• List of Articles Sensor

      • Open Access Article

        1 - An Efficient Approach to Detect Faulty Readings: Applicability in Long-Thin Wireless Sensor Networks
        Seyyed Jalaleddin Dastgheib
        Wireless sensor networks (WSN) are composed of thousands small nodes (sensors), which work together and are associated with specific tasks to do. A long-thin network topology of wireless sensor can produce errors in network localization due to special deployment of node More
        Wireless sensor networks (WSN) are composed of thousands small nodes (sensors), which work together and are associated with specific tasks to do. A long-thin network topology of wireless sensor can produce errors in network localization due to special deployment of nodes also, In this structure, failure of some close together nodes may pull some parts of network into isolation, or in a worse case the entire network may stop working.. In this paper, we propose an optimized algorithm to detect faulty readings using Debraj de localization error detection algorithm. The proposed algorithm uses correlation of average readings of two nodes to detect nodes with faulty readings. This algorithm reduces computational complexity of the correlation algorithm and has high accuracy. Manuscript profile
      • Open Access Article

        2 - Wireless Sensor Network Based Vehicle Tracking System
        Ali Pourghaffari
        In this paper, a wireless sensor network based vehicle tracking system with its hardware and software components is introduced. In this system, the mica2 sensor node and MTS310 sensing board of Crossbow company products are used. In this system a GPS based localization More
        In this paper, a wireless sensor network based vehicle tracking system with its hardware and software components is introduced. In this system, the mica2 sensor node and MTS310 sensing board of Crossbow company products are used. In this system a GPS based localization is used and its purpose is to track passing vehicles. Performance of this system, as a pilot system in laboratory scale is approved in practical tests with different vehicles. Sensor nodes in this system, track passing around vehicles and report it to the base station. The tinyOS operating system is used for sensor nodes in this system and application program codes are written with NesC language, an open source language suitable for sensor network nodes the same as tinyOS. NesC language in syntax is much like C. Manuscript profile
      • Open Access Article

        3 - Energy-efficient and Privacy preserving Data Aggreration in wireless sensor networks
        zahra zare
        Energy consumption is ranked among the major problems of research in wireless sensor networks(WSNs). The main reason for nodes failure is the discharge of batteries in sensor networks. Therefore, energy consumption plays an important role in wireless sensor networks. Da More
        Energy consumption is ranked among the major problems of research in wireless sensor networks(WSNs). The main reason for nodes failure is the discharge of batteries in sensor networks. Therefore, energy consumption plays an important role in wireless sensor networks. Data aggregation can greatly help to reduce this consumption by eliminating redundant data, and using clustering methods for data aggregation helps to further reduce energy consumption. Sensor nodes are prone to node compromise attacks which cause an adversary to change the aggregation result and inject false data into the WSN, hence security issues such as data confidentiality and integrity are extremely important. Because both data aggregation and security are critical for wireless sensor networks, achieving secure data aggregation that protects integrity is a critical issue. In this paper, we present a secure data aggregation method called Energy-Efficient and Privacy-Preserving Data Aggregation using our clustering algorithm which is an improvement on LEACH protocol and Homomorphic Encryption technique. Manuscript profile
      • Open Access Article

        4 - Improvement of the bulk sensitivity and FoM of the plasmonic nanodipole antenna array
        Samira  Amiri Najmeh  Nozhat
        In this paper, the sensitivity of a plasmonic nanodipole antenna array for different materials of the metal nanodipole and substrate is calculated by changing the refractive index of the surrounding medium. The performance of our proposed array is studied at two wavelen More
        In this paper, the sensitivity of a plasmonic nanodipole antenna array for different materials of the metal nanodipole and substrate is calculated by changing the refractive index of the surrounding medium. The performance of our proposed array is studied at two wavelengths of 1310 and 1550 nm, the wavelengths of the second and third telecommunications windows. It is shown that by using the silver (Ag) nanodipole instead of the gold (Au) one, the bulk sensitivity of the nanostructure is improved. By replacing the substrate material from Si to SiO2, the sensitivity increases up to 1220 and 1150 nm/RIU at the wavelengths of 1310 and 1550 nm, respectively, that is very suitable for sensing applications. Moreover, the figure of merit (FoM) of the plasmonic sensor is calculated for both substrates and nanodipole materials. The maximum value of the FoM is obtained for the nanoantenna array with SiO2 substrate and Ag nanodipole and it is equal to 14.35. Furthermore, it is shown that by increasing the thickness of the nanodipole, the nanostructure sensitivity and FoM are enhanced Manuscript profile
      • Open Access Article

        5 - Persian digit recognition system in aerial writing based on depth image
        reza maleki Shahram Mohammadi
        Recognizing handwriting on paper, screen or in the air are some of the challenges in machine vision. Recognizing aerial text has many challenges due to its three-dimensional nature. In this research work, Persian digit recognition is considered in aerial text in which t More
        Recognizing handwriting on paper, screen or in the air are some of the challenges in machine vision. Recognizing aerial text has many challenges due to its three-dimensional nature. In this research work, Persian digit recognition is considered in aerial text in which the user writes the digits zero to nine in front of the Kinect sensor in the air and the system is able to detect the above digits using the sensor depth information. In the proposed system, the k-means automatic clustering method is used to separate the hand and fingertip from the background, the proposed linear slope change method is used to extract the feature, and the hidden Markov model (HMM) category is used to identify the feature and figure. The detection accuracy of the proposed system for Persian cultivars with local database and 10-fold cross-validation is 98%. The proposed system was compared with the results of several similar works, these comparisons show that the proposed system works relatively better than the systems under comparison. Manuscript profile
      • Open Access Article

        6 - Discover product defect reports from the text of users' online comments
        narges nematifard Muharram Mansoorizadeh mahdi sakhaei nia
        With the development of Web 2 and social networks, customers and users can share their opinions about different products They leave. These ideas can be used as a valuable resource to determine the position of the product and its success in marketing. Extracting the rep More
        With the development of Web 2 and social networks, customers and users can share their opinions about different products They leave. These ideas can be used as a valuable resource to determine the position of the product and its success in marketing. Extracting the reported shortcomings from the large volume of comments generated by users is one of the major problems in this field of research. By comparing the products of different manufacturers, customers and consumers express the strengths and weaknesses of the products in the form of positive and negative comments. Classification of comments based on positive and negative sensory words in the text does not lead to accurate results without reference to documents containing a defect report. Because defects are not reported solely in negative comments. It is possible for a customer to feel positive about a product and still report a defect in their opinion. Therefore, another challenge of this research field is the correct and accurate classification of opinions. To solve these problems and challenges, this article provides an effective and efficient way to extract comments containing product defect reports from users' online comments. For this purpose, stochastic forest classifiers were used to identify the defect report and the unattended thematic modeling technique used the Dirichlet hidden allocation to provide a summary of the defect report. Data from the Amazon website has been used to analyze and evaluate the proposed method. The results showed that random forest has an acceptable performance for defect reporting even with a small number of educational data. Results and outputs extracted from documents containing the defect report, including a summary of the defect report to facilitate manufacturers' decision making, finding patterns of the defect report in the text automatically, and discovering the aspects of the product that reported the most defects Related to themDemonstrates the ability of Dirichlet's latent allocation method. Manuscript profile
      • Open Access Article

        7 - Increasing the value of collected data and reducing energy consumption by using network coding and mobile sinks in wireless sensor networks
        ehsan kharati
        The wireless sensor network includes a number of fixed sensor nodes that move sink nodes to collect data between nodes. To reduce energy consumption and increase the value of collected data, it is necessary to determine the optimum route and residence location of mobile More
        The wireless sensor network includes a number of fixed sensor nodes that move sink nodes to collect data between nodes. To reduce energy consumption and increase the value of collected data, it is necessary to determine the optimum route and residence location of mobile sinks, which increases the life of wireless sensor networks. Using network coding, this paper presents a Mixed Integer Linear Programming Model to determine the optimal multicast routing of source sensor nodes to mobile sinks in wireless sensor networks, which determines the time and location of sinks to collect maximum coded data and reduces the delay in sink movement and energy consumption. Solving this problem in polynomial time is not possible due to the involvement of various parameters and the constrained resources of wireless sensor networks. Therefore, several exploratory and greedy and fully distributed algorithms are proposed to determine the movement of sinks and their residence location based on maximizing the value of coded data and the type of data dead time. By simulating, the optimal method and the use of coding and proposed algorithms, reduce the runtime and energy consumption and increase the value of collected data and network lifetime than non-coding methods. Manuscript profile
      • Open Access Article

        8 - Improving imperialist competitive algorithm for solving the nodes placement problem in three-dimensional grid wireless sensor networks
        Sayed Wafa Barkhoda Hemmat Sheikhi sudabeh mohammadi
        One of the basic and important research fields in wireless sensor networks is how to place sensor nodes where by using minimum number of sensor nodes all target points are covered and all sensor nodes are connected to the sink. In this paper, a novel method based on imp More
        One of the basic and important research fields in wireless sensor networks is how to place sensor nodes where by using minimum number of sensor nodes all target points are covered and all sensor nodes are connected to the sink. In this paper, a novel method based on imperialist competitive algorithm is used for solving the mentioned problem. In the proposed method, a colony can immigrate from a weak empire to more powerful empire. The idea of immigration is inspired from human society in which a human can emigrate from a country to another country. The network is supposed to be a three-dimensional grid network and the sensor nodes can be only placed at cross-points of the grids while the target points can be deployed at each point of three-dimensional space. The simulation results show that the proposed method uses fewer number of sensor nodes than other similar algorithms and has the less running time. Manuscript profile
      • Open Access Article

        9 - Increasing the lifetime of underwater acoustic sensor networks by optimal relay node placement
        zahra mihamadi mohadeseh soleimanpour daryush avasimoghaddam Siamak Talebi
        Underwater acoustic sensor networks (UASNs) have gained growing importance due to their desirable features and wide spread practical applications in many communication fields. Due to the high cost of underwater sensor nodes as well as implementation complexity, increasi More
        Underwater acoustic sensor networks (UASNs) have gained growing importance due to their desirable features and wide spread practical applications in many communication fields. Due to the high cost of underwater sensor nodes as well as implementation complexity, increasing the lifetime of UASNs is an important issue. Although relay nodes have an important role in reducing the transmission distance and energy consumption. But the efficient RNP (Relay Node Placement) to avoid the critical sensor nodes' elimination is the main problem, i.e., to preserve the connected network. For this aim this paper presents an innovative solution called an Efficient Relay node Setting (ERS) algorithm, which involves formulating the Relay Node Placement (RNP) as a non-convex optimization problem. Actually, due to the Difference Convex (DC) constraints the proposed RNP problem is a non-convex problem and finding an optimal solution is complicated. However, a novel transformation can be applied to DC constraints which converts the problem into its convex programming equivalent. Application of the convex programming offers the advantage of readily computing a global optimal solution. Simulation results confirm the superiority of the proposed scheme over the competing RA method in terms of network lifetime and efficiency. Manuscript profile
      • Open Access Article

        10 - A Unicast Tree-Based Data Gathering Protocol for Delay Tolerant Mobile Sensor Networks
        Zeynab Mottaginia Ali Ghaffari
        The Delay Tolerant Mobile Sensor Networks (DTMSNs) distinguish themselves from conventional sensor networks by means of some features such as loose connectivity, node mobility, and delay tolerability. It needs to be acknowledged that traditional end-to-end routing proto More
        The Delay Tolerant Mobile Sensor Networks (DTMSNs) distinguish themselves from conventional sensor networks by means of some features such as loose connectivity, node mobility, and delay tolerability. It needs to be acknowledged that traditional end-to-end routing protocols cannot be applied usefully in such challenging network conditions because of intermittent connections and/or long delays. Hence, this research is intended to propose a Unicast Tree-based Data Gathering protocol (UTDG) to resolve this problem. A UTDG includes 3 phases: tree formation phase, data collection and data transmission phase, and finally the updating phase. The proposed protocol constructs a tree in each community on the basis of transmission ranking, contact probability and the link expiration time. The selection of the next-hop node is based on the tree structure rather than forwarding the message to the neighbor node directly. Each node unicasts the data to its parent in the related community, and the root of the tree successively sends the data to the sink node. The authors contend, based on the simulation results of the study, that the proposed protocol can gain significantly higher message delivery rates with lower transmission overhead and also lower delay in data delivery than the other existing DTMSNs routing protocols in some applications. Manuscript profile
      • Open Access Article

        11 - Camera Identification Algorithm Based on Sensor Pattern Noise Using Wavelet Transform, SVD / PCA and SVM Classifier
        Kimia Bolouri Mehdi Javanmard Mohammad Firouzmand
        Identifying the source camera of an image is one of the most important issues of digital court and is useful in many applications, such as images that are presented in court as evidence. In many methods, the image noise characteristics, extraction of Sensor Pattern Nois More
        Identifying the source camera of an image is one of the most important issues of digital court and is useful in many applications, such as images that are presented in court as evidence. In many methods, the image noise characteristics, extraction of Sensor Pattern Noise and its correlation with non-uniformity of the light response (PNU) are used. In this paper we have presented a method based on photo response non uniformity (PRNU) that provides some features for classification by support vector machine (SVM). Because the noise model is affected by the complexity of the image, we used the wavelet transform to de-noise and reduce edge effects in PRNU noise pattern and also raise the detection accuracy. We also used the Precision processing theory to reduce the image size, then we simplified and summarized the data using the Single Value Decomposition (SVD) Or principal component analysis (PCA). The results show that using two-level wavelet transform and summarized data is more suitable using PCA. Manuscript profile
      • Open Access Article

        12 - Node to Node Watermarking in Wireless Sensor Networks for Authentication of Self Nodes
        Hassan Farsi Seyed Morteza Nourian
        In order to solve some security issues in Wireless Sensor Networks (WSNs), node to node authentication method based on digital watermarking technique for verification of relative nodes is proposed. In the proposed method, some algorithms with low computational for gener More
        In order to solve some security issues in Wireless Sensor Networks (WSNs), node to node authentication method based on digital watermarking technique for verification of relative nodes is proposed. In the proposed method, some algorithms with low computational for generation, embedding and detection of security ID are designed. The collected data packets by the nodes are marked using security ID. In the proposed method, header is used to mark the packets. Since the nature of the sensor networks is cooperative, using the head of the packets is proposed for authentication. Also using the marked head can prevent from sending and receiving fake data in the other nodes. Simulations have been performed in environments with imposing unrealistic data and having a probability from 1% to 10%. Comparing the proposed method with other methods shows that the proposed method in term of security, reducing traffic and increasing network lifetime is more effective. Manuscript profile
      • Open Access Article

        13 - Coverage Improving with Energy Efficient in Wireless Sensor Networks
        Amir Pakmehr Ali Ghaffari
        Wireless sensor networks (WSNs) are formed by numerous sensors nodes that are able to sense different environmental phenomena and to transfer the collected data to the sink. The coverage of a network is one of the main discussion and one of the parameters of service qua More
        Wireless sensor networks (WSNs) are formed by numerous sensors nodes that are able to sense different environmental phenomena and to transfer the collected data to the sink. The coverage of a network is one of the main discussion and one of the parameters of service quality in WSNs. In most of the applications, the sensor nodes are scattered in the environment randomly that causes the density of the nodes to be high in some regions and low in some other regions. In this case, some regions are not covered with any nodes of the network that are called covering holes. Moreover, creating some regions with high density causes extra overlapping and consequently the consumption of energy increases in the network and life of the network decreases. The proposed approach causes an increase in life of the network and an increase in it through careful selection of the most appropriate approach as cluster head node and form clusters with a maximum length of two steps and selecting some nodes as redundancy nodes in order to cover the created holes in the network. The proposed scheme is simulated using MATLAB software. The function of the suggested approach will be compared with Learning Automata based Energy Efficient Coverage protocol (LAEEC) approach either. Simulation results shows that the function of the suggested approach is better than LAEEC considering the parameters such as average of the active nodes, average remaining energy in nodes, percent of network coverage and number of control packets. Manuscript profile
      • Open Access Article

        14 - Data Aggregation Tree Structure in Wireless Sensor Networks Using Cuckoo Optimization Algorithm
        Elham Mohsenifard Behnam Talebi
        Wireless sensor networks (WSNs) consist of numerous tiny sensors which can be regarded as a robust tool for collecting and aggregating data in different data environments. The energy of these small sensors is supplied by a battery with limited power which cannot be rech More
        Wireless sensor networks (WSNs) consist of numerous tiny sensors which can be regarded as a robust tool for collecting and aggregating data in different data environments. The energy of these small sensors is supplied by a battery with limited power which cannot be recharged. Certain approaches are needed so that the power of the sensors can be efficiently and optimally utilized. One of the notable approaches for reducing energy consumption in WSNs is to decrease the number of packets to be transmitted in the network. Using data aggregation method, the mass of data which should be transmitted can be remarkably reduced. One of the related methods in this approach is the data aggregation tree. However, it should be noted that finding the optimization tree for data aggregation in networks with one working-station is an NP-Hard problem. In this paper, using cuckoo optimization algorithm (COA), a data aggregation tree was proposed which can optimize energy consumption in the network. The proposed method in this study was compared with genetic algorithm (GA), Power Efficient Data gathering and Aggregation Protocol- Power Aware (PEDAPPA) and energy efficient spanning tree (EESR). The results of simulations which were conducted in matlab indicated that the proposed method had better performance than GA, PEDAPPA and EESR algorithm in terms of energy consumption. Consequently, the proposed method was able to enhance network lifetime. Manuscript profile
      • Open Access Article

        15 - Crisis management using spatial query processing in wireless sensor networks
        mohammad shakeri seyyed majid mazinani
        Natural disasters are an inevitable part of the world that we inhabit. Human casualties and financial losses are concomitants of these natural disasters. However, by an efficient crisis management program, we can minimize their physical and social damages. The real chal More
        Natural disasters are an inevitable part of the world that we inhabit. Human casualties and financial losses are concomitants of these natural disasters. However, by an efficient crisis management program, we can minimize their physical and social damages. The real challenge in crisis management is the inability to timely receive the information from the stricken areas. Technology has come to the aid of crisis management programs to help find an answer to the problem. One of these technologies is wireless sensor network. With recent advances in this field, sensor nodes can independently respond to the queries from the users. This has transformed the processing of the queries into one of the most useful chapters in sensor networks. Without requiring any infrastructure, the sensor network can easily be deployed in the stricken area. And with the help of spatial query processing, it can easily provide managers with the latest information. The main problem, however, is the irregular shape of the area. Since these areas require many points to present them, the transmission of the coordinates by sensor nodes necessitates an increase in the number of data packet transmissions in the sensor network. The high number of packets considerably increases energy consumption. In related previous works, to solve this problem, line simplification algorithm s, such as Ramer-Douglas-Peucker (RDP), were used. These algorithms could lessen energy consumption by reducing the number of points in the shape of the area. In this article, we present a new algorithm to simplify packet shapes which can reduce more points with more accuracy. This results in decreasing the number of transmitted packets in the network, the concomitant reduction of energy consumption, and, finally, increasing network lifetime. Our proposed method was implemented in different scenarios and could on average reduce network’s energy consumption by 72.3%, while it caused only 4.5% carelessness which, when compared to previous methods, showed a far better performance. Manuscript profile
      • Open Access Article

        16 - Lifetime Maximization by Dynamic Threshold and Sensor Selection in Multi-channel Cognitive Sensor Network
        Asma Bagheri Ataollah Ebrahimzadeh maryam najimi
        The tiny and low-cost sensors cannot simultaneously sense more than one channel since they do not have high-speed Analog-to-Digital-Convertors (ADCs) and high-power batteries. It is a critical problem when they are used for multi-channel sensing in cognitive sensor netw More
        The tiny and low-cost sensors cannot simultaneously sense more than one channel since they do not have high-speed Analog-to-Digital-Convertors (ADCs) and high-power batteries. It is a critical problem when they are used for multi-channel sensing in cognitive sensor networks (CSNs). One solution for this problem is that the sensors sense various channels at different sensing periods. Due to the energy limitation in these scenarios, the lifetime maximization will become an important issue. In this paper, maximizing the lifetime of a CSN is investigated by selecting both the cooperative sensors and their detector threshold, such that the desired detection performance constraints are satisfied. This is a NP-complete problem, and obtaining the optimum solution needs exhaustive search with exponential complexity order. Here we have proposed two convex-based optimization algorithms with low order of complexity. First algorithm applies the known instantaneous Signal-to-Noise-Ratio (SNR) and obtains the proper detector thresholds by solving an equation for every channel. Investigation the effect of detector thresholds on the energy consumption, the false alarm probability and the detection probability shows that we can minimize the detector thresholds such that the detection constraints are met. In the second algorithm in order to reduce the complexity of the problem it is proposed the Bisection method for determining detector thresholds. Because knowing the instantaneous SNR is difficult, we have investigated the performance of the second algorithm by average value of SNR. Simulation results show that the proposed algorithms improve the performance of the network in case of lifetime and energy consumption. Manuscript profile
      • Open Access Article

        17 - Clustering for Reduction of Energy Consumption in Wireless Sensor Networks by AHP Method
        Mohammad Reza  Taghva Robab  Hamlbarani Haghi Aziz Hanifi Kamran  feizi
        Due to the type of applications, wireless sensor nodes must always be energy efficient and small. Hence, some studies have been done in order to the reduction in energy consumption. Data collection in wireless sensor networks is one of the most important operations of t More
        Due to the type of applications, wireless sensor nodes must always be energy efficient and small. Hence, some studies have been done in order to the reduction in energy consumption. Data collection in wireless sensor networks is one of the most important operations of these networks. Due to the energy limitation of nodes, energy efficiency is considered as a key objective in the design of sensor networks. In this paper, we present a method in which, in the first phase, nodes obtain their position by using the position of the base station and two other two nodes informed geographic position and are out of covered environment. In the second phase, the optimal location of the base station is determined. In the third phase, we determine the cluster heads based on the criteria such as the remaining energy, the distance (the distance from the cluster head and the distance from the base station), the number of neighbors (the one-step neighbors and the two-step neighbors) and the centrality. Using the multi-as criteria to select optimally cluster heads by decision making method. We implement the proposed method in the NS2 environment and evaluate its effect and compare it with the NEECP E-LEACH protocols. Simulation results show that by reducing energy consumption, the proposed method enhances the network life time expectancy. In addition it improves average packet delivery and the average delay. Manuscript profile
      • Open Access Article

        18 - Security Enhancement of Wireless Sensor Networks: A Hybrid Efficient Encryption Algorithm Approach
        Omid Mahdi Ebadati Farshad Eshghi Amin Zamani
        Wireless sensor networks are new technologies that are used for various purposes such as environmental monitoring, home security, industrial process monitoring, healthcare programs and etc. Wireless sensor networks are vulnerable to various attacks. Cryptography is one More
        Wireless sensor networks are new technologies that are used for various purposes such as environmental monitoring, home security, industrial process monitoring, healthcare programs and etc. Wireless sensor networks are vulnerable to various attacks. Cryptography is one of the methods for secure transmission of information between sensors in wireless sensor networks. A complete and secure encryption system must establish three principles of confidentiality, authentication and integrity. An encryption algorithm alone cannot provide all the principles of encryption. A hybrid encryption algorithm, consisting of symmetric and asymmetric encryption algorithms, provides complete security for a cryptographic system. The papers presented in this area over the last few years, and a new secure algorithm present with regard to the limitations of wireless sensor networks, which establishes three principles of cryptography. The details of the algorithm and basic concepts are presented in such a way that the algorithm can be operational and showed a very high efficiency in compare to the current proposed methods. Manuscript profile
      • Open Access Article

        19 - Lifetime Improvement Using Cluster Head Selection and Base Station Localization in Wireless Sensor Networks
        maryam najimi Sajjad  Nankhoshki
        The limited energy supply of wireless sensor networks poses a great challenge for the deployment of wireless sensor nodes. In this paper, a sensor network of nodes with wireless transceiver capabilities and limited energy is considered. Clustering is one of the most eff More
        The limited energy supply of wireless sensor networks poses a great challenge for the deployment of wireless sensor nodes. In this paper, a sensor network of nodes with wireless transceiver capabilities and limited energy is considered. Clustering is one of the most efficient techniques to save more energy in these networks. Therefore, the proper selection of the cluster heads plays important role to save the energy of sensor nodes for data transmission in the network. In this paper, we propose an energy efficient data transmission by determining the proper cluster heads in wireless sensor networks. We also obtain the optimal location of the base station according to the cluster heads to prolong the network lifetime. An efficient method is considered based on particle swarm algorithm (PSO) which is a nature inspired swarm intelligence based algorithm, modelled after observing the choreography of a flock of birds, to solve a sensor network optimization problem. In the proposed energy- efficient algorithm, cluster heads distance from the base station and their residual energy of the sensors nodes are important parameters for cluster head selection and base station localization. The simulation results show that our proposed algorithm improves the network lifetime and also more alive sensors are remained in the wireless network compared to the baseline algorithms in different situations. Manuscript profile
      • Open Access Article

        20 - Using Residual Design for Key Management in Hierarchical Wireless Sensor Networks
        Vahid Modiri Hamid Haj Seyyed Javadi Amir Masoud  Rahmani Mohaddese Anzani
        Combinatorial designs are powerful structures for key management in wireless sensor networks to address good connectivity and also security against external attacks in large scale networks. Many researchers have used key pre-distribution schemes using combinatorial stru More
        Combinatorial designs are powerful structures for key management in wireless sensor networks to address good connectivity and also security against external attacks in large scale networks. Many researchers have used key pre-distribution schemes using combinatorial structures in which key-rings, are pre-distributed to each sensor node before deployment in a real environment. Regarding the restricted resources, key distribution is a great engagement and challenging issue in providing sufficient security in wireless sensor networks. To provide secure communication, a unique key should be found from their stored key-rings. Most of the key pre-distribution protocols based on public-key mechanisms could not support highly scalable networks due to their key storage overhead and communication cost that linearly increasing. In this paper, we introduce a new key distribution approach for hierarchical clustered wireless sensor networks. Each cluster has a construction that contains new points or that reinforces and builds upon similar ideas of their head clusters. Based on Residual Design as a powerful algebraic combinatorial architecture and hierarchical network model, our approach guarantees good connectivity between sensor nodes and also cluster heads. Compared with similar existing schemes, our approach can provide sufficient security no matter if the cluster head or normal sensor node is compromised Manuscript profile
      • Open Access Article

        21 - Energy Efficient Clustering Algorithm for Wireless Sensor Networks
        Maryam Bavaghar Amin Mohajer Sarah Taghavi Motlagh
        In Wireless Sensor Networks (WSNs), sensor nodes are usually deployed with limited energy reserves in remote environments for a long period of time with less or no human intervention. It makes energy efficiency as a challenging issue both for the design and deployment o More
        In Wireless Sensor Networks (WSNs), sensor nodes are usually deployed with limited energy reserves in remote environments for a long period of time with less or no human intervention. It makes energy efficiency as a challenging issue both for the design and deployment of sensor networks. This paper presents a novel approach named Energy Efficient Clustering Algorithm (EECA) for Wireless Sensor Networks which is based on two phases clustering model and provides maximum network coverage in an energy efficient way. In this framework, an effective resource-aware load balancing approach applied for autonomous methods of configuring the parameters in accordance with the signaling patterns in which approximately the same bit rate data is provided for each sensor. This resource-efficient clustering model can also form energy balanced clusters which results in increasing network life time and ensuring better network coverage. Simulation results prove that EECA is better than LEACH, LEA2C and EECS with respect to network lifetime and at the same time achieving more network coverage. In addition to obtained an optimal cluster size with minimum energy loss, the proposed approach also suggests new and better way for selecting cluster heads to reduce energy consumption of the distributed nodes resulting in increased operational reliability of sensor networks. Manuscript profile
      • Open Access Article

        22 - Energy Efficient Cross Layer MAC Protocol for Wireless Sensor Networks in Remote Area Monitoring Applications
        R Rathna L Mary Gladence J Sybi Cynthia V Maria Anu
        Sensor nodes are typically less mobile, much limited in capabilities, and more densely deployed than the traditional wired networks as well as mobile ad-hoc networks. General Wireless Sensor Networks (WSNs) are designed with electro-mechanical sensors through wireless d More
        Sensor nodes are typically less mobile, much limited in capabilities, and more densely deployed than the traditional wired networks as well as mobile ad-hoc networks. General Wireless Sensor Networks (WSNs) are designed with electro-mechanical sensors through wireless data communication. Nowadays the WSN has become ubiquitous. WSN is used in combination with Internet of Things and in many Big Data applications, it is used in the lower layer for data collection. It is deployed in combination with several high end networks. All the higher layer networks and application layer services depend on the low level WSN in the deployment site. So to achieve energy efficiency in the overall network some simplification strategies have to be carried out not only in the Medium Access Control (MAC) layer but also in the network and transport layers. An energy efficient algorithm for scheduling and clustering is proposed and described in detail. The proposed methodology clusters the nodes using a traditional yet simplified approach of hierarchically sorting the sensor nodes. Few important works on cross layer protocols for WSNs are reviewed and an attempt to modify their pattern has also been presented in this paper with results. Comparison with few prominent protocols in this domain has also been made. As a result of the comparison one would get a basic idea of using which type of scheduling algorithm for which type of monitoring applications. Manuscript profile
      • Open Access Article

        23 - Confronting DDoS Attacks in Software-Defined Wireless Sensor Networks based on Evidence Theory
        Nazbanoo Farzaneh Reyhaneh Hoseini
        DDoS attacks aim at making the authorized users unable to access the network resources. In the present paper, an evidence theory based security method has been proposed to confront DDoS attacks in software-defined wireless sensor networks. The security model, as a secur More
        DDoS attacks aim at making the authorized users unable to access the network resources. In the present paper, an evidence theory based security method has been proposed to confront DDoS attacks in software-defined wireless sensor networks. The security model, as a security unit, is placed on the control plane of the software-defined wireless sensor network aiming at detecting the suspicious traffic. The main purpose of this paper is detection of the DDoS attack using the central controller of the software-defined network and entropy approach as an effective light-weight and quick solution in the early stages of the detection and, also, Dempster-Shafer theory in order to do a more exact detection with longer time. Evaluation of the attacks including integration of data from the evidence obtained using Dempster-Shafer and entropy modules has been done with the purpose of increasing the rate of detection of the DDoS attack, maximizing the true positive, decreasing the false negative, and confronting the attack. The results of the paper show that providing a security unit on the control plane in a software-defined wireless sensor network is an efficient method for detecting and evaluating the probability of DDoS attacks and increasing the rate of detection of an attacker. Manuscript profile
      • Open Access Article

        24 - Sailor Localization in Oceans Beds using Genetic and Firefly Algorithm
        Shruti  Gupta Dr Ajay  Rana Vineet  Kansal
        The Localization is the core element in Wireless Sensor Network WSN, especially for those nodes without GPS or BDS; leaning towards improvement, based on its effective and increased use in the past decade. Localization methods are thus very important for estimating the More
        The Localization is the core element in Wireless Sensor Network WSN, especially for those nodes without GPS or BDS; leaning towards improvement, based on its effective and increased use in the past decade. Localization methods are thus very important for estimating the position of relative nodes in the network allowing a better and effective network for increasing the efficiency and thus increasing the lifeline of the network. Determining the current limitations in FA that are applied for solving different optimization problems is poor exploitation capability when the randomization factor is taken large during firefly changing position. This poor exploitation may lead to skip the most optimal solution even present in the vicinity of the current solution which results in poor local convergence rate that ultimately degrades the solution quality. This paper presents GEFIR (GenFire) algorithm to calculate position of unknown nodes for the fishermen in the ocean. The proposed approach calculates the position of unknown nodes, the proposed method effectively selects the anchor node in the cluster head to reduce the energy dissipation. Major benefits over other similar localization algorithms are a better positioning of nodes is provided and average localization error is reduced which eventually leads to better efficiency thus optimize the lifetime of the network for sailors. The obtained results depict that the proposed model surpasses the previous generation of localization algorithm in terms of energy dispersion and location estimation which is suitable for fishermen on the ocean bed. Manuscript profile
      • Open Access Article

        25 - A New Game Theory-Based Algorithm for Target Coverage in Directional Sensor Networks
        Elham Golrasan marzieh varposhti
        One of the challenging problems in directional sensor networks is maximizing target coverage while minimizing the amount of energy consumption. Considering the high redundancy in dense directional sensor networks, it is possible to preserve energy and enhance coverage q More
        One of the challenging problems in directional sensor networks is maximizing target coverage while minimizing the amount of energy consumption. Considering the high redundancy in dense directional sensor networks, it is possible to preserve energy and enhance coverage quality by turning off redundant sensors and adjusting the direction of the active sensor nodes. In this paper, we address the problem of maximizing network lifetime with adjustable ranges (MNLAR) and propose a new game theory-based algorithm in which sensor nodes try to adjust their working direction and sensing range in a distributed manner to achieve the desired coverage. For this purpose, we formulate this problem as a multiplayer repeated game in which each sensor as a player tries to maximize its utility function which is designed to capture the tradeoff between target coverage and energy consumption. To achieve an efficient action profile, we present a distributed payoff-based learning algorithm. The performance of the proposed algorithm is evaluated via simulations and compared to some existing methods. The simulation results demonstrate the performance of the proposed algorithm and its superiority over previous approaches in terms of network lifetime. Manuscript profile
      • Open Access Article

        26 - Training and Learning Swarm Intelligence Algorithm (TLSIA) for Selecting the Optimal Cluster Head in Wireless Sensor Networks
        Ali Sedighimanesh Hessam  Zandhessami Mahmood  Alborzi mohammadsadegh Khayyatian
        Background: Wireless sensor networks include a set of non-rechargeable sensor nodes that interact for particular purposes. Since the sensors are non-rechargeable, one of the most important challenges of the wireless sensor network is the optimal use of the energy of sen More
        Background: Wireless sensor networks include a set of non-rechargeable sensor nodes that interact for particular purposes. Since the sensors are non-rechargeable, one of the most important challenges of the wireless sensor network is the optimal use of the energy of sensors. The selection of the appropriate cluster heads for clustering and hierarchical routing is effective in enhancing the performance and reducing the energy consumption of sensors. Aim: Clustering sensors in different groups is one way to reduce the energy consumption of sensor nodes. In the clustering process, selecting the appropriate sensor nodes for clustering plays an important role in clustering. The use of multistep routes to transmit the data collected by the cluster heads also has a key role in the cluster head energy consumption. Multistep routing uses less energy to send information. Methods: In this paper, after distributing the sensor nodes in the environment, we use a Teaching-Learning-Based Optimization (TLBO) algorithm to select the appropriate cluster heads from the existing sensor nodes. The teaching-learning philosophy has been inspired by a classroom and imitates the effect of a teacher on learner output. After collecting the data of each cluster to send the information to the sink, the cluster heads use the Tabu Search (TS) algorithm and determine the subsequent step for the transmission of information. Findings: The simulation results indicate that the protocol proposed in this research (TLSIA) has a higher last node dead than the LEACH algorithm by 75%, ASLPR algorithm by 25%, and COARP algorithm by 10%. Conclusion: Given the limited energy of the sensors and the non-rechargeability of the batteries, the use of swarm intelligence algorithms in WSNs can decrease the energy consumption of sensor nodes and, eventually, increase the WSN lifetime. Manuscript profile
      • Open Access Article

        27 - Reducing Energy Consumption in Sensor-Based Internet of Things Networks Based on Multi-Objective Optimization Algorithms
        Mohammad sedighimanesh Hessam  Zandhessami Mahmood  Alborzi Mohammadsadegh  Khayyatian
        Energy is an important parameter in establishing various communications types in the sensor-based IoT. Sensors usually possess low-energy and non-rechargeable batteries since these sensors are often applied in places and applications that cannot be recharged. The mos More
        Energy is an important parameter in establishing various communications types in the sensor-based IoT. Sensors usually possess low-energy and non-rechargeable batteries since these sensors are often applied in places and applications that cannot be recharged. The most important objective of the present study is to minimize the energy consumption of sensors and increase the IoT network's lifetime by applying multi-objective optimization algorithms when selecting cluster heads and routing between cluster heads for transferring data to the base station. In the present article, after distributing the sensor nodes in the network, the type-2 fuzzy algorithm has been employed to select the cluster heads and also the genetic algorithm has been used to create a tree between the cluster heads and base station. After selecting the cluster heads, the normal nodes become cluster members and send their data to the cluster head. After collecting and aggregating the data by the cluster heads, the data is transferred to the base station from the path specified by the genetic algorithm. The proposed algorithm was implemented with MATLAB simulator and compared with LEACH, MB-CBCCP, and DCABGA protocols, the simulation results indicate the better performance of the proposed algorithm in different environments compared to the mentioned protocols. Due to the limited energy in the sensor-based IoT and the fact that they cannot be recharged in most applications, the use of multi-objective optimization algorithms in the design and implementation of routing and clustering algorithms has a significant impact on the increase in the lifetime of these networks. Manuscript profile
      • Open Access Article

        28 - Cluster-based Coverage Scheme for Wireless Sensor Networks using Learning Automata
        Ali Ghaffari Seyyed Keyvan  Mousavi
        Network coverage is one of the most important challenges in wireless sensor networks (WSNs). In a WSN, each sensor node has a sensing area coverage based on its sensing range. In most applications, sensor nodes are randomly deployed in the environment which causes the d More
        Network coverage is one of the most important challenges in wireless sensor networks (WSNs). In a WSN, each sensor node has a sensing area coverage based on its sensing range. In most applications, sensor nodes are randomly deployed in the environment which causes the density of nodes become high in some areas and low in some other. In this case, some areas are not covered by none of sensor nodes which these areas are called coverage holes. Also, creating areas with high density leads to redundant overlapping and as a result the network lifetime decreases. In this paper, a cluster-based scheme for the coverage problem of WSNs using learning automata is proposed. In the proposed scheme, each node creates the action and probability vectors of learning automata for itself and its neighbors, then determines the status of itself and all its neighbors and finally sends them to the cluster head (CH). Afterward, each CH starts to reward or penalize the vectors and sends the results to the sender for updating purposes. Thereafter, among the sent vectors, the CH node selects the best action vector and broadcasts it in the form of a message inside the cluster. Finally, each member changes its status in accordance with the vector included in the received message from the corresponding CH and the active sensor nodes perform environment monitoring operations. The simulation results show that the proposed scheme improves the network coverage and the energy consumption. Manuscript profile
      • Open Access Article

        29 - Providing a New Smart Camera Architecture for Intrusion Detection in Wireless Visual Sensor Network
        Meisam Sharifi Sani Amid Khatibi
        The wireless Visual sensor network is a highly functional domain of high-potential network generations in unpredictable and dynamic environments that have been deployed from a large number of uniform or non-uniform groups within the desired area, cause the realization o More
        The wireless Visual sensor network is a highly functional domain of high-potential network generations in unpredictable and dynamic environments that have been deployed from a large number of uniform or non-uniform groups within the desired area, cause the realization of large regulatory applications from the military and industrial domain to hospital and environment. Therefore, security is one of the most important challenges in these networks. In this research, a new method of routing smart cameras with the help of cloud computing technology has been provided. The framework in the cloud computing management layer increases security, routing, inter interaction, and other features required by wireless sensor networks. Systematic attacks are simulated by a series of standard data collected at the CTU University related to the Czech Republic with RapidMiner software. Finally, the accuracy of detection of attacks and error rates with the suggested NN-SVM algorithm, which is a combination of vector machines and neural networks, is provided in the smart cameras based on the visual wireless sensor networks in MATLAB software. The results show that different components of the proposed architecture meet the quality characteristics of visual wireless sensor networks. Detection of attacks in this method is in the range of 99.24% and 99.35% in the worst and best conditions, respectively. Manuscript profile
      • Open Access Article

        30 - Secure Key Management Scheme for Hierarchical Network Using Combinatorial Design
        Siddiq Iqbal B R  Sujatha
        The wireless sensor network (WSN) signifies to a gathering of spatially spread and committed sensors for observing and logging the physical states of the environment and for organizing the information gathered at the central Base station. Many security threats may affec More
        The wireless sensor network (WSN) signifies to a gathering of spatially spread and committed sensors for observing and logging the physical states of the environment and for organizing the information gathered at the central Base station. Many security threats may affect the functioning of these networks. Security of the data in the system depends on the cryptographic procedure and the methods where encryption and decryption keys are developed among the sensors. Symmetric key foundation is one of the best applicable ideal models for safe exchanges in WSNs. The main goal is to improve and evaluate certain issues, such as node attack, to provide better key strength, connectivity, security for node interaction, and throughput. Uniform Balanced Incomplete Block Design (UBIBD) is used to generate the keys allocated by the base station to the cluster head. The cluster head distributes keys to its members using Symmetric Balanced Incomplete Block Design (SBIBD), and the keys are refreshed on a regular basis to avoid out-of-date entries. In wireless sensor networks, compromised nodes can be used to inject false reports. The concept of interacting between sensor nodes using keys and establishing a secure connection aids in ensuring the network's security. Manuscript profile
      • Open Access Article

        31 - A Novel Approach for Establishing Connectivity in Partitioned Mobile Sensor Networks using Beamforming Techniques
        Abbas Mirzaei Shahram Zandian
        Network connectivity is one of the major design issues in the context of mobile sensor networks. Due to diverse communication patterns, some nodes lying in high-traffic zones may consume more energy and eventually die out resulting in network partitioning. This phenomen More
        Network connectivity is one of the major design issues in the context of mobile sensor networks. Due to diverse communication patterns, some nodes lying in high-traffic zones may consume more energy and eventually die out resulting in network partitioning. This phenomenon may deprive a large number of alive nodes of sending their important time critical data to the sink. The application of data caching in mobile sensor networks is exponentially increasing as a high-speed data storage layer. This paper presents a deep learning-based beamforming approach to find the optimal transmission strategies for cache-enabled backhaul networks. In the proposed scheme, the sensor nodes in isolated partitions work together to form a directional beam which significantly increases their overall communication range to reach out a distant relay node connected to the main part of the network. The proposed methodology of cooperative beamforming-based partition connectivity works efficiently if an isolated cluster gets partitioned with a favorably large number of nodes. We also present a new cross-layer method for link cost that makes a balance between the energy used by the relay. By directly adding the accessible auxiliary nodes to the set of routing links, the algorithm chooses paths which provide maximum dynamic beamforming usage for the intermediate nodes. The proposed approach is then evaluated through simulation results. The simulation results show that the proposed mechanism achieves up to 30% energy consumption reduction through beamforming as partition healing in addition to guarantee user throughput. Manuscript profile
      • Open Access Article

        32 - The role of the Quran on Science of the theology in the method
           
        Each science has the method or means by which it achieves its goals, There are some sciences of a single method, like philosophy, and some are some other methods. The Science of the theology, which is responsible for explaining religious doctrines and answers to doubts, More
        Each science has the method or means by which it achieves its goals, There are some sciences of a single method, like philosophy, and some are some other methods. The Science of the theology, which is responsible for explaining religious doctrines and answers to doubts, Various views have been presented on the one or more methods of theology of theology from different theological religions, For example, the Ahl al-Hadith selected the narrative method and the Mu'tazilites chose the rational method. But referring to the Qur'an shows that to explain religious teachings, we must use different methods. The author in this article will show that must use the science of the theology of all possible methods, example: narrative iIcludes Quran and Traditions, rational includes reason and even definitive philosophical principles, experimental and sensory, intuitive. This claim is in contradiction to the claims of some who regard the science of the theology as certain metaphors as quoted and experimental Manuscript profile
      • Open Access Article

        33 - Emanation of sensory perception and its certainty: inquiry of the influence of the Stoics on Mulla Sadra
        Ebrahim  Arash Mohsenn Fahim Mojtaba Jafari ashqavandi
        In this research, Mulla Sadra's theory about the union of sensory and senses in sensory perception was examined based on the issue of the emanation of sensory perception and its certainty. The importance of the issue is in the sense that Mulla Sadra was influenced by th More
        In this research, Mulla Sadra's theory about the union of sensory and senses in sensory perception was examined based on the issue of the emanation of sensory perception and its certainty. The importance of the issue is in the sense that Mulla Sadra was influenced by the Stoic theory in relation to this issue, and he himself clarified this issue.. Mulla Sadra's theory about sensory knowledge is the actualization of the forms of sensations for the soul and its realization in the sensory world. This kind of approach to knowledge as an ontological form that considers the relationship between the senses and the sensory perceptions as a kind of evolutionary relationship is different from the peripatetic theory. In Peripatetic theory, the forms of sensations in the soul are a prelude to rational knowledge through the abstraction of these forms. According to Mulla Sadra, the soul is active in the level of sense because it is the issuer of forms of sensations instead of being passive and therefore knowledge at this stage is also scientific and certain. Mulla Sadra has stated that, many thinkers before him had believed this promise. Accordingly, in this research Mulla Sadra's theory of sensory knowledge has been matched with the theory of epistemological impression of the early Stoics. In the theory of epistemological impression, the early Stoics consider sensory perception as the face for the matter of the soul on which it is engraved. The early Stoics consider the certainty of an epistemological impression to be synonymous with the soul and use it for the excellence of wisdom and morality in individuals. The results of the research show that Mulla Sadra and the early Stoics paid attention to the homogeneity of the senses and the activity of the soul in sensory perception to obtain sensory certainty. The method of conducting the research is content analysis and innovation of research is the possibility of dialogue between Mulla Sadra's views and early Stoic philosophy in the field of epistemology. Manuscript profile
      • Open Access Article

        34 - A Hybrid Approach based on PSO and Boosting Technique for Data Modeling in Sensor Networks
        hadi shakibian Jalaledin Nasiri
        An efficient data aggregation approach in wireless sensor networks (WSNs) is to abstract the network data into a model. In this regard, regression modeling has been addressed in many studies recently. If the limited characteristics of the sensor nodes are omitted from c More
        An efficient data aggregation approach in wireless sensor networks (WSNs) is to abstract the network data into a model. In this regard, regression modeling has been addressed in many studies recently. If the limited characteristics of the sensor nodes are omitted from consideration, a common regression technique could be employed after transmitting all the network data from the sensor nodes to the fusion center. However, it is not practical nor efferent. To overcome this issue, several distributed methods have been proposed in WSNs where the regression problem has been formulated as an optimization based data modeling problem. Although they are more energy efficient than the centralized method, the latency and prediction accuracy needs to be improved even further. In this paper, a new approach is proposed based on the particle swarm optimization (PSO) algorithm. Assuming a clustered network, firstly, the PSO algorithm is employed asynchronously to learn the network model of each cluster. In this step, every cluster model is learnt based on the size and data pattern of the cluster. Afterwards, the boosting technique is applied to achieve a better accuracy. The experimental results show that the proposed asynchronous distributed PSO brings up to 48% reduction in energy consumption. Moreover, the boosted model improves the prediction accuracy about 9% on the average. Manuscript profile
      • Open Access Article

        35 - Smart Farming Based on Internet of Things
        GholamReza  Farrokhi Mahboobeh Gapeleh
        Nowadays, with the increasing population of the world and the need for food on the one hand and the scarcity of water, energy and arable land on the other hand, traditional agriculture is no longer responsive to the food demand of the world population, so smart farming More
        Nowadays, with the increasing population of the world and the need for food on the one hand and the scarcity of water, energy and arable land on the other hand, traditional agriculture is no longer responsive to the food demand of the world population, so smart farming has become more and more popular. The IoT is a new technology that is capable of providing many solutions for modernizing agriculture. IoT provides reliable information on the seed to be sown, the seed rate, the best time to plant and harvest, as well as the prediction of the amount of crop to be harvested. In this article, by studying research and research through library data collection and the study of scientific resources in the field of IoT, as well as the infrastructure required for deployment, we discuss the potentials and capabilities of this technology In the field of agriculture. The present study reviews the benefits of using IoT in smart agriculture such as increasing crop yields due to proper planning of seed planting time, crop harvesting, water use optimization. Planning to apply appropriate irrigation methods according to the amount of water required for each plant and each climatic zone, identifying pests and plant diseases at the real time, and alerting the farmer to the necessary decisions and actions to be taken. Pest utilization of information obtained from sensors established in the field is another benefit that has been addressed in this study. Manuscript profile
      • Open Access Article

        36 - Dynamic Tree- Based Routing: Applied in Wireless Sensor Network and IOT
        Mehdi Khazaei
        The Internet of Things (IOT) has advanced in parallel with the wireless sensor network (WSN) and the WSN is an IOT empowerment. The IOT, through the internet provides the connection between the defined objects in apprehending and supervising the environment. In some app More
        The Internet of Things (IOT) has advanced in parallel with the wireless sensor network (WSN) and the WSN is an IOT empowerment. The IOT, through the internet provides the connection between the defined objects in apprehending and supervising the environment. In some applications, the IOT is converted into WSN with the same descriptions and limitations. Working with WSN is limited to energy, memory and computational ability of the sensor nodes. This makes the energy consumption to be wise if protection of network reliability is sought. The newly developed and effective hierarchical and clustering techniques are to overcome these limitations. The method proposed in this article, regarding energy consumption reduction is tree-based hierarchical technique, used clustering based on dynamic structure. In this method, the location-based and time-based properties of the sensor nodes are applied leading to provision of a greedy method as to form the subtree leaves. The rest of the tree structure up to the root, would be formed by applying the centrality concept in the network theory by the base station. The simulation reveals that the scalability and fairness parameter in energy consumption compare to the similar method has improved, thus, prolonged network lifetime and reliability. Manuscript profile
      • Open Access Article

        37 - Recognition of the sources of knowledge in the creation of Islamic knowledge
        Mostafa Jafarpishe محمد سعید جبل عاملی
        As sensory and experimental data are considered to be a source of knowledge and as intellectual data are considered to be a source of knowledge, the knowledge that is taught by the prophets to mankind is too, another source of knowledge. This paper deals with a fresh l More
        As sensory and experimental data are considered to be a source of knowledge and as intellectual data are considered to be a source of knowledge, the knowledge that is taught by the prophets to mankind is too, another source of knowledge. This paper deals with a fresh look at the sources of knowledge acquisition, process of acquisition, extraction and inference of Islamic knowledge from two sources of Quran and Sunnah, based on the statements of knowledge about the existence and phenomena of creation, in these two sources. in this paper, the concept of Islamic knowledge is cognition and knowledge that is first take from the religion of Islam, Quran and Sunnah, and secondly, that is related to the postulates of religion and reality of the universe in general and widespread, both materialistic and non - materialistic. But the recommendations of the Quran and the Sunnah will be directly excluded from our discussion. Manuscript profile
      • Open Access Article

        38 - Cache Point Selection and Transmissions Reduction using LSTM Neural Network
        Malihe  Bahekmat Mohammad Hossein  Yaghmaee Moghaddam
        Reliability of data transmission in wireless sensor networks (WSN) is very important in the case of high lost packet rate due to link problems or buffer congestion. In this regard, mechanisms such as middle cache points and congestion control can improve the performance More
        Reliability of data transmission in wireless sensor networks (WSN) is very important in the case of high lost packet rate due to link problems or buffer congestion. In this regard, mechanisms such as middle cache points and congestion control can improve the performance of the reliability of transmission protocols when the packet is lost. On the other hand, the issue of energy consumption in this type of networks has become an important parameter in their reliability. In this paper, considering the energy constraints in the sensor nodes and the direct relationship between energy consumption and the number of transmissions made by the nodes, the system tries to reduce the number of transmissions needed to send a packet from source to destination as much as possible by optimal selection of the cache points and packet caching. In order to select the best cache points, the information extracted from the network behavior analysis by deep learning algorithm has been used. In the training phase, long-short term memory (LSTM) capabilities as an example of recurrent neural network (RNN) deep learning networks to learn network conditions. The results show that the proposed method works better in examining the evaluation criteria of transmission costs, end-to-end delays, cache use and throughput. Manuscript profile
      • Open Access Article

        39 - Simplify Programming of TinyOS Applications for Wireless Sensor Networks
        M. Khezri M.  Sarram F. Adibnia
        Sensor node operating system provides a limited number of common services for developers to construct applications for wireless sensor networks. The sensor network community selected TinyOS as the de facto standard with most existing applications, libraries and device d More
        Sensor node operating system provides a limited number of common services for developers to construct applications for wireless sensor networks. The sensor network community selected TinyOS as the de facto standard with most existing applications, libraries and device drivers available for TinyOS. The programming model of TinyOS is event-based and is not easy to use. In this paper, we present a new task scheduler for TinyOS that includes a new computation concept, named Job. Jobs are a collaborative and non-preemptive way of multitasking. On the next step, we propose a programming model which combines the asynchronous basis of event-driven systems with a more classical programming interface for the developer. As a result, developer that uses such an interface in his application will be provided with the sequential view we wanted. This programming model is suitable for applications that have long running computations and there is a data flow dependency between different tasks. Manuscript profile
      • Open Access Article

        40 - A Biological Laboratory on Microelectronic Chip: Design, Fabrication, and Experimental Results
        E. Ghafar-Zadeh Mohammad Sawan
        In this paper, a complementary metal–oxide semiconductor (CMOS) based Laboratory-on-Chip platform is presented for bacteria growth monitoring. This platform integrates a 0.18 µm CMOS chip with two microfluidic channels. The proposed CMOS chip manufactured by Taiwan Semi More
        In this paper, a complementary metal–oxide semiconductor (CMOS) based Laboratory-on-Chip platform is presented for bacteria growth monitoring. This platform integrates a 0.18 µm CMOS chip with two microfluidic channels. The proposed CMOS chip manufactured by Taiwan Semiconductor Manufacturing Company (TSMC) features a differential capacitive sensor along with two reference and sensing interdigitized electrodes. Two microfluidic channels are thereafter implemented atop the electrodes through a direct-write assembly technique. These microchannels are filled with pure Luria-Bertani (LB) medium and Escherichia Coli (E. Coli) bacteria suspended in the LB medium, respectively. We demonstrate and discuss the experimental results by using two different bacteria concentrations in the order of 10^6 and 10^7 per 1 mL in the LB medium. Manuscript profile
      • Open Access Article

        41 - A Comprehensive Method to Secure Time Synchronization in Wireless Sensor
        Z. Ahmadi  
        One of the important requirements of sensor networks is synchronization of the nodes. The importance of time in sensor networks causes the adversary tries to disturb time synchronization by altering and faking messages, delaying or replying them, compromising the nodes More
        One of the important requirements of sensor networks is synchronization of the nodes. The importance of time in sensor networks causes the adversary tries to disturb time synchronization by altering and faking messages, delaying or replying them, compromising the nodes and sending false messages via them. Up to now, there is no method that is able to provide both synchronization and security needs of sensor networks simultaneously. In this paper, we suggest a method that is capable to provide precise synchronization, along with low communication and computational overhead, low convergence time and high security against internal and external attacks. Simulation and analytic results show the preference of our method compared to other available methods. Manuscript profile
      • Open Access Article

        42 - Topology Control in Wireless Sensor Networks Using Two-Level Fuzzy Logic
        A. Abdi Seyedkolaei A. Zakerolhosseini
        Wireless sensor networks are a new generation of networks that from sensors uses to get information about itself environment and communication this sensors is as wireless. One of the issues that is very important in wireless sensor networks is Discussion reducing energy More
        Wireless sensor networks are a new generation of networks that from sensors uses to get information about itself environment and communication this sensors is as wireless. One of the issues that is very important in wireless sensor networks is Discussion reducing energy consumption and increasing network lifetime. Topology control is one of the methods to reduce energy consumption and increase the lifetime of the network. Since different methods of topology control, to reduce energy consumption and enhance the network lifetime is proposed that including them is the clustering and one of the most famous clustering methods is LEACH. In this paper, we try to present a new clustering method that is superior compared to leach and other improved methods after the LEACH. we use in our clustering method from two-level fuzzy logic that be causing reduce energy consumption and increase the network lifetime compared to other methods and to prove the superiority of our method compared with other methods, we present a comparison using MATLAB software. Manuscript profile
      • Open Access Article

        43 - PLAER: Penalty Base Learning Automata for Energy Aware Routing in WSN
        M. Parvizi Omran A. Moeni H. Haj Seyyed Javadi
        Sensors in WSN work with batteries that have limited energy capacity. Therefore, reduction in power consumption is a very important issue. In this paper, we present a new routing algorithm to reduce power consumption in wireless sensor networks. This algorithm deploys L More
        Sensors in WSN work with batteries that have limited energy capacity. Therefore, reduction in power consumption is a very important issue. In this paper, we present a new routing algorithm to reduce power consumption in wireless sensor networks. This algorithm deploys Learning automata in each node to find a suitable path for routing data packets. In order to aim this goal the algorithm uses penalty based approach in learning automata and considers energy level of nodes and latency of packet delivery as well. Performance of our new developed algorithm has been compared with LABER and BEAR protocols in OMNET++ simulator. Simulation results show that, in a network with static nodes, energy consumption and control packets reduce significantly and network lifetime increases in comparison with two other protocols. Manuscript profile
      • Open Access Article

        44 - A Goal-Based Approach for the Holonification of Holonic Multi-Agent Systems
        Ahmad Esmaeili N. Mozayani M. R. Jahed Motlagh
        Holonic structures are a hierarchical formation of holons that are developed and used for the purpose of restricting interaction domains, reducing uncertainty, or forming the high level goals of multi-agent systems, in such a way that the system benefits a high degree o More
        Holonic structures are a hierarchical formation of holons that are developed and used for the purpose of restricting interaction domains, reducing uncertainty, or forming the high level goals of multi-agent systems, in such a way that the system benefits a high degree of flexibility and dynamism in response to environmental changes. Although the holonic multi-agent systems are extensively used in modeling and solving complex problems, most of its prerequisites, like forming the body holons and dynamically controlling its structure, use very simple application-specific models. This is due to the immaturity of the research literatures in this field. In this article, an endeavor is made to propose a goal-based approach for the formation of holonic structures, using the concepts in social science and organizational theory. The use of concepts like role, skill, and goal structures, makes the proposed method possible to be used in wide range of applications. In order to demonstrate the capabilities of the method and also the way it can be applied in real world problems, a test bed based on the application of wireless sensor networks in object tracking is designed and presented. In this application, the sensors, which are distributed in the environment as simple agents, using holonic structures, are responsible for the track of any alien objects that enter and move in the environment. According to the empirical results of the simulations, the proposed holonic approach has provided successful performance in terms of tracking quality and energy consumption of the sensors. Manuscript profile
      • Open Access Article

        45 - A Novel Energy-Efficient Algorithm to Enhance Load Balancing and Lifetime of Wireless Sensor Networks
        S. Abbasi-Daresari J. Abouei
        Wireless senor networks (WSNs) are widely used for the monitoring purposes. One of the most challenges in designing these networks is minimizing the data transmission cost with accurate data recovery. Data aggregation using the theory of compressive sampling is an effec More
        Wireless senor networks (WSNs) are widely used for the monitoring purposes. One of the most challenges in designing these networks is minimizing the data transmission cost with accurate data recovery. Data aggregation using the theory of compressive sampling is an effective way to reduce the cost of communication in the sink node. The existing data aggregation methods based on compressive sampling require to a large number of nodes for each measurement sample leading to inefficient energy consumption in wireless sensor network. To solve this problem, we propose a new scheme by using sparse random measurement matrix. In this scheme, the formation of routing trees with low cost and fair distribution of load on the network significantly reduces energy consumption. Toward this goal, a new algorithm called “weighted compressive data gathering (WCDG)” is suggested in which by creating weighted routing trees and using the compressive sampling, the data belong to all of nodes of each path is aggregated and then, sent to the sink node. Considering the power control ability in sensor nodes, efficient paths are selected in this algorithm. Numerical results demonstrate the efficiency of the proposed algorithm with compared to the conventional data aggregation schemes in terms of energy consumption, load balancing, and network lifetime. Manuscript profile
      • Open Access Article

        46 - Improving Target Coverage in Visual Sensor Networks by Adjusting the Cameras’ Field-of-View and Scheduling the Cover sets Using Simulated Annealing
        B. Shahrokhzadeh M. Dehghan M. R. Shahrokhzadeh
        In recent years, target coverage is one of the important problems in visual sensor networks. An efficient use of energy is required in order to increase the network lifetime, while covering all the targets. In this paper, we address the Maximum Lifetime with Coverage Sc More
        In recent years, target coverage is one of the important problems in visual sensor networks. An efficient use of energy is required in order to increase the network lifetime, while covering all the targets. In this paper, we address the Maximum Lifetime with Coverage Scheduling (MLCS) problem that maximizes the network lifetime. We develop a simulated annealing (SA) algorithm that divides the sensors’ Field-of-View (FoV) to a number of cover sets that can cover all the targets and then applies a sleep-wake scheduling algorithm. On the other hand, we have to identify the best possible FoV of sensors according to the targets’ location using rotating cameras, to reduce the solution space and find a near-optimal solution. It also provides the balanced distribution of energy consumption by introducing a new energy and neighbor generating function as well as escaping from local optima. Finally, we conduct some simulation experiments to evaluate the performance of our proposed method by comparing with well-known solutions in the literature such as greedy algorithms. Manuscript profile
      • Open Access Article

        47 - EBONC: A New Energy-Aware Clustering Approach Based on Optimum Number of Clusters for Mobile Wireless Sensor Networks
        N. Norouzy N. Norouzy M. Fazlali
        The energy constraint is one of the key challenges in wireless sensor networks that directly affects the network lifetime. Clustering the sensor nodes is one of the possible approaches to improving the energy efficiency by uniformly distributing the energy consumption a More
        The energy constraint is one of the key challenges in wireless sensor networks that directly affects the network lifetime. Clustering the sensor nodes is one of the possible approaches to improving the energy efficiency by uniformly distributing the energy consumption among the nodes. The number of appropriate clusters plays an important role in the network throughput. A Large number of clusters imply that packets pass more hops to reach the destination, which results in higher energy consumption. In this paper, we devise an energy and location aware clustering scheme that tries to optimize the number of required clusters. Moreover, the cluster heads are chosen according to their energy levels. The devised scheme partitions the network into concentric circles and calculates the appropriate number of clusters to provide an energy efficient network. A gossiping approach is used to provide information exchange mechanism. The performance of the devised approach is compared with ASH scheme. The simulation results show the network lifetime is improved from 25% to 40% in difference network scenarios. Manuscript profile
      • Open Access Article

        48 - Optimization of Adaptive Design of Wireless Sensor Networks Using Binary Quantum-Inspired Gravitational Search Algorithm
        M. Mirhosseini F. Barani H. Nezamabadi-pour
        In this paper, the binary quantum-inspired gravitational search algorithm is adapted to dynamically optimize the design of a wireless sensor network towards improving energy consumption and extending the lifetime of the network, so that the application-specific requirem More
        In this paper, the binary quantum-inspired gravitational search algorithm is adapted to dynamically optimize the design of a wireless sensor network towards improving energy consumption and extending the lifetime of the network, so that the application-specific requirements and communication constraints are fulfilled. The proposed approach is applied on a wireless sensor network used in the application of precise agriculture to monitor environmental conditions. This algorithm would present an optimal design detecting operational mode of each sensor including cluster head, high signal range, low signal range and inactive modes taking into consideration the constraints of the network. The simulation results indicate the most performance of the proposed method in comparison with binary genetic algorithm and particle swarm optimization. Manuscript profile
      • Open Access Article

        49 - An Efficient Hybrid Routing Protocol in Underwater Wireless Sensor Networks
        J. Tavakoli N. Moghim
        Underwater Wireless Sensor Network (UWSN) is a kind of sensor networks that their operational fields have been developed under water in recent decades, although these networks deal with lots of challenges due to lack of the GPS1. These networks encounter researchers wit More
        Underwater Wireless Sensor Network (UWSN) is a kind of sensor networks that their operational fields have been developed under water in recent decades, although these networks deal with lots of challenges due to lack of the GPS1. These networks encounter researchers with many challenges by some limitations like high propagation delay, low bandwidth, high bit error rate, movement, limited battery and memory. In comparison with terrestrial sensor networks, sensors in the UWSN consume energy more because they use acoustic technology to communicate. Motivation of this research is proposing a routing protocol for underwater systematic settings with a limited energy. The settled sensor nodes in underwater cannot communicate directly with nodes near surface, so they need prepared multi hop communications with a proper routing plan. In wireless sensor networks, node clustering is a common way to organize data traffic and to decrease intra-network communications along with scalability and load balance improvement plus reducing of overall energy consumption of system. Therefore, in this article a fuzzy clustering routing protocol with data aggregation and balanced energy consumption for UWSNs is proposed. Simulation results show that in the proposed protocol, energy consumption becomes more uniformly distributed in the network and average of the nodes' energy usage and number of routing packets decreases and finally, packet delivery ratio and throughput are improved in the network in comparison with DABC3 and IDACB4 algorithms. Manuscript profile
      • Open Access Article

        50 - Introducing a Fog-Based Algorithm for Routing in Wireless Sensor Networks
        E. Mirzavand Borujeni D. Rahbari M. Nickray
        Wireless sensor networks (WSNs) consist of thousands of small nodes. The small and inexpensive parts of these nodes have led to their widespread use in various fields. However, these networks have constraints on energy consumption, processing resources, and storage whic More
        Wireless sensor networks (WSNs) consist of thousands of small nodes. The small and inexpensive parts of these nodes have led to their widespread use in various fields. However, these networks have constraints on energy consumption, processing resources, and storage which have caused many studies to find solutions to reduce these constraints. In recent years, with the advent of the concept of Fog computing, many new and effective solutions are represented for routing in wireless sensor networks. Since in WSNs it is important to save alive nodes and reduce the energy consumption of nodes, fog computing is useful for this purpose. In most WSN routing protocols, the best way to send data to cluster heads and the base station is the major part of their studies. In the new protocols, the Fog computing have been used to find the best way. In these methods, we have seen decreasing energy consumption and increasing network lifetime. In this paper, we represent a fog-based algorithm for routing in WSNs. According to the simulation results, the proposed protocol improved energy consumption by 9% meanwhile the number of alive nodes is increased by 74%, compared to the reviewed method. Manuscript profile
      • Open Access Article

        51 - An Improved Grid-Based K-Coverage Technique Using Probabilistic Sensing Model for Wireless Sensor Networks
        Abdolreza Vaghefi Mahdi Mollamotalebi
        Coverage of an area, with one or multiple sensors, is one of the fundamental challenges in wireless sensor networks. Since a sensor life span is limited and reliable data is of great importance, sensitive applications like fire\leakage alarm systems, intrusion detection More
        Coverage of an area, with one or multiple sensors, is one of the fundamental challenges in wireless sensor networks. Since a sensor life span is limited and reliable data is of great importance, sensitive applications like fire\leakage alarm systems, intrusion detection, etc. need multiple sensors to cover the region of interest, which is called K-coverage. Most of the studies that have been carried out on K-coverage evaluation have used binary sensing model. In this paper, we propose a grid-based K-coverage evaluation technique using probabilistic sensing model to increase evaluation accuracy and decrease evaluation time. The proposed technique is implemented using NS-2 simulator, and its results are compared to probabilistic perimeter-based and binary grid-based techniques. The results indicate that the proposed technique improved accuracy by 14% and 24% compared to the mentioned techniques respectively. It also shows 7% decrease in evaluation time compared to probabilistic perimeter-based technique. Manuscript profile
      • Open Access Article

        52 - A Lightweight Intrusion Detection System Based on Two-Level Trust for Wireless Sensor Networks
        M. sadeghizade O. R. Marouzi
        Wireless sensor networks (WSNs) are one of the useful and attractive technologies that have received much attention in recent years. These networks have been used in a variety of applications, due to their ease of use and inexpensive deployment. Due to the criticality o More
        Wireless sensor networks (WSNs) are one of the useful and attractive technologies that have received much attention in recent years. These networks have been used in a variety of applications, due to their ease of use and inexpensive deployment. Due to the criticality of most applications of these networks, security is considered as one of the essential parameters of the quality of service (QoS), and thus Intrusion Detection System (IDS) is considered as a fundamental requirement for security in these networks. This paper provides a trust-based IDS to protect the WSN against all network layer and routing attacks based on the features extracted from them. Through simulations, the proposed IDS has been evaluated with all performance criteria. The results show that the proposed IDS, in comparison with existing works, which often focuses on a specific attack, covers all network layer and routing attacks in WSNs, and also, due to high detection accuracy, low false alarms rate, and low energy consumption is considered as a desirable and lightweight IDS for WSNs. Manuscript profile
      • Open Access Article

        53 - Propose a New Clustering Algorithm for Data Transmission in Wireless Sensor Networks by Using Apollonius Circle
        Sh. Pourbahrami E. Khaledi Alamdari L. Mohammad Khanli
        Wireless sensor networks, as an up-to-date technology, are one of the fastest growing technologies in the world today. Since these networks are used in military and agricultural environments as well as for observation of inaccessible environments, these networks need to More
        Wireless sensor networks, as an up-to-date technology, are one of the fastest growing technologies in the world today. Since these networks are used in military and agricultural environments as well as for observation of inaccessible environments, these networks need to be organized to achieve goals such as successful and timely sending of data to the main station. Clustering of wireless sensor networks is one of the most widely used methods for organizing these networks. Various ways to cluster these networks are provided, most of which are aimed at preventing energy loss and increasing the lifetime of sensor nodes. The thesis attempts to present a new geometric method for clustering the nodes of wireless sensor networks. In this geometric method, Apollonius circle is used to draw the abstract shape of the clusters and to assemble the nodes around the cluster head. Due to the high accuracy that it has in determining the fit of node distances, this circle can accurately assign nodes to cluster heads and prevent large single-node clusters or faraway nodes. In this algorithm, a main station, a number of nodes are used as a cluster header and a number of nodes as routers. The goal is to find the most accurate cluster heads and create clusters of high coverage in the network. The proposed method is implemented in MATLAB software and comparison of the results obtained from the view of successful data transmission, clustering accuracy, network lifetime and number of coverage areas, is showing accuracy of this method compared to optimal Leach algorithms and K-means presented in this field. Manuscript profile
      • Open Access Article

        54 - An Adaptive Multi-Objective Clustering Algorithm based on Auction_Prediction for Mobile Target Tracking in Wireless Sensor Network
        Roghieh Alinezhad Sepideh Adabi arash Sharifi
        One of the applications of sensor networks is to track moving target. In designing the algorithm for target tracking two issues are of importance: reduction of energy consumption and improvement of the tracking quality. One of the solutions for reduction of energy consu More
        One of the applications of sensor networks is to track moving target. In designing the algorithm for target tracking two issues are of importance: reduction of energy consumption and improvement of the tracking quality. One of the solutions for reduction of energy consumption is to form a tracking cluster. Two major challenges in formation of the tracking cluster are when and how it should be formed. To decrease the number of messages which are exchanged to form the tracking cluster an auction mechanism is adopted. The sensor’s bid in an auction is dynamically and independently determined with the aim of establishing an appropriate tradeoff between network lifetime and the accuracy of tracking. Furthermore, since the tracking cluster should be formed and activated before the target arrives to the concerned region (especially in high speed of target), avoidance from delay in formation of the tracking cluster is another challenge. Not addressing the mentioned challenge results in increased target missing rate and consequently energy loss. To overcome this challenge, it is proposed to predict the target’s position in the next two steps by using neural network and then, simultaneously form the tracking clusters in the next one and two steps. The results obtained from simulation indicate that the proposed algorithm outperforms AASA (Auction-based Adaptive Sensor Activation). Manuscript profile
      • Open Access Article

        55 - Optimal Resource Allocation in Multi-Task Software-Defined Sensor Networks
        S. A. Mostafavi M. Agha Sarram T. Salimian
        Unlike conventional wireless sensor networks which are designed for a specific application, Software-Defined Wireless Sensor Networks (SDSN) can embed multiple sensors on each node, defining multiple tasks simultaneously. Each sensor node has a virtualization program wh More
        Unlike conventional wireless sensor networks which are designed for a specific application, Software-Defined Wireless Sensor Networks (SDSN) can embed multiple sensors on each node, defining multiple tasks simultaneously. Each sensor node has a virtualization program which serves as a common communication infrastructure for several different applications. Different sensor applications in the network can have different target functions and decision parameters. Due to the resource constraints of sensor network nodes, the multiplicity and variety of tasks in each application, requirements for different levels of quality of service, and the different target functions for different applications, the problem of allocating resources to the tasks on the sensors is complicated. In this paper, we formulate the problem of allocating resources to the sensors in the SDSN with different objective functions as a multi-objective optimization problem and provide an effective solution to solve it. Manuscript profile
      • Open Access Article

        56 - DRSS-Based Localization Using Convex Optimization in Wireless Sensor Networks
        Hassan Nazari M. R. Danaee M. Sepahvand
        Localization with differential received signal strength measurement in recent years has been very much considered. Due to the fact that the probability density function is known for given observations, the maximum likelihood estimator is used. This estimator can be asym More
        Localization with differential received signal strength measurement in recent years has been very much considered. Due to the fact that the probability density function is known for given observations, the maximum likelihood estimator is used. This estimator can be asymptotically represented the optimal estimation of the location. After the formation of this estimator, it is observed that the corresponding cost function is highly nonlinear and non-convex and has a lot of minima, so there is no possibility of achieving the global minimum with Newton method and the localization error will be high. There is no analytical solution for this cost function. To overcome this problem, two methods are existed. First, the cost function is approximated by a linear estimator. But this estimator has poor accuracy. The second method is to replace the non-convex cost function with a convex one with the aid of convex optimization methods, in which case the global minimum is obtained. In this paper, we proposed new convex estimator to solve cost function of maximum likelihood estimator. The results of the simulations show that the proposed estimator has up to 20 percent performance improvement compared with existing estimators, moreover, the execution time of proposed estimator is 30 percent faster than other convex estimators. Manuscript profile
      • Open Access Article

        57 - Autonomous Controlling System for Structural Health Monitoring Wireless Sensor Networks
        Sahand Hashemi Seyyed Amir Asghari Mohammad Reza Binesh Marvasti
        Nowadays, office, residential, and historic buildings often require special monitoring. Obviously, such monitoring involves costs, errors and challenges. As a result of factors such as lower cost, broader application, and ease of installation, wireless sensor networks a More
        Nowadays, office, residential, and historic buildings often require special monitoring. Obviously, such monitoring involves costs, errors and challenges. As a result of factors such as lower cost, broader application, and ease of installation, wireless sensor networks are frequently replacing wired sensor networks for structural health monitoring. Depending on the type and condition of a structure, factors such as energy consumption and accuracy, as well as fault tolerance are important. Particularly when wireless sensor networks are involved, these are ongoing challenges which, despite research, have the possibility of being improved. Using the Markov decision process and wake-up sensors, this paper proposes an innovative approach to monitoring stable and semi-stable structures, reducing the associated cost and error over existing methods, and according to the problem, we have advantages both in implementation and execution. Thus, the proposed method uses the Markov decision process and wake-up sensors to provide a new and more efficient technique than existing methods in order to monitor the health of stable and semi-stable structures. This approach is described in six steps and compared to widely used methods, which were tested and simulated in CupCarbon simulation environment with different metrics, and shows that the proposed solution is better than similar solutions in terms of a reduction of energy consumption from 11 to 70%, fault tolerance in the transferring of messages from 10 to 80%, and a reduction of cost from 93 to 97%. Manuscript profile
      • Open Access Article

        58 - A Semi-Central Method to Improve Energy Saving in Real Wireless Sensor Networks Using Clustering and Mobile Sinks
        Fatemeh Sadeghi Sepideh Adabi Sahar Adabi
        Applying a hierarchical routing approach based on clustering technique and mobile sink has a great impact on reducing energy consumption in WSN. Two important issues in designing such an approach are cluster head selection and optimal allocation of mobile sinks to criti More
        Applying a hierarchical routing approach based on clustering technique and mobile sink has a great impact on reducing energy consumption in WSN. Two important issues in designing such an approach are cluster head selection and optimal allocation of mobile sinks to critical regions (i.e., regions those have low remaining energy and thus, high risk of energy hole problem). The limited number of mobile sinks should be utilized due to a high cost. Therefore, allocating the limited number of mobile sinks to the high amount of requests received from the critical regions is categorized as a NP-hard problem. Most of the previous studies address this problem by using heuristic methods which are carried out by sensor nodes. However, this type of solutions cannot be implemented in real WSN due to the sensors’ current technology and their limited processing capability. In other words, these are just theoretical solutions. Consequently, a semi-central genetic algorithm based method using mobile sink and clustering technique is proposed in order to find a trade-off between reduction of computation load on the sensors and increasing accuracy. In our method, lightweight computations are separated from heavyweight computations. While, the former computations are carried out by sensors, the latter are carried out by base station. Following activities are done by the authors: 1) cluster head selection by using effective environmental parameters and defining cost function of cluster membership, 2) mathematical modeling of a region’s chance to achieve mobile sink, and 3) designing a fitness function to evaluate the fitness of each allocation of mobile sinks to the critical regions in genetic algorithm. Furthermore, in our activities minimizing the number and length of messages are focused. In summary, the main distinguishing feature of the proposed method is that it can be implemented in real WSN (due to separation of lightweight computations from heavyweight computations) with respect to early mentioned objectives. The simulation results show the better performance of the proposed method compared to comparison bases. Manuscript profile
      • Open Access Article

        59 - Energy-Aware Data Gathering in Rechargeable Wireless Sensor Networks Using Particle Swarm Optimization Algorithm
        Vahideh Farahani Leili Farzinvash Mina Zolfy Lighvan Rahim Abri Lighvan
        This paper investigates the problem of data gathering in rechargeable Wireless Sensor Networks (WSNs). The low energy harvesting rate of rechargeable nodes necessitates effective energy management in these networks. The existing schemes did not comprehensively examine t More
        This paper investigates the problem of data gathering in rechargeable Wireless Sensor Networks (WSNs). The low energy harvesting rate of rechargeable nodes necessitates effective energy management in these networks. The existing schemes did not comprehensively examine the important aspects of energy-aware data gathering including sleep scheduling, and energy-aware clustering and routing. Additionally, most of them proposed greedy algorithms with poor performance. As a result, nodes run out of energy intermittently and temporary disconnections occur throughout the network. In this paper, we propose an energy-efficient data gathering algorithm namely Energy-aware Data Gathering in Rechargeable wireless sensor networks (EDGR). The proposed algorithm divides the original problem into three phases namely sleep scheduling, clustering, and routing, and solves them successively using particle swarm optimization algorithm. As derived from the simulation results, the EDGR algorithm improves the average and standard deviation of the energy stored in the nodes by 17% and 5.6 times, respectively, compared to the previous methods. Also, the packet loss ratio and energy consumption for delivering data to the sink of this scheme is very small and almost zero Manuscript profile
      • Open Access Article

        60 - Design, manufacture and evaluation of capacitive sensors to measure soil moisture
        elham movahed
        Precision agriculture is a new notion in modern agriculture. One of the reasons of the precision agriculture's growth among scientists and farmers, is the technological advancement in different fields including the geographic path system(GPS), sensors, aerial photos or More
        Precision agriculture is a new notion in modern agriculture. One of the reasons of the precision agriculture's growth among scientists and farmers, is the technological advancement in different fields including the geographic path system(GPS), sensors, aerial photos or satellite ( or RS ) and geographic information management facilities . Existence of parametric detection problems in the field of laboratory operations in the agricultural sector, particularly the detection of soil moisture persuade the specialists that always try to reach a suitable solution for soil moisture measurement needed for the plants and interested areas. So in this investigation it is tried to enable the detection of soil moisture by designing and making a hygrometer sensor which has been used of capacitive property in it. This capacitive sensor consists of two insulated aluminum plates that changes by changing the soil moisture, index of dielectric capacitor and its capacitance and frequency of the output circuit . From the characteristics of the device it can be detected to simultaneously moisture detection at several points of the field and also usage in control of the watering amount required by the plants. This machine in vitro was tested in 80 areas and for more exact tests by other different sensors. The mean error percentage received by the capacitive sensor is 0.60%. Manuscript profile
      • Open Access Article

        61 - Attenuating the Effect of Sensory Modality on Time Perception
        MohammadAli Nazari hassan sabourimoghaddam Reza khosrowabadi Hossein Sepasi Moghaddam Seyed Shahriar  Arab
        In psychophysics domain, various factors have been studied as the main account of the time contraction after stimulus repetition and the time expansion after a novel stimulus; however, there is no clear explanation about the amount of involvement of temporal and non-tem More
        In psychophysics domain, various factors have been studied as the main account of the time contraction after stimulus repetition and the time expansion after a novel stimulus; however, there is no clear explanation about the amount of involvement of temporal and non-temporal features. In this study, 48 sub-jects participated in 3 experiments in which the purer role of temporal properties of stimului were examined. Data were provided by a tem-poral oddball paradigm and the analysis was implemented by repeated measures analysis of variance in experiments 1 and 3. In experiment 2, a psychometric function was used to deter-mine the modified estimations in temporal pro-cessing system. Findings showed that despite removing the non-temporal change in expe-riment 1, the temporal change between repea-ted/non-repeated stimuli can produce time con-traction and dilation respectively. The result was only for the auditory system. In experi-ment 2, an efficient threshold for temporal oddball was suggested. Using the updated threshold, experiment 3 revealed concordant repeated/non-repeated effects on time percep-tion in both modalities. Manuscript profile
      • Open Access Article

        62 - Joint Cooperative Spectrum Sensing and Resource Allocation in Dynamic Wireless Energy Harvesting Enabled Cognitive Sensor Networks
        maryam Najimi
        Due to the limitations of the natural frequency spectrum, dynamic frequency allocation is required for wireless networks. Spectrum sensing of a radio channel is a technique to identify the spectrum holes. In this paper, we investigate a dynamic cognitive sensor networ More
        Due to the limitations of the natural frequency spectrum, dynamic frequency allocation is required for wireless networks. Spectrum sensing of a radio channel is a technique to identify the spectrum holes. In this paper, we investigate a dynamic cognitive sensor network, in which the cognitive sensor transmitter has the capability of the energy harvesting. In the first slot, the cognitive sensor transmitter participates in spectrum sensing and in the existence of the primary user, it harvests the energy from the primary signal, otherwise the sensor transmitter sends its signal to the corresponding receiver while in the second slot, using the decode-and-forward (DF) protocol, a part of the bandwidth is used to forward the signal of the primary user and the remained bandwidth is used for transmission of the cognitive sensor. Therefore, our purposed algorithm is to maximize the cognitive network transmission rate by selection of the suitable cognitive sensor transmitters subject to the rate of the primary transmission and energy consumption of the cognitive sensors according to the mobility model of the cognitive sensors in the dynamic network. Simulation results illustrate the effectiveness of the proposed algorithm in performance improvement of the network as well as reducing the energy consumption. Manuscript profile
      • Open Access Article

        63 - Distributed Target Tracking by Solving Average Consensus Problem on Sensor Network Measurements
        Iman  Maghsudlu Meysam r. Danaee Hamid  Arezumand
        In this paper, a new algorithm is presented to drastically reduce communication overhead in distributed (decentralized) single target tracking in a wireless sensor network. This algorithm is based on a new approach to solving the average consensus problem and the use of More
        In this paper, a new algorithm is presented to drastically reduce communication overhead in distributed (decentralized) single target tracking in a wireless sensor network. This algorithm is based on a new approach to solving the average consensus problem and the use of distributed particle filters. For the algorithm of this paper, unlike the common algorithms that solve an average consensus problem just to approximate the global likelihood function to calculate the particle importance weights in distributed tracking, a new model for observation is presented based on the Gaussian approximation, which only solves the problem Consensus is applied to the mean on the received observations of the nodes in the network (and not to approximate the global likelihood function). These innovations significantly reduce the exchange of information between network nodes and as a result uses much less energy resources. In different scenarios, the efficiency of the proposed algorithm has been compared with the centralized algorithm and the distributed algorithm based on the graph, and the simulation results show that the communication overhead of the network is greatly reduced in exchange for an acceptable drop in tracking accuracy by using our proposed algorithm. Manuscript profile
      • Open Access Article

        64 - A Study of the Quality of Abstraction of Philosophical Concepts Based on the Principles of the Transcendent Philosophy
        Mojtaba Rahmanian Koushkaki Mohsen Heidari Seyyed Mohammad  Musawy
        The common view is that philosophical concepts, such as existence, unity, causality, and necessity, have no objective existence and, even if they have, Man is not capable of perceiving them. This is because Man’s encounter with the world of sensibles is through the sens More
        The common view is that philosophical concepts, such as existence, unity, causality, and necessity, have no objective existence and, even if they have, Man is not capable of perceiving them. This is because Man’s encounter with the world of sensibles is through the senses, which can only perceive sensible qualities of objects and are not even capable of perceiving all accidents. Based on these two points, the abstraction of philosophical concepts from external sensible realities seems to be totally impossible. Following a descriptive-analytic method and based on some of the principles of the Transcendent Philosophy, including the subsistence and affirmation of philosophical concepts in the outside and the quality of the existence of the soul and the quality of perceiving it, this study is intended to demonstrate that philosophical concepts are attained directly and without any intermediary from the heart of sensory perceptions. Although this theory does not exist in Mullā Ṣadrā’s works, his philosophical principles fittingly provide the context for such an explanation. Manuscript profile
      • Open Access Article

        65 - A Comparison of the Immateriality of Sensory and Imaginal Perceptions with the Growing Block View of Time
        Mahdi Assadi
        One of the important problems that has remained untouched in Sadrian philosophy is the growing block view of time. On the basis of the growing view of time is the non-existence of future, while the past and present have their fixed places. Muslim philosophers have not d More
        One of the important problems that has remained untouched in Sadrian philosophy is the growing block view of time. On the basis of the growing view of time is the non-existence of future, while the past and present have their fixed places. Muslim philosophers have not directly addressed this idea; however, it seems to be necessary for demonstrating some statements of Sadrian philosophers about the immateriality of sensory and imaginal perceptions and memory. When we perceive something using our senses or imagination, the perception remains in our mind exactly in the same way that it had appeared. This paper is intended to illustrate that this view is, in fact, unrelated to immateriality and, in case of admissibility of its arguments, can only prove the growing block view of time. In line with this approach, the author has critically examined the literature on this theory in pre-Sadrian philosophers, particularly Suhrawardī’s claim as to attributing the idea of the growing block to some thinkers. Suhrawardī maintains that, as each of the motions has come into existence, so the whole of the motions have come into existence, and they are together in existence. Manuscript profile
      • Open Access Article

        66 - Two Fuzzy Virtual Force Algorithms to Improve Sensor Deployment in Wireless Sensor Networks
        Vahid Kiani
        Maximizing area coverage is an important issue in the placement of wireless network sensors, the realization of which helps to improve the network monitoring power. In many applications, the sensors are first randomly distributed in the sensing filed and then their plac More
        Maximizing area coverage is an important issue in the placement of wireless network sensors, the realization of which helps to improve the network monitoring power. In many applications, the sensors are first randomly distributed in the sensing filed and then their placement is modified. The virtual force algorithm (VFA) tries to achieve a more desirable deployment from an initial sensing deployment by considering repulsive and attractive forces between the sensors. In this paper, the combination of Takashi-Sugeno fuzzy system with VFA is used to achieve a better redeployment of the sensors. To adaptively adjust optimal distance value of the sensors, two fuzzy methods are proposed in this paper and their role in improving performance of the virtual force algorithm is analyzed. Comparison of the performance of the proposed methods with the state-of-the-art reveals that intelligent and adaptive adjustment of the optimal distance using a fuzzy system leads to higher final coverage ratio over traditional virtual force algorithm (VFA), improved virtual force algorithm (IVFA), fuzzy redeployment algorithm (FRED), and two metaheuristics GA, and PSO. On the other hand, the proposed VF-based methods require much less time to solve the problem than GA and PSO metaheuristic methods. Manuscript profile
      • Open Access Article

        67 - Death in the View of Abul-ḥassan ‘Āmirī (with a Focus on its Historical Place)
        Einullah  Khademi
        Death as one of the most definite and certain events in human life has always attracted the attention of numerous thinkers. Modern philosophers have shown special attention to it particularly in their discussion of the meaning of life. Abul-ḥassan al-‘Āmirī is one of th More
        Death as one of the most definite and certain events in human life has always attracted the attention of numerous thinkers. Modern philosophers have shown special attention to it particularly in their discussion of the meaning of life. Abul-ḥassan al-‘Āmirī is one of the thinkers in the Islamic tradition whose view of death is of great historical significance. ‘Āmirī mainly pays attention to death while focusing on sensory soul and defines death as the annihilation and separation of sensory soul from the body. He considers sensory soul as the link between the soul (as an immaterial thing) and body (as a material thing) that is annihilated along with the body at the time of death. However, the rational soul is not destroyed. It can be said that ‘Āmirī had a medical approach to the problem of death and was influenced by religious texts at the same time. From the philosophical and religious aspect, ‘Āmirī rejected the M‘utazilites’ view of death and used the term nuz’ (dying) in order to provide a more profound concept and understanding of death. He also presents some arguments for the immortality of the soul and, at the same time, benefits from the concept of “vision” and its different types for a better perception of death. He believes that fear of death is one of the obstacles to a deep understanding of death and maintains that the attention to the necessary joys of life and luminous world and a change of view of death are critical for a more accurate encounter with this issue. One of the weak points of ‘Āmirī’s discussion of death could be lack of a focus on different types of death, particularly voluntary death. Manuscript profile
      • Open Access Article

        68 - Stabilizing and Synchronizing the Islanded Microgrid with the Presence of Sensor and Actuator Fault and Cyber-Attack with Secondary Controller Design
        Abdollah Mirzabeigi Ali Kazemy Mehdi Ramezani Seyed Mohammad  Azimi
        In many microgrid control methods, the output information of sensors and actuators of neighbouring distributed generators (DGs) is used to stabilize and synchronize voltage and frequency. Many problems such as disturbances, uncertainty, unmodeled dynamics, cyber-attacks More
        In many microgrid control methods, the output information of sensors and actuators of neighbouring distributed generators (DGs) is used to stabilize and synchronize voltage and frequency. Many problems such as disturbances, uncertainty, unmodeled dynamics, cyber-attacks, noise, time delay, and measurement errors cause invalid data problems and errors in the system. Better microgrid control depends on the quality of data measured or sent from the output of sensors and actuators. In this paper, according to the advantages of the Cooperative distributed hierarchical control, it is used for control and synchronization in the islanded microgrid with the presence of sensor and actuator error. To synchronize DGs with multi-agent systems and communication channels, it is modeled with graph theory. To stabilize and synchronize, sensor and actuator error in the DG model is mathematically formulated. In the proof of stability and synchronization, the appropriate Lyapunov candidate is presented and the conditions of stability and synchronization are proved. Finally, to show the effectiveness of the designed controller in solving communication channel problems and verifying the presented theory, a case study is simulated in the MATLAB/Simulink software environment with the presence of error and cyber-attack of sensors and actuators. Manuscript profile
      • Open Access Article

        69 - Presenting a model of structural equations, The effect of brand sensory experience on brand equity with emphasis on the mediating role of customer cognitive, emotional and behavioral attachment in cosmetic products
        Abolghasem  Gholamreza Tehrani Houshang  Asadollah Serajoddin  Mohebbi Shahriar  Azizi
        The purpose of this study is to provide a model of structural equations for the effect of brand sensory experience on brand equity with emphasis on the mediating role of customer cognitive, emotional and behavioral attachment in the cosmetics market. In the present stud More
        The purpose of this study is to provide a model of structural equations for the effect of brand sensory experience on brand equity with emphasis on the mediating role of customer cognitive, emotional and behavioral attachment in the cosmetics market. In the present study, a descriptive-survey method has been used. The statistical population of the study was the customers of cosmetic products in Greater Tehran who were selected by random cluster sampling. Based on Cochran's formula, 384 cosmetics customers in Tehran were selected as the statistical sample of the study. In the present study, the Hipula et al. (2017) questionnaire was used. Findings showed that brand sensory experience has a positive and significant effect on brand equity by emphasizing the mediating role of cognitive, emotional and behavioral attachment of the customer in the cosmetics market. The results showed that the proposed model has a good fit with the data of this study and can explain 50% of the variance of cognitive attachment, 40% of emotional attachment, 36% of behavioral attachment and 62% of the variance of brand equity. Manuscript profile
      • Open Access Article

        70 - A Comparative Study of the Cognitive Profile of Students with Neurodevelopmental Disorders: Comparison of Sensory Processing, Working Memory, Emotional Regulation and Cognitive Flexibility
        Seyed Hamed Hosseinpour khaghani gholamreza Chalabianloo Hasan Bafandeh Gharamaleki
        <p>The present study was conducted with the aim of comparing the performance of cognitive profile functions in children with attention Deficit/hyperactivity disorder and special learning disorder. The statistical population of this descriptive and comparative causal res More
        <p>The present study was conducted with the aim of comparing the performance of cognitive profile functions in children with attention Deficit/hyperactivity disorder and special learning disorder. The statistical population of this descriptive and comparative causal research is all male students (ages 8-12 years old) who were studying in Tabriz city (1399-1400) and by using the purposeful sampling method, 30 students for Each group was selected. The research tools were cognitive flexibility (CFI), sensory processing (SPM), child and adolescent emotional regulation (ERQ-CA) and working memory questionnaires by Daneman and Carpenter. In order to analyze the data, descriptive indices and multivariate analysis of variance (MANOVA) were used. The results showed that there is a significant difference between the performance of the studied groups and their subscales (F=263.946, P&lt;0.001). Although children with hyperactivity showed a weaker performance in the general scales of cognitive flexibility, sensory processing and emotional regulation of re-evaluation, on the other hand, children with learning disorders also showed an obvious weakness in the general variable of working memory and They showed suppressed emotional regulation. These results have provided important implications in the field of effective therapeutic interventions and correct selection of training and rehabilitation programs to improve executive functions.</p> Manuscript profile
      • Open Access Article

        71 - Detection of Quantized Sparse Signals Using Locally Most Power Full Detector in Wireless Sensor NetworkS
        Abdolreza Mohammadi Amin Jajarmi
        This paper addresses the problem of distributed detection of stochastic sparse signals in a wireless sensor network. Observations/local likelihood ratios in each sensor node are quantized into 1-bit and sent to a fusion center (FC) through non-ideal channels. At the FC, More
        This paper addresses the problem of distributed detection of stochastic sparse signals in a wireless sensor network. Observations/local likelihood ratios in each sensor node are quantized into 1-bit and sent to a fusion center (FC) through non-ideal channels. At the FC, we propose two sub-optimal detectors after that the data are fused based on the locally most powerful test (LMPT). We obtain the quantization threshold for each sensor node via an asymptotic analysis of the performance of the detector. It is realized that the quantization threshold depends on the bit error probability of the channels between the sensor nodes and the FC. Simulation results are carried out to confirm our theoretical analysis and to depict the performance of the proposed detectors. Manuscript profile
      • Open Access Article

        72 - Temperature Sensor Based on Terahertz Plasmonic Slot Waveguide Coupled with a Resonator
        Alireza Dolatabady
        In this paper, the performance of a temperature sensor based on plasmonic structure including a slot waveguide coupled with a stub resonator has been investigated. The results have been attained based on the dependency of dispersion equation, and so, the resonance frequ More
        In this paper, the performance of a temperature sensor based on plasmonic structure including a slot waveguide coupled with a stub resonator has been investigated. The results have been attained based on the dependency of dispersion equation, and so, the resonance frequency of the stub, to electric permittivity of the constructing material of the structure, InSb, which is also dependent to the ambient temperature. The design of the structure has been carried out for frequencies in terahertz spectra. The simulation results confirm an approximate linear relation between the resonance frequencies and ambient temperature, between 260-350 Kelvin. Also, a criterion has been assigned for evaluation the sensitivity and the performance temperature span of the proposed sensor. The calculated sensitivity is about 1×10-10 Kelvin per Hertz in the mentioned temperature interval. The sensor measurement resolution depends on the frequency resolution of the detection system. This simple sensor can be utilized in various chemical and bio systems. Manuscript profile
      • Open Access Article

        73 - Developing a causal model of adolescent vulnerability to addiction based on the sensitivity of sensory processing and behavioral brain systems with the mediation of childhood trauma
        safura  keyvanlo Akbar  Atadokht
        Adolescents are heavily influenced by social and cultural changes that are exposed to harmful environmental stimuli such as addictive; Therefore, the present study was conducted with the aim of investigating the causal model of adolescent vulnerability to addiction base More
        Adolescents are heavily influenced by social and cultural changes that are exposed to harmful environmental stimuli such as addictive; Therefore, the present study was conducted with the aim of investigating the causal model of adolescent vulnerability to addiction based on the sensitivity of sensory processing and brain-behavioral systems with the mediation of childhood trauma in the city of Mashhad. The present study was a descriptive correlation in terms of its practical purpose and the method of data collection. The statistical population of the research was all secondary school students of the second year of Mashhad in the academic year of 1402-1401. 228 students were selected by cluster sampling method. In order to collect data, Enisi's questionnaires for identifying people at risk of addiction, Aron's and Aron's sensory processing sensitivity, Carver's and White's brain-behavioral systems, and Bernstein et al.'s trauma questionnaire were used. The collected data were analyzed using structural equation modeling method and SPSS27 and Lisrel8.8 software. The results of the research showed that the sensitivity variables of sensory processing and behavioral brain systems have a direct and significant effect on vulnerability to addiction. The results related to the fit indices of the model also showed that childhood trauma can mediate the sensitivity of sensory processing and behavioral brain systems with vulnerability to addiction. Manuscript profile
      • Open Access Article

        74 - Design of Distributed Consensus Controller for Leader-Follower Singular Multi-Agent Systems in the Presence of Sensor Fault
        Saeid Poormirzaee Hamidreza Ahmadzadeh masoud Shafiee
        In this paper, the problem of sensor fault estimation and designing of a distributed fault-tolerant controller is investigated to guarantee the leader-follower consensus for homogeneous singular multi-agent systems for the first time. First, a novel augmented model for More
        In this paper, the problem of sensor fault estimation and designing of a distributed fault-tolerant controller is investigated to guarantee the leader-follower consensus for homogeneous singular multi-agent systems for the first time. First, a novel augmented model for the system is proposed. It is shown that the proposed model is regular and impulse-free unlike some similar research works. Based on this model, the state and sensor fault of the system are simultaneously estimated by designing a distributed singular observer. The proposed observer also has the ability to estimate time-varying sensor fault. Then, a distributed controller is designed to guarantee the leader-follower consensus using estimation of state and sensor fault. The sufficeient conditions to ensure the stability of the observer dynamic and consensus dynamic are drived in terms of linear matrix inequalities (LMIs). The gains of observer and controller are computed by solving these conditions with MATLAB software. Finally, the validation and efficiency of the proposed control system for the leader-follower consensus of singular multi-agent systems exposed to sensor faults is illustrated by computer simulations. The simulation results show that the propsed control strategy deeling to the sensor falut in the singular multi-agent systems is effective. Manuscript profile
      • Open Access Article

        75 - Improving energy consumption in the Internet of Things using the Krill Herd optimization algorithm and mobile sink
        Shayesteh Tabatabaei
        Internet of Things (IoT) technology involves a large number of sensor nodes that generate large amounts of data. Optimal energy consumption of sensor nodes is a major challenge in this type of network. Clustering sensor nodes into separate categories and exchanging info More
        Internet of Things (IoT) technology involves a large number of sensor nodes that generate large amounts of data. Optimal energy consumption of sensor nodes is a major challenge in this type of network. Clustering sensor nodes into separate categories and exchanging information through headers is one way to improve energy consumption. This paper introduces a new clustering-based routing protocol called KHCMSBA. The proposed protocol biologically uses fast and efficient search features inspired by the Krill Herd optimization algorithm based on krill feeding behavior to cluster the sensor nodes. The proposed protocol also uses a mobile well to prevent the hot spot problem. The clustering process at the base station is performed by a centralized control algorithm that is aware of the energy levels and position of the sensor nodes. Unlike protocols in other research, KHCMSBA considers a realistic energy model in the grid that is tested in the Opnet simulator and the results are compared with AFSRP (Artifical Fish Swarm Routing ProtocolThe simulation results show better performance of the proposed method in terms of energy consumption by 12.71%, throughput rate by 14.22%, end-to-end delay by 76.07%, signal-to-noise ratio by 82.82%. 46% compared to the AFSRP protocol Manuscript profile
      • Open Access Article

        76 - The effectiveness of sensory-motor integration exercises on balance performance in children with autism spectrum disorder
        Sajjad Alizadeh Asli Abbas Ali Hossein Khanzadeh Mahnaz Khosrowjavid Seyyed Zahra Sidnoori
        <p>Autism spectrum disorder is a neurodevelopmental disorder that causes failure in communication, social interaction and stereotyped behaviors. The present study was conducted with the aim of investigating the effectiveness of sensory-motor integration exercises on bal More
        <p>Autism spectrum disorder is a neurodevelopmental disorder that causes failure in communication, social interaction and stereotyped behaviors. The present study was conducted with the aim of investigating the effectiveness of sensory-motor integration exercises on balance performance in children with autism spectrum disorder. The quasi-experimental research design was pre-test and post-test with a control group. The statistical population of the research was all the students of Rasht who were studying in the academic year of 1402-1403. The sample consisted of 30 children (boys and girls) who were selected by the available sampling method and based on the entry and exit criteria of the study and randomly assigned to two groups of 15 people. The children of the experimental group were subjected to an intervention with a package of sensory-motor integration exercises for 12 sessions of 45 minutes, while the control group did not receive any intervention. Data were analyzed by multivariate and univariate covariance analysis methods in SPSS 25 software. The research findings showed that sensory-motor integration exercises improve balance performance in children with autism spectrum disorder (P&lt;0.001). In general, it can be said that the desired intervention has improved the child's deficiency in balance performance by affecting the improvement of sensory coherence and eliminating the problems related to less or more sensitivity than the sensory limit; Therefore, it is suggested to use the intervention program used in this research to improve the balance performance of children with autism spectrum disorder.</p> Manuscript profile