Menu
Cohorets
Computer Engineering
College Name:
Faculty of Engineering
Educational Group Name:
Computer Engineering
Status:
Active
Room Number:
Email:
Phone:
51212250
Journal Articles
- A novel community-driven recommendation-based approach to predict and select friendships on the social IoT utilizing deep reinforcement learning
- ACADEMIC PRESS LTD- ELSEVIER SCIENCE LTD
- Machine Learning and Metaheuristic Algorithms for Voice-Based Authentication: A Mobile Banking Case Study
- ATLANTIS PRESS
- A semantic model based on ensemble learning and attribute-based encryption to increase security of smart buildings in fog computing
- SPRINGER
- Social networks data analytical approaches for trust?based recommender systems: A systematic literature review
- WILEY-BLACKWELL
- Belief Mining in Persian Texts Based on Deep Learning and Users' Opinions (revised December 2022)
- IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
- An efficient edge caching approach for SDN-based IoT environments utilizing the moth flame clustering algorithm
- SPRINGER
- Composition of caching and classification in edge computing based on quality optimization for SDN-based IoT healthcare solutions
- SPRINGER
- Toward caching techniques in edge computing over SDN-IoT architecture: a review of challenges, solutions, and open issues
- SPRINGER
- The IoT Resource Allocation Improvement in Fog Computing Using Non-Cooperative Game Theory
- پدافند الکترونيکي و سايبري
- Pre-Distribution Encryption Key Scheme for Communicating between IoT Device Layer and Fog Layer
- TAYLOR & FRANCIS INC
- Pre Distribution Encryption Key Scheme for Communicating between IoT Device Layer and Fog Layer
- TAYLOR & FRANCIS INC
- Using recommender clustering to improve quality of services with sustainable virtual machines in cloud computing
- SPRINGER
- Extended array model of star capacity-aware delay-based next controller placement problem for multiple controller failures in software-defined wide area networks
- SPRINGER HEIDELBERG
- A High Resilience and High Scalable Key Pre-distribution Scheme Based on Combinatorial Designs for Resource-Constrained Devices in IoT Networks
- SPRINGER
- Analytical model for task offloading in a fog computing system with batch-size-dependent service
- ELSEVIER SCIENCE BV
- Providing a Hybrid Cryptography Algorithm for Lightweight Authentication Protocol in RFID with Urban Traffic Usage Case
- The ISC International Journal of Information Security
- A new resource allocation method in fog computing via non-cooperative game theory
- Journal of Intelligent & Fuzzy Systems
- A cooperative approach for combining particle swarm optimization and differential evolution algorithms to solve single-objective optimization problems
- Applied Intelligence
- Fair multi-owner search over encrypted data with forward and backward privacy in cloud-assisted Internet of Things
- Future Generation Computer Systems
- Privacy Preserving Attribute-Based Encryption with Conjunctive Keyword Search for E-health Records in Cloud
- The ISC International Journal of Information Security
- Efficient and dynamic verifiable multi-keyword searchable symmetric encryption with full security
- Multimedia Tools and Applications
- A survey of key pre-distribution schemes based on combinatorial designs for resource-constrained devices in the IoT network
- Wireless Networks
- A Scalable Key Pre-distribution Scheme based on the Unital Design for the Internet of Things Security
- IETE Journal of Research
- Security in fog computing: A systematic review on issues, challenges and solutions
- Computer Science Review
- Dynamic secure multi-keyword ranked search over encrypted cloud data
- Journal of Information Security and Applications
- Internet of Things architecture challenges: A systematic review
- International Journal of Communication Systems
- Edge computing in SDN-IoT networks: a systematic review of issues, challenges and solutions
- Cluster Computing:The Journal of Networks, Software Tools and Applications
- A proactive fog service provisioning framework for Internet of Things applications: An autonomic approach
- Transactions on Emerging Telecommunications Technologies
- Performance improvement of Routing Protocol for Low?Power and Lossy Networks protocol in an Internet of Things?based smart retail system
- WILEY-BLACKWELL
- Star capacity-aware latency-based next controller placement problem with considering single controller failure in software-defined wide-area networks
- SPRINGER
- IAMnet: Presentation of Parallelization Approach for Repetitive Mining on Network Topologies with an Improved Apriori Method
- HINDAWI LTD
- S-Boxهاي پويا وابسته به كليد سبك وزن مبتني بر جم بيضويي براي دستگاه هاي اينترنت اشيا
- علوم رايانش و فناوري اطلاعات
- Key pre-distribution scheme based on transversal design in large mobile fog networks with multi-clouds
- Journal of Information Security and Applications
- A novel key pre-distribution scheme based on -PBIBD combinatorial design in the resource-constrained IoT network
- علوم رايانش و فناوري اطلاعات
- A New Incentive Mechanism to Detect and Restrict Sybil Nodes in P2P File-Sharing Networks with a Heterogeneous Bandwidth
- Journal of Artificial Intelligence & Data Mining=Journal of AI and Data Mining
- Measuring Efficiency of Financial Cloud Services in Banking Industry Using Modified Dynamic DEA with Network Structure (Case study: Iran E-Banking)
- Advances in Mathematical Finance and Applications
- A dynamic fog service provisioning approach for IoT applications
- International Journal of Communication Systems
- A Full Connectable and High Scalable Key Pre?distribution Scheme Based on Combinatorial Designs for Resource?Constrained Devices in IoT Network
- Wireless Personal Communications
- Anomaly Detection in Smart Homes Using Bayesian Networks
- KSII Transactions on Internet and Information Systems
- A secure remote health monitoring model for early disease diagnosis in cloud-based IoT environment
- SPRINGER LONDON LTD
- Toward a More Accurate Web Service Selection Using Modified Interval DEA Models with Undesirable Outputs
- TECH SCIENCE PRESS
- Using Residual Design for Key Management in Hierarchical Wireless Sensor Networks
- Journal of Information Systems and Telecommunication
- A Novel Probabilistic Hybrid Model to Detect Anomaly in Smart Homes
- CMES - Computer Modeling in Engineering and Sciences
- Privacy?aware cloud service composition based on QoS optimization in Internet of Things
- Journal of Ambient Intelligence and Humanized Computing
- A secure key-aggregate authentication cryptosystem for data sharing in dynamic cloud storage
- Multimedia Tools and Applications
- Verifiable ranked search over encrypted data with forward and backward privacy
- Future Generation Computer Systems
- A medical monitoring scheme and health?medical service composition model in cloud?based IoT platform
- Transactions on Emerging Telecommunications Technologies
- Hybrid Key Pre-distribution Scheme Based on Symmetric Design
- Iranian Journal of Science and Technology, Transactions A: Science
- Corrigendum to "Preventing Sybil Attacks in P2P File Sharing Networks Based on the Evolutionary Game Model" [Information Sciences 470 (2019) 94-108]
- ELSEVIER SCIENCE INC
- Residual design of sink localization algorithms for wireless sensor networks
- Journal Of High Speed Networks
- Preventing Sybil attacks in P2P file sharing networks based on the evolutionary game model
- Information Sciences
- Efficient clustering in collaborative filtering recommender system: Hybrid method based on genetic algorithm and gravitational emulation local search algorithm
- Genomics
- Service composition approaches in IoT: A systematic review
- Journal of Network and Computer Applications
- A hierarchical key pre-distribution scheme for fog networks
- Concurrency and Computation: Practice and Experience
- Cog-MAC Protocol: Channel Allocation in Cognitive Ad Hoc Networks Based on the Game of Learning Automata
- Wireless Personal Communications
- Load balancing in reducers for skewed data in MapReduce systems by using scalable simple random sampling
- The Journal of Supercomputing
- Identification of Sybil attacks on social networks using a framework based on user interactions
- Security and Privacy
- TCLAB: A New Topology Control Protocol in Cognitive MANETs Based on Learning Automata
- Journal of Network and Systems Management
- Detection and mitigation of pulse-delay attacks in pairwise-secured wireless sensor networks
- International Journal of High Performance Computing and Networking
- A Novel Scalable Key Pre-distribution Scheme for Wireless Sensor Networks Based on Residual Design
- Wireless Personal Communications
- Hypercube Bivariate-Based Key Management for Wireless Sensor Networks
- Journal of Sciences, Islamic Republic of Iran
- A Deterministic Multiple Key Space Scheme for Wireless Sensor Networks via Combinatorial Designs
- Journal of Communication Engineering
- Key-management scheme for wireless sensor networks based on merging blocks of symmetric design
- Wireless Networks
- Determining the Number of Accusations for Decision Making in Key Revocation Protocol for MANET
- Journal of Computing and Security
- A new method of trust mirroring estimation based on social networks parameters by fuzzy system
- International Journal of Machine Learning and Cybernetics
- A three level fuzzy system for evaluating the trust of single web services
- Journal of Intelligent & Fuzzy Systems
- Hybrid Key Pre-distribution Scheme for Wireless Sensor Network Based on Combinatorial Design
- Journal of Advances in Computer Engineering and Technology
- A deterministic Key Predistribution Method for Wireless Sensor Networks Based on Hypercube Multivariate Scheme
- Iranian Journal of Science and Technology, Transactions A: Science
- Trust estimation of the semantic web using semantic web clustering
- Journal of Experimental & Theoretical Artificial Intelligence
- Sink Location Service Based on Fano Plane in Wireless Sensor Networks
- Journal of Communication Engineering
- Solving the time-fractional diffusion equation via Sinc-Haar collocation method
- Applied Mathematics and Computation
- DEVELOPMENT OF A FUZZY EXPERT SYSTEM TO PRIORITIZE TRAFFIC CALMING PROJECTS
- Jurnal Teknologi -Sciences & Engineering
- A Novel Key Pre-Distribution Scheme for Wireless Sensor Networks
- Journal of Computational and Theoretical Nanoscience
- 3D Path Planning Algorithm for Mobile Anchor-Assisted Positioning in Wireless Sensor Networks
- Journal of Communication Engineering
- A dynamic key management scheme for dynamic wireless sensor networks
- Security and Communication Networks
- Numerical Algorithm Based on Haar-Sinc Collocation Method for Solving the Hyperbolic PDEs
- Scientific World Journal
- Key Predistribution Scheme for Clustered Hierarchical Wireless Sensor Networks based on Combinatorial Designs
- Security and Communication Networks
- Probabilistic Selection of Cluster-head based on the nearest possible Distance of Cluster-head
- مهندسي برق مدرس=Modares Journal of Electrical Engineering- فني و مهندسي مدرس سابق
- Application-specific hybrid symmetric design of key pre-distribution for wireless sensor networks
- Security and Communication Networks
- Optimistic Selection of Cluster Heads Based on Facility Location Problem in Cluster-Based Routing Protocols
- Wireless Personal Communications
- solving MHD falkner-skac boundary-layer equation using collocation method based on ratiional legendre function with transformed hermite-gauss nodes
- World Applied Science Journal
- Improvement of robot path planning using particle swarm optimization in dynamic environments with mobile obstacles and target
- Advanced Studies in Biology
- An Improvement in Maximum Likelihood Location Estimation Algorithm in Sensor Networks
- International Journal of Computer Science and Engineering Survey
- A new distributed weighted multidimensional scaling algorithm localization in wireless sensor networks
- Canadian Journal on Multimedia and Wireless Networks
- Proposing a New Algorithm Based on Bees Behavior for Solving Graph Coloring
- INTERNATIONAL JOURNAL OF CONTEMPORARY MATHEMATICAL SCIENCES
- Bee colony system :preciseness and speed in discrete optimization
- international Journal of Artificial Intelligence tools
- Multi-Join Query Optimization Using the Bees Algorithm
- Advances in Soft Computing- It,s Title Changed
- BEE COLONY SYSTEM: PRECISENESS AND SPEED IN DISCRETE OPTIMIZATION
- Advances in Intelligent and Soft Computing- It,s Title Changed
- A Meta Heuristic Solution for Closest Substring Problem Using Ant Colony System
- Advanced Studies in Biology
Conferences Articles
- FLHB-AC: Federated Learning History-Based Access Control Using Deep Neural Networks in Healthcare System
- Iranian Academic Center for Education, Culture and Research
- Improvement of Apriori Algorithm Using Parallelization Technique on Multi-CPU and GPU Topology
- HINDAWI LTD
- Reducing the computational complexity of fuzzy identity-based encryption from lattice
- پژوهشگاه ارتباطات و فناوري اطلاعات
- Application of S-Boxes based on the chaotic Hindmarsh-Rose system for image encryption
- University of Guilan
- Fuzzy Q-learning approach for autonomic resource provisioning of IoT applications in fog computing environments
- SPRINGER HEIDELBERG
- Multi-objective tasks scheduling using artificial bee colony algorithm based on cellular automata in cloud computing environment
- Institute of Advanced Engineering and Science (IAES)
- Survey of Effective of Combinatorial Design Schemes in Wireless Sensor Networks Security
- دانشگاه شاهد
- Titel Application of optimization algorithm to nonlinear fractional optimal control problems
- Qazvin Islamic Azad University
- Efficient recommendations in collaborative filtering recommender system: A multi-objective evolutionary approach based on NSGA-II algorithm
- conference
- معرفي يك الگوي جديد پيش توزيع كليد مبتني بر طرح تركيبياتي -PBIBD در شبكه IoT با منابع محدود
- انجمن علمي كامپيوتر
- روشي براي جلوگيري از حمله 51 در سکه بيتي و مدل کردن ان با زنجيره ي مارکوف
- پنجاهمين کنفرانس سالانه رياضي ايران
- STATIC TASK SCHEDULING IN HOMOGENEOUS MULTIPROCESSOR SYSTEMS BASED ON GENETIC ALGORITHM
- Proceedings of the International Conference on ICSTE 2009
- Solving the scheduling problem in multi-processor systems with communication cost and precedence using bee colony system
- INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING
- image security sistem using recursive cellular automata substitution and permutation
- دهمين کنفرانس سيستم هاي فازي ايران
- بهبود کارايي الگوريتم کلني مورچگان به وسيله جستجوي موضعي تقاطع (crossover) و جهش (mutation)
- سومين کنفرانس بين المللي انجمن ايراني تحقيق در عمليات
- بهبود كارايي الگوريتم كلني مورچگان به وسيله جستجوي موضعي تقاطع (crossover) و جهش (mutation)
- سومين كنفرانس بين المللي انجمن ايراني تحقيق در عمليات
- الگوريتم پيوندي كلني مورچگان و ژنتيك (HACO-GA) براي مسائل زمانبندي جايگشت خريد جريان (PFSP) با كمينه كردن زمان كل جريان
- چهارمين كنفرانس رياضي كاربردي ايران
- الگوريتم پيوندي کلني مورچگان و ژنتيک (HACO-GA) براي مسائل زمانبندي جايگشت خريد جريان (PFSP) با کمينه کردن زمان کل جريان
- چهارمين کنفرانس رياضي کاربردي ايران
- An energy aware cellular learning automata based routing algorithm for sensor networks
- 9th International Symposium on Communications and Information Technologies
- Using Particle Swarm Optimization for Robot Path Planning in Dynamic Environments with Moving Obstacles and Target
- Third UKSim European Symposium on Computer Modeling and Simulation
- ICLEAR : Energy Aware Routing Protocol fo WSN Using Irregular Cellular Learning Automata
- The 2009 IEEE Symposium on Industrial Electronics & Applications
- Path Planning Algorithm for Mobile Robot Based on Multilayared Cellular Automata
- International Conferences of Mathematical Sciences
- Evaluation A Novel Cellular Automaton Based Energy-Conservating Solution In Mobile Wireless Sensor Networks
- International conference of mathematical sciences
- Some Results About Algebraic Properties Of Generalized Cellular Automata
- International Conferences of Mathematical Sciences
- An Algorithm for Robot Path Planning in Environments with Flashing Off-On Obstacles,Using Cellular Automata
- International Conferences of Mathematical Sciences
- STATIC TASK SCHEDULING IN HOMOGENEOUS MULTIPROCESSOR SYSTEMS BASED ON GENETIC ALGORITHM
- Proceedings of the International Conference on ICSTE 2009
- يك روش سريع در يافتن چهره در تصاوير RGB بر اساس دسته ماشين هاي بردار پشتيبان
- سومين كنگره مشترك سيستم هي فازي و هوشمند
- يك روش سريع در يافتن چهره در تصاوير RGBبر اساس دسته ماشين هاي بردار پشتيبان
- سومين كنگره مشترك سيستم هي فازي و هوشمند
- Design an Efficient System for Intrusion Detection via Evolutionary Fuzzy System
- IEEE International Conference on Intelligent Computing and Intelligent Systems, 2009. .
- استفده از سيستم دسته بندي فازي مبتني بر جستجوي ممنوعه به منظور تشخيص نفوذ در شبكه هاي كامپيوتري
- IDMC2008
Thesis
- H
- 1399/11/19 Hamid Haj Seyyed Javadi (استاد راهنما اول)
- Integrate blockchain loich IoT
- 1399/08/05 Hamid Haj Seyyed Javadi (استاد راهنما اول)
- A secure cryptosystem for data sharing in dynamic cloud storage
- 1399/04/31 Hamid Haj Seyyed Javadi (استاد راهنما دوم)
- An enhanced model for searching on encrypted data with verifiability
- 1399/04/31 Hamid Haj Seyyed Javadi (استاد راهنما اول)
- A IoT cegnitive network topulogy control protocol based on learning automata
- 1399/03/10 Hamid Haj Seyyed Javadi (استاد راهنما اول)
- Entrpy-based source coding with linear time order
- 1398/06/14 Hamid Haj Seyyed Javadi (استاد راهنما اول)
- جلوگيري از حمله 51: تجزيه و تحليل تصادفي از دو فاز اثبات کار در سکه بيتي
- 1398/06/14 Hamid Haj Seyyed Javadi (استاد راهنما اول)
- 1397/06/31 Hamid Haj Seyyed Javadi (استاد مشاور اول)
- 1397/04/26 Hamid Haj Seyyed Javadi (استاد راهنما اول)
- 1396/06/29 Hamid Haj Seyyed Javadi (استاد راهنما اول)
- 1396/06/29 Hamid Haj Seyyed Javadi (استاد راهنما اول)
- 1396/04/21 Hamid Haj Seyyed Javadi (استاد راهنما اول)
- 1395/11/19 Hamid Haj Seyyed Javadi (استاد راهنما 1)
- 1395/11/18 Hamid Haj Seyyed Javadi (استاد راهنما 1)
- بررسي تعميم کروناي گرافها، اتصالات زيرتقسيمي و گرافهاي صحيح
- 1395/11/16 Hamid Haj Seyyed Javadi (استاد راهنما 1)
- 1395/06/29 Hamid Haj Seyyed Javadi (استاد راهنما دوم)
- 1394/11/06 Hamid Haj Seyyed Javadi (استاد راهنما 1)
- 1394/09/24 Hamid Haj Seyyed Javadi (استاد راهنما 1)
- 1394/06/21 Hamid Haj Seyyed Javadi (استاد راهنما اول)
- Image Steganography and steganography Analysis
- 1393/11/04 Hamid Haj Seyyed Javadi (استاد راهنما دوم)
- پيش توزيع کليد مبتني بر طرح هي ترکيبياتي در شبکه هاي حس گر بي سيم
- 1393/09/23 Hamid Haj Seyyed Javadi (استاد راهنما اول)
- 1393/06/03 Hamid Haj Seyyed Javadi (استاد راهنما اول)
- 1390/11/29 Hamid Haj Seyyed Javadi (استاد راهنما اول)
- Boneh-ShawObtaining Asymptetic Fingerprint Codes Through a New Analysis of the Boneh-Shaw Codes
- 1390/08/01 Hamid Haj Seyyed Javadi (استاد راهنما اول)
- Relative z-ideals in C (X)
- 1390/04/15 Hamid Haj Seyyed Javadi (استاد راهنما اول)
- 1389/11/24 Hamid Haj Seyyed Javadi (استاد 1)
- The minimal prime spectrum of rings with annihilator conditions
- 1389/11/10 Hamid Haj Seyyed Javadi (استاد راهنما اول)
- 1389/06/15 Hamid Haj Seyyed Javadi (استاد 1)
- 1389/06/15 Hamid Haj Seyyed Javadi (استاد 1)
- 1389/06/15 Hamid Haj Seyyed Javadi (استاد 1)
- 1389/06/15 Hamid Haj Seyyed Javadi (استاد 1)
- مدول بير و شبه بير
- 1389/04/28 Hamid Haj Seyyed Javadi (استاد 1)
- 1388/11/13 Hamid Haj Seyyed Javadi (استاد راهنما 1)
- حلقه هاي نيمه منظم تعميم يافته
- 1387/04/20 Hamid Haj Seyyed Javadi (استاد راهنما 1)