Results for 'Taheri Khurramabadi'

13 found
Order:
  1.  83
    The Universal Element of the Evolutionary and Technological Mind and the Return of its Enigmatic Aspects.OmidReza Taheri - manuscript
    The scientific understanding of the mind and consciousness is limited by the lack of knowledge on the missing pieces of this complex puzzle. However, the philosophy and the current physical and material sciences have made great strides in understanding the evolutionary processes of the mind, from the metaphysical and Meta universal layers to the physical, chemical, biological, psychological, and social layers. The complexity of the human mind and the subjective nature of consciousness make it difficult to define and study empirically. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. The Experience of Beauty or Love as a Religious Experience in Plato.Mohammadreza Bayat & Alireza Taheri - 2018 - Religions and Mysticism 51 (2):182-202.
    The issue of the article is whether the experience of Beauty or love in Plato can be considered as some kind of religious experience. First, the article describes different views on the religious experience. Then it deals with Plato's view on beauty and love and their relationship. finally, demonstrating the divinity of Beauty in Plato, the article shows that if religious experience is an encounter of the experiencer with the divine being, or in religious term God, that manifests itself in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. To Code or Not to Code: When and How to Use Network Coding in Energy Harvesting Wireless Multi-Hop Networks.Taheri Javan Nastooh - 2024 - IEEE Access 12:22608-22623.
    The broadcast nature of communication in transmission media has driven the rise of network coding’s popularity in wireless networks. Numerous benefits arise from employing network coding in multi-hop wireless networks, including enhanced throughput, reduced energy consumption, and decreased end-to-end delay. These advantages are a direct outcome of the minimized transmission count. This paper introduces a comprehensive framework to employ network coding in these networks. It refines decision-making at coding and decoding nodes simultaneously. The coding-nodes employ optimal stopping theory to find (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4.  82
    Using Zone-Disjoint Multi-Path Routing Algorithm for Video Transmission over Ah-Hoc Networks.Nastooh Taheri Javan - 2009 - 4Th International Conference on Computer Sciences and Convergence Information Technology 1 (1):877-882.
    Finding multi-path routes in ad hoc networks due to their grid topology seems to be a trivial task, but because of CSMA/CA effects in these networks found paths are not completely disjoint unless an appropriate algorithm have taken into account. If such an algorithm provided and designed carefully it could improve multi-path video transmission over these kinds of networks. By using node-disjoint paths, it is expected that the end-to-end delay and BER in each case should be independent of each other. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. To overhear or not to overhear: a dilemma between network coding gain and energy consumption in multi-hop wireless networks.Nastooh Taheri Javan - 2019 - Wireless Networks 25 (7):4097-4113.
    Any properly designed network coding technique can result in increased throughput and reliability of multi-hop wireless networks by taking advantage of the broadcast nature of wireless medium. In many inter-flow network coding schemes nodes are encouraged to overhear neighbour’s traffic in order to improve coding opportunities at the transmitter nodes. A study of these schemes reveal that some of the overheard packets are not useful for coding operation and thus this forced overhearing increases energy consumption dramatically. In this paper, we (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Adaptive Channel Hopping for IEEE 802.15. 4 TSCH-Based Networks: A Dynamic Bernoulli Bandit Approach.Taheri Javan Nastooh - 2021 - IEEE Sensors Journal 21 (20):23667-23681.
    In IEEE 802.15.4 standard for low-power low-range wireless communications, only one channel is employed for transmission which can result in increased energy consumption, high network delay and poor packet delivery ratio (PDR). In the subsequent IEEE 802.15.4-2015 standard, a Time-slotted Channel Hopping (TSCH) mechanism has been developed which allows for a periodic yet fixed frequency hopping pattern over 16 different channels. Unfortunately, however, most of these channels are susceptible to high-power coexisting Wi-Fi signal interference and to possibly some other ISM-band (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. ZD-AOMDV: A New Routing Algorithm for Mobile Ad-Hoc Networks.Nastooh Taheri Javan - 2009 - Eigth Ieee/Acis International Conference on Computer and Information Science 1 (1):852-857.
    A common characteristic of all popular multi-path routing algorithms in Mobile Ad-hoc networks, such as AOMDV, is that the end to end delay is reduced by utilization of parallel paths. The competition between the neighboring nodes for obtaining a common channel in those parallel paths is the reason for end to end delay increment. In fact, due to medium access mechanism in wireless networks, such as CSMA/CA, data transmissions even through two Node Disjoint paths are not completely independent and each (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. IZM-DSR: A New Zone-Disjoint Multi-path Routing Algorithm for Mobile Ad-Hoc Networks.Nastooh Taheri Javan - 2009 - Third Uksim European Symposium on Computer Modeling and Simulation 1 (1):511-516.
    Some of multi-path routing algorithms in MANETs use multiple paths simultaneously. These algorithms can attempt to find node-disjoint to achieve higher fault tolerance. By using node-disjoint paths, it is expected that the end-to-end delay in each case should be independent of each other. However, because of natural properties and medium access mechanisms in ad hoc networks, such as CSMA/CA, the endto-end delay between any source and destination depends on the pattern of communication in the neighborhood region. In this case some (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. EDAP: An Efficient Data-Gathering Protocol for Wireless Sensor Networks.Nastooh Taheri Javan - 2011 - International Journal of Ad Hoc and Ubiquitous Computing 7 (1):12-24.
    Directed Diffusion (DD) uses data aggregation to suppress data overhead however there is no guarantee that paths from nearby sources join after a few hops. In this paper, an efficient data-gathering protocol (EDAP) is proposed to address this problem by using a Virtual Sink (VS) node nearby the sources, which plays the role of sink node and broadcasts local interest messages and routes gathered data toward destination. Also, multiple paths are constructed between VS and the sink node, which leads to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Mobility Enhancement of Patients Body Monitoring based on WBAN with Multipath Routing.Nastooh Taheri Javan - 2014 - 2Nd International Conference on Information and Communication Technology 1 (1):127-132.
    —One of the promising applications of wireless sensor networks (WSNs) is monitoring of the human body for health concerns. For this purpose, a large number of small sensors are implanted in the human body. These sensors altogether provide a network of wireless sensors (WBANs) and monitor the vital signs and signals of the human body; these sensors will then send this information to the doctor. The most important application of the WBAN is the implementation of the monitoring network for patient (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11.  74
    IMPROVING ENERGY EFFICIENCY IN MANETS BY MULTI-PATH ROUTING.Nastooh Taheri Javan - 2013 - International Journal of Wireless and Mobile Networks 5 (1):163-176.
    Some multi-path routing algorithm in MANET, simultaneously send information to the destination through several directions to reduce end-to-end delay. In all these algorithms, the sent traffic through a path affects the adjacent path and unintentionally increases the delay due to the use of adjacent paths. Because, there are repetitive competitions among neighboring nodes, in order to obtain the joint channel in adjacent paths. The represented algorithm in this study tries to discover the distinct paths between source and destination nodes with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Assessment of the Experience of Beauty in Plato as the Numinous Experience.Mohammadreza Bayat & Alireza Taheri Soodejani - 2020 - Mirror of Wisdom 20 (2):77-100.
    The issue of the article is defending the claim that the experience of Beauty can be considered the numinous experience. First, the article explains Otto’s view on numinous experiences. Then it explains Plato’s view on Beauty and love. Finally, comparing the two views, the article shows that the experience of Beauty or Platonic love can be considered the numinous experience. Because, firstly, the experience of Beauty or Platonic love is an awareness of a “wholly other” being, which possesses all or (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Birthday, Revisited.Mehrzad Monzavi - manuscript
    In this paper, the philosophical concept of birth will be discussed from an uncommon point of view presented by M. A. Taheri.
    Download  
     
    Export citation  
     
    Bookmark