mecs-press

Displaying 201-240 of 537 results

  • White Papers // Apr 2013

    A Novel Routing Scheme for Mobile Ad Hoc Network

    Mobile Ad hoc NETwork (MANET) is a collection of mobile users without any support of fixed infrastructure. The nodes in these networks have several constraints such as transmission power, bandwidth and processing capability. In addition to it an important parameter of interest is the residual battery power of the nodes....

    Provided By mecs-press

  • White Papers // Apr 2013

    Activity Based Quality Model for Evaluating Web2.0 Applications

    Quality is key term to be considered when developing the web applications. If this is not adequately measured; there will be little to force users to use web applications. The focus of web2.0 is to enhance the interactions between the application and end users and among users. The main challenge...

    Provided By mecs-press

  • White Papers // Mar 2013

    Reinforcement Swap Attack Against Directed Diffusion in Wireless Sensor Networks

    In this paper, the authors introduce a new attack, Reinforcement Swap Attack, against Directed Diffusion based WSNs, which exploits the vulnerabilities of Directed Diffusion specifications. Its main idea is the disruption of configuration information, such as routing information to misuse route establishment along the network. Their approach is to swap...

    Provided By mecs-press

  • White Papers // Mar 2013

    A Framework for Real-Time Resource Allocation in IP Multimedia Subsystem Network

    IMS (IP Multimedia Subsystem) is designed to provide multiple-services and can be accessed from any access network. With the advent of new multimedia services; user requirement also changed and required delay tolerant services from the service providers. The new multimedia services demands the restrictions on network parameters and this can...

    Provided By mecs-press

  • White Papers // Mar 2013

    Comparative Analysis of AODV, OLSR, TORA, DSR and DSDV Routing Protocols in Mobile Ad-Hoc Networks

    Mobile Ad-Hoc NETworks (MANETs) are autonomous and decentralized wireless systems. Mobile Ad hoc Network is a collection of mobile nodes in which the wireless links are frequently broken down due to mobility and dynamic infrastructure. Routing is a significant issue and challenge in ad hoc networks. Many Routing protocols have...

    Provided By mecs-press

  • White Papers // Mar 2013

    User's Profile Replication Tree and On Demand Replica Update in Wireless Communication

    Replication strategy is mostly useful for replicating the called mobile user's profile at selected locations where some caller mobile users have higher calling rate. It plays important role in personal communication services (PCS) in order to reduce call setup cost and call setup time. In prior replication schemes, replicated sites...

    Provided By mecs-press

  • White Papers // Mar 2013

    Static Security Enhancement and Loss Minimization Using Simulated Annealing

    In this paper the authors present a developed algorithm for optimal placement of Thyristor Controlled Series Capacitors (TCSC's) for enhancing the power system static security and minimizing the system overall power loss. Placing TCSC's at selected branches requires analysis of the system behavior under all possible contingencies. A selective procedure...

    Provided By mecs-press

  • White Papers // Mar 2013

    A Proposed Model for Datacenter in -Depth Defense to Enhance Continual Security

    Defense in Depth is practical strategy for achieving Information Assurance in today's highly datacenter environments. It is a \"Best practices\" strategy in that it relies on the intelligent application of techniques and technologies that exist today. The strategy recommends a balance between the protection capability and cost, performance, and operational...

    Provided By mecs-press

  • White Papers // Feb 2013

    Enhancing the Capacity of Stratospheric Cellular Networks Using Adaptive Array Techniques

    In this paper, the capacity of stratospheric cellular communications is improved by optimizing the amplitude feeding of the Concentric Rings Array (CRA). The weighting profile of this array is chosen to be a cosine function raised to some power to control the beam pattern used in the cellular coverage. The...

    Provided By mecs-press

  • White Papers // Feb 2013

    Designing a Universal Data-Oriented Random Number Generator

    Data-oriented is new and applied theory which provides method that models the concepts with data structure. If the concept is modeled by using sufficient data in modeling, required inferences and calculations can be done fast with less complexity. Random variable was modeled with digital probability graph, by using ahmad fact...

    Provided By mecs-press

  • White Papers // Feb 2013

    Integrated Safety Mechanisms Based on Security Risks Minimization for the Distributed Computer Systems

    Today, there are known the basic principles of decision-making on the safety control of distributed computer systems in the face of uncertainty and risk. However, in this area there are no practical methods for the quantitative risk analysis and assessment, taking into account the dynamic changes of security threats, which...

    Provided By mecs-press

  • White Papers // Feb 2013

    Selection of Next Generation Anti-Virus against Virus Attacks in Networks Using AHP

    Defending against virus attacks in network is a vital part of network security. With the rapid evolution of viruses, its defense mechanism has also been evolved over the years. But given the diversity and complexity of virus propagation and its attack behavior, no defense mechanism is equipped fully to protect...

    Provided By mecs-press

  • White Papers // Feb 2013

    Blocking of SQL Injection Attacks by Comparing Static and Dynamic Queries

    Due to internet expansion web applications have now become a part of everyday life. As a result a number of incidents which exploit web application vulnerabilities are increasing. A large number of these incidents are SQL Injection attacks which are a serious security threat to databases which contain sensitive information,...

    Provided By mecs-press

  • White Papers // Feb 2013

    A Practical Privacy Preserving E-Voting Scheme with Smart Card Using Blind Signature

    Voting is regarded as one of the most effective methods for individuals to express their opinions to select their democratic leader in the public elections. As the computing, communicating, and cryptographic techniques progress rapidly, increasing emphasis has been placed on developing electronic voting schemes capable of providing more efficient voting...

    Provided By mecs-press

  • White Papers // Feb 2013

    Internet Passport Authentication System Using Multiple Biometric Identification Technology

    Electronic Passports (E-Passports) have known a wide and fast deployment all around the world since the International Civil Aviation Organization (ICAO) the world has adopted standards whereby passports can store biometric identifiers. The purpose of biometric passports is to prevent the illegal entry of traveler into a specific country and...

    Provided By mecs-press

  • White Papers // Feb 2013

    A Novel and Efficient Method for Protecting Internet Usage From Unauthorized Access Using Map Reduce

    The massive increases in data have paved a path for distributed computing, which in turn can reduce the data processing time. Though there are various approaches in distributed computing, Hadoop is one of the most efficient among the existing ones. Hadoop consists of different elements out of which Map Reduce...

    Provided By mecs-press

  • White Papers // Feb 2013

    Enhancing Leakage Power in CPU Cache Using Inverted Architecture

    Power consumption is an increasingly pressing problem in modern processor design. Since the on-chip caches usually consume a significant amount of power so power and energy consumption parameters have become one of the most important design constraint. It is one of the most attractive targets for power reduction. This paper...

    Provided By mecs-press

  • White Papers // Feb 2013

    A Near Real-time IP Traffic Classification Using Machine Learning

    With drastic increase in internet traffic over last few years due to increase in number of internet users, IP traffic classification has gained significant importance for research community as well as various internet service providers for optimization of their network performance and for governmental intelligence organizations. Today, traditional IP traffic...

    Provided By mecs-press

  • White Papers // Feb 2013

    Current Trends of High Capacity Optical Interconnection Data Link in High Performance Optical Communication Systems

    Optical technologies are ubiquitous in telecommunications networks and systems, providing multiple wavelength channels of transport at 2.5 Gbit/sec to 40 Gbit/sec data rates over single fiber optic cables. Market pressures continue to drive the number of wavelength channels per fiber and the data rate per channel. This trend will continue...

    Provided By mecs-press

  • White Papers // Feb 2013

    Efficient Data Clustering Algorithms: Improvements Over Kmeans

    In this paper the authors present a new approach to overcome one of the most known disadvantages of the well-known Kmeans clustering algorithm. The problems of classical Kmeans are such as the problem of random initialization of prototypes and the requirement of predefined number of clusters in the dataset. Randomly...

    Provided By mecs-press

  • White Papers // Feb 2013

    An Improved, Efficient and Cost Effective Software Inspection Meeting Process

    Normally, the inspection process is seemed to be just finding defects in software during software development process lifecycle. Software inspection is considered as a most cost effective technique, but if these defects are not properly corrected or handled it would cost the users more than double later in the project....

    Provided By mecs-press

  • White Papers // Feb 2013

    An Assessment of Extreme Programming Based Requirement Engineering Process

    Comprehensive Requirement Engineering (RE) process acts as a backbone of any successful project. RE processes are very complex because most of the requirement engineering documentation is written in natural languages, which are less formal and often distract the designers and developers of the system. To streamline different phases of the...

    Provided By mecs-press

  • White Papers // Jan 2013

    Rigorous Progress on Algorithms Based Routing and Wavelength Assignment in Trans-Egypt Network (TEGYNET) Management

    In simple Wavelength-Division Multiplexed (WDM) networks, a connection must be established along a route using a common wavelength on all of the links along the route. The introduction of wavelength converters into WDM cross connects increases the hardware cost and complexity. Given a set of connection requests, the routing and...

    Provided By mecs-press

  • White Papers // Jan 2013

    Effective Congestion Avoidance Scheme for Mobile Ad Hoc Networks

    Mobile nodes are organized randomly without any access point in Mobile Ad hoc NETworks (MANETs). Due to the mobility of nodes, the network congestion occurs. So many congestion control mechanisms were proposed to avoid the congestion avoidance or reducing the congestion status. In this research work, the authors proposed to...

    Provided By mecs-press

  • White Papers // Jan 2013

    Hybrid Model for Location Privacy in Wireless Ad-Hoc Networks

    In the today's fast growing world, use of internet is increasing popularly and at the same time Location-Based Services (LBS) are also getting more popular. LBS providers require user's current locations to answer their location-based queries. The primary objective of the present work is to develop a system which preserves...

    Provided By mecs-press

  • White Papers // Jan 2013

    Exponential Brute-Force Complexity of A Permutation Based Stream Cipher

    This paper introduces a permutation generation mechanism based on a shared secret key. The generated permutation vectors are used as encryption keys in a stream ciphering cryptosystem. The authors investigated various types of attacks on the known stream cipher RC4 and patched most of its loopholes, especially biased-byte and state-related...

    Provided By mecs-press

  • White Papers // Jan 2013

    Performance Evaluation of Security-Throughput Tradeoff with Channel Adaptive Encryption

    With the ever increasing volume of information over wireless medium, security has assumed an important dimension. The security of transmitted data over a wireless channel aims at protecting the data from unauthorized intrusion. Wireless network security is achieved using cryptographic primitives. Some properties that give encryption mechanism their cryptographic strength...

    Provided By mecs-press

  • White Papers // Jan 2013

    An Efficient Novel Key Management Scheme for Enhancing User Authentication in A WSN

    The Wireless Sensor Networks are energy constrained and are normally low cost and low power devices. These nodes are deployed over a specific area for specific goals. Due to energy and memory constraints, secure communication among these sensors is challenging management issue. In order to ensure security, proper connectivity among...

    Provided By mecs-press

  • White Papers // Jan 2013

    Performance Comparison and Evaluation of Different Multipath Routing Protocols Based on Various Scenario and Traffic Patterns for Mobile AD Hoc Networks

    A MANET is an interconnection of mobile devices by wireless links forming a dynamic topology without much physical network infrastructure such as routers, servers, access points/cables or centralized administration. The multipath routing protocols establish efficient communication within the network by discovering multiple routes between a pair of source and destination...

    Provided By mecs-press

  • White Papers // Jan 2013

    Self-organized Detection of Relationships in a Network

    Multistate operations within a network result in high-dimensional, multivariate temporal data, and are useful for systems, which monitor access to network entities like resources, objects, etc. Efficient self organization of such multistate network operations stored in databases with respect to relationships amongst users or between a user and a data...

    Provided By mecs-press

  • White Papers // Jan 2013

    DIMK-means \"Distance-based Initialization Method for K-means Clustering Algorithm\"

    Partition-based clustering technique is one of several clustering techniques that attempt to directly decompose the dataset into a set of disjoint clusters. K-means algorithm dependence on partition-based clustering technique is popular and widely used and applied to a variety of domains. K-means clustering results are extremely sensitive to the initial...

    Provided By mecs-press

  • White Papers // Jan 2013

    An Ontology-Based Approach for Multi-Agent Systems Engineering

    In this paper, the authors present Ontology-Based Approach for Multi-Agent Systems engineering (OBAMAS), an ontology-based contribution to agent oriented software engineering. They propose a formal process for agentification, starting with an analysis phase which consists of the construction of three formal ontologies (domain ontology, ontology of functionalities, and ontology of...

    Provided By mecs-press

  • White Papers // Jan 2013

    Review of Requirements Management Issues in Software Development

    A requirement is a capability to which a product or service should conform to. A meticulous consideration to requirements engineering acts as a backbone of software projects. Ambiguous and unrealistic requirements are major source of failure in the software-intensive systems. Requirements engineering processes are complex as most of the requirements...

    Provided By mecs-press

  • White Papers // Dec 2012

    Fault Tolerant Message Efficient Coordinator Election Algorithm in High Traffic Bidirectional Ring Network

    Now-a-days use of distributed systems such as internet and cloud computing is growing dramatically. Coordinator existence in these systems is crucial due to processes coordinating and consistency requirement as well. However the growth makes their election algorithm even more complicated. Too many algorithms are proposed in this area, but the...

    Provided By mecs-press

  • White Papers // Dec 2012

    Biometric Palm Prints Feature Matching for Person Identification

    Biometrics is playing an important role for person recognition. The Biometrics identification of an individual is can be done by physiological or behavioral characteristics; where the palm print of an individual can be captured by using sensors and is one of among physiological characteristics of an individual. Palm print is...

    Provided By mecs-press

  • White Papers // Dec 2012

    Intelligent Routing Techniques for Mobile Ad hoc Networks Using Swarm Intelligence

    A Mobile Ad hoc NETwork (MANET) is a collection of autonomous self-organized nodes. They use wireless medium for communication, thus two nodes can communicate directly if and only if they are within each other's transmission radius in a multi-hop fashion. Many conventional routing algorithms have been proposed for MANETs. An...

    Provided By mecs-press

  • White Papers // Dec 2012

    Enhanced Face Recognition Using Data Fusion

    In this paper the authors scrutinize the influence of fusion on the face recognition performance. In pattern recognition task, benefiting from different uncorrelated observations and performing fusion at feature and/or decision levels improves the overall performance. In features fusion approach, they fuse (concatenate) the feature vectors obtained using different feature...

    Provided By mecs-press

  • White Papers // Dec 2012

    Software Defect Detection-oriented Static Analysis Techniques

    Now-a-days, the application of software extends rapidly and the application environment is becoming more and more complicated. The number of accidents caused by poor quality of software is increasing, which, in turn, is doing more and more damage and leading to more serious results, such as the failure of IBM360...

    Provided By mecs-press

  • White Papers // Dec 2012

    TCP/IP Jumbo Frames Network Performance Evaluation on A Test-bed Infrastructure

    Enhancing network performance has been studied by a number of researchers. The need to provide greater throughput on network infrastructure has been the key driver for these studies. The use of jumbo frames is considered one of the methodologies that can be employed to increase data throughput on networks. In...

    Provided By mecs-press

  • White Papers // Dec 2012

    Design and Simulation Implementation of an Improved PPM Approach

    Probabilistic Packet Marking (PPM), having many merits such as low management cost, no extra network traffic, low additional workload for routes, is one of the most popular methods for tracing IP addresses. Different from recent Probabilistic Packet Marking (PPM) methods, Dynamic PPM may solve many problems of traditional methods, such...

    Provided By mecs-press

  • White Papers // Aug 2013

    KED - A Symmetric Key Algorithm for Secured Information Exchange Using Modulo 69

    Exchange of data over the internet is increasing day-by-day. Security is the main issue in communication over a network. Protection must be given against intruders. Hence, cryptography plays a vital role in providing security. There are two basic types of cryptography: symmetric key and asymmetric key. Symmetric key uses same...

    Provided By mecs-press

  • White Papers // Jun 2013

    Analysis of the SYN Flood DoS Attack

    The paper analyzes systems vulnerability targeted by TCP (Transmission Control Protocol) segments when SYN flag is ON, which gives space for a DoS (Denial of Service) attack called SYN flooding attack or more often referred as a SYN flood attack. The effects of this type of attack are analyzed and...

    Provided By mecs-press

  • White Papers // May 2013

    Exploiting SIMD Instructions in Modern Microprocessors to Optimize the Performance of Stream Ciphers

    Modern cryptographic protocols like TLS, SSL, etc. provide communication security by employing symmetric or secret key algorithms for encrypting the data and asymmetric or public key algorithms for key exchange. Modern microprocessors are loaded with a lot of performance optimization features. Single Instruction Multiple Data (SIMD) instruction set feature specially...

    Provided By mecs-press

  • White Papers // Apr 2013

    Biometric Passport Validation Scheme using Radio Frequency Identification

    Biometric passports issued now-a-days have an embedded RFID chip that carries digitally signed biometric information. This RIFD chip is integrated into the cover of a passport, called a biometric passport. Electronic passports as it is sometimes called, represents a bold initiative in the deployment of two new technologies: RIFD and...

    Provided By mecs-press

  • White Papers // Apr 2013

    Statistical Hiding Fuzzy Commitment Scheme for Securing Biometric Templates

    By considering the security flaws in cryptographic hash functions, any commitment scheme designed straight through hash function usage in general terms is insecure. In this paper, the authors develop a general fuzzy commitment scheme called an Ordinary Fuzzy Commitment Scheme (OFCS), in which many fuzzy commitment schemes with variety complexity...

    Provided By mecs-press

  • White Papers // Feb 2013

    Blocking of SQL Injection Attacks by Comparing Static and Dynamic Queries

    Due to internet expansion web applications have now become a part of everyday life. As a result a number of incidents which exploit web application vulnerabilities are increasing. A large number of these incidents are SQL Injection attacks which are a serious security threat to databases which contain sensitive information,...

    Provided By mecs-press

  • White Papers // Feb 2013

    A Practical Privacy Preserving E-Voting Scheme with Smart Card Using Blind Signature

    Voting is regarded as one of the most effective methods for individuals to express their opinions to select their democratic leader in the public elections. As the computing, communicating, and cryptographic techniques progress rapidly, increasing emphasis has been placed on developing electronic voting schemes capable of providing more efficient voting...

    Provided By mecs-press

  • White Papers // Oct 2013

    Study and Analysis of Text Steganography Tools

    Maintain the security of the secret information, this words has been a great challenge in the people day-to-day life. Sender can send messages regularly through a communication channel like Internet, draws the attention of third parties, hackers and crackers, perhaps causing attempts to break and expose the unusual messages. Steganography...

    Provided By mecs-press

  • White Papers // Oct 2013

    Performance Evaluation and Comparison of Network Firewalls Under DDoS Attack

    Network firewalls act as the first line of defense against unwanted and malicious traffic and also represent critical point of failure during DDoS attack. Predicting the overall firewall performance is crucial to network security administrators and designers in assessing the strength and effectiveness of network firewalls against DDoS attacks. In...

    Provided By mecs-press

  • White Papers // Aug 2013

    Security Algorithms for Mitigating Selfish and Shared Root Node Attacks in MANETs

    Mobile ad hoc network is a type of self configurable, dynamic wireless network in which all the mobile devices are connected to one another without any centralized infrastructure. Since, the network topology of MANETs changes rapidly. It is vulnerable to routing attacks than any other infrastructure based wireless and wired...

    Provided By mecs-press

  • White Papers // Sep 2013

    A Compression & Encryption Algorithm on DNA Sequences Using Dynamic Look Up Table and Modified Huffman Techniques

    In this paper, the authors discussed a new DNA compression algorithm whose key idea is dynamic LUT. This compression algorithm gives a good model for compressing DNA sequences that reveals the true characteristics of DNA sequences. The compression results of dynamic LUT for DNA sequences also indicate that their method...

    Provided By mecs-press

  • White Papers // May 2014

    A Survey for Replica Placement Techniques in Data Grid Environment

    In data grids, data replication on variant nodes can change some problems such as response time and availability. Also, in data replication, there are some challenges to finding the best replica efficiently in relation to performance and location of physical storage systems. In this paper, various replica placement strategies are...

    Provided By mecs-press

  • White Papers // Jun 2014

    AnAutomatic Approach to Detect Software Anomalies in Cloud Computing Using Pragmatic Bayes Approach

    Software detection of anomalies is a vital element of operations in data centers and service clouds. Statistical Process Control (SPC) cloud charts sense routine anomalies and their root causes are identified based on the differential profiling strategy. By automating the tasks, most of the manual overhead incurred in detecting the...

    Provided By mecs-press

  • White Papers // Jun 2014

    A Harmony Search Algorithm with Multi-pitch Adjustment Rate for Symbolic Time Series Data Representation

    The representation task in time series data mining has been a critical issue because the direct manipulation of continuous, high-dimensional data is extremely difficult to complete efficiently. One time series representation approach is a symbolic representation called the Symbolic Aggregate approXimation (SAX). The main function of SAX is to find...

    Provided By mecs-press

  • White Papers // Jun 2014

    Studies on ICT Usage in the Academic CampusUsing Educational Data Mining

    In the era of competition, change and complexity, innovation in teaching and learning practices in higher education sector has become unavoidable criteria. One of the biggest challenges that higher education system faces today is to assess the services provided through Information and Communication Technology (ICT) facilities installed in the campus....

    Provided By mecs-press

  • White Papers // Jun 2014

    Mathematical Modeling and Analysis of Network Service Failure in DataCentre

    World has become a global village. With the advent of technology, the concept of cloud computing has evolved a lot. Cloud computing offers various benefits in terms of storage, computation, cost and flexibility. It focuses on delivering combination of technological components such as applications, platforms, infrastructure, security and web hosted...

    Provided By mecs-press

  • White Papers // Feb 2014

    Classification via Clustering for Anonymization Data

    Due to the exponential growth of hardware technology particularly in the field of electronic data storage media and processing such data, has raised serious issues related in order to protect the individual privacy like ethical, philosophical and legal. Data mining techniques are employed to ensure the privacy. Privacy Preserving Data...

    Provided By mecs-press

  • White Papers // Jun 2014

    Router-based Content-aware Data Redirection for Future CDN Systems

    Delivery of data-enriched applications has become a top priority on the Internet, and Internet users are demanding faster and higher-quality services. Cater such requirements, Content Delivery Networks (CDNs) were introduced. However, the growth rate of information on the Internet requires infrastructural modifications to keep the consistency while maintaining quality of...

    Provided By mecs-press

  • White Papers // Nov 2013

    Goal Structured Requirement Engineering and Traceability Model for Data Warehouses

    Data warehouses are decision support systems that are specifically designed for the business managers and executives for reporting and business analysis. Data warehouse is a database that stores enterprise-wide data that can be used to deduce useful information. Business organizations can achieve a great level of competitive advantage by analyzing...

    Provided By mecs-press

  • White Papers // Nov 2013

    Implementation of Palm Print Biometric Identification System Using Ordinal Measures

    Personal identification is one of the most important requirements in all e-commerce and criminal detection applications. In this framework, a novel palm print representation method, namely orthogonal line ordinal features, is proposed. The palm print registration, feature extraction, palm print verification and palm print recognition modules are designed to manage...

    Provided By mecs-press

  • White Papers // Sep 2013

    Secluding Efficient Geographic Multicast Protocol against Multicast Attacks

    A Mobile Ad-hoc NETworks (MANETs) are composed of Mobile Nodes without any infrastructure. The network nodes in MANETs, not only act as ordinary network nodes but also as the routers for other peer devices. The dynamic topology, lack of a fixed infrastructure and the wireless nature make MANETs susceptible to...

    Provided By mecs-press

  • White Papers // Nov 2013

    Improving Situational Awareness for Precursory Data Classification using Attribute Rough Set Reduction Approach

    The issue of correlating, integrating and presenting related information to issue early warning to impending natural disasters by categorizing documents with the aid of knowledge-based features leverages information cannot be deduced from the documents alone. This also involves query based search based on machine learning methods that improves the acquisition...

    Provided By mecs-press

  • White Papers // Aug 2013

    A Face Recognition Approach Based on Entropy Estimate of the Nonlinear DCT Features in the Logarithm Domain Together With Kernel Entropy Component Analysis

    This paper exploits the feature extraction capabilities of the Discrete Cosine Transform (DCT) together with an illumination normalization approach in the logarithm domain that increase its robustness to variations in facial geometry and illumination. Secondly in the same domain the entropy measures are applied on the DCT coefficients so that...

    Provided By mecs-press

  • White Papers // Sep 2013

    Ontology Based Information Retrieval in Semantic Web: A Survey

    In present age of computers, there are various resources for gathering information related to given query like Radio Stations, Television, Internet and many more. Among them, Internet is considered as major factor for obtaining any information about a given domain. When a user wants to find some information, he/she enters...

    Provided By mecs-press

  • White Papers // Jul 2013

    Study and Performance Evaluation on Recent DDoS Trends of Attack & Defense

    Distributed Denial of Service attacks are exercised by attackers in various forms. These attacks vary from single attacking source to a networked attacking infrastructure. They also vary in degree of automation, from manual efforts to fully automated attacks. In networked form, a botnet of attacking sources is created. These machines...

    Provided By mecs-press

  • White Papers // Jun 2013

    Service Oriented Architecture for Remote Sensing Satellite Telemetry Data Implemented on Cloud Computing

    This paper articulates how Service Oriented Architecture (SOA) and cloud computing together can facilitate technology setup in TeleMetry (TM) processing with a case study from the Egyptian Space Program (ESP) and a comparative study with Space Situational Awareness (SSA) program in European Space Agency (ESA), Moreover, this paper illustrates how...

    Provided By mecs-press

  • White Papers // May 2013

    An Efficient IBE Scheme using IFP and DDLP

    In this system, each user needs to visit a Private Key Generation (PKG) and identify him-self before joining a communication network. Once a user is accepted, the PKG will provide him with a secret key. In this way, if a user wants to communicate with others, he only needs to...

    Provided By mecs-press

  • White Papers // May 2013

    Secured and Optimized AODV for Wireless Sensor Networks

    Similar to conventional wireless networks, WSNs are based on multi hop routing to ensure connectivity and data forwarding which makes the routing service a challenging task due to the nature of sensors usually limited in memory, battery and computing capacities as well as the nature of the environment which is...

    Provided By mecs-press

  • White Papers // Apr 2013

    The Extensive Bit-level Encryption System (EBES)

    Due to the growing need to protect the confidentiality of information, there is a rising demand for an encryption algorithm that can protect data of every format, size and type. In this paper, the authors has been introduced the Extensive Bit-level Encryption System (EBES), a bit-level encryption mechanism. It is...

    Provided By mecs-press

  • White Papers // Apr 2013

    Semantic Multi-granular Lock Model for Object Oriented Distributed Systems

    In Object Oriented Distributed Systems (OODS), the objects are viewed as resources. Concurrency control techniques are usually applied on the database tier. This has the limitations of lack of support of legacy files and requirement of separate concurrency control mechanisms for each database model. Hence concurrency control on the objects...

    Provided By mecs-press

  • White Papers // Feb 2013

    Internet Passport Authentication System Using Multiple Biometric Identification Technology

    Electronic Passports (E-Passports) have known a wide and fast deployment all around the world since the International Civil Aviation Organization (ICAO) the world has adopted standards whereby passports can store biometric identifiers. The purpose of biometric passports is to prevent the illegal entry of traveler into a specific country and...

    Provided By mecs-press

  • White Papers // Feb 2013

    A Novel and Efficient Method for Protecting Internet Usage From Unauthorized Access Using Map Reduce

    The massive increases in data have paved a path for distributed computing, which in turn can reduce the data processing time. Though there are various approaches in distributed computing, Hadoop is one of the most efficient among the existing ones. Hadoop consists of different elements out of which Map Reduce...

    Provided By mecs-press

  • White Papers // Jan 2013

    Self-organized Detection of Relationships in a Network

    Multistate operations within a network result in high-dimensional, multivariate temporal data, and are useful for systems, which monitor access to network entities like resources, objects, etc. Efficient self organization of such multistate network operations stored in databases with respect to relationships amongst users or between a user and a data...

    Provided By mecs-press

  • White Papers // Nov 2012

    Performance Analysis of Most Common Encryption Algorithms on Different Web Browsers

    The hacking is the greatest problem in the Wireless Local Area Network (WLAN). Many algorithms like DES, 3DES, AES,UMARAM, RC6 and UR5 have been used to prevent the outside attacks to eavesdrop or prevent the data to be transferred to the end-user correctly. The authors have proposed a Web programming...

    Provided By mecs-press

  • White Papers // Oct 2009

    An Improved Text Clustering Method based on Hybrid Model

    According to the high-dimensional sparse features on the storage of textual document, and defects existing in the clustering methods or the hybrid methods which have already been studied by now and some other problems. So an improved text clustering method based on hybrid model, that is a text clustering approach...

    Provided By mecs-press

  • White Papers // May 2011

    Tuning Schema Matching Systems using Parallel Genetic Algorithms on GPU

    Most recent schema matching systems combine multiple components, each of which employs a particular matching technique with several knobs. The multi-component nature has brought a tuning problem, that is to determine which components to execute and how to adjust the knobs (e.g., thresholds, weights, etc.) of these components for domain...

    Provided By mecs-press

  • White Papers // Jul 2013

    Networked Control System - A Survey

    Networked Control System (NCS) is a synthetic application which combines control science, computer science and network technology. It is a kind of feedback control systems wherein the control loops are closed through real time control network. NCS technology is applied in industry control system because of its simple structure, easy...

    Provided By mecs-press

  • White Papers // Dec 2013

    Throughput and Delay Analysis of Database Replication Algorithm

    Database management systems are among the most important systems that are driving the information transfer and storage functionality. Recently, (PDDRA) a Pre-fetching based Dynamic Data Replication Algorithm has been published. In the authors' previous paper, modifications to the algorithm have been suggested to minimize the delay in data replication. In...

    Provided By mecs-press

  • White Papers // Apr 2013

    Low-Cost and Optimized Two Layers Embedded Board Based on ATmega32L Microcontroller and Spartan-3 FPGA

    Microcontrollers and FPGAs both are widely used in digital system design. Microcontroller-based instruments are becoming increasingly widespread. This paper presents design and implementation of a new low-cost and minimum embedded board based on ATMEGA32L AVR microcontroller and Spartan-3 (XCS400-4PQG208C) FPGA in two layers with mount elements on top and button...

    Provided By mecs-press

  • White Papers // Jul 2013

    All-Optical Parity Circuits Using Nonlinear Directional Coupler

    Since in the previous existing optical designs, the electronic-optic-electronic conversion has not been completely eliminated. Construction of the optical circuits with nonlinear waveguides can overcome this drawback. The authors have developed a nonlinear directional coupler theory to describe novel all-optical parity circuits. By using three channels, appropriate adjusting of the...

    Provided By mecs-press