mecs-press

Displaying 1-40 of 808 results

  • White Papers // May 2015

    Evaluation of Load Balancing Performance of Parallel Processing Linear Time-Delay Systems

    Time delays in system states or control may result into unacceptable system operation or uncertainty in specialized technical systems like aircraft control, plant control, robotics etc. The issue of robustness, controllability, traceability, flexible management, reliability and safety of such systems with time-delays, has been one of the primary research focuses...

    Provided By mecs-press

  • White Papers // May 2015

    Increasing ERP Implementation Success Ratio by Focusing on Data Quality & User Participation

    ERP systems projects have been spread widely across many organizations in general and Small and Medium Enterprises (SMEs) in particular. Regrettably, failures were the results for most of the ERP implementations. As a result of that, Critical Failure and Success Factors (CFFs & CSFs) have been identified with the help...

    Provided By mecs-press

  • White Papers // May 2015

    Integration of Heterogeneous Cloud Storages through an Intermediate WCF Service

    Many organizations provide computing resources or services to the client like hardware, software, storage etc. Storage is one of important service that is popular and commonly used today and it provides storage space online to store the data. Service providers give a storage space to consumers on the basis of...

    Provided By mecs-press

  • White Papers // Apr 2015

    Adaptive Inverse Model of Nonlinear Systems

    In this paper, the authors propose Nonlinear Adaptive Filter-Bank (NAFB) based algorithm for inverse modeling of nonlinear systems. Inverse modeling has been an important component for sensor linearization, adaptive control and channel equalization in communication system and active noise control. Under practical situations, the plant/system behaves nonlinearly which can be...

    Provided By mecs-press

  • White Papers // Apr 2015

    Multi-Objective Task Scheduling in the Cloud Computing based on the Patrice Swarm Optimization

    Cloud computing is the latest emerging trend in distributed computing, where shared resources are provided to end-users in an on demand fashion that brings many advantages, including data ubiquity, flexibility of access, high availability of resources and flexibility. In this type of systems many challenges are existed that the task...

    Provided By mecs-press

  • White Papers // Apr 2015

    Development of the Model of Dynamic Storage Distribution in Data Processing Centers

    In this paper, the authors review dynamic distribution of storage resources among the users in data processing centers. The process of changing memory usage state was revealed to be the process of Markov. The paper proposes the development of stochastic model of the memory and computing usage distribution and the...

    Provided By mecs-press

  • White Papers // Apr 2015

    A New Approach for Dynamic Virtual Machine Consolidation in Cloud Data Centers

    Cloud computing environments have introduced a new model of computing by shifting the location of computing infrastructure to the Internet network to reduce the cost associated with the management of hardware and software resources. The cloud model uses virtualization technology to effectively consolidate Virtual Machines (VMs) into Physical Machines (PMs)...

    Provided By mecs-press

  • White Papers // Mar 2015

    A Novel Quaternary Full Adder Cell Based on Nanotechnology

    Binary logic circuits are limited by the requirement of interconnections. A feasible solution is to transmit more information over a signal line and utilizing Multiple-Valued Logic (MVL). This paper presents a novel high performance quaternary full adder cell based on Carbon NanoTube Field Effect Transistor (CNTFET). The proposed Quaternary full...

    Provided By mecs-press

  • White Papers // Mar 2015

    Feature Extraction or Feature Selection for Text Classification: A Case Study on Phishing Email Detection

    Dimensionality reduction is generally performed when high dimensional data like text are classified. This can be done either by using feature extraction techniques or by using feature selection techniques. This paper analyses which dimension reduction technique is better for classifying text data like emails. Email classification is difficult due to...

    Provided By mecs-press

  • White Papers // Mar 2015

    An Experimental Study of K Algorithm

    Machine Learning techniques are taking place in all areas of everyone lives, to help them to make decisions. There are a large number of algorithms available for multiple purposes and appropriate for specific data types. That is why it is required to pay special attention to decide which is the...

    Provided By mecs-press

  • White Papers // Mar 2015

    An Analysis of RDF Storage Models and Query Optimization Techniques

    The Web provides access to substantial amount of information. Metadata that means data about data enables the discovery of such information. When the metadata is effectively used, it increases the usefulness of the original data/resource and facilitates the resource discovery. Resource Description Framework (RDF) is a basis for handling these...

    Provided By mecs-press

  • White Papers // Mar 2015

    Hypervisors' Guest Isolation Capacity Evaluation in the Private Cloud using SIAGR Framework

    Hypervisor vendors do claim that they have negated virtualization overhead compared to a native system. They also state that complete guest isolation is achieved while running multiple guest Operating Systems (OSs) on their hypervisors. But in a virtualization environment which is a combination of hardware, hypervisor and Virtual Machines (VMs)...

    Provided By mecs-press

  • White Papers // Mar 2015

    Delay Scheduling Based Replication Scheme for Hadoop Distributed File System

    The data generated and processed by modern computing systems burgeon rapidly. MapReduce is an important programming model for large scale data intensive applications. Hadoop is a popular open source implementation of MapReduce and Google File System (GFS). The scalability and fault-tolerance feature of Hadoop makes it as a standard for...

    Provided By mecs-press

  • White Papers // Mar 2015

    Microcontroller based Home Security and Load Controlling using GSM Technology

    Home automation referred to as 'Intelligent home' or 'Automated home', indicates the automation of daily tasks with electrical devices used in homes. This could be the control of lights or more complex chores such as remote viewing of the house interiors for surveillance purposes. The emerging concept of smart homes...

    Provided By mecs-press

  • White Papers // Mar 2015

    Matlab-based Computer-Aided-Design Algorithm for Designing Stepped-Impedance Resonator Low-Pass Filters in Microstrip Technology

    An accurate MATLAB-based CAD (Computer Aided Design) algorithm for quickly designing microstrip-based Stepped-Impedance Resonator (SIR) low-pass filter is reported. The algorithm uses a circuit-theory approach to implement speedy computations, compared to the time-consuming computations involved in using electromagnetic theory. The accuracy of the proposed algorithm is verified for two widely-different...

    Provided By mecs-press

  • White Papers // Feb 2015

    Optimized Speech Compression Algorithm Based on Wavelets Techniques and its Real Time Implementation on DSP

    This paper presents an optimized speech compression algorithm using discrete wavelet transform, and its real time implementation on fixed-point Digital Signal Processor (DSP). The optimized speech compression algorithm presents the advantages to ensure low complexity, low bit rate and achieve high speech coding efficiency and this by adding a Voice...

    Provided By mecs-press

  • White Papers // Jan 2015

    A Novel Testing Model for SOA Based Services

    SOA (Service-Oriented Architecture) filled the gap between software and commercial enterprise. SOA integrates multiple web services. The authors bear to secure the caliber of web services that gives guarantee about what network services work and their output results. There is close to work has to be performed for an automatic...

    Provided By mecs-press

  • White Papers // Jan 2015

    Using Wavelet-Based Contourlet Transform Illumination Normalization for Face Recognition

    Evidently, the results of a face recognition system can be influenced by image illumination conditions. Regarding this, the authors proposed a system using wavelet-based contourlet transform normalization as an efficient method to enhance the lighting conditions of a face image. Particularly, this method can sharpen a face image and enhance...

    Provided By mecs-press

  • White Papers // Jan 2015

    PD Controller Structures: Comparison and Selection for an Electromechanical System

    Many different PD controller modeling, configurations and control algorithms have been developed. These methods differ in their theoretical basis and performance under the changes of system conditions. In the present paper, the authors review the methods used in the design of PD control systems. They highlight the main difficulties and...

    Provided By mecs-press

  • White Papers // Jan 2015

    A Web 2.0 Supported Business Process Management Environment for Collaborative Research

    Collaborative research includes research activities conducted by a group of people working at different locations and has become a hot issue due to the effects of globalization and advances in Information Technology (IT). This paper is to design, develop, implement and evaluate an IT environment to better manage the standard...

    Provided By mecs-press

  • White Papers // Jan 2015

    Enable Better and Timelier Decision-Making Using Real-Time Business Intelligence System

    Today's businesses need support when making decisions. Business intelligence (BI) helps businesses to make decisions based on good pre-analysis and documented data and enables information to be presented when and where the decisions need to be made. Real Time Business Intelligence (RTBI) presents numbers in real time, providing the decision...

    Provided By mecs-press

  • White Papers // Jan 2015

    A Comprehensive Survey on Cloud Computing

    Cloud computing is an innovation ideas that helps in reducing the computing cost. Cloud computing offers better computing through improved utilization and reduced administration and infrastructure costs. Cloud computing is the long-held dream of computing as a utility. Cloud computing is the combination of Software as a Service (SaaS) and...

    Provided By mecs-press

  • White Papers // Jan 2015

    Intelligent Adaptive Gain Backstepping Technique

    In this paper, the authors presented intelligent adaptive backstepping control as robust control for continuum robot. This paper is to design a Proportional-Derivative (PD) fuzzy system to compensate the system model uncertainties. It is focused on the design tuning gain adaptive methodology according to high quality partly nonlinear methodology. Conventional...

    Provided By mecs-press

  • White Papers // Jan 2015

    A Swarm Intelligence based Model for Mobile Cloud Computing

    Mobile Computing (MC) provides multi services and a lot of advantages for millions of users across the world over the internet. Millions of business customers have leveraged cloud computing services through mobile devices to get what is called Mobile Cloud Computing (MCC). MCC aims at using cloud computing techniques for...

    Provided By mecs-press

  • White Papers // Jan 2015

    OpenMP Dual Population Genetic Algorithm for Solving Constrained Optimization Problems

    Dual population genetic algorithm is an effective optimization algorithm that provides additional diversity to the main population. It deals with the premature convergence problem as well as the diversity problem associated with genetic algorithm. But dual population introduces additional search space that increases time required to find an optimal solution....

    Provided By mecs-press

  • White Papers // Dec 2014

    A Light-Weight Symmetric Encryption Algorithm Based on Feistel Cryptosystem Structure

    WSNs is usually deployed in opening wireless environment, its data is easy to be intercepted by attackers. It is necessary to adopt some encryption measurements to protect data of WSNs. But the battery capacity, CPU performance and RAM capacity of WSNs sensors are all limited; the complex encryption algorithm is...

    Provided By mecs-press

  • White Papers // Dec 2014

    Mean Response Time Approximation for HTTP Transactions over Transport Protocols

    In this paper, the authors address mean response time that end-users experience when using the Internet. HTTP (Hyper Text Transfer Protocol) is a widely used transfer protocol to retrieve web objects in the Internet. Generally, HTTP uses TCP (Transmission Control Protocol) in a transport layer. But it is known that...

    Provided By mecs-press

  • White Papers // Dec 2014

    An Improvement Over a Server-Less RFID Authentication Protocol

    With the increased Radio Frequency IDentification (RFID) applications different authentication schemes have been proposed in order to meet the required properties. In this paper, the authors analyze the security of a server-less RFID authentication protocol which is proposed in 2014. The researcher proposed an improvement over Hoque protocol to overcome...

    Provided By mecs-press

  • White Papers // Dec 2014

    Performance Evaluation of Distributed Protocols Using Different Levels of Heterogeneity Models in Wireless Sensor Networks

    Most of the protocols for enhancing the lifetime of Wireless Sensor Networks (WSNs) are of a homogeneous nature in which all sensors have equal amount of energy level. In this paper, the authors study the effect of heterogeneity on the homogeneous protocols. The ALBPS and ADEEPS are the two important...

    Provided By mecs-press

  • White Papers // Dec 2014

    Design of a Web Interface for Fractional Chaotic Systems

    There exists a great number of works related to chaotic systems investigated by many researchers, especially about Lorenz chaotic system. If the order of differentiation of variables is fractional, the systems are called fractional chaotic systems. In this paper, a web-based interface is designed for fractional composition of five different...

    Provided By mecs-press

  • White Papers // Dec 2014

    Analysis and Comparison of Access Control Policies Validation Mechanisms

    Validation and verification of security policies is a critical and important task to ensure that access control policies are error free. The two most common problems present in access control policies are: inconsistencies and incompleteness. In order to detect such problems, various access control policy validation mechanisms are proposed by...

    Provided By mecs-press

  • White Papers // Dec 2014

    TSSR: A Proposed Tool for Secure Software Requirement Management

    In this paper, the authors provide a unified framework in which entire design of the project can be captured right from the beginning of the software development. This paper discusses about the requirements which should be included in the development of the requirement management tools. As the requirements, criteria which...

    Provided By mecs-press

  • White Papers // Dec 2014

    Video Quality Analysis of Distributed Video Coding in Wireless Multimedia Sensor Networks

    Multimedia communications in wireless sensor networks is a very challenging task. Video coding with high computational complexity and great contribution to the energy consumption of nodes and video transmission over erroneous wireless channel are the main reasons of these challenges. Distributed video coding has high potential for being deployed in...

    Provided By mecs-press

  • White Papers // Dec 2014

    An Empirical Study on Testing of SOA based Services

    Service-Oriented Architecture (SOA) removed the gap between software and business. Today, there is a business transformation among enterprises and they adopt a service based Information Technology (IT) model. So, testing is necessary for SOA based applications. This paper investigates different type of approaches and techniques that address the testing problems...

    Provided By mecs-press

  • White Papers // Dec 2014

    Evaluating the Maintainability of a Software System by using Fuzzy Logic Approach

    Maintainability is an important quality attribute for almost every quality model. Maintainability of the software is considered as most expensive phase in software development life cycle as it consumes almost major part of the total effort allocated to the software system. Maintainability evaluation is complex due to its imprecise output....

    Provided By mecs-press

  • White Papers // Dec 2014

    A Proposed Process Model for Requirements Engineering using Delphi Techniques for Prioritisation

    Requirements Engineering (RE) addresses the first software development step and lays the foundation for a successful system. Consequently, ability to identify problems and suggestions for improvements in the RE process opens up significant potential for increasing the success of software projects. Since RE process is naturally collaborative in nature, the...

    Provided By mecs-press

  • White Papers // Dec 2014

    An Algorithm for Static Tracing of Message Passing Interface Programs Using Data Flow Analysis

    Message Passing Interface (MPI) is a well know paradigm that is widely used in coding explicit parallel programs. MPI programs exchange data among parallel processes using communication routines. Program execution trace depends on the way that its processes are communicated together. For the same program, there are a lot of...

    Provided By mecs-press

  • White Papers // Dec 2014

    Efficient FPGA Hardware Implementation of Secure Hash Function SHA-2

    The hash function has been studied by designers with the goal to improve its performances in terms of area, frequency and throughput. The hash function is used in many embedded systems to provide security. It is become the default choice for security services in numerous applications. In this paper, the...

    Provided By mecs-press

  • White Papers // Dec 2014

    Teaching Programming Courses Online using Cloud System: Practices and Future Challenges

    Acceptance of cloud systems as the future has given way to a large number of cloud application installations. They have their presence across domains be it banking, gaming, education and others. A cloud based solution brings down the cost of ownership and maintenance for the host organization. For the users...

    Provided By mecs-press

  • White Papers // Dec 2014

    Towards Contextual Mobile Learning

    Increasing usage of mobile technology has brought a widespread awareness in the field of mobile learning as well. One of the main topic of study in the domain of mobile learning is Context. The following paper, presents the major benefits offered by context in the field of mobile learning, along...

    Provided By mecs-press

  • White Papers // Feb 2011

    A WMPLS Based Multicast Mechanism in Mobile Ad Hoc Network

    Merging MPLS into multicast routing protocol in mobile ad hoc network is an elegant method to enhance the network performance and an efficient solution for multicast scalability and control overhead problems. Based on the Wireless MPLS technology, the mechanism and evaluation of a new multicast protocol, the Label Switching Multicast...

    Provided By mecs-press

  • White Papers // Nov 2010

    Low-Power Wireless Pressure Transmitter and Net of Oil-Well Based on Zigbee

    The paper introduced a low-power wireless pressure transmitter for measure pressure and temperature of oil-well. To avoid wiring cables onsite, ZICM2410 was adopted to construct Wireless Sensor Network (WSN), and powered by Li-Ion battery. To reduce the power consumption, MSP430F477 and other low-power chips were used to construct the hardware,...

    Provided By mecs-press

  • White Papers // Oct 2009

    Research of Intrusion Detection Technology and Its Formal Modeling

    The intrusion detection technology is one of the most important dynamic security technologies, which can be used in the critical security system construction and the basic service protection. Apparently, applying formal specification to the procedure of developing an intrusion detection system can fulfill their security requirement and win the confidence...

    Provided By mecs-press

  • White Papers // Nov 2010

    Performance Analysis of Spatial Reused Bandwidth Reservation in Ad Hoc Networks

    In this paper, an approach for spatial reused bandwidth reservation in ad hoc networks is proposed. Resource reservation in wireless networks is an essential component that is needed to support multimedia and real-time applications, such as audio/video conferencing. On the other hand, directional antenna technology provides the capability for considerable...

    Provided By mecs-press

  • White Papers // Nov 2010

    A Wireless Video Transmission Scheme Based on MAC-Independent Opportunistic Routing & Encoding Protocol

    It is a tremendous challenge to transmit real-time video streams over wireless sensor network because of the poor wireless communication conditions and the high requirements of video transmission. The opportunistic routing protocol can take advantage of the broadcast nature of wireless communication and can improve transfer throughput significantly. But the...

    Provided By mecs-press

  • White Papers // Apr 2011

    A Proxy Based Framework for Efficient Range Query Processing in a Cellular Network

    Within the last decade, the continuous development of mobile technology has motivated an intense research in mobile data services. Among these services, location-based services and location-dependant queries have attracted a lot of attention from the software industry as well as from researchers. Although a number of locations based service methods...

    Provided By mecs-press

  • White Papers // May 2011

    A Cost-Aware Resource Selection for Dataintensive Applications in Cloud-Oriented Data Centers

    As a kind of large-scale user-oriented data-intensive computing, cloud computing allows users to utilize on-demand computation, storage, data and services from around the world in a pay-as-you-go model. In cloud environment, applications need access to mass datasets that may each be replicated on different resources (or data centers). Mass data...

    Provided By mecs-press

  • White Papers // Apr 2011

    Mixed QoS Controlled Wireless Streaming Media Transmission Strategy

    Streaming media applications is currently limited by high bandwidth requirements. It is a challenging problem to provide the required Quality of Service (QoS) for the efficient transmission of video data under the varying network conditions such as the time-varying packet loss and fluctuating bandwidth. On Internet the most important part...

    Provided By mecs-press

  • White Papers // Oct 2009

    Modeling and Analysis on a DTN Based Wireless Sensor Network Topology Control

    Wireless Sensor Networks (WSNs) have unlimited and extensive potential application in different areas. Due to WSNs' work environments and nodes behavior, intermitted network connection may occur frequently, which lead packets delay and lose in the process of data transmission. Most related works on WSNs, seldom consider how to address the...

    Provided By mecs-press

  • White Papers // Aug 2012

    Optical Many Casting Using QoS Depend Layer Aware Mechanism

    Many distributed applications require a group of destinations to be coordinated to a single source. Multicasting is a communication paradigm to implement these distributed applications. In multicasting, at least one of the member in the group cannot satisfy the service requirement of the application, the multicast request said to be...

    Provided By mecs-press

  • White Papers // Aug 2012

    Random Handwritten CAPTCHA: Web Security With a Difference

    It is hard to believe a web form without a CAPTCHA. The web survival in this cut-throat competition is impossible without the mechanisms for blocking spam-boats. The spam-boats have now been made intelligent enough to break through machine printed CAPTCHAs. Handwritten CAPTCHA image can be one solution. In this paper...

    Provided By mecs-press

  • White Papers // Jul 2012

    A Novel Approach for Spectrum Access Using Fuzzy Logic in Cognitive Radio

    In this paper, the authors have proposed a novel approach using Fuzzy Logic System (FLS) for the potential management of the spectrum access. They have used four descriptors such as spectrum utilization efficiency of the secondary user, mobility, distance of the primary user, and signal strengths of the secondary users....

    Provided By mecs-press

  • White Papers // Jul 2012

    Trends, Issues and Challenges Concerning Spam Mails

    Traditional correspondence system has now been replaced by internet, which has now become indispensable in everyone's life. With the advent of the internet, majority of people correspond through emails several times in a day. However, as internet has evolved, email is being exploited by spammers so as to disturb the...

    Provided By mecs-press

  • White Papers // Jul 2012

    Doppler Shift Impact On the MIMO OFDM System in Vehicular Channel Condition

    Vehicle-To-Vehicle (V2V) communication systems will play an important role in Intelligent Transportation Systems (ITS). But in high mobility road condition, Orthogonal Frequency Division Multiplexing (OFDM) is very sensitive to Doppler shift. In this scenario Multiple Input and Multiple Output (MIMO) system combined with OFDM, make MIMO -OFDM techniques very attractive...

    Provided By mecs-press

  • White Papers // Aug 2012

    Cryptography Using Multiple Two-Dimensional Chaotic Maps

    In this paper, a symmetric key block cipher cryptosystem is proposed, involving multiple two-dimensional chaotic maps and using 128-bits external secret key. Computer simulations indicate that the cipher has good diffusion and confusion properties with respect to the plaintext and the key. Moreover, it produces ciphertext with random distribution. The...

    Provided By mecs-press

  • White Papers // Jun 2012

    Toward Security Test Automation for Event Driven GUI Web Contents

    The web is taking recently a large percentage of software products. The evolving nature of web applications put a serious challenge on testing, if the people consider the dynamic nature of the current web. More precisely, testing both blocked contents and AJAX interfaces, might create new challenges in terms of...

    Provided By mecs-press

  • White Papers // Jun 2012

    Security Aspects and Challenges in Mobile Adhoc Networks

    The traditional notion of a Adhoc wireless network is one in which there are a few Base Stations or Access Points and a number of Mobile Stations or Nodes. Security has become a primary concern in order to provide protected communication between mobile nodes in a hostile environment. The Adhoc...

    Provided By mecs-press

  • White Papers // Jun 2012

    Multi-User Quantum Key Distribution Using Wavelength Division Multiplexing

    Quantum cryptography, exclusively known as Quantum Key Distribution (QKD), has attracted a lot of attention in the recent years with the discovery that it can provide absolute secrecy for communications. The authors report a new architecture for constructing a fiber-based network of quantum key distribution using optical wavelength division multiplexing...

    Provided By mecs-press

  • White Papers // Jun 2012

    Preventive Aspect of Black Hole Attack in Mobile Ad Hoc Network

    Mobile ad hoc network is infrastructure less type of network. In this paper, the authors present the prevention mechanism for black hole in mobile ad hoc network. The routing algorithms are analyzed and discrete properties of routing protocols are defined. The discrete properties support in distributed routing efficiently. The protocol...

    Provided By mecs-press

  • White Papers // Jun 2012

    Dynamic Inter Arrival Time Based Seamless Handoff for Mobile WIMAX Ping-Pong Calls Bypassing PKMv2 EAP Authentication

    The rapid growth of wireless communication and its persistent use influences all walks of life. Mobile WiMAX IEEE 802.16e standard enabled convergence of mobile and fixed broadband networks through a common wide-area radio-access technology and flexible network architecture. It aims to provide seamless support to its users but an inevitable...

    Provided By mecs-press

  • White Papers // Jun 2012

    Battering Keyloggers and Screen Recording Software by Fabricating Passwords

    The keyloggers are covert security threat to the privacy and identity of users. The attackers are exploring different techniques of keylogging using hardware keyloggers, software keyloggers and screen capturing software to steal the user sensitive data. The Incognizance of the user is imposing greater risk. To overcome this problem, the...

    Provided By mecs-press

  • White Papers // Jun 2012

    IEATH: Improved Energy Aware and Two Hop Multipath Routing Protocol in Wireless Sensor Networks

    Wireless sensor networks in terms of energy sources are limited. Furthermore due to this type of network infrastructure wireless communications and channel errors not possible to reach the correct packet to the destination exists; hence the proposing algorithms to improve the quality of service in these networks and sending packets...

    Provided By mecs-press

  • White Papers // Jun 2012

    Evaluating Overheads of Integrated Multilevel Checkpointing Algorithms in Cloud Computing Environment

    This paper presents a methodology for providing high availability to the demands of cloud's clients. To attain this objective, failover stratagems for cloud computing using integrated checkpointing algorithms are purposed in this paper. Purposed strategy integrate checkpointing feature with load balancing algorithms and also make multilevel checkpoint to decrease checkpointing...

    Provided By mecs-press

  • White Papers // Jun 2012

    Congestion Control in 4G Wireless Networks Using Coalition Game

    In 4G-domain multi home Mobile Host (MH) will have access to different wireless networks. In this 4G wireless networks real time applications are initiated to support services like VOIP, videoconference. These applications use RTP over UDP. These protocols are unresponsive to congestion events. The authors' proposed congestion management scheme minimizes...

    Provided By mecs-press

  • White Papers // Jun 2012

    Optimization Design Parameters of Electro-Optic Modulators for Low Loss Wide Bandwidth Capability of Optical Communication Systems

    The effects of temperature, and operating signal wavelength on high frequency radio frequency transmission characteristics are deeply investigated against various materials based electro optic modulator devices such as Lithium Niobate (LiNbO3), polymer, and semiconductor materials. On the other hand, the authors have developed the optimization of the electro optic modulator...

    Provided By mecs-press

  • White Papers // Jun 2012

    A Hierarchical Load Balancing Policy for Grid Computing Environment

    With the rapid development of high-speed wide-area networks and powerful yet low-cost computational resources, grid computing has emerged as an attractive computing paradigm. It provides resources for solving large scientific applications. It is typically composed of heterogeneous resources such as clusters or sites at different administrative domains connected by networks...

    Provided By mecs-press

  • White Papers // May 2012

    Evaluation of IP Multimedia Subsystem Based Mobile Mass Examination System

    This paper is carried out to develop IP Multimedia Subsystem (IMS) based Mobile Mass Examination (MoMEx) System. MoMEx system is intended to improve on management of examination process for large number of examinees. IMS based application is considered to be the next generation mobile applications that enable developers to take...

    Provided By mecs-press

  • White Papers // May 2012

    A Packet Routing Model for Computer Networks

    The quest for reliable data transmission in today's computer networks and internetworks forms the basis for which routing schemes need be improved upon. The persistent increase in the size of internetwork leads to a dwindling performance of the present routing algorithms which are meant to provide optimal path for forwarding...

    Provided By mecs-press

  • White Papers // May 2012

    Residual Energy Based Anti-Traffic Analysis Privacy Preservation in WSN

    The paper is an effort to build an energy efficient mechanism which can preserve the privacy of the location of base station and the source nodes so that the adversary cannot take down these nodes. Core functionality of WSN includes routing of the sensed data through predetermined optimized routes to...

    Provided By mecs-press

  • White Papers // May 2012

    An Enhanced Dynamic Mutual Authentication Scheme for Smart Card Based Networks

    Network security is the prevailing and challenging factor in computer communications. Computer security and communication security are interrelated and essential features in the internetworking system. Network security is ascertained by many factors like authentication, authorization, digital signatures, cryptography, steganography, etc. Among them authentication is playing an important role in networked...

    Provided By mecs-press

  • White Papers // May 2012

    Digital Forensic Investigation Tools and Procedures

    Due to the significance of Data, in this new age, its' security has become a major issue in the I.T. industry. Cyber attacks from various sources are demanding its prevention in the new era of information security. Digital forensic is a relatively new fields that is the collection, analysis and...

    Provided By mecs-press

  • White Papers // May 2012

    Mobile Governance Based on WiMAX Connectivity for Rural Development in India

    This paper aims to explore the nature, role and relevance of the wireless technologies such as WiMAX connectivity for rural area of Jalgoan district, India. It focuses on development of the WiMAX(Worldwide Interoperability for Microwave Access) network model using OPNET MODELER 14.5 and observe overall performance with fixed, mobile node...

    Provided By mecs-press

  • White Papers // May 2012

    Asymptotic Stability Analysis of E-Speed Start Congestion Control Protocol for TCP

    All the proposed window based congestion control protocols use a single slow start algorithm. It has been shown in literature that slow start inefficiently utilizes bandwidth in a network with high Bandwidth Delay Product (BDP). A multiple startup algorithm (E-speed start) was proposed in this paper. E-speed start specifies a...

    Provided By mecs-press

  • White Papers // May 2012

    Recent Advances of Distributed Optical Fiber Raman Amplifiers in Ultra Wide Wavelength Division Multiplexing Telecommunication Networks

    Recently, many research works have been focused on the fiber optic devices for optical communication systems. One of the main interests is on the optical amplifiers to boost a weak signal in the communication systems. In order to overcome the limitations imposed by electrical regeneration, a means of optical amplification...

    Provided By mecs-press

  • White Papers // Aug 2012

    Cascading of C4.5 Decision Tree and Support Vector Machine for Rule Based Intrusion Detection System

    Main reason for the attack being introduced to the system is because of popularity of the internet. Information security has now become a vital subject. Hence, there is an immediate need to recognize and detect the attacks. Intrusion Detection is defined as a method of diagnosing the attack and the...

    Provided By mecs-press

  • White Papers // Aug 2012

    Modeling Prioritized Hard Handoff Management Scheme for Wireless Mobile Networks

    The channel associated with the current connection serviced by a base station is changed while a call is in progress. Usually, continuous service is achieved by supporting handoff from one cell to another. It is often initiated either by crossing a cell boundary or by deterioration in quality of the...

    Provided By mecs-press

  • White Papers // Aug 2012

    Distributed Encrypting File System for Linux in User-Space

    Linux systems use Encrypting File System (EFS) for providing confidentiality and integrity services to files stored on disk in a secure, efficient and transparent manner. Distributed encrypting file system should also provide support for secure remote access, multiuser file sharing, possible use by non-privileged users, portability, incremental backups, etc. Existing...

    Provided By mecs-press

  • White Papers // Aug 2012

    A New Approach for Multicast Routing in Wireless Mesh Networks

    This paper focuses on the multicast routing in wireless mesh networks under the 802.11s standard. This standard defines the HWMP (Hybrid Wireless Mesh network Protocol) as the protocol of the routing but only unicast and broadcast. Such the standard defines the multicast routing as a goal among several and that...

    Provided By mecs-press

  • White Papers // Aug 2012

    Enhancement of Security and Privacy in Biometric Passport Inspection System Using Face, Fingerprint, and Iris Recognition

    The biometric passports are to prevent the illegal entry of traveler into a specific country and limit the use of counterfeit documents by more accurate identification of an individual. Biometric Passports have been introduced in many countries to improve the security in Inspection Systems and enhance procedures and systems that...

    Provided By mecs-press

  • White Papers // Jul 2012

    UML Based Integrated Multilevel Checkpointing Algorithms for Cloud Computing Environment

    Main objective of this paper is to improve the checkpoint efficiency for integrated multilevel checkpointing algorithms and prevent checkpointing from becoming the bottleneck of cloud data centers. In order to find an efficient checkpoint interval, checkpointing overheads has also considered in this paper. Traditional checkpointing methods stores persistently snapshots of...

    Provided By mecs-press