mecs-press

Displaying 41-80 of 371 results

  • White Papers // Jul 2012

    UML Based Integrated Multilevel Checkpointing Algorithms for Cloud Computing Environment

    Main objective of this paper is to improve the checkpoint efficiency for integrated multilevel checkpointing algorithms and prevent checkpointing from becoming the bottleneck of cloud data centers. In order to find an efficient checkpoint interval, checkpointing overheads has also considered in this paper. Traditional checkpointing methods stores persistently snapshots of...

    Provided By mecs-press

  • White Papers // Jul 2012

    Protection Against DDoS and Data Modification Attack in Computational Grid Cluster Environment

    In the past decades, focus of computation has shifted to high performance computing like Grid Computing and Cloud Computing. In Grid computing, grid server is responsible for managing the all resources like processor, memory and CPU cycles. Grids are basically networks that pool resources, CPU cycles, storage or data from...

    Provided By mecs-press

  • White Papers // Jul 2012

    Impact of Physical Layer Jamming on Wireless Sensor Networks With Shadowing and Multicasting

    This paper analyzes the impact of a physical layer jamming on the performance of wireless sensor networks by performing exhaustive comparative simulations using multicasting and by employing varying intensity of shadowing (constant and log normal). Comprehensive result analysis reveals that jamming drastically degrades the legitimate traffic throughput in a network,...

    Provided By mecs-press

  • White Papers // Jul 2012

    Application of Biometrics in Mobile Voting

    Voting process in today's era is behind its time in respect of the usage of modern ICT. The voting process is being seen mostly as a manual and paper based one. This process can be overwhelming, time-consuming and prone to security breaches and electoral fraud. Over the years technology related...

    Provided By mecs-press

  • White Papers // Jul 2012

    Estimating the Video Registration Using Image Motions

    In this paper, the authors consider the problems of registering multiple video sequences dynamic scenes which are not limited non rigid objects such as fireworks, blasting, high speed car moving taken from different vantage points. In this paper, they propose a simple algorithm they can create different frames on particular...

    Provided By mecs-press

  • White Papers // Jun 2012

    QSWMCA - Quality of Service in Wireless Mesh Networks by Configuration Arguments

    In this paper, the authors present a Quality of Experience (QoE) based upon the analyze the key Quality of Service (QoS) parameters such as delay, jitter, throughput, packet loss, packet inspection in the mesh networks which executing the better approach for reconfiguration wireless mesh networks in the routing protocol. In...

    Provided By mecs-press

  • White Papers // Jun 2011

    Research of Emergency Vehicles Information System Based on SOA

    Using Service-Oriented Architecture (SOA) to build an information system is a hot topic at present. The primary goal of this paper is to investigate how to build a SOA-based information system in a special industry-the field of emergency vehicles in environment protection industry. The paper provides a presentation of current...

    Provided By mecs-press

  • White Papers // Apr 2011

    A Novel Framework to Carry Out Cloud Penetration Test

    In current cloud services, users put their data and resources into the cloud so as to enjoy the on-demand high quality applications and services. Different from the conventional services, users in cloud services lose control of their data which is instead manipulated by the large-scale cloud. Therefore, Cloud Service Providers...

    Provided By mecs-press

  • White Papers // Apr 2011

    A Dynamic Topology Management in a Hybrid Wireless Superstore Network

    With the development of large scale wireless networks, there has been short comings and limitations in traditional network topology management systems. In this paper, an adaptive algorithm is proposed to maintain topology of hybrid wireless superstore network by considering the transactions and individual network load. The adaptations include to choose...

    Provided By mecs-press

  • White Papers // Apr 2011

    Searching Methods of MP2P Based on Diffusion Strategy of Resources Index

    The inherent mobility of MP2P peers lead to an efficient of existing resources positioning method low, and the proposed application model is single. The proposed methods considered the resource positioning in the direction of the resource provider's, and implement it base on the diffusion resource index, which are spread in...

    Provided By mecs-press

  • White Papers // Apr 2011

    A Public Opinion Classification Algorithm Based on Micro-Blog Text Sentiment Intensity: Design and Implementation

    On the features of short content and nearly real-time broadcasting velocity of micro-blog information, the authors' lab constructed a public opinion corpus named MPO Corpus. Then, based on the analysis of the status of the network public opinion, it proposes an approach to calculate the sentiment intensity from three levels...

    Provided By mecs-press

  • White Papers // Apr 2011

    A Frequency Estimation for TD-SCDMA UE Based on Phase Difference

    This paper describes a new method of frequency estimation in cell search of TD-SCDMA system. Before identifying the scrambling code and Midamble code, using part of sync-dl code data for frequency estimation; and before controlling the multi-frame synchronization, using part of Midamble code data for frequency estimation. Also these two...

    Provided By mecs-press

  • White Papers // Mar 2011

    Semi-Distributed Coordinative Switch Beamforming With Power Scheduling

    Beam cooperative scheduling of a downlink transmission is an important technique to improve the spectrum efficiency in next generation mobile networks. This paper focuses on switched beams (the emission angles of the beams are fixed) and proposes a joint beam-power coordinative scheduling algorithm among neighbor sectors in the downlink of...

    Provided By mecs-press

  • White Papers // Mar 2011

    Design and Application of A New Hybrid Heuristic Algorithm for Flow Shop Scheduling

    A new heuristic algorithm was designed by combining with Johnson method, NEH method and characteristics of scheduling, and it was implemented on MATLAB. The efficiency of the new algorithm was tested through eight Car questions and two Hel questions of Benchmark problems, and the results revealed that the new heuristic...

    Provided By mecs-press

  • White Papers // Feb 2011

    Application of CL Multi-Wavelet Transform and DCT in Information Hiding Algorithm

    How to make the Information Hiding scheme have a better performance in terms of invisibility, robustness, sensitivity and anti-steganalysis becomes a research hotspot. Currently, the algorithm has not achieved four performances at the same time. The scheme based on space domain are good at invisibility, but can not meet the...

    Provided By mecs-press

  • White Papers // Feb 2011

    A Semantic Context-Based Model for Mobile Web Services Access Control

    As mobile web services becomes more pervasive, applications based on mobile web services will need flexible access control mechanisms. Unlike traditional approaches based on the identity or role for access control, access decisions for these applications will depend on the combination of the required attributes of users and the contextual...

    Provided By mecs-press

  • White Papers // Mar 2012

    Improved Classification Methods for Brain Computer Interface System

    Brain Computer Interface (BCI) aims at providing a new communication way without brain's normal output through nerve and muscle. The Electroencephalography (EEG) has been widely used for BCI system because it is a non-invasive approach. For the EEG signals of left and right hand motor imagery, the Event-Related Resynchronization (ERD)...

    Provided By mecs-press

  • White Papers // Mar 2012

    Error Detection & Correction in Wireless Sensor Networks by Using Residue Number Systems

    Wireless Sensor Networks have potential of significantly enhancing the people ability to monitor and interact with their physical environment. Realizing a fault tolerant operation is critical to the success of WSNs. The integrity of data has tremendous effects on performance of any data acquisition system. Noise and other disturbances can...

    Provided By mecs-press

  • White Papers // Mar 2012

    A Novel Security Scheme for Secret Data Using Cryptography and Steganography

    With the development of network techniques the problem of network security becomes more and more important. The use of Word Wide Web has grown extremely in the past few years. Furthermore, many end users can easily use tools to synthesize and edit multimedia information. Thus, security has become one of...

    Provided By mecs-press

  • White Papers // Mar 2012

    Semifragile Watermarking Schemes for Image Authentication- A Survey

    Digital images are very easy to manipulate, store, publish and secondary creation this juggle will lead to serious consequence in some applications such as military image, medical image. So, integrity of digital image must be authenticated. Tools that help one establish the authenticity and integrity of digital media are thus,...

    Provided By mecs-press

  • White Papers // Mar 2012

    Evolution of Electronic Passport Scheme Using Cryptographic Protocol Along With Biometrics Authentication System

    Millions of citizens around the world have already acquired their new electronic passport. The e-passport is equipped with contact-less chip which stores personal data of the passport holder, information about the passport and the issuing institution, as well as with a multiple biometrics enabling cryptographic functionality. Countries are required to...

    Provided By mecs-press

  • White Papers // Apr 2012

    Distributed Algorithms for Improving Search Efficiency in P2P Overlays

    Peer-To-Peer (P2P) overlay is a distributed application architecture in which peers share their resources. Peers are equally privileged, equipotent participants in the application. Several algorithms for enhancing P2P file searching have been proposed in the literature. In this paper, the authors have proposed a unique approach of reducing the P2P...

    Provided By mecs-press

  • White Papers // Apr 2012

    Fast Vertical Handover Algorithm for Vehicular Communication: A Holistic Approach

    Next generation vehicular communication environment will consist of heterogeneous Radio Access Networks (RAN). For seamless connectivity, vertical handover is a mandatory requirement. A novel context aware vertical handover algorithm is presented here. TOPSIS (Technique for Order Preference by Similarity to Ideal Solution), which is a Multi Criteria Decision Making (MCDM)...

    Provided By mecs-press

  • White Papers // Apr 2012

    Free Space Optical Channel Characterization and Modeling With Focus on Algeria Weather Conditions

    Free-Space Optics (FSO) is a wireless optical technology that enables optical transmission of data, voice and video communications through the air, up to 10 Gbps of data, based on the use of the free space (the atmosphere) as transmission medium and low power lasers as light sources. Quality and performance...

    Provided By mecs-press

  • White Papers // Apr 2012

    Network Packet Inspection to Identify Contraband File Sharing Using Forensic Tools

    This Paper discusses the digital forensic tool that uses a Field Programmable Gate Array [FPGA] based software for deep packet inspection in network Router for a Bit Torrent Handshake message. Extracts the "Information Hashing" of the file being shared, compares the hash against a list of known contraband files for...

    Provided By mecs-press

  • White Papers // Apr 2012

    Attacks Due to Flaw of Protocols Used in Network Access Control (NAC), Their Solutions and Issues: A Survey

    In order to ensure and enforce endpoint security, Network Access Control (NAC) is attracting considerable interest from the research community. Most NAC architectures are based on 802.1x, EAP (Extensible Authentication Protocol), EAPoL (EAP over LAN) 802.11i, 802.11w, and RADIUS (Remote Authentication Dial-In User Service) protocols. Unprotected management and control frames...

    Provided By mecs-press

  • White Papers // Jul 2012

    Performance Evaluation of MANET in Realistic Environment

    In order to facilitate communication in Mobile Ad hoc NETwork (MANET), routing protocols are developed. The performance of these protocols depends upon various factors such as: transmission range, number of nodes deployed and mobility of the nodes. Another factor which affects the performance of MANET routing protocols is the environment...

    Provided By mecs-press

  • White Papers // Jul 2012

    Ultra Encryption Standard (UES) Version-III: Advanced Symmetric Key Cryptosystem With Bit-Level Encryption Algorithm

    Due to massive growth in communication technology and the tremendous growth in internet technology in the last decade, it has become a real challenge for a sender to send confidential data from one computer to another. The security of data has now become a big issue in data communication network....

    Provided By mecs-press

  • White Papers // Aug 2012

    Integrating Non-Functional Properties in Model Driven Development: A Stepwise Refinement View

    Most of the refinement approach is about functional property of systems. Non-functional properties are as important as functional one. Without an accurate approach for specifying and refining their behaviors, software models will be regarded as imperfect and imprecise, and as a result, software systems cannot be generated correctly. Therefore, how...

    Provided By mecs-press

  • White Papers // Aug 2012

    Coupling Complexity Metric: A Cognitive Approach

    Analyzing object-oriented systems in order to evaluate their quality gains its importance as the paradigm continues to increase in popularity. Consequently, several object-oriented metrics have been proposed to evaluate different aspects of these systems such as class coupling. This paper presents a new cognitive complexity metric namely cognitive weighted coupling...

    Provided By mecs-press

  • White Papers // Nov 2011

    A Novel Method for Grayscale Image Segmentation by Using GIT-PCANN

    PCNN has been widely used in image segmentation. However, satisfactory results are usually obtained at the expense of time-consuming selection of PCNN parameters and the number of iteration. A novel method, called Grayscale Iteration Threshold Pulse Coupled Neural Network (GIT-PCNN) was proposed for image segmentation, which integrates grayscale iteration threshold...

    Provided By mecs-press

  • White Papers // Feb 2011

    A Hybrid P2P Approach to Service Discovery in the Cloud

    Highly scalable techniques for service discovery are key to the efficient use of Cloud resources, since the Cloud computing appears to be part of the mainstream computing in a few years. The authors embarked on a preliminary study on Cloud service discovery by adopting an unstructured P2P paradigm. They developed...

    Provided By mecs-press

  • White Papers // Feb 2011

    A Cost-Aware Resource Selection for Data-Intensive Applications in Cloud-Oriented Data Centers

    As a kind of large-scale user-oriented data-intensive computing, cloud computing allows users to utilize on-demand computation, storage, data and services from around the world in a pay-as-you-go model. In cloud environment, applications need access to mass datasets that may each be replicated on different resources (or data centers). Mass data...

    Provided By mecs-press

  • White Papers // Feb 2011

    A Differentiated QoS Supporting PPS Solution Based on CICQ

    Based on the study of the existing PPS scheduling mechanism, the authors propose a novel PPS scheme for Differentiated QoS based on CICQ. The scheduling mechanism adopt in order queuing way to solve sequence preserving problem and set a small amount of buffer in the multiplexer to achieve differentiated QoS...

    Provided By mecs-press

  • White Papers // Feb 2012

    Discrete Simulation of the Remote Access to the Resources of a Virtual Research Laboratory

    This paper discusses the problem of an evaluation of the remote access to the resources of a Virtual Research Lab (VRL) and information servicing investigation by using queuing model and program simulation. The results presented here are the final part of general investigation of proposed architecture of the VRL developed...

    Provided By mecs-press

  • White Papers // Feb 2012

    A Data Mining-Based Response Model for Target Selection in Direct Marketing

    Identifying customers who are more likely to respond to new product offers is an important issue in direct marketing. In direct marketing, data mining has been used extensively to identify potential customers for a new product (target selection). Using historical purchase data, a predictive response model with data mining techniques...

    Provided By mecs-press

  • White Papers // Feb 2012

    Performance of Frequency Domain DFE Using Subcarrier Allocation

    Due to the usage of single carrier, the performance of SC-FDMA systems degrades in deep frequency selective fading channels. In this paper, the authors propose a structure of equalizer based on frequency domain decision feedback which could be used for multi-user SC-FDMA systems. This algorithm is applicable to various carrier...

    Provided By mecs-press

  • White Papers // Feb 2012

    Architecture for Accessing Heterogeneous Databases

    This paper presents the architecture for accessing heterogeneous databases. Two major processes in this architecture which are extracting SQL statement and ontology. The algorithms for extracting SQL statement was created and tested in order to improve time performance during searching and retrieving process. Ontology approach was implemented and combined with...

    Provided By mecs-press

  • White Papers // Feb 2012

    A New Secure Multicast Key Distribution Scheme Using Tabulation Method

    In the present paper, the authors propose a new scheme for a scalable multicast key distribution scheme. The present scheme is based on the Key Management using Tabulation method of Boolean Function Simplification technique. It explores the use of batching of group membership changes to reduce the frequency, and hence...

    Provided By mecs-press

  • White Papers // Feb 2012

    Using Logic Programming to Represent Information Content Inclusion Relations

    Datalog is a widely recognised language for a certain class of deductive databases. Information Content Inclusion Relation (IIR) formulates a general, information theoretic relationship between: data constructs; between data constructs and real world objects, and between real world objects. IIR is particularly concerned with the information that data carry. It...

    Provided By mecs-press