Islamic Azad University

Displaying 201-217 of 217 results

  • White Papers // Jun 2009

    Effect of Distributed Generators on the Optimal Operation of Distribution Networks

    This paper presents an approach for daily optimal operation of distribution networks considering Distributed Generators (DGs). Due to private ownership of DGs, a cost based compensation method is used to encourage DGs in active and reactive power generation. The objective function is summation of electrical energy generated by DGs and...

    Provided By Islamic Azad University

  • White Papers // Jun 2009

    Risk-Management by Numerical Pattern Analysis in Data-Mining

    In this paper a new method is suggested for risk management by the numerical patterns in data-mining. These patterns are designed using probability rules in decision trees and are cared to be valid, novel, useful and understandable. Considering a set of functions, the system reaches to a good pattern or...

    Provided By Islamic Azad University

  • White Papers // Jun 2009

    Using Degree of Adaptive (DOA) Model for Partner Selection in Supply Chain

    In order to reduce cost, increase quality, and for timely supply, production systems have considerably taken the advantages of supply chain management and these advantages are also competitive. Selection of appropriate supplier has an important role in improvement and efficiency of systems. The models of supplier selection which have already...

    Provided By Islamic Azad University

  • White Papers // Jun 2009

    Consideration a Novel Manner for Data Sending Quality in Heterogeneous Radio Networks

    In real-time networks a large number of application programs are relying on video data and heterogeneous data transmission techniques. The aim of this research is presenting a method for end-to-end vouch quality service in surface application-layer for sending video data in comparison form in wireless heterogeneous networks. This method tries...

    Provided By Islamic Azad University

  • White Papers // Jun 2009

    A Low Power SRAM Base on Novel Word-Line Decoding

    This paper proposes a low power SRAM based on five transistor SRAM cell. Proposed SRAM uses novel word-line decoding such that, during read/write operation, only selected cell connected to bit-line whereas, in Conventional SRAM (CV-SRAM), all cells in selected row connected to their bit-lines, which in turn develops differential voltages...

    Provided By Islamic Azad University

  • White Papers // Jun 2009

    Web Service Security Method to SOA Development

    Web services provide significant new benefits for SOA-based applications, but they also expose significant new security risks. There are huge number of WS security standards and processes. At present, there is still a lack of a comprehensive approach which offers a methodical development in the construction of secure WS-based SOA....

    Provided By Islamic Azad University

  • White Papers // Jun 2009

    Next Generation Networks and Their Relation With Ad-Hoc Networks

    The communication networks development and advancement during two last decades has been toward a single goal and that is gradual change from circuit-switched networks to packed switched ones. Today a lot of networks operates are trying to transform the public telephone networks to multipurpose packed switch. This new achievement is...

    Provided By Islamic Azad University

  • White Papers // Jun 2009

    Grid Learning; Computer Grid Joins to e-Learning

    According to development of communications and web-based technologies in recent years, e-Learning has become very important for everyone and is seen as one of most dynamic teaching methods. Grid computing is a pattern for increasing of computing power and storage capacity of a system and is based on hardware and...

    Provided By Islamic Azad University

  • White Papers // Jun 2009

    A Theory in Optimization of Ad-Hoc Routing Algorithms

    In this paper optimization of routing in ad-hoc networks is surveyed and a new method for reducing the complexity of routing algorithms is suggested. Using binary matrices for each node in the network and updating it once the routing is done, helps nodes to stop repeating the routing protocols in...

    Provided By Islamic Azad University

  • White Papers // Jun 2009

    A New Scheme for Improving the Quality of Service in Heterogeneous Wireless Network for Data Stream Sending

    In this paper, the authors first consider the quality of service problems in heterogeneous wireless networks for sending the video data, which their problem of being real-time is pronounced. At last, the authors present a method for ensuring the end-to-end quality of service at application layer level for adaptable sending...

    Provided By Islamic Azad University

  • White Papers // Jun 2009

    An Innovational Intermittent Algorithm in Networks-on-Chip (NOC)

    Every day human life experiences new equipments more automatic and with more abilities. So the need for faster processors doesn't seem to finish. Despite new architectures and higher frequencies, a single processor is not adequate for many applications. Parallel processing and networks are previous solutions for this problem. The new...

    Provided By Islamic Azad University

  • White Papers // Jun 2009

    A New Approach to Annotate the Text's of the Websites and Documents With a Quite Comprehensive Knowledge Base

    Machine-understandable data when strongly interlinked constitutes the basis for the SemanticWeb. Annotating web documents is one of the major techniques for creating metadata on the Web. Annotating websites defines the containing data in a form which is suitable for interpretation by machines. In this paper, the authors present a new...

    Provided By Islamic Azad University

  • White Papers // Jun 2009

    Face Detection Using Gabor Wavelets and Neural Networks

    This paper proposes new hybrid approaches for face recognition. Gabor wavelets representation of face images is an effective approach for both facial action recognition and face identification. Perform dimensionality reduction and linear discriminate analysis on the down sampled Gabor wavelet faces can increase the discriminate ability. Nearest feature space is...

    Provided By Islamic Azad University

  • White Papers // Jun 2009

    A New Source Code Auditing Algorithm for Detecting LFI and RFI in PHP Programs

    Static analysis of source code is used for auditing web applications to detect the vulnerabilities. In this paper, the authors propose a new algorithm to analyze the PHP source code for detecting LFI and RFI potential vulnerabilities. In the approach, the authors first define some patterns for finding some functions...

    Provided By Islamic Azad University

  • White Papers // Jun 2009

    Service Identification Approach to SOA Development

    Service identification is one of the main activities in the modeling of a service-oriented solution, and therefore errors made during identification can flow down through detailed design and implementation activities that may necessitate multiple iterations, especially in building composite applications. Different strategies exist for how to identify candidate services that...

    Provided By Islamic Azad University

  • White Papers // Jun 2009

    Hardware Implementation of Stack-Based Replacement Algorithms

    Block replacement algorithms to increase hit ratio have been extensively used in cache memory management. Among basic replacement schemes, LRU and FIFO have been shown to be effective replacement algorithms in terms of hit rates. In this paper, the authors introduce a flexible stack-based circuit which can be employed in...

    Provided By Islamic Azad University

  • White Papers // Sep 2007

    A Fuzzy Approach for Measuring IT Effectiveness of Business Processes

    Information Technology (IT) is playing vital role in today's business success. It has been proved that IT services directly effect on business processes performance and organization success. A main factor, which is directly related to IT performance, is Effectiveness of IT services and their support of business processes. In every...

    Provided By Islamic Azad University

  • White Papers // Jul 2012

    The Effect of IT on Organizational Agility

    In the unpredictable and competitive world of today the organizations must have different competitive features to compete, otherwise they will move towards annihilation. One of these features that organizations need in turbulent environments is agility. Agility provides the organization with the possibility of quick response and compatibility with environment and...

    Provided By Islamic Azad University

  • White Papers // Dec 2011

    Innovation Models and Business Process Redesign

    Business Process Reengineering (BPR) is a paradigm that is used by many organizations to survive in the competitive era. However, creative design of the business processes is a critical phase and the organization should prepare the ground for innovation in this phase. Innovation helps organizations to use the BPR concept...

    Provided By Islamic Azad University

  • White Papers // Jan 2013

    Business Process Reengineering Implementation: An Investigation of Critical Success Factors

    Intense world-wide competition has forced organizations to reengineer their old fashioned processes to achieve new heights of success. However, Business Process Reengineering (BPR) implementation is a difficult task and many organizations have failed to achieve the expected results. Consequently, the present study attempts to throw more light to the subject....

    Provided By Islamic Azad University

  • White Papers // Jul 2011

    Run-time Adaptable Business Process Decentralization

    BPEL specified business processes in the Service Oriented Architecture (SOA) are executed by non-scalable centralized orchestration engines. In order to resolve scalability issues, the centralized engines are clustered, which is not a final solution either. Alternatively, several decentralized orchestration engines are being emerged with the purpose of decentralizing a BPEL...

    Provided By Islamic Azad University

  • White Papers // Feb 2011

    New Evolutionary Approach to Business Process Model Optimization

    In today competitive business world, organizations and enterprises need to manipulate their business processes. The real key to be successful in these organizations lies in proper business process design and management. Concentrating on Business Process Optimization and improvement, enterprises can achieve reduced costs, increased quality of products, raised efficiency of...

    Provided By Islamic Azad University

  • White Papers // Apr 2010

    Analysis the Impact of Enterprise Resource Planning Systems on Organizational Effectiveness

    Enterprise Resource Planning (ERP) Systems exist to create effectiveness organizations but measurement of this is so difficult. Effectiveness is multi-concept. Three variables affect organizational effectiveness such as defined casual, intervening and end-result. In this paper at the first, the authors review measurement methods that have a full fitness with these...

    Provided By Islamic Azad University

  • White Papers // Aug 2012

    Business Modeling Based on Agents Systems Modules

    Agent design patterns form the new methodology used to improve the development of software agents. Agent design patterns can help capture solutions to common problems in the design agent. The forms are used in various systems such as knowledge management systems, real-time systems and network management. An agent design pattern...

    Provided By Islamic Azad University

  • White Papers // Sep 2007

    A Fuzzy Approach for Measuring IT Effectiveness of Business Processes

    Information Technology (IT) is playing vital role in today's business success. It has been proved that IT services directly effect on business processes performance and organization success. A main factor, which is directly related to IT performance, is Effectiveness of IT services and their support of business processes. In every...

    Provided By Islamic Azad University

  • White Papers // Feb 2013

    A Framework for Applying ERP in Effective Implementation of TQM

    ERP (Enterprise Resource Planning) is an integrated system that gathers whole decision making information from all the departments of a company into one single place and plays an important role to integrate organization's information, functions and results in successful operation in global markets. On the other hand, TQM (Total Quality...

    Provided By Islamic Azad University

  • White Papers // Aug 2010

    Main Content Extraction from Detailed Web Pages

    A web page structure and layout varies depend on different content type it will represent or the tastes of designer styling its content. Thereby main content position or the main tag containing main content differs in variety of websites. Even there might be some content in page view that are...

    Provided By Islamic Azad University

  • White Papers // Aug 2013

    Data Storage Security Challenges in Cloud Computing

    In the digital world using technology and new technologies require safe and reliable environment, and it also requires consideration to all the challenges that technology faces with them and address these challenges. Cloud computing is also one of the new technologies in the IT world in this rule there is...

    Provided By Islamic Azad University

  • White Papers // Nov 2013

    Trust-Based Clustering in Mobile Ad Hoc Networks: Challenges and Issues

    Mobile ad hoc networks are prone to various security attacks of malicious nodes and attackers. To protect the network clustering from security attacks, numerous trust-based clustering schemes have been presented in the literature. Analyzing the existing trust-based clustering solutions, the researchers illustrated their primary features and properties in this paper...

    Provided By Islamic Azad University

  • White Papers // May 2013

    Hybrid Architecture for Distributed Intrusion Detection System in Wireless Network

    In order to the rapid growth of the network application, new kinds of network attacks are emerging endlessly. So it is critical to protect the networks from attackers and the Intrusion detection technology becomes popular. Therefore, it is necessary that this security concern must be articulate right from the beginning...

    Provided By Islamic Azad University

  • White Papers // Jan 2014

    Detecting Suspicion Information on the Web Using Crime Data Mining Techniques

    Along with the rapid popularity of the Internet, crime information on the web is becoming increasingly rampant, and the majority of them are in the form of text. Because a lot of crime information in documents is described through events, event-based semantic technology can be used to study the patterns...

    Provided By Islamic Azad University

  • White Papers // Mar 2012

    The Influence of Marketing Strategy Elements on Market Share of Firms

    The business performance and economic profit of the firm can be summarized in market share. One of the most important aims of firms is to enhance market share to achieve greater scale in its operations and improve profitability. Due to this, managers always want to expand their market share. Market...

    Provided By Islamic Azad University

  • White Papers // Dec 2011

    The Impact of Information Technology Application on Supply Chain Performance

    Huge advances in information technology, has already taken place, the industry has developed both changes, including changes in the supply chain. A fast data transfer and information technology in supply chain resulting in increased cooperation between the supply chain and finally, increased efficiency throughout the supply chain. An effective supply...

    Provided By Islamic Azad University

  • White Papers // May 2011

    An Optimized Way for Mapping BPMN to BPEL

    Business Process Management (BPM) is a way for building, maintaining and evolving large enterprise systems on the basis of business process models. A standard for representing such models is the Business Process Modeling Notation (BPMN). BPMN models are mainly intended for communication and decision-making between domain analysts, but often they...

    Provided By Islamic Azad University