mecs-press

Displaying 1-40 of 671 results

  • White Papers // Jun 2014

    A Harmony Search Algorithm with Multi-pitch Adjustment Rate for Symbolic Time Series Data Representation

    The representation task in time series data mining has been a critical issue because the direct manipulation of continuous, high-dimensional data is extremely difficult to complete efficiently. One time series representation approach is a symbolic representation called the Symbolic Aggregate approXimation (SAX). The main function of SAX is to find...

    Provided By mecs-press

  • White Papers // May 2014

    A Survey for Replica Placement Techniques in Data Grid Environment

    In data grids, data replication on variant nodes can change some problems such as response time and availability. Also, in data replication, there are some challenges to finding the best replica efficiently in relation to performance and location of physical storage systems. In this paper, various replica placement strategies are...

    Provided By mecs-press

  • White Papers // Jun 2014

    Router-based Content-aware Data Redirection for Future CDN Systems

    Delivery of data-enriched applications has become a top priority on the Internet, and Internet users are demanding faster and higher-quality services. Cater such requirements, Content Delivery Networks (CDNs) were introduced. However, the growth rate of information on the Internet requires infrastructural modifications to keep the consistency while maintaining quality of...

    Provided By mecs-press

  • White Papers // Feb 2014

    Classification via Clustering for Anonymization Data

    Due to the exponential growth of hardware technology particularly in the field of electronic data storage media and processing such data, has raised serious issues related in order to protect the individual privacy like ethical, philosophical and legal. Data mining techniques are employed to ensure the privacy. Privacy Preserving Data...

    Provided By mecs-press

  • White Papers // Jun 2014

    Studies on ICT Usage in the Academic CampusUsing Educational Data Mining

    In the era of competition, change and complexity, innovation in teaching and learning practices in higher education sector has become unavoidable criteria. One of the biggest challenges that higher education system faces today is to assess the services provided through Information and Communication Technology (ICT) facilities installed in the campus....

    Provided By mecs-press

  • White Papers // Jun 2014

    Mathematical Modeling and Analysis of Network Service Failure in DataCentre

    World has become a global village. With the advent of technology, the concept of cloud computing has evolved a lot. Cloud computing offers various benefits in terms of storage, computation, cost and flexibility. It focuses on delivering combination of technological components such as applications, platforms, infrastructure, security and web hosted...

    Provided By mecs-press

  • White Papers // Jun 2014

    AnAutomatic Approach to Detect Software Anomalies in Cloud Computing Using Pragmatic Bayes Approach

    Software detection of anomalies is a vital element of operations in data centers and service clouds. Statistical Process Control (SPC) cloud charts sense routine anomalies and their root causes are identified based on the differential profiling strategy. By automating the tasks, most of the manual overhead incurred in detecting the...

    Provided By mecs-press

  • White Papers // Jul 2011

    Design and Implementation of GPU-Based Prim's Algorithm

    Minimum spanning tree is a classical problem in graph theory that plays a key role in a broad domain of applications. This paper proposes a minimum spanning tree algorithm using Prim's approach on Nvidia GPU under CUDA architecture. By using new developed GPU-based min-reduction data parallel primitive in the key...

    Provided By mecs-press

  • White Papers // Jul 2014

    Design and Implementation of Fuzzy Rule Based Expert System for Employees Performance Appraisal in IT Organizations

    Performance appraisal of employees plays a very critical role towards the growth of any organization. It has always been a tough task for any industry or organization as there is no unanimous scientific modus operandi for that. Performance appraisal system is used to assess the capabilities and productiveness of the...

    Provided By mecs-press

  • White Papers // May 2014

    Hybrid Intelligent Agent-Based Internal Analysis Architecture for CRM Strategy Planning

    Now-a-days, attaining the general and comprehensive information about customers by means of traditional methods is difficult for CEO's because of the agility and complexity of organizations. So, they spend a considerable time to gather and analyze the market data and consider it according to the organization's strategy. Presenting a useful...

    Provided By mecs-press

  • White Papers // May 2013

    A Two Layers Novel Low-Cost and Optimized Embedded Board Based on TMS320C6713 DSP and Spartan-3 FPGA

    In this paper, the authors present the design and implementation of a new low-cost and minimum embedded board based on TMS320C6713 (PYP 208-PIN (PQFP)) DSP and Spartan-3 (XCS400-4PQG208C) FPGA in two layers with mount elements on two sides of the board. The proposed embedded board was developed satisfactorily for different...

    Provided By mecs-press

  • White Papers // Jul 2012

    FPGA Based Pipelined Parallel Architecture for Fuzzy Logic Controller

    In this paper, the authors present a high-speed VLSI fuzzy inference processor for the real-time applications using trapezoid-shaped membership functions. Analysis shows that the matching degree between two trapezoid-shaped membership functions can be obtained without traversing all the elements in the universal disclosure set of all possible conditions. A FPGA...

    Provided By mecs-press

  • White Papers // Oct 2014

    A Roadmap for Establishing Trust Management Strategy in E-Commerce Services Using Quality Based Assessment

    Trust has been reported as a key role in e-business, especially for a monetary based system like e-commerce. Therefore, many previous studies have been conducted to investigate the antecedents and consequences of consumer trust. But, there has been little work done on establishing sensible solutions for leveraging consumer trust. Furthermore,...

    Provided By mecs-press

  • White Papers // Feb 2011

    A WMPLS Based Multicast Mechanism in Mobile Ad Hoc Network

    Merging MPLS into multicast routing protocol in mobile ad hoc network is an elegant method to enhance the network performance and an efficient solution for multicast scalability and control overhead problems. Based on the Wireless MPLS technology, the mechanism and evaluation of a new multicast protocol, the Label Switching Multicast...

    Provided By mecs-press

  • White Papers // Oct 2009

    Modeling and Analysis on a DTN Based Wireless Sensor Network Topology Control

    Wireless Sensor Networks (WSNs) have unlimited and extensive potential application in different areas. Due to WSNs' work environments and nodes behavior, intermitted network connection may occur frequently, which lead packets delay and lose in the process of data transmission. Most related works on WSNs, seldom consider how to address the...

    Provided By mecs-press

  • White Papers // May 2011

    A Cost-Aware Resource Selection for Dataintensive Applications in Cloud-Oriented Data Centers

    As a kind of large-scale user-oriented data-intensive computing, cloud computing allows users to utilize on-demand computation, storage, data and services from around the world in a pay-as-you-go model. In cloud environment, applications need access to mass datasets that may each be replicated on different resources (or data centers). Mass data...

    Provided By mecs-press

  • White Papers // Apr 2011

    Mixed QoS Controlled Wireless Streaming Media Transmission Strategy

    Streaming media applications is currently limited by high bandwidth requirements. It is a challenging problem to provide the required Quality of Service (QoS) for the efficient transmission of video data under the varying network conditions such as the time-varying packet loss and fluctuating bandwidth. On Internet the most important part...

    Provided By mecs-press

  • White Papers // Nov 2010

    Low-Power Wireless Pressure Transmitter and Net of Oil-Well Based on Zigbee

    The paper introduced a low-power wireless pressure transmitter for measure pressure and temperature of oil-well. To avoid wiring cables onsite, ZICM2410 was adopted to construct Wireless Sensor Network (WSN), and powered by Li-Ion battery. To reduce the power consumption, MSP430F477 and other low-power chips were used to construct the hardware,...

    Provided By mecs-press

  • White Papers // Oct 2009

    Research of Intrusion Detection Technology and Its Formal Modeling

    The intrusion detection technology is one of the most important dynamic security technologies, which can be used in the critical security system construction and the basic service protection. Apparently, applying formal specification to the procedure of developing an intrusion detection system can fulfill their security requirement and win the confidence...

    Provided By mecs-press

  • White Papers // Nov 2010

    Performance Analysis of Spatial Reused Bandwidth Reservation in Ad Hoc Networks

    In this paper, an approach for spatial reused bandwidth reservation in ad hoc networks is proposed. Resource reservation in wireless networks is an essential component that is needed to support multimedia and real-time applications, such as audio/video conferencing. On the other hand, directional antenna technology provides the capability for considerable...

    Provided By mecs-press

  • White Papers // Nov 2010

    A Wireless Video Transmission Scheme Based on MAC-Independent Opportunistic Routing & Encoding Protocol

    It is a tremendous challenge to transmit real-time video streams over wireless sensor network because of the poor wireless communication conditions and the high requirements of video transmission. The opportunistic routing protocol can take advantage of the broadcast nature of wireless communication and can improve transfer throughput significantly. But the...

    Provided By mecs-press

  • White Papers // Apr 2011

    A Proxy Based Framework for Efficient Range Query Processing in a Cellular Network

    Within the last decade, the continuous development of mobile technology has motivated an intense research in mobile data services. Among these services, location-based services and location-dependant queries have attracted a lot of attention from the software industry as well as from researchers. Although a number of locations based service methods...

    Provided By mecs-press

  • White Papers // Oct 2012

    Identifying Key Challenges in Performance Issues in Cloud Computing

    Cloud computing is a harbinger to a newer era in the field of computing where distributed and centralized services are used in a unique way. In cloud computing, the computational resources of different vendors and IT services providers are managed for providing an enormous and a scalable computing services platform...

    Provided By mecs-press

  • White Papers // Jul 2012

    Performance Evaluation of MANET in Realistic Environment

    In order to facilitate communication in Mobile Ad hoc NETwork (MANET), routing protocols are developed. The performance of these protocols depends upon various factors such as: transmission range, number of nodes deployed and mobility of the nodes. Another factor which affects the performance of MANET routing protocols is the environment...

    Provided By mecs-press

  • White Papers // Jul 2012

    Ultra Encryption Standard (UES) Version-III: Advanced Symmetric Key Cryptosystem With Bit-Level Encryption Algorithm

    Due to massive growth in communication technology and the tremendous growth in internet technology in the last decade, it has become a real challenge for a sender to send confidential data from one computer to another. The security of data has now become a big issue in data communication network....

    Provided By mecs-press

  • White Papers // Aug 2012

    Integrating Non-Functional Properties in Model Driven Development: A Stepwise Refinement View

    Most of the refinement approach is about functional property of systems. Non-functional properties are as important as functional one. Without an accurate approach for specifying and refining their behaviors, software models will be regarded as imperfect and imprecise, and as a result, software systems cannot be generated correctly. Therefore, how...

    Provided By mecs-press

  • White Papers // Aug 2012

    Coupling Complexity Metric: A Cognitive Approach

    Analyzing object-oriented systems in order to evaluate their quality gains its importance as the paradigm continues to increase in popularity. Consequently, several object-oriented metrics have been proposed to evaluate different aspects of these systems such as class coupling. This paper presents a new cognitive complexity metric namely cognitive weighted coupling...

    Provided By mecs-press

  • White Papers // Nov 2011

    A Novel Method for Grayscale Image Segmentation by Using GIT-PCANN

    PCNN has been widely used in image segmentation. However, satisfactory results are usually obtained at the expense of time-consuming selection of PCNN parameters and the number of iteration. A novel method, called Grayscale Iteration Threshold Pulse Coupled Neural Network (GIT-PCNN) was proposed for image segmentation, which integrates grayscale iteration threshold...

    Provided By mecs-press

  • White Papers // Feb 2011

    A Hybrid P2P Approach to Service Discovery in the Cloud

    Highly scalable techniques for service discovery are key to the efficient use of Cloud resources, since the Cloud computing appears to be part of the mainstream computing in a few years. The authors embarked on a preliminary study on Cloud service discovery by adopting an unstructured P2P paradigm. They developed...

    Provided By mecs-press

  • White Papers // Feb 2011

    A Cost-Aware Resource Selection for Data-Intensive Applications in Cloud-Oriented Data Centers

    As a kind of large-scale user-oriented data-intensive computing, cloud computing allows users to utilize on-demand computation, storage, data and services from around the world in a pay-as-you-go model. In cloud environment, applications need access to mass datasets that may each be replicated on different resources (or data centers). Mass data...

    Provided By mecs-press

  • White Papers // Feb 2011

    A Differentiated QoS Supporting PPS Solution Based on CICQ

    Based on the study of the existing PPS scheduling mechanism, the authors propose a novel PPS scheme for Differentiated QoS based on CICQ. The scheduling mechanism adopt in order queuing way to solve sequence preserving problem and set a small amount of buffer in the multiplexer to achieve differentiated QoS...

    Provided By mecs-press

  • White Papers // Aug 2012

    Methodology for Benchmarking IPsec Gateways

    The paper analyses forwarding performance of IPsec gateway over the rage of offered loads. It focuses on the forwarding rate and packet loss particularly at the gateway's performance peak and at the state of gateway's overload. It explains possible performance degradation when the gateway is overloaded by excessive offered load....

    Provided By mecs-press

  • White Papers // Aug 2012

    Block Based Symmetry Key Visual Cryptography

    Visual cryptography is a method for protecting image-based secrets that has a computation-free decoding process. In this technique, numbers of shares have been generated from one image. The shares are sent through any channel to the receiver and the receiver can again produce original image by stacking all the shares...

    Provided By mecs-press

  • White Papers // Aug 2012

    A Link Quality Based Dispersity Routing Algorithm for Mobile Ad Hoc Networks

    Multipath routing mechanisms have been preferred over single path routing to provide parallel fail safe paths and to maximize throughput. Applying traditional shortest path metric for multipath route selection leads to traffic concentration at some nodes resulting in congestion, thereby causing performance degradation. Interference caused due to neighbouring node traffic...

    Provided By mecs-press

  • White Papers // Aug 2012

    Cognitive Radio Sensor Node Empowered Mobile Phone for Explosive Trace Detection

    Usefulness of sensor network applications in human life is increasing day by day and the concept of wireless connection promises new application areas. Sensor network can be very beneficial in saving human life from terrorist attacks causing explosion in certain areas leading to casualties. But realization of the sensor network...

    Provided By mecs-press

  • White Papers // Aug 2012

    Routers Sequential Comparing Two Sample Packets for Dropping Worms

    Network IDS perform a vital role in protecting network connection in the worldwide from malicious attack. Now-a-days the recent experiment work related to inspecting the packet for network security that is a minimal amount of process overhead. In this paper, analysis the network intrusion for packet inspection that is together...

    Provided By mecs-press

  • White Papers // Aug 2012

    Computation of Pheromone Values in AntNet Algorithm

    In this paper, the authors discuss the basic routing technique of ants and study the change in pheromone values at each node. Also the optimal paths can then be computed based on the shortest cumulative pheromone count between source and destination nodes. AntNet is a distributed multi-agent system inspired by...

    Provided By mecs-press

  • White Papers // Aug 2012

    Security Analysis and Performance Evaluation of Enhanced Threshold Proxy Signature Scheme Based on RSA for Known Signers

    An efficient threshold signature scheme solves the difficulties of the receiver to proof the approval of the document from the sender as well as detecting if the file has been altered by illegitimate parties. In these days there are plenty of signature schemes such as (t,n) threshold proxy signature scheme....

    Provided By mecs-press

  • White Papers // Aug 2012

    Difference of the Absolute Differences - A New Method for Motion Detection

    This paper presents a new method, which reduces costs and processing time for spatial object motion detection by focusing on the bare-hand motion that mimics computer mouse functions to allow the user to move the mouse pointer in real-time by the motion of his/her hand without any gloves worn, any...

    Provided By mecs-press

  • White Papers // Aug 2012

    Employing Fuzzy-Histogram Equalization to Combat Illumination Invariance in Face Recognition Systems

    With the recent surge in acceptance of face recognition systems, more and more work is needed to perfect the existing grey areas. A major concern is the issue of illumination intensities in the images used as probe and images trained in the database. This paper presents the adoption and use...

    Provided By mecs-press