mecs-press

Displaying 1-40 of 651 results

  • White Papers // Nov 2010

    Performance Analysis of Spatial Reused Bandwidth Reservation in Ad Hoc Networks

    In this paper, an approach for spatial reused bandwidth reservation in ad hoc networks is proposed. Resource reservation in wireless networks is an essential component that is needed to support multimedia and real-time applications, such as audio/video conferencing. On the other hand, directional antenna technology provides the capability for considerable...

    Provided By mecs-press

  • White Papers // Nov 2010

    A Wireless Video Transmission Scheme Based on MAC-Independent Opportunistic Routing & Encoding Protocol

    It is a tremendous challenge to transmit real-time video streams over wireless sensor network because of the poor wireless communication conditions and the high requirements of video transmission. The opportunistic routing protocol can take advantage of the broadcast nature of wireless communication and can improve transfer throughput significantly. But the...

    Provided By mecs-press

  • White Papers // Apr 2011

    A Proxy Based Framework for Efficient Range Query Processing in a Cellular Network

    Within the last decade, the continuous development of mobile technology has motivated an intense research in mobile data services. Among these services, location-based services and location-dependant queries have attracted a lot of attention from the software industry as well as from researchers. Although a number of locations based service methods...

    Provided By mecs-press

  • White Papers // May 2011

    A Cost-Aware Resource Selection for Dataintensive Applications in Cloud-Oriented Data Centers

    As a kind of large-scale user-oriented data-intensive computing, cloud computing allows users to utilize on-demand computation, storage, data and services from around the world in a pay-as-you-go model. In cloud environment, applications need access to mass datasets that may each be replicated on different resources (or data centers). Mass data...

    Provided By mecs-press

  • White Papers // Apr 2011

    Mixed QoS Controlled Wireless Streaming Media Transmission Strategy

    Streaming media applications is currently limited by high bandwidth requirements. It is a challenging problem to provide the required Quality of Service (QoS) for the efficient transmission of video data under the varying network conditions such as the time-varying packet loss and fluctuating bandwidth. On Internet the most important part...

    Provided By mecs-press

  • White Papers // Feb 2011

    A WMPLS Based Multicast Mechanism in Mobile Ad Hoc Network

    Merging MPLS into multicast routing protocol in mobile ad hoc network is an elegant method to enhance the network performance and an efficient solution for multicast scalability and control overhead problems. Based on the Wireless MPLS technology, the mechanism and evaluation of a new multicast protocol, the Label Switching Multicast...

    Provided By mecs-press

  • White Papers // Oct 2009

    Reducing Multicast Redundancy and Latency in Multi-Interface Multi-Channel Wireless Mesh Networks

    In wireless mesh networks, each node can be equipped with multiple network interface cards tuned to different channels. In this paper, the authors study the problem of collision-free multicast in multi-interface multi-channel wireless mesh networks. The concept of interface redundancy is proposed as a new criterion for the multicast/broadcast redundancy...

    Provided By mecs-press

  • White Papers // Dec 2010

    Semantic Management Information Modeling Based on Theory of Concept Lattices

    With the development of future Internet, it is of great significance to study how to realize unified management information modeling, in order to avoid a lot of repetitive work and standardize information modeling in network management domain. This paper discusses the problem from the ontology point of view and introduces...

    Provided By mecs-press

  • White Papers // Mar 2012

    Developing E-Business Strategies Curriculum Case Study in the Information Systems Department

    E-Business Strategies (EBS) is an elective course in the Information Systems Department, Faculty of Computing & Information Technology at King Abdulaziz University, Jeddah. In this course, students learn many concepts regarding e-business, such as strategies, models, relationships and so on. Also, they improve their leadership skills, such as analyzing the...

    Provided By mecs-press

  • White Papers // Mar 2012

    Learning the Related Mathematics to Cryptography by Interactive Way

    Cryptography is a complex area in the computer science field due to the complexity of the mathematics involved. The main goal of this paper is to discuss how the authors can take an advantage of the online interactive tools to facilitate this complex topic. These interactive tools can enhance the...

    Provided By mecs-press

  • White Papers // Mar 2012

    Improve Teaching Method of Data Mining Course

    It is clearly perceived that most of theoretical information, the authors teach to students are lost after graduation, mostly because abstract information do not last in students' minds much longer than the final exams, as they are not related to practical aspects and uses. Though labs are useful, they are...

    Provided By mecs-press

  • White Papers // Mar 2012

    Gender Differences on Information Literacy of Science and Engineering Undergraduates

    Information Literacy (IL) forms the basis of lifelong learning and plays very important role for students majoring in science and engineering. As far as higher education concerned, gender differences to may influence students' academic achievements. In order to evaluate the gender differences on information literacy of undergraduates, the authors surveyed...

    Provided By mecs-press

  • White Papers // Mar 2012

    Robust Algorithm for Face Detection in Color Images

    Robust Algorithm is presented for frontal face detection in color images. Face detection is an important task in facial analysis systems in order to have a priori localized faces in a given image. Applications such as face tracking, facial expression recognition, gesture recognition, etc., for example, have a pre-requisite that...

    Provided By mecs-press

  • White Papers // Jan 2013

    Rigorous Progress on Algorithms Based Routing and Wavelength Assignment in Trans-Egypt Network (TEGYNET) Management

    In simple Wavelength-Division Multiplexed (WDM) networks, a connection must be established along a route using a common wavelength on all of the links along the route. The introduction of wavelength converters into WDM cross connects increases the hardware cost and complexity. Given a set of connection requests, the routing and...

    Provided By mecs-press

  • White Papers // Jan 2013

    Hybrid Model for Location Privacy in Wireless Ad-Hoc Networks

    In the today's fast growing world, use of internet is increasing popularly and at the same time Location-Based Services (LBS) are also getting more popular. LBS providers require user's current locations to answer their location-based queries. The primary objective of the present work is to develop a system which preserves...

    Provided By mecs-press

  • White Papers // Jan 2013

    Effective Congestion Avoidance Scheme for Mobile Ad Hoc Networks

    Mobile nodes are organized randomly without any access point in Mobile Ad hoc NETworks (MANETs). Due to the mobility of nodes, the network congestion occurs. So many congestion control mechanisms were proposed to avoid the congestion avoidance or reducing the congestion status. In this research work, the authors proposed to...

    Provided By mecs-press

  • White Papers // Jan 2013

    Performance Comparison and Evaluation of Different Multipath Routing Protocols Based on Various Scenario and Traffic Patterns for Mobile AD Hoc Networks

    A MANET is an interconnection of mobile devices by wireless links forming a dynamic topology without much physical network infrastructure such as routers, servers, access points/cables or centralized administration. The multipath routing protocols establish efficient communication within the network by discovering multiple routes between a pair of source and destination...

    Provided By mecs-press

  • White Papers // Oct 2012

    Identifying Key Challenges in Performance Issues in Cloud Computing

    Cloud computing is a harbinger to a newer era in the field of computing where distributed and centralized services are used in a unique way. In cloud computing, the computational resources of different vendors and IT services providers are managed for providing an enormous and a scalable computing services platform...

    Provided By mecs-press

  • White Papers // Feb 2013

    Enhancing the Capacity of Stratospheric Cellular Networks Using Adaptive Array Techniques

    In this paper, the capacity of stratospheric cellular communications is improved by optimizing the amplitude feeding of the Concentric Rings Array (CRA). The weighting profile of this array is chosen to be a cosine function raised to some power to control the beam pattern used in the cellular coverage. The...

    Provided By mecs-press

  • White Papers // Apr 2013

    Location Prediction of Mobility Management Using Soft Computing Techniques in Cellular Network

    This paper describes the neural network technique to solve location management problem. A multilayer neural model is designed to predict the future prediction of the subscriber based on the past predicted information of the subscriber. In this paper, a prediction based location management scheme is proposed for locating a mobile...

    Provided By mecs-press

  • White Papers // Apr 2013

    A Fair Downlink Scheduling Algorithm for 3GPP LTE Networks

    Long Term Evolution (LTE), the standard specified by 3GPP on the way towards the fourth generation mobile networks, is intended to deliver high speed data and multimedia services to next generation mobile users. The Radio Resource Management (RRM) plays a very crucial role in managing limited radio resources to enhance...

    Provided By mecs-press

  • White Papers // Apr 2013

    Password Hardened Biometric: A Complete Solution of Online Security

    In present paper, secure online access to enterprises resources is very important for any organization. To protect valuable data become one of the big challenge for today's business as enterprise customers or clients involved in Business-to-Customer (B2C) and Business-to-Business (B2B) e-commerce need to feel that their transactions are secured from...

    Provided By mecs-press

  • White Papers // Apr 2013

    A Robust Fault Detection Scheme for the Advanced Encryption Standard

    Fault attacks are powerful and efficient cryptanalysis techniques to find the secret key of the Advanced Encryption Standard (AES) algorithm. These attacks are based on injecting faults into the structure of the AES to obtain the confidential information. To protect the AES implementation against these attacks, a number of countermeasures...

    Provided By mecs-press

  • White Papers // Jan 2013

    Exponential Brute-Force Complexity of A Permutation Based Stream Cipher

    This paper introduces a permutation generation mechanism based on a shared secret key. The generated permutation vectors are used as encryption keys in a stream ciphering cryptosystem. The authors investigated various types of attacks on the known stream cipher RC4 and patched most of its loopholes, especially biased-byte and state-related...

    Provided By mecs-press

  • White Papers // Jan 2013

    Performance Evaluation of Security-Throughput Tradeoff with Channel Adaptive Encryption

    With the ever increasing volume of information over wireless medium, security has assumed an important dimension. The security of transmitted data over a wireless channel aims at protecting the data from unauthorized intrusion. Wireless network security is achieved using cryptographic primitives. Some properties that give encryption mechanism their cryptographic strength...

    Provided By mecs-press

  • White Papers // Jan 2013

    An Efficient Novel Key Management Scheme for Enhancing User Authentication in A WSN

    The Wireless Sensor Networks are energy constrained and are normally low cost and low power devices. These nodes are deployed over a specific area for specific goals. Due to energy and memory constraints, secure communication among these sensors is challenging management issue. In order to ensure security, proper connectivity among...

    Provided By mecs-press

  • White Papers // Apr 2013

    Effect of Black Hole Attack on MANET Routing Protocols

    Due to the massive existing vulnerabilities in mobile ad-hoc networks, they may be insecure against attacks by the malicious nodes. In this paper, the authors have analyzed the effects of Black hole attack on mobile ad hoc routing protocols. Mainly two protocols AODV and Improved AODV have been considered. Simulation...

    Provided By mecs-press

  • White Papers // Nov 2012

    Swarm Flooding Attack Against Directed Diffusion in Wireless Sensor Networks

    The objective of this paper is to study the vulnerabilities of sensor networks, design, and implement new approaches for routing attack. As one of the cornerstones of network infrastructure, routing systems are facing more threats than ever; they are vulnerable by nature and challenging to protect. The authors present a...

    Provided By mecs-press

  • White Papers // Nov 2012

    Risk Management Strategies for the Use of Cloud Computing

    Cloud computing may lead to both cost-efficiency and flexibility, but it also inevitably triggers a certain degree of loss exposure. Unfortunately, there is little objective, scientific research focused on identifying and evaluating the loss exposure that results from cloud computing. In this study, a modified Delphi method and the analytic...

    Provided By mecs-press

  • White Papers // Nov 2012

    Need of Removing Delivered Message Replica From Delay Tolerant Network - A Problem Definition

    Recent wireless networks observe number of deployments in various conditions where they come across different intensities of link disconnection. On the basis of extent of the operating circumstances these networks are termed as Intermittently Connected Networks (ICNs). The prevailing TCP/IP protocol cannot be operational in ICNs thus providing number of...

    Provided By mecs-press

  • White Papers // Nov 2012

    Security Mechanisms to Decrease Vulnerability of Ad-Hoc Routing Protocols

    Many proposed routing protocols for ad hoc networks operate in an ad hoc fashion, as on demand routing protocols often have low overhead and faster reaction time than other types of routing based on periodic protocols. Dynamic nature of ad-hoc networks leads to challenges in securing the network. Due to...

    Provided By mecs-press

  • White Papers // Oct 2012

    Extended Queue Management Backward Congestion Control Algorithms for Web Transfers in Wireless Environment

    Wireless links are characterized by high error rates and intermittent connectivity. TCP congestion control has been developed on the assumption that network congestion is the only cause for packet loss. Upon detecting a packet loss, TCP drops it's transmit window resulting in an unnecessary reduction of end-to-end throughput which results...

    Provided By mecs-press

  • White Papers // Oct 2012

    A New 512 Bit Cipher for Secure Communication

    The internet today is being used by millions of users for a large variety of commercial and non commercial purposes. It is controlled by different entities. It is mainly used as an efficient means for communication, entertainment and education. With the rapid growth of internet, there is a need for...

    Provided By mecs-press

  • White Papers // Sep 2012

    Self Organized Replica Overlay Scheme for P2P Networks

    Peer-to-Peer (P2P) systems are widely used for data sharing applications in an autonomous and decentralized mode. P2P systems are suitable for largescale distributed environments in which nodes can share resources other than data such as computing power, memory and network bandwidth. Some of important parameters that affect the performance of...

    Provided By mecs-press

  • White Papers // Oct 2012

    E-Commerce Evaluation and E Business Trends

    The impact of information and communication technology on varied areas of the Global economy and current trends in e business is an area of research that could lead to valuable business insights. The adaptation of business models to accommodate the customer's needs for providing an internet based business transaction platform...

    Provided By mecs-press

  • White Papers // Oct 2009

    Modeling and Analysis on a DTN Based Wireless Sensor Network Topology Control

    Wireless Sensor Networks (WSNs) have unlimited and extensive potential application in different areas. Due to WSNs' work environments and nodes behavior, intermitted network connection may occur frequently, which lead packets delay and lose in the process of data transmission. Most related works on WSNs, seldom consider how to address the...

    Provided By mecs-press

  • White Papers // Nov 2010

    Low-Power Wireless Pressure Transmitter and Net of Oil-Well Based on Zigbee

    The paper introduced a low-power wireless pressure transmitter for measure pressure and temperature of oil-well. To avoid wiring cables onsite, ZICM2410 was adopted to construct Wireless Sensor Network (WSN), and powered by Li-Ion battery. To reduce the power consumption, MSP430F477 and other low-power chips were used to construct the hardware,...

    Provided By mecs-press

  • White Papers // Oct 2009

    Research of Intrusion Detection Technology and Its Formal Modeling

    The intrusion detection technology is one of the most important dynamic security technologies, which can be used in the critical security system construction and the basic service protection. Apparently, applying formal specification to the procedure of developing an intrusion detection system can fulfill their security requirement and win the confidence...

    Provided By mecs-press

  • White Papers // Feb 2013

    Integrated Safety Mechanisms Based on Security Risks Minimization for the Distributed Computer Systems

    Today, there are known the basic principles of decision-making on the safety control of distributed computer systems in the face of uncertainty and risk. However, in this area there are no practical methods for the quantitative risk analysis and assessment, taking into account the dynamic changes of security threats, which...

    Provided By mecs-press

  • White Papers // Feb 2013

    Selection of Next Generation Anti-Virus against Virus Attacks in Networks Using AHP

    Defending against virus attacks in network is a vital part of network security. With the rapid evolution of viruses, its defense mechanism has also been evolved over the years. But given the diversity and complexity of virus propagation and its attack behavior, no defense mechanism is equipped fully to protect...

    Provided By mecs-press