Search Results - "Hosseinzadeh, Mehdi"
-
1
Fault-Tolerant Supervisory Controller for a Hybrid AC/DC Micro-Grid
Published in IEEE transactions on smart grid (01-07-2018)“…In this paper, a fault-tolerant supervisory controller is proposed for a hybrid ac/dc micro-grid. In the hybrid micro-grid, dc sources, energy storage, and…”
Get full text
Journal Article -
2
Fault-Tolerant Control for Microgrids—Recent Developments and Future Directions
Published in Energies (Basel) (01-11-2022)“…Microgrids are defined as a cluster of loads, distributed energy resources, and storage devices, and they are receiving worldwide attention due to the…”
Get full text
Journal Article -
3
Context-aware recommender systems using hierarchical hidden Markov model
Published in Physica A (15-03-2019)“…Recommender systems often generate recommendations based on user’s prior preferences. Users’ preferences may change over time due to user mode change or…”
Get full text
Journal Article -
4
A Survey on the Computation Offloading Approaches in Mobile Edge/Cloud Computing Environment: A Stochastic-based Perspective
Published in Journal of grid computing (01-12-2020)“…Fast growth of produced data from deferent smart devices such as smart mobiles, IoT/IIoT networks, and vehicular networks running different specific…”
Get full text
Journal Article -
5
PAPR reduction in OFDM systems: An efficient PTS approach based on particle swarm optimization
Published in ICT express (01-09-2019)“…Orthogonal frequency division multiplexing (OFDM) is a multicarrier modulation technique for high-speed data transmission in wireless communications. In an…”
Get full text
Journal Article -
6
Using differential evolution and Moth–Flame optimization for scientific workflow scheduling in fog computing
Published in Applied soft computing (01-11-2021)“…Fog computing is an interesting technology aimed at providing various processing and storage resources at the IoT networks’ edge. Energy consumption is one of…”
Get full text
Journal Article -
7
An energy-aware and Q-learning-based area coverage for oil pipeline monitoring systems using sensors and Internet of Things
Published in Scientific reports (10-06-2022)“…Pipelines are the safest tools for transporting oil and gas. However, the environmental effects and sabotage of hostile people cause corrosion and decay of…”
Get full text
Journal Article -
8
An Energy-Aware IoT Routing Approach Based on a Swarm Optimization Algorithm and a Clustering Technique
Published in Wireless personal communications (01-12-2022)“…The Internet of Things (IoT) comprises many nodes dispersed around a particular target region, and it has lately been applied in a variety of sectors such as…”
Get full text
Journal Article -
9
Tailoring friction stir welding and postheat treatment of high-carbon steels to obtain nanostructured bainite
Published in Journal of adhesion science and technology (02-08-2024)“…Conventional welding processes destroy the unique microstructural characteristics in nanobainitic steels. A novel method, i.e. tailored friction stir welding…”
Get full text
Journal Article -
10
Text feature selection using ant colony optimization
Published in Expert systems with applications (01-04-2009)“…Feature selection and feature extraction are the most important steps in classification systems. Feature selection is commonly used to reduce dimensionality of…”
Get full text
Journal Article -
11
Detection of rumor conversations in Twitter using graph convolutional networks
Published in Applied intelligence (Dordrecht, Netherlands) (01-07-2021)“…With the increasing popularity of the social network Twitter and its use to propagate information, it is of vital importance to detect rumors prior to their…”
Get full text
Journal Article -
12
Enhancing healthcare IoT systems for diabetic patient monitoring: Integration of Harris Hawks and grasshopper optimization algorithms
Published in PloS one (29-05-2024)“…The integration of the Internet of Things (IoT) in healthcare, especially for people with diabetes, allows for constant health monitoring. This means that…”
Get full text
Journal Article -
13
A Novel Method for Detecting Future Generations of Targeted and Metamorphic Malware Based on Genetic Algorithm
Published in IEEE access (2021)“…This paper presents a novel solution for detecting rare and mutating malware programs and provides a strategy to address the scarcity of datasets for modeling…”
Get full text
Journal Article -
14
An energy-aware clustering method in the IoT using a swarm-based algorithm
Published in Wireless networks (2022)“…Internet of Things (IoT) is a set of interrelated devices on the Internet platform. It can receive and send data to make human life more efficient and…”
Get full text
Journal Article -
15
A novel constrained non-negative matrix factorization method based on users and items pairwise relationship for recommender systems
Published in Expert systems with applications (01-06-2022)“…Non-negative matrix factorization (NMF) is a famous method to learn parts-based representations of non-negative data. It has been used successfully in various…”
Get full text
Journal Article -
16
An Energy-Efficient Data Offloading Strategy for 5G-Enabled Vehicular Edge Computing Networks Using Double Deep Q-Network
Published in Wireless personal communications (01-12-2023)“…In the era of fifth-generation (5G)-enabled vehicular edge computing (VEC), efficient data offloading strategies are essential. The complexities inherent in…”
Get full text
Journal Article -
17
Accelerating Louvain community detection algorithm on graphic processing unit
Published in The Journal of supercomputing (01-06-2021)“…The Louvain community detection algorithm is a hierarchal clustering method categorized in the NP-hard problem. Its execution time to find communities in large…”
Get full text
Journal Article -
18
A novel ant colony optimization algorithm for PAPR reduction of OFDM signals
Published in International journal of communication systems (10-01-2021)“…Summary The high peak‐to‐average power ratio (PAPR) is the main challenge of orthogonal frequency division multiplexing (OFDM) systems. Partial transmit…”
Get full text
Journal Article -
19
Deep Learning-Based Intrusion Detection Systems: A Systematic Review
Published in IEEE access (2021)“…Nowadays, the ever-increasing complication and severity of security attacks on computer networks have inspired security researchers to incorporate different…”
Get full text
Journal Article -
20
Load Balancing Mechanisms in the Software Defined Networks: A Systematic and Comprehensive Review of the Literature
Published in IEEE access (01-01-2018)“…With the expansion of the network and increasing their users, as well as emerging new technologies, such as cloud computing and big data, managing traditional…”
Get full text
Journal Article