Zum Hauptinhalt springen

Showing 1–9 of 9 results for author: Naji, H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.13599  [pdf, other

    cs.CR

    Defying the Odds: Solana's Unexpected Resilience in Spite of the Security Challenges Faced by Developers

    Authors: Sébastien Andreina, Tobias Cloosters, Lucas Davi, Jens-Rene Giesen, Marco Gutfleisch, Ghassan Karame, Alena Naiakshina, Houda Naji

    Abstract: Solana gained considerable attention as one of the most popular blockchain platforms for deploying decentralized applications. Compared to Ethereum, however, we observe a lack of research on how Solana smart contract developers handle security, what challenges they encounter, and how this affects the overall security of the ecosystem. To address this, we conducted the first comprehensive study on… ▽ More

    Submitted 19 June, 2024; originally announced June 2024.

    Comments: To appear in the Proceedings of the 31st ACM Conference on Computer and Communications Security (CCS), 2024

  2. arXiv:2311.17282  [pdf

    cs.NI cs.DC

    Reducing energy consumption of cloud data centers using proper placement of virtual machines

    Authors: Hamid Reza Naji, Reza Esmaeili

    Abstract: In today's world, the use of cloud data centers for easy access to data and processing resources is expanding rapidly. Rapid technology growth and increasing number of users make hardware and software architectures upgrade a constant need. The necessary infrastructure to implement this architecture is the use of virtual machines in physical systems. The main issue in this architecture is how to al… ▽ More

    Submitted 7 November, 2023; originally announced November 2023.

    Comments: arXiv admin note: substantial text overlap with arXiv:2311.16147

  3. arXiv:2311.16147  [pdf

    cs.NI cs.DC

    Load balancing in cloud data centers with optimized virtual machines placement

    Authors: Hamid Reza naji, Reza Esmaeili

    Abstract: So far, various solutions have been proposed for symmetric distribution of load cloud computing environments. In this article, a new solution to the optimal allocation of virtual machines in the cloud data centers is presented to provide a good load balancing among servers. The proposed method offers a solution uses learning automata as a reinforcement learning model to improve the performance of… ▽ More

    Submitted 7 November, 2023; originally announced November 2023.

  4. arXiv:2311.05648  [pdf

    eess.SY cs.CR

    Risk Management of Unmanned Aerial Vehicles

    Authors: Hamid Reza Naji, Aref Ayati

    Abstract: This paper presents an efficient risk management model for unmanned aerial vehicles or UAVs. Our proposed risk management establishes a cyclic model with a continuous and iterative structure that is very adaptable to agile methods and all IT-related resources. This model can be used in many applications, but as a case study, we have discussed it for UAVs. The increasing use of UAVs or drones in ma… ▽ More

    Submitted 7 November, 2023; originally announced November 2023.

  5. arXiv:2306.17116  [pdf, ps, other

    cs.CV

    Learning Nuclei Representations with Masked Image Modelling

    Authors: Piotr Wójcik, Hussein Naji, Adrian Simon, Reinhard Büttner, Katarzyna Bożek

    Abstract: Masked image modelling (MIM) is a powerful self-supervised representation learning paradigm, whose potential has not been widely demonstrated in medical image analysis. In this work, we show the capacity of MIM to capture rich semantic representations of Haemotoxylin & Eosin (H&E)-stained images at the nuclear level. Inspired by Bidirectional Encoder representation from Image Transformers (BEiT),… ▽ More

    Submitted 29 June, 2023; originally announced June 2023.

  6. Internet of Things and Health Care in Pandemic COVID-19: System Requirements Evaluation

    Authors: Hasan Naji, Nicolae Goga, Ammar Karkar, Iuliana Marin, Haider Abdullah Ali

    Abstract: Technology adoption in healthcare services has resulted in advancing care delivery services and improving the experiences of patients. This paper presents research that aims to find the important requirements for a remote monitoring system for patients with COVID-19. As this pandemic is growing more and more, there is a critical need for such systems. In this paper, the requirements and the value… ▽ More

    Submitted 5 May, 2022; originally announced May 2022.

    Comments: 6 pages, 5 figures

  7. Novel Design and Implementation of a Vehicle Controlling and Tracking System

    Authors: Hasan Naji, Iuliana Marin, Nicolae Goga, Cristian Taslitschi

    Abstract: The purpose of this project is to build a system that will quickly track the location of a stolen vehicle, thereby reducing the cost and effort of police. Moreover, the vehicle's computer system can be controlled remotely by the owners of the vehicle or police. More precisely, the goal of this work is to design a, develop remote control of the vehicle, and find the locations with Latitude (LAT) an… ▽ More

    Submitted 29 January, 2021; originally announced February 2021.

    Comments: International Journal of Advanced Computer Science and Applications 2020

  8. arXiv:1601.06933  [pdf

    cs.LG

    A Novel Memetic Feature Selection Algorithm

    Authors: Mohadeseh Montazeri, Hamid Reza Naji, Mitra Montazeri, Ahmad Faraahi

    Abstract: Feature selection is a problem of finding efficient features among all features in which the final feature set can improve accuracy and reduce complexity. In feature selection algorithms search strategies are key aspects. Since feature selection is an NP-Hard problem; therefore heuristic algorithms have been studied to solve this problem. In this paper, we have proposed a method based on memetic a… ▽ More

    Submitted 26 January, 2016; originally announced January 2016.

    Comments: M., Montazeri, H. R. Naji, M. Montazeri, A. Faraahi. A novel memetic feature selection algorithm. In Information and Knowledge Technology (IKT), 2013 5th Conference on. 2013

  9. arXiv:1003.1810  [pdf

    cs.MA

    Reconfigurable Parallel Data Flow Architecture

    Authors: Hamid Reza Naji

    Abstract: This paper presents a reconfigurable parallel data flow architecture. This architecture uses the concepts of multi-agent paradigm in reconfigurable hardware systems. The utilization of this new paradigm has the potential to greatly increase the flexibility, efficiency, expandability of data flow systems and to provide an attractive alternative to the current set of disjoint approaches that are cur… ▽ More

    Submitted 9 March, 2010; originally announced March 2010.

    Comments: Pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS, Vol. 7 No. 2, February 2010, USA. ISSN 1947 5500, http://sites.google.com/site/ijcsis/