Computer Networks and Distributed Systems
Mona Alimardani; Amir Masoud Rahmani; Houman Zarrabi
Volume 3, Issue 4 , November 2017, Pages 181-188
Abstract
Advances in medical sciences with other fields of science and technology is closely casual profound mutations in different branches of science and methods for providing medical services affect the lives of its descriptor. Wireless Body Area Network (WBAN) represents such a leap. Those networks excite ...
Read More
Advances in medical sciences with other fields of science and technology is closely casual profound mutations in different branches of science and methods for providing medical services affect the lives of its descriptor. Wireless Body Area Network (WBAN) represents such a leap. Those networks excite new branches in the world of telemedicine. Small wireless sensors, to be quite precise and calculated, are installed in or on the body and create a WBAN that various vital statistics or environmental parameters sampling, processing and radio. These nodes allow independent monitoring of a person's location, in typical environments and for long periods and provide for the user and the medical, offer real-time feedback from the patient's health status. In this article, the introduction of WBAN and review issues and applications of medical sensor networks, to offer a protocol has been established that the threshold for data transmission reduces power consumption on sensor nodes, increasing the lifetime of the network and motion phase to increase the dynamics of the network. The proposed protocol in the network been compared with the SIMPLE and ATTEMPT protocols. Results indicate a significant reduction in energy consumption of sensors to reduce energy consumption the entire network.
Computer Networks and Distributed Systems
Elaheh Radmehr; HASSAN SHAKERI
Volume 3, Issue 4 , November 2017, Pages 189-194
Abstract
Wireless sensor networks have been widely considered as one of the most important 21th century technologies and are used in so many applications such as environmental monitoring, security and surveillance. Wireless sensor networks are used when it is not possible or convenient to supply signaling or ...
Read More
Wireless sensor networks have been widely considered as one of the most important 21th century technologies and are used in so many applications such as environmental monitoring, security and surveillance. Wireless sensor networks are used when it is not possible or convenient to supply signaling or power supply wires to a wireless sensor node. The wireless sensor node must be battery powered.Coverage and network lifetime are major problems in WSNs so in order to address this difficulty we propose a combinational method consists of fuzzy-logic and genetic algorithms. The proposed scheme detects the coverage holes in the network and selects the most appropriate hole's neighbor to move towards the blank area and compensate the coverage loss with fuzzy-logic contribution and above node new coordinate is determined by genetic algorithm. As fuzzy-logic will be so effective if more than one factor influence on decision making and also genetic algorithms perform well in dynamic problems so our proposed solution results in fast, optimized and reliable output
Computer Networks and Distributed Systems
Zoleikha Azizi; Kambiz Majidzadeh
Volume 3, Issue 4 , November 2017, Pages 195-202
Abstract
Considering the great significant role that routing protocols play in transfer rate and choosing the optimum path for exchange of data packages, and further in the amount of consumed energy in the routing protocol, the present study has focused on developing an efficient compound energy algorithm based ...
Read More
Considering the great significant role that routing protocols play in transfer rate and choosing the optimum path for exchange of data packages, and further in the amount of consumed energy in the routing protocol, the present study has focused on developing an efficient compound energy algorithm based on cluster structure which is called active node with cluster structure. The purpose of this algorithm is to distribute the heavy traffic of data and equal load of highly-consumed energy throughout the networks by introducing unequal and unbalanced clusters into the network. In the second stage, the light sensor mechanism which is called active node sensor algorithm has been proposed. The major purpose of this mechanism is to prevent excessive interfering data of sensors through incorporating a set of active nodes in each cluster with a defensive shield near to the incident node. The third stage has aimed at proposing an active node algorithm for complexity of internal and external addressing due to clusters routing in high density distribution based on the values within node range. The obtained results indicate relative success of the design in terms of energy optimization on the basis of routing protocol.
Computer Networks and Distributed Systems
Marzieh Bozorgi Elize; Ahmad KhademZadeh
Volume 3, Issue 4 , November 2017, Pages 203-212
Abstract
Cloud computing is a result of the continuing progress made in the areas of hardware, technologies related to the Internet, distributed computing and automated management. The Increasing demand has led to an increase in services resulting in the establishment of large-scale computing and data centers, ...
Read More
Cloud computing is a result of the continuing progress made in the areas of hardware, technologies related to the Internet, distributed computing and automated management. The Increasing demand has led to an increase in services resulting in the establishment of large-scale computing and data centers, in addition to high operating costs and huge amounts of electrical power consumption. Insufficient cooling systems and inefficient, causing overheating sources, shortening the life of the machine and too much carbon dioxide is produced. In this paper, we aim to improve system performance; Cloud Computing based on a decrease in migration of among virtual machines (VM), and reduce energy consumption to be able to manage resources to achieve optimal energy efficiency. For this reason, various techniques such as genetic algorithms (GAs), virtual machine migration and ways Dynamic voltage and frequency scaling (DVFS), and resize virtual machines to reduce energy consumption and fault tolerance are used. The main purpose of this article, the allocation of resources with the aim of reducing energy consumption in cloud computing. The results show that reduced energy consumption and hold down the rate of virtual machines breach of contract, reduces migration as well.
Computer Networks and Distributed Systems
mohammadreza hosseinzadehmoghadam; seyed javad mirabedini; toraj banirostam
Volume 3, Issue 4 , November 2017, Pages 213-222
Abstract
Abstract— In order to provide complete security in a computer system and to prevent intrusion, intrusion detection systems (IDS) are required to detect if an attacker crosses the firewall, antivirus, and other security devices. Data and options to deal with it. In this paper, we are trying to provide ...
Read More
Abstract— In order to provide complete security in a computer system and to prevent intrusion, intrusion detection systems (IDS) are required to detect if an attacker crosses the firewall, antivirus, and other security devices. Data and options to deal with it. In this paper, we are trying to provide a model for combining types of attacks on public data using combined methods of genetic algorithm and neural network. The goal is to make the designed model act as a measure of system attack and combine optimization algorithms to create the ultimate accuracy and reliability for the proposed model and reduce the error rate. To do this, we used a feedback neural network, and by examining the worker, it can be argued that this research with the new approach reduces errors in the classification.with the rapid development of communication and information technology and its applications, especially in computer networks, there is a new competition in information security and network security.
Computer Networks and Distributed Systems
Hussam Elbehiery
Volume 3, Issue 4 , November 2017, Pages 223-228
Abstract
Traffic congestion in road networks is one of the main issues to be addressed, also vehicle traffic congestion and monitoring has become one of the critical issues in road transport. With the help of Intelligent Transportation System (ITS), current information of traffic can be used by control room ...
Read More
Traffic congestion in road networks is one of the main issues to be addressed, also vehicle traffic congestion and monitoring has become one of the critical issues in road transport. With the help of Intelligent Transportation System (ITS), current information of traffic can be used by control room to improve the traffic efficiency. The suggested system utilize technologies for real-time collection, organization and transmission of information to provide an efficient and accurate estimation of traffic density which can be exploited by traffic-aware applications. So, the proposed architecture of Vehicle Traffic Congestion Control & Monitoring System in IoT would perform well. A short overview of the main currently used traffic control methods for freeways will be explained. A sensor array is a group/collection of sensors, usually it is deployed in a certain geometry pattern. So, efficiency of congestion in traffic will improve. The tangible Internet of Things (IoT) based service models which are helpful to academic and industrial world to understand IoT business will be discussed.