Hamid Haj Seyyed javadi (Seyyed Hamid Haji Seyyed Javadi)
Hamid Haj Seyyed javadi (Seyyed Hamid Haji Seyyed Javadi)
Professor of Mathematics and Computer Science, Shahed University
Verified email at shahed.ac.ir
Title
Cited by
Cited by
Year
Internet of Things applications: A systematic review
P Asghari, AM Rahmani, HHS Javadi
Computer Networks 148, 241-261, 2019
952019
Using cipher key to generate dynamic S-box in AES cipher system
R Hosseinkhani, HHS Javadi
International Journal of Computer Science and Security (IJCSS) 6 (1), 19-28, 2012
642012
Using particle swarm optimization for robot path planning in dynamic environments with moving obstacles and target
AZ Nasrollahy, HHS Javadi
2009 Third UKSim European Symposium on Computer Modeling and Simulation, 60-65, 2009
632009
A cellular automata based algorithm for path planning in multi-agent systems with a common goal
Y Tavakoli, HHS Javadi, S Adabi
International journal of computer science and network security 8 (7), 119-123, 2008
392008
Service composition approaches in IoT: A systematic review
P Asghari, AM Rahmani, HHS Javadi
Journal of Network and Computer Applications 120, 61-77, 2018
342018
Generalized quasi-Baer rings
A Moussavi, H Haj Seyyed Javadi, E Hashemi
Communications in AlgebraŽ 33 (7), 2115-2129, 2005
252005
Improvement of robot path planning using particle swarm optimization in dynamic environments with mobile obstacles and target
M Yarmohamadi, HHS Javadi, H Erfani
Advanced Studies in Biology 3 (1), 43-53, 2011
212011
Solving the time-fractional diffusion equation via Sinc–Haar collocation method
A Pirkhedri, HHS Javadi
Applied Mathematics and Computation 257, 317-326, 2015
192015
Efficient clustering in collaborative filtering recommender system: Hybrid method based on genetic algorithm and gravitational emulation local search algorithm
T Mohammadpour, AM Bidgoli, R Enayatifar, HHS Javadi
Genomics 111 (6), 1902-1912, 2019
172019
A dynamic key management scheme for dynamic wireless sensor networks
SH Erfani, HHS Javadi, AM Rahmani
Security and Communication Networks 8 (6), 1040-1049, 2015
172015
Application-specific hybrid symmetric design of key pre-distribution for wireless sensor networks
MH Tooska Dargahi, Hamid H. S. Javadi
Security and Communication Networks 8 (8), 1561-1574, 2015
172015
Polynomial Ore extensions of Baer and pp-rings
E Hashemi, A Moussavi, H Haj Seyyed Javadi
Bulletin of the Iranian Mathematical Society 29 (2), 65-86, 2011
172011
Proposing a new algorithm based on bees behavior for solving graph coloring
M Faraji, HHS Javadi
International Journal of Contemporary Mathematical Sciences 6 (1), 41-49, 2011
162011
AHP techniques for Persian text summarization
SM Tofighy, RG Raj, HHS Javad
Malaysian Journal of Computer Science 26 (1), 1-8, 2013
152013
Cyber kill chain-based taxonomy of advanced persistent threat actors: analogy of tactics, techniques, and procedures
PN Bahrami, A Dehghantanha, T Dargahi, RM Parizi, KKR Choo, ...
Journal of Information Processing Systems 15 (4), 865-889, 2019
132019
A medical monitoring scheme and health‐medical service composition model in cloud‐based IoT platform
P Asghari, AM Rahmani, H Haj Seyyed Javadi
Transactions on Emerging Telecommunications Technologies 30 (6), e3637, 2019
132019
Key-management scheme for wireless sensor networks based on merging blocks of symmetric design
M Anzani, HHS Javadi, V Modirir
Wireless Networks 24 (8), 2867-2879, 2018
132018
Key predistribution scheme for clustered hierarchical wireless sensor networks based on combinatorial designs
M Javanbakht, H Erfani, HHS Javadi, P Daneshjoo
Security and Communication Networks 7 (11), 2003-2014, 2014
122014
Optimal scheduling in cloud computing environment using the bee algorithm
N Hesabian, H Haj, S Javadi
Int J Comput Netw Commun Secur 3, 253-258, 2015
112015
Multi-join query optimization using the bees algorithm
M Alamery, A Faraahi, HHS Javadi, S Nourossana, H Erfani
Distributed Computing and Artificial Intelligence, 449-457, 2010
112010
The system can't perform the operation now. Try again later.
Articles 1–20