Islamic Azad University

Displaying 1-40 of 245 results

  • White Papers // Jan 2015

    An Approach for Transforming of Relational Databases to OWL Ontology

    Rapid growth of documents, web pages, and other types of text content is a huge challenge for the modern content management systems. One of the problems in the areas of information storage and retrieval is the lacking of semantic data. Ontologies can present knowledge in sharable and repeatedly usable manner...

    Provided By Islamic Azad University

  • White Papers // Nov 2014

    Intrusion Detection System in Computer Network Using Hybrid Algorithms (SVM and ABC)

    In recent years, the needs of the Internet are felt in lives of all people. Accordingly, many studies have been done on security in virtual environment. Old techniques such as firewalls, authentication and encryption could not provide Internet security completely; So, Intrusion detection system is created as a new solution...

    Provided By Islamic Azad University

  • White Papers // Oct 2014

    Energy Efficient Full Adder Cell Design with Using Carbon Nanotube Field Effect Transistors in 32 Nanometer Technology

    Full Adder is one of the critical parts of logical and arithmetic units. So, presenting a low power full adder cell reduces the power consumption of the entire circuit. Also, using nano-scale transistors, because of their unique characteristics will save energy consumption and decrease the chip area. In this paper,...

    Provided By Islamic Azad University

  • White Papers // Aug 2014

    An Analytical Algorithm of Component-Based Heterogeneous Software Architectural Styles Performance Prediction

    With regard to the society's need for complicated software and high level of expenses on its development, it is necessary to take all stakeholders' requirements and the demands into consideration, before any investments and put on the design and utilization stages. Software architecture is a technical description of a software...

    Provided By Islamic Azad University

  • White Papers // Aug 2014

    A Routing Algorithm Based on Fuzzy Clustering and Minimum Cost Tree (FCMCT) in Wireless Sensor Network

    Now-a-days, wireless sensor network has been of interest to investigators and the greatest challenge in this part is the limited energy of sensors. Sensors usually are in the harsh environments and transit in these environments is hard and impossible and moreover the nodes use non-replaceable batteries. Because of this, saving...

    Provided By Islamic Azad University

  • White Papers // May 2014

    Data Steganography on VoIP Through Combination of Residue Number System and DNA Sequences

    Today, optimal performance and cost advantages of using Internet telephony are obvious. Despite current standardized techniques, voice transferring through protocol has lower security than traditional telephony. One of the most important security issues which should be noticed in using VoIP is end -to-end user identity, i.e. when there is a...

    Provided By Islamic Azad University

  • White Papers // Feb 2014

    Analyzing Access Control Models Dynamic Level and Security in Service - Oriented Architecture Environment

    Service-based architecture is the most recent generation of informational systems architecture; this architecture has been implemented through service web technology during the recent years. One of the important characteristics in this architecture is the existence of various users and subsystems and communication and cooperation among them to do actions. In...

    Provided By Islamic Azad University

  • White Papers // Feb 2014

    Investigating the Effect of Black Hole Attack on AODV and DSR Routing Protocols in Wireless Ad Hoc Network

    Wireless ad hoc networks are composed of independent nodes managing the network without any infrastructure. The connection between nodes is provided by sending packages and by trusting to each other. Therefore, using efficient and certain protocols is the essential requirement of these networks. Due to special characteristics of wireless ad...

    Provided By Islamic Azad University

  • White Papers // Feb 2014

    Proposing a Novel Algorithm for Fault-Tolerant Relay Node Placement in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are composed of hundreds or thousands of small nodes called sensor that work together and are associated with a specific task or tasks to do. Each of these nodes includes sensor, processor, communication components, a small memory and a source of energy. It is expected that...

    Provided By Islamic Azad University

  • White Papers // Feb 2014

    Taxonomy of Intelligent Transportation Systems (VANET): A Survey

    For last years, the evolution of new issues has incited a great development of the transportation system. In this paper, the authors discuss ingredients of ITS (Intelligent Transportation System) that are Inter-Vehicle Communication (IVC) or what can call Vehicular Ad-hoc NETworks (VANET), which are special type of MANET. They will...

    Provided By Islamic Azad University

  • White Papers // Jan 2014

    Detecting Suspicion Information on the Web Using Crime Data Mining Techniques

    Along with the rapid popularity of the Internet, crime information on the web is becoming increasingly rampant, and the majority of them are in the form of text. Because a lot of crime information in documents is described through events, event-based semantic technology can be used to study the patterns...

    Provided By Islamic Azad University

  • White Papers // Jan 2014

    Enriched eTOM Framework in Service Deliver Operation through Alignment with some of COBIT5 Strategic Objectives

    In recent years, types of telecom services are expanding rapidly. On the other hand, present management Frameworks cannot cover and /or support them well. There are the place where few best known standards may be used for IT Service Management to enrich it, such as eTOM and COBIT5 (Control Objectives...

    Provided By Islamic Azad University

  • White Papers // Jan 2014

    A Distributed Data Mining Architecture Based on Nonlinear Model

    Development of computer networks and distributed database technologies has encouraged distributed data storage and a new technical generation of distributed data mining. This field has a wide range of applications. The present paper deals with applying multi-agent technology in data mining. At first the authors talk about agent and data...

    Provided By Islamic Azad University

  • White Papers // Dec 2013

    A New Approach Towards Integrated Cloud Computing Architecture

    Today across various businesses, administrative and senior managers seeking for new technologies and approaches in which they can utilize it, more easy and affordable and thereby rise up their competitive profit and utility. Information Communications and Technology (ICT) is no exception from this principle. Cloud computing concept and technology and...

    Provided By Islamic Azad University

  • White Papers // Nov 2013

    Trust-Based Clustering in Mobile Ad Hoc Networks: Challenges and Issues

    Mobile ad hoc networks are prone to various security attacks of malicious nodes and attackers. To protect the network clustering from security attacks, numerous trust-based clustering schemes have been presented in the literature. Analyzing the existing trust-based clustering solutions, the researchers illustrated their primary features and properties in this paper...

    Provided By Islamic Azad University

  • White Papers // Nov 2013

    Secret Key Cryptosystem Based on Non-Systematic Polar Codes

    Polar codes are provably capacity achieving linear block codes. The generator matrix of these codes is specified by knowing the parameters of transmission channel, length and dimension of the used code. On the other hand, for the cryptosystems based on general decoding problem (i.e. code based cryptosystems), the generator matrix...

    Provided By Islamic Azad University

  • White Papers // Nov 2013

    Modeling and Evaluation of Web Services in Mobile Networks Using Stochastic Colored Petri Nets

    With recent developments in communication technologies, it is possible to access information any time and in any place; however, mobile environments bring forward certain requirements and exclusive challenges including low connection speeds and bandwidth limitations. Thus, the authors need to consider mobile limitations when using web services. Providing services and...

    Provided By Islamic Azad University

  • White Papers // Nov 2013

    Time Slot Allocation Algorithm Based on TDMA Protocol in Wireless Sensor Networks

    In recent years, many researchers have worked in the area of wireless sensor networks that has led to the variety of algorithms and methods for the collection and transmission of environment information; but still many challenges faced by wireless sensor networks using methodologies are applied in various fields. Such as...

    Provided By Islamic Azad University

  • White Papers // Nov 2013

    Ad Hoc On-Demand Non Overlapped Multipath Distance Vector Routing Protocol (AONOMDV)

    In this paper, the authors propose a scheme to improve existing Ad-hoc On-demand Distance Vector (AODV) routing protocol by discovering and maintaining multiple non-overlapped routes. Their routing protocol is a multipath version of AODV routing protocol that considers only the disjoint path. Due to non-overlapping among paths, when a link...

    Provided By Islamic Azad University

  • White Papers // Oct 2013

    Modeling Kerberos Authentication Protocol Using Colored Petri Net

    Information security is essential in today's digital world and plays an important role in message exchanges and trading. Authentication protocols play an important role in information security. Kerberos is one of the famous and commonly used authentication protocols. These factors cause attention of many researchers for formal modeling and analyzing...

    Provided By Islamic Azad University

  • White Papers // Oct 2013

    Security and Fault Aware Scheduling in Computational Grid

    Grid computation is an issue that has received much attention from researchers in recent years. Its aim is to use the computational power of idle resources which have been distributed in different places and under different policies and security conditions. Therefore, one of the challenges facing this technology is the...

    Provided By Islamic Azad University

  • White Papers // Oct 2013

    An Efficient Method for Automatic Text Categorization

    Automatic text categorization refers to assigning uncategorized text documents to one or more predefined categories. Texts categorization generally divided into two main sections: feature selection and learning algorithm. For Feature selection and learning algorithms techniques, various methods have been proposed. The purpose of the proposed techniques, increasing the accuracy of...

    Provided By Islamic Azad University

  • White Papers // Aug 2013

    Data Storage Security Challenges in Cloud Computing

    In the digital world using technology and new technologies require safe and reliable environment, and it also requires consideration to all the challenges that technology faces with them and address these challenges. Cloud computing is also one of the new technologies in the IT world in this rule there is...

    Provided By Islamic Azad University

  • White Papers // Aug 2013

    Intrusion Detection System in Computer Networks Using Decision Tree and SVM Algorithms

    Internet applications spreading and its high usage popularity result in significant increasing of cyber-attacks. Consequently, network security has become a matter of importance and several methods have been developed for these attacks. For this purpose, Intrusion Detection Systems (IDS) are being used to monitor the attacks occurring on computer networks....

    Provided By Islamic Azad University

  • White Papers // Jul 2013

    GPU Implementation of Real-Time Biologically Inspired Face Detection using CUDA

    In this paper, massively parallel real-time face detection based on a visual attention and cortex-like mechanism of cognitive vision system is presented. As a first step, the authors use saliency map model to select salient face regions and HMAX C1 model to extract features from salient input image and then...

    Provided By Islamic Azad University

  • White Papers // Jul 2013

    Filtering Spam: Current Trends and Techniques

    In this paper, the authors give an overview about latest trend and techniques in spam filtering. They analyzed the problems which is introduced by spam, what spam actually do and how to measure the spam. This paper mainly focuses on automated, non-interactive filters, with a broad review ranging from commercial...

    Provided By Islamic Azad University

  • White Papers // May 2013

    Providing a Fault-Tolerant Algorithm for On-Chip Interconnection Networks

    As technology scales, fault tolerance has become a key concern in the on-chip communication. On-chip network reliability can be increased with the development of fault-tolerant routing algorithms. Distributed routing algorithms are a class of algorithms in which routing decisions, taken without the knowledge of total network status. Given the time...

    Provided By Islamic Azad University

  • White Papers // May 2013

    Design and Evaluation of Two Distributed Methods for Sensors Placement in Wireless Sensor Networks

    Adequate coverage is one of the main problems for distributed wireless sensor networks and the effectiveness of that highly depends on the sensor deployment scheme. Given a finite number of sensors, optimizing the sensor deployment will provide sufficient sensor coverage and save power of sensors for movement to target location...

    Provided By Islamic Azad University

  • White Papers // May 2013

    Service Differentiation of IEEE 802.11e

    The type of the applications for which Internet is being used has changed over the years. Multimedia applications, real-time applications and game playing require quality of service. IEEE has proposed IEEE 802.11e, a quality of service extension to the wireless LAN standard IEEE 802.11. In this paper, service differentiation ability...

    Provided By Islamic Azad University

  • White Papers // May 2013

    Region Directed Diffusion in Sensor Network Using Learning Automata: RDDLA

    One of the main challenges in wireless sensor network is energy problem and life cycle of nodes in networks. Several methods can be used for increasing life cycle of nodes. One of these methods is load balancing in nodes while transmitting data from source to destination. Directed diffusion algorithm is...

    Provided By Islamic Azad University

  • White Papers // May 2013

    Hybrid Architecture for Distributed Intrusion Detection System in Wireless Network

    In order to the rapid growth of the network application, new kinds of network attacks are emerging endlessly. So it is critical to protect the networks from attackers and the Intrusion detection technology becomes popular. Therefore, it is necessary that this security concern must be articulate right from the beginning...

    Provided By Islamic Azad University

  • White Papers // May 2013

    Reputation-Based Clustering Algorithms in Mobile Ad Hoc Networks

    Clustering is one of the main techniques that are used to increase the scalability of MANETs, but without any security considerations clustering is prone to various security attacks. Some cryptographic-based schemes have been proposed to secure the clustering process, but they are unable to handle the internal attacks. Trust-based clustering...

    Provided By Islamic Azad University

  • White Papers // Apr 2013

    Identification of Mazandaran Telecommunication Company Fixed phone subscribers using H-Means and W-K-Means Algorithm

    In recent years, companies' interaction with customers has changed significantly. Organizations require a proper understanding of customers and their needs in order to succeed in business. Customer Relationship Management (CRM) using data mining techniques, to discover hidden and valuable knowledge in data and information of organizations, provide the conditions for...

    Provided By Islamic Azad University

  • White Papers // Mar 2013

    A Paradigm for the Application of Cloud Computing in Mobile Intelligent Tutoring Systems

    Now-a-days, with the rapid growth of cloud computing, many industries are going to move their computing activities to clouds. Researchers of virtual learning are also looking for the ways to use clouds through mobile platforms. This paper offers a model to accompany the benefits of "Mobile intelligent learning" technology and...

    Provided By Islamic Azad University

  • White Papers // Mar 2013

    High-Resolution Direction Finding of Non-Stationary Signals Using Matching Pursuit

    One of the main goals of Time-Frequency (TF) signal representations in non-stationary array processing is to equip multi-antenna receivers with the ability to separate sources in the TF domain prior to direction finding. This permits high-resolution Direction-Of-Arrival (DOA) estimation of individual sources and of more sources than sensors. In this...

    Provided By Islamic Azad University

  • White Papers // Mar 2013

    Evaluation of the Data Security Methods in Cloud Computing Environments

    Cloud computing is an expression which is used by IT server companies to exchange computing needs as an asymmetrical service of relation for the final receivers of these services. All the models of the cloud computing depend on the resource sharing on the network due to regarding access integrity economic...

    Provided By Islamic Azad University

  • White Papers // Feb 2013

    A Framework for Applying ERP in Effective Implementation of TQM

    ERP (Enterprise Resource Planning) is an integrated system that gathers whole decision making information from all the departments of a company into one single place and plays an important role to integrate organization's information, functions and results in successful operation in global markets. On the other hand, TQM (Total Quality...

    Provided By Islamic Azad University

  • White Papers // Feb 2013

    Optimal Routing in Nanosensor Networks by a Game Theory Approach

    In this paper, the authors investigate a moving-Optimum Routing problem with nanosensor networks. Each nanosensor node has a sensor to observe the target and a processor to estimate the target position. It also has wireless communication capability but with limited range and can only communicate with neighbors. The moving target...

    Provided By Islamic Azad University

  • White Papers // Feb 2013

    Provide a Method for Evaluation of Software Architecture Using Ontology

    Software architecture is an undeniable role in the software life cycle. Some criteria should be noted at the time of analysis and evaluation of software architecture including quality characteristics, risks and non-risks, architectural decisions or tactics. Software architecture evaluation involves evaluating different options for architectural decisions, and combining them in...

    Provided By Islamic Azad University

  • White Papers // Feb 2013

    Core Porosity Estimation Through Different Training Approaches for Neural Network: Back-Propagation Learning Vs. Genetic Algorithm

    Porosity of hydrocarbon bearing formations is a crucial parameter for reservoir characterization, reserve estimation, planning for completion, and geomechanical and geophysical studies. Accurate determination of porosity from laboratory core analysis is highly cost, time, and people intensive. Therefore, the quest for a rapid, cost-effective, and efficient method of determining porosity...

    Provided By Islamic Azad University

  • White Papers // Jan 2014

    Detecting Suspicion Information on the Web Using Crime Data Mining Techniques

    Along with the rapid popularity of the Internet, crime information on the web is becoming increasingly rampant, and the majority of them are in the form of text. Because a lot of crime information in documents is described through events, event-based semantic technology can be used to study the patterns...

    Provided By Islamic Azad University

  • White Papers // Aug 2010

    Main Content Extraction from Detailed Web Pages

    A web page structure and layout varies depend on different content type it will represent or the tastes of designer styling its content. Thereby main content position or the main tag containing main content differs in variety of websites. Even there might be some content in page view that are...

    Provided By Islamic Azad University

  • White Papers // Nov 2011

    Review and Ranking E-Commerce Characteristics on E-Commerce Application in Insurance Industry

    E-commerce is used as one of the most important aspects of innovation in business processes which performed by organizations and many companies in the world. Insurance industry as one of the major economic function plays a vital role in improving and promoting economic indicators. Therefore by adopting methods and factors...

    Provided By Islamic Azad University

  • White Papers // Sep 2011

    A Fuzzy Realistic Mobility Model for VANET

    Realistic mobility models can assess more the results more accurate estimate parameters because it is closer to the real world. In this paper a realistic Fuzzy Mobility Model has been proposed. This model has rules which are changeable depending on nodes and environmental conditions. This model is more complete and...

    Provided By Islamic Azad University

  • White Papers // Sep 2011

    Neural Networks for Error Detection and Data Aggregation in Wireless Sensor Network

    Correct information and data aggregation are very important in wireless sensor networks because sending incorrect information by fault sensors make to wrong decision about environment and increasing defective sensor during the time incorrect data decries reliability of wireless sensor networks. Previous methods have problems such as there are fault sensors...

    Provided By Islamic Azad University

  • White Papers // Sep 2011

    A New Routing Algorithm for a Three-Stage Clos Interconnection Networks

    Clos Interconnection network is one of the known connection networks in processing systems and distributed systems, which is used extensively in many fields such as Telecommunication networks, ATM switches and Data transmission. In order to eliminate the blocking in such networks, various routing algorithm have been proposed, each imposing extra...

    Provided By Islamic Azad University

  • White Papers // Sep 2011

    Reliable Communication in Wireless Body Area Sensor Network for Health Monitoring

    Now days, interests in the application of Wireless Body Area Network (WBAN) have grown considerably. A number of tiny wireless sensors, strategically placed on the human body, create a wireless body area network that can monitor various vital signs, providing real-time feedback to the user and medical personnel. This communication...

    Provided By Islamic Azad University

  • White Papers // Sep 2011

    A Routing Algorithm Based on Cellular Automata for Mobile Adhoc Networks

    Mobile Ad hoc NETworks (MANETs) are self organizing, adaptive and infrastructure less networks. Analyzing these networks is a complex task due to the high mobility and rapid topology change. Routing in MANETs is one of the challenging tasks. Although a lot of researches have done in this area, the usage...

    Provided By Islamic Azad University

  • White Papers // Jun 2010

    Fuzzy Based Approach for Load Balanced Distributing Database on Sensor Network

    A wireless sensor network consists of tiny sensing devices, with limited energy and processing ability. Some time the authors have to distribute a database on sensor network, because of limited energy in sensors, load balanced distributing database can increase the lifetime of this networks. In this paper, they propose Fuzzy...

    Provided By Islamic Azad University

  • White Papers // Mar 2010

    An Energy Efficient Coverage Method for Clustered Wireless Sensor Networks

    An important issue in WSN is the regional covering. A coverage algorithm should be able to solve this issue by considering the power consumption to improve the network lifetime. This requires employing the lowest number of sensors. A solution is just to turn on a subset of nodes. This subset...

    Provided By Islamic Azad University

  • White Papers // Mar 2011

    An Intelligent Energy Efficient Clustering in Wireless Sensor Networks

    One of the main challenges of wireless sensor network is how to improve its life time. The limited energy of nodes is the main obstacle. The authors may overcome this problem by optimizing the nodes' power consumption. A solution is clustering, but optimum clustering of wireless sensor network is a...

    Provided By Islamic Azad University

  • White Papers // Jul 2011

    Authenticated Hierarchy Double Signature Protocol for MANET

    In this paper, the authors present a secure routing protocol based on reliability hierarchy levels and using reliable server. Reliable server grants certifications to authenticated nodes in MANET. Simulated results shows when there is intruder nodes packet delivery ratio of proposed method is greater than delivery ratio of other related...

    Provided By Islamic Azad University

  • White Papers // Jul 2011

    Ad Hoc Protocols Via Multi Agent Based Tools

    Mobile Ad Hoc networks are actually the future of wireless networks; because they are cheap, simple and supple and have simple usage. The people live in world that networks constantly change in it and change their topology for linkage new nodes, for this reason the authors go toward this networks....

    Provided By Islamic Azad University

  • White Papers // Jul 2011

    A 3D Signal Obstruction Model for Realistic Mobility Models in Mobile Ad Hoc Networks

    The paper of mobile ad hoc networks depends on understanding protocols from simulations before applying them in a real-world setting. The production of a real-world environment within which an ad hoc network can be formed among a set of nodes requires the development of a realistic, generic, and comprehensive mobility...

    Provided By Islamic Azad University

  • White Papers // Jul 2011

    SINR Prediction in Mobile CDMA Systems by Linear and Nonlinear Artificial Neural-Network-Based Predictors

    This paper describes linear and nonlinear Artificial Neural Network (ANN)-based predictors as Autoregressive Moving Average models with Auxiliary input (ARMAX) process for Signal to Interference plus Noise Ratio (SINR) prediction in Direct Sequence Code Division Multiple Access (DS/CDMA) systems. The Multi Layer Perceptron (MLP) neural network with nonlinear function is...

    Provided By Islamic Azad University

  • White Papers // Jul 2011

    Improvement of Connectivity in Mobile Ad-Hoc Networks by Adding Static Nodes Based on a Realistic Mobility Model

    One of the ad hoc networks challenges is the connectivity problem coming from changeable and dynamic topology of networks nodes. Adding static nodes is a solution for this challenge. These nodes are added in some critical points in network environment where lack of mobile nodes is sensed in them. Many...

    Provided By Islamic Azad University

  • White Papers // May 2010

    Multi Objective AODV Based On a Realistic Mobility Model

    Routing is one of the most important challenges in ad hoc network. Numerous algorithms have been presented and one of the most important of them is AODV. This algorithm like many other algorithm calculate optimum path while pays no attention to environment situations, mobility pattern and mobile nodes status. However,...

    Provided By Islamic Azad University

  • White Papers // Jan 2010

    Design Modem Based on DSP Processor TMS for Power Line Carrier System

    One of the most important parts of the data transmission systems is processing of the signals. In the primary models of this system, all these processes were done in an analog format. Because of this, the volume and the price were high. But in this model of system, however, all...

    Provided By Islamic Azad University

  • White Papers // May 2010

    A Review of Coverage and Routing for Wireless Sensor Networks

    The special constraints of sensor networks impose a number of technical challenges for employing them. This paper presents the issues and existing protocols in three areas: coverage and routing. The authors present two types of coverage problems: to determine the minimum number of sensor nodes that need to perform active...

    Provided By Islamic Azad University

  • White Papers // Jan 2011

    Comparative Evaluation of Data Stream Indexing Models

    In recent years, the management and processing of data streams has become a topic of active research in several fields of computer science such as, distributed systems, database systems, and data mining. A data stream can be thought of as a transient, continuously increasing sequence of data. In data streams'...

    Provided By Islamic Azad University

  • White Papers // Dec 2010

    DWDM Optical Supervisory Channel by Manchester Code on FPGA

    The next generation optical Wavelength Division Multiplex (WDM) network will transport a stupendous aggregate data rate that consists of all existing types of payload, synchronous and asynchronous, and all types of traffic, voice, video and internet. The Optical Supervisory Channel (OSC), which is an important section in every DWDM system,...

    Provided By Islamic Azad University

  • White Papers // Jun 2009

    A New Scheme for Improving the Quality of Service in Heterogeneous Wireless Network for Data Stream Sending

    In this paper, the authors first consider the quality of service problems in heterogeneous wireless networks for sending the video data, which their problem of being real-time is pronounced. At last, the authors present a method for ensuring the end-to-end quality of service at application layer level for adaptable sending...

    Provided By Islamic Azad University

  • White Papers // Jun 2009

    A Low Power SRAM Base on Novel Word-Line Decoding

    This paper proposes a low power SRAM based on five transistor SRAM cell. Proposed SRAM uses novel word-line decoding such that, during read/write operation, only selected cell connected to bit-line whereas, in Conventional SRAM (CV-SRAM), all cells in selected row connected to their bit-lines, which in turn develops differential voltages...

    Provided By Islamic Azad University

  • White Papers // Nov 2010

    Influence of Radio Frequency Identification Technology in Logistic, Inventory Control and Supply Chain Optimization

    The main aim of Supply Chain Management (SCM) is to produce, distribute, logistics and deliver goods and equipment in right location, right time, right amount to satisfy customers, with minimum time and cost waste. So implementing techniques that reduce project time and cost, and improve productivity and performance is very...

    Provided By Islamic Azad University

  • White Papers // Nov 2010

    Reverse Link Performance of DS-CDMA Cellular Systems Through Closed-Loop Power Control and Beamforming in 2D Urban Environment

    The interference reduction capability of antenna arrays and the power control algorithms have been considered separately as means to decrease the interference in wireless communication networks. In this paper, the authors propose Smart Step closed-loop Power Control (SSPC) algorithm in Direct Sequence-Code Division Multiple Access (DS-CDMA) receivers in a 2D...

    Provided By Islamic Azad University

  • White Papers // Jan 2011

    DS-CDMA Cellular Systems Performance With Base Station Assignment, Power Control Error, and Beamforming Over Multipath Fading

    The interference reduction capability of antenna arrays, base station assignment and the power control algorithms have been considered separately as means to increase the capacity in wireless communication networks. In this paper, the authors propose Base Station Assignment method based on Minimizing the Transmitter Power (BSA-MTP) technique in a Direct...

    Provided By Islamic Azad University

  • White Papers // Sep 2010

    A Systematic Method for Performance Analysis of SOA Applications

    The successful implementation of Service-Oriented Architecture (SOA) is not confined to Information Technology systems and required changes of the whole enterprise. In order to adapt IT and business, the enterprise requires adequate and measurable methods. The adoption of SOA creates new problem with regard to measuring and analysis the performance....

    Provided By Islamic Azad University

  • White Papers // Jun 2009

    Web Service Security Method to SOA Development

    Web services provide significant new benefits for SOA-based applications, but they also expose significant new security risks. There are huge number of WS security standards and processes. At present, there is still a lack of a comprehensive approach which offers a methodical development in the construction of secure WS-based SOA....

    Provided By Islamic Azad University

  • White Papers // Jun 2009

    Service Identification Approach to SOA Development

    Service identification is one of the main activities in the modeling of a service-oriented solution, and therefore errors made during identification can flow down through detailed design and implementation activities that may necessitate multiple iterations, especially in building composite applications. Different strategies exist for how to identify candidate services that...

    Provided By Islamic Azad University

  • White Papers // Jun 2009

    Next Generation Networks and Their Relation With Ad-Hoc Networks

    The communication networks development and advancement during two last decades has been toward a single goal and that is gradual change from circuit-switched networks to packed switched ones. Today a lot of networks operates are trying to transform the public telephone networks to multipurpose packed switch. This new achievement is...

    Provided By Islamic Azad University

  • White Papers // Jun 2009

    A New Source Code Auditing Algorithm for Detecting LFI and RFI in PHP Programs

    Static analysis of source code is used for auditing web applications to detect the vulnerabilities. In this paper, the authors propose a new algorithm to analyze the PHP source code for detecting LFI and RFI potential vulnerabilities. In the approach, the authors first define some patterns for finding some functions...

    Provided By Islamic Azad University

  • White Papers // Jun 2009

    WBRR: A Weight Based Reliable Routing Method in Mobile Ad Hoc Network

    Mobile Ad Hoc Networks (MANET) consists of a set of mobile hosts that can communicate with each other without the assistance of base stations. MANETs are heterogeneous mix of different wireless and mobile devices, ranging from little hand-held devices to laptops. In MANETs, the high mobility of mobile nodes is...

    Provided By Islamic Azad University

  • White Papers // Dec 2010

    TBRP: Novel Tree Based Routing Protocol in Wireless Sensor Network

    In this paper, the authors propose a novel Tree Based Routing Protocol (TBRP) for prolong the sensor network lifetime. TBRP achieves a good performance in terms of lifetime by balancing the energy load among all the nodes. TBRP introduces a new clustering factor for cluster head election, which can better...

    Provided By Islamic Azad University

  • White Papers // Jun 2009

    The European Stock Market Impulse To The US Financial Crisis

    This paper examines how the European stock market reacts to the U.S. financial crisis and the Fed's policy, changing FFR. Johansen and Juselius cointegration analysis suggests that markets are integrated and there exists a long term relationship between these markets. The Granger causality test indicates that causality runs from US...

    Provided By Islamic Azad University

  • White Papers // Nov 2010

    Presenting a New Routing Protocol for Increasing Lifetime of Sensor Network

    Sensor Networks are systems with restrict resources that are scattered on a large scale with numerous deployment density and are used in aggregating data in a intelligent style. In this paper the concept of "efficient energy consumption" in routing protocol of sensor network, which causes to increase the lifetime of...

    Provided By Islamic Azad University

  • White Papers // Jul 2009

    PNR: New Position Based Routing Algorithm for Mobile Ad Hoc Networks

    An ad hoc network (MANET) has no fixed networking infrastructure, and consists of mobile nodes that communicate with each other. Since nodes are mobile, Routing in ad hoc network is a challenging task. Efficient routing protocols can make better performance in such networks. Many protocols have been proposed for ad...

    Provided By Islamic Azad University

  • White Papers // Jul 2010

    Novel Cluster Based Routing Protocol in Wireless Sensor Networks

    In this paper, the authors propose a novel Cluster Based Routing Protocol (CBRP) for prolong the sensor network lifetime. CBRP achieves a good performance in terms of lifetime by balancing the energy load among all the nodes. In this protocol first the authors Cluster the network by using new factors...

    Provided By Islamic Azad University

  • White Papers // Oct 2009

    The European Stock Market Impulse To The U.S. Financial Crisis

    This study examines how the European stock market reacts to the US fundamentals including the Federal Fund Rate (FFR), the Euro-dollar exchange rate, and the US stock market indices. The results from Johansen and Juselius cointegration technique suggest that a long-term relationship exists between the European stock market, and the...

    Provided By Islamic Azad University

  • White Papers // Oct 2010

    Grid Resource Selection Optimization With Guarantee Quality of Service by Hybrid of Genetic and Simulated Annealing Algorithms

    When there are a lot of requests for resources in a grid system, it is essential to make a good planning and resources allocation to provide a suitable QOS. As different programs need different amounts of services based on their priorities, there are various methods to provide these requests by...

    Provided By Islamic Azad University

  • White Papers // Mar 2011

    An Efficient Method Based on Genetic Algorithms to Solve Sensor Network Optimization Problem

    Minimization of the number of cluster heads in a wireless sensor network is a very important problem to reduce channel contention and to improve the efficiency of the algorithm when executed at the level of cluster-heads. In this paper, the authors propose an efficient method based on Genetic Algorithms (GAs)...

    Provided By Islamic Azad University