Miad Faezipour - Profile on Academia.edu (original) (raw)

Uploads

Papers by Miad Faezipour

Research paper thumbnail of Formally expressing HIPAA privacy policies for web services

Formally expressing HIPAA privacy policies for web services

2015 IEEE International Conference on Electro/Information Technology (EIT), 2015

Research paper thumbnail of Histogram analysis for automatic blood vessels detection: First step of IOP

Histogram analysis for automatic blood vessels detection: First step of IOP

2015 IEEE International Conference on Electro/Information Technology (EIT), 2015

Research paper thumbnail of Polycaprolactone Nanofibrous Materials As an Efficient Dry Eye Test Strip

2014 Ieee Healthcare Innovation Conference, Oct 9, 2014

Dry eye symptoms are moderately common in the general population and are often chronic particular... more Dry eye symptoms are moderately common in the general population and are often chronic particularly amongst the older adults above age 65. Dry eye can occur from conditions such as aging, dehydration, corneal ulcers and associated infections, vitamin A deficiency or as a temporary or permanent side effect of laser treatment. Some of the tests available to identify a tear deficient eye are Schirmer strip test, strip Meniscometry and phenol red thread test, the most popular being the Schirmer's test, where a patient is tested positive for a dry eye if the test strip is wet for less than 5mm of length over a period of 5 minutes and negative for wetting of at least 10mm within 5minutes. Here we report a simple design and fabrication of an efficient dry eye test strip using a laboratory developed metal rotating collector for electrospinning setup that aligns nanofibers of Polycaprolactone (PCL), a biosafe and biodegradable polymer. Electrospun PCL nanofibers have diameters in the range of 70 -150nm depending upon the protocol creating either aligned or randomly oriented nanofibers. It was found that both random and aligned PCL nanofibers test strips show fast wetting time of 5 seconds for covering the same distance of 10mm that a conventional test strip covers in 5 minutes making our product approximately sixty times faster and exhibiting high throughput. We believe that this is because of higher capillary transport and better wetting of the nanofibers. It is further demonstrated that the concentration of PCL plays a crucial role in the formation of the nanofibers and hence the wetting phenomena.

Research paper thumbnail of Conceptual Framework of a Virtual Reality Environment to Assist Lung Cancer Patients

Research paper thumbnail of Estimating Lung Capacity from Acoustic Signal of Respiration

Estimating Lung Capacity from Acoustic Signal of Respiration

ABSTRACT INTRODUCTION reathing disorders are generally associated with the lung cancer disease. T... more ABSTRACT INTRODUCTION reathing disorders are generally associated with the lung cancer disease. Through daily treatment, lung cancer patients often use a traditional spirometer to measure their lung capacity. However, a smart alternative would be to employ a microphone embedded within a hand-held device (e.g. a smart-phone), that can easily capture the acoustic signal of breath without certain instructions. This signal can then be processed to estimate the lung capacity. PROPOSED METHOD This work presents a novel method on the recorded acoustic signal of breath captured using a microphone to estimate the lung capacity. The breathing cycle is segmented to inhale, pause, exhale and pause phases by applying the Voice Activity Detection (VAD) technique [1] on the acoustic signal of respiration. The voice (speech) phases are considered to be one inhale (inspiratory) phase and one exhale (expiratory) phase per breath cycle [2-3] (see Fig. 1). The depth of the breath along with the time duration and signal energy are measured to compute the lung capacity. Fig 1. Segmenting acoustic signal of breath using VAD.

Research paper thumbnail of OSA Screening Test at the Patient’s Home

OSA Screening Test at the Patient’s Home

Research paper thumbnail of A Patient Posture Scheduling Using Constrained Shortest Path to Prevent Pressure Ulcers

A Patient Posture Scheduling Using Constrained Shortest Path to Prevent Pressure Ulcers

Research paper thumbnail of Breathing Movement Classification Using MFCCs

Breathing Movement Classification Using MFCCs

ABSTRACT

Research paper thumbnail of Eye Tracking and Head Movements Detection to Assist People with Disabilities: Unveiled

Many researches have been devoted in the past two decades to develop technologies that assist peo... more Many researches have been devoted in the past two decades to develop technologies that assist people suffering motor disabilities associated with problems in verbal communication. Eye tracking and head movement detection and their use in empowering people with disability have remained interesting subjects especially in the current digital era. Generally, eye tracking involves manipulation through measuring the eye motion or monitoring the activities of the eye. Various researches have used different methods of eye tracking providing evidence that the science is of value to the society in general, and to the disabled individuals, in particular. Their methods have worked with individuals as well as groups. Head movement detection tracking has been found to be a natural way of expressing direction, and as a control technique it has been shown to be simple and effective. This paper surveys the literature on eye-tracking and head movement detection techniques for helping the disabled group.

Research paper thumbnail of Improving Wireless Infrastructure Networks Security by Access Point Checking

Improving Wireless Infrastructure Networks Security by Access Point Checking

Research paper thumbnail of Access Point Checking to Improve Security in Wireless Infrastructure Networks

Access Point Checking to Improve Security in Wireless Infrastructure Networks

ABSTRACT

Research paper thumbnail of Novel Steganography over HTML

Novel Steganography over HTML

Different security strategies have been developed to protect the transfer of information between ... more Different security strategies have been developed to protect the transfer of information between users. This has become especially important after the tremendous growth of internet use. Encryption techniques convert readable data into a ciphered form. Other techniques hide the message in another file, and some powerful techniques combine hiding and encryption concepts. In this paper, a new security algorithm is presented by using Steganography over HTML pages. Hiding the information inside Html page code comments and employing encryption, can enhance the possibility to discover the hidden data. The proposed algorithm applies some statistical concepts to create a frequency array to determine the occurrence frequency of each character. The encryption step depends on two simple logical operations to change the data form to increase the complexity of the hiding process. The last step is to embed the encrypted data as comments inside the HTML page. This new algorithm comes with many adva...

Research paper thumbnail of Highly efficient novel text steganography algorithms

Highly efficient novel text steganography algorithms

2015 Long Island Systems, Applications and Technology, 2015

ABSTRACT This paper investigates eight novel Steganography algorithms employing text file as a ca... more ABSTRACT This paper investigates eight novel Steganography algorithms employing text file as a carrier file. The proposed model hides secret data in the text file by manipulating the font format or inserting special symbols in the text file. Furthermore, the suggested algorithms can be applied to both Unicode and ASCII code languages, regardless of the text file format. In addition, a merging capability among the techniques is introduced, which allows alternatives for users based on the system requirements. The proposed algorithms achieve a high degree of optimized Steganography attributes such as hidden ratio, robustness, and transparency.

Research paper thumbnail of A comparison of different machine learning algorithms using single channel EEG signal for classifying human sleep stages

A comparison of different machine learning algorithms using single channel EEG signal for classifying human sleep stages

2015 Long Island Systems, Applications and Technology, 2015

Research paper thumbnail of FPGA-based denoising and beat detection of the ECG signal

FPGA-based denoising and beat detection of the ECG signal

2015 Long Island Systems, Applications and Technology, 2015

Research paper thumbnail of A comparison of feature sets for an automated skin lesion analysis system for melanoma early detection and prevention

A comparison of feature sets for an automated skin lesion analysis system for melanoma early detection and prevention

2015 Long Island Systems, Applications and Technology, 2015

Research paper thumbnail of Noninvasive Real-Time Automated Skin Lesion Analysis System for Melanoma Early Detection and Prevention

IEEE Journal of Translational Engineering in Health and Medicine, 2015

Melanoma spreads through metastasis, and therefore, it has been proved to be very fatal. Statisti... more Melanoma spreads through metastasis, and therefore, it has been proved to be very fatal. Statistical evidence has revealed that the majority of deaths resulting from skin cancer are as a result of melanoma. Further investigations have shown that the survival rates in patients depend on the stage of the cancer; early detection and intervention of melanoma implicate higher chances of cure. Clinical diagnosis and prognosis of melanoma are challenging, since the processes are prone to misdiagnosis and inaccuracies due to doctors' subjectivity. Malignant melanomas are asymmetrical, have irregular borders, notched edges, and color variations, so analyzing the shape, color, and texture of the skin lesion is important for the early detection and prevention of melanoma. This paper proposes the two major components of a noninvasive real-time automated skin lesion analysis system for the early detection and prevention of melanoma. The first component is a real-time alert to help users prevent skinburn caused by sunlight; a novel equation to compute the time for skin to burn is thereby introduced. The second component is an automated image analysis module, which contains image acquisition, hair detection and exclusion, lesion segmentation, feature extraction, and classification. The proposed system uses PH2 Dermoscopy image database from Pedro Hispano Hospital for the development and testing purposes. The image database contains a total of 200 dermoscopy images of lesions, including benign, atypical, and melanoma cases. The experimental results show that the proposed system is efficient, achieving classification of the benign, atypical, and melanoma images with accuracy of 96.3%, 95.7%, and 97.5%, respectively.

Research paper thumbnail of Automated skin lesion analysis based on color and shape geometry feature set for melanoma early detection and prevention

IEEE Long Island Systems, Applications and Technology (LISAT) Conference 2014, 2014

Melanoma incidence rates have been increasing for the past three decades. Most people diagnosed w... more Melanoma incidence rates have been increasing for the past three decades. Most people diagnosed with non-melanoma skin cancer have higher chances to cure, but melanoma survival rates are low comparing to other skin cancer types. It is important to note that one in five Americans will develop skin cancer in their lifetime, and on average, one American dies from skin cancer every hour. A system to prevent this type of skin cancer is being awaited and is highly in-demand. Early detection of melanoma is one of the major factors to increase the chance of cure significantly. Malignant melanomas are asymmetrical and have irregular borders with rages and notched edges, so analyzing the shape of the skin lesion is important for melanoma early detection and prevention. In this paper, we introduce an automated skin lesion segmentation and analysis for early detection and prevention based on color and shape geometry. The system further incorporates other feature sets such as color to determine the lesion type. In our proposed system, we used PH2 Dermoscopy image database from Pedro Hispano Hospital for the development of our system and for testing purposes. This image database contains a total of 200 dermoscopy images of lesions, including normal, atypical, and melanoma cases. Our approach of analyzing the shape geometry and the color will be helpful to detect atypical lesions before it grows and becomes a melanoma case.

Research paper thumbnail of Access Point Checking to Improve Security in Wireless Infrastructure Networks

Access Point Checking to Improve Security in Wireless Infrastructure Networks

Lecture Notes in Electrical Engineering, 2012

ABSTRACT

Research paper thumbnail of A High-Performance Multi-Match Priority Encoder for TCAM-Based Packet Classifiers

A High-Performance Multi-Match Priority Encoder for TCAM-Based Packet Classifiers

2007 6th IEEE Dallas Circuits and Systems Workshop on System-on-Chip, 2007

ABSTRACT

Research paper thumbnail of Formally expressing HIPAA privacy policies for web services

Formally expressing HIPAA privacy policies for web services

2015 IEEE International Conference on Electro/Information Technology (EIT), 2015

Research paper thumbnail of Histogram analysis for automatic blood vessels detection: First step of IOP

Histogram analysis for automatic blood vessels detection: First step of IOP

2015 IEEE International Conference on Electro/Information Technology (EIT), 2015

Research paper thumbnail of Polycaprolactone Nanofibrous Materials As an Efficient Dry Eye Test Strip

2014 Ieee Healthcare Innovation Conference, Oct 9, 2014

Dry eye symptoms are moderately common in the general population and are often chronic particular... more Dry eye symptoms are moderately common in the general population and are often chronic particularly amongst the older adults above age 65. Dry eye can occur from conditions such as aging, dehydration, corneal ulcers and associated infections, vitamin A deficiency or as a temporary or permanent side effect of laser treatment. Some of the tests available to identify a tear deficient eye are Schirmer strip test, strip Meniscometry and phenol red thread test, the most popular being the Schirmer's test, where a patient is tested positive for a dry eye if the test strip is wet for less than 5mm of length over a period of 5 minutes and negative for wetting of at least 10mm within 5minutes. Here we report a simple design and fabrication of an efficient dry eye test strip using a laboratory developed metal rotating collector for electrospinning setup that aligns nanofibers of Polycaprolactone (PCL), a biosafe and biodegradable polymer. Electrospun PCL nanofibers have diameters in the range of 70 -150nm depending upon the protocol creating either aligned or randomly oriented nanofibers. It was found that both random and aligned PCL nanofibers test strips show fast wetting time of 5 seconds for covering the same distance of 10mm that a conventional test strip covers in 5 minutes making our product approximately sixty times faster and exhibiting high throughput. We believe that this is because of higher capillary transport and better wetting of the nanofibers. It is further demonstrated that the concentration of PCL plays a crucial role in the formation of the nanofibers and hence the wetting phenomena.

Research paper thumbnail of Conceptual Framework of a Virtual Reality Environment to Assist Lung Cancer Patients

Research paper thumbnail of Estimating Lung Capacity from Acoustic Signal of Respiration

Estimating Lung Capacity from Acoustic Signal of Respiration

ABSTRACT INTRODUCTION reathing disorders are generally associated with the lung cancer disease. T... more ABSTRACT INTRODUCTION reathing disorders are generally associated with the lung cancer disease. Through daily treatment, lung cancer patients often use a traditional spirometer to measure their lung capacity. However, a smart alternative would be to employ a microphone embedded within a hand-held device (e.g. a smart-phone), that can easily capture the acoustic signal of breath without certain instructions. This signal can then be processed to estimate the lung capacity. PROPOSED METHOD This work presents a novel method on the recorded acoustic signal of breath captured using a microphone to estimate the lung capacity. The breathing cycle is segmented to inhale, pause, exhale and pause phases by applying the Voice Activity Detection (VAD) technique [1] on the acoustic signal of respiration. The voice (speech) phases are considered to be one inhale (inspiratory) phase and one exhale (expiratory) phase per breath cycle [2-3] (see Fig. 1). The depth of the breath along with the time duration and signal energy are measured to compute the lung capacity. Fig 1. Segmenting acoustic signal of breath using VAD.

Research paper thumbnail of OSA Screening Test at the Patient’s Home

OSA Screening Test at the Patient’s Home

Research paper thumbnail of A Patient Posture Scheduling Using Constrained Shortest Path to Prevent Pressure Ulcers

A Patient Posture Scheduling Using Constrained Shortest Path to Prevent Pressure Ulcers

Research paper thumbnail of Breathing Movement Classification Using MFCCs

Breathing Movement Classification Using MFCCs

ABSTRACT

Research paper thumbnail of Eye Tracking and Head Movements Detection to Assist People with Disabilities: Unveiled

Many researches have been devoted in the past two decades to develop technologies that assist peo... more Many researches have been devoted in the past two decades to develop technologies that assist people suffering motor disabilities associated with problems in verbal communication. Eye tracking and head movement detection and their use in empowering people with disability have remained interesting subjects especially in the current digital era. Generally, eye tracking involves manipulation through measuring the eye motion or monitoring the activities of the eye. Various researches have used different methods of eye tracking providing evidence that the science is of value to the society in general, and to the disabled individuals, in particular. Their methods have worked with individuals as well as groups. Head movement detection tracking has been found to be a natural way of expressing direction, and as a control technique it has been shown to be simple and effective. This paper surveys the literature on eye-tracking and head movement detection techniques for helping the disabled group.

Research paper thumbnail of Improving Wireless Infrastructure Networks Security by Access Point Checking

Improving Wireless Infrastructure Networks Security by Access Point Checking

Research paper thumbnail of Access Point Checking to Improve Security in Wireless Infrastructure Networks

Access Point Checking to Improve Security in Wireless Infrastructure Networks

ABSTRACT

Research paper thumbnail of Novel Steganography over HTML

Novel Steganography over HTML

Different security strategies have been developed to protect the transfer of information between ... more Different security strategies have been developed to protect the transfer of information between users. This has become especially important after the tremendous growth of internet use. Encryption techniques convert readable data into a ciphered form. Other techniques hide the message in another file, and some powerful techniques combine hiding and encryption concepts. In this paper, a new security algorithm is presented by using Steganography over HTML pages. Hiding the information inside Html page code comments and employing encryption, can enhance the possibility to discover the hidden data. The proposed algorithm applies some statistical concepts to create a frequency array to determine the occurrence frequency of each character. The encryption step depends on two simple logical operations to change the data form to increase the complexity of the hiding process. The last step is to embed the encrypted data as comments inside the HTML page. This new algorithm comes with many adva...

Research paper thumbnail of Highly efficient novel text steganography algorithms

Highly efficient novel text steganography algorithms

2015 Long Island Systems, Applications and Technology, 2015

ABSTRACT This paper investigates eight novel Steganography algorithms employing text file as a ca... more ABSTRACT This paper investigates eight novel Steganography algorithms employing text file as a carrier file. The proposed model hides secret data in the text file by manipulating the font format or inserting special symbols in the text file. Furthermore, the suggested algorithms can be applied to both Unicode and ASCII code languages, regardless of the text file format. In addition, a merging capability among the techniques is introduced, which allows alternatives for users based on the system requirements. The proposed algorithms achieve a high degree of optimized Steganography attributes such as hidden ratio, robustness, and transparency.

Research paper thumbnail of A comparison of different machine learning algorithms using single channel EEG signal for classifying human sleep stages

A comparison of different machine learning algorithms using single channel EEG signal for classifying human sleep stages

2015 Long Island Systems, Applications and Technology, 2015

Research paper thumbnail of FPGA-based denoising and beat detection of the ECG signal

FPGA-based denoising and beat detection of the ECG signal

2015 Long Island Systems, Applications and Technology, 2015

Research paper thumbnail of A comparison of feature sets for an automated skin lesion analysis system for melanoma early detection and prevention

A comparison of feature sets for an automated skin lesion analysis system for melanoma early detection and prevention

2015 Long Island Systems, Applications and Technology, 2015

Research paper thumbnail of Noninvasive Real-Time Automated Skin Lesion Analysis System for Melanoma Early Detection and Prevention

IEEE Journal of Translational Engineering in Health and Medicine, 2015

Melanoma spreads through metastasis, and therefore, it has been proved to be very fatal. Statisti... more Melanoma spreads through metastasis, and therefore, it has been proved to be very fatal. Statistical evidence has revealed that the majority of deaths resulting from skin cancer are as a result of melanoma. Further investigations have shown that the survival rates in patients depend on the stage of the cancer; early detection and intervention of melanoma implicate higher chances of cure. Clinical diagnosis and prognosis of melanoma are challenging, since the processes are prone to misdiagnosis and inaccuracies due to doctors' subjectivity. Malignant melanomas are asymmetrical, have irregular borders, notched edges, and color variations, so analyzing the shape, color, and texture of the skin lesion is important for the early detection and prevention of melanoma. This paper proposes the two major components of a noninvasive real-time automated skin lesion analysis system for the early detection and prevention of melanoma. The first component is a real-time alert to help users prevent skinburn caused by sunlight; a novel equation to compute the time for skin to burn is thereby introduced. The second component is an automated image analysis module, which contains image acquisition, hair detection and exclusion, lesion segmentation, feature extraction, and classification. The proposed system uses PH2 Dermoscopy image database from Pedro Hispano Hospital for the development and testing purposes. The image database contains a total of 200 dermoscopy images of lesions, including benign, atypical, and melanoma cases. The experimental results show that the proposed system is efficient, achieving classification of the benign, atypical, and melanoma images with accuracy of 96.3%, 95.7%, and 97.5%, respectively.

Research paper thumbnail of Automated skin lesion analysis based on color and shape geometry feature set for melanoma early detection and prevention

IEEE Long Island Systems, Applications and Technology (LISAT) Conference 2014, 2014

Melanoma incidence rates have been increasing for the past three decades. Most people diagnosed w... more Melanoma incidence rates have been increasing for the past three decades. Most people diagnosed with non-melanoma skin cancer have higher chances to cure, but melanoma survival rates are low comparing to other skin cancer types. It is important to note that one in five Americans will develop skin cancer in their lifetime, and on average, one American dies from skin cancer every hour. A system to prevent this type of skin cancer is being awaited and is highly in-demand. Early detection of melanoma is one of the major factors to increase the chance of cure significantly. Malignant melanomas are asymmetrical and have irregular borders with rages and notched edges, so analyzing the shape of the skin lesion is important for melanoma early detection and prevention. In this paper, we introduce an automated skin lesion segmentation and analysis for early detection and prevention based on color and shape geometry. The system further incorporates other feature sets such as color to determine the lesion type. In our proposed system, we used PH2 Dermoscopy image database from Pedro Hispano Hospital for the development of our system and for testing purposes. This image database contains a total of 200 dermoscopy images of lesions, including normal, atypical, and melanoma cases. Our approach of analyzing the shape geometry and the color will be helpful to detect atypical lesions before it grows and becomes a melanoma case.

Research paper thumbnail of Access Point Checking to Improve Security in Wireless Infrastructure Networks

Access Point Checking to Improve Security in Wireless Infrastructure Networks

Lecture Notes in Electrical Engineering, 2012

ABSTRACT

Research paper thumbnail of A High-Performance Multi-Match Priority Encoder for TCAM-Based Packet Classifiers

A High-Performance Multi-Match Priority Encoder for TCAM-Based Packet Classifiers

2007 6th IEEE Dallas Circuits and Systems Workshop on System-on-Chip, 2007

ABSTRACT

Research paper thumbnail of An enhanced communication protocol for location privacy in WSN

Wireless sensor network (WSN) is built of many sensor nodes. The sensors can sense a phenomenon, ... more Wireless sensor network (WSN) is built of many sensor nodes. The sensors can sense a phenomenon, which will be represented in a form of data and sent to an aggregator for further processing. WSN is used in many applications, such as object tracking and security monitoring. The objects in many situations need physical and location protection. In addition to the source location privacy, sink location privacy should be provided. Providing an efficient location privacy solution would be challenging due to the open nature of the WSN. Anonymity is a key solution for location privacy. We present a network model that is protected against local, multilocal, and global adversaries that can launch sophisticated passive and active attacks against the WSN.

Research paper thumbnail of Temporal privacy scheme for end-to-end location privacy in wireless sensor networks

Wireless sensor network (WSN) is built of hosts called sensors which can sense a phenomenon such ... more Wireless sensor network (WSN) is built of hosts called sensors which can sense a phenomenon such as motion, temperature, and humidity. Sensors represent what they sense in data format. Providing an efficient end-to-end privacy solution would be a challenging task due to the open nature of the WSN. The key schemes needed for end-to-end location privacy are anonymity, observability, capture likelihood and safety period. On top of that, having temporal privacy is crucial to attain. We extend this work to provide a solution against global adversaries. We present a network model that is protected against passive/active and local/multi-local/global attacks. This work provides a solution for temporal privacy to attain end-to-end anonymity and location privacy.

Research paper thumbnail of An enhanced communication protocol for anonymity and   location privacy in WSN

Wireless sensor networks (WSNs) consist of many sensors working as hosts. These sensors can sense... more Wireless sensor networks (WSNs) consist of many sensors working as hosts. These sensors can sense a phenomenon and represent it in a form of data. There are many applications for WSNs such as object tracking and monitoring where the objects need protection. Providing an efficient location privacy solution would be challenging to achieve due to the exposed nature of the WSN. The communication protocol needs to provide location privacy measured by anonymity, observability, capture- likelihood and safety period. We extend this work to allow for countermeasures against semi-global and global adversaries. We present a network model that is protected against a sophisticated passive and active attacks using local, semi-global, and global adversaries.