Islamic Azad University

Displaying 1-40 of 227 results

  • White Papers // Jan 2015

    An Approach for Transforming of Relational Databases to OWL Ontology

    Rapid growth of documents, web pages, and other types of text content is a huge challenge for the modern content management systems. One of the problems in the areas of information storage and retrieval is the lacking of semantic data. Ontologies can present knowledge in sharable and repeatedly usable manner...

    Provided By Islamic Azad University

  • White Papers // Nov 2014

    An Improved Approach for Scheduling Tasks Based on Lottery Algorithm in Cloud Computing Environment

    Cloud computing paradigm of distributed computing, applications are composed a large number of resources and services for the purpose of sharing resources and services on the internet. Task scheduling problems have paramount importance and are trying to determine an efficient scheduling to run tasks and optimal resource allocation. There are...

    Provided By Islamic Azad University

  • White Papers // Nov 2014

    Intrusion Detection System in Computer Network Using Hybrid Algorithms (SVM and ABC)

    In recent years, the needs of the Internet are felt in lives of all people. Accordingly, many studies have been done on security in virtual environment. Old techniques such as firewalls, authentication and encryption could not provide Internet security completely; So, Intrusion detection system is created as a new solution...

    Provided By Islamic Azad University

  • White Papers // Oct 2014

    Energy Efficient Full Adder Cell Design with Using Carbon Nanotube Field Effect Transistors in 32 Nanometer Technology

    Full Adder is one of the critical parts of logical and arithmetic units. So, presenting a low power full adder cell reduces the power consumption of the entire circuit. Also, using nano-scale transistors, because of their unique characteristics will save energy consumption and decrease the chip area. In this paper,...

    Provided By Islamic Azad University

  • White Papers // Aug 2014

    An Analytical Algorithm of Component-Based Heterogeneous Software Architectural Styles Performance Prediction

    With regard to the society's need for complicated software and high level of expenses on its development, it is necessary to take all stakeholders' requirements and the demands into consideration, before any investments and put on the design and utilization stages. Software architecture is a technical description of a software...

    Provided By Islamic Azad University

  • White Papers // Aug 2014

    A Routing Algorithm Based on Fuzzy Clustering and Minimum Cost Tree (FCMCT) in Wireless Sensor Network

    Now-a-days, wireless sensor network has been of interest to investigators and the greatest challenge in this part is the limited energy of sensors. Sensors usually are in the harsh environments and transit in these environments is hard and impossible and moreover the nodes use non-replaceable batteries. Because of this, saving...

    Provided By Islamic Azad University

  • White Papers // May 2014

    Data Steganography on VoIP Through Combination of Residue Number System and DNA Sequences

    Today, optimal performance and cost advantages of using Internet telephony are obvious. Despite current standardized techniques, voice transferring through protocol has lower security than traditional telephony. One of the most important security issues which should be noticed in using VoIP is end -to-end user identity, i.e. when there is a...

    Provided By Islamic Azad University

  • White Papers // Feb 2014

    Analyzing Access Control Models Dynamic Level and Security in Service - Oriented Architecture Environment

    Service-based architecture is the most recent generation of informational systems architecture; this architecture has been implemented through service web technology during the recent years. One of the important characteristics in this architecture is the existence of various users and subsystems and communication and cooperation among them to do actions. In...

    Provided By Islamic Azad University

  • White Papers // Feb 2014

    Investigating the Effect of Black Hole Attack on AODV and DSR Routing Protocols in Wireless Ad Hoc Network

    Wireless ad hoc networks are composed of independent nodes managing the network without any infrastructure. The connection between nodes is provided by sending packages and by trusting to each other. Therefore, using efficient and certain protocols is the essential requirement of these networks. Due to special characteristics of wireless ad...

    Provided By Islamic Azad University

  • White Papers // Feb 2014

    Proposing a Novel Algorithm for Fault-Tolerant Relay Node Placement in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are composed of hundreds or thousands of small nodes called sensor that work together and are associated with a specific task or tasks to do. Each of these nodes includes sensor, processor, communication components, a small memory and a source of energy. It is expected that...

    Provided By Islamic Azad University

  • White Papers // Feb 2014

    Taxonomy of Intelligent Transportation Systems (VANET): A Survey

    For last years, the evolution of new issues has incited a great development of the transportation system. In this paper, the authors discuss ingredients of ITS (Intelligent Transportation System) that are Inter-Vehicle Communication (IVC) or what can call Vehicular Ad-hoc NETworks (VANET), which are special type of MANET. They will...

    Provided By Islamic Azad University

  • White Papers // Jan 2014

    Detecting Suspicion Information on the Web Using Crime Data Mining Techniques

    Along with the rapid popularity of the Internet, crime information on the web is becoming increasingly rampant, and the majority of them are in the form of text. Because a lot of crime information in documents is described through events, event-based semantic technology can be used to study the patterns...

    Provided By Islamic Azad University

  • White Papers // Jan 2014

    Enriched eTOM Framework in Service Deliver Operation through Alignment with some of COBIT5 Strategic Objectives

    In recent years, types of telecom services are expanding rapidly. On the other hand, present management Frameworks cannot cover and /or support them well. There are the place where few best known standards may be used for IT Service Management to enrich it, such as eTOM and COBIT5 (Control Objectives...

    Provided By Islamic Azad University

  • White Papers // Jan 2014

    A Distributed Data Mining Architecture Based on Nonlinear Model

    Development of computer networks and distributed database technologies has encouraged distributed data storage and a new technical generation of distributed data mining. This field has a wide range of applications. The present paper deals with applying multi-agent technology in data mining. At first the authors talk about agent and data...

    Provided By Islamic Azad University

  • White Papers // Dec 2013

    A New Approach Towards Integrated Cloud Computing Architecture

    Today across various businesses, administrative and senior managers seeking for new technologies and approaches in which they can utilize it, more easy and affordable and thereby rise up their competitive profit and utility. Information Communications and Technology (ICT) is no exception from this principle. Cloud computing concept and technology and...

    Provided By Islamic Azad University

  • White Papers // Nov 2013

    Trust-Based Clustering in Mobile Ad Hoc Networks: Challenges and Issues

    Mobile ad hoc networks are prone to various security attacks of malicious nodes and attackers. To protect the network clustering from security attacks, numerous trust-based clustering schemes have been presented in the literature. Analyzing the existing trust-based clustering solutions, the researchers illustrated their primary features and properties in this paper...

    Provided By Islamic Azad University

  • White Papers // Nov 2013

    Modeling and Evaluation of Web Services in Mobile Networks Using Stochastic Colored Petri Nets

    With recent developments in communication technologies, it is possible to access information any time and in any place; however, mobile environments bring forward certain requirements and exclusive challenges including low connection speeds and bandwidth limitations. Thus, the authors need to consider mobile limitations when using web services. Providing services and...

    Provided By Islamic Azad University

  • White Papers // Nov 2013

    Time Slot Allocation Algorithm Based on TDMA Protocol in Wireless Sensor Networks

    In recent years, many researchers have worked in the area of wireless sensor networks that has led to the variety of algorithms and methods for the collection and transmission of environment information; but still many challenges faced by wireless sensor networks using methodologies are applied in various fields. Such as...

    Provided By Islamic Azad University

  • White Papers // Nov 2013

    Ad Hoc On-Demand Non Overlapped Multipath Distance Vector Routing Protocol (AONOMDV)

    In this paper, the authors propose a scheme to improve existing Ad-hoc On-demand Distance Vector (AODV) routing protocol by discovering and maintaining multiple non-overlapped routes. Their routing protocol is a multipath version of AODV routing protocol that considers only the disjoint path. Due to non-overlapping among paths, when a link...

    Provided By Islamic Azad University

  • White Papers // Nov 2013

    Secret Key Cryptosystem Based on Non-Systematic Polar Codes

    Polar codes are provably capacity achieving linear block codes. The generator matrix of these codes is specified by knowing the parameters of transmission channel, length and dimension of the used code. On the other hand, for the cryptosystems based on general decoding problem (i.e. code based cryptosystems), the generator matrix...

    Provided By Islamic Azad University

  • White Papers // Oct 2013

    Modeling Kerberos Authentication Protocol Using Colored Petri Net

    Information security is essential in today's digital world and plays an important role in message exchanges and trading. Authentication protocols play an important role in information security. Kerberos is one of the famous and commonly used authentication protocols. These factors cause attention of many researchers for formal modeling and analyzing...

    Provided By Islamic Azad University

  • White Papers // Oct 2013

    Security and Fault Aware Scheduling in Computational Grid

    Grid computation is an issue that has received much attention from researchers in recent years. Its aim is to use the computational power of idle resources which have been distributed in different places and under different policies and security conditions. Therefore, one of the challenges facing this technology is the...

    Provided By Islamic Azad University

  • White Papers // Oct 2013

    An Efficient Method for Automatic Text Categorization

    Automatic text categorization refers to assigning uncategorized text documents to one or more predefined categories. Texts categorization generally divided into two main sections: feature selection and learning algorithm. For Feature selection and learning algorithms techniques, various methods have been proposed. The purpose of the proposed techniques, increasing the accuracy of...

    Provided By Islamic Azad University

  • White Papers // Aug 2013

    Intrusion Detection System in Computer Networks Using Decision Tree and SVM Algorithms

    Internet applications spreading and its high usage popularity result in significant increasing of cyber-attacks. Consequently, network security has become a matter of importance and several methods have been developed for these attacks. For this purpose, Intrusion Detection Systems (IDS) are being used to monitor the attacks occurring on computer networks....

    Provided By Islamic Azad University

  • White Papers // Aug 2013

    Data Storage Security Challenges in Cloud Computing

    In the digital world using technology and new technologies require safe and reliable environment, and it also requires consideration to all the challenges that technology faces with them and address these challenges. Cloud computing is also one of the new technologies in the IT world in this rule there is...

    Provided By Islamic Azad University

  • White Papers // Jul 2013

    GPU Implementation of Real-Time Biologically Inspired Face Detection using CUDA

    In this paper, massively parallel real-time face detection based on a visual attention and cortex-like mechanism of cognitive vision system is presented. As a first step, the authors use saliency map model to select salient face regions and HMAX C1 model to extract features from salient input image and then...

    Provided By Islamic Azad University

  • White Papers // Jul 2013

    Filtering Spam: Current Trends and Techniques

    In this paper, the authors give an overview about latest trend and techniques in spam filtering. They analyzed the problems which is introduced by spam, what spam actually do and how to measure the spam. This paper mainly focuses on automated, non-interactive filters, with a broad review ranging from commercial...

    Provided By Islamic Azad University

  • White Papers // May 2013

    Providing a Fault-Tolerant Algorithm for On-Chip Interconnection Networks

    As technology scales, fault tolerance has become a key concern in the on-chip communication. On-chip network reliability can be increased with the development of fault-tolerant routing algorithms. Distributed routing algorithms are a class of algorithms in which routing decisions, taken without the knowledge of total network status. Given the time...

    Provided By Islamic Azad University

  • White Papers // May 2013

    Design and Evaluation of Two Distributed Methods for Sensors Placement in Wireless Sensor Networks

    Adequate coverage is one of the main problems for distributed wireless sensor networks and the effectiveness of that highly depends on the sensor deployment scheme. Given a finite number of sensors, optimizing the sensor deployment will provide sufficient sensor coverage and save power of sensors for movement to target location...

    Provided By Islamic Azad University

  • White Papers // May 2013

    Service Differentiation of IEEE 802.11e

    The type of the applications for which Internet is being used has changed over the years. Multimedia applications, real-time applications and game playing require quality of service. IEEE has proposed IEEE 802.11e, a quality of service extension to the wireless LAN standard IEEE 802.11. In this paper, service differentiation ability...

    Provided By Islamic Azad University

  • White Papers // May 2013

    Region Directed Diffusion in Sensor Network Using Learning Automata: RDDLA

    One of the main challenges in wireless sensor network is energy problem and life cycle of nodes in networks. Several methods can be used for increasing life cycle of nodes. One of these methods is load balancing in nodes while transmitting data from source to destination. Directed diffusion algorithm is...

    Provided By Islamic Azad University

  • White Papers // May 2013

    Reputation-Based Clustering Algorithms in Mobile Ad Hoc Networks

    Clustering is one of the main techniques that are used to increase the scalability of MANETs, but without any security considerations clustering is prone to various security attacks. Some cryptographic-based schemes have been proposed to secure the clustering process, but they are unable to handle the internal attacks. Trust-based clustering...

    Provided By Islamic Azad University

  • White Papers // May 2013

    Hybrid Architecture for Distributed Intrusion Detection System in Wireless Network

    In order to the rapid growth of the network application, new kinds of network attacks are emerging endlessly. So it is critical to protect the networks from attackers and the Intrusion detection technology becomes popular. Therefore, it is necessary that this security concern must be articulate right from the beginning...

    Provided By Islamic Azad University

  • White Papers // Apr 2013

    Identification of Mazandaran Telecommunication Company Fixed phone subscribers using H-Means and W-K-Means Algorithm

    In recent years, companies' interaction with customers has changed significantly. Organizations require a proper understanding of customers and their needs in order to succeed in business. Customer Relationship Management (CRM) using data mining techniques, to discover hidden and valuable knowledge in data and information of organizations, provide the conditions for...

    Provided By Islamic Azad University

  • White Papers // Mar 2013

    A Paradigm for the Application of Cloud Computing in Mobile Intelligent Tutoring Systems

    Now-a-days, with the rapid growth of cloud computing, many industries are going to move their computing activities to clouds. Researchers of virtual learning are also looking for the ways to use clouds through mobile platforms. This paper offers a model to accompany the benefits of "Mobile intelligent learning" technology and...

    Provided By Islamic Azad University

  • White Papers // Mar 2013

    High-Resolution Direction Finding of Non-Stationary Signals Using Matching Pursuit

    One of the main goals of Time-Frequency (TF) signal representations in non-stationary array processing is to equip multi-antenna receivers with the ability to separate sources in the TF domain prior to direction finding. This permits high-resolution Direction-Of-Arrival (DOA) estimation of individual sources and of more sources than sensors. In this...

    Provided By Islamic Azad University

  • White Papers // Mar 2013

    Evaluation of the Data Security Methods in Cloud Computing Environments

    Cloud computing is an expression which is used by IT server companies to exchange computing needs as an asymmetrical service of relation for the final receivers of these services. All the models of the cloud computing depend on the resource sharing on the network due to regarding access integrity economic...

    Provided By Islamic Azad University

  • White Papers // Feb 2013

    A Framework for Applying ERP in Effective Implementation of TQM

    ERP (Enterprise Resource Planning) is an integrated system that gathers whole decision making information from all the departments of a company into one single place and plays an important role to integrate organization's information, functions and results in successful operation in global markets. On the other hand, TQM (Total Quality...

    Provided By Islamic Azad University

  • White Papers // Feb 2013

    Optimal Routing in Nanosensor Networks by a Game Theory Approach

    In this paper, the authors investigate a moving-Optimum Routing problem with nanosensor networks. Each nanosensor node has a sensor to observe the target and a processor to estimate the target position. It also has wireless communication capability but with limited range and can only communicate with neighbors. The moving target...

    Provided By Islamic Azad University

  • White Papers // Feb 2013

    Modeling Cooperation Between Nodes in Wireless Networks by APD Game

    Cooperation is the foundation of many protocols in wireless networks. Without cooperation, the performance of a network significantly decreases. Hence, all nodes in traditional networks are required to cooperate with each other. In this paper, instead of traditional networks, a network of rational and autonomous nodes is considered. Which means...

    Provided By Islamic Azad University