- Cloud Computing and Resource Management
- Distributed and Parallel Computing Systems
- Energy Efficient Wireless Sensor Networks
- Distributed systems and fault tolerance
- Parallel Computing and Optimization Techniques
- Advanced Data Storage Technologies
- Peer-to-Peer Network Technologies
- IoT and Edge/Fog Computing
- Caching and Content Delivery
- Service-Oriented Architecture and Web Services
- Context-Aware Activity Recognition Systems
- Software System Performance and Reliability
- Advanced Software Engineering Methodologies
- Security in Wireless Sensor Networks
- Real-Time Systems Scheduling
- Web Data Mining and Analysis
- Opportunistic and Delay-Tolerant Networks
- Modular Robots and Swarm Intelligence
- Advanced Database Systems and Queries
- Embedded Systems Design Techniques
- Interconnection Networks and Systems
- Mobile Ad Hoc Networks
- Business Process Modeling and Analysis
- Software-Defined Networks and 5G
- Accounting Education and Careers
Isfahan University of Medical Sciences
2017-2025
Iran University of Science and Technology
2015-2024
Ghent University
2021
Tabarestan University
2017
State Key Laboratory of Transducer Technology
2015
California State University, Fullerton
2002-2014
PayPal (United States)
2012
Amirkabir University of Technology
2009
Shahid Beheshti University of Medical Sciences
2006-2008
Eastern Michigan University
1991-2000
Since edge detection is in the forefront of image processing for object detection, it crucial to have a good understanding algorithms. This paper introduces new classification most important and commonly used algorithms, namely ISEF, Canny, Marr-Hildreth, Sobel, Kirsch, Lapla1 Lapla2. Five categories are included our classification, then advantages disadvantages some available algorithms within this category discussed. A representative group containing above seven implemented C++ compared...
With the ever-increasing advancement of mobile device technology and their pervasive usage, users expect to run applications on devices get same performance as if they used powerful non-mobile computers. There is a challenge though in that deliver lower than traditional less-constrained computers because are constrained by weight, size, mobility spite all advancements recent years. One most common solutions has ameliorated this disparity cyber foraging, wherein nearby called surrogates...
One of the key activities that are needed to construct a quality service-oriented solution is identification its architectural elements with right granularity. The selection an appropriate method for services from business models enterprise thus quite crucial success any enterprise. Existing methods service ignore required performance metrics and semantics integrity elements; more importantly, they focus on entity-based while ignoring process based ones. This paper proposes new specification...
The use of machine learning (ML) inference for various applications is growing drastically. ML services engage with users directly, requiring fast and accurate responses. Moreover, these face dynamic workloads requests, imposing changes in their computing resources. Failing to right-size resources results either latency service level objectives (SLOs) violations or wasted Adapting considering all the pillars accuracy, latency, resource cost challenging. In response challenges, we propose...
The emergence of symmetric multi-processing (SMP) systems with non-uniform memory access (NUMA) has prompted extensive research on process and data placement to mitigate the performance impact NUMA applications. However, existing solutions often overlook coordination between CPU scheduler manager, leading inefficient thread page table placement. Moreover, replication techniques employed improve locality suffer from redundant replicas, scalability barriers, degradation due bandwidth...
A considerable amount of undesirable factors in the wireless capsule endoscopy (WCE) procedure hinder proper visualization small bowel and take gastroenterologists more time to review. Objective quantitative assessment different preparation paradigms saving physician reviewing motivated us present an automatic low-cost statistical model for automatically segmenting clean contaminated regions WCE images. In construction phase, only 20 manually pixel-labeled images have been used from normal...
Phishing is an increasing web attack both in volume and techniques sophistication. Blacklists are used to resist this type of attack, but fail make their lists up- to-date. This paper proposes a new technique architecture for blacklist generator that maintains up-to-date phishing sites. When page claims it belongs given company, the company's name searched powerful search engine like Google. The domain then compared with each Google's top- 10 results. If matching found, considered as...
The saponin composition of a specimen black sea cucumber, Holothuria atra collected in the Persian Gulf was studied by combined approach including LC-MS/MS, Molecular Networking, pure compound isolation, and NMR spectroscopy. turned out to be more complex than previously reported. most abundant saponins extract (1⁻4) were isolated characterized 1D- 2D-NMR experiments. Compound 1 identified as new triterpene glycoside saponin, holothurin A5. side chain 1, unprecedented among glycosides, is an...
Objectives/Goals: Poor visual memory and perceptual organization task performance predicts cognitive decline is sensitive to dementia severity. No genome-wide association study (GWAS) has assessed the genomic basis of visual-spatial phenotypes. We aimed identify common genetic variants associated with spatial organization. Methods/Study Population: included dementia- stroke-free participants aged 45 years or older from up seven cohorts in Cohorts for Heart Aging Research Genomic Epidemiology...
The combination of sensor and actor nodes in wireless networks (WSANs) has created new challenges notably coordination. In this paper, we survey, categorize, bring into perspective existing researches on weak connectivity its impacts coordination ranging from a node failure to disability communicate with other actors permanently. We present each category alongside provisions approaches the context proposed coordination-oriented categorization. Alongside explanation general concepts for...
Virtualization technology in the form of server consolidation makes running hot-standby replicas on one system possible, while software rejuvenation provides proactive recovery failure. Both technologies have been used to make systems more dependable. However, deployment virtualized had limited only virtual machines (VMs) or machine monitors (VMMs), requiring changes applications too. We propose a new technique for high available that is applied at both VM and VMM levels yet it does not...
Today, IT organizations have encountered growing challenges in the management and maintenance of large scale heterogeneous distributed computing systems because these to be active available at all hours. Therefore, it is difficult for administrators manage such handle changes occured Moreover, current programming languages, methods, tools are inadequate complexity, heterogeneity, scale, dynamism, uncertainty as most important systems. researchers investigate new ideas address problems...
Background: Marine organisms produce a variety of compounds with pharmacological activities including anticancer effects. This study attempt to find cytotoxicity hexane (HEX), dichloromethane (DCM), and butanol (BUTOH) partitions Sargassum angustifolium. Materials Methods: S. angustifolium was collected from Bushehr, Southwest coastline Persian Gulf. The plant extracted by maceration methanol-ethyl acetate. extract evaporated under vacuum partitioned Kupchan method yield HEX, DCM, BUTOH...
The authors describe a graduate capstone accounting class as basis for building communication skills desired by both practitioners and faculty. An academic service-learning (ASL) component is included. Adopted required master of science degree in at two universities, this course supports accreditation. Surveys offer evidence that faculty rate, slightly different order, the three most important written communication, oral analytical/critical thinking. Accounting curricula worldwide are under...
Task allocation is a critical issue in proper engineering of cooperative applications embedded systems with latency and energy constraints, as wireless sensor actor networks (WSANs). Existing task algorithms are mostly concerned savings ignore time constraints thus increase the makespan tasks network well probability malfunctioning network. In this paper we take both awareness reduction tasks' times to completion WSANs into account propose two-phase technique based on Queuing theory. first...
Cloud computing enjoys the many attractive attributes of virtualization technology, such as consolidation, isolation, migration and suspend/resume support.In this model computing, some desirable features scalability are provided by means a new type building blocks called virtual machines (VMs).As with any other construction block, VMs have their own scheduling challenges advantages.This paper presents major differences between schedulable processes explains why traditional techniques used in...