Skip to main content

previous disabled Page of 2
and
  1. No Access

    Article

    Stochastic model-driven capacity planning framework for multi-access edge computing

    Multi-access edge computing (MEC) offers cloud computing capabilities and IT services situated at the Radio Access Network (RAN) in the mobile users’ proximity. Applications could offload their computation-int...

    Reza Shojaee, Nasser Yazdani in Computing (2022)

  2. No Access

    Article

    Effects benefits and hazards of honey bee venom on wound healing and serum biochemical changes in alloxan-induced diabetic rats

    Honey bee (Apis mellifera) venom (BV) contains many enzymes and peptides used to treat various diseases, including cancer, neurodegenerative diseases, and chronic or autoimmune diseases. However, its adverse effe...

    Abdolrasoul Namjou, Nasser Yazdani in Comparative Clinical Pathology (2022)

  3. No Access

    Chapter and Conference Paper

    Modeling and Performance Evaluation of Map Layer Loading in Mobile Edge Computing Paradigm

    Mobile Edge Computing (MEC) is a promising technology to prepare cloud services in the vicinity of mobile radio network. Mobile users could offload their tasks to the MEC servers to acquire results in minimum ...

    Reza Shojaee, Nasser Yazdani in High-Performance Computing and Big Data Analysis (2019)

  4. No Access

    Article

    Analytical performance models for resource allocation schemes of cloudlet in mobile cloud computing

    In the cloudlet architecture of mobile cloud computing (MCC), the mobile users offload their resource-intensive tasks to a local cloud (i.e., Cloudlet) via WiFi connections, to overcome the resource-constrained n...

    Hassan Raei, Nasser Yazdani in The Journal of Supercomputing (2017)

  5. No Access

    Article

    Analytical performance model for mobile network operator cloud

    The characteristics of mobile cloud computing (MCC) including, mobility, the instability of 3G/WiFi connections, and the complexity of virtualization, make the prediction of performance challenging. To deal wi...

    Hassan Raei, Nasser Yazdani in The Journal of Supercomputing (2015)

  6. No Access

    Article

    Strategic Network Formation Game for Energy Consumption Balancing

    Creation of hot-spots is unavoidable, in multihop wireless sensor networks using the least power (or shortest path) routing method. This happens due to the irregularity of underlying network structures. Since ...

    Hamed Khanmirza, Nasser Yazdani in Wireless Personal Communications (2015)

  7. No Access

    Article

    Delay-Constrained Optimized Packet Aggregation in High-Speed Wireless Networks

    High-speed wireless networks such as IEEE 802.11n have been introduced based on IEEE 802.11 to meet the growing demand for high-throughput and multimedia applications. It is known that the medium access contro...

    Peyman Teymoori, Nasser Yazdani in Journal of Computer Science and Technology (2013)

  8. No Access

    Article

    Neighbor Selection Game in Wireless Ad Hoc Networks

    In wireless ad hoc networks, there is no infrastructure to enforce cooperation between nodes. As a result, nodes may act selfishly when running network protocols to conserve their energy resources as much as p...

    Sajjad Zarifzadeh, Nasser Yazdani in Wireless Personal Communications (2013)

  9. No Access

    Chapter and Conference Paper

    A Novel Community Detection Algorithm for Privacy Preservation in Social Networks

    Developed online social networks are recently being grown and popularized tremendously, influencing some life aspects of human. Therefore, privacy preservation is considered as an essential and crucial issue i...

    Fatemeh Amiri, Nasser Yazdani, Heshaam Faili, Alireza Rezvanian in Intelligent Informatics (2013)

  10. No Access

    Chapter and Conference Paper

    Delay-Constrained Optimized Packet Aggregation in High-Speed Wireless Ad Hoc Networks

    In recent years, high-speed WLANs are introduced to service growing demand of delay-sensitive and multimedia applications. To improve efficiency at the MAC layer of high-speed WLANs, few researches have tried ...

    Peyman Teymoori, Nasser Yazdani, Ali Sehati in Wireless Communications and Applications (2012)

  11. No Access

    Chapter and Conference Paper

    Network Layer Challenges of IEEE 802.11n Wireless Ad Hoc Networks

    Recent demands toward high-speed wireless networks are growing. IEEE 802.11n, as the latest standard toward achieving higher speeds, aims to enhance IEEE 802.11 for higher throughputs. There are few works whic...

    Mehdi EffatParvar, Nasser Yazdani in Wireless Communications and Applications (2012)

  12. No Access

    Chapter and Conference Paper

    A Risk-Reward Competitive Analysis for Online Routing Algorithms in Delay Tolerant Networks

    Delay Tolerant Networks (DTNs) suffer from frequent disruptions and partitioning. Because of dynamic environment and lack of knowledge about the whole network topology, routing is quiet challenging in DTNs. Pr...

    Maziar Mirzazad Barijough, Nasser Yazdani in Internet of Things, Smart Spaces, and Next… (2012)

  13. No Access

    Chapter and Conference Paper

    Map-Based Compressive Sensing Model for Wireless Sensor Network Architecture, A Starting Point

    Sub-Nyquist sampling techniques for Wireless Sensor Networks (WSN) are gaining increasing attention as an alternative method to capture natural events with desired quality while minimizing the number of active...

    Mohammadreza Mahmudimanesh in Mobile Wireless Middleware, Operating Syst… (2009)

  14. No Access

    Chapter and Conference Paper

    Ontology Matching Using Vector Space

    Interoperability of heterogeneous systems on the Web will be achieved through an agreement between the underlying ontologies. Ontology matching is an operation that takes two ontologies and determines their se...

    Zahra Eidoon, Nasser Yazdani, Farhad Oroumchian in Advances in Information Retrieval (2008)

  15. No Access

    Article

    Effect of the contention window size on performance and fairness of the IEEE 802.11 standard

    IEEE 802.11 is a widely used standard for MAC and PHY layers of WLANs. Unfortunately, the access methods offered in this standard cannot support QoS (Quality of Service) for real-time traffics. Using multimedi...

    Azade Khalaj, Nasser Yazdani, Maseud Rahgozar in Wireless Personal Communications (2007)

  16. No Access

    Chapter

    Critical Transmission Range for Connectivity in Ad-Hoc Networks

    One of the challenging problems in the ad hoc networks is how to determine the critical transmission range for each communicating node to achieve a connected network with minimum power consumption and communic...

    Hossein Ajorloo, S. Hashem Maddah Hosseini in New Technologies, Mobility and Security (2007)

  17. No Access

    Chapter and Conference Paper

    Accelerating Computation Bounded IP Lookup Methods by Adding Simple Instructions

    Most of software-based IP lookup methods are memory bounded so their speed depends on memory technology. However, some of them are computation bounded, meaning that their memory time is less than computation. ...

    Hossein Mohammadi, Nasser Yazdani in Universal Multiservice Networks (2004)

  18. No Access

    Chapter and Conference Paper

    Improving Data Distribution in Branching Point Based Multicast Protocols

    In several multicast routing protocols, the multicast distribution tree is identified by its branching points where multicast data is delivered from one branching point to another using native unicast. As a re...

    Mozafar Bag-Mohammadi in Information Networking. Networking Technol… (2004)

  19. Chapter and Conference Paper

    Linkcast: Fast and Scalable Multicast Routing Protocol

    The current multicast routing protocols require state maintenance in the on-tree routers in order to forward multicast packet properly. Therefore, the routers memory may be easily saturated when there are very...

    Mozafar Bag-Mohammadi, Siavash Samadian-Barzoki, Nasser Yazdani in Networking 2004 (2004)

  20. No Access

    Chapter and Conference Paper

    A Fast Group Communication Mechanism for Large Scale Distributed Objects

    Group communication undoubtedly is a useful paradigm for many distributed object systems. Provision of a fast and scalable group communication mechanism can considerably improve the efficiency of these systems...

    Hojjat Jafarpour, Nasser Yazdani in On The Move to Meaningful Internet Systems… (2003)

previous disabled Page of 2