عباسی, مهدی

دانشگاه بوعلی سینا

[ 1 ] - افزایش کارایی دسته بند درختی مبتنی بر TCAM به کمک برش‌های پویا در فضای ژئومتریک

دسته‌بندی بسته‌ها یکی از پردازش‌های اساسی است که اغلب توسط پردازنده‌های شبکه اجرا می‌گردد. در پیاده‌سازی سخت‌افزاری الگوریتم‌های دسته‌بندی بسته‌ها، از حافظه‌های تداعیگر چند‌وضعیتی (TCAM) برای جست‌و‌جوی موازی و افزایش سرعت پردازش استفاده می‌شود. در معماری دسته‌بند که عموما از دو مرحله تشکیل شده است، نخست درخت‌های تصمیم‌گیری ایجاد شده و قوانین دسته‌بند بین برگ‌های آن توزیع می‌شوند. در مرحله دوم، ...

[ 2 ] - A Performance Survey of Meta-Heuristic And Brute-Force Search Algorithms to Cryptanalysis The SDES Encryption Algorithm

For many years, cryptanalysis has been considered as an attractive topic in jeopardizing the security and resistance of an encryption algorithm. The SDES encryption algorithm is a symmetric cryptography algorithm that performs a cryptographic operation using a crypt key. In the world of encryption, there are many search algorithms to cryptanalysis. In these researches, brute force attack algori...

[ 3 ] - Efficient parallelization of the genetic algorithm solution of traveling salesman problem on multi-core and many-core systems

Efficient parallelization of genetic algorithms (GAs) on state-of-the-art multi-threading or many-threading platforms is a challenge due to the difficulty of schedulation of hardware resources regarding the concurrency of threads. In this paper, for resolving the problem, a novel method is proposed, which parallelizes the GA by designing three concurrent kernels, each of which running some depe...

[ 4 ] - Improvement and parallelization of Snort network intrusion detection mechanism using graphics processing unit

Nowadays, Network Intrusion Detection Systems (NIDS) are widely used to provide full security on computer networks. IDS are categorized into two primary types, including signature-based systems and anomaly-based systems. The former is more commonly used than the latter due to its lower error rate. The core of a signature-based IDS is the pattern matching. This process is inherently a computatio...