Results for "Mohsen Guizani"

total 768took 0.11s
Market-Based Model in CR-WSN: A Q-Probabilistic Multi-agent Learning ApproachFeb 26 2019The ever-increasingly urban populations and their material demands have brought unprecedented burdens to cities. Smart cities leverage emerging technologies like the Internet of Things (IoT), Cognitive Radio Wireless Sensor Network (CR-WSN) to provide ... More
LRCoin: Leakage-resilient Cryptocurrency Based on Bitcoin for Data Trading in IoTOct 26 2018Currently, the number of Internet of Thing (IoT) devices making up the IoT is more than 11 billion and this number has been continuously increasing. The prevalence of these devices leads to an emerging IoT business model called Device-as-a-service(DaaS), ... More
A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) SecurityJul 29 2018The Internet of Things (IoT) integrates billions of smart devices that can communicate with one another with minimal human intervention. It is one of the fastest developing fields in the history of computing, with an estimated 50 billion devices by the ... More
Assured Data Deletion with Fine-grained Access Control for Fog-based Industrial ApplicationsApr 09 2018The advances of cloud computing, fog computing and Internet of Things (IoT) make the industries more prosperous than ever. A wide range of industrial systems such as transportation systems and manufacturing systems have been developed by integrating cloud ... More
A Computation Offloading Incentive Mechanism with Delay and Cost Constraints under 5G Satellite-ground IoV architectureApr 05 2018The 5G Internet of Vehicles has become a new paradigm alongside the growing popularity and variety of computation-intensive applications with high requirements for computational resources and analysis capabilities. Existing network architectures and resource ... More
PRIF: A Privacy-Preserving Interest-Based Forwarding Scheme for Social Internet of VehiclesApr 06 2018Recent advances in Socially Aware Networks (SANs) have allowed its use in many domains, out of which social Internet of vehicles (SIOV) is of prime importance. SANs can provide a promising routing and forwarding paradigm for SIOV by using interest-based ... More
LPTD: Achieving Lightweight and Privacy-Preserving Truth Discovery in CIoTApr 05 2018In recent years, cognitive Internet of Things (CIoT) has received considerable attention because it can extract valuable information from various Internet of Things (IoT) devices. In CIoT, truth discovery plays an important role in identifying truthful ... More
Design Challenges of Multi-UAV Systems in Cyber-Physical Applications: A Comprehensive Survey, and Future DirectionsOct 23 2018Unmanned Aerial Vehicles (UAVs) have recently rapidly grown to facilitate a wide range of innovative applications that can fundamentally change the way cyber-physical systems (CPSs) are designed. CPSs are a modern generation of systems with synergic cooperation ... More
Cloud-Assisted Remote Sensor Network Virtualization for Distributed Consensus EstimationJan 15 2015We develop cloud-assisted remote sensing techniques for enabling distributed consensus estimation of unknown parameters in a given geographic area. We first propose a distributed sensor network virtualization algorithm that searches for, selects, and ... More
Partial Relay Selection For Hybrid RF/FSO Systems with Hardware ImpairmentsJan 16 2019In this paper, we investigate the performance analysis of dual hop relaying system consisting of asymmetric Radio Frequency (RF)/Free Optical Space (FSO) links. The RF channels follow a Rayleigh distribution and the optical links are subject to Gamma-Gamma ... More
Lclean: A Plausible Approach to Individual Trajectory Data SanitizationApr 05 2018In recent years, with the continuous development of significant data industrialization, trajectory data have more and more critical analytical value for urban construction and environmental monitoring. However, the trajectory contains a lot of personal ... More
Semi-supervised Deep Reinforcement Learning in Support of IoT and Smart City ServicesOct 09 2018Smart services are an important element of the smart cities and the Internet of Things (IoT) ecosystems where the intelligence behind the services is obtained and improved through the sensory data. Providing a large amount of training data is not always ... More
LCD: Low Latency Command Dissemination for A Platoon of VehiclesJan 18 2018In a vehicular platoon, a lead vehicle that is responsible for managing the platoon's moving directions and velocity periodically disseminates control commands to following vehicles based on vehicle-to-vehicle communications. However, reducing command ... More
FPAN: Fine-grained and Progressive Attention Localization Network for Data RetrievalApr 05 2018The Localization of the target object for data retrieval is a key issue in the Intelligent and Connected Transportation Systems (ICTS). However, due to lack of intelligence in the traditional transportation system, it can take tremendous resources to ... More
Proactive Video Chunks Caching and Processing for Latency and Cost Minimization in Edge NetworksDec 16 2018Recently, the growing demand for rich multimedia content such as Video on Demand (VoD) has made the data transmission from content delivery networks (CDN) to end-users quite challenging. Edge networks have been proposed as an extension to CDN networks ... More
Vehicle Tracking Using Surveillance with Multimodal Data FusionOct 29 2018Vehicle location prediction or vehicle tracking is a significant topic within connected vehicles. This task, however, is difficult if only a single modal data is available, probably causing bias and impeding the accuracy. With the development of sensor ... More
Self-Selective Correlation Ship Tracking Method for Smart Ocean SystemFeb 26 2019In recent years, with the development of the marine industry, navigation environment becomes more complicated. Some artificial intelligence technologies, such as computer vision, can recognize, track and count the sailing ships to ensure the maritime ... More
Privacy-Preserving DDoS Attack Detection Using Cross-Domain Traffic in Software Defined NetworksSep 19 2018Existing distributed denial-of-service attack detection in software defined networks (SDNs) typically perform detection in a single domain. In reality, abnormal traffic usually affects multiple network domains. Thus, a cross-domain attack detection has ... More
Toward Intelligent Network Optimization in Wireless Networking: An Auto-learning FrameworkDec 19 2018In wireless communication systems (WCSs), the network optimization problems (NOPs) play an important role in maximizing system performances by setting appropriate network configurations. When dealing with NOPs by using conventional optimization methodologies, ... More
Trading Wireless Information and Power Transfer: Relay Selection to Minimize the Outage ProbabilityDec 09 2014This paper studies the outage probability minimization problem for a multiple relay network with energy harvesting constraints. The relays are hybrid nodes used for simultaneous wireless information and power transfer from the source radio frequency (RF) ... More
Achieving Data Utility-Privacy Tradeoff in Internet of Medical Things: A Machine Learning ApproachFeb 08 2019The emergence and rapid development of the Internet of Medical Things (IoMT), an application of the Internet of Things into the medical and healthcare systems, have brought many changes and challenges to modern medical and healthcare systems. Particularly, ... More
An Efficient Anonymous Authentication Scheme for Internet of VehiclesNov 08 2018Internet of Vehicles (IoV) is an intelligent application of IoT in smart transportation, which can make intelligent decisions for passengers. It has drawn extensive attention to improve traffic safety and efficiency and create a more comfortable driving ... More
Reinforcement Learning for Resource Provisioning in Vehicular CloudMay 28 2018This article presents a concise view of vehicular clouds that incorporates various vehicular cloud models, which have been proposed, to date. Essentially, they all extend the traditional cloud and its utility computing functionalities across the entities ... More
Securing Cognitive Radio Networks against Primary User Emulation AttacksAug 28 2013Cognitive Radio (CR) is a promising technology for next-generation wireless networks in order to efficiently utilize the limited spectrum resources and satisfy the rapidly increasing demand for wireless applications and services. Security is a very important ... More
Mutual Heterogeneous Signcryption Schemes for 5G Network SlicingsNov 09 2018With the emerging of mobile communication technologies, we are entering the fifth generation mobile communication system (5G) era. Various application scenarios will arise in the 5G era to meet the different service requirements. Different 5G network ... More
Preserving Location Privacy in Mobile Edge ComputingApr 05 2018The burgeoning technology of Mobile Edge Computing is attracting the traditional LBS and LS to deploy due to its nature characters such as low latency and location awareness. Although this transplant will avoid the location privacy threat from the central ... More
Deep Learning for IoT Big Data and Streaming Analytics: A SurveyDec 09 2017Jun 05 2018In the era of the Internet of Things (IoT), an enormous amount of sensing devices collect and/or generate various sensory data over time for a wide range of fields and applications. Based on the nature of the application, these devices will result in ... More
A Privacy-Preserving Traffic Monitoring Scheme via Vehicular CrowdsourcingFeb 12 2019The explosive growth of vehicle amount has given rise to a series of traffic problems, such as traffic congestion, road safety, and fuel waste. Collecting vehicles' speed information is an effective way to monitor the traffic condition and avoid vehicles ... More
Privacy Leakage in Smart Homes and Its Mitigation: IFTTT as a Case StudyFeb 08 2019The combination of smart home platforms and automation apps introduces much convenience to smart home users. However, this also brings the potential for privacy leakage. If a smart home platform is permitted to collect all the events of a user day and ... More
Secure Data Access for Wireless Body Sensor NetworksOct 25 2018Recently, with the support of mobile cloud computing, a large number of health related data collected from various body sensor networks can be managed efficiently. However, to ensure data security and data privacy in cloud-integrated body sensor networks ... More
Privacy Leakage in Smart Homes and Its Mitigation: IFTTT as a Case StudyFeb 08 2019Feb 14 2019The combination of smart home platforms and automation apps introduces much convenience to smart home users. However, this also brings the potential for privacy leakage. If a smart home platform is permitted to collect all the events of a user day and ... More
Super-Resolution of Brain MRI Images using Overcomplete Dictionaries and Nonlocal SimilarityFeb 13 2019Recently, the Magnetic Resonance Imaging (MRI) images have limited and unsatisfactory resolutions due to various constraints such as physical, technological and economic considerations. Super-resolution techniques can obtain high-resolution MRI images. ... More
Interest-Related Item Similarity Model Based on Multimodal Data for Top-N RecommendationFeb 13 2019Nowadays, the recommendation systems are applied in the fields of e-commerce, video websites, social networking sites, etc., which bring great convenience to people's daily lives. The types of the information are diversified and abundant in recommendation ... More
Attention-Mechanism-based Tracking Method for Intelligent Internet of VehiclesOct 29 2018Vehicle tracking task plays an important role on the internet of vehicles and intelligent transportation system. Beyond the traditional GPS sensor, the image sensor can capture different kinds of vehicles, analyze their driving situation and can interact ... More
Adversarial Samples on Android Malware Detection Systems for IoT SystemsFeb 12 2019Many IoT(Internet of Things) systems run Android systems or Android-like systems. With the continuous development of machine learning algorithms, the learning-based Android malware detection system for IoT devices has gradually increased. However, these ... More
Spectrum Resource Management and Interference Mitigation for D2D Communications with Awareness of BER Constraint in mmWave 5G Underlay NetworkMay 19 2016The work presented in this paper deals with the issue of massive demands for higher capacity. For that matter, we investigate the spectrum resource management in outdoor mmWave cell for the uplink of cellular and D2D communications. Indeed, we provide ... More
Interference-Based Optimal Power-Efficient Access Scheme for Cognitive Radio NetworksApr 03 2014Jul 08 2014In this paper, we propose a new optimization-based access strategy of multipacket reception (MPR) channel for multiple secondary users (SUs) accessing the primary user (PU) spectrum opportunistically. We devise an analytical model that realizes the multipacket ... More
Reinforcement Learning based QoS/QoE-aware Service Function Chaining in Software-Driven 5G SlicesApr 06 2018With the ever growing diversity of devices and applications that will be connected to 5G networks, flexible and agile service orchestration with acknowledged QoE that satisfies end-user's functional and QoS requirements is necessary. SDN (Software-Defined ... More
Towards Delay-Tolerant Flexible Data Access Control for Smart Grid with Renewable Energy ResourcesOct 25 2018In the Smart Grid with Renewable Energy Resources (RERs), the Residential Units (RUs) with Distributed Energy Resources (DERs) are considered to be both power consumers and suppliers. Specifically, RUs with excessive renewable generations can trade with ... More
High-speed FSK Modulator Using Switched-capacitor ResonatorsNov 20 2015Aug 11 2016In this paper, an ultra-fast frequency shift-keying (FSK) modulation technique based on switched capacitor resonators is presented. It is demonstrated that switching a reactive component such as a capacitor, in a high-Q resonator with proper switching ... More
On the addition of squares of units modulo nJul 29 2016Let $\mathbb{Z}_n$ be the ring of residue classes modulo $n$, and let $\mathbb{Z}_n^{\ast}$ be the group of its units. 90 years ago, Brauer obtained a formula for the number of representations of $c\in \mathbb{Z}_n$ as the sum of $k$ units. Recently, ... More
Wireless IP TelephonyMar 09 2010The convergence of traditional telecommunications and the Internet is creating new network-based service delivery opportunities for telecommunications companies carriers, service providers, and network equipment providers. Voice over Wireless IP is one ... More
Maximum a posteriori learning in demand competition gamesNov 28 2016We consider an inventory competition game between two firms. The question we address is this: If players do not know the opponent's action and opponent's utility function can they learn to play the Nash policy in a repeated game by observing their own ... More
Power means of probability measures and Ando-Hiai inequalityJun 11 2018It has been shown that if $\mu$ is a probability measure of compact support on $\mathbb{M}_n^{+} $ and $t\in(0,1]$, then $$ P_{\frac{t}{p}}(\nu)\leq P_t(\mu)$$ for every $p\geq1$, where $\nu(Z)=\mu(Z^{1/p})$. This provides an extension of the Ando-Hiai ... More
A Conic Section Approach to the Relativistic Reflection LawAug 19 2016We consider the reflection of light, from a stationary source, off of a uniformly moving flat mirror, and derive the relativistic reflection law using well-known properties of conic sections. The effective surface of reflection (ESR) is defined as the ... More
MDBV: Monitoring Data Batch Verification for Survivability of Internet of VehiclesNov 09 2018Along with the development of vehicular sensors and wireless communication technology, Internet of Vehicles (IoV) is emerging that can improve traffic efficiency and provide a comfortable driving environment. However, there is still a challenge how to ... More
A Novel Secure Authentication Scheme for Heterogeneous Internet of ThingFeb 10 2019Today, Internet of Things (IoT) technology is being increasingly popular which is applied in a wide range of industry sectors such as healthcare, transportation and some critical infrastructures. With the widespread applications of IoT technology, people's ... More
A Large-scale Concurrent Data Anonymous Batch Verification Scheme for Mobile Healthcare Crowd SensingApr 05 2018Recently, with the rapid development of big data, Internet of Things (IoT) brings more and more intelligent and convenient services to people's daily lives. Mobile healthcare crowd sensing (MHCS), as a typical application of IoT, is becoming an effective ... More
Discovering Communities of Malapps on Android-based Mobile Cyber-physical SystemsApr 05 2018Android-based devices like smartphones have become ideal mobile cyber-physical systems (MCPS) due to their powerful processors and variety of sensors. In recent years, an explosively and continuously growing number of malicious applications (malapps) ... More
Dynamics of charged dust particles in protoplanetary discsNov 13 2007Feb 13 2008We study the effect of an imposed magnetic field on the motion of charged dust particles in magnetically active regions of a protoplanetary disc. Assuming a power law structure for the vertical and the toroidal components of the magnetic field for the ... More
A Model for Quasi-Spherical Magnetized Accretion FlowMar 11 2003May 17 2004A model for axisymmetric magnetized accretion flow is proposed. The dominant mechanism of energy dissipation is assumed to be the magnetic diffusivity due to turbulence in the accretion flow. In analogy to the advection-dominated accretion flow (ADAF) ... More
Epigraph of Operator FunctionsDec 17 2015It is known that a real function $f$ is convex if and only if the set $$\mathrm{E}(f)=\{(x,y)\in\mathbb{R}\times\mathbb{R};\ f(x)\leq y\},$$ the epigraph of $f$ is a convex set in $\mathbb{R}^2$. We state an extension of this result for operator convex ... More
On the rigidity of symbolic powersNov 20 2016We deal with the rigidity conjecture of symbolic powers over regular rings. This was asked by Huneke. Along with our investigation, we confirm a conjecture [7, Conjecture 3.8].
Witten deformation using Lie groupoidsMar 27 2019We express Witten's deformation of Morse functions using deformation to the normal cone and $C^*$-modules. This allows us to obtain asympotitcs of the `large eigenvalues'. Our methods extend to Morse functions along a foliation. We construct the Witten ... More
Polar codes for secret sharingMay 08 2017A secret can be an encrypted message or a private key to decrypt the ciphertext. One of the main issues in cryptography is keeping this secret safe. Entrusting secret to one person or saving it in a computer can conclude betrayal of the person or destruction ... More
C*-Convexity of Norm Unit BallsApr 11 2016We determine those norms on B(H) whose unit ball is C*-convex. We call them M-norms and show that the class of M-norms less than a given norm enjoys a maximum element. These minimum and maximum elements will be determined in some cases. Finally, we give ... More
Security Protocols in a NutshellMay 31 2016Jun 02 2016Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. ... More
Homological aspects of perfect algebrasMay 10 2010Nov 15 2017We investigate homological properties of perfect algebras of prime characteristic. The principle is as follows: perfect algebras resolve the singularities. For example, we show any module over the ring of absolute integral closure has finite flat dimension. ... More
Exclusive pi+ pi- production at 7TeVOct 27 2016We report a measurement of the exclusive production of pairs of charged pions in proton-proton collisions, dominated by the process $pp \rightarrow p^{(*)} \pi^{+}\pi^{-} p^{(*)}$, where $\rm p^{(*)}$ stands for a diffractively dissociated proton, the ... More
Desingularization of regular algebrasOct 07 2013The goals of this paper are two-fold. First, motivated by the uniformization theorem of Zariski, we investigate the rings that can be written as a direct limit of noetherian regular rings. Second, as reverse to the ?rst one, we study properties of a direct ... More
Huneke's degree-computing problemSep 14 2016In this short note, we deal with a problem posted by Huneke on a numerical invariant attached to symbolic powers of homogenous ideals.
Analytical solution for the structure of ADAFsMay 30 2014The standard Advection-Dominated Accretion Flow (ADAF) is studied using a set of self-similar analytical solutions in the spherical coordinates. Our new solutions are useful for studying ADAFs without dealing with the usual mathematical complexity. We ... More
The influence of winds on the time-dependent behavior of self-gravitating accretion discsJun 01 2008Jan 27 2009We study effects of winds on the time evolution of isothermal, self-gravitating accretion discs by adopting a radius dependent mass loss rate because of the existence of the wind. Our similarity and semi-analytical solution describes time evolution of ... More
Thermal instability with the effect of cosmic-ray diffusionMar 23 2009May 14 2009We study dynamical effects of cosmics rays (CRs) on the thermal instability in the linear regime. CRs and the thermal plasma are treated as two different interacting fluids, in which CRs can diffuse along the magnetic field lines. We show that growth ... More
Gravitational collapse of polytropic, magnetized, filamentary cloudsNov 02 2004When the gas of a magnetized filamentary cloud obeys a polytropic equation of state, gravitational collapse of the cloud is studied using a simplified model. We concentrate on the radial distribution and restrict ourselves to the purely toroidal magnetic ... More
Nuclear kinetic energy spectra of D_2^+ in intense laser field: Beyond Born Oppenheimer approximationNov 12 2007Mar 05 2008Simultaneously, the vibrational nuclear dynamics and full dimensional electronic dynamics of the deuterium molecular ion exposed to the linear polarized intense laser field are studied. The time dependent Schr\"odinger equation of the aligned D2+ with ... More
Policies and Economics of Digital Multimedia TransmissionApr 20 2010There are different Standards of digital multimedia transmission, for example DVB in Europe and ISDB in Japan and DMB in Korea, with different delivery system (example MPEG-2, MPEG-4).This paper describe an overview of Digital Multimedia Transmission ... More
Group theoretical interpretation of the modified gravity in de Sitter spaceJan 14 2016Mar 09 2016A frame work has been presented for theoretical interpretation of various modified gravitational models which is based on the group theoretical approach and unitary irreducible representations (UIR's) of de Sitter (dS) group. In order to illustrate the ... More
Near-Optimal Distributed Approximation of Minimum-Weight Connected Dominating SetApr 30 2014This paper presents a near-optimal distributed approximation algorithm for the minimum-weight connected dominating set (MCDS) problem. The presented algorithm finds an $O(\log n)$ approximation in $\tilde{O}(D+\sqrt{n})$ rounds, where $D$ is the network ... More
An Improved Distributed Algorithm for Maximal Independent SetJun 16 2015Jul 12 2015The Maximal Independent Set (MIS) problem is one of the basics in the study of locality in distributed graph algorithms. This paper presents an extremely simple randomized algorithm providing a near-optimal local complexity for this problem, which incidentally, ... More
Some Results on the Primary Order Preserving Properties of Stochastic OrdersApr 03 2019In this paper, we discuss the existential conditions of fundamental order-preserving additive and multiplicative properties of the usual stochastic order, and five other stochastic orders defined on the set of all real valued random variables.
Achieving Secure and Efficient Cloud Search Services: Cross-Lingual Multi-Keyword Rank Search over Encrypted Cloud DataFeb 11 2019Multi-user multi-keyword ranked search scheme in arbitrary language is a novel multi-keyword rank searchable encryption (MRSE) framework based on Paillier Cryptosystem with Threshold Decryption (PCTD). Compared to previous MRSE schemes constructed based ... More
A Traceable Concurrent Data Anonymous Transmission Scheme for Heterogeneous VANETsNov 08 2018Vehicular Ad Hoc Networks (VANETs) are attractive scenarios that can improve the traffic situation and provide convenient services for drivers and passengers via vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication. However, there ... More
BPDS: A Blockchain based Privacy-Preserving Data Sharing for Electronic Medical RecordsNov 08 2018Electronic medical record (EMR) is a crucial form of healthcare data, currently drawing a lot of attention. Sharing health data is considered to be a critical approach to improve the quality of healthcare service and reduce medical costs. However, EMRs ... More
Softwarization of Internet of Things Infrastructure for Secure and Smart HealthcareMay 28 2018We propose an agile softwarized infrastructure for flexible, cost effective, secure and privacy preserving deployment of Internet of Things (IoT) for smart healthcare applications and services. It integrates state-of-the-art networking and virtualization ... More
Vulnerability Prediction Based on Weighted Software Network for Secure Software BuildingFeb 13 2019To build a secure communications software, Vulnerability Prediction Models (VPMs) are used to predict vulnerable software modules in the software system before software security testing. At present many software security metrics have been proposed to ... More
vFAC: Fine-Grained Access Control with Versatility for Cloud StorageNov 08 2018In recent years, cloud storage technology has been widely used in many fields such as education, business, medical and more because of its convenience and low cost. With the widespread applications of cloud storage technology, data access control methods ... More
Security in Mobile Edge Caching with Reinforcement LearningJan 18 2018Mobile edge computing usually uses cache to support multimedia contents in 5G mobile Internet to reduce the computing overhead and latency. Mobile edge caching (MEC) systems are vulnerable to various attacks such as denial of service attacks and rogue ... More
SDN Controllers: Benchmarking & Performance EvaluationFeb 12 2019Software Defined Networks offer flexible and intelligent network operations by splitting a traditional network into a centralized control plane and a programmable data plane. The intelligent control plane is responsible for providing flow paths to switches ... More
Achieving Trust-Based and Privacy-Preserving Customer Selection in Ubiquitous ComputingFeb 12 2019The recent proliferation of smart devices has given rise to ubiquitous computing, an emerging computing paradigm which allows anytime & anywhere computing possible. In such a ubiquitous computing environment, customers release different computing or sensing ... More
PPLS: A Privacy-Preserving Location-Sharing Scheme in Vehicular Social NetworksApr 06 2018Recent advances in Socially Aware Networks (SANs) have allowed its use in many domains, out of which social Internet of vehicles (SIOV) is of prime importance. SANs can provide a promising routing and forwarding paradigm for SIOV by using interest-based ... More
When Energy Trading meets Blockchain in Electrical Power System: The State of the ArtFeb 19 2019With the rapid growth of renewable energy resources, the energy trading began to shift from centralized to distributed manner. Blockchain, as a distributed public ledger technology, has been widely adopted to design new energy trading schemes. However, ... More
Vcash: A Novel Reputation Framework for Identifying Denial of Traffic Service in Internet of Connected VehiclesFeb 11 2019Trust management of Internet of connected vehicles has been a hot topic during the recent years with the rapid development of UGV technologies. However, existing resolutions based on trustworthiness verification among vehicles make the traffic event transmission ... More
Automated Attack and Defense Framework for 5G Security on Physical and Logical LayersFeb 11 2019The 5th generation (5G) network adopts a great number of revolutionary technologies to fulfill continuously increasing requirements of a variety of applications, including ultra-high bandwidth, ultra-low latency, ultra-massive device access, ultra-reliability, ... More
A Blockchain-based Self-tallying Voting Scheme in Decentralized IoTFeb 11 2019The Internet of Things (IoT) is experiencing explosive growth and has gained extensive attention from academia and industry in recent years. Most of the existing IoT infrastructures are centralized, in which the presence of a cloud server is mandatory. ... More
When Traffic Flow Prediction Meets Wireless Big Data AnalyticsSep 23 2017Traffic flow prediction is an important research issue for solving the traffic congestion problem in an Intelligent Transportation System (ITS). Traffic congestion is one of the most serious problems in a city, which can be predicted in advance by analyzing ... More
Evaluating Reputation Management Schemes of Internet of Vehicles based on Evolutionary Game TheoryFeb 12 2019Conducting reputation management is very important for Internet of vehicles. However, most of the existing researches evaluate the effectiveness of their schemes with settled attacking behaviors in their simulation which cannot represent the scenarios ... More
Bus Trajectory-Based Street-Centric Routing for Message Delivery in Urban Vehicular Ad hoc NetworksApr 07 2018This paper focuses on the routing algorithm for the communications between vehicles and places in urban VANET. As one of the basic transportation facilities in an urban setting, buses periodically run along their fixed routes and widely cover city streets. ... More
A high-performance virtual machine filesystem monitor in cloud-assisted cognitive IoTApr 05 2018Cloud-assisted Cognitive Internet of Things has powerful data analytics abilities based on the computing and data storage capabilities of cloud virtual machines, which makes protecting virtual machine filesystem very important for the whole system security. ... More
A Performance Analysis Model of TCP over Multiple Heterogeneous Paths for 5G Mobile ServicesApr 07 2018Driven by the primary requirement of emerging 5G mobile services, the demand for concurrent multipath transfer (CMT) is still prominent. Yet, multipath transport protocols are not widely adopted and TCP-based CMT schemes will still be in dominant position ... More
The role of Hall diffusion in the magnetically threaded thin accretion discsOct 24 2011We study role of the Hall diffusion in the magnetic star-disc interaction. In a simplified steady state configuration, the total torque is calculated in terms of the fastness parameter and a new term because of the Hall diffusion. We show the total torque ... More
Variability in the stellar initial mass function at high mass: coalescence models for starburst clustersJul 06 2004A coalescence model using the observed properties of pre-stellar condensations (PSCs) shows how an initially steep IMF that might be characteristic of primordial cloud fragmentation can change into a Salpeter IMF or shallower IMF in a cluster of normal ... More
Time-dependent evolution of quasi-spherical, self-gravitating accretion flowJan 22 2004May 21 2004A self-similar solution for time evolution of quasi-spherical, self-gravitating accretion flows is obtained under the assumption that the generated heat by viscosity is retained in the flow. The solutions are parameterized by the ratio of the mass of ... More
Analysis of the instability due to gas-dust friction in protoplanetary discsDec 14 2015We study stability of a dust layer in a gaseous disc subject to the linear axisymmetric perturbations. Instead of considering single-size particles, however, the population of dust particles is assumed to consist of two grain species. Dust grains exchange ... More
Knowledge ManagementMar 09 2010This paper discusses the important process of knowledge and its management, and differences between tacit and explicit knowledge and understanding the culture as a key issue for the successful implementation of knowledge management, in addition to, this ... More
Conformally Invariant Equations for GravitonOct 12 2012Nov 12 2012Recent astrophysical data indicate that our universe might currently be in a de Sitter (dS) phase. The importance of dS space has been primarily ignited by the study of the inflationary model of the universe and the quantum gravity. As we know Einstein's ... More
Finite support of tensor productsFeb 27 2019We compute the submodule of finite support of the tensor product of two modules $M$ and $N$ and estimate its length in terms of $M$ and $N$. Also, we compute some higher local cohomology modules of tensor products.
Chern Simons invariants in $KK$ theoryJan 15 2018For a unitary representation $\phi$ of the fundamental group of a compact smooth manifold, Atiyah, Patodi, Singer defined the so called $\alpha$-invariant of $\phi$ using the Chern-Simons invariants. In this article using traces on $C^*$-algebras, we ... More
Containment of $\c_0$ and $\ell_1$ in $Π_1(E,F)$Jul 26 2006Suppose $\Pi_1(E, F)$ is the space of all absolutely 1-summing operators between two Banach spaces $E$ and $F$. We show that if $F$ has a copy of $c_0$, then $\Pi_1(E, F)$ will have a copy of $c_0$, and under some conditions if $E$ has a copy of $\ell_1$ ... More
On the (LC) conjectureDec 08 2015Jul 12 2016We prove the (LC) conjecture of Hochster and Huneke in some non-trivial cases. This has several applications. Recently, Brenner and Caminata answered a numerical evidence due to Dao and Smirnov on the shape of generalized Hilbert-Kunz functions of smooth ... More