Ahmad Faraahi

Learn More
Distributed denial of service (DDoS) attacks are serious threats for availability of the internet services. These types of attacks command multiple agents to send a great number of packets to a victim and thus can easily exhaust the resources of the victim. In this paper we propose an anomaly-based DDoS detection method based on the various features of(More)
Due to rapid advances and availabilities of powerful image processing software, digital images are easy to manipulate and modify for ordinary people. This makes it more and more difficult for a viewer to check the authenticity of a given digital image. Copy-move forgery is a specific type of image tampering where a part of the image is copied and pasted on(More)
In this paper we introduce a new software architecture for Autonomic Grid computing networks by military C4ISR (Command, Control, Communications, Computers and Intelligence, Surveillance, & Reconnaissance) architecture. We discuss Self-* property of autonomic grid computing networks in autonomic grid computing networks can lead and manage by C4ISR(More)
So far many methods are introduced to compose Web services. In order to automate Web service composition, concepts from semantic Web technology are used. By using this technology, we can compose Web services in order to response users’ request automatically or semi-automatically. By the growth of Web services amount, the possible composition of Web services(More)
Multi-join query optimization is an important technique for designing and implementing database management system. It is a crucial factor that affects the capability of database. This paper proposes a Bees algorithm that simulates the foraging behavior of honey bee swarm to solve Multi-join query optimization problem. The performance of the Bees algorithm(More)
Feature selection is a problem of finding efficient features among all features in which the final feature set can improve accuracy and reduce complexity. In feature selection algorithms search strategies are key aspects. Since feature selection is an NP-Hard problem; therefore heuristic algorithms have been studied to solve this problem. In this paper, we(More)
Due to rapid and increasingly growth of electronic texts and documents, we need some techniques for integration, communication and appropriate utilization of these texts. Summarizing the literature is one of the most fundamental tasks for integrating and taking advantages of these gathered texts. Selecting key words and then integrating them as a summary(More)
In the era of network security, intrusion detection system plays a vital to detect real – time intrusions, and to execute work to stop the attack. Being everything shifting to internet, security became the foremost preference. In real world, the minority attacks R2L (Remote-To-User) and U2R (User-To-Root) are more hazardous than Probe and DoS(More)
A Pervasive Computing Environment includes a variety of communication networks and service systems and has places suitable for providing variety of services to client. One of the most important problems in such environments is service discovery, i.e. how a client can use his service of interest. In a Pervasive Computing Environment Context, information(More)