mecs-press

Displaying 201-240 of 809 results

  • White Papers // Feb 2014

    Design Modified Sliding Mode Controller with Parallel Fuzzy Inference System Compensator to Control of Spherical Motor

    The increasing demand for multi-Degree-Of-Freedom (DOF) actuators in a number of industries has motivated a flurry of research in the development of non-conventional actuators, spherical motor. This motor is capable of providing smooth and isotropic three-dimensional motion in a single joint. Not only can the spherical motor combine 3-DOF motion...

    Provided By mecs-press

  • White Papers // Feb 2014

    Design New Robust Self Tuning Fuzzy Backstopping Methodology

    In this paper, the authors focused on proposed Proportional-Integral (PI) like fuzzy adaptive backstopping fuzzy algorithms based on Proportional-Derivative (PD) fuzzy rule base with the adaptation laws derived in the Lyapunov sense. Adaptive SISO PI like fuzzy adaptive backstopping fuzzy method has two main objectives; the first objective is design...

    Provided By mecs-press

  • White Papers // Jan 2014

    Defending Against Malicious Threats in Wireless Sensor Network: A Mathematical Model

    Wireless sensor networks offer a powerful combination of distributed sensing, computing and communication. They lend themselves to countless applications and at the same time constrained by limited battery life, processing capability, memory and bandwidth which makes it soft target of malicious objects such as virus and worms. The authors study...

    Provided By mecs-press

  • White Papers // Jan 2014

    Efficient Analysis of Pattern and Association Rule Mining Approaches

    The process of data mining produces various patterns from a given data source. The most recognized data mining tasks are the process of discovering frequent itemsets, frequent sequential patterns, frequent sequential rules and frequent association rules. Numerous efficient algorithms have been proposed to do the above processes. Frequent pattern mining...

    Provided By mecs-press

  • White Papers // Jan 2014

    Improvised Scout Bee Movements in Artificial Bee Colony

    In the basic Artificial Bee Colony (ABC) algorithm, if the fitness value associated with a food source is not improved for a certain number of specified trials then the corresponding bee becomes a scout to which a random value is assigned for finding the new food source. Basically, it is...

    Provided By mecs-press

  • White Papers // Jan 2014

    Mobile Communication Evolution

    Presently, there is a wide establishment of mobile computing across the globe and the number of subscribers worldwide is on the increase every day. It started with mobile voice communication and has gradually been extended to the capability of sending and receiving data across the cellular networks. Also, the coming...

    Provided By mecs-press

  • White Papers // Jan 2014

    Highlighting the role of Requirement Engineering and User Experience Design in Product Development Life Cycle

    Product Development Life Cycle (PDLC) has been evolving from last decade from side to side unremitting progression of finest practices, process models and advance life cycles. Already present development models like rational unified process, waterfall model and spiral model have facilitated the people, who are being practicing the new models,...

    Provided By mecs-press

  • White Papers // Jan 2014

    Performance Analysis of Differential Evolution Algorithm based Beamforming for Smart Antenna Systems

    In this paper, the authors present smart antenna array beamforming using differential evolution algorithm. The excitation values of the elements in the array are smartly adjusted to control side lobe levels and placing nulls in the interference signal direction while maintaining the beam in the desired signal direction. Different cases...

    Provided By mecs-press

  • White Papers // Jan 2014

    Interference Mitigation Techniques for Spectral Capacity Enhancement in GSM Networks

    Random Frequency Hopping (FH) is a key feature of GSM networks that allows for capacity enhancement. The increased co-channel interference experienced in networks with tight frequency reuse schemes can be mitigated by adopting frequency hopping. Frequency hopping diversifies the interference signals over sparse transmitted bursts. This effect is called interference...

    Provided By mecs-press

  • White Papers // Jan 2014

    Effect of Noise on the Average Received SNR of Different Combining Schemes

    In wireless communication system, the multipath fading affects the performance of the system. Diversity-combining scheme is one of the powerful tools to mitigate the effect of fading. The multiple antennas provide an improvement in the capacity and reliability of the system. The performance of four combining schemes - Selection Combining...

    Provided By mecs-press

  • White Papers // Jan 2014

    A Machine Learning based Efficient Software Reusability Prediction Model for Java Based Object Oriented Software

    Software reuse refers to the development of new software systems with the likelihood of completely or partially using existing components or resources with or without modification. Reusability is the measure of the ease with which previously acquired concepts and objects can be used in new contexts. It is a promising...

    Provided By mecs-press

  • White Papers // Jan 2014

    A Comparison Study on Selective Traffic Models with Handoff Management Scheme for Wireless Mobile Network Infrastructure

    Wireless and mobile network infrastructure services generally examine how different infrastructure providers are positioning themselves to compete in wireless services. These services analyze the opportunities and challenges facing by the infrastructure providers selling to wireless and mobile network operators worldwide. The opportunities and challenges are the review of strategies, market...

    Provided By mecs-press

  • White Papers // Jan 2014

    Implementation of Enhanced Security Algorithms in Mobile Ad hoc Networks

    Mobile ad hoc networks are wireless infrastructure fewer networks can be easily formed or deployed due to its simple infrastructure. Security has become a primary concern in order to provide protected communication between mobile nodes in a hostile environment. The main objective of this work is to enhance the performance...

    Provided By mecs-press

  • White Papers // Jan 2014

    Hybrid Intrusion Detection Using Ensemble of Classification Methods

    One of the major developments in machine learning in the past decade is the ensemble method, which finds highly accurate classifier by combining many moderately accurate component classifiers. In this paper, new ensemble classification methods are proposed for homogeneous ensemble classifiers using bagging and heterogeneous ensemble classifiers using arcing classifier...

    Provided By mecs-press

  • White Papers // Jan 2014

    Minimization of Power Consumption in Mobile Ad hoc Networks

    An ad hoc network is a mobile wireless network that has no fixed access point or centralized infrastructure. Each node in the network functions as a mobile router of data packets for other nodes and should maintain the network routes for long standing which is not possible due to limited...

    Provided By mecs-press

  • White Papers // Jan 2014

    A Novel Mutual RFID Authentication Protocol with Low Complexity and High Security

    Radio Frequency IDentification (RFID) is a method for automated identifying objects. One of the problems of this technology is its security. RFID tags include resource limitation; therefore, the system designers cannot implement complex circuits to enhance their security. Usually the symmetric and asymmetric encryption methods increase resources and cost. Because...

    Provided By mecs-press

  • White Papers // Jan 2014

    Secure and Dynamic Model for Book Searching on Cloud Computing as Mobile Augmented Reality

    Availability of internet on different devices like smart phones like android based, IOs based, windows based and PDA etc. has brought into the evolution of mobile cloud computing, which is a vast side of research nowadays. Internet connectivity has become very easy with the evolution of Wi-Fi; everyone can access...

    Provided By mecs-press

  • White Papers // Jan 2014

    Reference Threshold Calculation for Biometric Authentication

    In biometric systems, reference threshold is defined as a value that can decide the authenticity of a person. Authenticity means whether the person is genuine or intruder. The statistical calculation of various values like reference threshold, FAR (False Acceptance Rate), FRR (False Rejection Rate) is required for real-time automated biometric...

    Provided By mecs-press

  • White Papers // Jan 2014

    Distributed Denial of Service Attacks: A Review

    A Wireless Sensor Network (WSN) is a wireless network consisting of spatially distributed autonomous devices using sensors to monitor physical or environmental conditions.WSN is a flourishing network that has numerous applications and could be used in diverse scenarios. DDoS (Distributed Denial of Service) is an attack where a number of...

    Provided By mecs-press

  • White Papers // Jan 2014

    An Integrated Agent-Based Architecture and Performance Optimization of VANET using Agent Packet Size Reduction Process

    The advancements of Information Technology have led to many developments that make life easier and faster with high reachability and efficiency. There is a drastic improvement in the area of distributed applications with the advent of mobile agent technology over the usual client/server framework. Applying mobile agent technology in the...

    Provided By mecs-press

  • White Papers // Jan 2014

    Grid Approach with Metadata of Messages in Service Oriented Architecture

    Service orientation architecture is playing a vital role in the middleware and enterprise organizations through its key design principles and there are many benefits of it as well. Loose Coupling between services is one of its design principles that help system or architecture to maintain its efficiency because services are...

    Provided By mecs-press

  • White Papers // Jan 2014

    E-mail Spam Filtering Using Adaptive Genetic Algorithm

    Now-a-days everybody email inbox is full with spam mails. The problem with spam mails is that they are not malicious in nature so generally don't get blocked with firewall or filters etc., however, they are unwanted mails received by any internet users. In 2012, more that 50% emails of the...

    Provided By mecs-press

  • White Papers // Jan 2014

    Strategic Sensor Placement for Intrusion Detection in Network-Based IDS

    Network Intrusion Detection Systems (NIDSs) can be composed of a potentially large number of sensors, which monitor the traffic flowing in the network. Deciding where sensors should be placed and what information they need in order to detect the desired attacks can be a demanding task for network administrators, one...

    Provided By mecs-press

  • White Papers // Jan 2014

    Performance Analysis of Multi Functional Bot System Design Using Microcontroller

    In this paper the authors include performance analysis of a multipurpose microcontroller based system which has various modes to control distinct applications. The paper elucidates how a single chip microcontroller can process different signals and accomplish different tasks. The system discussed in this paper has seven modes. Each mode controls...

    Provided By mecs-press

  • White Papers // Jan 2014

    Fuzzy Predictive Control of Step-Down DC-DC Converter Based on Hybrid System Approach

    In this paper, the authors proposed a fuzzy predictive control scheme for controlling output voltage of a step-down DC-DC converter in presence of disturbance and uncertainty. The DC-DC converter is considered as a hybrid system and modeled by mixed logical dynamical modeling approach. This paper is to design a fuzzy...

    Provided By mecs-press

  • White Papers // Jan 2014

    Quality Model and Artificial Intelligence Base Fuel Ratio Management with Applications to Automotive Engine

    In this paper, the authors manage the Internal Combustion (IC) engine modeling and a multi-input-multi-output artificial intelligence baseline chattering free sliding mode methodology scheme is developed with guaranteed stability to simultaneously control fuel ratios to desired levels under various air flow disturbances by regulating the mass flow rates of engine...

    Provided By mecs-press

  • White Papers // Dec 2013

    Spam Mail Detection through Data Mining - A Comparative Performance Analysis

    As web is expanding day by day and people generally rely on web for communication so e-mails are the fastest way to send information from one place to another. Now-a-days all the transactions and all the communication, whether general or of business taking place through e-mails. E-mail is an effective...

    Provided By mecs-press

  • White Papers // Dec 2013

    Throughput and Delay Analysis of Database Replication Algorithm

    Database management systems are among the most important systems that are driving the information transfer and storage functionality. Recently, (PDDRA) a Pre-fetching based Dynamic Data Replication Algorithm has been published. In the authors' previous paper, modifications to the algorithm have been suggested to minimize the delay in data replication. In...

    Provided By mecs-press

  • White Papers // Dec 2013

    A Survey of Unipath Routing Protocols for Mobile Ad Hoc Networks

    A MANET (Mobile Ad hoc NETwork) is an interconnection of mobile devices by wireless links forming a dynamic topology without much physical network infrastructure such as routers, servers, access points/cables or centralized administration. Routing is a mechanism of exchanging data between the source node and the destination node. Several protocols...

    Provided By mecs-press

  • White Papers // Dec 2013

    An Image Encryption Scheme Based on Bit Circular Shift and Bi-directional Diffusion

    A novel image encryption scheme based on chaotic system is proposed. The proposed encryption scheme utilizes one tent map to generate a pseudo-random sequence and then shift the bits of the expanding 0-1 image circularly so as to shuffle the image gray values. To make the encryption scheme resist differential...

    Provided By mecs-press

  • White Papers // Dec 2013

    Energy-Efficient Secure Directed Diffusion Protocol for Wireless Sensor Networks

    In wireless sensor networks, it is crucial to design and employ energy-efficient communication protocols, since nodes are battery-powered and thus their lifetimes are limited. Such constraints combined with a great number of applications used in these networks, pose many challenges (limited energy and low security) to the design and management...

    Provided By mecs-press

  • White Papers // Dec 2013

    FSM Circuits Design for Approximate String Matching in Hardware Based Network Intrusion Detection Systems

    In this paper, the authors present a logical circuits design for approximate content matching implemented as Finite State Machines (FSM). As network speed increases the software based Network Intrusion Detection and Prevention Systems (NIDPS) are lagging behind requirements in throughput of so called deep package inspection - the most exhaustive...

    Provided By mecs-press

  • White Papers // Dec 2013

    Social Network Clustering

    As the users' know, the datasets related to social networks are increasing. There are different procedures to analyze these types of datasets; one of these procedures is clustering which makes communities of social data. Random walk is a process which can find communities in a network, in other words when...

    Provided By mecs-press

  • White Papers // Dec 2013

    A New Fault Detection Method Using End-to-End Data and Sequential Testing for Computer Networks

    Fault localization, a central part of network fault management, is a process of deducing the exact source of a failure from a set of observed failure indications. in the network, end systems and hosts communicate through routers and links connecting them. When a link or a router faces with a...

    Provided By mecs-press

  • White Papers // Dec 2013

    Management of Automotive Engine Based on Stable Fuzzy Technique With Parallel Sliding Mode Optimization

    The Internal Combustion (IC) engine is designed to produce power from the energy that is contained in its fuel. More specifically, its fuel contains chemical energy and together with air, this mixture is burned to output mechanical power. Both fuzzy logic and sliding mode can compensate the steady-state error of...

    Provided By mecs-press

  • White Papers // Dec 2013

    Metrics for Evaluating Pervasive Middleware

    Pervasive computing aims at developing smart environments which enable user to interact with other devices. Pervasive computing includes a middleware to support interoperability, heterogeneity and self-management among different platforms. It provides efficient communications and context awareness among devices. Middleware for pervasive computing provides much more attention to coordinate the devices...

    Provided By mecs-press

  • White Papers // Dec 2013

    Design High Efficiency Intelligent Robust Back stepping Controller

    The increasing demand for multi-Degree-Of-Freedom (DOF) continuum robot in presence of highly nonlinear dynamic parameters in a number of industries has motivated a flurry of research in the development of soft computing nonlinear methodology. This research contributes to the on-going research effort by exploring alternate methods for controlling the continuum...

    Provided By mecs-press

  • White Papers // Dec 2013

    A Meta Level Data Mining Approach to Predict Software Reusability

    Software repositories contain wealth of information about software code, designs, execution history, code and design changes, bug database, software release and software evolution. To meet increased pressure of releasing updated or new versions of software systems due to changing requirements of stakeholder, software are rarely built from scratch. Software reusability...

    Provided By mecs-press

  • White Papers // Nov 2013

    Cloud Computing Ensembles Agile Development Methodologies for Successful Project Development

    In today's IT world combination of AD (Agile Development) and CC (Cloud Computing) is a good recipe for the user needs fulfillment in efficient manners. This combination brings superiority for both worlds, Agile and Cloud. CC opportunities are optimized by AD processes for iterative software releases and getting more frequent...

    Provided By mecs-press

  • White Papers // Nov 2013

    A Biometric Based: 3-D Ear Recognition System Combining Local and Holistic Features

    This paper introduces an improved ear recognition approach based on 3 dimensional key point matching and combining local and holistic features. At first, the 3D key points are detected using the shape index image. The system consists of four primary steps: ear image segmentation; local feature extraction and matching; holistic...

    Provided By mecs-press