mecs-press

Displaying 241-280 of 809 results

  • White Papers // Apr 2011

    A Weighed Least Square TDOA Location Algorithm for TDMA Multi-target

    In order to improve the location precision of multiple targets in a Time Division Multiple Address (TDMA) system, a new weighed least square algorithm is presented for multi-target ranging and locating. According to the time synchronization of the TDMA system, the range difference model between multiple targets is built using...

    Provided By mecs-press

  • White Papers // Apr 2011

    Research of NCS Real-time Performance with Judging Priority Based on Generalized Stability

    The conceptions of generalized stability and priority judgment function of real-time node which guaranteed the generalized stability were put forward aiming at the problem of Networked Control System (NCS) real-time performance based on shared Ethernet. From the perspective of control theory and communication theory, generalized stability and priority judgment function...

    Provided By mecs-press

  • White Papers // Apr 2011

    A Novel Approach to Simulate DDoS Attack

    Due to the rapid spread of botnets, distributed denial of service attacks have become more and more frequent and fatal. In order to detect and defend DDoS attack, many researchers have been done, such as using NS2 to simulate such attacks. However, the major bottlenecks in large-scale network simulation are...

    Provided By mecs-press

  • White Papers // Apr 2011

    Fast Matching Algorithm Based on Fingerprint Classification Information

    In this paper, the authors focus on fingerprint minutia matching algorithm. A special minutia neighbor structure is proposed during the matching process in this algorithm. It can locate fingerprints using the singular from classification information. In addition, minutia structure can be used to save the time of matching minutia in...

    Provided By mecs-press

  • White Papers // Apr 2011

    Discussion on IGMP Snooping and Its Sequence in Industrial Applicaiton

    In this paper, the authors have an introduction on a new intelligent controller for industrial Ethernet with IGMP: Intelligent Controller for Industrial Ethernet (ICIE). It proposed a new mechanism to minimize the congestion which is based on the taking an adaptive decision during transferring multicast messages. It also focuses on...

    Provided By mecs-press

  • White Papers // Apr 2011

    An Incentive Compatible Reputation Model for P2P Networks

    An important challenge regarding peer's trust assessment in Peer-To-Peer (P2P) networks is how to cope with such issues as the fraudulent behaviors and the dishonest feedback behaviors from malicious peers, and the issue of inactive recommendations to others. However, these issues cannot be effectively addressed by the existing solutions. Thus,...

    Provided By mecs-press

  • White Papers // Feb 2011

    Application of PKI in Encrypting Communications and Verifying Identities of Users in the Internet Banking

    In this paper, the authors analyzes and researches the theories of the encryption communications and identities authentication over the Internet banking based on the PKI technology. Combined with the specific Internet banking system, this research tries to design Internet banking system communication encryption and identities verification and the workflow and...

    Provided By mecs-press

  • White Papers // Feb 2011

    Application of Digital Mockup Technology

    With the development of virtual prototyping technology, computer simulation has been used in product design as checking and optimizing product design. The users can test product model, simulate test and estimate product by means of digital analyzing technology. They can improve product efficiency and reduce cost when they improve design....

    Provided By mecs-press

  • White Papers // Feb 2011

    Detecting Polymorphic Buffer Overflow Exploits with a Static Analysis Approach

    Remote exploit attacks are the most serious threats in network security area. Polymorphism is a kind of code-modifying technique used to evade detection. A novel approach using static analysis methods is proposed to discover the polymorphic exploit codes hiding in network data flows. The idea of abstract execution is firstly...

    Provided By mecs-press

  • White Papers // Nov 2014

    A Study and Review on the Development of Mutation Testing Tools for Java and Aspect-J Programs

    Mutation analysis in software testing is observed as the most effective way to validate the software under inspection. In last decade, number of researchers developed various methods and tools to apply mutation testing on aspect oriented programs. In this paper, the authors analyzed numerous mutation testing based tools available to...

    Provided By mecs-press

  • White Papers // Nov 2014

    Novel Classification Method Using Hybridization of Fuzzy Clustering and Neural Networks for Intrusion Detection

    In this paper, the authors propose a hybrid classifier using fuzzy clustering and several neural networks has been proposed. With using the fuzzy C-means algorithm, training samples will be clustered and the inappropriate data will be detected and moved to another dataset (removed-dataset) and used differently in the classification phase....

    Provided By mecs-press

  • White Papers // Aug 2011

    A Scheme on PN Code Tracking of DS/FH Signals for Telemetry, Tracking, and Commanding (TT&C)

    The impact of Doppler frequency hopping on code tracking performance is simulated. A design on Pseudo-Noise (PN) Code tracking loop aided by the carrier tracking loop according to the carrier frequency hopping pattern is proposed in this paper. This scheme can be applied in the telemetry, tracking, and commanding system...

    Provided By mecs-press

  • White Papers // Aug 2011

    A New Ranging Technique for IEEE 802.16e Uplink

    Aiming at the shortcomings of the traditional ranging algorithm, this paper proposes a new ranging technique for 802.16e uplink in the frequency domain. The ranging technique eliminates the effect of the timing offset by computing the frequency difference of adjacent sub-carriers in the ranging channel, which reduces the search space...

    Provided By mecs-press

  • White Papers // Aug 2011

    Privacy Preserving Similarity Measurement

    Data similarity measurement is an important direction for data mining research. This paper is concentrated on the issue of protecting the underlying attribute values when sharing data for the similarity of objects measurement and proposes a simple data transformation method: Isometric-Based Transformation (IBT). IBT selects the attribute pairs and then...

    Provided By mecs-press

  • White Papers // Aug 2011

    Next Generation Campus Network Deployment Project Based on Softswitch

    After analyzing the current networks, the authors brought forward a scheme of next generation campus networks based on soft-switch technology by choosing SoftX3000 switching system of HuaWei and provided the specific solution of accessing campus networks in this paper. It is proved that this scheme is feasible by using OPNET,...

    Provided By mecs-press

  • White Papers // Aug 2011

    A New Joint Antenna Selection Algorithm Based on Capacity

    Antenna selection in MIMO systems can increase the system capacity; reduce the MIMO system complexity and cost of radio links effectively. In this paper, a new joint antenna selection algorithm was presented which can adaptively change the number of the selected transmitting and receiving antenna number according to the channel...

    Provided By mecs-press

  • White Papers // Aug 2011

    A New Three-party Key Exchange Protocol Based on Diffie-Hellman

    An important problem in cryptography is how to create keys in exchange protocol, such as DES or AES, especially when two parties are far away. The goal of key exchange protocol is to establish a common and secure session key using the interactive communications. The existing schemes are usually in...

    Provided By mecs-press

  • White Papers // Aug 2011

    Relative Distance Based Routing for Delay Tolerant Mobile Sensor Network

    Delay Tolerant Mobile Sensor Network (DTMSN) is the network for pervasive information gathering. Traditional static routing approaches may not fit for DTMSN due to its intermittent connectivity. This paper proposes a Relative Distance Based Routing (RDBR) strategy for DTMSN, in which nodes delivery probabilities are calculated and updated according to...

    Provided By mecs-press

  • White Papers // Jun 2011

    A Comprhensive CBVR System Based on Spatiotemporal Features Such as Motion,Quantized Color and Edge Density Features

    Rapid development of the multimedia and the associated technologies urge the processing of a huge database of video clips. The processing efficiency depends on the search methodologies utilized in the video processing system. Use of inappropriate search methodologies may make the processing system ineffective. Hence, an effective video retrieval system...

    Provided By mecs-press

  • White Papers // Jun 2011

    Polynomial Algorithm for Node Deployment in Hybrid Wireless Sensor Networks

    When detecting a target or monitoring a physical phenomenon in a region, the deployment problem is fundamental in these applications. Traditionally, stationary sensor networks are deployed to carry out the sensing operations. It is well known that the mobility of sensor nodes can improve the coverage and the probability of...

    Provided By mecs-press

  • White Papers // Jun 2011

    Enlightenment on Computer Network Reliability From Transportation Network Reliability

    In the early decades of computer age, the most important characteristic of a computer system was its speed. Thus, computers were usually judged by how fast they could perform a given task, and techniques were developed to predict it. Now with the acceleration of social information, not only does users...

    Provided By mecs-press

  • White Papers // Jun 2011

    A Scalable Simulation Method for Network Attack

    With the rapid development of network technology, the number of network security threats grows more quickly. As the members of the network interconnection use network protocols and network protocol itself is a highly complex set, also some programmers do not have rigorous programming habit, attacks against network protocols continue happens....

    Provided By mecs-press

  • White Papers // Jun 2011

    A QoS Multicast Routing in TDMA-Based MANET Using Directional Antennas

    In this paper, the authors propose a Quality of Service (QoS) multicast routing protocol in Mobile Ad hoc NETworks (MANET) using directional antennas has been presented. Many important applications, such as audio/video conferencing, require the quality of service guarantee. Directional antenna technology provides the capability for considerable increase in spatial...

    Provided By mecs-press

  • White Papers // Jun 2011

    The Study on Formal Verification of OS Kernel

    There is increasing pressure on providing a high degree of assurance of operation system's security and functionality. Formal verification is the only known way to guarantee that a system is free of programming errors. The authors study on formal verification of operation system kernel in system implementation level and take...

    Provided By mecs-press

  • White Papers // Dec 2011

    A New Half-Blind Algorithm of Smart Antenna for Mobile Terminal

    Since the limitation of size, power consumption cost and other factors of smart antenna, the complexity of algorithm should be low, simple and fast convergence by the general requirements. So selecting an appropriate algorithm is a key issue. The core of smart antenna is its adaptive algorithm. For the characteristics...

    Provided By mecs-press

  • White Papers // Dec 2011

    Analysis of Trusted Identity Based Encryption (IBE-Trust) Protocol for Wireless Sensor Networks

    The peculiarity of Wireless Sensor Networks (WSNs) demands extra consideration during the design of the security protocol. One of the most challenging yet important security features in Wireless Sensor Network (WSN) is in establishing trusted communication between sensor node and base station. While the term trusted has been widely used...

    Provided By mecs-press

  • White Papers // Dec 2011

    Defending Against LDoS Attacks Using Fair AQM

    According to the instant high rate and high intensity of Low-rate Denial-of-Service (LDoS) attacks, this paper explores using fair queue management mechanism to mitigate their effect. The authors perform simulation experiments to evaluate the performance of fair AQM FRED and CHOKe under LDoS attacks. The simulation results show that they...

    Provided By mecs-press

  • White Papers // Dec 2011

    A Structured Multi-signature Scheme Against Forgery Attack

    Digital signature is one of the important problems of cryptography, it is a simulation of traditional handwritten signatures, and can realize sign electronic news. General digital signature scheme includes three processes: system initialization procedures, signature generating process and signature verification process. There are some classic structured multi-signature programs, such as...

    Provided By mecs-press

  • White Papers // Oct 2011

    Frameproof Codes Based on the Generalized Difference Function Families

    Frameproof codes with tracing baleful users' property are often used for copyright and piracy tracing. Researcher used a kind of function family satisfying some special properties to construct several kinds of anti-pirate codes. Frameproof code is a kind of anti-pirate code. The frame-proof codes are used in copyright protecting. Motivated...

    Provided By mecs-press

  • White Papers // Oct 2011

    An Improved Dynamic Probabilistic Packet Marking Algorithm

    Denial-of-Service (DoS) attacks pose an increasing threat to the network systems in recent years as they are simple to implement, hard to prevent, and difficult to trace. An improved dynamic probabilistic packet marking algorithm named IDPPM is presented, which not only can reduce the marking overhead of routers near the...

    Provided By mecs-press

  • White Papers // Oct 2011

    Reduction of Feedback Based-on User Traffic Rate in OFDM Relay System

    In order to reduce feedback while maintaining user performance in multiuser Orthogonal Frequency Division Multiplexing (OFDM) relay system, feedback mechanism based on user traffic rate is proposed. From the aspects of feedback outage probability, user weighted channel gain related to user traffic rate is compared with the system threshold. The...

    Provided By mecs-press

  • White Papers // Oct 2011

    Power Allocation for Balancing Spectrum Efficiency and Power Consumption in Cognitive Relay Networks

    In order to guarantee the QoS requirement of secondary users and not to affect the outage probability of primary user in cognitive relay networks, the authors propose two optimal power allocation models: maximizing the transmission rate of secondary users; minimizing the total power consumption. Theory analysis shows that two optimal...

    Provided By mecs-press

  • White Papers // Oct 2011

    A Multicast Routing Mechanism in Mobile Ad Hoc Network Through Label Switching

    Efficient multicasting in Mobile Ad hoc NETwork (MANET) faces challenges not encountered in other types of networks such as the mobility of nodes, the tenuous status of communication links, limited resources, and indefinite knowledge of the network topology. Merging MPLS into multicast routing protocol in Mobile Ad hoc NETwork (MANET)...

    Provided By mecs-press

  • White Papers // Oct 2011

    A Trust Evaluation Model for Industrial Control Ethernet Network

    Industrial control Ethernet networks are more important in connecting with equipments each other of enterprise comprehensive automation and integrating information. With the explosive growth of network techniques, the traditional control networks can no longer satisfy the security demands on network connectivity, data storage and information exchanges. New types of networks...

    Provided By mecs-press

  • White Papers // Oct 2011

    Cross Layer Design and Performance Analysis of HARQ Schemes in Multi-Relay Networks

    In this paper, the authors propose a cross-layer design combining Adaptive Modulation and Coding (AMC) at the physical layer with a Hybrid Automatic Repeat reQuest (HARQ) protocol at the data link layer in multi-relay networks with imperfect Channel State Information (CSI). Based on a simple and distributed relay selection strategy,...

    Provided By mecs-press

  • White Papers // Aug 2011

    Study on the Distribution of Networked Devices' Clock Skew

    Clock skews of devices on the Internet are viewed as one way delay noise, but their distribution is unknown. The authors explore the distribution of clock skews to see the conflict probability. In this paper, they introduce an accurate clock skew estimation algorithm to filter inaccurate clock skew estimation by...

    Provided By mecs-press

  • White Papers // Oct 2012

    Optical Packet Switch Architectures: A Comparative Study

    In this paper, four fiber-loop-buffer based photonic packet switched architectures are compared. It is done in terms of their packet loss probability and their optical cost under various load conditions for the random traffic model. The recirculating type delay lines are used for the storage of packets to resolve the...

    Provided By mecs-press

  • White Papers // Sep 2012

    MIMO Capacity Analysis Using Adaptive Semi Blind Channel Estimation with Modified Precoder and Decoder for Time Varying Spatial Channel

    Multiple Input Multiple Output (MIMO) has been in much importance in recent past because of high capacity gain over a single antenna system. In this paper, analysis over the capacity of the MIMO channel systems with spatial channel with modified pre-coder and decoder has been considered when the Channel State...

    Provided By mecs-press

  • White Papers // Sep 2012

    Location Based Recommendation for Mobile Users Using Language Model and Skyline Query

    Location based personalized recommendation has been introduced for the purpose of providing a mobile user with interesting information by distinguishing they preference and location. In most cases, mobile user usually does not provide all attributes of their preference or query. In extreme case, especially when mobile user is moving, the...

    Provided By mecs-press

  • White Papers // Aug 2012

    Study the Performance of SLM for Different Number of Subcarriers

    Orthogonal Frequency Division Multiplexing (OFDM) is an attractive modulation technique for transmitting large amounts of digital data over radio waves. One major disadvantage of OFDM is that the time domain OFDM signal which is a sum of several sinusoids leads to high Peak to Average Power Ratio (PAPR) which leads...

    Provided By mecs-press