Amirahmad Chapnevis

ORCID: 0000-0003-2258-3449
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • UAV Applications and Optimization
  • Robotic Path Planning Algorithms
  • Distributed Control Multi-Agent Systems
  • Age of Information Optimization
  • Advanced Malware Detection Techniques
  • Blockchain Technology Applications and Security
  • IoT and Edge/Fog Computing
  • Vehicular Ad Hoc Networks (VANETs)
  • Video Surveillance and Tracking Methods
  • Energy Efficient Wireless Sensor Networks
  • Network Security and Intrusion Detection
  • IoT Networks and Protocols
  • Robotics and Sensor-Based Localization
  • Complex Network Analysis Techniques
  • Advanced Steganography and Watermarking Techniques
  • Green IT and Sustainability
  • Digital Imaging for Blood Diseases
  • Digital Media Forensic Detection
  • COVID-19 epidemiological studies
  • COVID-19 diagnosis using AI
  • Computational Geometry and Mesh Generation
  • Chaos-based Image/Signal Encryption
  • Opportunistic and Delay-Tolerant Networks
  • Software-Defined Networks and 5G
  • Crime, Illicit Activities, and Governance

Virginia Commonwealth University
2020-2024

Amirkabir University of Technology
2018-2021

ICT Research Institute
2020

The global stability analysis for the mathematical model of an infectious disease is discussed here. endemic equilibrium shown to be globally stable by using a modification Volterra–Lyapunov matrix method. basis method combination Lyapunov functions and matrices. By reducing dimensions matrices under some conditions, we can easily show equilibrium. To prove based on matrices, use with symmetry properties (symmetric positive definite). results developed in this paper applied more complex...

10.3390/sym12111778 article EN Symmetry 2020-10-27

Aggregated Internet of Things (IoT) communication aims to use core network resources efficiently by providing cellular access a group IoT devices over the same subscriber identity. Leveraging low data rates and long sending intervals devices, several in serving area are grouped together take turns send their servers without causing overlaps communication. In this paper, we approach further benefiting from flexibility schedules, aim increase savings shifting (delaying or performing earlier)...

10.1109/lcn48667.2020.9314781 article EN 2020-11-16

The COVID-19 epidemic is spreading day by day. Early diagnosis of this disease essential to provide effective preventive and therapeutic measures. This process can be used a computer-aided methodology improve accuracy. In study, new optimal method has been utilized for the COVID-19. Here, based on fuzzy <math xmlns="http://www.w3.org/1998/Math/MathML" id="M2"> <mi>C</mi> </math> -ordered means (FCOM) along with an improved version enhanced capsule network (ECN) proposed purpose. ECN mayfly...

10.1155/2021/2295920 article EN cc-by BioMed Research International 2021-10-19

10.1109/icc51166.2024.10622459 article EN ICC 2022 - IEEE International Conference on Communications 2024-06-09

Cellular-enabled unmanned aerial vehicles (UAVs) require almost continuous cellular network connectivity to fulfill their missions successfully. However, the area (e.g., rural) they fly over may have partial coverage, making path planning of such UAV a challenging task. Recently tolerable outage duration is taken into account for UAVs, and trajectory optimization under this studied. these existing studies consider only single focus on each UAV's own separately even in multi-UAV scenarios. In...

10.1109/vtc2021-spring51267.2021.9448776 article EN 2021-04-01

Unmanned Aerial Vehicles (UAVs) can help data collection from ground sensors or Internet of Things (IoT) devices deployed even in hard to access areas and deliver them their destinations as relays. However, the UAV trajectories should be planned carefully due limited battery lifetimes. Recently, Age Information (AoI) has also been considered a metric quantify freshness collected during this process path UAVs are aimed optimized considering AoI. existing studies have defined AoI context...

10.1109/lcn58197.2023.10223376 article EN 2023-09-06

This paper proposes a novel nature-inspired meta-heuristic algorithm called the Golden Tortoise Beetle Optimizer (GTBO) to solve optimization problems. It mimics golden tortoise beetle's behavior of changing colors attract opposite sex for mating and its protective strategy that uses kind anal fork deter predators. The is modeled based on dual attractiveness survival generate new solutions To measure performance, proposed GTBO compared with five other evolutionary algorithms 24 well-known...

10.48550/arxiv.2104.01521 preprint EN cc-by arXiv (Cornell University) 2021-01-01

Watermarking refers to a way of protecting copyright. From one perspective, watermarking algorithms are categorized as key-based and non-key-based. In the watermarking, targeted blocks selected by using key embed watermark bits; in non-key-based on other hand, bits embedded predefined position host image. general, schemes expected be more robust against removal attacks. this paper we propose two attacks algorithm, which based QR decomposition. Although supposed robust, show that they...

10.1109/icee.2018.8472576 article EN 2018-05-01

Intersection detection between three-dimensional bodies has various applications in computer graphics, video game development, robotics as well military industries. In some respects, entities do not want to disclose sensitive information about themselves, including their location. this paper, we present a secure two-party protocol determine the existence of an intersection entities. The presented paper allows for spaces geometry. Our approach is use intersecting plane two separation or...

10.48550/arxiv.2011.00319 preprint EN other-oa arXiv (Cornell University) 2020-01-01

Unmanned aerial vehicles (UAVs) have recently been used in many applications from surveillance to communication. UAVs can also assist the process of data collection ground Internet Things (IoT) devices thanks low deployment cost and flexibility. Since energy flight time is limited, trajectory planning for during this vital. While there are several studies that look at problem with varying objectives, still a need finding optimal UAV path mobile IoT both delay secure mind as main concern. In...

10.1109/icit58465.2023.10143110 article EN 2022 IEEE International Conference on Industrial Technology (ICIT) 2023-04-04

Cellular-connected Unmanned Aerial Vehicles (UAVs) need consistent cellular network connectivity to effectively accomplish their designated missions. However, when navigating through regions with partial coverage, such as rural areas, the task of planning flight paths for these UAV missions becomes notably intricate. Algorithms designed solve this issue require significant computational resources, making them infeasible active deployment where an algorithm must run in real time using small...

10.1145/3565287.3617622 article EN 2023-09-28

International mobile subscriber identity (IMSI) sharing-based aggregated communication aims to connect multiple Internet of Things (IoT) devices the operator's core network over same line. IoT with low data rates and long sending intervals are first grouped together assigned identity. They then take turns perform their exchanges using cellular connection, yielding huge savings in resource (e.g., number active bearers) usage. Current solutions however do not consider different device traffic...

10.1109/jiot.2022.3155923 article EN publisher-specific-oa IEEE Internet of Things Journal 2022-03-02

The rapid growth of technology has led to the creation computing networks. applications Internet Things are becoming more and visible with expansion development sensors use a series equipment connect Internet. Of course, any network will also provide some challenges. main challenge IoT like other is its security. In field security, there issues such as attack detection, authentication, encryption so on. One most important cyber-attacks that disrupt usage. attacks on BotNet attack. challenges...

10.48550/arxiv.2207.04503 preprint EN cc-by arXiv (Cornell University) 2022-01-01

Unmanned aerial vehicle (UAV) technology has become increasingly pivotal in various industries including agriculture, emergencies, and transportation. However, there is a growing need for more intuitive unobtrusive control mechanisms. In response, our team developed groundbreaking technique that optimizes drone tracking through operator gaze. Through the use of eye-tracking interaction, we have created approach to human operation, which reduces workload improves overall efficiency. After...

10.1145/3565287.3617619 article EN 2023-09-28

Financial innovation has entered a new era with cryptocurrencies. Bitcoin is the first decentralised cryptocurrency and most popular in world. The main features of this technology are immutability, trust anonymity. anonymous untraceable system facilitates cash-out laundering cybercrime proceeds. currency flow provides an address graph that assigns bitcoin between two addresses. Identifying suspicious nodes network similar to problem recognising origins contact different applications, i.e.,...

10.1504/ijsn.2020.10039019 article EN cc-by-nc-nd International Journal of Security and Networks 2020-01-01

In this demo, we design and implement traffic aggregation of multiple mobile devices using the same subscriber identity resources in core network. Using off-the-shelf smartphones, programmable SIM cards, Amarisoft Callbox with both network eNB components, demonstrate setup implementation an experiment where each these shares a clone card connects to at different times for download tasks. The results show that can be efficiently used through sharing compared communication separate cellular...

10.1109/mass56207.2022.00045 article EN 2022 IEEE 19th International Conference on Mobile Ad Hoc and Smart Systems (MASS) 2022-10-01
Coming Soon ...