Algorithm Based on Trap Packet to Detect Black Hole Attack in Ad-Hoc Networks Using Common Methods
Algorithm Based on Trap Packet to Detect Black Hole Attack in Ad-Hoc Networks Using Common Methods

Shahram Mohammadi

Volume 4, Issue 1 , January 2023, , Pages 31-43

https://doi.org/10.48309/jeires.2023.1.4

Abstract
  Mobile ad hoc networks include sets of nodes that can freely communicate with each other without having any network infrastructure and through radio frequencies. These networks' speed ...  Read More
Investigating the Performance of DCS Wide Control Systems
Investigating the Performance of DCS Wide Control Systems

Shahram Mohammadi

Volume 4, Issue 1 , January 2023, , Pages 44-60

https://doi.org/10.48309/jeires.2023.1.5

Abstract
  The implementation of control operations for factory processes required control panels. As a result, it required much labor and did not provide a precise result. The next step in development ...  Read More