mecs-press

Displaying 41-80 of 342 results

  • White Papers // Nov 2013

    Security Solutions for Networked Control Systems Based on DES Algorithm and Improved Grey Prediction Model

    Compared with the conventional control systems, Networked Control Systems (NCSs) are more open to the external network. As a result, they are more vulnerable to attacks from disgruntled insiders or malicious cyber-terrorist organizations. Therefore, the security issues of NCSs have been receiving a lot of attention recently. In this paper,...

    Provided By mecs-press

  • White Papers // Nov 2013

    On Maxima Distribution of Full Differentials and Linear Hulls of Block Symmetric Ciphers

    The problem of determination of maxima distribution laws of full differentials and linear bias of block symmetric ciphers as substitution transformations is considered. Well-known theoretical results, published in literature, are given, as well as experiment results on making the laws of maxima distribution of full differential transitions and maximum biasess...

    Provided By mecs-press

  • White Papers // Oct 2013

    Collaborative Anti-jamming in Cognitive Radio Networks Using Minimax-Q Learning

    Cognitive radio is an efficient technique for realization of dynamic spectrum access. Since in the Cognitive Radio Network (CRN) environment, the Secondary Users (SUs) are susceptible to the random jammers, the security issue of the SU's channel access becomes crucial for the CRN framework. The rapidly varying spectrum dynamics of...

    Provided By mecs-press

  • White Papers // Oct 2013

    Study and Analysis of Text Steganography Tools

    Maintain the security of the secret information, this words has been a great challenge in the people day-to-day life. Sender can send messages regularly through a communication channel like Internet, draws the attention of third parties, hackers and crackers, perhaps causing attempts to break and expose the unusual messages. Steganography...

    Provided By mecs-press

  • White Papers // Oct 2013

    Performance Evaluation and Comparison of Network Firewalls Under DDoS Attack

    Network firewalls act as the first line of defense against unwanted and malicious traffic and also represent critical point of failure during DDoS attack. Predicting the overall firewall performance is crucial to network security administrators and designers in assessing the strength and effectiveness of network firewalls against DDoS attacks. In...

    Provided By mecs-press

  • White Papers // Oct 2013

    A Novel Minimized Computational Time Based Encryption and Authentication Using ECDSA

    Providing the security on the basis of encryption standards is considered as key challenges for achieving the integrity & confidentiality. There are three main public-key cryptosystem contenders. Each has a variable key size that can be increased to achieve higher security at the cost of slower cryptographic operations. The best...

    Provided By mecs-press

  • White Papers // Sep 2013

    Secluding Efficient Geographic Multicast Protocol against Multicast Attacks

    A Mobile Ad-hoc NETworks (MANETs) are composed of Mobile Nodes without any infrastructure. The network nodes in MANETs, not only act as ordinary network nodes but also as the routers for other peer devices. The dynamic topology, lack of a fixed infrastructure and the wireless nature make MANETs susceptible to...

    Provided By mecs-press

  • White Papers // Sep 2013

    Ontology Based Information Retrieval in Semantic Web: A Survey

    In present age of computers, there are various resources for gathering information related to given query like Radio Stations, Television, Internet and many more. Among them, Internet is considered as major factor for obtaining any information about a given domain. When a user wants to find some information, he/she enters...

    Provided By mecs-press

  • White Papers // Sep 2013

    Security Challenges and Attacks in Mobile Ad Hoc Networks

    Mobile Ad-hoc NETwork (MANET) is an autonomous collection of mobile nodes that form a temporary network without of any existing network infrastructure or central access point. The popularity of these networks created security challenges as an important issue. The traditional routing protocols perform well with dynamically changing topology but are...

    Provided By mecs-press

  • White Papers // Sep 2013

    A Compression & Encryption Algorithm on DNA Sequences Using Dynamic Look Up Table and Modified Huffman Techniques

    In this paper, the authors discussed a new DNA compression algorithm whose key idea is dynamic LUT. This compression algorithm gives a good model for compressing DNA sequences that reveals the true characteristics of DNA sequences. The compression results of dynamic LUT for DNA sequences also indicate that their method...

    Provided By mecs-press

  • White Papers // Sep 2013

    Design and Development of Biometrics Secure Person Detection System for E-Passport Using Cryptographic Security Protocols

    The biometric passports are to prevent the illegal entry of traveler into a specific country and limit the use of counterfeit documents by more accurate identification of an individual. This IC chip is integrated into the cover of a passport, called a biometric passport. Biometric Passports have been introduced in...

    Provided By mecs-press

  • White Papers // Sep 2013

    Security Mechanisms and Access Control Infrastructure for Biometrics Passport using Cryptographic Protocols

    Electronic passports (e-passports) are to prevent the illegal entry of traveler into a specific country and limit the use of counterfeit documents by more accurate identification of an individual. The e-passport, as it is sometimes called, represents a bold initiative in the deployment of two new technologies: cryptography security and...

    Provided By mecs-press

  • White Papers // Aug 2013

    Design and Development MIPS Processor Based on a High Performance and Low Power Architecture on FPGA

    In this paper the authors present the design and development of a high performance and low power MIPS microprocessor and implementation on FPGA. In this method they for achieving high performance and low power in the operation of the proposed microprocessor use different methods including, unfolding transformation (parallel processing), C-slow...

    Provided By mecs-press

  • White Papers // Aug 2013

    A Face Recognition Approach Based on Entropy Estimate of the Nonlinear DCT Features in the Logarithm Domain Together With Kernel Entropy Component Analysis

    This paper exploits the feature extraction capabilities of the Discrete Cosine Transform (DCT) together with an illumination normalization approach in the logarithm domain that increase its robustness to variations in facial geometry and illumination. Secondly in the same domain the entropy measures are applied on the DCT coefficients so that...

    Provided By mecs-press

  • White Papers // Aug 2013

    KED - A Symmetric Key Algorithm for Secured Information Exchange Using Modulo 69

    Exchange of data over the internet is increasing day-by-day. Security is the main issue in communication over a network. Protection must be given against intruders. Hence, cryptography plays a vital role in providing security. There are two basic types of cryptography: symmetric key and asymmetric key. Symmetric key uses same...

    Provided By mecs-press

  • White Papers // Aug 2013

    A Hybrid Model for Biometric Authentication Using Finger Back Knuckle Surface Based on Angular Geometric Analysis

    Biometric based personal recognition is an efficient method for identifying a person. Recently, hand based biometric has become popular due to its various advantages such as high verification accuracy and high user acceptability. This paper proposes a hybrid model using an emerging hand based biometric trait known as Finger Back...

    Provided By mecs-press

  • White Papers // Aug 2013

    Biometric Based Security Solutions for MANET: A Review

    Mobile ad hoc networks are self organizing, infrastructure-less, low power networks, design to deploy bandwidth-shared radio channel communication and to work under vulnerable environment. Security is primary concern in MANETs and in order to achieve high security (confidentiality, integrity, authentication, availability and non repudiation), several techniques have been explored in...

    Provided By mecs-press

  • White Papers // Aug 2013

    Next Generation Electronic Passport Scheme Using Cryptographic Authentication Protocols and Multiple Biometrics Technology

    Electronic passports (e-passports) are to prevent the illegal entry of traveler into a specific country and limit the use of counterfeit documents by more accurate identification of an individual. The e-passport, as it is sometimes called, represents a bold initiative in the deployment of two new technologies: cryptography security and...

    Provided By mecs-press

  • White Papers // Aug 2013

    Security Algorithms for Mitigating Selfish and Shared Root Node Attacks in MANETs

    Mobile ad hoc network is a type of self configurable, dynamic wireless network in which all the mobile devices are connected to one another without any centralized infrastructure. Since, the network topology of MANETs changes rapidly. It is vulnerable to routing attacks than any other infrastructure based wireless and wired...

    Provided By mecs-press

  • White Papers // Jul 2013

    Networked Control System - A Survey

    Networked Control System (NCS) is a synthetic application which combines control science, computer science and network technology. It is a kind of feedback control systems wherein the control loops are closed through real time control network. NCS technology is applied in industry control system because of its simple structure, easy...

    Provided By mecs-press

  • White Papers // Jul 2013

    All-Optical Parity Circuits Using Nonlinear Directional Coupler

    Since in the previous existing optical designs, the electronic-optic-electronic conversion has not been completely eliminated. Construction of the optical circuits with nonlinear waveguides can overcome this drawback. The authors have developed a nonlinear directional coupler theory to describe novel all-optical parity circuits. By using three channels, appropriate adjusting of the...

    Provided By mecs-press

  • White Papers // Jul 2013

    Study and Performance Evaluation on Recent DDoS Trends of Attack & Defense

    Distributed Denial of Service attacks are exercised by attackers in various forms. These attacks vary from single attacking source to a networked attacking infrastructure. They also vary in degree of automation, from manual efforts to fully automated attacks. In networked form, a botnet of attacking sources is created. These machines...

    Provided By mecs-press

  • White Papers // Jul 2013

    A Scheme to Reduce Response Time in Cloud Computing Environment

    The area of cloud computing has become popular from the last decade due to its enormous benefits such as lower cost, faster development and access to highly available resources. Apart from these core benefits some challenges are also associated with it such as QoS, security, trust and better resource management....

    Provided By mecs-press

  • White Papers // Jul 2013

    A Survey on Interoperability in the Cloud Computing Environments

    In the recent years, cloud computing has been one of the top ten new technologies which provide various services such as software, platform and infrastructure for internet users. The cloud computing is a promising IT paradigm which enables the Internet evolution into a global market of collaborating services. In order...

    Provided By mecs-press

  • White Papers // Jun 2013

    Service Oriented Architecture for Remote Sensing Satellite Telemetry Data Implemented on Cloud Computing

    This paper articulates how Service Oriented Architecture (SOA) and cloud computing together can facilitate technology setup in TeleMetry (TM) processing with a case study from the Egyptian Space Program (ESP) and a comparative study with Space Situational Awareness (SSA) program in European Space Agency (ESA), Moreover, this paper illustrates how...

    Provided By mecs-press

  • White Papers // Jun 2013

    Analysis of the SYN Flood DoS Attack

    The paper analyzes systems vulnerability targeted by TCP (Transmission Control Protocol) segments when SYN flag is ON, which gives space for a DoS (Denial of Service) attack called SYN flooding attack or more often referred as a SYN flood attack. The effects of this type of attack are analyzed and...

    Provided By mecs-press

  • White Papers // Jun 2013

    Establishing Inter Vehicle Wireless Communication in Vanet and Preventing It From Hackers

    The entire humanity needs a vehicle to travel from one place to another. Obviously a new model vehicle is manufactured by the manufacturing companies to attract its customers every day. All the manufactured vehicles have different advantages, when compared with one another. In this paper, the authors introduce another added...

    Provided By mecs-press

  • White Papers // Jun 2013

    Wi-Fi Networks Security and Accessing Control

    As wireless networks access gains popularity in corporate, private and personal networks, the nature of wireless networks opens up new possibilities for network attacks. This paper negotiating Wi-Fi security against scanning of rogue Wi-Fi networks and other related activities and considers the monitoring of Wi-Fi traffic effects. The unauthorized Access...

    Provided By mecs-press

  • White Papers // Jun 2013

    Information Leakage Prevention Using Virtual Disk Drive

    The worst news for information technology people are computer has been stolen or lost. The actual problem is the loss of the data stored on the hard drive that can fall into the wrong hands. However, users of information system and laptops computers are facing real problems with due to...

    Provided By mecs-press

  • White Papers // May 2013

    A Hybrid Algorithm for Privacy Preserving in Data Mining

    With the proliferation of information available in the internet and databases, the privacy-preserving data mining is extensively used to maintain the privacy of the underlying data. Various methods of the state art are available in the literature for privacy-preserving. Evolutionary Algorithms (EAs) provide effective solutions for various real-world optimization problems....

    Provided By mecs-press

  • White Papers // May 2013

    Bitwise Operations Related to a Combinatorial Problem on Binary Matrices

    Some techniques for the use of bitwise operations are described in the paper. As an example, an open problem of isomorphism-free generations of combinatorial objects is discussed. An equivalence relation on the set of square binary matrices having the same number of units in each row and each column is...

    Provided By mecs-press

  • White Papers // May 2013

    Performance Comparison of Various Robust Data Clustering Algorithms

    Robust clustering techniques are real life clustering techniques for noisy data. They work efficiently in the presence of noise. Fuzzy C-Means (FCM) is the first clustering algorithm, based upon fuzzy sets, proposed by 0but it does not give accurate results in the presence of noise. In this paper, FCM and...

    Provided By mecs-press

  • White Papers // May 2013

    An Efficient IBE Scheme using IFP and DDLP

    In this system, each user needs to visit a Private Key Generation (PKG) and identify him-self before joining a communication network. Once a user is accepted, the PKG will provide him with a secret key. In this way, if a user wants to communicate with others, he only needs to...

    Provided By mecs-press

  • White Papers // May 2013

    Secured and Optimized AODV for Wireless Sensor Networks

    Similar to conventional wireless networks, WSNs are based on multi hop routing to ensure connectivity and data forwarding which makes the routing service a challenging task due to the nature of sensors usually limited in memory, battery and computing capacities as well as the nature of the environment which is...

    Provided By mecs-press

  • White Papers // May 2013

    Exploiting SIMD Instructions in Modern Microprocessors to Optimize the Performance of Stream Ciphers

    Modern cryptographic protocols like TLS, SSL, etc. provide communication security by employing symmetric or secret key algorithms for encrypting the data and asymmetric or public key algorithms for key exchange. Modern microprocessors are loaded with a lot of performance optimization features. Single Instruction Multiple Data (SIMD) instruction set feature specially...

    Provided By mecs-press

  • White Papers // May 2013

    Student Learning Ability Assessment using Rough Set and Data Mining Approaches

    All learners are not able to learn anything and everything complete. Though the learning mode and medium are different in e-learning mode and in classroom learning, similar activities are required in both the modes for teachers to observe and assess the learner(s). Student performance varies considerably depending upon whether a...

    Provided By mecs-press

  • White Papers // Apr 2013

    Location Prediction of Mobility Management Using Soft Computing Techniques in Cellular Network

    This paper describes the neural network technique to solve location management problem. A multilayer neural model is designed to predict the future prediction of the subscriber based on the past predicted information of the subscriber. In this paper, a prediction based location management scheme is proposed for locating a mobile...

    Provided By mecs-press

  • White Papers // Apr 2013

    A Fair Downlink Scheduling Algorithm for 3GPP LTE Networks

    Long Term Evolution (LTE), the standard specified by 3GPP on the way towards the fourth generation mobile networks, is intended to deliver high speed data and multimedia services to next generation mobile users. The Radio Resource Management (RRM) plays a very crucial role in managing limited radio resources to enhance...

    Provided By mecs-press

  • White Papers // Apr 2013

    Password Hardened Biometric: A Complete Solution of Online Security

    In present paper, secure online access to enterprises resources is very important for any organization. To protect valuable data become one of the big challenge for today's business as enterprise customers or clients involved in Business-to-Customer (B2C) and Business-to-Business (B2B) e-commerce need to feel that their transactions are secured from...

    Provided By mecs-press

  • White Papers // Apr 2013

    A Robust Fault Detection Scheme for the Advanced Encryption Standard

    Fault attacks are powerful and efficient cryptanalysis techniques to find the secret key of the Advanced Encryption Standard (AES) algorithm. These attacks are based on injecting faults into the structure of the AES to obtain the confidential information. To protect the AES implementation against these attacks, a number of countermeasures...

    Provided By mecs-press

  • White Papers // Feb 2011

    Sensitive Data Protection Based on Intrusion Tolerance in Cloud Computing

    Cloud computing distributes computing tasks to virtual resource pools which are constituted of a large number of computers, and cloud computing ensures that various applications can get access to computing power, storage space and various software services when needed. Service integration and supply on-demand coming from cloud computing can significantly...

    Provided By mecs-press

  • White Papers // Dec 2013

    Metrics for Evaluating Pervasive Middleware

    Pervasive computing aims at developing smart environments which enable user to interact with other devices. Pervasive computing includes a middleware to support interoperability, heterogeneity and self-management among different platforms. It provides efficient communications and context awareness among devices. Middleware for pervasive computing provides much more attention to coordinate the devices...

    Provided By mecs-press

  • White Papers // Jan 2014

    E-mail Spam Filtering Using Adaptive Genetic Algorithm

    Now-a-days everybody email inbox is full with spam mails. The problem with spam mails is that they are not malicious in nature so generally don't get blocked with firewall or filters etc., however, they are unwanted mails received by any internet users. In 2012, more that 50% emails of the...

    Provided By mecs-press

  • White Papers // Jan 2014

    Strategic Sensor Placement for Intrusion Detection in Network-Based IDS

    Network Intrusion Detection Systems (NIDSs) can be composed of a potentially large number of sensors, which monitor the traffic flowing in the network. Deciding where sensors should be placed and what information they need in order to detect the desired attacks can be a demanding task for network administrators, one...

    Provided By mecs-press

  • White Papers // Jan 2014

    Performance Analysis of Multi Functional Bot System Design Using Microcontroller

    In this paper the authors include performance analysis of a multipurpose microcontroller based system which has various modes to control distinct applications. The paper elucidates how a single chip microcontroller can process different signals and accomplish different tasks. The system discussed in this paper has seven modes. Each mode controls...

    Provided By mecs-press

  • White Papers // Dec 2012

    Intelligent Routing Techniques for Mobile Ad hoc Networks Using Swarm Intelligence

    A Mobile Ad hoc NETwork (MANET) is a collection of autonomous self-organized nodes. They use wireless medium for communication, thus two nodes can communicate directly if and only if they are within each other's transmission radius in a multi-hop fashion. Many conventional routing algorithms have been proposed for MANETs. An...

    Provided By mecs-press

  • White Papers // Feb 2011

    A Method of Hash Join in the DAS Model

    In the Database As Service(DAS) model, authenticated join processing is more difficult than authenticated range query because the previous approach of authenticated range query, signature on a single relation, can not be used to verify join results directly. In this paper, an authenticated hash join processing algorithm is described in...

    Provided By mecs-press

  • White Papers // Dec 2010

    Code Formal Verification of Operation System

    With the increasing pressure on non-function attributes (security, safety and reliability) requirements of an operation system, high-confidence operation system is becoming more important. Formal verification is the only known way to guarantee that a system is free of programming errors. The authors research on formal verification of operation system kernel...

    Provided By mecs-press

  • White Papers // Dec 2010

    Performance Analysis of QoS Multicast Routing in Mobile Ad Hoc Networks Using Directional Antennas

    In this paper, a Quality of Service (QoS) multicast routing protocol in Mobile Ad hoc NETworks (MANETs) by using directional antennas has been presented. Many important applications, such as audio/video conferencing, require the quality of service guarantee. Directional antenna technology provides the capability for considerable increase in spatial reuse, which...

    Provided By mecs-press

  • White Papers // Dec 2010

    Study of 2D DOA Estimation for Uniform Circular Array in Wireless Location System

    In this paper, the use of a Uniform Circular Antenna arrays (UCA) for high resolution of Two Dimensional (2D) Direction Of Arrivals (DOAs) estimation in wireless location system is investigated. Performance of 2D DOA estimation based on the real-valued unitary transformation MUSIC algorithm for UCA is presented, especially focusing on...

    Provided By mecs-press

  • White Papers // Dec 2010

    An Improved Dynamic Probabilistic Packet Marking for IP Trace back

    An improved dynamic probabilistic packet marking algorithm named IDPPM is presented, which not only can locate and attack a source rapidly and accurately, but also can reduce the marking overhead of routers near the attackers, which is its greatest contribution given by the authors' technique. In contrast to previous work,...

    Provided By mecs-press

  • White Papers // Dec 2010

    Research on Trusted Industrial Control Ethernet Network

    Industrial control Ethernet networks are more important in connecting with equipments each other of enterprise comprehensive automation and integrating information. With the explosive growth of network techniques, the traditional control networks can no longer satisfy the security demands on network connectivity, data storage and information exchanges. New types of networks...

    Provided By mecs-press

  • White Papers // Dec 2010

    A New Immunity Intrusion Detection Model Based on Genetic Algorithm and Vaccine Mechanism

    After analyzing the characteristics of Immunity Intrusion Detection System, by utilizing prominent characteristics of genetic algorithm and vaccine mechanism, a new hybird immunity intrusion detection model based on genetic algorithm and vaccine mechanism was established. The modeling process is described in detail, such as feature extraction of vaccine, genetic operates...

    Provided By mecs-press

  • White Papers // Nov 2010

    Intelligent Rate Adaptation Based on Improved Simulated Annealing Algorithm

    This paper analyzes the PHY layer of IEEE 802.11 standards for a variety of transmission rates, after learning that MAC layer does not provide adaptive approach for rate control. With the study of various adaptive algorithms, the SAARF (Simulated Annealing Auto Rate Fallback) protocol based on simulated annealing algorithm is...

    Provided By mecs-press

  • White Papers // Nov 2010

    Nonlinear Blind Source Separation Using Kernel Multi-Set Canonical Correlation Analysis

    To solve the problem of nonlinear Blind Source Separation (BSS), a novel algorithm based on kernel Multi-set Canonical Correlation Analysis (MCCA) is presented. Combining complementary research fields of kernel feature spaces and BSS using MCCA, the proposed approach yields a highly efficient and elegant algorithm for nonlinear BSS with invertible...

    Provided By mecs-press

  • White Papers // Nov 2010

    Research on the Method of Multi-Channel Video Acquisition and Display Based on FPGA

    With the problems of high speed and asynchronism in a multi-channel video, a video monitor system based on FPGA and SRAM is designed and implemented. The system adopts the method of time-division multiplexing to realize the function of four-channel video parallel acquisition. The synchronization between four-channel video is achieved by...

    Provided By mecs-press

  • White Papers // Nov 2010

    Research on Humanoid Robot Soccer System Based on Fuzzy Logic

    This paper presents the use of a fuzzy logic controller combined with Machine Vision to improve the accuracy to identify the ball and speed of approaching the ball in Robot Soccer. The conventional robot control consists of methods for path generation and path following. When a robot moves away the...

    Provided By mecs-press

  • White Papers // Nov 2010

    Getting Obstacle Avoidance Trajectory of Mobile Beacon for Localization

    Localization is one of the most important technologies in wireless sensor network, and mobile beacon assisted localization is a promising localization method. The mobile beacon trajectory planning is a basic and important problem in these methods. There are many obstacles in the real world, which obstruct the moving of mobile...

    Provided By mecs-press

  • White Papers // Nov 2010

    System Design of a Trusted SoC and Detailed Analysis of Its Secure State Transitions

    According to the relevant criterion and principle for designing and evaluating various trusted computing chips, the authors have proposed a new trusted SoC chip, and have given the implementation of its basic functional modules. In detail, they have discussed the design of the trusted SoC security architecture and the main...

    Provided By mecs-press

  • White Papers // Aug 2012

    Optical Many Casting Using QoS Depend Layer Aware Mechanism

    Many distributed applications require a group of destinations to be coordinated to a single source. Multicasting is a communication paradigm to implement these distributed applications. In multicasting, at least one of the member in the group cannot satisfy the service requirement of the application, the multicast request said to be...

    Provided By mecs-press

  • White Papers // Aug 2012

    Random Handwritten CAPTCHA: Web Security With a Difference

    It is hard to believe a web form without a CAPTCHA. The web survival in this cut-throat competition is impossible without the mechanisms for blocking spam-boats. The spam-boats have now been made intelligent enough to break through machine printed CAPTCHAs. Handwritten CAPTCHA image can be one solution. In this paper...

    Provided By mecs-press

  • White Papers // Jul 2012

    A Novel Approach for Spectrum Access Using Fuzzy Logic in Cognitive Radio

    In this paper, the authors have proposed a novel approach using Fuzzy Logic System (FLS) for the potential management of the spectrum access. They have used four descriptors such as spectrum utilization efficiency of the secondary user, mobility, distance of the primary user, and signal strengths of the secondary users....

    Provided By mecs-press

  • White Papers // Jul 2012

    Trends, Issues and Challenges Concerning Spam Mails

    Traditional correspondence system has now been replaced by internet, which has now become indispensable in everyone's life. With the advent of the internet, majority of people correspond through emails several times in a day. However, as internet has evolved, email is being exploited by spammers so as to disturb the...

    Provided By mecs-press

  • White Papers // Jul 2012

    Doppler Shift Impact On the MIMO OFDM System in Vehicular Channel Condition

    Vehicle-To-Vehicle (V2V) communication systems will play an important role in Intelligent Transportation Systems (ITS). But in high mobility road condition, Orthogonal Frequency Division Multiplexing (OFDM) is very sensitive to Doppler shift. In this scenario Multiple Input and Multiple Output (MIMO) system combined with OFDM, make MIMO -OFDM techniques very attractive...

    Provided By mecs-press

  • White Papers // Aug 2012

    Cryptography Using Multiple Two-Dimensional Chaotic Maps

    In this paper, a symmetric key block cipher cryptosystem is proposed, involving multiple two-dimensional chaotic maps and using 128-bits external secret key. Computer simulations indicate that the cipher has good diffusion and confusion properties with respect to the plaintext and the key. Moreover, it produces ciphertext with random distribution. The...

    Provided By mecs-press

  • White Papers // Aug 2012

    Cascading of C4.5 Decision Tree and Support Vector Machine for Rule Based Intrusion Detection System

    Main reason for the attack being introduced to the system is because of popularity of the internet. Information security has now become a vital subject. Hence, there is an immediate need to recognize and detect the attacks. Intrusion Detection is defined as a method of diagnosing the attack and the...

    Provided By mecs-press

  • White Papers // Aug 2012

    Modeling Prioritized Hard Handoff Management Scheme for Wireless Mobile Networks

    The channel associated with the current connection serviced by a base station is changed while a call is in progress. Usually, continuous service is achieved by supporting handoff from one cell to another. It is often initiated either by crossing a cell boundary or by deterioration in quality of the...

    Provided By mecs-press

  • White Papers // Aug 2012

    Distributed Encrypting File System for Linux in User-Space

    Linux systems use Encrypting File System (EFS) for providing confidentiality and integrity services to files stored on disk in a secure, efficient and transparent manner. Distributed encrypting file system should also provide support for secure remote access, multiuser file sharing, possible use by non-privileged users, portability, incremental backups, etc. Existing...

    Provided By mecs-press

  • White Papers // Aug 2012

    A New Approach for Multicast Routing in Wireless Mesh Networks

    This paper focuses on the multicast routing in wireless mesh networks under the 802.11s standard. This standard defines the HWMP (Hybrid Wireless Mesh network Protocol) as the protocol of the routing but only unicast and broadcast. Such the standard defines the multicast routing as a goal among several and that...

    Provided By mecs-press

  • White Papers // Aug 2012

    Enhancement of Security and Privacy in Biometric Passport Inspection System Using Face, Fingerprint, and Iris Recognition

    The biometric passports are to prevent the illegal entry of traveler into a specific country and limit the use of counterfeit documents by more accurate identification of an individual. Biometric Passports have been introduced in many countries to improve the security in Inspection Systems and enhance procedures and systems that...

    Provided By mecs-press

  • White Papers // Jul 2012

    UML Based Integrated Multilevel Checkpointing Algorithms for Cloud Computing Environment

    Main objective of this paper is to improve the checkpoint efficiency for integrated multilevel checkpointing algorithms and prevent checkpointing from becoming the bottleneck of cloud data centers. In order to find an efficient checkpoint interval, checkpointing overheads has also considered in this paper. Traditional checkpointing methods stores persistently snapshots of...

    Provided By mecs-press

  • White Papers // Jul 2012

    Protection Against DDoS and Data Modification Attack in Computational Grid Cluster Environment

    In the past decades, focus of computation has shifted to high performance computing like Grid Computing and Cloud Computing. In Grid computing, grid server is responsible for managing the all resources like processor, memory and CPU cycles. Grids are basically networks that pool resources, CPU cycles, storage or data from...

    Provided By mecs-press

  • White Papers // Jul 2012

    Impact of Physical Layer Jamming on Wireless Sensor Networks With Shadowing and Multicasting

    This paper analyzes the impact of a physical layer jamming on the performance of wireless sensor networks by performing exhaustive comparative simulations using multicasting and by employing varying intensity of shadowing (constant and log normal). Comprehensive result analysis reveals that jamming drastically degrades the legitimate traffic throughput in a network,...

    Provided By mecs-press

  • White Papers // Jul 2012

    Application of Biometrics in Mobile Voting

    Voting process in today's era is behind its time in respect of the usage of modern ICT. The voting process is being seen mostly as a manual and paper based one. This process can be overwhelming, time-consuming and prone to security breaches and electoral fraud. Over the years technology related...

    Provided By mecs-press

  • White Papers // Jul 2012

    Estimating the Video Registration Using Image Motions

    In this paper, the authors consider the problems of registering multiple video sequences dynamic scenes which are not limited non rigid objects such as fireworks, blasting, high speed car moving taken from different vantage points. In this paper, they propose a simple algorithm they can create different frames on particular...

    Provided By mecs-press

  • White Papers // Jun 2012

    QSWMCA - Quality of Service in Wireless Mesh Networks by Configuration Arguments

    In this paper, the authors present a Quality of Experience (QoE) based upon the analyze the key Quality of Service (QoS) parameters such as delay, jitter, throughput, packet loss, packet inspection in the mesh networks which executing the better approach for reconfiguration wireless mesh networks in the routing protocol. In...

    Provided By mecs-press

  • White Papers // Aug 2013

    KED - A Symmetric Key Algorithm for Secured Information Exchange Using Modulo 69

    Exchange of data over the internet is increasing day-by-day. Security is the main issue in communication over a network. Protection must be given against intruders. Hence, cryptography plays a vital role in providing security. There are two basic types of cryptography: symmetric key and asymmetric key. Symmetric key uses same...

    Provided By mecs-press

  • White Papers // Jun 2013

    Analysis of the SYN Flood DoS Attack

    The paper analyzes systems vulnerability targeted by TCP (Transmission Control Protocol) segments when SYN flag is ON, which gives space for a DoS (Denial of Service) attack called SYN flooding attack or more often referred as a SYN flood attack. The effects of this type of attack are analyzed and...

    Provided By mecs-press

  • White Papers // May 2013

    Exploiting SIMD Instructions in Modern Microprocessors to Optimize the Performance of Stream Ciphers

    Modern cryptographic protocols like TLS, SSL, etc. provide communication security by employing symmetric or secret key algorithms for encrypting the data and asymmetric or public key algorithms for key exchange. Modern microprocessors are loaded with a lot of performance optimization features. Single Instruction Multiple Data (SIMD) instruction set feature specially...

    Provided By mecs-press

  • White Papers // Apr 2013

    Biometric Passport Validation Scheme using Radio Frequency Identification

    Biometric passports issued now-a-days have an embedded RFID chip that carries digitally signed biometric information. This RIFD chip is integrated into the cover of a passport, called a biometric passport. Electronic passports as it is sometimes called, represents a bold initiative in the deployment of two new technologies: RIFD and...

    Provided By mecs-press