Pejman Khadivi | Isfahan University of Technology (original) (raw)

Papers by Pejman Khadivi

Research paper thumbnail of Using mobile node speed changes for movement direction change prediction in a realistic category of mobility models

In order to evaluate performance of protocols for ad hoc networks, the protocols have to be teste... more In order to evaluate performance of protocols for ad hoc networks, the protocols have to be tested under realistic conditions. These conditions may include a reasonable transmission range, a limited buffer size, and realistic movement of mobile users (mobility models). In this paper, we propose a new and realistic type of random mobility models in which the mobile node has to decelerate to reach the point of direction change and accelerates with a defined acceleration to reach its intended speed. This realistic mobility model is proposed based on random mobility models. In reality, mobile objects tend to change their speed when they are going to change their direction, i.e. decelerate when approaching a direction change point and accelerate when they start their movement in a new direction. Therefore, in this paper, we implement this behavior in random mobility models which lack such specification. In fact, this paper represents our effort to use this accelerated movement to anticipate a probable direction change of a mobile node with reasonable confidence. The simulation type of this paper is based on traces produced by a mobility trace generator tool. We use a data mining concept called association rule mining to find any possible correlations between accelerated movement of mobile node and the probability that mobile node wants to change its direction. We calculate confidence and lift parameters for this matter, and simulate this mobility model based on random mobility models. These simulations show a meaningful correlation between occurrence of an accelerated movement and event of mobile node's direction change.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Location based targeted advertising using Bayesian network and Fuzzy TOPSIS

2010 5th International Symposium on Telecommunications, 2010

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Mobile ad hoc relaying in hybrid WLAN/cellular systems for dropping probability reduction

Proceedings of the Nineth …, Jan 1, 2004

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Visual sensor network lifetime maximization by prioritized scheduling of nodes

Journal of Network and …, Jan 1, 2012

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Improving Success Ratio in Multi-Constraint Quality of Service Routing

Multi-constraint quality-of-service routing will become increasingly important as the Internet ev... more Multi-constraint quality-of-service routing will become increasingly important as the Internet evolves to support real-time services. It is well known however, that optimum multi-constraint QoS routing is computationally complex, and for this reason various heuristics have been proposed for routing in practical situations. Among these methods, those that use a single mixed metric are the most popular. Although mixed metric routing discards potentially useful information, this is compensated for by significantly reduced complexity. Exploiting this tradeoff is becoming increasingly important where low complexity designs are desired, such as in battery operated wireless applications. In this paper, a novel single mixed metric multi-constraint routing algorithm is introduced. The proposed technique has similar complexity compared with existing low complexity methods. Simulation results are presented which show that it can obtain better performance than comparable techniques in terms of generating feasible multi-constraint QoS routes.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Using Fault Avoidance for Fault Tolerant Routing In Interconnection Networks

ece.iut.ac.ir

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Secure Directional Routing to Prevent Relay Attack

Abstract In a wireless ad hoc network, routing process is done by means of some intermediate node... more Abstract In a wireless ad hoc network, routing process is done by means of some intermediate nodes. Hence, the behavior of these nodes is important for secure path establishment between the source and the destination nodes. Several secure routing ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Session 6F: Information Security Technology (II)

Breaker page.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Dropping Rate Reduction In Hybrid WLAN/Cellular Systems by Mobile Ad Hoc Relaying

Wireless Personal …, Jan 1, 2006

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Handoff Trigger Nodes for Hybrid IEEE 802.11 WLAN/Cellular Networks Ý

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Designing Underwater Cellular Networks Parameters

Majlesi Journal of Electrical …, Jan 1, 2009

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Maximum Permissible Density of Simultaneous Transmissions In Underwater Sensor Networks

ABSTRACT

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Multi-Constraint QoS Routing Using a New Single Mixed Metrics

Journal of Network and Computer …, Jan 1, 2008

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Investigation on Quality of Service In BGP/MPL VPN Network Based on Special Service

Majlesi Journal of Electrical …, Jan 1, 2010

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Using Relay Network to Increase Life Time In Wireless Body Area Sensor Networks

Wireless sensor network (WSN) is one of the most fascinating results of recent advances in multip... more Wireless sensor network (WSN) is one of the most fascinating results of recent advances in multiple branches of technology such as wireless systems, networking, microelectronic and sensor design. Nowadays WSNs are used in various potential applications. Typically a lot of ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Distributed Certificate Authority and Key Establishment Protocol for Mobile Ad Hoc Networks

10th International …, Jan 1, 2008

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Handoff In Hybrid Wireless Networks Based on Self Organization

IEEE International Conference on …, Jan 1, 2006

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Cluster-Based Key Establishment Protocol for Wireless Mobile Ad Hoc Networks

Advances in Computer …, Jan 1, 2009

H. Sarbazi-Azad et al. (Eds.): CSICC 2008, CCIS 6, pp. 585–592, 2008. © Springer-Verlag Berlin He... more H. Sarbazi-Azad et al. (Eds.): CSICC 2008, CCIS 6, pp. 585–592, 2008. © Springer-Verlag Berlin Heidelberg 2008 ... A Cluster-Based Key Establishment Protocol for Wireless ... Mohammad Sheikh Zefreh, Ali Fanian, Sayyed Mahdi Sajadieh, Pejman Khadivi, and Mehdi Berenjkoub

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Transmission Capacity of Underwater Sensor Networks: A Case for Fixed Distance

… Conference on Sensor …, Jan 1, 2008

Abstract In this paper, upper and lower bound on the transmission capacity of underwater sensor n... more Abstract In this paper, upper and lower bound on the transmission capacity of underwater sensor networks are derived. Transmission capacity is defined as the maximum permissible density of simultaneous transmissions that allows a certain probability of successful reception. In ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Application of Data Mining In Cryptanalysis

… of the 9th international conference on …, Jan 1, 2009

Cryptography is a popular method for information hiding and reaching confidentiality in digital w... more Cryptography is a popular method for information hiding and reaching confidentiality in digital world. On the other hand, cryptanalysis is an interesting and useful science from different viewpoints. All the digital materials that are processed by computers or transferred in data ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Using mobile node speed changes for movement direction change prediction in a realistic category of mobility models

In order to evaluate performance of protocols for ad hoc networks, the protocols have to be teste... more In order to evaluate performance of protocols for ad hoc networks, the protocols have to be tested under realistic conditions. These conditions may include a reasonable transmission range, a limited buffer size, and realistic movement of mobile users (mobility models). In this paper, we propose a new and realistic type of random mobility models in which the mobile node has to decelerate to reach the point of direction change and accelerates with a defined acceleration to reach its intended speed. This realistic mobility model is proposed based on random mobility models. In reality, mobile objects tend to change their speed when they are going to change their direction, i.e. decelerate when approaching a direction change point and accelerate when they start their movement in a new direction. Therefore, in this paper, we implement this behavior in random mobility models which lack such specification. In fact, this paper represents our effort to use this accelerated movement to anticipate a probable direction change of a mobile node with reasonable confidence. The simulation type of this paper is based on traces produced by a mobility trace generator tool. We use a data mining concept called association rule mining to find any possible correlations between accelerated movement of mobile node and the probability that mobile node wants to change its direction. We calculate confidence and lift parameters for this matter, and simulate this mobility model based on random mobility models. These simulations show a meaningful correlation between occurrence of an accelerated movement and event of mobile node's direction change.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Location based targeted advertising using Bayesian network and Fuzzy TOPSIS

2010 5th International Symposium on Telecommunications, 2010

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Mobile ad hoc relaying in hybrid WLAN/cellular systems for dropping probability reduction

Proceedings of the Nineth …, Jan 1, 2004

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Visual sensor network lifetime maximization by prioritized scheduling of nodes

Journal of Network and …, Jan 1, 2012

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Improving Success Ratio in Multi-Constraint Quality of Service Routing

Multi-constraint quality-of-service routing will become increasingly important as the Internet ev... more Multi-constraint quality-of-service routing will become increasingly important as the Internet evolves to support real-time services. It is well known however, that optimum multi-constraint QoS routing is computationally complex, and for this reason various heuristics have been proposed for routing in practical situations. Among these methods, those that use a single mixed metric are the most popular. Although mixed metric routing discards potentially useful information, this is compensated for by significantly reduced complexity. Exploiting this tradeoff is becoming increasingly important where low complexity designs are desired, such as in battery operated wireless applications. In this paper, a novel single mixed metric multi-constraint routing algorithm is introduced. The proposed technique has similar complexity compared with existing low complexity methods. Simulation results are presented which show that it can obtain better performance than comparable techniques in terms of generating feasible multi-constraint QoS routes.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Using Fault Avoidance for Fault Tolerant Routing In Interconnection Networks

ece.iut.ac.ir

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Secure Directional Routing to Prevent Relay Attack

Abstract In a wireless ad hoc network, routing process is done by means of some intermediate node... more Abstract In a wireless ad hoc network, routing process is done by means of some intermediate nodes. Hence, the behavior of these nodes is important for secure path establishment between the source and the destination nodes. Several secure routing ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Session 6F: Information Security Technology (II)

Breaker page.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Dropping Rate Reduction In Hybrid WLAN/Cellular Systems by Mobile Ad Hoc Relaying

Wireless Personal …, Jan 1, 2006

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Handoff Trigger Nodes for Hybrid IEEE 802.11 WLAN/Cellular Networks Ý

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Designing Underwater Cellular Networks Parameters

Majlesi Journal of Electrical …, Jan 1, 2009

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Maximum Permissible Density of Simultaneous Transmissions In Underwater Sensor Networks

ABSTRACT

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Multi-Constraint QoS Routing Using a New Single Mixed Metrics

Journal of Network and Computer …, Jan 1, 2008

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Investigation on Quality of Service In BGP/MPL VPN Network Based on Special Service

Majlesi Journal of Electrical …, Jan 1, 2010

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Using Relay Network to Increase Life Time In Wireless Body Area Sensor Networks

Wireless sensor network (WSN) is one of the most fascinating results of recent advances in multip... more Wireless sensor network (WSN) is one of the most fascinating results of recent advances in multiple branches of technology such as wireless systems, networking, microelectronic and sensor design. Nowadays WSNs are used in various potential applications. Typically a lot of ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Distributed Certificate Authority and Key Establishment Protocol for Mobile Ad Hoc Networks

10th International …, Jan 1, 2008

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Handoff In Hybrid Wireless Networks Based on Self Organization

IEEE International Conference on …, Jan 1, 2006

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Cluster-Based Key Establishment Protocol for Wireless Mobile Ad Hoc Networks

Advances in Computer …, Jan 1, 2009

H. Sarbazi-Azad et al. (Eds.): CSICC 2008, CCIS 6, pp. 585–592, 2008. © Springer-Verlag Berlin He... more H. Sarbazi-Azad et al. (Eds.): CSICC 2008, CCIS 6, pp. 585–592, 2008. © Springer-Verlag Berlin Heidelberg 2008 ... A Cluster-Based Key Establishment Protocol for Wireless ... Mohammad Sheikh Zefreh, Ali Fanian, Sayyed Mahdi Sajadieh, Pejman Khadivi, and Mehdi Berenjkoub

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Transmission Capacity of Underwater Sensor Networks: A Case for Fixed Distance

… Conference on Sensor …, Jan 1, 2008

Abstract In this paper, upper and lower bound on the transmission capacity of underwater sensor n... more Abstract In this paper, upper and lower bound on the transmission capacity of underwater sensor networks are derived. Transmission capacity is defined as the maximum permissible density of simultaneous transmissions that allows a certain probability of successful reception. In ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Application of Data Mining In Cryptanalysis

… of the 9th international conference on …, Jan 1, 2009

Cryptography is a popular method for information hiding and reaching confidentiality in digital w... more Cryptography is a popular method for information hiding and reaching confidentiality in digital world. On the other hand, cryptanalysis is an interesting and useful science from different viewpoints. All the digital materials that are processed by computers or transferred in data ...

Bookmarks Related papers MentionsView impact