Papers by Marjan Kuchaki Rafsanjani
arXiv (Cornell University), Dec 29, 2014
In this paper, we present some new connections between BCKalgebras and binary block codes.

SN applied sciences, May 18, 2019
In the present paper, we use a deep reinforcement learning (DRL) approach for solving the multipl... more In the present paper, we use a deep reinforcement learning (DRL) approach for solving the multiple sequence alignment problem which is an NP-complete problem. Multiple Sequence Alignment problem simply refers to the process of arranging initial sequences of DNA, RNA or proteins in order to maximize their regions of similarity. Multiple Sequence Alignment is the first step in solving many bioinformatics problems such as constructing phylogenetic trees. In this study, our proposed approach models the Multiple Sequence Alignment problem as a DRL problem and utilizes long short-term memory networks for estimation phase in the reinforcement learning algorithm. Furthermore, the actor-critic algorithm with experience-replay method is used for much quicker convergence process. Using deep Q-learning (an RL approach) and Q-network overcomes the complexity of other approaches. The experimental evaluation is performed on 8 different real-life datasets and in every used dataset our approach outperforms other well-known approaches and tools such as MAFFT, ClustalW, and other heuristic approaches in case of scoring in solving the MSA problem.
Journal of Systems and Software, Jul 1, 2020
This is a PDF file of an article that has undergone enhancements after acceptance, such as the ad... more This is a PDF file of an article that has undergone enhancements after acceptance, such as the addition of a cover page and metadata, and formatting for readability, but it is not yet the definitive version of record. This version will undergo additional copyediting, typesetting and review before it is published in its final form, but we are providing this version to give early visibility of the article. Please note that, during the production process, errors may be discovered which could affect the content, and all legal disclaimers that apply to the journal pertain.
Journal of Innovation & Knowledge, Jul 1, 2023

International Journal of Intelligent Systems, Aug 15, 2022
In the recent years, there are massive digital images collections in many fields of our life, whi... more In the recent years, there are massive digital images collections in many fields of our life, which led the technology to find methods to search and retrieve these images efficiently. The content-based is one of the popular methods used to retrieve images, which depends on the color, texture and shape descriptors to extract features from images. However, the performance of the content-based image retrieval methods depends on the size of features that are extracted from images and the classification accuracy. Therefore, this problem is considered as a multi-objective and there are several methods that used to manipulate it such as NSGA-II and NSMOPSO. However, these methods have drawbacks such as their time and space complexity are large since they used traditional non-dominated sorting methods. In this paper, a new non-dominated sorting based on multi-objective whale optimization algorithm is proposed for content-based image retrieval (NSMOWOA). The proposed method avoids the drawbacks in other non-dominated sorting multi-objective methods that have been used for content-based image retrieval through reducing the space and time complexity. The results of the NSMOWOA showed a good performance in content-based image retrieval problem in terms of recall and precision.
Journal of Intelligent and Fuzzy Systems, Aug 1, 2015
In this paper, we present some new connections between BCKalgebras and binary block codes.

Journal of Information and Optimization Sciences, Apr 12, 2018
In this paper, we propose clustering algorithm based on the membership degree of node for mobile ... more In this paper, we propose clustering algorithm based on the membership degree of node for mobile ad hoc networks (CABMD). The aim of CABMD focuses on cluster-head election and cluster formation. The cluster-head election is based on quality of node that is calculated by a combination of characteristics such as connectivity, energy and mobility of nodes. The node has the best quality among all of the nodes is elected as first cluster-head and forms its cluster based on the membership degree of the node that is related to its quality and distance between the cluster-head and node. This procedure follows for election of next cluster-heads and formation of their clusters until all of the nodes in the network are elected as cluster-heads or cluster-members. This study uses the characteristics of CEMCA algorithm and tries to improve its performance by a new method. We apply membership degree for clustering, so that the performance of clusters in the network will be improved. We have simulated our algorithm (CABMD) by NS-2 in order to measure the performance of it. Our results will be compared with the Weighted Clustering Algorithm (WCA), connectivity, energy and mobility driven weighted clustering algorithm (CEMCA) and connectivity, residual battery power, average mobility, and distance algorithm (CBMD).
arXiv (Cornell University), Aug 12, 2016
In the last time some papers were devoted to the study of the connections between binary block co... more In the last time some papers were devoted to the study of the connections between binary block codes and BCK-algebras. In this paper, we try to generalize these results to n-ary block codes, providing an algorithm which allows us to construct a BCK-algebra from a given n-ary block code.
International Journal of Advanced Intelligence Paradigms, 2020
Job shop scheduling problem is an NP-hard problem. This paper proposes a new hybrid genetic algor... more Job shop scheduling problem is an NP-hard problem. This paper proposes a new hybrid genetic algorithm to solve the problem in an appropriate way. In this paper, a new selection criterion to tackle premature convergence problem is introduced. To make full use of the problem itself, a new crossover based on the machines is designed. Furthermore, a new local search is designed which can improve the local search ability of proposed GA. This new approach is run on the some problems and computer simulation shows the effectiveness of the proposed approach.

The ISC International Journal of Information Security, Aug 8, 2015
In this study, a novel approach which uses combination of steganography and cryptography for hidi... more In this study, a novel approach which uses combination of steganography and cryptography for hiding information into digital images as host media is proposed. In the process, secret data is first encrypted using the mono-alphabetic substitution cipher method and then the encrypted secret data is embedded inside an image using an algorithm which combines the random patterns based on Space Filling Curves (SFC) and the optimal pair-wise LSB matching method. We employ a modified Imperialist Competitive Algorithm by Genetic Algorithm operations, namely Discrete Imperialist Competitive Algorithm (DICA), to perform the optimal pair-wise LSB matching method and find the suboptimum adjustment list. The performance of the proposed method is compared with other methods with respect to Peak Signal to Noise Ratio (PSNR). The PSNR value of the proposed method is higher than the state-of-the-art methods by almost 4dB to 5dB.

Peer-to-peer Networking and Applications, Oct 24, 2020
Vehicular Ad hoc Networks (VANETs) as a subset of mobile ad hoc networks which allow communicatio... more Vehicular Ad hoc Networks (VANETs) as a subset of mobile ad hoc networks which allow communication between any vehicle with other adjacent vehicles, road side units and infrastructure. In these networks, the purpose is to enhance the security, improve the management of urban and road traffic and provide services to the passenger. Due to problems such as reliability and privacy, messages that are exchanged in the network should be confidential and secure. Therefore, we need a secure topology to maintain trust, which enables the cryptographic process. In this paper, a trust based authentication method for clustered vehicular ad hoc networks is proposed. The efficient authentication method should be able to accurately detect malicious nodes and reduced delay and overhead. The main purpose of the proposed method is to create trustworthy and stable clusters that lead to the stability of the entire network. For this purpose, we estimate the trust degree of each vehicle by combining the trust between vehicles and the trust between the vehicle and Road Side Units (RSUs), and Cluster Heads (CHs) are selected based on this estimated trust degree. Cluster Heads along with verifiers are responsible for monitoring each vehicle. On the other hand, the cluster heads provide an optimal and secure route for transmitting messages. Messages are digitally signed by the sender and encrypted using a public/ private key as distributed by a Trusted Authority (TA) and decrypted by the destination; so that each message contains a certificate from a trusted authority. In this identification, the sender and receiver of the message are verified and authentication will be achieved. By simulation results, it is proves that the proposed method increases the accuracy in detecting malicious nodes and the packet delivery ratio, and decreases the delay of authentication and overhead.

IEEE Transactions on Intelligent Transportation Systems, Jul 1, 2021
Embedded systems and wireless sensor networks (WSN) are found today in increasingly critical area... more Embedded systems and wireless sensor networks (WSN) are found today in increasingly critical areas of applications. They have become integrated and embedded in nearly all aspects of everyday life, including manufacturing, healthcare, education, critical infrastructure, and entertainment. The number of connected devices continues to grow, and due to the insecure nature of these devices, the amount of risk continues to grow as well. These risks, however, can be mitigated with the creation and adoption of WSN security standards developed to create an environment of safety, security, and confidence in the technology. Designing the security policy for WSNs requires asking some preliminary questions. These questions are particularly important in the case of WSNs because their use is highly decentralized. Blockchain's ability on governing decentralized networks makes it especially suitable for designing a self-managing system on WSN devices. This article proposes a routing protocol that uses Blockchain technology to offer a shared memory between the network's nodes. The simulation results have shown that this solution could be applicable and could resolve the issues cited above.
International Journal of Advanced Intelligence Paradigms, 2022
Walailak Journal of Science and Technology, Jan 6, 2014
Ad hoc networks are wireless networks with new architectures, which are formed in any environment... more Ad hoc networks are wireless networks with new architectures, which are formed in any environment that is needed, without a fixed infrastructure. Due to a lack of central management and fixed infrastructure, and the poor physical security of nodes, these networks are extremely vulnerable. As the usage and development of ad hoc networks increases, problems related to these networks are a popular research topic. Hence, efficient and effective algorithms, such as bee algorithms, were created, which were inspired by the foraging principles of honey bees. In this paper, we study algorithms based on bee swarms in ad hoc networks.
Çankaya University Journal of Humanities and Social Sciences, Nov 1, 2013
Designing an optimal supply chain network (SCN) is an NP-hard and highly nonlinear problem; there... more Designing an optimal supply chain network (SCN) is an NP-hard and highly nonlinear problem; therefore, this problem may not be solved efficiently using conventional optimization methods. In this article, we propose a genetic algorithm (GA) approach with segment-based operators combined with a local search technique (SHGA) to solve the multistage-based SCN design problems. To evaluate the performance of the proposed algorithm, we applied SHGA and other competing algorithms to SCNs with different features and different parameters. The results obtained show that the proposed algorithm outperforms the other competing algorithms.

International Journal of Software Science and Computational Intelligence, Oct 14, 2022
Human activity recognition (HAR) is a crucial and challenging classification task for a range of ... more Human activity recognition (HAR) is a crucial and challenging classification task for a range of applications from surveillance to assistance. Existing sensor-based HAR systems have limited training data availability and lack fast and accurate methods for robust and rapid activity recognition. In this paper, a novel hybrid HAR technique based on CNN, bi-directional long short-term memory, and gated recurrent units is proposed that can accurately and quickly recognize new human activities with a limited training set and high accuracy. The experiment was conducted on UCI Machine Learning Repository's MHEALTH dataset to analyze the effectiveness of the proposed method. The confusion matrix and accuracy score are utilized to gauge the performance of the presented model. Experiments indicate that the proposed hybrid approach for human activity recognition integrating CNN, bi-directional LSTM, and gated recurrent outperforms computing complexity and efficiency. The overall findings demonstrate that the proposed hybrid model performs exceptionally well, with enhanced accuracy of 94.68%.
Current Medical Imaging Reviews, May 1, 2021
Advances in intelligent systems and computing, Aug 18, 2020
In vehicular ad hoc network (VANET), which is considered as a type of mobile ad hoc network (MANE... more In vehicular ad hoc network (VANET), which is considered as a type of mobile ad hoc network (MANET), communication occurs between neighbor vehicles and also roadside equipment and vehicles. Due to the characteristics of VANET, there are chances of a number possible attack in this network. In this paper, an anomaly detection system that uses clustering and fuzzy set theory to defend the Denial of Service (DoS) attack is presented. Results of simulation represent that the proposed algorithm arrives to the high detection rate.
In this paper, we present a novel data centric routing protocol for Wireless Multimedia Sensor Ne... more In this paper, we present a novel data centric routing protocol for Wireless Multimedia Sensor Networks (WMSN) called Multi phase, QoS aware Routing Protocol (MQRP). It performs data delivery in WMSN considering crucial parameters, energy consumption, timeliness (delay), reliability, lifetime and fairness. Multiple QoS priorities are provided and the routing is performed based on the provided constraints. Simulation results show that MQRP provides QoS differentiation in mentioned parameters, as a result, achieves its goal which is improvement in the efficiency of a WMSN.
Uploads
Papers by Marjan Kuchaki Rafsanjani