
Ali M SaghiriWilliam Paterson University · Department of Computer Science
Ali M Saghiri
PhD
About
112
Publications
22,416
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,170
Citations
Introduction
Currently, I am working on artificial general intelligence, cognitive systems, Blockchain, and IoT.
Additional affiliations
January 2007 - present
Publications
Publications (112)
Functional cell death pathways are essential for normal ocular vascular development and tissue homeostasis. As our understanding of necrosis-based cell death pathways has expanded, the inclusion of regulated forms, including necroptosis, ferroptosis, and oxytosis, has occurred. Although the existence of these pathways is well described, our underst...
Recent platoon management solutions aim to eliminate the need for a leader in management algorithms. Blockchain-based solutions have been proposed to address these challenges and require customization to be effective. Blockchain technology presents a promising solution by enabling decentralized platoon management. Decentralization concepts are incl...
In an era where software systems undergo rapid evolution, the demand for self-evolving programs has received much attention. This paper introduces a groundbreaking methodology that amalgamates the predictive power of Large Language Model-Based Methods with the self-replicating nature of Quine Programs to organize self-evolving software. This innova...
Discover the Future: Are We on the Brink of Digital Immortality?
This book invites you on an exhilarating journey through the confluence of neuroscience, technology, and philosophy. This groundbreaking book demystifies the ambitious quest to create digital replicas of human brains — a venture that could redefine the essence of life and death.
Unr...
The Proof-of-Work (PoW) consensus protocol is widely utilized in various blockchain implementations, including Bitcoin. The security of this protocol relies heavily on the incentive compatibility of participating miners, who compete against each other to discover new blocks. However, the assumption that competition will naturally evolve into collab...
Abstract
Within the pages of this book, readers will uncover a treasure trove of practical insights designed to empower job seekers through the strategic utilization of cutting-edge chatbot technology. Prominent examples like ChatGPT, Bard, and Gemini are featured prominently. This narrative unfolds as a comprehensive guide, shedding light on the t...
Abstract:
The landscape of computer, programming, and artificial intelligence (AI) jobs is facing unprecedented challenges. Possessing a broad range of technical skills, particularly programming expertise, no longer guarantees a high salary or job security. In today's dynamic world, no one can confidently predict job prospects for individuals in t...
Abstract
In this book, we delve into the multifaceted landscape of Artificial Intelligence (AI), offering a critical examination of the hidden perils that lie beneath its dazzling promise. As AI continues to advance at an unprecedented pace, it has become imperative to scrutinize not only its capabilities but also the ethical, environmental, and e...
Are you looking for a comprehensive guide to ChatGPT, GPT-4, and the new generation of AI-based chatbots? This single book covers everything you need to know, offering the equivalent content of eight distinct books in one volume. Save time and money as you explore the capabilities of these chatbots.
Suitable for a wide audience: Whether you're a j...
Chapter 1 of book entitled "Why GPT-Based Chatbots Will Be Vital: Applications, Challenges, and the Shaping of the Fragile Job Market "
This book is a comprehensive manual designed to empower both newcomers and experienced investors to harness the transformative power of Bitcoin and other digital currencies. This book focus on the evolving world of cryptocurrency, offering 50 actionable strategies that span a diverse range of investment techniques and innovative income streams.
Wi...
Quantum Machine Learning is an interdisciplinary field that combines the
principles of quantum physics, quantum computers, and machine learning to
enhance computational performance. In recent years, there have been significant advancements in the field of quantum machine learning. Researchers
have developed quantum algorithms for various tasks....
Artificial immune systems (AIS), as nature-inspired algorithms, have been developed to solve various types of problems, ranging from machine learning to optimization. This paper proposes a novel hybrid model of AIS that incorporates cellular automata (CA), known as the cellular automata-based artificial immune system (CaAIS), specifically designed...
Learning Automaton (LA) is an adaptive self-organized model that improves its action-selection through interaction with an unknown environment. LA with finite action set can be classified into two main categories: fixed and variable structure. Furthermore, variable action-set learning automaton (VASLA) is one of the main subsets of variable structu...
The Bitcoin cryptocurrency has received much attention recently. In the network of Bitcoin, transactions are recorded in a ledger. In this network, the process of recording transactions depends on some nodes called miners that execute a protocol known as mining protocol. One of the significant aspects of mining protocol is incentive compatibility....
Nutritional and lifestyle modifications are still a critical part of disease prevention and healthy aging. Better nutrition has been linked to stronger immune systems, a decreased risk of noncommunicable illnesses including diabetes, obesities, and cardiovascular diseases, as well as increased longevity. It is now clear that with the aid of the Int...
Recently, Digital Twin (DT) technology has received much attention because of its capabilities to manage systems and organisms that suffering complexity and unpredictability challenges. On the other hand, migraine is a neurological disease that causes a variety of symptoms, most notably pulsating headaches. Migraine attacks may get worse with physi...
Allergy is an immune system reaction to foreign materials. Some reactions would occur after an allergen is injected, touched, inhaled, or eaten. Allergic responses influence the human quality of life by affecting nose, ears, eyes, and throat. Allergies are increasing public health concerns and healthcare costs. To reduce these threats, The Internet...
Transportation sector and its impacts on climate change have received much attention over the last decade. Energy-optimal vehicle control algorithms such as adaptive cruise control can potentially reduce fuel consumption and the consequential environmental impacts. Adaptive cruise control algorithms optimize vehicles’ speed to lower energy consumpt...
This study intended to evaluate the effects of inorganic trace elements such as magnesium (Mg), strontium (Sr), and zinc (Zn) on root canal dentin using an Artificial Neural Network (ANN). The authors obtained three hundred extracted human premolars from type II diabetic individuals and divided them into three groups according to the solutions used...
In recent years, artificial intelligence has had a tremendous impact on every field, and several definitions of its different types have been provided. In the literature, most articles focus on the extraordinary capabilities of artificial intelligence. Recently, some challenges such as security, safety, fairness, robustness, and energy consumption...
Learning Automata (LAs) are adaptive decision-making models designed to find an appropriate action in unknown environments. LAs can be classified into two classes: variable structure and fixed structure. To the best of our knowledge, there is no hybrid model based on both of these classes. In this paper, we propose a model that brings together the...
Cancer is a dangerous ailment that influences any part of the body and could produce malignant tumors. One feature of cancer is that abnormal cells create quickly and expand beyond their regular bounds. This could attack various parts of the human body and spread to other organs, which is the primary cause of cancer death. Cancer is becoming a more...
Internet of Things (IoT) technology will be used in a wide range of applications such as healthcare and transportation. Because of distributed and dynamic nature of IoT-based systems, designing management algorithms for them results in challenging problems. On the other hand, cognitive computing refers to systems that emulate cognitive processes in...
The aim of this review is to examine various pathological conditions that impact the voice and how these features can be used in their diagnosis. An electronic search of PubMed and Google Scholar was performed for the articles published between January 2000 and July 2022 using the keywords found in the Medical Subject Headings database along with P...
Background
This paper outlines the current status and mechanism for identifying dental implants, with emphasis on future direction and updated technology, and covers the existing factors influencing the identification of implant systems.
Main body
A search was performed on the current methods of identifying dental implants between January 2000 thr...
With the increasing growth of different types of data, search engines have become an essential tool on the Internet. Every day, billions of queries are run through few search engines with several privacy violations and monopoly problems. The blockchain, as a trending technology applied in various fields, including banking, IoT, education, etc., can...
Objective
To propose a method to develop 3-dimensional (3D) models of regular and orthodontic typodonts using their 2-dimensional (2D) images, as an alternate method to 3D scanners.
Materials and methods
The mandibles of two typodonts; regular occlusion and malocclusion were scanned using a 3D scanner to generate their models. Captured scans were...
Nowadays, intelligent systems play an important role in a wide range of applications, including financial ones, smart cities, healthcare, and transportation. Most of the intelligent systems are composed of prefabricated components. Inappropriate composition of components may lead to unsafe, power-consuming, and vulnerable intelligent systems. Altho...
The Internet of Things (IoT) is used to improve traditional healthcare systems in different aspects, including monitoring patients’ behaviors. Information gathered by sensors in the IoT plays an essential role in healthcare systems. Because of privacy and security issues, the data must be protected against unauthorized changes. On the other hand, B...
Although currently used power toothbrushes have shown promising results in comparison with manual toothbrushes, automated toothbrushes have risen recently to improve oral hygiene and fulfil the limitations of dexterity of users. The present study intends to evaluate the efficacy of dental plaque removal ability of two automated toothbrushes: V‐Whit...
Cognitive peer‐to‐peer networks are obtained from a combination of cognitive networking concepts and peer‐to‐peer networks. These networks are able to improve their performance while operating under dynamic and unknown environments. A cognitive peer‐to‐peer network tries to learn an appropriate configuration for itself considering the unknown physi...
Diabetes associated complications, including diabetic retinopathy and loss of vision, are major health concerns. Detecting early retinal vascular changes during diabetes is not well documented, and only few studies have addressed this domain. The purpose of this study was to noninvasively evaluate temporal changes in retinal vasculature at very ear...
The Internet of Things (IoT) is an increasingly important part of social and economic developments around the world which supports homes and industrial automatons. The most important change brought about by IoT in the home is the automation of tasks (adjusting heating, cooling, and security systems). There is no longer a need for manual controls in...
The primary goal of cognitive computing is to design a digitalized model that is able to mimic human thinking processes. The cognitive engine is in charge of implementing the functionality of a cognitive system. Nowadays, cognitive engines are used as a self-organized management mechanism in different fields such as computer networks, Internet of T...
The tremendous increase in Web usage led to the appearance of different network structures. One of the essential issues in the field of network science and engineering is to find and utilize network structures such as community structures by community detection. Although most of the current algorithms for detection of community use on the binary re...
Nowadays online learning communities (OLC) have been thought of as a great source of learning contents by many users in various areas such as online forums, question answering, and online social networks. Millions of posts are virally shared among different users in online social communities every day; however, different types of users deal with th...
Recently, blockchain technology has received much attention. This is because of the rise of cryptocurrencies such as Bitcoin and Ethereum. The cryptocurrencies manage the transactions of the users as a set of blocks in a ledger using cryptography techniques. In these systems, peer-to-peer networks are used to manage communications among users. Thes...
Blockchain technology, Artificial Intelligence (AI), and Internet of Things (IoT) will be used as the infrastructure of modern applications in the near future. Therefore, we need to know some information about the implementation of them. For this purpose, many tools and applications have been reported in the literature. In this chapter, we show how...
Recently, blockchain technology has received much attention. This is because of the rise of cryptocurrencies such as Bitcoin and Ethereum. The cryptocurrencies manage the transactions of the users as a set of blocks in a ledger using cryptography techniques. In these systems, peer-to-peer networks are used to manage communications among users. Thes...
Peer-to-peer networks are usually implemented without a central controller with the aim of providing some features such as flexibility, scalability and reliability.The use of peer-to-peer systems is often limited to unstructured peer-to-peer networks. Finding an object in such networks has led to various search methods. In the random walk method, a...
مقدمه ای بر اینترنت اشیاء
Peer-to-peer systems are well-known patterns of
distributed systems which created several revelations in
designing ultra-scalable systems. Recently, these types of systems
are evolved into cognitive peer-to-peer networks. Because of the
distributed nature of Internet of Things (IoT), peer-to-peer
systems such as blockchain can be used to design man...
Peer-to-peer systems are well-known patterns of distributed systems which created several revelations in designing ultra-scalable systems. Recently, these types of systems are evolved into cognitive peer-to-peer networks. Because of the distributed nature of Internet of Things (IoT), peer-to-peer systems such as blockchain can be used to design man...
The topological structure of peer-to-peer networks is one of the topics of interest in these types of networks. Using the concept of community, as a technique for putting together the peers with similar interests, has largely contributed to the topological structure of peer-to-peer networks. A community is created when one or more numbers of a peer...
The topological structure of peer-to-peer networks is one of the topics of interest in these types of networks. Using the concept of community, as a technique for putting together the peers with similar interests, has largely contributed to the topological structure of peer-to-peer networks. A community is created when one or more numbers of a peer...
All of the intelligent models of random walk proposed in Chap. 2 are domain independent. Therefore, these models can be applied in a wide variety of problems. As it was previously discussed, all of the proposed models can be used to design prediction models based on random walk algorithms. This characteristic can be used to design problem-solving m...
Random walk algorithms are used to problem-solving, modeling, and simulation in many types of networks including computer networks, social networks, and biological networks. In real-world problems, the non-intelligent models of random walk may not be used as a problem-solving method. Recently, intelligent models of random walk have been reported in...
Intelligent models of random walk are obtained from random walk algorithms and a learning element. In this chapter, the learning element is a type of learning automata which is called as variable-structure learning automata. In this chapter, this type of learning automata is used to design three intelligent models of random walk. The first model is...
In this book, we presented a comprehensive analysis of the principal tasks related to the intelligent models of random walk based on learning automata. After introducing the random walk, we focused on its main drawbacks and weak performance in real-world applications. Then, three intelligent models were established on the bases of random walk. More...
Recently, Internet of Things (IoT) and blockchain technology are used to improve the traditional companies. One type of traditional companies is insurance companies. These companies suffer several problems that are leading to decrease their efficiency in modern societies. Many users of these companies are unhappy and dissatisfied because of some pr...
A workshop in IoT, AI, and Blockchain has been organized in coffee innovation, Tehran-Iran in July 2018.
Internet of Things, cognitive systems, and blockchain technology are three fields which have created numerous revolutions in software development. It seems that a combination among these fields may results in emerging a high potential and interesting field. Therefore, in this paper, we propose a framework for Internet of Things based on cognitive s...
Super-peer networks refer to a class of peer-to-peer networks in which some peers called super-peers are in charge of managing the network. A group of super-peer selection algorithms use the capacity of the peers for the purpose of super-peer selection where the capacity of a peer is defined as a general concept that can be calculated by some prope...
In this chapter, we present an approach for designing cognitive peer-to-peer networks based on DCLAs. In this chapter, several cognitive engines based on the DCLAs are presented for solving topology mismatch, and super-peer selection problems in peer-to-peer networks. In order to design the structure updating rule of the DCLAs, the restructuring ru...
Cellular learning automata (CLAs) have received significant attentions by researchers in recent years. CLAs are learning models, which bring together the computational power of cellular automata (CAs), and the learning capability of learning automata (LAs). From the viewpoint of the structure regularity, CLAs can be classified into two classes: irr...
Wireless senor networks (WSN) are collections of tiny and low-cost sensors, capable of wirelessly communicating and cooperating with each other to fulfill intended network duties. The environment of a WSN is highly dynamic due to a number of reasons, topological changes, wireless errors, autonomity of sensor nodes which results in ad hoc changes in...
Learning automaton (LA) is an effective decision making agent, especially within unknown stochastic environments. This book aims at collecting recent theoretical advancements as well as applied experiences of LAs in different research areas of the computer science discipline.
Since learning automata are suitable techniques for modelling, learning, controlling and solving dynamic and distributed problems in unknown environments, in this chapter, we present a brief description of some learning automata based algorithms for applications of social network analysis. In this regards, first we introduce complex social networks...
Learning automaton (LA) as one of computational intelligence techniques is a stochastic model operating in the framework of the reinforcement learning. LA has been found to be a useful tool for solving many complex and real world problems where a large amount of uncertainty exists or there is no access to the whole information regarding the environ...
Mobile peer-to-peer (MP2P) networks refer to the peer-to-peer overlay networks superimposing above the mobile ad-hoc networks. Heterogeneity of capacity and mobility of the peers as well as inherent limitation of resources along with the wireless networks characteristics are challenges on MP2P networks. In some MP2P networks, in order to improve ne...
This chapter contributes toward proposing adaptive Petri nets which evolve under the control of a number of learning agents. To this end, we utilize learning automata as learning agents and propose a number of hybrid machines, which are constructed by the fusion of Petri nets and learning automata. To justify the suitability of the proposed hybrid...
Internet of Things (IoT) will be emerged over many of devices that are dynamically networked. Because of distributed and dynamic nature of IoT, designing a recommender system for them is a challenging problem. Recently, cognitive systems are used to design modern frameworks in different types of computer applications such as cognitive radio network...
Cellular learning automata (CLAs) are learning models that bring together the computational power of cellular automata and also the learning capability of learning automata in unknown environments. CLAs can be open or closed. In a closed CLA, the action of each learning automaton depends on the neighboring cells, whereas in an open CLA, the action...
Cellular Learning Automata (CLAs) are hybrid models obtained from combination of Cellular Automata (CAs) and Learning Automata (LAs). These models can be either open or closed. In closed CLAs, the states of neighboring cells of each cell called local environment affect on the action selection process of the LA of that cell whereas in open CLAs, eac...
Peer-to-peer network is organized on top of another network as an overlay network. Super peer network is one of the peer-to-peer networks. A super peer, in a super peer based network, is a peer that has more responsibility than other peers have and is responsible for some of the tasks of network management. Since different peers vary in terms of ca...