naser gasemi | Islamic University of Indonesia (original) (raw)

Papers by naser gasemi

Research paper thumbnail of Design and Simulation of Optimal Routing Algorithms for WSN BIO Power Applications Muscle Movement

— Wireless Sensor Network is the collection of tiny sensor nodes, which are commonly used to coll... more — Wireless Sensor Network is the collection of tiny sensor nodes, which are commonly used to collect information and data from different target areas. WSN is very useful to be used in the area where traditional wired or wireless network is difficult to be deployed. In WSNs, energy is crucial challenge for sensor node for sensing and transferring the data to the nearest node or to the sink as per clustering approach. Each energy efficient approach available in lifetime has its own advantages over the other energy efficient approaches. In this paper, we proposed algorithm (WEECA). For Design and Simulation of Optimal Routing Algorithms for WSN BIO Power Applications Muscle Movement. The goal is to provide a clustering algorithm to minimize the possibility of problems raised. In this proposed method, various energy efficient routing protocols and data collection approaches to reduce the energy consumption in the network are described. The simulation is carried out by means of NS2 (Network Simulator). Analytical and experimental results show that the proposed method (WEECA) the protocol outperforms in all its aspects.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Greedy Routing Algorithm Based on Geog

Ad-Hoc networks between vehicles are special types of mobile ad-hoc networks. VANET nodes despite... more Ad-Hoc networks between vehicles are special types of mobile ad-hoc networks. VANET nodes despite MANET networks move too fast. Keeping and staying in a stable and constant route for urgent and alarming messages broadcasting from one danger area, is a very challenging task. Therefore, routing play significant role in VANETs. Network overhead decrease, preventing overcrowd incidence in the network, the traffic jam and increasing package delivery rate are the most important issues related to routing in VANET. Therefore, broadcasting and transmitting threatening alarm messages as accident prevention message and damage incidence, jam controlling messages, messages related to the road conditions and all other threatening alarm messages, on time for the endangered vehicles is of great importance. The main goal of this paper is to study routing protocol based on geographical location, so it needs Global Positioning System (GPS) to obtain vehicle's location and improve decision making for data delivery. On VANET networks, for better routing, we will need network topology information to make decisions to deliver data to the next vehicle, so we can make the best decision. In this Paper, the purpose is to present one greedy routing method and executing it in a scenario as urban area. For this reason, the proposed method creation was by using the vector concept and b y using greedily transmission. which in time of selecting the next step, not only it gives importance to the distance criteria and data routing precision, but also is connected with intersections in urban areas and adds a certain mode for predicting vehicle's behaviour at intersections, which promote the routing protocol efficiency. By using the NS2 simulator, Simulation results of the proposed method, (GRUA), indicate that this method has an efficient performance and improves throughput , Packet drop , Packet delivery ratio and end-to-end delay decrease.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Comprehensive Study on Defense Against Network Layer Attacks in Mobile Ad hoc Networks

— Wireless networks are widely deployed in the Present scenario. A type of wireless network, mobi... more — Wireless networks are widely deployed in the Present scenario. A type of wireless network, mobile ad hoc network (MANET) is an autonomous system of mobile nodes where a collection of mobile hosts with wireless network interfaces form a temporary network without the aid of any fixed infrastructure or centralized administration. The success of MANET strongly depends on its security. Security is an essential service for wireless network communications. A variety of attacks such as Black hole attacks, Gray hole attack, Sybil attack Wormhole attack etc. have been identified. In such environments malicious Attacks may try to disrupt the communications to create more chaos for their own benefit. Some solutions have been proposed in the literature. In This paper presents a survey of proposed methods of detecting wormhole, Gray hole Sybil and black hole attack against ad-hoc on-demand distance vector routing protocol in mobile ad hoc networks. In an attack, a malicious node answers each route request with a fake reply claiming to have the shortest and freshest route to the destination. Our simulation based study shows that wormhole, gray hole, sybil and black hole attacks drastically increase the end-to-end delay of the protocol. Routing under attack attacks such as wormhole, sybil, garyhole and blackhole are deadly and severely affect the packet efficiency and bring down the packet loss to unacceptable ranges.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of MULTILINGUALTEXT CATEGORIZATION

A multi lingual text categorization classifies the document from different languages to a single ... more A multi lingual text categorization classifies the document from different languages to a single language format. This approach is dependenton semantic representation of extracted data from different languages and is not restricted for only some domains but also helps in carrying out by internal system manager. In the testing phase WordNet and java web translator were used for translating the content into a unique language and identifying the similarity percentage of matched data using classification approaches i.e, TF-IDF, K-Nearest Neighbour.This helps in categorizing the profiles and attainingsynset relation between test and train documents.As the techniques KNN and TF-IDFwere compared based on monolingual and multilingual similarity measure which provides better results compared to the existing techniques.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Design and Simulation of Optimal Routing Algorithms for WSN BIO Power Applications Muscle Movement

— Wireless Sensor Network is the collection of tiny sensor nodes, which are commonly used to coll... more — Wireless Sensor Network is the collection of tiny sensor nodes, which are commonly used to collect information and data from different target areas. WSN is very useful to be used in the area where traditional wired or wireless network is difficult to be deployed. In WSNs, energy is crucial challenge for sensor node for sensing and transferring the data to the nearest node or to the sink as per clustering approach. Each energy efficient approach available in lifetime has its own advantages over the other energy efficient approaches. In this paper, we proposed algorithm (WEECA). For Design and Simulation of Optimal Routing Algorithms for WSN BIO Power Applications Muscle Movement. The goal is to provide a clustering algorithm to minimize the possibility of problems raised. In this proposed method, various energy efficient routing protocols and data collection approaches to reduce the energy consumption in the network are described. The simulation is carried out by means of NS2 (Network Simulator). Analytical and experimental results show that the proposed method (WEECA) the protocol outperforms in all its aspects.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Greedy Routing Algorithm Based on Geog

Ad-Hoc networks between vehicles are special types of mobile ad-hoc networks. VANET nodes despite... more Ad-Hoc networks between vehicles are special types of mobile ad-hoc networks. VANET nodes despite MANET networks move too fast. Keeping and staying in a stable and constant route for urgent and alarming messages broadcasting from one danger area, is a very challenging task. Therefore, routing play significant role in VANETs. Network overhead decrease, preventing overcrowd incidence in the network, the traffic jam and increasing package delivery rate are the most important issues related to routing in VANET. Therefore, broadcasting and transmitting threatening alarm messages as accident prevention message and damage incidence, jam controlling messages, messages related to the road conditions and all other threatening alarm messages, on time for the endangered vehicles is of great importance. The main goal of this paper is to study routing protocol based on geographical location, so it needs Global Positioning System (GPS) to obtain vehicle's location and improve decision making for data delivery. On VANET networks, for better routing, we will need network topology information to make decisions to deliver data to the next vehicle, so we can make the best decision. In this Paper, the purpose is to present one greedy routing method and executing it in a scenario as urban area. For this reason, the proposed method creation was by using the vector concept and b y using greedily transmission. which in time of selecting the next step, not only it gives importance to the distance criteria and data routing precision, but also is connected with intersections in urban areas and adds a certain mode for predicting vehicle's behaviour at intersections, which promote the routing protocol efficiency. By using the NS2 simulator, Simulation results of the proposed method, (GRUA), indicate that this method has an efficient performance and improves throughput , Packet drop , Packet delivery ratio and end-to-end delay decrease.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Comprehensive Study on Defense Against Network Layer Attacks in Mobile Ad hoc Networks

— Wireless networks are widely deployed in the Present scenario. A type of wireless network, mobi... more — Wireless networks are widely deployed in the Present scenario. A type of wireless network, mobile ad hoc network (MANET) is an autonomous system of mobile nodes where a collection of mobile hosts with wireless network interfaces form a temporary network without the aid of any fixed infrastructure or centralized administration. The success of MANET strongly depends on its security. Security is an essential service for wireless network communications. A variety of attacks such as Black hole attacks, Gray hole attack, Sybil attack Wormhole attack etc. have been identified. In such environments malicious Attacks may try to disrupt the communications to create more chaos for their own benefit. Some solutions have been proposed in the literature. In This paper presents a survey of proposed methods of detecting wormhole, Gray hole Sybil and black hole attack against ad-hoc on-demand distance vector routing protocol in mobile ad hoc networks. In an attack, a malicious node answers each route request with a fake reply claiming to have the shortest and freshest route to the destination. Our simulation based study shows that wormhole, gray hole, sybil and black hole attacks drastically increase the end-to-end delay of the protocol. Routing under attack attacks such as wormhole, sybil, garyhole and blackhole are deadly and severely affect the packet efficiency and bring down the packet loss to unacceptable ranges.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of MULTILINGUALTEXT CATEGORIZATION

A multi lingual text categorization classifies the document from different languages to a single ... more A multi lingual text categorization classifies the document from different languages to a single language format. This approach is dependenton semantic representation of extracted data from different languages and is not restricted for only some domains but also helps in carrying out by internal system manager. In the testing phase WordNet and java web translator were used for translating the content into a unique language and identifying the similarity percentage of matched data using classification approaches i.e, TF-IDF, K-Nearest Neighbour.This helps in categorizing the profiles and attainingsynset relation between test and train documents.As the techniques KNN and TF-IDFwere compared based on monolingual and multilingual similarity measure which provides better results compared to the existing techniques.

Bookmarks Related papers MentionsView impact