mecs-press

Displaying 201-240 of 342 results

  • White Papers // Mar 2012

    Error Detection & Correction in Wireless Sensor Networks by Using Residue Number Systems

    Wireless Sensor Networks have potential of significantly enhancing the people ability to monitor and interact with their physical environment. Realizing a fault tolerant operation is critical to the success of WSNs. The integrity of data has tremendous effects on performance of any data acquisition system. Noise and other disturbances can...

    Provided By mecs-press

  • White Papers // Mar 2012

    A Novel Security Scheme for Secret Data Using Cryptography and Steganography

    With the development of network techniques the problem of network security becomes more and more important. The use of Word Wide Web has grown extremely in the past few years. Furthermore, many end users can easily use tools to synthesize and edit multimedia information. Thus, security has become one of...

    Provided By mecs-press

  • White Papers // Mar 2012

    Semifragile Watermarking Schemes for Image Authentication- A Survey

    Digital images are very easy to manipulate, store, publish and secondary creation this juggle will lead to serious consequence in some applications such as military image, medical image. So, integrity of digital image must be authenticated. Tools that help one establish the authenticity and integrity of digital media are thus,...

    Provided By mecs-press

  • White Papers // Mar 2012

    Evolution of Electronic Passport Scheme Using Cryptographic Protocol Along With Biometrics Authentication System

    Millions of citizens around the world have already acquired their new electronic passport. The e-passport is equipped with contact-less chip which stores personal data of the passport holder, information about the passport and the issuing institution, as well as with a multiple biometrics enabling cryptographic functionality. Countries are required to...

    Provided By mecs-press

  • White Papers // Apr 2011

    A Frequency Estimation for TD-SCDMA UE Based on Phase Difference

    This paper describes a new method of frequency estimation in cell search of TD-SCDMA system. Before identifying the scrambling code and Midamble code, using part of sync-dl code data for frequency estimation; and before controlling the multi-frame synchronization, using part of Midamble code data for frequency estimation. Also these two...

    Provided By mecs-press

  • White Papers // Mar 2011

    Semi-Distributed Coordinative Switch Beamforming With Power Scheduling

    Beam cooperative scheduling of a downlink transmission is an important technique to improve the spectrum efficiency in next generation mobile networks. This paper focuses on switched beams (the emission angles of the beams are fixed) and proposes a joint beam-power coordinative scheduling algorithm among neighbor sectors in the downlink of...

    Provided By mecs-press

  • White Papers // Mar 2011

    Design and Application of A New Hybrid Heuristic Algorithm for Flow Shop Scheduling

    A new heuristic algorithm was designed by combining with Johnson method, NEH method and characteristics of scheduling, and it was implemented on MATLAB. The efficiency of the new algorithm was tested through eight Car questions and two Hel questions of Benchmark problems, and the results revealed that the new heuristic...

    Provided By mecs-press

  • White Papers // Feb 2011

    Application of CL Multi-Wavelet Transform and DCT in Information Hiding Algorithm

    How to make the Information Hiding scheme have a better performance in terms of invisibility, robustness, sensitivity and anti-steganalysis becomes a research hotspot. Currently, the algorithm has not achieved four performances at the same time. The scheme based on space domain are good at invisibility, but can not meet the...

    Provided By mecs-press

  • White Papers // Feb 2011

    A Semantic Context-Based Model for Mobile Web Services Access Control

    As mobile web services becomes more pervasive, applications based on mobile web services will need flexible access control mechanisms. Unlike traditional approaches based on the identity or role for access control, access decisions for these applications will depend on the combination of the required attributes of users and the contextual...

    Provided By mecs-press

  • White Papers // Feb 2011

    A Method of Hash Join in the DAS Model

    In the Database As Service(DAS) model, authenticated join processing is more difficult than authenticated range query because the previous approach of authenticated range query, signature on a single relation, can not be used to verify join results directly. In this paper, an authenticated hash join processing algorithm is described in...

    Provided By mecs-press

  • White Papers // Dec 2010

    Code Formal Verification of Operation System

    With the increasing pressure on non-function attributes (security, safety and reliability) requirements of an operation system, high-confidence operation system is becoming more important. Formal verification is the only known way to guarantee that a system is free of programming errors. The authors research on formal verification of operation system kernel...

    Provided By mecs-press

  • White Papers // Dec 2010

    Performance Analysis of QoS Multicast Routing in Mobile Ad Hoc Networks Using Directional Antennas

    In this paper, a Quality of Service (QoS) multicast routing protocol in Mobile Ad hoc NETworks (MANETs) by using directional antennas has been presented. Many important applications, such as audio/video conferencing, require the quality of service guarantee. Directional antenna technology provides the capability for considerable increase in spatial reuse, which...

    Provided By mecs-press

  • White Papers // Dec 2010

    Study of 2D DOA Estimation for Uniform Circular Array in Wireless Location System

    In this paper, the use of a Uniform Circular Antenna arrays (UCA) for high resolution of Two Dimensional (2D) Direction Of Arrivals (DOAs) estimation in wireless location system is investigated. Performance of 2D DOA estimation based on the real-valued unitary transformation MUSIC algorithm for UCA is presented, especially focusing on...

    Provided By mecs-press

  • White Papers // Dec 2010

    An Improved Dynamic Probabilistic Packet Marking for IP Trace back

    An improved dynamic probabilistic packet marking algorithm named IDPPM is presented, which not only can locate and attack a source rapidly and accurately, but also can reduce the marking overhead of routers near the attackers, which is its greatest contribution given by the authors' technique. In contrast to previous work,...

    Provided By mecs-press

  • White Papers // Apr 2012

    Analysis towards Mobile IPV4 and Mobile IPV6 in Computer Networks

    With the rapid growth in the number of mobile devices like cellular phones, Personal Digital Assistants (PDAs), and laptop computers, the demand for \"Anywhere, anytime, and any way\" high-speed Internet access is becoming a primary concern in the people lives. Mobile IP has been designed with the Internet Engineering Task...

    Provided By mecs-press

  • White Papers // May 2013

    Performance Comparison of Various Robust Data Clustering Algorithms

    Robust clustering techniques are real life clustering techniques for noisy data. They work efficiently in the presence of noise. Fuzzy C-Means (FCM) is the first clustering algorithm, based upon fuzzy sets, proposed by 0but it does not give accurate results in the presence of noise. In this paper, FCM and...

    Provided By mecs-press

  • White Papers // May 2013

    A Hybrid Algorithm for Privacy Preserving in Data Mining

    With the proliferation of information available in the internet and databases, the privacy-preserving data mining is extensively used to maintain the privacy of the underlying data. Various methods of the state art are available in the literature for privacy-preserving. Evolutionary Algorithms (EAs) provide effective solutions for various real-world optimization problems....

    Provided By mecs-press

  • White Papers // Aug 2013

    Design and Development MIPS Processor Based on a High Performance and Low Power Architecture on FPGA

    In this paper the authors present the design and development of a high performance and low power MIPS microprocessor and implementation on FPGA. In this method they for achieving high performance and low power in the operation of the proposed microprocessor use different methods including, unfolding transformation (parallel processing), C-slow...

    Provided By mecs-press

  • White Papers // May 2011

    Development of Networked Virtual Experiment System Based on Virtual Campus

    Virtual Reality (VR) has found many applications in education; and the resources of virtual education such as virtual campus, virtual laboratory etc. are used more and more widely, especially in the field of higher education. But so far virtual campus was mainly regarded as a means of image exhibition, and...

    Provided By mecs-press

  • White Papers // Nov 2010

    Cloud Policy Model in the Desktop Management System

    With the rapid development of computer technology and widely used Internet applications, there have been an increasing number of computer equipments in the enterprises. By studying the policy and desktop management systems theories, referencing the Internet Engineering Task Force (IETF) policy model and theories of cloud computing, this paper proposed...

    Provided By mecs-press

  • White Papers // May 2011

    A Scheme for Evaluating XML Engine on RDBMS

    There are an increasing number of DBMS vendors thinking of integrating XML data management into traditional relational database, with wider use of XML. In this case, a comprehensive evaluation methodology is needed to evaluate the XML engine in RDBMS correctly. In this paper, the authors analyze the characteristics of XML...

    Provided By mecs-press

  • White Papers // Jun 2012

    An Integrated Symmetric Key Cryptographic Method - Amalgamation of TTJSA Algorithm , Advanced Caesar Cipher Algorithm, Bit Rotation and Reversal Method: SJA Algorithm

    In this paper the authors present a new integrated symmetric-key cryptographic method, named SJA, which is the combination of advanced caesar cipher method, TTJSA method, bit wise rotation and reversal method. The encryption method consists of three basic steps: encryption technique using advanced caesar cipher, encryption technique using TTJSA algorithm,...

    Provided By mecs-press

  • White Papers // Feb 2013

    Enhancing Leakage Power in CPU Cache Using Inverted Architecture

    Power consumption is an increasingly pressing problem in modern processor design. Since the on-chip caches usually consume a significant amount of power so power and energy consumption parameters have become one of the most important design constraint. It is one of the most attractive targets for power reduction. This paper...

    Provided By mecs-press

  • White Papers // Apr 2013

    Low-Cost and Optimized Two Layers Embedded Board Based on ATmega32L Microcontroller and Spartan-3 FPGA

    Microcontrollers and FPGAs both are widely used in digital system design. Microcontroller-based instruments are becoming increasingly widespread. This paper presents design and implementation of a new low-cost and minimum embedded board based on ATMEGA32L AVR microcontroller and Spartan-3 (XCS400-4PQG208C) FPGA in two layers with mount elements on top and button...

    Provided By mecs-press

  • White Papers // Mar 2012

    Gender Differences on Information Literacy of Science and Engineering Undergraduates

    Information Literacy (IL) forms the basis of lifelong learning and plays very important role for students majoring in science and engineering. As far as higher education concerned, gender differences to may influence students' academic achievements. In order to evaluate the gender differences on information literacy of undergraduates, the authors surveyed...

    Provided By mecs-press

  • White Papers // Mar 2012

    Robust Algorithm for Face Detection in Color Images

    Robust Algorithm is presented for frontal face detection in color images. Face detection is an important task in facial analysis systems in order to have a priori localized faces in a given image. Applications such as face tracking, facial expression recognition, gesture recognition, etc., for example, have a pre-requisite that...

    Provided By mecs-press

  • White Papers // Mar 2012

    Issues of Technical Support for e-Learning Systems in Higher Education Institutions

    Information and Communication Technologies (ICTs) have provided several tools to facilitate higher education. However, their effective use demands technical expertise to achieve the required academic goals. The university constituents (teachers, students and administrators) are given e-Training but this is not enough. Every e-Learning system establishes a basic 'Infrastructure' of computers,...

    Provided By mecs-press

  • White Papers // Mar 2012

    Undergraduate Program in Network Engineering and Security - A Feasibility Study

    In this paper, a feasibility study for initiating a new undergraduate program in network engineering and security is presented. The paper was based on surveying and analyzing the current and projected future market demand for specialized network engineering graduates. The results of this paper concluded that the demand for such...

    Provided By mecs-press

  • White Papers // Mar 2012

    Adoption of Employment-Oriented Experience Training Program to Improve Undergraduates Employment Competence

    To enhance undergraduates employment competitive advantages, communication and expression capability and team cooperation ability in engineering practice experiences, an experience training program is adopted to cultivate compound international talents of software development required by software companies. For the training program, knowledge spans and integration extent of teaching contents, implementation flow...

    Provided By mecs-press

  • White Papers // Feb 2012

    Element-Based Computational Model

    A variation on the data-flow model is proposed to use for developing parallel architectures. While the model is a data driven model it has significant differences to the data-flow model. The proposed model has an evaluation cycle of processing elements (encapsulated data) that is similar to the instruction cycle of...

    Provided By mecs-press

  • White Papers // Feb 2012

    Perceived Gender Classification From Face Images

    Perceiving human faces and modeling the distinctive features of human faces that contribute most towards face recognition are some of the challenges faced by computer vision and psychophysics researchers. There are many methods have been proposed in the literature for the facial features and gender classification. However, all of them...

    Provided By mecs-press

  • White Papers // Feb 2012

    A Frame of Intrusion Detection Learning System Utilizing Radial Basis Function

    The process of monitoring the events that occur in a computer system or network and analyzing them for signs of intrusion is known as Intrusion Detection System (IDS). Detection ability of most of the IDS are limited to known attack patterns; hence, new signatures for novel attacks can be troublesome,...

    Provided By mecs-press

  • White Papers // Feb 2012

    Using Virtual Security Lab in Teaching Cryptography

    Teaching Information Security for undergraduate students requires a safe hand-on environment for practicing. This paper focuses on using a virtual lab for two modules in cryptography concepts. At the end, a survey was conducted on a group of students at the Information Systems Department at the King Abdulaziz University to...

    Provided By mecs-press

  • White Papers // Feb 2012

    Finding Vulnerabilities in Rich Internet Applications (Flex/AS3) Using Static Techniques

    The number and the importance of Rich Internet Applications (RIA) have increased rapidly over the last years. At the same time, the quantity and impact of security vulnerabilities in such Rich Internet Applications (RIA) have increasing as well. Since manual code reviews are time consuming, error prone and costly and...

    Provided By mecs-press

  • White Papers // Apr 2011

    A High-Performance Communication Service for Parallel Servo Computing

    Complexity of algorithms for the servo control in the multi-dimensional, ultra-precise stage application has made multi-processor parallel computing technology needed. Considering the specific communication requirements in the parallel servo computing, the authors propose a communication service scheme based on VME bus, which provides high-performance data transmission and precise synchronization trigger...

    Provided By mecs-press

  • White Papers // Apr 2011

    Data Mining based Software Development Communication Pattern Discovery

    Smaller time loss and smoother communication pattern is the urgent pursuit in the software development enterprise. However, communication is difficult to control and manage and demands on technical support, due to the uncertainty and complex structure of data appeared in communication. Data mining is a well established framework aiming at...

    Provided By mecs-press

  • White Papers // Feb 2013

    Designing a Universal Data-Oriented Random Number Generator

    Data-oriented is new and applied theory which provides method that models the concepts with data structure. If the concept is modeled by using sufficient data in modeling, required inferences and calculations can be done fast with less complexity. Random variable was modeled with digital probability graph, by using ahmad fact...

    Provided By mecs-press

  • White Papers // May 2013

    Bitwise Operations Related to a Combinatorial Problem on Binary Matrices

    Some techniques for the use of bitwise operations are described in the paper. As an example, an open problem of isomorphism-free generations of combinatorial objects is discussed. An equivalence relation on the set of square binary matrices having the same number of units in each row and each column is...

    Provided By mecs-press

  • White Papers // May 2013

    Student Learning Ability Assessment using Rough Set and Data Mining Approaches

    All learners are not able to learn anything and everything complete. Though the learning mode and medium are different in e-learning mode and in classroom learning, similar activities are required in both the modes for teachers to observe and assess the learner(s). Student performance varies considerably depending upon whether a...

    Provided By mecs-press

  • White Papers // Jul 2013

    A Scheme to Reduce Response Time in Cloud Computing Environment

    The area of cloud computing has become popular from the last decade due to its enormous benefits such as lower cost, faster development and access to highly available resources. Apart from these core benefits some challenges are also associated with it such as QoS, security, trust and better resource management....

    Provided By mecs-press