Mohammad Izadi

Orcid: 0000-0003-3561-3942

According to our database1, Mohammad Izadi authored at least 76 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Knowledge Distillation on Spatial-Temporal Graph Convolutional Network for Traffic Prediction.
CoRR, 2024

2023
Proposing a Dimensionality Reduction Technique With an Inequality for Unsupervised Learning from High-Dimensional Big Data.
IEEE Trans. Syst. Man Cybern. Syst., June, 2023

Applications of Modified Bessel Polynomials to Solve a Nonlinear Chaotic Fractional-Order System in the Financial Market: Domain-Splitting Collocation Techniques.
Comput., June, 2023

Breaking Barriers to Creative Expression: Co-Designing and Implementing an Accessible Text-to-Image Interface.
CoRR, 2023

Application of the Bell polynomials for the solution of some differential-algebraic equations.
CoRR, 2023

A new approach based on shifted Vieta-Fibonacci-quasilinearization technique and its convergence analysis for nonlinear third-order Emden-Fowler equation with multi-singularity.
Commun. Nonlinear Sci. Numer. Simul., 2023

2022
A convergent hybrid numerical scheme for a class of nonlinear diffusion equations.
Comput. Appl. Math., October, 2022


Predicting human behavior in size-variant repeated games through deep convolutional neural networks.
Prog. Artif. Intell., 2022

DD-KARB: data-driven compliance to quality by rule based benchmarking.
J. Big Data, 2022

K-means-G*: Accelerating <i>k</i>-means clustering algorithm utilizing primitive geometric concepts.
Inf. Sci., 2022

Two-stage explicit schemes based on numerical approximations of convection-diffusion equations.
Int. J. Comput. Sci. Math., 2022

WIDESim: A toolkit for simulating resource management techniques of scientific Workflows In Distributed Environments with graph topology.
CoRR, 2022

Stateless and Rule-Based Verification For Compliance Checking Applications.
CoRR, 2022

An Effective Approximation Algorithm for Second-Order Singular Functional Differential Equations.
Axioms, 2022

Fractional Clique Collocation Technique for Numerical Simulations of Fractional-Order Brusselator Chemical Model.
Axioms, 2022

Bessel-quasilinearization technique to solve the fractional-order HIV-1 infection of CD4+ T-cells considering the impact of antiviral drug treatment.
Appl. Math. Comput., 2022

Spectral semi-discretization algorithm for a class of nonlinear parabolic PDEs with applications.
Appl. Math. Comput., 2022

Selfish Routing Game-Based Multi-Resource Allocation and Fair Scheduling of Indivisible Jobs in Edge Environments.
IEEE Access, 2022

2021
Application of Vieta-Lucas Series to Solve a Class of Multi-Pantograph Delay Differential Equations with Singularity.
Symmetry, 2021

Solving fully dynamic bin packing problem for virtual machine allocation in the cloud environment by the futuristic greedy algorithm.
J. Intell. Fuzzy Syst., 2021

Offloading Coalition Formation for Scheduling Scientific Workflow Ensembles in Fog Environments.
J. Grid Comput., 2021

Assessing and Supplying the Health of Videos Games via Formal Semantics.
CoRR, 2021

SELM: Software Engineering of Machine Learning Models.
CoRR, 2021

Langar: An Approach to Evaluate Reo Programming Language.
CoRR, 2021

An efficient power-aware VM allocation mechanism in cloud data centers: a micro genetic-based approach.
Clust. Comput., 2021

Communities Detection for Advertising by Futuristic Greedy Method with Clustering Approach.
Big Data, 2021

An efficient approximation technique applied to a non-linear Lane-Emden pantograph delay differential model.
Appl. Math. Comput., 2021

A discontinuous finite element approximation to singular Lane-Emden type equations.
Appl. Math. Comput., 2021

2020
An Empirical Approach to Modeling User-System Interaction Conflicts in Smart Homes.
IEEE Trans. Hum. Mach. Syst., 2020

Generalized Bessel Polynomial for Multi-Order Fractional Differential Equations.
Symmetry, 2020

Broadcast Complexity and Adaptive Adversaries in Verifiable Secret Sharing.
Secur. Commun. Networks, 2020

Decreasing the execution time of reducers by revising clustering based on the futuristic greedy approach.
J. Big Data, 2020

A Discretization Approach for the Nonlinear Fractional Logistic Equation.
Entropy, 2020

A Reo Based Solution for Engineering the Coordination Protocols for Smart Cities.
CoRR, 2020

Phishing Detection Using Machine Learning Techniques.
CoRR, 2020

KARB Solution: Compliance to Quality by Rule Based Benchmarking.
CoRR, 2020

A Crisis Situations Decision-Making Systems Software Development Process With Rescue Experiences.
IEEE Access, 2020

2019
New approach for reducing energy consumption and load balancing in data centers of cloud computing.
J. Intell. Fuzzy Syst., 2019

A prediction-based and power-aware virtual machine allocation algorithm in three-tier cloud data centers.
Int. J. Commun. Syst., 2019

A Deep Learning-Based Approach for Measuring the Domain Similarity of Persian Texts.
CoRR, 2019

DAST Model: Deciding About Semantic Complexity of a Text.
CoRR, 2019

An improved upper bound on dilation of regular polygons.
Comput. Geom., 2019

Using Reo Formalism for Compliance Checking of Architecture Evolution with Evolutionary Rules.
Proceedings of the Advancing Technology Industrialization Through Intelligent Software Methodologies, Tools and Techniques, 2019

Mutual Noise Estimation Algorithm for Video Denoising.
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019

2018
Upper bounds for minimum dilation triangulation in two special cases.
Inf. Process. Lett., 2018

A Protocol for Constraint Automata Execution in a Synchronous Network of Processors.
Proceedings of the Verification and Evaluation of Computer and Communication Systems, 2018

2017
An exact algorithm for the minimum dilation triangulation problem.
J. Glob. Optim., 2017

2016
A Perceptual Quality Metric for Videos Distorted by Spatially Correlated Noise.
Proceedings of the 2016 ACM Conference on Multimedia Conference, 2016

2015
Byzantine consensus for unknown dynamic networks.
J. Supercomput., 2015

Joining Transition Systems of Records: Some Congruency and Language-Theoretic Results.
CoRR, 2015

Improving Security Issues in MANET AODV Routing Protocol.
Proceedings of the Ad Hoc Networks, 2015

2012
Hierarchical Matrix Techniques on Massively Parallel Computers
PhD thesis, 2012

Robust Weighted Graph Transformation Matching for Rigid and Nonrigid Image Registration.
IEEE Trans. Image Process., 2012

Three-Dimensional Polygonal Building Model Estimation From Single Satellite Images.
IEEE Trans. Geosci. Remote. Sens., 2012

Parallel H-matrix arithmetic on distributed-memory systems.
Comput. Vis. Sci., 2012

A Büchi automata based model checking framework for reo connectors.
Proceedings of the ACM Symposium on Applied Computing, 2012

2011
Büchi automata for modeling component connectors.
Softw. Syst. Model., 2011

2010
Failure-based equivalence of constraint automata.
Int. J. Comput. Math., 2010

Automatic Building Detection in Aerial Images Using a Hierarchical Feature Based Image Segmentation.
Proceedings of the 20th International Conference on Pattern Recognition, 2010

Height estimation for buildings with complex contours in monocular satellite/airborne images based on fuzzy reasoning.
Proceedings of the International Conference on Image Processing, 2010

2009
An improved time-adaptive self-organizing map for high-speed shape modeling.
Pattern Recognit., 2009

Height estimation for buildings in monocular satellite/airborne images based on fuzzy reasoning and genetic algorithm.
Proceedings of the 10th Workshop on Image Analysis for Multimedia Interactive Services, 2009

Automata Based Model Checking for Reo Connectors.
Proceedings of the Fundamentals of Software Engineering, 2009

2008
Model Checking of Component Based Software Using Compositional Reductions.
Int. J. Softw. Eng. Knowl. Eng., 2008

Modeling Component Connectors: Synchronisation and Context-Dependency.
Proceedings of the Sixth IEEE International Conference on Software Engineering and Formal Methods, 2008

Recasting Constraint Automata into Büchi Automata.
Proceedings of the Theoretical Aspects of Computing, 2008

Robust region-based background subtraction and shadow removing using color and gradient information.
Proceedings of the 19th International Conference on Pattern Recognition (ICPR 2008), 2008

Linear Temporal Logic of Constraint Automata.
Proceedings of the Advances in Computer Science and Engineering, 2008

Live and Fair Constraint Automata and Their Linear Temporal Logic of Steps.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

2007
Streamline diffusion method for treating coupling equations of hyperbolic scalar conservation laws.
Math. Comput. Model., 2007

Compositional Failure-based Equivalence of Constraint Automata.
Proceedings of the Seventh International Workshop on Automated Verification of Critical Systems, 2007

Compositional failure-based semantic equivalences for Reo specifications.
Proceedings of the 2007 Conference Specification and Verification of Component-Based Systems, 2007

Model Checking of Component Connectors.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007

2005
An Equivalence Based Method for Compositional Verification of the Linear Temporal Logic of Constraint Automata.
Proceedings of the First IPM International Workshop on Foundations of Software Engineering, 2005

An Efficient Model Checking Algorithm for a Fragment of µ-Calculus.
Proceedings of the 17th International Conference on Software Engineering and Knowledge Engineering (SEKE'2005), 2005


  Loading...