Shahram Jamali

Orcid: 0000-0003-2764-6373

According to our database1, Shahram Jamali authored at least 45 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
An Intrusion Detection System Using the Artificial Neural Network-based Approach and Firefly Algorithm.
Wirel. Pers. Commun., August, 2024

Three-layer data center-based intelligent slice admission control algorithm for C-RAN using approximate reinforcement learning.
Clust. Comput., August, 2024

Deep reinforcement learning-based resource allocation in multi-access edge computing.
Concurr. Comput. Pract. Exp., July, 2024

Hardening of the Internet of Things by using an intrusion detection system based on deep learning.
Clust. Comput., June, 2024

Approximate Q-learning-based (AQL) network slicing in mobile edge-cloud for delay-sensitive services.
J. Supercomput., February, 2024

Resource allocation in 5G cloud-RAN using deep reinforcement learning algorithms: A review.
Trans. Emerg. Telecommun. Technol., January, 2024

Slice admission control in 5G cloud radio access network using deep reinforcement learning: A survey.
Int. J. Commun. Syst., 2024

A hybrid model for VNF deployment capable of responding to online requests at network edge.
Comput. Networks, 2024

2023
An Enhanced Deep Reinforcement Learning-based Slice Acceptance Control System (EDRL-SACS) for Cloud-Radio Access Network.
Phys. Commun., December, 2023

Software-defined networking enabled big data tasks scheduling: A tabu search approach.
J. Commun. Networks, February, 2023

2022
A Request Redirection Algorithm in Content Delivery Network: Using PROMETHEE Approach.
Wirel. Pers. Commun., 2022

A power-efficient and performance-aware online virtual network function placement in SDN/NFV-enabled networks.
Comput. Networks, 2022

EmcFIS: Evolutionary multi-criteria Fuzzy Inference System for virtual network function placement and routing.
Appl. Soft Comput., 2022

2021
Performance-aware placement and chaining scheme for virtualized network functions: a particle swarm optimization approach.
J. Supercomput., 2021

Congestion control in high-speed networks using the probabilistic estimation approach.
Int. J. Commun. Syst., 2021

Cost-aware co-locating of services in Internet of Things by using multicriteria decision making.
Int. J. Commun. Syst., 2021

Big Data-Aware Intrusion Detection System in Communication Networks: a Deep Learning Approach.
J. Grid Comput., 2021

2019
On the use of the genetic programming for balanced load distribution in software-defined networks.
Digit. Commun. Networks, 2019

Deep-RL: Deep Reinforcement Learning for Marking-Aware via per-Port in Data Centers.
Proceedings of the 25th IEEE International Conference on Parallel and Distributed Systems, 2019

2018
Data Replication in Large Scale Content Delivery Networks: A Genetic Algorithm Approach.
J. Circuits Syst. Comput., 2018

2017
DAWA: Defending against wormhole attack in MANETs by using fuzzy logic and artificial immune system.
J. Supercomput., 2017

An intelligent intrusion detection system by using hierarchically structured learning automata.
Neural Comput. Appl., 2017

An imperialist competitive algorithm for virtual machine placement in cloud computing.
J. Exp. Theor. Artif. Intell., 2017

Fault localization algorithm in computer networks by employing a genetic algorithm.
J. Exp. Theor. Artif. Intell., 2017

A Learning Automata Based Dynamic Resource Provisioning in Cloud Computing Environments.
Proceedings of the 18th International Conference on Parallel and Distributed Computing, 2017

2016
Online reputation measurement of companies based on user-generated content in online social networks.
Comput. Hum. Behav., 2016

2015
Coverage Aware Scheduling in Wireless Sensor Networks: An Optimal Placement Approach.
Wirel. Pers. Commun., 2015

TCP Pegas: A PSO-based improvement over TCP Vegas.
Appl. Soft Comput., 2015

2014
Real-Time Human-Computer Interaction Based on Face and Hand Gesture Recognition.
CoRR, 2014

Defense against SYN flooding attacks: A particle swarm optimization approach.
Comput. Electr. Eng., 2014

2013
On the use of a full information feedback to stabilize RED.
J. Netw. Comput. Appl., 2013

Dynamic Resource Provisioning in Cloud Computing: A Heuristic Markovian Approach.
Proceedings of the Cloud Computing - 4th International Conference, CloudComp 2013, Wuhan, 2013

2012
Defense against SYN-Flood Denial of Service Attacks Based on Learning Automata
CoRR, 2012

PSO-SFDD: Defense against SYN flooding DoS attacks by employing PSO algorithm.
Comput. Math. Appl., 2012

2011
Globally stable and high-performance Internet congestion control through a computational inspiration from nature.
Sci. China Inf. Sci., 2011

2010
Predator-prey system: an optimiser that solves a linear programming.
Int. J. Bio Inspired Comput., 2010

An improvement over RED algorithm by using particle swarm optimization.
IEICE Electron. Express, 2010

Stable route selection in ODMRP with energy based strategy.
Proceedings of the IEEE 21st International Symposium on Personal, 2010

2009
Congestion Control in the Internet by Employing a Ratio dependent Plant Herbivore Carnivorous Model
CoRR, 2009

2008
Congestion Control in the Internet: Inspiration from Balanced Food Chains in the Nature.
J. Netw. Syst. Manag., 2008

2007
Bio-Inspired Congestion Control: Conceptual Framework, Algorithm and Discussion.
Proceedings of the Advances in Biologically Inspired Information Systems: Models, 2007

Equation-Based Congestion Control in the Internet Biologic Environment.
Trans. Comp. Sys. Biology, 2007

Internet congestion control using nature population control tactics.
Ecol. Informatics, 2007

Nature-Inspired Congestion Control: Using a Realistic Predator-Prey Model.
Proceedings of the Bio-inspired Modeling of Cognitive Tasks, 2007

2006
A conceptual framework for bio-inspired congestion control in communication networks.
Proceedings of the 1st International ICST Conference on Bio Inspired Models of Network, 2006


  Loading...