Islamic Azad University

Displaying 41-80 of 245 results

  • White Papers // Feb 2013

    Core Porosity Estimation Through Different Training Approaches for Neural Network: Back-Propagation Learning Vs. Genetic Algorithm

    Porosity of hydrocarbon bearing formations is a crucial parameter for reservoir characterization, reserve estimation, planning for completion, and geomechanical and geophysical studies. Accurate determination of porosity from laboratory core analysis is highly cost, time, and people intensive. Therefore, the quest for a rapid, cost-effective, and efficient method of determining porosity...

    Provided By Islamic Azad University

  • White Papers // Feb 2013

    Energy Consumption Estimation in Clustered Wireless Sensor Networks Using M/M/1 Queuing Model

    Wireless Sensor Network (WSN), consists of a large number of sensor nodes. Each sensor node senses environmental phenomenon and sends the sensed data to a sink node. Since the sensor nodes are powered by limited power batteries. Energy efficiency is a major challenge in WSN applications. In this paper, the...

    Provided By Islamic Azad University

  • White Papers // Feb 2013

    Improving Energy Efficiency in MANETs by Multi-Path Routing

    Some multi-path routing algorithm in MANET, simultaneously send information to the destination through several directions to reduce end-to-end delay. In all these algorithms, the sent traffic through a path affects the adjacent path and unintentionally increases the delay due to the use of adjacent paths. Because, there are repetitive competitions...

    Provided By Islamic Azad University

  • White Papers // Feb 2013

    Assessing Efficiency of ITIL Framework to Align Business And IT

    Ensuring that IT and business have a more mature alignment relationship is recognized as being critical to an organization's success. To achieve alignment leveraging, Information Technology Infrastructure Library (ITIL) is considered fundamental as a comprehensive approach to planning and managing IT actions within the organization, based on its business requirements....

    Provided By Islamic Azad University

  • White Papers // Jan 2013

    Entrepreneurship and Risk - Taking

    Risk - taking and Entrepreneurship are two associated words studying in the entrepreneurial literature. In the most definitions, entrepreneurs are associated with risk and risk - taking. One of the most important factors in the entrepreneurs+ success is their risk - taking .Entrepreneurs must be risk - taker to realize...

    Provided By Islamic Azad University

  • White Papers // Jan 2013

    Business Process Reengineering Implementation: An Investigation of Critical Success Factors

    Intense world-wide competition has forced organizations to reengineer their old fashioned processes to achieve new heights of success. However, Business Process Reengineering (BPR) implementation is a difficult task and many organizations have failed to achieve the expected results. Consequently, the present study attempts to throw more light to the subject....

    Provided By Islamic Azad University

  • White Papers // Jan 2013

    Minimize Energy Consumption and Improve the Lifetime of Heterogeneous Wireless Sensor Networks by Using Monkey Search Algorithm

    Heterogeneous wireless sensor networks consist of various types of sensor nodes with different sensing units. Energy consumption and life time are the most significant concerns in heterogeneous wireless sensor network so that improving the balance in energy consumption increases the network lifetime. In this paper, the evolutionary approach is introduced...

    Provided By Islamic Azad University

  • White Papers // Jan 2013

    Noise Resistant Identification of Human Iris Patterns Using Fuzzy ARTMAP Neural Network

    A biometric system provides automatic identification of an individual based on unique features or characteristics possessed by that person. In this paper, the authors propose an efficient iris recognition system that employs circular Hough transform technique to localize the iris region in the eye image and cumulative sum based gray...

    Provided By Islamic Azad University

  • White Papers // Jan 2013

    IBCAV: Intelligent Based Clustering Algorithm in VANET

    Study of Vehicular Ad-hoc NETworks (VANETs) is among challenges facing researchers today. Nodes in such networks have a relatively high speed, while there is a great shortage of the time needed for data transmission between them as a result of node speed difference as well as persistent changing of the...

    Provided By Islamic Azad University

  • White Papers // Dec 2012

    Issues on Cloud Computing: A Systematic Review

    Cloud computing plays a vital role in todays distributed systems widely used by internet users. It provides a flexible and consistent environment in which the data, devices and services can be shared among end users in order to save the time and cost. The advanced computing is the most important...

    Provided By Islamic Azad University

  • White Papers // Dec 2012

    A Dynamic Approach for Honeypot Management

    Honeypot is a security device the value of which lies mainly in discovering and inspecting, being attacked and being at risk. Most of the present honeypots are configured and installed on the network statically. In some cases, considerations have been made on dynamic configuration of honeypots at the time of...

    Provided By Islamic Azad University

  • White Papers // Dec 2012

    Cloud Computing as an Innovation in GIS & SDI: Methodologies, Services, Issues and Deployment Techniques

    Cloud computing is one of the main issues of interest to the scientific community of the spatial data. A cloud is referred to computing infrastructure for a representation of network. From the perspective of providers, the main characteristics of cloud computing is being dynamic, high power in computing and storage....

    Provided By Islamic Azad University

  • White Papers // Nov 2012

    Energy Efficient Routing in Mobile Ad Hoc Networks by Using Honey Bee Mating Optimization

    Mobile Ad hoc NETworks (MANETs) are composed of mobile stations communicating through wireless links, without any fixed backbone support. In these networks, limited power energy supply, and frequent topology changes caused by node mobility, makes their routing a challenging problem. TORA is one of the routing protocols that successfully copies...

    Provided By Islamic Azad University

  • White Papers // Nov 2012

    A Survey of Service Oriented Architecture Systems Testing

    Service Oriented Architecture (SOA) is one of the latest software architectures. This architecture is created in direction of the business requirements and removed the gap between software and businesses. The software testing is the rising cost of activities in development software. SOA has different specifications and features proportion of the...

    Provided By Islamic Azad University

  • White Papers // Nov 2012

    Building a Private Cloud With OpenStack and Joli OS

    Today, with rapid growth of the cloud computing technology, enterprises and organizations need to build their private cloud for their own specific requirements. Infrastructure itself is not sufficient for users, they need platforms and software, and what mobile users need is a special kind of operating system which must be...

    Provided By Islamic Azad University

  • White Papers // Nov 2012

    Design a B2B Electronic Commerce System Through Social Networking

    Now-a-days E-commerce is one of the most important topics in the IT world. Advances in technology have led to intense competition among businesses. In this paper, the authors present the design of a B2B e-commerce system through social networking. The paper proposes a set of diagrams based on object orientation...

    Provided By Islamic Azad University

  • White Papers // Nov 2012

    Application of the Model SRP in Strategic Management of Strategic Human Resources so as to Create Social Capital

    Inspection of ups and downs of human resources development shows that today human force in development of organizations has much more importance than the past, and human is considered as the most essential human capital and the principle factor in creation of sustainable competitive advantages for organizations. One of the...

    Provided By Islamic Azad University

  • White Papers // Oct 2012

    A Comparative Study on Seven Static Mapping Heuristics for Grid Scheduling Problem

    Grid computing is a promising technology for future computing platforms and is expected to provide easier access to remote computational resources that are usually locally limited. Scheduling is one of the core steps to efficiently exploit the capabilities of Grid Computing (GC) systems. The problem of optimally mapping (defined as...

    Provided By Islamic Azad University

  • White Papers // Oct 2012

    A Novel Evolutionary-Fuzzy System for Function Approximation and Comparison the Robust of Used Evolutionary Algorithms

    Despite the previous successful history of fuzzy systems, the lack of learning capabilities characterizing most of the works generated a certain interest to design a fuzzy rule base with added learning capabilities. Evolutionary Algorithms (EAs) have inspired new design for fuzzy systems with added learning authorities. The purpose of the...

    Provided By Islamic Azad University

  • White Papers // Oct 2012

    Automatic Software Test Case Generation: An Analytical Classification Framework

    A challenging part of software testing entails the generation of test cases. A good test case should have the quality to cover more features of test objective. The techniques for automatic generation of test cases try to efficiently find a small set of cases that allow an adequacy criterion to...

    Provided By Islamic Azad University

  • White Papers // Oct 2012

    Using Adaptive Neuro-Fuzzy Inference System in Alert Management of Intrusion Detection Systems

    By ever increase in using computer network and internet, using Intrusion Detection Systems (IDS) has been more important. Main problems of IDS are the number of generated alerts, alert failure as well as identifying the attack type of alerts. In this paper a system is proposed that uses Adaptive Neuro-Fuzzy...

    Provided By Islamic Azad University

  • White Papers // Oct 2012

    A Survey on Cloud Computing and Current Solution Providers

    Cloud computing is an attractive computing model since it allows for resources to be provisioned according to a demand basis. It has also made it possible to process a large amount of data, using clusters of commodity computers. Moreover, the diffusion of cloud computing is expected to generate substantial direct...

    Provided By Islamic Azad University

  • White Papers // Oct 2012

    Security Threats and Countermeasures in Cloud Computing

    Security concerns have given rise to immerging an active area of research due to the many security threats that many organizations have faced at present. Addressing these issues requires getting confidence from user for cloud applications and services. In this paper, the authors have cast light over the major security...

    Provided By Islamic Azad University

  • White Papers // Oct 2012

    Achieving the Benefits of Agility in Software Architecture-XP

    One challenge of XP agile method in software development is this method's underestimation over software quality attribution; these attributes are of main indices of software architecture. In this study, a method is represented for responding this challenge on the bases of probability theory. In this method, firstly, the rating matrix...

    Provided By Islamic Azad University

  • White Papers // Oct 2012

    A Review of Workflow Scheduling in Cloud Computing Environment

    Cloud computing environments facilitate applications by providing virtualized resources that can be provisioned dynamically. The advent of Cloud computing as a new model of service provisioning in distributed systems, encourages researchers to investigate its benefits and drawbacks in executing scientific applications such as workflows. There are a mass of researches...

    Provided By Islamic Azad University

  • White Papers // Sep 2012

    Intelligent Intrusion Detection in Computer Networks Using Fuzzy Systems

    The Internet and computer networks are exposed to an increasing number of security threats. With new types of attacks appearing continually, developing flexible and adaptive security oriented approaches is a severe challenge. Intrusion detection is a significant focus of research in the security of computer systems and networks. The security...

    Provided By Islamic Azad University

  • White Papers // Sep 2012

    Taxonomy of the Security Aspects of Cloud Computing Systems-A Survey

    Cloud computing is a model of both service delivery and consumption for increasing the capabilities of enterprises dynamically without investing in new infrastructure, training new personnel, or licensing new software. It refers to everything delivered as services over the Internet. Although the benefits of Cloud Computing are evident, security is...

    Provided By Islamic Azad University

  • White Papers // Aug 2012

    A Novel Architecture for Antenna Arrangement in Wireless Cellular CDMA Systems

    Wise arrangement of antennas is critical in wireless cellular systems for both reduction of Co-Channel Interference (CCI) and increase the Quality of Service (QoS). In this paper, a novel architecture for antenna arrangement in CDMA wireless cellular systems is presented. In this architecture that the authors called microzone, every cell...

    Provided By Islamic Azad University

  • White Papers // Aug 2012

    Defense Against Syn-Flood Denial of Service Attacks Based on Learning Automata

    SYN-flooding attack uses the weakness available in TCP's three-way handshake process to keep it from handling legitimate requests. This attack causes the victim host to populate its backlog queue with forged TCP connections. In other words it increases Ploss (Probability of loss) and Pa (buffer occupancy Percentage of attack requests)...

    Provided By Islamic Azad University

  • White Papers // Aug 2012

    Business Modeling Based on Agents Systems Modules

    Agent design patterns form the new methodology used to improve the development of software agents. Agent design patterns can help capture solutions to common problems in the design agent. The forms are used in various systems such as knowledge management systems, real-time systems and network management. An agent design pattern...

    Provided By Islamic Azad University

  • White Papers // Aug 2012

    Federated Identification Architecture

    Service Oriented Architectures is a concept which exposes capabilities in distributed, domain-spanning environments as services. These modern systems have three characteristics: They are heterogeneous, distributed and loose Coupling. With increasing popularity of Service Oriented Architecture (SOA), this is no longer possible since interacting systems are generally not located within a...

    Provided By Islamic Azad University

  • White Papers // Jul 2012

    Trust in Electronic Commerce: A New Model for Building Online Trust in B2C

    The rapid growth in the electronic commerce over the internet has fuelled predictions and speculations about what makes a Business To Consumer (B2C) web site effective. Increasing use of the World Wide Web as a B2C commercial tool raises interest in understanding the key issues in building relationships with customers...

    Provided By Islamic Azad University

  • White Papers // Jul 2012

    The Effect of IT on Organizational Agility

    In the unpredictable and competitive world of today the organizations must have different competitive features to compete, otherwise they will move towards annihilation. One of these features that organizations need in turbulent environments is agility. Agility provides the organization with the possibility of quick response and compatibility with environment and...

    Provided By Islamic Azad University

  • White Papers // Jul 2012

    A Survey on the e-Government Business Model Regarding Value Creation Approach

    Internet development, business success, and internet affairs and on the other hand, increase in complexity of traditional governments processes, and costly affairs have hade governments move toward being an e-government. To this aim, application of business models can be a solution in order to implement a more successful e-government. Value...

    Provided By Islamic Azad University

  • White Papers // Jul 2012

    Toward Knowledge Management as a Service in Cloud-Based Environments

    As new technologies and paradigms emerge, businesses have to make new efforts to properly get aligned with them, especially in knowledge management area. Today the Cloud Computing paradigm is becoming more and more popular, due to the vast decrease in time, cost and effort for meeting software development needs. It...

    Provided By Islamic Azad University

  • White Papers // Jul 2012

    Efficient and Secure Web Services by Using Multi Agents

    Mobile agents are an excellent technology for implementing Web services. Within a set of federated Web services, mobile agents can reduce bandwidth requirements and mitigate the effects of high-latency network connections. This paper presents a model for implementing Web services with mobile agents where agents are free to move between...

    Provided By Islamic Azad University

  • White Papers // Jul 2012

    Study of Access Control Issue in Web Services

    Security is an important issue that must be well-defined in Service Oriented Architecture (SOA) environment, so that it could be used in implementing the web services. In this paper, the authors focus on one of the important aspects of SOA security, which is access control. They explain the security requirements...

    Provided By Islamic Azad University

  • White Papers // Jun 2012

    Exploring the Type of Relationship between Information Security Management and Organizational Culture

    Now-a-days, in information era, providing information assets security has become one of the major challenges in organizations. A culture conducive to information security practice is extremely important for organizations since information has to be critical assets in modern enterprises. Thus, for understanding and improving the organizational behavior with regard to...

    Provided By Islamic Azad University

  • White Papers // Jun 2012

    A New Sensor Data's Storage

    Sensor networks are a kind of ad hoc networks. Sensors enable machines to capture and observe characteristics of physical objects and features of natural incidents. Most of the current efforts on sensor networks are focused on networking and service development for various applications, but less on processing the emerging data....

    Provided By Islamic Azad University

  • White Papers // Jun 2012

    Reversible Circuit Optimization Using PSO Algorithm

    Reversible Circuits Synthesis and optimization is one of the main terms dealt with in this paper. The synthesis and optimization of circuits using PSO algorithm is investigated in this paper. In this paper, for the first time the reversible circuits are synthesized using PSO algorithms. At the time of circuit...

    Provided By Islamic Azad University