• Home
  • mohsen Norouzi
  • OpenAccess
    • List of Articles mohsen Norouzi

      • Open Access Article

        1 - Encryption of Color Images using Pixel Shift Algorithm and Developed Hill Algorithm
        mohsen Norouzi Ali Arshaghi Moshsen Ashourian
        With the advent of communication networks, the speed of data transmission has increased dramatically. One of the important factors in each transfer is to maintain data security and prevent unauthorized access to data transmitted. Using cryptography is one of the methods More
        With the advent of communication networks, the speed of data transmission has increased dramatically. One of the important factors in each transfer is to maintain data security and prevent unauthorized access to data transmitted. Using cryptography is one of the methods used to keep data secure throughout the transmission path. Today, with the growth of computer networks, the use of video conferencing, the transfer of military information, image data, the need for encryption of data in a variety of image data plays an important role. Encryption in images due to its specific features, such as the high volume of transmitted images, the amount of additional data for encryption, the correlation coefficient and the high repetition among the pixels, are very different from the text data; this has led to all traditional encryption methods It is not suitable for image data and there are changes in their structure to use traditional methods in image cryptography. In this paper, using pixel shift algorithms and Hill's encryption algorithm, ciphering of color images has been addressed; the pixel shift algorithm has been used to maintain greater dependency and security, and Hill's encryption algorithm has been used to change the amount of pixels. For analysis of the work, the algorithm is presented and for comparison with other methods, images and standard analysis methods have been used. The obtained results improve the efficiency of the proposed algorithm in comparison with the standard hail algorithm (especially in images with similar pixels) And compared with other comparable algorithms. Manuscript profile
      • Open Access Article

        2 - On the Applications and Techniques of Vehicular Ad-Hoc Networks
        mohsen Norouzi ali arshaghi navid Razmjooy Mohsen ashourian
        Vehicular Ad-Hoc Networks (VANET) models are derived from Mobile Ad-Hoc Networks that possess an impressive role in the intelligent transportation system today and also in the future. So scientists are always looking for the best theories in hope of grasping the fastest More
        Vehicular Ad-Hoc Networks (VANET) models are derived from Mobile Ad-Hoc Networks that possess an impressive role in the intelligent transportation system today and also in the future. So scientists are always looking for the best theories in hope of grasping the fastest and safest connections between vehicles, to provide traffic and accident news in real time. The high number of nodes is one of the significant features of this network that results in an increase of the number of transmitted packets in the network. Distributed system and high mobility of the nodes are the other most important attributes of Vehicular Ad-Hoc networks. In this paper, we aim to review the studies and improvements of vehicular Ad-Hoc network in the fields of safety and traffic management. In addition, we introduce the most common challenges of this network and gather latest methods for resolving those problems. Multi agent systems will be one of the newest and suitable tools in this system. The main purpose is arranging safe connection between agents. Fixing agreements and removing the disputes are not detachable from functional system. It is like group associations and societies which require human collaborations and cooperation. Development of science resulted in utilization of these systems in various aspects like VANET. Nowadays scientists and researchers are interested to make use of these methods for improving the role of vehicle networks in the field of traffic management, safety and entertainment, we will review them in the following paragraphs. Manuscript profile
      • Open Access Article

        3 - A Survey on Face Recognition Based on Deep Neural Networks
        mohsen Norouzi Ali Arshaghi
        Face recognition is one of the most important and challenging issues in computer vision and image processing. About half a century ago, since the first face recognition system was introduced, facial recognition has become one of the most important issues in industry and More
        Face recognition is one of the most important and challenging issues in computer vision and image processing. About half a century ago, since the first face recognition system was introduced, facial recognition has become one of the most important issues in industry and academia. In recent years, with the developing of computers throughput and developments of a new generation of hierarchical learning algorithms called deep learning, much attention has been devoted to solving learning problems by deep learning algorithms. Deep neural networks perform feature learning instead of feature extraction which by this strategy they are much useful for image processing and computer vision problems. Deep neural network through feature learning perform data representation well and have gained many successes in learning and complex problems, many studies have been done on the application of deep neural networks to face recognition and many successes has been achieved. In this study we examine the neural network based methods used for face recognition such as multilayer perceptrons, restricted Boltzmann machine and auto encoders. Most of our study devoted to convolutional neural network as one of the most successful deep learning algorithms. At the end we have examined the results of the encountered methods on ORL, AR, YALE, FERET datasets and show deep neural network has gained high recognition rate in comparing with benchmark methods. Manuscript profile
      • Open Access Article

        4 - An Approach to Integrate Wireless Sensor Networks with Cloud Computing Technology in Medical Context
        Mohsen Norouzi Ali Arshaghi Mohsen Ashourian
        Recently, with the advent of cloud computing technology and the growth of cell phone applications, the technology has been introduced as a solution for use in smart phones. Combining cloud computing and smart phones copes with such obstacles as performance including bat More
        Recently, with the advent of cloud computing technology and the growth of cell phone applications, the technology has been introduced as a solution for use in smart phones. Combining cloud computing and smart phones copes with such obstacles as performance including battery life time, storage capacity and bandwidth, environment as scalability and availability, and security like reliability and accessibility. Today, patient information collection processes require extensive analysis on the collected input data. In addition, this process has lots of errors, it is affordable and increases the time needed for access to the data. These conditions constrain effective monitoring and diagnostic capabilities by the hospitals. Unlike previous methods, data can be collected by devices such as Bluetooth and stored on a server in hospital. In this paper, a comprehensive research involves collecting data from patients and sending this data to a smart phone. Therefore, two algorithms were proposed for a list of physicians with the highest priority. Priority parameters are received by the hospitals server. These priorities include the initial weight, the weight indicating how busy the physician is, and the relationship between physician and patient's disease. Android application was simulated by Eclipse software. The application includes a diagnostic system that receives patient data and compared it with the reference table. If the patient's condition is not good, a short message is sent using two mentioned algorithms. Manuscript profile