Bahram Sadeghi Bigham

Orcid: 0000-0003-3387-3193

According to our database1, Bahram Sadeghi Bigham authored at least 37 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A novel buffering fault-tolerance approach for network on chip (NoC).
IET Circuits Devices Syst., July, 2023

Minimum constraint removal problem for line segments is NP-hard.
Discret. Math. Algorithms Appl., January, 2023

2022
Minimum landmarks for robot localization in orthogonal environments.
Evol. Intell., 2022

Predicting Points of Interest with Social Relations and Geographical-Temporal Information.
Proceedings of the Intelligent Systems Design and Applications - 22nd International Conference on Intelligent Systems Design and Applications (ISDA 2022) Held December 12-14, 2022, 2022

2021
E-learning model for art education: Case study in Iran.
CoRR, 2021

Fingerprint Matching using the Onion Peeling Approach and Turning Function.
CoRR, 2021

Tiling Rectangles and the Plane using Squares of Integral Sides.
CoRR, 2021

Lower Bound for Sculpture Garden Problem.
CoRR, 2021

A new metaheuristic approach for the art gallery problem.
CoRR, 2021

Creating A New Color Space utilizing PSO and FCM to Perform Skin Detection by using Neural Network and ANFIS.
CoRR, 2021

Separating Geometric Data with Minimum Cost: Two Disjoint Convex Hulls.
CoRR, 2021

2020
A polynomial time algorithm for big data in a special case of minimum constraint removal problem.
Evol. Intell., 2020

2018
A multi-objective market-driven framework for power matching in the smart grid.
Eng. Appl. Artif. Intell., 2018

Iterated Greedy Algorithms for the Hop-Constrained Steiner Tree Problem.
CoRR, 2018

Greedy Harmony Search Algorithm for the Hop Constrained Connected Facility Location.
CoRR, 2018

EXTRA: EXpertise-Boosted Model for Trust-Based Recommendation System Based on Supervised Random Walk.
Comput. Informatics, 2018

Extracting an English-Persian Parallel Corpus from Comparable Corpora.
Proceedings of the Eleventh International Conference on Language Resources and Evaluation, 2018

2017
Over-sampling via under-sampling in strongly imbalanced data.
Int. J. Adv. Intell. Paradigms, 2017

A neural network approach to navigation of a mobile robot and obstacle avoidance in dynamic and unknown environments.
Turkish J. Electr. Eng. Comput. Sci., 2017

A New Image Mining Approach for Detecting Micro-Calcification in Digital Mammograms.
Appl. Artif. Intell., 2017

2016
Adaptive Data Hiding, Using Pixel-Value-Differencing and LSB Substitution.
Cybern. Syst., 2016

2014
Design, Implementation and Evaluation of MTBDD based Fuzzy Sets and Binary Fuzzy Relations.
CoRR, 2014

A Greedy Agent-Based Resource Allocation in the Smart Electricity Markets.
Proceedings of the Artificial Intelligence Applications and Innovations, 2014

2013
A combinatorial cooperative-tabu search feature reduction approach.
Sci. Iran., 2013

Using Voronoi diagrams to solve a hybrid facility location problem with attentive facilities.
Inf. Sci., 2013

2012
Near-pole polar diagram of objects and duality.
J. Comput. Sci., 2012

2011
An applicable master plan to develop city's information technology infrastructure.
Proceedings of the First World Conference on Information Technology, 2011

Good's history and trust in electronic commerce.
Proceedings of the First World Conference on Information Technology, 2011

Fingerprint Matching Using an Onion Layer Algorithm of Computational Geometry Based on Level 3 Features.
Proceedings of the Digital Information and Communication Technology and Its Applications, 2011

A new fingerprint matching approach using level 2 and level 3 features.
Proceedings of the Fourth International C* Conference on Computer Science & Software Engineering, 2011

2010
An Ant Colony Algorithm for the Minimum Weight Triangulation.
Proceedings of the Prodeedings of the 2010 International Conference on Computational Science and Its Applications, 2010

An optimal solution for dynamic polar diagram.
Proceedings of the 22nd Annual Canadian Conference on Computational Geometry, 2010

2008
Dynamic polar diagram.
Inf. Process. Lett., 2008

Data Encryption Based On Protein Synthesis.
Proceedings of the 2008 International Conference on Genetic and Evolutionary Methods, 2008

Phishing Guard and Antivirus: A New Approach.
Proceedings of the 2008 International Conference on Security & Management, 2008

2007
Applications of Chaos Model in Software Development Process.
Proceedings of the 2007 International Conference on Software Engineering Research & Practice, 2007

Solving Semantic Problems in Chaff and Winnowing Problem by Using Cryptography.
Proceedings of the 2007 International Conference on Security & Management, 2007


  Loading...