Mehdi Hosseinzadeh

Orcid: 0000-0002-8626-9857

Affiliations:
  • University Of Human Development, Sulaymaniyah, Iraq (since 2017)
  • Iran University of Medical Sciences, Tehran, Iran (since 2015)
  • Islamic Azad University, Department of Computer, Tehran, Iran (PhD 2008)


According to our database1, Mehdi Hosseinzadeh authored at least 179 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Longitudinal analysis of heart rate and physical activity collected from smartwatches.
CCF Trans. Pervasive Comput. Interact., March, 2024

A Q-learning-based smart clustering routing method in flying Ad Hoc networks.
J. King Saud Univ. Comput. Inf. Sci., January, 2024

2023
A novel fuzzy trust-based secure routing scheme in flying ad hoc networks.
Veh. Commun., December, 2023

Resource Management approaches to Internet of Vehicles.
Multim. Tools Appl., December, 2023

A novel Q-learning-based routing scheme using an intelligent filtering algorithm for flying ad hoc networks (FANETs).
J. King Saud Univ. Comput. Inf. Sci., December, 2023

Decentralized and scalable hybrid scheduling-clustering method for real-time applications in volatile and dynamic Fog-Cloud Environments.
J. Cloud Comput., December, 2023

A greedy perimeter stateless routing method based on a position prediction mechanism for flying ad hoc networks.
J. King Saud Univ. Comput. Inf. Sci., September, 2023

SIMOF: swarm intelligence multi-objective fuzzy thermal-aware routing protocol for WBANs.
J. Supercomput., July, 2023

A comprehensive and systematic literature review on the big data management techniques in the internet of things.
Wirel. Networks, April, 2023

An Energy-Efficient Data Offloading Strategy for 5G-Enabled Vehicular Edge Computing Networks Using Double Deep Q-Network.
Wirel. Pers. Commun., 2023

A secure remote health monitoring model for early disease diagnosis in cloud-based IoT environment.
Pers. Ubiquitous Comput., 2023

The impact of in-air features on the diagnosis of developmental dysgraphia.
J. Intell. Fuzzy Syst., 2023

An energy-aware scheme for solving the routing problem in the internet of things based on jaya and flower pollination algorithms.
J. Ambient Intell. Humaniz. Comput., 2023

Data cleansing mechanisms and approaches for big data analytics: a systematic study.
J. Ambient Intell. Humaniz. Comput., 2023

An elderly health monitoring system based on biological and behavioral indicators in internet of things.
J. Ambient Intell. Humaniz. Comput., 2023

LBAA: A novel load balancing mechanism in cloud environments using ant colony optimization and artificial bee colony algorithms.
Int. J. Commun. Syst., 2023

Task Scheduling Mechanisms for Fog Computing: A Systematic Survey.
IEEE Access, 2023

2022
An Energy-Aware IoT Routing Approach Based on a Swarm Optimization Algorithm and a Clustering Technique.
Wirel. Pers. Commun., 2022

An energy-aware clustering method in the IoT using a swarm-based algorithm.
Wirel. Networks, 2022

OLSR+: A new routing method based on fuzzy logic in flying ad-hoc networks (FANETs).
Veh. Commun., 2022

Correction to: Novel design and simulation of reversible ALU in quantum dot cellular automata.
J. Supercomput., 2022

Novel design and simulation of reversible ALU in quantum dot cellular automata.
J. Supercomput., 2022

A novel hierarchical fault management framework for wireless sensor networks: HFMF.
Peer-to-Peer Netw. Appl., 2022

Correction to: Automatic COVID-19 detection mechanisms and approaches from medical images: a systematic review.
Multim. Tools Appl., 2022

Automatic COVID-19 detection mechanisms and approaches from medical images: a systematic review.
Multim. Tools Appl., 2022

A new model for analyzing the role of new ICT-based technologies on the success of employees' learning programs.
Kybernetes, 2022

Toward the efficient service selection approaches in cloud computing.
Kybernetes, 2022

A comprehensive literature review on the medical learning systems in the developing countries.
Kybernetes, 2022

Data reduction in fog computing and internet of things: A systematic literature survey.
Internet Things, 2022

Federated learning-based IoT: A systematic literature review.
Int. J. Commun. Syst., 2022

The applications of the routing protocol for low-power and lossy networks (RPL) on the internet of mobile things.
Int. J. Commun. Syst., 2022

IoT based thermal aware routing protocols in wireless body area networks: Survey: IoT based thermal aware routing in WBAN.
IET Commun., 2022

Optimized fuzzy clustering in wireless sensor networks using improved squirrel search algorithm.
Fuzzy Sets Syst., 2022

Cloud healthcare services: A comprehensive and systematic literature review.
Trans. Emerg. Telecommun. Technol., 2022

Longitudinal Analysis of Heart Rate and Physical Activity Collected from Smartwatches.
CoRR, 2022

Performance Evaluation of Query Plan Recommendation with Apache Hadoop and Apache Spark.
CoRR, 2022

Artificial intelligence empowered threat detection in the Internet of Things: A systematic review.
Concurr. Comput. Pract. Exp., 2022

A new clustering-based routing method in the mobile internet of things using a krill herd algorithm.
Clust. Comput., 2022

Clustering for smart cities in the internet of things: a review.
Clust. Comput., 2022

Software architecture for IoT-based health-care systems with cloud/fog service model.
Clust. Comput., 2022

Join queries optimization in the distributed databases using a hybrid multi-objective algorithm.
Clust. Comput., 2022

Optimized fuzzy clustering using moth-flame optimization algorithm in wireless sensor networks.
Artif. Intell. Rev., 2022

Fault-Tolerant Load Balancing in Cloud Computing: A Systematic Literature Review.
IEEE Access, 2022

A New Combination Method for Improving Parallelism in Two and Three Level Perfect Nested Loops.
IEEE Access, 2022

2021
A Hybrid Protocol for Energy Management in Wireless Body Area Networks.
Wirel. Pers. Commun., 2021

Towards Data and Computation Offloading in Mobile Cloud Computing: Taxonomy, Overview, and Future Directions.
Wirel. Pers. Commun., 2021

Accelerating Louvain community detection algorithm on graphic processing unit.
J. Supercomput., 2021

Efficient designs of reversible sequential circuits.
J. Supercomput., 2021

A review on diagnostic autism spectrum disorder approaches based on the Internet of Things and Machine Learning.
J. Supercomput., 2021

A biological multiplexer, designs, and simulations.
J. Supercomput., 2021

Efficient binary to quaternary and vice versa converters: embedding in quaternary arithmetic circuits.
J. Supercomput., 2021

A multiple multilayer perceptron neural network with an adaptive learning algorithm for thyroid disease diagnosis in the internet of medical things.
J. Supercomput., 2021

Improving security using SVM-based anomaly detection: issues and challenges.
Soft Comput., 2021

Efficient techniques for fault detection and location of multiple controlled Toffoli-based reversible circuit.
Quantum Inf. Process., 2021

Artificial intelligence approaches and mechanisms for big data analytics: a systematic study.
PeerJ Comput. Sci., 2021

A technique for parallel query optimization using MapReduce framework and a semantic-based clustering method.
PeerJ Comput. Sci., 2021

CovidCTNet: an open-source deep learning approach to diagnose covid-19 using small cohort of CT images.
npj Digit. Medicine, 2021

A diagnostic prediction model for chronic kidney disease in internet of things platform.
Multim. Tools Appl., 2021

A new model for investigating the role of knowledge management system on the mental health of employees.
Kybernetes, 2021

The impact of knowledge on e-health: a systematic literature review of the advanced systems.
Kybernetes, 2021

Secure data aggregation methods and countermeasures against various attacks in wireless sensor networks: A comprehensive review.
J. Netw. Comput. Appl., 2021

Fog data management: A vision, challenges, and future directions.
J. Netw. Comput. Appl., 2021

A comprehensive survey and taxonomy of the SVM-based intrusion detection systems.
J. Netw. Comput. Appl., 2021

Towards secure intrusion detection systems using deep learning techniques: Comprehensive analysis and review.
J. Netw. Comput. Appl., 2021

Two Novel Current-Mode CNFET-Based Full Adders Using ULPD as Voltage Regulator.
J. Circuits Syst. Comput., 2021

Rumor conversations detection in twitter through extraction of structural features.
Inf. Technol. Manag., 2021

An automatic clustering technique for query plan recommendation.
Inf. Sci., 2021

A New Preventive Routing Method Based on Clustering and Location Prediction in the Mobile Internet of Things.
IEEE Internet Things J., 2021

11 Years with Wearables: Quantitative Analysis of Social Media, Academia, News Agencies, and Lead User Community from 2009-2020 on Wearable Technologies.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2021

Clustered Routing Method in the Internet of Things Using a Moth-Flame Optimization Algorithm.
Int. J. Commun. Syst., 2021

Correction to: Improved Butterfly Optimization Algorithm for Data Placement and Scheduling in Edge Computing Environments.
J. Grid Comput., 2021

Improved Butterfly Optimization Algorithm for Data Placement and Scheduling in Edge Computing Environments.
J. Grid Comput., 2021

Reliability-based fuzzy clustering ensemble.
Fuzzy Sets Syst., 2021

An efficient automated incremental density-based algorithm for clustering and classification.
Future Gener. Comput. Syst., 2021

A New High-Speed, Low-Area Residue-to-Binary Converter For the Moduli Set 2<sup>4n</sup> , 2<sup>2n</sup> + 1, 2<sup>n</sup> + 1, 2<sup>n</sup> - 1 Based on CRT-1.
Circuits Syst. Signal Process., 2021

Friendship selection and management in social internet of things: A systematic review.
Comput. Networks, 2021

The Role of the Internet of Things in Healthcare: Future Trends and Challenges.
Comput. Methods Programs Biomed., 2021

Using differential evolution and Moth-Flame optimization for scientific workflow scheduling in fog computing.
Appl. Soft Comput., 2021

Detection of rumor conversations in Twitter using graph convolutional networks.
Appl. Intell., 2021

Electrocardiogram signals-based user authentication systems using soft computing techniques.
Artif. Intell. Rev., 2021

Questioning the Security of Three Recent Authentication and Key Agreement Protocols.
IEEE Access, 2021

AMAPG: Advanced Mobile Authentication Protocol for GLOMONET.
IEEE Access, 2021

An Energy-Aware and Predictive Fuzzy Logic-Based Routing Scheme in Flying Ad Hoc Networks (FANETs).
IEEE Access, 2021

Deep Learning-Based Intrusion Detection Systems: A Systematic Review.
IEEE Access, 2021

A Novel Method for Detecting Future Generations of Targeted and Metamorphic Malware Based on Genetic Algorithm.
IEEE Access, 2021

Topic Discovery on Farsi, English, French, and Arabic Tweets Related to COVID-19 Using Text Mining Techniques.
Proceedings of the Navigating Healthcare Through Challenging Times - Proceedings of dHealth 2021, 2021

2020
Novel Fault Management Framework Using Markov Chain in Wireless Sensor Networks: FMMC.
Wirel. Pers. Commun., 2020

Novel fault-tolerant clustering-based multipath algorithm (FTCM) for wireless sensor networks.
Telecommun. Syst., 2020

Sampling Rate Prediction of Biosensors in Wireless Body Area Networks using Deep-Learning Methods.
Simul. Model. Pract. Theory, 2020

A comparison and analysis of the Twitter discourse related to weight loss and fitness.
Netw. Model. Anal. Health Informatics Bioinform., 2020

Using Twitter to raise the profile of childhood cancer awareness month.
Netw. Model. Anal. Health Informatics Bioinform., 2020

Service Selection Using Multi-criteria Decision Making: A Comprehensive Overview.
J. Netw. Syst. Manag., 2020

Deep-learning based forecasting sampling frequency of biosensors in wireless body area networks.
J. Intell. Fuzzy Syst., 2020

Comprehensive and Systematic Study on the Fault Tolerance Architectures in Cloud Computing.
J. Circuits Syst. Comput., 2020

Corrigendum to "Preventing Sybil Attacks in P2P File Sharing Networks Based on the Evolutionary Game Model" [Information Sciences 470 (2019) 94-108].
Inf. Sci., 2020

Optimum data collection and fusion schemes in WBSN.
Int. J. Sens. Networks, 2020

Energy-aware dynamic-link load balancing method for a software-defined network using a multi-objective artificial bee colony algorithm and genetic operators.
IET Commun., 2020

Efficient design of quaternary quantum comparator with only a single ancillary input.
IET Circuits Devices Syst., 2020

A Survey on the Computation Offloading Approaches in Mobile Edge/Cloud Computing Environment: A Stochastic-based Perspective.
J. Grid Comput., 2020

Multi-Objective Task and Workflow Scheduling Approaches in Cloud Computing: a Comprehensive Review.
J. Grid Comput., 2020

Efficient Designs of Reversible Majority Voters.
J. Electron. Test., 2020

CovidCTNet: An Open-Source Deep Learning Approach to Identify Covid-19 Using CT Image.
CoRR, 2020

Fault management frameworks in wireless sensor networks: A survey.
Comput. Commun., 2020

Priority-based task scheduling method over cloudlet using a swarm intelligence algorithm.
Clust. Comput., 2020

Network adapter architectures in network on chip: comprehensive literature review.
Clust. Comput., 2020

A Novel Lightweight Block Cipher-Based Mutual Authentication Protocol for Constrained Environments.
IEEE Access, 2020

Formal Verification of a Hybrid Machine Learning-Based Fault Prediction Model in Internet of Things Applications.
IEEE Access, 2020

An Author Gender Detection Method Using Whale Optimization Algorithm and Artificial Neural Network.
IEEE Access, 2020

A Hybrid Service Selection and Composition Model for Cloud-Edge Computing in the Internet of Things.
IEEE Access, 2020

A New Strong Adversary Model for RFID Authentication Protocols.
IEEE Access, 2020

An Enhanced Authentication Protocol for RFID Systems.
IEEE Access, 2020

A Systematic Study on the Recommender Systems in the E-Commerce.
IEEE Access, 2020

Scheduling of Scientific Workflows in Multi-Fog Environments Using Markov Models and a Hybrid Salp Swarm Algorithm.
IEEE Access, 2020

2019
An Online Cost-Based Job Scheduling Method by Cellular Automata in Cloud Computing Environment.
Wirel. Pers. Commun., 2019

A Priority-Based MAC Protocol for Energy Consumption and Delay Guaranteed in Wireless Body Area Networks.
Wirel. Pers. Commun., 2019

Accuracy and availability modeling of social networks for Internet of Things event detection applications.
Wirel. Networks, 2019

Design a novel routing criterion based on channel features and internal backup routes for cognitive radio network.
Telecommun. Syst., 2019

A rapid anti-collision algorithm with class parting and optimal frames length in RFID systems.
Telecommun. Syst., 2019

Tracing temporal communities and event prediction in dynamic social networks.
Soc. Netw. Anal. Min., 2019

Correction to: A lightweight signcryption scheme for defense against fragment duplication attack in the 6LoWPAN networks.
Peer-to-Peer Netw. Appl., 2019

A lightweight signcryption scheme for defense against fragment duplication attack in the 6LoWPAN networks.
Peer-to-Peer Netw. Appl., 2019

Residual design of sink localization algorithms for wireless sensor networks.
J. High Speed Networks, 2019

Preventing Sybil attacks in P2P file sharing networks based on the evolutionary game model.
Inf. Sci., 2019

Nature-inspired meta-heuristic algorithms for solving the load balancing problem in the software-defined network.
Int. J. Commun. Syst., 2019

Dependability analysis for characterizing Google cluster reliability.
Int. J. Commun. Syst., 2019

Query optimization mechanisms in the cloud environments: A systematic study.
Int. J. Commun. Syst., 2019

An efficient resource allocation scheme in a dense RFID network based on cellular learning automata.
Int. J. Commun. Syst., 2019

A fuzzy-based method for task scheduling in the cloud environments using inverted ant colony optimisation algorithm.
Int. J. Bio Inspired Comput., 2019

Efficient mapping algorithm on mesh-based NoCs in terms of cellular learning automata.
Int. Arab J. Inf. Technol., 2019

Deterministic and non-deterministic query optimization techniques in the cloud computing.
Concurr. Comput. Pract. Exp., 2019

Resource allocation mechanisms and approaches on the Internet of Things.
Clust. Comput., 2019

2018
TSRN: A Tabu Search-Based Routing Protocol for Named Data Networking.
Wirel. Pers. Commun., 2018

Cog-MAC Protocol: Channel Allocation in Cognitive Ad Hoc Networks Based on the Game of Learning Automata.
Wirel. Pers. Commun., 2018

A Lightweight Defense Approach to Mitigate Version Number and Rank Attacks in Low-Power and Lossy Networks.
Wirel. Pers. Commun., 2018

A Framework for Recognition and Confronting of Obfuscated Malwares Based on Memory Dumping and Filter Drivers.
Wirel. Pers. Commun., 2018

A Scalable and Lightweight Grouping Proof Protocol for Internet of Things Applications.
J. Supercomput., 2018

A full adder structure without cross-wiring in quantum-dot cellular automata with energy dissipation analysis.
J. Supercomput., 2018

A secure search protocol for lightweight and low-cost RFID systems.
Telecommun. Syst., 2018

Hijab in Twitter: Advocates and Critics: A Content Analysis of Hijab-Related Tweets.
IEEE Technol. Soc. Mag., 2018

Evaluation of users' privacy concerns by checking of their WhatsApp status.
Softw. Pract. Exp., 2018

An investigation into the requirements of privacy in social networks and factors contributing to users' concerns about violation of their privacy.
Soc. Netw. Anal. Min., 2018

TCLAB: A New Topology Control Protocol in Cognitive MANETs Based on Learning Automata.
J. Netw. Syst. Manag., 2018

Reliability and high availability in cloud computing environments: a reference roadmap.
Hum. centric Comput. Inf. Sci., 2018

A framework to expedite joint energy-reserve payment cost minimization using a custom-designed method based on Mixed Integer Genetic Algorithm.
Eng. Appl. Artif. Intell., 2018

A beacon analysis-based RFID reader anti-collision protocol for dense reader environments.
Comput. Commun., 2018

Unital Design Based Sink Location Service for Wireless Sensor Networks.
IEEE Access, 2018

Load Balancing Mechanisms in the Software Defined Networks: A Systematic and Comprehensive Review of the Literature.
IEEE Access, 2018

Detection and Elimination of Spyware and Ransomware by Intercepting Kernel-Level System Routines.
IEEE Access, 2018

2017
On the (Im)Possibility of Receiving Security Beyond 2 l Using an l-Bit PRNG.
Wirel. Pers. Commun., 2017

A New Certificateless and Secure Authentication Scheme for Ad hoc Networks.
Wirel. Pers. Commun., 2017

An Efficient Component for Designing Signed Reverse Converters for a Class of RNS Moduli Sets of Composite Form {2<sup>k</sup>, 2<sup>P</sup>-1}.
IEEE Trans. Very Large Scale Integr. Syst., 2017

A learning automata and clustering-based routing protocol for named data networking.
Telecommun. Syst., 2017

A Reduced-Bias Approach With a Lightweight Hard-Multiple Generator to Design a Radix-8 Modulo 2<sup>n</sup> + 1 Multiplier.
IEEE Trans. Circuits Syst. II Express Briefs, 2017

On the security of an RFID-based parking lot management system.
Int. J. Commun. Syst., 2017

Highly reliable architecture using the 80/20 rule in cloud computing datacenters.
Future Gener. Comput. Syst., 2017

Probabilistic modeling to achieve load balancing in Expert Clouds.
Ad Hoc Networks, 2017

2016
An authenticated encryption based grouping proof protocol for RFID systems.
Secur. Commun. Networks, 2016

Erratum: Midpoint Memory: A Special Memory Structure for Data-Oriented Models Implementation.
J. Circuits Syst. Comput., 2016

Area-delay-power-aware adder placement method for RNS reverse converter design.
Proceedings of the IEEE 7th Latin American Symposium on Circuits & Systems, 2016

2015
A Reader Anti-collision Protocol for RFID-Enhanced Wireless Sensor Networks.
Wirel. Pers. Commun., 2015

Reverse Converter Design via Parallel-Prefix Adders: Novel Components, Methodology, and Implementations.
IEEE Trans. Very Large Scale Integr. Syst., 2015

Application-specific hybrid symmetric design of key pre-distribution for wireless sensor networks.
Secur. Commun. Networks, 2015

Midpoint Memory: A Special Memory Structure for Data-Oriented Models Implementation.
J. Circuits Syst. Comput., 2015

Efficient RNS Converter via Two-Part RNS.
J. Circuits Syst. Comput., 2015

On the (im)possibility of receiving security beyond 2<sup>l</sup> using an l-bit PRNG: the case of Wang et. al. protocol.
IACR Cryptol. ePrint Arch., 2015

Behavioral modeling and automated verification of a Cloud-based framework to share the knowledge and skills of human resources.
Comput. Ind., 2015

Expert Cloud: A Cloud-based framework to share the knowledge and skills of human resources.
Comput. Hum. Behav., 2015

2014
Job scheduling in the Expert Cloud based on genetic algorithms.
Kybernetes, 2014

Resource discovery mechanisms in grid systems: A survey.
J. Netw. Comput. Appl., 2014

Efficient Reverse Converters for 4-Moduli Sets {2<sup>2n-1</sup>-1, 2<sup>n</sup>, 2<sup>n</sup>+1, 2<sup>n</sup>-1} and {2<sup>2n-1</sup>, 2<sup>2n-1</sup>-1, 2<sup>n</sup>+1, 2<sup>n</sup>-1} Based on CRTs Algorithm.
Circuits Syst. Signal Process., 2014

Rethinking reverse converter design: From algorithms to hardware components.
Proceedings of the 2014 International Symposium on Integrated Circuits (ISIC), 2014

2012
Reverse converter for the flexible moduli set {2<sup><i>n</i>+<i>k</i></sup>, 2<sup>2<i>n</i>-1</sup>-1, 2<sup><i>n</i>/2</sup>+1, 2<sup><i>n</i>/2</sup>-1}.
IEICE Electron. Express, 2012

HCABS: The hierarchical clustering algorithm based on soft threshold and cluster member bounds for wireless sensor networks.
IEICE Electron. Express, 2012

2011
A Novel Adder Circuit for Module rn using One-hot Residue Number.
J. Next Gener. Inf. Technol., 2011

An Efficient Reverse Converter for the New Four-Moduli Set {2<sup>2n</sup>, 2<sup>n+1</sup> - 1, 2<sup>n/2</sup> + 1, 2<sup>n/2</sup> - 1}.
J. Circuits Syst. Comput., 2011

2010
A new four-moduli set with high speed RNS arithmetic unit and efficient reverse converter.
IEICE Electron. Express, 2010

Redundant Multi-Level one-hot Residue Number System based error correction codes.
Proceedings of the 2010 East-West Design & Test Symposium, 2010

2008
Reliable and Secure Chip Level Communication by residue number System Code.
Trans. SDPS, 2008

An improved reverse converter for the moduli set {2<sup>n</sup>-1, 2<sup>n</sup>, 2<sup>n</sup>+1, 2<sup>n+1</sup>-1}.
IEICE Electron. Express, 2008


  Loading...