M. Kuchaki Rafsanjani

Learn More
— Scheduling is one of the core steps to efficiently exploit the capabilities of heterogeneous computing systems. The problem of mapping meta-tasks to a machine is shown to be NP-complete. The NP-complete problem can be solved only using heuristic approach. There are a number of heuristic algorithms that were tailored to deal with scheduling of independent(More)
Mobile ad hoc are gaining popularity because of availability of low cost mobile devices and its ability to provide instant wireless networking capabilities where implementation of wired network is not possible or costly. MANETs are vulnerable to various types of attack because of its features like continuous changing topology, resource constraints and(More)
Mobile ad hoc networks have different characteristics from wired networks. There are new challenges related to security issues that need to be addressed. In this paper, a monitoring nodes selection method with high battery power in these networks is presented. We propose a two-phase detection scheme. In the first phase, authorized nodes are detected and in(More)
Intrusion Detection Systems (IDS) for Mobile Ad hoc NETworks (MANETs) are necessary when they are deployed in reality. In This paper, we have presented a combined method of selecting IDS agent nodes in mobile ad hoc networks. Since, the IDS agents in MANET due to more activities need to more battery power. In our method, first, compromised nodes are(More)
Mobile ad hoc networks have different characteristics from wired networks. There are new challenges related to security issues that need to be addressed. In this paper, first, critical nodes and authentication in mobile ad hoc networks are discussed. Then, a monitoring nodes selection method with high battery power in these networks is presented. We propose(More)
Mobile Ad hoc Network (MANET) is constructed from a collection of nodes that can move anywhere and anytime in different areas without any infrastructure. Each node works at the same time as router and host. Lack of a fixed infrastructure, wireless medium and dynamic topology makes MANET vulnerable to different kinds of attacks. In this paper, we investigate(More)
Differential evolution (DE) has recently emerged as simple and efficient algorithm for global optimization over continuous spaces. DE shares many features of the classical genetic algorithms (GA). But it is much easier to implement than GA and applies a kind of differential mutation operator on parent chromosomes to generate the offspring. Grid computing(More)
Nowadays with appearance of a wide range of wireless devices, security of Mobile Ad hoc Networks (MANET) became an important problem and Intrusion Detection System (IDS) can be deployed as a second line of defense in a MANET. In this paper, a monitoring nodes selection method with high battery power in these networks is presented. A three-phase detection(More)
In the last time some papers were devoted to the study of the connections between binary block codes and BCK-algebras. In this paper, we try to generalize these results to n-ary block codes, providing an algorithm which allows us to construct a BCK-algebra from a given n-ary block code. Y. Imai and K. Iseki introduced BCK-algebras in 1966, through the paper(More)
Mobile ad hoc network (MANET) is constructed from various number of nodes, that can be move anywhere and at any time, without any infrastructure. MANETs use wireless connections to connect various networks, without any fixed infrastructure or any centralized administration. Due to this nature of MANET, Ad hoc networks are open to different types of security(More)