default search action
Mohammad Masoud Javidi
Person information
- affiliation: Shahid Bahonar University of Kerma, Department of Computer Science, Iran
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j42]Behnam Mohammad Hasani Zade, Najme Mansouri, Mohammad Masoud Javidi:
Multi-objective task scheduling based on PSO-Ring and intuitionistic fuzzy set. Clust. Comput. 27(8): 11747-11802 (2024) - [j41]Aboozar Zandvakili, Mohammad Masoud Javidi, Najme Mansouri:
Simultaneous feature selection and SVM optimization based on fuzzy signature and chaos GOA. Evol. Syst. 15(5): 1907-1937 (2024) - [j40]Zahra Jalali Khalil Abadi, Najme Mansouri, Mohammad Masoud Javidi:
Deep reinforcement learning-based scheduling in distributed systems: a critical review. Knowl. Inf. Syst. 66(10): 5709-5782 (2024) - [j39]Aboozar Zandvakili, Najme Mansouri, Mohammad Masoud Javidi:
A new feature selection algorithm based on fuzzy-pathfinder optimization. Neural Comput. Appl. 36(28): 17585-17614 (2024) - 2023
- [j38]Behnam Mohammad Hasani Zade, Najme Mansouri, Mohammad Masoud Javidi:
A new hyper-heuristic based on ant lion optimizer and Tabu search algorithm for replica management in cloud environment. Artif. Intell. Rev. 56(9): 9837-9947 (2023) - [j37]Zahra Asghari Varzaneh, Soodeh Hosseini, Mohammad Masoud Javidi:
A novel binary horse herd optimization algorithm for feature selection problem. Multim. Tools Appl. 82(26): 40309-40343 (2023) - [j36]Behnam Mohammad Hasani Zade, Mohammad Masoud Javidi, Najme Mansouri:
An improved Caledonian crow learning algorithm based on ring topology for security-aware workflow scheduling in cloud computing. Peer Peer Netw. Appl. 16(6): 2929-2984 (2023) - [j35]Soghra Mousavi, Sepehr Ebrahimi Mood, Alireza Souri, Mohammad Masoud Javidi:
Directed Search: A New Operator in NSGA-II for Task Scheduling in IoT Based on Cloud-Fog Computing. IEEE Trans. Cloud Comput. 11(2): 2144-2157 (2023) - 2022
- [j34]Behnam Mohammad Hasani Zade, Najme Mansouri, Mohammad Masoud Javidi:
A two-stage scheduler based on New Caledonian Crow Learning Algorithm and reinforcement learning strategy for cloud environment. J. Netw. Comput. Appl. 202: 103385 (2022) - [j33]Fatemeh Aghaeipoor, Mohammad Masoud Javidi, Alberto Fernández:
IFC-BD: An Interpretable Fuzzy Classifier for Boosting Explainable Artificial Intelligence in Big Data. IEEE Trans. Fuzzy Syst. 30(3): 830-840 (2022) - 2021
- [j32]Behnam Mohammad Hasani Zade, Najme Mansouri, Mohammad Masoud Javidi:
Multi-objective scheduling technique based on hybrid hitchcock bird algorithm and fuzzy signature in cloud computing. Eng. Appl. Artif. Intell. 104: 104372 (2021) - [j31]Ali Mahmoudabadi, Marjan Kuchaki Rafsanjani, Mohammad Masoud Javidi:
Online one pass clustering of data streams based on growing neural gas and fuzzy inference systems. Expert Syst. J. Knowl. Eng. 38(7) (2021) - [j30]Behnam Mohammad Hasani Zade, Najme Mansouri, Mohammad Masoud Javidi:
SAEA: A security-aware and energy-aware task scheduling strategy by Parallel Squirrel Search Algorithm in cloud environment. Expert Syst. Appl. 176: 114915 (2021) - [j29]Hamed Tabrizchi, Mohammad Masoud Javidi, Vahid Amirzadeh:
Estimates of residential building energy consumption using a multi-verse optimizer-based support vector machine with k-fold cross-validation. Evol. Syst. 12(3): 755-767 (2021) - [j28]Najme Mansouri, Mohammad Masoud Javidi, Behnam Mohammad Hasani Zade:
Hierarchical data replication strategy to improve performance in cloud computing. Frontiers Comput. Sci. 15(2): 152501 (2021) - [j27]Mohammad Masoud Javidi:
Feature selection schema based on game theory and biology migration algorithm for regression problems. Int. J. Mach. Learn. Cybern. 12(2): 303-342 (2021) - [j26]Sepehr Ebrahimi Mood, Ming Ding, Zihuai Lin, Mohammad Masoud Javidi:
Performance optimization of UAV-based IoT communications using a novel constrained gravitational search algorithm. Neural Comput. Appl. 33(22): 15557-15568 (2021) - [j25]Najme Mansouri, Mohammad Masoud Javidi, Behnam Mohammad Hasani Zade:
A CSO-based approach for secure data replication in cloud computing environment. J. Supercomput. 77(6): 5882-5933 (2021) - 2020
- [j24]Najme Mansouri, Mohammad Masoud Javidi:
Cost-based job scheduling strategy in cloud computing environments. Distributed Parallel Databases 38(2): 365-400 (2020) - [j23]Fatemeh Aghaeipoor, Mohammad Masoud Javidi:
A hybrid fuzzy feature selection algorithm for high-dimensional regression problems: An mRMR-based framework. Expert Syst. Appl. 162: 113859 (2020) - [j22]Sadegh Eskandari, Mohammad Masoud Javidi:
A novel hybrid bat algorithm with a fast clustering-based hybridization. Evol. Intell. 13(3): 427-442 (2020) - [j21]Sepehr Ebrahimi Mood, Mohammad Masoud Javidi:
Energy-efficient clustering method for wireless sensor networks using modified gravitational search algorithm. Evol. Syst. 11(4): 575-587 (2020) - [j20]Najme Mansouri, Behnam Mohammad Hasani Zade, Mohammad Masoud Javidi:
A multi-objective optimized replication using fuzzy based self-defense algorithm for cloud computing. J. Netw. Comput. Appl. 171: 102811 (2020) - [j19]Najme Mansouri, Mohammad Masoud Javidi, Behnam Mohammad Hasani Zade:
Using data mining techniques to improve replica management in cloud environment. Soft Comput. 24(10): 7335-7360 (2020) - [j18]Najme Mansouri, Mohammad Masoud Javidi:
A review of data replication based on meta-heuristics approach in cloud computing and data grid. Soft Comput. 24(19): 14503-14530 (2020) - [c6]Fatemeh Aghaeipoor, Mohammad Masoud Javidi, Isaac Triguero, Alberto Fernández:
Chi-BD-DRF: Design of Scalable Fuzzy Classifiers for Big Data via A Dynamic Rule Filtering Approach. FUZZ-IEEE 2020: 1-7
2010 – 2019
- 2019
- [j17]Fatemeh Aghaeipoor, Mohammad Masoud Javidi:
On the influence of using fuzzy extensions in linguistic fuzzy rule-based regression systems. Appl. Soft Comput. 79: 283-299 (2019) - [j16]Najme Mansouri, Behnam Mohammad Hasani Zade, Mohammad Masoud Javidi:
Hybrid task scheduling strategy for cloud computing by modified particle swarm optimization and fuzzy theory. Comput. Ind. Eng. 130: 597-633 (2019) - [j15]Sepehr Ebrahimi Mood, Mohammad Masoud Javidi:
Rank-Based Gravitational Search Algorithm: a Novel Nature-Inspired Optimization Algorithm for Wireless Sensor Networks Clustering. Cogn. Comput. 11(5): 719-734 (2019) - [j14]Sepehr Ebrahimi Mood, Mohammad Masoud Javidi:
A modified gravitational search algorithm and its application in lifetimemaximization of wireless sensor networks. Turkish J. Electr. Eng. Comput. Sci. 27(6): 4055-4069 (2019) - [j13]Fatemeh Aghaeipoor, Mohammad Masoud Javidi:
MOKBL+MOMs: An interpretable multi-objective evolutionary fuzzy system for learning high-dimensional regression data. Inf. Sci. 496: 1-24 (2019) - [j12]Mohammad Masoud Javidi, Sadegh Eskandari:
Online streaming feature selection: a minimum redundancy, maximum significance approach. Pattern Anal. Appl. 22(3): 949-963 (2019) - 2018
- [j11]Mohammad Masoud Javidi, Fatemeh Zarisfi Kermani:
Utilizing the advantages of both global and local search strategies for finding a small subset of features in a two-stage method. Appl. Intell. 48(10): 3502-3522 (2018) - [j10]Najme Mansouri, Mohammad Masoud Javidi:
A new Prefetching-aware Data Replication to decrease access latency in cloud environment. J. Syst. Softw. 144: 197-215 (2018) - [j9]Mohammad Masoud Javidi, Sadegh Eskandari:
Streamwise feature selection: a rough set method. Int. J. Mach. Learn. Cybern. 9(4): 667-676 (2018) - [j8]Najme Mansouri, Mohammad Masoud Javidi:
A hybrid data replication strategy with fuzzy-based deletion for heterogeneous cloud data centers. J. Supercomput. 74(10): 5349-5372 (2018) - 2017
- [j7]Mohammad Masoud Javidi, Sadegh Eskandari:
A noise resistant dependency measure for rough set-based feature selection. J. Intell. Fuzzy Syst. 33(3): 1613-1626 (2017) - [j6]Najme Mansouri, M. Kuchaki Rafsanjani, Mohammad Masoud Javidi:
DPRS: A dynamic popularity aware replication strategy with parallel download scheme in cloud environments. Simul. Model. Pract. Theory 77: 177-196 (2017) - 2016
- [j5]Sadegh Eskandari, Mohammad Masoud Javidi:
Online streaming feature selection using rough sets. Int. J. Approx. Reason. 69: 35-57 (2016) - 2014
- [j4]Mina Sohrabi, Mohammad Masoud Javidi, Sattar Hashemi:
Detecting intrusion transactions in database systems: a novel approach. J. Intell. Inf. Syst. 42(3): 619-644 (2014) - 2011
- [c5]Mohammad Masoud Javidi, Soheila Khatami, Roghiyeh Hoseinpour Fard, Mahdi Jampour:
An effective adaptive technique for impulse noise detection and reduction in digital images. HIS 2011: 217-222 - 2010
- [j3]Mahdi Jampour, Mohammad Masoud Javidi, Adel Soleymani Nejad, Maryam Ashourzadeh, Mahdi Yaghoobi:
A New Technique in saving Fingerprint with low volume by using Chaos Game and Fractal Theory. Int. J. Interact. Multim. Artif. Intell. 1(3): 27-31 (2010) - [c4]Marjan Kuchaki Rafsanjani, Laya Aliahmadipour, Mohammad Masoud Javidi:
An Optimal Method for Detecting Internal and External Intrusion in MANET. FGIT-FGCN (2) 2010: 71-82 - [c3]Mohammad Masoud Javidi, Mina Sohrabi, Marjan Kuchaki Rafsanjani:
Intrusion Detection in Database Systems. FGIT-FGCN (2) 2010: 93-101
2000 – 2009
- 2009
- [j2]Mohammad Masoud Javidi, Hamid Reza Naji, Mohammad E. Shiri:
Increasing the security of e-commerce systems using multi-agents. Int. J. Bus. Inf. Syst. 4(4): 460-476 (2009) - [c2]Hamid Mirvaziri, Mohammad Masoud Javidi, Najme Mansouri:
Handwriting Recognition Algorithm in Different Languages: Survey. IVIC 2009: 487-497 - 2006
- [j1]Mohammad Masoud Javidi:
Spectral collocation method for the solution of the generalized Burger-Fisher equation. Appl. Math. Comput. 174(1): 345-352 (2006) - 2003
- [c1]Ali Akbar Niknafs, Mohammad E. Shiri, Mohammad Masoud Javidi:
A Case-Based Reasoning Approach in E-Tourism: Tour Itinerary Planning. DEXA Workshops 2003: 818-822
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-10 21:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint