Ahmad Faraahi

Learn More
Due to rapid advances and availabilities of powerful image processing software, digital images are easy to manipulate and modify for ordinary people. This makes it more and more difficult for a viewer to check the authenticity of a given digital image. Copy-move forgery is a specific type of image tampering where a part of the image is copied and pasted on(More)
Distributed denial of service (DDoS) attacks are serious threats for availability of the internet services. These types of attacks command multiple agents to send a great number of packets to a victim and thus can easily exhaust the resources of the victim. In this paper we propose an anomaly-based DDoS detection method based on the various features of(More)
In this paper we introduce a new software architecture for Autonomic Grid computing networks by military C4ISR (Command, Control, Communications, Computers and Intelligence, Surveillance, & Reconnaissance) architecture. We discuss Self-* property of autonomic grid computing networks in autonomic grid computing networks can lead and manage by C4ISR(More)
Multi-join query optimization is an important technique for designing and implementing database management system. It is a crucial factor that affects the capability of database. This paper proposes a Bees algorithm that simulates the foraging behavior of honey bee swarm to solve Multi-join query optimization problem. The performance of the Bees algorithm(More)
A Pervasive Computing Environment includes a variety of communication networks and service systems and has places suitable for providing variety of services to client. One of the most important problems in such environments is service discovery, i.e. how a client can use his service of interest. In a Pervasive Computing Environment Context, information(More)
Feature selection is a problem of finding efficient features among all features in which the final feature set can improve accuracy and reduce complexity. In feature selection algorithms search strategies are key aspects. Since feature selection is an NP-Hard problem; therefore heuristic algorithms have been studied to solve this problem. In this paper, we(More)
So far many methods are introduced to compose Web services. In order to automate Web service composition, concepts from semantic Web technology are used. By using this technology, we can compose Web services in order to response users' request automatically or semi-automatically. By the growth of Web services amount, the possible composition of Web services(More)
Portfolio recommendation in stock market is complex, especially when the required data are vague. In order to evaluate the stocks and recommend the high priority of them to the customers, it is necessary to rank the stocks based on the criteria which is obtained from literature. Since in this paper the stocks score were presented by fuzzy number, fuzzy(More)
New achieves in wireless network technology, satellite services and cellular communication allows to usage of mobile computing. This mobility is troublesome for doing mobile computing that need to retrieve information from database. System movement during transaction execute, causes to disconnection of mobile unit from wireless network and this(More)
In this research, intelligent sliding mode controls are presented as robust controls for robot manipulators. The objective of the study is to design controls for robot manipulators without the knowledge of the boundary of the uncertainties by using an intelligent sliding mode control (SMC) while elucidating the robustness of the fuzzy SMC. A sliding mode(More)