Search Results - "Rahimi, Sanaz"
-
1
An improved ALNS for hybrid pickup and drones delivery system in disaster by penalizing deprivation time
Published in Computers & operations research (01-10-2024)“…•Developing a new model for the truck-drone delivery penalizing deprivation time.•Considering pickup and delivery services at some particular demand…”
Get full text
Journal Article -
2
A heuristic-based benders decomposition for the hybrid relief distribution network minimizing deprivation cost of vulnerable areas
Published in Kybernetes (22-03-2024)“…Purpose The study aims to optimize truck routes by minimizing social and economic costs. It introduces a strategy involving diverse drones and their potential…”
Get full text
Journal Article -
3
Accounting for differences in linkage disequilibrium in multi-breed genomic prediction
Published in Livestock science (01-10-2020)“…•Between-breed differences in LD between SNPs and QTL affects prediction accuracy for multi-breed reference population.•Simple pooling of two reference…”
Get full text
Journal Article -
4
Comment on “COVID-19 and diabetes: Association intensify risk factors for morbidity and mortality.”
Published in Biomedicine & pharmacotherapy (01-09-2022)Get full text
Journal Article -
5
Enhancement of therapeutic DNA vaccine potency by melatonin through inhibiting VEGF expression and induction of antitumor immunity mediated by CD8+ T cells
Published in Archives of virology (01-03-2018)“…To be effective, therapeutic cancer vaccines should stimulate both an effective cell-mediated and a robust cytotoxic CD8+ T-cell response against human…”
Get full text
Journal Article -
6
Low-Latency Approach for Secure ECG Feature Based Cryptographic Key Generation
Published in IEEE access (01-01-2018)“…We propose a low-latency approach for generating secure electrocardiogram (ECG) feature-based cryptographic keys. This is done by taking advantage of the…”
Get full text
Journal Article -
7
Non-replicating Newcastle Disease Virus as an adjuvant for DNA vaccine enhances antitumor efficacy through the induction of TRAIL and granzyme B expression
Published in Virus research (01-02-2019)“…•Antitumor effect of DNA vaccine can be enhanced by combining with low dose of non-replicating Newcastle Disease Virus (NDV) strain.•NDV strain-adjuvanted DNA…”
Get full text
Journal Article -
8
What family doctors know about congenital CMV: a regional survey in Iran
Published in Italian journal of pediatrics (01-03-2018)“…Since there is no effective treatment or vaccine against the congenital cytomegalovirus (cCMV) infection, knowledge and awareness of medical doctor's (MDs)…”
Get full text
Journal Article -
9
Secondary use of electronic health records: Availability aspects in two Nordic countries
Published in Health Information Management Journal (01-09-2019)“…Background: The potential for the secondary use of electronic health records (EHRs) is underused due to restrictions in national legislation. For privacy…”
Get full text
Journal Article -
10
Estimating willingness to pay for the Covid-19 vaccine using the conditional valuation method
Published in Payesh (01-04-2021)“…Objective: Conditional valuation method is one of the methods of estimating the willingness to pay and is a cost-benefit analysis. The aim of the present study…”
Get full text
Journal Article -
11
PlayGrid: Sparking AI Literacy with an Intuitive and Accessible Learning Interface
Published in 2023 Fifth International Conference on Transdisciplinary AI (TransAI) (25-09-2023)“…Artificial Intelligence (AI) has become increasingly commonplace for the average consumer, but AI is not commonly understood. In a global survey of adults, 1/3…”
Get full text
Conference Proceeding -
12
A Lightweight Blockchain and Fog-enabled Secure Remote Patient Monitoring System
Published 09-01-2023“…IoT has enabled the rapid growth of smart remote healthcare applications. These IoT-based remote healthcare applications deliver fast and preventive medical…”
Get full text
Journal Article -
13
On the Feasibility of Attribute-Based Encryption on Internet of Things Devices
Published in IEEE MICRO (01-11-2016)“…The Internet of Things (IoT) is emerging with the pace of technology evolution, connecting people and things through the Internet. IoT devices enable…”
Get full text
Journal Article -
14
A lightweight blockchain and fog-enabled secure remote patient monitoring system
Published in Internet of things (Amsterdam. Online) (01-07-2023)“…IoT has enabled the rapid growth of smart remote healthcare applications. These IoT-based remote healthcare applications deliver fast and preventive medical…”
Get full text
Journal Article -
15
End-to-end security scheme for mobility enabled healthcare Internet of Things
Published in Future generation computer systems (01-11-2016)“…We propose an end-to-end security scheme for mobility enabled healthcare Internet of Things (IoT). The proposed scheme consists of (i) a secure and efficient…”
Get full text
Journal Article -
16
Vulnerability Scrying Method for Software Vulnerability Discovery Prediction Without a Vulnerability Database
Published in IEEE transactions on reliability (01-06-2013)“…Predicting software vulnerability discovery trends can help improve secure deployment of software applications and facilitate backup provisioning, disaster…”
Get full text
Journal Article -
17
Volatility Spillover among Exchange Rate, Inflation and Liquidity in Iran’s Economy: A TVP-VAR-BK Approach
Published in Faṣlnāmah-ʼi pizhūhishʹhā-yi iqtiṣādī-i Īrān (01-12-2023)“…The present study aimed to examine the transfer, reception, and the spillover of volatility from March 1982 to September 2022, using the time-varying parameter…”
Get full text
Journal Article -
18
Predicting the effect of factors affecting economic growth of Iran with the approach of time-varying parameters -dynamic model averaging
Published in مدلسازی اقتصادسنجی (01-08-2023)“…One of the most important goals of economic policymakers in every country is to achieve high economic growth. For this purpose, this study aims to identify the…”
Get full text
Journal Article -
19
Analysis of the security of VPN configurations in industrial control environments
Published in International journal of critical infrastructure protection (01-03-2012)“…Virtual private networks (VPNs) are a popular approach for protecting otherwise insecure industrial control protocols. VPNs provide confidentiality, integrity…”
Get full text
Journal Article -
20
Secondary use of electronic health records: Availability aspects in two Nordic countries
Published in Health Information Management Journal (01-09-2019)“…Background: The potential for the secondary use of electronic health records (EHRs) is underused due to restrictions in national legislation. For privacy…”
Get full text
Journal Article