behrang barekatain - Academia.edu (original) (raw)

Papers by behrang barekatain

Research paper thumbnail of MBL-DSDN: a novel load balancing algorithm in distributed software-defined networks based on micro-clustering and B-LSTM methods

˜The œJournal of supercomputing/Journal of supercomputing, Jun 1, 2024

Research paper thumbnail of Sin-Cos-bIAVOA: A New Feature Selection Method Based on Improved African Vulture Optimization Algorithm and a Novel Transfer Function to DDoS Attack Detection

Expert Systems With Applications, Oct 1, 2023

Research paper thumbnail of Performance Evaluation of Routing Protocols in Live Video Streaming over Wireless Mesh Networks

Jurnal teknologi, May 27, 2013

Research paper thumbnail of GAZELLE: An Enhanced Random Network Coding Based Framework for Efficient P2P Live Video Streaming Over Hybrid WMNs

Wireless Personal Communications, Dec 24, 2016

Although Peer-to-Peer live video streaming over wireless mesh networks (WMNs) is considered a pro... more Although Peer-to-Peer live video streaming over wireless mesh networks (WMNs) is considered a promising technology, some important challenges such as interference, mobility and limited available resources in gadgets (e.g. Smartphones and Tablets) may significantly reduce the perceived video quality. GREENIE and MATIN, in our previous studies, provided an efficient routing protocol in WMNs and a video streaming method based on random network coding (RNC), respectively. Therefore, their integration in the form of an enhanced framework, named GAZELLE, can considerably increase the video quality on these gadgets by decreasing the video distortion, dependency distortion, initial start-up delay and end-to-end delay. Findings using a precise simulation in OMNET?? show that GAZELLE noticeably outperforms other frameworks. GAZELLE not only decreases the imposed computational complexity and transmission overhead due to using RNC considerably, but it also efficiently routes video packets through those gadgets which does not require neither high battery energy sources nor high CPU power.

Research paper thumbnail of An enhanced AHP-TOPSIS-based clustering algorithm for high-quality live video streaming in flying ad hoc networks

The Journal of Supercomputing, Mar 9, 2021

Flying ad hoc networks (FANETs) consist of unmanned aerial vehicles (UAVs) with energy limitation... more Flying ad hoc networks (FANETs) consist of unmanned aerial vehicles (UAVs) with energy limitations which have the capability of sending recorded live video stream to supervise their surroundings completely and intelligently. Although significant efforts have been made by previous researchers to increase the quality of received video stream as a main mission of a UAV, challenges like energy consumption, effective use of bandwidth, effective clustering among UAVs and their intelligent communication with ground stations especially at the same time have not been noticed in the past research studies simultaneously. Therefore, in the proposed method, for the first time, a low complex AHP-TOPSIS hybrid algorithm has been used for effective clustering in FANETs. Cluster heads (CHs), in addition to imaging, receive the recorded videos frames by other UAVs through Wi-Fi and send them to the ground station through 5G connection. Using AHP-TOPSIS algorithm, the ground controller intelligently specifies which UAVs should be CH in regular intervals. Therefore, because of UAVs’ swarm reduction and, at the same time, effective use of bandwidth, traffic and delay in transferring live video frames are reduced which leads to achieving high video quality in ground station and, at the same time, reduction UAV energy consumption. The results of numerous simulations in OMNET + + under different conditions show that the parameters of video quality percentage, UAV average energy consumption and the number of necessary cluster head have been significantly improved when two famous mobility models including Paparazzi and Random Waypoint are considered comparing other methods.

Research paper thumbnail of A Comprehensive Evaluation of Different Loss Recovery Schemes in Peer-to-Peer Live Video Streaming over WMNs

In the recent years, Wireless Mesh Networks (WMNs) has become popular for video multicasting. Alt... more In the recent years, Wireless Mesh Networks (WMNs) has become popular for video multicasting. Although peer-to-peer communication lets wireless nodes improves the functionality of the video streaming applications over WMNs, required level of Quality-of-Service (QoS) is one of the most important challenges in these systems. Therefore, it is necessary to introduce new or enhance existing techniques in order to increase QoS for providing better perceived video quality on receivers. In this paper, different loss recovery schemes in peer-to-peer live video streaming over wireless mesh networks are evaluated precisely. The obtained results show how the provided efficiency by each of these schemes can improve the level of the introduced QoS in peer-to-peer live video streaming over WMNs.

Research paper thumbnail of An Intelligent Novel Hybrid Live Video Streaming Method in Mesh-Based Peer-to-Peer Networks

Research paper thumbnail of HDMS: high-performance dual-shaped microring-resonator-based optical switch

Optical Engineering, 2022

Abstract. The optical network-on-chip (ONoC) is a promising alternative to the traditional electr... more Abstract. The optical network-on-chip (ONoC) is a promising alternative to the traditional electrical network. However, in manycore systems, the crosstalk noise and insertion loss significantly limit the scalability of ONoCs. We propose a 2 × 2 optical switch composed of two microring resonator-based switching elements with no waveguide crossings. Also, the effects of reducing power loss, due to the waveguide crossing elimination, on the transmission spectra are investigated. The crosstalk noise is measured −15 dB for the through port and larger than −20 dB for the drop port. An insertion loss values on through and drop states are equal to 0.8 and 1.3 dB for λ = 1462.2 nm and λ = 1501 nm, respectively. The simulation results show that the 2 × 2 HDMS can be an appropriate candidate in silicon photonic integrated circuits.

Research paper thumbnail of Transparent and Robust Audio Watermarking Using Synergy LU Decomposition and the Fibonacci Sequence in GBT-DCT-DWT Transforms

JOURNAL OF ELECTRONIC AND CYBER DEFENCE, 2021

Digital watermarking technology is presented as one of the best solutions for solving unauthorize... more Digital watermarking technology is presented as one of the best solutions for solving unauthorized copying, content identification and authentication of digital media. Digital watermarking can be applied in the fields of image, text, audio, and video contents. Audio watermarking has recently attracted the attention of researchers because the human auditory system is much more sensitive than his vision system. Therefore, insertion of the data into audio signals in a transparent way is much more difficult than other watermarking species. An efficient audio watermarking system should be able to improve reconciliation of the three measures of transparency, strength and capacitance. Improving the compromise between these three measures is a challenging problem, due to the fact that increasing the capacity of the input signal, causes distortions in the signal which in turn causes a reduction in transparency and robustness. In this paper, a new method is proposed for watermarking of audio signals that is able to improve the three criteria of transparency, robustness and capacity in an appropriate manner. In order to improve the resilience of the hidden signal against signal processing attacks, the synergy of three efficient transforms in the field of signal processing namely, the graph-centric conversion (GBT), the discrete cosine transform (DCT) and the discrete wavelet transform (DWT), has been used. In addition, in order to maintain the transparency of the watermarked signal, the watermarked data in the high triangle matrix resulting from the LU decomposition of the approximation coefficients of the discrete wavelet are entered in an order which is based on the Fibonacci sequence. The procedure is based on the value of the watermarked bit, the non-zero values of the upper triangular matrix are replaced by the nearest even or odd numbers in the Fibonacci sequence. The latent extraction operation is completely blind. The results of the evaluation of the proposed method on audio files with Blue, Electronic, Classic and Jazz styles show that the proposed method, despite good resistance to various signal processing attacks, has an average signal rate of 45.13 dB and a placement rate of 625.75 bits per second.

Research paper thumbnail of Four components of pain management in Iranian neonatal Intensive Care Units: The nurses’ and physicians’ viewpoint

Journal of Education and Health Promotion, 2017

BACKGROUND: As an important right and a treatment priority, pain management and alleviation can p... more BACKGROUND: As an important right and a treatment priority, pain management and alleviation can prevent harmful consequences and sever effects to the infant. The aim of this study was to determine the nurses and physicians’ viewpoints about assessment, intervention, and evaluation of pain in the infants in the neonatal Intensive Care Units (NICUs). METHODS: The cross-sectional study was performed in census method in the NICUs of educational hospitals with participation of 157 staff in 2015 in Iran. Data collection tool was a questioner that was designed to assess the four components of pain management namely assessment, pharmacological intervention, nonpharmacological intervention, and evaluation. The collected data were analyzed in a descriptive and inferential statistics by means of the SPSS software, version 16. RESULTS: The findings of study indicated the total average scores of pain management from nurses and physicians’ viewpoint 66.7 and 65.5, respectively that were at the mo...

Research paper thumbnail of RI-RPL: a new high-quality RPL-based routing protocol using Q-learning algorithm

The Journal of Supercomputing

Research paper thumbnail of FSopt_k: Finding the Optimal Anonymization Level for a Social Network Graph

Applied Sciences

k-degree anonymity is known as one of the best models for anonymizing social network graphs. Alth... more k-degree anonymity is known as one of the best models for anonymizing social network graphs. Although recent works have tried to address the privacy challenges of social network graphs, privacy levels are considered to be independent of the features of the graph degree sequence. In other words, the optimal value of k is not considered for the graph, leading to increasing information loss. Additionally, the graph may not need a high privacy level. In addition, determining the optimal value of k for the graph in advance is a big problem for the data owner. Therefore, in this paper, we present a technique named FSopt_k that is able to find the optimal value of k for each social network graph. This algorithm uses an efficient technique to partition the graph nodes to choose the best k value. It considers the graph structure features to determine the best privacy level. In this way, there will be a balance between privacy and loss in the anonymized graph. Furthermore, information loss wi...

Research paper thumbnail of Correction to: Improve customer churn prediction through the proposed PCA‑PSO‑K means algorithm in the communication industry

The Journal of Supercomputing

Research paper thumbnail of FSCN: A Novel Forwarding Method based on Shannon Entropy and COPRAS Decision Process in Named Data Networking

One of the next-generation Information-Centric Networking (ICN) architectures for the future Inte... more One of the next-generation Information-Centric Networking (ICN) architectures for the future Internet is Named Data Networking (NDN). The appropriate output interface (forwarding) has recently emerged as a key challenge affecting the performance of this network and has received a lot of attention from researchers due to its importance. Although efforts have been made through the methods introduced so far to address this challenge, the neglect of effective network load balancing parameters, non-dynamic weighting, and the use of only a few criteria have been suggested for selecting the output interface have made it vital to further improve the network delay, congestion, and ultimately the network's throughput. Regarding this matter, a new strategy is presented in this article based on the COPRAS Decision-Making Process with the dynamic weighting of Shannon's entropy called FSCN for transmitting request packets through the optimal output interface. The essential parameters iden...

Research paper thumbnail of A Novel Efficient Energy-Aware Coverage Hole Detection Algorithm in Wireless Sensor Networks

Signal and Data Processing

One of the most widely researched areas in wireless sensor networks is the issue of coverage. Cov... more One of the most widely researched areas in wireless sensor networks is the issue of coverage. Coverage is directly related to the degree of quality, how and how long the sensors are able to detect predetermined targets in areas. Standard coverage for calculating network Quality of Service (QoS) greatly affects network performance. The most important factor in maximum coverage in wireless sensor networks is to consider the energy consumption constraints. Sensor nodes typically use a battery to supply power, which in most cases is not rechargeable; therefore, it is very important to carry out operations to reduce energy consumption and increase the life of the sensor node. Full network coverage is such that all areas of interest must be monitored and covered by diffused sensors. Now, if a certain area is not covered by any sensor, it is known as a cover hole and the real events in the cover points will not be recognizable and traceable. The aim of this study is to identify cover holes to reduce energy consumption in wireless sensor networks; which is applied by presenting a new model of credit management system. In this system, the sensor radius of the nodes is adjusted for maximum coverage in the network. In the

Research paper thumbnail of Improve customer churn prediction through the proposed PCA-PSO-K means algorithm in the communication industry

The Journal of Supercomputing

Research paper thumbnail of GOP-SDN: an enhanced load balancing method based on genetic and optimized particle swarm optimization algorithm in distributed SDNs

Research paper thumbnail of A New Low Power, Area Efficient 4-bit Carry Look Ahead Adder in CNFET Technology

Majlesi Journal of Electrical Engineering

Research paper thumbnail of A Novel Energy-aware for efficient coverage hole detection in wireless sensor networks

Signal and Data Processing, Oct 10, 2021

Research paper thumbnail of LOADng-AT: a novel practical implementation of hybrid AHP-TOPSIS algorithm in reactive routing protocol for intelligent IoT-based networks

The Journal of Supercomputing, 2022

Despite that IoT technology provides a promising future for human life, some significant challeng... more Despite that IoT technology provides a promising future for human life, some significant challenges such as routing, security, low-cost equipment, energy consumption, privacy, and reliability can considerably affect its performance. In recent studies, routing has been considered as one of the most critical challenges in IoT due to many existing IoT devices in a network. Selecting a non-optimal path increases collision probability and packet latency which sharply reduces the network performance. Hence, a novel flexible, scalable, and efficient routing protocol named LOADng-AT has been introduced in this study to overcome this challenge. Using LOADng-AT, firstly, taking advantage of the hello message, information about link quality parameters up to two hops is exchanged among nodes. This information includes various parameters such as bi-/unidirectional links, ETX, number of neighbors, link stability, received and residual energy, and SINR, gathered by hello message. Secondly, considering those parameters simultaneously, LOADng-AT efficiently chooses the best possible route based on the hybrid AHP-TOPSIS algorithm. The proposed protocol considerably decreases the RREQ broadcast storm. Moreover, it supports an error recovery path without rerunning a new routing process that noticeably decreases the network routing delay. LOADng-AT can be easily adapted to any QoS parameter with very low complexity which is very important for a delay-sensitive IoT-based network. Finally, in case of noisy condition, the proposed protocol can be efficiently used in low-quality links. Simulation results based on several scenarios in the OMNET ++ simulator show that end-to-end delay (EED) and packet delivery ratio (PDR) parameters significantly improved in the proposed method compared to other similar methods. In other words, using LOADng-AT, the mean values of PDR parameter were 98.64 and 82 percent for network sizes 400 × 200 and 800 × 400 m 2 , respectively, while the mean values of EED were 0.001 and 0.018 for network sizes 400 × 200 and 800 × 400 m 2 , respectively. The overall improvement for PDR and Extended author information available on the last page of the article Z. Sharifian et al. 1 3 EED parameters in all 60 considered scenarios compared to similar methods were 82.26 and 16.6 percent, respectively.

Research paper thumbnail of MBL-DSDN: a novel load balancing algorithm in distributed software-defined networks based on micro-clustering and B-LSTM methods

˜The œJournal of supercomputing/Journal of supercomputing, Jun 1, 2024

Research paper thumbnail of Sin-Cos-bIAVOA: A New Feature Selection Method Based on Improved African Vulture Optimization Algorithm and a Novel Transfer Function to DDoS Attack Detection

Expert Systems With Applications, Oct 1, 2023

Research paper thumbnail of Performance Evaluation of Routing Protocols in Live Video Streaming over Wireless Mesh Networks

Jurnal teknologi, May 27, 2013

Research paper thumbnail of GAZELLE: An Enhanced Random Network Coding Based Framework for Efficient P2P Live Video Streaming Over Hybrid WMNs

Wireless Personal Communications, Dec 24, 2016

Although Peer-to-Peer live video streaming over wireless mesh networks (WMNs) is considered a pro... more Although Peer-to-Peer live video streaming over wireless mesh networks (WMNs) is considered a promising technology, some important challenges such as interference, mobility and limited available resources in gadgets (e.g. Smartphones and Tablets) may significantly reduce the perceived video quality. GREENIE and MATIN, in our previous studies, provided an efficient routing protocol in WMNs and a video streaming method based on random network coding (RNC), respectively. Therefore, their integration in the form of an enhanced framework, named GAZELLE, can considerably increase the video quality on these gadgets by decreasing the video distortion, dependency distortion, initial start-up delay and end-to-end delay. Findings using a precise simulation in OMNET?? show that GAZELLE noticeably outperforms other frameworks. GAZELLE not only decreases the imposed computational complexity and transmission overhead due to using RNC considerably, but it also efficiently routes video packets through those gadgets which does not require neither high battery energy sources nor high CPU power.

Research paper thumbnail of An enhanced AHP-TOPSIS-based clustering algorithm for high-quality live video streaming in flying ad hoc networks

The Journal of Supercomputing, Mar 9, 2021

Flying ad hoc networks (FANETs) consist of unmanned aerial vehicles (UAVs) with energy limitation... more Flying ad hoc networks (FANETs) consist of unmanned aerial vehicles (UAVs) with energy limitations which have the capability of sending recorded live video stream to supervise their surroundings completely and intelligently. Although significant efforts have been made by previous researchers to increase the quality of received video stream as a main mission of a UAV, challenges like energy consumption, effective use of bandwidth, effective clustering among UAVs and their intelligent communication with ground stations especially at the same time have not been noticed in the past research studies simultaneously. Therefore, in the proposed method, for the first time, a low complex AHP-TOPSIS hybrid algorithm has been used for effective clustering in FANETs. Cluster heads (CHs), in addition to imaging, receive the recorded videos frames by other UAVs through Wi-Fi and send them to the ground station through 5G connection. Using AHP-TOPSIS algorithm, the ground controller intelligently specifies which UAVs should be CH in regular intervals. Therefore, because of UAVs’ swarm reduction and, at the same time, effective use of bandwidth, traffic and delay in transferring live video frames are reduced which leads to achieving high video quality in ground station and, at the same time, reduction UAV energy consumption. The results of numerous simulations in OMNET + + under different conditions show that the parameters of video quality percentage, UAV average energy consumption and the number of necessary cluster head have been significantly improved when two famous mobility models including Paparazzi and Random Waypoint are considered comparing other methods.

Research paper thumbnail of A Comprehensive Evaluation of Different Loss Recovery Schemes in Peer-to-Peer Live Video Streaming over WMNs

In the recent years, Wireless Mesh Networks (WMNs) has become popular for video multicasting. Alt... more In the recent years, Wireless Mesh Networks (WMNs) has become popular for video multicasting. Although peer-to-peer communication lets wireless nodes improves the functionality of the video streaming applications over WMNs, required level of Quality-of-Service (QoS) is one of the most important challenges in these systems. Therefore, it is necessary to introduce new or enhance existing techniques in order to increase QoS for providing better perceived video quality on receivers. In this paper, different loss recovery schemes in peer-to-peer live video streaming over wireless mesh networks are evaluated precisely. The obtained results show how the provided efficiency by each of these schemes can improve the level of the introduced QoS in peer-to-peer live video streaming over WMNs.

Research paper thumbnail of An Intelligent Novel Hybrid Live Video Streaming Method in Mesh-Based Peer-to-Peer Networks

Research paper thumbnail of HDMS: high-performance dual-shaped microring-resonator-based optical switch

Optical Engineering, 2022

Abstract. The optical network-on-chip (ONoC) is a promising alternative to the traditional electr... more Abstract. The optical network-on-chip (ONoC) is a promising alternative to the traditional electrical network. However, in manycore systems, the crosstalk noise and insertion loss significantly limit the scalability of ONoCs. We propose a 2 × 2 optical switch composed of two microring resonator-based switching elements with no waveguide crossings. Also, the effects of reducing power loss, due to the waveguide crossing elimination, on the transmission spectra are investigated. The crosstalk noise is measured −15 dB for the through port and larger than −20 dB for the drop port. An insertion loss values on through and drop states are equal to 0.8 and 1.3 dB for λ = 1462.2 nm and λ = 1501 nm, respectively. The simulation results show that the 2 × 2 HDMS can be an appropriate candidate in silicon photonic integrated circuits.

Research paper thumbnail of Transparent and Robust Audio Watermarking Using Synergy LU Decomposition and the Fibonacci Sequence in GBT-DCT-DWT Transforms

JOURNAL OF ELECTRONIC AND CYBER DEFENCE, 2021

Digital watermarking technology is presented as one of the best solutions for solving unauthorize... more Digital watermarking technology is presented as one of the best solutions for solving unauthorized copying, content identification and authentication of digital media. Digital watermarking can be applied in the fields of image, text, audio, and video contents. Audio watermarking has recently attracted the attention of researchers because the human auditory system is much more sensitive than his vision system. Therefore, insertion of the data into audio signals in a transparent way is much more difficult than other watermarking species. An efficient audio watermarking system should be able to improve reconciliation of the three measures of transparency, strength and capacitance. Improving the compromise between these three measures is a challenging problem, due to the fact that increasing the capacity of the input signal, causes distortions in the signal which in turn causes a reduction in transparency and robustness. In this paper, a new method is proposed for watermarking of audio signals that is able to improve the three criteria of transparency, robustness and capacity in an appropriate manner. In order to improve the resilience of the hidden signal against signal processing attacks, the synergy of three efficient transforms in the field of signal processing namely, the graph-centric conversion (GBT), the discrete cosine transform (DCT) and the discrete wavelet transform (DWT), has been used. In addition, in order to maintain the transparency of the watermarked signal, the watermarked data in the high triangle matrix resulting from the LU decomposition of the approximation coefficients of the discrete wavelet are entered in an order which is based on the Fibonacci sequence. The procedure is based on the value of the watermarked bit, the non-zero values of the upper triangular matrix are replaced by the nearest even or odd numbers in the Fibonacci sequence. The latent extraction operation is completely blind. The results of the evaluation of the proposed method on audio files with Blue, Electronic, Classic and Jazz styles show that the proposed method, despite good resistance to various signal processing attacks, has an average signal rate of 45.13 dB and a placement rate of 625.75 bits per second.

Research paper thumbnail of Four components of pain management in Iranian neonatal Intensive Care Units: The nurses’ and physicians’ viewpoint

Journal of Education and Health Promotion, 2017

BACKGROUND: As an important right and a treatment priority, pain management and alleviation can p... more BACKGROUND: As an important right and a treatment priority, pain management and alleviation can prevent harmful consequences and sever effects to the infant. The aim of this study was to determine the nurses and physicians’ viewpoints about assessment, intervention, and evaluation of pain in the infants in the neonatal Intensive Care Units (NICUs). METHODS: The cross-sectional study was performed in census method in the NICUs of educational hospitals with participation of 157 staff in 2015 in Iran. Data collection tool was a questioner that was designed to assess the four components of pain management namely assessment, pharmacological intervention, nonpharmacological intervention, and evaluation. The collected data were analyzed in a descriptive and inferential statistics by means of the SPSS software, version 16. RESULTS: The findings of study indicated the total average scores of pain management from nurses and physicians’ viewpoint 66.7 and 65.5, respectively that were at the mo...

Research paper thumbnail of RI-RPL: a new high-quality RPL-based routing protocol using Q-learning algorithm

The Journal of Supercomputing

Research paper thumbnail of FSopt_k: Finding the Optimal Anonymization Level for a Social Network Graph

Applied Sciences

k-degree anonymity is known as one of the best models for anonymizing social network graphs. Alth... more k-degree anonymity is known as one of the best models for anonymizing social network graphs. Although recent works have tried to address the privacy challenges of social network graphs, privacy levels are considered to be independent of the features of the graph degree sequence. In other words, the optimal value of k is not considered for the graph, leading to increasing information loss. Additionally, the graph may not need a high privacy level. In addition, determining the optimal value of k for the graph in advance is a big problem for the data owner. Therefore, in this paper, we present a technique named FSopt_k that is able to find the optimal value of k for each social network graph. This algorithm uses an efficient technique to partition the graph nodes to choose the best k value. It considers the graph structure features to determine the best privacy level. In this way, there will be a balance between privacy and loss in the anonymized graph. Furthermore, information loss wi...

Research paper thumbnail of Correction to: Improve customer churn prediction through the proposed PCA‑PSO‑K means algorithm in the communication industry

The Journal of Supercomputing

Research paper thumbnail of FSCN: A Novel Forwarding Method based on Shannon Entropy and COPRAS Decision Process in Named Data Networking

One of the next-generation Information-Centric Networking (ICN) architectures for the future Inte... more One of the next-generation Information-Centric Networking (ICN) architectures for the future Internet is Named Data Networking (NDN). The appropriate output interface (forwarding) has recently emerged as a key challenge affecting the performance of this network and has received a lot of attention from researchers due to its importance. Although efforts have been made through the methods introduced so far to address this challenge, the neglect of effective network load balancing parameters, non-dynamic weighting, and the use of only a few criteria have been suggested for selecting the output interface have made it vital to further improve the network delay, congestion, and ultimately the network's throughput. Regarding this matter, a new strategy is presented in this article based on the COPRAS Decision-Making Process with the dynamic weighting of Shannon's entropy called FSCN for transmitting request packets through the optimal output interface. The essential parameters iden...

Research paper thumbnail of A Novel Efficient Energy-Aware Coverage Hole Detection Algorithm in Wireless Sensor Networks

Signal and Data Processing

One of the most widely researched areas in wireless sensor networks is the issue of coverage. Cov... more One of the most widely researched areas in wireless sensor networks is the issue of coverage. Coverage is directly related to the degree of quality, how and how long the sensors are able to detect predetermined targets in areas. Standard coverage for calculating network Quality of Service (QoS) greatly affects network performance. The most important factor in maximum coverage in wireless sensor networks is to consider the energy consumption constraints. Sensor nodes typically use a battery to supply power, which in most cases is not rechargeable; therefore, it is very important to carry out operations to reduce energy consumption and increase the life of the sensor node. Full network coverage is such that all areas of interest must be monitored and covered by diffused sensors. Now, if a certain area is not covered by any sensor, it is known as a cover hole and the real events in the cover points will not be recognizable and traceable. The aim of this study is to identify cover holes to reduce energy consumption in wireless sensor networks; which is applied by presenting a new model of credit management system. In this system, the sensor radius of the nodes is adjusted for maximum coverage in the network. In the

Research paper thumbnail of Improve customer churn prediction through the proposed PCA-PSO-K means algorithm in the communication industry

The Journal of Supercomputing

Research paper thumbnail of GOP-SDN: an enhanced load balancing method based on genetic and optimized particle swarm optimization algorithm in distributed SDNs

Research paper thumbnail of A New Low Power, Area Efficient 4-bit Carry Look Ahead Adder in CNFET Technology

Majlesi Journal of Electrical Engineering

Research paper thumbnail of A Novel Energy-aware for efficient coverage hole detection in wireless sensor networks

Signal and Data Processing, Oct 10, 2021

Research paper thumbnail of LOADng-AT: a novel practical implementation of hybrid AHP-TOPSIS algorithm in reactive routing protocol for intelligent IoT-based networks

The Journal of Supercomputing, 2022

Despite that IoT technology provides a promising future for human life, some significant challeng... more Despite that IoT technology provides a promising future for human life, some significant challenges such as routing, security, low-cost equipment, energy consumption, privacy, and reliability can considerably affect its performance. In recent studies, routing has been considered as one of the most critical challenges in IoT due to many existing IoT devices in a network. Selecting a non-optimal path increases collision probability and packet latency which sharply reduces the network performance. Hence, a novel flexible, scalable, and efficient routing protocol named LOADng-AT has been introduced in this study to overcome this challenge. Using LOADng-AT, firstly, taking advantage of the hello message, information about link quality parameters up to two hops is exchanged among nodes. This information includes various parameters such as bi-/unidirectional links, ETX, number of neighbors, link stability, received and residual energy, and SINR, gathered by hello message. Secondly, considering those parameters simultaneously, LOADng-AT efficiently chooses the best possible route based on the hybrid AHP-TOPSIS algorithm. The proposed protocol considerably decreases the RREQ broadcast storm. Moreover, it supports an error recovery path without rerunning a new routing process that noticeably decreases the network routing delay. LOADng-AT can be easily adapted to any QoS parameter with very low complexity which is very important for a delay-sensitive IoT-based network. Finally, in case of noisy condition, the proposed protocol can be efficiently used in low-quality links. Simulation results based on several scenarios in the OMNET ++ simulator show that end-to-end delay (EED) and packet delivery ratio (PDR) parameters significantly improved in the proposed method compared to other similar methods. In other words, using LOADng-AT, the mean values of PDR parameter were 98.64 and 82 percent for network sizes 400 × 200 and 800 × 400 m 2 , respectively, while the mean values of EED were 0.001 and 0.018 for network sizes 400 × 200 and 800 × 400 m 2 , respectively. The overall improvement for PDR and Extended author information available on the last page of the article Z. Sharifian et al. 1 3 EED parameters in all 60 considered scenarios compared to similar methods were 82.26 and 16.6 percent, respectively.