مرور Volume 1, Issue 3 بر اساس تاریخ انتشار
در حال نمایش موارد 1 - 5 از 5
-
Combining Harmony search algorithm and Ant Colony Optimization algorithm to increase the lifetime of Wireless Sensor Networks
(Science and Research Branch,Islamic Azad University, 2015-08-01)Wireless Sensor Networks are the new generation of networks that typically are formed great numbers of nodes and the communications of these nodes are done as Wireless. The main goal of these networks is collecting data ...
-
HF-Blocker: Detection of Distributed Denial of Service Attacks Based On Botnets
(Science and Research Branch,Islamic Azad University, 2015-08-01)Abstract—Today, botnets have become a serious threat to enterprise networks. By creation of network of bots, they launch several attacks, distributed denial of service attacks (DDoS) on networks is a sample of such attacks. ...
-
A Near Optimal Approach in Choosing The Appropriate Physical Machines for Live Virtual Machines Migration in Cloud Computing
(Science and Research Branch,Islamic Azad University, 2015-08-01)Migration of Virtual Machine (VM) is a critical challenge in cloud computing. The process to move VMs or applications from one Physical Machine (PM) to another is known as VM migration. In VM migration several issues should ...
-
Nonlinear System Identification Using Hammerstein-Wiener Neural Network and subspace algorithms
(Science and Research Branch,Islamic Azad University, 2015-08-01)Neural networks are applicable in identification systems from input-output data. In this report, we analyze theHammerstein-Wiener models and identify them. TheHammerstein-Wiener systems are the simplest ...
-
Hybrid Key pre-distribution scheme for wireless sensor network based on combinatorial design
(Science and Research Branch,Islamic Azad University, 2015-08-01)Key distribution is an important problem in wireless sensor networks where sensor nodesare randomly scattered in adversarial environments.Due to the random deployment of sensors, a list of keys must be ...



