Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Mehregan Mahdavi

    Mehregan Mahdavi

    In differentiated learning, the teacher needs to be aware of the learning styles of students in the classroom to accommodate specific learning preferences, e.g., the Felder–Silverman learning style model. The corresponding instrument,... more
    In differentiated learning, the teacher needs to be aware of the learning styles of students in the classroom to accommodate specific learning preferences, e.g., the Felder–Silverman learning style model. The corresponding instrument, i.e., the Felder–Silverman Index of Learning Style (ILS), was designed to assess learning styles, specifically for engineering students. The ILS has been tested at the middle school level to identify the learning styles; however, validity/reliability had not been established in earlier studies with large samples. The focus of this study was to identify the validity and reliability of an ILS instrument for middle school students (N=450) by investigating the factor structure through factor analysis. This includes internal consistency reliability and constructing validity report of the ILS. An exploratory and confirmatory factor analysis was undertaken to investigate the factor structure to establish validity. As a result of the study, the reliability of ...
    Purpose Sustainable development goals and the climate change agenda are becoming widely promoted topics of research for the 21st century. The role of cities is increasingly recognised as central to investigating these topics. Yet, the... more
    Purpose Sustainable development goals and the climate change agenda are becoming widely promoted topics of research for the 21st century. The role of cities is increasingly recognised as central to investigating these topics. Yet, the field of informal sector entrepreneurship which so many urban entrepreneurs in developing countries depend upon is seldom considered. To redress this imbalance, this study aims to develop a decision model in accordance with institutional theory (IT) and resource dependency theory (RDT) for city managers to deploy. The model identifies and prioritises optimal strategies to address the three areas of sustainability requirements environment society and economy within the study context of Bangladesh. Design/methodology/approach This study used a mixed methods research design. In the qualitative part, the authors identified the three areas of sustainability requirements (i.e. environment, society and economy) and their corresponding strategies involving the...
    ABSTRACT On the recent decades, interception of computer system on the different sciences such as medical decisions has been one of the important issues in medical science. This paper qualifies a recommender system on the medical scope... more
    ABSTRACT On the recent decades, interception of computer system on the different sciences such as medical decisions has been one of the important issues in medical science. This paper qualifies a recommender system on the medical scope for disease recognition and treatment which can be implemented on the web or be used as an offline system. Firstly, we will have a look to recommendation concept. Then, we explain initial definitions of recommendation on the medical field, its framework and also make a clear view about basic required elements. After a total definition, the steps of implemented recommendation system and its algorithm will be represented. Finally we represent a sample data and then implement our structure and relations on it.
    Business world is getting increasingly dynamic. Information processing using knowledge-, service-, and cloud-based systems makes the use of complex, dynamic and often knowledge-intensive activities an inevitable task. Knowledge-intensive... more
    Business world is getting increasingly dynamic. Information processing using knowledge-, service-, and cloud-based systems makes the use of complex, dynamic and often knowledge-intensive activities an inevitable task. Knowledge-intensive processes contain a set of coordinated tasks and activities, controlled by knowledge workers to achieve a business objective or goal. Recruitment process - i.e., the process of attracting, shortlisting, selecting and appointing suitable candidates for jobs within an organization - is an example of a knowledge-intensive process, where recruiters (i.e., knowledge workers who have the experience, understanding, information, and skills) control various tasks from advertising positions to analyzing the candidates’ Curriculum Vitae. Attracting and recruiting right talent is a key differentiator in modern organizations. In this paper, we put the first step towards automating the recruitment process. We present a framework and algorithms (namely iRecruit) t...
    Cross-site scripting is a vulnerability in Web applications that can be exploited by injecting malicious script codes such as JavaScript into a Web application. A cross-site scripting technique allows an authorised user to inject... more
    Cross-site scripting is a vulnerability in Web applications that can be exploited by injecting malicious script codes such as JavaScript into a Web application. A cross-site scripting technique allows an authorised user to inject malicious codes into a Web application and perform malicious activities. This paper analyses the traditional methods used in preventing cross-site scripting. A security framework is then proposed to improve the security of Web applications against Web-scripting attacks. This framework defines a security checklist, which comprises a set of rules. These rules contribute towards strengthening the security of Web applications and making them more robust to cross-site scripting attacks.
    The initial algorithm that has been used for processing of raw data synthetic aperture radar (SAR) is Range Doppler Algorithm (RDA). This data is related to spaceborne or airborne SARs that often data gathering is done by satellite. Due... more
    The initial algorithm that has been used for processing of raw data synthetic aperture radar (SAR) is Range Doppler Algorithm (RDA). This data is related to spaceborne or airborne SARs that often data gathering is done by satellite. Due to SAR sensor motion with respect to static or moving targets in ground encounter with range cell migration (RCM) phenomenon in spaceborne. In the aircraft case RCM is negligible because the platform velocity is lower. In this paper we implement the RDA on spaceborne real data gathered from RADARSAT1 to generate SAR image.
    Cloud computing provides a set of resources and services for customers on the Internet on demand and based on a pay as you go model. Cloud providers are looking to decrease costs and increase profits. Therefore, resource management and... more
    Cloud computing provides a set of resources and services for customers on the Internet on demand and based on a pay as you go model. Cloud providers are looking to decrease costs and increase profits. Therefore, resource management and provisioning are very important for cloud providers. Automated scaling can be used to provide resources for user requests. Auto‐scaling can decrease the total operational costs for providers, although it does have its own cost and time overheads. In this paper, a new solution is presented for resource provisioning on multi‐layered cloud applications based on MAPE‐K loop. A weighted ensemble prediction model is proposed to estimate the resources utilization in each cloud layer. In addition, accuracy of the model and a regularization technique are used to regulate the weights of the models in the proposed hybrid prediction model. Furthermore, a decision tree‐based algorithm is presented to analyze status of the resources to make scaling decision. In add...
    ABSTRACT
    Research Interests:
    Information explosion especially in the form of files and folders utilized new software/hardware technologies to satisfy the users' needs. The traditional hierarchical file system was used as foundation of almost all the file managers... more
    Information explosion especially in the form of files and folders utilized new software/hardware technologies to satisfy the users' needs. The traditional hierarchical file system was used as foundation of almost all the file managers for file storage, search and retrieval. In spite of all the benefits of hierarchical structures for information storage and retrieval, there are some shortcomings in categorization of massive amounts of information that in mid-term and long-term lead to ambiguity and redundancy in storage/retrieval. In this article, a new file manager, File & Concept Browser (FCB) is proposed that supports multiple categorization. The general attitude is similar to the common hierarchical file managers, but it supports maintaining a file through different paths without multi-versioning, redundancy and ambiguity. The idea was implemented as a software prototype and experimental results show that in addition to avoiding redundancy, using FCB can reduce access time, r...
    Abstract A virtual university is an organization, which provides education and learning through web portal over internet and utilizes multimedia technology to provide online classes, course units, and interactive instructor. It also... more
    Abstract A virtual university is an organization, which provides education and learning through web portal over internet and utilizes multimedia technology to provide online classes, course units, and interactive instructor. It also utilizes virtual reality application for ...
    Abstract The Collaborative Filtering is the most successful algorithm in the recommender systems' field. A recommender system is an intelligent system can help users to come across interesting items. It uses data mining and... more
    Abstract The Collaborative Filtering is the most successful algorithm in the recommender systems' field. A recommender system is an intelligent system can help users to come across interesting items. It uses data mining and information filtering techniques. The ...
    ... Morteza Ashurzad Delcheh Software Eng. Department, Azad University – Lahijan Branch, Iran Mor.delcheh@gmail.com Seyyed Hamidreza Afzali School of ICT, Royal Institute of Technology (KTH), Sweden Hr.afzali@gmail.com ...
    Abstract Existing methods and techniques utilized by peer-to-peer (P2P) systems could address the scalability issue faced by grid systems. Today's Grid systems have to deal with potentially a large number of resources which their... more
    Abstract Existing methods and techniques utilized by peer-to-peer (P2P) systems could address the scalability issue faced by grid systems. Today's Grid systems have to deal with potentially a large number of resources which their status changes over time. Therefore, ...
    Abstract Since the determination of IEEE 802.11 protocol behavior against various scenarios is important, Therefore we offer two scenarios that how corrupted frames are effected on inter frame spaces and its adverse effect impact on... more
    Abstract Since the determination of IEEE 802.11 protocol behavior against various scenarios is important, Therefore we offer two scenarios that how corrupted frames are effected on inter frame spaces and its adverse effect impact on efficiency and fairness are explained. ...
    Abstract Efficient programs are characterized by several parameters including the user interface design (UID). From the end-userpsilas point of view, the user interface is the representative of the program. Therefore, friendlier software... more
    Abstract Efficient programs are characterized by several parameters including the user interface design (UID). From the end-userpsilas point of view, the user interface is the representative of the program. Therefore, friendlier software with limited capabilities is ...
    Abstract—This paper introduces a new file manager to support multiple categorization. The proposed file manager is designed based on a subtle idea named Conceptual File Management (CFM). According to this approach, files are not contained... more
    Abstract—This paper introduces a new file manager to support multiple categorization. The proposed file manager is designed based on a subtle idea named Conceptual File Management (CFM). According to this approach, files are not contained by folders; ...
    Security has been an important issue in the smart home applications. In home networks with distributed architectures that consist of a broad range of wired or wireless devices, it is likely that unauthorized access to some restricted data... more
    Security has been an important issue in the smart home applications. In home networks with distributed architectures that consist of a broad range of wired or wireless devices, it is likely that unauthorized access to some restricted data or devices may occur. Therefore, it ...
    The Internet of Things (IoT) is recognized as one of the major key areas of future technology and is gaining vast attention from an extensive range of industries. The sensors and devices are generating massive amounts of high-dimensional... more
    The Internet of Things (IoT) is recognized as one of the major key areas of future technology and is gaining vast attention from an extensive range of industries. The sensors and devices are generating massive amounts of high-dimensional and heterogeneous data that need to be stored and processed. Machine learning encompasses the widespread techniques of artificial intelligence that can deduce patterns and relationships from unstructured data. Big data analytics are advanced statistical and predictive analytic methods which are capable of manipulating data in a range of Exabytes and more. This paper presents a review of the applications of the Internet of Everything and the machine learning techniques in the fields of health, smart electrical grid, and supply chain management. A review of the literature has been conducted to demonstrate the future issues and challenges that researchers will face.
    Higher education for sustainable development (HESD) plays a key role in achieving the United Nations’ 17 Sustainable Development Goals (SDGs). This research study specifically examined HESD in terms of eLearning initiatives in Australian... more
    Higher education for sustainable development (HESD) plays a key role in achieving the United Nations’ 17 Sustainable Development Goals (SDGs). This research study specifically examined HESD in terms of eLearning initiatives in Australian private higher education providers from the perspective of teachers. A qualitative structured interview method was adopted wherein 10 teachers were interviewed in order to gain an understanding of their general knowledge of HESD, their attitudes and experience towards HESD, their teaching practices related to HESD, and their understandings of strategy as well as planning initiatives for their institution. The main findings suggest that (1) teachers in private higher education providers tend to have a limited knowledge of sustainability concepts and limited experience in teaching sustainability; (2) eLearning can be a valuable approach in teaching sustainability, but this approach presents teachers with challenges such as student engagement; and (3) ...
    ... LRU-SP combines size and popularity of Web objects into LRU [9]. 3. A collaborative caching strategy ... 4. Experimental results In order to evaluate the performance of the collaborative caching strategy, we compare its performance... more
    ... LRU-SP combines size and popularity of Web objects into LRU [9]. 3. A collaborative caching strategy ... 4. Experimental results In order to evaluate the performance of the collaborative caching strategy, we compare its performance with other caching strategies. ...
    Efficient programs are characterized by several parameters including the User Interface Design (UID). From the end-user's point of view, the user interface is the representative of the program. Therefore, friendlier software with... more
    Efficient programs are characterized by several parameters including the User Interface Design (UID). From the end-user's point of view, the user interface is the representative of the program. Therefore, friendlier software with limited capabilities is viewed to be more useable than a comprehensive software; in other words, the UI has a great impact on the software to choose. There has been a great amount of work on UID guidelines. In this paper, we introduce the fundamental guidelines that a designer should consider to increase usability. We consider new aspects including user access, language selection and other technical options in the forms. The subjects are studied independently from the application and are applicable to all kinds of environments such as web based, desktop, and embedded software. Following these guidelines results in a software which is friendlier, easier to understand and use, more reusable and less tedious.
    In this paper, a filtering approach for the 3D magnetic resonance imaging (MRI) assuming a Rician model for noise is addressed. Our denoising method is based on the Conventional Approach (CA) proposed to deal with the noise issue in the... more
    In this paper, a filtering approach for the 3D magnetic resonance imaging (MRI) assuming a Rician model for noise is addressed. Our denoising method is based on the Conventional Approach (CA) proposed to deal with the noise issue in the squared domain of the acquired magnitude MRI, where the noise distribution follows a Chi-square model rather than the Rician one. In the CA filtering method, the local samples around each voxel is used to estimate the unknown signal value. Intrinsically, such a method fails to achieve the best results where the underlying signal values have different statistical properties. On the contrary, our proposal takes advantage of the data redundancy and self-similarity properties of real MR images to improve the noise removal performance. In other words, in our approach, the statistical momentums of the given 3D MR volume are first calculated to explore the similar patches inside a defined search volume. Then, these patches are put together to obtain the noi...
    In this article, a new model is proposed for tourism recommender systems. This model recommends tours to tourists using data-mining techniques such as clustering and association rules. According to the proposed model, tourists are... more
    In this article, a new model is proposed for tourism recommender systems. This model recommends tours to tourists using data-mining techniques such as clustering and association rules. According to the proposed model, tourists are initially clustered. Self Organize Map (SOM) algorithm is used for determining the number of clusters and the clusters are created by K-means algorithm. Then, the clusters are analyzed and validated considering Quantization error, Topographic error and Davies-Bouldin error parameters. This model is implemented using two methods; according to the first method, recommendation is made based on tourists’ location, and in the second method this is done based on tourists’ behavioural patterns in the past. The results from evaluating the model using Pearson Correlation show that recommendations based on the behavioural patterns are closer to tourists’ interests.
    هدیکچ : متسیس ياه RFID ) Radio Frequency Identification متسیسس زا يدیدج لسن ( وتا ییاسانش ياه رب ینتبم کیتام تارباخم يژولونکت یب میس دنتسه متسیس نیا رد . گت همه اه ) اه Tags ابترا يرارقرب يارب لاناک کی زا ( هدنناوخ هاگتسد اب ط یم هدافتسا... more
    هدیکچ : متسیس ياه RFID ) Radio Frequency Identification متسیسس زا يدیدج لسن ( وتا ییاسانش ياه رب ینتبم کیتام تارباخم يژولونکت یب میس دنتسه متسیس نیا رد . گت همه اه ) اه Tags ابترا يرارقرب يارب لاناک کی زا ( هدنناوخ هاگتسد اب ط یم هدافتسا .دننک مادقا نامزمه روط هب گت نیدنچ رگا ب ه نآ یلاسرا لانگیس دننک دوخ هسانش هرامش لاسرا دروخرب مه اب اه .درک دهاوخ متسیس رد دروخرب نیا ندرک فرط رب هوحن ياه RFID متسیس رد ًاصوصخم رب میقتسم ریثات دایز گت دادعت اب ياه ییاسانش تعرس متسیس نیا اه مان اب يدیدج متیروگلا هلاقم نیا رد .دراد EBCDA ) Enhanced Bit Collision Detection
    Rural credit is one of the most critical inputs for farm production across the globe. Despite so many advances in digitalization in emerging and developing economies, still a large part of society like small farm holders, rural youth, and... more
    Rural credit is one of the most critical inputs for farm production across the globe. Despite so many advances in digitalization in emerging and developing economies, still a large part of society like small farm holders, rural youth, and women farmers are untouched by the mainstream of banking transactions. Machine learning-based technology is giving a new hope to these individuals. However, it is the banking or non-banking institutions that decide how they will adopt this advanced technology, to have reduced human biases in loan decision making. Therefore, the scope of this study is to highlight the various AI-ML- based methods for credit scoring and their gaps currently in practice by banking or non-banking institutions. For this study, systematic literature review methods have been applied; existing research articles have been empirically reviewed with an attempt to identify and compare the best fit AI-ML-based model adopted by various financial institutions worldwide. The main ...
    A fully differential low-power down-conversion mixer using a TSMC 0.18-μm CMOS process is presented in this paper. The proposed mixer is based on a folded double-balanced Gilbert cell topology that enhances conversion gain and reduces... more
    A fully differential low-power down-conversion mixer using a TSMC 0.18-μm CMOS process is presented in this paper. The proposed mixer is based on a folded double-balanced Gilbert cell topology that enhances conversion gain and reduces power dissipation. Though, this mixer is designed for 5.8 GHz ISM band applications, but at 0.5-7.5 GHz, the proposed mixer exhibits a maximum conversion gain of 12dB, maximum IIP3 of -2.5 dBm, maximum input 1-dB compression point of -13 dBm, the minimum DSB noise figure of 9.2 dB and a dc power consumption of 2.52 mW at 1.8 V power supply. Also, this circuit architecture increases port-to-port isolations to above 140 dB. Moreover this mixer is suitable for broadband applications.
    Research Interests:
    Learning Management Systems (LMS) enable effective design and delivery of learning materials. They are Web-based software applications used to plan, implement, and assess a specific learning process. LMSs allow learners to connect to and... more
    Learning Management Systems (LMS) enable effective design and delivery of learning materials. They are Web-based software applications used to plan, implement, and assess a specific learning process. LMSs allow learners to connect to and interact with the educational material through the Internet. They enable tools for authors (instructors) to design learning materials that include text, html, audio, video, etc. They also enable learner activity management in the learning process. Moreover, they provide tools for effective and efficient assessment of the learners. This chapter explores learning management systems and their key components that enable instructors organize and monitor learning activities of the learners. It also introduces the authoring features provided by such systems for preparing learning material. Moreover, it presents assessment methods and tools that enable evaluation of the learners in the learning process. Furthermore, existing challenges and issues in this fi...
    Internet technology has rapidly grown during the last decades. Presently, users are faced with a great amount of information and they need help to find appropriate items in the shortest possible time. Recommender systems were introduced... more
    Internet technology has rapidly grown during the last decades. Presently, users are faced with a great amount of information and they need help to find appropriate items in the shortest possible time. Recommender systems were introduced to overcome this problem of overloaded information. They recommend items of interest to users based on their expressed preferences. Major e-commerce companies try to use this technology to increase their sales. Collaborative Filtering is the most promising technique in recommender systems. It provides personalized recommendations according to user preferences. But one of the problems of Collaborative Filtering is cold-start. The authors provide a novel approach for solving this problem through using the attributes of items in order to recommend items to more people for improving e-business activities. The experimental results show that the proposed method performs better than existing methods in terms of the number of generated recommendations and th...
    Caching Dynamic Data for E-Business Applications* Mehregan Mahdavi1, Boualem Benatallah1, and Fethi Rabhi2 1 School of Computer Science and Engineering The University of New South Wales, Sydney, NSW 2052, Australia 2 School of Information... more
    Caching Dynamic Data for E-Business Applications* Mehregan Mahdavi1, Boualem Benatallah1, and Fethi Rabhi2 1 School of Computer Science and Engineering The University of New South Wales, Sydney, NSW 2052, Australia 2 School of Information Systems, ...
    Abstract—In mobile learning, there is no limitation for the number of learners; it is more attractive than traditional learning, more convenient and cheaper for updating, quicker in terms of broadcasting, less bulky and it is easier to... more
    Abstract—In mobile learning, there is no limitation for the number of learners; it is more attractive than traditional learning, more convenient and cheaper for updating, quicker in terms of broadcasting, less bulky and it is easier to transfer information. In addition, the ...
    Abstract: Requirements of users for wireless devices such as laptops and mobiles are different from their needs for wired devices. Wireless networks have limitations such as bandwidth, processing power of devices and size of display... more
    Abstract: Requirements of users for wireless devices such as laptops and mobiles are different from their needs for wired devices. Wireless networks have limitations such as bandwidth, processing power of devices and size of display screen. Therefore, some ...
    Portals are one of the rapidly growing applications on the Web, providing a single interface to access different sources (providers). Providing fast response time is one of the crit-ical issues in such applications. Dissatisfaction of... more
    Portals are one of the rapidly growing applications on the Web, providing a single interface to access different sources (providers). Providing fast response time is one of the crit-ical issues in such applications. Dissatisfaction of users dra-matically increases with increasing ...

    And 7 more