Search Results - "Hosseinzadeh, Mehdi"

Refine Results
  1. 1

    Fault-Tolerant Supervisory Controller for a Hybrid AC/DC Micro-Grid by Hosseinzadeh, Mehdi, Salmasi, Farzad Rajaei

    Published in IEEE transactions on smart grid (01-07-2018)
    “…In this paper, a fault-tolerant supervisory controller is proposed for a hybrid ac/dc micro-grid. In the hybrid micro-grid, dc sources, energy storage, and…”
    Get full text
    Journal Article
  2. 2

    Fault-Tolerant Control for Microgrids—Recent Developments and Future Directions by Hosseinzadeh, Mehdi

    Published in Energies (Basel) (01-11-2022)
    “…Microgrids are defined as a cluster of loads, distributed energy resources, and storage devices, and they are receiving worldwide attention due to the…”
    Get full text
    Journal Article
  3. 3

    Context-aware recommender systems using hierarchical hidden Markov model by Hosseinzadeh Aghdam, Mehdi

    Published in Physica A (15-03-2019)
    “…Recommender systems often generate recommendations based on user’s prior preferences. Users’ preferences may change over time due to user mode change or…”
    Get full text
    Journal Article
  4. 4

    A Survey on the Computation Offloading Approaches in Mobile Edge/Cloud Computing Environment: A Stochastic-based Perspective by Shakarami, Ali, Ghobaei-Arani, Mostafa, Masdari, Mohammad, Hosseinzadeh, Mehdi

    Published in Journal of grid computing (01-12-2020)
    “…Fast growth of produced data from deferent smart devices such as smart mobiles, IoT/IIoT networks, and vehicular networks running different specific…”
    Get full text
    Journal Article
  5. 5

    PAPR reduction in OFDM systems: An efficient PTS approach based on particle swarm optimization by Hosseinzadeh Aghdam, Mehdi, Sharifi, Abbas Ali

    Published in ICT express (01-09-2019)
    “…Orthogonal frequency division multiplexing (OFDM) is a multicarrier modulation technique for high-speed data transmission in wireless communications. In an…”
    Get full text
    Journal Article
  6. 6

    Using differential evolution and Moth–Flame optimization for scientific workflow scheduling in fog computing by Ahmed, Omed Hassan, Lu, Joan, Xu, Qiang, Ahmed, Aram Mahmood, Rahmani, Amir Masoud, Hosseinzadeh, Mehdi

    Published in Applied soft computing (01-11-2021)
    “…Fog computing is an interesting technology aimed at providing various processing and storage resources at the IoT networks’ edge. Energy consumption is one of…”
    Get full text
    Journal Article
  7. 7

    An energy-aware and Q-learning-based area coverage for oil pipeline monitoring systems using sensors and Internet of Things by Rahmani, Amir Masoud, Ali, Saqib, Malik, Mazhar Hussain, Yousefpoor, Efat, Yousefpoor, Mohammad Sadegh, Mousavi, Amir, khan, Faheem, Hosseinzadeh, Mehdi

    Published in Scientific reports (10-06-2022)
    “…Pipelines are the safest tools for transporting oil and gas. However, the environmental effects and sabotage of hostile people cause corrosion and decay of…”
    Get full text
    Journal Article
  8. 8

    An Energy-Aware IoT Routing Approach Based on a Swarm Optimization Algorithm and a Clustering Technique by Sadrishojaei, Mahyar, Navimipour, Nima Jafari, Reshadi, Midia, Hosseinzadeh, Mehdi

    Published in Wireless personal communications (01-12-2022)
    “…The Internet of Things (IoT) comprises many nodes dispersed around a particular target region, and it has lately been applied in a variety of sectors such as…”
    Get full text
    Journal Article
  9. 9

    Tailoring friction stir welding and postheat treatment of high-carbon steels to obtain nanostructured bainite by Avishan, Behzad, Khanmiri, Mehdi Hosseinzadeh, Aghdam, Majid Charchi, Heidarzadeh, Akbar

    Published in Journal of adhesion science and technology (02-08-2024)
    “…Conventional welding processes destroy the unique microstructural characteristics in nanobainitic steels. A novel method, i.e. tailored friction stir welding…”
    Get full text
    Journal Article
  10. 10

    Text feature selection using ant colony optimization by Aghdam, Mehdi Hosseinzadeh, Ghasem-Aghaee, Nasser, Basiri, Mohammad Ehsan

    Published in Expert systems with applications (01-04-2009)
    “…Feature selection and feature extraction are the most important steps in classification systems. Feature selection is commonly used to reduce dimensionality of…”
    Get full text
    Journal Article
  11. 11

    Detection of rumor conversations in Twitter using graph convolutional networks by Lotfi, Serveh, Mirzarezaee, Mitra, Hosseinzadeh, Mehdi, Seydi, Vahid

    “…With the increasing popularity of the social network Twitter and its use to propagate information, it is of vital importance to detect rumors prior to their…”
    Get full text
    Journal Article
  12. 12

    Enhancing healthcare IoT systems for diabetic patient monitoring: Integration of Harris Hawks and grasshopper optimization algorithms by Hosseinzadeh, Mehdi, Arabi, Zohre, Ali, Saqib, Min, Hong, Malik, Mazhar Hussain

    Published in PloS one (29-05-2024)
    “…The integration of the Internet of Things (IoT) in healthcare, especially for people with diabetes, allows for constant health monitoring. This means that…”
    Get full text
    Journal Article
  13. 13

    A Novel Method for Detecting Future Generations of Targeted and Metamorphic Malware Based on Genetic Algorithm by Javaheri, Danial, Lalbakhsh, Pooia, Hosseinzadeh, Mehdi

    Published in IEEE access (2021)
    “…This paper presents a novel solution for detecting rare and mutating malware programs and provides a strategy to address the scarcity of datasets for modeling…”
    Get full text
    Journal Article
  14. 14

    An energy-aware clustering method in the IoT using a swarm-based algorithm by Sadrishojaei, Mahyar, Jafari Navimipour, Nima, Reshadi, Midia, Hosseinzadeh, Mehdi, Unal, Mehmet

    Published in Wireless networks (2022)
    “…Internet of Things (IoT) is a set of interrelated devices on the Internet platform. It can receive and send data to make human life more efficient and…”
    Get full text
    Journal Article
  15. 15

    A novel constrained non-negative matrix factorization method based on users and items pairwise relationship for recommender systems by Hosseinzadeh Aghdam, Mehdi

    Published in Expert systems with applications (01-06-2022)
    “…Non-negative matrix factorization (NMF) is a famous method to learn parts-based representations of non-negative data. It has been used successfully in various…”
    Get full text
    Journal Article
  16. 16

    An Energy-Efficient Data Offloading Strategy for 5G-Enabled Vehicular Edge Computing Networks Using Double Deep Q-Network by Moghaddasi, Komeil, Rajabi, Shakiba, Soleimanian Gharehchopogh, Farhad, Hosseinzadeh, Mehdi

    Published in Wireless personal communications (01-12-2023)
    “…In the era of fifth-generation (5G)-enabled vehicular edge computing (VEC), efficient data offloading strategies are essential. The complexities inherent in…”
    Get full text
    Journal Article
  17. 17

    Accelerating Louvain community detection algorithm on graphic processing unit by Mohammadi, Maryam, Fazlali, Mahmood, Hosseinzadeh, Mehdi

    Published in The Journal of supercomputing (01-06-2021)
    “…The Louvain community detection algorithm is a hierarchal clustering method categorized in the NP-hard problem. Its execution time to find communities in large…”
    Get full text
    Journal Article
  18. 18

    A novel ant colony optimization algorithm for PAPR reduction of OFDM signals by Hosseinzadeh Aghdam, Mehdi, Sharifi, Abbas Ali

    “…Summary The high peak‐to‐average power ratio (PAPR) is the main challenge of orthogonal frequency division multiplexing (OFDM) systems. Partial transmit…”
    Get full text
    Journal Article
  19. 19

    Deep Learning-Based Intrusion Detection Systems: A Systematic Review by Lansky, Jan, Ali, Saqib, Mohammadi, Mokhtar, Majeed, Mohammed Kamal, Karim, Sarkhel H. Taher, Rashidi, Shima, Hosseinzadeh, Mehdi, Rahmani, Amir Masoud

    Published in IEEE access (2021)
    “…Nowadays, the ever-increasing complication and severity of security attacks on computer networks have inspired security researchers to incorporate different…”
    Get full text
    Journal Article
  20. 20

    Load Balancing Mechanisms in the Software Defined Networks: A Systematic and Comprehensive Review of the Literature by Neghabi, Ali Akbar, Jafari Navimipour, Nima, Hosseinzadeh, Mehdi, Rezaee, Ali

    Published in IEEE access (01-01-2018)
    “…With the expansion of the network and increasing their users, as well as emerging new technologies, such as cloud computing and big data, managing traditional…”
    Get full text
    Journal Article