فهرس المقالات علی ارشقی


  • المقاله

    1 - Encryption of Color Images using Pixel Shift Algorithm and Developed Hill Algorithm
    Majlesi Journal of Telecommunication Devices , العدد 44 , السنة 11 , پاییز 2022
    With the advent of communication networks, the speed of data transmission has increased dramatically. One of the important factors in each transfer is to maintain data security and prevent unauthorized access to data transmitted. Using cryptography is one of the methods أکثر
    With the advent of communication networks, the speed of data transmission has increased dramatically. One of the important factors in each transfer is to maintain data security and prevent unauthorized access to data transmitted. Using cryptography is one of the methods used to keep data secure throughout the transmission path. Today, with the growth of computer networks, the use of video conferencing, the transfer of military information, image data, the need for encryption of data in a variety of image data plays an important role. Encryption in images due to its specific features, such as the high volume of transmitted images, the amount of additional data for encryption, the correlation coefficient and the high repetition among the pixels, are very different from the text data; this has led to all traditional encryption methods It is not suitable for image data and there are changes in their structure to use traditional methods in image cryptography. In this paper, using pixel shift algorithms and Hill's encryption algorithm, ciphering of color images has been addressed; the pixel shift algorithm has been used to maintain greater dependency and security, and Hill's encryption algorithm has been used to change the amount of pixels. For analysis of the work, the algorithm is presented and for comparison with other methods, images and standard analysis methods have been used. The obtained results improve the efficiency of the proposed algorithm in comparison with the standard hail algorithm (especially in images with similar pixels) And compared with other comparable algorithms. تفاصيل المقالة

  • المقاله

    2 - On the Applications and Techniques of Vehicular Ad-Hoc Networks
    Majlesi Journal of Telecommunication Devices , العدد 43 , السنة 11 , تابستان 2022
    Vehicular Ad-Hoc Networks (VANET) models are derived from Mobile Ad-Hoc Networks that possess an impressive role in the intelligent transportation system today and also in the future. So scientists are always looking for the best theories in hope of grasping the fastest أکثر
    Vehicular Ad-Hoc Networks (VANET) models are derived from Mobile Ad-Hoc Networks that possess an impressive role in the intelligent transportation system today and also in the future. So scientists are always looking for the best theories in hope of grasping the fastest and safest connections between vehicles, to provide traffic and accident news in real time. The high number of nodes is one of the significant features of this network that results in an increase of the number of transmitted packets in the network. Distributed system and high mobility of the nodes are the other most important attributes of Vehicular Ad-Hoc networks. In this paper, we aim to review the studies and improvements of vehicular Ad-Hoc network in the fields of safety and traffic management. In addition, we introduce the most common challenges of this network and gather latest methods for resolving those problems. Multi agent systems will be one of the newest and suitable tools in this system. The main purpose is arranging safe connection between agents. Fixing agreements and removing the disputes are not detachable from functional system. It is like group associations and societies which require human collaborations and cooperation. Development of science resulted in utilization of these systems in various aspects like VANET. Nowadays scientists and researchers are interested to make use of these methods for improving the role of vehicle networks in the field of traffic management, safety and entertainment, we will review them in the following paragraphs. تفاصيل المقالة

  • المقاله

    3 - An Approach to Integrate Wireless Sensor Networks with Cloud Computing Technology in Medical Context
    Majlesi Journal of Telecommunication Devices , العدد 46 , السنة 12 , بهار 2023
    Recently, with the advent of cloud computing technology and the growth of cell phone applications, the technology has been introduced as a solution for use in smart phones. Combining cloud computing and smart phones copes with such obstacles as performance including bat أکثر
    Recently, with the advent of cloud computing technology and the growth of cell phone applications, the technology has been introduced as a solution for use in smart phones. Combining cloud computing and smart phones copes with such obstacles as performance including battery life time, storage capacity and bandwidth, environment as scalability and availability, and security like reliability and accessibility. Today, patient information collection processes require extensive analysis on the collected input data. In addition, this process has lots of errors, it is affordable and increases the time needed for access to the data. These conditions constrain effective monitoring and diagnostic capabilities by the hospitals. Unlike previous methods, data can be collected by devices such as Bluetooth and stored on a server in hospital. In this paper, a comprehensive research involves collecting data from patients and sending this data to a smart phone. Therefore, two algorithms were proposed for a list of physicians with the highest priority. Priority parameters are received by the hospitals server. These priorities include the initial weight, the weight indicating how busy the physician is, and the relationship between physician and patient's disease. Android application was simulated by Eclipse software. The application includes a diagnostic system that receives patient data and compared it with the reference table. If the patient's condition is not good, a short message is sent using two mentioned algorithms. تفاصيل المقالة