Mohammad Fathian

Orcid: 0000-0002-6909-6974

According to our database1, Mohammad Fathian authored at least 53 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Refining breast cancer biomarker discovery and drug targeting through an advanced data-driven approach.
BMC Bioinform., December, 2024

An enhanced Teaching-Learning-Based Optimization (TLBO) with Grey Wolf Optimizer (GWO) for text feature selection and clustering.
CoRR, 2024

2023
Alternate Solutions for Influence Maximization: Beyond theoretical approximation by the Genetic Algorithm Framework.
Swarm Evol. Comput., December, 2023

A novel bio-inspired hybrid multi-filter wrapper gene selection method with ensemble classifier for microarray data.
Neural Comput. Appl., June, 2023

Risk-Averse Influence Maximization.
J. Supercomput., 2023

2022
Service composition in dynamic environments: A systematic review and future directions.
J. Syst. Softw., 2022

Determining the factors affecting the acceptance of social commerce in service-oriented businesses using the fuzzy Delphi method.
Int. J. Electron. Bus., 2022

An Ensemble-Based Credit Card Fraud Detection Algorithm Using an Efficient Voting Strategy.
Comput. J., 2022

2021
SAIoT: Scalable Anomaly-Aware Services Composition in CloudIoT Environments.
IEEE Internet Things J., 2021

A novel multi-objective forest optimization algorithm for wrapper feature selection.
Expert Syst. Appl., 2021

A Machine Learning Approach for DDoS Detection on IoT Devices.
CoRR, 2021

2020
Robust design and planning for a multi-mode multi-product supply network: a dairy industry case study.
Oper. Res., 2020

ARC: Anomaly-aware Robust Cloud-integrated IoT service composition based on uncertainty in advertised quality of service values.
J. Syst. Softw., 2020

Investigating the effect of gamification elements on bank customers to personalize gamified systems.
Int. J. Hum. Comput. Stud., 2020

Evolutionary Algorithms For k-Anonymity In Social Networks Based On Clustering Approach.
Comput. J., 2020

Multi-objective optimization model in a heterogeneous weighted network through key nodes identification in overlapping communities.
Comput. Ind. Eng., 2020

A BOA-based adaptive strategy with multi-party perspective for automated multilateral negotiations.
Appl. Intell., 2020

Conceptualizing the Role of Gamification in Contemporary Enterprises.
IEEE Access, 2020

2018
A reputation system for e-marketplaces based on pairwise comparison.
Knowl. Inf. Syst., 2018

Location and transportation planning in supply chains under uncertainty and congestion by using an improved electromagnetism-like algorithm.
J. Intell. Manuf., 2018

2017
A New Optimization Model for Reliable Team Formation Problem Considering Experts' Collaboration Network.
IEEE Trans. Engineering Management, 2017

Behavior-based indices for evaluating communities in online social networks.
Intell. Data Anal., 2017

Multiobjective approach for detecting communities in heterogeneous networks.
Comput. Intell., 2017

2016
Erratum to: Two New Clustering Algorithms for Vehicular Ad-Hoc Network Based on Ant Colony System.
Wirel. Pers. Commun., 2016

Offering a hybrid approach of data mining to predict the customer churn based on bagging and boosting methods.
Kybernetes, 2016

2015
Two New Clustering Algorithms for Vehicular Ad-Hoc Network Based on Ant Colony System.
Wirel. Pers. Commun., 2015

New clustering algorithms for vehicular ad-hoc network in a highway communication environment.
Wirel. Networks, 2015

A hybrid artificial immune network for detecting communities in complex networks.
Computing, 2015

2014
A novel utility-based model for identifying the customer value in online shopping.
Int. J. Electron. Bus., 2014

Designing an ontology-based multi-agent system for supply chain performance measurement using graph traversal.
Int. J. Comput. Integr. Manuf., 2014

Measuring and analysing customer satisfaction with multi-criteria satisfaction analysis (MUSA) model: an electronic retailing case study.
Int. J. Bus. Inf. Syst., 2014

A linear MmTSP formulation of robust location-routing problem: a dairy products supply chain case study.
Int. J. Appl. Decis. Sci., 2014

Applying Simulated Annealing to a generalized Cell Formation Problem considering Alternative Routings and Machine reliability.
Asia Pac. J. Oper. Res., 2014

2013
A new critical path method and a memetic algorithm for flexible job shop scheduling with overlapping operations.
Simul., 2013

Summarising customer online reviews using a new text mining approach.
Int. J. Bus. Inf. Syst., 2013

2012
Efficient and secure credit card payment protocol for mobile devices.
Int. J. Inf. Comput. Secur., 2012

2011
An Application of Locally Linear Model Tree Algorithm for Predictive Accuracy of Credit Scoring.
Proceedings of the Model and Data Engineering - First International Conference, 2011

2010
A novel algorithm for ontology matching.
J. Inf. Sci., 2010

Mining important association rules based on the RFMD technique.
Int. J. Data Anal. Tech. Strateg., 2010

Mining frequent itemsets in the presence of malicious participants.
IET Inf. Secur., 2010

Solving the Problem of Flow Shop Scheduling by Neural Network Approach.
Proceedings of the Networked Digital Technologies - Second International Conference, 2010

Process Mining Approach to Promote Business Intelligence in Iranian Detectives' Police.
Proceedings of the Networked Digital Technologies - Second International Conference, 2010

2009
Identifying the cause and effect factors of agile NPD process with fuzzy DEMATEL method: the case of Iranian companies.
J. Intell. Manuf., 2009

Optimal pricing model for electronic products.
Comput. Ind. Eng., 2009

A robust trust establishment framework using Dempster-Shafer theory for MANETs.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009

2008
Efficient anonymous secure auction schema (ASAS) without fully trustworthy auctioneer.
Inf. Manag. Comput. Secur., 2008

How to Assess Knowledge Management: Developing a Quantitative Model.
Int. J. Electron. Bus. Manag., 2008

2007
The development of an expert system for effective selection and appointment of the jobs applicants in human resource management.
Comput. Ind. Eng., 2007

Comparing simulated annealing and genetic algorithm in learning FCM.
Appl. Math. Comput., 2007

Application of honey-bee mating optimization algorithm on clustering.
Appl. Math. Comput., 2007

Investigation of Effective Factors on e-Readiness of Iranian Manufacturing SMEs.
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007

Management Advantages of Object Classification in Role-Based Access Control (RBAC).
Proceedings of the Advances in Computer Science, 2007

2006
A modular approach to ERP system selection: A case study.
Inf. Manag. Comput. Secur., 2006


  Loading...