Mehdi Sookhak

Mehdi Sookhak
  • Doctor of Philosophy
  • Professor (Assistant) at Texas A&M University – Corpus Christi

About

97
Publications
46,432
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
4,760
Citations
Current institution
Texas A&M University – Corpus Christi
Current position
  • Professor (Assistant)
Additional affiliations
August 2019 - present
Illinois State University
Position
  • Professor (Assistant)
August 2017 - August 2019
Arizona State University
Position
  • Lecturer
January 2016 - January 2018
Carleton University
Position
  • PostDoc Position

Publications

Publications (97)
Article
Cloud computing has emerged as a new computing paradigm that offers great potential for storing data remotely. Presently, many organizations have reduced the burden of local data storage and maintenance by outsourcing data storage to the cloud. However, integrity and security of the outsourced data continues to be a matter of major concern for data...
Article
Full-text available
Cloud computing has emerged as a long dream vision of utility computing paradigm that provides reliable and resilient infrastructure for users to remotely store data, and use on demand applications and services. Currently, many individuals and organizations reduce the burden of local data storage and maintenance by outsourcing data to the cloud. Ho...
Article
Full-text available
Wireless sensor networks (WSNs) are ubiquitous and pervasive, and therefore; highly susceptible to a number of security attacks. Denial of Service (DoS) attack is considered the most dominant and a major threat to WSNs. Moreover, the wormhole attack represents one of the potential forms of the Denial of Service (DoS) attack. Besides, crafting the w...
Article
Cloud computing has emerged as a computational paradigm and an alternative to the conventional computing with the aim of providing reliable, resilient infrastructure, and with high quality of services for cloud users in both academic and business environments. However, the outsourced data in the cloud and the computation results are not always trus...
Article
Vehicular networking has become a significant research area due to its specific features and applications such as standardization, efficient traffic management, road safety and infotainment. Vehicles are expected to carry relatively more communication systems, on board computing facilities, storage and increased sensing power. Hence, several techno...
Conference Paper
This study focuses on downlink transmissions of a low earth orbit (LEO) satellite, assisted by a beyond diagonal reconfigurable intelligent surface (BD-RIS) to serve ground terminals. Toward optimizing the performance of this system, we formulate the minimization of the average age of information (AoI) achieved at ground terminals. Our formulation...
Conference Paper
This paper centers around a multi-antenna un-manned aerial vehicle (UAV) which leverages stacked intelligent metasurface (SIM) as a green technology for signal processing at the electromagnetic wave domain. To assess the performance of this system, a radio resource allocation problem is accordingly formulated for jointly optimizing the motion traje...
Preprint
Full-text available
Stacked intelligent metasurface (SIM) as an advanced signal processing paradigm enables real-time processing of electromagnetic waves at the speed of light. Benefiting from this technology, the current paper studies the downlink transmission of a wireless network, where a SIM-deployed base station (BS) serves two disjoint sets of energy-and informa...
Preprint
Full-text available
This study focuses on downlink transmissions of a low earth orbit (LEO) satellite, assisted by a beyond diagonal reconfigurable intelligent surface (BD-RIS) to serve ground terminals. Toward optimizing the performance of this system, we formulate the minimization of the average age of information (AoI) achieved at ground terminals. Our formulation...
Preprint
Full-text available
Reconfigurable intelligent surface (RIS) has emerged as a groundbreaking paradigm in shaping the future of wireless systems in late years. Derived from RISs, stacked intelligent metasurface (SIM), by enabling the real-time modulation of electromagnetic waves at the speed of light, and simultaneous transmitting and reflecting RIS (STAR-RIS), by dras...
Preprint
Full-text available
This paper centers around a multi-antenna un-manned aerial vehicle (UAV) which leverages stacked intelligent metasurface (SIM) as a green technology for signal processing at the electromagnetic wave domain. To assess the performance of this system, a radio resource allocation problem is accordingly formulated for jointly optimizing the motion traje...
Preprint
Full-text available
This endeavor centers around downlink transmission of a base station (BS), outfitted with a stacked intelligent metasurface (SIM) that realizes an energy-efficient wave-domain multiuser beamforming. The underlying network includes mobile devices with multimedia service requirements, including web surfing, HTTP live video streaming and voice-over-LT...
Preprint
Full-text available
This research investigates a wireless system in which a base station (BS), outfitted with a stacked intelligent meta-surface (SIM), performs wave-domain multiuser beamforming in downlink transmission. The communication benefits from the assistance of an active reconfigurable intelligent surface (RIS) that amplifies incoming signal strength to exten...
Article
The need for continuous coverage, as well as low-latency, and ultrareliable communication in 5G and beyond cellular networks encouraged the deployment of high-altitude platforms and low-altitude drones as flying base stations (FBSs) to provide last-mile communication where high cost or geographical restrictions hinder the installation of terrestria...
Article
Full-text available
Handling and quantifying two types of uncertainties, spatial and inherent, in land-cover segmentation using multiple satellite images constitutes a primary concern within the domain of segmenting multiple remote sensing images. Despite the comprehensive examination of the spatial uncertainty, the lack of a mathematical model addressing the inherent...
Article
As the next-generation battery substitute for IoT system, energy harvesting (EH) technology revolutionize the IoT industry with environmental friendliness, ubiquitous accessibility, and sustainability, which enables various self-sustaining IoT applications. However, due to the weak and intermittent nature of EH power, the performance of EH-powered...
Article
Full-text available
This paper investigates the applications of explainable AI (XAI) in healthcare, which aims to provide transparency, fairness, accuracy, generality, and comprehensibility to the results obtained from AI and ML algorithms in decision-making systems. The black box nature of AI and ML systems has remained a challenge in healthcare, and interpretable AI...
Conference Paper
Full-text available
This paper addresses the problem of distributed formation trajectory planning for multi-vehicle systems with collision avoidance among vehicles. Unlike some previous distributed formation trajectory planning methods, our proposed approach offers great flexibility in handling computational tasks for each vehicle when the global formation of all the...
Article
Full-text available
In recent years, the use of Software Defined Networking (SDN) has increased due to various network management requirements. Using SDN in computer network applications has brought several benefits to users, including lower operational costs, better hardware management, flexibility, and centralized network deployment. On the other hand, the Internet...
Article
Full-text available
As an emerging technology, blockchain (BC) has been playing a promising role in today's software‐defined networking (SDN)‐enabled Internet of Things (IoT) applications. Because of the salient feature of the network function virtualization (NFV) techniques, SDN can ensure an IoT system runs efficiently and smoothly in a cloud‐driven ecosystem. When...
Article
Full-text available
In recent years, the use of Software Defined Networking (SDN) has increased due to various network management requirements. Using SDN in computer network applications has brought several benefits to users, including lower operational costs, better hardware management, flexibility, and centralized network deployment. On the other hand, the Internet...
Preprint
As an emerging technology, Blockchain (BC) has been playing a promising role in today's Software Defined-Networking (SDN)-enabled Internet of Things (IoT) applications. Because of the salient feature of the Network Function Virtualization (NFV) techniques, SDN can ensure an IoT system runs efficiently and smoothly in a cloud-driven ecosystem. When...
Chapter
Full-text available
Distributed Ledger Technology (DLT) has become popular with the creation of the Bitcoin Blockchain. However, it does not fully address issues such as scalability, transaction fees, and quantum security in application to the Internet of Vehicles (IoV). The IOTA Foundation has claimed to handle these issues: The Tangle. Directed Acyclic Graph (DAG)-b...
Article
Nowadays, acquiring high spatial and temporal land surface temperature (LST) is one of the significant factors in urban climate studies. This study aims to assess the sharpening thermal imagery (TsHARP) method, which is developed for determining the LST in urban regions. Whereas the original TsHARP method correlates the Normalized Difference Vegeta...
Article
Full-text available
Recent technology has modeled VANET (vehicular adhoc network) communication well in terms of privileges to derive vehicular communication technologically to save time, energy, and money. Due to the increase in powerful technology in modern times, VANETs play a vital role in uplifting daily concerns across vehicles and vehicular identities. Hence, t...
Article
Full-text available
The manuscript represents a comeprehensive and systematic literature review on the machine learning methods in the emerging applications of the smart cities. Application domains include the essential aspects of the smart cities including the energy, healthcare, transportation, security, and pollution. The research methodology presents a state-of-th...
Article
Full-text available
In recent years, artificial intelligence has had a tremendous impact on every field, and several definitions of its different types have been provided. In the literature, most articles focus on the extraordinary capabilities of artificial intelligence. Recently, some challenges such as security, safety, fairness, robustness, and energy consumption...
Preprint
Full-text available
In this paper, we consider a cellular network demand in an urban area. We aim to cover users and serve their required data rate in a period of time using a 5G cellular network. The type of considered UAV in this scenario is The Scout B- 330 UAV helicopter which can fly up to 3 km height. In these scenarios, to find the most proper trajectory of UAV...
Preprint
Full-text available
Nowadays, Unmanned Aerial Vehicles (UAVs) have been significantly improved, and one of their most important applications is to provide temporary coverage for cellular users. Static Base Station cannot service all users due to temporary crashes because of temporary events such as ground BS breakdowns, bad weather conditions, natural disasters, trans...
Preprint
Full-text available
Due to the sustainable power supply and environment-friendly features, self-powered IoT devices have been increasingly employed in various fields such as providing observation data in remote areas, especially in rural areas or post-disaster scenarios. Generally, through multi-hop relay, the sensed data of those self-powered IoT devices are collecte...
Article
Full-text available
Myocarditis is the form of an inflammation of the middle layer of the heart wall which is caused by a viral infection and can affect the heart muscle and its electrical system. It has remained one of the most challenging diagnoses in cardiology. Myocardial is the prime cause of unexpected death in approximately 20% of adults less than 40 years of a...
Article
Full-text available
The Internet of Things (IoT) has seen a surge in mobile devices with the market and technical expansion. IoT networks provide end-to-end connectivity while keeping minimal latency. To reduce delays, efficient data delivery schemes are required for dispersed fog-IoT network orchestrations. We use a Spark-based big data processing scheme (BDPS) to ac...
Article
Full-text available
Rainfall-Runoff simulation is the backbone of all hydrological and climate change studies. This study proposes a novel stochastic model for daily rainfall-runoff simulation called Stacked Long Short-Term Memory (SLSTM) relying on machine learning technology. The SLSTM model utilizes only the rainfall-runoff data in its modelling approach and the hy...
Preprint
The ever-evolving and contagious nature of the Coronavirus (COVID-19) has immobilized the world around us. As the daily number of infected cases increases, the containment of the spread of this virus is proving to be an overwhelming task. Healthcare facilities around the world are over-burdened with an ominous responsibility to combat an ever-worse...
Article
Full-text available
The ever-evolving and contagious nature of the Coronavirus (COVID-19) has immobilized the world around us. As the daily number of infected cases increases, the containment of the spread of this virus is proving to be an overwhelming task. Healthcare facilities around the world are overburdened with an ominous responsibility to combat an ever-worsen...
Preprint
Detection and Classification of a brain tumor is an important step to provide a better understanding of its mechanism. Currently, Magnetic Reasoning Imaging (MRI) is an experimental medical imaging technique that helps the radiologist to find the tumor region. However, it requires expertise and time to test the MRI images manually. Nowadays, the ad...
Article
Full-text available
As a global community, the Internet is comprised of thousands of administrative entities that operate and interact with each other. Transferring data among these entities is possible due to the process of routing, which is challenging due to the lack of centrality. Consequently, the Border Gateway Protocol (BGP) can play a vital role in the routing...
Article
Full-text available
With the rapid development of ICT, the present world is experiencing rapid changes in the field of education. Implementation of e-learning and ICT in the education system could allow teachers to upgrade and improve their lectures. However, from the perspective of value co-creation behavior in learning communities, conventional learning and e-learnin...
Article
Full-text available
Insecure and portable devices in the smart city’s Internet of Things (IoT) network are increasing at an incredible rate. Various distributed and centralized platforms against cyber-attacks have been implemented in recent years, but these platforms are inefficient due to their constrained levels of storage, high energy consumption, the central point...
Article
Full-text available
These days, with the emerging developments in wireless communication technologies, such as 6G and 5G and the Internet of Things (IoT) sensors, the usage of E-Transport applications has been increasing progressively. These applications are E-Bus, E-Taxi, self-autonomous car, E-Train and E-Ambulance, and latency-sensitive workloads executed in the di...
Article
Full-text available
Software-Defined Networking (SDN) and Blockchain are leading technologies used worldwide to establish safe network communication as well as build secure network infrastructures. They provide a robust and reliable platform to address threats and face challenges such as security, privacy, flexibility, scalability, and confidentiality. Driven by these...
Article
Full-text available
Software-Defined Networking (SDN) and Blockchain are leading technologies used worldwide to establish safe network communication as well as build secure network infrastructures. They provide a robust and reliable platform to address threats and face challenges such as security, privacy, flexibility, scalability, and confidentiality. Driven by these...
Article
Full-text available
Nowadays, intelligent systems play an important role in a wide range of applications, including financial ones, smart cities, healthcare, and transportation. Most of the intelligent systems are composed of prefabricated components. Inappropriate composition of components may lead to unsafe, power-consuming, and vulnerable intelligent systems. Altho...
Article
Emerging technologies are playing a critical role in the evolution of healthcare systems by presenting eHealth to provide high-quality services and better health to wide-range of patients. Achieving the eHealth goals highly depends on employing modern information and communication technologies (ICTs) to securely and efficiently collect and transmit...
Article
In recent years driving violations have increased in big and crowded cities specially in developing countries. This has resulted in escalation of traffic congestions and number of accidents, making them difficult to handle by a central managing authority. New technologies can be used in order to mitigate this problem. Hence, in this paper, we propo...
Article
Full-text available
The Unified Medical Language System (UMLS) is an internationally recognized medical vocabulary that enables semantic interoperability across various biomedical terminologies. To use its knowledge, the users must understand its complex knowledge structure, a structure that is not interoperable or is not compliant with any known biomedical and health...
Article
Full-text available
The world is witnessing the daily emergence of a vast variety of online social networks and community detection problem is a major research area in online social network studies. The existing community detection algorithms are mostly edge-based and are evaluated using the modularity metric benchmarks. However, these algorithms have two inherent lim...
Article
Full-text available
The unprecedented growth of energy consumption in data centers created critical concern in recent years for both the research community and industry. Besides its direct associated cost; high energy consumption also results in a large amount of CO2 emission and incurs extra cooling expenditure. The foremost reason for overly energy consumption is th...
Conference Paper
Even though the cloud paradigm and its associated services has been adopted in various enterprise applications, there has been major issues with regard to authenticating users’ critical data. Single Sign on (SSO) is a user authentication technique through which a server authenticates and allows a user to use a single aspect of login credentials, fo...
Preprint
Full-text available
Previous studies show that information security breaches and privacy violations are important issues for organisations and people. It is acknowledged that decreasing the risk in this domain requires consideration of the technological aspects of information security alongside human aspects. Employees intentionally or unintentionally account for a si...
Article
Previous studies show that information security breaches and privacy violations are important issues for organisations and people. It is acknowledged that decreasing the risk in this domain requires consideration of the technological aspects of information security alongside human aspects. Employees intentionally or unintentionally account for a si...
Article
Augmentation and virtualization of resource-poor wireless/ mobile smart things are opening the doors to novel contextaware crowd sensing applications, that allow geographically distributed people/machine users to capture, analyze and share environmental local features of social interest. In order to implement the resulting network of the so-called...
Article
In recent years, we have witnessed tremendous advances in cloud data centers (CDCs) from the point of view of the communication layer. A recent report from Cisco Systems Inc demonstrates that CDCs, which are distributed across many geographical locations, will dominate the global data center traffic flow for the foreseeable future. Their importance...
Article
Full-text available
Blockchain as an emerging technology is revolutionizing several industries and its abundant privileges have opened up a bunch of research directions in various industries; thereby it has acquired many interests from the research community. The rapid evolution of Blockchain research papers in recent years has resulted in a need to conduct research s...
Article
With recent advances of Information and Communication Technology (ICT), smart city has been emerged as a new paradigm to dynamically optimize the resources in cities and provide better facilities and quality of life for the citizens. Smart cities involve a variety of components, including ubiquitous sensing devices, heterogeneous networks, large-sc...
Article
Cloud computing has arisen as the mainstream platform of utility computing paradigm that offers reliable and robust infrastructure for storing data remotely, and provides on demand applications and services. Currently, establishments that produce huge volume of sensitive data, leverage data outsourcing to reduce the burden of local data storage and...
Chapter
During the last decade, researchers and developers have been attracted to Vehicular Ad-hoc Network (VANET) research area due to its significant applications, including efficient traffic management, road safety, and entertainment. Several resources such as communication, on-board unit, storage, computing, and endless battery are embedded in the vehi...
Article
Full-text available
As healthcare is one of major socioeconomic problems in cities, mobile healthcare network becomes one of core components of smart cities, which would improve urban healthcare environment. However, there are wide privacy concerns as personal health information is outsourced to untrusted cloud servers. It’s a promising method to encrypt the health da...
Article
Full-text available
Fog computing has been emerged as a promising solution for accommodating the surge of mobile traffic and reducing latency, which are known as the inherent problem of cloud computing. The fog services including computation, storage, and networking are hosted in vicinity of end users (edge of network) and as a result a reliable access is provisioned...
Article
Fog computing has been emerged as an attractive solution to the distributed application of Internet of Things, and could provide low-latency, highly mobile and geo-distributed services distinguishing from cloud. While fog computing offers numerous benefits, it is also facing with various security challenges, in which access control is one of the fu...
Article
Vehicular infotainment systems have attracted great interests from both academia and industry. A vehicular infotainment system includes two parts, the information part and the entertainment part, which are integrated together to provide a unified platform to drivers and passengers. Although some excellent works have been done on vehicular infotainm...
Article
Cloud computing is currently emerging quickly as a client-server technology structure and, currently, providing distributed service applications. However, given the availability of a diverse range of wireless access technologies, people expect continuous connection to the most suitable technology that matchers price affordability and performance go...
Article
Full-text available
Cloud computing has emerged as a popular computing model to process data and execute computationally intensive applications in a pay-as-you-go manner. Due to the ever-increasing demand for cloud-based applications, it is becoming difficult to efficiently allocate resources according to user requests while satisfying the service-level agreement betw...
Article
Full-text available
The popularity of network virtualization has recently regained considerable momentum because of the emergence of OpenFlow technology. It is essentially decouples a data plane from a control plane and promotes hardware programmability. Subsequently, OpenFlow facilitates the implementation of network virtualization. This study aims to provide an over...
Article
With the thriving growth of the cloud computing, the security and privacy concerns of outsourcing data have been increasing dramatically. However, because of delegating the management of data to an untrusted cloud server in data outsourcing process, the data access control has been recognized as a challenging issue in cloud storage systems. One of...
Conference Paper
During the last decade, researchers and developers have been attracted to Vehicular Ad-hoc Network (VANET) research area due to its significant applications, including efficient traffic management, road safety, and entertainment. Several resources such as communication, on-board unit, storage, computing, and endless battery are embedded in the vehi...
Article
Today, the Internet can be considered to be a basic commodity, similar to electricity, without which many businesses simply cannot operate. However, information security for both private and business aspects is important. Experts believe that technology cannot solely guarantee a secure environment for information. Users' behaviour should be conside...
Article
Full-text available
In Mobile Cloud Computing (MCC), migrating an application processing to the cloud data centers enables the execution of resource-intensive applications on the mobile devices. However, the resource-intensive migration approaches and the intrinsic limitations of the wireless medium impede the applications from attaining optimal performance in the clo...
Article
Wireless sensor networks (WSNs) are ubiquitous and pervasive, and therefore; highly susceptible to a number of security attacks. Denial of Service (DoS) attack is considered the most dominant and a major threat to WSNs. Moreover, the wormhole attack represents one of the potential forms of the Denial of Service (DoS) attack. Besides, crafting the w...
Article
Full-text available
Man-At-The-End (MATE) attacks and fortifications are difficult to analyze, model, and evaluate predominantly for three reasons: Firstly, the attacker is human and therefore, utilizes motivation, creativity, and ingenuity. Secondly, the attacker has limitless and authorized access of the target. Thirdly, all major protections stand up to a determine...
Article
Mobile Cloud Computing (MCC) leverages computational clouds for mitigating resources limitations in mobile devices. However, the mobility attribute of mobile devices and the intrinsic limitations of wireless access medium obstruct to achieve the goal of seamless connectivity for accessing distributed services in MCC. Mobility involves the issues of...
Article
Full-text available
Cloud computing has emerged as a long dream vision of computational paradigm where computing as a utility and storing data remotely has a great potential. Presently, enterprise and businesses reduce the burden of local data storage and maintenance by outsourcing data to the cloud. The outsourced data, however, in the cloud and the computation outco...
Article
Despite of substantial technological advancements in the recent years, Smart Mobile Devices (SMDs) are still low potential computing devices. Therefore, Mobile Cloud Computing (MCC) deploys computational offloading for augmenting SMDs. The contemporary Computational Offloading Frameworks (COFs) implement resources intensive procedures for computati...
Article
In recent years, research on Wireless Sensor Networks (WSNs) has become one of the main topics in electronic and computer fields. Since, the WSNs include many low cost and low power sensor nodes and battery replacement in harsh environments is usually impossible, an energy-efficient paradigm for all layers of protocol stack specially routing scheme...
Article
In recent years, research on Wireless Sensor Networks (WSNs) has become one of the main topics in electronic and computer fields. Since, the WSNs include many low cost and low power sensor nodes and battery replacement in harsh environments is usually impossible, an energy-efficient paradigm for all layers of protocol stack specially routing scheme...
Conference Paper
Providing security for sensor nodes is one of the important issues in WSNs because they are deployed in the harsh environment. WSNs are distributed in nature and preparing centralized security solutions cannot be a suitable for WSNs. There are various sensor holes that may be formed in WSNs and create variations in network topologies and also threa...
Article
Full-text available
Abstract—Book distribution is one of the main parts in the cycle of book trade. If we want to solve some problems like accumulation the books in the shelves for a long time, we should have a powerful distribution system for books among bookstores. In developed countries, they use technology based on booksellers’ needs and growth the rate of their o...
Article
Full-text available
In the years, routing protocols in wireless sensor networks (WSN) have been substantially investigated by researches. Most state-of-the-art surveys have focused on reviewing of wireless sensor network .In this paper we review the existing secure geographic routing protocols for wireless sensor network (WSN) and also provide a qualitative comparison...

Network

Cited By