Skip to main content

previous disabled Page of 7
and
  1. No Access

    Article

    Anonymizing Big Data Streams Using In-memory Processing: A Novel Model Based on One-time Clustering

    Big data privacy preservation is a critical challenge for data mining and data analysis. Existing methods for anonymizing big data streams using k-anonymity algorithms may cause high data loss, low data qualit...

    Elham Shamsinejad, Touraj Banirostam in Journal of Signal Processing Systems (2024)

  2. No Access

    Article

    Edge artificial intelligence for big data: a systematic review

    Edge computing, artificial intelligence (AI), and machine learning (ML) concepts have become increasingly prevalent in Internet of Things (IoT) applications. As the number of IoT devices continues to grow, rel...

    Atefeh Hemmati, Parisa Raoufi, Amir Masoud Rahmani in Neural Computing and Applications (2024)

  3. No Access

    Article

    Deep learning applications in the Internet of Things: a review, tools, and future directions

    The emergence of the Internet of Things (IoT) has enabled the proliferation of interconnected devices and sensors, generating vast amounts of often complex and unstructured data. Deep learning (DL), a subfield...

    Parisa Raoufi, Atefeh Hemmati, Amir Masoud Rahmani in Evolutionary Intelligence (2024)

  4. No Access

    Article

    Direction based method for representing and querying fuzzy regions

    Uncertainty management for geometric data is a fundamental issue for spatial databases, image databases, and spatial data systems, such as geographic information systems. Currently, spatial database systems ca...

    Majid Saidi Mobarakeh, Mohammad Davarpanah Jazi in Multimedia Tools and Applications (2024)

  5. No Access

    Article

    A Survey of Artificial Hummingbird Algorithm and Its Variants: Statistical Analysis, Performance Evaluation, and Structural Reviewing

    In the last few decades, metaheuristic algorithms that use the laws of nature have been used dramatically in numerous and complex optimization problems. The artificial hummingbird algorithm (AHA) is one of the...

    Mehdi Hosseinzadeh, Amir Masoud Rahmani in Archives of Computational Methods in Engin… (2024)

  6. No Access

    Article

    A distributed load balancing method for IoT/Fog/Cloud environments with volatile resource support

    In cloud/fog-based environments, resource management is an important and challenging process. The deadline-based workflow scheduling mechanism is a common practice in such systems to overcome the complexities ...

    Zari Shamsa, Ali Rezaee, Sahar Adabi, Ali Movaghar Rahimabadi in Cluster Computing (2024)

  7. No Access

    Article

    Robust intrusion detection for network communication on the Internet of Things: a hybrid machine learning approach

    The importance and growth of the Internet of Things (IoT) in computer networks and applications have been increasing. Additionally, many of these applications generate large volumes of data, which are critical...

    Nasim Soltani, Amir Masoud Rahmani, Mahdi Bohlouli, Mehdi Hosseinzadeh in Cluster Computing (2024)

  8. No Access

    Article

    Lane and Platoon Assignment in Intelligent Transportation System: A Novel Heuristic Approach

    The right lane and platoon assignment to a vehicle significantly impacts achieving the desired driving goals to improve occupants’ safety or reduce pollution. Preparing an intelligent assistant to address this...

    Hamidreza Mahini, Mehrdad Asadi in International Journal of Intelligent Trans… (2024)

  9. No Access

    Article

    A distributed B+Tree indexing method for processing range queries over streaming data

    A data stream exhibits as a massive unbounded sequence of data elements continuously generated at a high rate. Stream databases raise new challenges for query processing due to both the streaming nature of dat...

    Shahab Safaee, Meghdad Mirabi, Amir Masoud Rahmani, Ali Asghar Safaei in Cluster Computing (2024)

  10. No Access

    Article

    Analyzing the impact of various parameters on job scheduling in the Google cluster dataset

    Cloud architecture and its operations interest both general consumers and researchers. Google, as a technology giant, offers cloud services globally. This paper analyzes the Google cluster usage trace, focusin...

    Danyal Shahmirzadi, Navid Khaledian, Amir Masoud Rahmani in Cluster Computing (2024)

  11. Article

    An Intelligent Algorithm to Predict GDP Rate and Find a Relationship Between COVID-19 Outbreak and Economic Downturn

    With the spread of COVID-19, economic damages are challenging for governments and people’s livelihood besides its dangerous and negative impact on humanity's health, which can be led to death. Various health g...

    Amir Masoud Rahmani, Seyedeh Yasaman Hosseini Mirmahaleh in Computational Economics (2024)

  12. No Access

    Article

    Data Replication Methods in Cloud, Fog, and Edge Computing: A Systematic Literature Review

    Nowadays, a large amount of data is being generated and these data are usually stored in distributed environments such as cloud, fog, and edge environments. Data replication, which is commonly used to manage l...

    Fatemeh Karamimirazizi, Seyed Mahdi Jameii in Wireless Personal Communications (2024)

  13. No Access

    Article

    An Adaptable Algorithm for Optimizing Bus Line Distribution Using the Clustering Method

    The current fleet of cars requires reevaluation, upgrades, and replacement in response to the expanding human population, the increase in urban traffic volume, and the elevated levels of air pollution attribut...

    Fatemeh Sheikhi, Amir Masoud Rahmani in Wireless Personal Communications (2024)

  14. No Access

    Article

    A decentralized prediction-based workflow load balancing architecture for cloud/fog/IoT environments

    Processing of data gathered from new communication devices, such as Internet of Things (IoT)-based technology, has grown dramatically in the past decade. Resource management plays a vital role in cloud/fog-bas...

    Zari Shamsa, Ali Rezaee, Sahar Adabi, Amir Masoud Rahmani in Computing (2024)

  15. No Access

    Article

    Automatic text summarization using deep reinforced model coupling contextualized word representation and attention mechanism

    With the rapid and unprecedented growth of textual data in recent years, there is a remarkable need for automatic text summarization models to retrieve useful information from these large numbers of textual do...

    Hassan Aliakbarpour, Mohammad Taghi Manzuri in Multimedia Tools and Applications (2024)

  16. No Access

    Chapter

    Metaverse in Medicine: Medical Internet of Things (MIoT)

    Medical Internet of Things (MIoT) has been integrated with biosensors, wearable sensors, and other medical devices to facilitate the timely diagnosis and prediction of acute diseases. However, security and pri...

    Seyedeh Yasaman Hosseini Mirmahaleh in The Metaverse for the Healthcare Industry (2024)

  17. Article

    Open Access

    Designing secure PUF-based authentication protocols for constrained environments

    Physical Unclonable Functions (PUFs) are widely used in cryptographic authentication and key-agreement protocols due to their unique physical properties. This article presents a comprehensive cryptanalysis of ...

    Sang-Woong Lee, Masoumeh Safkhani, Quynh Le, Omed Hassan Ahmed in Scientific Reports (2023)

  18. No Access

    Article

    Providing and evaluating a comprehensive model for detecting fraudulent electronic payment card transactions with a two-level filter based on flow processing in big data

    Previous research on fraud detection modeling is often based on a single algorithm, optimizing categories and clusters to find fraudulent patterns that they have provided unsupervised or supervised methods alo...

    Hamid Banirostam, Touraj Banirostam in International Journal of Information Techn… (2023)

  19. No Access

    Article

    Resource Management approaches to Internet of Vehicles

    The Internet of Vehicles (IoV) has become a significant issue in designing smart cities. Many applications and services are provided in IoV for various purposes. They need the resources for the computation and...

    Mehdi Hosseinzadeh, Shirin Abbasi, Amir Masoud Rahmani in Multimedia Tools and Applications (2023)

  20. No Access

    Article

    A Model to Detect the Fraud of Electronic Payment Card Transactions Based on Stream Processing in Big Data

    With the growing use of electronic cash cards, the number of transactions with these cards has also increased rapidly, so the importance of using fraud detection models has been paid attention to by financial ...

    Hamid Banirostam, Touraj Banirostam in Journal of Signal Processing Systems (2023)

previous disabled Page of 7