Jafari Navimipour, Nima

Loading...
Profile Picture
Name Variants
Jafari Navimipour,Nima
JAFARI NAVIMIPOUR, Nima
N. Jafari Navimipour
Jafari Navimipour, Nima
Jafari Navimipour,N.
J.,Nima
JAFARI NAVIMIPOUR, NIMA
Jafari Navimipour, N.
Nima Jafari Navimipour
Nima JAFARI NAVIMIPOUR
Jafari Navimipour, NIMA
Jafari Navimipour N.
NIMA JAFARI NAVIMIPOUR
J., Nima
Nima, Jafari Navimipour
Navimipour, Nima Jafari
Navimipour, N.J.
Navimpour, Nima Jafari
Navımıpour, Nıma Jafarı
Jafari Navimipour, Nima Jafari
Job Title
Doç. Dr.
Email Address
Main Affiliation
Computer Engineering
Computer Engineering
05. Faculty of Engineering and Natural Sciences
01. Kadir Has University
Status
Current Staff
Website
ORCID ID
Scopus Author ID
Turkish CoHE Profile ID
Google Scholar ID
WoS Researcher ID

Sustainable Development Goals

15

LIFE ON LAND
LIFE ON LAND Logo

0

Research Products

16

PEACE, JUSTICE AND STRONG INSTITUTIONS
PEACE, JUSTICE AND STRONG INSTITUTIONS Logo

0

Research Products

14

LIFE BELOW WATER
LIFE BELOW WATER Logo

2

Research Products

6

CLEAN WATER AND SANITATION
CLEAN WATER AND SANITATION Logo

0

Research Products

3

GOOD HEALTH AND WELL-BEING
GOOD HEALTH AND WELL-BEING Logo

12

Research Products

17

PARTNERSHIPS FOR THE GOALS
PARTNERSHIPS FOR THE GOALS Logo

0

Research Products

4

QUALITY EDUCATION
QUALITY EDUCATION Logo

0

Research Products

2

ZERO HUNGER
ZERO HUNGER Logo

5

Research Products

10

REDUCED INEQUALITIES
REDUCED INEQUALITIES Logo

0

Research Products

7

AFFORDABLE AND CLEAN ENERGY
AFFORDABLE AND CLEAN ENERGY Logo

10

Research Products

13

CLIMATE ACTION
CLIMATE ACTION Logo

1

Research Products

1

NO POVERTY
NO POVERTY Logo

0

Research Products

9

INDUSTRY, INNOVATION AND INFRASTRUCTURE
INDUSTRY, INNOVATION AND INFRASTRUCTURE Logo

18

Research Products

12

RESPONSIBLE CONSUMPTION AND PRODUCTION
RESPONSIBLE CONSUMPTION AND PRODUCTION Logo

5

Research Products

8

DECENT WORK AND ECONOMIC GROWTH
DECENT WORK AND ECONOMIC GROWTH Logo

0

Research Products

11

SUSTAINABLE CITIES AND COMMUNITIES
SUSTAINABLE CITIES AND COMMUNITIES Logo

9

Research Products

5

GENDER EQUALITY
GENDER EQUALITY Logo

0

Research Products
This researcher does not have a Scopus ID.
This researcher does not have a WoS ID.
Scholarly Output

113

Articles

101

Views / Downloads

1293/14107

Supervised MSc Theses

3

Supervised PhD Theses

1

WoS Citation Count

3164

Scopus Citation Count

3971

WoS h-index

32

Scopus h-index

33

Patents

0

Projects

0

WoS Citations per Publication

28.00

Scopus Citations per Publication

35.14

Open Access Source

28

Supervised Theses

4

Google Analytics Visitor Traffic

JournalCount
Nano Communication Networks6
Sustainable Computing-Informatics & Systems5
Cluster Computing5
International Journal of Communication Systems4
Multimedia Tools and Applications4
Current Page: 1 / 14

Scopus Quartile Distribution

Competency Cloud

GCRIS Competency Cloud

Scholarly Output Search Results

Now showing 1 - 10 of 113
  • Article
    Citation - WoS: 8
    Citation - Scopus: 8
    Leveraging Explainable Artificial Intelligence for Transparent and Trustworthy Cancer Detection Systems
    (Elsevier, 2025) Toumaj, Shiva; Heidari, Arash; Navimipour, Nima Jafari
    Timely detection of cancer is essential for enhancing patient outcomes. Artificial Intelligence (AI), especially Deep Learning (DL), demonstrates significant potential in cancer diagnostics; however, its opaque nature presents notable concerns. Explainable AI (XAI) mitigates these issues by improving transparency and interpretability. This study provides a systematic review of recent applications of XAI in cancer detection, categorizing the techniques according to cancer type, including breast, skin, lung, colorectal, brain, and others. It emphasizes interpretability methods, dataset utilization, simulation environments, and security considerations. The results indicate that Convolutional Neural Networks (CNNs) account for 31 % of model usage, SHAP is the predominant interpretability framework at 44.4 %, and Python is the leading programming language at 32.1 %. Only 7.4 % of studies address security issues. This study identifies significant challenges and gaps, guiding future research in trustworthy and interpretable AI within oncology.
  • Article
    Citation - WoS: 13
    Citation - Scopus: 14
    A New a Flow-Based Approach for Enhancing Botnet Detection Using Convolutional Neural Network and Long Short-Term Memory
    (Springer London Ltd, 2025) Asadi, Mehdi; Heidari, Arash; Navimipour, Nima Jafari
    Despite the growing research and development of botnet detection tools, an ever-increasing spread of botnets and their victims is being witnessed. Due to the frequent adaptation of botnets to evolving responses offered by host-based and network-based detection mechanisms, traditional methods are found to lack adequate defense against botnet threats. In this regard, the suggestion is made to employ flow-based detection methods and conduct behavioral analysis of network traffic. To enhance the performance of these approaches, this paper proposes utilizing a hybrid deep learning method that combines convolutional neural network (CNN) and long short-term memory (LSTM) methods. CNN efficiently extracts spatial features from network traffic, such as patterns in flow characteristics, while LSTM captures temporal dependencies critical to detecting sequential patterns in botnet behaviors. Experimental results reveal the effectiveness of the proposed CNN-LSTM method in classifying botnet traffic. In comparison with the results obtained by the leading method on the identical dataset, the proposed approach showcased noteworthy enhancements, including a 0.61% increase in precision, a 0.03% augmentation in accuracy, a 0.42% enhancement in the recall, a 0.51% improvement in the F1-score, and a 0.10% reduction in the false-positive rate. Moreover, the utilization of the CNN-LSTM framework exhibited robust overall performance and notable expeditiousness in the realm of botnet traffic identification. Additionally, we conducted an evaluation concerning the impact of three widely recognized adversarial attacks on the Information Security Centre of Excellence dataset and the Information Security and Object Technology dataset. The findings underscored the proposed method's propensity for delivering a promising performance in the face of these adversarial challenges.
  • Article
    Citation - WoS: 4
    Citation - Scopus: 8
    Quantum-based serial-parallel multiplier circuit using an efficient nano-scale serial adder
    (Soc Microelectronics, Electron Components Materials-midem, 2024) Wu, Hongyu; Jiang, Shuai; Seyedi, Saeid; Navimipour, Nima Jafari
    Quantum dot cellular automata (QCA) is one of the newest nanotechnologies. The conventional complementary metal oxide semiconductor (CMOS) technology was superbly replaced by QCA technology. This method uses logic states to identify the positions of individual electrons rather than defining voltage levels. A wide range of optimization factors, including reduced power consumption, quick transitions, and an extraordinarily dense structure, are covered by QCA technology. On the other hand, the serialparallel multiplier (SPM) circuit is an important circuit by itself, and it is also very important in the design of larger circuits. This paper defines an optimized circuit of SPM circuit using QCA. It can integrate serial and parallel processing benefits altogether to increase efficiency and decrease computation time. Thus, all these mentioned advantages make this multiplier framework a crucial element in numerous applications, including complex arithmetic computations and signal processing. This research presents a new QCAbased SPM circuit to optimize the multiplier circuit's performance and enhance the overall design. The proposed framework is an amalgamation of highly performance architecture with efficient path planning. Other than that, the proposed QCA-based SPM circuit is based on the majority gate and 1-bit serial adder (BSA). BCA circuit has 34 cells and a 0.04 mu m2 area and uses 0.5 clock cycles. The outcomes showed the suggested QCA-based SPM circuit occupies a mere 0.28 mu m 2 area, requires 222 QCA cells, and demonstrates a latency of 1.25 clock cycles. This work contributes to the existing literature on QCA technology, also emphasizing its capabilities in advancing VLSI circuit layout via optimized performance.
  • Article
    Citation - WoS: 1
    Citation - Scopus: 1
    Scalable and Low-Power Reversible Logic for Future Devices: QCA and IBM-Based Gate Realization
    (Elsevier, 2025) Ahmadpour, Seyed-Sajad; Navimipour, Nima Jafari; Zohaib, Muhammad; Misra, Neeraj Kumar; Pour, Mahsa Rastegar; Rasmi, Hadi; Das, Jadav Chandra
    One such revolutionary approach to changing the nano-electronic landscape is integrating reversible logic with quantum dot technology that will replace the conventional complementary metal-oxide semiconductors (CMOS) circuits for ultra-high speed, low density, and energy-efficient digital designs. The implementation of the reversible structure under the most inflexible conditions, as executed by quantum laws, is a highly challenging task. Furthermore, the enormous occupying areas seriously compromise the accuracy of the output in quantum dot circuits. Because of this challenge, quantum circuits can be employed as fundamental building blocks in highperformance digital systems since their implementation has a key impact on overall system performance. This study discusses a paradigm shift in nanoscale digital design by using a 4 x 4 reversible gate that redefines the basis of efficiency and precision. This reversible gate is elaborately used in a reversible full-adder circuit, fully symbolizing the core of minimum area, ultra-low energy consumption, and perfect output accuracy. The proposed reversible circuits have been fully realized using quantum-dot cellular automata technology (QCA), simulated, and verified by the highly reliable tool such as Qiskit IBM and QCADesigner 2.0.3. Furthermore, simulations results demonstrated the superiority of the QCA-based proposed adder, which reduced occupied area by 7.14 %, and cell count by 11.57 %, respectively. This work resolves some problems and opens new boundaries toward the future of digital circuits by addressing the main challenges of stability and pushing the boundaries of reversible logic design.
  • Book Part
    Citation - Scopus: 2
    Machine/Deep Learning Techniques for Multimedia Security
    (inst Engineering Tech-iet, 2023) Heidari, Arash; Navimipour, Nima Jafari; Azad, Poupak
    Multimedia security based on Machine Learning (ML)/ Deep Learning (DL) is a field of study that focuses on using ML/DL techniques to protect multimedia data such as images, videos, and audio from unauthorized access, manipulation, or theft. Developing and implementing algorithms and systems that use ML/DL techniques to detect and prevent security breaches in multimedia data is the main subject of this field. These systems use techniques like watermarking, encryption, and digital signature verification to protect multimedia data. The advantages of using ML/DL in multimedia security include improved accuracy, scalability, and automation. ML/DL algorithms can improve the accuracy of detecting security threats and help identify multimedia data vulnerabilities. Additionally, ML models can be scaled up to handle large amounts of multimedia data, making them helpful in protecting big datasets. Finally, ML/DL algorithms can automate the process of multimedia security, making it easier and more efficient to protect multimedia data. The disadvantages of using ML/DL in multimedia security include data availability, complexity, and black box models. ML and DL algorithms require large amounts of data to train the models, which can sometimes be challenging. Developing and implementing ML algorithms can also be complex, requiring specialized skills and knowledge. Finally, ML/DL models are often black box models, which means it can be difficult to understand how they make their decisions. This can be a challenge when explaining the decisions to stakeholders or auditors. Overall, multimedia security based on ML/DL is a promising area of research with many potential benefits. However, it also presents challenges that must be addressed to ensure the security and privacy of multimedia data.
  • Article
    Citation - WoS: 9
    Citation - Scopus: 13
    A Nano-Scale Design of Vedic Multiplier for Electrocardiogram Signal Processing Based on a Quantum Technology
    (Aip Publishing, 2025) Wang, Yuyao; Darbandi, Mehdi; Ahmadpour, Seyed-Sajad; Navimipour, Nima Jafari; Navin, Ahmad Habibizad; Heidari, Arash; Anbar, Mohammad
    An electrocardiogram (ECG) measures the electric signals from the heartbeat to diagnose various heart issues; nevertheless, it is susceptible to noise. ECG signal noise must be removed because it significantly affects ECG signal characteristics. In addition, speed and occupied area play a fundamental role in ECG structures. The Vedic multiplier is an essential part of signal processing and is necessary for various applications, such as ECG, clusters, and finite impulse response filter architectures. All ECGs have a Vedic multiplier circuit unit that is necessary for signal processing. The Vedic multiplier circuit always performs multiplication and accumulation steps to execute continuous and complex operations in signal processing programs. Conversely, in the Vedic multiplier framework, the circuit speed and occupied area are the main limitations. Fixing these significant defects can drastically improve the performance of this crucial circuit. The use of quantum technologies is one of the most popular solutions to overcome all previous shortcomings, such as the high occupied area and speed. In other words, a unique quantum technology like quantum dot cellular automata (QCA) can easily overcome all previous shortcomings. Thus, based on quantum technology, this paper proposes a multiplier for ECG using carry skip adder, half-adder, and XOR circuits. All suggested frameworks utilized a single-layer design without rotated cells to increase their operability in complex architectures. All designs have been proposed with a coplanar configuration in view, having an impact on the circuits' durability and stability. All proposed architectures have been designed and validated with the tool QCADesigner 2.0.3. All designed circuits showed a simple structure with minimum quantum cells, minimum area, and minimum delay with respect to state-of-the-art structures.
  • Article
    Citation - WoS: 12
    Citation - Scopus: 16
    Evaluating the Effect of Human Factors on Big Data Analytics and Cloud of Things Adoption in the Manufacturing Micro, Small, and Medium Enterprises
    (IEEE Computer Soc, 2022) Kavre, Mahesh S.; Gardas, Bhaskar B.; Narwane, Vaibhav S.; Navimipour, Nima Jafari; Yalcin, Senay
    The purpose of the study is to explore and analyze human factors that influence big data analytics and the cloud of things adoption across Indian micro, small, and medium enterprises (MSMEs). The human factors were identified through a literature survey and experts' opinions. In order to develop a hierarchical structural model of identified human factors indicating the mutual relationship and classify the factors into cause-effect groups, a hybrid ISM-DEMATEL approach has been employed. Results of the study stated that Lack of training and development programs (HF11), Lack of vision of top management and ineffective corporate governance (HF13), and Communication barrier between management and workforce (HF4) are the most significant factors. The study's findings would be helpful to human resource managers and decision-makers of the firm to understand human-related factors responsible for technology adoption. Further, results can be validated with the investigation in other emerging economies.
  • Article
    Citation - WoS: 2
    Citation - Scopus: 7
    Multimedia big data computing mechanisms: a bibliometric analysis
    (Springer, 2023) Rivai, Faradillah Amalia; Navimipour, Nima Jafari; Yalcin, Senay
    Massive multimedia data are being created due to the rising amount of the Internet and user-generated content, low-cost commodity devices with cameras (like cellphones, surveillance systems, and so on), and the proliferation of social networks, forming a unique type of big data. Several studies have been conducted in this research area using a survey and event analysis approach; however, none has been conducted to investigate the status of knowledge, its features, evolution, and emerging trend of multimedia big data. Therefore, in this paper, a bibliometric study using VOSviewer software is carried out with 1,865 documents from 2008 to 2020. Based on the result, 2013 is the starting year where the total publication excess of 100 articles and the configuration of leading countries, productive organizations, and authors are investigated. The most cited journals, popular publications venues, and hot research topics are also included in the investigations. Our investigation uncovered useful information, such as annual publishing patterns, the hottest research topic, the top 10 important authors and articles, and the most helpful funding organizations and venues.
  • Review
    Citation - WoS: 25
    Citation - Scopus: 24
    The History of Computing in Iran (persia)-Since the Achaemenid Empire
    (Mdpi, 2022) Heidari, Arash; Navimipour, Nima Jafari; Unal, Mehmet
    Persia was the early name for the territory that is currently recognized as Iran. Iran's proud history starts with the Achaemenid Empire, which began in the 6th century BCE (c. 550). The Iranians provided numerous innovative ideas in breakthroughs and technologies that are often taken for granted today or whose origins are mostly unknown from the Achaemenid Empire's early days. To recognize the history of computing systems in Iran, we must pay attention to everything that can perform computing. Because of Iran's historical position in the ancient ages, studying the history of computing in this country is an exciting subject. The history of computing in Iran started very far from the digital systems of the 20th millennium. The Achaemenid Empire can be mentioned as the first recorded sign of using computing systems in Persia. The history of computing in Iran started with the invention of mathematical theories and methods for performing simple calculations. This paper also attempts to shed light on Persia's computing heritage elements, dating back to 550 BC. We look at both the ancient and current periods of computing. In the ancient section, we will go through the history of computing in the Achaemenid Empire, followed by a description of the tools used for calculations. Additionally, the transition to the Internet era, the formation of a computer-related educational system, the evolution of data networks, the growth of the software and hardware industry, cloud computing, and the Internet of Things (IoT) are all discussed in the modern section. We highlighted the findings in each period that involve vital sparks of computing evolution, such as the gradual growth of computing in Persia from its early stages to the present. The findings indicate that the development of computing and related technologies has been rapidly accelerating recently.
  • Article
    Citation - WoS: 21
    Citation - Scopus: 26
    An Energy-Aware Iot Routing Approach Based on a Swarm Optimization Algorithm and a Clustering Technique
    (Springer, 2022) Sadrishojaei, Mahyar; Navimipour, Nima Jafari; Reshadi, Midia; Hosseinzadeh, Mehdi
    The Internet of Things (IoT) comprises many nodes dispersed around a particular target region, and it has lately been applied in a variety of sectors such as smart cities, farming, climatology, smart metering, waste treatment, and others. Even though the IoT has tremendous potential, some difficulties must be addressed. When building the clustering and routing protocol for huge-scale IoT networks, uniform energy usage and optimization are two significant concerns. Clustering and routing are well-known NP-hard optimization challenges applied to the IoT. The ease with which chicken can be implemented has garnered much interest compared to other population-based metaheuristic algorithms in solving optimization problems in the IoT. Aiming to reduce and improve node energy consumption in the IoT network by choosing the most suitable cluster head, the current effort seeks to extend the life of a network by selecting the most appropriate cluster head. A new cost function for homogenous dispersion of cluster heads was proposed in this research, and a good balance among exploration and exploitation search skills to create a node clustering protocol based on chicken search. This procedure is a big step forward from previous state-of-the-art protocols. The number of packets received, the total power consumption, the number of active nodes, and the latency of the suggested integrated clustered routing protocol are all used to evaluate the protocol's overall performance. The proposed strategy has been demonstrated to improve power consumption by at least 16 percent.