Islamic Azad University

Displaying 1-40 of 245 results

  • White Papers // Jan 2015

    An Approach for Transforming of Relational Databases to OWL Ontology

    Rapid growth of documents, web pages, and other types of text content is a huge challenge for the modern content management systems. One of the problems in the areas of information storage and retrieval is the lacking of semantic data. Ontologies can present knowledge in sharable and repeatedly usable manner...

    Provided By Islamic Azad University

  • White Papers // Nov 2014

    Intrusion Detection System in Computer Network Using Hybrid Algorithms (SVM and ABC)

    In recent years, the needs of the Internet are felt in lives of all people. Accordingly, many studies have been done on security in virtual environment. Old techniques such as firewalls, authentication and encryption could not provide Internet security completely; So, Intrusion detection system is created as a new solution...

    Provided By Islamic Azad University

  • White Papers // Oct 2014

    Energy Efficient Full Adder Cell Design with Using Carbon Nanotube Field Effect Transistors in 32 Nanometer Technology

    Full Adder is one of the critical parts of logical and arithmetic units. So, presenting a low power full adder cell reduces the power consumption of the entire circuit. Also, using nano-scale transistors, because of their unique characteristics will save energy consumption and decrease the chip area. In this paper,...

    Provided By Islamic Azad University

  • White Papers // Aug 2014

    An Analytical Algorithm of Component-Based Heterogeneous Software Architectural Styles Performance Prediction

    With regard to the society's need for complicated software and high level of expenses on its development, it is necessary to take all stakeholders' requirements and the demands into consideration, before any investments and put on the design and utilization stages. Software architecture is a technical description of a software...

    Provided By Islamic Azad University

  • White Papers // Aug 2014

    A Routing Algorithm Based on Fuzzy Clustering and Minimum Cost Tree (FCMCT) in Wireless Sensor Network

    Now-a-days, wireless sensor network has been of interest to investigators and the greatest challenge in this part is the limited energy of sensors. Sensors usually are in the harsh environments and transit in these environments is hard and impossible and moreover the nodes use non-replaceable batteries. Because of this, saving...

    Provided By Islamic Azad University

  • White Papers // May 2014

    Data Steganography on VoIP Through Combination of Residue Number System and DNA Sequences

    Today, optimal performance and cost advantages of using Internet telephony are obvious. Despite current standardized techniques, voice transferring through protocol has lower security than traditional telephony. One of the most important security issues which should be noticed in using VoIP is end -to-end user identity, i.e. when there is a...

    Provided By Islamic Azad University

  • White Papers // Feb 2014

    Analyzing Access Control Models Dynamic Level and Security in Service - Oriented Architecture Environment

    Service-based architecture is the most recent generation of informational systems architecture; this architecture has been implemented through service web technology during the recent years. One of the important characteristics in this architecture is the existence of various users and subsystems and communication and cooperation among them to do actions. In...

    Provided By Islamic Azad University

  • White Papers // Feb 2014

    Investigating the Effect of Black Hole Attack on AODV and DSR Routing Protocols in Wireless Ad Hoc Network

    Wireless ad hoc networks are composed of independent nodes managing the network without any infrastructure. The connection between nodes is provided by sending packages and by trusting to each other. Therefore, using efficient and certain protocols is the essential requirement of these networks. Due to special characteristics of wireless ad...

    Provided By Islamic Azad University

  • White Papers // Feb 2014

    Proposing a Novel Algorithm for Fault-Tolerant Relay Node Placement in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are composed of hundreds or thousands of small nodes called sensor that work together and are associated with a specific task or tasks to do. Each of these nodes includes sensor, processor, communication components, a small memory and a source of energy. It is expected that...

    Provided By Islamic Azad University

  • White Papers // Feb 2014

    Taxonomy of Intelligent Transportation Systems (VANET): A Survey

    For last years, the evolution of new issues has incited a great development of the transportation system. In this paper, the authors discuss ingredients of ITS (Intelligent Transportation System) that are Inter-Vehicle Communication (IVC) or what can call Vehicular Ad-hoc NETworks (VANET), which are special type of MANET. They will...

    Provided By Islamic Azad University

  • White Papers // Jan 2014

    Detecting Suspicion Information on the Web Using Crime Data Mining Techniques

    Along with the rapid popularity of the Internet, crime information on the web is becoming increasingly rampant, and the majority of them are in the form of text. Because a lot of crime information in documents is described through events, event-based semantic technology can be used to study the patterns...

    Provided By Islamic Azad University

  • White Papers // Jan 2014

    Enriched eTOM Framework in Service Deliver Operation through Alignment with some of COBIT5 Strategic Objectives

    In recent years, types of telecom services are expanding rapidly. On the other hand, present management Frameworks cannot cover and /or support them well. There are the place where few best known standards may be used for IT Service Management to enrich it, such as eTOM and COBIT5 (Control Objectives...

    Provided By Islamic Azad University

  • White Papers // Jan 2014

    A Distributed Data Mining Architecture Based on Nonlinear Model

    Development of computer networks and distributed database technologies has encouraged distributed data storage and a new technical generation of distributed data mining. This field has a wide range of applications. The present paper deals with applying multi-agent technology in data mining. At first the authors talk about agent and data...

    Provided By Islamic Azad University

  • White Papers // Dec 2013

    A New Approach Towards Integrated Cloud Computing Architecture

    Today across various businesses, administrative and senior managers seeking for new technologies and approaches in which they can utilize it, more easy and affordable and thereby rise up their competitive profit and utility. Information Communications and Technology (ICT) is no exception from this principle. Cloud computing concept and technology and...

    Provided By Islamic Azad University

  • White Papers // Nov 2013

    Trust-Based Clustering in Mobile Ad Hoc Networks: Challenges and Issues

    Mobile ad hoc networks are prone to various security attacks of malicious nodes and attackers. To protect the network clustering from security attacks, numerous trust-based clustering schemes have been presented in the literature. Analyzing the existing trust-based clustering solutions, the researchers illustrated their primary features and properties in this paper...

    Provided By Islamic Azad University

  • White Papers // Nov 2013

    Secret Key Cryptosystem Based on Non-Systematic Polar Codes

    Polar codes are provably capacity achieving linear block codes. The generator matrix of these codes is specified by knowing the parameters of transmission channel, length and dimension of the used code. On the other hand, for the cryptosystems based on general decoding problem (i.e. code based cryptosystems), the generator matrix...

    Provided By Islamic Azad University

  • White Papers // Nov 2013

    Modeling and Evaluation of Web Services in Mobile Networks Using Stochastic Colored Petri Nets

    With recent developments in communication technologies, it is possible to access information any time and in any place; however, mobile environments bring forward certain requirements and exclusive challenges including low connection speeds and bandwidth limitations. Thus, the authors need to consider mobile limitations when using web services. Providing services and...

    Provided By Islamic Azad University

  • White Papers // Nov 2013

    Time Slot Allocation Algorithm Based on TDMA Protocol in Wireless Sensor Networks

    In recent years, many researchers have worked in the area of wireless sensor networks that has led to the variety of algorithms and methods for the collection and transmission of environment information; but still many challenges faced by wireless sensor networks using methodologies are applied in various fields. Such as...

    Provided By Islamic Azad University

  • White Papers // Nov 2013

    Ad Hoc On-Demand Non Overlapped Multipath Distance Vector Routing Protocol (AONOMDV)

    In this paper, the authors propose a scheme to improve existing Ad-hoc On-demand Distance Vector (AODV) routing protocol by discovering and maintaining multiple non-overlapped routes. Their routing protocol is a multipath version of AODV routing protocol that considers only the disjoint path. Due to non-overlapping among paths, when a link...

    Provided By Islamic Azad University

  • White Papers // Oct 2013

    Security and Fault Aware Scheduling in Computational Grid

    Grid computation is an issue that has received much attention from researchers in recent years. Its aim is to use the computational power of idle resources which have been distributed in different places and under different policies and security conditions. Therefore, one of the challenges facing this technology is the...

    Provided By Islamic Azad University

  • White Papers // Oct 2013

    An Efficient Method for Automatic Text Categorization

    Automatic text categorization refers to assigning uncategorized text documents to one or more predefined categories. Texts categorization generally divided into two main sections: feature selection and learning algorithm. For Feature selection and learning algorithms techniques, various methods have been proposed. The purpose of the proposed techniques, increasing the accuracy of...

    Provided By Islamic Azad University

  • White Papers // Oct 2013

    Modeling Kerberos Authentication Protocol Using Colored Petri Net

    Information security is essential in today's digital world and plays an important role in message exchanges and trading. Authentication protocols play an important role in information security. Kerberos is one of the famous and commonly used authentication protocols. These factors cause attention of many researchers for formal modeling and analyzing...

    Provided By Islamic Azad University

  • White Papers // Aug 2013

    Intrusion Detection System in Computer Networks Using Decision Tree and SVM Algorithms

    Internet applications spreading and its high usage popularity result in significant increasing of cyber-attacks. Consequently, network security has become a matter of importance and several methods have been developed for these attacks. For this purpose, Intrusion Detection Systems (IDS) are being used to monitor the attacks occurring on computer networks....

    Provided By Islamic Azad University

  • White Papers // Aug 2013

    Data Storage Security Challenges in Cloud Computing

    In the digital world using technology and new technologies require safe and reliable environment, and it also requires consideration to all the challenges that technology faces with them and address these challenges. Cloud computing is also one of the new technologies in the IT world in this rule there is...

    Provided By Islamic Azad University

  • White Papers // Jul 2013

    GPU Implementation of Real-Time Biologically Inspired Face Detection using CUDA

    In this paper, massively parallel real-time face detection based on a visual attention and cortex-like mechanism of cognitive vision system is presented. As a first step, the authors use saliency map model to select salient face regions and HMAX C1 model to extract features from salient input image and then...

    Provided By Islamic Azad University

  • White Papers // Jul 2013

    Filtering Spam: Current Trends and Techniques

    In this paper, the authors give an overview about latest trend and techniques in spam filtering. They analyzed the problems which is introduced by spam, what spam actually do and how to measure the spam. This paper mainly focuses on automated, non-interactive filters, with a broad review ranging from commercial...

    Provided By Islamic Azad University

  • White Papers // May 2013

    Providing a Fault-Tolerant Algorithm for On-Chip Interconnection Networks

    As technology scales, fault tolerance has become a key concern in the on-chip communication. On-chip network reliability can be increased with the development of fault-tolerant routing algorithms. Distributed routing algorithms are a class of algorithms in which routing decisions, taken without the knowledge of total network status. Given the time...

    Provided By Islamic Azad University

  • White Papers // May 2013

    Design and Evaluation of Two Distributed Methods for Sensors Placement in Wireless Sensor Networks

    Adequate coverage is one of the main problems for distributed wireless sensor networks and the effectiveness of that highly depends on the sensor deployment scheme. Given a finite number of sensors, optimizing the sensor deployment will provide sufficient sensor coverage and save power of sensors for movement to target location...

    Provided By Islamic Azad University

  • White Papers // May 2013

    Service Differentiation of IEEE 802.11e

    The type of the applications for which Internet is being used has changed over the years. Multimedia applications, real-time applications and game playing require quality of service. IEEE has proposed IEEE 802.11e, a quality of service extension to the wireless LAN standard IEEE 802.11. In this paper, service differentiation ability...

    Provided By Islamic Azad University

  • White Papers // May 2013

    Region Directed Diffusion in Sensor Network Using Learning Automata: RDDLA

    One of the main challenges in wireless sensor network is energy problem and life cycle of nodes in networks. Several methods can be used for increasing life cycle of nodes. One of these methods is load balancing in nodes while transmitting data from source to destination. Directed diffusion algorithm is...

    Provided By Islamic Azad University

  • White Papers // May 2013

    Hybrid Architecture for Distributed Intrusion Detection System in Wireless Network

    In order to the rapid growth of the network application, new kinds of network attacks are emerging endlessly. So it is critical to protect the networks from attackers and the Intrusion detection technology becomes popular. Therefore, it is necessary that this security concern must be articulate right from the beginning...

    Provided By Islamic Azad University

  • White Papers // May 2013

    Reputation-Based Clustering Algorithms in Mobile Ad Hoc Networks

    Clustering is one of the main techniques that are used to increase the scalability of MANETs, but without any security considerations clustering is prone to various security attacks. Some cryptographic-based schemes have been proposed to secure the clustering process, but they are unable to handle the internal attacks. Trust-based clustering...

    Provided By Islamic Azad University

  • White Papers // Apr 2013

    Identification of Mazandaran Telecommunication Company Fixed phone subscribers using H-Means and W-K-Means Algorithm

    In recent years, companies' interaction with customers has changed significantly. Organizations require a proper understanding of customers and their needs in order to succeed in business. Customer Relationship Management (CRM) using data mining techniques, to discover hidden and valuable knowledge in data and information of organizations, provide the conditions for...

    Provided By Islamic Azad University

  • White Papers // Mar 2013

    A Paradigm for the Application of Cloud Computing in Mobile Intelligent Tutoring Systems

    Now-a-days, with the rapid growth of cloud computing, many industries are going to move their computing activities to clouds. Researchers of virtual learning are also looking for the ways to use clouds through mobile platforms. This paper offers a model to accompany the benefits of "Mobile intelligent learning" technology and...

    Provided By Islamic Azad University

  • White Papers // Mar 2013

    High-Resolution Direction Finding of Non-Stationary Signals Using Matching Pursuit

    One of the main goals of Time-Frequency (TF) signal representations in non-stationary array processing is to equip multi-antenna receivers with the ability to separate sources in the TF domain prior to direction finding. This permits high-resolution Direction-Of-Arrival (DOA) estimation of individual sources and of more sources than sensors. In this...

    Provided By Islamic Azad University

  • White Papers // Mar 2013

    Evaluation of the Data Security Methods in Cloud Computing Environments

    Cloud computing is an expression which is used by IT server companies to exchange computing needs as an asymmetrical service of relation for the final receivers of these services. All the models of the cloud computing depend on the resource sharing on the network due to regarding access integrity economic...

    Provided By Islamic Azad University

  • White Papers // Feb 2013

    A Framework for Applying ERP in Effective Implementation of TQM

    ERP (Enterprise Resource Planning) is an integrated system that gathers whole decision making information from all the departments of a company into one single place and plays an important role to integrate organization's information, functions and results in successful operation in global markets. On the other hand, TQM (Total Quality...

    Provided By Islamic Azad University

  • White Papers // Feb 2013

    Optimal Routing in Nanosensor Networks by a Game Theory Approach

    In this paper, the authors investigate a moving-Optimum Routing problem with nanosensor networks. Each nanosensor node has a sensor to observe the target and a processor to estimate the target position. It also has wireless communication capability but with limited range and can only communicate with neighbors. The moving target...

    Provided By Islamic Azad University

  • White Papers // Feb 2013

    Core Porosity Estimation Through Different Training Approaches for Neural Network: Back-Propagation Learning Vs. Genetic Algorithm

    Porosity of hydrocarbon bearing formations is a crucial parameter for reservoir characterization, reserve estimation, planning for completion, and geomechanical and geophysical studies. Accurate determination of porosity from laboratory core analysis is highly cost, time, and people intensive. Therefore, the quest for a rapid, cost-effective, and efficient method of determining porosity...

    Provided By Islamic Azad University

  • White Papers // Feb 2013

    Energy Consumption Estimation in Clustered Wireless Sensor Networks Using M/M/1 Queuing Model

    Wireless Sensor Network (WSN), consists of a large number of sensor nodes. Each sensor node senses environmental phenomenon and sends the sensed data to a sink node. Since the sensor nodes are powered by limited power batteries. Energy efficiency is a major challenge in WSN applications. In this paper, the...

    Provided By Islamic Azad University

  • White Papers // Oct 2010

    Grid Resource Selection Optimization With Guarantee Quality of Service by Hybrid of Genetic and Simulated Annealing Algorithms

    When there are a lot of requests for resources in a grid system, it is essential to make a good planning and resources allocation to provide a suitable QOS. As different programs need different amounts of services based on their priorities, there are various methods to provide these requests by...

    Provided By Islamic Azad University

  • White Papers // Jul 2010

    Novel Cluster Based Routing Protocol in Wireless Sensor Networks

    In this paper, the authors propose a novel Cluster Based Routing Protocol (CBRP) for prolong the sensor network lifetime. CBRP achieves a good performance in terms of lifetime by balancing the energy load among all the nodes. In this protocol first the authors Cluster the network by using new factors...

    Provided By Islamic Azad University

  • White Papers // Jun 2009

    WBRR: A Weight Based Reliable Routing Method in Mobile Ad Hoc Network

    Mobile Ad Hoc Networks (MANET) consists of a set of mobile hosts that can communicate with each other without the assistance of base stations. MANETs are heterogeneous mix of different wireless and mobile devices, ranging from little hand-held devices to laptops. In MANETs, the high mobility of mobile nodes is...

    Provided By Islamic Azad University

  • White Papers // Jun 2009

    A Low Power SRAM Base on Novel Word-Line Decoding

    This paper proposes a low power SRAM based on five transistor SRAM cell. Proposed SRAM uses novel word-line decoding such that, during read/write operation, only selected cell connected to bit-line whereas, in Conventional SRAM (CV-SRAM), all cells in selected row connected to their bit-lines, which in turn develops differential voltages...

    Provided By Islamic Azad University

  • White Papers // Jun 2009

    The European Stock Market Impulse To The US Financial Crisis

    This paper examines how the European stock market reacts to the U.S. financial crisis and the Fed's policy, changing FFR. Johansen and Juselius cointegration analysis suggests that markets are integrated and there exists a long term relationship between these markets. The Granger causality test indicates that causality runs from US...

    Provided By Islamic Azad University

  • White Papers // Nov 2010

    Presenting a New Routing Protocol for Increasing Lifetime of Sensor Network

    Sensor Networks are systems with restrict resources that are scattered on a large scale with numerous deployment density and are used in aggregating data in a intelligent style. In this paper the concept of "efficient energy consumption" in routing protocol of sensor network, which causes to increase the lifetime of...

    Provided By Islamic Azad University

  • White Papers // Oct 2009

    The European Stock Market Impulse To The U.S. Financial Crisis

    This study examines how the European stock market reacts to the US fundamentals including the Federal Fund Rate (FFR), the Euro-dollar exchange rate, and the US stock market indices. The results from Johansen and Juselius cointegration technique suggest that a long-term relationship exists between the European stock market, and the...

    Provided By Islamic Azad University

  • White Papers // Nov 2010

    Influence of Radio Frequency Identification Technology in Logistic, Inventory Control and Supply Chain Optimization

    The main aim of Supply Chain Management (SCM) is to produce, distribute, logistics and deliver goods and equipment in right location, right time, right amount to satisfy customers, with minimum time and cost waste. So implementing techniques that reduce project time and cost, and improve productivity and performance is very...

    Provided By Islamic Azad University

  • White Papers // Sep 2010

    A Systematic Method for Performance Analysis of SOA Applications

    The successful implementation of Service-Oriented Architecture (SOA) is not confined to Information Technology systems and required changes of the whole enterprise. In order to adapt IT and business, the enterprise requires adequate and measurable methods. The adoption of SOA creates new problem with regard to measuring and analysis the performance....

    Provided By Islamic Azad University

  • White Papers // Jun 2009

    Service Identification Approach to SOA Development

    Service identification is one of the main activities in the modeling of a service-oriented solution, and therefore errors made during identification can flow down through detailed design and implementation activities that may necessitate multiple iterations, especially in building composite applications. Different strategies exist for how to identify candidate services that...

    Provided By Islamic Azad University

  • White Papers // Jun 2009

    Web Service Security Method to SOA Development

    Web services provide significant new benefits for SOA-based applications, but they also expose significant new security risks. There are huge number of WS security standards and processes. At present, there is still a lack of a comprehensive approach which offers a methodical development in the construction of secure WS-based SOA....

    Provided By Islamic Azad University

  • White Papers // Jun 2009

    Next Generation Networks and Their Relation With Ad-Hoc Networks

    The communication networks development and advancement during two last decades has been toward a single goal and that is gradual change from circuit-switched networks to packed switched ones. Today a lot of networks operates are trying to transform the public telephone networks to multipurpose packed switch. This new achievement is...

    Provided By Islamic Azad University

  • White Papers // Jun 2009

    A New Source Code Auditing Algorithm for Detecting LFI and RFI in PHP Programs

    Static analysis of source code is used for auditing web applications to detect the vulnerabilities. In this paper, the authors propose a new algorithm to analyze the PHP source code for detecting LFI and RFI potential vulnerabilities. In the approach, the authors first define some patterns for finding some functions...

    Provided By Islamic Azad University

  • White Papers // Jul 2009

    PNR: New Position Based Routing Algorithm for Mobile Ad Hoc Networks

    An ad hoc network (MANET) has no fixed networking infrastructure, and consists of mobile nodes that communicate with each other. Since nodes are mobile, Routing in ad hoc network is a challenging task. Efficient routing protocols can make better performance in such networks. Many protocols have been proposed for ad...

    Provided By Islamic Azad University

  • White Papers // May 2010

    A Review of Coverage and Routing for Wireless Sensor Networks

    The special constraints of sensor networks impose a number of technical challenges for employing them. This paper presents the issues and existing protocols in three areas: coverage and routing. The authors present two types of coverage problems: to determine the minimum number of sensor nodes that need to perform active...

    Provided By Islamic Azad University

  • White Papers // Jan 2011

    Comparative Evaluation of Data Stream Indexing Models

    In recent years, the management and processing of data streams has become a topic of active research in several fields of computer science such as, distributed systems, database systems, and data mining. A data stream can be thought of as a transient, continuously increasing sequence of data. In data streams'...

    Provided By Islamic Azad University

  • White Papers // Dec 2010

    DWDM Optical Supervisory Channel by Manchester Code on FPGA

    The next generation optical Wavelength Division Multiplex (WDM) network will transport a stupendous aggregate data rate that consists of all existing types of payload, synchronous and asynchronous, and all types of traffic, voice, video and internet. The Optical Supervisory Channel (OSC), which is an important section in every DWDM system,...

    Provided By Islamic Azad University

  • White Papers // Nov 2010

    Reverse Link Performance of DS-CDMA Cellular Systems Through Closed-Loop Power Control and Beamforming in 2D Urban Environment

    The interference reduction capability of antenna arrays and the power control algorithms have been considered separately as means to decrease the interference in wireless communication networks. In this paper, the authors propose Smart Step closed-loop Power Control (SSPC) algorithm in Direct Sequence-Code Division Multiple Access (DS-CDMA) receivers in a 2D...

    Provided By Islamic Azad University

  • White Papers // Jan 2011

    DS-CDMA Cellular Systems Performance With Base Station Assignment, Power Control Error, and Beamforming Over Multipath Fading

    The interference reduction capability of antenna arrays, base station assignment and the power control algorithms have been considered separately as means to increase the capacity in wireless communication networks. In this paper, the authors propose Base Station Assignment method based on Minimizing the Transmitter Power (BSA-MTP) technique in a Direct...

    Provided By Islamic Azad University

  • White Papers // Jan 2010

    Design Modem Based on DSP Processor TMS for Power Line Carrier System

    One of the most important parts of the data transmission systems is processing of the signals. In the primary models of this system, all these processes were done in an analog format. Because of this, the volume and the price were high. But in this model of system, however, all...

    Provided By Islamic Azad University

  • White Papers // Jun 2009

    A New Scheme for Improving the Quality of Service in Heterogeneous Wireless Network for Data Stream Sending

    In this paper, the authors first consider the quality of service problems in heterogeneous wireless networks for sending the video data, which their problem of being real-time is pronounced. At last, the authors present a method for ensuring the end-to-end quality of service at application layer level for adaptable sending...

    Provided By Islamic Azad University

  • White Papers // Dec 2010

    TBRP: Novel Tree Based Routing Protocol in Wireless Sensor Network

    In this paper, the authors propose a novel Tree Based Routing Protocol (TBRP) for prolong the sensor network lifetime. TBRP achieves a good performance in terms of lifetime by balancing the energy load among all the nodes. TBRP introduces a new clustering factor for cluster head election, which can better...

    Provided By Islamic Azad University

  • White Papers // Sep 2010

    The Impact of Data Replication on Job Scheduling Performance in Hierarchical Data Grid

    In data-intensive applications data transfer is a primary cause of job execution delay. Data access time depends on bandwidth. The major bottleneck to supporting fast data access in Grids is the high latencies of Wide Area Networks and Internet. Effective scheduling can reduce the amount of data transferred across the...

    Provided By Islamic Azad University

  • White Papers // Mar 2011

    An Efficient Method Based on Genetic Algorithms to Solve Sensor Network Optimization Problem

    Minimization of the number of cluster heads in a wireless sensor network is a very important problem to reduce channel contention and to improve the efficiency of the algorithm when executed at the level of cluster-heads. In this paper, the authors propose an efficient method based on Genetic Algorithms (GAs)...

    Provided By Islamic Azad University

  • White Papers // Sep 2010

    HERF: A Hybrid Energy Efficient Routing Using a Fuzzy Method in Wireless Sensor Networks

    Wireless Sensor Network (WSN) is one of the major research areas in computer network field today. Data dissemination is an important task performed by wireless sensor networks. The routing algorithms of this network depend on a number of factors such as application areas, usage condition, power, aggregation parameters. With respect...

    Provided By Islamic Azad University

  • White Papers // Sep 2010

    Two Level Job Scheduling and Data Replication in Data Grid

    Data Grid environment is a geographically distributed that deal with date-intensive application in scientific and enterprise computing. In data-intensive applications data transfer is a primary cause of job execution delay. Data access time depends on bandwidth, especially when hierarchy of bandwidth appears in network. Effective job scheduling can reduce data...

    Provided By Islamic Azad University

  • White Papers // Mar 2011

    Fault Tolerance in Grid Using Ant Colony Optimization and Directed Acyclic Graph

    By day to day developing the grid systems, it is necessary to apply new methods for allocating the resources to achieving the high performance in heterogeneous computing environment. This paper aims to seeking for a new approach by which one can allocate the tasks using a modified version of Ant...

    Provided By Islamic Azad University

  • White Papers // Feb 2010

    Cluster-Based and Cellular Approach to Fault Detection and Recovery in Wireless Sensor Network

    In the past few years wireless sensor networks have received a greater interest in application such as disaster management, border protection, combat field reconnaissance, and security surveillance. Sensor nodes are expected to operate autonomously in unattended environments and potentially in large numbers. Failures are inevitable in wireless sensor networks due...

    Provided By Islamic Azad University

  • White Papers // Apr 2011

    A Machine Learning Based Analytical Framework for Semantic Annotation Requirements

    The Semantic Web is an extension of the current web in which information is given well-defined meaning. The perspective of Semantic Web is to promote the quality and intelligence of the current web by changing its contents into machine understandable form. Therefore, semantic level information is one of the cornerstones...

    Provided By Islamic Azad University

  • White Papers // Apr 2011

    SULMA: A Secure Ultra Light-Weight Mutual Authentication Protocol for Lowcost RFID Tags

    Radio Frequency IDentification (RFID) is an emerging technology. It is the next generation of an optical barcode with several major advantages over an optical barcode since a line of sight between the reader and the barcode is not needed, and several tags can be read simultaneously. RFID technology is rapidly...

    Provided By Islamic Azad University

  • White Papers // Feb 2011

    Analytical Classification of Multimedia Index Structures by Using a Partitioning Method-Based Framework

    Due to the advances in hardware technology and increase in production of multimedia data in many applications, during the last decades, multimedia databases have become increasingly important. Content-based multimedia retrieval is one of an important research area in the field of multimedia databases. Lots of research on this field has...

    Provided By Islamic Azad University

  • White Papers // Feb 2011

    Fault Detection and Recovery in Wireless Sensor Network Using Clustering

    Some WSN by a lot of immobile node and with the limited energy and without further charge of energy. Whereas extension of many sensor nodes and their operation. Hence it is normal, unactive nodes miss their communication in network, hence split the network. For avoidance split of network, the authors...

    Provided By Islamic Azad University

  • White Papers // Mar 2011

    Survey of Fault Recovery in Wireless Sensor Networks

    In the past few years wireless sensor networks have received a greater interest in application such as disaster management, border protection, combat field reconnaissance, and security surveillance. Sensor nodes are expected to operate autonomously in unattended environments and potentially in large numbers. Failures are inevitable in wireless sensor networks due...

    Provided By Islamic Azad University

  • White Papers // Feb 2010

    CPW Fed Double T-Shaped Array Antenna With Suppressed Mutual Coupling

    A compact CPW-fed double T-Shaped antenna is proposed for dual-band Wireless Local Area Network (WLAN) operations. For the proposed antenna, the -10 dB return loss bandwidth could reach about 25.5% for the 2.4 GHz band and 5.7 % for the 5 GHz band, which meet the required bandwidth specification of...

    Provided By Islamic Azad University

  • White Papers // Dec 2009

    Modern Symmetric Cryptography Methodologies and Its Applications

    Nowadays, using cryptographic systems play an effective role in security and safety technologies. One of the most applied kind of cryptography is Symmetric Cryptography and its applications. New aspects of symmetric Cryptography methodologies and applications has been presented by this paper. Security-based networks and some complex technologies such as RFID...

    Provided By Islamic Azad University

  • White Papers // Jun 2009

    A New Approach for Mobile Agent Security

    A mobile agent is a software which performs an action autonomously and independently as a person or an organizations assistance. Mobile agents are used for searching information, retrieval information, filtering, intruder recognition in networks, and so on. One of the important issues of mobile agent is their security. It must...

    Provided By Islamic Azad University

  • White Papers // Feb 2011

    Tunable Active Dual-Band Bandpass Filter Design Using MMIC Technology

    The inductor-less designing of monolithic tunable active dual-band bandpass filter is presented in this paper. Biasing voltages signify main role. The authors can control the center frequency and quality factor. Using four biasing voltages and cascading two similar filters lead to dual-band bandpass filter. By keeping the gain constant, the...

    Provided By Islamic Azad University

  • White Papers // Jan 2011

    Intellectual Capital & Return On Investment: Case Study: Iranian Stock Exchange

    All organizations are alive in accordance with knowledge in any economies based upon it as well. In such cases, the most successful organizations are able to have better and quicker benefits from knowledge as a real investment. Roos et. al discuss that Intellectual capital from the strategic point of view...

    Provided By Islamic Azad University

  • White Papers // Mar 2011

    Performance of QoS Parameters in MANET Application Traffics in Large Scale Scenarios

    A mobile ad-hoc network consists of wireless nodes communicating without the need for a centralized administration. A user can move any time in an ad hoc scenario and, as a result, such a network needs to have routing protocols which can adopt dynamically changing topology. To accomplish this, a number...

    Provided By Islamic Azad University

  • White Papers // Mar 2011

    A High Performance Scalable QoS Routing Protocol for Mobile Ad Hoc Networks

    A Mobile Ad hoc NETwork (MANET) consists of a set of mobile hosts capable that form a temporary network on the fly without using any fixed infrastructure. The nodes operate both as hosts and routers. Due to mobility of nodes, the topology of the network may change rapidly and unexpectedly,...

    Provided By Islamic Azad University