against these attacks, a number of countermeasures...

    Provided By mecs-press

  • White Papers // Jan 2013

    Exponential Brute-Force Complexity of A Permutation Based Stream Cipher

    This paper introduces a permutation generation mechanism based on a shared secret key. The generated permutation vectors are used as encryption keys in a stream ciphering cryptosystem. The authors investigated various types of attacks on the known stream cipher RC4 and patched most of its loopholes, especially biased-byte and state-related...

    Provided By mecs-press

  • White Papers // Jan 2013

    Performance Evaluation of Security-Throughput Tradeoff with Channel Adaptive Encryption

    With the ever increasing volume of information over wireless medium, security has assumed an important dimension. The security of transmitted data over a wireless channel aims at protecting the data from unauthorized intrusion. Wireless network security is achieved using cryptographic primitives. Some properties that give encryption mechanism their cryptographic strength...

    Provided By mecs-press

  • White Papers // Jan 2013

    An Efficient Novel Key Management Scheme for Enhancing User Authentication in A WSN

    The Wireless Sensor Networks are energy constrained and are normally low cost and low power devices. These nodes are deployed over a specific area for specific goals. Due to energy and memory constraints, secure communication among these sensors is challenging management issue. In order to ensure security, proper connectivity among...

    Provided By mecs-press

  • White Papers // Feb 2013

    Integrated Safety Mechanisms Based on Security Risks Minimization for the Distributed Computer Systems

    Today, there are known the basic principles of decision-making on the safety control of distributed computer systems in the face of uncertainty and risk. However, in this area there are no practical methods for the quantitative risk analysis and assessment, taking into account the dynamic changes of security threats, which...

    Provided By mecs-press

  • White Papers // Feb 2013

    Selection of Next Generation Anti-Virus against Virus Attacks in Networks Using AHP

    Defending against virus attacks in network is a vital part of network security. With the rapid evolution of viruses, its defense mechanism has also been evolved over the years. But given the diversity and complexity of virus propagation and its attack behavior, no defense mechanism is equipped fully to protect...

    Provided By mecs-press

  • White Papers // Mar 2013

    Reinforcement Swap Attack Against Directed Diffusion in Wireless Sensor Networks

    In this paper, the authors introduce a new attack, Reinforcement Swap Attack, against Directed Diffusion based WSNs, which exploits the vulnerabilities of Directed Diffusion specifications. Its main idea is the disruption of configuration information, such as routing information to misuse route establishment along the network. Their approach is to swap...

    Provided By mecs-press

  • White Papers // Jan 2013

    Rigorous Progress on Algorithms Based Routing and Wavelength Assignment in Trans-Egypt Network (TEGYNET) Management

    In simple Wavelength-Division Multiplexed (WDM) networks, a connection must be established along a route using a common wavelength on all of the links along the route. The introduction of wavelength converters into WDM cross connects increases the hardware cost and complexity. Given a set of connection requests, the routing and...

    Provided By mecs-press

  • White Papers // Jan 2013

    Hybrid Model for Location Privacy in Wireless Ad-Hoc Networks

    In the today's fast growing world, use of internet is increasing popularly and at the same time Location-Based Services (LBS) are also getting more popular. LBS providers require user's current locations to answer their location-based queries. The primary objective of the present work is to develop a system which preserves...

    Provided By mecs-press

  • White Papers // Jan 2013

    Effective Congestion Avoidance Scheme for Mobile Ad Hoc Networks

    Mobile nodes are organized randomly without any access point in Mobile Ad hoc NETworks (MANETs). Due to the mobility of nodes, the network congestion occurs. So many congestion control mechanisms were proposed to avoid the congestion avoidance or reducing the congestion status. In this research work, the authors proposed to...

    Provided By mecs-press

  • White Papers // Jan 2013

    Performance Comparison and Evaluation of Different Multipath Routing Protocols Based on Various Scenario and Traffic Patterns for Mobile AD Hoc Networks

    A MANET is an interconnection of mobile devices by wireless links forming a dynamic topology without much physical network infrastructure such as routers, servers, access points/cables or centralized administration. The multipath routing protocols establish efficient communication within the network by discovering multiple routes between a pair of source and destination...

    Provided By mecs-press

  • White Papers // Oct 2012

    Identifying Key Challenges in Performance Issues in Cloud Computing

    Cloud computing is a harbinger to a newer era in the field of computing where distributed and centralized services are used in a unique way. In cloud computing, the computational resources of different vendors and IT services providers are managed for providing an enormous and a scalable computing services platform...

    Provided By mecs-press

  • White Papers // Feb 2013

    Enhancing the Capacity of Stratospheric Cellular Networks Using Adaptive Array Techniques

    In this paper, the capacity of stratospheric cellular communications is improved by optimizing the amplitude feeding of the Concentric Rings Array (CRA). The weighting profile of this array is chosen to be a cosine function raised to some power to control the beam pattern used in the cellular coverage. The...

    Provided By mecs-press

  • White Papers // Feb 2011

    A Method of Hash Join in the DAS Model

    In the Database As Service(DAS) model, authenticated join processing is more difficult than authenticated range query because the previous approach of authenticated range query, signature on a single relation, can not be used to verify join results directly. In this paper, an authenticated hash join processing algorithm is described in...

    Provided By mecs-press

  • White Papers // Dec 2010

    Code Formal Verification of Operation System

    With the increasing pressure on non-function attributes (security, safety and reliability) requirements of an operation system, high-confidence operation system is becoming more important. Formal verification is the only known way to guarantee that a system is free of programming errors. The authors research on formal verification of operation system kernel...

    Provided By mecs-press

  • White Papers // Dec 2010

    Performance Analysis of QoS Multicast Routing in Mobile Ad Hoc Networks Using Directional Antennas

    In this paper, a Quality of Service (QoS) multicast routing protocol in Mobile Ad hoc NETworks (MANETs) by using directional antennas has been presented. Many important applications, such as audio/video conferencing, require the quality of service guarantee. Directional antenna technology provides the capability for considerable increase in spatial reuse, which...

    Provided By mecs-press

  • White Papers // Dec 2010

    Study of 2D DOA Estimation for Uniform Circular Array in Wireless Location System

    In this paper, the use of a Uniform Circular Antenna arrays (UCA) for high resolution of Two Dimensional (2D) Direction Of Arrivals (DOAs) estimation in wireless location system is investigated. Performance of 2D DOA estimation based on the real-valued unitary transformation MUSIC algorithm for UCA is presented, especially focusing on...

    Provided By mecs-press

  • White Papers // Dec 2010

    An Improved Dynamic Probabilistic Packet Marking for IP Trace back

    An improved dynamic probabilistic packet marking algorithm named IDPPM is presented, which not only can locate and attack a source rapidly and accurately, but also can reduce the marking overhead of routers near the attackers, which is its greatest contribution given by the authors' technique. In contrast to previous work,...

    Provided By mecs-press

  • White Papers // Dec 2010

    Research on Trusted Industrial Control Ethernet Network

    Industrial control Ethernet networks are more important in connecting with equipments each other of enterprise comprehensive automation and integrating information. With the explosive growth of network techniques, the traditional control networks can no longer satisfy the security demands on network connectivity, data storage and information exchanges. New types of networks...

    Provided By mecs-press

  • White Papers // Dec 2010

    A New Immunity Intrusion Detection Model Based on Genetic Algorithm and Vaccine Mechanism

    After analyzing the characteristics of Immunity Intrusion Detection System, by utilizing prominent characteristics of genetic algorithm and vaccine mechanism, a new hybird immunity intrusion detection model based on genetic algorithm and vaccine mechanism was established. The modeling process is described in detail, such as feature extraction of vaccine, genetic operates...

    Provided By mecs-press

  • White Papers // Nov 2010

    Intelligent Rate Adaptation Based on Improved Simulated Annealing Algorithm

    This paper analyzes the PHY layer of IEEE 802.11 standards for a variety of transmission rates, after learning that MAC layer does not provide adaptive approach for rate control. With the study of various adaptive algorithms, the SAARF (Simulated Annealing Auto Rate Fallback) protocol based on simulated annealing algorithm is...

    Provided By mecs-press

  • White Papers // Nov 2010

    Nonlinear Blind Source Separation Using Kernel Multi-Set Canonical Correlation Analysis

    To solve the problem of nonlinear Blind Source Separation (BSS), a novel algorithm based on kernel Multi-set Canonical Correlation Analysis (MCCA) is presented. Combining complementary research fields of kernel feature spaces and BSS using MCCA, the proposed approach yields a highly efficient and elegant algorithm for nonlinear BSS with invertible...

    Provided By mecs-press

  • White Papers // Nov 2010

    Research on the Method of Multi-Channel Video Acquisition and Display Based on FPGA

    With the problems of high speed and asynchronism in a multi-channel video, a video monitor system based on FPGA and SRAM is designed and implemented. The system adopts the method of time-division multiplexing to realize the function of four-channel video parallel acquisition. The synchronization between four-channel video is achieved by...

    Provided By mecs-press

  • White Papers // Nov 2010

    Research on Humanoid Robot Soccer System Based on Fuzzy Logic

    This paper presents the use of a fuzzy logic controller combined with Machine Vision to improve the accuracy to identify the ball and speed of approaching the ball in Robot Soccer. The conventional robot control consists of methods for path generation and path following. When a robot moves away the...

    Provided By mecs-press

  • White Papers // Nov 2010

    Getting Obstacle Avoidance Trajectory of Mobile Beacon for Localization

    Localization is one of the most important technologies in wireless sensor network, and mobile beacon assisted localization is a promising localization method. The mobile beacon trajectory planning is a basic and important problem in these methods. There are many obstacles in the real world, which obstruct the moving of mobile...

    Provided By mecs-press

  • White Papers // Nov 2010

    System Design of a Trusted SoC and Detailed Analysis of Its Secure State Transitions

    According to the relevant criterion and principle for designing and evaluating various trusted computing chips, the authors have proposed a new trusted SoC chip, and have given the implementation of its basic functional modules. In detail, they have discussed the design of the trusted SoC security architecture and the main...

    Provided By mecs-press

  • White Papers // Aug 2012

    Optical Many Casting Using QoS Depend Layer Aware Mechanism

    Many distributed applications require a group of destinations to be coordinated to a single source. Multicasting is a communication paradigm to implement these distributed applications. In multicasting, at least one of the member in the group cannot satisfy the service requirement of the application, the multicast request said to be...

    Provided By mecs-press

  • White Papers // Aug 2012

    Random Handwritten CAPTCHA: Web Security With a Difference

    It is hard to believe a web form without a CAPTCHA. The web survival in this cut-throat competition is impossible without the mechanisms for blocking spam-boats. The spam-boats have now been made intelligent enough to break through machine printed CAPTCHAs. Handwritten CAPTCHA image can be one solution. In this paper...

    Provided By mecs-press

  • White Papers // Jul 2012

    A Novel Approach for Spectrum Access Using Fuzzy Logic in Cognitive Radio

    In this paper, the authors have proposed a novel approach using Fuzzy Logic System (FLS) for the potential management of the spectrum access. They have used four descriptors such as spectrum utilization efficiency of the secondary user, mobility, distance of the primary user, and signal strengths of the secondary users....

    Provided By mecs-press

  • White Papers // Jul 2012

    Trends, Issues and Challenges Concerning Spam Mails

    Traditional correspondence system has now been replaced by internet, which has now become indispensable in everyone's life. With the advent of the internet, majority of people correspond through emails several times in a day. However, as internet has evolved, email is being exploited by spammers so as to disturb the...

    Provided By mecs-press

  • White Papers // Jul 2012

    Doppler Shift Impact On the MIMO OFDM System in Vehicular Channel Condition

    Vehicle-To-Vehicle (V2V) communication systems will play an important role in Intelligent Transportation Systems (ITS). But in high mobility road condition, Orthogonal Frequency Division Multiplexing (OFDM) is very sensitive to Doppler shift. In this scenario Multiple Input and Multiple Output (MIMO) system combined with OFDM, make MIMO -OFDM techniques very attractive...

    Provided By mecs-press

  • White Papers // Aug 2012

    Cryptography Using Multiple Two-Dimensional Chaotic Maps

    In this paper, a symmetric key block cipher cryptosystem is proposed, involving multiple two-dimensional chaotic maps and using 128-bits external secret key. Computer simulations indicate that the cipher has good diffusion and confusion properties with respect to the plaintext and the key. Moreover, it produces ciphertext with random distribution. The...

    Provided By mecs-press

  • White Papers // Aug 2012

    Cascading of C4.5 Decision Tree and Support Vector Machine for Rule Based Intrusion Detection System

    Main reason for the attack being introduced to the system is because of popularity of the internet. Information security has now become a vital subject. Hence, there is an immediate need to recognize and detect the attacks. Intrusion Detection is defined as a method of diagnosing the attack and the...

    Provided By mecs-press

  • White Papers // Aug 2012

    Modeling Prioritized Hard Handoff Management Scheme for Wireless Mobile Networks

    The channel associated with the current connection serviced by a base station is changed while a call is in progress. Usually, continuous service is achieved by supporting handoff from one cell to another. It is often initiated either by crossing a cell boundary or by deterioration in quality of the...

    Provided By mecs-press

  • White Papers // Aug 2012

    Distributed Encrypting File System for Linux in User-Space

    Linux systems use Encrypting File System (EFS) for providing confidentiality and integrity services to files stored on disk in a secure, efficient and transparent manner. Distributed encrypting file system should also provide support for secure remote access, multiuser file sharing, possible use by non-privileged users, portability, incremental backups, etc. Existing...

    Provided By mecs-press

  • White Papers // Aug 2012

    A New Approach for Multicast Routing in Wireless Mesh Networks

    This paper focuses on the multicast routing in wireless mesh networks under the 802.11s standard. This standard defines the HWMP (Hybrid Wireless Mesh network Protocol) as the protocol of the routing but only unicast and broadcast. Such the standard defines the multicast routing as a goal among several and that...

    Provided By mecs-press

  • White Papers // Aug 2012

    Enhancement of Security and Privacy in Biometric Passport Inspection System Using Face, Fingerprint, and Iris Recognition

    The biometric passports are to prevent the illegal entry of traveler into a specific country and limit the use of counterfeit documents by more accurate identification of an individual. Biometric Passports have been introduced in many countries to improve the security in Inspection Systems and enhance procedures and systems that...

    Provided By mecs-press