Ferdowsi University Of Mashhad

Displaying 1-9 of 9 results

  • White Papers // Jul 2013

    Designing Secure Clustering Protocol with the Approach of Reducing Energy Consumption in Wireless Sensor Networks

    In recent years, many researchers have focused on wireless sensor networks and their applications. To obtain scalability potential in these networks most of the nodes are categorized as distinct groups named cluster and the node which is selected as cluster head or Aggregation Node offers the operation of data collection...

    Provided By Ferdowsi University Of Mashhad

  • White Papers // Apr 2013

    A Parallel High Speed General Architecture for Digital Fuzzy Logic Controllers

    In this paper, the authors present design and implementation of a general parallel high speed architecture for digital Fuzzy Logic Controller (FLC). The proposed design is in structural level in which adder, multiplier, and divider used in FLC have Fine-Grain multiplexer based pipelined array structure. Simulations were carried out by...

    Provided By Ferdowsi University Of Mashhad

  • White Papers // May 2012

    Fast Feature Reduction in Intrusion Detection Datasets

    In the most Intrusion Detection Systems (IDS), a system tries to learn characteristics of different type of attacks by analyzing packets that sent or received in network. These packets have a lot of features. But not all of them are required to be analyzed to detect that specific type of...

    Provided By Ferdowsi University Of Mashhad

  • White Papers // Dec 2011

    An Optimized Congestion Control and Path Management Scheme for SCTP

    In this paper, a new SCTP congestion control mechanism is introduced in multi-homing mode. Congestion in each route can be avoided or can be controlled, based on an Active Queue Management (AQM) method. Also, routers compute probability of congestion for the sources on the paths and then notify them. Therefore,...

    Provided By Ferdowsi University Of Mashhad

  • White Papers // Nov 2011

    Capacity Region of Multiple Access Relay Channels With Orthogonal Components

    In this paper, the authors introduce multiple access relay channel with orthogonal components from the senders to the relay receiver and from the senders and relay to the receiver. Their model is motivated by the practical constraint in wireless communications that a node cannot send and receive at the same...

    Provided By Ferdowsi University Of Mashhad

  • White Papers // May 2011

    Budget Constrained Scheduling of Grid Workflows Using Partial Critical Paths

    Workflow scheduling on utility Grids is a complex multi-objective optimization problem which tries to optimize several scheduling criteria such as execution time and cost. One common approach to the problem is to optimize only one criterion, while other criteria are constrained within fixed thresholds. In this paper, the authors propose...

    Provided By Ferdowsi University Of Mashhad

  • White Papers // Feb 2011

    Computation of the Capacity for Discrete Memoryless Channels and Sum Capacity of Multiple Access Channels With Causal Side Information at Receiver

    Capacity analysis and computation for communication channels with side information at the receiver is an important area of research. Cover-Chiang have proved the increment of capacity with non-causal information at the receiver. The authors investigate this capacity increment for the channel with causal side information and proposed an efficient algorithm...

    Provided By Ferdowsi University Of Mashhad

  • White Papers // Jul 2010

    Automatic Firewall Rules Generator for Anomaly Detection Systems with Apriori Algorithm

    Network intrusion detection systems have become a crucial issue for computer systems security infrastructures. Different methods and algorithms are developed and proposed in recent years to improve intrusion detection systems. The most important issue in current systems is that they are poor at detecting novel anomaly attacks. These kinds of...

    Provided By Ferdowsi University Of Mashhad

  • White Papers // Oct 2009

    A Hierarchical Possibilistic Clustering

    In this paper, the authors propose to combine two clustering approaches, namely fuzzy and possibilistic c-means. While fuzzy c-means algorithm finds suitable clusters for groups of data points, obtained memberships of data, however, encounters a major deficiency caused by misinterpretation of membership values of data points. Therefore, membership values cannot...

    Provided By Ferdowsi University Of Mashhad

  • White Papers // Oct 2009

    A Hierarchical Possibilistic Clustering

    In this paper, the authors propose to combine two clustering approaches, namely fuzzy and possibilistic c-means. While fuzzy c-means algorithm finds suitable clusters for groups of data points, obtained memberships of data, however, encounters a major deficiency caused by misinterpretation of membership values of data points. Therefore, membership values cannot...

    Provided By Ferdowsi University Of Mashhad

  • White Papers // May 2012

    Fast Feature Reduction in Intrusion Detection Datasets

    In the most Intrusion Detection Systems (IDS), a system tries to learn characteristics of different type of attacks by analyzing packets that sent or received in network. These packets have a lot of features. But not all of them are required to be analyzed to detect that specific type of...

    Provided By Ferdowsi University Of Mashhad

  • White Papers // Jul 2013

    Designing Secure Clustering Protocol with the Approach of Reducing Energy Consumption in Wireless Sensor Networks

    In recent years, many researchers have focused on wireless sensor networks and their applications. To obtain scalability potential in these networks most of the nodes are categorized as distinct groups named cluster and the node which is selected as cluster head or Aggregation Node offers the operation of data collection...

    Provided By Ferdowsi University Of Mashhad

  • White Papers // May 2011

    Budget Constrained Scheduling of Grid Workflows Using Partial Critical Paths

    Workflow scheduling on utility Grids is a complex multi-objective optimization problem which tries to optimize several scheduling criteria such as execution time and cost. One common approach to the problem is to optimize only one criterion, while other criteria are constrained within fixed thresholds. In this paper, the authors propose...

    Provided By Ferdowsi University Of Mashhad

  • White Papers // Dec 2011

    An Optimized Congestion Control and Path Management Scheme for SCTP

    In this paper, a new SCTP congestion control mechanism is introduced in multi-homing mode. Congestion in each route can be avoided or can be controlled, based on an Active Queue Management (AQM) method. Also, routers compute probability of congestion for the sources on the paths and then notify them. Therefore,...

    Provided By Ferdowsi University Of Mashhad

  • White Papers // Feb 2011

    Computation of the Capacity for Discrete Memoryless Channels and Sum Capacity of Multiple Access Channels With Causal Side Information at Receiver

    Capacity analysis and computation for communication channels with side information at the receiver is an important area of research. Cover-Chiang have proved the increment of capacity with non-causal information at the receiver. The authors investigate this capacity increment for the channel with causal side information and proposed an efficient algorithm...

    Provided By Ferdowsi University Of Mashhad

  • White Papers // Nov 2011

    Capacity Region of Multiple Access Relay Channels With Orthogonal Components

    In this paper, the authors introduce multiple access relay channel with orthogonal components from the senders to the relay receiver and from the senders and relay to the receiver. Their model is motivated by the practical constraint in wireless communications that a node cannot send and receive at the same...

    Provided By Ferdowsi University Of Mashhad

  • White Papers // Jul 2010

    Automatic Firewall Rules Generator for Anomaly Detection Systems with Apriori Algorithm

    Network intrusion detection systems have become a crucial issue for computer systems security infrastructures. Different methods and algorithms are developed and proposed in recent years to improve intrusion detection systems. The most important issue in current systems is that they are poor at detecting novel anomaly attacks. These kinds of...

    Provided By Ferdowsi University Of Mashhad

  • White Papers // Apr 2013

    A Parallel High Speed General Architecture for Digital Fuzzy Logic Controllers

    In this paper, the authors present design and implementation of a general parallel high speed architecture for digital Fuzzy Logic Controller (FLC). The proposed design is in structural level in which adder, multiplier, and divider used in FLC have Fine-Grain multiplexer based pipelined array structure. Simulations were carried out by...

    Provided By Ferdowsi University Of Mashhad