فهرست مطالب

Journal of Advances in Computer Engineering and Technology
Volume:3 Issue: 4, Autumn 2017

  • تاریخ انتشار: 1396/08/10
  • تعداد عناوین: 6
|
  • Mona Alimardani, AmirMasoud Rahmani, Houman Zarrabi * Pages 181-188

    Advances in medical sciences with other fields of science and technology is closely casual profound mutations in different branches of science and methods for providing medical services affect the lives of its descriptor. Wireless Body Area Network (WBAN) represents such a leap. Those networks excite new branches in the world of telemedicine. Small wireless sensors, to be quite precise and calculated, are installed in or on the body and create a WBAN that various vital statistics or environmental parameters sampling, processing and radio. These nodes allow independent monitoring of a person's location, in typical environments and for long periods and provide for the user and the medical, offer real-time feedback from the patient's health status. In this article, the introduction of WBAN and review issues and applications of medical sensor networks, to offer a protocol has been established that the threshold for data transmission reduces power consumption on sensor nodes, increasing the lifetime of the network and motion phase to increase the dynamics of the network. The proposed protocol in the network been compared with the SIMPLE and ATTEMPT protocols. Results indicate a significant reduction in energy consumption of sensors to reduce energy consumption the entire network.

    Keywords: Body area network, lifetime network, Energy consumption, traffic management
  • Elaheh Radmehr *, HASSAN SHAKERI Pages 189-194
    Wireless sensor networks have been widely considered as one of the most important 21th century technologies and are used in so many applications such as environmental monitoring, security and surveillance. Wireless sensor networks are used when it is not possible or convenient to supply signaling or power supply wires to a wireless sensor node. The wireless sensor node must be battery powered.Coverage and network lifetime are major problems in WSNs so in order to address this difficulty we propose a combinational method consists of fuzzy-logic and genetic algorithms. The proposed scheme detects the coverage holes in the network and selects the most appropriate hole's neighbor to move towards the blank area and compensate the coverage loss with fuzzy-logic contribution and above node new coordinate is determined by genetic algorithm. As fuzzy-logic will be so effective if more than one factor influence on decision making and also genetic algorithms perform well in dynamic problems so our proposed solution results in fast, optimized and reliable output
    Keywords: wireless sensor networks, fuzzy-logic, Genetic algorithm, coverage hole
  • Zoleikha Azizi *, Kambiz Majidzadeh Pages 195-202
    Considering the great significant role that routing protocols play in transfer rate and choosing the optimum path for exchange of data packages, and further in the amount of consumed energy in the routing protocol, the present study has focused on developing an efficient compound energy algorithm based on cluster structure which is called active node with cluster structure. The purpose of this algorithm is to distribute the heavy traffic of data and equal load of highly-consumed energy throughout the networks by introducing unequal and unbalanced clusters into the network. In the second stage, the light sensor mechanism which is called active node sensor algorithm has been proposed. The major purpose of this mechanism is to prevent excessive interfering data of sensors through incorporating a set of active nodes in each cluster with a defensive shield near to the incident node. The third stage has aimed at proposing an active node algorithm for complexity of internal and external addressing due to clusters routing in high density distribution based on the values within node range. The obtained results indicate relative success of the design in terms of energy optimization on the basis of routing protocol.
    Keywords: routing, Energy efficiency, dense distribution, Clustering
  • Marzieh Bozorgi Elize, Ahmad Khademzadeh * Pages 203-212
    Cloud computing is a result of the continuing progress made in the areas of hardware, technologies related to the Internet, distributed computing and automated management. The Increasing demand has led to an increase in services resulting in the establishment of large-scale computing and data centers, in addition to high operating costs and huge amounts of electrical power consumption. Insufficient cooling systems and inefficient, causing overheating sources, shortening the life of the machine and too much carbon dioxide is produced. In this paper, we aim to improve system performance; Cloud Computing based on a decrease in migration of among virtual machines (VM), and reduce energy consumption to be able to manage resources to achieve optimal energy efficiency. For this reason, various techniques such as genetic algorithms (GAs), virtual machine migration and ways Dynamic voltage and frequency scaling (DVFS), and resize virtual machines to reduce energy consumption and fault tolerance are used. The main purpose of this article, the allocation of resources with the aim of reducing energy consumption in cloud computing. The results show that reduced energy consumption and hold down the rate of virtual machines breach of contract, reduces migration as well.
    Keywords: cloud computing, Energy efficiency, Genetic algorithm
  • Mohammadreza Hosseinzadehmoghadam *, Seyed Javad Mirabedini, Toraj Banirostam Pages 213-222
    Abstract— In order to provide complete security in a computer system and to prevent intrusion, intrusion detection systems (IDS) are required to detect if an attacker crosses the firewall, antivirus, and other security devices. Data and options to deal with it. In this paper, we are trying to provide a model for combining types of attacks on public data using combined methods of genetic algorithm and neural network. The goal is to make the designed model act as a measure of system attack and combine optimization algorithms to create the ultimate accuracy and reliability for the proposed model and reduce the error rate. To do this, we used a feedback neural network, and by examining the worker, it can be argued that this research with the new approach reduces errors in the classification.with the rapid development of communication and information technology and its applications, especially in computer networks, there is a new competition in information security and network security.
    Keywords: Intrusion Detection System, Neural Network, Genetic algorithm, Clustring, firewall
  • Hussam Elbehiery * Pages 223-228
    Traffic congestion in road networks is one of the main issues to be addressed, also vehicle traffic congestion and monitoring has become one of the critical issues in road transport. With the help of Intelligent Transportation System (ITS), current information of traffic can be used by control room to improve the traffic efficiency. The suggested system utilize technologies for real-time collection, organization and transmission of information to provide an efficient and accurate estimation of traffic density which can be exploited by traffic-aware applications. So, the proposed architecture of Vehicle Traffic Congestion Control & Monitoring System in IoT would perform well. A short overview of the main currently used traffic control methods for freeways will be explained. A sensor array is a group/collection of sensors, usually it is deployed in a certain geometry pattern. So, efficiency of congestion in traffic will improve. The tangible Internet of Things (IoT) based service models which are helpful to academic and industrial world to understand IoT business will be discussed.
    Keywords: ITS, IoT, MPC, Smart city, and Smart Analytics