Pejman Khadivi | Isfahan University of Technology (original) (raw)
Papers by Pejman Khadivi
In order to evaluate performance of protocols for ad hoc networks, the protocols have to be teste... more In order to evaluate performance of protocols for ad hoc networks, the protocols have to be tested under realistic conditions. These conditions may include a reasonable transmission range, a limited buffer size, and realistic movement of mobile users (mobility models). In this paper, we propose a new and realistic type of random mobility models in which the mobile node has to decelerate to reach the point of direction change and accelerates with a defined acceleration to reach its intended speed. This realistic mobility model is proposed based on random mobility models. In reality, mobile objects tend to change their speed when they are going to change their direction, i.e. decelerate when approaching a direction change point and accelerate when they start their movement in a new direction. Therefore, in this paper, we implement this behavior in random mobility models which lack such specification. In fact, this paper represents our effort to use this accelerated movement to anticipate a probable direction change of a mobile node with reasonable confidence. The simulation type of this paper is based on traces produced by a mobility trace generator tool. We use a data mining concept called association rule mining to find any possible correlations between accelerated movement of mobile node and the probability that mobile node wants to change its direction. We calculate confidence and lift parameters for this matter, and simulate this mobility model based on random mobility models. These simulations show a meaningful correlation between occurrence of an accelerated movement and event of mobile node's direction change.
Bookmarks Related papers MentionsView impact
2010 5th International Symposium on Telecommunications, 2010
Bookmarks Related papers MentionsView impact
Proceedings of the Nineth …, Jan 1, 2004
Bookmarks Related papers MentionsView impact
Journal of Network and …, Jan 1, 2012
Bookmarks Related papers MentionsView impact
Multi-constraint quality-of-service routing will become increasingly important as the Internet ev... more Multi-constraint quality-of-service routing will become increasingly important as the Internet evolves to support real-time services. It is well known however, that optimum multi-constraint QoS routing is computationally complex, and for this reason various heuristics have been proposed for routing in practical situations. Among these methods, those that use a single mixed metric are the most popular. Although mixed metric routing discards potentially useful information, this is compensated for by significantly reduced complexity. Exploiting this tradeoff is becoming increasingly important where low complexity designs are desired, such as in battery operated wireless applications. In this paper, a novel single mixed metric multi-constraint routing algorithm is introduced. The proposed technique has similar complexity compared with existing low complexity methods. Simulation results are presented which show that it can obtain better performance than comparable techniques in terms of generating feasible multi-constraint QoS routes.
Bookmarks Related papers MentionsView impact
ece.iut.ac.ir
Bookmarks Related papers MentionsView impact
Abstract In a wireless ad hoc network, routing process is done by means of some intermediate node... more Abstract In a wireless ad hoc network, routing process is done by means of some intermediate nodes. Hence, the behavior of these nodes is important for secure path establishment between the source and the destination nodes. Several secure routing ...
Bookmarks Related papers MentionsView impact
Breaker page.
Bookmarks Related papers MentionsView impact
Wireless Personal …, Jan 1, 2006
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Majlesi Journal of Electrical …, Jan 1, 2009
Bookmarks Related papers MentionsView impact
ABSTRACT
Bookmarks Related papers MentionsView impact
Journal of Network and Computer …, Jan 1, 2008
Bookmarks Related papers MentionsView impact
Majlesi Journal of Electrical …, Jan 1, 2010
Bookmarks Related papers MentionsView impact
Wireless sensor network (WSN) is one of the most fascinating results of recent advances in multip... more Wireless sensor network (WSN) is one of the most fascinating results of recent advances in multiple branches of technology such as wireless systems, networking, microelectronic and sensor design. Nowadays WSNs are used in various potential applications. Typically a lot of ...
Bookmarks Related papers MentionsView impact
10th International …, Jan 1, 2008
Bookmarks Related papers MentionsView impact
IEEE International Conference on …, Jan 1, 2006
Bookmarks Related papers MentionsView impact
Advances in Computer …, Jan 1, 2009
H. Sarbazi-Azad et al. (Eds.): CSICC 2008, CCIS 6, pp. 585592, 2008. © Springer-Verlag Berlin He... more H. Sarbazi-Azad et al. (Eds.): CSICC 2008, CCIS 6, pp. 585592, 2008. © Springer-Verlag Berlin Heidelberg 2008 ... A Cluster-Based Key Establishment Protocol for Wireless ... Mohammad Sheikh Zefreh, Ali Fanian, Sayyed Mahdi Sajadieh, Pejman Khadivi, and Mehdi Berenjkoub
Bookmarks Related papers MentionsView impact
… Conference on Sensor …, Jan 1, 2008
Abstract In this paper, upper and lower bound on the transmission capacity of underwater sensor n... more Abstract In this paper, upper and lower bound on the transmission capacity of underwater sensor networks are derived. Transmission capacity is defined as the maximum permissible density of simultaneous transmissions that allows a certain probability of successful reception. In ...
Bookmarks Related papers MentionsView impact
… of the 9th international conference on …, Jan 1, 2009
Cryptography is a popular method for information hiding and reaching confidentiality in digital w... more Cryptography is a popular method for information hiding and reaching confidentiality in digital world. On the other hand, cryptanalysis is an interesting and useful science from different viewpoints. All the digital materials that are processed by computers or transferred in data ...
Bookmarks Related papers MentionsView impact
In order to evaluate performance of protocols for ad hoc networks, the protocols have to be teste... more In order to evaluate performance of protocols for ad hoc networks, the protocols have to be tested under realistic conditions. These conditions may include a reasonable transmission range, a limited buffer size, and realistic movement of mobile users (mobility models). In this paper, we propose a new and realistic type of random mobility models in which the mobile node has to decelerate to reach the point of direction change and accelerates with a defined acceleration to reach its intended speed. This realistic mobility model is proposed based on random mobility models. In reality, mobile objects tend to change their speed when they are going to change their direction, i.e. decelerate when approaching a direction change point and accelerate when they start their movement in a new direction. Therefore, in this paper, we implement this behavior in random mobility models which lack such specification. In fact, this paper represents our effort to use this accelerated movement to anticipate a probable direction change of a mobile node with reasonable confidence. The simulation type of this paper is based on traces produced by a mobility trace generator tool. We use a data mining concept called association rule mining to find any possible correlations between accelerated movement of mobile node and the probability that mobile node wants to change its direction. We calculate confidence and lift parameters for this matter, and simulate this mobility model based on random mobility models. These simulations show a meaningful correlation between occurrence of an accelerated movement and event of mobile node's direction change.
Bookmarks Related papers MentionsView impact
2010 5th International Symposium on Telecommunications, 2010
Bookmarks Related papers MentionsView impact
Proceedings of the Nineth …, Jan 1, 2004
Bookmarks Related papers MentionsView impact
Journal of Network and …, Jan 1, 2012
Bookmarks Related papers MentionsView impact
Multi-constraint quality-of-service routing will become increasingly important as the Internet ev... more Multi-constraint quality-of-service routing will become increasingly important as the Internet evolves to support real-time services. It is well known however, that optimum multi-constraint QoS routing is computationally complex, and for this reason various heuristics have been proposed for routing in practical situations. Among these methods, those that use a single mixed metric are the most popular. Although mixed metric routing discards potentially useful information, this is compensated for by significantly reduced complexity. Exploiting this tradeoff is becoming increasingly important where low complexity designs are desired, such as in battery operated wireless applications. In this paper, a novel single mixed metric multi-constraint routing algorithm is introduced. The proposed technique has similar complexity compared with existing low complexity methods. Simulation results are presented which show that it can obtain better performance than comparable techniques in terms of generating feasible multi-constraint QoS routes.
Bookmarks Related papers MentionsView impact
ece.iut.ac.ir
Bookmarks Related papers MentionsView impact
Abstract In a wireless ad hoc network, routing process is done by means of some intermediate node... more Abstract In a wireless ad hoc network, routing process is done by means of some intermediate nodes. Hence, the behavior of these nodes is important for secure path establishment between the source and the destination nodes. Several secure routing ...
Bookmarks Related papers MentionsView impact
Breaker page.
Bookmarks Related papers MentionsView impact
Wireless Personal …, Jan 1, 2006
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Majlesi Journal of Electrical …, Jan 1, 2009
Bookmarks Related papers MentionsView impact
ABSTRACT
Bookmarks Related papers MentionsView impact
Journal of Network and Computer …, Jan 1, 2008
Bookmarks Related papers MentionsView impact
Majlesi Journal of Electrical …, Jan 1, 2010
Bookmarks Related papers MentionsView impact
Wireless sensor network (WSN) is one of the most fascinating results of recent advances in multip... more Wireless sensor network (WSN) is one of the most fascinating results of recent advances in multiple branches of technology such as wireless systems, networking, microelectronic and sensor design. Nowadays WSNs are used in various potential applications. Typically a lot of ...
Bookmarks Related papers MentionsView impact
10th International …, Jan 1, 2008
Bookmarks Related papers MentionsView impact
IEEE International Conference on …, Jan 1, 2006
Bookmarks Related papers MentionsView impact
Advances in Computer …, Jan 1, 2009
H. Sarbazi-Azad et al. (Eds.): CSICC 2008, CCIS 6, pp. 585592, 2008. © Springer-Verlag Berlin He... more H. Sarbazi-Azad et al. (Eds.): CSICC 2008, CCIS 6, pp. 585592, 2008. © Springer-Verlag Berlin Heidelberg 2008 ... A Cluster-Based Key Establishment Protocol for Wireless ... Mohammad Sheikh Zefreh, Ali Fanian, Sayyed Mahdi Sajadieh, Pejman Khadivi, and Mehdi Berenjkoub
Bookmarks Related papers MentionsView impact
… Conference on Sensor …, Jan 1, 2008
Abstract In this paper, upper and lower bound on the transmission capacity of underwater sensor n... more Abstract In this paper, upper and lower bound on the transmission capacity of underwater sensor networks are derived. Transmission capacity is defined as the maximum permissible density of simultaneous transmissions that allows a certain probability of successful reception. In ...
Bookmarks Related papers MentionsView impact
… of the 9th international conference on …, Jan 1, 2009
Cryptography is a popular method for information hiding and reaching confidentiality in digital w... more Cryptography is a popular method for information hiding and reaching confidentiality in digital world. On the other hand, cryptanalysis is an interesting and useful science from different viewpoints. All the digital materials that are processed by computers or transferred in data ...
Bookmarks Related papers MentionsView impact