mecs-press

Displaying 161-200 of 798 results

  • White Papers // May 2014

    A Review on Gravitational Search Algorithm and its Applications to Data Clustering & Classification

    Natural phenomenon's and swarms behavior are the warm area of research among the researchers. A large number of algorithms have been developed on the account of natural phenomenon's and swarms behavior. These algorithms have been implemented on the various computational problems for the sake of solutions and provided significant results...

    Provided By mecs-press

  • White Papers // Apr 2014

    Holes Detection in Wireless Sensor Networks: A Survey

    Now-a-days, it has been a great idea of research on using Wireless Sensor Networks (WSNs) to assist in the initial deployment of sensor nodes. Hole problem in WSNs is the most fundamental problem in WSNs. Hole means a communication gap in WSNs. Finding an optimal sensor deployment strategy that would...

    Provided By mecs-press

  • White Papers // Apr 2014

    Asymmetric Concealed Data Aggregation Techniques in Wireless Sensor Networks: A Survey

    The wireless communication nature of remotely deployed sensor nodes makes the attacks more easily to be happened in Wireless Sensor Networks (WSNs). But traditional security algorithms are infeasible in WSNs due to the limited computing, communication power, storage, band width and energy of sensor nodes. So energy efficient secure data...

    Provided By mecs-press

  • White Papers // Apr 2014

    Six Algorithms for Frequency Offset Estimation in OFDM Systems

    Generally, wireless systems suffer from Carrier Frequency Offsets (CFO), which results either from the receiver's oscillator's impairments or Doppler shifts. The frequency offset between transmitter and receiver local oscillator is a main drawback of OFDM systems. A frequency drift in the receiver's oscillator would result in a frequency offset in...

    Provided By mecs-press

  • White Papers // Apr 2014

    PCA Based Multimodal Biometrics using Ear and Face Modalities

    Automatic person identification is an important task in computer vision and related applications. Multimodal biometrics involves more than two modalities. The proposed paper is an implementation of person identification fusing face and ear biometric modalities. The authors have used PCA based neural network classifier for feature extraction from the images....

    Provided By mecs-press

  • White Papers // Apr 2014

    Substitute and Communication Pattern for an Internet Banking System

    The design patterns are the reusable component used in the development of the software, which delivers enhanced quality software to the end users. The design patterns are available for user interface, mobile applications, text classification and so on. There are no design patterns for internet banking applications. This motivated to...

    Provided By mecs-press

  • White Papers // Apr 2014

    RBNS Encoded Energy Efficient Routing Protocol for Wireless Sensor Network

    Self organizing Wireless Sensor Networks (WSNs) is an emergent and challenging technology that is applicable to various real life scenarios. Different routing protocols in the WSN have been proposed over the years. In this type of network the major concern is the energy constraint sensor nodes that operate on limited...

    Provided By mecs-press

  • White Papers // Apr 2014

    Design Intelligent PID like Fuzzy Sliding Mode Controller for Spherical Motor

    The minimum rule base Proportional Integral Derivative (PID) fuzzy Sliding Mode Controller (SMC) with application to spherical motor is presented in this paper. The popularity of PID fuzzy sliding mode controller can be attributed to their robust performance in a wide range of operating conditions and partly to their functional...

    Provided By mecs-press

  • White Papers // Apr 2014

    Cloud Task Scheduling for Load Balancing based on Intelligent Strategy

    Cloud computing is a type of parallel and distributed system consisting of a collection of interconnected and virtual computers. With the increasing demand and benefits of cloud computing infrastructure, different computing can be performed on cloud environment. One of the fundamental issues in this environment is related to task scheduling....

    Provided By mecs-press

  • White Papers // Apr 2014

    MATLAB/Simulink Based Study of Different Approaches using Mathematical Model of Differential Equations

    A large number of diverse engineering applications are frequently modeled using different approaches, viz., and a differential equation or by a transfer function and state space. All these descriptions provide a great deal of information about the system, such as stability of the system, its step or impulse response, and...

    Provided By mecs-press

  • White Papers // Apr 2014

    Design PID Baseline Fuzzy Tuning Proportional- Derivative Coefficient Nonlinear Controller with Application to Continuum Robot

    Continuum robot manipulators are optimized to meet best trajectory requirements. Closed loop control is a key technology that is used to optimize the system output process to achieve this goal. In order to conduct research in the area of closed loop control, a control oriented cycle-to-cycle continuum robot model, containing...

    Provided By mecs-press

  • White Papers // Apr 2014

    Supplier Segmentation using Fuzzy Linguistic Preference Relations and Fuzzy Clustering

    In an environment characterized by its competitiveness, managing and monitoring relationships with suppliers are of the essence. Supplier management includes supplier segmentation. Existing literature demonstrates that suppliers are mostly segmented by computing their aggregated scores, without taking each supplier's criterion value into account. This paper is to propose a supplier...

    Provided By mecs-press

  • White Papers // Apr 2014

    Evaluating Web Services Functionality and Performance

    Traditional distributed database transaction applications within large organizations often involve a large number of resources. In this case, people and DDBMSs (Distributed DataBase Management Systems) distributed over a wide geographic area, may introduce conflict between heterogeneous systems. Web Services (WSs) provide solution for this problem since WS have an independent...

    Provided By mecs-press

  • White Papers // Apr 2014

    Hardware Design and Simulation of Sobel Edge Detection Algorithm

    In this paper, the authors designed a hardware system for Sobel edge detection algorithm and simulated for a 128 pixel, 8-bit monochrome line-scan camera. The system is designed to detect objects as they move along a conveyor belt in a manufacturing environment, the camera will observe dark objects on a...

    Provided By mecs-press

  • White Papers // Mar 2014

    Extending the SOLO Model for Software-Based Projects

    In the process of assessing learning outcomes, educators use constructive tools for evaluating students' understanding and performance. In the present study MIS students were engaged in a full life cycle project as part of a software analysis and design workshop. For evaluating their performance, the authors used the Structure of...

    Provided By mecs-press

  • White Papers // Mar 2014

    A Secure and Efficient Image Encryption Scheme Based on Tent Map and Permutation-substitution Architecture

    A secure image encryption scheme based on 2D skew tent map is proposed for the encryption of color images. The proposed encryption scheme is composed of one permutation process and one substitution process. The 3D color plain-image matrix is converted to 2D image matrix first, and then 2D skew tent...

    Provided By mecs-press

  • White Papers // Mar 2014

    Defect Management in Agile Software Development

    Agile development reduces the risk of developing low quality software in the first place by minimizing defects. In agile software development formal defect management processes help to build quality software. The core purpose of defect management is to make the software more effective and efficient in order to increase its...

    Provided By mecs-press

  • White Papers // Mar 2014

    A Discussion of a 60GHz Meander Slot Antenna for an RFID TAG with Lumped Element

    In this paper, the authors propose a novel approach to design an antenna for a transponder in Radio Frequency IDentification (RFID). This approach is based on using a meander slot patch with a CoPlanar Waveguide excitation (CPW). The RFID frequency chosen is the free 60 GHz band. The proposed circuit...

    Provided By mecs-press

  • White Papers // Mar 2014

    Innovative Large Scale Wireless Sensor Network Architecture Using Satellites and High-Altitude Platforms

    Wireless sensor network has many applications and very active research area. The coverage span of this network is very important parameter where wide coverage area is a challenge. This paper proposes architecture for Large-Scale Wireless Sensor Network (LSWSN) based on satellites and the High-Altitude Platforms (HAPs) where the sensor nodes...

    Provided By mecs-press

  • White Papers // Mar 2014

    Novel Orthogonal Minimum Correlation Spreading Code in CDMA System

    Code Division Multiple Access (CDMA) is a technique in which transmission of information takes place simultaneously over the same available channel bandwidth. CDMA systems make use of Spread Spectrum (SS) technique for transmission of information by employing spreading codes. Each user is assigned with a unique spreading code which acts...

    Provided By mecs-press

  • White Papers // Mar 2014

    A Novel Approach for Identification of Hadoop Cloud Temporal Patterns Using Map Reduce

    Due to the latest developments in the area of science and technology resulted in the developments of efficient data transfer, capability of handling huge data and the retrieval of data efficiently. Since the data that is stored is increasing voluminously, methods to retrieve relative information and security related concerns are...

    Provided By mecs-press

  • White Papers // Mar 2014

    Selecting Appropriate Requirements Management Tool for Developing Secure Enterprises Software

    In this paper, the authors discuss about the significance of selecting right requirements management tools. It's no secret that poorly understood user requirements and uncontrolled scope creep to many software project failures. Many of the application development professionals buy wrong tools for the wrong reasons. To avoid purchasing the more...

    Provided By mecs-press

  • White Papers // Mar 2014

    Service Based Cooperation Patterns to Support Flexible Inter-Organizational Workflows

    Service Oriented Architecture (SOA) is a paradigm that provides important advantages like interoperability, reusability and flexibility, particularly beneficial for B2B applications. In the current paper, the authors consider specific architectures of Inter-Organizational WorkFlows (IOWF) fairly widespread in the B2B area and implementing different cooperation schemas. Their aim is to propose...

    Provided By mecs-press

  • White Papers // Mar 2014

    A New Ant Colony Optimization Algorithm Applied to Optimizing Centralized Wireless Access Network

    The wireless access networks design problem is formulated as a constrained optimization problem, where the goal is to find a network topology such that an objective function is optimized, subject to a set of constraints. The objective function may be the total cost, or some performance measure like utilization, call...

    Provided By mecs-press

  • White Papers // Mar 2014

    Design Sliding Mode Controller with Parallel Fuzzy Inference System Compensator to Control of Robot Manipulator

    Sliding Mode Controller (SMC) is a significant nonlinear controller under condition of partly uncertain dynamic parameters of system. This controller is used to control of highly nonlinear systems especially for robot manipulators, because this controller is a robust and stable. Conversely, pure sliding mode controller is used in many applications;...

    Provided By mecs-press

  • White Papers // Mar 2014

    Interfacing the Analog Camera with FPGA Board for Real-time Video Acquisition

    Advances in FPGA (Field Programmable Gate Array) technology have dramatically increased the use of FPGAs for computer vision applications. The primary task for development of such FPGAs based systems is the interfacing of the analog camera with FPGA board. This paper describes the design and implementation of camera interface module...

    Provided By mecs-press

  • White Papers // Feb 2014

    Classification via Clustering for Anonymization Data

    Due to the exponential growth of hardware technology particularly in the field of electronic data storage media and processing such data, has raised serious issues related in order to protect the individual privacy like ethical, philosophical and legal. Data mining techniques are employed to ensure the privacy. Privacy Preserving Data...

    Provided By mecs-press

  • White Papers // Feb 2014

    Robustness Analysis of Layered Public Transport Networks Due to Edge Overload Breakdown

    The robustness of urban bus-transport networks has important influence on the network performance. This paper proposes the model of layered public bus-transport network which is composed of the logical layer and the physical layer and expounds the relationship between these two layers. The authors map the bus-transport network into two...

    Provided By mecs-press

  • White Papers // Feb 2014

    Public vs Private vs Hybrid vs Community - Cloud Computing: A Critical Review

    These days cloud computing is booming like no other technology. Every organization whether it's small, mid-sized or big, wants to adapt this cutting edge technology for its business. As cloud technology becomes immensely popular among these businesses, the question arises: which cloud model to consider for the users business? There...

    Provided By mecs-press

  • White Papers // Feb 2014

    Enhanced Role Based Access Control Mechanism for Electronic Examination System

    Over the years, e-learning and e-examination has become standard in many institutions of higher learning. It has been observed that examination questions and results can be easily intercepted by invalid users, thus the security of resources shared among valid users is not guaranteed. In order to solve these problems as...

    Provided By mecs-press

  • White Papers // Feb 2014

    Modeling GSM Based Network Communication in Vehicular Network

    Obviously fair communication establishment in every technology increases the efficiency. As the authors know well, vehicles are used in day to day life of every human being to move from one location to another location. If network communication is formed between vehicles, mobile phones and home based telephones, it will...

    Provided By mecs-press

  • White Papers // Feb 2014

    A Hybrid RBF-SVM Ensemble Approach for Data Mining Applications

    One of the major developments in machine learning in the past decade is the ensemble method, which finds highly accurate classifier by combining many moderately accurate component classifiers. This paper addresses using an ensemble of classification methods for data mining applications like intrusion detection, direct marketing, and signature verification. In...

    Provided By mecs-press

  • White Papers // Feb 2014

    E-Learning in Web 3.0

    Web 2.0 is about social networking and collaboration between the creator and the user. Web 3.0 is termed as intelligent web or semantic web with technologies like big data, linked data, cloud computing, 3D visualization, augmented reality and more to make passive learner into active learner in the learning process....

    Provided By mecs-press

  • White Papers // Feb 2014

    An Analysis of Application Level Security in Service Oriented Architecture

    In computing, the software elements like objects and components emphasize on reusability using design tools of abstraction and separation of concerns. Software architecture has appeared as an initial idea to develop huge, complicated and heterogeneous distributed systems successfully. Service Oriented Architecture (SOA) combines services together to make systems having a...

    Provided By mecs-press

  • White Papers // Feb 2014

    Software Testing Resource Allocation and Release Time Problem: A Review

    Software testing resource allocation and release time decisions are vital for the software systems. The objective behind such critical decisions may differ from firm to firm. The motive of the firm may be maximization of software reliability or maximization of number of faults to be removed from each module or...

    Provided By mecs-press

  • White Papers // Feb 2014

    Suitability and Contribution of Agile Methods in Mobile Software Development

    Boom of mobile app market is phenomenal and so are the challenges for developing these mobile applications. With changing mobile market technology and trends, various technical constraints for building these mobile apps also cropped up with time. Tradition development approaches are unable to tackle these challenges and technical limitations of...

    Provided By mecs-press

  • White Papers // Feb 2014

    Design of FPGA Based 32-Bit Floating Point Arithmetic Unit and Verification of Its VHDL Code Using MATLAB

    Most of the algorithms implemented in FPGAs used to be fixed-point. Floating-point operations are useful for computations involving large dynamic range, but they require significantly more resources than integer operations. With the current trends in system requirements and available FPGAs, floating-point implementations are becoming more common and designers are increasingly...

    Provided By mecs-press

  • White Papers // Feb 2014

    Modified Binary Exponential Backoff Algorithm to Minimize Mobiles Communication Time

    The field of Wireless Local Area Networks (LANs) is expanding rapidly as a result of advances in digital communications, portable computers, and semiconductor technology. The early adopters of this technology have primarily been vertical application that places a premium on the mobility offered by such systems. Binary Exponential Backoff (BEB)...

    Provided By mecs-press

  • White Papers // Feb 2014

    Design New Robust Self Tuning Fuzzy Backstopping Methodology

    In this paper, the authors focused on proposed Proportional-Integral (PI) like fuzzy adaptive backstopping fuzzy algorithms based on Proportional-Derivative (PD) fuzzy rule base with the adaptation laws derived in the Lyapunov sense. Adaptive SISO PI like fuzzy adaptive backstopping fuzzy method has two main objectives; the first objective is design...

    Provided By mecs-press

  • White Papers // Feb 2014

    Design Modified Sliding Mode Controller with Parallel Fuzzy Inference System Compensator to Control of Spherical Motor

    The increasing demand for multi-Degree-Of-Freedom (DOF) actuators in a number of industries has motivated a flurry of research in the development of non-conventional actuators, spherical motor. This motor is capable of providing smooth and isotropic three-dimensional motion in a single joint. Not only can the spherical motor combine 3-DOF motion...

    Provided By mecs-press