total 586took 0.10s

Adversarial Samples on Android Malware Detection Systems for IoT SystemsFeb 12 2019Many IoT(Internet of Things) systems run Android systems or Android-like systems. With the continuous development of machine learning algorithms, the learning-based Android malware detection system for IoT devices has gradually increased. However, these ... More

Interference-Based Optimal Power-Efficient Access Scheme for Cognitive Radio NetworksApr 03 2014Jul 08 2014In this paper, we propose a new optimization-based access strategy of multipacket reception (MPR) channel for multiple secondary users (SUs) accessing the primary user (PU) spectrum opportunistically. We devise an analytical model that realizes the multipacket ... More

When Energy Trading meets Blockchain in Electrical Power System: The State of the ArtFeb 19 2019With the rapid growth of renewable energy resources, the energy trading began to shift from centralized to distributed manner. Blockchain, as a distributed public ledger technology, has been widely adopted to design new energy trading schemes. However, ... More

Vulnerability Prediction Based on Weighted Software Network for Secure Software BuildingFeb 13 2019To build a secure communications software, Vulnerability Prediction Models (VPMs) are used to predict vulnerable software modules in the software system before software security testing. At present many software security metrics have been proposed to ... More

Vcash: A Novel Reputation Framework for Identifying Denial of Traffic Service in Internet of Connected VehiclesFeb 11 2019Trust management of Internet of connected vehicles has been a hot topic during the recent years with the rapid development of UGV technologies. However, existing resolutions based on trustworthiness verification among vehicles make the traffic event transmission ... More

PRIF: A Privacy-Preserving Interest-Based Forwarding Scheme for Social Internet of VehiclesApr 06 2018Recent advances in Socially Aware Networks (SANs) have allowed its use in many domains, out of which social Internet of vehicles (SIOV) is of prime importance. SANs can provide a promising routing and forwarding paradigm for SIOV by using interest-based ... More

LPTD: Achieving Lightweight and Privacy-Preserving Truth Discovery in CIoTApr 05 2018In recent years, cognitive Internet of Things (CIoT) has received considerable attention because it can extract valuable information from various Internet of Things (IoT) devices. In CIoT, truth discovery plays an important role in identifying truthful ... More

Design Challenges of Multi-UAV Systems in Cyber-Physical Applications: A Comprehensive Survey, and Future DirectionsOct 23 2018Unmanned Aerial Vehicles (UAVs) have recently rapidly grown to facilitate a wide range of innovative applications that can fundamentally change the way cyber-physical systems (CPSs) are designed. CPSs are a modern generation of systems with synergic cooperation ... More

Cloud-Assisted Remote Sensor Network Virtualization for Distributed Consensus EstimationJan 15 2015We develop cloud-assisted remote sensing techniques for enabling distributed consensus estimation of unknown parameters in a given geographic area. We first propose a distributed sensor network virtualization algorithm that searches for, selects, and ... More

Vehicle Tracking Using Surveillance with Multimodal Data FusionOct 29 2018Vehicle location prediction or vehicle tracking is a significant topic within connected vehicles. This task, however, is difficult if only a single modal data is available, probably causing bias and impeding the accuracy. With the development of sensor ... More

Privacy-Preserving DDoS Attack Detection Using Cross-Domain Traffic in Software Defined NetworksSep 19 2018Existing distributed denial-of-service attack detection in software defined networks (SDNs) typically perform detection in a single domain. In reality, abnormal traffic usually affects multiple network domains. Thus, a cross-domain attack detection has ... More

FPAN: Fine-grained and Progressive Attention Localization Network for Data RetrievalApr 05 2018The Localization of the target object for data retrieval is a key issue in the Intelligent and Connected Transportation Systems (ICTS). However, due to lack of intelligence in the traditional transportation system, it can take tremendous resources to ... More

Lclean: A Plausible Approach to Individual Trajectory Data SanitizationApr 05 2018In recent years, with the continuous development of significant data industrialization, trajectory data have more and more critical analytical value for urban construction and environmental monitoring. However, the trajectory contains a lot of personal ... More

Securing Cognitive Radio Networks against Primary User Emulation AttacksAug 28 2013Cognitive Radio (CR) is a promising technology for next-generation wireless networks in order to efficiently utilize the limited spectrum resources and satisfy the rapidly increasing demand for wireless applications and services. Security is a very important ... More

Mutual Heterogeneous Signcryption Schemes for 5G Network SlicingsNov 09 2018With the emerging of mobile communication technologies, we are entering the fifth generation mobile communication system (5G) era. Various application scenarios will arise in the 5G era to meet the different service requirements. Different 5G network ... More

Preserving Location Privacy in Mobile Edge ComputingApr 05 2018The burgeoning technology of Mobile Edge Computing is attracting the traditional LBS and LS to deploy due to its nature characters such as low latency and location awareness. Although this transplant will avoid the location privacy threat from the central ... More

A Privacy-Preserving Traffic Monitoring Scheme via Vehicular CrowdsourcingFeb 12 2019The explosive growth of vehicle amount has given rise to a series of traffic problems, such as traffic congestion, road safety, and fuel waste. Collecting vehicles' speed information is an effective way to monitor the traffic condition and avoid vehicles ... More

Trading Wireless Information and Power Transfer: Relay Selection to Minimize the Outage ProbabilityDec 09 2014This paper studies the outage probability minimization problem for a multiple relay network with energy harvesting constraints. The relays are hybrid nodes used for simultaneous wireless information and power transfer from the source radio frequency (RF) ... More

An Efficient Anonymous Authentication Scheme for Internet of VehiclesNov 08 2018Internet of Vehicles (IoV) is an intelligent application of IoT in smart transportation, which can make intelligent decisions for passengers. It has drawn extensive attention to improve traffic safety and efficiency and create a more comfortable driving ... More

Achieving Data Utility-Privacy Tradeoff in Internet of Medical Things: A Machine Learning ApproachFeb 08 2019The emergence and rapid development of the Internet of Medical Things (IoMT), an application of the Internet of Things into the medical and healthcare systems, have brought many changes and challenges to modern medical and healthcare systems. Particularly, ... More

Reinforcement Learning for Resource Provisioning in Vehicular CloudMay 28 2018This article presents a concise view of vehicular clouds that incorporates various vehicular cloud models, which have been proposed, to date. Essentially, they all extend the traditional cloud and its utility computing functionalities across the entities ... More

Privacy Leakage in Smart Homes and Its Mitigation: IFTTT as a Case StudyFeb 08 2019The combination of smart home platforms and automation apps introduces much convenience to smart home users. However, this also brings the potential for privacy leakage. If a smart home platform is permitted to collect all the events of a user day and ... More

Attention-Mechanism-based Tracking Method for Intelligent Internet of VehiclesOct 29 2018Vehicle tracking task plays an important role on the internet of vehicles and intelligent transportation system. Beyond the traditional GPS sensor, the image sensor can capture different kinds of vehicles, analyze their driving situation and can interact ... More

Secure Data Access for Wireless Body Sensor NetworksOct 25 2018Recently, with the support of mobile cloud computing, a large number of health related data collected from various body sensor networks can be managed efficiently. However, to ensure data security and data privacy in cloud-integrated body sensor networks ... More

Super-Resolution of Brain MRI Images using Overcomplete Dictionaries and Nonlocal SimilarityFeb 13 2019Recently, the Magnetic Resonance Imaging (MRI) images have limited and unsatisfactory resolutions due to various constraints such as physical, technological and economic considerations. Super-resolution techniques can obtain high-resolution MRI images. ... More

Spectrum Resource Management and Interference Mitigation for D2D Communications with Awareness of BER Constraint in mmWave 5G Underlay NetworkMay 19 2016The work presented in this paper deals with the issue of massive demands for higher capacity. For that matter, we investigate the spectrum resource management in outdoor mmWave cell for the uplink of cellular and D2D communications. Indeed, we provide ... More

MDBV: Monitoring Data Batch Verification for Survivability of Internet of VehiclesNov 09 2018Along with the development of vehicular sensors and wireless communication technology, Internet of Vehicles (IoV) is emerging that can improve traffic efficiency and provide a comfortable driving environment. However, there is still a challenge how to ... More

LRCoin: Leakage-resilient Cryptocurrency Based on Bitcoin for Data Trading in IoTOct 26 2018Currently, the number of Internet of Thing (IoT) devices making up the IoT is more than 11 billion and this number has been continuously increasing. The prevalence of these devices leads to an emerging IoT business model called Device-as-a-service(DaaS), ... More

A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) SecurityJul 29 2018The Internet of Things (IoT) integrates billions of smart devices that can communicate with one another with minimal human intervention. It is one of the fastest developing fields in the history of computing, with an estimated 50 billion devices by the ... More

A Large-scale Concurrent Data Anonymous Batch Verification Scheme for Mobile Healthcare Crowd SensingApr 05 2018Recently, with the rapid development of big data, Internet of Things (IoT) brings more and more intelligent and convenient services to people's daily lives. Mobile healthcare crowd sensing (MHCS), as a typical application of IoT, is becoming an effective ... More

Discovering Communities of Malapps on Android-based Mobile Cyber-physical SystemsApr 05 2018Android-based devices like smartphones have become ideal mobile cyber-physical systems (MCPS) due to their powerful processors and variety of sensors. In recent years, an explosively and continuously growing number of malicious applications (malapps) ... More

A Novel Secure Authentication Scheme for Heterogeneous Internet of ThingFeb 10 2019Today, Internet of Things (IoT) technology is being increasingly popular which is applied in a wide range of industry sectors such as healthcare, transportation and some critical infrastructures. With the widespread applications of IoT technology, people's ... More

Reinforcement Learning based QoS/QoE-aware Service Function Chaining in Software-Driven 5G SlicesApr 06 2018With the ever growing diversity of devices and applications that will be connected to 5G networks, flexible and agile service orchestration with acknowledged QoE that satisfies end-user's functional and QoS requirements is necessary. SDN (Software-Defined ... More

Towards Delay-Tolerant Flexible Data Access Control for Smart Grid with Renewable Energy ResourcesOct 25 2018In the Smart Grid with Renewable Energy Resources (RERs), the Residential Units (RUs) with Distributed Energy Resources (DERs) are considered to be both power consumers and suppliers. Specifically, RUs with excessive renewable generations can trade with ... More

vFAC: Fine-Grained Access Control with Versatility for Cloud StorageNov 08 2018In recent years, cloud storage technology has been widely used in many fields such as education, business, medical and more because of its convenience and low cost. With the widespread applications of cloud storage technology, data access control methods ... More

Security in Mobile Edge Caching with Reinforcement LearningJan 18 2018Mobile edge computing usually uses cache to support multimedia contents in 5G mobile Internet to reduce the computing overhead and latency. Mobile edge caching (MEC) systems are vulnerable to various attacks such as denial of service attacks and rogue ... More

Achieving Trust-Based and Privacy-Preserving Customer Selection in Ubiquitous ComputingFeb 12 2019The recent proliferation of smart devices has given rise to ubiquitous computing, an emerging computing paradigm which allows anytime & anywhere computing possible. In such a ubiquitous computing environment, customers release different computing or sensing ... More

PPLS: A Privacy-Preserving Location-Sharing Scheme in Vehicular Social NetworksApr 06 2018Recent advances in Socially Aware Networks (SANs) have allowed its use in many domains, out of which social Internet of vehicles (SIOV) is of prime importance. SANs can provide a promising routing and forwarding paradigm for SIOV by using interest-based ... More

SDN Controllers: Benchmarking & Performance EvaluationFeb 12 2019Software Defined Networks offer flexible and intelligent network operations by splitting a traditional network into a centralized control plane and a programmable data plane. The intelligent control plane is responsible for providing flow paths to switches ... More

Assured Data Deletion with Fine-grained Access Control for Fog-based Industrial ApplicationsApr 09 2018The advances of cloud computing, fog computing and Internet of Things (IoT) make the industries more prosperous than ever. A wide range of industrial systems such as transportation systems and manufacturing systems have been developed by integrating cloud ... More

BPDS: A Blockchain based Privacy-Preserving Data Sharing for Electronic Medical RecordsNov 08 2018Electronic medical record (EMR) is a crucial form of healthcare data, currently drawing a lot of attention. Sharing health data is considered to be a critical approach to improve the quality of healthcare service and reduce medical costs. However, EMRs ... More

A Computation Offloading Incentive Mechanism with Delay and Cost Constraints under 5G Satellite-ground IoV architectureApr 05 2018The 5G Internet of Vehicles has become a new paradigm alongside the growing popularity and variety of computation-intensive applications with high requirements for computational resources and analysis capabilities. Existing network architectures and resource ... More

A Traceable Concurrent Data Anonymous Transmission Scheme for Heterogeneous VANETsNov 08 2018Vehicular Ad Hoc Networks (VANETs) are attractive scenarios that can improve the traffic situation and provide convenient services for drivers and passengers via vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication. However, there ... More

Achieving Secure and Efficient Cloud Search Services: Cross-Lingual Multi-Keyword Rank Search over Encrypted Cloud DataFeb 11 2019Multi-user multi-keyword ranked search scheme in arbitrary language is a novel multi-keyword rank searchable encryption (MRSE) framework based on Paillier Cryptosystem with Threshold Decryption (PCTD). Compared to previous MRSE schemes constructed based ... More

Softwarization of Internet of Things Infrastructure for Secure and Smart HealthcareMay 28 2018We propose an agile softwarized infrastructure for flexible, cost effective, secure and privacy preserving deployment of Internet of Things (IoT) for smart healthcare applications and services. It integrates state-of-the-art networking and virtualization ... More

Exclusive pi+ pi- production at 7TeVOct 27 2016We report a measurement of the exclusive production of pairs of charged pions in proton-proton collisions, dominated by the process $pp \rightarrow p^{(*)} \pi^{+}\pi^{-} p^{(*)}$, where $\rm p^{(*)}$ stands for a diffractively dissociated proton, the ... More

Desingularization of regular algebrasOct 07 2013The goals of this paper are two-fold. First, motivated by the uniformization theorem of Zariski, we investigate the rings that can be written as a direct limit of noetherian regular rings. Second, as reverse to the ?rst one, we study properties of a direct ... More

Huneke's degree-computing problemSep 14 2016In this short note, we deal with a problem posted by Huneke on a numerical invariant attached to symbolic powers of homogenous ideals.

Analytical solution for the structure of ADAFsMay 30 2014The standard Advection-Dominated Accretion Flow (ADAF) is studied using a set of self-similar analytical solutions in the spherical coordinates. Our new solutions are useful for studying ADAFs without dealing with the usual mathematical complexity. We ... More

The influence of winds on the time-dependent behavior of self-gravitating accretion discsJun 01 2008Jan 27 2009We study effects of winds on the time evolution of isothermal, self-gravitating accretion discs by adopting a radius dependent mass loss rate because of the existence of the wind. Our similarity and semi-analytical solution describes time evolution of ... More

Thermal instability with the effect of cosmic-ray diffusionMar 23 2009May 14 2009We study dynamical effects of cosmics rays (CRs) on the thermal instability in the linear regime. CRs and the thermal plasma are treated as two different interacting fluids, in which CRs can diffuse along the magnetic field lines. We show that growth ... More

Gravitational collapse of polytropic, magnetized, filamentary cloudsNov 02 2004When the gas of a magnetized filamentary cloud obeys a polytropic equation of state, gravitational collapse of the cloud is studied using a simplified model. We concentrate on the radial distribution and restrict ourselves to the purely toroidal magnetic ... More

Nuclear kinetic energy spectra of D_2^+ in intense laser field: Beyond Born Oppenheimer approximationNov 12 2007Mar 05 2008Simultaneously, the vibrational nuclear dynamics and full dimensional electronic dynamics of the deuterium molecular ion exposed to the linear polarized intense laser field are studied. The time dependent Schr\"odinger equation of the aligned D2+ with ... More

Policies and Economics of Digital Multimedia TransmissionApr 20 2010There are different Standards of digital multimedia transmission, for example DVB in Europe and ISDB in Japan and DMB in Korea, with different delivery system (example MPEG-2, MPEG-4).This paper describe an overview of Digital Multimedia Transmission ... More

Exclusive pi+ pi- production at 7TeVOct 27 2016Oct 28 2016We report a measurement of the exclusive production of pairs of charged pions in proton-proton collisions, dominated by the process $pp \rightarrow p^{(*)} \pi^{+}\pi^{-} p^{(*)}$, where $\rm p^{(*)}$ stands for a diffractively dissociated proton, the ... More

An Improved Distributed Algorithm for Maximal Independent SetJun 16 2015Jul 12 2015The Maximal Independent Set (MIS) problem is one of the basics in the study of locality in distributed graph algorithms. This paper presents an extremely simple randomized algorithm providing a near-optimal local complexity for this problem, which incidentally, ... More

Near-Optimal Distributed Approximation of Minimum-Weight Connected Dominating SetApr 30 2014This paper presents a near-optimal distributed approximation algorithm for the minimum-weight connected dominating set (MCDS) problem. The presented algorithm finds an $O(\log n)$ approximation in $\tilde{O}(D+\sqrt{n})$ rounds, where $D$ is the network ... More

Group theoretical interpretation of the modified gravity in de Sitter spaceJan 14 2016Mar 09 2016A frame work has been presented for theoretical interpretation of various modified gravitational models which is based on the group theoretical approach and unitary irreducible representations (UIR's) of de Sitter (dS) group. In order to illustrate the ... More

A Blockchain-based Self-tallying Voting Scheme in Decentralized IoTFeb 11 2019The Internet of Things (IoT) is experiencing explosive growth and has gained extensive attention from academia and industry in recent years. Most of the existing IoT infrastructures are centralized, in which the presence of a cloud server is mandatory. ... More

A Performance Analysis Model of TCP over Multiple Heterogeneous Paths for 5G Mobile ServicesApr 07 2018Driven by the primary requirement of emerging 5G mobile services, the demand for concurrent multipath transfer (CMT) is still prominent. Yet, multipath transport protocols are not widely adopted and TCP-based CMT schemes will still be in dominant position ... More

Bus Trajectory-Based Street-Centric Routing for Message Delivery in Urban Vehicular Ad hoc NetworksApr 07 2018This paper focuses on the routing algorithm for the communications between vehicles and places in urban VANET. As one of the basic transportation facilities in an urban setting, buses periodically run along their fixed routes and widely cover city streets. ... More

A high-performance virtual machine filesystem monitor in cloud-assisted cognitive IoTApr 05 2018Cloud-assisted Cognitive Internet of Things has powerful data analytics abilities based on the computing and data storage capabilities of cloud virtual machines, which makes protecting virtual machine filesystem very important for the whole system security. ... More

Automated Attack and Defense Framework for 5G Security on Physical and Logical LayersFeb 11 2019The 5th generation (5G) network adopts a great number of revolutionary technologies to fulfill continuously increasing requirements of a variety of applications, including ultra-high bandwidth, ultra-low latency, ultra-massive device access, ultra-reliability, ... More

Evaluating Reputation Management Schemes of Internet of Vehicles based on Evolutionary Game TheoryFeb 12 2019Conducting reputation management is very important for Internet of vehicles. However, most of the existing researches evaluate the effectiveness of their schemes with settled attacking behaviors in their simulation which cannot represent the scenarios ... More

Dynamics of charged dust particles in protoplanetary discsNov 13 2007Feb 13 2008We study the effect of an imposed magnetic field on the motion of charged dust particles in magnetically active regions of a protoplanetary disc. Assuming a power law structure for the vertical and the toroidal components of the magnetic field for the ... More

A Model for Quasi-Spherical Magnetized Accretion FlowMar 11 2003May 17 2004A model for axisymmetric magnetized accretion flow is proposed. The dominant mechanism of energy dissipation is assumed to be the magnetic diffusivity due to turbulence in the accretion flow. In analogy to the advection-dominated accretion flow (ADAF) ... More

C*-Convexity of Norm Unit BallsApr 11 2016We determine those norms on B(H) whose unit ball is C*-convex. We call them M-norms and show that the class of M-norms less than a given norm enjoys a maximum element. These minimum and maximum elements will be determined in some cases. Finally, we give ... More

Epigraph of Operator FunctionsDec 17 2015It is known that a real function $f$ is convex if and only if the set $$\mathrm{E}(f)=\{(x,y)\in\mathbb{R}\times\mathbb{R};\ f(x)\leq y\},$$ the epigraph of $f$ is a convex set in $\mathbb{R}^2$. We state an extension of this result for operator convex ... More

On the rigidity of symbolic powersNov 20 2016We deal with the rigidity conjecture of symbolic powers over regular rings. This was asked by Huneke. Along with our investigation, we confirm a conjecture [7, Conjecture 3.8].

On the addition of squares of units modulo nJul 29 2016Let $\mathbb{Z}_n$ be the ring of residue classes modulo $n$, and let $\mathbb{Z}_n^{\ast}$ be the group of its units. 90 years ago, Brauer obtained a formula for the number of representations of $c\in \mathbb{Z}_n$ as the sum of $k$ units. Recently, ... More

Wireless IP TelephonyMar 09 2010The convergence of traditional telecommunications and the Internet is creating new network-based service delivery opportunities for telecommunications companies carriers, service providers, and network equipment providers. Voice over Wireless IP is one ... More

High-speed FSK Modulator Using Switched-capacitor ResonatorsNov 20 2015Aug 11 2016In this paper, an ultra-fast frequency shift-keying (FSK) modulation technique based on switched capacitor resonators is presented. It is demonstrated that switching a reactive component such as a capacitor, in a high-Q resonator with proper switching ... More

Operator log-convex functions and f-divergence functionalMay 31 2013Aug 25 2014We present a characterization of operator log-convex functions by using positive linear mappings. Moreover, we study the non-commutative f-divergence functional of operator log-convex functions. In particular, we prove that f is operator log-convex if ... More

Maximum a posteriori learning in demand competition gamesNov 28 2016We consider an inventory competition game between two firms. The question we address is this: If players do not know the opponent's action and opponent's utility function can they learn to play the Nash policy in a repeated game by observing their own ... More

A Conic Section Approach to the Relativistic Reflection LawAug 19 2016We consider the reflection of light, from a stationary source, off of a uniformly moving flat mirror, and derive the relativistic reflection law using well-known properties of conic sections. The effective surface of reflection (ESR) is defined as the ... More

Properties of the Dot Product Graph of a Commutative RingJan 19 2016Let $R$ be a commutative ring with identity and $n\geq1$ be an integer. Let $R^{n}=R\times\cdots\times R~(n~times)$. The \textit{total dot product} graph, denoted by $TD(R,n)$ is a simple graph with elements of $R^{n}-\{(0,0,\ldots,0)\}$ as vertices, ... More

Holographic ComplexitySep 22 2015Jan 15 2016For a field theory with a gravitational dual, following Susskind's proposal we define holographic complexity for a subsystem. The holographic complexity is proportional to the volume of a co-dimension one time slice in the bulk geometry enclosed by the ... More

A note on Hilbert-Kunz multiplicityMar 14 2016In this note we first give a new bound on $e_{HK}(\sim)$ the Hilbert-Kunz multiplicity of invariant rings, by the help of the Noether's bound. Then, we simplify, extend and present applications of the reciprocity formulae due to L. Smith. He proved the ... More

Hot accretion with outflow and thermal conductionAug 02 2008We present self-similar solutions for advection -dominated accretion flows with thermal conduction in the presence of outflows. Possible effects of outflows on the accretion flow are parametrized and a saturated form of thermal conduction, as is appropriate ... More

On the orbital motion of cold clouds in BLRsMay 31 2015We study orbit of a pressure-confined cloud in the broad-line region (BLR) of active galactic nuclei (AGNs) when the combined effects of the central gravity and anisotropic radiation pressure and the drag force are considered. Physical properties of the ... More

Infinitely many homoclinic orbits for a class of superquadratic Hamiltonian systemsFeb 21 2013In this paper, we prove the existence of infinitely many homoclinic orbits for the first order Hamiltonian systems $J\dot{x}-M(t)x+ R'(t,x)=0$, by the minimax methods in critical point theory, when $R(t,y)$ satisfies the superquadratic condition ${{R(t,x)}\over{\|x\r|^{2}}}\longrightarrow ... More

On Operator-valued Semicircular Random VariablesSep 22 2011In this paper, we discuss some special properties of operator- valued semicircular random variables including representation of the Cauchy transform of a compactly supported probability measure in terms of their operator-valued Cauchy transforms and existence ... More

Fermions on the Worldsheet of Effective Strings via Coset ConstructionMar 27 2016In this paper the detailed CCWZ procedure for introducing fermions on the world sheet of a string propagating in flat space-time is presented. The theory of nonlinear realizations is used to derive the transformation as well as the interactions of fermionic ... More

A Distributed Method for Trust-Aware Recommendation in Social NetworksNov 10 2010This paper contains the details of a distributed trust-aware recommendation system. Trust-base recommenders have received a lot of attention recently. The main aim of trust-based recommendation is to deal the problems in traditional Collaborative Filtering ... More

Homological properties of the perfect and absolute integral closures of Noetherian domainsApr 09 2009Aug 25 2012For a Noetherian local domain $R$ let $R^+$ be the absolute integral closure of $R$ and let $R_{\infty}$ be the perfect closure of $R$, when $R$ has prime characteristic. In this paper we investigate the projective dimension of residue rings of certain ... More

A Dynamical Approach to the Exterior Geometry of a Perfect Fluid as a Relativistic StarNov 22 2011Nov 30 2014In this article, we assume that a cold charged perfect fluid is constructing a spherical relativistic star. Our purpose is the investigation of the dynamical properties of its exterior geometry, through simulating the geodesic motion of a charged test ... More

On Vulnerabilities of the Security Association in the IEEE 802.15.6 StandardJan 12 2015Wireless Body Area Networks (WBAN) support a variety of real-time health monitoring and consumer electronics applications. The latest international standard for WBAN is the IEEE 802.15.6. The security association in this standard includes four elliptic ... More

The role of Hall diffusion in the magnetically threaded thin accretion discsOct 24 2011We study role of the Hall diffusion in the magnetic star-disc interaction. In a simplified steady state configuration, the total torque is calculated in terms of the fastness parameter and a new term because of the Hall diffusion. We show the total torque ... More

Variability in the stellar initial mass function at high mass: coalescence models for starburst clustersJul 06 2004A coalescence model using the observed properties of pre-stellar condensations (PSCs) shows how an initially steep IMF that might be characteristic of primordial cloud fragmentation can change into a Salpeter IMF or shallower IMF in a cluster of normal ... More

Time-dependent evolution of quasi-spherical, self-gravitating accretion flowJan 22 2004May 21 2004A self-similar solution for time evolution of quasi-spherical, self-gravitating accretion flows is obtained under the assumption that the generated heat by viscosity is retained in the flow. The solutions are parameterized by the ratio of the mass of ... More

Analysis of the instability due to gas-dust friction in protoplanetary discsDec 14 2015We study stability of a dust layer in a gaseous disc subject to the linear axisymmetric perturbations. Instead of considering single-size particles, however, the population of dust particles is assumed to consist of two grain species. Dust grains exchange ... More

Containment of $\c_0$ and $\ell_1$ in $Π_1(E,F)$Jul 26 2006Suppose $\Pi_1(E, F)$ is the space of all absolutely 1-summing operators between two Banach spaces $E$ and $F$. We show that if $F$ has a copy of $c_0$, then $\Pi_1(E, F)$ will have a copy of $c_0$, and under some conditions if $E$ has a copy of $\ell_1$ ... More

Knowledge ManagementMar 09 2010This paper discusses the important process of knowledge and its management, and differences between tacit and explicit knowledge and understanding the culture as a key issue for the successful implementation of knowledge management, in addition to, this ... More

On the (LC) conjectureDec 08 2015Jul 12 2016We prove the (LC) conjecture of Hochster and Huneke in some non-trivial cases. This has several applications. Recently, Brenner and Caminata answered a numerical evidence due to Dao and Smirnov on the shape of generalized Hilbert-Kunz functions of smooth ... More

Conformally Invariant Equations for GravitonOct 12 2012Nov 12 2012Recent astrophysical data indicate that our universe might currently be in a de Sitter (dS) phase. The importance of dS space has been primarily ignited by the study of the inflationary model of the universe and the quantum gravity. As we know Einstein's ... More

5G Wireless Backhaul Networks: Challenges and Research AdvanceDec 23 20145G networks are expected to achieve gigabit-level throughput in future cellular networks. However, it is a great challenge to treat 5G wireless backhaul traffic in an effective way. In this article, we analyze the wireless backhaul traffic in two typical ... More

Thermal instability in ionized plasmaNov 16 2009We study magnetothermal instability in the ionized plasmas including the effects of Ohmic, ambipolar and Hall diffusion. Magnetic field in the single fluid approximation does not allow transverse thermal condensations, however, non-ideal effects highly ... More

Task Allocation in Robotic Swarms: Explicit Communication Based ApproachesMar 01 2015In this paper we study multi robot cooperative task allocation issue in a situation where a swarm of robots is deployed in a confined unknown environment where the number of colored spots which represent tasks and the ratios of them are unknown. The robots ... More

Magneto-thermal condensation modes including the effects of charged dust particlesJun 15 2008Feb 03 2009We study thermal instability in a magnetized and partially ionized plasma with charged dust particles. Our linear analysis shows that the growth rate of the unstable modes in the presence of dust particles strongly depends on the ratio of the cooling ... More