Mohammad Hossein Anisi
University of Essex
Routing protocolWireless networkDistributed computingEngineeringArtificial intelligenceNetwork packetEnergy (signal processing)Vehicular ad hoc networkWireless sensor networkEfficient energy useVertical handoverEnergy consumptionComputer networkComputer scienceKey distribution in wireless sensor networksWireless Routing ProtocolPacket lossWirelessMobile wireless sensor networkReal-time computingWireless ad hoc network
93Publications
22H-index
1,507Citations
Publications 96
Newest
#1Azadeh Pourkabirian (IAU: Islamic Azad University)H-Index: 3
#2Mohammad Hossein Anisi (University of Essex)H-Index: 22
Last. Fereshteh Kooshki (IAU: Islamic Azad University)
view all 3 authors...
Abstract null null Spectrum sharing deployment of femtocells brings interferences which dramatically degrade network performance. Hence, interference control is a crucial challenge for femtocell networks. In this paper, we propose a power optimization approach for 5G femtocell networks consisting of macrocell and underlying femtocells to manage the interference. Firstly, we formulate the problem based on a non-cooperative game to analyze the competition among the users to access shared spectrum....
Source
#1Seyed Ahmad Soleymani (UTM: Universiti Teknologi Malaysia)H-Index: 9
#2Sh. Goudarzi (IUST: Iran University of Science and Technology)H-Index: 1
Last. H.M. Rusli (UTM: Universiti Teknologi Malaysia)
view all 6 authors...
Abstract null null Vehicular Ad Hoc Network (VANET), as an important network infrastructure in the Industrial Internet of Thing (IIoT), creates an intelligent space for vehicular communications. However, security and privacy are the main issues related to VANET since it is an open-access environment. To this end, a secure and impressive privacy-preserving authentication scheme can improve safety in VANET. In this paper, a node and message authentication with privacy-preserving is designed wherei...
Source
#1Shreyas Upasane (University of Essex)H-Index: 1
#2Hani Hagras (University of Essex)H-Index: 51
view all 6 authors...
Source
#1Shidrokh GoudarziH-Index: 2
#1Shidrokh GoudarziH-Index: 13
Last. Sherali ZeadallyH-Index: 69
view all 5 authors...
Today, there is a crucial need for precise monitoring and prediction of energy consumption at the building level using the latest technologies including Internet of Things (IoT) and data analytics to determine and enhance energy usage. Data-driven models could be used for energy consumption prediction. However, due to high non-linearity between the inputs and outputs of energy consumption prediction models, these models need improvement in terms of accuracy and robustness. Therefore, this work a...
Source
#1Seyed Ahmad Soleymani (UTM: Universiti Teknologi Malaysia)H-Index: 9
#2Shidrokh Goudarzi (UKM: National University of Malaysia)H-Index: 1
Last. Nazri Kama (UTM: Universiti Teknologi Malaysia)H-Index: 9
view all 6 authors...
Abstract Security and privacy are the most important concerns related to vehicular ad hoc network (VANET), as it is an open-access and self-organized network. The presence of ‘selfish’ nodes distributed in the network are taken into account as an important challenge and as a security threat in VANET. A selfish node is a legitimate vehicle node which tries to achieve the most benefit from the network by broadcasting wrong information. An efficient and proper security model can be useful to tackle...
1 CitationsSource
2 CitationsSource
#1Shidrokh GoudarziH-Index: 1
#1Shidrokh Goudarzi (UKM: National University of Malaysia)H-Index: 2
Last. A. PescapeH-Index: 1
view all 5 authors...
Heterogeneous wireless networks that are used for seamless mobility are expected to face prominent problems in future fifth generation (5G) cellular networks. Due to their proper flexibility and adaptable preparation, remote-controlled unmanned aerial vehicles (UAVs) could assist heterogeneous wireless communication. However, the key challenges of current UAV-assisted communications consist in having appropriate accessibility over wireless networks via mobile devices with an acceptable Quality o...
1 CitationsSource
#1Vahid Abolghasemi (University of Essex)H-Index: 15
#2Mohammad Hossein Anisi (University of Essex)H-Index: 22
Although wireless sensor networks are considered as one of the prominent solutions for flood monitoring, the energy constraint nature of the sensors is still a technical challenge. In this letter, we tackle this problem by proposing a novel energy-efficient remote flood monitoring system, enabled by compressive sensing. The proposed approach compressively captures water level data using i) a random block-based sampler, and ii) a gradient-based compressive sensing approach, at a very low rate, ex...
2 CitationsSource
#1Shidrokh Goudarzi (UKM: National University of Malaysia)H-Index: 1
#1Shidrokh Goudarzi (UKM: National University of Malaysia)H-Index: 2
Last. Leila MusavianH-Index: 24
view all 4 authors...
In vehicular ad-hoc networks, autonomous vehicles generate a large amount of data prior to support in-vehicle applications. So, a big storage and high computation platform is needed. On the other hand, the computation for vehicular networks at the cloud platform requires low latency. Applying edge computation (EC) as a new computing paradigm has potentials to provide computation services while reducing the latency and improving the total utility. We propose a three-tier EC framework to set the e...
7 CitationsSource
#1Yeganeh Jalali (University of Shahrood)
#2Mansoor Fateh (University of Shahrood)H-Index: 2
Last. Mohammad Hossein Anisi (University of Essex)H-Index: 22
view all 5 authors...
Lung CT image segmentation is a key process in many applications such as lung cancer detection. It is considered a challenging problem due to existing similar image densities in the pulmonary structures, different types of scanners, and scanning protocols. Most of the current semi-automatic segmentation methods rely on human factors therefore it might suffer from lack of accuracy. Another shortcoming of these methods is their high false-positive rate. In recent years, several approaches, based o...
Source