Mehdi Hosseinzadeh

According to our database1, Mehdi Hosseinzadeh authored at least 22 papers between 2014 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
Residual design of sink localization algorithms for wireless sensor networks.
J. High Speed Networks, 2019

Preventing Sybil attacks in P2P file sharing networks based on the evolutionary game model.
Inf. Sci., 2019

Nature-inspired meta-heuristic algorithms for solving the load balancing problem in the software-defined network.
Int. J. Communication Systems, 2019

2018
Cog-MAC Protocol: Channel Allocation in Cognitive Ad Hoc Networks Based on the Game of Learning Automata.
Wireless Personal Communications, 2018

Evaluation of users' privacy concerns by checking of their WhatsApp status.
Softw., Pract. Exper., 2018

An investigation into the requirements of privacy in social networks and factors contributing to users' concerns about violation of their privacy.
Social Netw. Analys. Mining, 2018

TCLAB: A New Topology Control Protocol in Cognitive MANETs Based on Learning Automata.
J. Network Syst. Manage., 2018

Reliability and high availability in cloud computing environments: a reference roadmap.
HCIS, 2018

Unital Design Based Sink Location Service for Wireless Sensor Networks.
IEEE Access, 2018

Load Balancing Mechanisms in the Software Defined Networks: A Systematic and Comprehensive Review of the Literature.
IEEE Access, 2018

Detection and Elimination of Spyware and Ransomware by Intercepting Kernel-Level System Routines.
IEEE Access, 2018

2017
Highly reliable architecture using the 80/20 rule in cloud computing datacenters.
Future Generation Comp. Syst., 2017

Probabilistic modeling to achieve load balancing in Expert Clouds.
Ad Hoc Networks, 2017

2016
Erratum: Midpoint Memory: A Special Memory Structure for Data-Oriented Models Implementation.
Journal of Circuits, Systems, and Computers, 2016

2015
A Reader Anti-collision Protocol for RFID-Enhanced Wireless Sensor Networks.
Wireless Personal Communications, 2015

Application-specific hybrid symmetric design of key pre-distribution for wireless sensor networks.
Security and Communication Networks, 2015

Midpoint Memory: A Special Memory Structure for Data-Oriented Models Implementation.
Journal of Circuits, Systems, and Computers, 2015

Efficient RNS Converter via Two-Part RNS.
Journal of Circuits, Systems, and Computers, 2015

Behavioral modeling and automated verification of a Cloud-based framework to share the knowledge and skills of human resources.
Computers in Industry, 2015

Expert Cloud: A Cloud-based framework to share the knowledge and skills of human resources.
Computers in Human Behavior, 2015

2014
Job scheduling in the Expert Cloud based on genetic algorithms.
Kybernetes, 2014

Resource discovery mechanisms in grid systems: A survey.
J. Network and Computer Applications, 2014


  Loading...