Mohammad Heydari

Orcid: 0000-0003-3701-7132

According to our database1, Mohammad Heydari authored at least 32 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A simple and efficient preprocessing step for convex hull problem.
Discret. Math. Algorithms Appl., October, 2024

Distributed Record Linkage in Healthcare Data with Apache Spark.
CoRR, 2024

Deep Learning-based Sentiment Analysis in Persian Language.
CoRR, 2024

Persian Slang Text Conversion to Formal and Deep Learning of Persian Short Texts on Social Media for Sentiment Classification.
CoRR, 2024

Challenges and Experiences of Iranian Developers with MLOps at Enterprise.
CoRR, 2024

Analysis of Persian News Agencies on Instagram, A Words Co-occurrence Graph-based Approach.
CoRR, 2024

Convolutional Neural Networks Towards Facial Skin Lesions Detection.
CoRR, 2024

Convergence analysis of an iterative scheme to solve a family of functional Volterra integral equations.
Appl. Math. Comput., 2024

2023
Design, development and evaluation of a mobile-based self-care application for patients with COVID-19 not requiring hospitalization; a study of Northwest of Iran.
BMC Medical Informatics Decis. Mak., December, 2023

Telemedicine technologies and applications in the era of COVID-19 pandemic: A systematic review.
Health Informatics J., April, 2023

Graph Representation Learning Towards Patents Network Analysis.
CoRR, 2023

Analysis of Insect-Plant Interactions Affected by Mining Operations, A Graph Mining Approach.
CoRR, 2023

A simple and efficient preprocessing step for convex hull problem.
CoRR, 2023

2022
Prediction of Maximum Temperatures by Time Series and Artificial Neural Networks (Case Study: Isfahan Station).
Proceedings of the IEEE International Conference on Artificial Intelligence in Engineering and Technology, 2022

Effects of Rural Habitat Distribution and Farm Size on Food Production Index Growth in Sub-Saharan African Region: A Case of East Africa Countries.
Proceedings of the 10th International Conference on Information and Communication Technologies in Agriculture, 2022

OntoCyrene: Towards Ontology-Enhanced Asset Modelling for Supply Chains in the Context of Cyber Security.
Proceedings of the Computer Security. ESORICS 2022 International Workshops, 2022

2021
An improvement of adaptive cubic regularization method for unconstrained optimization problems.
Int. J. Comput. Math., 2021

2020
Two nonmonotone trust region algorithms based on an improved Newton method.
J. Appl. Math. Comput., October, 2020

A two-step improved Newton method to solve convex unconstrained optimization problems.
J. Appl. Math. Comput., February, 2020

Indeterminacy-aware prediction model for authentication in IoT.
PhD thesis, 2020

Correction of trust region method with a new modified Newton method.
Int. J. Comput. Math., 2020

Known unknowns: Indeterminacy in authentication in IoT.
Future Gener. Comput. Syst., 2020

Analysis of ResearchGate, A Community Detection Approach.
CoRR, 2020

2019
A Location-Aware Authentication Model to Handle Uncertainty in IoT.
Proceedings of the Sixth International Conference on Internet of Things: Systems, 2019

Uncertainty-Aware Authentication Model for Fog Computing in IoT.
Proceedings of the Fourth International Conference on Fog and Mobile Edge Computing, 2019

Uncertainty-Aware Authentication Model for IoT.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

Towards Indeterminacy-Tolerant Access Control in IoT.
Proceedings of the Handbook of Big Data and IoT Security, 2019

2017
An improved one-to-many authentication scheme based on bilinear pairings with provable security for mobile pay-TV systems.
Multim. Tools Appl., 2017

A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security.
Int. J. Commun. Syst., 2017

TRAWL: Protection against rogue sites for the masses.
Proceedings of the 11th International Conference on Research Challenges in Information Science, 2017

2016
An Efficient Password-Based Authenticated Key Exchange Protocol with Provable Security for Mobile Client-Client Networks.
Wirel. Pers. Commun., 2016

2015
An Improved Authentication Scheme for Electronic Payment Systems in Global Mobility Networks.
Inf. Technol. Control., 2015


  Loading...