- Complex Network Analysis Techniques
- Age of Information Optimization
- Advanced Optical Network Technologies
- IoT and Edge/Fog Computing
- Opinion Dynamics and Social Influence
- Opportunistic and Delay-Tolerant Networks
- Caching and Content Delivery
- Optical Network Technologies
- Advanced Wireless Network Optimization
- Software-Defined Networks and 5G
- Advanced Queuing Theory Analysis
- Cloud Computing and Resource Management
- Congenital Heart Disease Studies
- Interconnection Networks and Systems
- Mathematical and Theoretical Epidemiology and Ecology Models
- IoT Networks and Protocols
- Advanced MIMO Systems Optimization
- Misinformation and Its Impacts
- Network Traffic and Congestion Control
- Cooperative Communication and Network Coding
- Cultural Industries and Urban Development
- Distributed systems and fault tolerance
- Face and Expression Recognition
- Spam and Phishing Detection
- Peer-to-Peer Network Technologies
Nazarbayev University
2018-2024
University of Alberta
2022-2024
Mount Royal University
2024
Gwangju Institute of Science and Technology
2011-2017
University of Tehran
2008-2010
Institute for Cognitive Science Studies
2009-2010
Institute for Research in Fundamental Sciences
2009
Islamic Azad University, Tehran
2008
Multicasting is emerging as an enabling technology for multimedia transmissions over wireless networks to support several groups of users with flexible quality service (QoS) requirements. Although multicast has huge potential push the limits next generation communication systems; it however one most challenging issues currently being addressed. In this survey, we explain group formation and various forms rate determination approaches. We also provide a systematic review recent channel-aware...
Fluctuations in electricity tariffs induced by the sporadic nature of demand loads on power grids has initiated immense efforts to find optimal scheduling solutions for charging and discharging plug-in electric vehicles (PEVs) subject different objective sets. In this paper, we consider vehicle-to-grid (V2G) at a geographically large scale which PEVs have flexibility charging/discharging multiple smart stations coordinated individual aggregators. We first formulate maximizing overall profit...
In this paper, we use the concept of Markovian jump linear systems in order to analyze age information (AoI) discrete-time systems. This approach is fact, counterpart stochastic hybrid system (SHS) model reported for analyzing AoI continuous=time and thus, referred as SHS (DT-SHS) model. We then apply DT-SHS two wireless relay network settings optimize associated with static link scheduling policies. The first comprises one a direct between source destination, whereas second setting has...
The mild symptoms in Mild Cognitive Impairment (MCI), a precursor of dementia, often go unnoticed and are assumed as normal aging signs. Such negligence result late visits which consequently, lead to the diagnosis progression dementia. An instrumented gait assessment home settings may facilitate detection subtle MCI-related motor deficits thus, allowing early intervention. This paper investigates potential biomarkers derived from shank mounted inertial sensors signals under dual-task walking...
An important challenge confronted in distributed systems is the adoption of suitable and efficient algorithms for coordinator election. The main role an elected to manage use a shared resource optimal manner. Among all reported literature, Bully Ring have gained more popularity. In this paper, we describe novel approaches towards improving also propose heap tree mechanism electing coordinator. higher efficiency better performance our presented with respect existing validated through...
The ability to predict future epidemic threats, both in real and digital worlds, develop effective containment strategies heavily leans on the availability of reliable infection spreading models. stochastic behavior such processes makes them even more demanding scrutinize over structured networks. This paper concerns dynamics a new susceptible-infected-susceptible (SIS) model incorporated with multistage (infection delay) an infective medium (propagation vector) complex In particular, we...
This letter characterizes the intertwined behavior of a susceptible-infected-susceptible epidemic model involving multiple mutually exclusive memes, each competing over distinct contact planes an undirected multi-layer social network, with possibility inter-switching. Based on mean-field theory, we contrast and derive closed-form analytical expressions for steady-state thresholds that govern transitions between extinction, co-existence, absolute dominance inter-switchable memes. Moreover,...
Information aging has gained prominence in characterizing communication protocols for timely remote estimation and control applications. This work proposes an Age of (AoI)-aware threshold-based dynamic frame slotted ALOHA (T-DFSA) contention resolution random access machine-type networks. Unlike conventional DFSA that maximizes the throughput each frame, length age-gain threshold T-DFSA are determined to minimize normalized average AoI reduction network frame. At start proposed protocol,...
In this letter, the efficient dissemination of content in a socially-aware cache-enabled hybrid network using multi-armed bandit learning theory is analyzed. Specifically, an overlay cellular over vehicular social considered, where commuters request for multimedia from either stationary road-side units (RSUs), base station, or single mobile cache unit (MCU), if accessible. Firstly, we propose algorithm to optimally distribute popular contents among locally deployed RSU caches. To further...
This paper reports on a network-based investigation of the gendered nature work in screen sector. Using nine years Australian film and television production data, we explore how networks project-based collaboration might explain disparities career trajectories men women. Our analysis finds that projects with as directors tend to reproduce familiar teams exclusion women, while led by women key creative roles make more space for Moreover, find there is significant number who only (regardless...
The spreading dynamics and control of infectious agents primarily depend on the connectivity properties underlying networks. Here, we investigate stability a susceptible- infected-susceptible epidemic model incorporated with multiple infection stages propagation vectors to mimic malware behavior over scale-free communication In particular, derive basic reproductive ratio (R <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">0</sub> ) provide...
Online social networks have attracted billions of active users over the past decade. These systems play an integral role in everyday life many people around world. As such, these platforms are also attractive for misinformation, hoaxes, and fake news campaigns which usually utilize trolls and/or bots propagation. Detection so-called is challenging due to their large scale dynamic nature where users' data generated collected at multi-billion records per hour. In this paper, we focus on fickle...
Directional current relays are one of the most common that used in protection transmission and distribution lines. They provide reliable for However, increasing proliferation distributed energy sources may violate established relay coordination. This is caused by changes fault levels at points, thus coordination time interval violated. basically means primary backup do not operate with each other. Thus, it vital to optimizing settings accordance changing levels. paper proposes agent-based...
Content caching is a technique aimed to reduce the network load imposed by data transmission during peak time while ensuring users' quality of experience. Studies have shown that content delivery via coded can significantly improve beyond performance limits conventional schemes when caches and server share common link. Finding optimal cache placement however, becomes challenging under arbitrary distributions popularity. While existing works show partitioning contents into three popularity...
Reliability of power distribution systems is very crucial concern due to cases mass outages that occur worldwide. Once an unscheduled outage takes place in grids, the service restoration triggered rapidly return system normal conditions and minimize severity consequences. This paper proposes a self-healing grid technique based on decentralized multi-agent with reinforcement learning. The architecture two types zone agents: Inactive Zone Agent (IZA) Active (AZA), where IZA activated provided...
Prediction and control of spreading processes in social networks (SNs) are closely tied to the underlying connectivity patterns. Contrary most existing efforts that exclusively focus on positive user interactions, impact contagion temporal evolution signed SNs (SSNs) with distinctive friendly (positive) hostile (negative) relationships yet, remains largely unexplored. In this paper, we study interplay between link polarity propagation viral phenomena coupled alertness. particular, propose a...
Power management in multi-server data centers especially at scale is a vital issue of increasing importance cloud computing paradigm. Existing studies mostly consider thresholds on the number idle servers to switch or off and suffer from scalability issues. As natural approach view Markovian assumption, we present multi-level continuous-time Markov decision process (CTMDP) model based state aggregation with setup times that interestingly overcomes inherent intractability traditional MDP...
Caching has been recognized as a viable solution to surmount the limited capability of backhaul links in handling abundant network traffic. Although optimal approaches for minimizing average delivery load do exist, current caching strategies fail avert intelligent adversaries from obtaining invaluable contextual information by inspecting wireless communication and thus, violating users' privacy. Grounded theory, this letter, we propose mathematical model preserving privacy system involving...
The emergence of the Internet as a ubiquitous technology has facilitated rapid evolution social media leading virtual platform for communication, content sharing, and information dissemination. In spite revolutionizing way news is delivered to people, this also brought along with itself inevitable demerits. One such drawback spread rumors expedited by platforms, which may provoke doubt fear. Therefore, it essential debunk before their widespread use. Over years, many studies have been...
With the successful deployment of IEEE 802.11a/b/g wireless local area networks (WLANs) and pent-up market demand for high speed access, 802.11n protocol has emerged as a promising standard with major enhancements. In order to scale physical layer transmission rate up 600 Mbps, current medium access control (MAC) requires significant improvements. Towards this end, several packet aggregation schemes have been proposed reduce inherent overhead. However, choosing large frame sizes would result...
The timeliness of status message delivery in communications networks is subjective to time-varying wireless channel transmissions. In this letter, we investigate the age information (AoI) each source a multi-source M/G/1 queueing update system with active server failures. particular, adopt method supplementary variables derive closed-form expression for average AoI terms parameters, where repair time follows general distribution and service packets generated by independent sources random...
Content caching has emerged as a promising technique to reduce the backhaul multimedia traffic rising due proliferation of mobile devices. To address bottleneck issue arising result sparse wireless resources, current literature is mainly focused on designing centralized or decentralized coded schemes. In this paper, we present hybrid approach in cellular network considering users, where both downlink transmission from base-station (BS) and device-to-device (D2D) communications are permitted....