Results for 'OmidReza Taheri'

20 found
Order:
  1.  95
    The Universal Element of the Evolutionary and Technological Mind and the Return of its Enigmatic Aspects.OmidReza Taheri - manuscript
    The scientific understanding of the mind and consciousness is limited by the lack of knowledge on the missing pieces of this complex puzzle. However, the philosophy and the current physical and material sciences have made great strides in understanding the evolutionary processes of the mind, from the metaphysical and Meta universal layers to the physical, chemical, biological, psychological, and social layers. The complexity of the human mind and the subjective nature of consciousness make it difficult to define and study empirically. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. IZM-DSR: A New Zone-Disjoint Multi-path Routing Algorithm for Mobile Ad-Hoc Networks.Nastooh Taheri Javan - 2009 - Third Uksim European Symposium on Computer Modeling and Simulation 1 (1):511-516.
    Some of multi-path routing algorithms in MANETs use multiple paths simultaneously. These algorithms can attempt to find node-disjoint to achieve higher fault tolerance. By using node-disjoint paths, it is expected that the end-to-end delay in each case should be independent of each other. However, because of natural properties and medium access mechanisms in ad hoc networks, such as CSMA/CA, the endto-end delay between any source and destination depends on the pattern of communication in the neighborhood region. In this case some (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3.  90
    Using Zone-Disjoint Multi-Path Routing Algorithm for Video Transmission over Ah-Hoc Networks.Nastooh Taheri Javan - 2009 - 4Th International Conference on Computer Sciences and Convergence Information Technology 1 (1):877-882.
    Finding multi-path routes in ad hoc networks due to their grid topology seems to be a trivial task, but because of CSMA/CA effects in these networks found paths are not completely disjoint unless an appropriate algorithm have taken into account. If such an algorithm provided and designed carefully it could improve multi-path video transmission over these kinds of networks. By using node-disjoint paths, it is expected that the end-to-end delay and BER in each case should be independent of each other. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. To Code or Not to Code: When and How to Use Network Coding in Energy Harvesting Wireless Multi-Hop Networks.Taheri Javan Nastooh - 2024 - IEEE Access 12:22608-22623.
    The broadcast nature of communication in transmission media has driven the rise of network coding’s popularity in wireless networks. Numerous benefits arise from employing network coding in multi-hop wireless networks, including enhanced throughput, reduced energy consumption, and decreased end-to-end delay. These advantages are a direct outcome of the minimized transmission count. This paper introduces a comprehensive framework to employ network coding in these networks. It refines decision-making at coding and decoding nodes simultaneously. The coding-nodes employ optimal stopping theory to find (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. The Experience of Beauty or Love as a Religious Experience in Plato.Mohammadreza Bayat & Alireza Taheri - 2018 - Religions and Mysticism 51 (2):182-202.
    The issue of the article is whether the experience of Beauty or love in Plato can be considered as some kind of religious experience. First, the article describes different views on the religious experience. Then it deals with Plato's view on beauty and love and their relationship. finally, demonstrating the divinity of Beauty in Plato, the article shows that if religious experience is an encounter of the experiencer with the divine being, or in religious term God, that manifests itself in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. EDAP: An Efficient Data-Gathering Protocol for Wireless Sensor Networks.Nastooh Taheri Javan - 2011 - International Journal of Ad Hoc and Ubiquitous Computing 7 (1):12-24.
    Directed Diffusion (DD) uses data aggregation to suppress data overhead however there is no guarantee that paths from nearby sources join after a few hops. In this paper, an efficient data-gathering protocol (EDAP) is proposed to address this problem by using a Virtual Sink (VS) node nearby the sources, which plays the role of sink node and broadcasts local interest messages and routes gathered data toward destination. Also, multiple paths are constructed between VS and the sink node, which leads to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Mobility Enhancement of Patients Body Monitoring based on WBAN with Multipath Routing.Nastooh Taheri Javan - 2014 - 2Nd International Conference on Information and Communication Technology 1 (1):127-132.
    —One of the promising applications of wireless sensor networks (WSNs) is monitoring of the human body for health concerns. For this purpose, a large number of small sensors are implanted in the human body. These sensors altogether provide a network of wireless sensors (WBANs) and monitor the vital signs and signals of the human body; these sensors will then send this information to the doctor. The most important application of the WBAN is the implementation of the monitoring network for patient (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8.  14
    Enhancing Malicious Code Detection With Boosted N-Gram Analysis and Efficient Feature Selection.Nastooh Taheri Javan - 2024 - IEEE Access 12:147400-147421.
    A fundamental challenge in virology research lies in effectively detecting malicious code. N-gram analysis has become a cornerstone technique, but selecting the most informative features, especially for longer n-grams, remains crucial for efficient detection. This paper addresses this challenge by introducing a novel feature extraction method that leverages both adjacent and non-adjacent bi-grams, providing a richer set of information for malicious code identification. Additionally, we propose a computationally efficient feature selection approach that utilizes a genetic algorithm combined with Boosting principles. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. To overhear or not to overhear: a dilemma between network coding gain and energy consumption in multi-hop wireless networks.Nastooh Taheri Javan - 2019 - Wireless Networks 25 (7):4097-4113.
    Any properly designed network coding technique can result in increased throughput and reliability of multi-hop wireless networks by taking advantage of the broadcast nature of wireless medium. In many inter-flow network coding schemes nodes are encouraged to overhear neighbour’s traffic in order to improve coding opportunities at the transmitter nodes. A study of these schemes reveal that some of the overheard packets are not useful for coding operation and thus this forced overhearing increases energy consumption dramatically. In this paper, we (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Adaptive Channel Hopping for IEEE 802.15. 4 TSCH-Based Networks: A Dynamic Bernoulli Bandit Approach.Taheri Javan Nastooh - 2021 - IEEE Sensors Journal 21 (20):23667-23681.
    In IEEE 802.15.4 standard for low-power low-range wireless communications, only one channel is employed for transmission which can result in increased energy consumption, high network delay and poor packet delivery ratio (PDR). In the subsequent IEEE 802.15.4-2015 standard, a Time-slotted Channel Hopping (TSCH) mechanism has been developed which allows for a periodic yet fixed frequency hopping pattern over 16 different channels. Unfortunately, however, most of these channels are susceptible to high-power coexisting Wi-Fi signal interference and to possibly some other ISM-band (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. ZD-AOMDV: A New Routing Algorithm for Mobile Ad-Hoc Networks.Nastooh Taheri Javan - 2009 - Eigth Ieee/Acis International Conference on Computer and Information Science 1 (1):852-857.
    A common characteristic of all popular multi-path routing algorithms in Mobile Ad-hoc networks, such as AOMDV, is that the end to end delay is reduced by utilization of parallel paths. The competition between the neighboring nodes for obtaining a common channel in those parallel paths is the reason for end to end delay increment. In fact, due to medium access mechanism in wireless networks, such as CSMA/CA, data transmissions even through two Node Disjoint paths are not completely independent and each (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12.  81
    IMPROVING ENERGY EFFICIENCY IN MANETS BY MULTI-PATH ROUTING.Nastooh Taheri Javan - 2013 - International Journal of Wireless and Mobile Networks 5 (1):163-176.
    Some multi-path routing algorithm in MANET, simultaneously send information to the destination through several directions to reduce end-to-end delay. In all these algorithms, the sent traffic through a path affects the adjacent path and unintentionally increases the delay due to the use of adjacent paths. Because, there are repetitive competitions among neighboring nodes, in order to obtain the joint channel in adjacent paths. The represented algorithm in this study tries to discover the distinct paths between source and destination nodes with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13.  16
    To‐send‐or‐not‐to‐send: An optimal stopping approach to network coding in multi‐hop wireless networks.Nastooh Taheri Javan - 2018 - International Journal of Communication Systems 31 (2):e3438.
    Network coding is all about combining a variety of packets and forwarding as much packets as possible in each transmission operation. The network coding technique improves the throughput efficiency of multi‐hop wireless networks by taking advantage of the broadcast nature of wireless channels. However, there are some scenarios where the coding cannot be exploited due to the stochastic nature of the packet arrival process in the network. In these cases, the coding node faces 2 critical choices: forwarding the packet towards (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14.  14
    Energy & throughput tradeoff in WSN with network coding.Nastooh Taheri Javan - 2013 - 2013 International Conference on Ict Convergence (Ictc) 1 (1):304-309.
    Recently, network coding emerged as a promising technology that can provide significant improvements in throughput and energy efficiency of wireless networks. Many implementations of network coding in wireless networks, such as COPE, encourage nodes to overhear to improve the coding opportunities so that they can create better opportunities for coding at the transmitter node through overhearing more packages. In this paper, we have shown that all overheard packets are not necessarily useful for coding; thus, a node can go to sleep (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15.  12
    Increasing coding opportunities using maximum-weight clique.Nastooh Taheri Javan - 2013 - 2013 5Th Computer Science and Electronic Engineering Conference (Ceec) 1 (1):168-173.
    Network coding is used to improve the throughput of communication networks. In this technique, the intermediate nodes mix packets to increase the information content of each transmission. For each flow, a coding pattern is defined as a set of flows that can be coded together. Finding a suitable coding pattern is a challenge due to much complexity. In this paper, we propose an algorithm to find a suitable coding pattern in intermediate nodes by mapping this problem onto maximum-weight clique. Also, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16.  12
    LBAODV: a new load balancing multipath routing algorithm for mobile ad hoc networks.Nastooh Taheri Javan - 2008 - 2008 6Th National Conference on Telecommunication Technologies 1 (1):344-349.
    An ad hoc network is comprised of mobile hosts without any wired infrastructure support. Multipath routing allows the establishment of multiple paths between a source and a destination. It distributes traffic among multiple paths instead of routing all the traffics along a single path. In this paper, we propose a new multipath routing protocol that uses all discovered paths simultaneously for transmitting data, by using this approach data packets are balanced over discovered paths and energy consumption is distributed across many (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17.  12
    Reducing End-to-End Delay in Multi-path Routing Algorithms for Mobile Ad Hoc Networks.Nastooh Taheri Javan - 2007 - Mobile Ad-Hoc and Sensor Networks 1 (1):715–724.
    Some of the routing algorithms in mobile ad hoc networks use multiple paths simultaneously. These algorithms can attempt to find node-disjoint paths to achieve higher fault tolerance capability. By using node-disjoint paths, it is expected that the end-to-end delay in each path should be independent of each other. However, because of natural properties of wireless media and medium access mechanisms in ad hoc networks, the end-to-end delay between any source and destination depends on the pattern of communication in the neighborhood (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18.  11
    IEEE 802.15.4.e TSCH-Based Scheduling for Throughput Optimization: A Combinatorial Multi-Armed Bandit Approach.Nastooh Taheri Javan - 2019 - IEEE Sensors Journal 20 (1):525-537.
    In TSCH, which is a MAC mechanism set of the IEEE 802.15.4e amendment, calculation, construction, and maintenance of the packet transmission schedules are not defined. Moreover, to ensure optimal throughput, most of the existing scheduling methods are based on the assumption that instantaneous and accurate Channel State Information (CSI) is available. However, due to the inevitable errors in the channel estimation process, this assumption cannot be materialized in many practical scenarios. In this paper, we propose two alternative and realistic approaches. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Assessment of the Experience of Beauty in Plato as the Numinous Experience.Mohammadreza Bayat & Alireza Taheri Soodejani - 2020 - Mirror of Wisdom 20 (2):77-100.
    The issue of the article is defending the claim that the experience of Beauty can be considered the numinous experience. First, the article explains Otto’s view on numinous experiences. Then it explains Plato’s view on Beauty and love. Finally, comparing the two views, the article shows that the experience of Beauty or Platonic love can be considered the numinous experience. Because, firstly, the experience of Beauty or Platonic love is an awareness of a “wholly other” being, which possesses all or (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Birthday, Revisited.Mehrzad Monzavi - manuscript
    In this paper, the philosophical concept of birth will be discussed from an uncommon point of view presented by M. A. Taheri.
    Download  
     
    Export citation  
     
    Bookmark