mecs-press

Displaying 241-280 of 371 results

  • White Papers // Dec 2013

    Spam Mail Detection through Data Mining - A Comparative Performance Analysis

    As web is expanding day by day and people generally rely on web for communication so e-mails are the fastest way to send information from one place to another. Now-a-days all the transactions and all the communication, whether general or of business taking place through e-mails. E-mail is an effective...

    Provided By mecs-press

  • White Papers // Aug 2013

    Design and Development MIPS Processor Based on a High Performance and Low Power Architecture on FPGA

    In this paper the authors present the design and development of a high performance and low power MIPS microprocessor and implementation on FPGA. In this method they for achieving high performance and low power in the operation of the proposed microprocessor use different methods including, unfolding transformation (parallel processing), C-slow...

    Provided By mecs-press

  • White Papers // May 2011

    Development of Networked Virtual Experiment System Based on Virtual Campus

    Virtual Reality (VR) has found many applications in education; and the resources of virtual education such as virtual campus, virtual laboratory etc. are used more and more widely, especially in the field of higher education. But so far virtual campus was mainly regarded as a means of image exhibition, and...

    Provided By mecs-press

  • White Papers // Jun 2012

    An Integrated Symmetric Key Cryptographic Method - Amalgamation of TTJSA Algorithm , Advanced Caesar Cipher Algorithm, Bit Rotation and Reversal Method: SJA Algorithm

    In this paper the authors present a new integrated symmetric-key cryptographic method, named SJA, which is the combination of advanced caesar cipher method, TTJSA method, bit wise rotation and reversal method. The encryption method consists of three basic steps: encryption technique using advanced caesar cipher, encryption technique using TTJSA algorithm,...

    Provided By mecs-press

  • White Papers // Feb 2013

    Enhancing Leakage Power in CPU Cache Using Inverted Architecture

    Power consumption is an increasingly pressing problem in modern processor design. Since the on-chip caches usually consume a significant amount of power so power and energy consumption parameters have become one of the most important design constraint. It is one of the most attractive targets for power reduction. This paper...

    Provided By mecs-press

  • White Papers // Nov 2010

    Cloud Policy Model in the Desktop Management System

    With the rapid development of computer technology and widely used Internet applications, there have been an increasing number of computer equipments in the enterprises. By studying the policy and desktop management systems theories, referencing the Internet Engineering Task Force (IETF) policy model and theories of cloud computing, this paper proposed...

    Provided By mecs-press

  • White Papers // May 2011

    A Scheme for Evaluating XML Engine on RDBMS

    There are an increasing number of DBMS vendors thinking of integrating XML data management into traditional relational database, with wider use of XML. In this case, a comprehensive evaluation methodology is needed to evaluate the XML engine in RDBMS correctly. In this paper, the authors analyze the characteristics of XML...

    Provided By mecs-press

  • White Papers // May 2013

    A Hybrid Algorithm for Privacy Preserving in Data Mining

    With the proliferation of information available in the internet and databases, the privacy-preserving data mining is extensively used to maintain the privacy of the underlying data. Various methods of the state art are available in the literature for privacy-preserving. Evolutionary Algorithms (EAs) provide effective solutions for various real-world optimization problems....

    Provided By mecs-press

  • White Papers // Jun 2011

    A Growing Evolutionary Algorithm and Its Application for Data Mining

    An unsuitable representation will make the task of mining classification rules very hard for a traditional Evolutionary Algorithm (EA). But for a given dataset, it is difficult to decide which one is the best representation used in the mining progress. In this paper, the authors analyses the effects of different...

    Provided By mecs-press

  • White Papers // Apr 2012

    Modern CPU's Memory Architecture - A Programmer's Outlook

    In this paper the authors provide the overview of modern computer's memory usage and how the programmers can exploit the architecture to best utilize for enhanced design of software programs. The paper talks about the main memory, cache memory and the memory interfaces with CPU's. They also talk about the...

    Provided By mecs-press

  • White Papers // Apr 2012

    Analysis towards Mobile IPV4 and Mobile IPV6 in Computer Networks

    With the rapid growth in the number of mobile devices like cellular phones, Personal Digital Assistants (PDAs), and laptop computers, the demand for \"Anywhere, anytime, and any way\" high-speed Internet access is becoming a primary concern in the people lives. Mobile IP has been designed with the Internet Engineering Task...

    Provided By mecs-press

  • White Papers // May 2013

    Performance Comparison of Various Robust Data Clustering Algorithms

    Robust clustering techniques are real life clustering techniques for noisy data. They work efficiently in the presence of noise. Fuzzy C-Means (FCM) is the first clustering algorithm, based upon fuzzy sets, proposed by 0but it does not give accurate results in the presence of noise. In this paper, FCM and...

    Provided By mecs-press

  • White Papers // May 2013

    Student Learning Ability Assessment using Rough Set and Data Mining Approaches

    All learners are not able to learn anything and everything complete. Though the learning mode and medium are different in e-learning mode and in classroom learning, similar activities are required in both the modes for teachers to observe and assess the learner(s). Student performance varies considerably depending upon whether a...

    Provided By mecs-press

  • White Papers // Jul 2013

    A Scheme to Reduce Response Time in Cloud Computing Environment

    The area of cloud computing has become popular from the last decade due to its enormous benefits such as lower cost, faster development and access to highly available resources. Apart from these core benefits some challenges are also associated with it such as QoS, security, trust and better resource management....

    Provided By mecs-press

  • White Papers // Oct 2013

    Collaborative Anti-jamming in Cognitive Radio Networks Using Minimax-Q Learning

    Cognitive radio is an efficient technique for realization of dynamic spectrum access. Since in the Cognitive Radio Network (CRN) environment, the Secondary Users (SUs) are susceptible to the random jammers, the security issue of the SU's channel access becomes crucial for the CRN framework. The rapidly varying spectrum dynamics of...

    Provided By mecs-press

  • White Papers // Nov 2013

    Cloud Computing Ensembles Agile Development Methodologies for Successful Project Development

    In today's IT world combination of AD (Agile Development) and CC (Cloud Computing) is a good recipe for the user needs fulfillment in efficient manners. This combination brings superiority for both worlds, Agile and Cloud. CC opportunities are optimized by AD processes for iterative software releases and getting more frequent...

    Provided By mecs-press

  • White Papers // Apr 2011

    Data Mining based Software Development Communication Pattern Discovery

    Smaller time loss and smoother communication pattern is the urgent pursuit in the software development enterprise. However, communication is difficult to control and manage and demands on technical support, due to the uncertainty and complex structure of data appeared in communication. Data mining is a well established framework aiming at...

    Provided By mecs-press

  • White Papers // Apr 2011

    A High-Performance Communication Service for Parallel Servo Computing

    Complexity of algorithms for the servo control in the multi-dimensional, ultra-precise stage application has made multi-processor parallel computing technology needed. Considering the specific communication requirements in the parallel servo computing, the authors propose a communication service scheme based on VME bus, which provides high-performance data transmission and precise synchronization trigger...

    Provided By mecs-press

  • White Papers // May 2013

    Bitwise Operations Related to a Combinatorial Problem on Binary Matrices

    Some techniques for the use of bitwise operations are described in the paper. As an example, an open problem of isomorphism-free generations of combinatorial objects is discussed. An equivalence relation on the set of square binary matrices having the same number of units in each row and each column is...

    Provided By mecs-press

  • White Papers // Feb 2013

    Designing a Universal Data-Oriented Random Number Generator

    Data-oriented is new and applied theory which provides method that models the concepts with data structure. If the concept is modeled by using sufficient data in modeling, required inferences and calculations can be done fast with less complexity. Random variable was modeled with digital probability graph, by using ahmad fact...

    Provided By mecs-press

  • White Papers // Sep 2013

    Security Challenges and Attacks in Mobile Ad Hoc Networks

    Mobile Ad-hoc NETwork (MANET) is an autonomous collection of mobile nodes that form a temporary network without of any existing network infrastructure or central access point. The popularity of these networks created security challenges as an important issue. The traditional routing protocols perform well with dynamically changing topology but are...

    Provided By mecs-press

  • White Papers // Dec 2013

    Energy-Efficient Secure Directed Diffusion Protocol for Wireless Sensor Networks

    In wireless sensor networks, it is crucial to design and employ energy-efficient communication protocols, since nodes are battery-powered and thus their lifetimes are limited. Such constraints combined with a great number of applications used in these networks, pose many challenges (limited energy and low security) to the design and management...

    Provided By mecs-press

  • White Papers // Dec 2013

    FSM Circuits Design for Approximate String Matching in Hardware Based Network Intrusion Detection Systems

    In this paper, the authors present a logical circuits design for approximate content matching implemented as Finite State Machines (FSM). As network speed increases the software based Network Intrusion Detection and Prevention Systems (NIDPS) are lagging behind requirements in throughput of so called deep package inspection - the most exhaustive...

    Provided By mecs-press

  • White Papers // Sep 2012

    An Efficient Approach to Genetic Algorithm for Task Scheduling in Cloud Computing Environment

    Cloud computing is recently a booming area and has been emerging as a commercial reality in the information technology domain. Cloud computing represents supplement, consumption and delivery model for IT services that are based on internet on pay as per usage basis. The scheduling of the cloud services to the...

    Provided By mecs-press

  • White Papers // Jun 2012

    An Analytical Assessment on Document Clustering

    Clustering is related to data mining for information retrieval. Relevant information is retrieved quickly while doing the clustering of documents. It organizes the documents into groups; each group contains the documents of similar type content. Document clustering is an unsupervised approach of data mining. Different clustering algorithms are used for...

    Provided By mecs-press

  • White Papers // Aug 2013

    A Hybrid Model for Biometric Authentication Using Finger Back Knuckle Surface Based on Angular Geometric Analysis

    Biometric based personal recognition is an efficient method for identifying a person. Recently, hand based biometric has become popular due to its various advantages such as high verification accuracy and high user acceptability. This paper proposes a hybrid model using an emerging hand based biometric trait known as Finger Back...

    Provided By mecs-press

  • White Papers // Feb 2011

    A Group-Oriented Access Control Scheme for P2P Networks

    A group-oriented access control scheme is proposed for P2P (Peer-To-Peer) networks. In the proposed scheme, authentication control, admission control and revocation control are used in order to provide security services for P2P networks. Moreover, the proposed scheme can simply and efficient establish share key between two members without interactions, therefore...

    Provided By mecs-press

  • White Papers // Jun 2013

    Establishing Inter Vehicle Wireless Communication in Vanet and Preventing It From Hackers

    The entire humanity needs a vehicle to travel from one place to another. Obviously a new model vehicle is manufactured by the manufacturing companies to attract its customers every day. All the manufactured vehicles have different advantages, when compared with one another. In this paper, the authors introduce another added...

    Provided By mecs-press

  • White Papers // Apr 2012

    Secure Communication Using Symmetric and Asymmetric Cryptographic Techniques

    Information security has its own importance right from the early days of computing. Satellite based communication is a way to transmit digital information from one geographic location to another by utilizing satellites. Satellite as communication medium to transfer data vulnerable various types of information security threat, and require a novel...

    Provided By mecs-press

  • White Papers // Oct 2011

    A Three-Party Password Authenticated Key Exchange Protocol with Key Confirmation

    Three-party authenticated key exchange protocol is an important cryptographic technique in the secure communication areas, by which any two clients can verify the ability to use a server to establish communication. Recently, researchers have begun proposing new key exchange protocols that would not require the use of server public keys,...

    Provided By mecs-press

  • White Papers // Feb 2014

    Public vs Private vs Hybrid vs Community - Cloud Computing: A Critical Review

    These days cloud computing is booming like no other technology. Every organization whether it's small, mid-sized or big, wants to adapt this cutting edge technology for its business. As cloud technology becomes immensely popular among these businesses, the question arises: which cloud model to consider for the users business? There...

    Provided By mecs-press

  • White Papers // Nov 2013

    Textual Manipulation for SQL Injection Attacks

    SQL injection attacks try to use string or text manipulations to access illegally websites and their databases. This is since using some symbols or characters in SQL statements may trick the authentication system to incorrectly allow such SQL statements to be processed or executed. In this paper, the authors highlighted...

    Provided By mecs-press

  • White Papers // Jan 2014

    Implementation of Enhanced Security Algorithms in Mobile Ad hoc Networks

    Mobile ad hoc networks are wireless infrastructure fewer networks can be easily formed or deployed due to its simple infrastructure. Security has become a primary concern in order to provide protected communication between mobile nodes in a hostile environment. The main objective of this work is to enhance the performance...

    Provided By mecs-press

  • White Papers // Nov 2013

    Security Solutions for Networked Control Systems Based on DES Algorithm and Improved Grey Prediction Model

    Compared with the conventional control systems, Networked Control Systems (NCSs) are more open to the external network. As a result, they are more vulnerable to attacks from disgruntled insiders or malicious cyber-terrorist organizations. Therefore, the security issues of NCSs have been receiving a lot of attention recently. In this paper,...

    Provided By mecs-press

  • White Papers // Jan 2014

    Hybrid Intrusion Detection Using Ensemble of Classification Methods

    One of the major developments in machine learning in the past decade is the ensemble method, which finds highly accurate classifier by combining many moderately accurate component classifiers. In this paper, new ensemble classification methods are proposed for homogeneous ensemble classifiers using bagging and heterogeneous ensemble classifiers using arcing classifier...

    Provided By mecs-press

  • White Papers // Jan 2014

    Minimization of Power Consumption in Mobile Ad hoc Networks

    An ad hoc network is a mobile wireless network that has no fixed access point or centralized infrastructure. Each node in the network functions as a mobile router of data packets for other nodes and should maintain the network routes for long standing which is not possible due to limited...

    Provided By mecs-press

  • White Papers // Nov 2013

    On Maxima Distribution of Full Differentials and Linear Hulls of Block Symmetric Ciphers

    The problem of determination of maxima distribution laws of full differentials and linear bias of block symmetric ciphers as substitution transformations is considered. Well-known theoretical results, published in literature, are given, as well as experiment results on making the laws of maxima distribution of full differential transitions and maximum biasess...

    Provided By mecs-press

  • White Papers // Feb 2014

    Enhanced Role Based Access Control Mechanism for Electronic Examination System

    Over the years, e-learning and e-examination has become standard in many institutions of higher learning. It has been observed that examination questions and results can be easily intercepted by invalid users, thus the security of resources shared among valid users is not guaranteed. In order to solve these problems as...

    Provided By mecs-press

  • White Papers // Feb 2014

    Modeling GSM Based Network Communication in Vehicular Network

    Obviously fair communication establishment in every technology increases the efficiency. As the authors know well, vehicles are used in day to day life of every human being to move from one location to another location. If network communication is formed between vehicles, mobile phones and home based telephones, it will...

    Provided By mecs-press

  • White Papers // Jan 2014

    A Novel Mutual RFID Authentication Protocol with Low Complexity and High Security

    Radio Frequency IDentification (RFID) is a method for automated identifying objects. One of the problems of this technology is its security. RFID tags include resource limitation; therefore, the system designers cannot implement complex circuits to enhance their security. Usually the symmetric and asymmetric encryption methods increase resources and cost. Because...

    Provided By mecs-press