Skip to main content

Showing 1–7 of 7 results for author: Atani, R E

Searching in archive cs. Search in all archives.
.
  1. arXiv:1906.09355  [pdf, ps, other

    cs.NI

    An Incentive Security Model to Provide Fairness for Peer-to-Peer Networks

    Authors: Samaneh Berenjian, Saeed Hajizadeh, Reza Ebrahimi Atani

    Abstract: Peer-to-Peer networks are designed to rely on resources of their own users. Therefore, resource management plays an important role in P2P protocols. Therefore, resource management plays an important role in P2P protocols. Early P2P networks did not use proper mechanisms to manage fairness. However, after seeing difficulties and rise of freeloaders in networks like Gnutella, the importance of provi… ▽ More

    Submitted 27 June, 2019; v1 submitted 21 June, 2019; originally announced June 2019.

  2. arXiv:1902.10038  [pdf

    cs.CR

    A Wireless Sensor Network based approach to monitor and control air Pollution in large urban areas

    Authors: Seyed Pourya Miralavy, Reza Ebrahimi Atani, Navid Khoshrouz

    Abstract: Air pollution is a major concern in large urban areas. Various studies have been made to monitor and control the pollution level emitted by the vehicles but some main factors like ease of implementation or feasibility of the proposed approaches are not focused in the told studies. In this paper we propose a wireless sensor network solution to monitor vehicles exhaust systems pollution emission. Fu… ▽ More

    Submitted 29 January, 2019; originally announced February 2019.

    Comments: 8 pages

    Journal ref: 4th Conference on Contemporary Issues in Computer Information and Sciences, 23-25 Jan. 2019, Kharazmi University, Karaj, Iran

  3. arXiv:1712.07601  [pdf

    cs.CR

    An Analytical Perspective to Traffic Engineering in Anonymous Communication Systems

    Authors: Mehran Alidoost Nia, Eduard Babulak, Benjamin Fabian, Reza Ebrahimi Atani

    Abstract: Anonymous communication systems (ACS) offer privacy and anonymity through the Internet. They are mostly free tools and are popular among users all over the world. In the recent years, anonymity applications faced many problems regarding traffic engineering methods. Even though they ensure privacy under some conditions, their anonymity will be endangered by high performance processing units. To add… ▽ More

    Submitted 20 December, 2017; originally announced December 2017.

  4. arXiv:1611.06439  [pdf

    cs.CR cs.AI cs.LG

    A Survey of Credit Card Fraud Detection Techniques: Data and Technique Oriented Perspective

    Authors: SamanehSorournejad, Zahra Zojaji, Reza Ebrahimi Atani, Amir Hassan Monadjemi

    Abstract: Credit card plays a very important rule in today's economy. It becomes an unavoidable part of household, business and global activities. Although using credit cards provides enormous benefits when used carefully and responsibly,significant credit and financial damages may be caused by fraudulent activities. Many techniques have been proposed to confront the growth in credit card fraud. However, al… ▽ More

    Submitted 19 November, 2016; originally announced November 2016.

  5. arXiv:1404.4791  [pdf

    cs.CR

    Light Weight Implementation of Stream Ciphers for M-Commerce Applications

    Authors: Mona Pourghasem, Elham Ghare Sheikhloo, Reza Ebrahimi Atani

    Abstract: In today's world the use of computer and telecommunications networking is essential for human life. Among these, mobile tools and devices due to availability, have found a special impact on everyone life. This feature addition to providing sample facilities such as financial transactions at any place and time has raised the Sensitivities about security of these devices. In order to provide securit… ▽ More

    Submitted 20 March, 2014; originally announced April 2014.

  6. arXiv:1404.2261  [pdf

    cs.CR cs.DC cs.NI

    A Novel Anonymous Cloud Architecture Design; Providing Secure Online Services and Electronic Payments

    Authors: Mehran Alidoost Nia, Aida Ghorbani, Reza Ebrahimi Atani

    Abstract: Anonymous cloud architecture provides secure environment for business and also e-commerce approaches. By using this type of architecture, we can propose anonymous online applications. Customers who need secure and reliable online services should pay for provided services. A big problem is electronic payment that is needed for billing customers. But customer identity should be remained anonymous du… ▽ More

    Submitted 8 April, 2014; originally announced April 2014.

    Comments: in proceeding of the first international conference on Electronic Commerce and Economy, Tehran, April 2013

  7. A novel datatype architecture support for programming languages

    Authors: Mehran Alidoost Nia, Reza Ebrahimi Atani

    Abstract: In programmers point of view, Datatypes in programming language level have a simple description but inside hardware, huge machine codes are responsible to describe type features. Datatype architecture design is a novel approach to match programming features along with hardware design. In this paper a novel Data type-Based Code Reducer (TYPELINE) architecture is proposed and implemented according t… ▽ More

    Submitted 1 February, 2014; originally announced February 2014.

    Comments: This paper is accepted and published in International journal of Programming Languages and applications

    Journal ref: International journal of Programming Languages and applications Vol. 4 No.1 2014