Azad University

Displaying 1-13 of 13 results

  • White Papers // Feb 2013

    Analysis and Design by Agent Based MaSE Methodology: A Case Study

    Multiagent Systems Engineering (MaSE) Methodology is one of old object-oriented methodology which supports the development process and is established based on the development of the object-oriented software engineering methods and their adjustment with the agent view. Some characteristics of the agent like autonomy, creativity and pre-activated are not paid attention....

    Provided By Azad University

  • White Papers // Feb 2013

    Aspect-Oriented Software Development Based Solution for Intervention Concerns Problems:Case Study

    All existing methods for Developing Software Systems, most insist on a separate system to keep the components together till they have been had the least overlapping. But these methods in the management system those have some parts and are using use case, and involved in the other parts of the...

    Provided By Azad University

  • White Papers // Oct 2012

    Secure Virtualization Technology

    Cloud is one of today's most interesting technologies because of it can reduce cost and make flexibility and scalability. Hence, cloud computing became a promising business from a pure idea in a few years. However, there are some issues in cloud about which IT organizations concern such as security. As...

    Provided By Azad University

  • White Papers // Oct 2012

    A New Framework for Mapping Business Domain Ontologies

    In cross enterprise collaboration, business domains need to interoperate and collaborate to each other for receiving profits. To create an understanding of enterprises and the ways they do business, a starting point could be business models. The goal of business modeling is to create semantically representations of business domain concepts...

    Provided By Azad University

  • White Papers // Apr 2012

    A New Hybrid Approach for Data Clustering Using Firefly Algorithm and K-Means

    Data clustering is a common technique for data analysis and is used in many fields, including data mining, pattern recognition and image analysis. K-means clustering is a common and simple approach for data clustering but this method has some limitation such as local optimal convergence and initial point sensibility. Firefly...

    Provided By Azad University

  • White Papers // Sep 2011

    Cloud Computing Security Threats and Responses

    Cloud computing is one of today's most exciting technologies due to its ability to reduce costs associated with computing while increasing flexibility and scalability for computer processes. During the past few years, cloud computing has grown from being a promising business idea to one of the fastest growing parts of...

    Provided By Azad University

  • White Papers // Sep 2011

    Enterprise Integration Using Service Oriented Architecture

    Today, one of the new solutions to build organizational systems applications, service-based solution is considered. This paper will attempt to identify with the full service approach the authors offer Integration. In this method, a process model of organization and inventory lists organizations as inputs received during a three-step process for...

    Provided By Azad University

  • White Papers // Jul 2011

    Security Model for Service-Oriented Architecture

    In this paper, the authors examine how security applies to Service Oriented Architecture (SOA). Before they discuss security for SOA, let's take a step back and examine what SOA is. SOA is an architectural approach which involves applications being exposed as "Services". Originally, services in SOA were associated with a...

    Provided By Azad University

  • White Papers // Mar 2010

    Presenting an Approach in Order to Predict Routers Traffic and Amount of Their Alternation in Internet Data Centers (IDC)

    These days many of the data centers are looking for new ways in order to increase the amount of responding to requests and also offering effectual and optimal services. Hence, in many of the data centers procedures like cache management of physical resources same as routers, load balancing, controlling over...

    Provided By Azad University

  • White Papers // Oct 2009

    Nonlinear Fading Channel Equalization of BPSK Signals Using Multiplicative Neuron Model

    A high order feed forward neural network architecture with optimum number of nodes is used for adaptive channel equalization in this paper. The replacement of summation at each node by multiplication results in more powerful mapping because of its capability of processing higher-order information from training data. The equalizer is...

    Provided By Azad University

  • White Papers // Sep 2009

    ODMRP With Quality of Service and Local Recovery With Security Support

    Multicasting is the transmission of packet to group of hosts identified by destination address. A multicast datagram is typically delivered to all members of its destination host group with the same reliability as regular unicast datagrams. In the case of IP, for example, the datagram is not guaranteed to arrive...

    Provided By Azad University

  • White Papers // Jun 2009

    A Differential Adaptive Learning Rate Method for Back-Propagation Neural Networks

    In this paper a high speed learning method using Differential Adaptive Learning Rate (DALRM) is proposed. Comparison of this method with other methods such as standard BP, Nguyen-Widrow weight Initialization and Optical BP shows that the network's learning speed has highly increased. Learning often takes a long time to converge...

    Provided By Azad University

  • White Papers // Apr 2009

    A Novel Fuzzy Logic Base Scheduling Mechanism for Service Differentiation in IP Networks

    Quality of Service (QoS) refers to a set of rules or techniques that help the network administrators use the available network resources optimally to manage the effects of congestion and to treat the applications according to their needs. The Differentiated services architecture (DiffServ) allows providing quality of service to users....

    Provided By Azad University

  • White Papers // Feb 2013

    Analysis and Design by Agent Based MaSE Methodology: A Case Study

    Multiagent Systems Engineering (MaSE) Methodology is one of old object-oriented methodology which supports the development process and is established based on the development of the object-oriented software engineering methods and their adjustment with the agent view. Some characteristics of the agent like autonomy, creativity and pre-activated are not paid attention....

    Provided By Azad University

  • White Papers // Feb 2013

    Aspect-Oriented Software Development Based Solution for Intervention Concerns Problems:Case Study

    All existing methods for Developing Software Systems, most insist on a separate system to keep the components together till they have been had the least overlapping. But these methods in the management system those have some parts and are using use case, and involved in the other parts of the...

    Provided By Azad University

  • White Papers // Sep 2011

    Cloud Computing Security Threats and Responses

    Cloud computing is one of today's most exciting technologies due to its ability to reduce costs associated with computing while increasing flexibility and scalability for computer processes. During the past few years, cloud computing has grown from being a promising business idea to one of the fastest growing parts of...

    Provided By Azad University

  • White Papers // Oct 2012

    Secure Virtualization Technology

    Cloud is one of today's most interesting technologies because of it can reduce cost and make flexibility and scalability. Hence, cloud computing became a promising business from a pure idea in a few years. However, there are some issues in cloud about which IT organizations concern such as security. As...

    Provided By Azad University

  • White Papers // Sep 2009

    ODMRP With Quality of Service and Local Recovery With Security Support

    Multicasting is the transmission of packet to group of hosts identified by destination address. A multicast datagram is typically delivered to all members of its destination host group with the same reliability as regular unicast datagrams. In the case of IP, for example, the datagram is not guaranteed to arrive...

    Provided By Azad University

  • White Papers // Jun 2009

    A Differential Adaptive Learning Rate Method for Back-Propagation Neural Networks

    In this paper a high speed learning method using Differential Adaptive Learning Rate (DALRM) is proposed. Comparison of this method with other methods such as standard BP, Nguyen-Widrow weight Initialization and Optical BP shows that the network's learning speed has highly increased. Learning often takes a long time to converge...

    Provided By Azad University

  • White Papers // Oct 2009

    Nonlinear Fading Channel Equalization of BPSK Signals Using Multiplicative Neuron Model

    A high order feed forward neural network architecture with optimum number of nodes is used for adaptive channel equalization in this paper. The replacement of summation at each node by multiplication results in more powerful mapping because of its capability of processing higher-order information from training data. The equalizer is...

    Provided By Azad University

  • White Papers // Apr 2012

    A New Hybrid Approach for Data Clustering Using Firefly Algorithm and K-Means

    Data clustering is a common technique for data analysis and is used in many fields, including data mining, pattern recognition and image analysis. K-means clustering is a common and simple approach for data clustering but this method has some limitation such as local optimal convergence and initial point sensibility. Firefly...

    Provided By Azad University

  • White Papers // Sep 2011

    Enterprise Integration Using Service Oriented Architecture

    Today, one of the new solutions to build organizational systems applications, service-based solution is considered. This paper will attempt to identify with the full service approach the authors offer Integration. In this method, a process model of organization and inventory lists organizations as inputs received during a three-step process for...

    Provided By Azad University

  • White Papers // Jul 2011

    Security Model for Service-Oriented Architecture

    In this paper, the authors examine how security applies to Service Oriented Architecture (SOA). Before they discuss security for SOA, let's take a step back and examine what SOA is. SOA is an architectural approach which involves applications being exposed as "Services". Originally, services in SOA were associated with a...

    Provided By Azad University

  • White Papers // Apr 2009

    A Novel Fuzzy Logic Base Scheduling Mechanism for Service Differentiation in IP Networks

    Quality of Service (QoS) refers to a set of rules or techniques that help the network administrators use the available network resources optimally to manage the effects of congestion and to treat the applications according to their needs. The Differentiated services architecture (DiffServ) allows providing quality of service to users....

    Provided By Azad University

  • White Papers // Oct 2012

    A New Framework for Mapping Business Domain Ontologies

    In cross enterprise collaboration, business domains need to interoperate and collaborate to each other for receiving profits. To create an understanding of enterprises and the ways they do business, a starting point could be business models. The goal of business modeling is to create semantically representations of business domain concepts...

    Provided By Azad University

  • White Papers // Mar 2010

    Presenting an Approach in Order to Predict Routers Traffic and Amount of Their Alternation in Internet Data Centers (IDC)

    These days many of the data centers are looking for new ways in order to increase the amount of responding to requests and also offering effectual and optimal services. Hence, in many of the data centers procedures like cache management of physical resources same as routers, load balancing, controlling over...

    Provided By Azad University