mecs-press

Displaying 121-160 of 342 results

  • White Papers // Jan 2013

    Performance Comparison and Evaluation of Different Multipath Routing Protocols Based on Various Scenario and Traffic Patterns for Mobile AD Hoc Networks

    A MANET is an interconnection of mobile devices by wireless links forming a dynamic topology without much physical network infrastructure such as routers, servers, access points/cables or centralized administration. The multipath routing protocols establish efficient communication within the network by discovering multiple routes between a pair of source and destination...

    Provided By mecs-press

  • White Papers // Jan 2013

    Self-organized Detection of Relationships in a Network

    Multistate operations within a network result in high-dimensional, multivariate temporal data, and are useful for systems, which monitor access to network entities like resources, objects, etc. Efficient self organization of such multistate network operations stored in databases with respect to relationships amongst users or between a user and a data...

    Provided By mecs-press

  • White Papers // Jan 2013

    DIMK-means \"Distance-based Initialization Method for K-means Clustering Algorithm\"

    Partition-based clustering technique is one of several clustering techniques that attempt to directly decompose the dataset into a set of disjoint clusters. K-means algorithm dependence on partition-based clustering technique is popular and widely used and applied to a variety of domains. K-means clustering results are extremely sensitive to the initial...

    Provided By mecs-press

  • White Papers // Dec 2012

    Intelligent Routing Techniques for Mobile Ad hoc Networks Using Swarm Intelligence

    A Mobile Ad hoc NETwork (MANET) is a collection of autonomous self-organized nodes. They use wireless medium for communication, thus two nodes can communicate directly if and only if they are within each other's transmission radius in a multi-hop fashion. Many conventional routing algorithms have been proposed for MANETs. An...

    Provided By mecs-press

  • White Papers // Dec 2012

    Fault Tolerant Message Efficient Coordinator Election Algorithm in High Traffic Bidirectional Ring Network

    Now-a-days use of distributed systems such as internet and cloud computing is growing dramatically. Coordinator existence in these systems is crucial due to processes coordinating and consistency requirement as well. However the growth makes their election algorithm even more complicated. Too many algorithms are proposed in this area, but the...

    Provided By mecs-press

  • White Papers // Dec 2012

    Enhanced Face Recognition Using Data Fusion

    In this paper the authors scrutinize the influence of fusion on the face recognition performance. In pattern recognition task, benefiting from different uncorrelated observations and performing fusion at feature and/or decision levels improves the overall performance. In features fusion approach, they fuse (concatenate) the feature vectors obtained using different feature...

    Provided By mecs-press

  • White Papers // Dec 2012

    Biometric Palm Prints Feature Matching for Person Identification

    Biometrics is playing an important role for person recognition. The Biometrics identification of an individual is can be done by physiological or behavioral characteristics; where the palm print of an individual can be captured by using sensors and is one of among physiological characteristics of an individual. Palm print is...

    Provided By mecs-press

  • White Papers // Nov 2012

    Performance Analysis of Most Common Encryption Algorithms on Different Web Browsers

    The hacking is the greatest problem in the Wireless Local Area Network (WLAN). Many algorithms like DES, 3DES, AES,UMARAM, RC6 and UR5 have been used to prevent the outside attacks to eavesdrop or prevent the data to be transferred to the end-user correctly. The authors have proposed a Web programming...

    Provided By mecs-press

  • White Papers // Nov 2012

    Semantic Enabled Role Based Social Network

    Communication is the most common but an intricate activity that the people perform every day. Sender sends message, discussions, greetings, gestures, emotics and texts through numerous channels, (e.g. e-mail, messengers, social networks and so on) intending the receiver to understand. The means of personal or group communication has been radically...

    Provided By mecs-press

  • White Papers // Nov 2012

    Swarm Flooding Attack Against Directed Diffusion in Wireless Sensor Networks

    The objective of this paper is to study the vulnerabilities of sensor networks, design, and implement new approaches for routing attack. As one of the cornerstones of network infrastructure, routing systems are facing more threats than ever; they are vulnerable by nature and challenging to protect. The authors present a...

    Provided By mecs-press

  • White Papers // Nov 2012

    Risk Management Strategies for the Use of Cloud Computing

    Cloud computing may lead to both cost-efficiency and flexibility, but it also inevitably triggers a certain degree of loss exposure. Unfortunately, there is little objective, scientific research focused on identifying and evaluating the loss exposure that results from cloud computing. In this study, a modified Delphi method and the analytic...

    Provided By mecs-press

  • White Papers // Nov 2012

    Need of Removing Delivered Message Replica From Delay Tolerant Network - A Problem Definition

    Recent wireless networks observe number of deployments in various conditions where they come across different intensities of link disconnection. On the basis of extent of the operating circumstances these networks are termed as Intermittently Connected Networks (ICNs). The prevailing TCP/IP protocol cannot be operational in ICNs thus providing number of...

    Provided By mecs-press

  • White Papers // Nov 2012

    Security Mechanisms to Decrease Vulnerability of Ad-Hoc Routing Protocols

    Many proposed routing protocols for ad hoc networks operate in an ad hoc fashion, as on demand routing protocols often have low overhead and faster reaction time than other types of routing based on periodic protocols. Dynamic nature of ad-hoc networks leads to challenges in securing the network. Due to...

    Provided By mecs-press

  • White Papers // Oct 2012

    Identifying Key Challenges in Performance Issues in Cloud Computing

    Cloud computing is a harbinger to a newer era in the field of computing where distributed and centralized services are used in a unique way. In cloud computing, the computational resources of different vendors and IT services providers are managed for providing an enormous and a scalable computing services platform...

    Provided By mecs-press

  • White Papers // Oct 2012

    Empirical Network Performance Evaluation of Security Protocols on Operating Systems

    Securing data transmission is currently a widely researched topic. There are numerous facades in data security. Virtual Private Network (VPN) is one such strand that provides security for data that is in motion. Performance of a network that has VPN implementation is at the forefront of network design and choice...

    Provided By mecs-press

  • White Papers // Oct 2012

    Keywords Review of IT Security Literature in Recent 20 Years

    The volume of published scientific literature available on Internet has been increasing exponentially. Some of them reflect the latest achievement of the specific research domain. In recent years, many projects have been funded aiming to online scientific literature mining, especially in biomedical research. Scientific literature covers most of the hot...

    Provided By mecs-press

  • White Papers // Oct 2012

    Analysis of Current Wireless Network Security

    Most threats against wireless networks involve an attacker with access to the radio link between wireless devices. Several of the threats listed in following rely on an attacker's ability to intercept and inject network communications. This highlights the most significant difference between protecting wireless and wired networks: the relative ease...

    Provided By mecs-press

  • White Papers // Oct 2012

    Prediction of Missing Associations Using Rough Computing and Bayesian Classification

    Information technology revolution has brought a radical change in the way data are collected or generated for ease of decision making. It is generally observed that the data has not been consistently collected. The huge amount of data has no relevance unless it provides certain useful information. Only by unlocking...

    Provided By mecs-press

  • White Papers // Oct 2012

    Extended Queue Management Backward Congestion Control Algorithms for Web Transfers in Wireless Environment

    Wireless links are characterized by high error rates and intermittent connectivity. TCP congestion control has been developed on the assumption that network congestion is the only cause for packet loss. Upon detecting a packet loss, TCP drops it's transmit window resulting in an unnecessary reduction of end-to-end throughput which results...

    Provided By mecs-press

  • White Papers // Oct 2012

    A New 512 Bit Cipher for Secure Communication

    The internet today is being used by millions of users for a large variety of commercial and non commercial purposes. It is controlled by different entities. It is mainly used as an efficient means for communication, entertainment and education. With the rapid growth of internet, there is a need for...

    Provided By mecs-press

  • White Papers // Oct 2012

    E-Commerce Evaluation and E Business Trends

    The impact of information and communication technology on varied areas of the Global economy and current trends in e business is an area of research that could lead to valuable business insights. The adaptation of business models to accommodate the customer's needs for providing an internet based business transaction platform...

    Provided By mecs-press

  • White Papers // Sep 2012

    Anti-Spam Software for Detecting Information Attacks

    In this paper the development of anti-spam software detecting information attacks is offered. For this purpose it is considered spam filtration system with the multilayered, multivalent architecture, coordinating all ISP's in the country. All users and ISPs of this system involved in spam filtration process. After spam filtering process, saved...

    Provided By mecs-press

  • White Papers // Sep 2012

    An Efficient Approach to Genetic Algorithm for Task Scheduling in Cloud Computing Environment

    Cloud computing is recently a booming area and has been emerging as a commercial reality in the information technology domain. Cloud computing represents supplement, consumption and delivery model for IT services that are based on internet on pay as per usage basis. The scheduling of the cloud services to the...

    Provided By mecs-press

  • White Papers // Sep 2012

    Constraint Based Periodicity Mining in Time Series Databases

    The search for the periodicity in time-series database has a number of application, is an interesting data mining problem. In real world dataset are mostly noisy and rarely a perfect periodicity, this problem is not trivial. Periodicity is very common practice in time series mining algorithms, since it is more...

    Provided By mecs-press

  • White Papers // Sep 2012

    Self Organized Replica Overlay Scheme for P2P Networks

    Peer-to-Peer (P2P) systems are widely used for data sharing applications in an autonomous and decentralized mode. P2P systems are suitable for largescale distributed environments in which nodes can share resources other than data such as computing power, memory and network bandwidth. Some of important parameters that affect the performance of...

    Provided By mecs-press

  • White Papers // Sep 2012

    Contribution to the Fusion of Biometric Modalities by the Choquet Integral

    In multimodal biometrics, modalities can be robust against the authentication of certain people and weak for others. The conventional fusion techniques such as the Product, Mean, AND, OR and the Majority Voting do not take into account this kind of behavior. In this paper, the authors propose a new approach...

    Provided By mecs-press

  • White Papers // Aug 2012

    Optical Many Casting Using QoS Depend Layer Aware Mechanism

    Many distributed applications require a group of destinations to be coordinated to a single source. Multicasting is a communication paradigm to implement these distributed applications. In multicasting, at least one of the member in the group cannot satisfy the service requirement of the application, the multicast request said to be...

    Provided By mecs-press

  • White Papers // Aug 2012

    Random Handwritten CAPTCHA: Web Security With a Difference

    It is hard to believe a web form without a CAPTCHA. The web survival in this cut-throat competition is impossible without the mechanisms for blocking spam-boats. The spam-boats have now been made intelligent enough to break through machine printed CAPTCHAs. Handwritten CAPTCHA image can be one solution. In this paper...

    Provided By mecs-press

  • White Papers // Aug 2012

    Cryptography Using Multiple Two-Dimensional Chaotic Maps

    In this paper, a symmetric key block cipher cryptosystem is proposed, involving multiple two-dimensional chaotic maps and using 128-bits external secret key. Computer simulations indicate that the cipher has good diffusion and confusion properties with respect to the plaintext and the key. Moreover, it produces ciphertext with random distribution. The...

    Provided By mecs-press

  • White Papers // Aug 2012

    Cascading of C4.5 Decision Tree and Support Vector Machine for Rule Based Intrusion Detection System

    Main reason for the attack being introduced to the system is because of popularity of the internet. Information security has now become a vital subject. Hence, there is an immediate need to recognize and detect the attacks. Intrusion Detection is defined as a method of diagnosing the attack and the...

    Provided By mecs-press

  • White Papers // Aug 2012

    Modeling Prioritized Hard Handoff Management Scheme for Wireless Mobile Networks

    The channel associated with the current connection serviced by a base station is changed while a call is in progress. Usually, continuous service is achieved by supporting handoff from one cell to another. It is often initiated either by crossing a cell boundary or by deterioration in quality of the...

    Provided By mecs-press

  • White Papers // Aug 2012

    Distributed Encrypting File System for Linux in User-Space

    Linux systems use Encrypting File System (EFS) for providing confidentiality and integrity services to files stored on disk in a secure, efficient and transparent manner. Distributed encrypting file system should also provide support for secure remote access, multiuser file sharing, possible use by non-privileged users, portability, incremental backups, etc. Existing...

    Provided By mecs-press

  • White Papers // Aug 2012

    A New Approach for Multicast Routing in Wireless Mesh Networks

    This paper focuses on the multicast routing in wireless mesh networks under the 802.11s standard. This standard defines the HWMP (Hybrid Wireless Mesh network Protocol) as the protocol of the routing but only unicast and broadcast. Such the standard defines the multicast routing as a goal among several and that...

    Provided By mecs-press

  • White Papers // Aug 2012

    Enhancement of Security and Privacy in Biometric Passport Inspection System Using Face, Fingerprint, and Iris Recognition

    The biometric passports are to prevent the illegal entry of traveler into a specific country and limit the use of counterfeit documents by more accurate identification of an individual. Biometric Passports have been introduced in many countries to improve the security in Inspection Systems and enhance procedures and systems that...

    Provided By mecs-press

  • White Papers // Aug 2012

    A New Secure Strategy for Small-Scale IEEE 802.11 Wireless Local Area Networ

    As the main secret-key encryption techniques of the Wireless Local Area Network (WLAN) have been proven to be unsafe, wireless network security is faced with serious challenges. It is unpractical for home users and small companies to buy expansive network equipments to improve the network security. Therefore, the secure strategy...

    Provided By mecs-press

  • White Papers // Aug 2012

    Integrating Non-Functional Properties in Model Driven Development: A Stepwise Refinement View

    Most of the refinement approach is about functional property of systems. Non-functional properties are as important as functional one. Without an accurate approach for specifying and refining their behaviors, software models will be regarded as imperfect and imprecise, and as a result, software systems cannot be generated correctly. Therefore, how...

    Provided By mecs-press

  • White Papers // Aug 2012

    Coupling Complexity Metric: A Cognitive Approach

    Analyzing object-oriented systems in order to evaluate their quality gains its importance as the paradigm continues to increase in popularity. Consequently, several object-oriented metrics have been proposed to evaluate different aspects of these systems such as class coupling. This paper presents a new cognitive complexity metric namely cognitive weighted coupling...

    Provided By mecs-press

  • White Papers // Aug 2012

    Proactive Security of E-Business

    Network security is a crucial problem in the construction of e-business. As the improvement of network openness, sharing and interconnection, the security problem is becoming more serious. After giving a brief statement to the theory of proactive security, based on the differences between passive defense and proactive security, the paper...

    Provided By mecs-press

  • White Papers // Aug 2012

    Security Analysis and Performance Evaluation of Enhanced Threshold Proxy Signature Scheme Based on RSA for Known Signers

    An efficient threshold signature scheme solves the difficulties of the receiver to proof the approval of the document from the sender as well as detecting if the file has been altered by illegitimate parties. In these days there are plenty of signature schemes such as (t,n) threshold proxy signature scheme....

    Provided By mecs-press

  • White Papers // Aug 2012

    Difference of the Absolute Differences - A New Method for Motion Detection

    This paper presents a new method, which reduces costs and processing time for spatial object motion detection by focusing on the bare-hand motion that mimics computer mouse functions to allow the user to move the mouse pointer in real-time by the motion of his/her hand without any gloves worn, any...

    Provided By mecs-press

  • White Papers // Apr 2013

    Low-Cost and Optimized Two Layers Embedded Board Based on ATmega32L Microcontroller and Spartan-3 FPGA

    Microcontrollers and FPGAs both are widely used in digital system design. Microcontroller-based instruments are becoming increasingly widespread. This paper presents design and implementation of a new low-cost and minimum embedded board based on ATMEGA32L AVR microcontroller and Spartan-3 (XCS400-4PQG208C) FPGA in two layers with mount elements on top and button...

    Provided By mecs-press

  • White Papers // Jul 2013

    All-Optical Parity Circuits Using Nonlinear Directional Coupler

    Since in the previous existing optical designs, the electronic-optic-electronic conversion has not been completely eliminated. Construction of the optical circuits with nonlinear waveguides can overcome this drawback. The authors have developed a nonlinear directional coupler theory to describe novel all-optical parity circuits. By using three channels, appropriate adjusting of the...

    Provided By mecs-press

  • White Papers // Jul 2013

    Networked Control System - A Survey

    Networked Control System (NCS) is a synthetic application which combines control science, computer science and network technology. It is a kind of feedback control systems wherein the control loops are closed through real time control network. NCS technology is applied in industry control system because of its simple structure, easy...

    Provided By mecs-press

  • White Papers // Dec 2013

    Throughput and Delay Analysis of Database Replication Algorithm

    Database management systems are among the most important systems that are driving the information transfer and storage functionality. Recently, (PDDRA) a Pre-fetching based Dynamic Data Replication Algorithm has been published. In the authors' previous paper, modifications to the algorithm have been suggested to minimize the delay in data replication. In...

    Provided By mecs-press

  • White Papers // Dec 2013

    Spam Mail Detection through Data Mining - A Comparative Performance Analysis

    As web is expanding day by day and people generally rely on web for communication so e-mails are the fastest way to send information from one place to another. Now-a-days all the transactions and all the communication, whether general or of business taking place through e-mails. E-mail is an effective...

    Provided By mecs-press

  • White Papers // Oct 2009

    An Improved Text Clustering Method based on Hybrid Model

    According to the high-dimensional sparse features on the storage of textual document, and defects existing in the clustering methods or the hybrid methods which have already been studied by now and some other problems. So an improved text clustering method based on hybrid model, that is a text clustering approach...

    Provided By mecs-press

  • White Papers // May 2011

    Tuning Schema Matching Systems using Parallel Genetic Algorithms on GPU

    Most recent schema matching systems combine multiple components, each of which employs a particular matching technique with several knobs. The multi-component nature has brought a tuning problem, that is to determine which components to execute and how to adjust the knobs (e.g., thresholds, weights, etc.) of these components for domain...

    Provided By mecs-press

  • White Papers // Jun 2014

    Router-based Content-aware Data Redirection for Future CDN Systems

    Delivery of data-enriched applications has become a top priority on the Internet, and Internet users are demanding faster and higher-quality services. Cater such requirements, Content Delivery Networks (CDNs) were introduced. However, the growth rate of information on the Internet requires infrastructural modifications to keep the consistency while maintaining quality of...

    Provided By mecs-press

  • White Papers // Feb 2014

    Classification via Clustering for Anonymization Data

    Due to the exponential growth of hardware technology particularly in the field of electronic data storage media and processing such data, has raised serious issues related in order to protect the individual privacy like ethical, philosophical and legal. Data mining techniques are employed to ensure the privacy. Privacy Preserving Data...

    Provided By mecs-press

  • White Papers // Jun 2014

    Studies on ICT Usage in the Academic CampusUsing Educational Data Mining

    In the era of competition, change and complexity, innovation in teaching and learning practices in higher education sector has become unavoidable criteria. One of the biggest challenges that higher education system faces today is to assess the services provided through Information and Communication Technology (ICT) facilities installed in the campus....

    Provided By mecs-press

  • White Papers // Jun 2014

    Mathematical Modeling and Analysis of Network Service Failure in DataCentre

    World has become a global village. With the advent of technology, the concept of cloud computing has evolved a lot. Cloud computing offers various benefits in terms of storage, computation, cost and flexibility. It focuses on delivering combination of technological components such as applications, platforms, infrastructure, security and web hosted...

    Provided By mecs-press

  • White Papers // Jun 2014

    AnAutomatic Approach to Detect Software Anomalies in Cloud Computing Using Pragmatic Bayes Approach

    Software detection of anomalies is a vital element of operations in data centers and service clouds. Statistical Process Control (SPC) cloud charts sense routine anomalies and their root causes are identified based on the differential profiling strategy. By automating the tasks, most of the manual overhead incurred in detecting the...

    Provided By mecs-press

  • White Papers // Jun 2014

    A Harmony Search Algorithm with Multi-pitch Adjustment Rate for Symbolic Time Series Data Representation

    The representation task in time series data mining has been a critical issue because the direct manipulation of continuous, high-dimensional data is extremely difficult to complete efficiently. One time series representation approach is a symbolic representation called the Symbolic Aggregate approXimation (SAX). The main function of SAX is to find...

    Provided By mecs-press

  • White Papers // Jul 2012

    Performance Evaluation of MANET in Realistic Environment

    In order to facilitate communication in Mobile Ad hoc NETwork (MANET), routing protocols are developed. The performance of these protocols depends upon various factors such as: transmission range, number of nodes deployed and mobility of the nodes. Another factor which affects the performance of MANET routing protocols is the environment...

    Provided By mecs-press

  • White Papers // Jul 2012

    Ultra Encryption Standard (UES) Version-III: Advanced Symmetric Key Cryptosystem With Bit-Level Encryption Algorithm

    Due to massive growth in communication technology and the tremendous growth in internet technology in the last decade, it has become a real challenge for a sender to send confidential data from one computer to another. The security of data has now become a big issue in data communication network....

    Provided By mecs-press

  • White Papers // Aug 2012

    Integrating Non-Functional Properties in Model Driven Development: A Stepwise Refinement View

    Most of the refinement approach is about functional property of systems. Non-functional properties are as important as functional one. Without an accurate approach for specifying and refining their behaviors, software models will be regarded as imperfect and imprecise, and as a result, software systems cannot be generated correctly. Therefore, how...

    Provided By mecs-press

  • White Papers // Aug 2012

    Coupling Complexity Metric: A Cognitive Approach

    Analyzing object-oriented systems in order to evaluate their quality gains its importance as the paradigm continues to increase in popularity. Consequently, several object-oriented metrics have been proposed to evaluate different aspects of these systems such as class coupling. This paper presents a new cognitive complexity metric namely cognitive weighted coupling...

    Provided By mecs-press

  • White Papers // Nov 2011

    A Novel Method for Grayscale Image Segmentation by Using GIT-PCANN

    PCNN has been widely used in image segmentation. However, satisfactory results are usually obtained at the expense of time-consuming selection of PCNN parameters and the number of iteration. A novel method, called Grayscale Iteration Threshold Pulse Coupled Neural Network (GIT-PCNN) was proposed for image segmentation, which integrates grayscale iteration threshold...

    Provided By mecs-press

  • White Papers // Feb 2011

    A Hybrid P2P Approach to Service Discovery in the Cloud

    Highly scalable techniques for service discovery are key to the efficient use of Cloud resources, since the Cloud computing appears to be part of the mainstream computing in a few years. The authors embarked on a preliminary study on Cloud service discovery by adopting an unstructured P2P paradigm. They developed...

    Provided By mecs-press

  • White Papers // Feb 2011

    A Cost-Aware Resource Selection for Data-Intensive Applications in Cloud-Oriented Data Centers

    As a kind of large-scale user-oriented data-intensive computing, cloud computing allows users to utilize on-demand computation, storage, data and services from around the world in a pay-as-you-go model. In cloud environment, applications need access to mass datasets that may each be replicated on different resources (or data centers). Mass data...

    Provided By mecs-press

  • White Papers // Feb 2011

    A Differentiated QoS Supporting PPS Solution Based on CICQ

    Based on the study of the existing PPS scheduling mechanism, the authors propose a novel PPS scheme for Differentiated QoS based on CICQ. The scheduling mechanism adopt in order queuing way to solve sequence preserving problem and set a small amount of buffer in the multiplexer to achieve differentiated QoS...

    Provided By mecs-press

  • White Papers // Feb 2012

    Discrete Simulation of the Remote Access to the Resources of a Virtual Research Laboratory

    This paper discusses the problem of an evaluation of the remote access to the resources of a Virtual Research Lab (VRL) and information servicing investigation by using queuing model and program simulation. The results presented here are the final part of general investigation of proposed architecture of the VRL developed...

    Provided By mecs-press

  • White Papers // Feb 2012

    A Data Mining-Based Response Model for Target Selection in Direct Marketing

    Identifying customers who are more likely to respond to new product offers is an important issue in direct marketing. In direct marketing, data mining has been used extensively to identify potential customers for a new product (target selection). Using historical purchase data, a predictive response model with data mining techniques...

    Provided By mecs-press

  • White Papers // Feb 2012

    Performance of Frequency Domain DFE Using Subcarrier Allocation

    Due to the usage of single carrier, the performance of SC-FDMA systems degrades in deep frequency selective fading channels. In this paper, the authors propose a structure of equalizer based on frequency domain decision feedback which could be used for multi-user SC-FDMA systems. This algorithm is applicable to various carrier...

    Provided By mecs-press

  • White Papers // Feb 2012

    Architecture for Accessing Heterogeneous Databases

    This paper presents the architecture for accessing heterogeneous databases. Two major processes in this architecture which are extracting SQL statement and ontology. The algorithms for extracting SQL statement was created and tested in order to improve time performance during searching and retrieving process. Ontology approach was implemented and combined with...

    Provided By mecs-press

  • White Papers // Feb 2012

    A New Secure Multicast Key Distribution Scheme Using Tabulation Method

    In the present paper, the authors propose a new scheme for a scalable multicast key distribution scheme. The present scheme is based on the Key Management using Tabulation method of Boolean Function Simplification technique. It explores the use of batching of group membership changes to reduce the frequency, and hence...

    Provided By mecs-press

  • White Papers // Feb 2012

    Using Logic Programming to Represent Information Content Inclusion Relations

    Datalog is a widely recognised language for a certain class of deductive databases. Information Content Inclusion Relation (IIR) formulates a general, information theoretic relationship between: data constructs; between data constructs and real world objects, and between real world objects. IIR is particularly concerned with the information that data carry. It...

    Provided By mecs-press

  • White Papers // Feb 2012

    Performance of a Slantlet Based OFDM Transceiver Under Different Channel Conditions

    A major goal of the next-generation wireless communication system is the development of a reliable high-speed wireless communication system that supports high user mobility. Orthogonal Frequency Division Multiplexing (OFDM) system is one of the most promising technologies for current and future wireless communications that has drawn a lot of attention....

    Provided By mecs-press

  • White Papers // Apr 2012

    Strongly Robust and Highly Secured DWT-SVD Based Color Image Watermarking: Embedding Data in All Y, U, V Color Spaces

    In this paper 'DWT-SVD' based Color Image Watermarking technique in YUV color space using Arnold Transform is proposed. The RGB color image is converted into YUV color space. Image is decomposed by 3 level DWT and then SVD is applied. The security is increased with watermark scrambling using Arnold Transform....

    Provided By mecs-press

  • White Papers // Apr 2012

    Design and Simulation of MC-CDMA Transceiver Via Slantlet Transform

    Wireless communications is a rapidly growing piece of the communications manufacturing, with the potential to provide high-speed high-quality information exchange between the portable devices located anywhere in the world. Multi-Carrier Code Division Multiple Access (MC-CDMA) has emerged recently as a promising candidate for the next generation broad-band mobile networks. Recently,...

    Provided By mecs-press

  • White Papers // Apr 2012

    Impact of Variation in Pause Time and Network Load in AODV and AOMDV Protocols

    A MANET is a collection of mobile nodes by wireless links forming a dynamic topology without any network infrastructure such as routers, servers, access points/cables or centralized administration. The communication within the network is facilitated through a protocol which discovers routes between nodes. The two major classifications of routing protocols...

    Provided By mecs-press

  • White Papers // Apr 2012

    Dual Amplitude-Width PPM for Free Space Optical Systems

    The PPM (Pulse Position Modulation) is commonly used in Free Space Optic (FSO) systems owing to its power efficiency, but it shows a rapid decline in spectral efficiency with increase in the power efficiency and moderate data rate. In order to improve these two parameters, the authors present a modified...

    Provided By mecs-press

  • White Papers // Mar 2012

    An Integrated Knowledge Management Capabilities Framework for Assessing Organizational Performance

    In the present aggressive world of competition, knowledge management strategies are becoming the major vehicle for the organizations to achieve their goals; to compete and to perform well. Linking knowledge management to business performance could make a strong business case in convincing senior management of any organization about the need...

    Provided By mecs-press

  • White Papers // Feb 2013

    Designing a Universal Data-Oriented Random Number Generator

    Data-oriented is new and applied theory which provides method that models the concepts with data structure. If the concept is modeled by using sufficient data in modeling, required inferences and calculations can be done fast with less complexity. Random variable was modeled with digital probability graph, by using ahmad fact...

    Provided By mecs-press

  • White Papers // May 2013

    Bitwise Operations Related to a Combinatorial Problem on Binary Matrices

    Some techniques for the use of bitwise operations are described in the paper. As an example, an open problem of isomorphism-free generations of combinatorial objects is discussed. An equivalence relation on the set of square binary matrices having the same number of units in each row and each column is...

    Provided By mecs-press

  • White Papers // May 2013

    Student Learning Ability Assessment using Rough Set and Data Mining Approaches

    All learners are not able to learn anything and everything complete. Though the learning mode and medium are different in e-learning mode and in classroom learning, similar activities are required in both the modes for teachers to observe and assess the learner(s). Student performance varies considerably depending upon whether a...

    Provided By mecs-press

  • White Papers // Jul 2013

    A Scheme to Reduce Response Time in Cloud Computing Environment

    The area of cloud computing has become popular from the last decade due to its enormous benefits such as lower cost, faster development and access to highly available resources. Apart from these core benefits some challenges are also associated with it such as QoS, security, trust and better resource management....

    Provided By mecs-press

  • White Papers // Oct 2013

    Collaborative Anti-jamming in Cognitive Radio Networks Using Minimax-Q Learning

    Cognitive radio is an efficient technique for realization of dynamic spectrum access. Since in the Cognitive Radio Network (CRN) environment, the Secondary Users (SUs) are susceptible to the random jammers, the security issue of the SU's channel access becomes crucial for the CRN framework. The rapidly varying spectrum dynamics of...

    Provided By mecs-press

  • White Papers // Nov 2013

    Cloud Computing Ensembles Agile Development Methodologies for Successful Project Development

    In today's IT world combination of AD (Agile Development) and CC (Cloud Computing) is a good recipe for the user needs fulfillment in efficient manners. This combination brings superiority for both worlds, Agile and Cloud. CC opportunities are optimized by AD processes for iterative software releases and getting more frequent...

    Provided By mecs-press

  • White Papers // Jun 2011

    A Growing Evolutionary Algorithm and Its Application for Data Mining

    An unsuitable representation will make the task of mining classification rules very hard for a traditional Evolutionary Algorithm (EA). But for a given dataset, it is difficult to decide which one is the best representation used in the mining progress. In this paper, the authors analyses the effects of different...

    Provided By mecs-press