Islamic Azad University

Displaying 41-80 of 219 results

  • White Papers // Oct 2012

    A Novel Evolutionary-Fuzzy System for Function Approximation and Comparison the Robust of Used Evolutionary Algorithms

    Despite the previous successful history of fuzzy systems, the lack of learning capabilities characterizing most of the works generated a certain interest to design a fuzzy rule base with added learning capabilities. Evolutionary Algorithms (EAs) have inspired new design for fuzzy systems with added learning authorities. The purpose of the...

    Provided By Islamic Azad University

  • White Papers // Oct 2012

    Automatic Software Test Case Generation: An Analytical Classification Framework

    A challenging part of software testing entails the generation of test cases. A good test case should have the quality to cover more features of test objective. The techniques for automatic generation of test cases try to efficiently find a small set of cases that allow an adequacy criterion to...

    Provided By Islamic Azad University

  • White Papers // Oct 2012

    A Comparative Study on Seven Static Mapping Heuristics for Grid Scheduling Problem

    Grid computing is a promising technology for future computing platforms and is expected to provide easier access to remote computational resources that are usually locally limited. Scheduling is one of the core steps to efficiently exploit the capabilities of Grid Computing (GC) systems. The problem of optimally mapping (defined as...

    Provided By Islamic Azad University

  • White Papers // Oct 2012

    Using Adaptive Neuro-Fuzzy Inference System in Alert Management of Intrusion Detection Systems

    By ever increase in using computer network and internet, using Intrusion Detection Systems (IDS) has been more important. Main problems of IDS are the number of generated alerts, alert failure as well as identifying the attack type of alerts. In this paper a system is proposed that uses Adaptive Neuro-Fuzzy...

    Provided By Islamic Azad University

  • White Papers // Sep 2012

    Intelligent Intrusion Detection in Computer Networks Using Fuzzy Systems

    The Internet and computer networks are exposed to an increasing number of security threats. With new types of attacks appearing continually, developing flexible and adaptive security oriented approaches is a severe challenge. Intrusion detection is a significant focus of research in the security of computer systems and networks. The security...

    Provided By Islamic Azad University

  • White Papers // Sep 2012

    Taxonomy of the Security Aspects of Cloud Computing Systems-A Survey

    Cloud computing is a model of both service delivery and consumption for increasing the capabilities of enterprises dynamically without investing in new infrastructure, training new personnel, or licensing new software. It refers to everything delivered as services over the Internet. Although the benefits of Cloud Computing are evident, security is...

    Provided By Islamic Azad University

  • White Papers // Aug 2012

    A Novel Architecture for Antenna Arrangement in Wireless Cellular CDMA Systems

    Wise arrangement of antennas is critical in wireless cellular systems for both reduction of Co-Channel Interference (CCI) and increase the Quality of Service (QoS). In this paper, a novel architecture for antenna arrangement in CDMA wireless cellular systems is presented. In this architecture that the authors called microzone, every cell...

    Provided By Islamic Azad University

  • White Papers // Aug 2012

    Defense Against Syn-Flood Denial of Service Attacks Based on Learning Automata

    SYN-flooding attack uses the weakness available in TCP's three-way handshake process to keep it from handling legitimate requests. This attack causes the victim host to populate its backlog queue with forged TCP connections. In other words it increases Ploss (Probability of loss) and Pa (buffer occupancy Percentage of attack requests)...

    Provided By Islamic Azad University

  • White Papers // Aug 2012

    Business Modeling Based on Agents Systems Modules

    Agent design patterns form the new methodology used to improve the development of software agents. Agent design patterns can help capture solutions to common problems in the design agent. The forms are used in various systems such as knowledge management systems, real-time systems and network management. An agent design pattern...

    Provided By Islamic Azad University

  • White Papers // Aug 2012

    Federated Identification Architecture

    Service Oriented Architectures is a concept which exposes capabilities in distributed, domain-spanning environments as services. These modern systems have three characteristics: They are heterogeneous, distributed and loose Coupling. With increasing popularity of Service Oriented Architecture (SOA), this is no longer possible since interacting systems are generally not located within a...

    Provided By Islamic Azad University

  • White Papers // Jul 2012

    Trust in Electronic Commerce: A New Model for Building Online Trust in B2C

    The rapid growth in the electronic commerce over the internet has fuelled predictions and speculations about what makes a Business To Consumer (B2C) web site effective. Increasing use of the World Wide Web as a B2C commercial tool raises interest in understanding the key issues in building relationships with customers...

    Provided By Islamic Azad University

  • White Papers // Jul 2012

    The Effect of IT on Organizational Agility

    In the unpredictable and competitive world of today the organizations must have different competitive features to compete, otherwise they will move towards annihilation. One of these features that organizations need in turbulent environments is agility. Agility provides the organization with the possibility of quick response and compatibility with environment and...

    Provided By Islamic Azad University

  • White Papers // Jul 2012

    A Survey on the e-Government Business Model Regarding Value Creation Approach

    Internet development, business success, and internet affairs and on the other hand, increase in complexity of traditional governments processes, and costly affairs have hade governments move toward being an e-government. To this aim, application of business models can be a solution in order to implement a more successful e-government. Value...

    Provided By Islamic Azad University

  • White Papers // Jul 2012

    Efficient and Secure Web Services by Using Multi Agents

    Mobile agents are an excellent technology for implementing Web services. Within a set of federated Web services, mobile agents can reduce bandwidth requirements and mitigate the effects of high-latency network connections. This paper presents a model for implementing Web services with mobile agents where agents are free to move between...

    Provided By Islamic Azad University

  • White Papers // Jul 2012

    Study of Access Control Issue in Web Services

    Security is an important issue that must be well-defined in Service Oriented Architecture (SOA) environment, so that it could be used in implementing the web services. In this paper, the authors focus on one of the important aspects of SOA security, which is access control. They explain the security requirements...

    Provided By Islamic Azad University

  • White Papers // Jul 2012

    Toward Knowledge Management as a Service in Cloud-Based Environments

    As new technologies and paradigms emerge, businesses have to make new efforts to properly get aligned with them, especially in knowledge management area. Today the Cloud Computing paradigm is becoming more and more popular, due to the vast decrease in time, cost and effort for meeting software development needs. It...

    Provided By Islamic Azad University

  • White Papers // Jun 2012

    Exploring the Type of Relationship between Information Security Management and Organizational Culture

    Now-a-days, in information era, providing information assets security has become one of the major challenges in organizations. A culture conducive to information security practice is extremely important for organizations since information has to be critical assets in modern enterprises. Thus, for understanding and improving the organizational behavior with regard to...

    Provided By Islamic Azad University

  • White Papers // Jun 2012

    A New Sensor Data's Storage

    Sensor networks are a kind of ad hoc networks. Sensors enable machines to capture and observe characteristics of physical objects and features of natural incidents. Most of the current efforts on sensor networks are focused on networking and service development for various applications, but less on processing the emerging data....

    Provided By Islamic Azad University

  • White Papers // Jun 2012

    Reversible Circuit Optimization Using PSO Algorithm

    Reversible Circuits Synthesis and optimization is one of the main terms dealt with in this paper. The synthesis and optimization of circuits using PSO algorithm is investigated in this paper. In this paper, for the first time the reversible circuits are synthesized using PSO algorithms. At the time of circuit...

    Provided By Islamic Azad University

  • White Papers // Jun 2012

    A Proposed Fuzzy Method to Detect Faulty Nodes in Wireless Sensor Network Clustering Structure

    Wireless Sensor Networks (WSN) consist of hundreds or thousands tiny nodes called sensor that work together and are connected to each other in order to do some special tasks. Because of limited nodes energy supply, clustering structure is introduced to reduce energy consumption in WSN. Due to specific features of...

    Provided By Islamic Azad University

  • White Papers // May 2012

    LAMR: Learning Automata Based Multicast Routing Protocol for Multi-Channel Multi-Radio Wireless Mesh Networks

    Multicast routing is a crucial issue in wireless networks in which the same content should be delivered to a group of recipients simultaneously. Multicast is also considered as a key service for audio and video applications as well as data dissemination protocols over the last-mile backhaul Internet connectivity provided by...

    Provided By Islamic Azad University

  • White Papers // May 2012

    Cloud Computing Vs. Grid Computing

    Cloud computing emerges as one of the hottest topic in field of information technology. Cloud computing is based on several other computing research areas such as HPC, virtualization, utility computing and grid computing. In order to make clear the essential of cloud computing, the authors propose the characteristics of this...

    Provided By Islamic Azad University

  • White Papers // Apr 2012

    An Approximation Algorithm for Clarity Edge Covering Problem

    Clarity edge covering problem is a version of art gallery problem. In this problem the goal is finding the minimum number of guards which covers all edges. Here, meaning of visibility is different from art gallery problem and it is restricted. In this paper, a logarithmic approximation algorithm is presented...

    Provided By Islamic Azad University

  • White Papers // Apr 2012

    Face Recognition Using Co-Occurrence Matrix of Local Average Binary Pattern (CMLABP)

    The Local Binary Pattern (LBP) operator has been proved to be effective for image representation, but it is too local to be strength. In this paper, the authors propose Co-occurrence Matrix of Local Average Binary Pattern operator (CMLABP), and apply it to face recognition. In the method, calculation is performed...

    Provided By Islamic Azad University

  • White Papers // Apr 2012

    Synthetic Feature Transformation with RBF Neural Network to Improve the Intrusion Detection System Accuracy and Decrease Computational Costs

    With the rapidly growing and wide spread use of computer networks, the number of new attacks and malicious has grown widely. Intrusion Detection System can identify the attacks and protect the systems successfully. However, performance of IDS related to feature extraction and selection phases. In this paper, the authors proposed...

    Provided By Islamic Azad University

  • White Papers // Apr 2012

    Security Constraint Unit Commitment Considering Line and Unit Contingencies-Particle Swarm Optimization

    In this paper, the author presents a new approach for considering all possible contingencies in short-term power system operation. Based on this new approach, both generator and transmission line outages would be modeled in network-based power system analysis. Multi generator and also parallel transmission lines is modeled in this methodology....

    Provided By Islamic Azad University

  • White Papers // Mar 2012

    Simulated Annealing Algorithm for Data Aggregation Trees in Wireless Sensor Networks

    Wireless sensor networks look like mobile ad hoc networks based on many aspects, but protocols which are used for ad hoc networks, are not suitable for wireless sensor networks. In ad hoc networks, the main issue about designing of protocols is quality of service, so that in wireless sensor networks...

    Provided By Islamic Azad University

  • White Papers // Mar 2012

    Offline Signature Recognition Using Radon Transform

    In this paper, a new offline signature recognition system based on Radon Transform, Fractal Dimension (FD) and Support Vector Machine (SVM) is presented. In the first step, projections of original signatures along four specified directions have been performed using radon transform. Then, FDs of four obtained vectors are calculated to...

    Provided By Islamic Azad University

  • White Papers // Mar 2012

    The Role of Factors Among Organization in Organizational Readiness of Small and Medium Companies for Acceptance of E-Commerce

    The use of e-commerce companies is the requirements of associated with organizations in developing of global trade. Small and Medium sized Enterprises (SME) through the use of this possibility can be covered their weaknesses and placed in the international trade. Readiness of small and medium enterprises and in particular small...

    Provided By Islamic Azad University

  • White Papers // Mar 2012

    An Innovative View to Cultural Infrastructures of Investment

    Investment is a complex phenomenon and process; investment pursues the goal of benefitting from its spiritual and economic advantages. Therefore, the required infrastructures for attracting investments are not only limited to economical aspects because enforcement of laws and regulations does not solely suffice to attract investments. Innovation in the cultural...

    Provided By Islamic Azad University

  • White Papers // Feb 2012

    Solving Connected Dominating Set Problem in Unit Disk Graphs by Genetic Algorithms

    In this paper, the authors use Genetic Algorithms to find the Minimum Connected Dominating Set (MCDS) of Unit Disk Graphs (UDG). UDGs are used for modeling ad-hoc networks and finding MCDS in such graphs is a promising approach to construct an efficient virtual backbone in wireless ad-hoc networks. The MCDS...

    Provided By Islamic Azad University

  • White Papers // Feb 2012

    Simulated Annealing Algorithm for Data Aggregation Trees in Wireless Sensor Networks and Comparison with Genetic Algorithm

    In ad hoc networks, the main issue about designing of protocols is quality of service, so that in wireless sensor networks the main constraint in designing protocols is limited energy of sensors. In fact, protocols which minimize the power consumption in sensors are more considered in wireless sensor networks. One...

    Provided By Islamic Azad University

  • White Papers // Feb 2012

    An Approach for Agile SoA Development Using Agile Principals

    In dynamic and turbulent business environment, the need for success and survival of any organization is the ability of adapting to changes efficiently and cost-effectively. So, for developing software applications, one of the methods is Service Oriented Architecture (SOA) methodology and other is Agile Methodology. Since embracing changes is the...

    Provided By Islamic Azad University

  • White Papers // Feb 2012

    Providing a Model for Predicting Tour Sale in Mobile e-Tourism Recommender Systems

    In this paper, a new model is proposed for tourism recommender systems. This model recommends tours to tourists using data-mining techniques such as clustering and association rules. According to the proposed model, tourists are initially clustered. Self Organize Map (SOM) algorithm is used for determining the number of clusters and...

    Provided By Islamic Azad University

  • White Papers // Jan 2012

    A New Protocol for Concealed Data Aggregation in Wireless Sensor Networks

    Wireless Sensor Networks (WSN) consists of many sensor nodes that are placed on unattended environments such as military sites in order to collect important information. Implementing a secure protocol that can prevent forwarding forged data and modifying content of aggregated data and has low delay and overhead of communication, computing...

    Provided By Islamic Azad University

  • White Papers // Jan 2012

    Improving Survivability in Wireless Ad Hoc Network

    Topological changes in mobile ad hoc networks frequently render routing paths unusable. Such recurrent path failures have detrimental effects on quality of service. A suitable technique for eliminating this problem is to use multiple backup paths between the source and the destination in the network. This paper proposes an effective...

    Provided By Islamic Azad University

  • White Papers // Jan 2012

    The New Method of Concealed Data Aggregation in Wireless Sensor: A Case Study

    Wireless Sensor Networks (WSN) consists of many sensor nodes that are placed on unattended environments such as military sites in order to collect important information. Implementing a secure protocol that can prevent forwarding forged data and modifying content of aggregated data and has low delay and overhead of communication, computing...

    Provided By Islamic Azad University

  • White Papers // Dec 2011

    A New Algorithm for Query Processing in Wireless Sensor Networks

    A Wireless Sensor Network (WSN) is a wireless network having distributed self-organized autonomous devices employing sensors to monitor environmental conditions like temperature, humidity, pressure, movement, etc. Dense deployment of disposable and low-cost sensor nodes makes WSN concept beneficial for battle-fields. Tiny sizes and light weight structure of these (WSN) nodes...

    Provided By Islamic Azad University

  • White Papers // Dec 2011

    A Novel Virtual Machine Placement in Cloud Computing

    In this paper a novel virtual machine placement mechanism for cloud computing is proposed based on network-aware Virtual Machines (VMs). VMs are widely applied to modern data center for cloud computing as a key technology to realize energy-efficient operation of servers. In such a scenario, applications and data thereof can...

    Provided By Islamic Azad University

  • White Papers // Dec 2011

    A Learning Automata Based and Multicast Routing Energy Efficiency Algorithm Using Minimum Spanning Tree for Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) include a lot of small sensor nodes with limited energy. Multi-cast routing in wireless sensor networks is an appropriate method for sending a same data to several different receivers in the network. In this paper, A multi-cast routing algorithm based on learning automata is presented for...

    Provided By Islamic Azad University

  • White Papers // Dec 2011

    A Novel Virtual Machine Placement in Cloud Computing

    In this paper a novel virtual machine placement mechanism for cloud computing is proposed based on network-aware Virtual Machines (VMs). VMs are widely applied to modern data center for cloud computing as a key technology to realize energy-efficient operation of servers. In such a scenario, applications and data thereof can...

    Provided By Islamic Azad University

  • White Papers // Nov 2011

    Efficient Detection of Sybil Attack Based on Cryptography in VANET

    Vehicular communications play a substantial role in providing safety transportation by means of safety message exchange. Researchers have proposed several solutions for securing safety messages. Protocols based on a fixed key infrastructure are more efficient in implementation and maintain stronger security in comparison with dynamic structures. The purpose of this...

    Provided By Islamic Azad University

  • White Papers // Sep 2011

    Multiple Ant-Bee Colony Optimization for Load Balancing in Packet-Switched Networks

    One of the important issues in computer networks is "Load Balancing" which leads to efficient use of the network resources. To achieve a balanced network it is necessary to find different routes between the source and destination. In the current paper, the authors propose a new approach to find different...

    Provided By Islamic Azad University

  • White Papers // Dec 2010

    A Positioning Method in Wireless Sensor Networks Using Genetic Algorithms

    The recent area of Wireless Sensor Networks (WSNs) has brought new challenges to developers of network protocols. Energy consumption and network coverage are two important challenges in wireless sensor networks. The authors investigate intelligent techniques for node positioning to reduce energy consumption with coverage preserved in wireless sensor network. A...

    Provided By Islamic Azad University

  • White Papers // Oct 2011

    Smart Card Security; Technology and Adoption

    Newly, smart card technology are being used in a number of ways around the world, on the other hand, security has become significant in information technology, especially in those application involving data sharing and transactions through the internet. Furthermore, researches in information technology acceptance have identified the security as one...

    Provided By Islamic Azad University

  • White Papers // Jan 2012

    The New Method of Concealed Data Aggregation in Wireless Sensor: A Case Study

    Wireless Sensor Networks (WSN) consists of many sensor nodes that are placed on unattended environments such as military sites in order to collect important information. Implementing a secure protocol that can prevent forwarding forged data and modifying content of aggregated data and has low delay and overhead of communication, computing...

    Provided By Islamic Azad University

  • White Papers // Jan 2012

    A New Protocol for Concealed Data Aggregation in Wireless Sensor Networks

    Wireless Sensor Networks (WSN) consists of many sensor nodes that are placed on unattended environments such as military sites in order to collect important information. Implementing a secure protocol that can prevent forwarding forged data and modifying content of aggregated data and has low delay and overhead of communication, computing...

    Provided By Islamic Azad University

  • White Papers // Jan 2012

    Improving Survivability in Wireless Ad Hoc Network

    Topological changes in mobile ad hoc networks frequently render routing paths unusable. Such recurrent path failures have detrimental effects on quality of service. A suitable technique for eliminating this problem is to use multiple backup paths between the source and the destination in the network. This paper proposes an effective...

    Provided By Islamic Azad University

  • White Papers // Mar 2012

    Offline Signature Recognition Using Radon Transform

    In this paper, a new offline signature recognition system based on Radon Transform, Fractal Dimension (FD) and Support Vector Machine (SVM) is presented. In the first step, projections of original signatures along four specified directions have been performed using radon transform. Then, FDs of four obtained vectors are calculated to...

    Provided By Islamic Azad University

  • White Papers // Feb 2012

    Providing a Model for Predicting Tour Sale in Mobile e-Tourism Recommender Systems

    In this paper, a new model is proposed for tourism recommender systems. This model recommends tours to tourists using data-mining techniques such as clustering and association rules. According to the proposed model, tourists are initially clustered. Self Organize Map (SOM) algorithm is used for determining the number of clusters and...

    Provided By Islamic Azad University

  • White Papers // Jun 2011

    Role Allocation and Scheme in Software Engineering Course Projects

    Role is a set of behavioural actions and responsibilities one takes in a specific situation. The people play different roles with their family, at work as well as in other environments. Differences among the role definitions reach mainly from the different emphasis of the software development method itself. Agile software...

    Provided By Islamic Azad University

  • White Papers // Dec 2011

    A New Algorithm for Query Processing in Wireless Sensor Networks

    A Wireless Sensor Network (WSN) is a wireless network having distributed self-organized autonomous devices employing sensors to monitor environmental conditions like temperature, humidity, pressure, movement, etc. Dense deployment of disposable and low-cost sensor nodes makes WSN concept beneficial for battle-fields. Tiny sizes and light weight structure of these (WSN) nodes...

    Provided By Islamic Azad University

  • White Papers // May 2012

    LAMR: Learning Automata Based Multicast Routing Protocol for Multi-Channel Multi-Radio Wireless Mesh Networks

    Multicast routing is a crucial issue in wireless networks in which the same content should be delivered to a group of recipients simultaneously. Multicast is also considered as a key service for audio and video applications as well as data dissemination protocols over the last-mile backhaul Internet connectivity provided by...

    Provided By Islamic Azad University

  • White Papers // May 2011

    LLACA: An Adaptive Localized Clustering Algorithm for Wireless Ad Hoc Networks

    Performance of ad hoc networks dramatically declines as network grows. Cluster formation in which the network hosts are hierarchically partitioned into several autonomous non-overlapping groups, based on proximity, is a promising approach to alleviate the scalability problem of ad hoc networks. In this paper, the authors propose a localized learning...

    Provided By Islamic Azad University

  • White Papers // Mar 2011

    A Link Stability-Based Multicast Routing Protocol for Wireless Mobile Ad Hoc Networks

    Recently, several studies have been conducted to design mobility-based multicast routing protocols for wireless Mobile Ad hoc NETworks (MANET). These protocols assume that the mobility parameters of the network are fixed, and so they cannot perform well under real MANET scenarios in which the mobility parameters of the hosts vary...

    Provided By Islamic Azad University

  • White Papers // Feb 2011

    A Mobility-Based Cluster Formation Algorithm for Wireless Mobile Adhoc Networks

    In the last decade, numerous efforts have been devoted to design efficient algorithms for clustering the wireless Mobile Ad-hoc NETworks (MANET) considering the network mobility characteristics. However, in existing algorithms, it is assumed that the mobility parameters of the networks are fixed, while they are stochastic and vary with time...

    Provided By Islamic Azad University

  • White Papers // Apr 2011

    An Analytical Framework for Data Stream Mining Techniques Based on Challenges and Requirements

    A growing number of applications that generate massive streams of data need intelligent data processing and online analysis. Real-time surveillance systems, telecommunication systems, sensor networks and other dynamic environments are such examples. The imminent need for turning such data into useful information and knowledge augments the development of systems, algorithms...

    Provided By Islamic Azad University

  • White Papers // Feb 2011

    Classification and Evaluation the Privacy Preserving Data Mining Techniques by Using a Data Modification-Based Framework

    In recent years, the data mining techniques have met a serious challenge due to the increased concerning and worries of the privacy, that is, protecting the privacy of the critical and sensitive data. Different techniques and algorithms have been already presented for Privacy Preserving data mining, which could be classified...

    Provided By Islamic Azad University

  • White Papers // Nov 2012

    A Survey of Service Oriented Architecture Systems Testing

    Service Oriented Architecture (SOA) is one of the latest software architectures. This architecture is created in direction of the business requirements and removed the gap between software and businesses. The software testing is the rising cost of activities in development software. SOA has different specifications and features proportion of the...

    Provided By Islamic Azad University

  • White Papers // May 2008

    LCS Based Classification Algorithm for Online Prediction in WUM Recommendation System

    Web usage mining is widely applied in various areas and online recommendation is one web usage mining application. WUM can model user behavior and, therefore, to forecast their future movements. In this paper, to provide online prediction efficiently, the authors advance an architecture for online predicting in web usage mining...

    Provided By Islamic Azad University

  • White Papers // Jul 2009

    Energy and Distance Based Clustering: An Energy Efficient Clustering Method for Wireless Sensor Networks

    In this paper, the authors propose an energy efficient cluster based communication protocol for wireless sensor network. The protocol considers both the residual energy of sensor nodes and the distance of each node from the BS when selecting cluster-head. This protocol can successfully prolong the network's lifetime by reducing the...

    Provided By Islamic Azad University

  • White Papers // Mar 2011

    Performance of QoS Parameters in MANET Application Traffics in Large Scale Scenarios

    A mobile ad-hoc network consists of wireless nodes communicating without the need for a centralized administration. A user can move any time in an ad hoc scenario and, as a result, such a network needs to have routing protocols which can adopt dynamically changing topology. To accomplish this, a number...

    Provided By Islamic Azad University

  • White Papers // Feb 2011

    Tunable Active Dual-Band Bandpass Filter Design Using MMIC Technology

    The inductor-less designing of monolithic tunable active dual-band bandpass filter is presented in this paper. Biasing voltages signify main role. The authors can control the center frequency and quality factor. Using four biasing voltages and cascading two similar filters lead to dual-band bandpass filter. By keeping the gain constant, the...

    Provided By Islamic Azad University

  • White Papers // Feb 2010

    CPW Fed Double T-Shaped Array Antenna With Suppressed Mutual Coupling

    A compact CPW-fed double T-Shaped antenna is proposed for dual-band Wireless Local Area Network (WLAN) operations. For the proposed antenna, the -10 dB return loss bandwidth could reach about 25.5% for the 2.4 GHz band and 5.7 % for the 5 GHz band, which meet the required bandwidth specification of...

    Provided By Islamic Azad University

  • White Papers // Mar 2011

    A High Performance Scalable QoS Routing Protocol for Mobile Ad Hoc Networks

    A Mobile Ad hoc NETwork (MANET) consists of a set of mobile hosts capable that form a temporary network on the fly without using any fixed infrastructure. The nodes operate both as hosts and routers. Due to mobility of nodes, the topology of the network may change rapidly and unexpectedly,...

    Provided By Islamic Azad University

  • White Papers // Jan 2011

    Intellectual Capital & Return On Investment: Case Study: Iranian Stock Exchange

    All organizations are alive in accordance with knowledge in any economies based upon it as well. In such cases, the most successful organizations are able to have better and quicker benefits from knowledge as a real investment. Roos et. al discuss that Intellectual capital from the strategic point of view...

    Provided By Islamic Azad University

  • White Papers // Mar 2011

    Survey of Fault Recovery in Wireless Sensor Networks

    In the past few years wireless sensor networks have received a greater interest in application such as disaster management, border protection, combat field reconnaissance, and security surveillance. Sensor nodes are expected to operate autonomously in unattended environments and potentially in large numbers. Failures are inevitable in wireless sensor networks due...

    Provided By Islamic Azad University

  • White Papers // Feb 2010

    The Effects Of Oil Price Shocks On Monetary Policy In Iran

    Changes and increases in the price of oil are effective on the aggregate economic. So, it's important to study on oil price shocks, because they affect on economic growth& monetary policy. In this paper, a structural and generalized VAR modeless has been considered for Iran in order to study the...

    Provided By Islamic Azad University

  • White Papers // May 2011

    NISR: A Nature Inspired Scalable Routing Protocol for Mobile Ad Hoc Networks

    Mobile Ad hoc NETworks (MANETs) are multi-hop wireless networks consisting of radio-equipped nodes that are mobile. The topology of a mobile ad hoc network changes frequently and this dynamic topology makes it difficult to design an efficient routing protocol. Number of nodes in a MANET can be varied from a...

    Provided By Islamic Azad University

  • White Papers // Apr 2012

    An Approximation Algorithm for Clarity Edge Covering Problem

    Clarity edge covering problem is a version of art gallery problem. In this problem the goal is finding the minimum number of guards which covers all edges. Here, meaning of visibility is different from art gallery problem and it is restricted. In this paper, a logarithmic approximation algorithm is presented...

    Provided By Islamic Azad University

  • White Papers // Apr 2012

    Face Recognition Using Co-Occurrence Matrix of Local Average Binary Pattern (CMLABP)

    The Local Binary Pattern (LBP) operator has been proved to be effective for image representation, but it is too local to be strength. In this paper, the authors propose Co-occurrence Matrix of Local Average Binary Pattern operator (CMLABP), and apply it to face recognition. In the method, calculation is performed...

    Provided By Islamic Azad University

  • White Papers // Jun 2012

    A Proposed Fuzzy Method to Detect Faulty Nodes in Wireless Sensor Network Clustering Structure

    Wireless Sensor Networks (WSN) consist of hundreds or thousands tiny nodes called sensor that work together and are connected to each other in order to do some special tasks. Because of limited nodes energy supply, clustering structure is introduced to reduce energy consumption in WSN. Due to specific features of...

    Provided By Islamic Azad University

  • White Papers // Mar 2011

    Integration of Information Systems Using Model Driven Architecture (MDA)

    No doubt there are difficult problems before IT managers and software development pioneers. These problems are the main challenge for the dutifulness of today modern organizations. Developing Information system requires accurate and tiring work. It should be done by very experienced programmers and needs spending a lot of many on...

    Provided By Islamic Azad University

  • White Papers // Apr 2011

    A Scheduling Algorithm for Increasing the Quality of the Distributed Systems by Using Genetic Algorithm

    This paper will present a scheduling algorithm for increasing the quality of the distributed system by using genetic algorithm. The proposed algorithm OQSG is more efficient in comparison with the previous algorithms. This proposed algorithm can be reliable like the other algorithms, regarding the effective parameters used for the available...

    Provided By Islamic Azad University

  • White Papers // Oct 2012

    A Novel Evolutionary-Fuzzy System for Function Approximation and Comparison the Robust of Used Evolutionary Algorithms

    Despite the previous successful history of fuzzy systems, the lack of learning capabilities characterizing most of the works generated a certain interest to design a fuzzy rule base with added learning capabilities. Evolutionary Algorithms (EAs) have inspired new design for fuzzy systems with added learning authorities. The purpose of the...

    Provided By Islamic Azad University

  • White Papers // Apr 2011

    A Novel Hybrid GA-ABC Based Energy Efficient Clustering in Wireless Sensor Network

    Extending the lifetime of wireless sensor networks remains in the center of attention when talking about wireless sensor network issues. As lifetime is directly dependent upon the energy supplies of the nodes, optimization of node energy consumption is a robust approach to contribute to the overall network lifetime. Network clustering...

    Provided By Islamic Azad University

  • White Papers // Oct 2012

    Automatic Software Test Case Generation: An Analytical Classification Framework

    A challenging part of software testing entails the generation of test cases. A good test case should have the quality to cover more features of test objective. The techniques for automatic generation of test cases try to efficiently find a small set of cases that allow an adequacy criterion to...

    Provided By Islamic Azad University

  • White Papers // Oct 2012

    A Comparative Study on Seven Static Mapping Heuristics for Grid Scheduling Problem

    Grid computing is a promising technology for future computing platforms and is expected to provide easier access to remote computational resources that are usually locally limited. Scheduling is one of the core steps to efficiently exploit the capabilities of Grid Computing (GC) systems. The problem of optimally mapping (defined as...

    Provided By Islamic Azad University

  • White Papers // Sep 2012

    Taxonomy of the Security Aspects of Cloud Computing Systems-A Survey

    Cloud computing is a model of both service delivery and consumption for increasing the capabilities of enterprises dynamically without investing in new infrastructure, training new personnel, or licensing new software. It refers to everything delivered as services over the Internet. Although the benefits of Cloud Computing are evident, security is...

    Provided By Islamic Azad University

  • White Papers // Jan 2011

    A Mathematical Formulation for Joint Channel Assignment and Multicast Routing in Multi-Channel Multi-Radio Wireless Mesh Networks

    Multicast routing is generally an efficient mechanism for delivering identical content to a group of receivers. Multicast is also deemed a key enabling service for a wealth of audio and video applications as well as data dissemination protocols over the last-mile backhaul Internet connectivity provided by Multi-Channel Multi-Radio Wireless Mesh...

    Provided By Islamic Azad University