Hamid Hassan Kashi; Amir Masoud Rahamni; Mehdi Hoseinzadeh; Vahid Sadatpour
Volume 1, Issue 1 , February 2015, , Pages 1-8
Abstract
In wireless sensor networks, optimal consumptionof energy and having maximum life time are important factors. In this article attempt has been made to send the data packets with particular reliability from the beginning based on AODV protocol. In this way two new fields add to the routing packets and ...
Read More
In wireless sensor networks, optimal consumptionof energy and having maximum life time are important factors. In this article attempt has been made to send the data packets with particular reliability from the beginning based on AODV protocol. In this way two new fields add to the routing packets and during routing and discovering of new routes, the lowest remained energy of nodes and route traffic based on the number of discarded packages, will store in this field as two variables. These two variables will be considered during choosing a suitable route for sending the data to that message which should be answered by sink. The efficiency of this protocol is based on the fact that, at the route request, it finds the routes with high energy and low traffic through which data are sent(information is sent).So data packets reach the destination with a higher probability and also the balance of energy consumption is considered in the network. From the energy point of view, not using weak nodes routes leads to not having off nodes at the end of the process. This fact affects balancing of energy consumption and reducing the variance of the energy remainder proportional to AODV model. Not using high traffic routes leads to reducing collision and sending fewer signaling packets; more data packets with lower delay reach the destination. In the case of high congestion, for meeting the desired reliability, which is among the main goals there may be more sending signaling packets, delay and collision. But this happens with sending more packets and a guaranteed reliability.
Pattern Analysis and Intelligent Systems
Mozhgan Rahimirad; Mohammad Mosleh; Amir Masoud Rahmani
Volume 1, Issue 2 , May 2015, , Pages 1-8
Abstract
With the explosive growth in amount of information, it is highly required to utilize tools and methods in order to search, filter and manage resources. One of the major problems in text classification relates to the high dimensional feature spaces. Therefore, the main goal of text classification is to ...
Read More
With the explosive growth in amount of information, it is highly required to utilize tools and methods in order to search, filter and manage resources. One of the major problems in text classification relates to the high dimensional feature spaces. Therefore, the main goal of text classification is to reduce the dimensionality of features space. There are many feature selection methods. However, only a few methods are utilized for huge text classification problems. In this paper, we propose a new wrapper method based on Particle Swarm Optimization (PSO) algorithm and Support Vector Machine (SVM). We combine it with Learning Automata in order to make it more efficient. This helps to select better features using the reward and penalty system of automata. To evaluate the efficiency of the proposed method, we compare it with a method which selects features based on Genetic Algorithm over the Reuters-21578 dataset. The simulation results show that our proposed algorithm works more efficiently.
Maryam Ashtari Mahini; Mohammad Teshnehlab; Mojtaba Ahmadieh khanehsar
Volume 1, Issue 3 , August 2015, , Pages 1-8
Abstract
Neural networks are applicable in identification systems from input-output data. In this report, we analyze theHammerstein-Wiener models and identify them. TheHammerstein-Wiener systems are the simplest type of block orientednonlinear systems where the linear dynamic block issandwiched in between two ...
Read More
Neural networks are applicable in identification systems from input-output data. In this report, we analyze theHammerstein-Wiener models and identify them. TheHammerstein-Wiener systems are the simplest type of block orientednonlinear systems where the linear dynamic block issandwiched in between two static nonlinear blocks, whichappear in many engineering applications; the aim of nonlinearsystem identification by Hammerstein-Wiener neural networkis finding model order, state matrices and system matrices. Wepropose a robust approach for identifying the nonlinear systemby neural network and subspace algorithms. The subspacealgorithms are mathematically well-established and noniterativeidentification process. The use of subspace algorithmmakes it possible to directly obtain the state space model.Moreover the order of state space model is achieved usingsubspace algorithm. Consequently, by applying the proposedalgorithm, the mean squared error decreases to 0.01 which isless than the results obtained using most approaches in theliterature.
Computer Networks and Distributed Systems
Ali Abbasi; Amir Masoud Rahmani; Esmaeil Zeinali Khasraghi
Volume 1, Issue 4 , November 2015, , Pages 1-14
Abstract
Abstract - One of the important problems in grid environments is data replication in grid sites. Reliability and availability of data replication in some cases is considered low. To separate sites with high reliability and high availability of sites with low availability and low reliability, clustering ...
Read More
Abstract - One of the important problems in grid environments is data replication in grid sites. Reliability and availability of data replication in some cases is considered low. To separate sites with high reliability and high availability of sites with low availability and low reliability, clustering can be used. In this study, the data grid dynamically evaluate and predict the condition of the sites. The reliability and availability of sites were calculated and it was used to make decisions to replicate data. With these calculations, we have information on the locations of users in grid with reliability and availability or cost commensurate with the value of the work they did. This information can be downloaded from users who are willing to send them data with suitable reliability and availability. Simulation results show that the addition of the two parameters, reliability and availability, assessment criteria have been improved in certain access patterns.
Computer Networks and Distributed Systems
Nafiseh Daneshgar; M. Habibi Najafi; Mohsen Jahanshahi; Ehsan Ahvar
Volume 2, Issue 1 , February 2016, , Pages 1-8
Abstract
Energy consumption is considered as a critical issue in wireless sensor networks (WSNs). Batteries of sensor nodes have limited power supply which in turn limits services and applications that can be supported by them. An efcient solution to improve energy consumption and even trafc in WSNs is Data Aggregation ...
Read More
Energy consumption is considered as a critical issue in wireless sensor networks (WSNs). Batteries of sensor nodes have limited power supply which in turn limits services and applications that can be supported by them. An efcient solution to improve energy consumption and even trafc in WSNs is Data Aggregation (DA) that can reduce the number of transmissions. Two main challenges for DA are: (i) most DA techniques need network clustering. Clustering itself is a time and energy consuming procedure. (ii) DA techniques often do not have ability to detect intrusions. Studying to design a new DA technique without using clustering and with ability of nding intrusion is valuable. This paper proposes an energy-intrusion aware DA Technique (named EIDA) that does not need clustering. EIDA is designed to support on demand requests of mobile sinks in WSNs. It uses learning automata for aggregating data and a simple and effective algorithm for intrusion detection. Finally, we simulate
Pattern Analysis and Intelligent Systems
Hamid Parvin; Hosein Alizadeh; Mohsen Moshki
Volume 2, Issue 2 , May 2016, , Pages 1-10
Abstract
Pattern recognition systems are widely used in a host of different fields. Due to some reasons such as lack of knowledge about a method based on which the best classifier is detected for any arbitrary problem, and thanks to significant improvement in accuracy, researchers turn to ensemble methods in ...
Read More
Pattern recognition systems are widely used in a host of different fields. Due to some reasons such as lack of knowledge about a method based on which the best classifier is detected for any arbitrary problem, and thanks to significant improvement in accuracy, researchers turn to ensemble methods in almost every task of pattern recognition. Classification as a major task in pattern recognition, have been subject to this transition. The classifier ensemble which uses a number of base classifiers is considered as meta-classifier to learn any classification problem in pattern recognition. Although some researchers think they are better than single classifiers, they will not be better if some conditions are not met. The most important condition among them is diversity of base classifiers. Generally in design of multiple classifier systems, the more diverse the results of the classifiers, the more appropriate the aggregated result. It has been shown that the necessary diversity for the ensemble can be achieved by manipulation of dataset features, manipulation of data points in dataset, different sub-samplings of dataset, and usage of different classification algorithms. We also propose a new method of creating this diversity. We use Linear Discriminant Analysis to manipulate the data points in dataset. Although the classifier ensemble produced by proposed method may not always outperform all of its base classifiers, it always possesses the diversity needed for creation of an ensemble, and consequently it always outperforms all of its base classifiers on average.
Computer Architecture and Digital Systems
Elnaz Alikhah-Asl; Midia Reshadi
Volume 2, Issue 3 , August 2016, , Pages 1-8
Abstract
Increasing the number of cores integrated on a chip and the problems of system on chips caused to emerge networks on chips. NoCs have features such as scalability and high performance. NoCs architecture provides communication infrastructure and in this way, the blocks were produced that their communication ...
Read More
Increasing the number of cores integrated on a chip and the problems of system on chips caused to emerge networks on chips. NoCs have features such as scalability and high performance. NoCs architecture provides communication infrastructure and in this way, the blocks were produced that their communication with each other made NoC. Due to increasing number of cores, the placement of the cores in NoC platform has become an important issue. If wecan map the application cores close to each other to place them with more communication requirements, the performance parameters will improve and the network will be more efficient. Inthis paper, we propose two low complexity heuristic algorithms for the application mapping onto NoC to improve latency. In addition, one approach has been proposed to extract an Abstract graph from an application core graph, so, using this resent approach, we can map applications in two proposed algorithms. Moreover, we use bypass routers that can route packets in a cycle from the source to destination. Proposed algorithms and previous papers were compared on two real applications VOPD and MPEG-4 and results were reported.
Software Engineering and Information Systems
Fatemeh Eghrari Solout; Mehdi Hosseinzadeh
Volume 2, Issue 4 , November 2016, , Pages 1-8
Abstract
One of the most important issues related to knowledge discovery is the field of comment mining. Opinion mining is a tool through which the opinions of people who comment about a specific issue can be evaluated in order to achieve some interesting results. This is a subset of data mining. Opinion mining ...
Read More
One of the most important issues related to knowledge discovery is the field of comment mining. Opinion mining is a tool through which the opinions of people who comment about a specific issue can be evaluated in order to achieve some interesting results. This is a subset of data mining. Opinion mining can be improved using the data mining algorithms. One of the important parts of opinion mining is the sentiment analysis in social networks. Today, the social networks contain billions of users' comments about different issues. In previous researches in this area, various methods have been used for Persian comments analysis. In these studies, preprocessing is one of the most important parts. It arranges the data set for analysis in a standard form. The number of hashtags selected for analysis is limited. To detect the positive and negative comments, knowledge extraction or neural network techniques have been used. The current research presents a method of analysis which can analyze any hashtag for each group of users and has no limitations in this regard. Type of hashtag, the number of likes, type of user and type of positive and negative sentences can be analyzed by this method. The results of simulation and comparison of divorce data set show that the proposed method has an acceptable performance.
Software Engineering and Information Systems
Abdolghader pourali
Volume 3, Issue 1 , February 2017, , Pages 1-10
Abstract
Software architecture is one of the most fundamental products in the process of software development in the areas of behavioral or non- behavioral features like availability or transformability change. There are different ways to evaluate software architecture one of which is the creation of application ...
Read More
Software architecture is one of the most fundamental products in the process of software development in the areas of behavioral or non- behavioral features like availability or transformability change. There are different ways to evaluate software architecture one of which is the creation of application model. An executable model of software architecture is an official description of architecture which if used prior to the running of architecture, its final behavior and function will be observed and as a result possible problems could be elevated and promoted. In this study we aimed at availability evaluation in object- oriented style. To ensure the applicability of the style the UML diagrams, especially the sequence diagram, were used to exhibit the architectural behavior. In the later stages, as the UML diagram is inapplicable, the following operations were done. First, metric annotation is used to tag clichés. Then, the studied style diagram was transformed into an applicable one. Afterwards and following the design of petri, using CpnTools, the applicable model based on color petri net was evaluated. In this research the availability evaluation on an ATM for the N=5 users was tested and the results of evaluation showed that the higher the rate of availability (approximately %100) the higher is the rate of usability of the system when needed.
Software Engineering and Information Systems
Zahra Baatmaanghelich; Ali Rezaee; Sahar Adabi
Volume 4, Issue 1 , February 2018, , Pages 1-6
Abstract
One of the areas with greatest needs having available information at the right moment and with high accuracy is healthcare. Right information at right time saves lives. Healthcare is a vital domain which needs high processing power for high amounts of data. Due to the critical and the special characteristics ...
Read More
One of the areas with greatest needs having available information at the right moment and with high accuracy is healthcare. Right information at right time saves lives. Healthcare is a vital domain which needs high processing power for high amounts of data. Due to the critical and the special characteristics of these systems, formal methods are used for specification, description and verification. The goal of this research is to turn a business process graphical diagram into a formal based model. In this work, BPMN has been extended to add time and probability information and then has been transferred to probabilistic real-time CSP area. This mapping can be employed as a basic model for modeling different system characteristics. This mapping, then, is modeled using a case study in pervasive healthcare domain and verified in a model checking tool. Index Terms — Formal methods, CSP, BPMN, Pervasive healthcare, Model checking, Verification, Service Composition.
Pattern Analysis and Intelligent Systems
Reham Mohammed
Volume 5, Issue 1 , February 2019, , Pages 1-10
Abstract
Quadrotor control has been noted for its trouble as the consequence of the high maneuverability, system nonlinearity and strongly coupled multivariable. This paper deals with the simulation depend on proposed controller of a quadrotor that can overcome this trouble. The mathematical model of quadrotor ...
Read More
Quadrotor control has been noted for its trouble as the consequence of the high maneuverability, system nonlinearity and strongly coupled multivariable. This paper deals with the simulation depend on proposed controller of a quadrotor that can overcome this trouble. The mathematical model of quadrotor is determined using a Newton-Euler formulation. Fractional Order Proportional Integral Derivative (FOPID) controller tuned by genetic algorithm (GA) is investigated to control and stabilization the position and attitude of quadrotor using feedback linearization. This controller is used as a reference to compare its results with Proportional Integral Derivative (PID) controller tuned by GA. The control structure performance is evaluated through the response and minimizing the error of the position and attitude. Simulation results, demonstrates that position and attitude control using FOPID has fast response, better steady state error and RMS error than PID. By simulation the two controllers are tested under the same conditions using SIMULINK under MATLAB2015a.
Pattern Analysis and Intelligent Systems
Iraj Naruei; farshid keynia
Volume 7, Issue 1 , February 2021, , Pages 1-18
Abstract
Recently, many optimization algorithms have been proposed to find the best solution for complex engineering problems. These algorithms can search unknown and multidimensional spaces and find the optimal solution the shortest possible time. In this paper we present a new modified differential evolution ...
Read More
Recently, many optimization algorithms have been proposed to find the best solution for complex engineering problems. These algorithms can search unknown and multidimensional spaces and find the optimal solution the shortest possible time. In this paper we present a new modified differential evolution algorithm. Optimization algorithms typically have two stages of exploration and exploitation. Exploration refers to global search and exploitation refers to local search. We used the same differential evolution (DE) algorithm. This algorithm uses a random selection of several other search agents to update the new search agent position. This makes the search agents continually have random moves in the search space, which refers to the exploration phase but there is no mechanism specifically considered for the exploitation phase in the DE algorithm. In this paper, we have added a new formula for the exploitation phase to this algorithm and named it the Balanced Differential Evolution (BDE) algorithm. We tested the performance of the proposed algorithm on standard test functions, CEC2005 Complex and Combined Test Functions. We also apply the proposed algorithm to solve some real problems to demonstrate its ability to solve constraint problems. The results showed that the proposed algorithm has a better performance and competitive performance than the new and novel optimization algorithms.
Pattern Analysis and Intelligent Systems
Negin Fatholahzade; Gholamreza Akbarizadeh; Morteza Romoozi
Volume 4, Issue 2 , May 2018, , Pages 51-60
Abstract
Nowadays the active traffic management is enabled for better performance due to the nature of the real-time large data in transportation system. With the advancement of large data, monitoring and improving the traffic safety transformed into necessity in the form of actively and appropriately. Per-formance ...
Read More
Nowadays the active traffic management is enabled for better performance due to the nature of the real-time large data in transportation system. With the advancement of large data, monitoring and improving the traffic safety transformed into necessity in the form of actively and appropriately. Per-formance efficiency and traffic safety are considered as an im-portant element in measuring the performance of the system. Although the productivity can be evaluated in terms of traffic congestion, safety can be obtained through analysis of incidents. Exposure effects have been done to identify the Factors and solutions of traffic congestion and accidents.In this study, the goal is reducing traffic congestion and im-proving the safety with reduced risk of accident in freeways to improve the utilization of the system. Suggested method Man-ages and controls traffic with use of prediction the accidents and congestion traffic in freeways. In fact, the design of the real-time monitoring system accomplished using Big Data on the traffic flow and classified using the algorithm of random-ized forest and analysis of Big Data Defined needs. Output category is extracted with attention to the specified characteristics that is considered necessary and then by Alarms and signboards are announced which are located in different parts of the freeways and roads. All of these processes are evaluated by the Colored Petri Nets using the Cpn Tools tool.
Computer Networks and Distributed Systems
Gholamhossein Ekbatanifard; Omid Yousefi
Volume 5, Issue 2 , May 2019, , Pages 57-70
Abstract
The Internet of Things (IoT) and social networking integration, create a new concept named Social Internet of Things (SIoT) according to which the things are able to autonomously establish social relationships with regard to the owners. Things in SIoT operate according to a service-oriented architecture. ...
Read More
The Internet of Things (IoT) and social networking integration, create a new concept named Social Internet of Things (SIoT) according to which the things are able to autonomously establish social relationships with regard to the owners. Things in SIoT operate according to a service-oriented architecture. There may be misbehaving owners and consequently misbehaving devices that can perform harmful attacks based on their social relationships with other things for their own gain at the expense of other IoT devices. This motivates us to work on the issue of how to estimate the trust of a service provider to avoid malicious service providers and select the best service provider. In this paper, a novel trust management model is proposed based on four properties. The model deals with attacks (especially on-off attacks) and considers service levels for services provided by each node. A method to provide different levels of services via SIoT devices, and a new trust assessment scheme are the contributions of this paper. We evaluated the proposed scheme with extensive simulations and the results show that the proposed model can effectively select the best service provider and cope with most trust related attacks.
Software Engineering and Information Systems
Mina Sadat Mousavi Kasravi; Mohammad Ahmadinia; Abbas Rezaiee
Volume 3, Issue 2 , May 2017, , Pages 65-74
Abstract
E-readiness is one of the major prerequisites for effective implementation of e-government. For the correct implementation of e-government, it is needed to accurately assess the state of e-readiness in desired community. In this regard, there are models to assess, but the correct choice of model is one ...
Read More
E-readiness is one of the major prerequisites for effective implementation of e-government. For the correct implementation of e-government, it is needed to accurately assess the state of e-readiness in desired community. In this regard, there are models to assess, but the correct choice of model is one of the most important challenges in this area. The process of evaluating and selecting the appropriate options in the implementation of e-government due to the involvement of different groups of decision-makers, existence of interrelationships between technology and desired community as well as existing platforms is a complex process. In recent decades, with access to computational methods and powerful decision making systems selecting more accurate options, effective analysis of qualitative and quantitative characteristic and studying the interaction between them are provided. This article tries to examine the performance of e-readiness assessment models and multi criteria decision making methods and introduces the best selection of the e-readiness model for effective implementation of e-government. In order to reach this purpose, we introduced a layered architecture based on multi-criteria decision making methods and SWOT Analysis. The proposed layered architecture, reduces decision making errors and increases the accuracy in choosing the appropriate e-readiness assessment model.
Pattern Analysis and Intelligent Systems
narges jafari; Farhad Soleimanian Gharehchopogh
Volume 6, Issue 3 , August 2020, , Pages 119-132
Abstract
Metaheuristic algorithms are used to solve NP-hard optimization problems. These algorithms have two main components, i.e. exploration and exploitation, and try to strike a balance between exploration and exploitation to achieve the best possible near-optimal solution. The bat algorithm is one of the ...
Read More
Metaheuristic algorithms are used to solve NP-hard optimization problems. These algorithms have two main components, i.e. exploration and exploitation, and try to strike a balance between exploration and exploitation to achieve the best possible near-optimal solution. The bat algorithm is one of the metaheuristic algorithms with poor exploration and exploitation. In this paper, exploration and exploitation processes of Gray Wolf Optimizer (GWO) algorithm are applied to some of the solutions produced by the bat algorithm. Therefore, part of the population of the bat algorithm is changed by two processes (i.e. exploration and exploitation) of GWO; the new population enters the bat algorithm population when its result is better than that of the exploitation and exploration operators of the bat algorithm. Thereby, better new solutions are introduced into the bat algorithm at each step. In this paper, 20 mathematic benchmark functions are used to evaluate and compare the proposed method. The simulation results show that the proposed method outperforms the bat algorithm and other metaheuristic algorithms in most implementations and has a high performance.
Pattern Analysis and Intelligent Systems
Vahid Golmah; Mina Tashakori
Volume 3, Issue 3 , August 2017, , Pages 125-134
Abstract
Telecommunication companies have received a great deal of research attention, which have many advantages such as low cost, higher qualification, simple installation and maintenance, and high reliability. However, the using of technical maintenance approaches in Telecommunication companies could improve ...
Read More
Telecommunication companies have received a great deal of research attention, which have many advantages such as low cost, higher qualification, simple installation and maintenance, and high reliability. However, the using of technical maintenance approaches in Telecommunication companies could improve system reliability and users' satisfaction from Asymmetric digital subscriber line (ADSL) services. In ADSL systems, there are many variables giving some noise for classification and there are many fault patterns with overlapping data. Therefore, this paper proposes a multilayer perceptron (MLP) classifier integrated with Self Organization Map (SOM) models for fault detection and diagnosis (FDD) of occurred ADSL systems. The interest of this paper is to improve the performance of single MLP by dividing the fault pattern space into a few smaller sub-spaces using SOM clustering technique and triggering the right local classifier by designing a supervisor agent. The performances of this method are evaluated on the fault data of Iranian Telecommunication Company which develop ADSL services and then the proposed algorithm is also compared against single MLP. Finally, the results obtained by this algorithm are analyzed to increase user's satisfaction with reducing occurred faults for them with predicting before they face it.
Computer Networks and Distributed Systems
Zahra Nafarieh; Ebrahim Mahdipur; Haj Hamid Haj Seyed Javadi
Volume 5, Issue 3 , August 2019, , Pages 129-142
Abstract
Abstract—One of the serious threats to cyberspace is the Bot networks or Botnets. Bots are malicious software that acts as a network and allows hackers to remotely manage and control infected computer victims. Given the fact that DNS is one of the most common protocols in the network and is essential ...
Read More
Abstract—One of the serious threats to cyberspace is the Bot networks or Botnets. Bots are malicious software that acts as a network and allows hackers to remotely manage and control infected computer victims. Given the fact that DNS is one of the most common protocols in the network and is essential for the proper functioning of the network, it is very useful for monitoring, detecting and reducing the activity of the Botnets. DNS queries are sent in the early stages of the life cycle of each Botnet, so infected hosts are identified before any malicious activity is performed. Because the exchange of information in the network environment and the volume of information is very high, Storing and indexing this massive data requires a large database. By using the DNS traffic analysis, we try to identify the Botnets. We used the data generated from the network traffic and information of known Botnets with the Splunk platform to conduct data analysis to quickly identify attacks and predict potential dangers that could arise. The analysis results were used in tests conducted on real network environments to determine the types of attacks. Visual IP mapping was then used to determine actions that could be taken. The proposed method is capable of recognizing known and unknown Bots.
Software Engineering and Information Systems
Syed Atif Ali Shah
Volume 4, Issue 3 , August 2018, , Pages 135-142
Abstract
Abstract of Re-engineering of Industrial CMMI Through this research, I have established a general strategy to appraise an organization against a scale of five process maturity levels whilst maintaining a strong mechanics of CMMI. Reengineering of industrial CMMI proposes a novel method for Industrial ...
Read More
Abstract of Re-engineering of Industrial CMMI Through this research, I have established a general strategy to appraise an organization against a scale of five process maturity levels whilst maintaining a strong mechanics of CMMI. Reengineering of industrial CMMI proposes a novel method for Industrial Competence ranking of those organizations/companies which are targeting various CMMI levels. This approach uses SCAMPI assessment techniques to rank different organizations that fall below certain level of CMMI model. Furthermore, it adds the credulous factors, i.e., Score, Reliance and Confidence level for an organization’s capability and maturity evaluation. The benefit of proposed model is, that an organization can set its objectives to achieve target level of CMMI model, and it could be differentiated from less mature organizations at same level. This technique not only reclassifies the CMMI levels but also exposes various confidence factors.Index Terms— CMMI, Industrial Process Optimization, Process Engineering, Capability and Maturity Ranking, Product Quality Assurance.
Computer Networks and Distributed Systems
Mona Alimardani; Amir Masoud Rahmani; Houman Zarrabi
Volume 3, Issue 4 , November 2017, , Pages 181-188
Abstract
Advances in medical sciences with other fields of science and technology is closely casual profound mutations in different branches of science and methods for providing medical services affect the lives of its descriptor. Wireless Body Area Network (WBAN) represents such a leap. Those networks excite ...
Read More
Advances in medical sciences with other fields of science and technology is closely casual profound mutations in different branches of science and methods for providing medical services affect the lives of its descriptor. Wireless Body Area Network (WBAN) represents such a leap. Those networks excite new branches in the world of telemedicine. Small wireless sensors, to be quite precise and calculated, are installed in or on the body and create a WBAN that various vital statistics or environmental parameters sampling, processing and radio. These nodes allow independent monitoring of a person's location, in typical environments and for long periods and provide for the user and the medical, offer real-time feedback from the patient's health status. In this article, the introduction of WBAN and review issues and applications of medical sensor networks, to offer a protocol has been established that the threshold for data transmission reduces power consumption on sensor nodes, increasing the lifetime of the network and motion phase to increase the dynamics of the network. The proposed protocol in the network been compared with the SIMPLE and ATTEMPT protocols. Results indicate a significant reduction in energy consumption of sensors to reduce energy consumption the entire network.
Computer Architecture and Digital Systems
Akram Reza; Parisa Jolani; Midia Reshadi
Volume 5, Issue 4 , November 2019, , Pages 205-212
Abstract
By increasing, the complexity of chips and the need to integrating more components into a chip has made network –on- chip known as an important infrastructure for network communications on the system, and is a good alternative to traditional ways and using the bus. By increasing the density of ...
Read More
By increasing, the complexity of chips and the need to integrating more components into a chip has made network –on- chip known as an important infrastructure for network communications on the system, and is a good alternative to traditional ways and using the bus. By increasing the density of chips, the possibility of failure in the chip network increases and providing correction and fault tolerance methods is one of the principles of today's chip design. Faults may have undesirable effects on the correct system operation and system performance. In this paper the communication infrastructure failure has been considered as same as link and router failure and the fault tolerance low cost routing algorithm has been suggested base on local fault information By using quad neighbor fault information to avoid back tracking in routing in order to select possible minimal path to destination. In this article, we have suggested cost aware fault tolerance (CAFT) routing algorithm. Our contribution in this algorithm is minimum local fault information, minimum routing decision overhead by implementing routing logic base and determining shortest possible path. For deadlock freedom using an additional virtual channel along Y dimension and prohibiting certain routing turns. In order to evaluate the performance of our routing, we compared it with other fault tolerant routing in terms of average packet latency, throughput and power.
Computer Networks and Distributed Systems
Ojo Jayeola Adaramola; Jamiu Rotimi Olasina
Volume 4, Issue 4 , November 2018, , Pages 209-218
Abstract
Abstract- Communication has become inevitably part of our day to day activities, in academic, business, banking, and other sectors. It has therefore become so important to implement good and efficient communication system. A reference point according to this research is the wireless sensor networking ...
Read More
Abstract- Communication has become inevitably part of our day to day activities, in academic, business, banking, and other sectors. It has therefore become so important to implement good and efficient communication system. A reference point according to this research is the wireless sensor networking (WSN) system, and most important thing in communication is to be free from interference, attenuation, crosstalk, and fading. Any of these factors is a serious problem in communication system. To solve these problems, mobile and fixed nodes networks were considered for efficient operation of WSN when ZigBee technology was employed and designed using the OPNET when certain network parameters: Throughput (bits/s), load (bits/s), and end-to end delay (second) parameters from fixed and mobile networks were compared and considered for smooth operation of WSN that is free from interference, attenuation, crosstalk and fading. The network investigation and performance analysis of fixed and mobile networks were based on tree, star and mesh topologies between the two systems. After considering all the parameters for various analyses, the fixed network was considered the most suitable over the mobile network for WSN.
Software Engineering and Information Systems
Amin Moradbeiky; Amid Khatibi Bardsiri
Volume 4, Issue 1 , February 2018, , Pages 7-12
Abstract
Software project management has always faced challenges that have often had a great impact on the outcome of projects in future. For this, Managers of software projects always seek solutions against challenges. The implementation of unguaranteed approaches or mere personal experiences by managers does ...
Read More
Software project management has always faced challenges that have often had a great impact on the outcome of projects in future. For this, Managers of software projects always seek solutions against challenges. The implementation of unguaranteed approaches or mere personal experiences by managers does not necessarily suffice for solving the problems. Therefore, the management area of software projects requires tools and means helping software project managers confront with challenges. The estimation of effort required for software development is among such important challenges. In this study, a neural-network-based architecture has been proposed that makes use of PSO algorithm to increase its accuracy in estimating software development effort. The architecture suggested here has been tested by several datasets. Furthermore, similar experiments were done on the datasets using various widely used methods in estimating software development. The results showed the accuracy of the proposed model. The results of this research have applications for researchers of software engineering and data mining.
Alireza Amirshahi; Mahmoud Fathy; Morteza Romoozi; Mohammad Assarian
Volume 1, Issue 1 , February 2015, , Pages 9-18
Abstract
Realistic mobility models can demonstrate more precise evaluation results because their parameters are closer to the reality. In this paper a realistic Fuzzy Mobility Model has been proposed. This model has rules which are changeable depending on nodes and environmental conditions. It seems that this ...
Read More
Realistic mobility models can demonstrate more precise evaluation results because their parameters are closer to the reality. In this paper a realistic Fuzzy Mobility Model has been proposed. This model has rules which are changeable depending on nodes and environmental conditions. It seems that this model is more complete than other mobility models.After simulation, it was found out that not only considering nodes movement as being imprecise (fuzzy) has a positive effects on most of ad hoc network parameters, but also, more importantly as they are closer to the real world condition, they can have a more positive effect on the implementation of ad hoc network protocols.
Computer Networks and Distributed Systems
Zahra Kamaei; Hamidreza Bakhshi; Behrooz Masoumi
Volume 1, Issue 3 , August 2015, , Pages 9-16
Abstract
Wireless Sensor Networks are the new generation of networks that typically are formed great numbers of nodes and the communications of these nodes are done as Wireless. The main goal of these networks is collecting data from neighboring environment of network sensors. Since the sensor nodes are battery ...
Read More
Wireless Sensor Networks are the new generation of networks that typically are formed great numbers of nodes and the communications of these nodes are done as Wireless. The main goal of these networks is collecting data from neighboring environment of network sensors. Since the sensor nodes are battery operated and there is no possibility of charging or replacing the batteries, the lifetime of the networks is dependent on the energy of sensors. The objective of this research, is to combine the Harmony Search Algorithm and Ant Colony Optimization Algorithm, as successful meta heuristic algorithm to routing at wireless sensor to increase lifetime at this type of networks. To this purpose, algorithm called HS-ACO is suggested. In this algorithm, two criterion of reduction consumption of energy and appropriate distribution of consumption energy between nodes of sensor leads to increase lifetime of network is considered. Results of simulations, show the capability of the proposed algorithm in finding the Proper path and establishment appropriate balance in the energy consumed by the nodes. Propose algorithm is better than Harmony Search algorithm and Ant Colony Optimization algorithm and Genetic Ant algorithm.