Miad Faezipour - Profile on Academia.edu (original) (raw)
Uploads
Papers by Miad Faezipour
Formally expressing HIPAA privacy policies for web services
2015 IEEE International Conference on Electro/Information Technology (EIT), 2015
Histogram analysis for automatic blood vessels detection: First step of IOP
2015 IEEE International Conference on Electro/Information Technology (EIT), 2015
2014 Ieee Healthcare Innovation Conference, Oct 9, 2014
Dry eye symptoms are moderately common in the general population and are often chronic particular... more Dry eye symptoms are moderately common in the general population and are often chronic particularly amongst the older adults above age 65. Dry eye can occur from conditions such as aging, dehydration, corneal ulcers and associated infections, vitamin A deficiency or as a temporary or permanent side effect of laser treatment. Some of the tests available to identify a tear deficient eye are Schirmer strip test, strip Meniscometry and phenol red thread test, the most popular being the Schirmer's test, where a patient is tested positive for a dry eye if the test strip is wet for less than 5mm of length over a period of 5 minutes and negative for wetting of at least 10mm within 5minutes. Here we report a simple design and fabrication of an efficient dry eye test strip using a laboratory developed metal rotating collector for electrospinning setup that aligns nanofibers of Polycaprolactone (PCL), a biosafe and biodegradable polymer. Electrospun PCL nanofibers have diameters in the range of 70 -150nm depending upon the protocol creating either aligned or randomly oriented nanofibers. It was found that both random and aligned PCL nanofibers test strips show fast wetting time of 5 seconds for covering the same distance of 10mm that a conventional test strip covers in 5 minutes making our product approximately sixty times faster and exhibiting high throughput. We believe that this is because of higher capillary transport and better wetting of the nanofibers. It is further demonstrated that the concentration of PCL plays a crucial role in the formation of the nanofibers and hence the wetting phenomena.
Estimating Lung Capacity from Acoustic Signal of Respiration
ABSTRACT INTRODUCTION reathing disorders are generally associated with the lung cancer disease. T... more ABSTRACT INTRODUCTION reathing disorders are generally associated with the lung cancer disease. Through daily treatment, lung cancer patients often use a traditional spirometer to measure their lung capacity. However, a smart alternative would be to employ a microphone embedded within a hand-held device (e.g. a smart-phone), that can easily capture the acoustic signal of breath without certain instructions. This signal can then be processed to estimate the lung capacity. PROPOSED METHOD This work presents a novel method on the recorded acoustic signal of breath captured using a microphone to estimate the lung capacity. The breathing cycle is segmented to inhale, pause, exhale and pause phases by applying the Voice Activity Detection (VAD) technique [1] on the acoustic signal of respiration. The voice (speech) phases are considered to be one inhale (inspiratory) phase and one exhale (expiratory) phase per breath cycle [2-3] (see Fig. 1). The depth of the breath along with the time duration and signal energy are measured to compute the lung capacity. Fig 1. Segmenting acoustic signal of breath using VAD.
OSA Screening Test at the Patient’s Home
A Patient Posture Scheduling Using Constrained Shortest Path to Prevent Pressure Ulcers
Breathing Movement Classification Using MFCCs
ABSTRACT
Many researches have been devoted in the past two decades to develop technologies that assist peo... more Many researches have been devoted in the past two decades to develop technologies that assist people suffering motor disabilities associated with problems in verbal communication. Eye tracking and head movement detection and their use in empowering people with disability have remained interesting subjects especially in the current digital era. Generally, eye tracking involves manipulation through measuring the eye motion or monitoring the activities of the eye. Various researches have used different methods of eye tracking providing evidence that the science is of value to the society in general, and to the disabled individuals, in particular. Their methods have worked with individuals as well as groups. Head movement detection tracking has been found to be a natural way of expressing direction, and as a control technique it has been shown to be simple and effective. This paper surveys the literature on eye-tracking and head movement detection techniques for helping the disabled group.
Improving Wireless Infrastructure Networks Security by Access Point Checking
Access Point Checking to Improve Security in Wireless Infrastructure Networks
ABSTRACT
Novel Steganography over HTML
Different security strategies have been developed to protect the transfer of information between ... more Different security strategies have been developed to protect the transfer of information between users. This has become especially important after the tremendous growth of internet use. Encryption techniques convert readable data into a ciphered form. Other techniques hide the message in another file, and some powerful techniques combine hiding and encryption concepts. In this paper, a new security algorithm is presented by using Steganography over HTML pages. Hiding the information inside Html page code comments and employing encryption, can enhance the possibility to discover the hidden data. The proposed algorithm applies some statistical concepts to create a frequency array to determine the occurrence frequency of each character. The encryption step depends on two simple logical operations to change the data form to increase the complexity of the hiding process. The last step is to embed the encrypted data as comments inside the HTML page. This new algorithm comes with many adva...
Highly efficient novel text steganography algorithms
2015 Long Island Systems, Applications and Technology, 2015
ABSTRACT This paper investigates eight novel Steganography algorithms employing text file as a ca... more ABSTRACT This paper investigates eight novel Steganography algorithms employing text file as a carrier file. The proposed model hides secret data in the text file by manipulating the font format or inserting special symbols in the text file. Furthermore, the suggested algorithms can be applied to both Unicode and ASCII code languages, regardless of the text file format. In addition, a merging capability among the techniques is introduced, which allows alternatives for users based on the system requirements. The proposed algorithms achieve a high degree of optimized Steganography attributes such as hidden ratio, robustness, and transparency.
A comparison of different machine learning algorithms using single channel EEG signal for classifying human sleep stages
2015 Long Island Systems, Applications and Technology, 2015
FPGA-based denoising and beat detection of the ECG signal
2015 Long Island Systems, Applications and Technology, 2015
A comparison of feature sets for an automated skin lesion analysis system for melanoma early detection and prevention
2015 Long Island Systems, Applications and Technology, 2015
IEEE Journal of Translational Engineering in Health and Medicine, 2015
Melanoma spreads through metastasis, and therefore, it has been proved to be very fatal. Statisti... more Melanoma spreads through metastasis, and therefore, it has been proved to be very fatal. Statistical evidence has revealed that the majority of deaths resulting from skin cancer are as a result of melanoma. Further investigations have shown that the survival rates in patients depend on the stage of the cancer; early detection and intervention of melanoma implicate higher chances of cure. Clinical diagnosis and prognosis of melanoma are challenging, since the processes are prone to misdiagnosis and inaccuracies due to doctors' subjectivity. Malignant melanomas are asymmetrical, have irregular borders, notched edges, and color variations, so analyzing the shape, color, and texture of the skin lesion is important for the early detection and prevention of melanoma. This paper proposes the two major components of a noninvasive real-time automated skin lesion analysis system for the early detection and prevention of melanoma. The first component is a real-time alert to help users prevent skinburn caused by sunlight; a novel equation to compute the time for skin to burn is thereby introduced. The second component is an automated image analysis module, which contains image acquisition, hair detection and exclusion, lesion segmentation, feature extraction, and classification. The proposed system uses PH2 Dermoscopy image database from Pedro Hispano Hospital for the development and testing purposes. The image database contains a total of 200 dermoscopy images of lesions, including benign, atypical, and melanoma cases. The experimental results show that the proposed system is efficient, achieving classification of the benign, atypical, and melanoma images with accuracy of 96.3%, 95.7%, and 97.5%, respectively.
IEEE Long Island Systems, Applications and Technology (LISAT) Conference 2014, 2014
Melanoma incidence rates have been increasing for the past three decades. Most people diagnosed w... more Melanoma incidence rates have been increasing for the past three decades. Most people diagnosed with non-melanoma skin cancer have higher chances to cure, but melanoma survival rates are low comparing to other skin cancer types. It is important to note that one in five Americans will develop skin cancer in their lifetime, and on average, one American dies from skin cancer every hour. A system to prevent this type of skin cancer is being awaited and is highly in-demand. Early detection of melanoma is one of the major factors to increase the chance of cure significantly. Malignant melanomas are asymmetrical and have irregular borders with rages and notched edges, so analyzing the shape of the skin lesion is important for melanoma early detection and prevention. In this paper, we introduce an automated skin lesion segmentation and analysis for early detection and prevention based on color and shape geometry. The system further incorporates other feature sets such as color to determine the lesion type. In our proposed system, we used PH2 Dermoscopy image database from Pedro Hispano Hospital for the development of our system and for testing purposes. This image database contains a total of 200 dermoscopy images of lesions, including normal, atypical, and melanoma cases. Our approach of analyzing the shape geometry and the color will be helpful to detect atypical lesions before it grows and becomes a melanoma case.
Access Point Checking to Improve Security in Wireless Infrastructure Networks
Lecture Notes in Electrical Engineering, 2012
ABSTRACT
A High-Performance Multi-Match Priority Encoder for TCAM-Based Packet Classifiers
2007 6th IEEE Dallas Circuits and Systems Workshop on System-on-Chip, 2007
ABSTRACT
Formally expressing HIPAA privacy policies for web services
2015 IEEE International Conference on Electro/Information Technology (EIT), 2015
Histogram analysis for automatic blood vessels detection: First step of IOP
2015 IEEE International Conference on Electro/Information Technology (EIT), 2015
2014 Ieee Healthcare Innovation Conference, Oct 9, 2014
Dry eye symptoms are moderately common in the general population and are often chronic particular... more Dry eye symptoms are moderately common in the general population and are often chronic particularly amongst the older adults above age 65. Dry eye can occur from conditions such as aging, dehydration, corneal ulcers and associated infections, vitamin A deficiency or as a temporary or permanent side effect of laser treatment. Some of the tests available to identify a tear deficient eye are Schirmer strip test, strip Meniscometry and phenol red thread test, the most popular being the Schirmer's test, where a patient is tested positive for a dry eye if the test strip is wet for less than 5mm of length over a period of 5 minutes and negative for wetting of at least 10mm within 5minutes. Here we report a simple design and fabrication of an efficient dry eye test strip using a laboratory developed metal rotating collector for electrospinning setup that aligns nanofibers of Polycaprolactone (PCL), a biosafe and biodegradable polymer. Electrospun PCL nanofibers have diameters in the range of 70 -150nm depending upon the protocol creating either aligned or randomly oriented nanofibers. It was found that both random and aligned PCL nanofibers test strips show fast wetting time of 5 seconds for covering the same distance of 10mm that a conventional test strip covers in 5 minutes making our product approximately sixty times faster and exhibiting high throughput. We believe that this is because of higher capillary transport and better wetting of the nanofibers. It is further demonstrated that the concentration of PCL plays a crucial role in the formation of the nanofibers and hence the wetting phenomena.
Estimating Lung Capacity from Acoustic Signal of Respiration
ABSTRACT INTRODUCTION reathing disorders are generally associated with the lung cancer disease. T... more ABSTRACT INTRODUCTION reathing disorders are generally associated with the lung cancer disease. Through daily treatment, lung cancer patients often use a traditional spirometer to measure their lung capacity. However, a smart alternative would be to employ a microphone embedded within a hand-held device (e.g. a smart-phone), that can easily capture the acoustic signal of breath without certain instructions. This signal can then be processed to estimate the lung capacity. PROPOSED METHOD This work presents a novel method on the recorded acoustic signal of breath captured using a microphone to estimate the lung capacity. The breathing cycle is segmented to inhale, pause, exhale and pause phases by applying the Voice Activity Detection (VAD) technique [1] on the acoustic signal of respiration. The voice (speech) phases are considered to be one inhale (inspiratory) phase and one exhale (expiratory) phase per breath cycle [2-3] (see Fig. 1). The depth of the breath along with the time duration and signal energy are measured to compute the lung capacity. Fig 1. Segmenting acoustic signal of breath using VAD.
OSA Screening Test at the Patient’s Home
A Patient Posture Scheduling Using Constrained Shortest Path to Prevent Pressure Ulcers
Breathing Movement Classification Using MFCCs
ABSTRACT
Many researches have been devoted in the past two decades to develop technologies that assist peo... more Many researches have been devoted in the past two decades to develop technologies that assist people suffering motor disabilities associated with problems in verbal communication. Eye tracking and head movement detection and their use in empowering people with disability have remained interesting subjects especially in the current digital era. Generally, eye tracking involves manipulation through measuring the eye motion or monitoring the activities of the eye. Various researches have used different methods of eye tracking providing evidence that the science is of value to the society in general, and to the disabled individuals, in particular. Their methods have worked with individuals as well as groups. Head movement detection tracking has been found to be a natural way of expressing direction, and as a control technique it has been shown to be simple and effective. This paper surveys the literature on eye-tracking and head movement detection techniques for helping the disabled group.
Improving Wireless Infrastructure Networks Security by Access Point Checking
Access Point Checking to Improve Security in Wireless Infrastructure Networks
ABSTRACT
Novel Steganography over HTML
Different security strategies have been developed to protect the transfer of information between ... more Different security strategies have been developed to protect the transfer of information between users. This has become especially important after the tremendous growth of internet use. Encryption techniques convert readable data into a ciphered form. Other techniques hide the message in another file, and some powerful techniques combine hiding and encryption concepts. In this paper, a new security algorithm is presented by using Steganography over HTML pages. Hiding the information inside Html page code comments and employing encryption, can enhance the possibility to discover the hidden data. The proposed algorithm applies some statistical concepts to create a frequency array to determine the occurrence frequency of each character. The encryption step depends on two simple logical operations to change the data form to increase the complexity of the hiding process. The last step is to embed the encrypted data as comments inside the HTML page. This new algorithm comes with many adva...
Highly efficient novel text steganography algorithms
2015 Long Island Systems, Applications and Technology, 2015
ABSTRACT This paper investigates eight novel Steganography algorithms employing text file as a ca... more ABSTRACT This paper investigates eight novel Steganography algorithms employing text file as a carrier file. The proposed model hides secret data in the text file by manipulating the font format or inserting special symbols in the text file. Furthermore, the suggested algorithms can be applied to both Unicode and ASCII code languages, regardless of the text file format. In addition, a merging capability among the techniques is introduced, which allows alternatives for users based on the system requirements. The proposed algorithms achieve a high degree of optimized Steganography attributes such as hidden ratio, robustness, and transparency.
A comparison of different machine learning algorithms using single channel EEG signal for classifying human sleep stages
2015 Long Island Systems, Applications and Technology, 2015
FPGA-based denoising and beat detection of the ECG signal
2015 Long Island Systems, Applications and Technology, 2015
A comparison of feature sets for an automated skin lesion analysis system for melanoma early detection and prevention
2015 Long Island Systems, Applications and Technology, 2015
IEEE Journal of Translational Engineering in Health and Medicine, 2015
Melanoma spreads through metastasis, and therefore, it has been proved to be very fatal. Statisti... more Melanoma spreads through metastasis, and therefore, it has been proved to be very fatal. Statistical evidence has revealed that the majority of deaths resulting from skin cancer are as a result of melanoma. Further investigations have shown that the survival rates in patients depend on the stage of the cancer; early detection and intervention of melanoma implicate higher chances of cure. Clinical diagnosis and prognosis of melanoma are challenging, since the processes are prone to misdiagnosis and inaccuracies due to doctors' subjectivity. Malignant melanomas are asymmetrical, have irregular borders, notched edges, and color variations, so analyzing the shape, color, and texture of the skin lesion is important for the early detection and prevention of melanoma. This paper proposes the two major components of a noninvasive real-time automated skin lesion analysis system for the early detection and prevention of melanoma. The first component is a real-time alert to help users prevent skinburn caused by sunlight; a novel equation to compute the time for skin to burn is thereby introduced. The second component is an automated image analysis module, which contains image acquisition, hair detection and exclusion, lesion segmentation, feature extraction, and classification. The proposed system uses PH2 Dermoscopy image database from Pedro Hispano Hospital for the development and testing purposes. The image database contains a total of 200 dermoscopy images of lesions, including benign, atypical, and melanoma cases. The experimental results show that the proposed system is efficient, achieving classification of the benign, atypical, and melanoma images with accuracy of 96.3%, 95.7%, and 97.5%, respectively.
IEEE Long Island Systems, Applications and Technology (LISAT) Conference 2014, 2014
Melanoma incidence rates have been increasing for the past three decades. Most people diagnosed w... more Melanoma incidence rates have been increasing for the past three decades. Most people diagnosed with non-melanoma skin cancer have higher chances to cure, but melanoma survival rates are low comparing to other skin cancer types. It is important to note that one in five Americans will develop skin cancer in their lifetime, and on average, one American dies from skin cancer every hour. A system to prevent this type of skin cancer is being awaited and is highly in-demand. Early detection of melanoma is one of the major factors to increase the chance of cure significantly. Malignant melanomas are asymmetrical and have irregular borders with rages and notched edges, so analyzing the shape of the skin lesion is important for melanoma early detection and prevention. In this paper, we introduce an automated skin lesion segmentation and analysis for early detection and prevention based on color and shape geometry. The system further incorporates other feature sets such as color to determine the lesion type. In our proposed system, we used PH2 Dermoscopy image database from Pedro Hispano Hospital for the development of our system and for testing purposes. This image database contains a total of 200 dermoscopy images of lesions, including normal, atypical, and melanoma cases. Our approach of analyzing the shape geometry and the color will be helpful to detect atypical lesions before it grows and becomes a melanoma case.
Access Point Checking to Improve Security in Wireless Infrastructure Networks
Lecture Notes in Electrical Engineering, 2012
ABSTRACT
A High-Performance Multi-Match Priority Encoder for TCAM-Based Packet Classifiers
2007 6th IEEE Dallas Circuits and Systems Workshop on System-on-Chip, 2007
ABSTRACT
Wireless sensor network (WSN) is built of many sensor nodes. The sensors can sense a phenomenon, ... more Wireless sensor network (WSN) is built of many sensor nodes. The sensors can sense a phenomenon, which will be represented in a form of data and sent to an aggregator for further processing. WSN is used in many applications, such as object tracking and security monitoring. The objects in many situations need physical and location protection. In addition to the source location privacy, sink location privacy should be provided. Providing an efficient location privacy solution would be challenging due to the open nature of the WSN. Anonymity is a key solution for location privacy. We present a network model that is protected against local, multilocal, and global adversaries that can launch sophisticated passive and active attacks against the WSN.
Wireless sensor network (WSN) is built of hosts called sensors which can sense a phenomenon such ... more Wireless sensor network (WSN) is built of hosts called sensors which can sense a phenomenon such as motion, temperature, and humidity. Sensors represent what they sense in data format. Providing an efficient end-to-end privacy solution would be a challenging task due to the open nature of the WSN. The key schemes needed for end-to-end location privacy are anonymity, observability, capture likelihood and safety period. On top of that, having temporal privacy is crucial to attain. We extend this work to provide a solution against global adversaries. We present a network model that is protected against passive/active and local/multi-local/global attacks. This work provides a solution for temporal privacy to attain end-to-end anonymity and location privacy.
Wireless sensor networks (WSNs) consist of many sensors working as hosts. These sensors can sense... more Wireless sensor networks (WSNs) consist of many sensors working as hosts. These sensors can sense a phenomenon and represent it in a form of data. There are many applications for WSNs such as object tracking and monitoring where the objects need protection. Providing an efficient location privacy solution would be challenging to achieve due to the exposed nature of the WSN. The communication protocol needs to provide location privacy measured by anonymity, observability, capture- likelihood and safety period. We extend this work to allow for countermeasures against semi-global and global adversaries. We present a network model that is protected against a sophisticated passive and active attacks using local, semi-global, and global adversaries.