Ahmad Baraani-Dastjerdi

Orcid: 0000-0003-3887-5702

Affiliations:
  • University of Isfahan, Iran


According to our database1, Ahmad Baraani-Dastjerdi authored at least 61 papers between 1995 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Distributed RMI-DBG model: Scalable iterative de Bruijn graph algorithm for short read genome assembly problem.
Expert Syst. Appl., December, 2023

An influences-adapted two-phase approach to stance detection in the diachronic perspective.
Expert Syst. Appl., November, 2023

Topic-aware multi-hop machine reading comprehension using weighted graphs.
Expert Syst. Appl., August, 2023

2022
Graph-based abstractive biomedical text summarization.
J. Biomed. Informatics, 2022

A dual framework for implicit and explicit emotion recognition: An ensemble of language models and computational linguistics.
Expert Syst. Appl., 2022

A Comprehensive Survey on Multi-hop Machine Reading Comprehension Approaches.
CoRR, 2022

A Comprehensive Survey on Multi-hop Machine Reading Comprehension Datasets and Metrics.
CoRR, 2022

CEFER: A Four Facets Framework based on Context and Emotion embedded features for Implicit and Explicit Emotion Recognition.
CoRR, 2022

2021
RMI-DBG algorithm: A more agile iterative de Bruijn graph algorithm in short read genome assembly.
J. Bioinform. Comput. Biol., 2021

CGenProg: Adaptation of cartesian genetic programming with migration and opposite guesses for automatic repair of software regression faults.
Expert Syst. Appl., 2021

A novel similarity measure for spatial entity resolution based on data granularity model: Managing inconsistencies in place descriptions.
Appl. Intell., 2021

2020
APRSuite: A suite of components and use cases based on categorical decomposition of automatic program repair techniques and tools.
J. Comput. Lang., 2020

LISA: Language-Independent Method for Aspect-Based Sentiment Analysis.
IEEE Access, 2020

2019
Code4Bench: A multidimensional benchmark of Codeforces data for different program analysis techniques.
J. Comput. Lang., 2019

2017
Cryptographic collusion-resistant protocols for secure sum.
Int. J. Electron. Secur. Digit. Forensics, 2017

Enriched LDA (ELDA): Combination of latent Dirichlet allocation with word co-occurrence analysis for aspect extraction.
Expert Syst. Appl., 2017

2016
Links between the personalities, styles and performance in computer programming.
J. Syst. Softw., 2016

Using Personality Traits to Understand the Influence of Personality on Computer Programming: An Empirical Study.
J. Cases Inf. Technol., 2016

NSAMD: A new approach to discover structured contiguous substrings in sequence datasets using Next-Symbol-Array.
Comput. Biol. Chem., 2016

2015
The Cloaked-Centroid protocol: location privacy protection for a group of users of location-based services.
Knowl. Inf. Syst., 2015

Influence of Personality on Programming Styles an Empirical Study.
J. Inf. Technol. Res., 2015

A New Experience in Persian Text Clustering using FarsNet Ontology.
J. Inf. Sci. Eng., 2015

Bidding strategy for agents in multi-attribute combinatorial double auction.
Expert Syst. Appl., 2015

2014
Improving Persian Document Classification Using Semantic Relations between Words.
CoRR, 2014

2013
Using Artificial Immune System and Fuzzy Logic for Alert Correlation.
Int. J. Netw. Secur., 2013

2012
Process Aware Host-based Intrusion Detection Model.
Int. J. Commun. Networks Inf. Secur., 2012

Alert correlation using artificial immune recognition system.
Int. J. Bio Inspired Comput., 2012

GLP: A cryptographic approach for group location privacy.
Comput. Commun., 2012

Investigating QoS support in WiMAX over Metro-Ethernet backhaul.
Proceedings of the 2012 Second International Conference on Digital Information and Communication Technology and it's Applications (DICTAP), 2012

2011
Optimizing the performance and robustness of type-2 fuzzy group nearest-neighbor queries.
Mob. Inf. Syst., 2011

Agent-based modeling of consumer decision making process based on power distance and personality.
Knowl. Based Syst., 2011

GREST - a type-2 fuzzy distance model for group nearest-neighbor queries.
J. Intell. Fuzzy Syst., 2011

The Spatial Nearest Neighbor Skyline Queries
CoRR, 2011

A Concurrency Control Method Based on Commitment Ordering in Mobile Databases
CoRR, 2011

An Extension of Semantic Proximity for Fuzzy Multivalued Dependencies in Fuzzy Relational Database
CoRR, 2011

A Human-Centric Approach to Group-Based Context-Awareness
CoRR, 2011

Semi-Automatic Labeling of Training Data Sets in Text Classification.
Comput. Inf. Sci., 2011

2010
Leaf constrained minimal spanning trees solved by modified quantum-behaved particle swarm optimization.
Artif. Intell. Rev., 2010

Using the Density of Paths for Semantic Relatedness Measurement.
Proceedings of the 2010 International Conference on Semantic Web & Web Services, 2010

Sudoku Using Parallel Simulated Annealing.
Proceedings of the Advances in Swarm Intelligence, First International Conference, 2010

KASRA Framework: A Service Oriented Enterprise Architecture Framework (SOEAF).
Proceedings of the 6th World Congress on Services, 2010

Using the whole structure of ontology for semantic relatedness measurement.
Proceedings of the 22nd International Conference on Software Engineering & Knowledge Engineering (SEKE'2010), Redwood City, San Francisco Bay, CA, USA, July 1, 2010

2009
Electronic promotion to new customers using mk.
Inf. Sci., 2009

An algorithm to mine general association rules from tabular data.
Inf. Sci., 2009

A heuristic personality-based bilateral multi-issue bargaining model in electronic commerce.
Int. J. Hum. Comput. Stud., 2009

A Hybrid Multi Objective Particle Swarm Optimization Method to Discover Biclusters in Microarray Data
CoRR, 2009

MobiCash: A New Anonymous Mobile Payment System Implemented by Elliptic Curve Cryptography.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

2008
One Step beyond Nash Equilibrium.
Proceedings of the 2008 International Conference on Scientific Computing, 2008

2007
An Electronic Marketplace Based on Reputation and Learning.
J. Theor. Appl. Electron. Commer. Res., 2007

A Novelty Detection Method Based on Frequent Itemsets.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2007

An Efficient Classifier Using Decision Trees and Association Rules.
Proceedings of the Advances in Data Mining. 7th Industrial Conference, 2007

A Context-Aware Service Discovery Framework Based on Human Needs Model.
Proceedings of the Service-Oriented Computing, 2007

Electronic Promotion to New Customers using a Fixed link mkNN Learning.
Proceedings of the 2007 International Conference on E-Learning, 2007

2005
Fast approximation of anti-random sequence generator for stream ciphering.
Proceedings of IEEE International Conference on Communications, 2005

A New Segmentation Method for Lung HRCT Images.
Proceedings of the International Conference on Digital Image Computing: Techniques and Applications, 2005

1997
Using Cryptographic Hash Functions for Discretionary Access Control in Object-Oriented Databases.
J. Univers. Comput. Sci., 1997

A Multi-Level View Model for Secure Object-Oriented Databases.
Data Knowl. Eng., 1997

1996
Modeling a multi-level secure object-oriented database using views.
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996

1995
A Cryptographic Mechanism for Object-Instance-Based Authorization in Object-Oriented Database Systems.
Proceedings of the OOER'95: Object-Oriented and Entity-Relationship Modelling, 1995

A Model of Authorization for Object-Oriented Databases based on Object Views.
Proceedings of the Deductive and Object-Oriented Databases, 1995

A Cryptographic Solution to Discretionary Access Control in Structurally Object-Oriented Databases.
Proceedings of the Sixth Australasian Database Conference, 1995


  Loading...