Islamic Azad University

Displaying 1-40 of 219 results

  • White Papers // Feb 2014

    Analyzing Access Control Models Dynamic Level and Security in Service - Oriented Architecture Environment

    Service-based architecture is the most recent generation of informational systems architecture; this architecture has been implemented through service web technology during the recent years. One of the important characteristics in this architecture is the existence of various users and subsystems and communication and cooperation among them to do actions. In...

    Provided By Islamic Azad University

  • White Papers // Jan 2014

    Enriched eTOM Framework in Service Deliver Operation through Alignment with some of COBIT5 Strategic Objectives

    In recent years, types of telecom services are expanding rapidly. On the other hand, present management Frameworks cannot cover and /or support them well. There are the place where few best known standards may be used for IT Service Management to enrich it, such as eTOM and COBIT5 (Control Objectives...

    Provided By Islamic Azad University

  • White Papers // Jan 2014

    A Distributed Data Mining Architecture Based on Nonlinear Model

    Development of computer networks and distributed database technologies has encouraged distributed data storage and a new technical generation of distributed data mining. This field has a wide range of applications. The present paper deals with applying multi-agent technology in data mining. At first the authors talk about agent and data...

    Provided By Islamic Azad University

  • White Papers // Dec 2013

    A New Approach Towards Integrated Cloud Computing Architecture

    Today across various businesses, administrative and senior managers seeking for new technologies and approaches in which they can utilize it, more easy and affordable and thereby rise up their competitive profit and utility. Information Communications and Technology (ICT) is no exception from this principle. Cloud computing concept and technology and...

    Provided By Islamic Azad University

  • White Papers // Nov 2013

    Trust-Based Clustering in Mobile Ad Hoc Networks: Challenges and Issues

    Mobile ad hoc networks are prone to various security attacks of malicious nodes and attackers. To protect the network clustering from security attacks, numerous trust-based clustering schemes have been presented in the literature. Analyzing the existing trust-based clustering solutions, the researchers illustrated their primary features and properties in this paper...

    Provided By Islamic Azad University

  • White Papers // Nov 2013

    Secret Key Cryptosystem Based on Non-Systematic Polar Codes

    Polar codes are provably capacity achieving linear block codes. The generator matrix of these codes is specified by knowing the parameters of transmission channel, length and dimension of the used code. On the other hand, for the cryptosystems based on general decoding problem (i.e. code based cryptosystems), the generator matrix...

    Provided By Islamic Azad University

  • White Papers // Oct 2013

    Security and Fault Aware Scheduling in Computational Grid

    Grid computation is an issue that has received much attention from researchers in recent years. Its aim is to use the computational power of idle resources which have been distributed in different places and under different policies and security conditions. Therefore, one of the challenges facing this technology is the...

    Provided By Islamic Azad University

  • White Papers // Oct 2013

    An Efficient Method for Automatic Text Categorization

    Automatic text categorization refers to assigning uncategorized text documents to one or more predefined categories. Texts categorization generally divided into two main sections: feature selection and learning algorithm. For Feature selection and learning algorithms techniques, various methods have been proposed. The purpose of the proposed techniques, increasing the accuracy of...

    Provided By Islamic Azad University

  • White Papers // Oct 2013

    Modeling Kerberos Authentication Protocol Using Colored Petri Net

    Information security is essential in today's digital world and plays an important role in message exchanges and trading. Authentication protocols play an important role in information security. Kerberos is one of the famous and commonly used authentication protocols. These factors cause attention of many researchers for formal modeling and analyzing...

    Provided By Islamic Azad University

  • White Papers // Aug 2013

    Data Storage Security Challenges in Cloud Computing

    In the digital world using technology and new technologies require safe and reliable environment, and it also requires consideration to all the challenges that technology faces with them and address these challenges. Cloud computing is also one of the new technologies in the IT world in this rule there is...

    Provided By Islamic Azad University

  • White Papers // Jul 2013

    GPU Implementation of Real-Time Biologically Inspired Face Detection using CUDA

    In this paper, massively parallel real-time face detection based on a visual attention and cortex-like mechanism of cognitive vision system is presented. As a first step, the authors use saliency map model to select salient face regions and HMAX C1 model to extract features from salient input image and then...

    Provided By Islamic Azad University

  • White Papers // Jul 2013

    Filtering Spam: Current Trends and Techniques

    In this paper, the authors give an overview about latest trend and techniques in spam filtering. They analyzed the problems which is introduced by spam, what spam actually do and how to measure the spam. This paper mainly focuses on automated, non-interactive filters, with a broad review ranging from commercial...

    Provided By Islamic Azad University

  • White Papers // May 2013

    Hybrid Architecture for Distributed Intrusion Detection System in Wireless Network

    In order to the rapid growth of the network application, new kinds of network attacks are emerging endlessly. So it is critical to protect the networks from attackers and the Intrusion detection technology becomes popular. Therefore, it is necessary that this security concern must be articulate right from the beginning...

    Provided By Islamic Azad University

  • White Papers // May 2013

    Reputation-Based Clustering Algorithms in Mobile Ad Hoc Networks

    Clustering is one of the main techniques that are used to increase the scalability of MANETs, but without any security considerations clustering is prone to various security attacks. Some cryptographic-based schemes have been proposed to secure the clustering process, but they are unable to handle the internal attacks. Trust-based clustering...

    Provided By Islamic Azad University

  • White Papers // Apr 2013

    Identification of Mazandaran Telecommunication Company Fixed phone subscribers using H-Means and W-K-Means Algorithm

    In recent years, companies' interaction with customers has changed significantly. Organizations require a proper understanding of customers and their needs in order to succeed in business. Customer Relationship Management (CRM) using data mining techniques, to discover hidden and valuable knowledge in data and information of organizations, provide the conditions for...

    Provided By Islamic Azad University

  • White Papers // Mar 2013

    A Paradigm for the Application of Cloud Computing in Mobile Intelligent Tutoring Systems

    Now-a-days, with the rapid growth of cloud computing, many industries are going to move their computing activities to clouds. Researchers of virtual learning are also looking for the ways to use clouds through mobile platforms. This paper offers a model to accompany the benefits of "Mobile intelligent learning" technology and...

    Provided By Islamic Azad University

  • White Papers // Mar 2013

    High-Resolution Direction Finding of Non-Stationary Signals Using Matching Pursuit

    One of the main goals of Time-Frequency (TF) signal representations in non-stationary array processing is to equip multi-antenna receivers with the ability to separate sources in the TF domain prior to direction finding. This permits high-resolution Direction-Of-Arrival (DOA) estimation of individual sources and of more sources than sensors. In this...

    Provided By Islamic Azad University

  • White Papers // Mar 2013

    Evaluation of the Data Security Methods in Cloud Computing Environments

    Cloud computing is an expression which is used by IT server companies to exchange computing needs as an asymmetrical service of relation for the final receivers of these services. All the models of the cloud computing depend on the resource sharing on the network due to regarding access integrity economic...

    Provided By Islamic Azad University

  • White Papers // Feb 2013

    A Framework for Applying ERP in Effective Implementation of TQM

    ERP (Enterprise Resource Planning) is an integrated system that gathers whole decision making information from all the departments of a company into one single place and plays an important role to integrate organization's information, functions and results in successful operation in global markets. On the other hand, TQM (Total Quality...

    Provided By Islamic Azad University

  • White Papers // Feb 2013

    Optimal Routing in Nanosensor Networks by a Game Theory Approach

    In this paper, the authors investigate a moving-Optimum Routing problem with nanosensor networks. Each nanosensor node has a sensor to observe the target and a processor to estimate the target position. It also has wireless communication capability but with limited range and can only communicate with neighbors. The moving target...

    Provided By Islamic Azad University

  • White Papers // Feb 2013

    Provide a Method for Evaluation of Software Architecture Using Ontology

    Software architecture is an undeniable role in the software life cycle. Some criteria should be noted at the time of analysis and evaluation of software architecture including quality characteristics, risks and non-risks, architectural decisions or tactics. Software architecture evaluation involves evaluating different options for architectural decisions, and combining them in...

    Provided By Islamic Azad University

  • White Papers // Feb 2013

    Core Porosity Estimation Through Different Training Approaches for Neural Network: Back-Propagation Learning Vs. Genetic Algorithm

    Porosity of hydrocarbon bearing formations is a crucial parameter for reservoir characterization, reserve estimation, planning for completion, and geomechanical and geophysical studies. Accurate determination of porosity from laboratory core analysis is highly cost, time, and people intensive. Therefore, the quest for a rapid, cost-effective, and efficient method of determining porosity...

    Provided By Islamic Azad University

  • White Papers // Feb 2013

    Energy Consumption Estimation in Clustered Wireless Sensor Networks Using M/M/1 Queuing Model

    Wireless Sensor Network (WSN), consists of a large number of sensor nodes. Each sensor node senses environmental phenomenon and sends the sensed data to a sink node. Since the sensor nodes are powered by limited power batteries. Energy efficiency is a major challenge in WSN applications. In this paper, the...

    Provided By Islamic Azad University

  • White Papers // Feb 2013

    Improving Energy Efficiency in MANETs by Multi-Path Routing

    Some multi-path routing algorithm in MANET, simultaneously send information to the destination through several directions to reduce end-to-end delay. In all these algorithms, the sent traffic through a path affects the adjacent path and unintentionally increases the delay due to the use of adjacent paths. Because, there are repetitive competitions...

    Provided By Islamic Azad University

  • White Papers // Feb 2013

    Assessing Efficiency of ITIL Framework to Align Business And IT

    Ensuring that IT and business have a more mature alignment relationship is recognized as being critical to an organization's success. To achieve alignment leveraging, Information Technology Infrastructure Library (ITIL) is considered fundamental as a comprehensive approach to planning and managing IT actions within the organization, based on its business requirements....

    Provided By Islamic Azad University

  • White Papers // Jan 2013

    IBCAV: Intelligent Based Clustering Algorithm in VANET

    Study of Vehicular Ad-hoc NETworks (VANETs) is among challenges facing researchers today. Nodes in such networks have a relatively high speed, while there is a great shortage of the time needed for data transmission between them as a result of node speed difference as well as persistent changing of the...

    Provided By Islamic Azad University

  • White Papers // Jan 2013

    Minimize Energy Consumption and Improve the Lifetime of Heterogeneous Wireless Sensor Networks by Using Monkey Search Algorithm

    Heterogeneous wireless sensor networks consist of various types of sensor nodes with different sensing units. Energy consumption and life time are the most significant concerns in heterogeneous wireless sensor network so that improving the balance in energy consumption increases the network lifetime. In this paper, the evolutionary approach is introduced...

    Provided By Islamic Azad University

  • White Papers // Jan 2013

    Noise Resistant Identification of Human Iris Patterns Using Fuzzy ARTMAP Neural Network

    A biometric system provides automatic identification of an individual based on unique features or characteristics possessed by that person. In this paper, the authors propose an efficient iris recognition system that employs circular Hough transform technique to localize the iris region in the eye image and cumulative sum based gray...

    Provided By Islamic Azad University

  • White Papers // Jan 2013

    Entrepreneurship and Risk - Taking

    Risk - taking and Entrepreneurship are two associated words studying in the entrepreneurial literature. In the most definitions, entrepreneurs are associated with risk and risk - taking. One of the most important factors in the entrepreneurs+ success is their risk - taking .Entrepreneurs must be risk - taker to realize...

    Provided By Islamic Azad University

  • White Papers // Jan 2013

    Business Process Reengineering Implementation: An Investigation of Critical Success Factors

    Intense world-wide competition has forced organizations to reengineer their old fashioned processes to achieve new heights of success. However, Business Process Reengineering (BPR) implementation is a difficult task and many organizations have failed to achieve the expected results. Consequently, the present study attempts to throw more light to the subject....

    Provided By Islamic Azad University

  • White Papers // Dec 2012

    Issues on Cloud Computing: A Systematic Review

    Cloud computing plays a vital role in todays distributed systems widely used by internet users. It provides a flexible and consistent environment in which the data, devices and services can be shared among end users in order to save the time and cost. The advanced computing is the most important...

    Provided By Islamic Azad University

  • White Papers // Dec 2012

    A Dynamic Approach for Honeypot Management

    Honeypot is a security device the value of which lies mainly in discovering and inspecting, being attacked and being at risk. Most of the present honeypots are configured and installed on the network statically. In some cases, considerations have been made on dynamic configuration of honeypots at the time of...

    Provided By Islamic Azad University

  • White Papers // Dec 2012

    Cloud Computing as an Innovation in GIS & SDI: Methodologies, Services, Issues and Deployment Techniques

    Cloud computing is one of the main issues of interest to the scientific community of the spatial data. A cloud is referred to computing infrastructure for a representation of network. From the perspective of providers, the main characteristics of cloud computing is being dynamic, high power in computing and storage....

    Provided By Islamic Azad University

  • White Papers // Nov 2012

    Building a Private Cloud With OpenStack and Joli OS

    Today, with rapid growth of the cloud computing technology, enterprises and organizations need to build their private cloud for their own specific requirements. Infrastructure itself is not sufficient for users, they need platforms and software, and what mobile users need is a special kind of operating system which must be...

    Provided By Islamic Azad University

  • White Papers // Nov 2012

    Design a B2B Electronic Commerce System Through Social Networking

    Now-a-days E-commerce is one of the most important topics in the IT world. Advances in technology have led to intense competition among businesses. In this paper, the authors present the design of a B2B e-commerce system through social networking. The paper proposes a set of diagrams based on object orientation...

    Provided By Islamic Azad University

  • White Papers // Nov 2012

    A Survey of Service Oriented Architecture Systems Testing

    Service Oriented Architecture (SOA) is one of the latest software architectures. This architecture is created in direction of the business requirements and removed the gap between software and businesses. The software testing is the rising cost of activities in development software. SOA has different specifications and features proportion of the...

    Provided By Islamic Azad University

  • White Papers // Oct 2012

    A Review of Workflow Scheduling in Cloud Computing Environment

    Cloud computing environments facilitate applications by providing virtualized resources that can be provisioned dynamically. The advent of Cloud computing as a new model of service provisioning in distributed systems, encourages researchers to investigate its benefits and drawbacks in executing scientific applications such as workflows. There are a mass of researches...

    Provided By Islamic Azad University

  • White Papers // Oct 2012

    A Survey on Cloud Computing and Current Solution Providers

    Cloud computing is an attractive computing model since it allows for resources to be provisioned according to a demand basis. It has also made it possible to process a large amount of data, using clusters of commodity computers. Moreover, the diffusion of cloud computing is expected to generate substantial direct...

    Provided By Islamic Azad University

  • White Papers // Oct 2012

    Security Threats and Countermeasures in Cloud Computing

    Security concerns have given rise to immerging an active area of research due to the many security threats that many organizations have faced at present. Addressing these issues requires getting confidence from user for cloud applications and services. In this paper, the authors have cast light over the major security...

    Provided By Islamic Azad University

  • White Papers // Oct 2012

    Achieving the Benefits of Agility in Software Architecture-XP

    One challenge of XP agile method in software development is this method's underestimation over software quality attribution; these attributes are of main indices of software architecture. In this study, a method is represented for responding this challenge on the bases of probability theory. In this method, firstly, the rating matrix...

    Provided By Islamic Azad University

  • White Papers // Feb 2013

    Provide a Method for Evaluation of Software Architecture Using Ontology

    Software architecture is an undeniable role in the software life cycle. Some criteria should be noted at the time of analysis and evaluation of software architecture including quality characteristics, risks and non-risks, architectural decisions or tactics. Software architecture evaluation involves evaluating different options for architectural decisions, and combining them in...

    Provided By Islamic Azad University

  • White Papers // Feb 2013

    Core Porosity Estimation Through Different Training Approaches for Neural Network: Back-Propagation Learning Vs. Genetic Algorithm

    Porosity of hydrocarbon bearing formations is a crucial parameter for reservoir characterization, reserve estimation, planning for completion, and geomechanical and geophysical studies. Accurate determination of porosity from laboratory core analysis is highly cost, time, and people intensive. Therefore, the quest for a rapid, cost-effective, and efficient method of determining porosity...

    Provided By Islamic Azad University

  • White Papers // Mar 2013

    A Paradigm for the Application of Cloud Computing in Mobile Intelligent Tutoring Systems

    Now-a-days, with the rapid growth of cloud computing, many industries are going to move their computing activities to clouds. Researchers of virtual learning are also looking for the ways to use clouds through mobile platforms. This paper offers a model to accompany the benefits of "Mobile intelligent learning" technology and...

    Provided By Islamic Azad University

  • White Papers // Nov 2012

    Building a Private Cloud With OpenStack and Joli OS

    Today, with rapid growth of the cloud computing technology, enterprises and organizations need to build their private cloud for their own specific requirements. Infrastructure itself is not sufficient for users, they need platforms and software, and what mobile users need is a special kind of operating system which must be...

    Provided By Islamic Azad University

  • White Papers // Mar 2013

    High-Resolution Direction Finding of Non-Stationary Signals Using Matching Pursuit

    One of the main goals of Time-Frequency (TF) signal representations in non-stationary array processing is to equip multi-antenna receivers with the ability to separate sources in the TF domain prior to direction finding. This permits high-resolution Direction-Of-Arrival (DOA) estimation of individual sources and of more sources than sensors. In this...

    Provided By Islamic Azad University

  • White Papers // Jan 2013

    IBCAV: Intelligent Based Clustering Algorithm in VANET

    Study of Vehicular Ad-hoc NETworks (VANETs) is among challenges facing researchers today. Nodes in such networks have a relatively high speed, while there is a great shortage of the time needed for data transmission between them as a result of node speed difference as well as persistent changing of the...

    Provided By Islamic Azad University

  • White Papers // Feb 2013

    Energy Consumption Estimation in Clustered Wireless Sensor Networks Using M/M/1 Queuing Model

    Wireless Sensor Network (WSN), consists of a large number of sensor nodes. Each sensor node senses environmental phenomenon and sends the sensed data to a sink node. Since the sensor nodes are powered by limited power batteries. Energy efficiency is a major challenge in WSN applications. In this paper, the...

    Provided By Islamic Azad University

  • White Papers // Feb 2013

    Improving Energy Efficiency in MANETs by Multi-Path Routing

    Some multi-path routing algorithm in MANET, simultaneously send information to the destination through several directions to reduce end-to-end delay. In all these algorithms, the sent traffic through a path affects the adjacent path and unintentionally increases the delay due to the use of adjacent paths. Because, there are repetitive competitions...

    Provided By Islamic Azad University

  • White Papers // Mar 2013

    Evaluation of the Data Security Methods in Cloud Computing Environments

    Cloud computing is an expression which is used by IT server companies to exchange computing needs as an asymmetrical service of relation for the final receivers of these services. All the models of the cloud computing depend on the resource sharing on the network due to regarding access integrity economic...

    Provided By Islamic Azad University

  • White Papers // Aug 2012

    A Novel Architecture for Antenna Arrangement in Wireless Cellular CDMA Systems

    Wise arrangement of antennas is critical in wireless cellular systems for both reduction of Co-Channel Interference (CCI) and increase the Quality of Service (QoS). In this paper, a novel architecture for antenna arrangement in CDMA wireless cellular systems is presented. In this architecture that the authors called microzone, every cell...

    Provided By Islamic Azad University

  • White Papers // May 2011

    Global Grids and Cloud Toolkits

    In the past few years, many overlying concepts of distributed computing eminently cluster, grid and cloud computing have appeared. In recent years, extensive researches have been conducted in the area of simulation to model large complex systems and understand their behavior, especially in parallel and distributed systems. Distributed computing combines...

    Provided By Islamic Azad University

  • White Papers // Dec 2010

    Differentiated Services Fuzzy Assured Forward Queuing for Congestion Control in Intermediate Routers

    Today's, computer networks play a very important role in users' daily activities. In order to have a better network management, data packet problems, should be considerably reduced. One of the most important problems that happens in networks and is not recognizable easily, is congestion, That encouraged experts to research more...

    Provided By Islamic Azad University

  • White Papers // May 2011

    A Two-Stage Algorithm for Data Clustering

    Cluster analysis is an important and popular data analysis technique that is used in a large variety of fields. K-means is a well-known and widely used clustering technique due to its simplicity in implementation and high speed in most situations. However, it suffers from two major shortcomings: it is very...

    Provided By Islamic Azad University

  • White Papers // May 2011

    Feature Selection with Hybrid Mutual Information and Genetic Algorithm

    Feature selection plays an important role in data mining and pattern recognition, especially for large scale data. During past years, various metrics have been proposed to measure the relevance between different features. Mutual information is nonlinear and can effectively represent the dependencies of features. In this paper, the authors proposed...

    Provided By Islamic Azad University

  • White Papers // May 2012

    Cloud Computing Vs. Grid Computing

    Cloud computing emerges as one of the hottest topic in field of information technology. Cloud computing is based on several other computing research areas such as HPC, virtualization, utility computing and grid computing. In order to make clear the essential of cloud computing, the authors propose the characteristics of this...

    Provided By Islamic Azad University

  • White Papers // Dec 2012

    Issues on Cloud Computing: A Systematic Review

    Cloud computing plays a vital role in todays distributed systems widely used by internet users. It provides a flexible and consistent environment in which the data, devices and services can be shared among end users in order to save the time and cost. The advanced computing is the most important...

    Provided By Islamic Azad University

  • White Papers // Feb 2013

    Assessing Efficiency of ITIL Framework to Align Business And IT

    Ensuring that IT and business have a more mature alignment relationship is recognized as being critical to an organization's success. To achieve alignment leveraging, Information Technology Infrastructure Library (ITIL) is considered fundamental as a comprehensive approach to planning and managing IT actions within the organization, based on its business requirements....

    Provided By Islamic Azad University

  • White Papers // Dec 2011

    Organizational Customers Expectation in Business Plan Strategy

    With the rise in the standard of living, resulting from increased organizational productivity changes in the needs and demands of the population. House Of Quality (HOQ) has been widely used to translate customers' expectation to a Products & Services (P&S) technical attributes. Products & Services have emerged as the fastest...

    Provided By Islamic Azad University

  • White Papers // Jul 2011

    Information Technology Adoption in Small and Medium-sized Enterprises; An Appraisal of Two Decades Literature

    Small to Medium-sized Enterprises (SMEs) account for major source of employment, technological advancements, and competitive advantages for both developed and developing countries. Owing to the intensified competitive pressure and necessity for entering to global market undergone by SMEs, these businesses are incrementally employing Information Technology (IT) to take advantage of...

    Provided By Islamic Azad University

  • White Papers // Jul 2010

    Business and Information Technology Alignment Through Business Service Orientation

    The alignment issue between business and information technology is one of the most mind boggling problems enterprises encounter in achieving an agile and dynamic business it is so important that has a direct effect on the overall performance of an enterprise, in enterprises that there is an alignment, they have...

    Provided By Islamic Azad University

  • White Papers // Nov 2012

    Design a B2B Electronic Commerce System Through Social Networking

    Now-a-days E-commerce is one of the most important topics in the IT world. Advances in technology have led to intense competition among businesses. In this paper, the authors present the design of a B2B e-commerce system through social networking. The paper proposes a set of diagrams based on object orientation...

    Provided By Islamic Azad University

  • White Papers // Oct 2012

    A Review of Workflow Scheduling in Cloud Computing Environment

    Cloud computing environments facilitate applications by providing virtualized resources that can be provisioned dynamically. The advent of Cloud computing as a new model of service provisioning in distributed systems, encourages researchers to investigate its benefits and drawbacks in executing scientific applications such as workflows. There are a mass of researches...

    Provided By Islamic Azad University

  • White Papers // Nov 2010

    Optimizing the Data Search Results in Web Using Genetic Algorithm

    One of the most important problems of web data search is recombining words of query, because reformulation of query words plays an effective role in search engine results. Web users try to make queries using their experience. What matter here is to develop a method so that web users can...

    Provided By Islamic Azad University

  • White Papers // Jan 2013

    Minimize Energy Consumption and Improve the Lifetime of Heterogeneous Wireless Sensor Networks by Using Monkey Search Algorithm

    Heterogeneous wireless sensor networks consist of various types of sensor nodes with different sensing units. Energy consumption and life time are the most significant concerns in heterogeneous wireless sensor network so that improving the balance in energy consumption increases the network lifetime. In this paper, the evolutionary approach is introduced...

    Provided By Islamic Azad University

  • White Papers // Feb 2012

    Simulated Annealing Algorithm for Data Aggregation Trees in Wireless Sensor Networks and Comparison with Genetic Algorithm

    In ad hoc networks, the main issue about designing of protocols is quality of service, so that in wireless sensor networks the main constraint in designing protocols is limited energy of sensors. In fact, protocols which minimize the power consumption in sensors are more considered in wireless sensor networks. One...

    Provided By Islamic Azad University

  • White Papers // Feb 2013

    Optimal Routing in Nanosensor Networks by a Game Theory Approach

    In this paper, the authors investigate a moving-Optimum Routing problem with nanosensor networks. Each nanosensor node has a sensor to observe the target and a processor to estimate the target position. It also has wireless communication capability but with limited range and can only communicate with neighbors. The moving target...

    Provided By Islamic Azad University

  • White Papers // Oct 2012

    A Survey on Cloud Computing and Current Solution Providers

    Cloud computing is an attractive computing model since it allows for resources to be provisioned according to a demand basis. It has also made it possible to process a large amount of data, using clusters of commodity computers. Moreover, the diffusion of cloud computing is expected to generate substantial direct...

    Provided By Islamic Azad University

  • White Papers // Oct 2012

    Security Threats and Countermeasures in Cloud Computing

    Security concerns have given rise to immerging an active area of research due to the many security threats that many organizations have faced at present. Addressing these issues requires getting confidence from user for cloud applications and services. In this paper, the authors have cast light over the major security...

    Provided By Islamic Azad University

  • White Papers // Jul 2012

    Efficient and Secure Web Services by Using Multi Agents

    Mobile agents are an excellent technology for implementing Web services. Within a set of federated Web services, mobile agents can reduce bandwidth requirements and mitigate the effects of high-latency network connections. This paper presents a model for implementing Web services with mobile agents where agents are free to move between...

    Provided By Islamic Azad University

  • White Papers // Jul 2012

    Study of Access Control Issue in Web Services

    Security is an important issue that must be well-defined in Service Oriented Architecture (SOA) environment, so that it could be used in implementing the web services. In this paper, the authors focus on one of the important aspects of SOA security, which is access control. They explain the security requirements...

    Provided By Islamic Azad University

  • White Papers // Nov 2011

    Weak Estimation-Based Algorithm Fault-Tolerant Routing Wireless Sensor Networks

    Wireless Sensor Networks are characterized by the cooperative engagement of mobile nodes that constitute networks possessing continuously-changing infrastructures, the bereavement of centralized network managers, access points, fixed base stations and a backbone network for controlling the network management functions. While comprehensive studies have been carried out in the past several...

    Provided By Islamic Azad University

  • White Papers // Oct 2011

    The Key Metric for Evaluation Localizationin Wireless Sensor Networks Via Distance/Angle Estimation Algorithm (D/A-EA)

    Wireless sensor network localization is an important area that attracted significant research interest. Hence, localization schemes for wireless sensor, although, mobility would appear to make localization more difficult. In this paper, the authors present a new method by which a sensor node can determine its location by listening to wireless...

    Provided By Islamic Azad University

  • White Papers // Oct 2012

    Achieving the Benefits of Agility in Software Architecture-XP

    One challenge of XP agile method in software development is this method's underestimation over software quality attribution; these attributes are of main indices of software architecture. In this study, a method is represented for responding this challenge on the bases of probability theory. In this method, firstly, the rating matrix...

    Provided By Islamic Azad University

  • White Papers // Feb 2012

    An Approach for Agile SoA Development Using Agile Principals

    In dynamic and turbulent business environment, the need for success and survival of any organization is the ability of adapting to changes efficiently and cost-effectively. So, for developing software applications, one of the methods is Service Oriented Architecture (SOA) methodology and other is Agile Methodology. Since embracing changes is the...

    Provided By Islamic Azad University

  • White Papers // Aug 2012

    Federated Identification Architecture

    Service Oriented Architectures is a concept which exposes capabilities in distributed, domain-spanning environments as services. These modern systems have three characteristics: They are heterogeneous, distributed and loose Coupling. With increasing popularity of Service Oriented Architecture (SOA), this is no longer possible since interacting systems are generally not located within a...

    Provided By Islamic Azad University

  • White Papers // Jan 2013

    Noise Resistant Identification of Human Iris Patterns Using Fuzzy ARTMAP Neural Network

    A biometric system provides automatic identification of an individual based on unique features or characteristics possessed by that person. In this paper, the authors propose an efficient iris recognition system that employs circular Hough transform technique to localize the iris region in the eye image and cumulative sum based gray...

    Provided By Islamic Azad University

  • White Papers // Dec 2011

    A Learning Automata Based and Multicast Routing Energy Efficiency Algorithm Using Minimum Spanning Tree for Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) include a lot of small sensor nodes with limited energy. Multi-cast routing in wireless sensor networks is an appropriate method for sending a same data to several different receivers in the network. In this paper, A multi-cast routing algorithm based on learning automata is presented for...

    Provided By Islamic Azad University

  • White Papers // Jan 2011

    On Wireless Sensor Networks: Architectures,Information Dissemination Protocols,Applications

    In recent years, many research in fields of data dissemination protocol to mobile sinks for wireless sensor networks have been published. The communication or message passing process must be designed to conserve the limited energy resources of the sensors. Clustering in Mobile Ad hoc NETworks (MANETs) and Wireless Sensor Networks...

    Provided By Islamic Azad University

  • White Papers // Oct 2011

    Improving Lifetime and Reliability in Routing Real-Time Wireless Sensor Networks Based on Hybrid Algorithm

    Recent advancements in microelectronic and wireless communications introduce a novel technology with a wide range of real-time applications called Wireless Sensor Network. Wireless sensor network is used in various types of applications such as environmental monitoring, temperature measurement, air pressure control and etc. the mentioned network consisting of large number...

    Provided By Islamic Azad University

  • White Papers // Aug 2010

    Proffering a Brand New Methodology for Resource Discovery and Pricing in Computational Grid Using Learning Automata

    Grid Computing is a parallel and distributed system that facilitates the virtualization of distributed computing and enables coordinating and sharing of computing and storage resources. Mechanism based on economic models is an effective approach to solve the problem of grid resources management. The essence of this problem is how to...

    Provided By Islamic Azad University