Loading...
Search for: hemmatyar--mohammad-afshin
0.157 seconds

    Improve Quality of Service in Multi-hop Cognitive Radio Networks

    , M.Sc. Thesis Sharif University of Technology Elahi, Mohammad (Author) ; Hemmatyar, Ali Mohammad Afshin (Supervisor)
    Abstract
    Introducing a new paradigm, cognitive radio, for spectrum utilization of unlicensed users, new research on spectrum utilization of licensed users was planned. The results show inefficiency of spectrum usage, so cognitive radio network was introduced. Cognitive radio network should not have any affect on primary users activity, so these networks face with some chalenges and the important ones is the supporting of the QoS.
    In this thesis after analyzing of the proposed routing metrics for finding best end-to-end path, the important ones of them were selected for more precise analyzing. After analyzing we find some disadvantage, can be improved by multi-radio. Although all of these metrics... 

    Secure Data Collection in Wireless Multimedia Sensor Networks

    , M.Sc. Thesis Sharif University of Technology Saeidi, Maryam (Author) ; Hemmatyar, Mohammad Afshin (Supervisor)
    Abstract
    Wireless Multimedia Sensor Networks (WMSNs) have many applications in survilient systems. In this kind of applications, although we have limited energy and computational power, we should provide minimal security to transfer data in such networks. These constraints are more crucial when we use multimedia that has more data for processing and transmission. Because of this huge amount of data, we must use compression for using less energy in both processing and transmission.
    In some algorithms, it has been proposed to integrate compression and encryption in order to decrease time and power consumption. The proposed algorithm is several times faster than AES (Advanced Encryption Standard) or... 

    Survey on FRID Specifications and Requirements for Using in License Plates

    , M.Sc. Thesis Sharif University of Technology Boroumand, Moosareza (Author) ; Hemmatyar, Mohammad Afshin (Supervisor)
    Abstract
    An RFID (Radio Frequency Identification) device consists of a small and inexpensive microchip attached to an antenna. The chip can be very small and some RFID tags are thin enough to be embedded in paper. RFID are heavily used to track items in production environments and to label items in supermarkets, Hospital, Factory, License plate, Cattle….They are usually thought of as an advanced barcode. However, in this project we argue about RFID license plate and using RFID tags for recognize vehicle from distance. Radio Frequency Identification (RFID) tags has many applications in modern automatic and intelligent identification systems. Vehicles outfitted by RFID tags as License Plates, can be... 

    Analysis and Modeling of RFID Positioning Accuracy

    , M.Sc. Thesis Sharif University of Technology Fami, Foroutan (Author) ; Hemmatyar, Ali Mohammad Afshin (Supervisor)
    Abstract
    Indoor Positioning Systems (IPS) are commonly used in context-aware environments in order to determine the location of any desired object. In such environments location awareness is a key to adequate response. There are several positioning technologies available such as beacon-based positioning, camera-based positioning, Wi-Fi positioning, etc. Among these positioning systems Radio Frequency Identification (RFID) positioning has significant advantages over other technologies. Flexibility, ease of implementation, cost and accuracy are key advantages for RFID positioning technology. RFID positioning systems are classified in three categories: RF signal analysis-based, active RFID and passive... 

    Improving Securiry in VANETs

    , M.Sc. Thesis Sharif University of Technology Rezaei, Fatemeh (Author) ; Hemmatyar, Ali Mohammad Afshin (Supervisor)
    Abstract
    The Vehicular Ad hoc Network (VANET) have been presented to enhance the safety and comfort of driver and passengers. Thus, the functionality of VANET is related to the accuracy of disseminated messages about surrounding environment. Therefore, it is critical to detect the true reports among false reports which they have been reported by malicious nodes. However, in this research, the proposed scheme presents a centralized trust management assessment scheme named Detection of Best Report (DBR) in vehicular ad hoc environments. Each received message is evaluated individually according to its reporter interactions during event reporting. Based on this evaluation in RSU, the most reliable nodes... 

    Energy Optimization in Roadside Unit in Vehicular Ad-hoc Networks

    , M.Sc. Thesis Sharif University of Technology Rashidi, Zahra (Author) ; Afshin Hemmatyar, Ali Mohammad (Supervisor)
    Abstract
    Optimization of energy consumption is generally important in mobile networks and in particular in automotive networks. One of the challenges of installing roadside units in automotive case networks is to provide energy to the equipment assigned to these units. In some cases, power is easily available, but in many places, the cost of energy is very high and does not have economic justification. Therefore, optimization of energy consumption in roadside unit is of great importance. Typically, vehicles limitations in terms of energy consumption for communications are far lower than that of a roadside unit. In this dissertation, part of roadside communication to vehicles is shifted to the... 

    Reduction of Energy Consumption in Wireless Sensor Networks Using Genetic Algorithm

    , M.Sc. Thesis Sharif University of Technology Karimi, Mojtaba (Author) ; Hemmatyar, Ali Mohammad Afshin (Supervisor)
    Abstract
    Reducing energy consumption is one of the challenges facing wireless sensor networks with many solutions introduced for them with each having advantages and disadvantages. Some of the solutions introduced are based on using movable sinks. In this project, we attempt at proposing a place for the establishment of sinks using genetic algorithm that can reduce energy consumption in the net knots and increase the net life. This work should be done after reviewing the results of past researches and introduced methods. We will analyze the practicality of the proposed model using simulation and will show their advantages over the previous mentioned methods  

    Routing Off-chain Payments in Payment Channel Networks

    , M.Sc. Thesis Sharif University of Technology Dadjuy, Hadi (Author) ; Hemmatyar, Ali Mohammad Afshin (Supervisor)
    Abstract
    In 2008, a decentralized and distributed payment solution called Bitcoin was born. Since then, it has made the payment industry think about banks and companies on the one hand and government authorities on the other. By using mathematics and cryptography, Bitcoin was able to eliminate the need for trust and in this way it was able to eliminate intermediaries such as banks. In traditional financial affairs such as banks, the user must trust the bank and everything relies on the bank’s servers. While Bitcoin stores the history of transactions in a public and distributed ledger. This ledger is encrypted so that the state of the blockchain is always reliable. In Bitcoin’s decentralized and... 

    Improving Privacy in IoV Using Fog Computing

    , M.Sc. Thesis Sharif University of Technology Yavari, Morteza (Author) ; Hemmatyar, Ali Mohammad Afshin (Supervisor)
    Abstract
    Along with the emergence of the smart city concept and the increasing demand for a wide range of vehicles, the Internet of Vehicles (IoV) has attracted a lot of attention by providing numerous benefits including vehicle accident warning, reducing pollution levels and traffic congestion, as well as entertainment services. Furthermore, IoV offers various services combining Vehicular ad hoc networks (VANETs) and IoT in smart cities. However, these types of networks are exposed to a variety of security and privacy risks due to the wireless nature, because the sensitive message is transmitted through an insecure channel in the IoV-based smart city environment, therefore, it is necessary to... 

    Energy Management in Smart Manufacturing Based on AI Methods

    , M.Sc. Thesis Sharif University of Technology Moshiri, Abdollah (Author) ; Hemmatyar, Ali Mohammad Afshin (Supervisor)
    Abstract
    Focusing on developing the EEPS (Energy Electric and Power System) based on the SG (Smart Grid) infrastructure to achieve implementation of EI (Energy Internet) ultimately, in order to analyze and manage the energy/power consumption, requires a robust embedded EMS (Energy Management System) to implement real-time LF (Load Forecasting), prevent the power waste and realize consumption management which eventually leads toward the smart industries/buildings. STLF (Short Term Load Forecasting) is an essential component that an industrial plant requires to manage the power, regarding the load fluctuations during production, and compulsory requirement of cost mitigation. This thesis, in order to... 

    Enabling Open Rmote to Use Fog and Edge Computing

    , M.Sc. Thesis Sharif University of Technology Farahmand, Navid (Author) ; Hemmatyar, Ali Mohammad Afshin (Supervisor)
    Abstract
    The main idea of the upcoming research is to provide a way of benefiting from processing at the edge and processing in the fog for the open source platform openremote; In such a way that the central core of the platform can offload its processing tasks to the edge of the network. With this work, a large amount of the processes that used to be done by the core will be offloaded from the core. On the other hand, by applying processes at the edge of the network, it becomes possible to eliminate a large amount of overhead caused by raw data transmission, and as a result, the productivity of the network increases. In the current research, in addition to designing a model to add the mentioned... 

    Neighbor Discovery in Smartphone-Based Opportunistic Networks

    , M.Sc. Thesis Sharif University of Technology Hosseini, Mohammad Reza (Author) ; Hemmatyar, Ali Mohammad Afshin (Supervisor)
    Abstract
    In opportunistic networks, the nodes have ad-hoc communications that are formed directly between them, without any infrastructure, and not by any using any other intermediate node. In case that the destination node is not in the same region as the source during the sending of a message, the source will send the message to one or a few of its neighbors so that they can store and carry out the message to the original destination in cooperation known as Store-Carry-Forward Mechanism. Remarkably, in most cases, the devices involving in this type of network, e.g., smartphones, have limited source of energy or they use a battery, there is a need to minimize the energy consumption in the nodes.... 

    Mobility Pattern Recognition in Mobile Ad-Hoc Networks

    , M.Sc. Thesis Sharif University of Technology Khaledi, Mojgan (Author) ; Afshin Hemmatyar, Ali Mohammad (Supervisor)
    Abstract
    Mobility is one of the most challenging issues in mobile Ad-Hoc networks which has a significant impact on performance of network protocols. To cope with this issue, the protocol designers should be able to analyze the movement of mobile nodes in a particular wireless network. In this thesis, a new framework called Mobility Analyzer has been proposed. At first, Mobility Analyzer categorizes mobility models based on their mobility characteristics; subsequently, it uses mobility metrics for evaluating mobility traces which are collected by GPS or generated by mobility simulators. Finally, Mobility Analyzer recognizes the mobility model of mobility traces based on mobility metrics and measures... 

    Improvement of Resource Management Algorithms in Cognitive Radio Networks

    , M.Sc. Thesis Sharif University of Technology Ramezani, Yosef (Author) ; Hemmatyar, Ali Mohammad Afshin (Supervisor)
    Abstract
    Recent researches show inefficient use of frequency spectrum such that there is shortage of frequency in operation. In order to overcome this problem cognitive radio are introduced that opportunist usage of frequency band is their prominent characteristic. Problems and challenges caused by using these networks are wide and increasing. In this thesis we focus on improving resource management algorithms in cognitive radio. In this study in order to have a dynamic and efficient management in choosing reliable and quality channels, reinforcement learning algorithms are used based upon existing data and experiences. Since this tool has the learning capability and analysis in dynamic situation of... 

    Energy-Efficient Reliable Data Aggregation in Wireless Sensor Neworks

    , M.Sc. Thesis Sharif University of Technology Ashouri, Majid (Author) ; Hemmatyar, Ali Mohammad Afshin (Supervisor)
    Abstract
    Data aggregation is an efficient method to conserve energy by reducing packet transmissions in Wireless Sensor Networks. However, providing end-to-end data reliability is a major challenge when the network uses data aggregation. In this case a packet loss can miss a complete subtree of values, so greatly affect final results. Data transmission in multiple paths can tolerate this problem, but it may incur some computational error for duplicate-sensitive aggregates when aggregating individual sensor values multiple times. In this thesis, we have proposed a reliable data Aggregation protocol which uses the available path redundancy to deliver a correct aggregate result to the sink with a high... 

    Improving Anomaly Detection Methods for Intrusion Detection in MANETS

    , M.Sc. Thesis Sharif University of Technology Javanmard,Fahime (Author) ; Hemmatyar, Ali Mohammad Afshin (Supervisor)
    Abstract
    In recent decades, Securing mobile ad hoc networks has attracted much attention. Today, several security tools, such as intrusion detection systems are used in the network. Methods based IDS works on pattern recognition and anomaly detection are divided into two categories. Pattern recognition methods based on known attack patterns work with high detection rate, but do not have the ability to detect new attacks. Anomaly detection techniques have the ability to detect new attacks, but they have high false alarm rate.
    In this thesis, an anomaly detection system based on artificial immune designed, implemented and evaluated.For example, an anomaly detection methods such cases, a variety of... 

    A Multi-channel Scheme for Fast Data Collection in Wireless Sensor Networks

    , M.Sc. Thesis Sharif University of Technology Ghods, Fatemeh (Author) ; Hemmatyar, Ali Mohammad Afshin (Supervisor)
    Abstract
    With the development of technology and growing interest in using high performance and low price products, Wireless Sensor Networks (WSNs) are being dramatically deployed as an emerging technology. The main concern in WSNs is energy consumption that has an effect on sensor’s life time. In order to minimize the energy consumption, Data aggregation, which obtains aggregated values from WSNs, is an important functionality but yet time consuming. On the other hands, Emerging applications of Wireless Sensor Networks (WSNs) such as real-time detection of events need high-rate data collection, which is now an important challenge in WSNs. Multi-channel communication is one of the efficient methods to... 

    New Mobility Model for MANETs Based on Real Data of Human Mobility

    , M.Sc. Thesis Sharif University of Technology Foroozani, Ahmad (Author) ; Hemmatyar, Ali Mohammad Afshin (Supervisor)
    Abstract
    Due to difficulties in setting up real mobile ad hoc networks, researchers must use simulation tools to evaluate their new protocols. One of the most important issues in MANET simulations is node movements. In reality nodes in MANET are transported by peopleand because of this,mobility models are based on human mobility. On the other hand, data of human mobility are rare and they are related to special locations so, none of the existing models have all the human mobility properties. By collecting data of human mobilityin the city of Tehran, new mobility model has been proposed that captures human mobility properties and is more realistic than existing models  

    Improving Quality of Service in Multimedia Wireless Sensor Networks

    , M.Sc. Thesis Sharif University of Technology Malool, Iman (Author) ; Hemmatyar, Ali Mohammad Afshin (Supervisor)
    Abstract
    Due to their specific characteristics such as huge data loads, heavy processes, various quality of service requirements (delay, jitter and reliability), multimedia streams have different necessities in comparison with normal data streams. The challenges of wireless sensor networks (process power, storage capacity and power limitations) add up to the challenges faced in WMSNs. In order to improve the quality of service in wireless multimedia sensor networks, attention must be paid to all the network layers. In this study improvement of quality of service is sought through the design of a protocol for the network layer of the wireless multimedia sensor network.
    This protocol tries to... 

    Multipath Routing in Cognitive Radio Networks

    , M.Sc. Thesis Sharif University of Technology Rezaei, Shahbaz (Author) ; Hemmatyar, Ali Mohammad Afshin (Supervisor)
    Abstract
    Cognitive Radio (CR) technology enables dynamic spectrum access (DSA) to overcome the problems of unlicensed bands which is becoming overcrowded. However, providing an acceptable quality of service (QoS) for cognitive users requiresmore sophisticated approachesdut to the existence of primary users (PU) with their high priority over licensed bands. Additionally, reducing interference with primary users so that they can communicate without interruption is of extreme importance. In order to meet cognitive user’s quality of service as much as possible and reduce interference with PUs, a new class-based multipath on-demand routing protocol for cognitive radio networks (CMORC) is proposed. CMORC...