Islamic Azad University

Displaying 41-80 of 216 results

  • White Papers // Oct 2012

    Achieving the Benefits of Agility in Software Architecture-XP

    One challenge of XP agile method in software development is this method's underestimation over software quality attribution; these attributes are of main indices of software architecture. In this study, a method is represented for responding this challenge on the bases of probability theory. In this method, firstly, the rating matrix...

    Provided By Islamic Azad University

  • White Papers // Oct 2012

    A Review of Workflow Scheduling in Cloud Computing Environment

    Cloud computing environments facilitate applications by providing virtualized resources that can be provisioned dynamically. The advent of Cloud computing as a new model of service provisioning in distributed systems, encourages researchers to investigate its benefits and drawbacks in executing scientific applications such as workflows. There are a mass of researches...

    Provided By Islamic Azad University

  • White Papers // Oct 2012

    A Novel Evolutionary-Fuzzy System for Function Approximation and Comparison the Robust of Used Evolutionary Algorithms

    Despite the previous successful history of fuzzy systems, the lack of learning capabilities characterizing most of the works generated a certain interest to design a fuzzy rule base with added learning capabilities. Evolutionary Algorithms (EAs) have inspired new design for fuzzy systems with added learning authorities. The purpose of the...

    Provided By Islamic Azad University

  • White Papers // Oct 2012

    Automatic Software Test Case Generation: An Analytical Classification Framework

    A challenging part of software testing entails the generation of test cases. A good test case should have the quality to cover more features of test objective. The techniques for automatic generation of test cases try to efficiently find a small set of cases that allow an adequacy criterion to...

    Provided By Islamic Azad University

  • White Papers // Oct 2012

    A Comparative Study on Seven Static Mapping Heuristics for Grid Scheduling Problem

    Grid computing is a promising technology for future computing platforms and is expected to provide easier access to remote computational resources that are usually locally limited. Scheduling is one of the core steps to efficiently exploit the capabilities of Grid Computing (GC) systems. The problem of optimally mapping (defined as...

    Provided By Islamic Azad University

  • White Papers // Sep 2012

    Intelligent Intrusion Detection in Computer Networks Using Fuzzy Systems

    The Internet and computer networks are exposed to an increasing number of security threats. With new types of attacks appearing continually, developing flexible and adaptive security oriented approaches is a severe challenge. Intrusion detection is a significant focus of research in the security of computer systems and networks. The security...

    Provided By Islamic Azad University

  • White Papers // Sep 2012

    Taxonomy of the Security Aspects of Cloud Computing Systems-A Survey

    Cloud computing is a model of both service delivery and consumption for increasing the capabilities of enterprises dynamically without investing in new infrastructure, training new personnel, or licensing new software. It refers to everything delivered as services over the Internet. Although the benefits of Cloud Computing are evident, security is...

    Provided By Islamic Azad University

  • White Papers // Aug 2012

    A Novel Architecture for Antenna Arrangement in Wireless Cellular CDMA Systems

    Wise arrangement of antennas is critical in wireless cellular systems for both reduction of Co-Channel Interference (CCI) and increase the Quality of Service (QoS). In this paper, a novel architecture for antenna arrangement in CDMA wireless cellular systems is presented. In this architecture that the authors called microzone, every cell...

    Provided By Islamic Azad University

  • White Papers // Aug 2012

    Defense Against Syn-Flood Denial of Service Attacks Based on Learning Automata

    SYN-flooding attack uses the weakness available in TCP's three-way handshake process to keep it from handling legitimate requests. This attack causes the victim host to populate its backlog queue with forged TCP connections. In other words it increases Ploss (Probability of loss) and Pa (buffer occupancy Percentage of attack requests)...

    Provided By Islamic Azad University

  • White Papers // Aug 2012

    Business Modeling Based on Agents Systems Modules

    Agent design patterns form the new methodology used to improve the development of software agents. Agent design patterns can help capture solutions to common problems in the design agent. The forms are used in various systems such as knowledge management systems, real-time systems and network management. An agent design pattern...

    Provided By Islamic Azad University

  • White Papers // Aug 2012

    Federated Identification Architecture

    Service Oriented Architectures is a concept which exposes capabilities in distributed, domain-spanning environments as services. These modern systems have three characteristics: They are heterogeneous, distributed and loose Coupling. With increasing popularity of Service Oriented Architecture (SOA), this is no longer possible since interacting systems are generally not located within a...

    Provided By Islamic Azad University

  • White Papers // Jul 2012

    Trust in Electronic Commerce: A New Model for Building Online Trust in B2C

    The rapid growth in the electronic commerce over the internet has fuelled predictions and speculations about what makes a Business To Consumer (B2C) web site effective. Increasing use of the World Wide Web as a B2C commercial tool raises interest in understanding the key issues in building relationships with customers...

    Provided By Islamic Azad University

  • White Papers // Jul 2012

    The Effect of IT on Organizational Agility

    In the unpredictable and competitive world of today the organizations must have different competitive features to compete, otherwise they will move towards annihilation. One of these features that organizations need in turbulent environments is agility. Agility provides the organization with the possibility of quick response and compatibility with environment and...

    Provided By Islamic Azad University

  • White Papers // Jul 2012

    A Survey on the e-Government Business Model Regarding Value Creation Approach

    Internet development, business success, and internet affairs and on the other hand, increase in complexity of traditional governments processes, and costly affairs have hade governments move toward being an e-government. To this aim, application of business models can be a solution in order to implement a more successful e-government. Value...

    Provided By Islamic Azad University

  • White Papers // Jul 2012

    Efficient and Secure Web Services by Using Multi Agents

    Mobile agents are an excellent technology for implementing Web services. Within a set of federated Web services, mobile agents can reduce bandwidth requirements and mitigate the effects of high-latency network connections. This paper presents a model for implementing Web services with mobile agents where agents are free to move between...

    Provided By Islamic Azad University

  • White Papers // Jul 2012

    Study of Access Control Issue in Web Services

    Security is an important issue that must be well-defined in Service Oriented Architecture (SOA) environment, so that it could be used in implementing the web services. In this paper, the authors focus on one of the important aspects of SOA security, which is access control. They explain the security requirements...

    Provided By Islamic Azad University

  • White Papers // Jul 2012

    Toward Knowledge Management as a Service in Cloud-Based Environments

    As new technologies and paradigms emerge, businesses have to make new efforts to properly get aligned with them, especially in knowledge management area. Today the Cloud Computing paradigm is becoming more and more popular, due to the vast decrease in time, cost and effort for meeting software development needs. It...

    Provided By Islamic Azad University

  • White Papers // Jun 2012

    Exploring the Type of Relationship between Information Security Management and Organizational Culture

    Now-a-days, in information era, providing information assets security has become one of the major challenges in organizations. A culture conducive to information security practice is extremely important for organizations since information has to be critical assets in modern enterprises. Thus, for understanding and improving the organizational behavior with regard to...

    Provided By Islamic Azad University

  • White Papers // Jun 2012

    A New Sensor Data's Storage

    Sensor networks are a kind of ad hoc networks. Sensors enable machines to capture and observe characteristics of physical objects and features of natural incidents. Most of the current efforts on sensor networks are focused on networking and service development for various applications, but less on processing the emerging data....

    Provided By Islamic Azad University

  • White Papers // Jun 2012

    Reversible Circuit Optimization Using PSO Algorithm

    Reversible Circuits Synthesis and optimization is one of the main terms dealt with in this paper. The synthesis and optimization of circuits using PSO algorithm is investigated in this paper. In this paper, for the first time the reversible circuits are synthesized using PSO algorithms. At the time of circuit...

    Provided By Islamic Azad University

  • White Papers // Jun 2012

    A Proposed Fuzzy Method to Detect Faulty Nodes in Wireless Sensor Network Clustering Structure

    Wireless Sensor Networks (WSN) consist of hundreds or thousands tiny nodes called sensor that work together and are connected to each other in order to do some special tasks. Because of limited nodes energy supply, clustering structure is introduced to reduce energy consumption in WSN. Due to specific features of...

    Provided By Islamic Azad University

  • White Papers // May 2012

    LAMR: Learning Automata Based Multicast Routing Protocol for Multi-Channel Multi-Radio Wireless Mesh Networks

    Multicast routing is a crucial issue in wireless networks in which the same content should be delivered to a group of recipients simultaneously. Multicast is also considered as a key service for audio and video applications as well as data dissemination protocols over the last-mile backhaul Internet connectivity provided by...

    Provided By Islamic Azad University

  • White Papers // May 2012

    Cloud Computing Vs. Grid Computing

    Cloud computing emerges as one of the hottest topic in field of information technology. Cloud computing is based on several other computing research areas such as HPC, virtualization, utility computing and grid computing. In order to make clear the essential of cloud computing, the authors propose the characteristics of this...

    Provided By Islamic Azad University

  • White Papers // Apr 2012

    An Approximation Algorithm for Clarity Edge Covering Problem

    Clarity edge covering problem is a version of art gallery problem. In this problem the goal is finding the minimum number of guards which covers all edges. Here, meaning of visibility is different from art gallery problem and it is restricted. In this paper, a logarithmic approximation algorithm is presented...

    Provided By Islamic Azad University

  • White Papers // Apr 2012

    Synthetic Feature Transformation with RBF Neural Network to Improve the Intrusion Detection System Accuracy and Decrease Computational Costs

    With the rapidly growing and wide spread use of computer networks, the number of new attacks and malicious has grown widely. Intrusion Detection System can identify the attacks and protect the systems successfully. However, performance of IDS related to feature extraction and selection phases. In this paper, the authors proposed...

    Provided By Islamic Azad University

  • White Papers // Apr 2012

    Security Constraint Unit Commitment Considering Line and Unit Contingencies-Particle Swarm Optimization

    In this paper, the author presents a new approach for considering all possible contingencies in short-term power system operation. Based on this new approach, both generator and transmission line outages would be modeled in network-based power system analysis. Multi generator and also parallel transmission lines is modeled in this methodology....

    Provided By Islamic Azad University

  • White Papers // Apr 2012

    Face Recognition Using Co-Occurrence Matrix of Local Average Binary Pattern (CMLABP)

    The Local Binary Pattern (LBP) operator has been proved to be effective for image representation, but it is too local to be strength. In this paper, the authors propose Co-occurrence Matrix of Local Average Binary Pattern operator (CMLABP), and apply it to face recognition. In the method, calculation is performed...

    Provided By Islamic Azad University

  • White Papers // Mar 2012

    Simulated Annealing Algorithm for Data Aggregation Trees in Wireless Sensor Networks

    Wireless sensor networks look like mobile ad hoc networks based on many aspects, but protocols which are used for ad hoc networks, are not suitable for wireless sensor networks. In ad hoc networks, the main issue about designing of protocols is quality of service, so that in wireless sensor networks...

    Provided By Islamic Azad University

  • White Papers // Mar 2012

    Offline Signature Recognition Using Radon Transform

    In this paper, a new offline signature recognition system based on Radon Transform, Fractal Dimension (FD) and Support Vector Machine (SVM) is presented. In the first step, projections of original signatures along four specified directions have been performed using radon transform. Then, FDs of four obtained vectors are calculated to...

    Provided By Islamic Azad University

  • White Papers // Mar 2012

    An Innovative View to Cultural Infrastructures of Investment

    Investment is a complex phenomenon and process; investment pursues the goal of benefitting from its spiritual and economic advantages. Therefore, the required infrastructures for attracting investments are not only limited to economical aspects because enforcement of laws and regulations does not solely suffice to attract investments. Innovation in the cultural...

    Provided By Islamic Azad University

  • White Papers // Mar 2012

    The Role of Factors Among Organization in Organizational Readiness of Small and Medium Companies for Acceptance of E-Commerce

    The use of e-commerce companies is the requirements of associated with organizations in developing of global trade. Small and Medium sized Enterprises (SME) through the use of this possibility can be covered their weaknesses and placed in the international trade. Readiness of small and medium enterprises and in particular small...

    Provided By Islamic Azad University

  • White Papers // Feb 2012

    Solving Connected Dominating Set Problem in Unit Disk Graphs by Genetic Algorithms

    In this paper, the authors use Genetic Algorithms to find the Minimum Connected Dominating Set (MCDS) of Unit Disk Graphs (UDG). UDGs are used for modeling ad-hoc networks and finding MCDS in such graphs is a promising approach to construct an efficient virtual backbone in wireless ad-hoc networks. The MCDS...

    Provided By Islamic Azad University

  • White Papers // Feb 2012

    Simulated Annealing Algorithm for Data Aggregation Trees in Wireless Sensor Networks and Comparison with Genetic Algorithm

    In ad hoc networks, the main issue about designing of protocols is quality of service, so that in wireless sensor networks the main constraint in designing protocols is limited energy of sensors. In fact, protocols which minimize the power consumption in sensors are more considered in wireless sensor networks. One...

    Provided By Islamic Azad University

  • White Papers // Feb 2012

    An Approach for Agile SoA Development Using Agile Principals

    In dynamic and turbulent business environment, the need for success and survival of any organization is the ability of adapting to changes efficiently and cost-effectively. So, for developing software applications, one of the methods is Service Oriented Architecture (SOA) methodology and other is Agile Methodology. Since embracing changes is the...

    Provided By Islamic Azad University

  • White Papers // Feb 2012

    Providing a Model for Predicting Tour Sale in Mobile e-Tourism Recommender Systems

    In this paper, a new model is proposed for tourism recommender systems. This model recommends tours to tourists using data-mining techniques such as clustering and association rules. According to the proposed model, tourists are initially clustered. Self Organize Map (SOM) algorithm is used for determining the number of clusters and...

    Provided By Islamic Azad University

  • White Papers // Jan 2012

    A New Protocol for Concealed Data Aggregation in Wireless Sensor Networks

    Wireless Sensor Networks (WSN) consists of many sensor nodes that are placed on unattended environments such as military sites in order to collect important information. Implementing a secure protocol that can prevent forwarding forged data and modifying content of aggregated data and has low delay and overhead of communication, computing...

    Provided By Islamic Azad University

  • White Papers // Jan 2012

    Improving Survivability in Wireless Ad Hoc Network

    Topological changes in mobile ad hoc networks frequently render routing paths unusable. Such recurrent path failures have detrimental effects on quality of service. A suitable technique for eliminating this problem is to use multiple backup paths between the source and the destination in the network. This paper proposes an effective...

    Provided By Islamic Azad University

  • White Papers // Jan 2012

    The New Method of Concealed Data Aggregation in Wireless Sensor: A Case Study

    Wireless Sensor Networks (WSN) consists of many sensor nodes that are placed on unattended environments such as military sites in order to collect important information. Implementing a secure protocol that can prevent forwarding forged data and modifying content of aggregated data and has low delay and overhead of communication, computing...

    Provided By Islamic Azad University

  • White Papers // Dec 2011

    A New Algorithm for Query Processing in Wireless Sensor Networks

    A Wireless Sensor Network (WSN) is a wireless network having distributed self-organized autonomous devices employing sensors to monitor environmental conditions like temperature, humidity, pressure, movement, etc. Dense deployment of disposable and low-cost sensor nodes makes WSN concept beneficial for battle-fields. Tiny sizes and light weight structure of these (WSN) nodes...

    Provided By Islamic Azad University

  • White Papers // Dec 2011

    A Novel Virtual Machine Placement in Cloud Computing

    In this paper a novel virtual machine placement mechanism for cloud computing is proposed based on network-aware Virtual Machines (VMs). VMs are widely applied to modern data center for cloud computing as a key technology to realize energy-efficient operation of servers. In such a scenario, applications and data thereof can...

    Provided By Islamic Azad University

  • White Papers // May 2012

    Cloud Computing Vs. Grid Computing

    Cloud computing emerges as one of the hottest topic in field of information technology. Cloud computing is based on several other computing research areas such as HPC, virtualization, utility computing and grid computing. In order to make clear the essential of cloud computing, the authors propose the characteristics of this...

    Provided By Islamic Azad University

  • White Papers // Dec 2012

    Issues on Cloud Computing: A Systematic Review

    Cloud computing plays a vital role in todays distributed systems widely used by internet users. It provides a flexible and consistent environment in which the data, devices and services can be shared among end users in order to save the time and cost. The advanced computing is the most important...

    Provided By Islamic Azad University

  • White Papers // Jun 2009

    A New Source Code Auditing Algorithm for Detecting LFI and RFI in PHP Programs

    Static analysis of source code is used for auditing web applications to detect the vulnerabilities. In this paper, the authors propose a new algorithm to analyze the PHP source code for detecting LFI and RFI potential vulnerabilities. In the approach, the authors first define some patterns for finding some functions...

    Provided By Islamic Azad University

  • White Papers // Nov 2010

    Influence of Radio Frequency Identification Technology in Logistic, Inventory Control and Supply Chain Optimization

    The main aim of Supply Chain Management (SCM) is to produce, distribute, logistics and deliver goods and equipment in right location, right time, right amount to satisfy customers, with minimum time and cost waste. So implementing techniques that reduce project time and cost, and improve productivity and performance is very...

    Provided By Islamic Azad University

  • White Papers // Jun 2009

    A Low Power SRAM Base on Novel Word-Line Decoding

    This paper proposes a low power SRAM based on five transistor SRAM cell. Proposed SRAM uses novel word-line decoding such that, during read/write operation, only selected cell connected to bit-line whereas, in Conventional SRAM (CV-SRAM), all cells in selected row connected to their bit-lines, which in turn develops differential voltages...

    Provided By Islamic Azad University

  • White Papers // Jan 2010

    Design Modem Based on DSP Processor TMS for Power Line Carrier System

    One of the most important parts of the data transmission systems is processing of the signals. In the primary models of this system, all these processes were done in an analog format. Because of this, the volume and the price were high. But in this model of system, however, all...

    Provided By Islamic Azad University

  • White Papers // Nov 2010

    Reverse Link Performance of DS-CDMA Cellular Systems Through Closed-Loop Power Control and Beamforming in 2D Urban Environment

    The interference reduction capability of antenna arrays and the power control algorithms have been considered separately as means to decrease the interference in wireless communication networks. In this paper, the authors propose Smart Step closed-loop Power Control (SSPC) algorithm in Direct Sequence-Code Division Multiple Access (DS-CDMA) receivers in a 2D...

    Provided By Islamic Azad University

  • White Papers // Jan 2011

    DS-CDMA Cellular Systems Performance With Base Station Assignment, Power Control Error, and Beamforming Over Multipath Fading

    The interference reduction capability of antenna arrays, base station assignment and the power control algorithms have been considered separately as means to increase the capacity in wireless communication networks. In this paper, the authors propose Base Station Assignment method based on Minimizing the Transmitter Power (BSA-MTP) technique in a Direct...

    Provided By Islamic Azad University

  • White Papers // Jan 2011

    Comparative Evaluation of Data Stream Indexing Models

    In recent years, the management and processing of data streams has become a topic of active research in several fields of computer science such as, distributed systems, database systems, and data mining. A data stream can be thought of as a transient, continuously increasing sequence of data. In data streams'...

    Provided By Islamic Azad University

  • White Papers // Dec 2010

    DWDM Optical Supervisory Channel by Manchester Code on FPGA

    The next generation optical Wavelength Division Multiplex (WDM) network will transport a stupendous aggregate data rate that consists of all existing types of payload, synchronous and asynchronous, and all types of traffic, voice, video and internet. The Optical Supervisory Channel (OSC), which is an important section in every DWDM system,...

    Provided By Islamic Azad University

  • White Papers // Jun 2009

    A New Scheme for Improving the Quality of Service in Heterogeneous Wireless Network for Data Stream Sending

    In this paper, the authors first consider the quality of service problems in heterogeneous wireless networks for sending the video data, which their problem of being real-time is pronounced. At last, the authors present a method for ensuring the end-to-end quality of service at application layer level for adaptable sending...

    Provided By Islamic Azad University

  • White Papers // Jan 2011

    Practical Attacks on a RFID Authentication Protocol Conforming to EPC C-1 G-2 Standard

    Yeh et al. recently have proposed a mutual authentication protocol based on EPC Class-1 Gen.-2 standard. They have claimed that their protocol is secure against adversarial attacks and also provides forward secrecy. In this paper THE AUTHORS will show that the proposed protocol does not have proper security features. A...

    Provided By Islamic Azad University

  • White Papers // Jan 2011

    Cryptanalysis of Two Mutual Authentication Protocols for Low-Cost RFID

    Radio Frequency IDentification (RFID) is appearing as a favorite technology for automated identification, which can be widely applied to many applications such as e-passport, supply chain management and ticketing. However, researchers have found many security and privacy problems along RFID technology. In recent years, many researchers are interested in RFID...

    Provided By Islamic Azad University

  • White Papers // Sep 2010

    The Impact of Data Replication on Job Scheduling Performance in Hierarchical Data Grid

    In data-intensive applications data transfer is a primary cause of job execution delay. Data access time depends on bandwidth. The major bottleneck to supporting fast data access in Grids is the high latencies of Wide Area Networks and Internet. Effective scheduling can reduce the amount of data transferred across the...

    Provided By Islamic Azad University

  • White Papers // Mar 2011

    An Efficient Method Based on Genetic Algorithms to Solve Sensor Network Optimization Problem

    Minimization of the number of cluster heads in a wireless sensor network is a very important problem to reduce channel contention and to improve the efficiency of the algorithm when executed at the level of cluster-heads. In this paper, the authors propose an efficient method based on Genetic Algorithms (GAs)...

    Provided By Islamic Azad University

  • White Papers // Sep 2010

    HERF: A Hybrid Energy Efficient Routing Using a Fuzzy Method in Wireless Sensor Networks

    Wireless Sensor Network (WSN) is one of the major research areas in computer network field today. Data dissemination is an important task performed by wireless sensor networks. The routing algorithms of this network depend on a number of factors such as application areas, usage condition, power, aggregation parameters. With respect...

    Provided By Islamic Azad University

  • White Papers // Sep 2010

    Two Level Job Scheduling and Data Replication in Data Grid

    Data Grid environment is a geographically distributed that deal with date-intensive application in scientific and enterprise computing. In data-intensive applications data transfer is a primary cause of job execution delay. Data access time depends on bandwidth, especially when hierarchy of bandwidth appears in network. Effective job scheduling can reduce data...

    Provided By Islamic Azad University

  • White Papers // Mar 2011

    Fault Tolerance in Grid Using Ant Colony Optimization and Directed Acyclic Graph

    By day to day developing the grid systems, it is necessary to apply new methods for allocating the resources to achieving the high performance in heterogeneous computing environment. This paper aims to seeking for a new approach by which one can allocate the tasks using a modified version of Ant...

    Provided By Islamic Azad University

  • White Papers // Apr 2011

    SULMA: A Secure Ultra Light-Weight Mutual Authentication Protocol for Lowcost RFID Tags

    Radio Frequency IDentification (RFID) is an emerging technology. It is the next generation of an optical barcode with several major advantages over an optical barcode since a line of sight between the reader and the barcode is not needed, and several tags can be read simultaneously. RFID technology is rapidly...

    Provided By Islamic Azad University

  • White Papers // Apr 2011

    A Machine Learning Based Analytical Framework for Semantic Annotation Requirements

    The Semantic Web is an extension of the current web in which information is given well-defined meaning. The perspective of Semantic Web is to promote the quality and intelligence of the current web by changing its contents into machine understandable form. Therefore, semantic level information is one of the cornerstones...

    Provided By Islamic Azad University

  • White Papers // Feb 2011

    Analytical Classification of Multimedia Index Structures by Using a Partitioning Method-Based Framework

    Due to the advances in hardware technology and increase in production of multimedia data in many applications, during the last decades, multimedia databases have become increasingly important. Content-based multimedia retrieval is one of an important research area in the field of multimedia databases. Lots of research on this field has...

    Provided By Islamic Azad University

  • White Papers // Feb 2010

    Cluster-Based and Cellular Approach to Fault Detection and Recovery in Wireless Sensor Network

    In the past few years wireless sensor networks have received a greater interest in application such as disaster management, border protection, combat field reconnaissance, and security surveillance. Sensor nodes are expected to operate autonomously in unattended environments and potentially in large numbers. Failures are inevitable in wireless sensor networks due...

    Provided By Islamic Azad University

  • White Papers // Dec 2011

    The Impact of Information Technology Application on Supply Chain Performance

    Huge advances in information technology, has already taken place, the industry has developed both changes, including changes in the supply chain. A fast data transfer and information technology in supply chain resulting in increased cooperation between the supply chain and finally, increased efficiency throughout the supply chain. An effective supply...

    Provided By Islamic Azad University

  • White Papers // Jul 2012

    The Effect of IT on Organizational Agility

    In the unpredictable and competitive world of today the organizations must have different competitive features to compete, otherwise they will move towards annihilation. One of these features that organizations need in turbulent environments is agility. Agility provides the organization with the possibility of quick response and compatibility with environment and...

    Provided By Islamic Azad University

  • White Papers // Jul 2012

    A Survey on the e-Government Business Model Regarding Value Creation Approach

    Internet development, business success, and internet affairs and on the other hand, increase in complexity of traditional governments processes, and costly affairs have hade governments move toward being an e-government. To this aim, application of business models can be a solution in order to implement a more successful e-government. Value...

    Provided By Islamic Azad University

  • White Papers // Aug 2012

    Defense Against Syn-Flood Denial of Service Attacks Based on Learning Automata

    SYN-flooding attack uses the weakness available in TCP's three-way handshake process to keep it from handling legitimate requests. This attack causes the victim host to populate its backlog queue with forged TCP connections. In other words it increases Ploss (Probability of loss) and Pa (buffer occupancy Percentage of attack requests)...

    Provided By Islamic Azad University

  • White Papers // Sep 2012

    Intelligent Intrusion Detection in Computer Networks Using Fuzzy Systems

    The Internet and computer networks are exposed to an increasing number of security threats. With new types of attacks appearing continually, developing flexible and adaptive security oriented approaches is a severe challenge. Intrusion detection is a significant focus of research in the security of computer systems and networks. The security...

    Provided By Islamic Azad University

  • White Papers // Oct 2012

    Using Adaptive Neuro-Fuzzy Inference System in Alert Management of Intrusion Detection Systems

    By ever increase in using computer network and internet, using Intrusion Detection Systems (IDS) has been more important. Main problems of IDS are the number of generated alerts, alert failure as well as identifying the attack type of alerts. In this paper a system is proposed that uses Adaptive Neuro-Fuzzy...

    Provided By Islamic Azad University

  • White Papers // Oct 2013

    Modeling Kerberos Authentication Protocol Using Colored Petri Net

    Information security is essential in today's digital world and plays an important role in message exchanges and trading. Authentication protocols play an important role in information security. Kerberos is one of the famous and commonly used authentication protocols. These factors cause attention of many researchers for formal modeling and analyzing...

    Provided By Islamic Azad University

  • White Papers // Apr 2012

    Synthetic Feature Transformation with RBF Neural Network to Improve the Intrusion Detection System Accuracy and Decrease Computational Costs

    With the rapidly growing and wide spread use of computer networks, the number of new attacks and malicious has grown widely. Intrusion Detection System can identify the attacks and protect the systems successfully. However, performance of IDS related to feature extraction and selection phases. In this paper, the authors proposed...

    Provided By Islamic Azad University

  • White Papers // Mar 2012

    An Innovative View to Cultural Infrastructures of Investment

    Investment is a complex phenomenon and process; investment pursues the goal of benefitting from its spiritual and economic advantages. Therefore, the required infrastructures for attracting investments are not only limited to economical aspects because enforcement of laws and regulations does not solely suffice to attract investments. Innovation in the cultural...

    Provided By Islamic Azad University

  • White Papers // Apr 2012

    Security Constraint Unit Commitment Considering Line and Unit Contingencies-Particle Swarm Optimization

    In this paper, the author presents a new approach for considering all possible contingencies in short-term power system operation. Based on this new approach, both generator and transmission line outages would be modeled in network-based power system analysis. Multi generator and also parallel transmission lines is modeled in this methodology....

    Provided By Islamic Azad University

  • White Papers // Oct 2012

    Achieving the Benefits of Agility in Software Architecture-XP

    One challenge of XP agile method in software development is this method's underestimation over software quality attribution; these attributes are of main indices of software architecture. In this study, a method is represented for responding this challenge on the bases of probability theory. In this method, firstly, the rating matrix...

    Provided By Islamic Azad University

  • White Papers // Feb 2012

    An Approach for Agile SoA Development Using Agile Principals

    In dynamic and turbulent business environment, the need for success and survival of any organization is the ability of adapting to changes efficiently and cost-effectively. So, for developing software applications, one of the methods is Service Oriented Architecture (SOA) methodology and other is Agile Methodology. Since embracing changes is the...

    Provided By Islamic Azad University

  • White Papers // Aug 2012

    Federated Identification Architecture

    Service Oriented Architectures is a concept which exposes capabilities in distributed, domain-spanning environments as services. These modern systems have three characteristics: They are heterogeneous, distributed and loose Coupling. With increasing popularity of Service Oriented Architecture (SOA), this is no longer possible since interacting systems are generally not located within a...

    Provided By Islamic Azad University

  • White Papers // Jan 2013

    Noise Resistant Identification of Human Iris Patterns Using Fuzzy ARTMAP Neural Network

    A biometric system provides automatic identification of an individual based on unique features or characteristics possessed by that person. In this paper, the authors propose an efficient iris recognition system that employs circular Hough transform technique to localize the iris region in the eye image and cumulative sum based gray...

    Provided By Islamic Azad University

  • White Papers // Nov 2012

    Design a B2B Electronic Commerce System Through Social Networking

    Now-a-days E-commerce is one of the most important topics in the IT world. Advances in technology have led to intense competition among businesses. In this paper, the authors present the design of a B2B e-commerce system through social networking. The paper proposes a set of diagrams based on object orientation...

    Provided By Islamic Azad University

  • White Papers // Oct 2012

    A Review of Workflow Scheduling in Cloud Computing Environment

    Cloud computing environments facilitate applications by providing virtualized resources that can be provisioned dynamically. The advent of Cloud computing as a new model of service provisioning in distributed systems, encourages researchers to investigate its benefits and drawbacks in executing scientific applications such as workflows. There are a mass of researches...

    Provided By Islamic Azad University

  • White Papers // Nov 2010

    Optimizing the Data Search Results in Web Using Genetic Algorithm

    One of the most important problems of web data search is recombining words of query, because reformulation of query words plays an effective role in search engine results. Web users try to make queries using their experience. What matter here is to develop a method so that web users can...

    Provided By Islamic Azad University

  • White Papers // Jan 2013

    Minimize Energy Consumption and Improve the Lifetime of Heterogeneous Wireless Sensor Networks by Using Monkey Search Algorithm

    Heterogeneous wireless sensor networks consist of various types of sensor nodes with different sensing units. Energy consumption and life time are the most significant concerns in heterogeneous wireless sensor network so that improving the balance in energy consumption increases the network lifetime. In this paper, the evolutionary approach is introduced...

    Provided By Islamic Azad University