Jafari Navimipour, Nima
Loading...

Profile URL
Name Variants
Jafari Navimipour,Nima
JAFARI NAVIMIPOUR, Nima
N. Jafari Navimipour
Jafari Navimipour, Nima
Jafari Navimipour,N.
J.,Nima
JAFARI NAVIMIPOUR, NIMA
Jafari Navimipour, N.
Nima Jafari Navimipour
Nima JAFARI NAVIMIPOUR
Jafari Navimipour, NIMA
Jafari Navimipour N.
NIMA JAFARI NAVIMIPOUR
J., Nima
Nima, Jafari Navimipour
Navimipour, Nima Jafari
Navimipour, N.J.
Navimpour, Nima Jafari
Navımıpour, Nıma Jafarı
Jafari Navimipour, Nima Jafari
JAFARI NAVIMIPOUR, Nima
N. Jafari Navimipour
Jafari Navimipour, Nima
Jafari Navimipour,N.
J.,Nima
JAFARI NAVIMIPOUR, NIMA
Jafari Navimipour, N.
Nima Jafari Navimipour
Nima JAFARI NAVIMIPOUR
Jafari Navimipour, NIMA
Jafari Navimipour N.
NIMA JAFARI NAVIMIPOUR
J., Nima
Nima, Jafari Navimipour
Navimipour, Nima Jafari
Navimipour, N.J.
Navimpour, Nima Jafari
Navımıpour, Nıma Jafarı
Jafari Navimipour, Nima Jafari
Job Title
Doç. Dr.
Email Address
Main Affiliation
Computer Engineering
Computer Engineering
05. Faculty of Engineering and Natural Sciences
01. Kadir Has University
Computer Engineering
05. Faculty of Engineering and Natural Sciences
01. Kadir Has University
Status
Current Staff
Website
ORCID ID
Scopus Author ID
Turkish CoHE Profile ID
Google Scholar ID
WoS Researcher ID
Sustainable Development Goals
15
LIFE ON LAND

0
Research Products
16
PEACE, JUSTICE AND STRONG INSTITUTIONS

0
Research Products
14
LIFE BELOW WATER

2
Research Products
6
CLEAN WATER AND SANITATION

0
Research Products
3
GOOD HEALTH AND WELL-BEING

12
Research Products
17
PARTNERSHIPS FOR THE GOALS

0
Research Products
4
QUALITY EDUCATION

0
Research Products
2
ZERO HUNGER

5
Research Products
10
REDUCED INEQUALITIES

0
Research Products
7
AFFORDABLE AND CLEAN ENERGY

10
Research Products
13
CLIMATE ACTION

1
Research Products
1
NO POVERTY

0
Research Products
9
INDUSTRY, INNOVATION AND INFRASTRUCTURE

18
Research Products
12
RESPONSIBLE CONSUMPTION AND PRODUCTION

5
Research Products
8
DECENT WORK AND ECONOMIC GROWTH

0
Research Products
11
SUSTAINABLE CITIES AND COMMUNITIES

9
Research Products
5
GENDER EQUALITY

0
Research Products

This researcher does not have a Scopus ID.

This researcher does not have a WoS ID.

Scholarly Output
113
Articles
101
Views / Downloads
1293/14107
Supervised MSc Theses
3
Supervised PhD Theses
1
WoS Citation Count
3164
Scopus Citation Count
3971
WoS h-index
32
Scopus h-index
33
Patents
0
Projects
0
WoS Citations per Publication
28.00
Scopus Citations per Publication
35.14
Open Access Source
28
Supervised Theses
4
Google Analytics Visitor Traffic
| Journal | Count |
|---|---|
| Nano Communication Networks | 6 |
| Sustainable Computing-Informatics & Systems | 5 |
| Cluster Computing | 5 |
| International Journal of Communication Systems | 4 |
| Multimedia Tools and Applications | 4 |
Current Page: 1 / 14
Scopus Quartile Distribution
Competency Cloud

113 results
Scholarly Output Search Results
Now showing 1 - 10 of 113
Article Citation - WoS: 8Citation - Scopus: 8Leveraging Explainable Artificial Intelligence for Transparent and Trustworthy Cancer Detection Systems(Elsevier, 2025) Toumaj, Shiva; Heidari, Arash; Navimipour, Nima JafariTimely detection of cancer is essential for enhancing patient outcomes. Artificial Intelligence (AI), especially Deep Learning (DL), demonstrates significant potential in cancer diagnostics; however, its opaque nature presents notable concerns. Explainable AI (XAI) mitigates these issues by improving transparency and interpretability. This study provides a systematic review of recent applications of XAI in cancer detection, categorizing the techniques according to cancer type, including breast, skin, lung, colorectal, brain, and others. It emphasizes interpretability methods, dataset utilization, simulation environments, and security considerations. The results indicate that Convolutional Neural Networks (CNNs) account for 31 % of model usage, SHAP is the predominant interpretability framework at 44.4 %, and Python is the leading programming language at 32.1 %. Only 7.4 % of studies address security issues. This study identifies significant challenges and gaps, guiding future research in trustworthy and interpretable AI within oncology.Article Citation - WoS: 13Citation - Scopus: 14A New a Flow-Based Approach for Enhancing Botnet Detection Using Convolutional Neural Network and Long Short-Term Memory(Springer London Ltd, 2025) Asadi, Mehdi; Heidari, Arash; Navimipour, Nima JafariDespite the growing research and development of botnet detection tools, an ever-increasing spread of botnets and their victims is being witnessed. Due to the frequent adaptation of botnets to evolving responses offered by host-based and network-based detection mechanisms, traditional methods are found to lack adequate defense against botnet threats. In this regard, the suggestion is made to employ flow-based detection methods and conduct behavioral analysis of network traffic. To enhance the performance of these approaches, this paper proposes utilizing a hybrid deep learning method that combines convolutional neural network (CNN) and long short-term memory (LSTM) methods. CNN efficiently extracts spatial features from network traffic, such as patterns in flow characteristics, while LSTM captures temporal dependencies critical to detecting sequential patterns in botnet behaviors. Experimental results reveal the effectiveness of the proposed CNN-LSTM method in classifying botnet traffic. In comparison with the results obtained by the leading method on the identical dataset, the proposed approach showcased noteworthy enhancements, including a 0.61% increase in precision, a 0.03% augmentation in accuracy, a 0.42% enhancement in the recall, a 0.51% improvement in the F1-score, and a 0.10% reduction in the false-positive rate. Moreover, the utilization of the CNN-LSTM framework exhibited robust overall performance and notable expeditiousness in the realm of botnet traffic identification. Additionally, we conducted an evaluation concerning the impact of three widely recognized adversarial attacks on the Information Security Centre of Excellence dataset and the Information Security and Object Technology dataset. The findings underscored the proposed method's propensity for delivering a promising performance in the face of these adversarial challenges.Article Citation - WoS: 4Citation - Scopus: 8Quantum-based serial-parallel multiplier circuit using an efficient nano-scale serial adder(Soc Microelectronics, Electron Components Materials-midem, 2024) Wu, Hongyu; Jiang, Shuai; Seyedi, Saeid; Navimipour, Nima JafariQuantum dot cellular automata (QCA) is one of the newest nanotechnologies. The conventional complementary metal oxide semiconductor (CMOS) technology was superbly replaced by QCA technology. This method uses logic states to identify the positions of individual electrons rather than defining voltage levels. A wide range of optimization factors, including reduced power consumption, quick transitions, and an extraordinarily dense structure, are covered by QCA technology. On the other hand, the serialparallel multiplier (SPM) circuit is an important circuit by itself, and it is also very important in the design of larger circuits. This paper defines an optimized circuit of SPM circuit using QCA. It can integrate serial and parallel processing benefits altogether to increase efficiency and decrease computation time. Thus, all these mentioned advantages make this multiplier framework a crucial element in numerous applications, including complex arithmetic computations and signal processing. This research presents a new QCAbased SPM circuit to optimize the multiplier circuit's performance and enhance the overall design. The proposed framework is an amalgamation of highly performance architecture with efficient path planning. Other than that, the proposed QCA-based SPM circuit is based on the majority gate and 1-bit serial adder (BSA). BCA circuit has 34 cells and a 0.04 mu m2 area and uses 0.5 clock cycles. The outcomes showed the suggested QCA-based SPM circuit occupies a mere 0.28 mu m 2 area, requires 222 QCA cells, and demonstrates a latency of 1.25 clock cycles. This work contributes to the existing literature on QCA technology, also emphasizing its capabilities in advancing VLSI circuit layout via optimized performance.Article Citation - WoS: 1Citation - Scopus: 1Scalable and Low-Power Reversible Logic for Future Devices: QCA and IBM-Based Gate Realization(Elsevier, 2025) Ahmadpour, Seyed-Sajad; Navimipour, Nima Jafari; Zohaib, Muhammad; Misra, Neeraj Kumar; Pour, Mahsa Rastegar; Rasmi, Hadi; Das, Jadav ChandraOne such revolutionary approach to changing the nano-electronic landscape is integrating reversible logic with quantum dot technology that will replace the conventional complementary metal-oxide semiconductors (CMOS) circuits for ultra-high speed, low density, and energy-efficient digital designs. The implementation of the reversible structure under the most inflexible conditions, as executed by quantum laws, is a highly challenging task. Furthermore, the enormous occupying areas seriously compromise the accuracy of the output in quantum dot circuits. Because of this challenge, quantum circuits can be employed as fundamental building blocks in highperformance digital systems since their implementation has a key impact on overall system performance. This study discusses a paradigm shift in nanoscale digital design by using a 4 x 4 reversible gate that redefines the basis of efficiency and precision. This reversible gate is elaborately used in a reversible full-adder circuit, fully symbolizing the core of minimum area, ultra-low energy consumption, and perfect output accuracy. The proposed reversible circuits have been fully realized using quantum-dot cellular automata technology (QCA), simulated, and verified by the highly reliable tool such as Qiskit IBM and QCADesigner 2.0.3. Furthermore, simulations results demonstrated the superiority of the QCA-based proposed adder, which reduced occupied area by 7.14 %, and cell count by 11.57 %, respectively. This work resolves some problems and opens new boundaries toward the future of digital circuits by addressing the main challenges of stability and pushing the boundaries of reversible logic design.Book Part Citation - Scopus: 2Machine/Deep Learning Techniques for Multimedia Security(inst Engineering Tech-iet, 2023) Heidari, Arash; Navimipour, Nima Jafari; Azad, PoupakMultimedia security based on Machine Learning (ML)/ Deep Learning (DL) is a field of study that focuses on using ML/DL techniques to protect multimedia data such as images, videos, and audio from unauthorized access, manipulation, or theft. Developing and implementing algorithms and systems that use ML/DL techniques to detect and prevent security breaches in multimedia data is the main subject of this field. These systems use techniques like watermarking, encryption, and digital signature verification to protect multimedia data. The advantages of using ML/DL in multimedia security include improved accuracy, scalability, and automation. ML/DL algorithms can improve the accuracy of detecting security threats and help identify multimedia data vulnerabilities. Additionally, ML models can be scaled up to handle large amounts of multimedia data, making them helpful in protecting big datasets. Finally, ML/DL algorithms can automate the process of multimedia security, making it easier and more efficient to protect multimedia data. The disadvantages of using ML/DL in multimedia security include data availability, complexity, and black box models. ML and DL algorithms require large amounts of data to train the models, which can sometimes be challenging. Developing and implementing ML algorithms can also be complex, requiring specialized skills and knowledge. Finally, ML/DL models are often black box models, which means it can be difficult to understand how they make their decisions. This can be a challenge when explaining the decisions to stakeholders or auditors. Overall, multimedia security based on ML/DL is a promising area of research with many potential benefits. However, it also presents challenges that must be addressed to ensure the security and privacy of multimedia data.Article Citation - WoS: 9Citation - Scopus: 13A Nano-Scale Design of Vedic Multiplier for Electrocardiogram Signal Processing Based on a Quantum Technology(Aip Publishing, 2025) Wang, Yuyao; Darbandi, Mehdi; Ahmadpour, Seyed-Sajad; Navimipour, Nima Jafari; Navin, Ahmad Habibizad; Heidari, Arash; Anbar, MohammadAn electrocardiogram (ECG) measures the electric signals from the heartbeat to diagnose various heart issues; nevertheless, it is susceptible to noise. ECG signal noise must be removed because it significantly affects ECG signal characteristics. In addition, speed and occupied area play a fundamental role in ECG structures. The Vedic multiplier is an essential part of signal processing and is necessary for various applications, such as ECG, clusters, and finite impulse response filter architectures. All ECGs have a Vedic multiplier circuit unit that is necessary for signal processing. The Vedic multiplier circuit always performs multiplication and accumulation steps to execute continuous and complex operations in signal processing programs. Conversely, in the Vedic multiplier framework, the circuit speed and occupied area are the main limitations. Fixing these significant defects can drastically improve the performance of this crucial circuit. The use of quantum technologies is one of the most popular solutions to overcome all previous shortcomings, such as the high occupied area and speed. In other words, a unique quantum technology like quantum dot cellular automata (QCA) can easily overcome all previous shortcomings. Thus, based on quantum technology, this paper proposes a multiplier for ECG using carry skip adder, half-adder, and XOR circuits. All suggested frameworks utilized a single-layer design without rotated cells to increase their operability in complex architectures. All designs have been proposed with a coplanar configuration in view, having an impact on the circuits' durability and stability. All proposed architectures have been designed and validated with the tool QCADesigner 2.0.3. All designed circuits showed a simple structure with minimum quantum cells, minimum area, and minimum delay with respect to state-of-the-art structures.Article Citation - WoS: 12Citation - Scopus: 16Evaluating the Effect of Human Factors on Big Data Analytics and Cloud of Things Adoption in the Manufacturing Micro, Small, and Medium Enterprises(IEEE Computer Soc, 2022) Kavre, Mahesh S.; Gardas, Bhaskar B.; Narwane, Vaibhav S.; Navimipour, Nima Jafari; Yalcin, SenayThe purpose of the study is to explore and analyze human factors that influence big data analytics and the cloud of things adoption across Indian micro, small, and medium enterprises (MSMEs). The human factors were identified through a literature survey and experts' opinions. In order to develop a hierarchical structural model of identified human factors indicating the mutual relationship and classify the factors into cause-effect groups, a hybrid ISM-DEMATEL approach has been employed. Results of the study stated that Lack of training and development programs (HF11), Lack of vision of top management and ineffective corporate governance (HF13), and Communication barrier between management and workforce (HF4) are the most significant factors. The study's findings would be helpful to human resource managers and decision-makers of the firm to understand human-related factors responsible for technology adoption. Further, results can be validated with the investigation in other emerging economies.Article Citation - WoS: 2Citation - Scopus: 7Multimedia big data computing mechanisms: a bibliometric analysis(Springer, 2023) Rivai, Faradillah Amalia; Navimipour, Nima Jafari; Yalcin, SenayMassive multimedia data are being created due to the rising amount of the Internet and user-generated content, low-cost commodity devices with cameras (like cellphones, surveillance systems, and so on), and the proliferation of social networks, forming a unique type of big data. Several studies have been conducted in this research area using a survey and event analysis approach; however, none has been conducted to investigate the status of knowledge, its features, evolution, and emerging trend of multimedia big data. Therefore, in this paper, a bibliometric study using VOSviewer software is carried out with 1,865 documents from 2008 to 2020. Based on the result, 2013 is the starting year where the total publication excess of 100 articles and the configuration of leading countries, productive organizations, and authors are investigated. The most cited journals, popular publications venues, and hot research topics are also included in the investigations. Our investigation uncovered useful information, such as annual publishing patterns, the hottest research topic, the top 10 important authors and articles, and the most helpful funding organizations and venues.Review Citation - WoS: 25Citation - Scopus: 24The History of Computing in Iran (persia)-Since the Achaemenid Empire(Mdpi, 2022) Heidari, Arash; Navimipour, Nima Jafari; Unal, MehmetPersia was the early name for the territory that is currently recognized as Iran. Iran's proud history starts with the Achaemenid Empire, which began in the 6th century BCE (c. 550). The Iranians provided numerous innovative ideas in breakthroughs and technologies that are often taken for granted today or whose origins are mostly unknown from the Achaemenid Empire's early days. To recognize the history of computing systems in Iran, we must pay attention to everything that can perform computing. Because of Iran's historical position in the ancient ages, studying the history of computing in this country is an exciting subject. The history of computing in Iran started very far from the digital systems of the 20th millennium. The Achaemenid Empire can be mentioned as the first recorded sign of using computing systems in Persia. The history of computing in Iran started with the invention of mathematical theories and methods for performing simple calculations. This paper also attempts to shed light on Persia's computing heritage elements, dating back to 550 BC. We look at both the ancient and current periods of computing. In the ancient section, we will go through the history of computing in the Achaemenid Empire, followed by a description of the tools used for calculations. Additionally, the transition to the Internet era, the formation of a computer-related educational system, the evolution of data networks, the growth of the software and hardware industry, cloud computing, and the Internet of Things (IoT) are all discussed in the modern section. We highlighted the findings in each period that involve vital sparks of computing evolution, such as the gradual growth of computing in Persia from its early stages to the present. The findings indicate that the development of computing and related technologies has been rapidly accelerating recently.Article Citation - WoS: 21Citation - Scopus: 26An Energy-Aware Iot Routing Approach Based on a Swarm Optimization Algorithm and a Clustering Technique(Springer, 2022) Sadrishojaei, Mahyar; Navimipour, Nima Jafari; Reshadi, Midia; Hosseinzadeh, MehdiThe Internet of Things (IoT) comprises many nodes dispersed around a particular target region, and it has lately been applied in a variety of sectors such as smart cities, farming, climatology, smart metering, waste treatment, and others. Even though the IoT has tremendous potential, some difficulties must be addressed. When building the clustering and routing protocol for huge-scale IoT networks, uniform energy usage and optimization are two significant concerns. Clustering and routing are well-known NP-hard optimization challenges applied to the IoT. The ease with which chicken can be implemented has garnered much interest compared to other population-based metaheuristic algorithms in solving optimization problems in the IoT. Aiming to reduce and improve node energy consumption in the IoT network by choosing the most suitable cluster head, the current effort seeks to extend the life of a network by selecting the most appropriate cluster head. A new cost function for homogenous dispersion of cluster heads was proposed in this research, and a good balance among exploration and exploitation search skills to create a node clustering protocol based on chicken search. This procedure is a big step forward from previous state-of-the-art protocols. The number of packets received, the total power consumption, the number of active nodes, and the latency of the suggested integrated clustered routing protocol are all used to evaluate the protocol's overall performance. The proposed strategy has been demonstrated to improve power consumption by at least 16 percent.

