Iran University of Science and Technology

Displaying 1-40 of 44 results

  • White Papers // Feb 2014

    K-Harmonic Means Data Clustering Using Combination of Particle Swarm Optimization and Tabu Search

    Clustering is one of the widely used techniques for data analysis. Also it is a tool to discover structures from inside of data without any previous knowledge. K-Harmonic Means (KHM) is a center-based clustering algorithm which solves sensitivity to initialization of the centers which is the main drawback of K-Means...

    Provided By Iran University of Science and Technology

  • White Papers // Oct 2013

    Study& Analysis of Cloud Based ERP Services

    In this paper, the authors explore the knowledge of the existing studies related to cloud computing current trend. The outcome of their work will be demonstrated in the form of diagram which will exemplify the ERP integration process for in-house and cloud eco-system. It will provide a conceptual view to...

    Provided By Iran University of Science and Technology

  • White Papers // Aug 2013

    For an EPC-C1 G2 RFID Compliant Protocol, CRC with Concatenation: No; PRNG with Concatenation: Yes

    In this paper the authors present new constraints to EPCglobal Class 1 Generation 2 (EPC- C1 G2) standard which if they have been considered in the design of EPC-C1 G2 complaint authentication protocols, lead to prevent predecessor's protocols' weaknesses and also present the secure ones. Also in this paper as...

    Provided By Iran University of Science and Technology

  • White Papers // Jul 2013

    Proposing a Strategic Framework for Distributed Manufacturing Execution System Using Cloud Computing

    In this paper, the authors introduce a strategic framework that uses service-oriented architecture to design distributed MES1 over cloud. In this study, the main structure of framework is defined in terms of a series of modules that communicate with each other by use of a design pattern, called mediator. Framework...

    Provided By Iran University of Science and Technology

  • White Papers // Jan 2013

    Frequency Hopping Spread Spectrum Security Improvement with Encrypted Spreading Codes in a Partial Band Noise Jamming Environment

    Frequency Hopping Spread Spectrum (FHSS) system is often deployed to protect wireless communication from jamming or to preclude undesired reception of the signal. Such themes can only be achieved if the jammer or undesired receiver does not have the knowledge of the spreading code. For this reason, unencrypted M-sequences are...

    Provided By Iran University of Science and Technology

  • White Papers // Jul 2012

    A Bayesian Framework for Face Recognition

    In this paper, a statistical face recognition scheme proposed by combining the techniques of Bayes' theorem and Parzen estimation applied on various features such as Discrete Wavelet Transform (DWT), Discrete Cosine Transform (DCT) and Principle Component Analysis (PCA). Parzen algorithm estimates the conditional probabilities for each class and according to...

    Provided By Iran University of Science and Technology

  • White Papers // Jun 2012

    On the Traceability of Tags in SUAP RFID Authentication Protocols

    Widespread adoption of RFID technology in all aspects of the people life mainly depends on the fixing the privacy concerns of this technology's customers. Using a tagged object should not lead to existence of the tracing possibility. This concern is a challenging issue that has motivated the researchers to propose...

    Provided By Iran University of Science and Technology

  • White Papers // Jun 2012

    Secure FSM- Based Arithmetic Codes

    Recently, arithmetic coding has attracted the attention of many scholars because of its high compression capability. Accordingly, in this paper a method which adds secrecy to this well-known source code is proposed. Finite State Arithmetic Code (FSAC) is used as source code to add security. Its Finite State Machine (FSM)...

    Provided By Iran University of Science and Technology

  • White Papers // May 2012

    Stability Analysis of Tandem SIP Proxies

    It has been shown that the throughput of Session Initiation Protocol (SIP) proxies is largely degraded during overload conditions due to the built in message retransmission mechanism of SIP. Many overload control algorithms have been proposed with the objective of keeping SIP proxy throughput at an acceptable level when overload...

    Provided By Iran University of Science and Technology

  • White Papers // May 2012

    Involving Kalman Filter Technique for Increasing the Reliability and Efficiency of Cloud Computing

    Cloud is a virtual image about some amount of undefined powers, that is widespread and had unknown power and inexact amount of hardware and software configurations, and because of the authors haven't any information about clouds location and time dimensions and also the amounts of its sources they tell that...

    Provided By Iran University of Science and Technology

  • White Papers // Feb 2012

    On the Security of Lo Et Al.'s Ownership Transfer Protocol

    Recently Lo et al. have proposed an ownership transfer protocol for RFID objects using lightweight computing operators and claim their protocol provides stronger security robustness and higher performance efficiency in comparison with existing solutions. However, in this paper the authors show that their claim unfortunately does not hold. More precisely,...

    Provided By Iran University of Science and Technology

  • White Papers // Jan 2012

    Security Analysis of a PUF Based RFID Authentication Protocol

    In this paper, the authors consider the security of a PUF based RFID Authentication protocol which has been recently proposed by Bassil et al.. The designers have claimed that their protocol offers immunity against a broad range of attacks while it provides excellent performance. However, they prove in contrary to...

    Provided By Iran University of Science and Technology

  • White Papers // Oct 2011

    On the Security of Mutual Authentication Protocols for RFID Systems

    Radio Frequency IDentification (RFID) is a wireless technology which is employed for identifying and tracking objects in various applications of the people daily life. Some common usage of this technology are in supply chain management in retail or wholesale stores, library access control, toll payments, theft prevention, human implants, e-Passports...

    Provided By Iran University of Science and Technology

  • White Papers // Sep 2011

    Adaptive Data Stream Management System Using Learning Automata

    In many modern applications, data are received as infinite, rapid, unpredictable and time-variant data elements that are known as data streams. Systems which are able to process data streams with such properties are called Data Stream Management Systems (DSMS). Due to the unpredictable and time-variant properties of data streams as...

    Provided By Iran University of Science and Technology

  • White Papers // Jul 2011

    Implementation of Cooperative Virtual MISO Communication in Underwater Acoustic Wireless Sensor Networks

    In this paper, for the first time, virtual antennas are used in an underwater acoustic wireless sensor network and their effects on total system performance are studied. In Multiple Input Single Output (MISO) channels, spacial diversity is used to improve the system performance. In certain networks, especially in underwater networks,...

    Provided By Iran University of Science and Technology

  • White Papers // Jun 2011

    Effective Parameters on Response Time of Data Stream Management Systems

    Considering rapid and time variant (bursty) nature of data streams, data would rapidly lost its value while time is going on. So, the results with high response time are not reliable in Data Stream Management Systems (DSMSs). In other words, one of the most important factors in data stream management...

    Provided By Iran University of Science and Technology

  • White Papers // May 2011

    On Design of Puf-Based Random Number Generators

    In this paper the authors propose a new architecture Physical Random Functions (or Physical Unclonable Functions, PUFs) to create a candidate hardware random number generator. So far several random number generators based on ring oscillators were introduced but all of them have either security or stability problems. This paper presents...

    Provided By Iran University of Science and Technology

  • White Papers // Feb 2011

    Cryptanalysis of Some Protocols for RFID Systems

    In this paper the authors analyze the security of the mutual authentication and ownership transfer protocols which have been recently proposed by Kulseng et al. The analysis demonstrates a variety of attacks against these protocols. This paper presents a secret parameters disclosure attack which discloses any secret parameter between the...

    Provided By Iran University of Science and Technology

  • White Papers // Dec 2010

    Security Enhanced Routing Protocol for Ad Hoc Networks

    Ad hoc networks are collections of wireless mobile devices with limited broadcast range and resources, and with no fixed infrastructure. A routing issue is one of the most basic networking issues in ad hoc networks. An adversary can easily palsy the network by attacking the routing protocol. There are some...

    Provided By Iran University of Science and Technology

  • White Papers // Nov 2010

    MPCA+DATER: A Novel Approach for Face Recognition Based on Tensor Objects

    A novel approach proposed to solve the supervised dimensionality reduction problem by using tensor objects. MPCA used for unsupervised dimension reduction. Then Discriminant Analysis with TEnsor Representation- (DATER) is proposed to find the best subspaces. It's important that both of those algorithms work in tensor space so the structure of...

    Provided By Iran University of Science and Technology

  • White Papers // Sep 2010

    Cryptanalysis of Tav-128 Hash Function

    Many RFID protocols use cryptographic hash functions for their security. The resource constrained nature of RFID systems forces the use of light weight cryptographic algorithms. Tav-128 is one such 128-bit light weight hash function proposed by Peris-Lopez et al. for a low-cost RFID tag authentication protocol. Apart from some statistical...

    Provided By Iran University of Science and Technology

  • White Papers // Sep 2010

    A New Approach in Packet Scheduling in the VANET

    Vehicular Ad hoc Networks (VANET) are expected to have great potential to improve both traffic safety and comfort in the future. When many vehicles want to access data through roadside unit, data scheduling become an important issue. In this paper, the authors identify some challenges in roadside based data access....

    Provided By Iran University of Science and Technology

  • White Papers // Aug 2010

    Intelligent Neural Network Based STLF

    Short-Term Load Forecasting (STLF) plays an important role for the economic and secure operation of power systems. In this paper, Continuous Genetic Algorithm (CGA) is employed to evolve the optimum large neural networks structure and connecting weights for one-day ahead electric load forecasting problem. This paper describes the process of...

    Provided By Iran University of Science and Technology

  • White Papers // Apr 2010

    Dependability Considerations in Wireless Sensor Networks Applications

    Recently, the use of wireless sensor networks has spread to applications areas that are not viable or cost-efficient to be run on other types of networks. Due to some critical tasks done in these types of networks, the majority of sensor networks applications should be dependable and should be run...

    Provided By Iran University of Science and Technology

  • White Papers // Feb 2010

    A Meta-Model Based Approach for Definition of a Multi-Formalism Modeling Framework

    Many software tools and environments are developed for modeling discrete-event systems. Although, most of the existing tool are proposed for modeling with one or a few modeling languages. In this paper, the authors propose a meta-modeling approach for definition of a multi-formalism modeling framework for Petri nets and related formal...

    Provided By Iran University of Science and Technology

  • White Papers // Jan 2010

    Classifying Application Phases in Asymmetric Chip Multiprocessors

    In present study, in order to improve the performance and reduce the amount of power which is dissipated in heterogeneous multi-core processors, the ability of detecting the program execution phases is investigated. The program's execution intervals have been classified in different phases based on their throughput and the utilization of...

    Provided By Iran University of Science and Technology

  • White Papers // Jan 2010

    Cryptanalysis of an Elliptic Curve-Based Signcryption Scheme

    The signcryption is a relatively new cryptographic technique that is supposed to fulfill the functionalities of encryption and digital signature in a single logical step. Although several signcryption schemes are proposed over the years, some of them are proved to have security problems. In this paper, the security of Han...

    Provided By Iran University of Science and Technology

  • White Papers // Nov 2009

    STLF Based on Optimized Neural Network Using PSO

    The quality of short-term load forecasting can improve the efficiency of planning and operation of electric utilities. Artificial Neural Networks (ANNs) are employed for nonlinear short-term load forecasting owing to their powerful nonlinear mapping capabilities. At present, there is no systematic methodology for optimal design and training of an artificial...

    Provided By Iran University of Science and Technology

  • White Papers // Nov 2009

    OFDM-CPM Performance and FOBP Under IEEE802.16 Scenario

    The future wireless communication networks will provide broadband services such as wireless Internet access to subscribers. Those broadband services require reliable and high-rate communications over time-dispersive (frequency-selective) channels with limited spectrum and Inter-Symbol Interference (ISI) caused by multi-path fading. Orthogonal Frequency Division Multiplex (OFDM) is one of the most promising...

    Provided By Iran University of Science and Technology

  • White Papers // Nov 2009

    SOAP Serialization Performance Enhancement

    The most straightforward way to improve performance of any system is to define the bottlenecks and think of ways to remove them. Web services are the inseparable part of any web application, as a result enhancing performance of web services will have a great effect on the overall performance of...

    Provided By Iran University of Science and Technology

  • White Papers // Nov 2009

    SOAP Serialization Performance Enhancement Design and Implementation of a Middleware

    The most straightforward way to improve performance of any system is to define the bottlenecks and think of ways to remove them. Web services are the inseparable part of any web application, as a result enhancing performance of web services will have a great effect on the overall performance of...

    Provided By Iran University of Science and Technology

  • White Papers // Oct 2009

    Design a Secure Composite Key-Management Scheme in Ad-Hoc Networks Using Localization

    A mobile Ad-Hoc network is a collection of wireless mobile nodes, dynamically forming a temporary network without the use of any existing network infrastructure or centralized Administration. Providing security support for mobile Ad-Hoc networks is hard to achieve due to the vulnerability of the links, the limited physical protection of...

    Provided By Iran University of Science and Technology

  • White Papers // Sep 2009

    Category-Based Selection of Effective Parameters for Intrusion Detection

    Existing intrusion detection techniques emphasize on building intrusion detection model based on all features provided. In feature-based intrusion detection, some selected features may found to be redundant and useless. Feature selection can reduce the computation power requirements and model complexity. This paper proposes a category-based selection of effective parameters for...

    Provided By Iran University of Science and Technology

  • White Papers // Jun 2009

    XDANNG: XML Based Distributed Artificial Neural Network With Globus Toolkit

    Artificial Neural Network is one of the most common AI application fields. This field has direct and indirect usages most sciences. The main goal of ANN is to imitate biological neural networks for solving scientific problems. But the level of parallelism is the main problem of ANN systems in comparison...

    Provided By Iran University of Science and Technology

  • White Papers // Jun 2009

    Global Stability Analysis for an Internet Congestion Control Model With a Time-Varying Link Capacity

    In this paper, a global stability analysis is given for a rate-based congestion control system modeled by a nonlinear delayed differential equation. The model determines the dynamics of a single-source single-link network, with a time-varying capacity of link and a fixed communication delay. The authors obtain a sufficient delay-independent conditions...

    Provided By Iran University of Science and Technology

  • White Papers // Jun 2009

    Grid-HPA: Predicting Resource Requirements of a Job in the Grid Computing Environment

    For complete support of Quality of Service, it is better that environment itself predicts resource requirements of a job by using special methods in the Grid computing. The exact and correct prediction causes exact matching of required resources with available resources. After the execution of each job, the used resources...

    Provided By Iran University of Science and Technology

  • White Papers // Jun 2009

    Voice Over IP Technology Development in Offshore Industry: System Dynamics Approach

    Nowadays, offshore's complicated facilities need their own communications requirements. Nevertheless, developing and real-world applications of new communications technology are faced with tremendous problems for new technology users, developers and implementers. Traditional systems engineering cannot be capable of developing a new technology effectively because it does not consider the dynamics of...

    Provided By Iran University of Science and Technology

  • White Papers // Jun 2009

    Strategies for Securing Safety Messages With Fixed Key Infrastructure in Vehicular Network

    Vehicular communications play a substantial role in providing safety in transportation by means of safety message exchange. Researchers have proposed several solutions for securing safety messages. Protocols based on a fixed key infrastructure are more efficient in implementation and maintain stronger security in comparison with dynamic structures. These protocols utilize...

    Provided By Iran University of Science and Technology

  • White Papers // Apr 2009

    A Replacement Algorithm Based on Weighting and Ranking Cache Objects

    Caching is one of the major steps in system designing to reach a higher performance in operating systems, databases and World Wide Web. High performance processors need memory systems with a proper access time, but still there is a big gap between performances of processors and memory systems. Virtual memory...

    Provided By Iran University of Science and Technology

  • White Papers // Nov 2008

    DNS Spoofing Attack Simulation for Model-Based Security Evaluation

    Security of computer systems and networks has become very significant nowadays. Introducing and using a unified framework for modeling and Quantitative Security Evaluation (QSE) is an open problem. The results of the study on drawbacks of the existing security assessment methodologies motivated one to use a simulation framework for model-based...

    Provided By Iran University of Science and Technology

  • White Papers // Jan 2010

    Classifying Application Phases in Asymmetric Chip Multiprocessors

    In present study, in order to improve the performance and reduce the amount of power which is dissipated in heterogeneous multi-core processors, the ability of detecting the program execution phases is investigated. The program's execution intervals have been classified in different phases based on their throughput and the utilization of...

    Provided By Iran University of Science and Technology

  • White Papers // Sep 2010

    A New Approach in Packet Scheduling in the VANET

    Vehicular Ad hoc Networks (VANET) are expected to have great potential to improve both traffic safety and comfort in the future. When many vehicles want to access data through roadside unit, data scheduling become an important issue. In this paper, the authors identify some challenges in roadside based data access....

    Provided By Iran University of Science and Technology

  • White Papers // Jun 2009

    Global Stability Analysis for an Internet Congestion Control Model With a Time-Varying Link Capacity

    In this paper, a global stability analysis is given for a rate-based congestion control system modeled by a nonlinear delayed differential equation. The model determines the dynamics of a single-source single-link network, with a time-varying capacity of link and a fixed communication delay. The authors obtain a sufficient delay-independent conditions...

    Provided By Iran University of Science and Technology

  • White Papers // Jun 2009

    XDANNG: XML Based Distributed Artificial Neural Network With Globus Toolkit

    Artificial Neural Network is one of the most common AI application fields. This field has direct and indirect usages most sciences. The main goal of ANN is to imitate biological neural networks for solving scientific problems. But the level of parallelism is the main problem of ANN systems in comparison...

    Provided By Iran University of Science and Technology

  • White Papers // Nov 2009

    SOAP Serialization Performance Enhancement

    The most straightforward way to improve performance of any system is to define the bottlenecks and think of ways to remove them. Web services are the inseparable part of any web application, as a result enhancing performance of web services will have a great effect on the overall performance of...

    Provided By Iran University of Science and Technology

  • White Papers // May 2011

    On Design of Puf-Based Random Number Generators

    In this paper the authors propose a new architecture Physical Random Functions (or Physical Unclonable Functions, PUFs) to create a candidate hardware random number generator. So far several random number generators based on ring oscillators were introduced but all of them have either security or stability problems. This paper presents...

    Provided By Iran University of Science and Technology

  • White Papers // Jun 2009

    Grid-HPA: Predicting Resource Requirements of a Job in the Grid Computing Environment

    For complete support of Quality of Service, it is better that environment itself predicts resource requirements of a job by using special methods in the Grid computing. The exact and correct prediction causes exact matching of required resources with available resources. After the execution of each job, the used resources...

    Provided By Iran University of Science and Technology

  • White Papers // Jun 2009

    Voice Over IP Technology Development in Offshore Industry: System Dynamics Approach

    Nowadays, offshore's complicated facilities need their own communications requirements. Nevertheless, developing and real-world applications of new communications technology are faced with tremendous problems for new technology users, developers and implementers. Traditional systems engineering cannot be capable of developing a new technology effectively because it does not consider the dynamics of...

    Provided By Iran University of Science and Technology

  • White Papers // Jun 2009

    Strategies for Securing Safety Messages With Fixed Key Infrastructure in Vehicular Network

    Vehicular communications play a substantial role in providing safety in transportation by means of safety message exchange. Researchers have proposed several solutions for securing safety messages. Protocols based on a fixed key infrastructure are more efficient in implementation and maintain stronger security in comparison with dynamic structures. These protocols utilize...

    Provided By Iran University of Science and Technology

  • White Papers // May 2008

    Improving TFRC Over DCCP Protocol in Mobile Wireless Networks

    TCP-Friendly Rate Control (TFRC) is a congestion control mechanism based on TCP Reno's throughput equation but provides a smooth rate in opposite to TCP. It is applicable to multimedia flows and is designed for best-effort Internet environments. TFRC interprets any packet loss as an indication of congestion and this leads...

    Provided By Iran University of Science and Technology

  • White Papers // Feb 2014

    K-Harmonic Means Data Clustering Using Combination of Particle Swarm Optimization and Tabu Search

    Clustering is one of the widely used techniques for data analysis. Also it is a tool to discover structures from inside of data without any previous knowledge. K-Harmonic Means (KHM) is a center-based clustering algorithm which solves sensitivity to initialization of the centers which is the main drawback of K-Means...

    Provided By Iran University of Science and Technology

  • White Papers // Oct 2013

    Study& Analysis of Cloud Based ERP Services

    In this paper, the authors explore the knowledge of the existing studies related to cloud computing current trend. The outcome of their work will be demonstrated in the form of diagram which will exemplify the ERP integration process for in-house and cloud eco-system. It will provide a conceptual view to...

    Provided By Iran University of Science and Technology

  • White Papers // Jul 2013

    Proposing a Strategic Framework for Distributed Manufacturing Execution System Using Cloud Computing

    In this paper, the authors introduce a strategic framework that uses service-oriented architecture to design distributed MES1 over cloud. In this study, the main structure of framework is defined in terms of a series of modules that communicate with each other by use of a design pattern, called mediator. Framework...

    Provided By Iran University of Science and Technology

  • White Papers // Apr 2009

    A Replacement Algorithm Based on Weighting and Ranking Cache Objects

    Caching is one of the major steps in system designing to reach a higher performance in operating systems, databases and World Wide Web. High performance processors need memory systems with a proper access time, but still there is a big gap between performances of processors and memory systems. Virtual memory...

    Provided By Iran University of Science and Technology

  • White Papers // Sep 2009

    Category-Based Selection of Effective Parameters for Intrusion Detection

    Existing intrusion detection techniques emphasize on building intrusion detection model based on all features provided. In feature-based intrusion detection, some selected features may found to be redundant and useless. Feature selection can reduce the computation power requirements and model complexity. This paper proposes a category-based selection of effective parameters for...

    Provided By Iran University of Science and Technology

  • White Papers // Oct 2009

    Design a Secure Composite Key-Management Scheme in Ad-Hoc Networks Using Localization

    A mobile Ad-Hoc network is a collection of wireless mobile nodes, dynamically forming a temporary network without the use of any existing network infrastructure or centralized Administration. Providing security support for mobile Ad-Hoc networks is hard to achieve due to the vulnerability of the links, the limited physical protection of...

    Provided By Iran University of Science and Technology

  • White Papers // Jun 2008

    Adaptive Admission Control for Quality of Service Guarantee in Differentiated Services Networks

    For avoiding congestion, the amount of injected traffic into the network should be controlled. Differentiated services network can support the Quality of Service (QoS). For QoS guarantee, Admission control mechanism should be added to the edge routers of the network. The process of deciding to accept or reject a new...

    Provided By Iran University of Science and Technology

  • White Papers // Apr 2010

    Dependability Considerations in Wireless Sensor Networks Applications

    Recently, the use of wireless sensor networks has spread to applications areas that are not viable or cost-efficient to be run on other types of networks. Due to some critical tasks done in these types of networks, the majority of sensor networks applications should be dependable and should be run...

    Provided By Iran University of Science and Technology

  • White Papers // Nov 2009

    OFDM-CPM Performance and FOBP Under IEEE802.16 Scenario

    The future wireless communication networks will provide broadband services such as wireless Internet access to subscribers. Those broadband services require reliable and high-rate communications over time-dispersive (frequency-selective) channels with limited spectrum and Inter-Symbol Interference (ISI) caused by multi-path fading. Orthogonal Frequency Division Multiplex (OFDM) is one of the most promising...

    Provided By Iran University of Science and Technology

  • White Papers // Feb 2011

    Cryptanalysis of Some Protocols for RFID Systems

    In this paper the authors analyze the security of the mutual authentication and ownership transfer protocols which have been recently proposed by Kulseng et al. The analysis demonstrates a variety of attacks against these protocols. This paper presents a secret parameters disclosure attack which discloses any secret parameter between the...

    Provided By Iran University of Science and Technology

  • White Papers // Feb 2012

    On the Security of Lo Et Al.'s Ownership Transfer Protocol

    Recently Lo et al. have proposed an ownership transfer protocol for RFID objects using lightweight computing operators and claim their protocol provides stronger security robustness and higher performance efficiency in comparison with existing solutions. However, in this paper the authors show that their claim unfortunately does not hold. More precisely,...

    Provided By Iran University of Science and Technology

  • White Papers // May 2012

    Stability Analysis of Tandem SIP Proxies

    It has been shown that the throughput of Session Initiation Protocol (SIP) proxies is largely degraded during overload conditions due to the built in message retransmission mechanism of SIP. Many overload control algorithms have been proposed with the objective of keeping SIP proxy throughput at an acceptable level when overload...

    Provided By Iran University of Science and Technology

  • White Papers // Jun 2012

    Secure FSM- Based Arithmetic Codes

    Recently, arithmetic coding has attracted the attention of many scholars because of its high compression capability. Accordingly, in this paper a method which adds secrecy to this well-known source code is proposed. Finite State Arithmetic Code (FSAC) is used as source code to add security. Its Finite State Machine (FSM)...

    Provided By Iran University of Science and Technology

  • White Papers // Nov 2009

    SOAP Serialization Performance Enhancement Design and Implementation of a Middleware

    The most straightforward way to improve performance of any system is to define the bottlenecks and think of ways to remove them. Web services are the inseparable part of any web application, as a result enhancing performance of web services will have a great effect on the overall performance of...

    Provided By Iran University of Science and Technology

  • White Papers // Jun 2012

    On the Traceability of Tags in SUAP RFID Authentication Protocols

    Widespread adoption of RFID technology in all aspects of the people life mainly depends on the fixing the privacy concerns of this technology's customers. Using a tagged object should not lead to existence of the tracing possibility. This concern is a challenging issue that has motivated the researchers to propose...

    Provided By Iran University of Science and Technology

  • White Papers // Nov 2010

    MPCA+DATER: A Novel Approach for Face Recognition Based on Tensor Objects

    A novel approach proposed to solve the supervised dimensionality reduction problem by using tensor objects. MPCA used for unsupervised dimension reduction. Then Discriminant Analysis with TEnsor Representation- (DATER) is proposed to find the best subspaces. It's important that both of those algorithms work in tensor space so the structure of...

    Provided By Iran University of Science and Technology

  • White Papers // Jul 2012

    A Bayesian Framework for Face Recognition

    In this paper, a statistical face recognition scheme proposed by combining the techniques of Bayes' theorem and Parzen estimation applied on various features such as Discrete Wavelet Transform (DWT), Discrete Cosine Transform (DCT) and Principle Component Analysis (PCA). Parzen algorithm estimates the conditional probabilities for each class and according to...

    Provided By Iran University of Science and Technology

  • White Papers // Jun 2011

    Effective Parameters on Response Time of Data Stream Management Systems

    Considering rapid and time variant (bursty) nature of data streams, data would rapidly lost its value while time is going on. So, the results with high response time are not reliable in Data Stream Management Systems (DSMSs). In other words, one of the most important factors in data stream management...

    Provided By Iran University of Science and Technology

  • White Papers // May 2012

    Involving Kalman Filter Technique for Increasing the Reliability and Efficiency of Cloud Computing

    Cloud is a virtual image about some amount of undefined powers, that is widespread and had unknown power and inexact amount of hardware and software configurations, and because of the authors haven't any information about clouds location and time dimensions and also the amounts of its sources they tell that...

    Provided By Iran University of Science and Technology

  • White Papers // Jan 2013

    Frequency Hopping Spread Spectrum Security Improvement with Encrypted Spreading Codes in a Partial Band Noise Jamming Environment

    Frequency Hopping Spread Spectrum (FHSS) system is often deployed to protect wireless communication from jamming or to preclude undesired reception of the signal. Such themes can only be achieved if the jammer or undesired receiver does not have the knowledge of the spreading code. For this reason, unencrypted M-sequences are...

    Provided By Iran University of Science and Technology

  • White Papers // Sep 2011

    Adaptive Data Stream Management System Using Learning Automata

    In many modern applications, data are received as infinite, rapid, unpredictable and time-variant data elements that are known as data streams. Systems which are able to process data streams with such properties are called Data Stream Management Systems (DSMS). Due to the unpredictable and time-variant properties of data streams as...

    Provided By Iran University of Science and Technology

  • White Papers // Aug 2013

    For an EPC-C1 G2 RFID Compliant Protocol, CRC with Concatenation: No; PRNG with Concatenation: Yes

    In this paper the authors present new constraints to EPCglobal Class 1 Generation 2 (EPC- C1 G2) standard which if they have been considered in the design of EPC-C1 G2 complaint authentication protocols, lead to prevent predecessor's protocols' weaknesses and also present the secure ones. Also in this paper as...

    Provided By Iran University of Science and Technology

  • White Papers // Oct 2011

    On the Security of Mutual Authentication Protocols for RFID Systems

    Radio Frequency IDentification (RFID) is a wireless technology which is employed for identifying and tracking objects in various applications of the people daily life. Some common usage of this technology are in supply chain management in retail or wholesale stores, library access control, toll payments, theft prevention, human implants, e-Passports...

    Provided By Iran University of Science and Technology

  • White Papers // Sep 2010

    Cryptanalysis of Tav-128 Hash Function

    Many RFID protocols use cryptographic hash functions for their security. The resource constrained nature of RFID systems forces the use of light weight cryptographic algorithms. Tav-128 is one such 128-bit light weight hash function proposed by Peris-Lopez et al. for a low-cost RFID tag authentication protocol. Apart from some statistical...

    Provided By Iran University of Science and Technology

  • White Papers // May 2008

    A Distributed Target Tracking Algorithm for Near/far Binary Sensor Networks

    In this paper the authors examine the role of very simple and noisy sensors for real-time distributed tracking problem. The authors use a proposed binary sensor model, where each sensor's value is converted reliably to one bit of information only: whether the object is moving toward the sensor or away...

    Provided By Iran University of Science and Technology

  • White Papers // May 2008

    Comparison of Evaluation Parameters Based on Mobility Management Protocols in Wireless Networks

    Mobility management has a significant role in recent years due to the popularity and increased number of mobile devices. Mobility management is responsible for supporting seamless connectivity and uninterrupted services across wireless networks when a mobile node moves from an access point to another. In this paper the authors discuss...

    Provided By Iran University of Science and Technology

  • White Papers // Nov 2008

    DNS Spoofing Attack Simulation for Model-Based Security Evaluation

    Security of computer systems and networks has become very significant nowadays. Introducing and using a unified framework for modeling and Quantitative Security Evaluation (QSE) is an open problem. The results of the study on drawbacks of the existing security assessment methodologies motivated one to use a simulation framework for model-based...

    Provided By Iran University of Science and Technology

  • White Papers // Aug 2010

    Intelligent Neural Network Based STLF

    Short-Term Load Forecasting (STLF) plays an important role for the economic and secure operation of power systems. In this paper, Continuous Genetic Algorithm (CGA) is employed to evolve the optimum large neural networks structure and connecting weights for one-day ahead electric load forecasting problem. This paper describes the process of...

    Provided By Iran University of Science and Technology

  • White Papers // Nov 2009

    STLF Based on Optimized Neural Network Using PSO

    The quality of short-term load forecasting can improve the efficiency of planning and operation of electric utilities. Artificial Neural Networks (ANNs) are employed for nonlinear short-term load forecasting owing to their powerful nonlinear mapping capabilities. At present, there is no systematic methodology for optimal design and training of an artificial...

    Provided By Iran University of Science and Technology

  • White Papers // Feb 2010

    A Meta-Model Based Approach for Definition of a Multi-Formalism Modeling Framework

    Many software tools and environments are developed for modeling discrete-event systems. Although, most of the existing tool are proposed for modeling with one or a few modeling languages. In this paper, the authors propose a meta-modeling approach for definition of a multi-formalism modeling framework for Petri nets and related formal...

    Provided By Iran University of Science and Technology