Masoud Shakiba
National University of Malaysia
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Masoud Shakiba.
international conference on information technology | 2011
Masoud Shakiba; Azam Zavvari; Elankovan Sundararajan
Radio Frequency Identification (RFID) system is a new communication technology to identify the objects using electromagnetic waves. The main superiority of RFID systems in comparison with other identification systems, such as barcodes, is its ability in simultaneous identification process, but when more than one tag wants to communicate with the reader, collision problem occurs and wastes time and increases energy consumption. This reduces efficiency of the identification process in RFID systems. Collision problem happens when the reader has to identify more than one tag at the same time. Consequently, it is essential to develop an efficient anti-collision algorithm to save the time and energy and increase the performance of the system. In this paper, after investigating the previous works on ALOHA-based anti-collision algorithms, a new anti-collision algorithm is presented to improve the DFSA ALOHA-based anti-collision algorithms. Evaluation of the ALOHA-based algorithms and simulation of the results illustrate that presented work recognizes the tags more efficiently by reducing the number of time slots.
Canadian Journal of Electrical and Computer Engineering-revue Canadienne De Genie Electrique Et Informatique | 2013
Masoud Shakiba; Elankovan Sundararajan; Azam Zavvari; Mohammad Tariqul Islam
Radio Frequency Identification (RFID) system is a communication technology used to identify objects using electromagnetic waves. The key advantage of RFID systems stems from their ability to simultaneously identify multiple tagged objects. However, communication of multiple tags with a reader may result in a collision problem, which is both time and energy inefficient, hindering the effectiveness of tag identification process. Presently, several anti-collision algorithms can be applied in order to reduce the collision probability. The reader¿s a priori knowledge of tag quantity significantly affects the overall performance of the system. Since the exact number of tags is not available for the reader, it is essential to develop an accurate tag estimation method to increase the efficiency of tag identification process. This paper presents a novel tag quantity estimation method, whereby, after simulating the tag distribution process, cubic spline interpolation method is employed to approximate the number of tags. According to the simulation results and the evaluation of the previous estimation methods, the new proposed method estimates the number of tags with a higher accuracy yielding an error rate of less than 1%, on average. Moreover, this low error rate is preserved even when the number of tags increases considerably.
PLOS ONE | 2014
Masoud Shakiba; Mandeep Singh Jit Singh; Elankovan Sundararajan; Azam Zavvari; Mohammad Tariqul Islam
The main objective of Radio Frequency Identification systems is to provide fast identification for tagged objects. However, there is always a chance of collision, when tags transmit their data to the reader simultaneously. Collision is a time-consuming event that reduces the performance of RFID systems. Consequently, several anti-collision algorithms have been proposed in the literature. Dynamic Framed Slotted ALOHA (DFSA) is one of the most popular of these algorithms. DFSA dynamically modifies the frame size based on the number of tags. Since the real number of tags is unknown, it needs to be estimated. Therefore, an accurate tag estimation method has an important role in increasing the efficiency and overall performance of the tag identification process. In this paper, we propose a novel estimation technique for DFSA anti-collision algorithms that applies birthday paradox theory to estimate the number of tags accurately. The analytical discussion and simulation results prove that the proposed method increases the accuracy of tag estimation and, consequently, outperforms previous schemes.
International Education Studies | 2014
Kaveh Bakhtiyari; Hadi Salehi; Mohamed Amin Embi; Masoud Shakiba; Azam Zavvari; Masoomeh Shahbazi-Moghadam; Nader Ale Ebrahim; Marjan Mohammadjafari
This paper discusses plagiarism origins, and the ethical solutions to prevent it. It also reviews some unethical approaches, which may be used to decrease the plagiarism rate in academic writings. We propose eight ethical techniques to avoid unconscious and accidental plagiarism in manuscripts without using online systems such as Turnitin and/or iThenticate for cross checking and plagiarism detection. The efficiency of the proposed techniques is evaluated on five different texts using students individually. After application of the techniques on the texts, they were checked by Turnitin to produce the plagiarism and similarity report. At the end, the “effective factor” of each method has been compared with each other; and the best result went to a hybrid combination of all techniques to avoid plagiarism. The hybrid of ethical methods decreased the plagiarism rate reported by Turnitin from nearly 100% to the average of 8.4% on 5 manuscripts.
industrial engineering and engineering management | 2014
Azam Zavvari; Mohammad Tariqul Islam; Masoud Shakiba; S. J. Mandeep
Radio Frequency Identification (RFID) is a system that transmits an entitys identity wirelessly using radio waves in the form of a unique serial number. RFID systems are broadly applied in various applications. The remarkable increase in the use of RFID technology has resulted in a number of security and privacy issues. Moreover, most previous security schemes suffer from the lack of a global standard secure communication and the time-consuming computational process of the necessary database activities. This paper focuses on the problems faced by RFID protocols attempting to raise security and privacy. Therefore, several criteria of RFID protocols will be compared and discussed on some chosen security protocols; including conformity to the EPCglobal C1-G2 standard, ability to implement on low-cost tags, anonymity, privacy, tracking, forward security, DoS attack, and impersonation attack.
Archive | 2017
Marjan Mohammadjafari; Hadi Salehi; Kaveh Bakhtiyari; Nader Ale Ebrahim; Mahmoud Danaee; Masoud Shakiba; Masoomeh Shahbazi-Moghadam; Azam Zavvari
1 Department of Industrial Engineering, Kerman Branch, Islamic Azad University, Kerman, Iran 2 Faculty of Literature and Humanities, Najafabad Branch, Islamic Azad University, Najafabad, Isfahan, Iran 3 Department of Computer & Cognitive Science, Facultyof Engineering, University of Duisburg-Essen, Duisburg 47057, Germany 4 Department of Electrical, Electronics and Systems Engineering, Faculty of Engineering and Built Environment, Universiti Kebangsaan Malaysia, Bangi 43600, Malaysia 5 Centre of Research Services, Institute of Research Management and Monitoring (IPPP), University of Malaya, 50603 Kuala Lumpur, Malaysia; [email protected] 6 Academic Enhancement and Leadership Development Centre (ADeC), University of Malaya, 50603 Kuala Lumpur, Malaysia 7 Manukau Institute of Technology, Auckland 2023, New Zealand 8 Perdana School of Science, Technology and Innovation Policy, Universiti Teknologi, 81310 Skudai, Johor, Malaysia 9 Center for Software Technology and Management, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, 43600 UKM Bangi, Selangor, Malaysia
Mathematical Models and Methods in Applied Sciences | 2014
Nader Ale Ebrahim; Hadi Salehi; Mohamed Amin Embi; Mahmoud Danaee; Marjan Mohammadjafari; Azam Zavvari; Masoud Shakiba; Masoomeh Shahbazi-Moghadam
Procedia Technology | 2013
Akbar Badpa; Bijan Yavar; Masoud Shakiba; Mandeep Singh Jit Singh
Procedia Technology | 2013
Azam Zavvari; Masoud Shakiba; Mohammad Tariqul Islam; Elankovan Sundararajan; Mandeep Singh Jit Singh
GeSec | 2015
Masoud Shakiba; Nader Ale Ebrahim; Mahmoud Danaee; Kaveh Bakhtiyari; Elankovan Sundararajan