Mohsen Sharifi

ORCID: 0000-0003-4992-2500
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cloud Computing and Resource Management
  • Distributed and Parallel Computing Systems
  • Energy Efficient Wireless Sensor Networks
  • Distributed systems and fault tolerance
  • Parallel Computing and Optimization Techniques
  • Advanced Data Storage Technologies
  • Peer-to-Peer Network Technologies
  • IoT and Edge/Fog Computing
  • Caching and Content Delivery
  • Service-Oriented Architecture and Web Services
  • Context-Aware Activity Recognition Systems
  • Software System Performance and Reliability
  • Advanced Software Engineering Methodologies
  • Security in Wireless Sensor Networks
  • Real-Time Systems Scheduling
  • Web Data Mining and Analysis
  • Opportunistic and Delay-Tolerant Networks
  • Modular Robots and Swarm Intelligence
  • Advanced Database Systems and Queries
  • Embedded Systems Design Techniques
  • Interconnection Networks and Systems
  • Mobile Ad Hoc Networks
  • Business Process Modeling and Analysis
  • Software-Defined Networks and 5G
  • Accounting Education and Careers

Isfahan University of Medical Sciences
2017-2025

Iran University of Science and Technology
2015-2024

Ghent University
2021

Tabarestan University
2017

State Key Laboratory of Transducer Technology
2015

California State University, Fullerton
2002-2014

PayPal (United States)
2012

Amirkabir University of Technology
2009

Shahid Beheshti University of Medical Sciences
2006-2008

Eastern Michigan University
1991-2000

Since edge detection is in the forefront of image processing for object detection, it crucial to have a good understanding algorithms. This paper introduces new classification most important and commonly used algorithms, namely ISEF, Canny, Marr-Hildreth, Sobel, Kirsch, Lapla1 Lapla2. Five categories are included our classification, then advantages disadvantages some available algorithms within this category discussed. A representative group containing above seven implemented C++ compared...

10.1109/itcc.2002.1000371 article EN 2005-08-25

With the ever-increasing advancement of mobile device technology and their pervasive usage, users expect to run applications on devices get same performance as if they used powerful non-mobile computers. There is a challenge though in that deliver lower than traditional less-constrained computers because are constrained by weight, size, mobility spite all advancements recent years. One most common solutions has ameliorated this disparity cyber foraging, wherein nearby called surrogates...

10.1109/surv.2011.111411.00016 article EN IEEE Communications Surveys & Tutorials 2011-11-18

One of the key activities that are needed to construct a quality service-oriented solution is identification its architectural elements with right granularity. The selection an appropriate method for services from business models enterprise thus quite crucial success any enterprise. Existing methods service ignore required performance metrics and semantics integrity elements; more importantly, they focus on entity-based while ignoring process based ones. This paper proposes new specification...

10.1109/scc.2008.52 article EN IEEE International Conference on Services Computing 2008-07-01

The use of machine learning (ML) inference for various applications is growing drastically. ML services engage with users directly, requiring fast and accurate responses. Moreover, these face dynamic workloads requests, imposing changes in their computing resources. Failing to right-size resources results either latency service level objectives (SLOs) violations or wasted Adapting considering all the pillars accuracy, latency, resource cost challenging. In response challenges, we propose...

10.1145/3578356.3592578 preprint EN 2023-05-04

The emergence of symmetric multi-processing (SMP) systems with non-uniform memory access (NUMA) has prompted extensive research on process and data placement to mitigate the performance impact NUMA applications. However, existing solutions often overlook coordination between CPU scheduler manager, leading inefficient thread page table placement. Moreover, replication techniques employed improve locality suffer from redundant replicas, scalability barriers, degradation due bandwidth...

10.48550/arxiv.2502.10923 preprint EN arXiv (Cornell University) 2025-02-15

A considerable amount of undesirable factors in the wireless capsule endoscopy (WCE) procedure hinder proper visualization small bowel and take gastroenterologists more time to review. Objective quantitative assessment different preparation paradigms saving physician reviewing motivated us present an automatic low-cost statistical model for automatically segmenting clean contaminated regions WCE images. In construction phase, only 20 manually pixel-labeled images have been used from normal...

10.1371/journal.pone.0315638 article EN cc-by PLoS ONE 2025-03-07

Phishing is an increasing web attack both in volume and techniques sophistication. Blacklists are used to resist this type of attack, but fail make their lists up- to-date. This paper proposes a new technique architecture for blacklist generator that maintains up-to-date phishing sites. When page claims it belongs given company, the company's name searched powerful search engine like Google. The domain then compared with each Google's top- 10 results. If matching found, considered as...

10.1109/aiccsa.2008.4493625 article EN 2008-03-01

The saponin composition of a specimen black sea cucumber, Holothuria atra collected in the Persian Gulf was studied by combined approach including LC-MS/MS, Molecular Networking, pure compound isolation, and NMR spectroscopy. turned out to be more complex than previously reported. most abundant saponins extract (1⁻4) were isolated characterized 1D- 2D-NMR experiments. Compound 1 identified as new triterpene glycoside saponin, holothurin A5. side chain 1, unprecedented among glycosides, is an...

10.3390/md17020086 article EN cc-by Marine Drugs 2019-02-01

Objectives/Goals: Poor visual memory and perceptual organization task performance predicts cognitive decline is sensitive to dementia severity. No genome-wide association study (GWAS) has assessed the genomic basis of visual-spatial phenotypes. We aimed identify common genetic variants associated with spatial organization. Methods/Study Population: included dementia- stroke-free participants aged 45 years or older from up seven cohorts in Cohorts for Heart Aging Research Genomic Epidemiology...

10.1017/cts.2024.758 article EN cc-by-nc-nd Journal of Clinical and Translational Science 2025-03-26

The combination of sensor and actor nodes in wireless networks (WSANs) has created new challenges notably coordination. In this paper, we survey, categorize, bring into perspective existing researches on weak connectivity its impacts coordination ranging from a node failure to disability communicate with other actors permanently. We present each category alongside provisions approaches the context proposed coordination-oriented categorization. Alongside explanation general concepts for...

10.1109/surv.2011.122811.00096 article EN IEEE Communications Surveys & Tutorials 2012-02-07

Virtualization technology in the form of server consolidation makes running hot-standby replicas on one system possible, while software rejuvenation provides proactive recovery failure. Both technologies have been used to make systems more dependable. However, deployment virtualized had limited only virtual machines (VMs) or machine monitors (VMMs), requiring changes applications too. We propose a new technique for high available that is applied at both VM and VMM levels yet it does not...

10.1109/ares.2010.69 article EN 2010-02-01

Today, IT organizations have encountered growing challenges in the management and maintenance of large scale heterogeneous distributed computing systems because these to be active available at all hours. Therefore, it is difficult for administrators manage such handle changes occured Moreover, current programming languages, methods, tools are inadequate complexity, heterogeneity, scale, dynamism, uncertainty as most important systems. researchers investigate new ideas address problems...

10.1109/ams.2007.20 article EN 2007-03-01

Background: Marine organisms produce a variety of compounds with pharmacological activities including anticancer effects. This study attempt to find cytotoxicity hexane (HEX), dichloromethane (DCM), and butanol (BUTOH) partitions Sargassum angustifolium. Materials Methods: S. angustifolium was collected from Bushehr, Southwest coastline Persian Gulf. The plant extracted by maceration methanol-ethyl acetate. extract evaporated under vacuum partitioned Kupchan method yield HEX, DCM, BUTOH...

10.4103/abr.abr_259_16 article EN cc-by-nc-sa Advanced Biomedical Research 2018-01-01

The authors describe a graduate capstone accounting class as basis for building communication skills desired by both practitioners and faculty. An academic service-learning (ASL) component is included. Adopted required master of science degree in at two universities, this course supports accreditation. Surveys offer evidence that faculty rate, slightly different order, the three most important written communication, oral analytical/critical thinking. Accounting curricula worldwide are under...

10.1177/1080569909334052 article EN Business Communication Quarterly 2009-04-03

Task allocation is a critical issue in proper engineering of cooperative applications embedded systems with latency and energy constraints, as wireless sensor actor networks (WSANs). Existing task algorithms are mostly concerned savings ignore time constraints thus increase the makespan tasks network well probability malfunctioning network. In this paper we take both awareness reduction tasks' times to completion WSANs into account propose two-phase technique based on Queuing theory. first...

10.1016/j.procs.2010.12.082 article EN Procedia Computer Science 2011-01-01

Cloud computing enjoys the many attractive attributes of virtualization technology, such as consolidation, isolation, migration and suspend/resume support.In this model computing, some desirable features scalability are provided by means a new type building blocks called virtual machines (VMs).As with any other construction block, VMs have their own scheduling challenges advantages.This paper presents major differences between schedulable processes explains why traditional techniques used in...

10.7763/ijcte.2012.v4.448 article EN International Journal of Computer Theory and Engineering 2012-01-01
Coming Soon ...