Benafsh Husain

Learn More
In this paper, we present an analysis of gallium nitride (GaN) quantum-well (QW) laser diode (LD) by numerical simulation. Here we discuss three aspects that are crucial to our analysis. First, the transverse mode pattern is studied, and our current GaN diode laser structure is discussed with optical waveguide mode analysis. Then we compare the QW design of(More)
Spyware is considered as a great threat to confidentiality that it can cause loss of control over private data for computer users. This kind of threat might select some data and send it to another third party without the consent of the user. Spyware detection techniques have been presented traditionally by three approaches; signature, behavior and(More)
Botnets are groups of compromised computers that botmasters (botherders) use to launch attacks over the Internet. To avoid detection, botnets use DNS fast flux to change the mapping between IP addresses and domain names periodically. Domain generation algorithms (DGAs) are employed to generate a large number of domain names. Detection techniques have been(More)
Understanding performance data, and more specifically memory access pattern is essential in optimizing scientific applications. Among the various factors affecting performance, such as the hardware architecture, the algorithms, or the system software stack, performance is also often related to the applications' physics. While there exists a number of(More)
Parallel distributed systems are widely used for dealing with massive data sets and high performance computing. Securing parallel distributed systems is problematic. Centralized security tools are likely to cause bottlenecks and introduce a single point of failure. Exascale storage systems should have advantages in performance and flexibility over(More)
  • 1