mecs-press

Displaying 241-280 of 747 results

  • White Papers // Mar 2013

    A Proposed Model for Datacenter in -Depth Defense to Enhance Continual Security

    Defense in Depth is practical strategy for achieving Information Assurance in today's highly datacenter environments. It is a \"Best practices\" strategy in that it relies on the intelligent application of techniques and technologies that exist today. The strategy recommends a balance between the protection capability and cost, performance, and operational...

    Provided By mecs-press

  • White Papers // Sep 2013

    A Compression & Encryption Algorithm on DNA Sequences Using Dynamic Look Up Table and Modified Huffman Techniques

    In this paper, the authors discussed a new DNA compression algorithm whose key idea is dynamic LUT. This compression algorithm gives a good model for compressing DNA sequences that reveals the true characteristics of DNA sequences. The compression results of dynamic LUT for DNA sequences also indicate that their method...

    Provided By mecs-press

  • White Papers // Sep 2013

    Security Challenges and Attacks in Mobile Ad Hoc Networks

    Mobile Ad-hoc NETwork (MANET) is an autonomous collection of mobile nodes that form a temporary network without of any existing network infrastructure or central access point. The popularity of these networks created security challenges as an important issue. The traditional routing protocols perform well with dynamically changing topology but are...

    Provided By mecs-press

  • White Papers // Sep 2012

    Anti-Spam Software for Detecting Information Attacks

    In this paper the development of anti-spam software detecting information attacks is offered. For this purpose it is considered spam filtration system with the multilayered, multivalent architecture, coordinating all ISP's in the country. All users and ISPs of this system involved in spam filtration process. After spam filtering process, saved...

    Provided By mecs-press

  • White Papers // Aug 2013

    A Face Recognition Approach Based on Entropy Estimate of the Nonlinear DCT Features in the Logarithm Domain Together With Kernel Entropy Component Analysis

    This paper exploits the feature extraction capabilities of the Discrete Cosine Transform (DCT) together with an illumination normalization approach in the logarithm domain that increase its robustness to variations in facial geometry and illumination. Secondly in the same domain the entropy measures are applied on the DCT coefficients so that...

    Provided By mecs-press

  • White Papers // Jul 2013

    Study and Performance Evaluation on Recent DDoS Trends of Attack & Defense

    Distributed Denial of Service attacks are exercised by attackers in various forms. These attacks vary from single attacking source to a networked attacking infrastructure. They also vary in degree of automation, from manual efforts to fully automated attacks. In networked form, a botnet of attacking sources is created. These machines...

    Provided By mecs-press

  • White Papers // Jun 2013

    Service Oriented Architecture for Remote Sensing Satellite Telemetry Data Implemented on Cloud Computing

    This paper articulates how Service Oriented Architecture (SOA) and cloud computing together can facilitate technology setup in TeleMetry (TM) processing with a case study from the Egyptian Space Program (ESP) and a comparative study with Space Situational Awareness (SSA) program in European Space Agency (ESA), Moreover, this paper illustrates how...

    Provided By mecs-press

  • White Papers // May 2013

    An Efficient IBE Scheme using IFP and DDLP

    In this system, each user needs to visit a Private Key Generation (PKG) and identify him-self before joining a communication network. Once a user is accepted, the PKG will provide him with a secret key. In this way, if a user wants to communicate with others, he only needs to...

    Provided By mecs-press

  • White Papers // May 2013

    Secured and Optimized AODV for Wireless Sensor Networks

    Similar to conventional wireless networks, WSNs are based on multi hop routing to ensure connectivity and data forwarding which makes the routing service a challenging task due to the nature of sensors usually limited in memory, battery and computing capacities as well as the nature of the environment which is...

    Provided By mecs-press

  • White Papers // Apr 2013

    The Extensive Bit-level Encryption System (EBES)

    Due to the growing need to protect the confidentiality of information, there is a rising demand for an encryption algorithm that can protect data of every format, size and type. In this paper, the authors has been introduced the Extensive Bit-level Encryption System (EBES), a bit-level encryption mechanism. It is...

    Provided By mecs-press

  • White Papers // Apr 2013

    Semantic Multi-granular Lock Model for Object Oriented Distributed Systems

    In Object Oriented Distributed Systems (OODS), the objects are viewed as resources. Concurrency control techniques are usually applied on the database tier. This has the limitations of lack of support of legacy files and requirement of separate concurrency control mechanisms for each database model. Hence concurrency control on the objects...

    Provided By mecs-press

  • White Papers // Feb 2013

    Internet Passport Authentication System Using Multiple Biometric Identification Technology

    Electronic Passports (E-Passports) have known a wide and fast deployment all around the world since the International Civil Aviation Organization (ICAO) the world has adopted standards whereby passports can store biometric identifiers. The purpose of biometric passports is to prevent the illegal entry of traveler into a specific country and...

    Provided By mecs-press

  • White Papers // Feb 2013

    A Novel and Efficient Method for Protecting Internet Usage From Unauthorized Access Using Map Reduce

    The massive increases in data have paved a path for distributed computing, which in turn can reduce the data processing time. Though there are various approaches in distributed computing, Hadoop is one of the most efficient among the existing ones. Hadoop consists of different elements out of which Map Reduce...

    Provided By mecs-press

  • White Papers // Jan 2013

    Self-organized Detection of Relationships in a Network

    Multistate operations within a network result in high-dimensional, multivariate temporal data, and are useful for systems, which monitor access to network entities like resources, objects, etc. Efficient self organization of such multistate network operations stored in databases with respect to relationships amongst users or between a user and a data...

    Provided By mecs-press

  • White Papers // Nov 2012

    Performance Analysis of Most Common Encryption Algorithms on Different Web Browsers

    The hacking is the greatest problem in the Wireless Local Area Network (WLAN). Many algorithms like DES, 3DES, AES,UMARAM, RC6 and UR5 have been used to prevent the outside attacks to eavesdrop or prevent the data to be transferred to the end-user correctly. The authors have proposed a Web programming...

    Provided By mecs-press

  • White Papers // Nov 2013

    Implementation of Palm Print Biometric Identification System Using Ordinal Measures

    Personal identification is one of the most important requirements in all e-commerce and criminal detection applications. In this framework, a novel palm print representation method, namely orthogonal line ordinal features, is proposed. The palm print registration, feature extraction, palm print verification and palm print recognition modules are designed to manage...

    Provided By mecs-press

  • White Papers // Nov 2013

    Goal Structured Requirement Engineering and Traceability Model for Data Warehouses

    Data warehouses are decision support systems that are specifically designed for the business managers and executives for reporting and business analysis. Data warehouse is a database that stores enterprise-wide data that can be used to deduce useful information. Business organizations can achieve a great level of competitive advantage by analyzing...

    Provided By mecs-press

  • White Papers // Nov 2013

    Improving Situational Awareness for Precursory Data Classification using Attribute Rough Set Reduction Approach

    The issue of correlating, integrating and presenting related information to issue early warning to impending natural disasters by categorizing documents with the aid of knowledge-based features leverages information cannot be deduced from the documents alone. This also involves query based search based on machine learning methods that improves the acquisition...

    Provided By mecs-press

  • White Papers // Sep 2013

    Secluding Efficient Geographic Multicast Protocol against Multicast Attacks

    A Mobile Ad-hoc NETworks (MANETs) are composed of Mobile Nodes without any infrastructure. The network nodes in MANETs, not only act as ordinary network nodes but also as the routers for other peer devices. The dynamic topology, lack of a fixed infrastructure and the wireless nature make MANETs susceptible to...

    Provided By mecs-press

  • White Papers // Sep 2013

    Ontology Based Information Retrieval in Semantic Web: A Survey

    In present age of computers, there are various resources for gathering information related to given query like Radio Stations, Television, Internet and many more. Among them, Internet is considered as major factor for obtaining any information about a given domain. When a user wants to find some information, he/she enters...

    Provided By mecs-press

  • White Papers // Jun 2012

    Dynamic High Level Cross Layer Security Mechanisms for Wireless Sensor Networks

    In dynamic insensitive application specific network, WSN consists of hundred and thousands of sensor nodes densely deployed in the sensor field. Majority of sensor nodes are static having power limitations, low network throughput, message transfer delays and computation power limits that are major obstacles. The limited communication range of WSN...

    Provided By mecs-press

  • White Papers // Jan 2014

    Defending Against Malicious Threats in Wireless Sensor Network: A Mathematical Model

    Wireless sensor networks offer a powerful combination of distributed sensing, computing and communication. They lend themselves to countless applications and at the same time constrained by limited battery life, processing capability, memory and bandwidth which makes it soft target of malicious objects such as virus and worms. The authors study...

    Provided By mecs-press

  • White Papers // Feb 2014

    Robustness Analysis of Layered Public Transport Networks Due to Edge Overload Breakdown

    The robustness of urban bus-transport networks has important influence on the network performance. This paper proposes the model of layered public bus-transport network which is composed of the logical layer and the physical layer and expounds the relationship between these two layers. The authors map the bus-transport network into two...

    Provided By mecs-press

  • White Papers // Jan 2014

    Efficient Analysis of Pattern and Association Rule Mining Approaches

    The process of data mining produces various patterns from a given data source. The most recognized data mining tasks are the process of discovering frequent itemsets, frequent sequential patterns, frequent sequential rules and frequent association rules. Numerous efficient algorithms have been proposed to do the above processes. Frequent pattern mining...

    Provided By mecs-press

  • White Papers // Feb 2014

    Public vs Private vs Hybrid vs Community - Cloud Computing: A Critical Review

    These days cloud computing is booming like no other technology. Every organization whether it's small, mid-sized or big, wants to adapt this cutting edge technology for its business. As cloud technology becomes immensely popular among these businesses, the question arises: which cloud model to consider for the users business? There...

    Provided By mecs-press

  • White Papers // Nov 2013

    Textual Manipulation for SQL Injection Attacks

    SQL injection attacks try to use string or text manipulations to access illegally websites and their databases. This is since using some symbols or characters in SQL statements may trick the authentication system to incorrectly allow such SQL statements to be processed or executed. In this paper, the authors highlighted...

    Provided By mecs-press

  • White Papers // Jan 2014

    Implementation of Enhanced Security Algorithms in Mobile Ad hoc Networks

    Mobile ad hoc networks are wireless infrastructure fewer networks can be easily formed or deployed due to its simple infrastructure. Security has become a primary concern in order to provide protected communication between mobile nodes in a hostile environment. The main objective of this work is to enhance the performance...

    Provided By mecs-press

  • White Papers // Nov 2013

    Security Solutions for Networked Control Systems Based on DES Algorithm and Improved Grey Prediction Model

    Compared with the conventional control systems, Networked Control Systems (NCSs) are more open to the external network. As a result, they are more vulnerable to attacks from disgruntled insiders or malicious cyber-terrorist organizations. Therefore, the security issues of NCSs have been receiving a lot of attention recently. In this paper,...

    Provided By mecs-press

  • White Papers // Jan 2014

    Hybrid Intrusion Detection Using Ensemble of Classification Methods

    One of the major developments in machine learning in the past decade is the ensemble method, which finds highly accurate classifier by combining many moderately accurate component classifiers. In this paper, new ensemble classification methods are proposed for homogeneous ensemble classifiers using bagging and heterogeneous ensemble classifiers using arcing classifier...

    Provided By mecs-press

  • White Papers // Jan 2014

    Minimization of Power Consumption in Mobile Ad hoc Networks

    An ad hoc network is a mobile wireless network that has no fixed access point or centralized infrastructure. Each node in the network functions as a mobile router of data packets for other nodes and should maintain the network routes for long standing which is not possible due to limited...

    Provided By mecs-press

  • White Papers // Dec 2010

    AuMID: An Authentication Mechanism Based on Identity Tag Under Future Internet Architecture

    It has been commonly recognized that the current Internet faces serious security and scaling problems. To address these problems, the architecture of ID/locator separation is the focus of future Internet development. However, the relevant authentication mechanism has not been proposed under this architecture. In this paper, the authors advance a...

    Provided By mecs-press

  • White Papers // Oct 2013

    A Novel Minimized Computational Time Based Encryption and Authentication Using ECDSA

    Providing the security on the basis of encryption standards is considered as key challenges for achieving the integrity & confidentiality. There are three main public-key cryptosystem contenders. Each has a variable key size that can be increased to achieve higher security at the cost of slower cryptographic operations. The best...

    Provided By mecs-press

  • White Papers // Dec 2012

    Biometric Palm Prints Feature Matching for Person Identification

    Biometrics is playing an important role for person recognition. The Biometrics identification of an individual is can be done by physiological or behavioral characteristics; where the palm print of an individual can be captured by using sensors and is one of among physiological characteristics of an individual. Palm print is...

    Provided By mecs-press

  • White Papers // Jun 2013

    Information Leakage Prevention Using Virtual Disk Drive

    The worst news for information technology people are computer has been stolen or lost. The actual problem is the loss of the data stored on the hard drive that can fall into the wrong hands. However, users of information system and laptops computers are facing real problems with due to...

    Provided By mecs-press

  • White Papers // Sep 2012

    Contribution to the Fusion of Biometric Modalities by the Choquet Integral

    In multimodal biometrics, modalities can be robust against the authentication of certain people and weak for others. The conventional fusion techniques such as the Product, Mean, AND, OR and the Majority Voting do not take into account this kind of behavior. In this paper, the authors propose a new approach...

    Provided By mecs-press

  • White Papers // Nov 2013

    Empirical Analysis of Bagged SVM Classifier for Data Mining Applications

    Data mining is the use of algorithms to extract the information and patterns derived by the knowledge discovery in databases process. Classification maps data into predefined groups or classes. It is often referred to as supervised learning because the classes are determined before examining the data. The feasibility and the...

    Provided By mecs-press

  • White Papers // Dec 2011

    Design and Implementation of Anti-Phishing Authentication System

    With the rapid development of Internet, various electronic frauds come in great numbers. Among them, phishing is the most deceptive and influential. As the situation of phishing becomes more and more serious, Anti-Phishing Working Group (APWG) is established in the world. For phishing problems and its essential characteristics, the authentication...

    Provided By mecs-press

  • White Papers // Aug 2012

    A New Secure Strategy for Small-Scale IEEE 802.11 Wireless Local Area Networ

    As the main secret-key encryption techniques of the Wireless Local Area Network (WLAN) have been proven to be unsafe, wireless network security is faced with serious challenges. It is unpractical for home users and small companies to buy expansive network equipments to improve the network security. Therefore, the secure strategy...

    Provided By mecs-press

  • White Papers // Apr 2012

    Secure Communication Using Symmetric and Asymmetric Cryptographic Techniques

    Information security has its own importance right from the early days of computing. Satellite based communication is a way to transmit digital information from one geographic location to another by utilizing satellites. Satellite as communication medium to transfer data vulnerable various types of information security threat, and require a novel...

    Provided By mecs-press

  • White Papers // Oct 2011

    A Three-Party Password Authenticated Key Exchange Protocol with Key Confirmation

    Three-party authenticated key exchange protocol is an important cryptographic technique in the secure communication areas, by which any two clients can verify the ability to use a server to establish communication. Recently, researchers have begun proposing new key exchange protocols that would not require the use of server public keys,...

    Provided By mecs-press