Amir Masoud Rahmani

Amir Masoud Rahmani
National Yunlin University of Science and Technology

PhD

About

614
Publications
268,144
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
22,480
Citations
Additional affiliations
November 2012 - May 2013
University of Algarve
Position
  • PostDoc Position
November 2015 - November 2017
February 2014 - November 2015
Islamic Azad University, Science and Research Branch
Position
  • Dean of Faculty of Engineering

Publications

Publications (614)
Article
Full-text available
This paper seeks to enhance the performance of Mel Frequency Cepstral Coefficients (MFCCs) for detecting abnormal heart sounds. Heart sounds are first pre-processed to remove noise and then segmented into S1, systole, S2, and diastole intervals, with thirteen MFCCs estimated from each segment, yielding 52 MFCCs per beat. Finally, MFCCs are used for...
Article
The ”Internet of Things” (IoT) refers to the interconnection of physical devices that transmit and receive data over a network infrastructure. Wireless Sensor Networks (WSNs) are a key component of this infrastructure, facilitating data exchange through wireless channels. They are widely used in healthcare, transportation, smart home monitoring, an...
Article
Recently, resource allocation in cloud computing has become a popular research topic. Hi-WAY is a scientific workflow management system that facilitates workflows involving large-scale inputs such as big data. Hadoop, a framework designed to implement distributed systems, allows Hi-WAY to be run on thousands of computing nodes with desirable fault...
Article
The Internet of Things (IoT) is an ever‐expanding network technology that connects diverse objects and devices, generating vast amounts of heterogeneous data at the network edge. These vast volumes of data present significant challenges in data management, transmission, and storage. In fog‐cloud‐enabled IoT, where data are processed at the edge (fo...
Article
Full-text available
In light of the escalating privacy risks in the big data era, this paper introduces an innovative model for the anonymization of big data streams, leveraging in-memory processing within the Spark framework. The approach is founded on the principle of K-anonymity and propels the field forward by critically evaluating various anonymization methods an...
Article
Full-text available
In the era of big data, with the increase in volume and complexity of data, the main challenge is how to use big data while preserving the privacy of users. This study was conducted with the aim of finding a solution to this challenge. In this study, we examined various data anonymization methods, including differential privacy, advanced encryption...
Article
Full-text available
With electronic healthcare systems undergoing rapid change, optimizing the crucial process of recording physician prescriptions is a task with major implications for patient care. The power of blockchain technology and the precision of the Raft consensus algorithm are combined in this article to create a revolutionary solution for this problem. In...
Article
Full-text available
The Internet of Vehicles (IoV) promises to revolutionize transportation in smart cities, but its interconnectedness raises critical security and privacy concerns. Limited computational power, diverse network technologies, and many sensors and vehicles challenge data integrity and trust in data exchange. Existing solutions, often dependent on specif...
Article
Full-text available
Today, with the increasing expansion of IoT devices and the growing number of user requests, processing their demands in computational environments has become increasingly challenging.The large volume of user requests and the appropriate distribution of tasks among computational resources often result in disordered energy consumption and increased...
Chapter
Medical Internet of Things (MIoT) has been integrated with biosensors, wearable sensors, and other medical devices to facilitate the timely diagnosis and prediction of acute diseases. However, security and privacy concerns can affect the dedication of appropriate healthcare service providers (HSPs) to patients and timely decision-making. Blockchain...
Article
One of the challenges drivers face in today’s fast-paced urban world is the ability to access parking spaces quickly. The increase in the number of vehicles in cities, especially in urban areas, as well as the growth of network services in smart cities, has created the need to provide easy-to-use smart parking networks. However, the most critical c...
Article
Full-text available
The emergence of the Internet of Things (IoT) has enabled the proliferation of interconnected devices and sensors, generating vast amounts of often complex and unstructured data. Deep learning (DL), a subfield of machine learning (ML), has shown great promise in addressing the challenges of processing and analyzing such data. Considering the increa...
Preprint
Full-text available
This paper explores the efficacy of Mel Frequency Cepstral Coefficients (MFCCs) in detecting abnormal phonocardiograms using two classification strategies: a single-classifier and an ensemble-classifier approach. Phonocardiograms were segmented into S1, systole, S2, and diastole intervals, with thirteen MFCCs estimated from each segment, yielding 5...
Article
Full-text available
In the last few decades, metaheuristic algorithms that use the laws of nature have been used dramatically in numerous and complex optimization problems. The artificial hummingbird algorithm (AHA) is one of the metaheuristic algorithms that was invented in 2022 based on the foraging and migration behavior of the hummingbird for modeling and solving...
Article
Full-text available
Big data privacy preservation is a critical challenge for data mining and data analysis. Existing methods for anonymizing big data streams using k-anonymity algorithms may cause high data loss, low data quality, and identity disclosure. In this paper, we propose a novel model for anonymizing big data streams using in-memory processing. The model us...
Article
Full-text available
In cloud/fog-based environments, resource management is an important and challenging process. The deadline-based workflow scheduling mechanism is a common practice in such systems to overcome the complexities of resource management. However, many proposed approaches suffer from resource overloading/underloading, ignoring volunteer and volatile reso...
Article
Full-text available
The importance and growth of the Internet of Things (IoT) in computer networks and applications have been increasing. Additionally, many of these applications generate large volumes of data, which are critical and require protection against attacks. Various techniques have been proposed to identify and counteract these threats. In this paper, we of...
Article
Full-text available
Nowadays, a large amount of data is being generated and these data are usually stored in distributed environments such as cloud, fog, and edge environments. Data replication, which is commonly used to manage large amounts of data, improves overall accessibility and availability. Due to the importance of data replication, a lot of research has been...
Article
Full-text available
The current fleet of cars requires reevaluation, upgrades, and replacement in response to the expanding human population, the increase in urban traffic volume, and the elevated levels of air pollution attributed to vehicular emissions. In densely populated cities, bus routes effectively compete with private transportation, optimize user accessibili...
Article
The right lane and platoon assignment to a vehicle significantly impacts achieving the desired driving goals to improve occupants’ safety or reduce pollution. Preparing an intelligent assistant to address this issue has exposed researchers’ attention, especially in intelligent transportation systems. Implementing such a system is complex and challe...
Article
Full-text available
Edge computing, artificial intelligence (AI), and machine learning (ML) concepts have become increasingly prevalent in Internet of Things (IoT) applications. As the number of IoT devices continues to grow, relying solely on cloud computing for real-time data processing and analysis is proving to be more challenging. The synergy between edge computi...
Article
Full-text available
Cloud architecture and its operations interest both general consumers and researchers. Google, as a technology giant, offers cloud services globally. This paper analyzes the Google cluster usage trace, focusing on three key aspects: task execution times, rescheduling frequency, and the relationship between task priority and rescheduling. Firstly, w...
Article
Big data has attracted extensive attention from industries and universities during the past few years. Big data is crucial in many fields, such as business analytics, healthcare, the Internet of Things (IoT), smart home, supply chain, transportation, and fraud detection. Nevertheless, some challenges must be addressed, such as decentralization, int...
Preprint
Full-text available
Quantum-dot Cellular Automata (QCA) technology offers several advantages over traditional CMOS technology, including reduced power consumption, higher clock speeds, and increased density. QCA has the potential to overcome the physical limitations of CMOS, making it an attractive choice for the future of VLSI circuits. It uses quantum dots to repres...
Article
Purpose Big data challenges and opportunities on the Internet of Vehicles (IoV) have emerged as a transformative paradigm to change intelligent transportation systems. With the growth of data-driven applications and the advances in data analysis techniques, the potential for data-adaptive innovation in IoV applications becomes an outstanding develo...
Article
Full-text available
Uncertainty management for geometric data is a fundamental issue for spatial databases, image databases, and spatial data systems, such as geographic information systems. Currently, spatial database systems can only handle geographical applications that interact with discrete spatial objects. In reality, many spatial objects do not have uniform int...
Article
Full-text available
Background and Objectives: Today, the increased number of Internet-connected smart devices require powerful computer processing servers such as cloud and fog and necessitate fulfilling requests and services more than ever before. The geographical distance of IoT devices to fog and cloud servers have turned issues such as delay and energy consumptio...
Article
Full-text available
RFID technology offers an affordable and user-friendly solution for contactless identification of objects and individuals. However, the widespread adoption of RFID systems raises concerns regarding security and privacy. Vulnerabilities such as message tampering, interception, and eavesdropping pose significant risks to the integrity of the system....
Article
Full-text available
In this paper, a new theory to train neural networks is presented which is called "Neural Network Meaningful Learning" (NNMeL) theory. According to this theory, meaningful learning in an artificial neural network occurs when concepts are learned separately but get related to each other. This theory is theoretically supported by "Azobel’s cognitive...
Article
Full-text available
Social IoT (SIoT) refers to socializing in the Internet of Things (IoT), where things generate social relationships. Due to the development of objects and issues such as delayed response, slow search, and composite service process, distributed object service discovery, selection, and composition based on the social structure have become essential c...
Article
Full-text available
Presents corrections to the paper, (Corrections to “Deep Learning-Based Intrusion Detection Systems: A Systematic Review”).
Conference Paper
The IoT as a fast-growing topic attracts attention from the research communities and business owners since the IoT paradigm can improve the ease of life and present new opportunities. The smart city scenario offers technology-based facilities for citizens to enhance their quality of life, public safety, and disaster management. Smart city context i...
Article
Full-text available
With the explosive growth of information on the web and the quick provision of novel web services, recommendation systems have emerged as efficient mechanism for providing advice regarding items in which users might be potentially interested. However, a traditional recommender system, which solely mines the user's previous behavior and item descrip...
Article
Full-text available
With the growing use of electronic cash cards, the number of transactions with these cards has also increased rapidly, so the importance of using fraud detection models has been paid attention to by financial organizations from various aspects. Electronic cash card fraud detection models often on a single algorithm, optimization of classifications...
Article
Full-text available
Physical Unclonable Functions (PUFs) are widely used in cryptographic authentication and key-agreement protocols due to their unique physical properties. This article presents a comprehensive cryptanalysis of two recently developed authentication protocols, namely PLAKE and EV-PUF, both relying on PUFs. Our analysis reveals significant vulnerabilit...
Article
Full-text available
p> With the emergence of cloud computing as a processing backbone for internet of thing (IoT), fog computing has been proposed as a solution for delay-sensitive applications. According to fog computing, this is done by placing computing servers near IoT. IoT networks are inherently very dynamic, and their topology and resources may be changed drast...
Article
Full-text available
Autonomous vehicles (AVs) have emerged as a promising technology for enhancing road safety and mobility. However, designing AVs involves various critical aspects, such as software and system requirements, that must be carefully addressed. This paper investigates safety-aware approaches for AVs, focusing on the software and system requirements aspec...
Article
Full-text available
Importance Lip, oral, and pharyngeal cancers are important contributors to cancer burden worldwide, and a comprehensive evaluation of their burden globally, regionally, and nationally is crucial for effective policy planning. Objective To analyze the total and risk-attributable burden of lip and oral cavity cancer (LOC) and other pharyngeal cancer...
Article
Previous research on fraud detection modeling is often based on a single algorithm, optimizing categories and clusters to find fraudulent patterns that they have provided unsupervised or supervised methods alone and within the framework of Hadoop. The proposed model, a model based on big data analysis extracts important features of user behavior pa...
Article
Full-text available
The energy demand for Internet of Things (IoT) applications is increasing with a rise in IoT devices. Rising costs and energy demands can cause serious problems. Fog computing (FC) has recently emerged as a model for location‐aware tasks, data processing, fast computing, and energy consumption reduction. The Fog computing model assists cloud comput...
Article
Full-text available
Patients must always communicate with their doctor for checking their health status. In recent years, wireless body sensor networks (WBSNs) has an important contribution in Healthcare. In these applications, energy-efficient and secure routing is really critical because health data of individuals must be forwarded to the destination securely to avo...
Article
Full-text available
p> In recent years, the number of end users connected to the internet of things (IoT) has increased, and we have witnessed the emergence of the cloud computing paradigm. These users utilize network resources to meet their quality of service (QoS) requirements, but traditional networks are not configured to backing maximum of scalability, real-time...
Data
Background The causes for immune-mediated inflammatory diseases (IMIDs) are diverse and the incidence trends of IMIDs from specific causes are rarely studied. The study aims to investigate the pattern and trend of IMIDs from 1990 to 2019. Methods We collected detailed information on six major causes of IMIDs, including asthma, inflammatory bowel di...
Article
Full-text available
The Internet of Vehicles (IoV) integrates various technologies to enable real‐time data exchange between vehicles, pedestrians, roadside units, unmanned aerial vehicles, road‐added things, and so forth. IoV is an improved internet‐enabled vehicular ad hoc network (VANET), which is similarly affected by data traffic aggravated by time‐variant networ...
Article
Full-text available
Background The causes for immune-mediated inflammatory diseases (IMIDs) are diverse and the incidence trends of IMIDs from specific causes are rarely studied. The study aims to investigate the pattern and trend of IMIDs from 1990 to 2019. Methods We collected detailed information on six major causes of IMIDs, including asthma, inflammatory bowel d...
Article
Full-text available
In wireless sensor networks (WSNs), existing routing protocols mainly consider energy efficiency or security separately. However, these protocols must be more comprehensive because many applications should guarantee security and energy efficiency, simultaneously. Due to the limited energy of sensor nodes, these protocols should make a trade-off bet...
Article
Full-text available
Processing of data gathered from new communication devices, such as Internet of Things (IoT)-based technology, has grown dramatically in the past decade. Resource management plays a vital role in cloud/fog-based platforms’ efficiency. Alternatively, a deadline-based workflow scheduling mechanism is an approach to resource management that increases...
Article
Full-text available
Today, wireless sensor networks (WSNs) are growing rapidly and provide a lot of comfort to human life. Due to the use of WSNs in various areas, like health care and battlefield, security is an important concern in the data transfer procedure to prevent data manipulation. Trust management is an affective scheme to solve these problems by building tr...
Article
Full-text available
In an increasingly automated world, Artificial Intelligence (AI) promises to revolutionize how people work, consume, and develop their societies. Science and technology advancement has led humans to seek solutions to problems; however, AI-based technology is not novel and has a wide range of economic applications. This paper examines AI application...
Article
Full-text available
In the last two decades, the use of chaotic iterative maps in cryptographic systems, especially chaotic hash functions, has been expanding. Sensitivity to small changes in initial conditions and control parameters in chaotic systems is the best feature for designing a chaotic hash function. This paper introduces a new generalized chaotic map based...
Article
Full-text available
Background Anaemia is a major health problem worldwide. Global estimates of anaemia burden are crucial for developing appropriate interventions to meet current international targets for disease mitigation. We describe the prevalence, years lived with disability, and trends of anaemia and its underlying causes in 204 countries and territories. Metho...
Article
Examining the particular value of each platform for big data would be difficult because of the variety of social media forms and sizes. Using social media to objectively and subjectively analyze large groups of individuals makes it the most effective tool for this task. There are numerous sources of big data within the organization. Social media ca...
Article
Full-text available
The Internet of Things (IoT) is a universal network to supervise the physical world through sensors installed on different devices. The network can improve many areas, including healthcare because IoT technology has the potential to reduce pressure caused by aging and chronic diseases on healthcare systems. For this reason, researchers attempt to s...