Loading...
Search for: internet
0.009 seconds
Total 370 records

    Designing and implementing two internet based exam systems using synchronous and asynchronous models

    , Article 2008 10th International Conference on Advanced Communication Technology, Phoenix Park, 17 February 2008 through 20 February 2008 ; Volume 3 , 2008 , Pages 2135-2139 ; 17389445 (ISSN); 9788955191356 (ISBN) Shirali Shahreza, M. H ; Shirali Shahreza, M ; Sharif University of Technology
    2008
    Abstract
    In this paper, two different systems for taking exams through the Internet are described and analyzed. They have been designed and executed in Yazd and Shahed Universities. These systems enable us to take the multiple-choice and descriptive exams. In these systems, the exam questions are prepared by the instructor of the concerned lesson and placed in the system database. The students who have taken that lesson can be connected to the system from wherever they want. After entering their username and password they can take part in the exam. One of these systems has been created on the basis of the synchronous model and another one has been developed on the basis of the asynchronous model.... 

    Question-based CAPTCHA

    , Article International Conference on Computational Intelligence and Multimedia Applications, ICCIMA 2007, Sivakasi, Tamil Nadu, 13 December 2007 through 15 December 2007 ; Volume 4 , 2008 , Pages 54-58 ; 0769530508 (ISBN); 9780769530505 (ISBN) Shirali Shahreza, M ; Shirali Shahreza, S ; Sharif University of Technology
    2008
    Abstract
    Today there are many Internet sites which require only the entry by human users but unfortunately some computer softwares called bots are designed by some hackers to enter these sites and use their resources through false registration. As a result some systems named CAPTCHA have been introduced to tell apart human users and computer software. This paper introduces a new CAPTCHA method. In this method a simple mathematical problem is generated according to a predefined pattern but instead of some object's name, we put their images. Then the whole problem is saved and shown to the user inform of an image to be answered by him. But since answering this problem requires four abilities of... 

    Login to internet websites by next generation game console

    , Article 2006 2nd IEEE/IFIP International Conference in Central Asia on Internet, ICI 2006, Tashkent, 19 September 2006 through 21 September 2006 ; 2006 ; 1424405432 (ISBN); 9781424405435 (ISBN) Shirali Shahreza, M ; Sharif University of Technology
    IEEE Computer Society  2006
    Abstract
    By a great leap, the computer game industry has today reached fame as big as filmmaking industry. Upon introduction of the new generation of game consoles, this industry will witness spectacular progress. One of these next generation consoles is Nintendo console named "Wii". This console has a new game pad which utilizes motion sensors. On the other hand, facilities such as internet connection are added in new consoles and they are not merely for playing. It is observed that placing password for creating usernames by game consoles is difficult. By the use of the specifications of Wii console game pads, a method for user authentication and entering password is proposed in this paper. By using... 

    A matrix factorization model for hellinger-based trust management in social internet of things

    , Article IEEE Transactions on Dependable and Secure Computing ; 2021 ; 15455971 (ISSN) Aalibagi, S ; Mahyar, H ; Movaghar, A ; Stanley, H. E ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    The Social Internet of Things (SIoT), integration of the Internet of Things and Social Networks paradigms, has been introduced to build a network of smart nodes that are capable of establishing social links. In order to deal with misbehaving service provider nodes, service requestor nodes must evaluate their trustworthiness levels. In this paper, we propose a novel trust management mechanism in the SIoT to predict the most reliable service providers for each service requestor, which leads to reduce the risk of being exposed to malicious nodes. We model the SIoT with a flexible bipartite graph, then build a social network among the service requestor nodes, using the Hellinger distance.... 

    TCP retransmission timer adjustment mechanism using system identification

    , Article Proceedings of the 2004 American Control Conference (AAC), Boston, MA, 30 June 2004 through 2 July 2004 ; Volume 3 , 2004 , Pages 2328-2332 ; 07431619 (ISSN); 0780383354 (ISBN) Haeri, M ; Rad, A. H. M ; American Automatic Control Council; International Federation of Automation Control, IFAC ; Sharif University of Technology
    2004
    Abstract
    In this paper, the TCP retransmission timer adjustment mechanism is approached from the system's theoretic point of view. TCP uses a simple recursive system identification algorithm to capture both time variant and time invariant Internet behavior and provides a dynamic Round-Trip Time (RTT) predictor. Based on real Internet data collection, it is observed that when the retransmission timer is adjusted by using the proposed predictor instead of the traditional RTT estimator, its performance increases significantly  

    Encrypted internet traffic classification using a supervised spiking neural network

    , Article Neurocomputing ; Volume 503 , 2022 , Pages 272-282 ; 09252312 (ISSN) Rasteh, A ; Delpech, F ; Aguilar Melchor, C ; Zimmer, R ; Shouraki, S. B ; Masquelier, T ; Sharif University of Technology
    Elsevier B.V  2022
    Abstract
    Internet traffic recognition is essential for access providers since it helps them define adapted priorities in order to enhance user experience, e.g., a high priority for an audio conference and a low priority for a file transfer. As internet traffic becomes increasingly encrypted, the main classic traffic recognition technique, payload inspection, is rendered ineffective. Hence this paper uses machine learning techniques looking only at packet size and time of arrival. For the first time, Spiking neural networks (SNNs), which are inspired by biological neurons, were used for this task for two reasons. Firstly, they can recognize time-related data packet features. Secondly, they can be... 

    ARMOR: A reliable and mobility-aware RPL for mobile internet of things infrastructures

    , Article IEEE Internet of Things Journal ; Volume 9, Issue 2 , 2022 , Pages 1503-1516 ; 23274662 (ISSN) Mohammadsalehi, A ; Safaei, B ; Monazzah, A. M. H ; Bauer, L ; Henkel, J ; Ejlali, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2022
    Abstract
    Mobile portable embedded devices are becoming an integral part of our daily activities in the vision of Internet of Things (IoT). Nevertheless, due to lack of mobility support in the IPv6 routing protocol for low-power and lossy networks (RPLs), which is standardized for multihop IoT infrastructures, providing reliable communications in terms of packet delivery ratio (PDR) in mobile IoT applications has become significantly challenging. While several studies tried to enhance the adaptability of RPL to network dynamics, their utilized routing metrics have prevented them from establishing long-lasting reliable paths. Furthermore, the stochastic parent replacement policy in the standard version... 

    LiFi Grid – Approach in Designing Intelligent Internet Service

    , M.Sc. Thesis Sharif University of Technology Pashazanoosi, Mohamadreza (Author) ; Salehi, Jawad (Supervisor)
    Abstract
    Demands on wireless access networks are growing enormously, thanks to deploying new generations of wireless communication systems—such as LTE, 4G, and in the near future 5G—and especially promoting new technologies, like Internet-of-Things (IoT). With the help of visible light communication (VLC) systems, networks have been developed the capacities of which can go beyond some Mbps, but this is not satisfying enough. Therefore, a newer version of VLC systems has been investigated, called Light-Fidelity (LiFi), which is complement to WiFi (in radio frequency networks(. Two main purposes of LiFi networks are obtaining a high-capacity wireless access network and using them for illumination... 

    Trust Management in the Social Internet of Things

    , M.Sc. Thesis Sharif University of Technology Aalibagi, Soroush (Author) ; Movaghar, Ali (Supervisor)
    Abstract
    The Social Internet of Things (SIoT), integration of Internet of Things and Social networks paradigms, has been introduced to build a network of smart nodes which are capable of establishing social links. In order to deal with misbehavioral service provider nodes, service requestor nodes must evaluate their trustworthiness levels.In this thesis, we propose a novel trust management mechanism in the SIoT to predict the most reliable service provider for a service requestor, that leads to reduce the risk of exposing to malicious nodes. We model an SIoT with a flexible bipartite graph (containing two sets of nodes: service providers and requestors), then build the corresponding social network... 

    An Access Control Model for Cloud-Enabled IoT Platforms

    , M.Sc. Thesis Sharif University of Technology Malek Mohammadi, Alireza (Author) ; Movaghar, Ali (Supervisor)
    Abstract
    In recent years, the Internet of Things has become one of the most popular technologies that has facilitated new interactions between objects and humans to improve their quality of life. With the rapid proliferation of the Internet of Things, an ever-evolving question arises - how to control access and permissions in a space that can contain hundreds of smart devices - which ultimately address security and privacy concerns of technologies and consumers. Today, cloud computing has become an important technology for the Internet of Things and creates a cloud architecture that is used in various fields in this area. A smart city is an urban area that uses a variety of sensors and electronic... 

    A distributed measurement system for internet delay estimation

    , Article 2010 IEEE International Instrumentation and Measurement Technology Conference, I2MTC 2010 - Proceedings, 3 May 2010 through 6 May 2010 ; May , 2010 , Pages 1556-1560 ; 9781424428335 (ISBN) Hariri, N ; Hariri, B ; Shirmohammadi, S ; Sharif University of Technology
    2010
    Abstract
    predicting the latency between hosts in the internet can play a significant rolein the improvement of the performance of many services that use latency distances among hosts as a decision making input. Although, the information regarding the point to point delay among internet peers is required in many applications, such information is not easily available to the peers. Latency data acquisition requires a considerableamount of measurements to be performed at each node in order for that node to keep a recordof its latency to all the other nodes. Moreover, the measurements need to be regularly repeated in order to be updatedagainst the network dynamics where the latency values are frequently... 

    A robust and efficient SIP authentication scheme

    , Article Scientia Iranica ; Volume 17, Issue 1 D , June , 2010 , Pages 25-38 ; 10263098 (ISSN) Mohammadi Nodooshan, A ; Darmani, Y ; Jalili, R ; Nourani, M ; Sayad Haghighi, M ; Sharif University of Technology
    2010
    Abstract
    The Session Initiation Protocol (SIP), which is becoming the de facto standard for the next-generation VoIP networks, is currently receiving much attention in many aspects. One aspect that was not deeply addressed in the original SIP is its authentication procedure. Apart from its security, an SIP authentication procedure should be efficient. This paper proposes a robust and efficient three-party SIP authentication protocol. In this protocol, the. end users are. authenticated with the proxy server in their domain using the. registrar server. Compared to previous works, our proposed protocol is more efficient and secure. To support our protocol with a formal security proof, its model is... 

    A novel method for supporting locality in peer-to-peer overlays using hypercube topology

    , Article ISMS 2010 - UKSim/AMSS 1st International Conference on Intelligent Systems, Modelling and Simulation, 27 January 2010 through 29 January 2010, Liverpool ; 2010 , Pages 391-395 ; 9780769539737 (ISBN) Gharib, M ; Barzegar, Z ; Habibi, J ; Sharif University of Technology
    2010
    Abstract
    Today, peer-to-peer networks are become more popular among internet users and more than millions peers share high volume of data from anywhere. Sending and receiving these data increase the network traffics terribly. By improving the performance of these networks not only the efficiency of these networks increase but also the overall performance of the internet augments. To achieve high performance and resilience to failures, a peer can make connections with those other peers that are geographically closer to it. In this paper, we present a novel mechanism for placing peers on the overlay network, which supports locality without increasing network traffic seriously  

    A learning automata and clustering-based routing protocol for named data networking

    , Article Telecommunication Systems ; 2016 , Pages 1-21 ; 10184864 (ISSN) Shariat, Z ; Movaghar, A ; Hoseinzadeh, M ; Sharif University of Technology
    Springer New York LLC 
    Abstract
    Named Data Networking (NDN) is a new information-centric networking architecture in which data or content is identified by a unique name and saved pieces of the content are used in the cache of routers. Certainly, routing is one of the major challenges in these networks. In NDN, to achieve the required data for users, interest messages containing the names of data are sent. Because the source and destination addresses are not included in this package, routers forward them using the names that carried in packages. This forward will continue until the interest package is served. In this paper, we propose a routing algorithm for NDN. The purpose of this protocol is to choose a path with the... 

    A learning automata and clustering-based routing protocol for named data networking

    , Article Telecommunication Systems ; Volume 65, Issue 1 , 2017 , Pages 9-29 ; 10184864 (ISSN) Shariat, Z ; Movaghar, A ; Hoseinzadeh, M ; Sharif University of Technology
    Springer New York LLC  2017
    Abstract
    Named data networking (NDN) is a new information-centric networking architecture in which data or content is identified by a unique name and saved pieces of the content are used in the cache of routers. Certainly, routing is one of the major challenges in these networks. In NDN, to achieve the required data for users, interest messages containing the names of data are sent. Because the source and destination addresses are not included in this package, routers forward them using the names that carried in packages. This forward will continue until the interest package is served. In this paper, we propose a routing algorithm for NDN. The purpose of this protocol is to choose a path with the... 

    A lightweight hierarchical authentication scheme for internet of things

    , Article Journal of Ambient Intelligence and Humanized Computing ; 2018 , Pages 1-13 ; 18685137 (ISSN) Akbarzadeh, A ; Bayat, M ; Zahednejad, B ; Payandeh, A ; Aref, M. R ; Sharif University of Technology
    Springer Verlag  2018
    Abstract
    The Internet of Things (IoT) technology enables numerous things with different processing power and storage capacity to communicate and share data with each other. Considering the constrained devices of the IoT network in terms of processing and storage, designing a lightweight authentication scheme is quite important. So in this paper, we propose a lightweight authentication scheme based on Chebyshev Chaotic Maps. In the proposed scheme we apply a hierarchical structure to define different access controls for various entities. We then provide a formal analysis via the BAN logic to show the security of our scheme. Moreover, we compare our proposed scheme with previous ones in terms of... 

    A framework for reliable and ubiquitous inference in wireless sensor network

    , Article CSI International Symposium on Real-Time and Embedded Systems and Technologies, RTEST 2018 ; 26 June , 2018 , Pages 63-70 ; 9781538614754 (ISBN) Shamsaie, A ; Abdi, E ; Habibi, J ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    Development of Internet of things (IoT) applications brings a new movement to the functionality of wireless sensor networks (WSNs) from only environment sensing and data gathering to collaborative inferring and ubiquitous intelligence. In intelligent WSNs, nodes collaborate to exchange the information needed to achieve the required inference or smartness. Efficiency or correctness of many smart applications rely on efficient, timely, reliable, and ubiquitous inference of information which may continually change in interaction with other nodes. In this paper, we introduce a framework which provides a generic solution for such common ubiquitous inferences. This framework brings the reliability... 

    Fast write operations in non-volatile memories using latency masking

    , Article CSI International Symposium on Real-Time and Embedded Systems and Technologies, RTEST 2018, 9 May 2018 through 10 May 2018 ; 2018 , Pages 1-7 ; 9781538614754 (ISBN) Hoseinghorban, A ; Bazzaz, M ; Ejlali, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    Energy consumption is an important issue in designing embedded systems and the emerging Internet of Things (IoT). The use of non-volatile memories instead of SRAM in these systems improves their energy consumption since non-volatile memories consume much less leakage power and provide better capacity given the same die area as SRAM. However, this can impose significant performance overhead because the write operation latency of non-volatile memories is more than that of SRAM. In this paper we presented an NVM-based data memory architecture for embedded systems which improves the performance of the system at the cost of a slight energy consumption overhead. The architecture employs... 

    Towards a reliable modulation and encoding scheme for internet of things communications

    , Article 13th IEEE International Conference on Application of Information and Communication Technologies, AICT 2019, 23 October 2019 through 25 October 2019 ; 2019 ; 9781728139005 (ISBN) Sadeghi, P ; Safaei, B ; Talaei, K ; Hosseini Monazzah, A. M ; Ejlali, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    As the emergence of Internet of Things (IoT) brings the realization of ubiquitous connectivity ever closer, our reliance on these applications gets more important. Nowadays, such connected devices could be found everywhere, from home appliances to industrial control systems and environmental monitoring applications. One of the main challenges in IoT infrastructures is that of reliability, which emboldens itself in the context of Low-power and Lossy Networks (LLN) as they are inherently prone to packet loss as a result of their environmental and design constraints. Therefore, reliability of IoT devices becomes crucially important. With communication, the most important consideration in these... 

    Secrecy throughput maximization for full-duplex wireless powered IOT networks under fairness constraints

    , Article IEEE Internet of Things Journal ; Volume 6, Issue 4 , 2019 , Pages 6964-6976 ; 23274662 (ISSN) Rezaei, R ; Sun, S ; Kang, X ; Guan, Y. L ; Pakravan, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    In this paper, we study the secrecy throughput of a full-duplex wireless powered communication network (WPCN) for Internet of Things (IoT). The WPCN consists of a full-duplex multiantenna base station (BS) and a number of sensor nodes. The BS transmits energy all the time, and each node harvests energy prior to its transmission time slot. The nodes sequentially transmit their confidential information to the BS, and the other nodes are considered as potential eavesdroppers. We first aim to optimize the sum secrecy throughput of the nodes. The optimization variables are the duration of the time slots and the BS beamforming vectors in different time slots. The optimization problem is shown to...