Mohammad Heydari

Learn More
2 ABSTRACT— Considering an under supervised 3D space where a group of mobile devices with limited sensing and communicating capabilities are deployed, this paper aims at proposing a decentralized self-deployment algorithm for agents to get maximum connected coverage topology. The problem is modeled as maximization which is solved completely distributed. In(More)
Given a 3D space where should be supervised and a group of mobile sensor actor nodes with limited sensing and communicating capabilities, this paper aims at proposing a distributed self-deployment algorithm for agents to cover the space as much as possible by considering non-uniform sensing coverage degree constraint of environment while preserving(More)
In this paper, an effective direct method to determine the numerical solution of linear and nonlinear Fredholm and Volterra integral and integro-differential equations is proposed. The method is based on expanding the required approximate solution as the elements of Chebyshev cardinal functions. The operational matrices for the integration and product of(More)
In this paper, an efficient method is presented for solving two dimensional Fred-holm and Volterra integral equations of the second kind. Chebyshev polynomials are applied to approximate a solution for these integral equations. This method transforms the integral equation to algebraic equations with unknown Chebyshev coefficients. The high accuracy of this(More)
The number of smartphones reached 3.4 billion in the third quarter of 2016 [1]. These devices facilitate our daily lives and have become the primary way of accessing the web. Although all desktop browsers filter rogue websites, their mobile counterparts often do not filter them at all, exposing their users to websites serving malware or hosting phishing(More)
In 2012, Wang and Qin proposed an authentication mechanism in order to get access control for mobile pay-TV organization to enhance the Sun and Leu’s technique. Wang and Qin declared that their technique satisfies the security expectations or requirements intended for mobile pay-TV system. However, this work indicates that Wang and Qin’s scheme suffers from(More)