Loading...
Search for: internet
0.014 seconds
Total 370 records

    Exploration of process and competitive factors of entrepreneurship in digital space: A multiple case study in Iran

    , Article Education, Business and Society: Contemporary Middle Eastern Issues ; Volume 4, Issue 4 , 2011 , Pages 267-279 ; 17537983 (ISSN) Hafezieh, N ; Akhavan, P ; Eshraghian, F ; Sharif University of Technology
    2011
    Abstract
    Purpose: The purpose of this paper is to explore the process and competitive factors of entrepreneurship in digital space in Iran. Design/methodology/approach: In the last decades, the development and advancement of information and communication technologies (ICTs) and the business innovations related to them have defined a new economy which is known as "digital economy". Establishing and running businesses in this digital space means carrying out a kind of electronic commerce by exploiting the internet and other electronic networks. The new digital economy provides exceptional opportunities for many entrepreneurs to create new ventures in different business areas according to electronic... 

    Feature-based no-reference video quality assessment using Extra Trees

    , Article IET Image Processing ; Volume 16, Issue 6 , 2022 , Pages 1531-1543 ; 17519659 (ISSN) Otroshi Shahreza, H ; Amini, A ; Behroozi, H ; Sharif University of Technology
    John Wiley and Sons Inc  2022
    Abstract
    With the emergence of social networks and improvements in the internet speed, the video data has become an ever-increasing portion of the global internet traffic. Besides the content, the quality of a video sequence is an important issue at the user end which is often affected by various factors such as compression. Therefore, monitoring the quality is crucial for the video content and service providers. A simple monitoring approach is to compare the raw video content (uncompressed) with the received data at the receiver. In most practical scenarios, however, the reference video sequence is not available. Consequently, it is desirable to have a general reference-less method for assessing the... 

    A New Analytical Simulator for the Provisioning Stage of IoT-based WSNs

    , Article 3rd CSI/CPSSI International Symposium on Real-Time and Embedded Systems and Technologies, RTEST 2020, 10 June 2020 through 11 June 2020 ; 2020 Sadeghi, P ; Ejlali, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    With IoT devices becoming abundant and WSN applications becoming evermore present, the once dream of ubiquitous connectivity is closer to realization than ever before. but this realization is hindered by many technical problems and lengthy time to markets. Currently, our best practice of feasibility analysis relies in the same simulators used to model and develop the network applications. Because of their broad range and immense usability challenges, these jack-of-all-trades simulators tend to be computation-intensive and hard to work with.Here, we propose a relatively light-weight simulator based on the analytical models of different parts of the network to aid in rapid development and ease... 

    A meta-heuristic clustering method to reduce energy consumption in internet of things

    , Article International Journal of Nonlinear Analysis and Applications ; Volume 12, Issue 1 , 2021 , Pages 45-58 ; 20086822 (ISSN) Heidari, E ; Motameni, H ; Movaghar, A ; Sharif University of Technology
    Semnan University, Center of Excellence in Nonlinear Analysis and Applications  2021
    Abstract
    The Internet of Things (IoT) is an emerging phenomenon in the field of communication, in which smart objects communicate with each other and respond to user requests. The IoT provides an integrated framework providing interoperability across various platforms. One of the most essential and necessary components of IoT is wireless sensor networks. Sensor networks play a vital role in the lowest level of IoT. Sensors in sensor networks use batteries which are not replaceable, and hence, energy consumption becomes of great importance. For this reason, many algorithms have been recently proposed to reduce energy consumption. In this paper, a meta-heuristic method called whale optimization... 

    Reducing energy consumption in iot by a routing whale optimization algorithm

    , Article Malaysian Journal of Computer Science ; Volume 35, Issue 2 , 2022 , Pages 142-157 ; 01279084 (ISSN) Heidari, E ; Movaghar, A ; Motameni, H ; Barzegar, B ; Sharif University of Technology
    Faculty of Computer Science and Information Technology  2022
    Abstract
    The Internet of Things is a new concept in the world of information and communication technology, in which for each being (whether it be a human, an animal or an object), the possibility of sending and receiving data through communication networks such as the Internet or Intranet is provided. Wireless sensors have limited energy resources due to their use of batteries in supplying energy, and since battery replacement in these sensors is not usually feasible, the longevity of wireless sensor networks is limited. Therefore, reducing the energy consumption of the used sensors in IoT networks to increase the network lifetime is one of the crucial challenges and parameters in such networks. In... 

    Proposing a Resource Discovery Framework for Internet of Things Platforms

    , M.Sc. Thesis Sharif University of Technology Esmaeili, Mohsen (Author) ; Habibi, Jafar (Supervisor)
    Abstract
    The Internet of Things (IoT) is one of the fields witnessing a significant growth in recent years and is expected to make the lives of so many people go under substantial changes. IoT will exploit large numbers of smart objects in people’s everyday life to bring smartness into reality and this necessitates correct and seamless connection and integration between smart entities. One of the key tasks of the IoT platform is providing such a connection, which is assigned to the resource discovery framework.A resource discovery framework should consider requirements and challenges present in the IoT environment. Heeding the literature, one finds deficiencies in this field. These shortcomings are... 

    LPRE: Lost speech packet recovery withenhancement

    , Article 2007 IEEE International Conference on Communications, ICC'07, Glasgow, Scotland, 24 June 2007 through 28 June 2007 ; August , 2007 , Pages 1778-1783 ; 05361486 (ISSN); 1424403537 (ISBN); 9781424403530 (ISBN) Ajorloo, H ; Manzuri Shalmani, M. T ; Sharif University of Technology
    2007
    Abstract
    In the internet telephony, loss of IP packets causes instantaneous discontinuities in the received speech. In this paper, we have focused on finding an error resilient method for this problem. Our proposed method creates artificial correlation between speech samples that pre-distorts the speech signal. The receiver uses this correlation to reconstruct the lost speech packets. An appropriate speech enhancement technique is designed for the reduction of the processing error in the recovered speech caused by the speech codecs. The SegSNR results show the superiority of our proposed speech enhancement method over a recently proposed one. © 2007 IEEE  

    Minimizing latency in geo-distributed clouds

    , Article Journal of Supercomputing ; Volume 71, Issue 12 , December , 2015 , Pages 4423-4445 ; 09208542 (ISSN) Malekimajd, M ; Movaghar, A ; Hosseinimotlagh, S ; Sharif University of Technology
    Springer New York LLC  2015
    Abstract
    Geo-distributed data-centers in cloud computing are becoming increasingly popular due to their lower end-user perceived latency and increased reliability in distributed applications. The important challenge of resource allocation in cloud management is more pronounced in geo-distributed data-centers compared to traditional data-centers. A geo-distributed cloud manager faces applications whose virtual machines (VMs) are far apart and need to interact with end users, access distributed data and communicate with each other. In such applications, the service level agreement is not met if the communication latency is not bounded. In this paper, we focus on the problem of finding data-centers for... 

    Passive worm and malware detection in peer-to-peer networks

    , Article Proceedings - IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, EUC 2010, 11 December 2010 through 13 December 2010 ; 2010 , Pages 561-565 ; 9780769543222 (ISBN) Fahimian, S ; Movahed, A ; Kharrazi, M ; Sharif University of Technology
    Abstract
    Today P2P networks are responsible for a large amount of traffic on the Internet, as many Internet users employ such networks for content distribution. At the same time, P2P networks are vulnerable to security threats such as Internet worms and facilitate their propagation. Internet worms and more generally malware are a major concern to the network security community. There are many different type of worms in the wild, mostly categorized based on how they find and infect their new victims (i.e. active, passive, etc.). In this paper, we investigate a new approach for detecting passive worms and malware in P2P networks based on the popularity of files in the network. As part of our... 

    A lightweight hierarchical authentication scheme for internet of things

    , Article Journal of Ambient Intelligence and Humanized Computing ; Volume 10, Issue 7 , 2019 , Pages 2607-2619 ; 18685137 (ISSN) Akbarzadeh, A ; Bayat, M ; Zahednejad, B ; Payandeh, A ; Aref, M. R ; Sharif University of Technology
    Springer Verlag  2019
    Abstract
    The Internet of Things (IoT) technology enables numerous things with different processing power and storage capacity to communicate and share data with each other. Considering the constrained devices of the IoT network in terms of processing and storage, designing a lightweight authentication scheme is quite important. So in this paper, we propose a lightweight authentication scheme based on Chebyshev Chaotic Maps. In the proposed scheme we apply a hierarchical structure to define different access controls for various entities. We then provide a formal analysis via the BAN logic to show the security of our scheme. Moreover, we compare our proposed scheme with previous ones in terms of... 

    Estimating geographical position of nodes in the internet

    , Article 11th IASTED International Conference on Internet and Multimedia Systems and Applications, IMSA 2007, Honolulu, HI, 20 August 2007 through 22 August 2007 ; 2007 , Pages 211-216 ; 9780889866782 (ISBN) Mousavi, H ; Semnani, M ; Rafiei, M. E ; Movaghar, A ; Sharif University of Technology
    2007
    Abstract
    By the advances in location-aware applications over the Internet, the need for information such as the geographical position of routers and hosts and also the Euclidian distance of nodes is more important than ever. These kinds of information can also provide a valuable insight for network administrators, analysts, and many others. In this paper, we propose an algorithm, called GPE, to estimate the geographical position of nodes across the Internet. In the proposed approach, Internet topology is modeled by a weighted graph. Each node of the graph may have a corresponding estimation of its position. Weight of each edge, in this graph, indicates the estimated length of corresponding link in... 

    Voice quality measurement in a typical router-based network

    , Article 32nd IEEE Conference on Local Computer Networks, LCN 2007, Dublin, 15 October 2007 through 18 October 2007 ; 2007 , Pages 274-275 ; 0769530001 (ISBN); 9780769530000 (ISBN) Azarfar, A ; Jahangir, A. H ; Sharif University of Technology
    2007
    Abstract
    In this paper, we introduce novel mechanisms for measuring and evaluating the performance of a network and its devices, configured especially for Voice over IP (VoIP). We study the effects of different configurations on final voice quality by enabling or changing the related equipment features. In our study we quantify quality changes based on different router configurations and discuss precisely to what extent and how much this quality is improved versus features or special configurations of network devices. These results can be used for two purposes: compare and benchmark different routers in order to know which one is proper for a typical VoIP network, and select the best configurations.... 

    The Exploratory Study of Customer Satisfaction & Loyalty in Private Access Provider (PAP)Companies: ADSL Internet Case in Iran

    , M.Sc. Thesis Sharif University of Technology Beheshtinejad, Ali (Author) ; Miremadi, Ali Reza (Supervisor)
    Abstract
    Internet and the market based on this new product and service has penetrated in all aspects of today’s modern life of human being. After invention of this market each day a new innovation revolutionized this market and industry. High speed internet based on ADSL technology was one of these innovations. The high-speed internet service has achieved a remarkable increase in penetration in recent years. In order to survive in this competitive market, companies should continue to improve their service performance. The high level of service performance is believed to be an effective way to improve customer satisfaction and loyalty. In recent years, the high-speed internet service, based on the... 

    Using Multiple-Radio for Solving Communication Problem in Internet of Things

    , M.Sc. Thesis Sharif University of Technology ZandKarimi, Nima (Author) ; Hemmatyar, Ali Mohammad Afshin (Supervisor)
    Abstract
    One of the main application domains of Internet of Things is the smart home. There are lots of kinds object in any home and all of them need to be connected to each other for sharing information. The central management system of smart home uses this information for controlling and organizing the home. The first condition of smart home is that the home should know every detail about itself. So the network infrastructure of home is very important and every single object in home must be connected to the central management system of home. But because of variety in objects there are so many connection ways which any object uses them for connecting to the network. So the central management system... 

    Estimating Possible Effects of Subsidies in Competition and Development of Fixed Broadband Internet

    , M.Sc. Thesis Sharif University of Technology Mohammadi, Mohammad Ali (Author) ; Vesal, Mohammad (Supervisor) ; Rahmati, Mohammad Hossein (Supervisor)
    Abstract
    In this work, the dynamic competition between firms providing internet services is studied. The framework is Markov equilibrium whereby structural parameters are obtained using two-step estimations, allowing for analyzing the situation in case of subsidies for service upgrade. The results show that such subsidy has little effect on the number of firms while increasing the number of fast firms  

    Enabling Open Rmote to Use Fog and Edge Computing

    , M.Sc. Thesis Sharif University of Technology Farahmand, Navid (Author) ; Hemmatyar, Ali Mohammad Afshin (Supervisor)
    Abstract
    The main idea of the upcoming research is to provide a way of benefiting from processing at the edge and processing in the fog for the open source platform openremote; In such a way that the central core of the platform can offload its processing tasks to the edge of the network. With this work, a large amount of the processes that used to be done by the core will be offloaded from the core. On the other hand, by applying processes at the edge of the network, it becomes possible to eliminate a large amount of overhead caused by raw data transmission, and as a result, the productivity of the network increases. In the current research, in addition to designing a model to add the mentioned... 

    Physical Layer Authentication in the Internet of Things based on Deep Learning

    , M.Sc. Thesis Sharif University of Technology Abdollahi, Majid (Author) ; Behroozi, Hamid (Supervisor)
    Abstract
    IoT security is an important step in the rapid development of its applications and ser-vices. Many security protocols have been defined to maintain security at higher communication layers, such as the transport layer and the application layer, but with the advent of quantum computers due to high-speed parallel computing, the previous methods are no longer secure and we have to establish security at lower layers such as the physical layer. The efficiency of IoT devices depends on the reliability of their message transmission. Cyber-attacks such as data injection, eavesdropping and man-in-the-middle can lead to security challenges. In this study, we propose a new deep learning based component... 

    Machine Learning-Based Solutions for IoT Intrusion Security

    , M.Sc. Thesis Sharif University of Technology Moradi, Kamyab (Author) ; Hajsadeghi, Khosro (Supervisor)
    Abstract
    Nowadays, by integrating the Internet of Things systems into the daily life of humans, mankind has created a platform for providing numerous and diverse services through which life has become much simpler and more convenient. These systems have gradually become an integral part of today's life. They are used in many areas of production and service provision, such as healthcare, agricultural industry, supply chain, education system, transportation, and many others. Although these achievements have facilitated human life in many aspects, they are also associated with many security risks. Intrusion detection systems (IDS) are methods for predicting possible damage (through security attacks such... 

    Incentive design and market evolution of mobile user-provided networks

    , Article Proceedings - IEEE INFOCOM, 26 April 2015 through 1 May 2015 ; Volume 2015-August , 2015 , Pages 498-503 ; 0743166X (ISSN) ; 9781467371315 (ISBN) Khalili, M. M ; Gao, L ; Huang, J ; Khalaj, B. H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    An operator-assisted user-provided network (UPN) has the potential to achieve a low cost ubiquitous Internet connectivity, without significantly increasing the network infrastructure investment. In this paper, we consider such a network where the network operator encourages some of her subscribers to operate as mobile Wi-Fi hotspots (hosts), providing Internet connectivity for other subscribers (clients). We formulate the interaction between the operator and mobile users as a two-stage game. In Stage I, the operator determines the usage-based pricing and quota-based incentive mechanism for the data usage. In Stage II, the mobile users make their decisions about whether to be a host, or a... 

    The effect of using cube connected cycle for improving locality awareness in peer-to-peer networks

    , Article UKSim2010 - UKSim 12th International Conference on Computer Modelling and Simulation, 24 March 2010 through 26 March 2010 ; March , 2010 , Pages 491-496 ; 9780769540160 (ISBN) Gharib, M ; Barzegar, Z ; Habibi, J ; UK Simulation Society; Asia Modelling and Simulation Society (AMSS); European Federation of Simulation Societies (EUROSIM); IEEE UK and RI; European Council for Modelling and Simulation (ECMS) ; Sharif University of Technology
    2010
    Abstract
    Today, peer-to-peer networks are become more popular among internet users and more than millions peers share high volume of data from anywhere. Sending and receiving these data increase the network traffics terribly. By improving the performance of these networks not only the efficiency of these networks increase but also the overall performance of the internet augments. To achieve high performance and resilience to failures, a peer can make connections with those other peers that are geographically closer to it. There are many solutions that are suggested for locality problem. In this paper, we suggest a Cube Connected Cycle as an overlay network to improve locality with higher performance