Browsing by Author "Hosseinzadeh, M."
Now showing 1 - 3 of 3
- Results Per Page
- Sort Options
Article Citation - Scopus: 13The Applications of the Routing Protocol for Low-Power and Lossy Networks (rpl) on the Internet of Mobile Things(John Wiley and Sons Ltd, 2022) Ghanbari, Z.; Jafari Navimipour, Nima; Navimipour, N.J.; Hosseinzadeh, M.; Shakeri, H.; Darwesh, A.; Computer EngineeringInternet of Mobile Things (IoMT) have become very popular recently. The routing protocol for low power and lossy networks (RPL) is standardized for static topologies. However, mobility is the nature of IoT. Mobility serves as a promising candidate to harness hand-off time issues, delay in data transmission, overhead, and low packet delivery rate (PDR) effectively. This study presents a comprehensive account of the mobility-aware RPL-based routing protocols to validate and compare the experimental results. Remarkably, classification methods are used in many articles. The aim is to introduce significant research efforts to improve RPL objective functions (OF) performance in hand-off time, PDR, delay, overhead, and so forth. In this regard, a complete analysis of the existing routing protocols in IoMT has been presented to compare the results. The main focus of this study is on approaches that proposed new OFs for supporting mobility in RPL. Two main categories are considered to study RPL-based routing protocol mechanisms: The mobile and static sink. The related studies on the mobile sink are divided into three groups: Single metric-based OF, composite metric OF, and hybrid routing protocols. Also, the related works based on the static sink are categorized into four groups: Fuzzy logic-based OF, trickle timer-based OF, composite metrics-based OF, and modification control messages-based OF approach. This paper presents a detailed comparison of mechanisms in each category. It also highlights the pros, cons, open issues, and evaluated metrics of each paper. Besides, challenges of mobility in the RPL-based routing protocol mechanism in IoMT for future studies. © 2022 John Wiley & Sons Ltd.Article Citation - Scopus: 20An Energy-Aware Scheme for Solving the Routing Problem in the Internet of Things Based on Jaya and Flower Pollination Algorithms(Springer Science and Business Media Deutschland GmbH, 2023) Sadrishojaei, M.; Jafari Navimipour, Nima; Navimipour, N.J.; Reshadi, M.; Hosseinzadeh, M.; Computer EngineeringClustering and routing protocols for Internet of Things (IoT) need to consider energy usage and how to reduce it. Unbalanced power usage is a common concern with current solutions to cluster-based routing problems in the IoT ecosystem. This research developed a swarm intelligence-based clustering technique to achieve a more uniform dispersion of cluster heads. The data packets across cluster heads and the sink are routed via a Jaya algorithm. Based on average remaining energy, number of active nodes, number of nodes that have failed or have been removed from the network, and overall network throughput, this combined clustering and routing method's quality has been assessed. The integrative clustering and routing protocol based on the flower pollination algorithm and Jaya algorithm described here exhibit considerable improvements over the current state-of-the-art. The network throughput and the number of the alive node are essential statistics for evaluating IoT in which battery-powered devices periodically acquire surroundings data and transmit gathered samples to a base station. The proposed strategy improved network throughput and the number of dead nodes by at least 14% and 18%, respectively. © 2023, The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature.Article Citation - WoS: 0Citation - Scopus: 0A New Nano-Scale Authentication Architecture for Improving the Security of Human-Computer Interaction Systems Based on Quantum Computing(Springer, 2025) Ahmadpour, S.-S.; Jafari Navimipour, Nima; Zohaib, M.; Navimipour, N.J.; Misra, N.K.; Rasmi, H.; Salahov, H.; Hosseinzadeh, M.; Computer EngineeringHuman-Computer Interaction (HCI) is an interdisciplinary area of study focusing on the interaction of users and computers by scheming interactive computer interfaces. In addition, HCI systems need security to confirm user authentication, which is a crucial issue in these systems. Hence, user authentication is vital, allowing only authorized users to access data. Authentication is critical to the digital world since it provides security and safety for digital data. Moreover, a digital signature is an authentication method to confirm the accuracy and reliability of digital documents or communications. In addition, designing the circuit based on the complementary metal-oxide semiconductor (CMOS) technology can affect the security and safety of digital data due to the excessive heat dissipation of circuits. On the other hand, quantum-dot cellular automata (QCA) and reversible logic as alternative technologies to CMOS address these problems. Since QCA and reversible logic circuits have minimal energy dissipation, which is considered nearly zero, approaching these technologies proves extremely difficult for any hacker. This work presents an effective structure for the authenticator and human-computer interaction using QCA and IBM quantum computing with Qiskit simulations. The proposed structure has outperformed current circuits in terms of area, cell count, and latency. The paper demonstrates the QCA reversible logic layout of the proposed HCI authenticator and integrates IBM quantum computing simulations using Qiskit for validation. The implementation and testing of results are performed utilizing QCADesigner-2.0.3 and Qiskit simulation tools. The accuracy and efficiency of the proposed design are validated through simulation-derived comparison values, and energy dissipation simulations prove that the suggested circuit dissipates minimal energy. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.