Saadan Zokaei

Saadan Zokaei
  • K.N.Toosi University of Technology

About

23
Publications
4,814
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
124
Citations
Introduction
Current institution
K.N.Toosi University of Technology

Publications

Publications (23)
Article
Full-text available
In order to enhance the reliability of the power transmission grid, planning and employing regional protection along with traditional local protection is necessary. Both regional and wide area protection is contingent upon communication and data networking infrastructure and hence prone to cyber-attacks. Moreover, since this kind of protection main...
Conference Paper
In the Internet of Things (IoT), collecting and transferring data of edge devices is very important. IoT Devices are often heterogamous and resource constrained. Therefore, in multi-hop communications at the edge of the network, a reliable routing protocol is required. Routing Protocol for Low Power and Lossy Networks (RPL) was designed by IETF-ROL...
Article
Full-text available
IEEE 802.11 based wireless ad hoc networks are highly appealing owing to their needless of infrastructures, ease and quick deployment and high availability. Vast variety of applications such as voice and video transmission over these types of networks need different network performances. In order to support quality of service for these applications...
Article
Recently, IEEE 802.11 wireless ad-hoc networks become popular due to their flexibility and lack of infrastructure. Also they can easily be set up and almost available anywhere and anytime. Most researches which evaluate performance of these type of networks suppose saturation condition for the sake of analytical simplicity. However, most recent app...
Article
In this paper, a multiband low-noise amplifier (LNA) with capability of band tuning is proposed to support the Mobile WiMAX (IEEE 802.16e) standard associated with a large IIP3 at RF frequencies using multi-gated linearization techniques. Proposed LNA architecture has been optimized in terms of linearity based on a comparative analysis between four...
Article
Flooding and Ad hoc on Demand Distance Vector routing algorithms (AODV) are common algorithms in Mobile Ad hoc Networks (MANETs). Flooding can dramatically affect the performance of MANET, but probabilistic approach to flooding has been proposed recently to solve the flooding storm problem. This problem leads to contention, collision and duplicated...
Article
In this paper, we consider physical-layer network coding (PNC) in a multi-unicast wireless cooperative network with a single relay. We aim to deal with the NC noise, i.e., an additional noise term due to applying NC, with the objective of improving the network data rate. Our approaches are based on relay power-allocation and group-allocation techni...
Article
Physical-layer network coding (PNC) promises a significant gain In overall network throughput for multi-user cooperative communications. In a multi-unicast scenario, one drawback associated with PNC is an additional noise term, coined as network coding (NC) noise, which severely degrades the system data rate. In this paper, our contribution to addr...
Conference Paper
Network coding (NC) is known as a promising approach to improve the cooperative communication network throughput. However, in certain situations, it can introduce additional noise terms which is recently referred to as NC noise. We consider such a problem in a two-unicast wireless system and seek to answer the following question: “Can we reduce or...
Conference Paper
Full-text available
In this paper focusing on multihop decode and forward ad hoc network, a distributed power optimized cooperative algorithm based on greedy geographical routing (POCGR) is proposed. We are concerned about optimizing the transmit power and reducing the total number of hops in a multihop wireless relay network jointly. We propose POCGR routing algorith...
Conference Paper
Power and bandwidth constraints are two major challenges in wireless sensor networks. Since a considerable amount of energy in sensor networks is consumed for data transmission, compression techniques may prolong the life of such networks. Moreover, with fewer bits to transmit, the network can cope better with the problem of inadequate bandwidth. I...
Article
Full-text available
IEEE802.11 access protocol uses CSMA/CA in its Medium Access control layer as the main access function, which carries several deficiencies. In these networks, as the number of active stations increases, delay and throughput degrade severely. As far as throughput and service delay are vital elements in Quality of Service (QoS) determination, such de...
Article
Full-text available
Nowadays, since devices can fi nd more than one access point (AP) in wireless local area networks (WLANs), we are supposed to choose the access point which tends to provide the best performance based on the kind of usage for which it is specifi ed. Currently, in order to select the most appropriate AP, computers use the received signal strength whi...
Article
In this study, a hybrid learning algorithm for training the Dynamic Synapse Neural Network (DSNN) to high accurate prediction of congestion in TCP computer networks is introduced. The idea behind this technique is to inform the TCP transmitters of congestion before it happens and to make transmitters decrease their data sending rate to a level whic...
Conference Paper
Full-text available
High expense of satellite channels along with providing telephony services for rural regions makes us to propose a new medium access control (MAC) protocol for sending signaling of telephony traffic via geo stationary satellite with narrow bandwidth channels. This paper explores an efficient MAC protocol, slot reservation demand assignment multiple...
Conference Paper
Full-text available
In pervasive computing environments, a user can access resources and services from any where and at any time; thus a key security challenge in these environments is the design of an effective access control model which is aware of context modifications. Changes in context may trigger changes in authorizations. In this paper, we propose a new contex...
Article
Full-text available
Energy efficient protocol design is the aim of current researches in the area of sensor networks where limited power resources impose energy conservation considerations. In this paper we care for Medium Access Control (MAC) protocols and after an extensive literature review, two adaptive schemes are discussed. Of them, adaptive-rate MACs which were...
Article
Because of the trend toward high-speed data communication, various protocols have been proposed. the behaviors of those protocols are complex and therefore various studies have been made on the performance evaluations. the authors have been studying the theories and the evaluations of the protocols for the cases where the bit error rate is negligib...
Article
Full-text available
A B S T R A C T Resources and services are accessible in pervasive computing environments from anywhere and at anytime. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynam...
Article
Full-text available
� Abstract—In the context of sensor networks, where every few dB saving counts, the novel node cooperation schemes are reviewed where MIMO techniques play a leading role. These methods could be treated as joint approach for designing physical layer of their communication scenarios. Then we analyzed the BER performance of transmission diversity sche...
Article
a.raeisi@ee.kntu.ac.ir, b.mahboobi@ee.kntu.ac.ir, szokaei@eetd.kntu.ac.ir, mehrdad@kntu.ac.ir Abstract— In this paper we developed a sub-optimal algorithm for joint routing and power allocation for an amplify-and-forward multi-hop relay network. The objective function for the optimization is the received signal-to-noise ratio (SNR) at the destinati...

Network

Cited By