Article
Engineering, Electrical & Electronic
Jian Ping, Da Li, Zheng Yan, Xiaowen Wu, Sijie Chen
Summary: With the increasing penetration of distributed energy resources, the traditional producer-centric electricity market is transitioning to a prosumer-centric market, enabling autonomous trading between prosumers. However, there is a lack of research on pricing and allocation of joint energy and reserves in this autonomous market. This paper proposes a joint energy-reserve peer-to-peer trading mechanism and a blockchain-based trading algorithm to create a trustworthy prosumer-centric market. Numerical results demonstrate the effectiveness of the mechanism and the improved efficiency of the blockchain-based algorithm.
ELECTRIC POWER SYSTEMS RESEARCH
(2023)
Article
Computer Science, Information Systems
Peiqian Liu, Shangchen Xie, Zihao Shen, Hui Wang
Summary: This paper proposes a scheme based on a peer-to-peer network for protecting location privacy. By utilizing location attribute-based security authentication and private sharing data group, trust among mobile terminals is established to prevent unauthorized access to query requests and protect location privacy.
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS
(2022)
Article
Computer Science, Hardware & Architecture
Xin Jian, Pengcheng Leng, Yanfeng Wang, Mubarak Alrashoud, M. Shamim Hossain
Summary: This article introduces a blockchain-powered trusted networking framework for UAANET to tackle the challenges of high dynamic topology and lack of trust. By proposing control signaling and algorithms, a new solution is provided for trusted networking in UAANET.
Article
Computer Science, Information Systems
Dong Xie, Jinghua Yang, Weixin Bian, Fulong Chen, Taochun Wang
Summary: In mobile edge computing, the offloading of computing tasks from IoT terminal devices to servers is necessary due to limited computing power. However, malicious attacks and insecure network channels pose serious threats to privacy and data security. An anonymous authentication key agreement mechanism is urgently needed to verify identities and ensure secure data transmission. Although Jia et al. proposed an identity-based authentication scheme with advantages, their scheme has security issues. We propose an improved scheme with security-enhanced keys and implicit IDs to solve these problems and provide formal security analysis.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Computer Science, Information Systems
Aniruddha Bhattacharjya, Kamil Kozdroj, Grzegorz Bazydlo, Remigiusz Wisniewski
Summary: The global market of Internet of Medical Things (IoMT) has expanded rapidly, with an increasing number of IoMT devices. Blockchain has emerged as a popular security method for protecting IoMT systems, with support from a Trusted Third Party (TTP) to ensure data immutability and transparency. This paper proposes a Blockchain-based technique for IoMT applications, aiming to maintain the Confidentiality, Integrity, and Availability (CIA triad) of data communication.
Article
Computer Science, Hardware & Architecture
O. Gilles, D. Gracia Perez, P. -a. Brameret, V. Lacroix
Summary: In the Industry 4.0 context, protecting data is crucial, especially when dealing with out-premise IIoT devices. OPC UA PubSub provides secure and interoperable solutions, but authentication remains a challenge. We propose a novel approach using open source software and a Trusted Platform Module to secure out-premise device authentication and ensure data confidentiality and integrity.
JOURNAL OF SYSTEMS ARCHITECTURE
(2023)
Article
Computer Science, Information Systems
Ziwang Wang, Liang Wang, Huili Yan
Summary: ARM TrustZone is the most widely used mobile trusted execution environment (TEE) technology, providing secure storage of credentials in mobile devices. However, little attention has been paid to managing the credentials stored in TEE throughout the device lifecycle. This paper presents a mutual anonymous authentication-based credential migration framework for TEE, addressing the risk of information disclosure caused by third-party service providers in traditional schemes.
Article
Computer Science, Information Systems
Noussair Fikri, Mohamed Rida, Nourredine Abghour, Khalid Moussaid, Amina El Omri, Mounia Myara
Summary: This article proposes a complete architecture based on Blockchain, TSLO, to solve the traceability and validity issues of accounting data in enterprise finance. TSLO is a more flexible and adaptable method for asset management, utilizing decentralized sub-ledgers and an implementation tree for assets-driven transactions.
Article
Computer Science, Information Systems
Ibrahim A. Abd El-Moghith And, Saad M. Darwish
Summary: Routing is a critical process in Wireless Sensor Networks (WSNs) to ensure data transmission to base stations. Existing routing methods are often impractical in practice and difficult to identify untrusted activities of routing nodes effectively. This article proposes a trusted routing method that combines deep blockchain and Markov Decision Processes (MDPs) to enhance the routing security and efficiency of WSNs.
Article
Computer Science, Information Systems
Zia Ullah, Basit Raza, Habib Shah, Shahzad Khan, Abdul Waheed
Summary: The paper introduces a blockchain-based decentralized distributed storage and sharing scheme that offers end-to-end encryption and fine-grained access control. The proposed IoTChain model uses attribute-based access control (A-BAC) policy, Ethereum blockchain, and IPFS, with advanced encryption standards and key exchange protocols. The system uses proof-of-authority (PoA) consensus to reduce transaction costs and boost throughput.
Article
Biology
Jing Xue, Yan Han, Hamid Baniasadi, Weizhong Zeng, Jimin Pei, Nick Grishin, Junmei Wang, Benjamin P. Tu, Youxing Jiang
Summary: TMEM120A, also known as TACAN, is a novel membrane protein highly conserved in vertebrates and has been proposed to function as an enzyme for fatty acid metabolism, rather than a mechanosensitive channel, based on the cryo-EM structure analysis presented in this study.
Article
Biology
Thierry Meurers, Raffael Bild, Kieu-Mi Do, Fabian Prasser
Summary: This article presents how ARX software was extended to improve support for high-dimensional biomedical datasets, with the implementation and evaluation of two novel search algorithms that outperformed previous methods. Additionally, the GUI was expanded to enhance usability and performance when working with complex datasets.
Article
Environmental Sciences
Huiting Chen, Hongxin Zhang, Sung-Gheel Jang, Xiaoyan Liu, Lijun Xing, Zihao Wu, Lin Zhang, Yaolin Liu, Cuizhen Chen
Summary: This study evaluates the criticality of flooded road links under different flood scenarios by combining flood modeling with commute simulation. The findings show that the impact of floods on roads is closely related to the proximity of water bodies, low-lying topography, and commute demands.
JOURNAL OF ENVIRONMENTAL MANAGEMENT
(2024)
Article
Economics
Thomas Cortade, Jean-Christophe Poudou
Summary: This article analyzes how new models of peer-to-peer exchange in the electricity sector can be effective and provide incentives to invest in decentralized domestic production units based on renewable energy sources. By modeling a local exchange system for electricity as a dealing platform, the study shows that such platforms can encourage prosumers to participate in energy exchanges and invest in local energy production. Compared to a no-platform configuration, a pure dealing welfare maximizing platform creates at least the same incentives to install domestic production units.
Article
Computer Science, Hardware & Architecture
Francesco Palmieri
Summary: This study introduces a new strategy to defeat the anonymity of traffic flows within anonymizing networks, using distributed flow-capture, characterization and correlation attacks driven by wavelet-based multi-resolution analysis. This strategy is effective and promising, and can be easily deployed on real-life network equipment.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
(2021)
Article
Computer Science, Artificial Intelligence
Milad Moradi, Nasser Ghadiri
ARTIFICIAL INTELLIGENCE IN MEDICINE
(2018)
Article
Computer Science, Interdisciplinary Applications
Mozhgan Nasr Azadani, Nasser Ghadiri, Ensieh Davoodijam
JOURNAL OF BIOMEDICAL INFORMATICS
(2018)
Article
Engineering, Chemical
Zahra Mannani, Iman Izadi, Nasser Ghadiri
INDUSTRIAL & ENGINEERING CHEMISTRY RESEARCH
(2019)
Article
Automation & Control Systems
Javad Salimi Sartakhti, Homayun Afrabandpey, Nasser Ghadiri
ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE
(2019)
Article
Multidisciplinary Sciences
Maryam Lotfi Shahreza, Nasser Ghadiri, James R. Green
SCIENTIFIC REPORTS
(2020)
Article
Computer Science, Artificial Intelligence
Mohammad Khodizadeh-Nahari, Nasser Ghadiri, Ahmad Baraani-Dastjerdi, Jorg-Rudiger Sack
Summary: This paper focuses on spatial data granulation to address the diversity in location descriptions from different data sources, improving the quality of data fusion. By introducing granular and data blocking methods, apparent differences in place descriptions can be managed effectively, reducing pairwise comparisons based on geographical features.
APPLIED INTELLIGENCE
(2021)
Article
Computer Science, Interdisciplinary Applications
Mehdi Joodaki, Nasser Ghadiri, Zeinab Maleki, Maryam Lotfi Shahreza
Summary: The effective mission of biology and medical science is to find disease-related genes, using gene/protein networks. Integrating multiple gene/protein networks could build a reliable heterogeneous network and the proposed RWRHN-FF algorithm outperforms existing methods in determining disease-related genes, applicable to various cancers. The algorithm's parallel implementation on the Apache Spark platform shows faster convergence on heterogeneous networks, compared to non-distributed modes.
JOURNAL OF BIOMEDICAL INFORMATICS
(2021)
Article
Computer Science, Interdisciplinary Applications
Ensieh Davoodijam, Nasser Ghadiri, Maryam Lotfi Shahreza, Fabio Rinaldi
Summary: This study introduces a domain-specific text summarization method that models a document as a multi-layer graph to process multiple features of the text simultaneously, selecting sentences from the graph using an unsupervised approach for improved information summarization. Evaluation through ROUGE and BERTScore demonstrates enhanced F-measure values.
JOURNAL OF BIOMEDICAL INFORMATICS
(2021)
Article
Agriculture, Dairy & Animal Science
Somayeh Sharifi, Maryam Lotfi Shahreza, Abbas Pakdel, James M. Reecy, Nasser Ghadiri, Hadi Atashi, Mahmood Motamedi, Esmaeil Ebrahimie
Summary: This study aimed to predict candidate drugs for the control and management of E. coli mastitis by integrating different levels of systems biology data. The use of a novel semi-supervised heterogeneous label propagation algorithm identified potential therapeutic avenues for the treatment of E. coli mastitis, including novel drugs such as Glibenclamide, Ipratropium, Salbutamol, and Carbidopa.
Article
Computer Science, Artificial Intelligence
Hoda Memarzadeh, Nasser Ghadiri, Matthias Samwald, Maryam Lotfi Shahreza
Summary: This study introduces a new method for representing EMRs based on clinical narratives, utilizing an unsupervised approach to integrate structured and unstructured data extracted from patients' EMRs. A tree structure model is employed to capture temporal relations of multiple medical events, and new relabeling methods for non-leaf nodes are developed to capture temporal aspects. Evaluation showed the proposed model leads to improved performance in patient similarity and mortality prediction tasks compared to baseline methods.
KNOWLEDGE AND INFORMATION SYSTEMS
(2022)
Article
Computer Science, Artificial Intelligence
Hoda Memarzadeh, Nasser Ghadiri, Matthias Samwald, Maryam Lotfi Shahreza
Summary: Clinical notes contain valuable patient information, but identifying key information and avoiding repetitive concepts during processing is challenging. This study addresses these challenges by using clinical natural language processing techniques and verifying a set of essential phrase extraction methods. Experimental results demonstrate the superiority of the proposed method in multiple and binary classification tasks, and offer insights into the efficacy of general methods for extracting key concepts from clinical notes.
PATTERN ANALYSIS AND APPLICATIONS
(2023)
Article
Computer Science, Artificial Intelligence
Erfan Farhangi Maleki, Nasser Ghadiri, Maryam Lotfi Shahreza, Zeinab Maleki
EXPERT SYSTEMS WITH APPLICATIONS
(2020)
Proceedings Paper
Computer Science, Artificial Intelligence
Hoda Memarzadeh, Nasser Ghadiri, Sara Parikhah Zarmehr
2018 8TH INTERNATIONAL CONFERENCE ON COMPUTER AND KNOWLEDGE ENGINEERING (ICCKE)
(2018)
Proceedings Paper
Computer Science, Artificial Intelligence
Mahsa Asadi, Nasser Ghadiri, Mohammad Amin Nikbakht
2018 8TH INTERNATIONAL CONFERENCE ON COMPUTER AND KNOWLEDGE ENGINEERING (ICCKE)
(2018)
Review
Biochemical Research Methods
Maryam Lotfi Shahreza, Nasser Ghadiri, Sayed Rasoul Mousavi, Jaleh Varshosaz, James R. Green
BRIEFINGS IN BIOINFORMATICS
(2018)