mecs-press

Displaying 1-40 of 335 results

  • White Papers // Feb 2014

    A Hybrid RBF-SVM Ensemble Approach for Data Mining Applications

    One of the major developments in machine learning in the past decade is the ensemble method, which finds highly accurate classifier by combining many moderately accurate component classifiers. This paper addresses using an ensemble of classification methods for data mining applications like intrusion detection, direct marketing, and signature verification. In...

    Provided By mecs-press

  • White Papers // Feb 2014

    Enhanced Role Based Access Control Mechanism for Electronic Examination System

    Over the years, e-learning and e-examination has become standard in many institutions of higher learning. It has been observed that examination questions and results can be easily intercepted by invalid users, thus the security of resources shared among valid users is not guaranteed. In order to solve these problems as...

    Provided By mecs-press

  • White Papers // Feb 2014

    Modeling GSM Based Network Communication in Vehicular Network

    Obviously fair communication establishment in every technology increases the efficiency. As the authors know well, vehicles are used in day to day life of every human being to move from one location to another location. If network communication is formed between vehicles, mobile phones and home based telephones, it will...

    Provided By mecs-press

  • White Papers // Feb 2014

    Robustness Analysis of Layered Public Transport Networks Due to Edge Overload Breakdown

    The robustness of urban bus-transport networks has important influence on the network performance. This paper proposes the model of layered public bus-transport network which is composed of the logical layer and the physical layer and expounds the relationship between these two layers. The authors map the bus-transport network into two...

    Provided By mecs-press

  • White Papers // Feb 2014

    Public vs Private vs Hybrid vs Community - Cloud Computing: A Critical Review

    These days cloud computing is booming like no other technology. Every organization whether it's small, mid-sized or big, wants to adapt this cutting edge technology for its business. As cloud technology becomes immensely popular among these businesses, the question arises: which cloud model to consider for the users business? There...

    Provided By mecs-press

  • White Papers // Jan 2014

    Defending Against Malicious Threats in Wireless Sensor Network: A Mathematical Model

    Wireless sensor networks offer a powerful combination of distributed sensing, computing and communication. They lend themselves to countless applications and at the same time constrained by limited battery life, processing capability, memory and bandwidth which makes it soft target of malicious objects such as virus and worms. The authors study...

    Provided By mecs-press

  • White Papers // Jan 2014

    Efficient Analysis of Pattern and Association Rule Mining Approaches

    The process of data mining produces various patterns from a given data source. The most recognized data mining tasks are the process of discovering frequent itemsets, frequent sequential patterns, frequent sequential rules and frequent association rules. Numerous efficient algorithms have been proposed to do the above processes. Frequent pattern mining...

    Provided By mecs-press

  • White Papers // Jan 2014

    An Integrated Agent-Based Architecture and Performance Optimization of VANET using Agent Packet Size Reduction Process

    The advancements of Information Technology have led to many developments that make life easier and faster with high reachability and efficiency. There is a drastic improvement in the area of distributed applications with the advent of mobile agent technology over the usual client/server framework. Applying mobile agent technology in the...

    Provided By mecs-press

  • White Papers // Jan 2014

    Grid Approach with Metadata of Messages in Service Oriented Architecture

    Service orientation architecture is playing a vital role in the middleware and enterprise organizations through its key design principles and there are many benefits of it as well. Loose Coupling between services is one of its design principles that help system or architecture to maintain its efficiency because services are...

    Provided By mecs-press

  • White Papers // Jan 2014

    E-mail Spam Filtering Using Adaptive Genetic Algorithm

    Now-a-days everybody email inbox is full with spam mails. The problem with spam mails is that they are not malicious in nature so generally don't get blocked with firewall or filters etc., however, they are unwanted mails received by any internet users. In 2012, more that 50% emails of the...

    Provided By mecs-press

  • White Papers // Jan 2014

    Strategic Sensor Placement for Intrusion Detection in Network-Based IDS

    Network Intrusion Detection Systems (NIDSs) can be composed of a potentially large number of sensors, which monitor the traffic flowing in the network. Deciding where sensors should be placed and what information they need in order to detect the desired attacks can be a demanding task for network administrators, one...

    Provided By mecs-press

  • White Papers // Jan 2014

    Performance Analysis of Multi Functional Bot System Design Using Microcontroller

    In this paper the authors include performance analysis of a multipurpose microcontroller based system which has various modes to control distinct applications. The paper elucidates how a single chip microcontroller can process different signals and accomplish different tasks. The system discussed in this paper has seven modes. Each mode controls...

    Provided By mecs-press

  • White Papers // Jan 2014

    Reference Threshold Calculation for Biometric Authentication

    In biometric systems, reference threshold is defined as a value that can decide the authenticity of a person. Authenticity means whether the person is genuine or intruder. The statistical calculation of various values like reference threshold, FAR (False Acceptance Rate), FRR (False Rejection Rate) is required for real-time automated biometric...

    Provided By mecs-press

  • White Papers // Jan 2014

    Distributed Denial of Service Attacks: A Review

    A Wireless Sensor Network (WSN) is a wireless network consisting of spatially distributed autonomous devices using sensors to monitor physical or environmental conditions.WSN is a flourishing network that has numerous applications and could be used in diverse scenarios. DDoS (Distributed Denial of Service) is an attack where a number of...

    Provided By mecs-press

  • White Papers // Jan 2014

    Implementation of Enhanced Security Algorithms in Mobile Ad hoc Networks

    Mobile ad hoc networks are wireless infrastructure fewer networks can be easily formed or deployed due to its simple infrastructure. Security has become a primary concern in order to provide protected communication between mobile nodes in a hostile environment. The main objective of this work is to enhance the performance...

    Provided By mecs-press

  • White Papers // Jan 2014

    Hybrid Intrusion Detection Using Ensemble of Classification Methods

    One of the major developments in machine learning in the past decade is the ensemble method, which finds highly accurate classifier by combining many moderately accurate component classifiers. In this paper, new ensemble classification methods are proposed for homogeneous ensemble classifiers using bagging and heterogeneous ensemble classifiers using arcing classifier...

    Provided By mecs-press

  • White Papers // Jan 2014

    Minimization of Power Consumption in Mobile Ad hoc Networks

    An ad hoc network is a mobile wireless network that has no fixed access point or centralized infrastructure. Each node in the network functions as a mobile router of data packets for other nodes and should maintain the network routes for long standing which is not possible due to limited...

    Provided By mecs-press

  • White Papers // Jan 2014

    A Novel Mutual RFID Authentication Protocol with Low Complexity and High Security

    Radio Frequency IDentification (RFID) is a method for automated identifying objects. One of the problems of this technology is its security. RFID tags include resource limitation; therefore, the system designers cannot implement complex circuits to enhance their security. Usually the symmetric and asymmetric encryption methods increase resources and cost. Because...

    Provided By mecs-press

  • White Papers // Jan 2014

    Secure and Dynamic Model for Book Searching on Cloud Computing as Mobile Augmented Reality

    Availability of internet on different devices like smart phones like android based, IOs based, windows based and PDA etc. has brought into the evolution of mobile cloud computing, which is a vast side of research nowadays. Internet connectivity has become very easy with the evolution of Wi-Fi; everyone can access...

    Provided By mecs-press

  • White Papers // Dec 2013

    Spam Mail Detection through Data Mining - A Comparative Performance Analysis

    As web is expanding day by day and people generally rely on web for communication so e-mails are the fastest way to send information from one place to another. Now-a-days all the transactions and all the communication, whether general or of business taking place through e-mails. E-mail is an effective...

    Provided By mecs-press

  • White Papers // Dec 2013

    Throughput and Delay Analysis of Database Replication Algorithm

    Database management systems are among the most important systems that are driving the information transfer and storage functionality. Recently, (PDDRA) a Pre-fetching based Dynamic Data Replication Algorithm has been published. In the authors' previous paper, modifications to the algorithm have been suggested to minimize the delay in data replication. In...

    Provided By mecs-press

  • White Papers // Dec 2013

    Energy-Efficient Secure Directed Diffusion Protocol for Wireless Sensor Networks

    In wireless sensor networks, it is crucial to design and employ energy-efficient communication protocols, since nodes are battery-powered and thus their lifetimes are limited. Such constraints combined with a great number of applications used in these networks, pose many challenges (limited energy and low security) to the design and management...

    Provided By mecs-press

  • White Papers // Dec 2013

    FSM Circuits Design for Approximate String Matching in Hardware Based Network Intrusion Detection Systems

    In this paper, the authors present a logical circuits design for approximate content matching implemented as Finite State Machines (FSM). As network speed increases the software based Network Intrusion Detection and Prevention Systems (NIDPS) are lagging behind requirements in throughput of so called deep package inspection - the most exhaustive...

    Provided By mecs-press

  • White Papers // Dec 2013

    Social Network Clustering

    As the users' know, the datasets related to social networks are increasing. There are different procedures to analyze these types of datasets; one of these procedures is clustering which makes communities of social data. Random walk is a process which can find communities in a network, in other words when...

    Provided By mecs-press

  • White Papers // Dec 2013

    A New Fault Detection Method Using End-to-End Data and Sequential Testing for Computer Networks

    Fault localization, a central part of network fault management, is a process of deducing the exact source of a failure from a set of observed failure indications. in the network, end systems and hosts communicate through routers and links connecting them. When a link or a router faces with a...

    Provided By mecs-press

  • White Papers // Dec 2013

    Management of Automotive Engine Based on Stable Fuzzy Technique With Parallel Sliding Mode Optimization

    The Internal Combustion (IC) engine is designed to produce power from the energy that is contained in its fuel. More specifically, its fuel contains chemical energy and together with air, this mixture is burned to output mechanical power. Both fuzzy logic and sliding mode can compensate the steady-state error of...

    Provided By mecs-press

  • White Papers // Dec 2013

    Metrics for Evaluating Pervasive Middleware

    Pervasive computing aims at developing smart environments which enable user to interact with other devices. Pervasive computing includes a middleware to support interoperability, heterogeneity and self-management among different platforms. It provides efficient communications and context awareness among devices. Middleware for pervasive computing provides much more attention to coordinate the devices...

    Provided By mecs-press

  • White Papers // Nov 2013

    Cloud Computing Ensembles Agile Development Methodologies for Successful Project Development

    In today's IT world combination of AD (Agile Development) and CC (Cloud Computing) is a good recipe for the user needs fulfillment in efficient manners. This combination brings superiority for both worlds, Agile and Cloud. CC opportunities are optimized by AD processes for iterative software releases and getting more frequent...

    Provided By mecs-press

  • White Papers // Nov 2013

    Implementation of Palm Print Biometric Identification System Using Ordinal Measures

    Personal identification is one of the most important requirements in all e-commerce and criminal detection applications. In this framework, a novel palm print representation method, namely orthogonal line ordinal features, is proposed. The palm print registration, feature extraction, palm print verification and palm print recognition modules are designed to manage...

    Provided By mecs-press

  • White Papers // Nov 2013

    Goal Structured Requirement Engineering and Traceability Model for Data Warehouses

    Data warehouses are decision support systems that are specifically designed for the business managers and executives for reporting and business analysis. Data warehouse is a database that stores enterprise-wide data that can be used to deduce useful information. Business organizations can achieve a great level of competitive advantage by analyzing...

    Provided By mecs-press

  • White Papers // Nov 2013

    Improving Situational Awareness for Precursory Data Classification using Attribute Rough Set Reduction Approach

    The issue of correlating, integrating and presenting related information to issue early warning to impending natural disasters by categorizing documents with the aid of knowledge-based features leverages information cannot be deduced from the documents alone. This also involves query based search based on machine learning methods that improves the acquisition...

    Provided By mecs-press

  • White Papers // Nov 2013

    Empirical Analysis of Bagged SVM Classifier for Data Mining Applications

    Data mining is the use of algorithms to extract the information and patterns derived by the knowledge discovery in databases process. Classification maps data into predefined groups or classes. It is often referred to as supervised learning because the classes are determined before examining the data. The feasibility and the...

    Provided By mecs-press

  • White Papers // Nov 2013

    Textual Manipulation for SQL Injection Attacks

    SQL injection attacks try to use string or text manipulations to access illegally websites and their databases. This is since using some symbols or characters in SQL statements may trick the authentication system to incorrectly allow such SQL statements to be processed or executed. In this paper, the authors highlighted...

    Provided By mecs-press

  • White Papers // Nov 2013

    Security Solutions for Networked Control Systems Based on DES Algorithm and Improved Grey Prediction Model

    Compared with the conventional control systems, Networked Control Systems (NCSs) are more open to the external network. As a result, they are more vulnerable to attacks from disgruntled insiders or malicious cyber-terrorist organizations. Therefore, the security issues of NCSs have been receiving a lot of attention recently. In this paper,...

    Provided By mecs-press

  • White Papers // Nov 2013

    On Maxima Distribution of Full Differentials and Linear Hulls of Block Symmetric Ciphers

    The problem of determination of maxima distribution laws of full differentials and linear bias of block symmetric ciphers as substitution transformations is considered. Well-known theoretical results, published in literature, are given, as well as experiment results on making the laws of maxima distribution of full differential transitions and maximum biasess...

    Provided By mecs-press

  • White Papers // Oct 2013

    Collaborative Anti-jamming in Cognitive Radio Networks Using Minimax-Q Learning

    Cognitive radio is an efficient technique for realization of dynamic spectrum access. Since in the Cognitive Radio Network (CRN) environment, the Secondary Users (SUs) are susceptible to the random jammers, the security issue of the SU's channel access becomes crucial for the CRN framework. The rapidly varying spectrum dynamics of...

    Provided By mecs-press

  • White Papers // Oct 2013

    Study and Analysis of Text Steganography Tools

    Maintain the security of the secret information, this words has been a great challenge in the people day-to-day life. Sender can send messages regularly through a communication channel like Internet, draws the attention of third parties, hackers and crackers, perhaps causing attempts to break and expose the unusual messages. Steganography...

    Provided By mecs-press

  • White Papers // Oct 2013

    Performance Evaluation and Comparison of Network Firewalls Under DDoS Attack

    Network firewalls act as the first line of defense against unwanted and malicious traffic and also represent critical point of failure during DDoS attack. Predicting the overall firewall performance is crucial to network security administrators and designers in assessing the strength and effectiveness of network firewalls against DDoS attacks. In...

    Provided By mecs-press

  • White Papers // Oct 2013

    A Novel Minimized Computational Time Based Encryption and Authentication Using ECDSA

    Providing the security on the basis of encryption standards is considered as key challenges for achieving the integrity & confidentiality. There are three main public-key cryptosystem contenders. Each has a variable key size that can be increased to achieve higher security at the cost of slower cryptographic operations. The best...

    Provided By mecs-press

  • White Papers // Sep 2013

    Security Mechanisms and Access Control Infrastructure for Biometrics Passport using Cryptographic Protocols

    Electronic passports (e-passports) are to prevent the illegal entry of traveler into a specific country and limit the use of counterfeit documents by more accurate identification of an individual. The e-passport, as it is sometimes called, represents a bold initiative in the deployment of two new technologies: cryptography security and...

    Provided By mecs-press

  • White Papers // Mar 2013

    Comparative Analysis of AODV, OLSR, TORA, DSR and DSDV Routing Protocols in Mobile Ad-Hoc Networks

    Mobile Ad-Hoc NETworks (MANETs) are autonomous and decentralized wireless systems. Mobile Ad hoc Network is a collection of mobile nodes in which the wireless links are frequently broken down due to mobility and dynamic infrastructure. Routing is a significant issue and challenge in ad hoc networks. Many Routing protocols have...

    Provided By mecs-press

  • White Papers // Jan 2013

    Rigorous Progress on Algorithms Based Routing and Wavelength Assignment in Trans-Egypt Network (TEGYNET) Management

    In simple Wavelength-Division Multiplexed (WDM) networks, a connection must be established along a route using a common wavelength on all of the links along the route. The introduction of wavelength converters into WDM cross connects increases the hardware cost and complexity. Given a set of connection requests, the routing and...

    Provided By mecs-press

  • White Papers // Jan 2013

    Hybrid Model for Location Privacy in Wireless Ad-Hoc Networks

    In the today's fast growing world, use of internet is increasing popularly and at the same time Location-Based Services (LBS) are also getting more popular. LBS providers require user's current locations to answer their location-based queries. The primary objective of the present work is to develop a system which preserves...

    Provided By mecs-press

  • White Papers // Jan 2013

    Effective Congestion Avoidance Scheme for Mobile Ad Hoc Networks

    Mobile nodes are organized randomly without any access point in Mobile Ad hoc NETworks (MANETs). Due to the mobility of nodes, the network congestion occurs. So many congestion control mechanisms were proposed to avoid the congestion avoidance or reducing the congestion status. In this research work, the authors proposed to...

    Provided By mecs-press

  • White Papers // Jan 2013

    Performance Comparison and Evaluation of Different Multipath Routing Protocols Based on Various Scenario and Traffic Patterns for Mobile AD Hoc Networks

    A MANET is an interconnection of mobile devices by wireless links forming a dynamic topology without much physical network infrastructure such as routers, servers, access points/cables or centralized administration. The multipath routing protocols establish efficient communication within the network by discovering multiple routes between a pair of source and destination...

    Provided By mecs-press

  • White Papers // Oct 2012

    Identifying Key Challenges in Performance Issues in Cloud Computing

    Cloud computing is a harbinger to a newer era in the field of computing where distributed and centralized services are used in a unique way. In cloud computing, the computational resources of different vendors and IT services providers are managed for providing an enormous and a scalable computing services platform...

    Provided By mecs-press

  • White Papers // Feb 2013

    Enhancing the Capacity of Stratospheric Cellular Networks Using Adaptive Array Techniques

    In this paper, the capacity of stratospheric cellular communications is improved by optimizing the amplitude feeding of the Concentric Rings Array (CRA). The weighting profile of this array is chosen to be a cosine function raised to some power to control the beam pattern used in the cellular coverage. The...

    Provided By mecs-press

  • White Papers // Apr 2013

    Location Prediction of Mobility Management Using Soft Computing Techniques in Cellular Network

    This paper describes the neural network technique to solve location management problem. A multilayer neural model is designed to predict the future prediction of the subscriber based on the past predicted information of the subscriber. In this paper, a prediction based location management scheme is proposed for locating a mobile...

    Provided By mecs-press

  • White Papers // Apr 2013

    A Fair Downlink Scheduling Algorithm for 3GPP LTE Networks

    Long Term Evolution (LTE), the standard specified by 3GPP on the way towards the fourth generation mobile networks, is intended to deliver high speed data and multimedia services to next generation mobile users. The Radio Resource Management (RRM) plays a very crucial role in managing limited radio resources to enhance...

    Provided By mecs-press

  • White Papers // Apr 2013

    Password Hardened Biometric: A Complete Solution of Online Security

    In present paper, secure online access to enterprises resources is very important for any organization. To protect valuable data become one of the big challenge for today's business as enterprise customers or clients involved in Business-to-Customer (B2C) and Business-to-Business (B2B) e-commerce need to feel that their transactions are secured from...

    Provided By mecs-press

  • White Papers // Apr 2013

    A Robust Fault Detection Scheme for the Advanced Encryption Standard

    Fault attacks are powerful and efficient cryptanalysis techniques to find the secret key of the Advanced Encryption Standard (AES) algorithm. These attacks are based on injecting faults into the structure of the AES to obtain the confidential information. To protect the AES implementation against these attacks, a number of countermeasures...

    Provided By mecs-press

  • White Papers // Jan 2013

    Exponential Brute-Force Complexity of A Permutation Based Stream Cipher

    This paper introduces a permutation generation mechanism based on a shared secret key. The generated permutation vectors are used as encryption keys in a stream ciphering cryptosystem. The authors investigated various types of attacks on the known stream cipher RC4 and patched most of its loopholes, especially biased-byte and state-related...

    Provided By mecs-press

  • White Papers // Jan 2013

    Performance Evaluation of Security-Throughput Tradeoff with Channel Adaptive Encryption

    With the ever increasing volume of information over wireless medium, security has assumed an important dimension. The security of transmitted data over a wireless channel aims at protecting the data from unauthorized intrusion. Wireless network security is achieved using cryptographic primitives. Some properties that give encryption mechanism their cryptographic strength...

    Provided By mecs-press

  • White Papers // Jan 2013

    An Efficient Novel Key Management Scheme for Enhancing User Authentication in A WSN

    The Wireless Sensor Networks are energy constrained and are normally low cost and low power devices. These nodes are deployed over a specific area for specific goals. Due to energy and memory constraints, secure communication among these sensors is challenging management issue. In order to ensure security, proper connectivity among...

    Provided By mecs-press

  • White Papers // Sep 2013

    Security Mechanisms and Access Control Infrastructure for Biometrics Passport using Cryptographic Protocols

    Electronic passports (e-passports) are to prevent the illegal entry of traveler into a specific country and limit the use of counterfeit documents by more accurate identification of an individual. The e-passport, as it is sometimes called, represents a bold initiative in the deployment of two new technologies: cryptography security and...

    Provided By mecs-press

  • White Papers // Oct 2012

    Empirical Network Performance Evaluation of Security Protocols on Operating Systems

    Securing data transmission is currently a widely researched topic. There are numerous facades in data security. Virtual Private Network (VPN) is one such strand that provides security for data that is in motion. Performance of a network that has VPN implementation is at the forefront of network design and choice...

    Provided By mecs-press

  • White Papers // Oct 2012

    Keywords Review of IT Security Literature in Recent 20 Years

    The volume of published scientific literature available on Internet has been increasing exponentially. Some of them reflect the latest achievement of the specific research domain. In recent years, many projects have been funded aiming to online scientific literature mining, especially in biomedical research. Scientific literature covers most of the hot...

    Provided By mecs-press

  • White Papers // Feb 2012

    Research of Network Security and Information Encryption

    With the continuous development of the computer network, the global information has become the general trend of development of human beings. But due to the connection of computer network structure with the diversity, terminal and non-uniformity of distribution network interconnection of openness, etc. In the process of rapid development of...

    Provided By mecs-press

  • White Papers // Oct 2012

    Analysis of Current Wireless Network Security

    Most threats against wireless networks involve an attacker with access to the radio link between wireless devices. Several of the threats listed in following rely on an attacker's ability to intercept and inject network communications. This highlights the most significant difference between protecting wireless and wired networks: the relative ease...

    Provided By mecs-press

  • White Papers // Aug 2012

    Proactive Security of E-Business

    Network security is a crucial problem in the construction of e-business. As the improvement of network openness, sharing and interconnection, the security problem is becoming more serious. After giving a brief statement to the theory of proactive security, based on the differences between passive defense and proactive security, the paper...

    Provided By mecs-press

  • White Papers // Oct 2009

    A Data-Fusion-Based Method for Intrusion Detection System in Networks

    Hackers' attacks are more and more intelligent, which makes it hard for single intrusion detection methods to attain favorable detection result. Therefore, many researchers have carried out how to combine multiple security measures to provide the network system more effective protection. However, so far none of those methods can achieve...

    Provided By mecs-press

  • White Papers // Sep 2012

    Constraint Based Periodicity Mining in Time Series Databases

    The search for the periodicity in time-series database has a number of application, is an interesting data mining problem. In real world dataset are mostly noisy and rarely a perfect periodicity, this problem is not trivial. Periodicity is very common practice in time series mining algorithms, since it is more...

    Provided By mecs-press

  • White Papers // Aug 2013

    Next Generation Electronic Passport Scheme Using Cryptographic Authentication Protocols and Multiple Biometrics Technology

    Electronic passports (e-passports) are to prevent the illegal entry of traveler into a specific country and limit the use of counterfeit documents by more accurate identification of an individual. The e-passport, as it is sometimes called, represents a bold initiative in the deployment of two new technologies: cryptography security and...

    Provided By mecs-press

  • White Papers // Apr 2013

    Performance of Personal Identification System Technique Using Iris Biometrics Technology

    The Iris identification as one of the significant techniques of biometric identification systems s and iris recognition algorithm is described. Biometric technology advances intellectual properties are wanted by many unauthorized personnel. As a result many researchers have being searching ways for more secure authentication methods for the user access. Iris...

    Provided By mecs-press

  • White Papers // Oct 2013

    Study and Analysis of Text Steganography Tools

    Maintain the security of the secret information, this words has been a great challenge in the people day-to-day life. Sender can send messages regularly through a communication channel like Internet, draws the attention of third parties, hackers and crackers, perhaps causing attempts to break and expose the unusual messages. Steganography...

    Provided By mecs-press

  • White Papers // Oct 2013

    Performance Evaluation and Comparison of Network Firewalls Under DDoS Attack

    Network firewalls act as the first line of defense against unwanted and malicious traffic and also represent critical point of failure during DDoS attack. Predicting the overall firewall performance is crucial to network security administrators and designers in assessing the strength and effectiveness of network firewalls against DDoS attacks. In...

    Provided By mecs-press

  • White Papers // Aug 2013

    Security Algorithms for Mitigating Selfish and Shared Root Node Attacks in MANETs

    Mobile ad hoc network is a type of self configurable, dynamic wireless network in which all the mobile devices are connected to one another without any centralized infrastructure. Since, the network topology of MANETs changes rapidly. It is vulnerable to routing attacks than any other infrastructure based wireless and wired...

    Provided By mecs-press

  • White Papers // Aug 2013

    KED - A Symmetric Key Algorithm for Secured Information Exchange Using Modulo 69

    Exchange of data over the internet is increasing day-by-day. Security is the main issue in communication over a network. Protection must be given against intruders. Hence, cryptography plays a vital role in providing security. There are two basic types of cryptography: symmetric key and asymmetric key. Symmetric key uses same...

    Provided By mecs-press

  • White Papers // Jun 2013

    Analysis of the SYN Flood DoS Attack

    The paper analyzes systems vulnerability targeted by TCP (Transmission Control Protocol) segments when SYN flag is ON, which gives space for a DoS (Denial of Service) attack called SYN flooding attack or more often referred as a SYN flood attack. The effects of this type of attack are analyzed and...

    Provided By mecs-press

  • White Papers // May 2013

    Exploiting SIMD Instructions in Modern Microprocessors to Optimize the Performance of Stream Ciphers

    Modern cryptographic protocols like TLS, SSL, etc. provide communication security by employing symmetric or secret key algorithms for encrypting the data and asymmetric or public key algorithms for key exchange. Modern microprocessors are loaded with a lot of performance optimization features. Single Instruction Multiple Data (SIMD) instruction set feature specially...

    Provided By mecs-press

  • White Papers // Apr 2013

    Biometric Passport Validation Scheme using Radio Frequency Identification

    Biometric passports issued now-a-days have an embedded RFID chip that carries digitally signed biometric information. This RIFD chip is integrated into the cover of a passport, called a biometric passport. Electronic passports as it is sometimes called, represents a bold initiative in the deployment of two new technologies: RIFD and...

    Provided By mecs-press

  • White Papers // Apr 2013

    Statistical Hiding Fuzzy Commitment Scheme for Securing Biometric Templates

    By considering the security flaws in cryptographic hash functions, any commitment scheme designed straight through hash function usage in general terms is insecure. In this paper, the authors develop a general fuzzy commitment scheme called an Ordinary Fuzzy Commitment Scheme (OFCS), in which many fuzzy commitment schemes with variety complexity...

    Provided By mecs-press

  • White Papers // Feb 2013

    Blocking of SQL Injection Attacks by Comparing Static and Dynamic Queries

    Due to internet expansion web applications have now become a part of everyday life. As a result a number of incidents which exploit web application vulnerabilities are increasing. A large number of these incidents are SQL Injection attacks which are a serious security threat to databases which contain sensitive information,...

    Provided By mecs-press

  • White Papers // Feb 2013

    A Practical Privacy Preserving E-Voting Scheme with Smart Card Using Blind Signature

    Voting is regarded as one of the most effective methods for individuals to express their opinions to select their democratic leader in the public elections. As the computing, communicating, and cryptographic techniques progress rapidly, increasing emphasis has been placed on developing electronic voting schemes capable of providing more efficient voting...

    Provided By mecs-press

  • White Papers // Sep 2013

    A Compression & Encryption Algorithm on DNA Sequences Using Dynamic Look Up Table and Modified Huffman Techniques

    In this paper, the authors discussed a new DNA compression algorithm whose key idea is dynamic LUT. This compression algorithm gives a good model for compressing DNA sequences that reveals the true characteristics of DNA sequences. The compression results of dynamic LUT for DNA sequences also indicate that their method...

    Provided By mecs-press

  • White Papers // Nov 2013

    Implementation of Palm Print Biometric Identification System Using Ordinal Measures

    Personal identification is one of the most important requirements in all e-commerce and criminal detection applications. In this framework, a novel palm print representation method, namely orthogonal line ordinal features, is proposed. The palm print registration, feature extraction, palm print verification and palm print recognition modules are designed to manage...

    Provided By mecs-press

  • White Papers // Nov 2013

    Goal Structured Requirement Engineering and Traceability Model for Data Warehouses

    Data warehouses are decision support systems that are specifically designed for the business managers and executives for reporting and business analysis. Data warehouse is a database that stores enterprise-wide data that can be used to deduce useful information. Business organizations can achieve a great level of competitive advantage by analyzing...

    Provided By mecs-press

  • White Papers // Nov 2013

    Improving Situational Awareness for Precursory Data Classification using Attribute Rough Set Reduction Approach

    The issue of correlating, integrating and presenting related information to issue early warning to impending natural disasters by categorizing documents with the aid of knowledge-based features leverages information cannot be deduced from the documents alone. This also involves query based search based on machine learning methods that improves the acquisition...

    Provided By mecs-press

  • White Papers // Sep 2013

    Secluding Efficient Geographic Multicast Protocol against Multicast Attacks

    A Mobile Ad-hoc NETworks (MANETs) are composed of Mobile Nodes without any infrastructure. The network nodes in MANETs, not only act as ordinary network nodes but also as the routers for other peer devices. The dynamic topology, lack of a fixed infrastructure and the wireless nature make MANETs susceptible to...

    Provided By mecs-press

  • White Papers // Sep 2013

    Ontology Based Information Retrieval in Semantic Web: A Survey

    In present age of computers, there are various resources for gathering information related to given query like Radio Stations, Television, Internet and many more. Among them, Internet is considered as major factor for obtaining any information about a given domain. When a user wants to find some information, he/she enters...

    Provided By mecs-press