
Seyed Reza Kamel TabbakhIslamic Azad University Mashhad Branch | IAUM · Department of Software Engineering
Seyed Reza Kamel Tabbakh
PhD
About
47
Publications
6,520
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
461
Citations
Citations since 2017
Additional affiliations
January 2006 - September 2016
Publications
Publications (47)
Many studies have used sensors attached to adults in order to collect signals by which one can carry out analyses to predict falls. In addition, there are research studies in which videos and photographs were used to extract and analyze body posture and body kinematics. The present study proposes an integrated approach consisting of body kinematics...
Recently, extensive research has been focused on population-based and nature-inspired optimization algorithms. Such as war strategy algorithm, particle swarms algorithm, gray wolves algorithm, and other algorithms. Depending on their nature, each algorithm has various applications in different sciences. Despite their benefits, there are a few probl...
Real-time market prediction tool tracking public opinion in specialized newsgroups and informative market data persuades investors of financial markets. Previous works mainly used lexicon-based sentiment analysis for financial markets prediction, while recently proposed transformer-based sentiment analysis promise good results for cross-domain sent...
The advent of the Internet of Things brings a wave of research, technology, and computing. The Internet of Things has brought a concept called the fog computing, which has launched many discussions in the scientific community. In a fog environment, a requested service decomposed into a set of tasks and applied with an optimal approach to schedule t...
One of the main concerns of power generation systems around the world is power theft. This research proposes a framework that merges clustering and classification together in order to power theft detection. Due to the fact that most datasets do not have abnormal samples or are few, we have added abnormal samples to the original datasets using artif...
Gastric cancer is the second most common cancer in the world. Due to the time-consuming diagnosis of the disease, it is essential to use new methods (e.g., computer science) for early diagnosis. Among various computer-based detection methods, artificial intelligence algorithms have attracted great attention today. The present study aimed to increas...
Diabetes signifies different types of metabolic diseases that cause high blood glucose, either because of insufficient insulin production or because the body cells fail to respond to insulin the body makes normally. Early detection of diabetes remains necessary in today's healthcare industry in order to reduce the mortality rate caused by kidney fa...
Various methods have been proposed to diagnose renal failure based on data mining and artificial intelligence techniques. The use of data mining approaches, renal failure could be predicted based on several features and risk factors that exacerbate the condition. At the same time, each is associated with issues such as complex computation and a lon...
The purpose of multi-objective optimization is to simultaneously optimize several objective functions that are usually in conflict with each other. An acceptable solution is one that can strike a trade-off between the results of these functions. Although, multi-objective evolutionary algorithms have a good history in solving multi-objective problem...
Brain tumors are among the most serious cancers that can have a negative impact on a person's quality of life. The magnetic resonance imaging (MRI) analysis detects abnormal cell growth in the skull. Recently, machine learning models such as artificial neural networks have been used to detect brain tumors more quickly. To classify brain tumors, thi...
Air traffic flow management is one of the most challenging work systems in the world. The issue of aircraft traffic arrangement to prevent interference and flight delays is one of the most important issues in the field of air traffic flow management. In most researches in this field, incoming or outgoing flights are usually dealt with separately an...
The analysis of various data is a challenging issue in the field of air traffic flow management (ATFM). Managing a large volume of data and their correct interpretation plays a key role in the prevention of air accidents, human errors, and flight interactions. In general, pilots and flight navigators deal with massive and variety information, inclu...
Nowadays this concept has been widely assessed due to its complexity and sensitivity for the beneficiaries, including passengers, airlines, regulatory agencies, and other organizations. To date, various methods (e.g., statistical and fuzzy techniques) and data mining algorithms (e.g., neural network) have been used to solve the issues of air traffi...
Feature selection is a process for the elimination of irrelevant and redundant features from a dataset in order to improve learning performance in terms of accuracy and time to build a model from the subsets. The conventional techniques in this regard have limitations such as the high computational overhead for training, even in moderate datasets....
The analysis of various data is a challenging issue in the field of air traffic flow management (ATFM). Managing a large volume of data and their correct interpretation plays a key role in the prevention of air accidents, human errors, and flight interactions. In general, pilots and flight navigators deal with massive information, including flight...
Flight delay is inevitable and it plays an important role in both profits and loss of the airlines. An accurate estimation of flight delay is critical for airlines because the results can be applied to increase customer satisfaction and incomes of airline agencies. There have been many researches on modeling and predicting flight delays, where most...
Air traffic management refers to the activities required for the efficient and safe management of the national air system (NAS) for each country. This concept has been widely assessed due to its complexity and sensitivity for the beneficiaries, including passengers, airlines, regulatory agencies, and other organizations. To date, various methods (e...
Air traffic management refers to the activities required for the efficient and safe management of the national air system (NAS) for each country. This concept has been widely assessed due to its complexity and sensitivity for the beneficiaries, including passengers, airlines, regulatory agencies, and other organizations. To date, various methods (e...
Today, gastric cancer is one of the diseases which affected many people's life. Early detection and accuracy are the main and crucial challenges in finding this kind of cancer. In this paper, a method to increase the accuracy of the diagnosis of detecting cancer using lint and colour features of tongue based on deep convolutional neural networks an...
In this study, a priority-aware lightweight secure sensing model for body area networks with clinical healthcare applications in internet of things is proposed. In this model, patients’ data is labeled according to the proposed prioritizing mechanism. This provides a prioritized and delay-less service in the server side for the patients with critic...
A brain tumor is an abnormal growth of cells inside the skull. Malignant brain tumors are among the most dreadful types of cancer with direct consequences such as cognitive decline and poor quality of life. Analyzing magnetic resonance imaging (MRI) is a popular technique for brain tumor detection. In this paper, we use these images to train our ne...
In recent years, large computational problems have solved by the distributed environment in which applications are executed in parallel. Also, lately, fog computing or edge computing as a new environment is applied to collect data from the devices and preprocessing is done before sending for main processing in cloud computing. Since one of the cruc...
Abstract One of the most common diseases among women is breast cancer, the early diagnosis of which is of paramount importance. Given the time-consuming nature of the diagnosis process of the disease, using new methods such as computer science is extremely important for early detection of the condition. Today, the main emphasis is on the science of...
Clustering is one of the effective methods which are applied in the wireless sensor networks to preserve the precious battery power of sensor nodes. Various clustering approaches have been proposed in the literature and LEACH is one of clustering and routing schemes which can be used to manage the sensor network. In this paper, we present an improv...
Clustering is one of the main techniques used to increase the scalability of wireless sensor networks (WSNs). Furthermore, clustering can help to improve the energy efficiency of resource limited ad hoc network and increase the lifetime of sensor network. In this paper, we present a fuzzy clustering algorithm which improves the energy efficiency of...
Since there is no fixed infrastructure or centralized management in Wireless Sensor Networks (WSNs), a Connected Dominating Set(CDS) has been proposed as a virtual backbone is efficient. A virtual backbone plays a major role in routing, broadcasting, coverage andactivity scheduling. Wireless sensor networks to form a CDS usually by UDG (Unit Disk G...
MANET is a kind of Ad Hoc network with mobile, wireless nodes. Because of its special characteristics like
dynamic topology, hop-by-hop communications and easy and quick setup, MANET faced lots of challenges
allegorically routing, security and clustering. The security challenges arise due to MANET’s selfconfiguration
and self-maintenance capabiliti...
A Wireless Sensor Network (WSN) is collection of wireless sensors with limited memory, processing and energy supply. Based on application, sensors distribute in a wide geographically area in order to collect information and transmit the collected data packets toward a base station also called Sink. Due to the relatively high node density and source...
Mobile Ad Hoc Network (MANET) is a collection of wireless mobile nodes with restricted
transmission range and resources, no fixed infrastructure and quick and easy setup. Because of
special characteristics, wide-spread deployment of MANET faced lots of challenges like
security, routing and clustering. The security challenges arise due to MANETs sel...
A Wireless Sensor Network (WSN) is deployed with a large number of sensors with limited
power supply in a wide geographically area. These sensors collect information depending on
application. The sensors transmit the data towards a base station called sink. Due to the
relatively high node density and source-to-sink communication pattern, congestion...
In this paper, an image encryption schemeis proposed based on parallelism elementary cellular automata (ECA). In this scheme, we increased the encryption speed with attractors and parallelism ECA. Simulation result on a grayscale image shows that performance of the proposed technique is better than previous works.
Traditional reliable transport protocols use end-to-end retransmission for the recovery of lost packets, which has high cost in Wireless Sensor Networks (WSNs). Hence, reliable transport protocols in WSNs use caching packets at the intermediate nodes in order to avoid costly end-to-end retransmission for loss recovery. Hop-by-hop retransmission sch...
Power is a critical issue in wireless sensor node, because in most of the applications it is difficult or in some cases impossible to replace or replenish the battery. This research surveys, summarizes and categorize the possible solutions to harvest required power of wireless sensor node from the working environment. Sensors are divided in differe...
In this paper we propose a Packet-based measurement technique called Floating IP Active Measurement (FIPAM) that utilizes routing loop to measure Delay and Throughput in IP networks. Calculating these parameters in multi-provider and complex networks like Internet has became a challenge as most of current active measurement tools relying on ICMP an...
In this paper we propose a generic architecture for a small powerful mobile computer that relies on network and its servers for majority of its activities. Since the network is located in middle of this architecture, we discuss the feasibility and capacity of using the network as a temporary dynamic storage in the form of cache for limited and freq...
This paper propose a novel approach to utilize the network to store data in form of floating IP packets. Network could play the role of temporary storage in certain applications and packets could be retained in the network in a closed routing loop. This approach which is called Data Storage Technique on IP Networks (DSTN) could be considered as one...