
Hamid Haj Seyyed JavadiShahed University · Department of Computer Engineering
Hamid Haj Seyyed Javadi
PhD
About
170
Publications
34,288
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,648
Citations
Citations since 2017
Introduction
Hamid Haj Seyyed Javadi is currently a Professor of Mathematics and Computer Science in the Department of Computer Engineering at Shahed University. He does research in Pure and Computer Algebra and its applications.
Skills and Expertise
Additional affiliations
March 2019 - September 2022
September 2005 - March 2019
January 2005 - January 2019
Education
September 1990 - September 2003
Publications
Publications (170)
This paper proposes a novel approach that uses a spectral clustering method to cluster patients with e-health IoT devices based on their similarity and distance and connect each cluster to an SDN edge node for efficient caching. The proposed MFO-Edge Caching algorithm is considered for selecting the near-optimal data options for caching based on co...
The Internet of Things (IoT) is a network of interconnected computing devices that link billions of devices to the Internet and take advantage of Information-centric networking (ICN) functionality to gain additional benefits. In addition, there are certain resource constraints in IoT, such as caching capability, power supply, and wireless bandwidth...
Due to the heterogeneity of devices available in the Internet of Things and the limitations of the resources connected to it, simplifying and lightening the algorithms used in the Internet of Things is an interesting area of study for researchers. One of the critical areas in the Internet of Things is the secret key establishment in communicating p...
The dramatic growth of smart devices and the Internet of things (IoT) has increased the volume of exchanges and data on the web. The centralized and traditional architecture of cloud computing does not meet the demands of users and proper implementation of latency-sensitive applications due to latency and mass demands of IoT applications that have...
In the Internet of Things, all living things can communicate and exchange information. For this information exchange to take place, the Internet of Things needs a reference architecture in which everyone can exchange information with a specific standard. Internet‐connected devices can provide a way to predict everything from consumer behavior to we...
A way of optimizing energy consumption in mobile ad hoc networks is topology control.
Various topology control algorithms have been proposed, but a few of them have used
meta-heuristic methods such as genetic algorithms, neural networks, and learning automata. This paper presents a new algorithm based on the Bayesian pursuit (BPST) algorithm.
The p...
The issue of security in fog has several challenges and one of which is to create a secure channel that connects fog layer to the end devices. Therefore, efficient and secure key distribution is very important to create this channel. One solution is key pre-distribute that the keys generation and distribution between nodes are before the network es...
Due to the proliferation of mobile, IoT, and Interlayer fog computing devices, the number of requests to the cloud network has increased. Today, cloud networks, new virtualization technologies, and virtual machines are essential for proper management and recommending the appropriate virtual machine to execute requests on the network. In addition, i...
The advent of the Software-Defined Networks (SDNs) has caused the control plane on the switches to be moved to a separate part of the data plane. Failure of a single controller deployed in the network disrupts the proper function of the network; therefore, we need to look for the multiple controller placement and find a way to plan the star ahead a...
span>Due to the development of communication device technology and the need to use up-to-date infrastructure ready to respond quickly and in a timely manner to computational needs, the competition for the use of processing resources is increasing nowadays. The scheduling tasks in the cloud computing environment have been remained a challenge to acc...
Cloud federation is the place where the cloud service providers could supply their resource deficiency from other members and offer their extra resources to other members of the federation in case of necessity. From the viewpoint of maximum use of resources, resource pricing is one of the main challenges in cloud computing which affects the utiliza...
The number of computing resources required for high‐volume applications is ever‐increasing. As far as the users' requests generate workload variations over time and the resources of cloud servers that respond to the requests are limited, the quality of services (QoS) of the cloud server is experiencing fluctuations. The cloud federation is a place...
The Internet of Things (IoT) technology improvement has led to concepts such as smart retail and supply chain management systems. The main problem with IoT‐based smart retail and supply chain management systems is the need for a high‐speed network for responding quickly to many transactions within the network. If the network is not able to respond...
Resource-constrained Devices are extensively used on the Internet of Things (IoT). WSN, RFID, and embedded systems are examples of these devices that have processing and communication power, memory capacity, and energy constraints. One of the lightweight methods in key distribution in these devices is to use Key Pre-Distribution Schemes (KPSs). A f...
The failure of a single controller in the control layer of the Software-Defined Network (SDN) challenges the management of switches in the data layer and disrupts the proper function of the network; therefore, the optimal placement of multiple controllers in the network and the assignment of switches to controllers, called Controller Placement Prob...
With increasing growth in IoT, the number of devices connected to the Internet is constantly growing. Moreover, the increase in the volume of data and their transmission through the Internet of Things, as well as the existence of inadequate bandwidth, limits cloud-based storage and data processing. Both fog and cloud computing provide the storage s...
In recent years, with the development of technology, the shopping approach of people has moved towards pervasive online social shopping. As a result, how to create a recommendation algorithm that offers products based on the personal and different needs and tastes of people on social networks is a significant research issue. This article proposes a...
Task offloading is one of the main concepts in fog computing which improves the system efficiency and decreases latency. Previously proposed models, such as exponential queue models, addressed the offloading models in a simple model. This study proposes a novel analytical model that examines batch queuing systems and the influence of batch size-dep...
The present paper proposes a new algorithm designed for solving optimization problems. This algorithm is a hybrid of Differential Evolution (DE) and Particle Swarm Optimization (PSO) algorithms. The proposed algorithm uses a coalition or cooperation model in the game theory to combine the DE and PSO algorithms. This is done in an attempt to keep a...
Recently, the discovery of association rules and the consequent mining frequent patterns have attracted the attention of many researchers to discover unknown relationships in big data, especially in networking and distributed environments. In this research, a parallelization-based approach is proposed to improve the performance of the Apriori algor...
The capacity and security of the confidential message on the channel are two important challenges in steganography. In this paper, a new block steganography model is presented using the bargain method so that a competitive model is introduced. In this game, the blocks are the same players. The bargain is provided with the aim of embedding informati...
In recent years, Internet of Things (IoT) services have expanded to promote the quality of life in different areas. Cloud connectivity services are so popular now that they have prompted the experts to enhance cloud computing for its utilization in IoT, making everything online in the next few decades. For reducing latency, immediate processing, an...
Due to increasing volume of stored data in organizations, data owners upload their data to cloud servers. Sensitive data has to be encrypted prior to uploading to the cloud server because of security requirements. Therefore, capable of searching over the encrypted cloud data is a very important issue. One of the most important challenges that must...
Fog computing refers to cloud computing development to the edge of a corporate network. Fog computing, as a promising computing paradigm, facilitates computing, storing and network services between terminal devices and cloud computing data centers. It also brings many advantages to cloud computing and large-scale deployment of IoT applications such...
A $\ast$-ring $R$ is called a $\pi$-Baer $\ast$-ring, if for any projection invariant left ideal $Y$ of $R$, the right annihilator of $Y $ is generated, as a right ideal, by a projection. In this note, we study some properties of such $\ast$-rings. We indicate interrelationships between the $\pi$-Baer $\ast$-rings and related classes of rings such...
Increasing the popularity of cloud computing raises the importance of efforts to improve the services of this paradigm. Searching over encrypted data is a requirement for cloud storage to provide, in addition to privacy-preserving, convenient and low-cost access to some of the outsourced data. Security and functionality along with efficiency are im...
Software defined networks and the Internet of Things (IoT) are two major and emerging developments in networking that have much in common and their survival depends on each other. Software Defined Networking (SDN) is one of the 5G enabling innovations that can help design complex, manageable, cost-effective and adaptable networks. On the other hand...
In recent years, the Internet of Things (IoT) has swept through most aspects of people lives, where all objects are connected to a common network. Therefore, the security of IoT devices is naturally crucial. As for the constrained resources of IoT devices, we need to have lightweight encryption algorithms. Accordingly, the symmetric key establishme...
The trend towards the Internet of Things (IoT) technology promises the growth of home and organizational automation in the world. Due to the large amount of IoT data stored in the semi-trust cloud server, the IoT is vulnerable to cyberattacks. Therefore, the privacy violation of outsourced data is an obstacle to efficient IoT data storage. Searchab...
A ring R is called right Ikeda–Nakayama ring (right IN-ring) if for any two right ideals I, J of R, l(I)+l(J)=l(I∩J). In this paper, we introduce the concept of Essential Ikeda–Nakayama rings (EIN-rings) as a generalization of right IN-rings. This class of rings includes semiprime rings. We prove that for a left nonsingular EIN-ring R, closed ideal...
Currently, IoT is being used as a novel tool in many applications. Some applications use the end nodes such as wireless sensor network, RFID and embedded systems referred to as resource-constrained devices. These devices have limitations in computing and communication power, memory capacity and power. One of the approaches to discuss key distributi...
IoT-based network systems use a modern architecture called fog computing, In which data providing data services is economical with low latency. This paper tends to solve the challenge of resource allocation in fog computing. Solving the resource allocation challenge leads to increased profits, economic savings, and optimal computing systems use. He...
Today, the Internet of Things (IoT) is one of the emerging technologies that enable the connection and transfer of information through communication networks. The main idea of the IoT is the widespread presence of objects such as mobile devices, sensors, and RFID. With the increase in traffic volume in urban areas, the existing intelligent urban tr...
The need for cyber resilience is increasingly important in our technology-dependent society where computing devices and data have been, and will continue to be, the target of cyber-attackers, particularly advanced persistent threat (APT) and nation-state/sponsored actors. APT and nation-state/sponsored actors tend to be more sophisticated, having a...
The Internet of Things (IoT) is a rapidly growing trend within many domains, such as automotive, avionics, automation, energy, and health. IoT architecture is the system of numerous elements, including sensors, protocols, actuators, cloud services, and layers. IoT architecture plays an important role to provide desired services. Nowadays, tens of I...
Security is one of the main issues in Internet of Things (IoT). Encryption plays a curtail role in making these systems secure. Substitution Box (S-Box) has an effective impact in block encryption methods. Due to the restricted resource capacities of IoT nodes, providing a lightweight S-Box is a challenging problem. This paper presents a key-depend...
In a resource-constrained IoT network, end nodes like WSN, RFID, and embedded systems are used which have memory, processing, and energy limitations. One of the key distribution solutions in these types of networks is to use the key pre-distribution scheme, which accomplishes the key distribution operation offline before the resource-constrained de...
Combinatorial designs are powerful structures for key management in wireless sensor networks to address good connectivity and also security against external attacks in large scale networks. Many researchers have used key pre-distribution schemes using combinatorial structures in which key-rings, are pre-distributed to each sensor node before deploy...
Internet of Things (IoT) and smart medical devices have improved the healthcare systems by enabling remote monitoring and screening of the patients’ health conditions anywhere and anytime. Due to an unexpected and huge increasing in number of patients during coronavirus (novel COVID-19) pandemic, it is considerably indispensable to monitor patients...
Considering the internet of things (IoT), end nodes such as wireless sensor network, RFID and embedded systems are used in many applications. These end nodes are known as resource-constrained devices in the IoT network. These devices have limitations such as computing and communication power, memory capacity and power. Key pre-distribution schemes...
Assuring the security of the communication channel is a significant issue in the fog networks. Designing an efficient and secure key management scheme with a common key among nodes is a critical factor. The available key distribution schemes of hierarchical networks are not scalable and impose high communication and computation overhead to networks...
Internet of Things (IoT) is an ecosystem that can improve the life quality of humans through smart services, thereby facilitating everyday tasks. Connecting to cloud and utilizing its services are now public and common, and the experts seek to find some ways to complete cloud computing to use it in IoT, which in next decades will make everything on...
We call a ring R generalized right π-Baer, if for any projection invariant left ideal Y of R, the right annihilator of Y n is generated, as a right ideal, by an idempotent, for some positive integer n, depending on Y. In this paper, we investigate connections between the generalized π-Baer rings and related classes of rings (e.g., π-Baer, generaliz...
In cooperative peer-to-peer (P2P) networks, there are two kinds of illegal users, namely free riders and Sybil nodes. Free riders are those who try to receive services without any cost. Sybil users are rational peers that have multiple fake identities. There are some techniques available to detect free riders and Sybil users such as the tit-for-tat...
The health and safety of elderly and disabled patients who cannot live alone is an important issue. Timely detection of sudden events is necessary to protect these people, and anomaly detection in smart homes is an efficient approach to extracting such information. In the real world, there is a causal relationship between an occupant's behaviour an...
With the advent of Internet of Things (IoT), cloud service composition problem has gotten more complex along with the composition of large number of cloud services and numerous complex requirements from the users as an NP-Hard problem. In order to compose various cloud services in the IoT context, a conceptual model is required besides an effective...
The ability of data owner in secure and efficient arbitrary data sharing with others is of great importance in the outsourced encrypted data on the cloud. To protect data confidentiality, data owner encrypts his files before storing information on the cloud. Data sharing schemes are used to share encrypted files with others. Guo et al.’s data shari...
In cooperative Peer-to-Peer (P2P) networks, a number of users, called Free-riders, try to receive service from others without cooperating with them. Some others, called Sybil nodes, break the rules of the system by colluding and showing fake identities. P2P networks are highly vulnerable to these attacks. In previous research, no method has been su...
With the growing number of Web services on the internet, there is a challenge to select the best Web service which can offer more quality-of-service (QoS) values at the lowest price. Another challenge is the uncertainty of QoS values over time due to the unpredictable nature of the internet. In this paper, we modify the interval data envelopment an...
The ultimate goal of the Recommender System (RS) is to offer a proposal that is very close to the user's real opinion. Data clustering can be effective in increasing the accuracy of production proposals by the RS. In this paper, single-objective hybrid evolutionary approach is proposed for clustering items in the offline collaborative filtering RS....
A way of optimizing energy consumption in mobile ad hoc networks is topology control. Various topology control algorithms have been proposed, but a few of them have used meta-heuristic methods such as genetic algorithms, neural networks, and learning automata. This paper presents a new algorithm based on the Bayesian pursuit (BPST) algorithm. The p...
Advanced technologies such as internet of things (IoT) and clouds have significantly influenced on modern medical monitoring systems. Analytical statistics derived from massive patients' medical data via different data analysis methods, contribute in remote medical monitoring, early diagnosis of diseases, predicting clinical events, and recommendin...
The more growing discovery of cloud computing capabilities, the more likely researchers are to make
progress in this field. The ability to search over the encrypted data is one of the prerequisites for
cloud computing. A large number of data owners all over the world are interested in outsourcing
data to the cloud, being concerned about protecting...
The capacity and security of confidential message on communication channels are two important challenges in steganography. The main objective of this study is introducing a new method based on integer wavelet transform to maintain the image quality and enhance the security of the confidential message. At first a three level integer wavelet transfor...
It is important in IoT that messages are sent among sensor nodes with high security. An agreement of keys by communicating nodes is necessary. Due to the limited resource, key agreement is a serious problem in IoT. There are many key pre-distribution schemes in general networks that not suitable for IoT. This paper describes an extensible secure mo...
A way of optimizing energy consumption in mobile ad hoc networks is topology control. Various topology control algorithms have been proposed, but a few of them have used meta-heuristic methods such as genetic algorithms, neural networks, and learning automata. This paper presents a new algorithm based on the Bayesian pursuit (BPST) algorithm. The p...
Geographic routing protocols in wireless sensor networks require providing location information of sinks to source nodes. Most studies have only focused on two-dimensional (2D) sensing field, but the real-world applications of sensor networks are in a three-dimensional (3D) environment. This paper presents a new scheme based on residual design prin...
In this paper, some properties of α-skew Armendariz and central Armendariz rings have been studied by variety of others. We generalize the notions to central α-skew Armendariz rings and investigate their properties. Also, we show that if α(e) = e for each idempotent e 2 = e ∈ R and R is α-skew Armendariz, then R is abelian. Moreover, if R is centra...
Join is an essential tool for data analysis which collected from different data sources. MapReduce has emerged as a prominent programming model for processing of massive data. However, traditional join algorithms based on MapReduce are not efficient when handling skewed data. The presence of data skew in input data leads to considerable load imbala...
Spectrum allocation is a major challenge in wireless ad hoc networks due to restrictions on the number of available communication channels and also passive approaches to channel allocation in dealing with changes in the network environment, and it is impossible to achieve a perfect operational status, which includes a comprehensive communication. A...
Internet of Things (IoT) is considered as an ecosystem that contains smart objects equipped with sensors, networking and processing technologies integrating and working together to provide an environment in which smart services are taken to the end users. The IoT is leading numerous benefits into the human life through the environment wherein smart...
Wireless sensor networks as the key infrastructure of the new networking paradigm are vulnerable against different kinds of attacks. Therefore, ensuring a secure communication between the sensor nodes is important. One of the most critical issues in this regard is the key distribution mechanism. Due to the random deployment of the sensors in the ta...