Islamic Azad University

Displaying 1-40 of 219 results

  • White Papers // Feb 2014

    Analyzing Access Control Models Dynamic Level and Security in Service - Oriented Architecture Environment

    Service-based architecture is the most recent generation of informational systems architecture; this architecture has been implemented through service web technology during the recent years. One of the important characteristics in this architecture is the existence of various users and subsystems and communication and cooperation among them to do actions. In...

    Provided By Islamic Azad University

  • White Papers // Jan 2014

    Detecting Suspicion Information on the Web Using Crime Data Mining Techniques

    Along with the rapid popularity of the Internet, crime information on the web is becoming increasingly rampant, and the majority of them are in the form of text. Because a lot of crime information in documents is described through events, event-based semantic technology can be used to study the patterns...

    Provided By Islamic Azad University

  • White Papers // Jan 2014

    Enriched eTOM Framework in Service Deliver Operation through Alignment with some of COBIT5 Strategic Objectives

    In recent years, types of telecom services are expanding rapidly. On the other hand, present management Frameworks cannot cover and /or support them well. There are the place where few best known standards may be used for IT Service Management to enrich it, such as eTOM and COBIT5 (Control Objectives...

    Provided By Islamic Azad University

  • White Papers // Jan 2014

    A Distributed Data Mining Architecture Based on Nonlinear Model

    Development of computer networks and distributed database technologies has encouraged distributed data storage and a new technical generation of distributed data mining. This field has a wide range of applications. The present paper deals with applying multi-agent technology in data mining. At first the authors talk about agent and data...

    Provided By Islamic Azad University

  • White Papers // Dec 2013

    A New Approach Towards Integrated Cloud Computing Architecture

    Today across various businesses, administrative and senior managers seeking for new technologies and approaches in which they can utilize it, more easy and affordable and thereby rise up their competitive profit and utility. Information Communications and Technology (ICT) is no exception from this principle. Cloud computing concept and technology and...

    Provided By Islamic Azad University

  • White Papers // Nov 2013

    Trust-Based Clustering in Mobile Ad Hoc Networks: Challenges and Issues

    Mobile ad hoc networks are prone to various security attacks of malicious nodes and attackers. To protect the network clustering from security attacks, numerous trust-based clustering schemes have been presented in the literature. Analyzing the existing trust-based clustering solutions, the researchers illustrated their primary features and properties in this paper...

    Provided By Islamic Azad University

  • White Papers // Nov 2013

    Secret Key Cryptosystem Based on Non-Systematic Polar Codes

    Polar codes are provably capacity achieving linear block codes. The generator matrix of these codes is specified by knowing the parameters of transmission channel, length and dimension of the used code. On the other hand, for the cryptosystems based on general decoding problem (i.e. code based cryptosystems), the generator matrix...

    Provided By Islamic Azad University

  • White Papers // Oct 2013

    Modeling Kerberos Authentication Protocol Using Colored Petri Net

    Information security is essential in today's digital world and plays an important role in message exchanges and trading. Authentication protocols play an important role in information security. Kerberos is one of the famous and commonly used authentication protocols. These factors cause attention of many researchers for formal modeling and analyzing...

    Provided By Islamic Azad University

  • White Papers // Oct 2013

    An Efficient Method for Automatic Text Categorization

    Automatic text categorization refers to assigning uncategorized text documents to one or more predefined categories. Texts categorization generally divided into two main sections: feature selection and learning algorithm. For Feature selection and learning algorithms techniques, various methods have been proposed. The purpose of the proposed techniques, increasing the accuracy of...

    Provided By Islamic Azad University

  • White Papers // Oct 2013

    Security and Fault Aware Scheduling in Computational Grid

    Grid computation is an issue that has received much attention from researchers in recent years. Its aim is to use the computational power of idle resources which have been distributed in different places and under different policies and security conditions. Therefore, one of the challenges facing this technology is the...

    Provided By Islamic Azad University

  • White Papers // Aug 2013

    Data Storage Security Challenges in Cloud Computing

    In the digital world using technology and new technologies require safe and reliable environment, and it also requires consideration to all the challenges that technology faces with them and address these challenges. Cloud computing is also one of the new technologies in the IT world in this rule there is...

    Provided By Islamic Azad University

  • White Papers // Jul 2013

    Filtering Spam: Current Trends and Techniques

    In this paper, the authors give an overview about latest trend and techniques in spam filtering. They analyzed the problems which is introduced by spam, what spam actually do and how to measure the spam. This paper mainly focuses on automated, non-interactive filters, with a broad review ranging from commercial...

    Provided By Islamic Azad University

  • White Papers // Jul 2013

    GPU Implementation of Real-Time Biologically Inspired Face Detection using CUDA

    In this paper, massively parallel real-time face detection based on a visual attention and cortex-like mechanism of cognitive vision system is presented. As a first step, the authors use saliency map model to select salient face regions and HMAX C1 model to extract features from salient input image and then...

    Provided By Islamic Azad University

  • White Papers // May 2013

    Providing a Fault-Tolerant Algorithm for On-Chip Interconnection Networks

    As technology scales, fault tolerance has become a key concern in the on-chip communication. On-chip network reliability can be increased with the development of fault-tolerant routing algorithms. Distributed routing algorithms are a class of algorithms in which routing decisions, taken without the knowledge of total network status. Given the time...

    Provided By Islamic Azad University

  • White Papers // May 2013

    Reputation-Based Clustering Algorithms in Mobile Ad Hoc Networks

    Clustering is one of the main techniques that are used to increase the scalability of MANETs, but without any security considerations clustering is prone to various security attacks. Some cryptographic-based schemes have been proposed to secure the clustering process, but they are unable to handle the internal attacks. Trust-based clustering...

    Provided By Islamic Azad University

  • White Papers // May 2013

    Hybrid Architecture for Distributed Intrusion Detection System in Wireless Network

    In order to the rapid growth of the network application, new kinds of network attacks are emerging endlessly. So it is critical to protect the networks from attackers and the Intrusion detection technology becomes popular. Therefore, it is necessary that this security concern must be articulate right from the beginning...

    Provided By Islamic Azad University

  • White Papers // Apr 2013

    Identification of Mazandaran Telecommunication Company Fixed phone subscribers using H-Means and W-K-Means Algorithm

    In recent years, companies' interaction with customers has changed significantly. Organizations require a proper understanding of customers and their needs in order to succeed in business. Customer Relationship Management (CRM) using data mining techniques, to discover hidden and valuable knowledge in data and information of organizations, provide the conditions for...

    Provided By Islamic Azad University

  • White Papers // Mar 2013

    A Paradigm for the Application of Cloud Computing in Mobile Intelligent Tutoring Systems

    Now-a-days, with the rapid growth of cloud computing, many industries are going to move their computing activities to clouds. Researchers of virtual learning are also looking for the ways to use clouds through mobile platforms. This paper offers a model to accompany the benefits of "Mobile intelligent learning" technology and...

    Provided By Islamic Azad University

  • White Papers // Mar 2013

    High-Resolution Direction Finding of Non-Stationary Signals Using Matching Pursuit

    One of the main goals of Time-Frequency (TF) signal representations in non-stationary array processing is to equip multi-antenna receivers with the ability to separate sources in the TF domain prior to direction finding. This permits high-resolution Direction-Of-Arrival (DOA) estimation of individual sources and of more sources than sensors. In this...

    Provided By Islamic Azad University

  • White Papers // Mar 2013

    Evaluation of the Data Security Methods in Cloud Computing Environments

    Cloud computing is an expression which is used by IT server companies to exchange computing needs as an asymmetrical service of relation for the final receivers of these services. All the models of the cloud computing depend on the resource sharing on the network due to regarding access integrity economic...

    Provided By Islamic Azad University

  • White Papers // Feb 2013

    A Framework for Applying ERP in Effective Implementation of TQM

    ERP (Enterprise Resource Planning) is an integrated system that gathers whole decision making information from all the departments of a company into one single place and plays an important role to integrate organization's information, functions and results in successful operation in global markets. On the other hand, TQM (Total Quality...

    Provided By Islamic Azad University

  • White Papers // Feb 2013

    Optimal Routing in Nanosensor Networks by a Game Theory Approach

    In this paper, the authors investigate a moving-Optimum Routing problem with nanosensor networks. Each nanosensor node has a sensor to observe the target and a processor to estimate the target position. It also has wireless communication capability but with limited range and can only communicate with neighbors. The moving target...

    Provided By Islamic Azad University

  • White Papers // Feb 2013

    Provide a Method for Evaluation of Software Architecture Using Ontology

    Software architecture is an undeniable role in the software life cycle. Some criteria should be noted at the time of analysis and evaluation of software architecture including quality characteristics, risks and non-risks, architectural decisions or tactics. Software architecture evaluation involves evaluating different options for architectural decisions, and combining them in...

    Provided By Islamic Azad University

  • White Papers // Feb 2013

    Core Porosity Estimation Through Different Training Approaches for Neural Network: Back-Propagation Learning Vs. Genetic Algorithm

    Porosity of hydrocarbon bearing formations is a crucial parameter for reservoir characterization, reserve estimation, planning for completion, and geomechanical and geophysical studies. Accurate determination of porosity from laboratory core analysis is highly cost, time, and people intensive. Therefore, the quest for a rapid, cost-effective, and efficient method of determining porosity...

    Provided By Islamic Azad University

  • White Papers // Feb 2013

    Energy Consumption Estimation in Clustered Wireless Sensor Networks Using M/M/1 Queuing Model

    Wireless Sensor Network (WSN), consists of a large number of sensor nodes. Each sensor node senses environmental phenomenon and sends the sensed data to a sink node. Since the sensor nodes are powered by limited power batteries. Energy efficiency is a major challenge in WSN applications. In this paper, the...

    Provided By Islamic Azad University

  • White Papers // Feb 2013

    Improving Energy Efficiency in MANETs by Multi-Path Routing

    Some multi-path routing algorithm in MANET, simultaneously send information to the destination through several directions to reduce end-to-end delay. In all these algorithms, the sent traffic through a path affects the adjacent path and unintentionally increases the delay due to the use of adjacent paths. Because, there are repetitive competitions...

    Provided By Islamic Azad University

  • White Papers // Feb 2013

    Assessing Efficiency of ITIL Framework to Align Business And IT

    Ensuring that IT and business have a more mature alignment relationship is recognized as being critical to an organization's success. To achieve alignment leveraging, Information Technology Infrastructure Library (ITIL) is considered fundamental as a comprehensive approach to planning and managing IT actions within the organization, based on its business requirements....

    Provided By Islamic Azad University

  • White Papers // Jan 2013

    Noise Resistant Identification of Human Iris Patterns Using Fuzzy ARTMAP Neural Network

    A biometric system provides automatic identification of an individual based on unique features or characteristics possessed by that person. In this paper, the authors propose an efficient iris recognition system that employs circular Hough transform technique to localize the iris region in the eye image and cumulative sum based gray...

    Provided By Islamic Azad University

  • White Papers // Jan 2013

    Minimize Energy Consumption and Improve the Lifetime of Heterogeneous Wireless Sensor Networks by Using Monkey Search Algorithm

    Heterogeneous wireless sensor networks consist of various types of sensor nodes with different sensing units. Energy consumption and life time are the most significant concerns in heterogeneous wireless sensor network so that improving the balance in energy consumption increases the network lifetime. In this paper, the evolutionary approach is introduced...

    Provided By Islamic Azad University

  • White Papers // Jan 2013

    IBCAV: Intelligent Based Clustering Algorithm in VANET

    Study of Vehicular Ad-hoc NETworks (VANETs) is among challenges facing researchers today. Nodes in such networks have a relatively high speed, while there is a great shortage of the time needed for data transmission between them as a result of node speed difference as well as persistent changing of the...

    Provided By Islamic Azad University

  • White Papers // Jan 2013

    Entrepreneurship and Risk - Taking

    Risk - taking and Entrepreneurship are two associated words studying in the entrepreneurial literature. In the most definitions, entrepreneurs are associated with risk and risk - taking. One of the most important factors in the entrepreneurs+ success is their risk - taking .Entrepreneurs must be risk - taker to realize...

    Provided By Islamic Azad University

  • White Papers // Jan 2013

    Business Process Reengineering Implementation: An Investigation of Critical Success Factors

    Intense world-wide competition has forced organizations to reengineer their old fashioned processes to achieve new heights of success. However, Business Process Reengineering (BPR) implementation is a difficult task and many organizations have failed to achieve the expected results. Consequently, the present study attempts to throw more light to the subject....

    Provided By Islamic Azad University

  • White Papers // Dec 2012

    Issues on Cloud Computing: A Systematic Review

    Cloud computing plays a vital role in todays distributed systems widely used by internet users. It provides a flexible and consistent environment in which the data, devices and services can be shared among end users in order to save the time and cost. The advanced computing is the most important...

    Provided By Islamic Azad University

  • White Papers // Dec 2012

    Cloud Computing as an Innovation in GIS & SDI: Methodologies, Services, Issues and Deployment Techniques

    Cloud computing is one of the main issues of interest to the scientific community of the spatial data. A cloud is referred to computing infrastructure for a representation of network. From the perspective of providers, the main characteristics of cloud computing is being dynamic, high power in computing and storage....

    Provided By Islamic Azad University

  • White Papers // Dec 2012

    A Dynamic Approach for Honeypot Management

    Honeypot is a security device the value of which lies mainly in discovering and inspecting, being attacked and being at risk. Most of the present honeypots are configured and installed on the network statically. In some cases, considerations have been made on dynamic configuration of honeypots at the time of...

    Provided By Islamic Azad University

  • White Papers // Nov 2012

    A Survey of Service Oriented Architecture Systems Testing

    Service Oriented Architecture (SOA) is one of the latest software architectures. This architecture is created in direction of the business requirements and removed the gap between software and businesses. The software testing is the rising cost of activities in development software. SOA has different specifications and features proportion of the...

    Provided By Islamic Azad University

  • White Papers // Nov 2012

    Design a B2B Electronic Commerce System Through Social Networking

    Now-a-days E-commerce is one of the most important topics in the IT world. Advances in technology have led to intense competition among businesses. In this paper, the authors present the design of a B2B e-commerce system through social networking. The paper proposes a set of diagrams based on object orientation...

    Provided By Islamic Azad University

  • White Papers // Nov 2012

    Building a Private Cloud With OpenStack and Joli OS

    Today, with rapid growth of the cloud computing technology, enterprises and organizations need to build their private cloud for their own specific requirements. Infrastructure itself is not sufficient for users, they need platforms and software, and what mobile users need is a special kind of operating system which must be...

    Provided By Islamic Azad University

  • White Papers // Oct 2012

    A Novel Evolutionary-Fuzzy System for Function Approximation and Comparison the Robust of Used Evolutionary Algorithms

    Despite the previous successful history of fuzzy systems, the lack of learning capabilities characterizing most of the works generated a certain interest to design a fuzzy rule base with added learning capabilities. Evolutionary Algorithms (EAs) have inspired new design for fuzzy systems with added learning authorities. The purpose of the...

    Provided By Islamic Azad University

  • White Papers // Oct 2012

    Automatic Software Test Case Generation: An Analytical Classification Framework

    A challenging part of software testing entails the generation of test cases. A good test case should have the quality to cover more features of test objective. The techniques for automatic generation of test cases try to efficiently find a small set of cases that allow an adequacy criterion to...

    Provided By Islamic Azad University

  • White Papers // Apr 2012

    Face Recognition Using Co-Occurrence Matrix of Local Average Binary Pattern (CMLABP)

    The Local Binary Pattern (LBP) operator has been proved to be effective for image representation, but it is too local to be strength. In this paper, the authors propose Co-occurrence Matrix of Local Average Binary Pattern operator (CMLABP), and apply it to face recognition. In the method, calculation is performed...

    Provided By Islamic Azad University

  • White Papers // Jun 2012

    A Proposed Fuzzy Method to Detect Faulty Nodes in Wireless Sensor Network Clustering Structure

    Wireless Sensor Networks (WSN) consist of hundreds or thousands tiny nodes called sensor that work together and are connected to each other in order to do some special tasks. Because of limited nodes energy supply, clustering structure is introduced to reduce energy consumption in WSN. Due to specific features of...

    Provided By Islamic Azad University

  • White Papers // Mar 2011

    Integration of Information Systems Using Model Driven Architecture (MDA)

    No doubt there are difficult problems before IT managers and software development pioneers. These problems are the main challenge for the dutifulness of today modern organizations. Developing Information system requires accurate and tiring work. It should be done by very experienced programmers and needs spending a lot of many on...

    Provided By Islamic Azad University

  • White Papers // Apr 2011

    A Scheduling Algorithm for Increasing the Quality of the Distributed Systems by Using Genetic Algorithm

    This paper will present a scheduling algorithm for increasing the quality of the distributed system by using genetic algorithm. The proposed algorithm OQSG is more efficient in comparison with the previous algorithms. This proposed algorithm can be reliable like the other algorithms, regarding the effective parameters used for the available...

    Provided By Islamic Azad University

  • White Papers // Oct 2012

    A Novel Evolutionary-Fuzzy System for Function Approximation and Comparison the Robust of Used Evolutionary Algorithms

    Despite the previous successful history of fuzzy systems, the lack of learning capabilities characterizing most of the works generated a certain interest to design a fuzzy rule base with added learning capabilities. Evolutionary Algorithms (EAs) have inspired new design for fuzzy systems with added learning authorities. The purpose of the...

    Provided By Islamic Azad University

  • White Papers // Apr 2011

    A Novel Hybrid GA-ABC Based Energy Efficient Clustering in Wireless Sensor Network

    Extending the lifetime of wireless sensor networks remains in the center of attention when talking about wireless sensor network issues. As lifetime is directly dependent upon the energy supplies of the nodes, optimization of node energy consumption is a robust approach to contribute to the overall network lifetime. Network clustering...

    Provided By Islamic Azad University

  • White Papers // Oct 2012

    Automatic Software Test Case Generation: An Analytical Classification Framework

    A challenging part of software testing entails the generation of test cases. A good test case should have the quality to cover more features of test objective. The techniques for automatic generation of test cases try to efficiently find a small set of cases that allow an adequacy criterion to...

    Provided By Islamic Azad University

  • White Papers // Oct 2012

    A Comparative Study on Seven Static Mapping Heuristics for Grid Scheduling Problem

    Grid computing is a promising technology for future computing platforms and is expected to provide easier access to remote computational resources that are usually locally limited. Scheduling is one of the core steps to efficiently exploit the capabilities of Grid Computing (GC) systems. The problem of optimally mapping (defined as...

    Provided By Islamic Azad University

  • White Papers // Sep 2012

    Taxonomy of the Security Aspects of Cloud Computing Systems-A Survey

    Cloud computing is a model of both service delivery and consumption for increasing the capabilities of enterprises dynamically without investing in new infrastructure, training new personnel, or licensing new software. It refers to everything delivered as services over the Internet. Although the benefits of Cloud Computing are evident, security is...

    Provided By Islamic Azad University

  • White Papers // Apr 2011

    An Analytical Framework for Data Stream Mining Techniques Based on Challenges and Requirements

    A growing number of applications that generate massive streams of data need intelligent data processing and online analysis. Real-time surveillance systems, telecommunication systems, sensor networks and other dynamic environments are such examples. The imminent need for turning such data into useful information and knowledge augments the development of systems, algorithms...

    Provided By Islamic Azad University

  • White Papers // Feb 2011

    Classification and Evaluation the Privacy Preserving Data Mining Techniques by Using a Data Modification-Based Framework

    In recent years, the data mining techniques have met a serious challenge due to the increased concerning and worries of the privacy, that is, protecting the privacy of the critical and sensitive data. Different techniques and algorithms have been already presented for Privacy Preserving data mining, which could be classified...

    Provided By Islamic Azad University

  • White Papers // Nov 2012

    A Survey of Service Oriented Architecture Systems Testing

    Service Oriented Architecture (SOA) is one of the latest software architectures. This architecture is created in direction of the business requirements and removed the gap between software and businesses. The software testing is the rising cost of activities in development software. SOA has different specifications and features proportion of the...

    Provided By Islamic Azad University

  • White Papers // Nov 2008

    Mobile Systems Challenges in Next Generation Networks

    Customary network migration to Next Generation Networks (NGN) is due to service integration and low cost of the offered services in NGN. NGN is based on an IP/MPLS backbone through which all traffics pass. Besides, different mobile generations up to R99 UMTS are all based on the circuit switch systems....

    Provided By Islamic Azad University

  • White Papers // Jun 2010

    Fuzzy Based Approach for Load Balanced Distributing Database on Sensor Network

    A wireless sensor network consists of tiny sensing devices, with limited energy and processing ability. Some time the authors have to distribute a database on sensor network, because of limited energy in sensors, load balanced distributing database can increase the lifetime of this networks. In this paper, they propose Fuzzy...

    Provided By Islamic Azad University

  • White Papers // Mar 2010

    An Energy Efficient Coverage Method for Clustered Wireless Sensor Networks

    An important issue in WSN is the regional covering. A coverage algorithm should be able to solve this issue by considering the power consumption to improve the network lifetime. This requires employing the lowest number of sensors. A solution is just to turn on a subset of nodes. This subset...

    Provided By Islamic Azad University

  • White Papers // Mar 2011

    An Intelligent Energy Efficient Clustering in Wireless Sensor Networks

    One of the main challenges of wireless sensor network is how to improve its life time. The limited energy of nodes is the main obstacle. The authors may overcome this problem by optimizing the nodes' power consumption. A solution is clustering, but optimum clustering of wireless sensor network is a...

    Provided By Islamic Azad University

  • White Papers // Jan 2011

    Proposed a New Algorithm for Real-Time Applications in Routing of Wireless Sensor Networks

    Many wireless sensor network applications must resolve the inherent conflict between energy efficient communication and the need to achieve desired quality of service such as end-to-end communication delay. To address this challenge, the authors propose a new protocol which tries to resolve the finding a trade off between lifetime of...

    Provided By Islamic Azad University

  • White Papers // Sep 2009

    An Adaptive Cross-Layer Multichannel QoS-MAC Protocol for Cluster Based Wireless Multimedia Sensor Networks

    Rapid penetration of small customized wireless devices and enormous growth of wireless communication technologies has already set the stage for large-scale deployment of wireless sensor networks. Offering precise Quality of Service (QoS) for multimedia transmission over sensor networks has not received significant attention. However offering some better QoS for wireless...

    Provided By Islamic Azad University

  • White Papers // Sep 2011

    A New MAC Algorithm for QoS Support in Ad Hoc Networks

    Supporting real-time traffic in wireless LANs is one of the interesting QoS (Quality of Service) issues. However, the wireless ad hoc networks are severely affected by bandwidth, and establishing a QoS in these networks face problems. In this paper, the authors have proposed a fully distributed MAC algorithm to support...

    Provided By Islamic Azad University

  • White Papers // Sep 2011

    A New Scheduling Algorithm for Ad Hoc Networks With Capability of QoS Support

    Considering the comfortably establishing ad hoc networks, the use of this type of network is increasing day to day. On the other side, it is predicted that using multimedia applications will be more public in these network. Supporting real-time traffic in Ad hoc networks is one of the interesting QoS...

    Provided By Islamic Azad University

  • White Papers // Mar 2011

    Self-Managing Fault in Wireless Sensor Networks

    Wireless sensor networks are characterized by dense deployment of energy constrained nodes. in the past few years wireless sensor networks have received a greater interest in application such as disaster management, border protection, combat field reconnaissance and security surveillance. Sensor nodes are expected to operate autonomously in unattended environments and...

    Provided By Islamic Azad University

  • White Papers // Dec 2011

    A Learning Automata Based and Multicast Routing Energy Efficiency Algorithm Using Minimum Spanning Tree for Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) include a lot of small sensor nodes with limited energy. Multi-cast routing in wireless sensor networks is an appropriate method for sending a same data to several different receivers in the network. In this paper, A multi-cast routing algorithm based on learning automata is presented for...

    Provided By Islamic Azad University

  • White Papers // Jan 2011

    On Wireless Sensor Networks: Architectures,Information Dissemination Protocols,Applications

    In recent years, many research in fields of data dissemination protocol to mobile sinks for wireless sensor networks have been published. The communication or message passing process must be designed to conserve the limited energy resources of the sensors. Clustering in Mobile Ad hoc NETworks (MANETs) and Wireless Sensor Networks...

    Provided By Islamic Azad University

  • White Papers // Oct 2011

    Improving Lifetime and Reliability in Routing Real-Time Wireless Sensor Networks Based on Hybrid Algorithm

    Recent advancements in microelectronic and wireless communications introduce a novel technology with a wide range of real-time applications called Wireless Sensor Network. Wireless sensor network is used in various types of applications such as environmental monitoring, temperature measurement, air pressure control and etc. the mentioned network consisting of large number...

    Provided By Islamic Azad University

  • White Papers // Aug 2010

    Proffering a Brand New Methodology for Resource Discovery and Pricing in Computational Grid Using Learning Automata

    Grid Computing is a parallel and distributed system that facilitates the virtualization of distributed computing and enables coordinating and sharing of computing and storage resources. Mechanism based on economic models is an effective approach to solve the problem of grid resources management. The essence of this problem is how to...

    Provided By Islamic Azad University

  • White Papers // Dec 2011

    A Novel Virtual Machine Placement in Cloud Computing

    In this paper a novel virtual machine placement mechanism for cloud computing is proposed based on network-aware Virtual Machines (VMs). VMs are widely applied to modern data center for cloud computing as a key technology to realize energy-efficient operation of servers. In such a scenario, applications and data thereof can...

    Provided By Islamic Azad University

  • White Papers // Nov 2011

    Efficient Detection of Sybil Attack Based on Cryptography in VANET

    Vehicular communications play a substantial role in providing safety transportation by means of safety message exchange. Researchers have proposed several solutions for securing safety messages. Protocols based on a fixed key infrastructure are more efficient in implementation and maintain stronger security in comparison with dynamic structures. The purpose of this...

    Provided By Islamic Azad University

  • White Papers // Sep 2011

    Multiple Ant-Bee Colony Optimization for Load Balancing in Packet-Switched Networks

    One of the important issues in computer networks is "Load Balancing" which leads to efficient use of the network resources. To achieve a balanced network it is necessary to find different routes between the source and destination. In the current paper, the authors propose a new approach to find different...

    Provided By Islamic Azad University

  • White Papers // Dec 2010

    A Positioning Method in Wireless Sensor Networks Using Genetic Algorithms

    The recent area of Wireless Sensor Networks (WSNs) has brought new challenges to developers of network protocols. Energy consumption and network coverage are two important challenges in wireless sensor networks. The authors investigate intelligent techniques for node positioning to reduce energy consumption with coverage preserved in wireless sensor network. A...

    Provided By Islamic Azad University

  • White Papers // Oct 2011

    Smart Card Security; Technology and Adoption

    Newly, smart card technology are being used in a number of ways around the world, on the other hand, security has become significant in information technology, especially in those application involving data sharing and transactions through the internet. Furthermore, researches in information technology acceptance have identified the security as one...

    Provided By Islamic Azad University

  • White Papers // Jan 2012

    The New Method of Concealed Data Aggregation in Wireless Sensor: A Case Study

    Wireless Sensor Networks (WSN) consists of many sensor nodes that are placed on unattended environments such as military sites in order to collect important information. Implementing a secure protocol that can prevent forwarding forged data and modifying content of aggregated data and has low delay and overhead of communication, computing...

    Provided By Islamic Azad University

  • White Papers // Jan 2012

    A New Protocol for Concealed Data Aggregation in Wireless Sensor Networks

    Wireless Sensor Networks (WSN) consists of many sensor nodes that are placed on unattended environments such as military sites in order to collect important information. Implementing a secure protocol that can prevent forwarding forged data and modifying content of aggregated data and has low delay and overhead of communication, computing...

    Provided By Islamic Azad University

  • White Papers // Jan 2012

    Improving Survivability in Wireless Ad Hoc Network

    Topological changes in mobile ad hoc networks frequently render routing paths unusable. Such recurrent path failures have detrimental effects on quality of service. A suitable technique for eliminating this problem is to use multiple backup paths between the source and the destination in the network. This paper proposes an effective...

    Provided By Islamic Azad University

  • White Papers // Mar 2012

    Offline Signature Recognition Using Radon Transform

    In this paper, a new offline signature recognition system based on Radon Transform, Fractal Dimension (FD) and Support Vector Machine (SVM) is presented. In the first step, projections of original signatures along four specified directions have been performed using radon transform. Then, FDs of four obtained vectors are calculated to...

    Provided By Islamic Azad University

  • White Papers // Feb 2012

    Providing a Model for Predicting Tour Sale in Mobile e-Tourism Recommender Systems

    In this paper, a new model is proposed for tourism recommender systems. This model recommends tours to tourists using data-mining techniques such as clustering and association rules. According to the proposed model, tourists are initially clustered. Self Organize Map (SOM) algorithm is used for determining the number of clusters and...

    Provided By Islamic Azad University

  • White Papers // Jun 2011

    Role Allocation and Scheme in Software Engineering Course Projects

    Role is a set of behavioural actions and responsibilities one takes in a specific situation. The people play different roles with their family, at work as well as in other environments. Differences among the role definitions reach mainly from the different emphasis of the software development method itself. Agile software...

    Provided By Islamic Azad University

  • White Papers // Dec 2011

    A New Algorithm for Query Processing in Wireless Sensor Networks

    A Wireless Sensor Network (WSN) is a wireless network having distributed self-organized autonomous devices employing sensors to monitor environmental conditions like temperature, humidity, pressure, movement, etc. Dense deployment of disposable and low-cost sensor nodes makes WSN concept beneficial for battle-fields. Tiny sizes and light weight structure of these (WSN) nodes...

    Provided By Islamic Azad University

  • White Papers // May 2012

    LAMR: Learning Automata Based Multicast Routing Protocol for Multi-Channel Multi-Radio Wireless Mesh Networks

    Multicast routing is a crucial issue in wireless networks in which the same content should be delivered to a group of recipients simultaneously. Multicast is also considered as a key service for audio and video applications as well as data dissemination protocols over the last-mile backhaul Internet connectivity provided by...

    Provided By Islamic Azad University

  • White Papers // May 2011

    LLACA: An Adaptive Localized Clustering Algorithm for Wireless Ad Hoc Networks

    Performance of ad hoc networks dramatically declines as network grows. Cluster formation in which the network hosts are hierarchically partitioned into several autonomous non-overlapping groups, based on proximity, is a promising approach to alleviate the scalability problem of ad hoc networks. In this paper, the authors propose a localized learning...

    Provided By Islamic Azad University

  • White Papers // Mar 2011

    A Link Stability-Based Multicast Routing Protocol for Wireless Mobile Ad Hoc Networks

    Recently, several studies have been conducted to design mobility-based multicast routing protocols for wireless Mobile Ad hoc NETworks (MANET). These protocols assume that the mobility parameters of the network are fixed, and so they cannot perform well under real MANET scenarios in which the mobility parameters of the hosts vary...

    Provided By Islamic Azad University