1. Nonlinear System Identification Using Hammerstein-Wiener Neural Network and subspace algorithms

Maryam Ashtari Mahini; Mohammad Teshnehlab; Mojtaba Ahmadieh khanehsar

Volume 1, Issue 3 , Summer 2015, Pages 1-8

Abstract
  Neural networks are applicable in identification systems from input-output data. In this report, we analyze theHammerstein-Wiener models and identify them. TheHammerstein-Wiener systems are the simplest type of block orientednonlinear systems where the linear dynamic block issandwiched in between two ...  Read More

Computer Networks and Distributed Systems
2. Combining Harmony search algorithm and Ant Colony Optimization algorithm to increase the lifetime of Wireless Sensor Networks

Zahra Kamaei; Hamidreza Bakhshi; Behrooz Masoumi

Volume 1, Issue 3 , Summer 2015, Pages 9-16

Abstract
  Wireless Sensor Networks are the new generation of networks that typically are formed great numbers of nodes and the communications of these nodes are done as Wireless. The main goal of these networks is collecting data from neighboring environment of network sensors. Since the sensor nodes are battery ...  Read More

Computer Networks and Distributed Systems
3. Optimization Task Scheduling Algorithm in Cloud Computing

Somayeh Taherian Dehkordi; Vahid Khatibi Bardsiri

Volume 1, Issue 3 , Summer 2015, Pages 17-22

Abstract
  Since software systems play an important role in applications more than ever, the security has become one of the most important indicators of softwares.Cloud computing refers to services that run in a distributed network and are accessible through common internet protocols. Presenting a proper scheduling ...  Read More

Computer Networks and Distributed Systems
4. A Near Optimal Approach in Choosing The Appropriate Physical Machines for Live Virtual Machines Migration in Cloud Computing

Seyedeh Roudabeh Hosseini; Sepideh Adabi; Reza Tavoli

Volume 1, Issue 3 , Summer 2015, Pages 23-32

Abstract
  Migration of Virtual Machine (VM) is a critical challenge in cloud computing. The process to move VMs or applications from one Physical Machine (PM) to another is known as VM migration. In VM migration several issues should be considered. One of the major issues in VM migration problem is selecting an ...  Read More

Computer Networks and Distributed Systems
5. Hybrid Key pre-distribution scheme for wireless sensor network based on combinatorial design

Hamid Haj Seyyed Javadi; Mohaddese Anzani

Volume 1, Issue 3 , Summer 2015, Pages 33-38

Abstract
  Key distribution is an important problem in wireless sensor networks where sensor nodesare randomly scattered in adversarial environments.Due to the random deployment of sensors, a list of keys must be pre-distributed to each sensor node before deployment. To establish a secure communication, two nodes ...  Read More

Computer Networks and Distributed Systems
6. HF-Blocker: Detection of Distributed Denial of Service Attacks Based On Botnets

Bita Amirshahi; Ali Ahangari

Volume 1, Issue 3 , Summer 2015, Pages 39-45

Abstract
  Abstract—Today, botnets have become a serious threat to enterprise networks. By creation of network of bots, they launch several attacks, distributed denial of service attacks (DDoS) on networks is a sample of such attacks. Such attacks with the occupation of system resources, have proven to be ...  Read More