hamid haj seyyed javadi
Department of Mathematics and Computer Science, Shahed University, Tehran, Iran
[ 1 ] - A Deterministic Multiple Key Space Scheme for Wireless Sensor Networks via Combinatorial Designs
The establishing of a pairwise key between two nodes for encryption in a wireless sensor network is a challenging issue. To do this, we propose a new deterministic key pre-distribution scheme which has modified the multiple key space scheme (MKSS). In the MKSS, the authors define two random parameters to make better resilience than existing schemes. Instead of a random selection of these parame...
[ 2 ] - Sink Location Service Based on Fano Plane in Wireless Sensor Networks
Sink location is considered as a basic service in geographic routing in wireless sensor networks. Obtaining the location of sink node by source node using an efficient method with low complexity has always been a challenging issue in research. In this paper, a sink location algorithm based on Fano plane is proposed. The research challenge is how to ensure the intersection of two SLQ (Location Q...
[ 3 ] - 3D Path Planning Algorithm for Mobile Anchor-Assisted Positioning in Wireless Sensor Networks
Positioning service is one of Wireless Sensor Networks’ (WSNs) fundamental services. The accurate position of the sensor nodes plays a vital role in many applications of WSNs. In this paper, a 3D positioning algorithm is being proposed, using mobile anchor node to assist sensor nodes in order to estimate their positions in a 3D geospatial environment. However, mobile anchor node’s 3D path optim...
[ 4 ] - On a generalization of central Armendariz rings
In this paper, some properties of $alpha$-skew Armendariz and central Armendariz rings have been studied by variety of others. We generalize the notions to central $alpha$-skew Armendariz rings and investigate their properties. Also, we show that if $alpha(e)=e$ for each idempotent $e^{2}=e in R$ and $R$ is $alpha$-skew Armendariz, then $R$ is abelian. Moreover, if $R$ is central $alpha$-skew A...
[ 5 ] - جستجو روی دادههای رمزگذاریشده: قابلیتها و چالشها
رشد تولید داده، ظرفیتها و نیازمندیهایی را در جهان به همراه دارد. از یک سو، نگهداری دادههای تولید شده، امکان بهکارگیری مجدد و تحلیل روی دادهها را فراهم میکند که منجر به تولید علم داده میشود؛ از سوی دیگر، حجم زیاد دادهها، نیازمند فضای ذخیرهسازی و امکان جستجو برای بهره برداری از آنها است. محاسبات ابری، یک مدل فناورانه و عملیاتی است که محدودیتهای ذخیرهسازی و محاسباتی را در نگهداری و به...
[ 6 ] - Detecting Active Bot Networks Based on DNS Traffic Analysis
Abstract—One of the serious threats to cyberspace is the Bot networks or Botnets. Bots are malicious software that acts as a network and allows hackers to remotely manage and control infected computer victims. Given the fact that DNS is one of the most common protocols in the network and is essential for the proper functioning of the network, it is very useful for monitoring, detecting and redu...
[ 7 ] - Measuring the Efficiency of Financial Cloud Services in the Banking Industry Using the Modified Dynamic DEA with Network Structure: The Case of Iran E-Banking
Nowadays, the great benefits of cloud computing have dramatically increased the number of e-banking users. Hence, the competition in the banking industry has boosted and managers need to evaluate their branches on a regular basis. To this end, this study aims to evaluate cloud-based banking systems based on the Quality of Service (QoS) attributes using the Dynamic Network Data Envelopment Analy...