Marjan Kuchaki Rafsanjani

Marjan Kuchaki Rafsanjani
  • Professor (Full) at Shahid Bahonar University of Kerman

About

205
Publications
29,795
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,822
Citations
Introduction
Marjan Kuchaki Rafsanjani currently works at the Department of Computer Sciences, Shahid Bahonar University of Kerman. Marjan does research in Computer Science, Computer Engineering and Telecommunications Engineering.
Current institution
Shahid Bahonar University of Kerman
Current position
  • Professor (Full)

Publications

Publications (205)
Article
Full-text available
Software Defined Networks (SDN) face many security challenges today. A great deal of research has been done within the field of Intrusion Detection Systems (IDS) in these networks. Yet, numerous approaches still rely on deep learning algorithms, but these algorithms suffer from complexity in implementation, the need for high processing power, and h...
Article
Full-text available
A Mobile Ad hoc Network (MANET) consists of a group of autonomous mobile nodes with wireless transmission capability without using any existing infrastructure or centralized administration. The MANET environment is particularly vulnerable due to its dynamic topology, less powerful mobile devices and distributed environment. Current solutions for se...
Article
Full-text available
Intrusion Detection Systems (IDSs) for Mobile Ad hoc Networks (MANETs) are necessary when we deploy MANETs in reality. In this paper, we focus on the protection of MANET routing protocols. Therefore, we present a new intrusion detection architecture based on quantitative, agents, and clusters that is suitable for multi-hop mobile ad hoc networks. I...
Article
Full-text available
The Internet of Things (IoT) offers substantial potential for enhancing real-time interaction between various smart components within a network. To reduce communication costs in the IoT infrastructure, wireless sensors can be employed as a cost-effective solution. The widespread applications of wireless sensor networks (WSNs) across various domains...
Article
Full-text available
In the big-data era, conveying information related to data can sometimes lead to redundancy and irrelevance. This large volume of information not only lacks benefits for optimal decision-making but also increases the costs associated with data collection, storage, and processing. In this view, dimension reduction can be an effective solution. There...
Preprint
Full-text available
Software Defined Networks (SDN) face many security challenges today. A great deal of research has been done within the field of Intrusion Detection Systems (IDS) in these networks. Yet, numerous approaches still rely on deep learning algorithms. These algorithms suffer from complexity in implementation, high processing power and high memory consump...
Article
Full-text available
This paper presents an approach based on deep learning for accurate Electrocardiogram signal classification. The electrocardiogram is a significant signal in the realm of medical affairs, which gives vital information about the cardiovascular status of patients to heart specialists. Manually meticulous analysis of signals needs high and specific sk...
Article
This study presented a comprehensive framework to explain how the knowledge spillover from foreign direct investment (FDI) influences domestic new venture performance. Referring to external (formal and informal institutional distances) and internal (foreign experience and learning orientation) factors, this study examined the external and internal...
Chapter
Multi-label classification is an important task in machine learning applications. However, today, these methods have more challenges due to high-dimensional data. Existing methods in the literature have not yet reached an acceptable performance, and as the number of labels in the dataset increases, their performance becomes weaker. Thus providing e...
Chapter
Blockchain is a new and revolutionary technology whose use is increasing in recent years. The blockchain network has recently been used in a wide variety of scenarios far beyond digital currencies, such as the Internet of Things (IoT), unmanned aerial vehicles (UAVs), and healthcare, where the need for collaboration between different blockchains is...
Chapter
Email is used in business and education and almost everywhere for communications. Email is categorized into many categories based on its content like primary, social, promotional, and spam. So spams are also a sub-category under all the categories. Spam may be in the form of text messages,web messages, images and others also. In this paper, we are...
Article
Full-text available
The security flaws in cyber security have always put the users and organizations at risk, which as a result created catastrophic conditions in the network that could be either irreversible or sometimes too costly to recover. In order to detect these attacks, Intrusion Detection Systems (IDSs) were born to alert the network in case of any intrusions...
Article
Because of the overgrowth of data, especially in text format, the value and importance of multi‐label text classification have increased. Aside from this, preprocessing and particularly intelligent feature selection (FS) are the most important step in classification. Each FS finds the best features based on its approach, but we try to use a multi‐s...
Article
With regard to large dimensions of contemporary data sets and restricted computational time of intelligent systems, reducing the dimensions of data sets is necessary. Feature selection is a practical way to remove a set of redundant, irrelevant, and noisy features. In this way, the speed of decision‐making procedure will be increased while the accu...
Article
Achieving a sustainable state in smart cities would require ongoing monitoring and evaluation of all activities in different dimensions. Hence, it is essential to use smart systems and adaptable, reliable, and controllable schemes in all dimensions of smart cities. This paper focuses on the on-demand wireless rechargeable sensor networks (WRSNs) to...
Conference Paper
Full-text available
Software Defined Network (SDN) has gained a huge popularity in the world of computer networks for its vast functionalities and its strength in providing scalability and maneuverability in the network. However, security challenges have always been among the top concerns that are required to be addressed. Many approaches regarding the security of SDN...
Article
This study takes a new perspective on the procedural content generation (PCG) evaluation problem, extracts current PCG evaluation methods from previous works, and presents a novel classification of these methods while showing each method’s capabilities. Also, the present study introduces a novel concept called Panda Evaluation. Additionally, the so...
Article
Full-text available
Nowadays, wireless sensor networks (WSNs) are used to monitor and collect data in various environments. One of the main challenges in WSNs is the energy consumption due to the deployed sensor nodes in WSNs are energy-constrained. Clustering method is a solution for this problem and the cluster head (CH) selection process is a major part of the clus...
Article
Different extensions of fuzzy sets like intuitionistic, picture, Pythagorean, and spherical have been proposed to model uncertainty. Although these extensions are able to increase the level of accuracy, imposing rigid restrictions on the grades are the main problem of them. In these types of fuzzy sets, the value of grades and also the sum of them...
Article
Full-text available
Due to the growth of the internet and internet-based software applications, cloud data center demand has increased. Cloud data centers have thousands of servers that are 24×7 working for users; it is the strong witness of enormous energy consumption for the operation of the cloud data center. However, server utilization is not remaining the same al...
Article
Full-text available
The vehicular internet of things (VIoT) network is connecting smart commuters to elevate traffic problems and effectiveness that help to improve driving conditions for vehicles. Every ITS-based vehicle OBU and commuter might be interchangeable and used to give access permission for the various services during transportation such as infotainment, em...
Article
Full-text available
Human activity recognition (HAR) is a crucial and challenging classification task for a range of applications from surveillance to assistance. Existing sensor-based HAR systems have limited training data availability and lack fast and accurate methods for robust and rapid activity recognition. In this paper, a novel hybrid HAR technique based on CN...
Article
Full-text available
Cloud computing resource privacy is important and it becomes stronger when image-based security is applied. Most cloud service providers provision resources for images to the end users. Numerous encryption strategies are applied to safeguard information of the image while empowering visual component extractions. The work uses wavelet domain techniq...
Article
Full-text available
Invasive cancer is the biggest cause of death worldwide, especially among women. Early cancer detection is vital to health. Early identification of breast cancer improves prognosis and survival odds by allowing for timely clinical therapy. For accurate cancer prediction, machine learning requires quick analytics and feature extraction. Cloud-based...
Conference Paper
Full-text available
دیابت نوعی بیماری مزمن است که با افزایش سطح قند خون مرتبط است. براساس دادههای سازمان بهداشت جهانی ، ۴۲۲میلیون بزرگسال در جهان به دیابت مبتلا هستند و با توجه به فراگیر شدن بیماری دیابت تعداد افراد مبتلا به این بیماری روز به روز افزایش مییابد. بیتوجهی به تشخیص و درمان این بیماری منجر به بروز برخی مشکلات اساسی در کلیهها ، قلب و عروق، چشمها و ... میشود...
Article
Full-text available
In recent years, many researchers have used chaos maps to encrypt digital images due to their unpredictability, ergodicity, and sensitivity to initial values. This paper introduces a novel image encryption algorithm based on an integrated chaos map and bit-level diffusion technique. First, a novel multi-directional diffusion technique is applied to...
Article
Interval data are usually applied where inaccuracy and variability must be considered. This paper presents a learning method for Interval Extreme Learning Machine (IELM) in classification. IELM has two steps similar to well known ELM. At first weights connecting the input and the hidden layers are generated randomly and in the second step, ELM uses...
Article
Nowadays, most real-world datasets suffer from the problem of imbalanced distribution of data samples in classes, especially when the number of data representing the larger class (majority) is much greater than that of the smaller class (minority). In order to solve this problem, various types of undersampling or oversampling techniques have been p...
Article
Full-text available
Vehicular Ad hoc Networks (VANETs) as a subset of mobile ad hoc networks which allow communication between any vehicle with other adjacent vehicles, road side units and infrastructure. In these networks, the purpose is to enhance the security, improve the management of urban and road traffic and provide services to the passenger. Due to problems su...
Article
Vehicular Ad hoc Networks (VANETs) that are considered as a subset of Mobile Ad hoc Networks (MANETs) can be applied in the field of transportation especially in Intelligent Transportation Systems (ITS). The routing process in these networks is a challenging task due to rapid topology changes, high vehicle mobility and frequent disconnection of lin...
Article
Full-text available
The clustering of big data streams has become a challenging task due to time and space constraints of the hardware and decreasing accuracy when the dimensionality of input data grows in time. In this paper, fuzzy growing neural gas is introduced, an online fuzzy approach for clustering data streams based on the growing neural gas algorithm, by adop...
Article
Due to an oversight of the author, the principal author’s name was published incorrectly in the author list and in the Fig. (3): Shakeel et al. (2019) have been changed to Shakeel et al. (2020) and Palani and Venkata-lakshmi (2019) have been changed to Palani and Venkatalakshmi (2018) in the article entitled “A Review on Lung Cancer Diagnosis Using...
Article
In recent years, mobile ad-hoc networks have been used widely due to advances in wireless technology. These networks are formed in any environment that is needed without a fixed infrastructure or centralized management. Mobile ad-hoc networks have some characteristics and advantages such as wireless medium access, multi-hop routing, low cost devel...
Article
Intrusion can compromise the integrity, confidentiality, or availability of a computer system. Intrusion Detection System (IDS) is a type of security software designed to monitor network traffic and identify network intrusions. In this paper, A Fuzzy Rule – Based classification system is used to detect intrusion in a computer network. In order to i...
Article
Wireless Sensor Networks (WSNs) are the main component in the Internet of Things (IoT) and smart cities to sense our environment, gather essential and meaningful data, and forward it to the base station (BS). Nowadays, IoT utilizes WSN as a necessary platform for sensing and communication of the data. One of the main strategies to minimize consumpt...
Article
Full-text available
Cloud computing has been one of significant domains of processing service in social networks like the internet and local networks in recent years. One of the main problems in cloud computing is placing a virtual server onto physical servers. This problem will have a remarkable effect on energy consumption, because if a suitable placement is not cho...
Chapter
Plants are one of the most important and most usable of resources for human, which are closely related to human life. This close relationship creates the necessity to distinguish plant species. First, the action of recognition is done by the expert humans, which has limitations and problems. With the rapid development of the image processing and th...
Chapter
Computer networks are very functional in different fields so, the security of them should be provided. Many methods have been proposed for intrusion detection in computer networks. Software methods have been studied more than other methods. Machine learning methods have a good performance. In this paper, some of classification and clustering method...
Chapter
Full-text available
In vehicular ad hoc network (VANET), which is considered as a type of mobile ad hoc network (MANET), communication occurs between neighbor vehicles and also roadside equipment and vehicles. Due to the characteristics of VANET, there are chances of a number possible attack in this network. In this paper, an anomaly detection system that uses cluster...
Chapter
Plants are one of the most widely used resources for humans in different fields. Therefore, the distinction between the plant species is important and it is referred to as the plant detection system. Until now, this task has been done by the expert botanists which is an overwhelming and time consuming task. Moreover, there is a lack of the memory a...
Chapter
Cloud is a new concept in Internet technology and has brought many benefits, particularly, in the field of computing. Cloud has changed how on-demand resources are allocated to the different user requests and has provided more optimal resource utilization. Tasks (user requests) have different kinds, including deadline-based tasks having time-relate...
Article
Full-text available
Cloud computing has gained huge attention over the past decades because of continuously increasing demands. There are several advantages to organizations moving toward cloud-based data storage solutions. These include simplified IT infrastructure and management, remote access from effectively anywhere in the world with a stable Internet connection...
Article
Nowadays, the most important aspects of wireless sensor networks (WSNs) are to make optimal use of and direct the limited energy of sensor nodes towards the desired application and prolong the network lifetime for that application. Although a few studies exist that have addressed these special goals, they have been mostly focused on the process of...
Article
The main objects of supply chain management are reducing the risk of supply chain and production cost, increasing the income, improving the customer services, optimizing the achievement level and business processes, which would increase the ability, competency, customer satisfaction and profitability. Further, the process of selecting an appropriat...
Conference Paper
Although clustering algorithms are a popular way to find the relationship among a collection of data, these algorithms have to deal with various types of challenges such as slow convergence rate, converging to local optima, and requiring the number of clusters in advance. In order to solve these drawbacks in one of the most famous clustering algori...
Article
Due to the serious consequences of lung cancer, medical associations are using computer-aided diagnostic procedures to more accurately diagnose cancer. In spite of the damaging consequences of lung cancer on the body, the lifetime of cancerous people can be extended by early diagnosis. Data mining techniques are practical ways to diagnose lung canc...
Conference Paper
This article uses a distributed (multi-agent) deep Q- learning (DDQL) approach to solve the multiple sequence alignment (MSA) problem, an NP-complete problem. The MSA problem alludes to the Deoxyribonucleic acid (DNA), Ribonucleic acid (RNA), or protein initial sequence arrangement process to maximize their similarity regions. The problem is modele...
Article
In today’s world, a major challenge is to conserve and make optimal use of energy. This is a critical matter in wireless sensor networks due to their wide application in different areas. More importantly, scant attention has been paid to the use of node energy for certain applications in such networks. This study used the Shuffled Frog Leaping Algo...
Article
Vehicular ad hoc networks (VANETs) are considered as a subset of mobile ad hoc networks (MANETs) that can be used in the transportation field. These networks considerably improve the traffic safety and accident prevention. Because of the characteristics of VANETs such as self-organization, frequent link disconnections and rapid topology changes, de...
Article
Predicting chaotic time series is an applicable issue, so that many scientists have introduced different methods to predict their behavior. Artificial neural networks are a tool that forecasts system behavior. These tools should be trained and back propagation algorithms used as learner. But this training process may be falling into trap of local opt...
Article
Predicting chaotic time series is an applicable issue so many scientists have introduced different methods to predict their behavior. Artificial neural networks are a tool that forecasts system behavior. These tools should be trained and backpropagation algorithms used as learners. But this training process may be falling into trap of local optimum...
Article
Job shop scheduling problem is an NP-hard problem. This paper proposes a new hybrid genetic algorithm to solve the problem in an appropriate way. In this paper, a new selection criterion to tackle premature convergence problem is introduced. To make full use of the problem itself, a new crossover based on the machines is designed. Furthermore, a ne...
Article
Full-text available
In the present paper, we use a deep reinforcement learning (DRL) approach for solving the multiple sequence alignment problem which is an NP-complete problem. Multiple Sequence Alignment problem simply refers to the process of arranging initial sequences of DNA, RNA or proteins in order to maximize their regions of similarity. Multiple Sequence Ali...
Article
In today's world that all sciences and technologies, including Wireless Sensor Networks (WSNs) are dealing with the improvement of the existing solutions, we are looking for time-saving and cost-effective approaches that unveil new methods and concepts in the intended field. Survey studies provide a quick and comprehensive access to these concepts...
Chapter
Over recent years, the usage of social, biologic, communication and the World Wide Web networks is widely increased. Each of these networks consists of many complex and various data that can be modeled as a graph. This graph is composed of a set of nodes and edges that each node model an entity in these networks and connection between two entities...
Article
The importance of Wireless Sensor Networks (WSNs) has increased owing to their extensive advances, allowing integration of nano-sensors, wireless networks, and smart software. The main challenge in WSNs is the fast sensor energy discharging. One of the most effective approaches to deal with this issue is clustering and selecting appropriate cluster...
Article
Full-text available
Vehicular ad hoc networks (VANETs) are a subset of mobile ad hoc networks that provide communication services between nearby vehicles and also between vehicles and roadside infrastructure. These networks improve road safety and accident prevention and provide entertainment for passengers of vehicles. Due to the characteristics of VANET such as self...
Article
In this paper, we propose clustering algorithm based on the membership degree of node for mobile ad hoc networks (CABMD). The aim of CABMD focuses on cluster-head election and cluster formation. The cluster - head election is based on quality of node that is calculated by a combination of characteristics such as connectivity, energy and mobility of...
Article
These days, community detection is an important field to understand the topology and functions in the complex networks. In this article, we propose a novel Community Detection Algorithm based on Structural Similarity (CDASS) that executed in two consecutive phases. In the first phase, we randomly remove some low similarity edges. Therefore, the net...
Article
Full-text available
In the last time some papers were devoted to the study of the connections between binary block codes and BCK-algebras. In this paper, we try to generalize these results to n-ary block codes, providing an algorithm which allows us to construct a BCK-algebra from a given n-ary block code. In more details, we proved that to each n-ary block code V we...
Article
Full-text available
In E-commerce, numbers of transactions are increasing day by day in B2B and B2C trade. Online negotiation is possible because of automated negotiation. Autonomous entities such as agents could help in these situations. Providing an offer which has maximum utilities for both trading parties into possible shortest time is the main aim of this work. P...
Article
Cloud computing has emerged as a main approach for managing huge distributed data in different areas such as scientific operations and engineering experiments. In this regard, data replication in Cloud environments is a key strategy that reduces response time and improves reliability. One of the main features of a distributed environment is to repl...
Article
Full-text available
In recent years, there has been a marked increase in the use of wireless sensor networks in various environments such as crisis areas, military operations, and monitoring systems. These networks do not use a fixed network infrastructure and therefore they are a popular choice for highly dynamic environments. One of the main concerns in these networ...
Article
Full-text available
Mobile ad hoc networks (MANETs) are a group of mobile nodes that are connected without using a fixed infrastructure. In these networks, nodes communicate with each other by forming a single-hop or multi-hop network. To design effective mobile ad hoc networks, it is important to evaluate the performance of multi-hop paths. In this paper, we present...
Conference Paper
Mobile ad hoc networks (MANETs) are a group of mobile nodes that are connected without using a fixed infrastructure. In these networks, nodes communicate with each other by forming a single-hop or multi-hop network. To design effective mobile ad hoc networks, performance evaluation of multi-hop paths is important. In this paper, we present a mathem...
Article
In this paper, we used four types of artificial neural network (ANN) to predict the behavior of chaotic time series. Each neural network that used in this paper acts as global model to predict the future behavior of time series. Prediction process is based on embedding theorem and time delay determined by this theorem. This ANN applied to the time...
Preprint
In the last time some papers were devoted to the study of the con- nections between binary block codes and BCK-algebras. In this paper, we try to generalize these results to n-ary block codes, providing an algorithm which allows us to construct a BCK-algebra from a given n-ary block code.
Article
Nowadays, companies are paying more attention to supply chain management in order to achieve success in the competitions and keep the customers satisfied. Therefore, supplier selection is of prime importance in a supply chain which has a key role in determining the success or failure of a business. In this paper, fuzzy multi-objective linear progra...
Article
In recent years, wireless sensor networks (WSNs) have been utilized widely. Clustering is one of the methods for applying these networks energy-efficiently. In this field, many protocols have been introduced. LEACH is one of the most important clustering protocols which has attracted the attention of researchers. Therefore, prior studies have endea...
Conference Paper
Full-text available
Mobile ad hoc networks (MANETs) are a group of mobile nodes that are connected without using a fixed infrastructure. In these networks, nodes communicate with each other by forming a single-hop or multi-hop network. To design effective mobile ad hoc networks, performance evaluation of multi-hop paths is important. In this paper, we present a mathem...
Article
Ant Colony Optimization (ACO) is an optimization algorithm inspired by the behavior of real ant colonies to approximate the solutions of difficult optimization problems. In this paper, ACO is introduced to tackle the image edge detection problem. The proposed approach is based on the distribution of ants on an image; ants try to find possible edges...

Network

Cited By