Ahmad Faraahi

Learn More
Distributed denial of service (DDoS) attacks are serious threats for availability of the internet services. These types of attacks command multiple agents to send a great number of packets to a victim and thus can easily exhaust the resources of the victim. In this paper we propose an anomaly-based DDoS detection method based on the various features of(More)
Multi-join query optimization is an important technique for designing and implementing database management system. It is a crucial factor that affects the capability of database. This paper proposes a Bees algorithm that simulates the foraging behavior of honey bee swarm to solve Multi-join query optimization problem. The performance of the Bees algorithm(More)
A Pervasive Computing Environment includes a variety of communication networks and service systems and has places suitable for providing variety of services to client. One of the most important problems in such environments is service discovery, i.e. how a client can use his service of interest. In a Pervasive Computing Environment Context, information(More)
— Feature selection is a problem of finding efficient features among all features in which the final feature set can improve accuracy and reduce complexity. In feature selection algorithms search strategies are key aspects. Since feature selection is an NP-Hard problem; therefore heuristic algorithms have been studied to solve this problem. In this paper,(More)
So far many methods are introduced to compose Web services. In order to automate Web service composition, concepts from semantic Web technology are used. By using this technology, we can compose Web services in order to response users' request automatically or semi-automatically. By the growth of Web services amount, the possible composition of Web services(More)
Efficient data management is a key issue for environments distributed on a large scale such as the data cloud. This can be taken into account by replicating the data. The replication of data reduces the time of service and the delay in availability, increases the availability, and optimizes the distribution of load in the system. It is worth mentioning,(More)
In this research, intelligent sliding mode controls are presented as robust controls for robot manipulators. The objective of the study is to design controls for robot manipulators without the knowledge of the boundary of the uncertainties by using an intelligent sliding mode control (SMC) while elucidating the robustness of the fuzzy SMC. A sliding mode(More)
During the last decade with the growth of cyber attacks, information safety has become an important issue all over the world. Intrusion detection systems (IDSs) are an essential element for network security infrastructure and play a very important role in detecting large number of attacks. Although there are different types of intrusion detection systems,(More)
In the era of network security, intrusion detection system plays a vital to detect real – time intrusions, and to execute work to stop the attack. Being everything shifting to internet, security became the foremost preference. In real world, the minority attacks R2L (Remote-To-User) and U2R (User-To-Root) are more hazardous than Probe and DoS(More)
A GIS (Geographic Information System), is a system designed to capture, store, manipulate, analyze, manage, and present all types of geographically referenced data. In other words, GIS is the merging of statistical analysis, database technology and cartography that can be integrated into any enterprise information system framework. But despite all these(More)