M. H. Samadzadeh

Learn More
Summary form only given. Measurements of understandability and maintainability of software have traditionally been developed of the basis of graph models, lexical counts, or information theory. The research reported proposes a theoretical foundation for a different way of evaluating software that can lead to a system of metrics. A model is provided that is(More)
Storage and retrieval of data in Wireless Sensor Networks (WSNs) have been found to be challenging issues in recent studies. The two principal approaches used in almost all proposed schemes in this field are Centralized and Decentralized. Many investigations have considered the security and communication issues in centralized schemes where a central node(More)
— The threshold secret sharing technique has been used extensively in cryptography. This technique is used for splitting secrets into shares and distributing the shares in the network to provide protection against attacks and to reduce the possibility of loss of information. In this paper, a new approach is introduced to enhance communication security among(More)