Amir Masoud RahmaniNational Yunlin University of Science and Technology
Amir Masoud Rahmani
PhD
About
614
Publications
268,144
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
22,480
Citations
Introduction
Amir Masoud Rahmani is a (Full) Professor of computer engineering.
Additional affiliations
November 2012 - May 2013
November 2015 - November 2017
February 2014 - November 2015
Publications
Publications (614)
This paper seeks to enhance the performance of Mel Frequency Cepstral Coefficients (MFCCs) for detecting abnormal heart sounds. Heart sounds are first pre-processed to remove noise and then segmented into S1, systole, S2, and diastole intervals, with thirteen MFCCs estimated from each segment, yielding 52 MFCCs per beat. Finally, MFCCs are used for...
The ”Internet of Things” (IoT) refers to the interconnection of physical devices that transmit and receive data over a network infrastructure. Wireless Sensor Networks (WSNs) are a key component of this infrastructure, facilitating data exchange through wireless channels. They are widely used in healthcare, transportation, smart home monitoring, an...
Recently, resource allocation in cloud computing has become a popular research topic. Hi-WAY is a scientific workflow management system that facilitates workflows involving large-scale inputs such as big data. Hadoop, a framework designed to implement distributed systems, allows Hi-WAY to be run on thousands of computing nodes with desirable fault...
The Internet of Things (IoT) is an ever‐expanding network technology that connects diverse objects and devices, generating vast amounts of heterogeneous data at the network edge. These vast volumes of data present significant challenges in data management, transmission, and storage. In fog‐cloud‐enabled IoT, where data are processed at the edge (fo...
In light of the escalating privacy risks in the big data era, this paper introduces an innovative model for the anonymization of big data streams, leveraging in-memory processing within the Spark framework. The approach is founded on the principle of K-anonymity and propels the field forward by critically evaluating various anonymization methods an...
In the era of big data, with the increase in volume and complexity of data, the main challenge is how to use big data while preserving the privacy of users. This study was conducted with the aim of finding a solution to this challenge. In this study, we examined various data anonymization methods, including differential privacy, advanced encryption...
With electronic healthcare systems undergoing rapid change, optimizing the crucial process of recording physician prescriptions is a task with major implications for patient care. The power of blockchain technology and the precision of the Raft consensus algorithm are combined in this article to create a revolutionary solution for this problem. In...
The Internet of Vehicles (IoV) promises to revolutionize transportation in smart cities, but its interconnectedness raises critical security and privacy concerns. Limited computational power, diverse network technologies, and many sensors and vehicles challenge data integrity and trust in data exchange. Existing solutions, often dependent on specif...
Today, with the increasing expansion of IoT devices and the growing number of user requests, processing their demands in computational environments has become increasingly challenging.The large volume of user requests and the appropriate distribution of tasks among computational resources often result in disordered energy consumption and increased...
Medical Internet of Things (MIoT) has been integrated with biosensors, wearable sensors, and other medical devices to facilitate the timely diagnosis and prediction of acute diseases. However, security and privacy concerns can affect the dedication of appropriate healthcare service providers (HSPs) to patients and timely decision-making. Blockchain...
One of the challenges drivers face in today’s fast-paced urban world is the ability to access parking spaces quickly. The increase in the number of vehicles in cities, especially in urban areas, as well as the growth of network services in smart cities, has created the need to provide easy-to-use smart parking networks. However, the most critical c...
The emergence of the Internet of Things (IoT) has enabled the proliferation of interconnected devices and sensors, generating vast amounts of often complex and unstructured data. Deep learning (DL), a subfield of machine learning (ML), has shown great promise in addressing the challenges of processing and analyzing such data. Considering the increa...
This paper explores the efficacy of Mel Frequency Cepstral Coefficients (MFCCs) in detecting abnormal phonocardiograms using two classification strategies: a single-classifier and an ensemble-classifier approach. Phonocardiograms were segmented into S1, systole, S2, and diastole intervals, with thirteen MFCCs estimated from each segment, yielding 5...
In the last few decades, metaheuristic algorithms that use the laws of nature have been used dramatically in numerous and complex optimization problems. The artificial hummingbird algorithm (AHA) is one of the metaheuristic algorithms that was invented in 2022 based on the foraging and migration behavior of the hummingbird for modeling and solving...
Big data privacy preservation is a critical challenge for data mining and data analysis. Existing methods for anonymizing big data streams using k-anonymity algorithms may cause high data loss, low data quality, and identity disclosure. In this paper, we propose a novel model for anonymizing big data streams using in-memory processing. The model us...
In cloud/fog-based environments, resource management is an important and challenging process. The deadline-based workflow scheduling mechanism is a common practice in such systems to overcome the complexities of resource management. However, many proposed approaches suffer from resource overloading/underloading, ignoring volunteer and volatile reso...
The importance and growth of the Internet of Things (IoT) in computer networks and applications have been increasing. Additionally, many of these applications generate large volumes of data, which are critical and require protection against attacks. Various techniques have been proposed to identify and counteract these threats. In this paper, we of...
Nowadays, a large amount of data is being generated and these data are usually stored in distributed environments such as cloud, fog, and edge environments. Data replication, which is commonly used to manage large amounts of data, improves overall accessibility and availability. Due to the importance of data replication, a lot of research has been...
The current fleet of cars requires reevaluation, upgrades, and replacement in response to the expanding human population, the increase in urban traffic volume, and the elevated levels of air pollution attributed to vehicular emissions. In densely populated cities, bus routes effectively compete with private transportation, optimize user accessibili...
The right lane and platoon assignment to a vehicle significantly impacts achieving the desired driving goals to improve occupants’ safety or reduce pollution. Preparing an intelligent assistant to address this issue has exposed researchers’ attention,
especially in intelligent transportation systems. Implementing such a system is complex and challe...
Edge computing, artificial intelligence (AI), and machine learning (ML) concepts have become increasingly prevalent in Internet of Things (IoT) applications. As the number of IoT devices continues to grow, relying solely on cloud computing for real-time data processing and analysis is proving to be more challenging. The synergy between edge computi...
Cloud architecture and its operations interest both general consumers and researchers. Google, as a technology giant, offers cloud services globally. This paper analyzes the Google cluster usage trace, focusing on three key aspects: task execution times, rescheduling frequency, and the relationship between task priority and rescheduling. Firstly, w...
Big data has attracted extensive attention from industries and universities during the past few years. Big data is crucial in many fields, such as business analytics, healthcare, the Internet of Things (IoT), smart home, supply chain, transportation, and fraud detection. Nevertheless, some challenges must be addressed, such as decentralization, int...
Quantum-dot Cellular Automata (QCA) technology offers several advantages over traditional CMOS technology, including reduced power consumption, higher clock speeds, and increased density. QCA has the potential to overcome the physical limitations of CMOS, making it an attractive choice for the future of VLSI circuits. It uses quantum dots to repres...
Purpose
Big data challenges and opportunities on the Internet of Vehicles (IoV) have emerged as a transformative paradigm to change intelligent transportation systems. With the growth of data-driven applications and the advances in data analysis techniques, the potential for data-adaptive innovation in IoV applications becomes an outstanding develo...
Uncertainty management for geometric data is a fundamental issue for spatial databases, image databases, and spatial data systems, such as geographic information systems. Currently, spatial database systems can only handle geographical applications that interact with discrete spatial objects. In reality, many spatial objects do not have uniform int...
Background and Objectives: Today, the increased number of Internet-connected smart devices require powerful computer processing servers such as cloud and fog and necessitate fulfilling requests and services more than ever before. The geographical distance of IoT devices to fog and cloud servers have turned issues such as delay and energy consumptio...
RFID technology offers an affordable and user-friendly solution for contactless identification of objects and individuals. However, the widespread adoption of RFID systems raises concerns regarding security and privacy. Vulnerabilities such as message tampering, interception, and eavesdropping pose significant risks to the integrity of the system....
In this paper, a new theory to train neural networks is presented which is called "Neural Network Meaningful Learning" (NNMeL) theory. According to this theory, meaningful learning in an artificial neural network occurs when concepts are learned separately but get related to each other. This theory is theoretically supported by "Azobel’s cognitive...
Social IoT (SIoT) refers to socializing in the Internet of Things (IoT), where things generate social relationships. Due to the development of objects and issues such as delayed response, slow search, and composite service process, distributed object service discovery, selection, and composition based on the social structure have become essential c...
Presents corrections to the paper, (Corrections to “Deep Learning-Based Intrusion Detection Systems: A Systematic Review”).
The IoT as a fast-growing topic attracts attention from the research communities and business owners since the IoT paradigm can improve the ease of life and present new opportunities. The smart city scenario offers technology-based facilities for citizens to enhance their quality of life, public safety, and disaster management. Smart city context i...
With the explosive growth of information on the web and the quick provision of novel web services, recommendation systems have emerged as efficient mechanism for providing advice regarding items in which users might be potentially interested. However, a traditional recommender system, which solely mines the user's previous behavior and item descrip...
With the growing use of electronic cash cards, the number of transactions with these cards has also increased rapidly, so the importance of using fraud detection models has been paid attention to by financial organizations from various aspects. Electronic cash card fraud detection models often on a single algorithm, optimization of classifications...
Physical Unclonable Functions (PUFs) are widely used in cryptographic authentication and key-agreement protocols due to their unique physical properties. This article presents a comprehensive cryptanalysis of two recently developed authentication protocols, namely PLAKE and EV-PUF, both relying on PUFs. Our analysis reveals significant vulnerabilit...
p> With the emergence of cloud computing as a processing backbone for internet of thing (IoT), fog computing has been proposed as a solution for delay-sensitive applications. According to fog computing, this is done by placing computing servers near IoT. IoT networks are inherently very dynamic, and their topology and resources may be changed drast...
Autonomous vehicles (AVs) have emerged as a promising technology for enhancing road safety and mobility. However, designing AVs involves various critical aspects, such as software and system requirements, that must be carefully addressed. This paper investigates safety-aware approaches for AVs, focusing on the software and system requirements aspec...
Importance
Lip, oral, and pharyngeal cancers are important contributors to cancer burden worldwide, and a comprehensive evaluation of their burden globally, regionally, and nationally is crucial for effective policy planning.
Objective
To analyze the total and risk-attributable burden of lip and oral cavity cancer (LOC) and other pharyngeal cancer...
Previous research on fraud detection modeling is often based on a single algorithm, optimizing categories and clusters to find fraudulent patterns that they have provided unsupervised or supervised methods alone and within the framework of Hadoop. The proposed model, a model based on big data analysis extracts important features of user behavior pa...
The energy demand for Internet of Things (IoT) applications is increasing with a rise in IoT devices. Rising costs and energy demands can cause serious problems. Fog computing (FC) has recently emerged as a model for location‐aware tasks, data processing, fast computing, and energy consumption reduction. The Fog computing model assists cloud comput...
Patients must always communicate with their doctor for checking their health status. In recent years, wireless body sensor networks (WBSNs) has an important contribution in Healthcare. In these applications, energy-efficient and secure routing is really critical because health data of individuals must be forwarded to the destination securely to avo...
p> In recent years, the number of end users connected to the internet of things (IoT) has increased, and we have witnessed the emergence of the cloud computing paradigm. These users utilize network resources to meet their quality of service (QoS) requirements, but traditional networks are not configured to backing maximum of scalability, real-time...
Background The causes for immune-mediated inflammatory diseases (IMIDs) are diverse and the incidence trends of IMIDs from specific causes are rarely studied. The study aims to investigate the pattern and trend of IMIDs from 1990 to 2019. Methods We collected detailed information on six major causes of IMIDs, including asthma, inflammatory bowel di...
The Internet of Vehicles (IoV) integrates various technologies to enable real‐time data exchange between vehicles, pedestrians, roadside units, unmanned aerial vehicles, road‐added things, and so forth. IoV is an improved internet‐enabled vehicular ad hoc network (VANET), which is similarly affected by data traffic aggravated by time‐variant networ...
Background
The causes for immune-mediated inflammatory diseases (IMIDs) are diverse and the incidence trends of IMIDs from specific causes are rarely studied. The study aims to investigate the pattern and trend of IMIDs from 1990 to 2019.
Methods
We collected detailed information on six major causes of IMIDs, including asthma, inflammatory bowel d...
In wireless sensor networks (WSNs), existing routing protocols mainly consider energy efficiency or security separately. However, these protocols must be more comprehensive because many applications should guarantee security and energy efficiency, simultaneously. Due to the limited energy of sensor nodes, these protocols should make a trade-off bet...
Processing of data gathered from new communication devices, such as Internet of Things (IoT)-based technology, has grown dramatically in the past decade. Resource management plays a vital role in cloud/fog-based platforms’ efficiency. Alternatively, a deadline-based workflow scheduling mechanism is an approach to resource management that increases...
Today, wireless sensor networks (WSNs) are growing rapidly and provide a lot of comfort to human life. Due to the use of WSNs in various areas, like health care and battlefield, security is an important concern in the data transfer procedure to prevent data manipulation. Trust management is an affective scheme to solve these problems by building tr...
In an increasingly automated world, Artificial Intelligence (AI) promises to revolutionize how people work, consume, and develop their societies. Science and technology advancement has led humans to seek solutions to problems; however, AI-based technology is not novel and has a wide range of economic applications. This paper examines AI application...
In the last two decades, the use of chaotic iterative maps in cryptographic systems, especially chaotic hash functions, has been expanding. Sensitivity to small changes in initial conditions and control parameters in chaotic systems is the best feature for designing a chaotic hash function. This paper introduces a new generalized chaotic map based...
Background Anaemia is a major health problem worldwide. Global estimates of anaemia burden are crucial for
developing appropriate interventions to meet current international targets for disease mitigation. We describe the
prevalence, years lived with disability, and trends of anaemia and its underlying causes in 204 countries and territories.
Metho...
Examining the particular value of each platform for big data would be difficult because of the variety of social media forms and sizes. Using social media to objectively and subjectively analyze large groups of individuals makes it the most effective tool for this task. There are numerous sources of big data within the organization. Social media ca...
The Internet of Things (IoT) is a universal network to supervise the physical world through sensors installed on different devices. The network can improve many areas, including healthcare because IoT technology has the potential to reduce pressure caused by aging and chronic diseases on healthcare systems. For this reason, researchers attempt to s...