Loading...
Search for: telecommunication-equipment
0.006 seconds
Total 35 records

    Text steganography in SMS

    , Article 2nd International Conference on Convergent Information Technology, ICCIT 07, Gyongju, 21 November 2007 through 23 November 2007 ; 2007 , Pages 2260-2265 ; 0769530389 (ISBN); 9780769530383 (ISBN) Shirali Shahreza, M ; Shirali Shahreza, M. H ; Sharif University of Technology
    2007
    Abstract
    One of the services used in mobile phone is the short message service (SMS) which is widely used by the public in all parts of the world especially in Asia and Europe. This service enables people to write and exchange short messages via mobile phone. Due to the limited size of SMS, lack of a proper keyboard on the mobile phone and to improve the speed of typing, new abbreviations have been invented for different words and phrases which has lead to the invention of a new language called SMS-Textlng. One of the main issues in communication is information security and privacy. There are many methods for secret communication and many researchers are working on steganography. In steganography the... 

    Steganography in SMS by Sudoku puzzle

    , Article 6th IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2008, Doha, 31 March 2008 through 4 April 2008 ; 2008 , Pages 844-847 ; 9781424419685 (ISBN) Shirali Shahreza, M. H ; Shirali Shahreza, M ; Sharif University of Technology
    2008
    Abstract
    Sudoku puzzle is a logical game which has recently got very popular. Every day various mass media print these puzzles. As a result these puzzles are a suitable alternative for hidden data transfer. SMS (short message service) is one of the popular mobile-phone services. In this service people can write short messages and send it to each other through mobile phones. In this paper a method has been presented for Steganography (hiding data) in Sudoku puzzles and through SMS. In this method after hiding data in a Sudoku puzzle, the puzzle is sent in a way that it does not attract any attention. Steganography algorithm is based on order of place of numbers 1 through 9 in one of the specified row... 

    Steganography in MMS

    , Article 11th IEEE International Multitopic Conference, INMIC 2007, Lahore, 28 December 2007 through 30 December 2007 ; 2007 ; 1424415535 (ISBN); 9781424415533 (ISBN) Shirali Shahreza, M ; Sharif University of Technology
    2007
    Abstract
    After rapid growth of the Internet, establishing hidden communication is an important subject of security that has gained increasing importance. One of the methods for establishing hidden communication is steganography. On the other hand with the expanding the use of mobile phones mobile telecommunication companies starting to add additional features to their mobile phones such as MMS (Multimedia Messaging Service) in order to attract more customers. Considering above statements, steganography in MMS messages is a good solution for establishing hidden communication. In this paper a new method for steganography in MMS messages using both text and image steganography methods is presented. This... 

    Sending mobile software activation code by SMS using steganography

    , Article 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2007, Kaohsiung, 26 November 2007 through 28 November 2007 ; Volume 1 , February , 2007 , Pages 554-557 ; 0769529941 (ISBN); 9780769529943 (ISBN) Shirali Shahreza, M. H ; Shirali Shahreza, M ; Sharif University of Technology
    2007
    Abstract
    Now we are able to offer numerous softwares for mobile phones after the advances in mobile phone industry. Most of these softwares should be bought in order that we can use them. Some of these softwares are sharewares and after buying them you have to insert an activation code given by the manufacturing company based on your mobile IMEI code in order to activate the software. In this paper a new method is introduced for sending the mobile software activation code by SMS (Short Message Service). In this method the activation code is hidden in an SMS picture message by steganography method and sent to the user. The software extracting the activation code from the picture and compare it with... 

    Route choice estimation using cell phone data

    , Article MATEC Web of Conferences, 6 July 2016 through 10 July 2016 ; Volume 81 , 2016 ; 2261236X (ISSN) Taghipour, H ; Shafahi, Y ; Figueira, M ; Sharif University of Technology
    EDP Sciences  2016
    Abstract
    Nowadays development of cell phone network provides huge and ubiquitous data, with wide application in transportation science. One of the most important advantages of these kinds of data is enabling the process of collecting information without any active users' interference. A big data set consisting of 300,000 cell phone users' information in Shiraz are studied. This data set includes spatiotemporal information of travelers for every 5 minutes in a time span of 40 hours in two consecutive days. The spatial part of each user's information contains the position of the BTS (Base Transceiver Station) to which his cell phone is currently connected. Due to the existence of outliers, it is... 

    RACE: a real-time scheduling policy and communication architecture for large-scale wireless sensor networks

    , Article Proceedings of the 7th Annual Communication Networks and Services Research Conference, CNSR 2009, 11 May 2009 through 13 May 2009, Moncton, NB ; 2009 , Pages 458-460 ; 9780769536491 (ISBN) Mizanian, K ; Hajisheykhi, R ; Mohammad, B ; Jahangir, A. H ; Sharif University of Technology
    2009
    Abstract
    In wireless sensor networks (WSN), individual sensor nodes are inherently unreliable and have very limited capabilities to ensure real-time properties. In fact, one of the most predominant limitations in wireless sensor networks is energy consumption, which hinders the capacity of the network to provide real-time guarantees (e.g. low duty-cycles, low transmission range). Many approaches have been proposed to deal with energy/latency trade-offs, but they are likely to be insufficient for the applications where reduced delay guarantee is the main concern. We present and evaluate a packet scheduling policy and routing algorithm called RACE that inherently accounts for time constraints. We show... 

    Preventing mobile software cracking using CAPTCHA

    , Article 2006 Innovations in Information Technology, IIT, Dubai, 19 November 2006 through 21 November 2006 ; 2006 ; 1424406749 (ISBN); 9781424406746 (ISBN) Shirali Shahreza, M ; Shirali Shahreza, S ; Sharif University of Technology
    2006
    Abstract
    Now we are able to offer numerous softwares for mobile phones after the advances in mobile phone industry. Most of these softwares should be bought in order that we can use them. Some of these softwares are sharewares and after buying them you have to insert a serial number given by the manufacturing company in order to activate the software. But the crackers reproduce them illegally by cracking the software. One of the tactics used by crackers for finding the serial number of the softwares is brute force attacks. In this paper a method based on CAPTCHA (Completely Automated Public Turing Test to tell Computer and Humans Apart) is proposed for solving this problem. In this method while... 

    PL-MAC; ProLonging network lifetime with a MAC layer approach in Wireless Sensor Networks

    , Article 2nd International Conference on Sensor Technologies and Applications, SENSORCOMM 2008, Cap Esterel, 25 August 2008 through 31 August 2008 ; 2008 , Pages 109-114 ; 9780769533308 (ISBN) Irandoost, A ; Taheri, S ; Movaghar, A ; Sharif University of Technology
    2008
    Abstract
    Energy consumption is one of the most important design criteria in Wireless Sensor Networks. Sensor nodes are expected to be battery-equipped. Due to their working environments, recharging or replacing batteries for each node is difficult and uneconomical. So prolonging the service lifetime of sensor nodes is a critical issue. The MAC protocol for WSNs plays a very important role in the control of energy consumption. Many of proposed MAC protocols attempt only to prolong the network lifetime for energy-efficiency. In this paper, we are going to reduce end-to-end latency in addition to extending the network lifetime. To reach this purpose, we propose a new adaptively ProLong MAC protocol... 

    Planning updates in multi-application wireless sensor networks

    , Article Proceedings - IEEE Symposium on Computers and Communications, 28 June 2011 through 1 July 2011 ; July , 2011 , Pages 802-808 ; 15301346 (ISSN) ; 9781457706783 (ISBN) Shamsaie, A ; Habibi, J ; Sharif University of Technology
    2011
    Abstract
    One of the arising issues in wireless sensor networks is running multiple applications to reduce deployment, administrative and management costs. In this paper we assume a sensor network in which nodes of a group have a set of same applications in their external flash memory that some of them are loaded and running. Occasionally, these applications should be updated for reasons that are manifold ranging from fixing software bugs to retasking. It is often that updates for a subset of applications happen at the same time, for example when a routing protocol shared among a subset of applications is changed. To bring the sensor nodes up to date with the new versions of the applications, existing... 

    Passwordless login system for mobile phones using CAPTCHA

    , Article 49th International Symposium ELMAR-2007 focused on Mobile Multimedia, Zadar, 12 September 2007 through 14 September 2007 ; September , 2007 , Pages 243-246 ; 13342630 (ISSN); 9789537044053 (ISBN) Shirali Shahreza, M ; Shirali Shahreza, S ; Sharif University of Technology
    2007
    Abstract
    In last 20 years, the Internet and mobile communication growth in parallel. There are many sites specially designed for mobile phones that users must enter username and password to enter them. In this paper we introduce a new method based on CAPTCHA which does not require entering any password. Instead of entering the password, an image of a number is shown to the user and he/she must type it. The user response is coded with his/her mobile phone IMEI and sent to the server. The server checks user's response according to user's IMEI and if it was correct, let the user to enter the site, so there is no need to enter any password. This method has been implemented in PHP and J2ME languages and... 

    Optimum operation of single cavity photonic switches

    , Article Proceedings of SPIE - The International Society for Optical Engineering, 25 January 2010 through 27 January 2010 ; Volume 7607 , January , 2010 ; 0277786X (ISSN) ; 9780819480033 (ISBN) Naqavi, A ; Monem Haghdoost, Z ; Edalatipour, M ; Khorasani, S ; Mehrany, K ; Sharif University of Technology
    2010
    Abstract
    In this work, an optimum frequency is found for the operation of single cavity photonic switches. At this optimum point, the transmission contrast of ON and OFF states takes its highest value, while keeping the device power threshold relatively low and the device speed acceptably high. Then, the dynamic behavior of a typical single cavity all optical switch is investigated in the optimum operation point through temporal Coupled Mode Theory. Switching speed and power are discussed, and the device is shown to be applicable for telecommunication and data processing applications. The analysis is quite general, and can be used for resonant structures, such as photonic crystals and microring... 

    Mobility pattern recognition in mobile ad-hoc networks

    , Article 4th International Conference on Mobile Technology, Applications and Systems, Mobility 2007, Incorporating the 1st International Symposium on Computer Human Interaction in Mobile Technology, IS-CHI 2007, Singapore, 10 September 2007 through 12 September 2007 ; 2007 , Pages 302-309 ; 9781595938190 (ISBN) Mousavi, S. M ; Rabiee, H. R ; Moshref, M ; Dabirmoghaddam, A ; Sharif University of Technology
    2007
    Abstract
    A Mobile Ad hoc Network (MANET) is a collection of wireless mobile nodes forming a self-configuring network without using any existing infrastructure. Network nodes in a mobile Ad-hoc network move in some motion patterns called mobility models. The mobility models play a very important role in determining the protocol performance in MANET. Thus, it is essential to study and analyze various mobility models and their effect on MANET protocols. If we can recognize the mobility pattern of motion of mobile nodes in our environment we can customize our network protocols to deal with that existing mobility model. In this paper we introduce a new method for classification and pattern recognition of... 

    Mobile banking services in the bank area

    , Article SICE Annual Conference, SICE 2007, Takamatsu, 17 September 2007 through 20 September 2007 ; 2007 , Pages 2682-2685 ; 4907764286 (ISBN); 9784907764289 (ISBN) Shirali Shahreza, M ; Shirali Shahreza, M. H ; Sharif University of Technology
    2007
    Abstract
    Mobile banking (M-Banking) has been welcomed in most of the countries as a new branch in electronic banking (E-Banking). In developing countries such as Iran mobile banking is limited to fields such as SMS due to lack of infrastructure and because of high costs. In this paper we present a method for developing banking services through mobile phone in the bank area. In our method a server which is capable to be connected through bluetooth is installed in the bank and offered banking services. Customers inside the bank and also around the bank are connected to the bank system through bluetooth technology and handle their banking operations through their mobile phones. This way they won't pay... 

    Long lifetime routing in unreliable wireless sensor networks

    , Article 2011 International Conference on Networking, Sensing and Control, ICNSC 2011, 11 April 2011 through 13 April 2011 ; April , 2011 , Pages 457-462 ; 9781424495702 (ISBN) Yousefi, H ; Yeganeh, M. H ; Movaghar, A ; Sharif University of Technology
    2011
    Abstract
    Lifetime is the most important concern in wireless sensor networks due to limited battery power of sensor nodes. In this paper, we focus on designing an energy-efficient and energy-aware routing algorithm, LLR, to increase the operational lifetime of multi-hop wireless sensor networks in the presence of unreliable communication links. Our proposed protocol utilizes a parameter, Broadcasting Delay, in each node associated with the hop parameters passed by a route request packet to select long lifetime paths in the network. The key point in Broadcasting Delay formulation is that it includes both node and link specific parameters. We use two different scenarios: either the link layer... 

    Improvement of fault detection in wireless sensor networks

    , Article 2009 Second ISECS International Colloquium on Computing, Communication, Control, and Management, CCCM 2009, Sanya, 8 August 2009 through 9 August 2009 ; Volume 4 , 2009 , Pages 644-646 ; 9781424442461 (ISBN) Khazaei, E ; Barati, A ; Movaghar, A ; Yangzhou University; Guangdong University of Business Studies; Wuhan Institute of Technology; IEEE SMC TC on Education Technology and Training; IEEE Technology Management Council ; Sharif University of Technology
    2009
    Abstract
    This paper presents a centralized fault detection algorithm for wireless sensor networks. Faulty sensor nodes are identified based on comparisons between neighboring nodes and own central node and dissemination of the decision made at each node. RNS system is used to tolerate transient faults in sensing and communication. In this system, arithmetic operations act on residues - reminder of dividing original number in several definite modules - in parallel. Consequently computations on these residues which are smaller than the original number are performed, so speed up arithmetic and decreased power consumption is achieved. ©2009 IEEE  

    Highlighting CAPTCHA

    , Article 2008 Conference on Human System Interaction, HSI 2008, Krakow, 25 May 2008 through 27 May 2008 ; 2008 , Pages 247-250 ; 1424415438 (ISBN); 9781424415434 (ISBN) Shirali Shahreza, M ; Sharif University of Technology
    2008
    Abstract
    There are many sites specially designed for mobile phones. In cases such as the registering in websites, some hackers write programs to make automatic false enrolments which waste the resources of the website. Therefore, it is necessary to distinguish between human users and computer programs. These systems are known as CAPTCHA (Completely Automated Public Turing test to tell Computers and Human Apart). CAPTCHA methods are mainly based on the weak points of OCR (Optical Character Recognition) systems while using them difficult in tools such as PDAs (Personal Digital Assistant) or mobile phones that lack a big keyboard. So the Non-OCR-Based CAPTCHA methods are proposed which are do not need... 

    FTS: An efficient tree structure based tool for searching in large data sets

    , Article ICIME 2010 - 2010 2nd IEEE International Conference on Information Management and Engineering, 16 April 2010 through 18 April 2010 ; Volume 2 , April , 2010 , Pages 294-298 ; 9781424452644 (ISBN) Saejdi Badashian, A ; Najafpour, M ; Mahdavi, M ; Ashurzad Delcheh, M ; Khalkhali, I ; Sharif University of Technology
    2010
    Abstract
    This paper addresses the issue of finding and accessing desired items when a large amount of data items are concerned, by proposing some concepts based on Tree Search Structure -a hierarchical structure for information retrieval. The proposed concepts are applicable to several environments such as File Managers on PCs, help tree views, site maps, taxonomies, and cell phones. A software tool, FTS (File Tree Search), that is developed to utilize the proposed concepts is also presented  

    Energy-efficient speed routing protocol for wireless sensor networks

    , Article 2009 5th Advanced International Conference on Telecommunications, AICT 2009, Venice, Mestre, 24 May 2009 through 28 May 2009 ; 2009 , Pages 267-271 ; 9780769536118 (ISBN) Kordafshari, M. S ; Pourkabirian, A ; Faez, K ; Rahimabadi, A. M ; IARIA ; Sharif University of Technology
    2009
    Abstract
    In this paper, we propose an approach for routing in SPEED protocol considering residual energy in routing decisions. Due to the limited energy of a sensor node, energyefficient routing is a very important issue in sensor networks. This approach finds energy-efficient paths for delayconstrained data in real-time traffic. The SPEED protocol does not consider any energy metric in its routing. In our approach, routing is based on a weight function, which is a combination of the three factors: Delay, Energy & Speed. Here, the node with the greatest value in the weight function is to be selected as the next hop forwarding. We increase the network lifetime by considering energy metric in routing... 

    Cost-aware reactive monitoring in resource-constrained wireless sensor networks

    , Article 2009 IEEE Wireless Communications and Networking Conference, WCNC 2009, Budapest, 5 April 2009 through 8 April 2009 ; 2009 ; 15253511 (ISSN); 9781424429486 (ISBN) Talebi, M ; Khonsari, A ; Jabarvand, R ; Sharif University of Technology
    2009
    Abstract
    Motivated by applications of sensor networks, there has been growing interest in monitoring large scale distributed systems. In these applications, we usually wish to monitor a global system condition defined as a function of local network elements parameters. In this paper, we study Reactive Monitoring in sensor networks, which has the benefit of operating in a decentralized manner. Our primary concern in adopting such a monitoring paradigm is reducing the communication cost which is the dominant factor of energy drain in wireless sensor networks. In this study, we address the reactive aggregate monitoring problem by casting the underlying threshold assignment as an optimization problem.... 

    Circuit design to improve security of telecommunication devices

    , Article 2017 IEEE 7th Annual Computing and Communication Workshop and Conference, CCWC 2017, 9 January 2017 through 11 January 2017 ; 2017 ; ISBN: 978-150904228-9 Bahrami, H ; Hajsadeghi, K ; Sharif University of Technology
    Abstract
    Security in mobile handsets of telecommunication standards such as GSM, Project 25 and TETRA is very important, especially when governments and military forces use handsets and telecommunication devices. Although telecommunication could be quite secure by using encryption, coding, tunneling and exclusive channel, attackers create new ways to bypass them without the knowledge of the legitimate user. In this paper we introduce a new, simple and economical circuit to warn the user in cases where the message is not encrypted because of manipulation by attackers or accidental damage. This circuit not only consumes very low power but also is created to sustain telecommunication devices in aspect...