Mehran Pourvahab

Mehran Pourvahab
Verified
Mehran verified their affiliation via an institutional email.
Verified
Mehran verified their affiliation via an institutional email.
  • PhD in Computer Engineering - Software Systems
  • Researcher at University of Beira Interior

About

25
Publications
10,606
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
276
Citations
Introduction
Mehran Pourvahab, IEEE Senior Member, is a researcher, developer, educator, and network engineer with a background in computer engineering and extensive experience in the fields of Medical Informatics, Data Science, Machine Learning, Networking, Cloud Security, Cloud Forensics, Software-defined Networking, and Blockchain Technology. He received his Ph.D. in computer engineering. He is working as a researcher at the University of Beira Interior (UBI), Covilhã, Portugal.
Current institution
University of Beira Interior
Current position
  • Researcher

Publications

Publications (25)
Presentation
Full-text available
Build your own private blockchain based on Ethereum
Chapter
Training feedforward neural networks (FFNN) is a complex process that requires determining the right weights and biases, crucial parameters that largely dictate the FFNN’s effectiveness. Traditional methods like gradient descent are common in FFNN training but have limitations, including the risk of becoming trapped in local minima. Evolutionary al...
Chapter
In this chapter, we focused on proposing a multi-objective strategy to address the conflicting objectives of enhancing image quality while simultaneously reducing image file size in the context of JPEG image compression, primarily through modifications to the quantisation table (QT). To this end, we employ two well-established methods: the non-domi...
Chapter
Image segmentation is crucial in image analysis and computer vision applications. Image thresholding, a popular approach due to its simplicity and robustness, becomes less efficient with an increase in thresholds due to an exhaustive search. Evolutionary algorithms like differential evolution (DE) can address this. Generalised Masi entropy (GME) le...
Chapter
In the study, a new method for analyzing Electrocardiogram (ECG) signals is suggested, which is vital for detecting and treating heart diseases. The technique focuses on improving ECG signal classification, particularly in identifying different heart conditions like arrhythmias and myocardial infarctions. An enhanced version of the differential evo...
Article
Full-text available
Worldwide, cardiovascular diseases are some of the primary causes of death; yet the early detection and diagnosis of such diseases have the potential to save many lives. Technological means of detection are becoming increasingly essential and numerous techniques have been created for this purpose, such as forecasting. Of these techniques, the time...
Article
Optimized Deep Learning (DL)-based workflows can improve the efficiency and accuracy of earthquake detection and location processes. This paper introduces a six-step automated event detection, phase association, and earthquake location workflow, which integrates the state-of-the-art Pair-Input DL model and waveform Migration Location methods (IPIML...
Preprint
Full-text available
Electrocardiogram (ECG) signals are recordings of the heart's electrical activity and are widely used in the medical field to diagnose various cardiac conditions and monitor heart function. The accurate classification of ECG signals is crucial for the early detection and treatment of heart-related diseases. This paper proposes a novel approach base...
Article
Full-text available
Cloud forensics is an intelligent evolution of digital forensics that defends against cyber-crimes. However, centralized evidence collection and preservation minimizes the reliability of digital evidence. To resolve this severe problem, this paper proposes a novel digital forensic architecture using fast-growing Software-Defined Networking (SDN) an...
Article
Full-text available
A Potential solution for solving forensic is the use of blockchain in Software Defined Networking (SDN). The blockchain is a distributed peer to peer network that can be utilized on SDN based Internet of Things (IoT) environments for security provisioning. Hence, to meet some challenges in digital forensics such as data integrity, evidence deletion...
Article
Full-text available
There are times we need to grant access to open ports and services only to certain or authorized users while they are inaccessible or hidden to others. Thus, there is needs for an effective authentication system which enables privileged users to secretly knock in close ports. Web-Knocking, is a variation of Port-Knocking (PKn), transmits data throu...
Conference Paper
Full-text available
Hackers, before to do anything, at first, try to identify the target to purpose for collecting the information and identify services running on a network to access and disabling the services. Mechanism of Port-Knocking from the perspective of the attackers is a unique way to prevent the discovery and exploitation of the services that are potentiall...
Conference Paper
Full-text available
Providing the facility of an open port for public is example of sending an invitation to an intruder. Unfortunately, lots of computer services like SMTP and HTTP need to be with open port for public. Although there are the other services that don't need to be available, and whenever we need them, must be available for. Therefore, with the use of Po...
Conference Paper
Full-text available
Providing the facility of an open port for public is example of sending an invitation to an intruder. Unfortunately, lots of computer services like SMTP and HTTP need to be with open port for public. Although there are the other services that don't need to be available, and whenever we need them, must be available for. Therefore, with the use of Po...
Article
Full-text available
Recent developments of wireless communication devices have increased the interest in wireless networks. The hidden node problem is one of the major problems which leads to packet dropping and transfer delays via blind collisions. In this paper, we discuss the design factors of some existing mechanisms to deal with hidden node avoidance, and present...
Article
Full-text available
In recent years, there has been an increasing interest in the authentication process due to the key role that it has in the network security. Port Knocking (PKn) is an authentication method in which data transmits through the closed ports. This method is prone to attacks when attackers sniff the network. This paper proposes a new method which is ca...

Network

Cited By