- Privacy-Preserving Technologies in Data
- Cryptography and Data Security
- Privacy, Security, and Data Protection
- Hydrology and Watershed Management Studies
- Vehicular Ad Hoc Networks (VANETs)
- Coastal and Marine Dynamics
- Soil erosion and sediment transport
- Fluid Dynamics Simulations and Interactions
- Internet Traffic Analysis and Secure E-voting
- Hydrological Forecasting Using AI
- IoT and Edge/Fog Computing
- Mobile Crowdsensing and Crowdsourcing
- Advanced Authentication Protocols Security
- Computational Fluid Dynamics and Aerodynamics
- Mobile Health and mHealth Applications
- Textile materials and evaluations
- Hydrology and Drought Analysis
- Process Optimization and Integration
- User Authentication and Security Systems
- COVID-19 Digital Contact Tracing
- Human Mobility and Location-Based Analysis
- Aeolian processes and effects
- Modular Robots and Swarm Intelligence
- Computer Graphics and Visualization Techniques
- Landslides and related hazards
Fasa University
2022-2023
Yazd University
2008-2023
Fasa University of Medical Sciences
2022-2023
Islamic Azad University Kerman
2023
Clark University
2020
Guangzhou Medical University
2020
Guangzhou Women and Children Medical Center
2020
Shahid Beheshti University
2020
University of Massachusetts Boston
2016-2019
Boston University
2018
The world has experienced many epidemic diseases in the past, SARS, H1N1, and Ebola are some examples of these diseases. When those outbreak, they spread very quickly among people it becomes a challenge to trace source order control disease. In this paper, we propose an efficient privacy-preserving contact tracing for infection detection (EPIC) which enables users securely upload their data server later case one user got infected other can check if have ever with past. process is done...
The main objective of this study is to combine remote-sensing and artificial intelligence (AI) approaches estimate surface soil moisture (SM) at 100 m spatial daily temporal resolution. two variables used in the Triangle method, that is, land-surface temperature (LST) vegetation cover, were downscaled calculated LSTs applying Wavelet-Artificial Intelligence Fusion Approach (WAIFA) on Moderate Resolution Imaging Spectroradiometer (MODIS) Landsat imageries. Vegetation fractions also estimated...
Mobile healthcare system integrating wearable sensing and wireless communication technologies continuously monitors the users' health status. However, mHealth raises a severe privacy concern as data it collects are private information, such heart rate blood pressure. In this paper, we propose an efficient privacy-preserving release approach for statistic with objectives to preserve unique patterns in original bins. The proposed adopts bucket partition algorithm differential preservation. A...
In-home IoT devices play a major role in healthcare systems as smart personal assistants. They usually come with voice-enabled feature to add an extra level of usability and convenience elderly, disabled people, patients. In this paper, we propose efficient privacy-preserving voice-based search scheme enhance the efficiency privacy in-home applications. We consider application scenario where patients use record upload their voice servers caregivers interested voices patient's based on...
Sharing the Autonomous Vehicles (AV) has potential to be ultimate solution for overcoming cost problem of these type vehicles fundamentally change transportation systems. AVs enable time sharing services where AV owners share their at times they don't need them. Such could reduce by enabling owner vehicle with other users. However, raise a severe privacy concern as shared location and route data users are considered highly private sensitive. In this paper we propose privacy- preserving...
Sharing of autonomous vehicles between multiple users can potentially be the ultimate solution for increasing efficiency transportation system. In a time-sharing scenario, (AV) owners share their to others at unwanted times without incurring any human efforts. However, such sharing service requires disclosure users' locations and route information, raising severe privacy concerns issues. this paper, we propose privacy-preserving task scheduling scheme services vehicles. First, design...
In recent days, membrane technology has obtained a special position in water and wastewater treatment, modeling of such processes seems to be necessary.If the these had not been applied properly, this success would have obtained.Researchers should modify traditional models according needs, by getting benefits modified models, they can get better information develop performances through designing appropriate equipment, putting proper input variables as pressures temperature cutting down cost...
In the present study a numerical method is developed for simulating shallow free surface flows in complex geometries. A Multi-Block (MB) employed conjunction with non-orthogonal curvilinear coordinate system. This technique gives high flexibility to tackle flow domains any boundary which may be encountered nature. The MB utilizes patched grid continuous lines across block boundaries. this paper methods applied 2-D flows. However, extendable 3-D models too. model based on collocated...
Mobile devices are pervasively used by everyone in all aspects of their daily lives. Sensing capability the mobile devices, using built-in sensors, is usually limited to immediate proximity. In this paper, we exploit a technique which enables device sense its physical proximity taking advantage WiFi Channel State Information. We define model detect movements human and non-human objects device. have exploited Fresnel zone movement towards outwards sensing area. The scheme can be alarm user...
Location-based comment sharing is a popular social application, yet it often requires an access to privacy-sensitive user's locations, preferences, and comments. In this paper, we propose efficient privacy-preserving location-based scheme which allows users post search comments about locations without compromising the privacy of selected location, keywords used search. Specifically, posting protocol searching where server unable know by users. addition, only accessible who belong same group....
Mobile devices use time-based de-authentication to secure themselves against un-authorized users, and usually lock after a pre- defined time of inactivity, known as "lock-out time". The technique is effective, however lack an adaptive mechanism may limit the usability security: if lock-out too short, suffers from requirement frequent possibly unnecessary user authentications, long, security increased window opportunity for lunch-time attacks. In this paper, we propose WiLock; WiFi-assisted...
Autonomous vehicles (AV) need an access to a big amount of data from online roadmap servers and local sensors make real-time control decision for safety. Considering the may change in cases road maintenance, new/broken signs, accidents, traffic jams, AV should keep its updated with servers. In this paper, we propose efficient privacy-preserving update scheme AV, which achieves privacy preservation route information while minimizing overhead. We define new type sensitivity segment based on...
Voice Assistant Systems (VAS) such as Amazon Echo and Google Home are becoming a popular technology for medical health systems among patients caregivers. The VAS devices allow caregivers to interact with them via voice commands. In most cases, the users' private data is fully disclosed server, which may raise severe privacy concerns, especially in case of information clearly sensitive. this paper, we propose privacy-preserving query scheme healthcare-based assistant system, enables users use...
In this paper, a new approach for Spiegler-Kedem model is introduced to estimate the solute concentration at boundary layers of membrane. The adjacent membrane itself are very important parts overall process and affect modeling. Original film theory used while according traditional region, changes sharply but shows just outside concentrations however, due lateral diffusion dramatic change seems be impossible. Our perspective measure effect polarization within presents an unprecedented...
Models grounded in irreversible thermodynamics adopt the perspective of treating membrane as an enigmatic system. This entails a lack explicit knowledge regarding intricacies mass transfer phenomena and experimental variables prevailing within membrane, such concentrations pressures. Consequently, these models pose insoluble enigmas unless certain assumptions concerning nature render to solve. In present study, we embrace notion linear applied pressure distribution across akin pore-flow...
Evaluating the Efficiency of Skew Correction Factors in Sediment Rating Curve and Comparison with Intelligent Models (Case Study: Jelogir Station, Khuzestan - Karkheh Catchment)