mecs-press

Displaying 161-200 of 537 results

  • White Papers // Jun 2013

    Service Oriented Architecture for Remote Sensing Satellite Telemetry Data Implemented on Cloud Computing

    This paper articulates how Service Oriented Architecture (SOA) and cloud computing together can facilitate technology setup in TeleMetry (TM) processing with a case study from the Egyptian Space Program (ESP) and a comparative study with Space Situational Awareness (SSA) program in European Space Agency (ESA), Moreover, this paper illustrates how...

    Provided By mecs-press

  • White Papers // Jun 2013

    Establishing Inter Vehicle Wireless Communication in Vanet and Preventing It From Hackers

    The entire humanity needs a vehicle to travel from one place to another. Obviously a new model vehicle is manufactured by the manufacturing companies to attract its customers every day. All the manufactured vehicles have different advantages, when compared with one another. In this paper, the authors introduce another added...

    Provided By mecs-press

  • White Papers // Jun 2013

    Information Leakage Prevention Using Virtual Disk Drive

    The worst news for information technology people are computer has been stolen or lost. The actual problem is the loss of the data stored on the hard drive that can fall into the wrong hands. However, users of information system and laptops computers are facing real problems with due to...

    Provided By mecs-press

  • White Papers // Jun 2013

    Wi-Fi Networks Security and Accessing Control

    As wireless networks access gains popularity in corporate, private and personal networks, the nature of wireless networks opens up new possibilities for network attacks. This paper negotiating Wi-Fi security against scanning of rogue Wi-Fi networks and other related activities and considers the monitoring of Wi-Fi traffic effects. The unauthorized Access...

    Provided By mecs-press

  • White Papers // Jun 2013

    A Survey of Adaptive Gateway Discovery Mechanisms in Heterogeneous Networks

    The communication range of devices within a mobile ad hoc network is inherently restricted. One way of enhancing the communication range of a mobile ad hoc network, is to interconnect it to a wired network like the internet, thus forming a heterogeneous wired cum wireless network. This interconnection also enables...

    Provided By mecs-press

  • White Papers // Jun 2013

    Flat-Top Ring-Shaped Cell Design for High-Altitude Platform Communications

    In this paper, the authors propose a new design for ring-shaped cells is introduced where to improve the power distribution and Carrier-to-Interference Ratio (CIR) over the cell area. The designed cell has flat-top radiation pattern with minimal ripples in the service area while the out-of-cell area has lower radiation levels....

    Provided By mecs-press

  • White Papers // Jun 2013

    Adaptive Population Sizing Genetic Algorithm Assisted Maximum Likelihood Detection of OFDM Symbols in the Presence of Nonlinear Distortions

    In this paper, the author's present Adaptive population sizing Genetic Algorithm (AGA) assisted Maximum Likelihood (ML) estimation of Orthogonal Frequency Division Multiplexing (OFDM) symbols in the presence of nonlinear distortions. The proposed algorithm is simulated in MATLAB and compared with existing estimation algorithms such as iterative DAR, decision feedback clipping...

    Provided By mecs-press

  • White Papers // Jun 2013

    A New Proposal for Route Finding in Mobile Ad Hoc Networks

    Mobile Ad hoc NETwork (MANET) is a kind of wireless ad-hoc network, and is a self-configuring network of mobile routers (and associated hosts) connected by wireless links - the union of which forms an arbitrary topology. The routers are free to move randomly and organize themselves arbitrarily, thus the network's...

    Provided By mecs-press

  • White Papers // May 2013

    A Hybrid Algorithm for Privacy Preserving in Data Mining

    With the proliferation of information available in the internet and databases, the privacy-preserving data mining is extensively used to maintain the privacy of the underlying data. Various methods of the state art are available in the literature for privacy-preserving. Evolutionary Algorithms (EAs) provide effective solutions for various real-world optimization problems....

    Provided By mecs-press

  • White Papers // May 2013

    Bitwise Operations Related to a Combinatorial Problem on Binary Matrices

    Some techniques for the use of bitwise operations are described in the paper. As an example, an open problem of isomorphism-free generations of combinatorial objects is discussed. An equivalence relation on the set of square binary matrices having the same number of units in each row and each column is...

    Provided By mecs-press

  • White Papers // May 2013

    Performance Comparison of Various Robust Data Clustering Algorithms

    Robust clustering techniques are real life clustering techniques for noisy data. They work efficiently in the presence of noise. Fuzzy C-Means (FCM) is the first clustering algorithm, based upon fuzzy sets, proposed by 0but it does not give accurate results in the presence of noise. In this paper, FCM and...

    Provided By mecs-press

  • White Papers // May 2013

    Exploiting SIMD Instructions in Modern Microprocessors to Optimize the Performance of Stream Ciphers

    Modern cryptographic protocols like TLS, SSL, etc. provide communication security by employing symmetric or secret key algorithms for encrypting the data and asymmetric or public key algorithms for key exchange. Modern microprocessors are loaded with a lot of performance optimization features. Single Instruction Multiple Data (SIMD) instruction set feature specially...

    Provided By mecs-press

  • White Papers // May 2013

    An Efficient IBE Scheme using IFP and DDLP

    In this system, each user needs to visit a Private Key Generation (PKG) and identify him-self before joining a communication network. Once a user is accepted, the PKG will provide him with a secret key. In this way, if a user wants to communicate with others, he only needs to...

    Provided By mecs-press

  • White Papers // May 2013

    Secured and Optimized AODV for Wireless Sensor Networks

    Similar to conventional wireless networks, WSNs are based on multi hop routing to ensure connectivity and data forwarding which makes the routing service a challenging task due to the nature of sensors usually limited in memory, battery and computing capacities as well as the nature of the environment which is...

    Provided By mecs-press

  • White Papers // May 2013

    Student Learning Ability Assessment using Rough Set and Data Mining Approaches

    All learners are not able to learn anything and everything complete. Though the learning mode and medium are different in e-learning mode and in classroom learning, similar activities are required in both the modes for teachers to observe and assess the learner(s). Student performance varies considerably depending upon whether a...

    Provided By mecs-press

  • White Papers // May 2013

    Social Networking for Botnet Command and Control

    A botnet is a group of compromised computers - often a large group - under the command and control of a malicious botmaster. Botnets can be used for a wide variety of malicious attacks, including spamming, distributed denial of service, and identity theft. Botnets are generally recognized as a serious...

    Provided By mecs-press

  • White Papers // May 2013

    An Efficient and Effective New Generation Objective Quality Model for Mobile Applications

    Recent proliferation of mobile market has swiftly increased the competition in mobile software market, new technology and new devices are emerging at phenomenal speed. As the number of mobile applications is increasing at daily rate, quality is becoming major issue. So mobile software organization need some quality model as guideline...

    Provided By mecs-press

  • White Papers // Apr 2013

    Location Prediction of Mobility Management Using Soft Computing Techniques in Cellular Network

    This paper describes the neural network technique to solve location management problem. A multilayer neural model is designed to predict the future prediction of the subscriber based on the past predicted information of the subscriber. In this paper, a prediction based location management scheme is proposed for locating a mobile...

    Provided By mecs-press

  • White Papers // Apr 2013

    A Fair Downlink Scheduling Algorithm for 3GPP LTE Networks

    Long Term Evolution (LTE), the standard specified by 3GPP on the way towards the fourth generation mobile networks, is intended to deliver high speed data and multimedia services to next generation mobile users. The Radio Resource Management (RRM) plays a very crucial role in managing limited radio resources to enhance...

    Provided By mecs-press

  • White Papers // Apr 2013

    Password Hardened Biometric: A Complete Solution of Online Security

    In present paper, secure online access to enterprises resources is very important for any organization. To protect valuable data become one of the big challenge for today's business as enterprise customers or clients involved in Business-to-Customer (B2C) and Business-to-Business (B2B) e-commerce need to feel that their transactions are secured from...

    Provided By mecs-press

  • White Papers // Apr 2013

    A Robust Fault Detection Scheme for the Advanced Encryption Standard

    Fault attacks are powerful and efficient cryptanalysis techniques to find the secret key of the Advanced Encryption Standard (AES) algorithm. These attacks are based on injecting faults into the structure of the AES to obtain the confidential information. To protect the AES implementation against these attacks, a number of countermeasures...

    Provided By mecs-press

  • White Papers // Apr 2013

    Low-Cost and Optimized Two Layers Embedded Board Based on ATmega32L Microcontroller and Spartan-3 FPGA

    Microcontrollers and FPGAs both are widely used in digital system design. Microcontroller-based instruments are becoming increasingly widespread. This paper presents design and implementation of a new low-cost and minimum embedded board based on ATMEGA32L AVR microcontroller and Spartan-3 (XCS400-4PQG208C) FPGA in two layers with mount elements on top and button...

    Provided By mecs-press

  • White Papers // Apr 2013

    Formal Verification of Congestion Control Algorithm in VANETs

    A Vehicular Ad-Hoc NETworks (VANETs) is the technology that uses moving cars as nodes in a network to create a mobile network. VANETs turn every participating car into a wireless router, allowing cars of each other to connect and create a network with a wide range. VANETs are developed for...

    Provided By mecs-press

  • White Papers // Apr 2013

    Optimizing the CMTS to Improve Quality of Service in Next Generation Networks Based on ACO Algorithm

    In this paper, the authors focus on the network topological design for providing Quality of Service (QoS) in Next Generation Network (NGN) and propose an effective Ant Colony Optimization (ACO) algorithm to solve the Capacitated Minimum Spanning Tree (cMTS) problem in dynamic environment. To improve QoS of communication network with...

    Provided By mecs-press

  • White Papers // Apr 2013

    QoS Enabled Probabilistic Routing for Heterogeneous Wireless Sensor Networks

    There is an increasing research interest in solving routing problems in Wireless Sensor Networks (WSN) and most of the existing routing protocols for WSN consider homogeneous nodes wherein, all sensor nodes have the same capabilities in terms of sensing, communication and computation capabilities. However, deployment of a homogeneous sensor network...

    Provided By mecs-press

  • White Papers // Apr 2013

    3-Level Heterogeneity Model for Wireless Sensor Networks

    In this paper, the authors propose a network model with energy heterogeneity. This model is general enough in the sense that it can describe 1-level, 2-level, and 3-level heterogeneity. The proposed model is characterized by a parameter whose lower and upper bounds are determined. For 1-level heterogeneity, the value of...

    Provided By mecs-press

  • White Papers // Apr 2013

    A Study on Contributory Group Key Agreements for Mobile Ad Hoc Networks

    Wireless networks, in particular Mobile Ad-hoc NETworks (MANETs) have revolutionized the field of networking with increasing number of their commercial and military applications. Security on the other hand, is now an essential requirement for these applications. However, the limitations of the dynamic, infrastructure-less nature of MANETs impose major difficulties in...

    Provided By mecs-press

  • White Papers // Apr 2013

    Omni Directional Antenna Assisted Scheme to Minimize Redundancy in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) incorporate smart antennas for information propagation to offer connected coverage with reduced interference. This paper presents an omni directional antenna assisted scheme for WSNs to reduce network redundancy besides offering connected coverage. The directivity of an omni directional antenna outfitted on a sink node is exploited...

    Provided By mecs-press

  • White Papers // Apr 2013

    Effect of Black Hole Attack on MANET Routing Protocols

    Due to the massive existing vulnerabilities in mobile ad-hoc networks, they may be insecure against attacks by the malicious nodes. In this paper, the authors have analyzed the effects of Black hole attack on mobile ad hoc routing protocols. Mainly two protocols AODV and Improved AODV have been considered. Simulation...

    Provided By mecs-press

  • White Papers // Apr 2013

    Biometric Passport Validation Scheme using Radio Frequency Identification

    Biometric passports issued now-a-days have an embedded RFID chip that carries digitally signed biometric information. This RIFD chip is integrated into the cover of a passport, called a biometric passport. Electronic passports as it is sometimes called, represents a bold initiative in the deployment of two new technologies: RIFD and...

    Provided By mecs-press

  • White Papers // Apr 2013

    Statistical Hiding Fuzzy Commitment Scheme for Securing Biometric Templates

    By considering the security flaws in cryptographic hash functions, any commitment scheme designed straight through hash function usage in general terms is insecure. In this paper, the authors develop a general fuzzy commitment scheme called an Ordinary Fuzzy Commitment Scheme (OFCS), in which many fuzzy commitment schemes with variety complexity...

    Provided By mecs-press

  • White Papers // Apr 2013

    The Extensive Bit-level Encryption System (EBES)

    Due to the growing need to protect the confidentiality of information, there is a rising demand for an encryption algorithm that can protect data of every format, size and type. In this paper, the authors has been introduced the Extensive Bit-level Encryption System (EBES), a bit-level encryption mechanism. It is...

    Provided By mecs-press

  • White Papers // Apr 2013

    Semantic Multi-granular Lock Model for Object Oriented Distributed Systems

    In Object Oriented Distributed Systems (OODS), the objects are viewed as resources. Concurrency control techniques are usually applied on the database tier. This has the limitations of lack of support of legacy files and requirement of separate concurrency control mechanisms for each database model. Hence concurrency control on the objects...

    Provided By mecs-press

  • White Papers // Apr 2013

    Defect Analysis Using Artificial Neural Network

    In this paper the authors deal with detection of defects in the manufactured ceramic tiles to ensure high density quality. The problem is concerned with the automatic inspection of ceramic tiles using Artificial Neural Network (ANN). The performance of the technique has been evaluated theoretically and experimentally on samples. Architecture...

    Provided By mecs-press

  • White Papers // Apr 2013

    Security Based on Real Time Tracking of Multiple Human Faces Identification

    Robust tracking of persons in real-world environments and in real-time is a common goal in many video applications. In this paper a computational system for the real-time tracking of multiple persons in natural environments is presented. Face detection has diverse applications especially as an identification solution which can meet the...

    Provided By mecs-press

  • White Papers // Apr 2013

    Performance of Personal Identification System Technique Using Iris Biometrics Technology

    The Iris identification as one of the significant techniques of biometric identification systems s and iris recognition algorithm is described. Biometric technology advances intellectual properties are wanted by many unauthorized personnel. As a result many researchers have being searching ways for more secure authentication methods for the user access. Iris...

    Provided By mecs-press

  • White Papers // Apr 2013

    Security Software Green Head for Mobile Devices Providing Comprehensive Protection From Malware and Illegal Activities of Cyber Criminals

    In this paper, the authors deal with the description of the threats to mobile devices and suggest the security software that provides comprehensive protection of personal data and mobile telephone from malware and illegal activity of cyber criminals. The developed security software Green Head protects personal Smartphone's of majority of...

    Provided By mecs-press

  • White Papers // Apr 2013

    Criteria Specifications for the Comparison and Evaluation of Access Control Models

    Now-a-days, information systems cover all-important aspects of people's life, and computer applications are vastly used in widespread fields from medicine to military sector. Because of considerable dependence on computer-based systems, the security of the information saved in these systems is of great concern, and therefore, the complexity of data protection...

    Provided By mecs-press

  • White Papers // Apr 2013

    Defending of IP Spoofing by Ingress Filter in Extended-Inter Domain Packet Key Marking System

    The significance of the Distributed Denial of Service (DDoS) problem and the increased occurrence and strength of attacks has led to the dawn of numerous prevention mechanisms. IP spoofing is most frequently used in denial-of-service attacks. In such attacks, the goal is to flood the victim with overwhelming amounts of...

    Provided By mecs-press

  • White Papers // Apr 2013

    Recent Replica Placement Algorithms in P2P Networks - A Review

    Peer-to-Peer (P2P) systems provide a platform for large internet scale distributed applications with no dedicated infrastructure. In P2P systems, applications are developed by dividing them across individual systems termed peers which take the role of both client as well as server. Popularity of objects in such a system can change...

    Provided By mecs-press

  • White Papers // Aug 2012

    Computation of Pheromone Values in AntNet Algorithm

    In this paper, the authors discuss the basic routing technique of ants and study the change in pheromone values at each node. Also the optimal paths can then be computed based on the shortest cumulative pheromone count between source and destination nodes. AntNet is a distributed multi-agent system inspired by...

    Provided By mecs-press

  • White Papers // Mar 2013

    A Framework for Real-Time Resource Allocation in IP Multimedia Subsystem Network

    IMS (IP Multimedia Subsystem) is designed to provide multiple-services and can be accessed from any access network. With the advent of new multimedia services; user requirement also changed and required delay tolerant services from the service providers. The new multimedia services demands the restrictions on network parameters and this can...

    Provided By mecs-press

  • White Papers // Mar 2013

    Comparative Analysis of AODV, OLSR, TORA, DSR and DSDV Routing Protocols in Mobile Ad-Hoc Networks

    Mobile Ad-Hoc NETworks (MANETs) are autonomous and decentralized wireless systems. Mobile Ad hoc Network is a collection of mobile nodes in which the wireless links are frequently broken down due to mobility and dynamic infrastructure. Routing is a significant issue and challenge in ad hoc networks. Many Routing protocols have...

    Provided By mecs-press

  • White Papers // Mar 2013

    User's Profile Replication Tree and On Demand Replica Update in Wireless Communication

    Replication strategy is mostly useful for replicating the called mobile user's profile at selected locations where some caller mobile users have higher calling rate. It plays important role in personal communication services (PCS) in order to reduce call setup cost and call setup time. In prior replication schemes, replicated sites...

    Provided By mecs-press

  • White Papers // Apr 2013

    Formal Verification of Congestion Control Algorithm in VANETs

    A Vehicular Ad-Hoc NETworks (VANETs) is the technology that uses moving cars as nodes in a network to create a mobile network. VANETs turn every participating car into a wireless router, allowing cars of each other to connect and create a network with a wide range. VANETs are developed for...

    Provided By mecs-press

  • White Papers // Apr 2013

    Optimizing the CMTS to Improve Quality of Service in Next Generation Networks Based on ACO Algorithm

    In this paper, the authors focus on the network topological design for providing Quality of Service (QoS) in Next Generation Network (NGN) and propose an effective Ant Colony Optimization (ACO) algorithm to solve the Capacitated Minimum Spanning Tree (cMTS) problem in dynamic environment. To improve QoS of communication network with...

    Provided By mecs-press

  • White Papers // Apr 2013

    QoS Enabled Probabilistic Routing for Heterogeneous Wireless Sensor Networks

    There is an increasing research interest in solving routing problems in Wireless Sensor Networks (WSN) and most of the existing routing protocols for WSN consider homogeneous nodes wherein, all sensor nodes have the same capabilities in terms of sensing, communication and computation capabilities. However, deployment of a homogeneous sensor network...

    Provided By mecs-press

  • White Papers // Apr 2013

    3-Level Heterogeneity Model for Wireless Sensor Networks

    In this paper, the authors propose a network model with energy heterogeneity. This model is general enough in the sense that it can describe 1-level, 2-level, and 3-level heterogeneity. The proposed model is characterized by a parameter whose lower and upper bounds are determined. For 1-level heterogeneity, the value of...

    Provided By mecs-press

  • White Papers // Apr 2013

    A Study on Contributory Group Key Agreements for Mobile Ad Hoc Networks

    Wireless networks, in particular Mobile Ad-hoc NETworks (MANETs) have revolutionized the field of networking with increasing number of their commercial and military applications. Security on the other hand, is now an essential requirement for these applications. However, the limitations of the dynamic, infrastructure-less nature of MANETs impose major difficulties in...

    Provided By mecs-press

  • White Papers // Apr 2013

    Omni Directional Antenna Assisted Scheme to Minimize Redundancy in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) incorporate smart antennas for information propagation to offer connected coverage with reduced interference. This paper presents an omni directional antenna assisted scheme for WSNs to reduce network redundancy besides offering connected coverage. The directivity of an omni directional antenna outfitted on a sink node is exploited...

    Provided By mecs-press

  • White Papers // Apr 2013

    Effect of Black Hole Attack on MANET Routing Protocols

    Due to the massive existing vulnerabilities in mobile ad-hoc networks, they may be insecure against attacks by the malicious nodes. In this paper, the authors have analyzed the effects of Black hole attack on mobile ad hoc routing protocols. Mainly two protocols AODV and Improved AODV have been considered. Simulation...

    Provided By mecs-press

  • White Papers // Nov 2012

    Swarm Flooding Attack Against Directed Diffusion in Wireless Sensor Networks

    The objective of this paper is to study the vulnerabilities of sensor networks, design, and implement new approaches for routing attack. As one of the cornerstones of network infrastructure, routing systems are facing more threats than ever; they are vulnerable by nature and challenging to protect. The authors present a...

    Provided By mecs-press

  • White Papers // Nov 2012

    Risk Management Strategies for the Use of Cloud Computing

    Cloud computing may lead to both cost-efficiency and flexibility, but it also inevitably triggers a certain degree of loss exposure. Unfortunately, there is little objective, scientific research focused on identifying and evaluating the loss exposure that results from cloud computing. In this study, a modified Delphi method and the analytic...

    Provided By mecs-press

  • White Papers // Nov 2012

    Need of Removing Delivered Message Replica From Delay Tolerant Network - A Problem Definition

    Recent wireless networks observe number of deployments in various conditions where they come across different intensities of link disconnection. On the basis of extent of the operating circumstances these networks are termed as Intermittently Connected Networks (ICNs). The prevailing TCP/IP protocol cannot be operational in ICNs thus providing number of...

    Provided By mecs-press

  • White Papers // Nov 2012

    Security Mechanisms to Decrease Vulnerability of Ad-Hoc Routing Protocols

    Many proposed routing protocols for ad hoc networks operate in an ad hoc fashion, as on demand routing protocols often have low overhead and faster reaction time than other types of routing based on periodic protocols. Dynamic nature of ad-hoc networks leads to challenges in securing the network. Due to...

    Provided By mecs-press

  • White Papers // Oct 2012

    Extended Queue Management Backward Congestion Control Algorithms for Web Transfers in Wireless Environment

    Wireless links are characterized by high error rates and intermittent connectivity. TCP congestion control has been developed on the assumption that network congestion is the only cause for packet loss. Upon detecting a packet loss, TCP drops it's transmit window resulting in an unnecessary reduction of end-to-end throughput which results...

    Provided By mecs-press

  • White Papers // Oct 2012

    A New 512 Bit Cipher for Secure Communication

    The internet today is being used by millions of users for a large variety of commercial and non commercial purposes. It is controlled by different entities. It is mainly used as an efficient means for communication, entertainment and education. With the rapid growth of internet, there is a need for...

    Provided By mecs-press

  • White Papers // Sep 2012

    Self Organized Replica Overlay Scheme for P2P Networks

    Peer-to-Peer (P2P) systems are widely used for data sharing applications in an autonomous and decentralized mode. P2P systems are suitable for largescale distributed environments in which nodes can share resources other than data such as computing power, memory and network bandwidth. Some of important parameters that affect the performance of...

    Provided By mecs-press

  • White Papers // Oct 2012

    E-Commerce Evaluation and E Business Trends

    The impact of information and communication technology on varied areas of the Global economy and current trends in e business is an area of research that could lead to valuable business insights. The adaptation of business models to accommodate the customer's needs for providing an internet based business transaction platform...

    Provided By mecs-press

  • White Papers // Jun 2012

    Privacy Notions and Review of Privacy Preservation Mechanisms in Wireless Sensor Networks

    The current research work in wireless sensor networks has mostly focused on the resolving issues related to power consumption and computational resource constraints in the wireless sensor networks. To achieve the same various specific routing schemes, MAC and cross layered protocols and techniques have been proposed and designed. But with...

    Provided By mecs-press

  • White Papers // Jun 2012

    Toward Security Test Automation for Event Driven GUI Web Contents

    The web is taking recently a large percentage of software products. The evolving nature of web applications put a serious challenge on testing, if the people consider the dynamic nature of the current web. More precisely, testing both blocked contents and AJAX interfaces, might create new challenges in terms of...

    Provided By mecs-press

  • White Papers // Jun 2012

    Security Aspects and Challenges in Mobile Adhoc Networks

    The traditional notion of a Adhoc wireless network is one in which there are a few Base Stations or Access Points and a number of Mobile Stations or Nodes. Security has become a primary concern in order to provide protected communication between mobile nodes in a hostile environment. The Adhoc...

    Provided By mecs-press

  • White Papers // Jun 2012

    Multi-User Quantum Key Distribution Using Wavelength Division Multiplexing

    Quantum cryptography, exclusively known as Quantum Key Distribution (QKD), has attracted a lot of attention in the recent years with the discovery that it can provide absolute secrecy for communications. The authors report a new architecture for constructing a fiber-based network of quantum key distribution using optical wavelength division multiplexing...

    Provided By mecs-press

  • White Papers // Jun 2012

    Preventive Aspect of Black Hole Attack in Mobile Ad Hoc Network

    Mobile ad hoc network is infrastructure less type of network. In this paper, the authors present the prevention mechanism for black hole in mobile ad hoc network. The routing algorithms are analyzed and discrete properties of routing protocols are defined. The discrete properties support in distributed routing efficiently. The protocol...

    Provided By mecs-press

  • White Papers // Jun 2012

    Dynamic Inter Arrival Time Based Seamless Handoff for Mobile WIMAX Ping-Pong Calls Bypassing PKMv2 EAP Authentication

    The rapid growth of wireless communication and its persistent use influences all walks of life. Mobile WiMAX IEEE 802.16e standard enabled convergence of mobile and fixed broadband networks through a common wide-area radio-access technology and flexible network architecture. It aims to provide seamless support to its users but an inevitable...

    Provided By mecs-press

  • White Papers // Jun 2012

    Battering Keyloggers and Screen Recording Software by Fabricating Passwords

    The keyloggers are covert security threat to the privacy and identity of users. The attackers are exploring different techniques of keylogging using hardware keyloggers, software keyloggers and screen capturing software to steal the user sensitive data. The Incognizance of the user is imposing greater risk. To overcome this problem, the...

    Provided By mecs-press

  • White Papers // Jun 2012

    IEATH: Improved Energy Aware and Two Hop Multipath Routing Protocol in Wireless Sensor Networks

    Wireless sensor networks in terms of energy sources are limited. Furthermore due to this type of network infrastructure wireless communications and channel errors not possible to reach the correct packet to the destination exists; hence the proposing algorithms to improve the quality of service in these networks and sending packets...

    Provided By mecs-press

  • White Papers // Jun 2012

    Evaluating Overheads of Integrated Multilevel Checkpointing Algorithms in Cloud Computing Environment

    This paper presents a methodology for providing high availability to the demands of cloud's clients. To attain this objective, failover stratagems for cloud computing using integrated checkpointing algorithms are purposed in this paper. Purposed strategy integrate checkpointing feature with load balancing algorithms and also make multilevel checkpoint to decrease checkpointing...

    Provided By mecs-press

  • White Papers // Jun 2012

    Congestion Control in 4G Wireless Networks Using Coalition Game

    In 4G-domain multi home Mobile Host (MH) will have access to different wireless networks. In this 4G wireless networks real time applications are initiated to support services like VOIP, videoconference. These applications use RTP over UDP. These protocols are unresponsive to congestion events. The authors' proposed congestion management scheme minimizes...

    Provided By mecs-press

  • White Papers // Jun 2012

    Optimization Design Parameters of Electro-Optic Modulators for Low Loss Wide Bandwidth Capability of Optical Communication Systems

    The effects of temperature, and operating signal wavelength on high frequency radio frequency transmission characteristics are deeply investigated against various materials based electro optic modulator devices such as Lithium Niobate (LiNbO3), polymer, and semiconductor materials. On the other hand, the authors have developed the optimization of the electro optic modulator...

    Provided By mecs-press

  • White Papers // Jun 2012

    A Hierarchical Load Balancing Policy for Grid Computing Environment

    With the rapid development of high-speed wide-area networks and powerful yet low-cost computational resources, grid computing has emerged as an attractive computing paradigm. It provides resources for solving large scientific applications. It is typically composed of heterogeneous resources such as clusters or sites at different administrative domains connected by networks...

    Provided By mecs-press

  • White Papers // May 2012

    Evaluation of IP Multimedia Subsystem Based Mobile Mass Examination System

    This paper is carried out to develop IP Multimedia Subsystem (IMS) based Mobile Mass Examination (MoMEx) System. MoMEx system is intended to improve on management of examination process for large number of examinees. IMS based application is considered to be the next generation mobile applications that enable developers to take...

    Provided By mecs-press

  • White Papers // May 2012

    A Packet Routing Model for Computer Networks

    The quest for reliable data transmission in today's computer networks and internetworks forms the basis for which routing schemes need be improved upon. The persistent increase in the size of internetwork leads to a dwindling performance of the present routing algorithms which are meant to provide optimal path for forwarding...

    Provided By mecs-press

  • White Papers // May 2012

    Residual Energy Based Anti-Traffic Analysis Privacy Preservation in WSN

    The paper is an effort to build an energy efficient mechanism which can preserve the privacy of the location of base station and the source nodes so that the adversary cannot take down these nodes. Core functionality of WSN includes routing of the sensed data through predetermined optimized routes to...

    Provided By mecs-press

  • White Papers // May 2012

    An Enhanced Dynamic Mutual Authentication Scheme for Smart Card Based Networks

    Network security is the prevailing and challenging factor in computer communications. Computer security and communication security are interrelated and essential features in the internetworking system. Network security is ascertained by many factors like authentication, authorization, digital signatures, cryptography, steganography, etc. Among them authentication is playing an important role in networked...

    Provided By mecs-press

  • White Papers // May 2012

    Digital Forensic Investigation Tools and Procedures

    Due to the significance of Data, in this new age, its' security has become a major issue in the I.T. industry. Cyber attacks from various sources are demanding its prevention in the new era of information security. Digital forensic is a relatively new fields that is the collection, analysis and...

    Provided By mecs-press

  • White Papers // May 2012

    Mobile Governance Based on WiMAX Connectivity for Rural Development in India

    This paper aims to explore the nature, role and relevance of the wireless technologies such as WiMAX connectivity for rural area of Jalgoan district, India. It focuses on development of the WiMAX(Worldwide Interoperability for Microwave Access) network model using OPNET MODELER 14.5 and observe overall performance with fixed, mobile node...

    Provided By mecs-press

  • White Papers // May 2012

    Asymptotic Stability Analysis of E-Speed Start Congestion Control Protocol for TCP

    All the proposed window based congestion control protocols use a single slow start algorithm. It has been shown in literature that slow start inefficiently utilizes bandwidth in a network with high Bandwidth Delay Product (BDP). A multiple startup algorithm (E-speed start) was proposed in this paper. E-speed start specifies a...

    Provided By mecs-press

  • White Papers // May 2012

    Recent Advances of Distributed Optical Fiber Raman Amplifiers in Ultra Wide Wavelength Division Multiplexing Telecommunication Networks

    Recently, many research works have been focused on the fiber optic devices for optical communication systems. One of the main interests is on the optical amplifiers to boost a weak signal in the communication systems. In order to overcome the limitations imposed by electrical regeneration, a means of optical amplification...

    Provided By mecs-press

  • White Papers // Sep 2012

    Anti-Spam Software for Detecting Information Attacks

    In this paper the development of anti-spam software detecting information attacks is offered. For this purpose it is considered spam filtration system with the multilayered, multivalent architecture, coordinating all ISP's in the country. All users and ISPs of this system involved in spam filtration process. After spam filtering process, saved...

    Provided By mecs-press