- Cooperative Communication and Network Coding
- Wireless Communication Security Techniques
- Advanced Data Storage Technologies
- Caching and Content Delivery
- Advanced MIMO Systems Optimization
- Cellular Automata and Applications
- Advanced Wireless Communication Techniques
- Blockchain Technology Applications and Security
- Security in Wireless Sensor Networks
- Wireless Communication Networks Research
- IoT and Edge/Fog Computing
- Coding theory and cryptography
- Image and Signal Denoising Methods
- Advanced Image Fusion Techniques
- Advanced Wireless Network Optimization
- Transportation and Mobility Innovations
- Cryptography and Data Security
- Big Data and Business Intelligence
- Energy Load and Power Forecasting
- Data Visualization and Analytics
- Network Security and Intrusion Detection
- Energy Harvesting in Wireless Networks
- Spectroscopy and Chemometric Analyses
- Distributed systems and fault tolerance
- graph theory and CDMA systems
University of Information Science and Technology St. Paul The Apostle
2013-2022
University of Information Science
2016-2022
HES-SO Arc
2022
Princeton University
2011-2018
Fraunhofer Institute for High Frequency Physics and Radar Techniques
2018
HES-SO University of Applied Sciences and Arts Western Switzerland
2017
Durham University
2017
University of Tehran
2016
Pusan National University
2016
Queen's University Belfast
2015
Physical layer security is an emerging area that achieves perfect secrecy data transmission between intended network nodes, while malicious nodes eavesdrop the communication obtain zero information. The so-called capacity can be improved using friendly jammers introduce extra interference to eavesdroppers. We investigate interaction source transmits useful and who assist by "masking" eavesdropper. To distributed solution, we a game theoretic approach. defined such pays interfere...
Abstract The real estate industry is currently undergoing a digital transformation that not only changes its nature in terms of the markets and work environments, but also influencing growth. What are main trends concerns related to this transformation? To what extent already prepared for this? This paper reviews situation emergence phenomenon known as PropTech. PropTech characterized by massive implementation emerging technology such home matching tools, drones, virtual reality, building...
Physical layer security is an emerging concept that achieves perfect secrecy data transmission between the intended network nodes, while eavesdropping malicious nodes obtain zero information. The so-called capacity can be improved using friendly jammers introduce extra interference to destination limited. In this paper, we investigate interaction source transmits desired and who assist by "disguising" eavesdropper. order a distributed solution, game theoretic approach. defined in such way...
The perceptual adaptation of the image (PAI) is introduced by inspiration from Chevreul–Mach Bands (CMB) visual phenomenon. By boosting CMB assisting illusory effect on boundaries regions, PAI adapts to perception human system and thereof increases quality image. proposed for application standard images or output any processing technique. For implementation image, an algorithm morphological filters (MFs) presented, which geometrically adds model effect. Numerical evaluation improvement...
Abstract The rapid development of internet things (IoT) is to be the next generation IoT devices are a simple target for attackers due lack security. Attackers can easily hack that used form botnets, which launch distributed denial service (DDoS) attack against networks. Botnets most dangerous threat security systems. Software‐defined networking (SDN) one developing filed, introduce capacity dynamic program network. Use flexibility and multidimensional characteristics SDN prevent DDoS...
Physical layer security is an emerging area that explores possibilities of achieving perfect secrecy data transmission between the intended network nodes, while possible malicious nodes eavesdrop communication obtain zero information. The so-called rate can be improved using friendly jammers introduce extra interference to eavesdroppers. Here, we investigate interaction multiple source-destination links and a jammer who assists by ''masking" eavesdropper. In order distributed solution, one...
The present study explores individual identity perception by analyzing the chemical peak information in gas chromatography-mass spectrometry (GC-MS) spectra of body odor samples with standard data mining approaches.
Today there exist many different types of smart assistants and devices, such as virtual assistants, smartphones wearables, which have a purpose to coordinate optimize the daily activities people worldwide. The assistants' focus is mainly on basic human needs, e.g. browsing, scheduling, navigating other similar activities. However, not are concerned with health overall. In this paper, we possibility using mirror detect issues. A new Smart eHealth Mirror model proposed, that consists works its...
Blockchain technology will bring a disruption in plenty of industries and businesses. Recently it proved the robustness, immutability, auditability, many crucial practical applications. The blockchain structure offers traceability actions, alterations, alerts, which is an important property system needed for development sustainable technologies. A part regarding optimization processes smart contract. It self-executable computer code, open transparent, encoding terms regular able to automate...
The memoryless noncoherent single-input-single-output (SISO) Rayleigh-fading channel is considered. Closed-form expressions are derived for the mutual information between output and input of this when magnitude distribution discrete restricted to having two mass points. It subsequently shown how these can be used obtain closed-form capacity signal noise ratio (SNR) values up approximately 0 dB, a tight lower bound SNR dB 10 dB. its given as functions parameter which obtained via numerical...
Security is an important aspect for the future wireless networks. Since number of network nodes increases constantly, and, in addition, networks are decentralized and ad-hoc nature, it becomes more challenging to apply current cryptographic methods that require exchange keys between communicating parties. Information-theoretic secrecy emerging security field explores possibility achieving perfect data transmission intended nodes, while possible malicious (also called eavesdroppers) kept...
A simple four node network in which cooperation improves the information-theoretic secrecy is studied. The channel consists of two senders, a receiver, and an eavesdropper. One or both senders transmit confidential messages to while eavesdropper tries decode transmitted message. main result derivation newly achievable rate-equivocation region that shown be larger than derived by Lai El Gamal for relay-eavesdropper channel. When rate helping interferer zero, new reduces capacity-equivocation...
Peak mitigation is of interest to power companies as peak periods may require the operator over provision supply in order meet demand. Flattening usage curve can result cost savings, both for and end users. Integration renewable energy into infrastructure presents an opportunity use excess generation supplement alleviate peaks. In addition, demand side management shift from off-peak times reduce magnitude this work, we present a data driven approach incentive-based mitigation. Understanding...
Physical layer security is an emerging field that explores the possibilities of achieving perfect secrecy data transmission between intended network nodes, while possible malicious nodes eavesdrop communication obtain zero information. In this paper, we observe how node cooperation improves physical a simple wireless by reducing surface geographical area in which can listen to transmitted from source destination. Our analysis and simulation results show dramatic improvement even with only...
Blind Components Processing (BCP), a novel approach in processing of data (signal, image, etc.) components, is introduced as well some applications to information communications technology (ICT) are proposed. The newly BCP with capability deployment orientation wider range applications. fundamental based on Source Separation (BSS), methodology which searches for unknown sources mixtures without prior knowledge either the or mixing process. Most natural, biomedical industrial observed signals...