فهرست مطالب
اعضای گروه
مهندسی کامپیوتر
نام دانشکده:
دانشکده فني و مهندسي
گروه آموزشی:
مهندسی کامپیوتر
وضعیت همکاری:
فعال
شماره اتاق:
پست الکترونیک:
تلفن محل کار:
51212250
مقالات ژورنالی
- A novel community-driven recommendation-based approach to predict and select friendships on the social IoT utilizing deep reinforcement learning
- ACADEMIC PRESS LTD- ELSEVIER SCIENCE LTD
- Machine Learning and Metaheuristic Algorithms for Voice-Based Authentication: A Mobile Banking Case Study
- ATLANTIS PRESS
- A semantic model based on ensemble learning and attribute-based encryption to increase security of smart buildings in fog computing
- SPRINGER
- Social networks data analytical approaches for trust?based recommender systems: A systematic literature review
- WILEY-BLACKWELL
- Belief Mining in Persian Texts Based on Deep Learning and Users' Opinions (revised December 2022)
- IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
- An efficient edge caching approach for SDN-based IoT environments utilizing the moth flame clustering algorithm
- SPRINGER
- Composition of caching and classification in edge computing based on quality optimization for SDN-based IoT healthcare solutions
- SPRINGER
- Toward caching techniques in edge computing over SDN-IoT architecture: a review of challenges, solutions, and open issues
- SPRINGER
- بهبود تخصيص منابع اينترنت اشيا در محاسبات مه با استفاده از نظريه بازي غير همكارانه
- پدافند الکترونيکي و سايبري
- Pre-Distribution Encryption Key Scheme for Communicating between IoT Device Layer and Fog Layer
- TAYLOR & FRANCIS INC
- Pre Distribution Encryption Key Scheme for Communicating between IoT Device Layer and Fog Layer
- TAYLOR & FRANCIS INC
- Using recommender clustering to improve quality of services with sustainable virtual machines in cloud computing
- SPRINGER
- Extended array model of star capacity-aware delay-based next controller placement problem for multiple controller failures in software-defined wide area networks
- SPRINGER HEIDELBERG
- A High Resilience and High Scalable Key Pre-distribution Scheme Based on Combinatorial Designs for Resource-Constrained Devices in IoT Networks
- SPRINGER
- Analytical model for task offloading in a fog computing system with batch-size-dependent service
- ELSEVIER SCIENCE BV
- Providing a Hybrid Cryptography Algorithm for Lightweight Authentication Protocol in RFID with Urban Traffic Usage Case
- The ISC International Journal of Information Security
- A new resource allocation method in fog computing via non-cooperative game theory
- Journal of Intelligent & Fuzzy Systems
- A cooperative approach for combining particle swarm optimization and differential evolution algorithms to solve single-objective optimization problems
- Applied Intelligence
- Fair multi-owner search over encrypted data with forward and backward privacy in cloud-assisted Internet of Things
- Future Generation Computer Systems
- Privacy Preserving Attribute-Based Encryption with Conjunctive Keyword Search for E-health Records in Cloud
- The ISC International Journal of Information Security
- Efficient and dynamic verifiable multi-keyword searchable symmetric encryption with full security
- Multimedia Tools and Applications
- A survey of key pre-distribution schemes based on combinatorial designs for resource-constrained devices in the IoT network
- Wireless Networks
- A Scalable Key Pre-distribution Scheme based on the Unital Design for the Internet of Things Security
- IETE Journal of Research
- Security in fog computing: A systematic review on issues, challenges and solutions
- Computer Science Review
- Dynamic secure multi-keyword ranked search over encrypted cloud data
- Journal of Information Security and Applications
- Internet of Things architecture challenges: A systematic review
- International Journal of Communication Systems
- Edge computing in SDN-IoT networks: a systematic review of issues, challenges and solutions
- Cluster Computing:The Journal of Networks, Software Tools and Applications
- A proactive fog service provisioning framework for Internet of Things applications: An autonomic approach
- Transactions on Emerging Telecommunications Technologies
- Performance improvement of Routing Protocol for Low?Power and Lossy Networks protocol in an Internet of Things?based smart retail system
- WILEY-BLACKWELL
- Star capacity-aware latency-based next controller placement problem with considering single controller failure in software-defined wide-area networks
- SPRINGER
- IAMnet: Presentation of Parallelization Approach for Repetitive Mining on Network Topologies with an Improved Apriori Method
- HINDAWI LTD
- S-Boxهاي پويا وابسته به كليد سبك وزن مبتني بر جم بيضويي براي دستگاه هاي اينترنت اشيا
- علوم رايانش و فناوري اطلاعات
- Key pre-distribution scheme based on transversal design in large mobile fog networks with multi-clouds
- Journal of Information Security and Applications
- معرفي يك الگوي جديد پيش توزيع كليد مبتني بر طرح تركيبياتي m-pbibd در شبكهIoT با منابع محدود
- علوم رايانش و فناوري اطلاعات
- A New Incentive Mechanism to Detect and Restrict Sybil Nodes in P2P File-Sharing Networks with a Heterogeneous Bandwidth
- Journal of Artificial Intelligence & Data Mining=Journal of AI and Data Mining
- اندازه گيري كارا سرويس هاي ابري مالي در صنعت بانكداري با استفاده از DEA پويا با ساختار شبكه
- Advances in Mathematical Finance and Applications
- يك روش اماده سازي سرويس مه پويا براي كاربردهاي اينترنت اشيا
- International Journal of Communication Systems
- يك طرح پيش توزيع كليد با مقايسه پذيري بالا و اتصال كامل بر پايه طرح هاي تركيبياتي براي وسايل با محدوديت منابع در شبكه اينترنت اشيا
- Wireless Personal Communications
- تشخيص ناهنجاري در منازل هوشمند بر پابه شبكه هاي بيزين
- KSII Transactions on Internet and Information Systems
- A secure remote health monitoring model for early disease diagnosis in cloud-based IoT environment
- SPRINGER LONDON LTD
- Toward a More Accurate Web Service Selection Using Modified Interval DEA Models with Undesirable Outputs
- TECH SCIENCE PRESS
- استفاده از طرح باقيمانده اي بر مديريت كليد در شبكه حسگر بي سيم سلسله مراتبي
- Journal of Information Systems and Telecommunication
- يك مدل تركيبي جديد احتمالي براي تشخيص ناهنجاري در منازل هوشمند
- CMES - Computer Modeling in Engineering and Sciences
- تركيب سرويس ابر اگاه از حريم خصوصي بر پايه Qosبينه در اينترنت اشيا
- Journal of Ambient Intelligence and Humanized Computing
- A secure key-aggregate authentication cryptosystem for data sharing in dynamic cloud storage
- Multimedia Tools and Applications
- Verifiable ranked search over encrypted data with forward and backward privacy
- Future Generation Computer Systems
- A medical monitoring scheme and health?medical service composition model in cloud?based IoT platform
- Transactions on Emerging Telecommunications Technologies
- Hybrid Key Pre-distribution Scheme Based on Symmetric Design
- Iranian Journal of Science and Technology, Transactions A: Science
- Corrigendum to "Preventing Sybil Attacks in P2P File Sharing Networks Based on the Evolutionary Game Model" [Information Sciences 470 (2019) 94-108]
- ELSEVIER SCIENCE INC
- Residual design of sink localization algorithms for wireless sensor networks
- Journal Of High Speed Networks
- Preventing Sybil attacks in P2P file sharing networks based on the evolutionary game model
- Information Sciences
- Efficient clustering in collaborative filtering recommender system: Hybrid method based on genetic algorithm and gravitational emulation local search algorithm
- Genomics
- Service composition approaches in IoT: A systematic review
- Journal of Network and Computer Applications
- A hierarchical key pre-distribution scheme for fog networks
- Concurrency and Computation: Practice and Experience
- Cog-MAC Protocol: Channel Allocation in Cognitive Ad Hoc Networks Based on the Game of Learning Automata
- Wireless Personal Communications
- Load balancing in reducers for skewed data in MapReduce systems by using scalable simple random sampling
- The Journal of Supercomputing
- Identification of Sybil attacks on social networks using a framework based on user interactions
- Security and Privacy
- TCLAB: A New Topology Control Protocol in Cognitive MANETs Based on Learning Automata
- Journal of Network and Systems Management
- Detection and mitigation of pulse-delay attacks in pairwise-secured wireless sensor networks
- International Journal of High Performance Computing and Networking
- A Novel Scalable Key Pre-distribution Scheme for Wireless Sensor Networks Based on Residual Design
- Wireless Personal Communications
- Hypercube Bivariate-Based Key Management for Wireless Sensor Networks
- Journal of Sciences, Islamic Republic of Iran
- يك چارچوب Multiple Key Space براي شبكه هاي سنسوري بي سيم با طرح هاي تركيبياتي
- Journal of Communication Engineering
- Key-management scheme for wireless sensor networks based on merging blocks of symmetric design
- Wireless Networks
- A new method of trust mirroring estimation based on social networks parameters by fuzzy system
- International Journal of Machine Learning and Cybernetics
- A three level fuzzy system for evaluating the trust of single web services
- Journal of Intelligent & Fuzzy Systems
- Hybrid Key Pre-distribution Scheme for Wireless Sensor Network Based on Combinatorial Design
- Journal of Advances in Computer Engineering and Technology
- A deterministic Key Predistribution Method for Wireless Sensor Networks Based on Hypercube Multivariate Scheme
- Iranian Journal of Science and Technology, Transactions A: Science
- Trust estimation of the semantic web using semantic web clustering
- Journal of Experimental & Theoretical Artificial Intelligence
- Sink Location Service Based on Fano Plane in Wireless Sensor Networks
- Journal of Communication Engineering
- Solving the time-fractional diffusion equation via Sinc-Haar collocation method
- Applied Mathematics and Computation
- DEVELOPMENT OF A FUZZY EXPERT SYSTEM TO PRIORITIZE TRAFFIC CALMING PROJECTS
- Jurnal Teknologi -Sciences & Engineering
- A Novel Key Pre-Distribution Scheme for Wireless Sensor Networks
- Journal of Computational and Theoretical Nanoscience
- 3D Path Planning Algorithm for Mobile Anchor-Assisted Positioning in Wireless Sensor Networks
- Journal of Communication Engineering
- A dynamic key management scheme for dynamic wireless sensor networks
- Security and Communication Networks
- Numerical Algorithm Based on Haar-Sinc Collocation Method for Solving the Hyperbolic PDEs
- Scientific World Journal
- Key Predistribution Scheme for Clustered Hierarchical Wireless Sensor Networks based on Combinatorial Designs
- Security and Communication Networks
- Probabilistic Selection of Cluster-head based on the nearest possible Distance of Cluster-head
- مهندسي برق مدرس=Modares Journal of Electrical Engineering- فني و مهندسي مدرس سابق
- Application-specific hybrid symmetric design of key pre-distribution for wireless sensor networks
- Security and Communication Networks
- Optimistic Selection of Cluster Heads Based on Facility Location Problem in Cluster-Based Routing Protocols
- Wireless Personal Communications
- solving MHD falkner-skac boundary-layer equation using collocation method based on ratiional legendre function with transformed hermite-gauss nodes
- World Applied Science Journal
- Improvement of robot path planning using particle swarm optimization in dynamic environments with mobile obstacles and target
- Advanced Studies in Biology
- An Improvement in Maximum Likelihood Location Estimation Algorithm in Sensor Networks
- International Journal of Computer Science and Engineering Survey
- A new distributed weighted multidimensional scaling algorithm localization in wireless sensor networks
- Canadian Journal on Multimedia and Wireless Networks
- پيشنهاد يك الگوريتم جديد بر پايه رفتار زنبوران براي حل رنگ آميزي گراف
- INTERNATIONAL JOURNAL OF CONTEMPORARY MATHEMATICAL SCIENCES
- Bee colony system :preciseness and speed in discrete optimization
- international Journal of Artificial Intelligence tools
- Multi-Join Query Optimization Using the Bees Algorithm
- Advances in Soft Computing- It,s Title Changed
- BEE COLONY SYSTEM: PRECISENESS AND SPEED IN DISCRETE OPTIMIZATION
- Advances in Intelligent and Soft Computing- It,s Title Changed
- يك متا هيوريستيك براي حل مساله نزديكترين زير رشته با استفاده از سيستم كلني مورچه ها
- Advanced Studies in Biology
مقالات کنفرانسی
- FLHB-AC: Federated Learning History-Based Access Control Using Deep Neural Networks in Healthcare System
- Iranian Academic Center for Education, Culture and Research
- Improvement of Apriori Algorithm Using Parallelization Technique on Multi-CPU and GPU Topology
- HINDAWI LTD
- Reducing the computational complexity of fuzzy identity-based encryption from lattice
- پژوهشگاه ارتباطات و فناوري اطلاعات
- Application of S-Boxes based on the chaotic Hindmarsh-Rose system for image encryption
- University of Guilan
- Fuzzy Q-learning approach for autonomic resource provisioning of IoT applications in fog computing environments
- SPRINGER HEIDELBERG
- Multi-objective tasks scheduling using artificial bee colony algorithm based on cellular automata in cloud computing environment
- Institute of Advanced Engineering and Science (IAES)
- Survey of Effective of Combinatorial Design Schemes in Wireless Sensor Networks Security
- دانشگاه شاهد
- Titel Application of optimization algorithm to nonlinear fractional optimal control problems
- Qazvin Islamic Azad University
- Efficient recommendations in collaborative filtering recommender system: A multi-objective evolutionary approach based on NSGA-II algorithm
- conference
- معرفي يك الگوي جديد پيش توزيع كليد مبتني بر طرح تركيبياتي -PBIBD در شبكه IoT با منابع محدود
- انجمن علمي كامپيوتر
- روشي براي جلوگيري از حمله 51 در سکه بيتي و مدل کردن ان با زنجيره ي مارکوف
- پنجاهمين کنفرانس سالانه رياضي ايران
- زمانبندي ايستا وظايف در سيستم هاي چند پردازنده اي بر پايه الگوريتم ژنتيک
- Proceedings of the International Conference on ICSTE 2009
- Solving the scheduling problem in multi-processor systems with communication cost and precedence using bee colony system
- INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING
- image security sistem using recursive cellular automata substitution and permutation
- دهمين کنفرانس سيستم هاي فازي ايران
- بهبود کارايي الگوريتم کلني مورچگان به وسيله جستجوي موضعي تقاطع (crossover) و جهش (mutation)
- سومين کنفرانس بين المللي انجمن ايراني تحقيق در عمليات
- بهبود كارايي الگوريتم كلني مورچگان به وسيله جستجوي موضعي تقاطع (crossover) و جهش (mutation)
- سومين كنفرانس بين المللي انجمن ايراني تحقيق در عمليات
- الگوريتم پيوندي كلني مورچگان و ژنتيك (HACO-GA) براي مسائل زمانبندي جايگشت خريد جريان (PFSP) با كمينه كردن زمان كل جريان
- چهارمين كنفرانس رياضي كاربردي ايران
- الگوريتم پيوندي کلني مورچگان و ژنتيک (HACO-GA) براي مسائل زمانبندي جايگشت خريد جريان (PFSP) با کمينه کردن زمان کل جريان
- چهارمين کنفرانس رياضي کاربردي ايران
- An energy aware cellular learning automata based routing algorithm for sensor networks
- 9th International Symposium on Communications and Information Technologies
- Using Particle Swarm Optimization for Robot Path Planning in Dynamic Environments with Moving Obstacles and Target
- Third UKSim European Symposium on Computer Modeling and Simulation
- ICLEAR : Energy Aware Routing Protocol fo WSN Using Irregular Cellular Learning Automata
- The 2009 IEEE Symposium on Industrial Electronics & Applications
- Path Planning Algorithm for Mobile Robot Based on Multilayared Cellular Automata
- International Conferences of Mathematical Sciences
- Evaluation A Novel Cellular Automaton Based Energy-Conservating Solution In Mobile Wireless Sensor Networks
- International conference of mathematical sciences
- Some Results About Algebraic Properties Of Generalized Cellular Automata
- International Conferences of Mathematical Sciences
- An Algorithm for Robot Path Planning in Environments with Flashing Off-On Obstacles,Using Cellular Automata
- International Conferences of Mathematical Sciences
- زمانبندي ايستا وظايف در سيستم هاي چند پردازنده اي بر پايه الگوريتم ژنتيك
- Proceedings of the International Conference on ICSTE 2009
- يك روش سريع در يافتن چهره در تصاوير RGB بر اساس دسته ماشين هاي بردار پشتيبان
- سومين كنگره مشترك سيستم هي فازي و هوشمند
- يك روش سريع در يافتن چهره در تصاوير RGBبر اساس دسته ماشين هاي بردار پشتيبان
- سومين كنگره مشترك سيستم هي فازي و هوشمند
- Design an Efficient System for Intrusion Detection via Evolutionary Fuzzy System
- IEEE International Conference on Intelligent Computing and Intelligent Systems, 2009. .
- استفده از سيستم دسته بندي فازي مبتني بر جستجوي ممنوعه به منظور تشخيص نفوذ در شبكه هاي كامپيوتري
- IDMC2008
پایان نامه ها
- حلقه هاي بئر تعميم يافته و حلقه هاي مرتبط با انها
- علي شهيدي كيا 1399/11/19 سيد حميد حاجي سيد جوادي (استاد راهنما اول)
- ادغام بلاکچين با اينترنت اشيا
- محمد گوهري 1399/08/05 سيد حميد حاجي سيد جوادي (استاد راهنما اول)
- ارائه ي يک طرح رمز نگاري امن براي به اشتراک گذاشتن اطلاعات در فاهاي ذخيره سازي پويا
- كبري علي محمدي 1399/04/31 سيد حميد حاجي سيد جوادي (استاد راهنما دوم)
- يک مدل بهبود يافته جستجو در داده هاي رمزگذاري شده با خاصيت وارسي پذيري
- انيسه نجفي 1399/04/31 سيد حميد حاجي سيد جوادي (استاد راهنما اول)
- يک پروتکل کنترل توپولوژي شبکه هاي شناختي lot بر پايه اتوماتاي يادگير
- علي بسمي 1399/03/10 سيد حميد حاجي سيد جوادي (استاد راهنما اول)
- کدگذاري منبع مبتني بر انتروپي با مرتبه زماني خطي
- پرويز قره باقري تركي 1398/06/14 سيد حميد حاجي سيد جوادي (استاد راهنما اول)
- جلوگيري از حمله 51: تجزيه و تحليل تصادفي از دو فاز اثبات کار در سکه بيتي
- محدثه شفيعي سروستاني 1398/06/14 سيد حميد حاجي سيد جوادي (استاد راهنما اول)
- طراحي يک سازوکار تشويقي مبتني برشهرت براي حل مسايل شبکه هاي اشتراک فايل نظير به نظير
- مرتضي بابازاده شاره 1397/06/31 سيد حميد حاجي سيد جوادي (استاد مشاور اول)
- ارايه يک طرح پيش توزيع کليد قطعي براي بهبود پارامترهاي ارزيابي شبکه هاي حسگر بي سيم
- ابراهيم قاسم زاده كلاگر 1397/04/26 سيد حميد حاجي سيد جوادي (استاد راهنما اول)
- ارايه الگوريتم توزيع شده کنترل توپولوژي در شبکه اقتضايي سيار شناختي
- پريسا رحماني 1396/06/29 سيد حميد حاجي سيد جوادي (استاد راهنما اول)
- استفاده از طرح باقيمانده براي مديريت کليد در شبکه هاي حس گر بي سيم
- وحيد مديري 1396/06/29 سيد حميد حاجي سيد جوادي (استاد راهنما اول)
- ارايه يک طرح امنيتي در شبکه هاي حسگر بي سيم مبتني بر ساختارهاي جبري ترکيباتي
- محدثه انزاني 1396/04/21 سيد حميد حاجي سيد جوادي (استاد راهنما اول)
- توسيع هاي اساسي با ويژگي L توسيعي
- سهيلا بابايي 1395/11/19 سيد حميد حاجي سيد جوادي (استاد راهنما 1)
- بررسي طيف برخي گراف هاي دوبخشي و ضرب کرونا تعميم يافته گراف ها
- طاهره سهيليان 1395/11/18 سيد حميد حاجي سيد جوادي (استاد راهنما 1)
- عليرضا فيوج لعلي 1395/11/16 سيد حميد حاجي سيد جوادي (استاد راهنما 1)
- ارزيابي و بهبود پروتکلهاي مسيريابي در شبکه هاي حسگر بي سيم
- محسن عرب 1395/06/29 سيد حميد حاجي سيد جوادي (استاد راهنما دوم)
- حلقه هاي AIP و تعميم انها
- غلامرضا انصاري 1394/11/06 سيد حميد حاجي سيد جوادي (استاد راهنما 1)
- حلقه هاي پوچ تميز و حلقه هاي پوچ تميز قوي
- ندا شكري وله زاقرد 1394/09/24 سيد حميد حاجي سيد جوادي (استاد راهنما 1)
- طراحي شبکه ي حسگر بيسيم امن مقاوم در برابر تغيير کليد
- پريسا دانشجو 1394/06/21 سيد حميد حاجي سيد جوادي (استاد راهنما اول)
- پنهان نگاري تصوير و اناليز پنهان نگاري
- بهبد کشاورزي 1393/11/04 سيد حميد حاجي سيد جوادي (استاد راهنما دوم)
- توسکا درگاهي 1393/09/23 سيد حميد حاجي سيد جوادي (استاد راهنما اول)
- توزيع و مديريت کليد در شبکه هاي حسگر بي سيم پويا
- سيدحسين عرفاني 1393/06/03 سيد حميد حاجي سيد جوادي (استاد راهنما اول)
- کاهش مصرف انرژي شبکه هاي حسگر ترکيبي بر اساس تکنيک چيدمان چند لايه اي
- نفيسه مسايلي 1390/11/29 سيد حميد حاجي سيد جوادي (استاد راهنما اول)
- بررسي کدهاي انگشت نگاري از طريق تحليل جديد کدهاي
- سولماز شريف نيا 1390/08/01 سيد حميد حاجي سيد جوادي (استاد راهنما اول)
- z-ايده ال هاي نسبي در C(X)
- جواد عبدي 1390/04/15 سيد حميد حاجي سيد جوادي (استاد راهنما اول)
- حلقه هاي با خاصيت (A)
- سودابه يزداني 1389/11/24 سيد حميد حاجي سيد جوادي (استاد 1)
- طيف ايده الهاي اول مينيمال از حلقه ها با شرط پوچ ساز
- طاهره حقيقي 1389/11/10 سيد حميد حاجي سيد جوادي (استاد راهنما اول)
- مولد اعداد شبه تصادفي با استفاده از الگوريتم هاي تکاملي مبتني بر اتوماتاي سلولي
- سيما سجادي 1389/06/15 سيد حميد حاجي سيد جوادي (استاد 1)
- پيدا کردن رشته هاي مرکزي بر پايه ي توپولوژي هاي موازي
- فاطمه سادات هل اتايي 1389/06/15 سيد حميد حاجي سيد جوادي (استاد 1)
- حلقه هاي دوو و توسيع هاي ار
- امين کاظمي 1389/06/15 سيد حميد حاجي سيد جوادي (استاد 1)
- الگوريتم پيوندي کلني مورچگان و ژنتيک(HACO-GA) براي مسائل زمانبندي جايگشت جريان خريد(PFSP)
- حميد دامن باغ 1389/06/15 سيد حميد حاجي سيد جوادي (استاد 1)
- محدثه انزاني 1389/04/28 سيد حميد حاجي سيد جوادي (استاد 1)
- استفاده از اتوماتاي سلولي چندلايه براي مساله مسيريابي ربات
- نسا نجفي 1388/11/13 سيد حميد حاجي سيد جوادي (استاد راهنما 1)
- مجيد اسلامي 1387/04/20 سيد حميد حاجي سيد جوادي (استاد راهنما 1)