Fereidoon Shams Aliee | Shahid Beheshti University (original) (raw)

Papers by Fereidoon Shams Aliee

Research paper thumbnail of Systematic and ontology-based approach to interoperable cross-domain open government data services

Transforming Government: People, Process and Policy, 2021

Purpose Open government data (OGD) has emerged as a radical paradigm shift and endeavor among gov... more Purpose Open government data (OGD) has emerged as a radical paradigm shift and endeavor among government administrations across the world mainly due to its promises of transparency, accountability, public-private collaboration, civic participation, social innovation and data-driven value creation. Complexity, cross-cutting nature, diversity of data sets, interoperability and quality issues usually hamper unlocking the full potential value of data. To tackle these challenges, this paper aims to provide a novel solution using a top-down approach. Design/methodology/approach In this paper, the authors propose a systematic ontology-based approach combined with a novel architecture and its corresponding processes enabling organizations to carry out all the steps in the OGD value chain. In addition, an OGD Platform including a portal (www.iranopendata.ir) and a data management system (www.ogdms.iranopendata.ir) are developed to showcase the proposed solution. Findings The efficiency and t...

Research paper thumbnail of Towards IoT-Driven Predictive Business Process Analytics

2020 International Conference on Omni-layer Intelligent Systems (COINS), 2020

Predictive business process monitoring is concerned with predicting the process-related Key Perfo... more Predictive business process monitoring is concerned with predicting the process-related Key Performance Indicators (KPIs) and forecasting the future behavior of the process in realtime. Despite the amount of work contributed by researches to this field of research, the performance of existing solutions is not desirable for practical settings. Indeed, these approaches are typically context-unaware and lack generality. However, in real-life use cases, business processes are not isolated from the surrounding working environment, and thus they are influenced by many contextual events, such as events generated by IoT devices. To the best of our knowledge, there is no comprehensive study addressing the integration of contextual events with the process prediction. This paper proposes a holistic context-aware methodology for predictive process monitoring by incorporating IoT data. Moreover, we present a systematic method to integrate the contextual events in the runtime process using Busine...

Research paper thumbnail of An Ontology-based Open Data Interoperability Approach for Cross-Domain Government Data Services

2020 25th International Computer Conference, Computer Society of Iran (CSICC), 2020

Open Government Data (OGD) has emerged as a radical paradigm shift and endeavor among government ... more Open Government Data (OGD) has emerged as a radical paradigm shift and endeavor among government administrations across the world largely due to its promises of transparency, accountability, collaboration, civic participation, social innovation as well as data-driven value creation. Data service is a critical component for OGD which guarantees the availability of government data to users in the form of structured and machine-readable open datasets. Aspects such as usability, quality, and interoperability should be considered in building such open datasets. The diversity of data sets usually hampers unlocking the full potential value of data. Interoperability addresses the ability of open data platforms and data services to communicate, exchange and consume data, and to operate effectively together. To tackle this issue, in this paper, we propose an ontology-based technique enabling governmental organizations to identify their public data and publish them via well-defined interoperable data services. In this context, an Open Governmental Data Platform including a portal (www.iranopendata.ir) and a data management system (www.ogdms.iranopendata.ir) is designed and developed to fulfill this goal. As a case study, the constructed platform has been utilized and evaluated in the Tehran Municipality organization. The results show that applying the proposed approach leads to the creation of high-quality datasets achieving a high degree of interoperability.

Research paper thumbnail of Cross-layer Enterprise Architecture Evaluation

Proceedings of the International Conference on Omni-Layer Intelligent Systems, 2019

Enterprise Architecture (EA) plays a dominant role in today's organizations by providing a ho... more Enterprise Architecture (EA) plays a dominant role in today's organizations by providing a holistic view of business, information, systems, and technology. Unfortunately, designing an EA is a very challenging and sophisticated task such that 40% of EA projects usually fail mainly due to either an inconsistent evaluation process or ignoring the planning aspect of evaluation. In this paper, we present a complete survey of various published papers on recent advancements in EA evaluation techniques and discuss the Pros and Cons of each of which. We finally present a set of novel evaluation criteria as well as a Cross-layer Evaluation (CLE) approach, which can consider all the EA layers from the strategy and business architecture to technology architecture. The proposed approach offers tremendous insights into EA and can be easily incorporated into every enterprise with a moderate cost.

Research paper thumbnail of Aspect-Oriented Software Development Versus Other Development Methods

Nowadays, there are many software development methods that are used by developers in order to pro... more Nowadays, there are many software development methods that are used by developers in order to produce high-quality software systems. Aspect-oriented software development as a new software development method tries to obtain the quality of software systems through the modularity of crosscutting concerns in the whole of software development process. However, there are some doubts about using aspect-oriented software development instead

Research paper thumbnail of Toward Empowering Extreme Programming from an Architectural Viewpoint

The XP method is one of the noticeable approaches among agile software development methodologies.... more The XP method is one of the noticeable approaches among agile software development methodologies. Besides its valuable features and capabilities there is a lack and that is about how to control the quality of the system and the effects of quality attributes on each other. In the last decade, software quality requirements have been especially addressed by software architecture. Since software architecture knowledge has grown and matured in recent years, many of agile methods, like XP, have not considered the importance of architecture in their development process. This paper introduces two practices (Continuous Architectural Refactoring andReal Architecture Qualification) in order to empower XP’s development process toward improving system’s architecture. The main characteristic of proposed solution is that it is derived from values and practices of XP so as to keep its agility intact.

Research paper thumbnail of How could ULS systems achieve architecture benefits?

ULS systems have been introduced as a kind of future systems. They advent by increasing scale of ... more ULS systems have been introduced as a kind of future systems. They advent by increasing scale of systems from different dimensions. The scale causes essential differences between these systems and conventional software systems. Geographical distribution in development and deployment is one of them which bring problems in the growth of these systems. However these systems would become so complex and we have to encounter them. Today, software architecture is considered in developing large scale systems. It gives some benefits that are significant to overcome complexity effects. Since ULS systems are greater than large scale systems, considering their architecture could be more vital. In this position paper, we investigate how to architect ULS systems and also how to obtain their architecture.

Research paper thumbnail of Business Process Improvement Challenges: A Systematic Literature Review

Business process is a set of activities that provides outputs to achieve a specific and predefine... more Business process is a set of activities that provides outputs to achieve a specific and predefined goal. Accordingly, Business Process Improvement is one of the most important factors in achieving the goals of enterprises. Unfortunately, despite the exorbitant costs in enterprises to improve business processes, activities in this area often fail. The reason for this, is the existence of numerous challenges on the path to improvement, which are often overlooked by researchers and practitioners in the field. Following this issue, this paper tries to identify the main challenges in this direction. While creating a comprehensive set of business process improvement challenges, a high-level abstraction cycle is presented for business process improvement activities. Finally, the identified challenges are categorized according to the steps in the proposed cycle.

Research paper thumbnail of A Method Based on Petri Nets for Identification of Aspects

One of the important factors in creating complexity in software systems is the existence of cross... more One of the important factors in creating complexity in software systems is the existence of crosscutting concerns. The concept of aspect orientation with presentation of a method could modulate crosscutting concerns into the single unit that is called aspect, and solve many prob- lems which are created such as tangling and scattering. However, identification and specification of crosscutting concerns and regarding them as aspects is not easy. For this reason, various methods are presented but such meth- ods are informal. In this paper, we propose a formal method based on Petri Nets for identification of aspects. In the method, a software system is expressed in terms of a number of concerns. A concern is composed of one or several requirements which realization of them cause realization of that concern. The proposed method defines requirements and concerns in the formal form by Petri Nets and named them as requirement nets and concern nets. Concern nets with dependencies which there ...

Research paper thumbnail of Enterprise information security, a review of architectures and frameworks from interoperability perspective

With the growth of ICT opportunities, the enterprises have realized the significance of interoper... more With the growth of ICT opportunities, the enterprises have realized the significance of interoperability as a competitive advantage. Thus, many enterprises have adopted the main strategy of rapidly changing their structures to support interoperability. On the other hand, interoperability is incompatible with information security. The Enterprise Information Security Architecture (EISA) offers a framework upon which business security requirements, the risks and the threats are analyzed and a portfolio of the best integrated enterprise security solutions is put together. Frameworks and models introduced in the past six years have examined different aspects of EISA. We realized the diversity of the mentioned approaches and in this paper, first, we develop two facets according to which these approaches are categorized. These facets are abstraction level (holistic vs. partial) and architectural viewpoint (managerial vs. technical). As interoperability is the primary focus of our study and...

Research paper thumbnail of A metric for measuring BPEL process context-independency

BPEL provides a workflow-oriented composition model for service-oriented solutions that facilitat... more BPEL provides a workflow-oriented composition model for service-oriented solutions that facilitates the system integration through orchestration and choreography of services. In some cases, BPEL process designs can be highly complex owing to the vast number of services executed in global markets. Such heavy coupling and context dependency with partners in one side and the complicated structure of the processes on the other side, provoke several undesirable drawbacks such as poor understandability, inflexibility, inadaptability, and defects. Therefore, heavy context dependency should be avoided. This paper proposes a quantitative metric to measure BPEL process context-independency which lead SOA architect determines to the extent that a BPEL process is context-independent.

Research paper thumbnail of Rich Device-Services (RDS): A Service-Oriented Approach to the Internet of Things (IoT)

The Internet of Things (IoT) should enable the seamless integration of devices to combine the dat... more The Internet of Things (IoT) should enable the seamless integration of devices to combine the data collected from the physical objects and yield new services. From the IoT perspective, every device can offer its functionality as one or more interoperable device-services. As the number of devices grows, and the number of interactions between their device-services is increased, achieving more scalable and dynamic integration of devices becomes a major challenge in IoT. An emerging approach to overcome this challenge is the application of service-oriented architecture. Over the last few years, Rich Services, which is a type of service-oriented architecture, has emerged as an excellent technique for facilitating integration of services in the large-scale systems. In this paper, inspired by the notion of Rich Services, we propose the Rich Device-Services approach to enable a scalable and dynamic integration of heterogeneous devices in IoT. The proposed approach exploits the Data Distribu...

Research paper thumbnail of Comparison of Schema Matching Systems

Research paper thumbnail of Towards Collaborative Machine Learning Driven Healthcare Internet of Things

Proceedings of the International Conference on Omni-Layer Intelligent Systems

The relationship between technology and healthcare due to the rise of Intelligent Internet of Thi... more The relationship between technology and healthcare due to the rise of Intelligent Internet of Things (IoT) and the rapid public embracement of medical-grade wearables has been dramatically transformed in the past few years. Powered by IoT, technology brought disruptive changes and unique opportunities to the healthcare industry including personalized services, tailored content, improved availability and accessibility, and cost-effective delivery. Despite these exciting advancements in transition from clinic-centric to patient-centric healthcare, many challenges still need to be tackled. The key to successfully unlock and enable this digital shift is adopting a holistic architecture to provide high-level of quality in attributes such as latency, availability, and real-time analytics processing. In this paper, we discuss applicability of Intelligent IoT based on Collaborative Machine Learning in healthcare and medicine by presenting a holistic multi-layer architecture. This solution enables real-time actionable insights which ultimately improves decision-making powers of patients and healthcare providers. The feasibility of such architecture is investigated by a case study, ECG-based arrhythmia detection, based on deep learning and Convolutional Neural Network (CNN) methods distributed across endpoint IoT Devices, Edge (Fog) nodes, and Cloud servers.

Research paper thumbnail of IoT Fundamentals: Definitions, Architectures, Challenges, and Promises

Intelligent Internet of Things

Research paper thumbnail of Online rating system development using blockchain-based distributed ledger technology

Wireless Networks

In most websites, the online rating system provides the ratings of products and services to users... more In most websites, the online rating system provides the ratings of products and services to users. Lack of trust in data integrity and its manipulation has hindered fulfilling user satisfaction. Since existing online rating systems deal with a central server, all rating data is stored on the central server. Therefore, all rating data can be removed, modified, and manipulated by the system manager to change the ratings in favor of the service or product provider. In this paper, an online rating system using distributed ledger technologies has been presented as the proposed system to solve all the weaknesses of current systems. Distributed ledger technologies are completely decentralized and there is no centralization on them by any institution. Distributed ledger technologies have different variants. Among distributed ledger technologies, blockchain technology has been used in the proposed rating system because of its support for smart contracts. In the proposed online rating system, the Ethereum platform has been chosen from different blockchain platforms that have a public permission network. In this system, the raters cannot rate unless they submit a request to the system and be authorized to take part in the online product rating process. The important feature of the Ethereum platform is its support for smart contracts, which can be used to write the rating contract in the Solidity language. Also, using Proof of Authority (PoA) consensus mechanisms, all rating transactions are approved by the surveyors. Since in the real Ethereum system, each rating transaction is sent to the network by the raters, some gas must be paid for each rating transaction. However, since this method is expensive, TestNet blockchain can be used in the rating system. Finally, the proposed rating system was used for rating the restaurants of a website and its features were tested.

Research paper thumbnail of Macrophage+: a Game With a Purpose for Applying Human Intelligence in Control Mechanisms

Scientia Iranica

Originally, control mechanisms were proposed to replace the need for human intervention in operat... more Originally, control mechanisms were proposed to replace the need for human intervention in operational environments, and thus, enhance the precision and reaction time. Nowadays, new requirements in computer systems such as adaptation have made the design of control mechanisms more challenging. The Observer/Controller pattern is one of the control mechanisms proposed to control many interacting independent elements by making intelligent decisions. An important challenge in designing these mechanisms is that the knowledge needed for decision making is provided by experts; therefore, the process becomes time consuming and costly, depending on the availability of experts and their costs. In this paper, we hypothesize that employing a Game With A Purpose can help to improve the process of providing knowledge in such control mechanisms by using crowd-sourcing and involving non-expert humans in an enjoyable manner. This hypothesis has been investigated by Macro-phage+, a Game With A Purpose implemented for this goal. We conducted experiments evaluating Macrophage+, focusing on both its applicability and effectiveness in the context of the observer/controller pattern as well as its enjoyability for the players. The results show that Macrophage+ is a successful Game With A Purpose that involves non-expert humans in the application of the observer/controller pattern.

Research paper thumbnail of An agent-based self-protective method to secure communication between UAVs in unmanned aerial vehicle networks

Research paper thumbnail of An agent-based self-protective method to secure communication between UAVs in unmanned aerial vehicle networks

Vehicular Communications, 2020

UAVNs (unmanned aerial vehicle networks) may become vulnerable to threats and attacks due to thei... more UAVNs (unmanned aerial vehicle networks) may become vulnerable to threats and attacks due to their characteristic features such as highly dynamic network topology, open-air wireless environments, and high mobility. Since previous work has focused on classical and metaheuristic-based approaches, none of these approaches have a self-adaptive approach. In this paper, the challenges and weaknesses of previous methods are examined in the form of a table. Furthermore, we propose an agent-based self-protective method (ASP-UAVN) for UAVNs that is based on the Human Immune System (HIS). In ASP-UAS, the safest route from the source UAV to the destination UAV is chosen according to a self-protective system. In this method, a multi-agent system using an Artificial Immune System (AIS) is employed to detect the attacking UAV and choose the safest route. In the proposed ASP-UAVN, the route request packet (RREQ) is initially transmitted from the source UAV to the destination UAV to detect the exist...

Research paper thumbnail of Fuzzy, Dynamic and Trust Based Routing Protocol for IoT

Journal of Network and Systems Management

Research paper thumbnail of Systematic and ontology-based approach to interoperable cross-domain open government data services

Transforming Government: People, Process and Policy, 2021

Purpose Open government data (OGD) has emerged as a radical paradigm shift and endeavor among gov... more Purpose Open government data (OGD) has emerged as a radical paradigm shift and endeavor among government administrations across the world mainly due to its promises of transparency, accountability, public-private collaboration, civic participation, social innovation and data-driven value creation. Complexity, cross-cutting nature, diversity of data sets, interoperability and quality issues usually hamper unlocking the full potential value of data. To tackle these challenges, this paper aims to provide a novel solution using a top-down approach. Design/methodology/approach In this paper, the authors propose a systematic ontology-based approach combined with a novel architecture and its corresponding processes enabling organizations to carry out all the steps in the OGD value chain. In addition, an OGD Platform including a portal (www.iranopendata.ir) and a data management system (www.ogdms.iranopendata.ir) are developed to showcase the proposed solution. Findings The efficiency and t...

Research paper thumbnail of Towards IoT-Driven Predictive Business Process Analytics

2020 International Conference on Omni-layer Intelligent Systems (COINS), 2020

Predictive business process monitoring is concerned with predicting the process-related Key Perfo... more Predictive business process monitoring is concerned with predicting the process-related Key Performance Indicators (KPIs) and forecasting the future behavior of the process in realtime. Despite the amount of work contributed by researches to this field of research, the performance of existing solutions is not desirable for practical settings. Indeed, these approaches are typically context-unaware and lack generality. However, in real-life use cases, business processes are not isolated from the surrounding working environment, and thus they are influenced by many contextual events, such as events generated by IoT devices. To the best of our knowledge, there is no comprehensive study addressing the integration of contextual events with the process prediction. This paper proposes a holistic context-aware methodology for predictive process monitoring by incorporating IoT data. Moreover, we present a systematic method to integrate the contextual events in the runtime process using Busine...

Research paper thumbnail of An Ontology-based Open Data Interoperability Approach for Cross-Domain Government Data Services

2020 25th International Computer Conference, Computer Society of Iran (CSICC), 2020

Open Government Data (OGD) has emerged as a radical paradigm shift and endeavor among government ... more Open Government Data (OGD) has emerged as a radical paradigm shift and endeavor among government administrations across the world largely due to its promises of transparency, accountability, collaboration, civic participation, social innovation as well as data-driven value creation. Data service is a critical component for OGD which guarantees the availability of government data to users in the form of structured and machine-readable open datasets. Aspects such as usability, quality, and interoperability should be considered in building such open datasets. The diversity of data sets usually hampers unlocking the full potential value of data. Interoperability addresses the ability of open data platforms and data services to communicate, exchange and consume data, and to operate effectively together. To tackle this issue, in this paper, we propose an ontology-based technique enabling governmental organizations to identify their public data and publish them via well-defined interoperable data services. In this context, an Open Governmental Data Platform including a portal (www.iranopendata.ir) and a data management system (www.ogdms.iranopendata.ir) is designed and developed to fulfill this goal. As a case study, the constructed platform has been utilized and evaluated in the Tehran Municipality organization. The results show that applying the proposed approach leads to the creation of high-quality datasets achieving a high degree of interoperability.

Research paper thumbnail of Cross-layer Enterprise Architecture Evaluation

Proceedings of the International Conference on Omni-Layer Intelligent Systems, 2019

Enterprise Architecture (EA) plays a dominant role in today's organizations by providing a ho... more Enterprise Architecture (EA) plays a dominant role in today's organizations by providing a holistic view of business, information, systems, and technology. Unfortunately, designing an EA is a very challenging and sophisticated task such that 40% of EA projects usually fail mainly due to either an inconsistent evaluation process or ignoring the planning aspect of evaluation. In this paper, we present a complete survey of various published papers on recent advancements in EA evaluation techniques and discuss the Pros and Cons of each of which. We finally present a set of novel evaluation criteria as well as a Cross-layer Evaluation (CLE) approach, which can consider all the EA layers from the strategy and business architecture to technology architecture. The proposed approach offers tremendous insights into EA and can be easily incorporated into every enterprise with a moderate cost.

Research paper thumbnail of Aspect-Oriented Software Development Versus Other Development Methods

Nowadays, there are many software development methods that are used by developers in order to pro... more Nowadays, there are many software development methods that are used by developers in order to produce high-quality software systems. Aspect-oriented software development as a new software development method tries to obtain the quality of software systems through the modularity of crosscutting concerns in the whole of software development process. However, there are some doubts about using aspect-oriented software development instead

Research paper thumbnail of Toward Empowering Extreme Programming from an Architectural Viewpoint

The XP method is one of the noticeable approaches among agile software development methodologies.... more The XP method is one of the noticeable approaches among agile software development methodologies. Besides its valuable features and capabilities there is a lack and that is about how to control the quality of the system and the effects of quality attributes on each other. In the last decade, software quality requirements have been especially addressed by software architecture. Since software architecture knowledge has grown and matured in recent years, many of agile methods, like XP, have not considered the importance of architecture in their development process. This paper introduces two practices (Continuous Architectural Refactoring andReal Architecture Qualification) in order to empower XP’s development process toward improving system’s architecture. The main characteristic of proposed solution is that it is derived from values and practices of XP so as to keep its agility intact.

Research paper thumbnail of How could ULS systems achieve architecture benefits?

ULS systems have been introduced as a kind of future systems. They advent by increasing scale of ... more ULS systems have been introduced as a kind of future systems. They advent by increasing scale of systems from different dimensions. The scale causes essential differences between these systems and conventional software systems. Geographical distribution in development and deployment is one of them which bring problems in the growth of these systems. However these systems would become so complex and we have to encounter them. Today, software architecture is considered in developing large scale systems. It gives some benefits that are significant to overcome complexity effects. Since ULS systems are greater than large scale systems, considering their architecture could be more vital. In this position paper, we investigate how to architect ULS systems and also how to obtain their architecture.

Research paper thumbnail of Business Process Improvement Challenges: A Systematic Literature Review

Business process is a set of activities that provides outputs to achieve a specific and predefine... more Business process is a set of activities that provides outputs to achieve a specific and predefined goal. Accordingly, Business Process Improvement is one of the most important factors in achieving the goals of enterprises. Unfortunately, despite the exorbitant costs in enterprises to improve business processes, activities in this area often fail. The reason for this, is the existence of numerous challenges on the path to improvement, which are often overlooked by researchers and practitioners in the field. Following this issue, this paper tries to identify the main challenges in this direction. While creating a comprehensive set of business process improvement challenges, a high-level abstraction cycle is presented for business process improvement activities. Finally, the identified challenges are categorized according to the steps in the proposed cycle.

Research paper thumbnail of A Method Based on Petri Nets for Identification of Aspects

One of the important factors in creating complexity in software systems is the existence of cross... more One of the important factors in creating complexity in software systems is the existence of crosscutting concerns. The concept of aspect orientation with presentation of a method could modulate crosscutting concerns into the single unit that is called aspect, and solve many prob- lems which are created such as tangling and scattering. However, identification and specification of crosscutting concerns and regarding them as aspects is not easy. For this reason, various methods are presented but such meth- ods are informal. In this paper, we propose a formal method based on Petri Nets for identification of aspects. In the method, a software system is expressed in terms of a number of concerns. A concern is composed of one or several requirements which realization of them cause realization of that concern. The proposed method defines requirements and concerns in the formal form by Petri Nets and named them as requirement nets and concern nets. Concern nets with dependencies which there ...

Research paper thumbnail of Enterprise information security, a review of architectures and frameworks from interoperability perspective

With the growth of ICT opportunities, the enterprises have realized the significance of interoper... more With the growth of ICT opportunities, the enterprises have realized the significance of interoperability as a competitive advantage. Thus, many enterprises have adopted the main strategy of rapidly changing their structures to support interoperability. On the other hand, interoperability is incompatible with information security. The Enterprise Information Security Architecture (EISA) offers a framework upon which business security requirements, the risks and the threats are analyzed and a portfolio of the best integrated enterprise security solutions is put together. Frameworks and models introduced in the past six years have examined different aspects of EISA. We realized the diversity of the mentioned approaches and in this paper, first, we develop two facets according to which these approaches are categorized. These facets are abstraction level (holistic vs. partial) and architectural viewpoint (managerial vs. technical). As interoperability is the primary focus of our study and...

Research paper thumbnail of A metric for measuring BPEL process context-independency

BPEL provides a workflow-oriented composition model for service-oriented solutions that facilitat... more BPEL provides a workflow-oriented composition model for service-oriented solutions that facilitates the system integration through orchestration and choreography of services. In some cases, BPEL process designs can be highly complex owing to the vast number of services executed in global markets. Such heavy coupling and context dependency with partners in one side and the complicated structure of the processes on the other side, provoke several undesirable drawbacks such as poor understandability, inflexibility, inadaptability, and defects. Therefore, heavy context dependency should be avoided. This paper proposes a quantitative metric to measure BPEL process context-independency which lead SOA architect determines to the extent that a BPEL process is context-independent.

Research paper thumbnail of Rich Device-Services (RDS): A Service-Oriented Approach to the Internet of Things (IoT)

The Internet of Things (IoT) should enable the seamless integration of devices to combine the dat... more The Internet of Things (IoT) should enable the seamless integration of devices to combine the data collected from the physical objects and yield new services. From the IoT perspective, every device can offer its functionality as one or more interoperable device-services. As the number of devices grows, and the number of interactions between their device-services is increased, achieving more scalable and dynamic integration of devices becomes a major challenge in IoT. An emerging approach to overcome this challenge is the application of service-oriented architecture. Over the last few years, Rich Services, which is a type of service-oriented architecture, has emerged as an excellent technique for facilitating integration of services in the large-scale systems. In this paper, inspired by the notion of Rich Services, we propose the Rich Device-Services approach to enable a scalable and dynamic integration of heterogeneous devices in IoT. The proposed approach exploits the Data Distribu...

Research paper thumbnail of Comparison of Schema Matching Systems

Research paper thumbnail of Towards Collaborative Machine Learning Driven Healthcare Internet of Things

Proceedings of the International Conference on Omni-Layer Intelligent Systems

The relationship between technology and healthcare due to the rise of Intelligent Internet of Thi... more The relationship between technology and healthcare due to the rise of Intelligent Internet of Things (IoT) and the rapid public embracement of medical-grade wearables has been dramatically transformed in the past few years. Powered by IoT, technology brought disruptive changes and unique opportunities to the healthcare industry including personalized services, tailored content, improved availability and accessibility, and cost-effective delivery. Despite these exciting advancements in transition from clinic-centric to patient-centric healthcare, many challenges still need to be tackled. The key to successfully unlock and enable this digital shift is adopting a holistic architecture to provide high-level of quality in attributes such as latency, availability, and real-time analytics processing. In this paper, we discuss applicability of Intelligent IoT based on Collaborative Machine Learning in healthcare and medicine by presenting a holistic multi-layer architecture. This solution enables real-time actionable insights which ultimately improves decision-making powers of patients and healthcare providers. The feasibility of such architecture is investigated by a case study, ECG-based arrhythmia detection, based on deep learning and Convolutional Neural Network (CNN) methods distributed across endpoint IoT Devices, Edge (Fog) nodes, and Cloud servers.

Research paper thumbnail of IoT Fundamentals: Definitions, Architectures, Challenges, and Promises

Intelligent Internet of Things

Research paper thumbnail of Online rating system development using blockchain-based distributed ledger technology

Wireless Networks

In most websites, the online rating system provides the ratings of products and services to users... more In most websites, the online rating system provides the ratings of products and services to users. Lack of trust in data integrity and its manipulation has hindered fulfilling user satisfaction. Since existing online rating systems deal with a central server, all rating data is stored on the central server. Therefore, all rating data can be removed, modified, and manipulated by the system manager to change the ratings in favor of the service or product provider. In this paper, an online rating system using distributed ledger technologies has been presented as the proposed system to solve all the weaknesses of current systems. Distributed ledger technologies are completely decentralized and there is no centralization on them by any institution. Distributed ledger technologies have different variants. Among distributed ledger technologies, blockchain technology has been used in the proposed rating system because of its support for smart contracts. In the proposed online rating system, the Ethereum platform has been chosen from different blockchain platforms that have a public permission network. In this system, the raters cannot rate unless they submit a request to the system and be authorized to take part in the online product rating process. The important feature of the Ethereum platform is its support for smart contracts, which can be used to write the rating contract in the Solidity language. Also, using Proof of Authority (PoA) consensus mechanisms, all rating transactions are approved by the surveyors. Since in the real Ethereum system, each rating transaction is sent to the network by the raters, some gas must be paid for each rating transaction. However, since this method is expensive, TestNet blockchain can be used in the rating system. Finally, the proposed rating system was used for rating the restaurants of a website and its features were tested.

Research paper thumbnail of Macrophage+: a Game With a Purpose for Applying Human Intelligence in Control Mechanisms

Scientia Iranica

Originally, control mechanisms were proposed to replace the need for human intervention in operat... more Originally, control mechanisms were proposed to replace the need for human intervention in operational environments, and thus, enhance the precision and reaction time. Nowadays, new requirements in computer systems such as adaptation have made the design of control mechanisms more challenging. The Observer/Controller pattern is one of the control mechanisms proposed to control many interacting independent elements by making intelligent decisions. An important challenge in designing these mechanisms is that the knowledge needed for decision making is provided by experts; therefore, the process becomes time consuming and costly, depending on the availability of experts and their costs. In this paper, we hypothesize that employing a Game With A Purpose can help to improve the process of providing knowledge in such control mechanisms by using crowd-sourcing and involving non-expert humans in an enjoyable manner. This hypothesis has been investigated by Macro-phage+, a Game With A Purpose implemented for this goal. We conducted experiments evaluating Macrophage+, focusing on both its applicability and effectiveness in the context of the observer/controller pattern as well as its enjoyability for the players. The results show that Macrophage+ is a successful Game With A Purpose that involves non-expert humans in the application of the observer/controller pattern.

Research paper thumbnail of An agent-based self-protective method to secure communication between UAVs in unmanned aerial vehicle networks

Research paper thumbnail of An agent-based self-protective method to secure communication between UAVs in unmanned aerial vehicle networks

Vehicular Communications, 2020

UAVNs (unmanned aerial vehicle networks) may become vulnerable to threats and attacks due to thei... more UAVNs (unmanned aerial vehicle networks) may become vulnerable to threats and attacks due to their characteristic features such as highly dynamic network topology, open-air wireless environments, and high mobility. Since previous work has focused on classical and metaheuristic-based approaches, none of these approaches have a self-adaptive approach. In this paper, the challenges and weaknesses of previous methods are examined in the form of a table. Furthermore, we propose an agent-based self-protective method (ASP-UAVN) for UAVNs that is based on the Human Immune System (HIS). In ASP-UAS, the safest route from the source UAV to the destination UAV is chosen according to a self-protective system. In this method, a multi-agent system using an Artificial Immune System (AIS) is employed to detect the attacking UAV and choose the safest route. In the proposed ASP-UAVN, the route request packet (RREQ) is initially transmitted from the source UAV to the destination UAV to detect the exist...

Research paper thumbnail of Fuzzy, Dynamic and Trust Based Routing Protocol for IoT

Journal of Network and Systems Management