Tamir Khason

Displaying 1-14 of 14 results

  • White Papers // Sep 2013

    Cryptanalysis of Two Dynamic ID-Based Remote User Authentication Schemes for Preserving User Privacy

    Remote user authentication is an essential part in electronic commerce to identify legitimate users over the Internet. However, how to protect user privacy in the authentication has become an important issue recently. Therefore, many secure authentication schemes with smart cards have been proposed. In this paper, the authors will analyze...

    Provided By Tamir Khason

  • White Papers // Aug 2013

    Cost-Effective Online Auction Fraud Detection by Genetic Feature Selection

    Online auction fraud is becoming a serious problem in the recent years. To protect normal traders from fraud, effective countermeasures are needed to uncover cunning fraudsters. A lot of work has been proposed for this purpose. However, seldom of them took the detection cost into consideration, which is crucial for...

    Provided By Tamir Khason

  • White Papers // Oct 2012

    Adaptive Priority-Based Downlink Scheduling for WiMAX Networks

    Supporting Quality of Service (QoS) guarantees for diverse multimedia services are the primary concerns for WiMAX (IEEE 802.16) networks. A scheduling scheme that satisfies QoS requirements has become more important for wireless communications. The authors propose a downlink scheduling scheme called Adaptive Priority-based Downlink Scheduling (APDS) for providing QoS guarantees...

    Provided By Tamir Khason

  • White Papers // Oct 2012

    Multi-Objective Genetic-Fuzzy Data Mining

    Many approaches have been proposed for mining fuzzy association rules. The membership functions, which critically influence the final mining results, are difficult to de ne. In general, multiple criteria are considered when defining membership functions. In this paper, a multi-objective genetic-fuzzy mining algorithm is proposed for extracting membership functions and...

    Provided By Tamir Khason

  • White Papers // Jun 2012

    LASER: A Load-Aware Spectral-Efficient Routing Metric for Path Selection in IEEE 802.16j Multi-Hop Relay Networks

    For coverage extension and throughput enhancement, the IEEE 802.16j task group has developed a novel multi-hop relay network architecture to enable typical IEEE 802.16 networks to achieve data transmission between base stations and mobile stations via a multihop path with relay stations deployment. How to determine an effective path for...

    Provided By Tamir Khason

  • White Papers // Mar 2012

    Belt-Barrier Construction Algorithm for WVSNs

    The barrier coverage problem is very important and challenging in Wireless Visual Sensor Networks (WVSNs). However, previous research of WVSNs did not consider breadth of coverage and thus could not ensure high Quality of Monitor (QoM). Two segments of an image are captured at time point t=0 and t=1 respectively....

    Provided By Tamir Khason

  • White Papers // Mar 2012

    The K-Barrier Coverage Mechanism in Wireless Visual Sensor Networks

    Wireless Visual Sensor Networks (WVSNs) consist of a set of camera sensor nodes each of which equips with a camera and is capable of communicating with the other camera sensors within a specific distance range. As an extension of Wireless Sensor Networks (WSNs), the WVSNs can provide richer information such...

    Provided By Tamir Khason

  • White Papers // May 2011

    Adopting Data Mining Techniques on the Recommendations of Library Collections

    In this paper, the researchers explored not only the cluster of the readers with similar characteristics, but also the connection between the readers and the book collections of the library by using Data Mining techniques. By doing this, the library will be able to improve the interaction with its readers,...

    Provided By Tamir Khason

  • White Papers // May 2010

    A Secure Remote Authentication Scheme Preserving User Anonymity with Non-Tamper Resistant Smart Cards

    Anonymity is one of the important properties of remote authentication schemes to preserve user privacy. Besides, it can avoid unauthorized entities from using the user ID and other intercepted information to forge legal login messages. In this paper, however, the authors will show that Hu et al.'s scheme still cannot...

    Provided By Tamir Khason

  • White Papers // Nov 2009

    QPPS : Qos Provision Packet Scheduling Algorithm in High Speed

    The 3rd Generation WCDMA standard has been enhanced to offer significantly increased performance for packet data. But coming application such as multimedia on desiring data rates will urge the UMTS support. To support such high data rates, High Speed Downlink Packet Access (HSDPA) labeled as 3.5G wireless system, has been...

    Provided By Tamir Khason

  • White Papers // Dec 2008

    Bandwidth Management Method for Heterogeneous Wireless Network

    The integration of heterogeneous networks is a trend of Fourth Generation (4G) systems. But with more integrating network technologies, bandwidth management is more complicated. This paper proposes a bandwidth management method, called Bandwidth Management and Disposition (BMD). The BMD calculates the Reword Point (RP) to quantify the Mobile Host's (MH)...

    Provided By Tamir Khason

  • White Papers // Dec 2008

    Constructing the Multi-Agents Communication Model to Implement Dynamic Intelligent System

    The intelligent agent communication mechanism is designed to execute under background when the application drives an event trigger and the telephony technologies have been rapidly grown up and provide the multi-functions and good interactive User Graphic Interface (GUI). The hardware of cellular phone device also provides the light, small size...

    Provided By Tamir Khason

  • White Papers // Sep 2008

    An Algorithm for Mining Strong Negative Fuzzy Sequential Patterns

    Many methods have been proposed for mining fuzzy sequential patterns. However, most of conventional methods only consider the occurrences of fuzzy itemsets in sequences. The fuzzy sequential patterns discovered by these methods are called as positive fuzzy sequential patterns. In practice, the absences of frequent fuzzy itemsets in sequences may...

    Provided By Tamir Khason

  • White Papers // Jun 2007

    Provably Efficient Authenticated Key Agreement Protocol for Multi-Servers

    An efficient and practical authenticated key agreement protocol based on the line of geometry is proposed in this paper. It is a good solution to provide authentication and confidentiality. Identity authentication and message confidentiality are two important issues for the open network environment. In the proposed protocol, the authorized user...

    Provided By Tamir Khason

  • White Papers // May 2010

    A Secure Remote Authentication Scheme Preserving User Anonymity with Non-Tamper Resistant Smart Cards

    Anonymity is one of the important properties of remote authentication schemes to preserve user privacy. Besides, it can avoid unauthorized entities from using the user ID and other intercepted information to forge legal login messages. In this paper, however, the authors will show that Hu et al.'s scheme still cannot...

    Provided By Tamir Khason

  • White Papers // Nov 2009

    QPPS : Qos Provision Packet Scheduling Algorithm in High Speed

    The 3rd Generation WCDMA standard has been enhanced to offer significantly increased performance for packet data. But coming application such as multimedia on desiring data rates will urge the UMTS support. To support such high data rates, High Speed Downlink Packet Access (HSDPA) labeled as 3.5G wireless system, has been...

    Provided By Tamir Khason

  • White Papers // Dec 2008

    Bandwidth Management Method for Heterogeneous Wireless Network

    The integration of heterogeneous networks is a trend of Fourth Generation (4G) systems. But with more integrating network technologies, bandwidth management is more complicated. This paper proposes a bandwidth management method, called Bandwidth Management and Disposition (BMD). The BMD calculates the Reword Point (RP) to quantify the Mobile Host's (MH)...

    Provided By Tamir Khason

  • White Papers // Dec 2008

    Constructing the Multi-Agents Communication Model to Implement Dynamic Intelligent System

    The intelligent agent communication mechanism is designed to execute under background when the application drives an event trigger and the telephony technologies have been rapidly grown up and provide the multi-functions and good interactive User Graphic Interface (GUI). The hardware of cellular phone device also provides the light, small size...

    Provided By Tamir Khason

  • White Papers // Oct 2012

    Multi-Objective Genetic-Fuzzy Data Mining

    Many approaches have been proposed for mining fuzzy association rules. The membership functions, which critically influence the final mining results, are difficult to de ne. In general, multiple criteria are considered when defining membership functions. In this paper, a multi-objective genetic-fuzzy mining algorithm is proposed for extracting membership functions and...

    Provided By Tamir Khason

  • White Papers // Sep 2008

    An Algorithm for Mining Strong Negative Fuzzy Sequential Patterns

    Many methods have been proposed for mining fuzzy sequential patterns. However, most of conventional methods only consider the occurrences of fuzzy itemsets in sequences. The fuzzy sequential patterns discovered by these methods are called as positive fuzzy sequential patterns. In practice, the absences of frequent fuzzy itemsets in sequences may...

    Provided By Tamir Khason

  • White Papers // May 2011

    Adopting Data Mining Techniques on the Recommendations of Library Collections

    In this paper, the researchers explored not only the cluster of the readers with similar characteristics, but also the connection between the readers and the book collections of the library by using Data Mining techniques. By doing this, the library will be able to improve the interaction with its readers,...

    Provided By Tamir Khason

  • White Papers // Jun 2012

    LASER: A Load-Aware Spectral-Efficient Routing Metric for Path Selection in IEEE 802.16j Multi-Hop Relay Networks

    For coverage extension and throughput enhancement, the IEEE 802.16j task group has developed a novel multi-hop relay network architecture to enable typical IEEE 802.16 networks to achieve data transmission between base stations and mobile stations via a multihop path with relay stations deployment. How to determine an effective path for...

    Provided By Tamir Khason

  • White Papers // Jun 2007

    Provably Efficient Authenticated Key Agreement Protocol for Multi-Servers

    An efficient and practical authenticated key agreement protocol based on the line of geometry is proposed in this paper. It is a good solution to provide authentication and confidentiality. Identity authentication and message confidentiality are two important issues for the open network environment. In the proposed protocol, the authorized user...

    Provided By Tamir Khason

  • White Papers // Sep 2013

    Cryptanalysis of Two Dynamic ID-Based Remote User Authentication Schemes for Preserving User Privacy

    Remote user authentication is an essential part in electronic commerce to identify legitimate users over the Internet. However, how to protect user privacy in the authentication has become an important issue recently. Therefore, many secure authentication schemes with smart cards have been proposed. In this paper, the authors will analyze...

    Provided By Tamir Khason

  • White Papers // Aug 2013

    Cost-Effective Online Auction Fraud Detection by Genetic Feature Selection

    Online auction fraud is becoming a serious problem in the recent years. To protect normal traders from fraud, effective countermeasures are needed to uncover cunning fraudsters. A lot of work has been proposed for this purpose. However, seldom of them took the detection cost into consideration, which is crucial for...

    Provided By Tamir Khason

  • White Papers // Oct 2012

    Adaptive Priority-Based Downlink Scheduling for WiMAX Networks

    Supporting Quality of Service (QoS) guarantees for diverse multimedia services are the primary concerns for WiMAX (IEEE 802.16) networks. A scheduling scheme that satisfies QoS requirements has become more important for wireless communications. The authors propose a downlink scheduling scheme called Adaptive Priority-based Downlink Scheduling (APDS) for providing QoS guarantees...

    Provided By Tamir Khason

  • White Papers // Mar 2012

    Belt-Barrier Construction Algorithm for WVSNs

    The barrier coverage problem is very important and challenging in Wireless Visual Sensor Networks (WVSNs). However, previous research of WVSNs did not consider breadth of coverage and thus could not ensure high Quality of Monitor (QoM). Two segments of an image are captured at time point t=0 and t=1 respectively....

    Provided By Tamir Khason

  • White Papers // Mar 2012

    The K-Barrier Coverage Mechanism in Wireless Visual Sensor Networks

    Wireless Visual Sensor Networks (WVSNs) consist of a set of camera sensor nodes each of which equips with a camera and is capable of communicating with the other camera sensors within a specific distance range. As an extension of Wireless Sensor Networks (WSNs), the WVSNs can provide richer information such...

    Provided By Tamir Khason