Miad Faezipour - Academia.edu (original) (raw)

Papers by Miad Faezipour

Research paper thumbnail of Formally expressing HIPAA privacy policies for web services

2015 IEEE International Conference on Electro/Information Technology (EIT), 2015

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Histogram analysis for automatic blood vessels detection: First step of IOP

2015 IEEE International Conference on Electro/Information Technology (EIT), 2015

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Polycaprolactone Nanofibrous Materials As an Efficient Dry Eye Test Strip

2014 Ieee Healthcare Innovation Conference, Oct 9, 2014

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Conceptual Framework of a Virtual Reality Environment to Assist Lung Cancer Patients

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Estimating Lung Capacity from Acoustic Signal of Respiration

ABSTRACT INTRODUCTION reathing disorders are generally associated with the lung cancer disease. T... more ABSTRACT INTRODUCTION reathing disorders are generally associated with the lung cancer disease. Through daily treatment, lung cancer patients often use a traditional spirometer to measure their lung capacity. However, a smart alternative would be to employ a microphone embedded within a hand-held device (e.g. a smart-phone), that can easily capture the acoustic signal of breath without certain instructions. This signal can then be processed to estimate the lung capacity. PROPOSED METHOD This work presents a novel method on the recorded acoustic signal of breath captured using a microphone to estimate the lung capacity. The breathing cycle is segmented to inhale, pause, exhale and pause phases by applying the Voice Activity Detection (VAD) technique [1] on the acoustic signal of respiration. The voice (speech) phases are considered to be one inhale (inspiratory) phase and one exhale (expiratory) phase per breath cycle [2-3] (see Fig. 1). The depth of the breath along with the time duration and signal energy are measured to compute the lung capacity. Fig 1. Segmenting acoustic signal of breath using VAD.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of OSA Screening Test at the Patient’s Home

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Patient Posture Scheduling Using Constrained Shortest Path to Prevent Pressure Ulcers

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Breathing Movement Classification Using MFCCs

ABSTRACT

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Eye Tracking and Head Movements Detection to Assist People with Disabilities: Unveiled

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Improving Wireless Infrastructure Networks Security by Access Point Checking

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Access Point Checking to Improve Security in Wireless Infrastructure Networks

ABSTRACT

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Novel Steganography over HTML

Different security strategies have been developed to protect the transfer of information between ... more Different security strategies have been developed to protect the transfer of information between users. This has become especially important after the tremendous growth of internet use. Encryption techniques convert readable data into a ciphered form. Other techniques hide the message in another file, and some powerful techniques combine hiding and encryption concepts. In this paper, a new security algorithm is presented by using Steganography over HTML pages. Hiding the information inside Html page code comments and employing encryption, can enhance the possibility to discover the hidden data. The proposed algorithm applies some statistical concepts to create a frequency array to determine the occurrence frequency of each character. The encryption step depends on two simple logical operations to change the data form to increase the complexity of the hiding process. The last step is to embed the encrypted data as comments inside the HTML page. This new algorithm comes with many adva...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Highly efficient novel text steganography algorithms

2015 Long Island Systems, Applications and Technology, 2015

ABSTRACT This paper investigates eight novel Steganography algorithms employing text file as a ca... more ABSTRACT This paper investigates eight novel Steganography algorithms employing text file as a carrier file. The proposed model hides secret data in the text file by manipulating the font format or inserting special symbols in the text file. Furthermore, the suggested algorithms can be applied to both Unicode and ASCII code languages, regardless of the text file format. In addition, a merging capability among the techniques is introduced, which allows alternatives for users based on the system requirements. The proposed algorithms achieve a high degree of optimized Steganography attributes such as hidden ratio, robustness, and transparency.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A comparison of different machine learning algorithms using single channel EEG signal for classifying human sleep stages

2015 Long Island Systems, Applications and Technology, 2015

Bookmarks Related papers MentionsView impact

Research paper thumbnail of FPGA-based denoising and beat detection of the ECG signal

2015 Long Island Systems, Applications and Technology, 2015

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A comparison of feature sets for an automated skin lesion analysis system for melanoma early detection and prevention

2015 Long Island Systems, Applications and Technology, 2015

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Noninvasive Real-Time Automated Skin Lesion Analysis System for Melanoma Early Detection and Prevention

IEEE Journal of Translational Engineering in Health and Medicine, 2015

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Automated skin lesion analysis based on color and shape geometry feature set for melanoma early detection and prevention

IEEE Long Island Systems, Applications and Technology (LISAT) Conference 2014, 2014

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Access Point Checking to Improve Security in Wireless Infrastructure Networks

Lecture Notes in Electrical Engineering, 2012

ABSTRACT

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A High-Performance Multi-Match Priority Encoder for TCAM-Based Packet Classifiers

2007 6th IEEE Dallas Circuits and Systems Workshop on System-on-Chip, 2007

ABSTRACT

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Formally expressing HIPAA privacy policies for web services

2015 IEEE International Conference on Electro/Information Technology (EIT), 2015

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Histogram analysis for automatic blood vessels detection: First step of IOP

2015 IEEE International Conference on Electro/Information Technology (EIT), 2015

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Polycaprolactone Nanofibrous Materials As an Efficient Dry Eye Test Strip

2014 Ieee Healthcare Innovation Conference, Oct 9, 2014

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Conceptual Framework of a Virtual Reality Environment to Assist Lung Cancer Patients

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Estimating Lung Capacity from Acoustic Signal of Respiration

ABSTRACT INTRODUCTION reathing disorders are generally associated with the lung cancer disease. T... more ABSTRACT INTRODUCTION reathing disorders are generally associated with the lung cancer disease. Through daily treatment, lung cancer patients often use a traditional spirometer to measure their lung capacity. However, a smart alternative would be to employ a microphone embedded within a hand-held device (e.g. a smart-phone), that can easily capture the acoustic signal of breath without certain instructions. This signal can then be processed to estimate the lung capacity. PROPOSED METHOD This work presents a novel method on the recorded acoustic signal of breath captured using a microphone to estimate the lung capacity. The breathing cycle is segmented to inhale, pause, exhale and pause phases by applying the Voice Activity Detection (VAD) technique [1] on the acoustic signal of respiration. The voice (speech) phases are considered to be one inhale (inspiratory) phase and one exhale (expiratory) phase per breath cycle [2-3] (see Fig. 1). The depth of the breath along with the time duration and signal energy are measured to compute the lung capacity. Fig 1. Segmenting acoustic signal of breath using VAD.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of OSA Screening Test at the Patient’s Home

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Patient Posture Scheduling Using Constrained Shortest Path to Prevent Pressure Ulcers

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Breathing Movement Classification Using MFCCs

ABSTRACT

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Eye Tracking and Head Movements Detection to Assist People with Disabilities: Unveiled

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Improving Wireless Infrastructure Networks Security by Access Point Checking

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Access Point Checking to Improve Security in Wireless Infrastructure Networks

ABSTRACT

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Novel Steganography over HTML

Different security strategies have been developed to protect the transfer of information between ... more Different security strategies have been developed to protect the transfer of information between users. This has become especially important after the tremendous growth of internet use. Encryption techniques convert readable data into a ciphered form. Other techniques hide the message in another file, and some powerful techniques combine hiding and encryption concepts. In this paper, a new security algorithm is presented by using Steganography over HTML pages. Hiding the information inside Html page code comments and employing encryption, can enhance the possibility to discover the hidden data. The proposed algorithm applies some statistical concepts to create a frequency array to determine the occurrence frequency of each character. The encryption step depends on two simple logical operations to change the data form to increase the complexity of the hiding process. The last step is to embed the encrypted data as comments inside the HTML page. This new algorithm comes with many adva...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Highly efficient novel text steganography algorithms

2015 Long Island Systems, Applications and Technology, 2015

ABSTRACT This paper investigates eight novel Steganography algorithms employing text file as a ca... more ABSTRACT This paper investigates eight novel Steganography algorithms employing text file as a carrier file. The proposed model hides secret data in the text file by manipulating the font format or inserting special symbols in the text file. Furthermore, the suggested algorithms can be applied to both Unicode and ASCII code languages, regardless of the text file format. In addition, a merging capability among the techniques is introduced, which allows alternatives for users based on the system requirements. The proposed algorithms achieve a high degree of optimized Steganography attributes such as hidden ratio, robustness, and transparency.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A comparison of different machine learning algorithms using single channel EEG signal for classifying human sleep stages

2015 Long Island Systems, Applications and Technology, 2015

Bookmarks Related papers MentionsView impact

Research paper thumbnail of FPGA-based denoising and beat detection of the ECG signal

2015 Long Island Systems, Applications and Technology, 2015

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A comparison of feature sets for an automated skin lesion analysis system for melanoma early detection and prevention

2015 Long Island Systems, Applications and Technology, 2015

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Noninvasive Real-Time Automated Skin Lesion Analysis System for Melanoma Early Detection and Prevention

IEEE Journal of Translational Engineering in Health and Medicine, 2015

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Automated skin lesion analysis based on color and shape geometry feature set for melanoma early detection and prevention

IEEE Long Island Systems, Applications and Technology (LISAT) Conference 2014, 2014

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Access Point Checking to Improve Security in Wireless Infrastructure Networks

Lecture Notes in Electrical Engineering, 2012

ABSTRACT

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A High-Performance Multi-Match Priority Encoder for TCAM-Based Packet Classifiers

2007 6th IEEE Dallas Circuits and Systems Workshop on System-on-Chip, 2007

ABSTRACT

Bookmarks Related papers MentionsView impact

Research paper thumbnail of An enhanced communication protocol for location privacy in WSN

Wireless sensor network (WSN) is built of many sensor nodes. The sensors can sense a phenomenon, ... more Wireless sensor network (WSN) is built of many sensor nodes. The sensors can sense a phenomenon, which will be represented in a form of data and sent to an aggregator for further processing. WSN is used in many applications, such as object tracking and security monitoring. The objects in many situations need physical and location protection. In addition to the source location privacy, sink location privacy should be provided. Providing an efficient location privacy solution would be challenging due to the open nature of the WSN. Anonymity is a key solution for location privacy. We present a network model that is protected against local, multilocal, and global adversaries that can launch sophisticated passive and active attacks against the WSN.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Temporal privacy scheme for end-to-end location privacy in wireless sensor networks

Wireless sensor network (WSN) is built of hosts called sensors which can sense a phenomenon such ... more Wireless sensor network (WSN) is built of hosts called sensors which can sense a phenomenon such as motion, temperature, and humidity. Sensors represent what they sense in data format. Providing an efficient end-to-end privacy solution would be a challenging task due to the open nature of the WSN. The key schemes needed for end-to-end location privacy are anonymity, observability, capture likelihood and safety period. On top of that, having temporal privacy is crucial to attain. We extend this work to provide a solution against global adversaries. We present a network model that is protected against passive/active and local/multi-local/global attacks. This work provides a solution for temporal privacy to attain end-to-end anonymity and location privacy.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of An enhanced communication protocol for anonymity and   location privacy in WSN

Wireless sensor networks (WSNs) consist of many sensors working as hosts. These sensors can sense... more Wireless sensor networks (WSNs) consist of many sensors working as hosts. These sensors can sense a phenomenon and represent it in a form of data. There are many applications for WSNs such as object tracking and monitoring where the objects need protection. Providing an efficient location privacy solution would be challenging to achieve due to the exposed nature of the WSN. The communication protocol needs to provide location privacy measured by anonymity, observability, capture- likelihood and safety period. We extend this work to allow for countermeasures against semi-global and global adversaries. We present a network model that is protected against a sophisticated passive and active attacks using local, semi-global, and global adversaries.

Bookmarks Related papers MentionsView impact