mecs-press

Displaying 281-320 of 537 results

  • White Papers // Jan 2014

    Secure and Dynamic Model for Book Searching on Cloud Computing as Mobile Augmented Reality

    Availability of internet on different devices like smart phones like android based, IOs based, windows based and PDA etc. has brought into the evolution of mobile cloud computing, which is a vast side of research nowadays. Internet connectivity has become very easy with the evolution of Wi-Fi; everyone can access...

    Provided By mecs-press

  • White Papers // Jan 2014

    Distributed Denial of Service Attacks: A Review

    A Wireless Sensor Network (WSN) is a wireless network consisting of spatially distributed autonomous devices using sensors to monitor physical or environmental conditions.WSN is a flourishing network that has numerous applications and could be used in diverse scenarios. DDoS (Distributed Denial of Service) is an attack where a number of...

    Provided By mecs-press

  • White Papers // Jan 2014

    Reference Threshold Calculation for Biometric Authentication

    In biometric systems, reference threshold is defined as a value that can decide the authenticity of a person. Authenticity means whether the person is genuine or intruder. The statistical calculation of various values like reference threshold, FAR (False Acceptance Rate), FRR (False Rejection Rate) is required for real-time automated biometric...

    Provided By mecs-press

  • White Papers // Jul 2013

    A Survey on Interoperability in the Cloud Computing Environments

    In the recent years, cloud computing has been one of the top ten new technologies which provide various services such as software, platform and infrastructure for internet users. The cloud computing is a promising IT paradigm which enables the Internet evolution into a global market of collaborating services. In order...

    Provided By mecs-press

  • White Papers // Feb 2014

    A Hybrid RBF-SVM Ensemble Approach for Data Mining Applications

    One of the major developments in machine learning in the past decade is the ensemble method, which finds highly accurate classifier by combining many moderately accurate component classifiers. This paper addresses using an ensemble of classification methods for data mining applications like intrusion detection, direct marketing, and signature verification. In...

    Provided By mecs-press

  • White Papers // Jun 2012

    Deliberate Secure Grid Computing Blueprint Design in Indian Context

    The novel concept of grid computing, clusters of computational power is constructed from a network of many small and widespread different computers servers or workstations into a single resource. The authors now proceed to translate the grid security problem into specific grid security requirements. The purpose of grid technologies is...

    Provided By mecs-press

  • White Papers // Jul 2012

    Application of Biometric Security in Agent Based Hotel Booking System - Android Environment

    The process of finding the finest hotel in central location is time consuming, information overload and overwhelming and in some cases poses a security risk to the client. Some of the more advanced web sites allow for a search of the destination via a map for example hotelguidge.com and jamaica.hotels.hu....

    Provided By mecs-press

  • White Papers // Dec 2010

    An Improved Kerberos Scheme Based on Dynamic Password

    When the authors communicate in a distributed network, there are some security threats: If a user accesses a certain specific workstation, he can impersonate another user to operate the workstation. A user can change the workstation network addresses to make its issued request seemingly come from a disguise workstation. A...

    Provided By mecs-press

  • White Papers // Dec 2010

    A Clientless Endpoint Authentication Scheme Based on TNC

    Trusted Network Connect (TNC) proposes a hierarchical and scalable architecture to securely and efficiently control endpoints` admission to the trusted computing platform to implement message passing and resource sharing. But, not all endpoints support or run a functional TNC client performing integrity checking, which represents a security risk in lots...

    Provided By mecs-press

  • White Papers // Oct 2013

    A Novel Minimized Computational Time Based Encryption and Authentication Using ECDSA

    Providing the security on the basis of encryption standards is considered as key challenges for achieving the integrity & confidentiality. There are three main public-key cryptosystem contenders. Each has a variable key size that can be increased to achieve higher security at the cost of slower cryptographic operations. The best...

    Provided By mecs-press

  • White Papers // Dec 2010

    AuMID: An Authentication Mechanism Based on Identity Tag Under Future Internet Architecture

    It has been commonly recognized that the current Internet faces serious security and scaling problems. To address these problems, the architecture of ID/locator separation is the focus of future Internet development. However, the relevant authentication mechanism has not been proposed under this architecture. In this paper, the authors advance a...

    Provided By mecs-press

  • White Papers // Jun 2013

    Information Leakage Prevention Using Virtual Disk Drive

    The worst news for information technology people are computer has been stolen or lost. The actual problem is the loss of the data stored on the hard drive that can fall into the wrong hands. However, users of information system and laptops computers are facing real problems with due to...

    Provided By mecs-press

  • White Papers // Dec 2012

    Biometric Palm Prints Feature Matching for Person Identification

    Biometrics is playing an important role for person recognition. The Biometrics identification of an individual is can be done by physiological or behavioral characteristics; where the palm print of an individual can be captured by using sensors and is one of among physiological characteristics of an individual. Palm print is...

    Provided By mecs-press

  • White Papers // Nov 2013

    Empirical Analysis of Bagged SVM Classifier for Data Mining Applications

    Data mining is the use of algorithms to extract the information and patterns derived by the knowledge discovery in databases process. Classification maps data into predefined groups or classes. It is often referred to as supervised learning because the classes are determined before examining the data. The feasibility and the...

    Provided By mecs-press

  • White Papers // Sep 2012

    Contribution to the Fusion of Biometric Modalities by the Choquet Integral

    In multimodal biometrics, modalities can be robust against the authentication of certain people and weak for others. The conventional fusion techniques such as the Product, Mean, AND, OR and the Majority Voting do not take into account this kind of behavior. In this paper, the authors propose a new approach...

    Provided By mecs-press

  • White Papers // Aug 2012

    A New Secure Strategy for Small-Scale IEEE 802.11 Wireless Local Area Networ

    As the main secret-key encryption techniques of the Wireless Local Area Network (WLAN) have been proven to be unsafe, wireless network security is faced with serious challenges. It is unpractical for home users and small companies to buy expansive network equipments to improve the network security. Therefore, the secure strategy...

    Provided By mecs-press

  • White Papers // Dec 2011

    Design and Implementation of Anti-Phishing Authentication System

    With the rapid development of Internet, various electronic frauds come in great numbers. Among them, phishing is the most deceptive and influential. As the situation of phishing becomes more and more serious, Anti-Phishing Working Group (APWG) is established in the world. For phishing problems and its essential characteristics, the authentication...

    Provided By mecs-press

  • White Papers // Jan 2014

    Defending Against Malicious Threats in Wireless Sensor Network: A Mathematical Model

    Wireless sensor networks offer a powerful combination of distributed sensing, computing and communication. They lend themselves to countless applications and at the same time constrained by limited battery life, processing capability, memory and bandwidth which makes it soft target of malicious objects such as virus and worms. The authors study...

    Provided By mecs-press

  • White Papers // Jun 2012

    Dynamic High Level Cross Layer Security Mechanisms for Wireless Sensor Networks

    In dynamic insensitive application specific network, WSN consists of hundred and thousands of sensor nodes densely deployed in the sensor field. Majority of sensor nodes are static having power limitations, low network throughput, message transfer delays and computation power limits that are major obstacles. The limited communication range of WSN...

    Provided By mecs-press

  • White Papers // Feb 2014

    Robustness Analysis of Layered Public Transport Networks Due to Edge Overload Breakdown

    The robustness of urban bus-transport networks has important influence on the network performance. This paper proposes the model of layered public bus-transport network which is composed of the logical layer and the physical layer and expounds the relationship between these two layers. The authors map the bus-transport network into two...

    Provided By mecs-press

  • White Papers // Jan 2014

    Efficient Analysis of Pattern and Association Rule Mining Approaches

    The process of data mining produces various patterns from a given data source. The most recognized data mining tasks are the process of discovering frequent itemsets, frequent sequential patterns, frequent sequential rules and frequent association rules. Numerous efficient algorithms have been proposed to do the above processes. Frequent pattern mining...

    Provided By mecs-press

  • White Papers // Jan 2014

    Strategic Sensor Placement for Intrusion Detection in Network-Based IDS

    Network Intrusion Detection Systems (NIDSs) can be composed of a potentially large number of sensors, which monitor the traffic flowing in the network. Deciding where sensors should be placed and what information they need in order to detect the desired attacks can be a demanding task for network administrators, one...

    Provided By mecs-press

  • White Papers // Jan 2014

    E-mail Spam Filtering Using Adaptive Genetic Algorithm

    Now-a-days everybody email inbox is full with spam mails. The problem with spam mails is that they are not malicious in nature so generally don't get blocked with firewall or filters etc., however, they are unwanted mails received by any internet users. In 2012, more that 50% emails of the...

    Provided By mecs-press

  • White Papers // Feb 2011

    Sensitive Data Protection Based on Intrusion Tolerance in Cloud Computing

    Cloud computing distributes computing tasks to virtual resource pools which are constituted of a large number of computers, and cloud computing ensures that various applications can get access to computing power, storage space and various software services when needed. Service integration and supply on-demand coming from cloud computing can significantly...

    Provided By mecs-press

  • White Papers // Dec 2013

    Metrics for Evaluating Pervasive Middleware

    Pervasive computing aims at developing smart environments which enable user to interact with other devices. Pervasive computing includes a middleware to support interoperability, heterogeneity and self-management among different platforms. It provides efficient communications and context awareness among devices. Middleware for pervasive computing provides much more attention to coordinate the devices...

    Provided By mecs-press

  • White Papers // Aug 2012

    Data Clustering Using Wave Atom

    Clustering of huge spatial databases is an important issue which tries to track the densely regions in the feature space to be used in data mining, knowledge discovery, or efficient information retrieval. Clustering approach should be efficient and can detect clusters of arbitrary shapes because spatial objects cannot be simply...

    Provided By mecs-press

  • White Papers // Oct 2012

    Prediction of Missing Associations Using Rough Computing and Bayesian Classification

    Information technology revolution has brought a radical change in the way data are collected or generated for ease of decision making. It is generally observed that the data has not been consistently collected. The huge amount of data has no relevance unless it provides certain useful information. Only by unlocking...

    Provided By mecs-press

  • White Papers // Feb 2013

    A Near Real-time IP Traffic Classification Using Machine Learning

    With drastic increase in internet traffic over last few years due to increase in number of internet users, IP traffic classification has gained significant importance for research community as well as various internet service providers for optimization of their network performance and for governmental intelligence organizations. Today, traditional IP traffic...

    Provided By mecs-press

  • White Papers // Feb 2013

    Current Trends of High Capacity Optical Interconnection Data Link in High Performance Optical Communication Systems

    Optical technologies are ubiquitous in telecommunications networks and systems, providing multiple wavelength channels of transport at 2.5 Gbit/sec to 40 Gbit/sec data rates over single fiber optic cables. Market pressures continue to drive the number of wavelength channels per fiber and the data rate per channel. This trend will continue...

    Provided By mecs-press

  • White Papers // Nov 2012

    Semantic Enabled Role Based Social Network

    Communication is the most common but an intricate activity that the people perform every day. Sender sends message, discussions, greetings, gestures, emotics and texts through numerous channels, (e.g. e-mail, messengers, social networks and so on) intending the receiver to understand. The means of personal or group communication has been radically...

    Provided By mecs-press

  • White Papers // Apr 2013

    Defect Analysis Using Artificial Neural Network

    In this paper the authors deal with detection of defects in the manufactured ceramic tiles to ensure high density quality. The problem is concerned with the automatic inspection of ceramic tiles using Artificial Neural Network (ANN). The performance of the technique has been evaluated theoretically and experimentally on samples. Architecture...

    Provided By mecs-press

  • White Papers // Apr 2013

    Security Based on Real Time Tracking of Multiple Human Faces Identification

    Robust tracking of persons in real-world environments and in real-time is a common goal in many video applications. In this paper a computational system for the real-time tracking of multiple persons in natural environments is presented. Face detection has diverse applications especially as an identification solution which can meet the...

    Provided By mecs-press

  • White Papers // Mar 2013

    Static Security Enhancement and Loss Minimization Using Simulated Annealing

    In this paper the authors present a developed algorithm for optimal placement of Thyristor Controlled Series Capacitors (TCSC's) for enhancing the power system static security and minimizing the system overall power loss. Placing TCSC's at selected branches requires analysis of the system behavior under all possible contingencies. A selective procedure...

    Provided By mecs-press

  • White Papers // Dec 2012

    Intelligent Routing Techniques for Mobile Ad hoc Networks Using Swarm Intelligence

    A Mobile Ad hoc NETwork (MANET) is a collection of autonomous self-organized nodes. They use wireless medium for communication, thus two nodes can communicate directly if and only if they are within each other's transmission radius in a multi-hop fashion. Many conventional routing algorithms have been proposed for MANETs. An...

    Provided By mecs-press

  • White Papers // Jan 2014

    Performance Analysis of Multi Functional Bot System Design Using Microcontroller

    In this paper the authors include performance analysis of a multipurpose microcontroller based system which has various modes to control distinct applications. The paper elucidates how a single chip microcontroller can process different signals and accomplish different tasks. The system discussed in this paper has seven modes. Each mode controls...

    Provided By mecs-press

  • White Papers // Feb 2013

    Efficient Data Clustering Algorithms: Improvements Over Kmeans

    In this paper the authors present a new approach to overcome one of the most known disadvantages of the well-known Kmeans clustering algorithm. The problems of classical Kmeans are such as the problem of random initialization of prototypes and the requirement of predefined number of clusters in the dataset. Randomly...

    Provided By mecs-press

  • White Papers // Jan 2013

    DIMK-means \"Distance-based Initialization Method for K-means Clustering Algorithm\"

    Partition-based clustering technique is one of several clustering techniques that attempt to directly decompose the dataset into a set of disjoint clusters. K-means algorithm dependence on partition-based clustering technique is popular and widely used and applied to a variety of domains. K-means clustering results are extremely sensitive to the initial...

    Provided By mecs-press

  • White Papers // Dec 2012

    Enhanced Face Recognition Using Data Fusion

    In this paper the authors scrutinize the influence of fusion on the face recognition performance. In pattern recognition task, benefiting from different uncorrelated observations and performing fusion at feature and/or decision levels improves the overall performance. In features fusion approach, they fuse (concatenate) the feature vectors obtained using different feature...

    Provided By mecs-press

  • White Papers // Dec 2013

    Management of Automotive Engine Based on Stable Fuzzy Technique With Parallel Sliding Mode Optimization

    The Internal Combustion (IC) engine is designed to produce power from the energy that is contained in its fuel. More specifically, its fuel contains chemical energy and together with air, this mixture is burned to output mechanical power. Both fuzzy logic and sliding mode can compensate the steady-state error of...

    Provided By mecs-press

  • White Papers // Jan 2014

    An Integrated Agent-Based Architecture and Performance Optimization of VANET using Agent Packet Size Reduction Process

    The advancements of Information Technology have led to many developments that make life easier and faster with high reachability and efficiency. There is a drastic improvement in the area of distributed applications with the advent of mobile agent technology over the usual client/server framework. Applying mobile agent technology in the...

    Provided By mecs-press