Search Results - "Rezvani, Mohammad Hossein"
-
1
An optimal context-aware content-based movie recommender system using genetic algorithm: a case study on MovieLens dataset
Published in Journal of experimental & theoretical artificial intelligence (16-11-2024)“…Most research on movie recommender systems has been conducted with Collaborative Filtering (CF) methods. The lack of sufficient information about users'…”
Get full text
Journal Article -
2
Multi-objective virtual network function placement using NSGA-II meta-heuristic approach
Published in The Journal of supercomputing (01-10-2019)“…Network function virtualization has facilitated network service development through the integration of network functions (NFs) such as firewalls, deep packet…”
Get full text
Journal Article -
3
Foam Rolling and Muscle and Joint Proprioception After Exercise-Induced Muscle Damage
Published in Journal of athletic training (01-01-2020)“…Foam rolling (FR) is considered an effective postexercise modality for reducing delayed-onset muscle soreness and enhancing recovery of muscle function…”
Get full text
Journal Article -
4
Multiobjective Offloading Optimization in Fog Computing Using Deep Reinforcement Learning
Published in Journal of computer networks and communications (26-09-2024)“…Edge computing allows IoT tasks to be processed by devices with passive processing capacity at the network’s edge and near IoT devices instead of being sent to…”
Get full text
Journal Article -
5
A novel optimized approach for resource reservation in cloud computing using producer–consumer theory of microeconomics
Published in The Journal of supercomputing (01-11-2019)“…Designing economic pricing mechanisms have recently attracted a great deal of attention in the context of cloud computing. We believe that microeconomics…”
Get full text
Journal Article -
6
Entropy‐aware energy‐efficient virtual machine placement in cloud environments using type information
Published in Concurrency and computation (14-11-2023)“…Summary One of the practical preferences of cloud service providers is to use specialized physical hosts. In other words, the goal is to place homogeneous…”
Get full text
Journal Article -
7
A bartering double auction resource allocation model in cloud environments
Published in Concurrency and computation (30-08-2022)“…Resource provisioning and allocation are two essential operations of cloud service providers (CSPs). Due to limited resources, it may sometimes not be…”
Get full text
Journal Article -
8
An Auction-Based Bid Prediction Mechanism for Fog-Cloud Offloading Using Q-Learning
Published in Complexity (New York, N.Y.) (17-01-2023)“…In the fog computing paradigm, if the computing resources of an end device are insufficient, the user’s tasks can be offloaded to nearby devices or the central…”
Get full text
Journal Article -
9
Strategic behavior modeling of multi-service overlay multicast networks based on auction mechanism design
Published in Journal of parallel and distributed computing (01-08-2011)“…Since the users of overlay multicast networks belong to different administrative domains, they are selfish in nature; resulting in degradation of performance…”
Get full text
Journal Article -
10
Joint optimization of energy consumption and time delay in IoT-fog-cloud computing environments using NSGA-II metaheuristic algorithm
Published in Journal of ambient intelligence and humanized computing (01-03-2023)“…Today, there exists a growing demand for Internet of Things (IoT) services in the form of vehicle networks, smart cities, augmented reality, virtual reality,…”
Get full text
Journal Article -
11
Utilization-aware energy-efficient virtual machine placement in cloud networks using NSGA-III meta-heuristic approach
Published in Cluster computing (01-12-2020)“…One of the most important issues in the context of cloud computing concerns the placement of virtual machines (VMs). The purpose of multi-objective virtual…”
Get full text
Journal Article -
12
Delay-aware optimization of energy consumption for task offloading in fog environments using metaheuristic algorithms
Published in Cluster computing (01-09-2021)“…Due to the limitations associated with the processing capability of mobile devices in cloud environments, various tasks are offloaded to the cloud server. This…”
Get full text
Journal Article -
13
Analysis of Decreased Rank Attack on RPL-Based IoT Networks
Published in 2024 10th International Conference on Web Research (ICWR) (24-04-2024)“…Routing within the Internet of Things(IoT) networks relies on utilizing the Routing Protocol for Low-Power and Lossy Networks (RPL). The RPL protocol is…”
Get full text
Conference Proceeding -
14
A novel neighborhood-based importance measure for social network influence maximization using NSGA-III
Published in 2024 10th International Conference on Artificial Intelligence and Robotics (QICAR) (29-02-2024)“…Information spreading on social networks is a chain process that depends on various factors for its speed of spread. Influential users with an impact on many…”
Get full text
Conference Proceeding -
15
Energy-aware and carbon-efficient VM placement optimization in cloud datacenters using evolutionary computing methods
Published in Soft computing (Berlin, Germany) (01-09-2022)“…One of the most critical concerns of cloud service providers is balancing renewable and fossil energy consumption. On the other hand, the policy of…”
Get full text
Journal Article -
16
Probabilistic Proximity-aware Resource Location in Peer-to-Peer Networks Using Resource Replication
Published in International journal of computers, communications & control (01-11-2010)“…Nowadays, content distribution has received remarkable attention in distributed computing researches and its applications typically allow personal computers,…”
Get full text
Journal Article -
17
An optimized message routing approach inspired by the landlord-peasants game in disruption-tolerant networks
Published in Ad hoc networks (15-03-2022)“…Disruption-tolerant networks (DTNs) have emerged as a paradigm shift for environments that may not have a continuous network connection. Although DTNs were…”
Get full text
Journal Article -
18
Ensemble classification using balanced data to predict customer churn: a case study on the telecom industry
Published in Multimedia tools and applications (01-05-2024)“…Today, in addition to reactive methods, companies try to use proactive techniques for the early detection of customer churn. Generally, gaining a new customer…”
Get full text
Journal Article -
19
An optimized content delivery approach based on demand–supply theory in disruption-tolerant networks
Published in Telecommunication systems (01-02-2021)“…Disruption-tolerance networks (DTNs) are suitable for applications that may lack continuous network connectivity. Examples of such applications include coupon…”
Get full text
Journal Article -
20
An Incentive-Compatible Routing Protocol for Delay-Tolerant Networks Using Second-Price Sealed-Bid Auction Mechanism
Published in Wireless personal communications (01-12-2021)“…Delay Tolerant Networks are a type of challenging, uninterrupted network in which there is not an end-to-end path between the source and the destination. These…”
Get full text
Journal Article