- UAV Applications and Optimization
- Robotic Path Planning Algorithms
- Distributed Control Multi-Agent Systems
- Age of Information Optimization
- Advanced Malware Detection Techniques
- Blockchain Technology Applications and Security
- IoT and Edge/Fog Computing
- Vehicular Ad Hoc Networks (VANETs)
- Video Surveillance and Tracking Methods
- Energy Efficient Wireless Sensor Networks
- Network Security and Intrusion Detection
- IoT Networks and Protocols
- Robotics and Sensor-Based Localization
- Complex Network Analysis Techniques
- Advanced Steganography and Watermarking Techniques
- Green IT and Sustainability
- Digital Imaging for Blood Diseases
- Digital Media Forensic Detection
- COVID-19 epidemiological studies
- COVID-19 diagnosis using AI
- Computational Geometry and Mesh Generation
- Chaos-based Image/Signal Encryption
- Opportunistic and Delay-Tolerant Networks
- Software-Defined Networks and 5G
- Crime, Illicit Activities, and Governance
Virginia Commonwealth University
2020-2024
Amirkabir University of Technology
2018-2021
ICT Research Institute
2020
The global stability analysis for the mathematical model of an infectious disease is discussed here. endemic equilibrium shown to be globally stable by using a modification Volterra–Lyapunov matrix method. basis method combination Lyapunov functions and matrices. By reducing dimensions matrices under some conditions, we can easily show equilibrium. To prove based on matrices, use with symmetry properties (symmetric positive definite). results developed in this paper applied more complex...
Aggregated Internet of Things (IoT) communication aims to use core network resources efficiently by providing cellular access a group IoT devices over the same subscriber identity. Leveraging low data rates and long sending intervals devices, several in serving area are grouped together take turns send their servers without causing overlaps communication. In this paper, we approach further benefiting from flexibility schedules, aim increase savings shifting (delaying or performing earlier)...
The COVID-19 epidemic is spreading day by day. Early diagnosis of this disease essential to provide effective preventive and therapeutic measures. This process can be used a computer-aided methodology improve accuracy. In study, new optimal method has been utilized for the COVID-19. Here, based on fuzzy <math xmlns="http://www.w3.org/1998/Math/MathML" id="M2"> <mi>C</mi> </math> -ordered means (FCOM) along with an improved version enhanced capsule network (ECN) proposed purpose. ECN mayfly...
Cellular-enabled unmanned aerial vehicles (UAVs) require almost continuous cellular network connectivity to fulfill their missions successfully. However, the area (e.g., rural) they fly over may have partial coverage, making path planning of such UAV a challenging task. Recently tolerable outage duration is taken into account for UAVs, and trajectory optimization under this studied. these existing studies consider only single focus on each UAV's own separately even in multi-UAV scenarios. In...
Unmanned Aerial Vehicles (UAVs) can help data collection from ground sensors or Internet of Things (IoT) devices deployed even in hard to access areas and deliver them their destinations as relays. However, the UAV trajectories should be planned carefully due limited battery lifetimes. Recently, Age Information (AoI) has also been considered a metric quantify freshness collected during this process path UAVs are aimed optimized considering AoI. existing studies have defined AoI context...
This paper proposes a novel nature-inspired meta-heuristic algorithm called the Golden Tortoise Beetle Optimizer (GTBO) to solve optimization problems. It mimics golden tortoise beetle's behavior of changing colors attract opposite sex for mating and its protective strategy that uses kind anal fork deter predators. The is modeled based on dual attractiveness survival generate new solutions To measure performance, proposed GTBO compared with five other evolutionary algorithms 24 well-known...
Watermarking refers to a way of protecting copyright. From one perspective, watermarking algorithms are categorized as key-based and non-key-based. In the watermarking, targeted blocks selected by using key embed watermark bits; in non-key-based on other hand, bits embedded predefined position host image. general, schemes expected be more robust against removal attacks. this paper we propose two attacks algorithm, which based QR decomposition. Although supposed robust, show that they...
Intersection detection between three-dimensional bodies has various applications in computer graphics, video game development, robotics as well military industries. In some respects, entities do not want to disclose sensitive information about themselves, including their location. this paper, we present a secure two-party protocol determine the existence of an intersection entities. The presented paper allows for spaces geometry. Our approach is use intersecting plane two separation or...
Unmanned aerial vehicles (UAVs) have recently been used in many applications from surveillance to communication. UAVs can also assist the process of data collection ground Internet Things (IoT) devices thanks low deployment cost and flexibility. Since energy flight time is limited, trajectory planning for during this vital. While there are several studies that look at problem with varying objectives, still a need finding optimal UAV path mobile IoT both delay secure mind as main concern. In...
Cellular-connected Unmanned Aerial Vehicles (UAVs) need consistent cellular network connectivity to effectively accomplish their designated missions. However, when navigating through regions with partial coverage, such as rural areas, the task of planning flight paths for these UAV missions becomes notably intricate. Algorithms designed solve this issue require significant computational resources, making them infeasible active deployment where an algorithm must run in real time using small...
International mobile subscriber identity (IMSI) sharing-based aggregated communication aims to connect multiple Internet of Things (IoT) devices the operator's core network over same line. IoT with low data rates and long sending intervals are first grouped together assigned identity. They then take turns perform their exchanges using cellular connection, yielding huge savings in resource (e.g., number active bearers) usage. Current solutions however do not consider different device traffic...
The rapid growth of technology has led to the creation computing networks. applications Internet Things are becoming more and visible with expansion development sensors use a series equipment connect Internet. Of course, any network will also provide some challenges. main challenge IoT like other is its security. In field security, there issues such as attack detection, authentication, encryption so on. One most important cyber-attacks that disrupt usage. attacks on BotNet attack. challenges...
Unmanned aerial vehicle (UAV) technology has become increasingly pivotal in various industries including agriculture, emergencies, and transportation. However, there is a growing need for more intuitive unobtrusive control mechanisms. In response, our team developed groundbreaking technique that optimizes drone tracking through operator gaze. Through the use of eye-tracking interaction, we have created approach to human operation, which reduces workload improves overall efficiency. After...
Financial innovation has entered a new era with cryptocurrencies. Bitcoin is the first decentralised cryptocurrency and most popular in world. The main features of this technology are immutability, trust anonymity. anonymous untraceable system facilitates cash-out laundering cybercrime proceeds. currency flow provides an address graph that assigns bitcoin between two addresses. Identifying suspicious nodes network similar to problem recognising origins contact different applications, i.e.,...
In this demo, we design and implement traffic aggregation of multiple mobile devices using the same subscriber identity resources in core network. Using off-the-shelf smartphones, programmable SIM cards, Amarisoft Callbox with both network eNB components, demonstrate setup implementation an experiment where each these shares a clone card connects to at different times for download tasks. The results show that can be efficiently used through sharing compared communication separate cellular...