Papers by Mohsen Amiribesheli

Intelligent Environments (IEs) can enhance the experiences of their users in a variety of context... more Intelligent Environments (IEs) can enhance the experiences of their users in a variety of contexts, such as healthcare, energy management, and education. Despite these enhancements, some people do not accept IE technologies to be embedded in their living environments. Numerous studies link this lack of acceptability to users' trust and attempt to address the trust issue by considering users' requirements such as privacy, security and reliability. In this paper, we address the concept of trust from the perspective of transparency by adopting the existing transparency reference models designed for software requirements engineering in the context of IEs. Based on the outcome of applying these reference models, we propose a human-centred principle-based transparency framework for IEs. We hope that this framework aids the researchers and developers in the IE community, and that the suggested transparency principles provide a solid foundation for transparent IE systems.

—Care costs of People with Dementia (PwDs) bear a tremendous burden on healthcare systems around ... more —Care costs of People with Dementia (PwDs) bear a tremendous burden on healthcare systems around the world. Smart Homes (SHs), as an instance of the ambient assisted living technology, can help reduce these expenses. However, only few of the existing studies in the literature discuss how SHs should be designed by considering the unique requirements of PwDs. Most of the studies view dementia care as a straight application of standard SH technology without accommodating the specific needs of PwDs. A consequence of this approach is the inadequacy and unacceptability of generic SH systems to PwDs as well as other stakeholders in the sector of dementia care. The present research reports on the requirements elici-tation, design and evaluation of a dedicated SH prototype for PwDs. In contrast to most of the existing SH systems proposed for PwDs, this work presents a tailored prototype that is based on a user-centred design methodology. The preliminary evaluation by a sample of stakeholders shows the suitability of the proposed methodology and consequently the resulting prototype for reducing care difficulties as well as its potential of deployment in the real-world environment.
In this paper, we present a user-centred approach for designing and developing smart homes for pe... more In this paper, we present a user-centred approach for designing and developing smart homes for people with dementia. In contrast to most of the existing literature related to dementia, the present approach aims at tailoring the system to the specific needs of dementia using a scenario-based methodology. Scenarios are based on typical dementia symptoms which are collected from research literatures and validated by dementia caregivers. They portray the common behaviour of people with dementia. Because they explain real-world situations, scenarios are meant to generalise the requirements of smart homes for people with dementia. Hence, a top-down approach is followed to summarise the content of the scenarios into the essential requirements for smart home frameworks dedicated to monitoring people with dementia.

The technology of Smart Homes (SH), as an instance of ambient assisted living technologies, is de... more The technology of Smart Homes (SH), as an instance of ambient assisted living technologies, is designed to assist the homes’ residents accomplishing their daily-living activities and thus having a better quality of life while preserving their privacy. A SH system is usually equipped with a collection of inter-related software and hardware components to monitor the living space by capturing the behaviour of the resident and understanding his activities. By doing so the system can inform about risky situations and take actions on behalf of the resident to his satisfaction. The present survey will address technologies and analysis methods and bring examples of the state of the art research studies in order to provide background for the research community. In particular, the survey will expose infrastructure technologies such as sensors and communication platforms along with artificial intelligence techniques used for modeling and recognizing activities. A brief overview of approaches used to develop Human–Computer interfaces for SH systems is given. The survey also highlights the challenges and research trends in this area.
Patient epicrisis reports obtained from the Pasteur Laboratory in the north of Iran were used. Al... more Patient epicrisis reports obtained from the Pasteur Laboratory in the north of Iran were used. All 175 samples have twenty features. The features are classified based on incorporating a fuzzy logic controller and artificial immune recognition system. The features are normalized through a fuzzy rule based on a labeling system. The labeled features are categorized into normal and tuberculosis classes using the Artificial Immune Recognition Algorithm.
Wireless sensor networks consist of a large number of sensor nodes having limited power. The most... more Wireless sensor networks consist of a large number of sensor nodes having limited power. The most important feature of these networks is the presence of dynamic topology which will lead to the mobility of the nodes. This mobility requires a routing capable of adapting to these changes. Despite the power
restriction in these networks, the purpose in routing algorithm is not to find the shortest route; rather it is the power of each node which constitutes one of the most important issues. In this article, we have used soft computing techniques for routing in the network. The results obtained show that the combined method based on soft computing as compared to previous methods some what improves the minimalization of used power.
In this article, a method that optimizes the information of an analyzed signal is described. This... more In this article, a method that optimizes the information of an analyzed signal is described. This method is practicable for various analyses and in fact is an additional process that is used after the analysis.
We tendered our idea in our previous article. In this method, we first analyzed the signal, after which the first frame and some other frames were put in a matrix, where each row was a frame. Then the likeness of this matrix was computed with itself. Subsequently, this process was done for the second frame and
the other frames following it, after which it was done for all frames.
Wireless sensor networks have been widely used in various areas, and their use in railway to redu... more Wireless sensor networks have been widely used in various areas, and their use in railway to reduce human and material losses has been a remarkable development. In this article, sensors placed in different places in railway are described and the way they recognize flaws in the railway is explained.
The data read by the sensors are sent to the sink node to be processed. Fuzzy logic has been used to process these data
In this article a new security model is introduced in which capabilities (such as looseconnection... more In this article a new security model is introduced in which capabilities (such as looseconnections, interactions independent of the technology and platform used among components, gradual development) and the service-oriented architecture, which is a new concept in architecture composed
of (SOAP, WSDL, UDDI, …) standards, and the security measures of this architecture are used to address shortcomings in the security sections of wireless sensor networks (such as the fact that these sections are not concentrated, they are wireless, their cost cannot be reduced very much, they are
dependent on nodes, their nodes perform several functions, etc.) So that a concentrated security system is established in the network and security shortcomings of WSN are reduced.
Uploads
Papers by Mohsen Amiribesheli
restriction in these networks, the purpose in routing algorithm is not to find the shortest route; rather it is the power of each node which constitutes one of the most important issues. In this article, we have used soft computing techniques for routing in the network. The results obtained show that the combined method based on soft computing as compared to previous methods some what improves the minimalization of used power.
We tendered our idea in our previous article. In this method, we first analyzed the signal, after which the first frame and some other frames were put in a matrix, where each row was a frame. Then the likeness of this matrix was computed with itself. Subsequently, this process was done for the second frame and
the other frames following it, after which it was done for all frames.
The data read by the sensors are sent to the sink node to be processed. Fuzzy logic has been used to process these data
of (SOAP, WSDL, UDDI, …) standards, and the security measures of this architecture are used to address shortcomings in the security sections of wireless sensor networks (such as the fact that these sections are not concentrated, they are wireless, their cost cannot be reduced very much, they are
dependent on nodes, their nodes perform several functions, etc.) So that a concentrated security system is established in the network and security shortcomings of WSN are reduced.
restriction in these networks, the purpose in routing algorithm is not to find the shortest route; rather it is the power of each node which constitutes one of the most important issues. In this article, we have used soft computing techniques for routing in the network. The results obtained show that the combined method based on soft computing as compared to previous methods some what improves the minimalization of used power.
We tendered our idea in our previous article. In this method, we first analyzed the signal, after which the first frame and some other frames were put in a matrix, where each row was a frame. Then the likeness of this matrix was computed with itself. Subsequently, this process was done for the second frame and
the other frames following it, after which it was done for all frames.
The data read by the sensors are sent to the sink node to be processed. Fuzzy logic has been used to process these data
of (SOAP, WSDL, UDDI, …) standards, and the security measures of this architecture are used to address shortcomings in the security sections of wireless sensor networks (such as the fact that these sections are not concentrated, they are wireless, their cost cannot be reduced very much, they are
dependent on nodes, their nodes perform several functions, etc.) So that a concentrated security system is established in the network and security shortcomings of WSN are reduced.