mecs-press

Displaying 1-40 of 809 results

  • White Papers // May 2015

    Evaluation of Load Balancing Performance of Parallel Processing Linear Time-Delay Systems

    Time delays in system states or control may result into unacceptable system operation or uncertainty in specialized technical systems like aircraft control, plant control, robotics etc. The issue of robustness, controllability, traceability, flexible management, reliability and safety of such systems with time-delays, has been one of the primary research focuses...

    Provided By mecs-press

  • White Papers // May 2015

    Increasing ERP Implementation Success Ratio by Focusing on Data Quality & User Participation

    ERP systems projects have been spread widely across many organizations in general and Small and Medium Enterprises (SMEs) in particular. Regrettably, failures were the results for most of the ERP implementations. As a result of that, Critical Failure and Success Factors (CFFs & CSFs) have been identified with the help...

    Provided By mecs-press

  • White Papers // May 2015

    Integration of Heterogeneous Cloud Storages through an Intermediate WCF Service

    Many organizations provide computing resources or services to the client like hardware, software, storage etc. Storage is one of important service that is popular and commonly used today and it provides storage space online to store the data. Service providers give a storage space to consumers on the basis of...

    Provided By mecs-press

  • White Papers // Apr 2015

    Adaptive Inverse Model of Nonlinear Systems

    In this paper, the authors propose Nonlinear Adaptive Filter-Bank (NAFB) based algorithm for inverse modeling of nonlinear systems. Inverse modeling has been an important component for sensor linearization, adaptive control and channel equalization in communication system and active noise control. Under practical situations, the plant/system behaves nonlinearly which can be...

    Provided By mecs-press

  • White Papers // Apr 2015

    Multi-Objective Task Scheduling in the Cloud Computing based on the Patrice Swarm Optimization

    Cloud computing is the latest emerging trend in distributed computing, where shared resources are provided to end-users in an on demand fashion that brings many advantages, including data ubiquity, flexibility of access, high availability of resources and flexibility. In this type of systems many challenges are existed that the task...

    Provided By mecs-press

  • White Papers // Apr 2015

    Development of the Model of Dynamic Storage Distribution in Data Processing Centers

    In this paper, the authors review dynamic distribution of storage resources among the users in data processing centers. The process of changing memory usage state was revealed to be the process of Markov. The paper proposes the development of stochastic model of the memory and computing usage distribution and the...

    Provided By mecs-press

  • White Papers // Apr 2015

    A New Approach for Dynamic Virtual Machine Consolidation in Cloud Data Centers

    Cloud computing environments have introduced a new model of computing by shifting the location of computing infrastructure to the Internet network to reduce the cost associated with the management of hardware and software resources. The cloud model uses virtualization technology to effectively consolidate Virtual Machines (VMs) into Physical Machines (PMs)...

    Provided By mecs-press

  • White Papers // Apr 2015

    Scrutable Mobile Client-Side Personalization

    Personalization has become an essential feature of mobile services of different domains. On the other hand, users have conflicting needs of personalized experience and privacy. This leads to the question of how to maximize the user's experience of personalized mobile services while keeping privacy. One possible solution is to provide...

    Provided By mecs-press

  • White Papers // Mar 2015

    A Novel Quaternary Full Adder Cell Based on Nanotechnology

    Binary logic circuits are limited by the requirement of interconnections. A feasible solution is to transmit more information over a signal line and utilizing Multiple-Valued Logic (MVL). This paper presents a novel high performance quaternary full adder cell based on Carbon NanoTube Field Effect Transistor (CNTFET). The proposed Quaternary full...

    Provided By mecs-press

  • White Papers // Mar 2015

    Feature Extraction or Feature Selection for Text Classification: A Case Study on Phishing Email Detection

    Dimensionality reduction is generally performed when high dimensional data like text are classified. This can be done either by using feature extraction techniques or by using feature selection techniques. This paper analyses which dimension reduction technique is better for classifying text data like emails. Email classification is difficult due to...

    Provided By mecs-press

  • White Papers // Mar 2015

    An Experimental Study of K Algorithm

    Machine Learning techniques are taking place in all areas of everyone lives, to help them to make decisions. There are a large number of algorithms available for multiple purposes and appropriate for specific data types. That is why it is required to pay special attention to decide which is the...

    Provided By mecs-press

  • White Papers // Mar 2015

    An Analysis of RDF Storage Models and Query Optimization Techniques

    The Web provides access to substantial amount of information. Metadata that means data about data enables the discovery of such information. When the metadata is effectively used, it increases the usefulness of the original data/resource and facilitates the resource discovery. Resource Description Framework (RDF) is a basis for handling these...

    Provided By mecs-press

  • White Papers // Mar 2015

    Hypervisors' Guest Isolation Capacity Evaluation in the Private Cloud using SIAGR Framework

    Hypervisor vendors do claim that they have negated virtualization overhead compared to a native system. They also state that complete guest isolation is achieved while running multiple guest Operating Systems (OSs) on their hypervisors. But in a virtualization environment which is a combination of hardware, hypervisor and Virtual Machines (VMs)...

    Provided By mecs-press

  • White Papers // Mar 2015

    Delay Scheduling Based Replication Scheme for Hadoop Distributed File System

    The data generated and processed by modern computing systems burgeon rapidly. MapReduce is an important programming model for large scale data intensive applications. Hadoop is a popular open source implementation of MapReduce and Google File System (GFS). The scalability and fault-tolerance feature of Hadoop makes it as a standard for...

    Provided By mecs-press

  • White Papers // Mar 2015

    Microcontroller based Home Security and Load Controlling using GSM Technology

    Home automation referred to as 'Intelligent home' or 'Automated home', indicates the automation of daily tasks with electrical devices used in homes. This could be the control of lights or more complex chores such as remote viewing of the house interiors for surveillance purposes. The emerging concept of smart homes...

    Provided By mecs-press

  • White Papers // Mar 2015

    Matlab-based Computer-Aided-Design Algorithm for Designing Stepped-Impedance Resonator Low-Pass Filters in Microstrip Technology

    An accurate MATLAB-based CAD (Computer Aided Design) algorithm for quickly designing microstrip-based Stepped-Impedance Resonator (SIR) low-pass filter is reported. The algorithm uses a circuit-theory approach to implement speedy computations, compared to the time-consuming computations involved in using electromagnetic theory. The accuracy of the proposed algorithm is verified for two widely-different...

    Provided By mecs-press

  • White Papers // Feb 2015

    Optimized Speech Compression Algorithm Based on Wavelets Techniques and its Real Time Implementation on DSP

    This paper presents an optimized speech compression algorithm using discrete wavelet transform, and its real time implementation on fixed-point Digital Signal Processor (DSP). The optimized speech compression algorithm presents the advantages to ensure low complexity, low bit rate and achieve high speech coding efficiency and this by adding a Voice...

    Provided By mecs-press

  • White Papers // Jan 2015

    A Novel Testing Model for SOA Based Services

    SOA (Service-Oriented Architecture) filled the gap between software and commercial enterprise. SOA integrates multiple web services. The authors bear to secure the caliber of web services that gives guarantee about what network services work and their output results. There is close to work has to be performed for an automatic...

    Provided By mecs-press

  • White Papers // Jan 2015

    Using Wavelet-Based Contourlet Transform Illumination Normalization for Face Recognition

    Evidently, the results of a face recognition system can be influenced by image illumination conditions. Regarding this, the authors proposed a system using wavelet-based contourlet transform normalization as an efficient method to enhance the lighting conditions of a face image. Particularly, this method can sharpen a face image and enhance...

    Provided By mecs-press

  • White Papers // Jan 2015

    PD Controller Structures: Comparison and Selection for an Electromechanical System

    Many different PD controller modeling, configurations and control algorithms have been developed. These methods differ in their theoretical basis and performance under the changes of system conditions. In the present paper, the authors review the methods used in the design of PD control systems. They highlight the main difficulties and...

    Provided By mecs-press

  • White Papers // Jan 2015

    A Web 2.0 Supported Business Process Management Environment for Collaborative Research

    Collaborative research includes research activities conducted by a group of people working at different locations and has become a hot issue due to the effects of globalization and advances in Information Technology (IT). This paper is to design, develop, implement and evaluate an IT environment to better manage the standard...

    Provided By mecs-press

  • White Papers // Jan 2015

    Enable Better and Timelier Decision-Making Using Real-Time Business Intelligence System

    Today's businesses need support when making decisions. Business intelligence (BI) helps businesses to make decisions based on good pre-analysis and documented data and enables information to be presented when and where the decisions need to be made. Real Time Business Intelligence (RTBI) presents numbers in real time, providing the decision...

    Provided By mecs-press

  • White Papers // Jan 2015

    A Comprehensive Survey on Cloud Computing

    Cloud computing is an innovation ideas that helps in reducing the computing cost. Cloud computing offers better computing through improved utilization and reduced administration and infrastructure costs. Cloud computing is the long-held dream of computing as a utility. Cloud computing is the combination of Software as a Service (SaaS) and...

    Provided By mecs-press

  • White Papers // Jan 2015

    Intelligent Adaptive Gain Backstepping Technique

    In this paper, the authors presented intelligent adaptive backstepping control as robust control for continuum robot. This paper is to design a Proportional-Derivative (PD) fuzzy system to compensate the system model uncertainties. It is focused on the design tuning gain adaptive methodology according to high quality partly nonlinear methodology. Conventional...

    Provided By mecs-press

  • White Papers // Jan 2015

    A Swarm Intelligence based Model for Mobile Cloud Computing

    Mobile Computing (MC) provides multi services and a lot of advantages for millions of users across the world over the internet. Millions of business customers have leveraged cloud computing services through mobile devices to get what is called Mobile Cloud Computing (MCC). MCC aims at using cloud computing techniques for...

    Provided By mecs-press

  • White Papers // Jan 2015

    OpenMP Dual Population Genetic Algorithm for Solving Constrained Optimization Problems

    Dual population genetic algorithm is an effective optimization algorithm that provides additional diversity to the main population. It deals with the premature convergence problem as well as the diversity problem associated with genetic algorithm. But dual population introduces additional search space that increases time required to find an optimal solution....

    Provided By mecs-press

  • White Papers // Dec 2014

    A Light-Weight Symmetric Encryption Algorithm Based on Feistel Cryptosystem Structure

    WSNs is usually deployed in opening wireless environment, its data is easy to be intercepted by attackers. It is necessary to adopt some encryption measurements to protect data of WSNs. But the battery capacity, CPU performance and RAM capacity of WSNs sensors are all limited; the complex encryption algorithm is...

    Provided By mecs-press

  • White Papers // Dec 2014

    Mean Response Time Approximation for HTTP Transactions over Transport Protocols

    In this paper, the authors address mean response time that end-users experience when using the Internet. HTTP (Hyper Text Transfer Protocol) is a widely used transfer protocol to retrieve web objects in the Internet. Generally, HTTP uses TCP (Transmission Control Protocol) in a transport layer. But it is known that...

    Provided By mecs-press

  • White Papers // Dec 2014

    An Improvement Over a Server-Less RFID Authentication Protocol

    With the increased Radio Frequency IDentification (RFID) applications different authentication schemes have been proposed in order to meet the required properties. In this paper, the authors analyze the security of a server-less RFID authentication protocol which is proposed in 2014. The researcher proposed an improvement over Hoque protocol to overcome...

    Provided By mecs-press

  • White Papers // Dec 2014

    Performance Evaluation of Distributed Protocols Using Different Levels of Heterogeneity Models in Wireless Sensor Networks

    Most of the protocols for enhancing the lifetime of Wireless Sensor Networks (WSNs) are of a homogeneous nature in which all sensors have equal amount of energy level. In this paper, the authors study the effect of heterogeneity on the homogeneous protocols. The ALBPS and ADEEPS are the two important...

    Provided By mecs-press

  • White Papers // Dec 2014

    Design of a Web Interface for Fractional Chaotic Systems

    There exists a great number of works related to chaotic systems investigated by many researchers, especially about Lorenz chaotic system. If the order of differentiation of variables is fractional, the systems are called fractional chaotic systems. In this paper, a web-based interface is designed for fractional composition of five different...

    Provided By mecs-press

  • White Papers // Dec 2014

    Analysis and Comparison of Access Control Policies Validation Mechanisms

    Validation and verification of security policies is a critical and important task to ensure that access control policies are error free. The two most common problems present in access control policies are: inconsistencies and incompleteness. In order to detect such problems, various access control policy validation mechanisms are proposed by...

    Provided By mecs-press

  • White Papers // Dec 2014

    TSSR: A Proposed Tool for Secure Software Requirement Management

    In this paper, the authors provide a unified framework in which entire design of the project can be captured right from the beginning of the software development. This paper discusses about the requirements which should be included in the development of the requirement management tools. As the requirements, criteria which...

    Provided By mecs-press

  • White Papers // Dec 2014

    Video Quality Analysis of Distributed Video Coding in Wireless Multimedia Sensor Networks

    Multimedia communications in wireless sensor networks is a very challenging task. Video coding with high computational complexity and great contribution to the energy consumption of nodes and video transmission over erroneous wireless channel are the main reasons of these challenges. Distributed video coding has high potential for being deployed in...

    Provided By mecs-press

  • White Papers // Dec 2014

    An Empirical Study on Testing of SOA based Services

    Service-Oriented Architecture (SOA) removed the gap between software and business. Today, there is a business transformation among enterprises and they adopt a service based Information Technology (IT) model. So, testing is necessary for SOA based applications. This paper investigates different type of approaches and techniques that address the testing problems...

    Provided By mecs-press

  • White Papers // Dec 2014

    Evaluating the Maintainability of a Software System by using Fuzzy Logic Approach

    Maintainability is an important quality attribute for almost every quality model. Maintainability of the software is considered as most expensive phase in software development life cycle as it consumes almost major part of the total effort allocated to the software system. Maintainability evaluation is complex due to its imprecise output....

    Provided By mecs-press

  • White Papers // Dec 2014

    A Proposed Process Model for Requirements Engineering using Delphi Techniques for Prioritisation

    Requirements Engineering (RE) addresses the first software development step and lays the foundation for a successful system. Consequently, ability to identify problems and suggestions for improvements in the RE process opens up significant potential for increasing the success of software projects. Since RE process is naturally collaborative in nature, the...

    Provided By mecs-press

  • White Papers // Dec 2014

    An Algorithm for Static Tracing of Message Passing Interface Programs Using Data Flow Analysis

    Message Passing Interface (MPI) is a well know paradigm that is widely used in coding explicit parallel programs. MPI programs exchange data among parallel processes using communication routines. Program execution trace depends on the way that its processes are communicated together. For the same program, there are a lot of...

    Provided By mecs-press

  • White Papers // Dec 2014

    Efficient FPGA Hardware Implementation of Secure Hash Function SHA-2

    The hash function has been studied by designers with the goal to improve its performances in terms of area, frequency and throughput. The hash function is used in many embedded systems to provide security. It is become the default choice for security services in numerous applications. In this paper, the...

    Provided By mecs-press

  • White Papers // Dec 2014

    Teaching Programming Courses Online using Cloud System: Practices and Future Challenges

    Acceptance of cloud systems as the future has given way to a large number of cloud application installations. They have their presence across domains be it banking, gaming, education and others. A cloud based solution brings down the cost of ownership and maintenance for the host organization. For the users...

    Provided By mecs-press