Amir Masoud Rahmani
YOU?
Author Swipe
View article: An IoT-Enabled Machine Learning Framework for Automated Teacher Performance Feedback to Enhance Teaching Quality
An IoT-Enabled Machine Learning Framework for Automated Teacher Performance Feedback to Enhance Teaching Quality Open
Given the crucial role of teachers in the education system, robust mechanisms are necessary to enhance their teaching effectiveness. Through leveraging advanced technological methods, both teacher and student evaluation processes can be co…
View article: The Rise of Large Language Models: Evolution, Applications, and Future Directions
The Rise of Large Language Models: Evolution, Applications, and Future Directions Open
Large Language Models (LLMs) have significantly revolutionized natural language processing tasks across various domains; however, understanding how to effectively evaluate and adapt them to specific application contexts remains an open cha…
View article: A hybrid flow shop scheduling optimization using puma optimizer: Addressing energy efficiency and workforce restrictions
A hybrid flow shop scheduling optimization using puma optimizer: Addressing energy efficiency and workforce restrictions Open
The Hybrid Flow Shop Scheduling Problem (HFSP) is a complex challenge in production and manufacturing, requiring efficient scheduling solutions that optimize productivity while considering real-world constraints. This study proposes an adv…
View article: Overcoming Charge Sharing, Race Condition, and Noise Sensitivity in Ternary DDCVSL Circuits
Overcoming Charge Sharing, Race Condition, and Noise Sensitivity in Ternary DDCVSL Circuits Open
Dynamic Differential Cascode Voltage Switch Logic (DDCVSL) is a circuit design that combines static DCVSL with dynamic logic to achieve the benefits of both simultaneously. It provides a robust structure and can be used in high-performance…
View article: Hybrid Optimization Method for Social Internet of Things Service Provision Based on Community Detection
Hybrid Optimization Method for Social Internet of Things Service Provision Based on Community Detection Open
The Internet of things (IoT) and social networks integrate into a new area called the social Internet of things (SIoT). The SIoT is characterized as a social network of things that has enhanced intelligence and social awareness. Essential …
View article: The Internet of Things in Elderly Healthcare Applications: A Systematic Review and Future Directions
The Internet of Things in Elderly Healthcare Applications: A Systematic Review and Future Directions Open
The increase in the elderly population globally and the prevalence of chronic diseases among the elderly have resulted in rising healthcare costs worldwide. Utilizing the Internet of Things (IoT) and smart sensors to reduce healthcare cost…
View article: A Comprehensive Study on Frequent Pattern Mining and Clustering Categories for Topic Detection in Persian Text Stream
A Comprehensive Study on Frequent Pattern Mining and Clustering Categories for Topic Detection in Persian Text Stream Open
Topic detection in social networks is extracting and summarizing frequent posts about an event or subject. Topic detection is a complex process and depends on language because it somehow needs to analyze text. There have been few studies o…
View article: Enhanced heart sound classification using Mel frequency cepstral coefficients and comparative analysis of single vs. ensemble classifier strategies
Enhanced heart sound classification using Mel frequency cepstral coefficients and comparative analysis of single vs. ensemble classifier strategies Open
This paper seeks to enhance the performance of Mel Frequency Cepstral Coefficients (MFCCs) for detecting abnormal heart sounds. Heart sounds are first pre-processed to remove noise and then segmented into S1, systole, S2, and diastole inte…
View article: Representing a Model for the Anonymization of Big Data Stream Using In-Memory Processing
Representing a Model for the Anonymization of Big Data Stream Using In-Memory Processing Open
In light of the escalating privacy risks in the big data era, this paper introduces an innovative model for the anonymization of big data streams, leveraging in-memory processing within the Spark framework. The approach is founded on the p…
View article: A Review of Anonymization Algorithms and Methods in Big Data
A Review of Anonymization Algorithms and Methods in Big Data Open
In the era of big data, with the increase in volume and complexity of data, the main challenge is how to use big data while preserving the privacy of users. This study was conducted with the aim of finding a solution to this challenge. In …
View article: Blockchain technology and raft consensus for secure physician prescriptions and improved diagnoses in electronic healthcare systems
Blockchain technology and raft consensus for secure physician prescriptions and improved diagnoses in electronic healthcare systems Open
With electronic healthcare systems undergoing rapid change, optimizing the crucial process of recording physician prescriptions is a task with major implications for patient care. The power of blockchain technology and the precision of the…
View article: Enhanced Heart Sound Classification Using Mel Frequency Cepstral Coefficients and Comparative Analysis of Single vs. Ensemble Classifier Strategies
Enhanced Heart Sound Classification Using Mel Frequency Cepstral Coefficients and Comparative Analysis of Single vs. Ensemble Classifier Strategies Open
This paper explores the efficacy of Mel Frequency Cepstral Coefficients (MFCCs) in detecting abnormal heart sounds using two classification strategies: a single classifier and an ensemble classifier approach. Heart sounds were first pre-pr…
View article: Anonymizing Big Data Streams Using In-memory Processing: A Novel Model Based on One-time Clustering
Anonymizing Big Data Streams Using In-memory Processing: A Novel Model Based on One-time Clustering Open
Big data privacy preservation is a critical challenge for data mining and data analysis. Existing methods for anonymizing big data streams using k-anonymity algorithms may cause high data loss, low data quality, and identity disclosure. In…
View article: A smart filtering-based adaptive optimized link state routing protocol in flying ad hoc networks for traffic monitoring
A smart filtering-based adaptive optimized link state routing protocol in flying ad hoc networks for traffic monitoring Open
Nowadays, the use of drones as a fundamental element of smart cities has attracted the attention of many researchers to monitor and control the traffic of vehicles. Because of the high flexibility of multi-drone systems, like flying ad hoc…
View article: Blockchain integration in big data: Review, vision, and opportunities
Blockchain integration in big data: Review, vision, and opportunities Open
Big data has attracted extensive attention from industries and universities during the past few years. Big data is crucial in many fields, such as business analytics, healthcare, the Internet of Things (IoT), smart home, supply chain, tran…
View article: A comprehensive study on Frequent Pattern Mining and Clustering categories for topic detection in Persian text stream
A comprehensive study on Frequent Pattern Mining and Clustering categories for topic detection in Persian text stream Open
Topic detection is a complex process and depends on language because it somehow needs to analyze text. There have been few studies on topic detection in Persian, and the existing algorithms are not remarkable. Therefore, we aimed to study …
View article: Efficient designs of QCA Full-adder and 4-bit QCA RCA Circuits
Efficient designs of QCA Full-adder and 4-bit QCA RCA Circuits Open
Quantum-dot Cellular Automata (QCA) technology offers several advantages over traditional CMOS technology, including reduced power consumption, higher clock speeds, and increased density. QCA has the potential to overcome the physical limi…
View article: An energy-aware routing scheme based on a virtual relay tunnel in flying ad hoc networks
An energy-aware routing scheme based on a virtual relay tunnel in flying ad hoc networks Open
Flying ad hoc networks (FANETs) tackle diverse challenges, for example, dynamic topological structure, high mobility of nodes, low density, and energy restrictions. These challenges make problems in designing reliable and stable routing in…
View article: Corrections to “Deep Learning-Based Intrusion Detection Systems: A Systematic Review”
Corrections to “Deep Learning-Based Intrusion Detection Systems: A Systematic Review” Open
Presents corrections to the paper, (Corrections to “Deep Learning-Based Intrusion Detection Systems: A Systematic Review”).
View article: An Improved Evolutionary Method for Social Internet of Things Service Provisioning Based on Community Detection
An Improved Evolutionary Method for Social Internet of Things Service Provisioning Based on Community Detection Open
Social IoT (SIoT) refers to socializing in the Internet of Things (IoT), where things generate social relationships. Due to the development of objects and issues such as delayed response, slow search, and composite service process, distrib…
View article: An Enhanced Authentication Protocol Suitable for Constrained RFID Systems
An Enhanced Authentication Protocol Suitable for Constrained RFID Systems Open
RFID technology offers an affordable and user-friendly solution for contactless identification of objects and individuals. However, the widespread adoption of RFID systems raises concerns regarding security and privacy. Vulnerabilities suc…