Ali Barati

Orcid: 0000-0001-5132-5540

According to our database1, Ali Barati authored at least 37 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
An authentication mechanism based on blockchain for IoT environment.
Clust. Comput., December, 2024

Time-sensitive propagation values discount centrality measure.
Computing, June, 2024

A lightweight hierarchical method for improving security in the internet of things using fuzzy logic.
Concurr. Comput. Pract. Exp., March, 2024

L2AI: lightweight three-factor authentication and authorization in IOMT blockchain-based environment.
CoRR, 2024

2023
A dynamic and multi-level key management method in wireless sensor networks (WSNs).
Comput. Networks, November, 2023

Correction to: A distributed energy-efficient coverage holes detection and recovery method in wireless sensor networks using the grasshopper optimization algorithm.
J. Ambient Intell. Humaniz. Comput., October, 2023

A distributed energy-efficient coverage holes detection and recovery method in wireless sensor networks using the grasshopper optimization algorithm.
J. Ambient Intell. Humaniz. Comput., October, 2023

Sinc collocation method: solution of a class of strongly nonlinear two-point boundary value problems.
Int. J. Comput. Sci. Math., 2023

2022
An overlapping routing approach for sending data from things to the cloud inspired by fog technology in the large-scale IoT ecosystem.
Wirel. Networks, 2022

A hierarchical congestion control method in clustered internet of things.
J. Supercomput., 2022

A two-level clustering based on fuzzy logic and content-based routing method in the internet of things.
Peer-to-Peer Netw. Appl., 2022

A secure three-factor authentication scheme for IoT environments.
J. Parallel Distributed Comput., 2022

A cluster-based routing method with authentication capability in Vehicular Ad hoc Networks (VANETs).
J. Parallel Distributed Comput., 2022

A hierarchical key management and authentication method for wireless sensor networks.
Int. J. Commun. Syst., 2022

An Authentication-Based Secure Data Aggregation Method in Internet of Things.
J. Grid Comput., 2022

A wrapper method based on a modified two-step league championship algorithm for detecting botnets in IoT environments.
Computing, 2022

An efficient gray system theory-based routing protocol for energy consumption management in the Internet of Things using fog and cloud computing.
Computing, 2022

2021
A hierarchical secure data aggregation method using the dragonfly algorithm in wireless sensor networks.
Peer-to-Peer Netw. Appl., 2021

Multipath routing through the firefly algorithm and fuzzy logic in wireless sensor networks.
Peer-to-Peer Netw. Appl., 2021

Secure data aggregation methods and countermeasures against various attacks in wireless sensor networks: A comprehensive review.
J. Netw. Comput. Appl., 2021

2020
3DEOR: an opportunity routing protocol using evidence theory appropriate for 3D urban environments in VANETs.
IET Commun., 2020

2018
Bifurcation analysis of an enzyme-catalyzed reaction-diffusion system.
Comput. Math. Appl., 2018

2017
Sinc-Galerkin method for solving nonlinear weakly singular two point boundary value problems.
Int. J. Comput. Math., 2017

2016
RDTP: reliable data transport protocol in wireless sensor networks.
Telecommun. Syst., 2016

2015
Audio watermarking method using QR decomposition and genetic algorithm.
Multim. Tools Appl., 2015

2014
Application of Sinc-Galerkin method to singularly perturbed parabolic convection-diffusion problems.
Numer. Algorithms, 2014

Energy Efficient and High Speed Error Control Scheme for Real Time Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2014

2012
Proposing an Enhanced Artificial Neural Network Prediction Model to Improve the Accuracy in Software Effort Estimation.
Proceedings of the Fourth International Conference on Computational Intelligence, 2012

2011
An Optimised Algorithm to Detect Faulty Readings along the Substrate Access Wireless Long-Thin Sensor Networks.
Proceedings of the UKSim 5th European Symposium on Computer Modeling and Simulation, 2011

2010
Analysis of two Chebyshev-like third order methods free from second derivatives for solving systems of nonlinear equations.
J. Comput. Appl. Math., 2010

2009
Some exact and new solutions of the Nizhnik-Novikov-Vesselov equation using the Exp-function method.
Comput. Math. Appl., 2009

Recovery of Sensors in Wireless Sensor Networks.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

A New Method for Coverage in Wireless Sensor Networks.
Proceedings of the Eighth IEEE International Conference on Dependable, 2009

2008
A note on the local convergence of iterative methods based on Adomian decomposition method and 3-node quadrature rule.
Appl. Math. Comput., 2008

2007
Super cubic iterative methods to solve systems of nonlinear equations.
Appl. Math. Comput., 2007

A fourth-order method from quadrature formulae to solve systems of nonlinear equations.
Appl. Math. Comput., 2007

A third-order Newton-type method to solve systems of nonlinear equations.
Appl. Math. Comput., 2007


  Loading...