mecs-press

Displaying 1-40 of 537 results

  • White Papers // Apr 2013

    Location Prediction of Mobility Management Using Soft Computing Techniques in Cellular Network

    This paper describes the neural network technique to solve location management problem. A multilayer neural model is designed to predict the future prediction of the subscriber based on the past predicted information of the subscriber. In this paper, a prediction based location management scheme is proposed for locating a mobile...

    Provided By mecs-press

  • White Papers // Apr 2013

    A Fair Downlink Scheduling Algorithm for 3GPP LTE Networks

    Long Term Evolution (LTE), the standard specified by 3GPP on the way towards the fourth generation mobile networks, is intended to deliver high speed data and multimedia services to next generation mobile users. The Radio Resource Management (RRM) plays a very crucial role in managing limited radio resources to enhance...

    Provided By mecs-press

  • White Papers // Apr 2013

    Password Hardened Biometric: A Complete Solution of Online Security

    In present paper, secure online access to enterprises resources is very important for any organization. To protect valuable data become one of the big challenge for today's business as enterprise customers or clients involved in Business-to-Customer (B2C) and Business-to-Business (B2B) e-commerce need to feel that their transactions are secured from...

    Provided By mecs-press

  • White Papers // Apr 2013

    A Robust Fault Detection Scheme for the Advanced Encryption Standard

    Fault attacks are powerful and efficient cryptanalysis techniques to find the secret key of the Advanced Encryption Standard (AES) algorithm. These attacks are based on injecting faults into the structure of the AES to obtain the confidential information. To protect the AES implementation against these attacks, a number of countermeasures...

    Provided By mecs-press

  • White Papers // Jan 2013

    Exponential Brute-Force Complexity of A Permutation Based Stream Cipher

    This paper introduces a permutation generation mechanism based on a shared secret key. The generated permutation vectors are used as encryption keys in a stream ciphering cryptosystem. The authors investigated various types of attacks on the known stream cipher RC4 and patched most of its loopholes, especially biased-byte and state-related...

    Provided By mecs-press

  • White Papers // Jan 2013

    Performance Evaluation of Security-Throughput Tradeoff with Channel Adaptive Encryption

    With the ever increasing volume of information over wireless medium, security has assumed an important dimension. The security of transmitted data over a wireless channel aims at protecting the data from unauthorized intrusion. Wireless network security is achieved using cryptographic primitives. Some properties that give encryption mechanism their cryptographic strength...

    Provided By mecs-press

  • White Papers // Jan 2013

    An Efficient Novel Key Management Scheme for Enhancing User Authentication in A WSN

    The Wireless Sensor Networks are energy constrained and are normally low cost and low power devices. These nodes are deployed over a specific area for specific goals. Due to energy and memory constraints, secure communication among these sensors is challenging management issue. In order to ensure security, proper connectivity among...

    Provided By mecs-press

  • White Papers // Feb 2013

    Integrated Safety Mechanisms Based on Security Risks Minimization for the Distributed Computer Systems

    Today, there are known the basic principles of decision-making on the safety control of distributed computer systems in the face of uncertainty and risk. However, in this area there are no practical methods for the quantitative risk analysis and assessment, taking into account the dynamic changes of security threats, which...

    Provided By mecs-press

  • White Papers // Feb 2013

    Selection of Next Generation Anti-Virus against Virus Attacks in Networks Using AHP

    Defending against virus attacks in network is a vital part of network security. With the rapid evolution of viruses, its defense mechanism has also been evolved over the years. But given the diversity and complexity of virus propagation and its attack behavior, no defense mechanism is equipped fully to protect...

    Provided By mecs-press

  • White Papers // Mar 2013

    Reinforcement Swap Attack Against Directed Diffusion in Wireless Sensor Networks

    In this paper, the authors introduce a new attack, Reinforcement Swap Attack, against Directed Diffusion based WSNs, which exploits the vulnerabilities of Directed Diffusion specifications. Its main idea is the disruption of configuration information, such as routing information to misuse route establishment along the network. Their approach is to swap...

    Provided By mecs-press

  • White Papers // Jan 2013

    Rigorous Progress on Algorithms Based Routing and Wavelength Assignment in Trans-Egypt Network (TEGYNET) Management

    In simple Wavelength-Division Multiplexed (WDM) networks, a connection must be established along a route using a common wavelength on all of the links along the route. The introduction of wavelength converters into WDM cross connects increases the hardware cost and complexity. Given a set of connection requests, the routing and...

    Provided By mecs-press

  • White Papers // Jan 2013

    Hybrid Model for Location Privacy in Wireless Ad-Hoc Networks

    In the today's fast growing world, use of internet is increasing popularly and at the same time Location-Based Services (LBS) are also getting more popular. LBS providers require user's current locations to answer their location-based queries. The primary objective of the present work is to develop a system which preserves...

    Provided By mecs-press

  • White Papers // Jan 2013

    Effective Congestion Avoidance Scheme for Mobile Ad Hoc Networks

    Mobile nodes are organized randomly without any access point in Mobile Ad hoc NETworks (MANETs). Due to the mobility of nodes, the network congestion occurs. So many congestion control mechanisms were proposed to avoid the congestion avoidance or reducing the congestion status. In this research work, the authors proposed to...

    Provided By mecs-press

  • White Papers // Jan 2013

    Performance Comparison and Evaluation of Different Multipath Routing Protocols Based on Various Scenario and Traffic Patterns for Mobile AD Hoc Networks

    A MANET is an interconnection of mobile devices by wireless links forming a dynamic topology without much physical network infrastructure such as routers, servers, access points/cables or centralized administration. The multipath routing protocols establish efficient communication within the network by discovering multiple routes between a pair of source and destination...

    Provided By mecs-press

  • White Papers // Oct 2012

    Identifying Key Challenges in Performance Issues in Cloud Computing

    Cloud computing is a harbinger to a newer era in the field of computing where distributed and centralized services are used in a unique way. In cloud computing, the computational resources of different vendors and IT services providers are managed for providing an enormous and a scalable computing services platform...

    Provided By mecs-press

  • White Papers // Feb 2013

    Enhancing the Capacity of Stratospheric Cellular Networks Using Adaptive Array Techniques

    In this paper, the capacity of stratospheric cellular communications is improved by optimizing the amplitude feeding of the Concentric Rings Array (CRA). The weighting profile of this array is chosen to be a cosine function raised to some power to control the beam pattern used in the cellular coverage. The...

    Provided By mecs-press

  • White Papers // Feb 2011

    A Method of Hash Join in the DAS Model

    In the Database As Service(DAS) model, authenticated join processing is more difficult than authenticated range query because the previous approach of authenticated range query, signature on a single relation, can not be used to verify join results directly. In this paper, an authenticated hash join processing algorithm is described in...

    Provided By mecs-press

  • White Papers // Dec 2010

    Code Formal Verification of Operation System

    With the increasing pressure on non-function attributes (security, safety and reliability) requirements of an operation system, high-confidence operation system is becoming more important. Formal verification is the only known way to guarantee that a system is free of programming errors. The authors research on formal verification of operation system kernel...

    Provided By mecs-press

  • White Papers // Dec 2010

    Performance Analysis of QoS Multicast Routing in Mobile Ad Hoc Networks Using Directional Antennas

    In this paper, a Quality of Service (QoS) multicast routing protocol in Mobile Ad hoc NETworks (MANETs) by using directional antennas has been presented. Many important applications, such as audio/video conferencing, require the quality of service guarantee. Directional antenna technology provides the capability for considerable increase in spatial reuse, which...

    Provided By mecs-press

  • White Papers // Dec 2010

    Study of 2D DOA Estimation for Uniform Circular Array in Wireless Location System

    In this paper, the use of a Uniform Circular Antenna arrays (UCA) for high resolution of Two Dimensional (2D) Direction Of Arrivals (DOAs) estimation in wireless location system is investigated. Performance of 2D DOA estimation based on the real-valued unitary transformation MUSIC algorithm for UCA is presented, especially focusing on...

    Provided By mecs-press

  • White Papers // Dec 2010

    An Improved Dynamic Probabilistic Packet Marking for IP Trace back

    An improved dynamic probabilistic packet marking algorithm named IDPPM is presented, which not only can locate and attack a source rapidly and accurately, but also can reduce the marking overhead of routers near the attackers, which is its greatest contribution given by the authors' technique. In contrast to previous work,...

    Provided By mecs-press

  • White Papers // Dec 2010

    Research on Trusted Industrial Control Ethernet Network

    Industrial control Ethernet networks are more important in connecting with equipments each other of enterprise comprehensive automation and integrating information. With the explosive growth of network techniques, the traditional control networks can no longer satisfy the security demands on network connectivity, data storage and information exchanges. New types of networks...

    Provided By mecs-press

  • White Papers // Dec 2010

    A New Immunity Intrusion Detection Model Based on Genetic Algorithm and Vaccine Mechanism

    After analyzing the characteristics of Immunity Intrusion Detection System, by utilizing prominent characteristics of genetic algorithm and vaccine mechanism, a new hybird immunity intrusion detection model based on genetic algorithm and vaccine mechanism was established. The modeling process is described in detail, such as feature extraction of vaccine, genetic operates...

    Provided By mecs-press

  • White Papers // Nov 2010

    Intelligent Rate Adaptation Based on Improved Simulated Annealing Algorithm

    This paper analyzes the PHY layer of IEEE 802.11 standards for a variety of transmission rates, after learning that MAC layer does not provide adaptive approach for rate control. With the study of various adaptive algorithms, the SAARF (Simulated Annealing Auto Rate Fallback) protocol based on simulated annealing algorithm is...

    Provided By mecs-press

  • White Papers // Nov 2010

    Nonlinear Blind Source Separation Using Kernel Multi-Set Canonical Correlation Analysis

    To solve the problem of nonlinear Blind Source Separation (BSS), a novel algorithm based on kernel Multi-set Canonical Correlation Analysis (MCCA) is presented. Combining complementary research fields of kernel feature spaces and BSS using MCCA, the proposed approach yields a highly efficient and elegant algorithm for nonlinear BSS with invertible...

    Provided By mecs-press

  • White Papers // Nov 2010

    Research on the Method of Multi-Channel Video Acquisition and Display Based on FPGA

    With the problems of high speed and asynchronism in a multi-channel video, a video monitor system based on FPGA and SRAM is designed and implemented. The system adopts the method of time-division multiplexing to realize the function of four-channel video parallel acquisition. The synchronization between four-channel video is achieved by...

    Provided By mecs-press

  • White Papers // Nov 2010

    Research on Humanoid Robot Soccer System Based on Fuzzy Logic

    This paper presents the use of a fuzzy logic controller combined with Machine Vision to improve the accuracy to identify the ball and speed of approaching the ball in Robot Soccer. The conventional robot control consists of methods for path generation and path following. When a robot moves away the...

    Provided By mecs-press

  • White Papers // Nov 2010

    Getting Obstacle Avoidance Trajectory of Mobile Beacon for Localization

    Localization is one of the most important technologies in wireless sensor network, and mobile beacon assisted localization is a promising localization method. The mobile beacon trajectory planning is a basic and important problem in these methods. There are many obstacles in the real world, which obstruct the moving of mobile...

    Provided By mecs-press

  • White Papers // Nov 2010

    System Design of a Trusted SoC and Detailed Analysis of Its Secure State Transitions

    According to the relevant criterion and principle for designing and evaluating various trusted computing chips, the authors have proposed a new trusted SoC chip, and have given the implementation of its basic functional modules. In detail, they have discussed the design of the trusted SoC security architecture and the main...

    Provided By mecs-press

  • White Papers // Aug 2012

    Optical Many Casting Using QoS Depend Layer Aware Mechanism

    Many distributed applications require a group of destinations to be coordinated to a single source. Multicasting is a communication paradigm to implement these distributed applications. In multicasting, at least one of the member in the group cannot satisfy the service requirement of the application, the multicast request said to be...

    Provided By mecs-press

  • White Papers // Aug 2012

    Random Handwritten CAPTCHA: Web Security With a Difference

    It is hard to believe a web form without a CAPTCHA. The web survival in this cut-throat competition is impossible without the mechanisms for blocking spam-boats. The spam-boats have now been made intelligent enough to break through machine printed CAPTCHAs. Handwritten CAPTCHA image can be one solution. In this paper...

    Provided By mecs-press

  • White Papers // Jul 2012

    A Novel Approach for Spectrum Access Using Fuzzy Logic in Cognitive Radio

    In this paper, the authors have proposed a novel approach using Fuzzy Logic System (FLS) for the potential management of the spectrum access. They have used four descriptors such as spectrum utilization efficiency of the secondary user, mobility, distance of the primary user, and signal strengths of the secondary users....

    Provided By mecs-press

  • White Papers // Jul 2012

    Trends, Issues and Challenges Concerning Spam Mails

    Traditional correspondence system has now been replaced by internet, which has now become indispensable in everyone's life. With the advent of the internet, majority of people correspond through emails several times in a day. However, as internet has evolved, email is being exploited by spammers so as to disturb the...

    Provided By mecs-press

  • White Papers // Jul 2012

    Doppler Shift Impact On the MIMO OFDM System in Vehicular Channel Condition

    Vehicle-To-Vehicle (V2V) communication systems will play an important role in Intelligent Transportation Systems (ITS). But in high mobility road condition, Orthogonal Frequency Division Multiplexing (OFDM) is very sensitive to Doppler shift. In this scenario Multiple Input and Multiple Output (MIMO) system combined with OFDM, make MIMO -OFDM techniques very attractive...

    Provided By mecs-press

  • White Papers // Aug 2012

    Cryptography Using Multiple Two-Dimensional Chaotic Maps

    In this paper, a symmetric key block cipher cryptosystem is proposed, involving multiple two-dimensional chaotic maps and using 128-bits external secret key. Computer simulations indicate that the cipher has good diffusion and confusion properties with respect to the plaintext and the key. Moreover, it produces ciphertext with random distribution. The...

    Provided By mecs-press

  • White Papers // Aug 2012

    Cascading of C4.5 Decision Tree and Support Vector Machine for Rule Based Intrusion Detection System

    Main reason for the attack being introduced to the system is because of popularity of the internet. Information security has now become a vital subject. Hence, there is an immediate need to recognize and detect the attacks. Intrusion Detection is defined as a method of diagnosing the attack and the...

    Provided By mecs-press

  • White Papers // Aug 2012

    Modeling Prioritized Hard Handoff Management Scheme for Wireless Mobile Networks

    The channel associated with the current connection serviced by a base station is changed while a call is in progress. Usually, continuous service is achieved by supporting handoff from one cell to another. It is often initiated either by crossing a cell boundary or by deterioration in quality of the...

    Provided By mecs-press

  • White Papers // Aug 2012

    Distributed Encrypting File System for Linux in User-Space

    Linux systems use Encrypting File System (EFS) for providing confidentiality and integrity services to files stored on disk in a secure, efficient and transparent manner. Distributed encrypting file system should also provide support for secure remote access, multiuser file sharing, possible use by non-privileged users, portability, incremental backups, etc. Existing...

    Provided By mecs-press

  • White Papers // Aug 2012

    A New Approach for Multicast Routing in Wireless Mesh Networks

    This paper focuses on the multicast routing in wireless mesh networks under the 802.11s standard. This standard defines the HWMP (Hybrid Wireless Mesh network Protocol) as the protocol of the routing but only unicast and broadcast. Such the standard defines the multicast routing as a goal among several and that...

    Provided By mecs-press

  • White Papers // Aug 2012

    Enhancement of Security and Privacy in Biometric Passport Inspection System Using Face, Fingerprint, and Iris Recognition

    The biometric passports are to prevent the illegal entry of traveler into a specific country and limit the use of counterfeit documents by more accurate identification of an individual. Biometric Passports have been introduced in many countries to improve the security in Inspection Systems and enhance procedures and systems that...

    Provided By mecs-press