Islamic Azad University

Displaying 161-200 of 219 results

  • White Papers // Oct 2010

    Grid Resource Selection Optimization With Guarantee Quality of Service by Hybrid of Genetic and Simulated Annealing Algorithms

    When there are a lot of requests for resources in a grid system, it is essential to make a good planning and resources allocation to provide a suitable QOS. As different programs need different amounts of services based on their priorities, there are various methods to provide these requests by...

    Provided By Islamic Azad University

  • White Papers // Sep 2010

    A Systematic Method for Performance Analysis of SOA Applications

    The successful implementation of Service-Oriented Architecture (SOA) is not confined to Information Technology systems and required changes of the whole enterprise. In order to adapt IT and business, the enterprise requires adequate and measurable methods. The adoption of SOA creates new problem with regard to measuring and analysis the performance....

    Provided By Islamic Azad University

  • White Papers // Sep 2010

    Fault Tolerance Mobile Agent System Using Witness Agent in 2- Dimensional Mesh Network

    Mobile agents are computer programs that act autonomously on behalf of a user or its owner and travel through a network of heterogeneous machines. Fault tolerance is important in their itinerary. In this paper, existent methods of fault tolerance in mobile agents are described which they are considered in linear...

    Provided By Islamic Azad University

  • White Papers // Sep 2010

    The Impact of Data Replication on Job Scheduling Performance in Hierarchical Data Grid

    In data-intensive applications data transfer is a primary cause of job execution delay. Data access time depends on bandwidth. The major bottleneck to supporting fast data access in Grids is the high latencies of Wide Area Networks and Internet. Effective scheduling can reduce the amount of data transferred across the...

    Provided By Islamic Azad University

  • White Papers // Sep 2010

    HERF: A Hybrid Energy Efficient Routing Using a Fuzzy Method in Wireless Sensor Networks

    Wireless Sensor Network (WSN) is one of the major research areas in computer network field today. Data dissemination is an important task performed by wireless sensor networks. The routing algorithms of this network depend on a number of factors such as application areas, usage condition, power, aggregation parameters. With respect...

    Provided By Islamic Azad University

  • White Papers // Sep 2010

    Two Level Job Scheduling and Data Replication in Data Grid

    Data Grid environment is a geographically distributed that deal with date-intensive application in scientific and enterprise computing. In data-intensive applications data transfer is a primary cause of job execution delay. Data access time depends on bandwidth, especially when hierarchy of bandwidth appears in network. Effective job scheduling can reduce data...

    Provided By Islamic Azad University

  • White Papers // Aug 2010

    Proffering a Brand New Methodology for Resource Discovery and Pricing in Computational Grid Using Learning Automata

    Grid Computing is a parallel and distributed system that facilitates the virtualization of distributed computing and enables coordinating and sharing of computing and storage resources. Mechanism based on economic models is an effective approach to solve the problem of grid resources management. The essence of this problem is how to...

    Provided By Islamic Azad University

  • White Papers // Aug 2010

    Main Content Extraction from Detailed Web Pages

    A web page structure and layout varies depend on different content type it will represent or the tastes of designer styling its content. Thereby main content position or the main tag containing main content differs in variety of websites. Even there might be some content in page view that are...

    Provided By Islamic Azad University

  • White Papers // Jul 2010

    Business and Information Technology Alignment Through Business Service Orientation

    The alignment issue between business and information technology is one of the most mind boggling problems enterprises encounter in achieving an agile and dynamic business it is so important that has a direct effect on the overall performance of an enterprise, in enterprises that there is an alignment, they have...

    Provided By Islamic Azad University

  • White Papers // Jul 2010

    Novel Cluster Based Routing Protocol in Wireless Sensor Networks

    In this paper, the authors propose a novel Cluster Based Routing Protocol (CBRP) for prolong the sensor network lifetime. CBRP achieves a good performance in terms of lifetime by balancing the energy load among all the nodes. In this protocol first the authors Cluster the network by using new factors...

    Provided By Islamic Azad University

  • White Papers // Jun 2010

    Fuzzy Based Approach for Load Balanced Distributing Database on Sensor Network

    A wireless sensor network consists of tiny sensing devices, with limited energy and processing ability. Some time the authors have to distribute a database on sensor network, because of limited energy in sensors, load balanced distributing database can increase the lifetime of this networks. In this paper, they propose Fuzzy...

    Provided By Islamic Azad University

  • White Papers // May 2010

    Delay and Energy Consumption Analysis of Conventional SRAM

    The energy consumption and delay in read/write operation of conventional SRAM is investigated analytically as well as by simulation. Explicit analytical expressions for the energy consumption and delay in read and write operation as a function of device parameters and supply voltage are derived. The expressions are useful in predicting...

    Provided By Islamic Azad University

  • White Papers // May 2010

    A Review of Coverage and Routing for Wireless Sensor Networks

    The special constraints of sensor networks impose a number of technical challenges for employing them. This paper presents the issues and existing protocols in three areas: coverage and routing. The authors present two types of coverage problems: to determine the minimum number of sensor nodes that need to perform active...

    Provided By Islamic Azad University

  • White Papers // May 2010

    Multi Objective AODV Based On a Realistic Mobility Model

    Routing is one of the most important challenges in ad hoc network. Numerous algorithms have been presented and one of the most important of them is AODV. This algorithm like many other algorithm calculate optimum path while pays no attention to environment situations, mobility pattern and mobile nodes status. However,...

    Provided By Islamic Azad University

  • White Papers // Apr 2010

    Learning AutomataBased Algorithms for Finding Minimum Weakly Connected Dominating Set in Stochastic Graphs

    A Weakly Connected Dominating Set (WCDS) of graph G is a subset of G so that the vertex set of the given subset and all vertices with at least one endpoint in the subset induce a connected sub-graph of G. Finding the WCDS is a new promising approach for clustering...

    Provided By Islamic Azad University

  • White Papers // Apr 2010

    Analysis the Impact of Enterprise Resource Planning Systems on Organizational Effectiveness

    Enterprise Resource Planning (ERP) Systems exist to create effectiveness organizations but measurement of this is so difficult. Effectiveness is multi-concept. Three variables affect organizational effectiveness such as defined casual, intervening and end-result. In this paper at the first, the authors review measurement methods that have a full fitness with these...

    Provided By Islamic Azad University

  • White Papers // Mar 2010

    An Energy Efficient Coverage Method for Clustered Wireless Sensor Networks

    An important issue in WSN is the regional covering. A coverage algorithm should be able to solve this issue by considering the power consumption to improve the network lifetime. This requires employing the lowest number of sensors. A solution is just to turn on a subset of nodes. This subset...

    Provided By Islamic Azad University

  • White Papers // Feb 2010

    The Effects Of Oil Price Shocks On Monetary Policy In Iran

    Changes and increases in the price of oil are effective on the aggregate economic. So, it's important to study on oil price shocks, because they affect on economic growth& monetary policy. In this paper, a structural and generalized VAR modeless has been considered for Iran in order to study the...

    Provided By Islamic Azad University

  • White Papers // Feb 2010

    Weighted Steiner Connected Dominating Set and Its Application to Multicast Routing in Wireless MANETs

    In this paper, the authors first propose three centralized learning automata-based heuristic algorithms for approximating a near optimal solution to the minimum Weight Steiner Connected Dominating Set (WSCDS) problem. Finding the Steiner connected dominating set of the network graph is a promising approach for multicast routing in wireless ad-hoc networks....

    Provided By Islamic Azad University

  • White Papers // Feb 2010

    CPW Fed Double T-Shaped Array Antenna With Suppressed Mutual Coupling

    A compact CPW-fed double T-Shaped antenna is proposed for dual-band Wireless Local Area Network (WLAN) operations. For the proposed antenna, the -10 dB return loss bandwidth could reach about 25.5% for the 2.4 GHz band and 5.7 % for the 5 GHz band, which meet the required bandwidth specification of...

    Provided By Islamic Azad University

  • White Papers // Feb 2010

    Cluster-Based and Cellular Approach to Fault Detection and Recovery in Wireless Sensor Network

    In the past few years wireless sensor networks have received a greater interest in application such as disaster management, border protection, combat field reconnaissance, and security surveillance. Sensor nodes are expected to operate autonomously in unattended environments and potentially in large numbers. Failures are inevitable in wireless sensor networks due...

    Provided By Islamic Azad University

  • White Papers // Jan 2010

    Design Modem Based on DSP Processor TMS for Power Line Carrier System

    One of the most important parts of the data transmission systems is processing of the signals. In the primary models of this system, all these processes were done in an analog format. Because of this, the volume and the price were high. But in this model of system, however, all...

    Provided By Islamic Azad University

  • White Papers // Jan 2010

    Finding Sequential Patterns From Large Sequence Data

    Data mining is the task of discovering interesting patterns from large amounts of data. There are many data mining tasks, such as classification, clustering, association rule mining, and sequential pattern mining. Sequential pattern mining finds sets of data items that occur together frequently in some sequences. Sequential pattern mining, which...

    Provided By Islamic Azad University

  • White Papers // Dec 2009

    Modern Symmetric Cryptography Methodologies and Its Applications

    Nowadays, using cryptographic systems play an effective role in security and safety technologies. One of the most applied kind of cryptography is Symmetric Cryptography and its applications. New aspects of symmetric Cryptography methodologies and applications has been presented by this paper. Security-based networks and some complex technologies such as RFID...

    Provided By Islamic Azad University

  • White Papers // Dec 2009

    The Impact of Semantic Web on E-Commerce

    Semantic Web Technologies enable machines to interpret data published in a machine-interpretable form on the web. At the present time, only human beings are able to understand the product information published online. The emerging semantic Web technologies have the potential to deeply influence the further development of the Internet Economy....

    Provided By Islamic Azad University

  • White Papers // Dec 2009

    New Methods for E-Commerce Databases Designing in Semantic Web Systems (Modern Systems)

    The purpose of this paper is to study Database Models to use them efficiently in E-commerce websites. In this paper the authors are going to find a method which can save and retrieve information in Ecommerce websites. Thus, semantic web applications can work with, and they are also going to...

    Provided By Islamic Azad University

  • White Papers // Dec 2009

    Dynamic Alarm Correlation Based on Cellular Learning Automata in Telecommunication Networks

    Powerful fault management systems are increasingly required to ensure robustness and qualitative services. Though alarms are usually useful for identifying faults in such systems, huge numbers of alarms generated as a result of some major network event require efficient management methods and algorithms in order to discover the root cause...

    Provided By Islamic Azad University

  • White Papers // Dec 2009

    Equalization of Energy Consumption in Ad Hoc Networks Using Learning Automata

    One of the main constraints in mobile ad hoc networks is high probability of failure due to energy-exhausted nodes. So, if some nodes die early due to lack of energy, they cannot communicate with each other. Therefore, inordinate consumption of nodes' energy should be prevented. In fact, nodes energy consumption...

    Provided By Islamic Azad University

  • White Papers // Dec 2009

    Maximizing Network Lifetime for Multicast Communication in Mobile Ad Hoc Networks

    Energy consumption is a crucial design concern in wireless ad hoc networks since wireless nodes are typically battery-limited. Power failure of a mobile node not only affects the node itself but also its ability to forward packets on behalf of others and hence affects the overall network lifetime. To this...

    Provided By Islamic Azad University

  • White Papers // Nov 2009

    A Context-Based Trust Management Model for Pervasive Computing Systems

    Trust plays an important role in making collaborative decisions about service evaluation and service selection in pervasive computing. Context is a fundamental concept in pervasive systems, which is based on the interpretation of environment and systems. The dynamic nature of context can strongly affect trust management and service selection. In...

    Provided By Islamic Azad University

  • White Papers // Nov 2009

    Proposed Platform for Improving Grid Security by Trust Management System

    With increasing the applications of grid system, the risk in security field is enhancing too. Recently Trust management system has been recognized as a noticeable approach in enhancing of security in grid systems. In this paper due to improve the grid security a new trust management system with two levels...

    Provided By Islamic Azad University

  • White Papers // Oct 2009

    The European Stock Market Impulse To The U.S. Financial Crisis

    This study examines how the European stock market reacts to the US fundamentals including the Federal Fund Rate (FFR), the Euro-dollar exchange rate, and the US stock market indices. The results from Johansen and Juselius cointegration technique suggest that a long-term relationship exists between the European stock market, and the...

    Provided By Islamic Azad University

  • White Papers // Oct 2009

    An Intelligent Global Flooding Algorithm in Wireless Ad Hoc Networks Based on Distributed Learning Automata

    In wireless ad hoc networks, due to the dynamic topology changes, multi hop communications and strict resource limitations, routing becomes the most challenging issue, and broadcasting is a common approach which is used to alleviate the routing problem. Global flooding is a straightforward broadcasting method which is used in almost...

    Provided By Islamic Azad University

  • White Papers // Oct 2009

    DAMQ-Based Schemes for Efficiently Using the Buffer Spaces of a NoC Router

    In this paper the authors present high performance Dynamically Allocated Multi-Queue (DAMQ) buffer schemes for fault tolerance systems on chip applications that require an interconnection network. Two or four virtual channels shared the same buffer space. On the message switching layer, they make improvement to boost system performance when there...

    Provided By Islamic Azad University

  • White Papers // Sep 2009

    An Adaptive Cross-Layer Multichannel QoS-MAC Protocol for Cluster Based Wireless Multimedia Sensor Networks

    Rapid penetration of small customized wireless devices and enormous growth of wireless communication technologies has already set the stage for large-scale deployment of wireless sensor networks. Offering precise Quality of Service (QoS) for multimedia transmission over sensor networks has not received significant attention. However offering some better QoS for wireless...

    Provided By Islamic Azad University

  • White Papers // Jul 2009

    Energy and Distance Based Clustering: An Energy Efficient Clustering Method for Wireless Sensor Networks

    In this paper, the authors propose an energy efficient cluster based communication protocol for wireless sensor network. The protocol considers both the residual energy of sensor nodes and the distance of each node from the BS when selecting cluster-head. This protocol can successfully prolong the network's lifetime by reducing the...

    Provided By Islamic Azad University

  • White Papers // Jul 2009

    PNR: New Position Based Routing Algorithm for Mobile Ad Hoc Networks

    An ad hoc network (MANET) has no fixed networking infrastructure, and consists of mobile nodes that communicate with each other. Since nodes are mobile, Routing in ad hoc network is a challenging task. Efficient routing protocols can make better performance in such networks. Many protocols have been proposed for ad...

    Provided By Islamic Azad University

  • White Papers // Jun 2009

    The European Stock Market Impulse To The US Financial Crisis

    This paper examines how the European stock market reacts to the U.S. financial crisis and the Fed's policy, changing FFR. Johansen and Juselius cointegration analysis suggests that markets are integrated and there exists a long term relationship between these markets. The Granger causality test indicates that causality runs from US...

    Provided By Islamic Azad University

  • White Papers // Jun 2009

    WBRR: A Weight Based Reliable Routing Method in Mobile Ad Hoc Network

    Mobile Ad Hoc Networks (MANET) consists of a set of mobile hosts that can communicate with each other without the assistance of base stations. MANETs are heterogeneous mix of different wireless and mobile devices, ranging from little hand-held devices to laptops. In MANETs, the high mobility of mobile nodes is...

    Provided By Islamic Azad University

  • White Papers // Jun 2009

    A New Approach for Mobile Agent Security

    A mobile agent is a software which performs an action autonomously and independently as a person or an organizations assistance. Mobile agents are used for searching information, retrieval information, filtering, intruder recognition in networks, and so on. One of the important issues of mobile agent is their security. It must...

    Provided By Islamic Azad University

  • White Papers // Feb 2013

    Energy Consumption Estimation in Clustered Wireless Sensor Networks Using M/M/1 Queuing Model

    Wireless Sensor Network (WSN), consists of a large number of sensor nodes. Each sensor node senses environmental phenomenon and sends the sensed data to a sink node. Since the sensor nodes are powered by limited power batteries. Energy efficiency is a major challenge in WSN applications. In this paper, the...

    Provided By Islamic Azad University

  • White Papers // Feb 2013

    Improving Energy Efficiency in MANETs by Multi-Path Routing

    Some multi-path routing algorithm in MANET, simultaneously send information to the destination through several directions to reduce end-to-end delay. In all these algorithms, the sent traffic through a path affects the adjacent path and unintentionally increases the delay due to the use of adjacent paths. Because, there are repetitive competitions...

    Provided By Islamic Azad University

  • White Papers // Mar 2013

    Evaluation of the Data Security Methods in Cloud Computing Environments

    Cloud computing is an expression which is used by IT server companies to exchange computing needs as an asymmetrical service of relation for the final receivers of these services. All the models of the cloud computing depend on the resource sharing on the network due to regarding access integrity economic...

    Provided By Islamic Azad University

  • White Papers // Aug 2012

    A Novel Architecture for Antenna Arrangement in Wireless Cellular CDMA Systems

    Wise arrangement of antennas is critical in wireless cellular systems for both reduction of Co-Channel Interference (CCI) and increase the Quality of Service (QoS). In this paper, a novel architecture for antenna arrangement in CDMA wireless cellular systems is presented. In this architecture that the authors called microzone, every cell...

    Provided By Islamic Azad University

  • White Papers // May 2011

    Global Grids and Cloud Toolkits

    In the past few years, many overlying concepts of distributed computing eminently cluster, grid and cloud computing have appeared. In recent years, extensive researches have been conducted in the area of simulation to model large complex systems and understand their behavior, especially in parallel and distributed systems. Distributed computing combines...

    Provided By Islamic Azad University

  • White Papers // Dec 2010

    Differentiated Services Fuzzy Assured Forward Queuing for Congestion Control in Intermediate Routers

    Today's, computer networks play a very important role in users' daily activities. In order to have a better network management, data packet problems, should be considerably reduced. One of the most important problems that happens in networks and is not recognizable easily, is congestion, That encouraged experts to research more...

    Provided By Islamic Azad University

  • White Papers // May 2011

    A Two-Stage Algorithm for Data Clustering

    Cluster analysis is an important and popular data analysis technique that is used in a large variety of fields. K-means is a well-known and widely used clustering technique due to its simplicity in implementation and high speed in most situations. However, it suffers from two major shortcomings: it is very...

    Provided By Islamic Azad University

  • White Papers // May 2011

    Feature Selection with Hybrid Mutual Information and Genetic Algorithm

    Feature selection plays an important role in data mining and pattern recognition, especially for large scale data. During past years, various metrics have been proposed to measure the relevance between different features. Mutual information is nonlinear and can effectively represent the dependencies of features. In this paper, the authors proposed...

    Provided By Islamic Azad University

  • White Papers // May 2012

    Cloud Computing Vs. Grid Computing

    Cloud computing emerges as one of the hottest topic in field of information technology. Cloud computing is based on several other computing research areas such as HPC, virtualization, utility computing and grid computing. In order to make clear the essential of cloud computing, the authors propose the characteristics of this...

    Provided By Islamic Azad University

  • White Papers // Dec 2012

    Issues on Cloud Computing: A Systematic Review

    Cloud computing plays a vital role in todays distributed systems widely used by internet users. It provides a flexible and consistent environment in which the data, devices and services can be shared among end users in order to save the time and cost. The advanced computing is the most important...

    Provided By Islamic Azad University

  • White Papers // Feb 2013

    Assessing Efficiency of ITIL Framework to Align Business And IT

    Ensuring that IT and business have a more mature alignment relationship is recognized as being critical to an organization's success. To achieve alignment leveraging, Information Technology Infrastructure Library (ITIL) is considered fundamental as a comprehensive approach to planning and managing IT actions within the organization, based on its business requirements....

    Provided By Islamic Azad University

  • White Papers // Dec 2011

    Organizational Customers Expectation in Business Plan Strategy

    With the rise in the standard of living, resulting from increased organizational productivity changes in the needs and demands of the population. House Of Quality (HOQ) has been widely used to translate customers' expectation to a Products & Services (P&S) technical attributes. Products & Services have emerged as the fastest...

    Provided By Islamic Azad University

  • White Papers // Oct 2013

    Modeling Kerberos Authentication Protocol Using Colored Petri Net

    Information security is essential in today's digital world and plays an important role in message exchanges and trading. Authentication protocols play an important role in information security. Kerberos is one of the famous and commonly used authentication protocols. These factors cause attention of many researchers for formal modeling and analyzing...

    Provided By Islamic Azad University

  • White Papers // Apr 2012

    Synthetic Feature Transformation with RBF Neural Network to Improve the Intrusion Detection System Accuracy and Decrease Computational Costs

    With the rapidly growing and wide spread use of computer networks, the number of new attacks and malicious has grown widely. Intrusion Detection System can identify the attacks and protect the systems successfully. However, performance of IDS related to feature extraction and selection phases. In this paper, the authors proposed...

    Provided By Islamic Azad University

  • White Papers // Mar 2012

    An Innovative View to Cultural Infrastructures of Investment

    Investment is a complex phenomenon and process; investment pursues the goal of benefitting from its spiritual and economic advantages. Therefore, the required infrastructures for attracting investments are not only limited to economical aspects because enforcement of laws and regulations does not solely suffice to attract investments. Innovation in the cultural...

    Provided By Islamic Azad University

  • White Papers // Jul 2012

    Toward Knowledge Management as a Service in Cloud-Based Environments

    As new technologies and paradigms emerge, businesses have to make new efforts to properly get aligned with them, especially in knowledge management area. Today the Cloud Computing paradigm is becoming more and more popular, due to the vast decrease in time, cost and effort for meeting software development needs. It...

    Provided By Islamic Azad University

  • White Papers // Jul 2011

    A Conceptual Model for Creating a Favorable Environment to Reduce the Production Time and Cost of Production by E-collaboration

    The companies need to the implementation the projects on time within budget for achievement the success and competitive in the market. The prior researcher illustrated many method and model for development time in new product. For this purpose, in this research the author created a new model and allegation the...

    Provided By Islamic Azad University

  • White Papers // Mar 2012

    The Role of Factors Among Organization in Organizational Readiness of Small and Medium Companies for Acceptance of E-Commerce

    The use of e-commerce companies is the requirements of associated with organizations in developing of global trade. Small and Medium sized Enterprises (SME) through the use of this possibility can be covered their weaknesses and placed in the international trade. Readiness of small and medium enterprises and in particular small...

    Provided By Islamic Azad University

  • White Papers // Oct 2011

    Effective Factors on Adoption of E-Commerce in SME Cooperative

    In this paper, the authors investigated factors influencing on the adoption of Electronic Commerce (EC) in Small and Medium sized Enterprises(SME), cooperatives in the city of Ardabil is trying by identifying factors influencing on the adoption of e-commerce provides One of the primary and basic steps to develop e-commerce companies....

    Provided By Islamic Azad University

  • White Papers // Jan 2013

    Entrepreneurship and Risk - Taking

    Risk - taking and Entrepreneurship are two associated words studying in the entrepreneurial literature. In the most definitions, entrepreneurs are associated with risk and risk - taking. One of the most important factors in the entrepreneurs+ success is their risk - taking .Entrepreneurs must be risk - taker to realize...

    Provided By Islamic Azad University

  • White Papers // Jul 2012

    Trust in Electronic Commerce: A New Model for Building Online Trust in B2C

    The rapid growth in the electronic commerce over the internet has fuelled predictions and speculations about what makes a Business To Consumer (B2C) web site effective. Increasing use of the World Wide Web as a B2C commercial tool raises interest in understanding the key issues in building relationships with customers...

    Provided By Islamic Azad University

  • White Papers // Dec 2012

    Cloud Computing as an Innovation in GIS & SDI: Methodologies, Services, Issues and Deployment Techniques

    Cloud computing is one of the main issues of interest to the scientific community of the spatial data. A cloud is referred to computing infrastructure for a representation of network. From the perspective of providers, the main characteristics of cloud computing is being dynamic, high power in computing and storage....

    Provided By Islamic Azad University

  • White Papers // Jan 2012

    A Comparative Study of Context Modeling Approches and Applying in an Infrustructure

    Context-awareness is a subset of the pervasive computing paradigm, whereas a well designed model is a key component to the context in any context-aware system. There is an inherent gap between the real-world and the world that can be perceived by computer systems, yielding uncertainty and ambiguity in system perceived...

    Provided By Islamic Azad University

  • White Papers // Jun 2012

    Exploring the Type of Relationship between Information Security Management and Organizational Culture

    Now-a-days, in information era, providing information assets security has become one of the major challenges in organizations. A culture conducive to information security practice is extremely important for organizations since information has to be critical assets in modern enterprises. Thus, for understanding and improving the organizational behavior with regard to...

    Provided By Islamic Azad University

  • White Papers // Dec 2012

    A Dynamic Approach for Honeypot Management

    Honeypot is a security device the value of which lies mainly in discovering and inspecting, being attacked and being at risk. Most of the present honeypots are configured and installed on the network statically. In some cases, considerations have been made on dynamic configuration of honeypots at the time of...

    Provided By Islamic Azad University

  • White Papers // Dec 2013

    A New Approach Towards Integrated Cloud Computing Architecture

    Today across various businesses, administrative and senior managers seeking for new technologies and approaches in which they can utilize it, more easy and affordable and thereby rise up their competitive profit and utility. Information Communications and Technology (ICT) is no exception from this principle. Cloud computing concept and technology and...

    Provided By Islamic Azad University

  • White Papers // May 2013

    Reputation-Based Clustering Algorithms in Mobile Ad Hoc Networks

    Clustering is one of the main techniques that are used to increase the scalability of MANETs, but without any security considerations clustering is prone to various security attacks. Some cryptographic-based schemes have been proposed to secure the clustering process, but they are unable to handle the internal attacks. Trust-based clustering...

    Provided By Islamic Azad University

  • White Papers // Nov 2013

    Secret Key Cryptosystem Based on Non-Systematic Polar Codes

    Polar codes are provably capacity achieving linear block codes. The generator matrix of these codes is specified by knowing the parameters of transmission channel, length and dimension of the used code. On the other hand, for the cryptosystems based on general decoding problem (i.e. code based cryptosystems), the generator matrix...

    Provided By Islamic Azad University

  • White Papers // May 2013

    Providing a Fault-Tolerant Algorithm for On-Chip Interconnection Networks

    As technology scales, fault tolerance has become a key concern in the on-chip communication. On-chip network reliability can be increased with the development of fault-tolerant routing algorithms. Distributed routing algorithms are a class of algorithms in which routing decisions, taken without the knowledge of total network status. Given the time...

    Provided By Islamic Azad University

  • White Papers // Jan 2014

    Enriched eTOM Framework in Service Deliver Operation through Alignment with some of COBIT5 Strategic Objectives

    In recent years, types of telecom services are expanding rapidly. On the other hand, present management Frameworks cannot cover and /or support them well. There are the place where few best known standards may be used for IT Service Management to enrich it, such as eTOM and COBIT5 (Control Objectives...

    Provided By Islamic Azad University

  • White Papers // Jul 2013

    Filtering Spam: Current Trends and Techniques

    In this paper, the authors give an overview about latest trend and techniques in spam filtering. They analyzed the problems which is introduced by spam, what spam actually do and how to measure the spam. This paper mainly focuses on automated, non-interactive filters, with a broad review ranging from commercial...

    Provided By Islamic Azad University

  • White Papers // Apr 2013

    Identification of Mazandaran Telecommunication Company Fixed phone subscribers using H-Means and W-K-Means Algorithm

    In recent years, companies' interaction with customers has changed significantly. Organizations require a proper understanding of customers and their needs in order to succeed in business. Customer Relationship Management (CRM) using data mining techniques, to discover hidden and valuable knowledge in data and information of organizations, provide the conditions for...

    Provided By Islamic Azad University

  • White Papers // Oct 2013

    An Efficient Method for Automatic Text Categorization

    Automatic text categorization refers to assigning uncategorized text documents to one or more predefined categories. Texts categorization generally divided into two main sections: feature selection and learning algorithm. For Feature selection and learning algorithms techniques, various methods have been proposed. The purpose of the proposed techniques, increasing the accuracy of...

    Provided By Islamic Azad University

  • White Papers // Jul 2013

    GPU Implementation of Real-Time Biologically Inspired Face Detection using CUDA

    In this paper, massively parallel real-time face detection based on a visual attention and cortex-like mechanism of cognitive vision system is presented. As a first step, the authors use saliency map model to select salient face regions and HMAX C1 model to extract features from salient input image and then...

    Provided By Islamic Azad University

  • White Papers // Jan 2014

    A Distributed Data Mining Architecture Based on Nonlinear Model

    Development of computer networks and distributed database technologies has encouraged distributed data storage and a new technical generation of distributed data mining. This field has a wide range of applications. The present paper deals with applying multi-agent technology in data mining. At first the authors talk about agent and data...

    Provided By Islamic Azad University

  • White Papers // Oct 2013

    Security and Fault Aware Scheduling in Computational Grid

    Grid computation is an issue that has received much attention from researchers in recent years. Its aim is to use the computational power of idle resources which have been distributed in different places and under different policies and security conditions. Therefore, one of the challenges facing this technology is the...

    Provided By Islamic Azad University

  • White Papers // Feb 2014

    Analyzing Access Control Models Dynamic Level and Security in Service - Oriented Architecture Environment

    Service-based architecture is the most recent generation of informational systems architecture; this architecture has been implemented through service web technology during the recent years. One of the important characteristics in this architecture is the existence of various users and subsystems and communication and cooperation among them to do actions. In...

    Provided By Islamic Azad University

  • White Papers // Sep 2012

    Intelligent Intrusion Detection in Computer Networks Using Fuzzy Systems

    The Internet and computer networks are exposed to an increasing number of security threats. With new types of attacks appearing continually, developing flexible and adaptive security oriented approaches is a severe challenge. Intrusion detection is a significant focus of research in the security of computer systems and networks. The security...

    Provided By Islamic Azad University

  • White Papers // Apr 2012

    Security Constraint Unit Commitment Considering Line and Unit Contingencies-Particle Swarm Optimization

    In this paper, the author presents a new approach for considering all possible contingencies in short-term power system operation. Based on this new approach, both generator and transmission line outages would be modeled in network-based power system analysis. Multi generator and also parallel transmission lines is modeled in this methodology....

    Provided By Islamic Azad University

  • White Papers // Oct 2012

    Using Adaptive Neuro-Fuzzy Inference System in Alert Management of Intrusion Detection Systems

    By ever increase in using computer network and internet, using Intrusion Detection Systems (IDS) has been more important. Main problems of IDS are the number of generated alerts, alert failure as well as identifying the attack type of alerts. In this paper a system is proposed that uses Adaptive Neuro-Fuzzy...

    Provided By Islamic Azad University