Nick Rahimi

Orcid: 0000-0002-1964-1794

Affiliations:
  • University of Southern Mississippi, Hattiesburg, USA


According to our database1, Nick Rahimi authored at least 171 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Secure and Efficient Hierarchical P2P Fog Architecture: A Novel Approach for IoT.
IEEE Internet Things J., May, 2024

Priority based job scheduling technique that utilizes gaps to increase the efficiency of job distribution in cloud computing.
Sustain. Comput. Informatics Syst., January, 2024

SG-PBFS: Shortest Gap-Priority Based Fair Scheduling technique for job scheduling in cloud environment.
Future Gener. Comput. Syst., January, 2024

Patient-centric knowledge graphs: a survey of current methods, challenges, and applications.
Frontiers Artif. Intell., 2024

AAD-LLM: Adaptive Anomaly Detection Using Large Language Models.
CoRR, 2024

Medical-GAT: Cancer Document Classification Leveraging Graph-Based Residual Network for Scenarios with Limited Data.
CoRR, 2024

Transfer Learning Applied to Computer Vision Problems: Survey on Current Progress, Limitations, and Opportunities.
CoRR, 2024

Explainable Anomaly Detection: Counterfactual driven What-If Analysis.
CoRR, 2024

A Survey on Privacy Attacks Against Digital Twin Systems in AI-Robotics.
CoRR, 2024

A Survey of Transformer Enabled Time Series Synthesis.
CoRR, 2024

From Questions to Insightful Answers: Building an Informed Chatbot for University Resources.
CoRR, 2024

Unveiling Thoughts: A Review of Advancements in EEG Brain Signal Decoding into Text.
CoRR, 2024

Generating Synthetic Time Series Data for Cyber-Physical Systems.
CoRR, 2024

MedInsight: A Multi-Source Context Augmentation Framework for Generating Patient-Centric Medical Responses using Large Language Models.
CoRR, 2024

Advancing Generative Model Evaluation: A Novel Algorithm for Realistic Image Synthesis and Comparison in OCR System.
CoRR, 2024

Eclectic Rule Extraction for Explainability of Deep Neural Network based Intrusion Detection Systems.
CoRR, 2024

LOCALINTEL: Generating Organizational Threat Intelligence from Global and Local Cyber Knowledge.
CoRR, 2024

A Hybrid Expert System for Estimation of the Manufacturability of a Notional Design.
Appl. Comput. Intell. Soft Comput., 2024

Security Considerations in AI-Robotics: A Survey of Current Methods, Challenges, and Opportunities.
IEEE Access, 2024

Explainable Predictive Maintenance: A Survey of Current Methods, Challenges and Opportunities.
IEEE Access, 2024

2023
Impacts and Risk of Generative AI Technology on Cyber Defense.
CoRR, 2023

Explainable Intrusion Detection Systems Using Competitive Learning Techniques.
CoRR, 2023

TwinExplainer: Explaining Predictions of an Automotive Digital Twin.
CoRR, 2023

Scalability, Explainability and Performance of Data-Driven Algorithms in Predicting the Remaining Useful Life: A Comprehensive Review.
IEEE Access, 2023

Deep Representation Learning: Fundamentals, Technologies, Applications, and Open Challenges.
IEEE Access, 2023

Secure and Scalable Permissioned Blockchain using LDE-P2P Networks.
Proceedings of the 10th International Conference on Internet of Things: Systems, 2023

Generative Local Interpretable Model-Agnostic Explanations.
Proceedings of the Thirty-Sixth International Florida Artificial Intelligence Research Society Conference, 2023

A Comparative Study of Continual, Lifelong, and Online Supervised Learning Libraries.
Proceedings of the Thirty-Sixth International Florida Artificial Intelligence Research Society Conference, 2023

Generative Data Augmentation for Arabic Handwritten Digit Recognition Boosting Real-time OCR Capabilities.
Proceedings of the 6th International Conference on Artificial Intelligence and Pattern Recognition, 2023

2022
A Multidimensional Game Theory-Based Group Decision Model for Predictive Analytics.
Comput. Math. Methods, September, 2022

A hybrid ARIMA-WNN approach to model vehicle operating behavior and detect unhealthy states.
Expert Syst. Appl., 2022

Deep representation learning: Fundamentals, Perspectives, Applications, and Open Challenges.
CoRR, 2022

A White-Box Adversarial Attack Against a Digital Twin.
CoRR, 2022

Designing an Artificial Immune System inspired Intrusion Detection System.
CoRR, 2022

Explainable Intrusion Detection Systems (X-IDS): A Survey of Current Methods, Challenges, and Opportunities.
IEEE Access, 2022

Creating an Explainable Intrusion Detection System Using Self Organizing Maps.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2022

SMS Malware Detection: A Machine Learning Approach.
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2022

A Temporal Anomaly Detection System for Vehicles utilizing Functional Working Groups and Sensor Channels.
Proceedings of the 8th IEEE International Conference on Collaboration and Internet Computing, 2022

Multi-Robot Directed Coverage Path Planning in Row-based Environments.
Proceedings of the 5th IEEE International Conference on Artificial Intelligence and Knowledge Engineering, 2022

2021
A bat-pigeon algorithm to crack detection-enabled autonomous vehicle navigation and mapping.
Intell. Syst. Appl., 2021

A novel compartmental model to capture the nonlinear trend of COVID-19.
Comput. Biol. Medicine, 2021

Immune System Algorithms to Environmental Exploration of Robot Navigation and Mapping.
Proceedings of the Advances in Swarm Intelligence - 12th International Conference, 2021

A Survey of HMM-based Algorithms in Machinery Fault Prediction.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2021

Deep Learning Approaches to Remaining Useful Life Prediction: A Survey.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2021

A Nature-Inspired Algorithm to Adaptively Safe Navigation of a Covid-19 Disinfection Robot.
Proceedings of the Intelligent Robotics and Applications - 14th International Conference, 2021

Similarity Based Methods for Faulty Pattern Detection in Predictive Maintenance.
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2021

A Study of the Landscape of Security Issues, Vulnerabilities, and Defense Mechanisms in Web Based Applications.
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2021

2020
Prediction of Highly Volatile Cryptocurrency Prices Using Social Media.
Int. J. Comput. Intell. Appl., 2020

Challenges and Strategies for Online Teaching in Information Technology and Other Computing Programs.
Proceedings of the SIGITE '20: The 21st Annual Conference on Information Technology Education, 2020

High Performance Computing Education: Current Challenges and Future Directions.
Proceedings of the Working Group Reports on Innovation and Technology in Computer Science Education, 2020

Toward High Performance Computing Education.
Proceedings of the 2020 ACM Conference on Innovation and Technology in Computer Science Education, 2020

Machine Learning Algorithms in Quantum Computing: A Survey.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

A Study of Emergency Department Patient Admittance Predictors.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

A Graph-based Ant-like Approach to Optimal Path Planning.
Proceedings of the IEEE Congress on Evolutionary Computation, 2020

Adversarial Machine Learning: Difficulties in Applying Machine Learning to Existing Cybersecurity Systems.
Proceedings of 35th International Conference on Computers and Their Applications, 2020

A Study of the Landscape of Internet Censorship and Anti-Censorship in Middle East.
Proceedings of 35th International Conference on Computers and Their Applications, 2020

2019
Hospital Data Interpretation: A Self-Organizing Map Approach.
Proceedings of the Fuzzy Techniques: Theory and Applications, 2019

Sepsis Prediction: An Attention-Based Interpretable Approach.
Proceedings of the 2019 IEEE International Conference on Fuzzy Systems, 2019

2018
Integration of Z-numbers and Bayesian decision theory: A hybrid approach to decision making under uncertainty and imprecision.
Appl. Soft Comput., 2018

Design of Very Efficient Lookup Algorithms for a Low Diameter Hierarchical Structured Peer-to-Peer Network.
Proceedings of the 16th IEEE International Conference on Industrial Informatics, 2018

Design of Very Efficient Lookup Algorithms for a Low Diameter Hierarchical Structured Peer-to-Peer Network.
Proceedings of the 16th IEEE International Conference on Industrial Informatics, 2018

2017
SentiCR: a customized sentiment analysis tool for code review interactions.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

Efficient data lookup in non-DHT based low diameter structured P2P network.
Proceedings of the 15th IEEE International Conference on Industrial Informatics, 2017

Efficient data lookup in non-DHT based low diameter structured P2P network.
Proceedings of the 15th IEEE International Conference on Industrial Informatics, 2017

A modified version of DVR-based multicasting with security.
Proceedings of the 15th IEEE International Conference on Industrial Informatics, 2017

An efficient approach for load-shared and fault-tolerant multicore shared tree multicasting.
Proceedings of the 15th IEEE International Conference on Industrial Informatics, 2017

An efficient approach for load-shared and fault-tolerant multicore shared tree multicasting.
Proceedings of the 15th IEEE International Conference on Industrial Informatics, 2017

2016
Modeling and implementation of Z-number.
Soft Comput., 2016

Designing a Human-Machine Hybrid Computing System for Unstructured Data Analytics.
CoRR, 2016

Locality based Core Selection for Multicore Shared Tree Multicasting.
CoRR, 2016

Towards Utilization of Neurofuzzy Systems for Taxonomic Identification Using Psittacines as a Case Study.
Appl. Comput. Intell. Soft Comput., 2016

Candidate core selection for load-balanced multicore shared tree multicasting.
Proceedings of the 2016 3rd International Conference on Recent Advances in Information Technology (RAIT), 2016

LDEPTH: A low diameter hierarchical P2P network architecture.
Proceedings of the 14th IEEE International Conference on Industrial Informatics, 2016

LDEPTH: A low diameter hierarchical P2P network architecture.
Proceedings of the 14th IEEE International Conference on Industrial Informatics, 2016

Towards patient flow optimization in emergency departments using genetic algorithms.
Proceedings of the 14th IEEE International Conference on Industrial Informatics, 2016

Towards a patient satisfaction based hospital recommendation system.
Proceedings of the 2016 International Joint Conference on Neural Networks, 2016

Bayesian decision making using z-numbers.
Proceedings of the 2016 IEEE International Conference on Fuzzy Systems, 2016

2015
Incremental fuzzy clustering for an adaptive backgammon game.
Proceedings of the 2015 Annual Conference of the North American Fuzzy Information Processing Society (NAFIPS) held jointly with 2015 5th World Conference on Soft Computing (WConSC), 2015

Applied Z-numbers.
Proceedings of the 2015 Annual Conference of the North American Fuzzy Information Processing Society (NAFIPS) held jointly with 2015 5th World Conference on Soft Computing (WConSC), 2015

2014
An evaluation of retranslation methods in computing with words.
Soft Comput., 2014

A highly efficient RPF-based broadcast protocol using a new two-level pruning mechanism.
J. Comput. Sci., 2014

2013
Formalization of Generalized Constraint Language: A Crucial Prelude to Computing With Words.
IEEE Trans. Cybern., 2013

An inference engine toolkit for computing with words.
J. Ambient Intell. Humaniz. Comput., 2013

Bootstrapping learning from abstract models in games.
Int. J. Bio Inspired Comput., 2013

Hierarchical pruning to improve bandwidth utilization of RPF-based broadcasting.
Proceedings of the 2013 IEEE Symposium on Computers and Communications, 2013

Optimized feature selection using NeuroEvolution of Augmenting Topologies (NEAT).
Proceedings of the Joint IFSA World Congress and NAFIPS Annual Meeting, 2013

Towards retranslation of fuzzy values in computing with words.
Proceedings of the Joint IFSA World Congress and NAFIPS Annual Meeting, 2013

Revisiting Linguistic Approximation for Computing with Words.
Proceedings of the Twenty-Sixth International Florida Artificial Intelligence Research Society Conference, 2013

2012
An Open-Bisimilarity Based Automated Verification Tool for -Calculus Family of Process Calculi.
Int. J. Softw. Sci. Comput. Intell., 2012

Deadlock verification of a DPS coordination strategy and its alternative model in pi-calculus.
Int. J. Intell. Inf. Database Syst., 2012

A low-overhead recovery approach for distributed computing environment.
Proceedings of the IEEE 10th International Conference on Industrial Informatics, 2012

2011
An Extension to Pi-Calculus for Performance Evaluation.
J. Softw. Eng. Appl., 2011

CWJess: An expert system shell for computing with words.
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2011

A Pre-Kernel Agent Platform for security assurance.
Proceedings of the 2011 IEEE Symposium on Intelligent Agent, 2011

Tuning Computer Gaming Agents using Q-Learning.
Proceedings of the Federated Conference on Computer Science and Information Systems, 2011

CWJess: Implementation of an Expert System Shell for Computing with Words.
Proceedings of the Federated Conference on Computer Science and Information Systems, 2011

2010
NPR - A new QoS-based routing protocol for mobile ad-hoc networks.
J. Comput. Methods Sci. Eng., 2010

A novel QOS-based broadcasting scheme for wide area networks.
J. Comput. Methods Sci. Eng., 2010

Soft computing in intrusion detection: the state of the art.
J. Ambient Intell. Humaniz. Comput., 2010

Intelligent distributed information systems.
Inf. Sci., 2010

SOM with Vulture Fest Model Discovers Feral Malware and Visually Profiles the Security of Subnets.
Int. J. Comput. Their Appl., 2010

Covert channel resistant information leakage protection using a multi-agent architecture.
IET Inf. Secur., 2010

Towards an automated reasoning for computing with words.
Proceedings of the FUZZ-IEEE 2010, 2010

A High Performance Roll Forward Recovery Agorithm for Ring Networks.
Proceedings of the ISCA 25th International Conference on Computers and Their Applications, 2010

Pseudo Diameter-Based Pruning - A QOS Based Broadcasting for Wide Area Networks.
Proceedings of the ISCA 25th International Conference on Computers and Their Applications, 2010

2009
A Novel Low-Overhead Recovery Approach for Distributed Systems.
J. Comput. Networks Commun., 2009

Coordinated UAV Manoeuvring Flight Formation.
Informatica (Slovenia), 2009

A multi-agent framework for stock trading.
Int. J. Intell. Inf. Database Syst., 2009

Performance evaluation of DPS coordination strategies modelled in pi-calculus.
Int. J. Intell. Inf. Database Syst., 2009

A Reasoning Methodology for CW-Based Question Answering Systems.
Proceedings of the Fuzzy Logic and Applications, 8th International Workshop, 2009

Information Leakage Detection in Distributed Systems using Software Agent.
Proceedings of the IEEE Symposium on Intelligent Agents, IA 2009, part of the IEEE Symposium Series on Computational Intelligence 2009, Nashville, TN, USA, March 30, 2009, 2009

A Domino-Effect Free Recovery Mechanism for Mobile Computing Environment.
Proceedings of the 2009 International Conference on Wireless Networks, 2009

An Improved Bandwidth-Efficient Multicasting Protocol for WANs.
Proceedings of the 2009 International Conference on Wireless Networks, 2009

Novel Crash Recovery Approach for Concurrent Failures in Cluster Federation.
Proceedings of the Advances in Grid and Pervasive Computing, 4th International Conference, 2009

A self-organizing map and its modeling for discovering malignant network traffic.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Cyber Security, 2009

A Novel Bandwidth-Efficient Multicasting Protocol for Wide Area Networks.
Proceedings of the ISCA 24th International Conference on Computers and Their Applications, 2009

A Novel Recovery Approach for Distributed Systems.
Proceedings of the ISCA 24th International Conference on Computers and Their Applications, 2009

Developing a Performance Evaluation Tool for Distributed Problem-Solving Strategies.
Proceedings of the ISCA 24th International Conference on Computers and Their Applications, 2009

Visualization of Network Security Traffic using Hexagonal Self-Organizing Maps.
Proceedings of the ISCA 22nd International Conference on Computer Applications in Industry and Engineering, 2009

2008
Delegations guided by trust and autonomy.
Web Intell. Agent Syst., 2008

ACVisualizer: A visualization tool for APi-calculus.
Multiagent Grid Syst., 2008

Ontological Mediation for Multi-Agent Systems.
Int. J. Electron. Gov. Res., 2008

Design of High Performance Distributed Snapshot/Recovery Algorithms for Ring Networks.
J. Comput. Inf. Technol., 2008

An Expert System for Pi-Calculus and Api-Calculus Automated Reduction.
Proceedings of the 2008 International Conference on Software Engineering Research & Practice, 2008

Special track on Mobile Agents and Systems: editorial message.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

A generic mobile agent framework for ambient intelligence.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

Domino-Effect Free Recovery for Concurrent Failures in Distributed Computing Environment.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2008

A Model to Use Denied Internet Traffic to Indirectly Discover Internal Network Security Problems.
Proceedings of the 2008 IEEE International Performance, 2008

A Bandwidth-Efficient Multicasting Approach for Wide Area Networks.
Proceedings of the 2008 International Conference on Wireless Networks, 2008

Performance Evaluation of DPS Coordination Strategies Modeled in Pi-calculus.
Proceedings of the 2008 International Conference on Artificial Intelligence, 2008

Domino-Effect Free Crash Recovery for Concurrent Failures in Cluster Federation.
Proceedings of the Advances in Grid and Pervasive Computing, 2008

2007
A Performance and Programming Analysis of Java Communication Mechanisms in a Distributed Environment.
Scalable Comput. Pract. Exp., 2007

An Expert System for Analysis of Consistency Criteria in Checkpointing Algorithms.
Scalable Comput. Pract. Exp., 2007

A Novel Roll-Back Mechanism for Performance Enhancement of Asynchronous Checkpointing and Recovery.
Informatica (Slovenia), 2007

A web-based high-performance multicriteria decision support system for medical diagnosis.
Int. J. Intell. Syst., 2007

Novel low-overhead roll-forward recovery scheme for distributed systems.
IET Comput. Digit. Tech., 2007

A New Recovery Algorithm for Distributed Computing Environment.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2007

An Improved Reverse Path Forwarding Algorithm for Broadcasting in Wide Area Networks.
Proceedings of the 2007 International Conference on Wireless Networks, 2007

Ontological Mediation Among Information Agents.
Proceedings of the 2007 International Conference on Artificial Intelligence, 2007

A Formal Framework for Agent-Oriented Software Engineering.
Proceedings of the 2007 International Conference on Artificial Intelligence, 2007

A Novel Recovery Approach for Cluster Federations.
Proceedings of the Advances in Grid and Pervasive Computing, 2007

Improving Parallel Performance of Particle Swarm Optimization Algorithm.
Proceedings of the 2007 International Conference on Genetic and Evolutionary Methods, 2007

A Domino-Effect Free Checkpointing / Recovery Mechanism for Cluster Federations.
Proceedings of the 22nd International Conference on Computers and Their Applications, 2007

A New Efficient Recovery Algorithm for Cluster Federations.
Proceedings of the 22nd International Conference on Computers and Their Applications, 2007

2006
Software Agent Technology.
Scalable Comput. Pract. Exp., 2006

A low-overhead DVR based multicast routing protocol for clustered MANET.
J. Comput. Methods Sci. Eng., 2006

Performance evaluation of SDIAGENT, a multi-agent system for distributed fuzzy geospatial data conflation.
Inf. Sci., 2006

A Perception Based, Domain Specific Expert System for Question-Answering Support.
Proceedings of the 2006 IEEE / WIC / ACM International Conference on Web Intelligence (WI 2006), 2006

An Analysis of Java Distributed Computing Communication Trade-offs: Performance and Programming.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications & Conference on Real-Time Computing Systems and Applications, 2006

Specification of Fault-Tolerant Mobile Agent Execution and its Building Block.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications & Conference on Real-Time Computing Systems and Applications, 2006

A Fast And Efficient Non-Blocking Coordinated Checkpointing Approach For Distributed Systems.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications & Conference on Real-Time Computing Systems and Applications, 2006

A High Performance Non-Blocking Checkpointing/Recovery Algorithm For Ring Networks.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications & Conference on Real-Time Computing Systems and Applications, 2006

An Implicit-Feedback Based Ranking Methodology for Web Search Engines.
Proceedings of the 2006 International Conference on Internet Computing & Conference on Computer Games Development, 2006

TrAgent: A Multi-Agent System for Stock Exchange.
Proceedings of the 2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2006

A Low-Overhead Non-block Checkpointing Algorithm for Mobile Computing Environment.
Proceedings of the Advances in Grid and Pervasive Computing, 2006

Extracting Web User Profiles Using a Modified CARD Algorithm.
Proceedings of the IEEE International Conference on Fuzzy Systems, 2006

A High-Performance Recovery Algorithm for Distributed Systems.
Proceedings of the 21st International Conference on Computers and Their Applications, 2006

Low-Overhead Roll-Forward Checkpointing and Failure Recovery for Distributed Systems.
Proceedings of the 21st International Conference on Computers and Their Applications, 2006

2005
ORVPF - the Model and its DNC Implementation.
Informatica, 2005

Dynamic Load Balancing in MPIAB - General Architecture.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2005

An Efficient Non-Block Synchronous Checkpointing Scheme for Distributed Systems.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2005

A Robust Multicast Algorithm for Cellular Networks.
Proceedings of the 2005 International Conference on Wireless Networks, 2005

A New Non-Blocking Synchronous Checkpointing Scheme for Distributed Systems.
Proceedings of the 20th International Conference on Computers and Their Applications, 2005

2004
A Task-Oriented Compositional Mobile Agent Architecture for Knowledge Exchanges Between Agencies and Agents.
Informatica (Slovenia), 2004

The First Stage of a System Verification Strategy for API-Calculus.
Proceedings of the International Conference on Modeling, 2004

A Light-weight Distributed Web Search Engine: Distributed Web Crawling Part.
Proceedings of the 19th International Conference on Computers and Their Applications, 2004

A Deterministic-Heuristic Load Balancing Methodology for MPIAB.
Proceedings of the 19th International Conference on Computers and Their Applications, 2004

2003
MPIAB: A Novel Agent Architecture for Parallel Processing.
Proceedings of the 2003 IEEE/WIC International Conference on Intelligent Agent Technology (IAT 2003), 2003

Preliminary Performance Evaluation of an Agent-Based Geospatial Data Conflation System.
Proceedings of the 2003 IEEE/WIC International Conference on Intelligent Agent Technology (IAT 2003), 2003

An inexact inferencing strategy for spatial objects with determined and indeterminate boundaries.
Proceedings of the 12th IEEE International Conference on Fuzzy Systems, 2003

2002
An intelligence representation in agent systems: an extended π-calculus.
Proceedings of the 2002 IEEE International Conference on Fuzzy Systems, 2002


  Loading...