- Facility Location and Emergency Management
- Caching and Content Delivery
- Peer-to-Peer Network Technologies
- Time Series Analysis and Forecasting
- Additive Manufacturing and 3D Printing Technologies
- Blockchain Technology Applications and Security
- Anomaly Detection Techniques and Applications
- Manufacturing Process and Optimization
- Vehicle Routing Optimization Methods
- Currency Recognition and Detection
- Advanced Data Storage Technologies
- Urban and Freight Transport Logistics
- Innovations in Concrete and Construction Materials
- Access Control and Trust
- Advanced Steganography and Watermarking Techniques
- Vehicle emissions and performance
- Optimization and Mathematical Programming
- Transportation Planning and Optimization
- Explainable Artificial Intelligence (XAI)
- Forecasting Techniques and Applications
- Cooperative Communication and Network Coding
- Microplastics and Plastic Pollution
- Evacuation and Crowd Dynamics
- Smart Parking Systems Research
- Food Supply Chain Traceability
Mississippi State University
2018-2023
Luleå University of Technology
2020-2023
Skellefteå Hospital
2020
Iran University of Science and Technology
2019
Mazandaran University of Science and Technology
2013-2015
Distributed ledgers and blockchain technologies can improve system security trustworthiness by providing immutable replicated histories of data. Blockchain is a linked list blocks containing ...
Blockchain technology has enabled the keeping of a decentralized, tamper-proof, immutable, and ordered ledger transactional events. Efforts to leverage such may be challenging when data storage requirements exceed most blockchain protocols' current capacities. Storing large amounts decentralized while maintaining system efficiency is challenge that we target. This paper proposes using IPFS distributed hash table (DHT) store information immutably in manner mitigate high cost storage. A...
In this paper, a Casualty Collection Points (CCPs) location problem is formulated as two-stage robust stochastic optimization model in an uncertain environment. modelling approach, the network design decisions are integrated with multi-period response operational where number of casualties different levels injuries coming from affected areas uncertain. Furthermore, transportation capacity for evacuation to CCPs and hospitals also To solve complex problem, sample average approximation method...
Decentralization is essential when trust and performance must not depend on a single organization. Distributed Ledger Technologies (DLTs) Decentralized Hash Tables (DHTs) are examples where the DLT useful for transactional events, DHT large-scale data storage. The combination of these two technologies can meet many challenges. blockchain with immutable history protected by cryptographic signatures in blocks. Identification an issue traditionally provided centralized anchors. Self-sovereign...
Abstract Nowadays, increasing awareness of environmental protection has evoked the adoption green technologies in design and manufacturing. As a revolutionizing manufacturing technology that produces components layer-by-layer fashion, additive (AM) followed this trend. Among variety AM processes, fused filament fabrication (FFF) is one most commonly used technologies. However, (including FFF) inherently energy expensive inefficient compared with conventional Thus, an urgent investigation...
Video conferencing applications help people communicate via the Internet and provide a significant consistent basis for virtual meetings. However, integrity, security, identification, authentication problems are still universal. Current video conference technologies typically rely on cloud systems to stable secure executing tasks processes. At same time, being migrated from centralized decentralized solutions better performance without need third-party interactions. This article demonstrates...
This study evaluates metrics for tasks such as classification, regression, clustering, correlation analysis, statistical tests, segmentation, and image-to-image (I2I) translation. Metrics were compared across Python libraries, R packages, Matlab functions to assess their consistency highlight discrepancies. The findings underscore the need a unified roadmap standardize metrics, ensuring reliable reproducible ML evaluations platforms. examined wide range of evaluation various found only some...
Despite of its tremendous merits in producing parts with complex geometry and functionally graded materials, additive manufacturing (AM) is inherently an energy expensive process. Prior studies have shown that process parameters, such as printing resolution, speed, temperature, are correlated to consumption per part. Moreover, part geometric accuracy another major focus AM research, extensive the final highly dependent on those parameters well. Though both heavily depend processes, jointly...
This study presents a capacitated multi-facility location-allocation problem with stochastic demands based on well-known distribution function. In this discrete environment, besides the facilities, we can employee sub-source of each facility for satisfying customers. The objective function is to find optimal locations facilities among finite number potential and allocation demand points (customers) operated so that total sum establishment costs costumers expected values servicing outsourcing...
Evolving traceability requirements increasingly challenge manufacturing supply chain actors to collect tamperproof and auditable evidence about what inputs they process, in way these are used, the resulting process outputs are. Traceability solutions based on blockchain technology have shown ways satisfy of creating a tamper-proof trail data. However, existing struggle meet increasing storage necessary create an using In this paper, we show evolving product story that uses decentralized file...
User identification in decentralized systems is a demanding task. Identification should work resiliently and have efficient performance. Moreover, protect the data that they must store against hackers saboteurs. Keeping system with without any intervention middle has attracted attention to improve earlier centralized systems. Decentralized Identifiers (DIDs) constitute solution for divided into different modules. The verifiable registry one of main parts this technology, which distributed...
Peer to peer networks have become one of the most popular networking methods because their flexibility and many use cases such as file sharing distributed computations.Unstructured overlay are key components systems that considerable low cost in network construction maintenance.One main challenges unstructured is topology mismatch between underlying physical infrastructure.The root this challenge lack awareness about peers infrastructure during connection disconnection from network, addition...