Shahed University

 

Hamid Haj Seyyed Javadi

Professor - Ph.D - Computer Algebra


School of : Faculty of Engineering
Department : Computer Engineering
Room number :
Email :
Office Tel :51212250
Links :

EDUCATION:

Ph.D., Algebra, Amir Kabir University, 2003
    Dissertation: Generalized Quasi Baer Rings
    Dissertation Advisors: Ahmad Moussavi, Ph.D., Gholam Hossein Eslamzadeh, Ph.D.

M.Sc., Computational Algebra, Amir Kabir University,1996. 
      Thesis: Generalization of Some NonCommutative Rings Theorems, by Streb's Algorithm.
B.Sc., Mathematics and Computer Science,  Amir Kabir University.

https://mathscinet.ams.org/mathscinet/MRAuthorID/760776

Journal Papers (96)   Download XML   Download TXT

●  The IoT Resource Allocation Improvement in Fog Computing Using Non-Cooperative Game Theory
   ◂ Hamid Navidi Ghaziani, Houshyar Mohamadi, Hamid Haj Seyyed Javadi, A. Rezakhani
   ✔ 2022/06/01  1401/03/11
    پدافند الکترونیکی و سایبری
   ❖ PDF

●  Providing a Hybrid Cryptography Algorithm for Lightweight Authentication Protocol in RFID with Urban Traffic Usage Case
   ◂ Vahid Chegeni, Hamid Haj Seyyed Javadi, Mohammad Reza Moazami Goudarzi, Afshin RezaKhani
   ✔ 2022/01/05  1400/10/15
    The ISC International Journal of Information Security

●  A new resource allocation method in fog computing via non-cooperative game theory
   ◂ Houshyar Mohammady Talvar, Hamid Navidi Ghaziani, Afshin Rezakhani, Hamid Haj Seyyed Javadi
   ✔ 2021/10/05  1400/07/13
    Journal of Intelligent & Fuzzy Systems

●  A cooperative approach for combining particle swarm optimization and differential evolution algorithms to solve single-objective optimization problems
   ◂ Hamid Navidi Ghaziani, Mitra Mirzarezaee, Hamid Haj Seyyed Javadi, Marziayh Dadvar
   ✔ 2021/07/17  1400/04/26
    Applied Intelligence

●  Fair multi-owner search over encrypted data with forward and backward privacy in cloud-assisted Internet of Things
   ◂ Majid Bayat, Hamid Haj Seyyed Javadi, Aniseh Najafi
   ✔ 2021/06/09  1400/03/19
    Future Generation Computer Systems

●  Privacy Preserving Attribute-Based Encryption with Conjunctive Keyword Search for E-health Records in Cloud
   ◂ Aniseh Najafi, Hamid Haj Seyyed Javadi, Majid Bayat
   ✔ 2021/05/08  1400/02/18
    The ISC International Journal of Information Security

●  Dynamic secure multi-keyword ranked search over encrypted cloud data
   ◂ Parvaneh Asghari, Hamid Haj Seyyed Javadi, Maryam Hozhabr
   ✔ 2021/04/27  1400/02/07
    Journal of Information Security and Applications

●  Security in fog computing: A systematic review on issues, challenges and solutions
   ◂ Ronita Rezapour, Parvaneh Asghari, Hamid Haj Seyyed Javadi, Shamsollah Ghanbari
   ✔ 2021/04/27  1400/02/07
    Computer Science Review

●  A note on essential Ikeda–Nakayama rings
   ◂ Mahya Derakhshan, Shervin Sahebi, Hamid Haj Seyyed Javadi
   ✔ 2021/04/27  1400/02/07
    Rendiconti del Circolo Matematico di Palermo Series 2

●  A Scalable Key Pre-distribution Scheme based on the Unital Design for the Internet of Things Security
   ◂ V. Chegeni, Hamid Haj Seyyed Javadi, M.R. Moazami Goudarzi, A. Rezakhani
   ✔ 2021/04/27  1400/02/07
    IETE Journal of Research

●  Efficient and dynamic verifiable multi-keyword searchable symmetric encryption with full security
   ◂ Majid Bayat, Aniseh Najafi, Hamid Haj Seyyed Javadi
   ✔ 2021/04/27  1400/02/07
    Multimedia Tools and Applications

●  Internet of Things architecture challenges: A systematic review
   ◂ Tina Samizadeh Nikoui, Amir Masoud Rahmani, Ali Balador, Hamid Haj Seyyed Javadi
   ✔ 2021/04/27  1400/02/07
    International Journal of Communication Systems

●  A survey of key pre-distribution schemes based on combinatorial designs for resource-constrained devices in the IoT network
   ◂ Neda Solari Esfehani, Hamid Haj Seyyed Javadi
   ✔ 2021/04/27  1400/02/07
    Wireless Networks

●  A proactive fog service provisioning framework for Internet of Things applications: An autonomic approach
   ◂ Mohammad Faraji?Mehmandar, Sam Jabbehdari, Hamid Haj Seyyed Javadi
   ✔ 2021/04/27  1400/02/07
    Transactions on Emerging Telecommunications Technologies

●  یهینه سازی کدهای دودویی
   ◂ Hamid Haj Seyyed Javadi, parviz Gharehbaghri, Naser Gharehbagheri, parvaneh Asghari
   ✔ 2021/04/27  1400/02/07
    علوم رایانش و فناوری اطلاعات

●  Edge computing in SDN-IoT networks: a systematic review of issues, challenges and solutions
   ◂ Hamid Haj Seyyed Javadi, Seyedeh Shabnam Jazaeri, Sam Jabbehdari, Parvaneh Asghari
   ✔ 2021/04/27  1400/02/07
    Cluster Computing:The Journal of Networks, Software Tools and Applications

●  S-Boxهای پویا وابسته به کلید سبک وزن مبتنی بر جم بیضویی برای دستگاه های اینترنت اشیا
   ◂ parvaneh Asghari, Hamid Haj Seyyed Javadi
   ✔ 2021/02/25  1399/12/07
    علوم رایانش و فناوری اطلاعات

●  Key pre-distribution scheme based on transversal design in large mobile fog networks with multi-clouds
   ◂ Nafiseh Masaeli, Hamid Haj Seyyed Javadi, Seyed Hossein Erfani
   ✔ 2020/12/31  1399/10/11
    Journal of Information Security and Applications

●  -BAER -RINGS
   ◂ Hamid Haj Seyyed Javadi, Ali Shahidikia, Ahmad Moussavi
   ✔ 2020/12/30  1399/10/10
    International Electronic Journal of Algebra

●   A novel key pre-distribution scheme based on -PBIBD combinatorial design in the resource-constrained IoT network
   ◂ Hamid Haj Seyyed Javadi, Akbar Morshed Aski
   ✔ 2020/12/20  1399/09/30
    علوم رایانش و فناوری اطلاعات

●  Generalized Baer rings
   ◂ Ahmad MOUSSAVI2, Hamid Haj Seyyed Javadi, Ali Shahidikia
   ✔ 2020/12/05  1399/09/15
    Turkish Journal of Mathematics

●  A New Incentive Mechanism to Detect and Restrict Sybil Nodes in P2P File-Sharing Networks with a Heterogeneous Bandwidth
   ◂ M. Babazadeh Shareh, Hamid Haj Seyyed Javadi, M. HosseinZadeh, Hamid Navidi Ghaziani
   ✔ 2020/10/25  1399/08/04
    Journal of Artificial Intelligence & Data Mining=Journal of AI and Data Mining
   ❖ PDF

●  Measuring Efficiency of Financial Cloud Services in Banking Industry Using Modified Dynamic DEA with Network Structure (Case study: Iran E-Banking)
   ◂ Hamid Haj Seyyed Javadi, Alireza poordavoodi, mohamadreza moazami goudarzi, masoud rahmani
   ✔ 2020/07/18  1399/04/28
    Advances in Mathematical Finance and Applications

●  A dynamic fog service provisioning approach for IoT applications
   ◂ sam jabbehdari, mohammad faraji mehmandar, Hamid Haj Seyyed Javadi
   ✔ 2020/06/29  1399/04/09
    International Journal of Communication Systems

●  A Full Connectable and High Scalable Key Pre?distribution Scheme Based on Combinatorial Designs for Resource?Constrained Devices in IoT Network
   ◂ Hamid Haj Seyyed Javadi, Akbar Morshed Aski, Gholam Hassan Shirdel
   ✔ 2020/05/27  1399/03/07
    Wireless Personal Communications

●  Anomaly Detection in Smart Homes Using Bayesian Networks
   ◂ hossein amirkhani, Hamid Haj Seyyed Javadi, sasan saqaeeyan
   ✔ 2020/04/06  1399/01/18
    KSII Transactions on Internet and Information Systems

●  Using Residual Design for Key Management in Hierarchical Wireless Sensor Networks
   ◂ Hamid Haj Seyyed Javadi, vahid modiri, Amir masoud rahmani, mohamade anzani
   ✔ 2020/02/08  1398/11/19
    Journal of Information Systems and Telecommunication

●  A Novel Probabilistic Hybrid Model to Detect Anomaly in Smart Homes
   ◂ Hamid Haj Seyyed Javadi, sasan saqaeeyan, hossein amirkhani
   ✔ 2020/01/25  1398/11/05
    CMES - Computer Modeling in Engineering and Sciences

●  Privacy?aware cloud service composition based on QoS optimization in Internet of Things
   ◂ Pavaneh asghari, Amir masoud rahmani, Hamid Haj Seyyed Javadi
   ✔ 2020/01/23  1398/11/03
    Journal of Ambient Intelligence and Humanized Computing

●  A secure key-aggregate authentication cryptosystem for data sharing in dynamic cloud storage
   ◂ Kobra Alimohammadi, Majid Bayat, Hamid Haj Seyyed Javadi
   ✔ 2019/12/03  1398/09/12
    Multimedia Tools and Applications

●  Verifiable ranked search over encrypted data with forward and backward privacy
   ◂ Aniseh Najafi, Hamid Haj Seyyed Javadi, Majid Bayat
   ✔ 2019/06/21  1398/03/31
    Future Generation Computer Systems

●  A medical monitoring scheme and health?medical service composition model in cloud?based IoT platform
   ◂ Parvaneh Asghari, Amir Masoud Rahmani, Hamid Haj Seyyed Javadi
   ✔ 2019/05/28  1398/03/07
    Transactions on Emerging Telecommunications Technologies

●  Hybrid Key Pre-distribution Scheme Based on Symmetric Design
   ◂ Hamid Haj Seyyed Javadi, Samira Akhbarifar, Amir Masoud Rahmani, Mehdi Hosseinzadeh
   ✔ 2019/04/22  1398/02/02
    Iranian Journal of Science and Technology, Transactions A: Science

●  جستجو روی داده‌های رمزگذاری‌شده: قابلیت‌ها و چالش‌ها
   ◂ Ensienh Najafi, Majid Bayat, Hamid Haj Seyyed Javadi
   ✔ 2019/03/06  1397/12/15
    منادی امنیت فضای تولید و تبادل اطلاعات

●  Residual design of sink localization algorithms for wireless sensor networks
   ◂ Hamid Reza Sharifi, Hamid Haj Seyyed Javadi, Mehdi Hosseinzadeh, Ali Moeini
   ✔ 2019/02/19  1397/11/30
    Journal Of High Speed Networks

●  Topology Control in MANETs Using the Bayesian Pursuit Algorithm
   ◂ Parisa Rahmani, Hamid Haj Seyyed Javadi
   ✔ 2019/02/18  1397/11/29
    Wireless Personal Communications

●  Preventing Sybil attacks in P2P file sharing networks based on the evolutionary game model
   ◂ Morteza Babazadeh Shareh, Hamidreza Navidi, Hamid Haj Seyyed Javadi, Mehdi Hosseinzadeh
   ✔ 2019/01/25  1397/11/05
    Information Sciences
   ❖ PDF

●  Internet of Things applications: A systematic review
   ◂ Parvaneh Asghari, Amir Masoud Rahmani A, Hamid Haj Seyyed Javadi
   ✔ 2019/01/15  1397/10/25
    Computer Networks

●  Efficient clustering in collaborative filtering recommender system: Hybrid method based on genetic algorithm and gravitational emulation local search algorithm
   ◂ Touraj Mohammadpour, Amir Massoud Bidgoli, Rasul Enayatifar, Hamid Haj Seyyed Javadi
   ✔ 2019/01/02  1397/10/12
    Genomics

●  Service composition approaches in IoT: A systematic review
   ◂ Parvaneh Asghari, Amir Masoud Rahmani, Hamid Haj Seyyed Javadi
   ✔ 2018/10/16  1397/07/24
    Journal of Network and Computer Applications

●  Load balancing in join algorithms for skewed data in MapReduce systems
   ◂ Elaheh Gavagsaz, Ali Rezaee, Hamid Haj Seyyed Javadi
   ✔ 2018/09/01  1397/06/10
    The Journal of Supercomputing

●  A hierarchical key pre-distribution scheme for fog networks
   ◂ Kimkwang Raymond Choo, Ali Dehghantanha, Tooska Dargahi, Hamid Haj Seyyed Javadi, Pooneh Nikkhah Bahrami
   ✔ 2018/08/14  1397/05/23
    Concurrency and Computation: Practice and Experience

●  Cog-MAC Protocol: Channel Allocation in Cognitive Ad Hoc Networks Based on the Game of Learning Automata
   ◂ Parisa Rahmani, Hamid Haj Seyyed Javadi, Hamidreza Bakhshi, Mehdi Hosseinzadeh
   ✔ 2018/07/31  1397/05/09
    Wireless Personal Communications

●  Unital Design Based Sink Location Service for Wireless Sensor Networks
   ◂ Hamid Reza Sharifi, Hamid Haj Seyyed Javadi, Ali Moeini, Mehdi Hosseinzadeh
   ✔ 2018/07/07  1397/04/16
    IEEE Access

●  Load balancing in reducers for skewed data in MapReduce systems by using scalable simple random sampling
   ◂ Elaheh Gavagsaz, Ali Rezaee, Hamid Haj Seyyed Javadi
   ✔ 2018/07/01  1397/04/10
    The Journal of Supercomputing

●  Identification of Sybil attacks on social networks using a framework based on user interactions
   ◂ Hooman Asadian, Hamid Haj Seyyed Javadi
   ✔ 2018/04/01  1397/01/12
    Security and Privacy

●  TCLAB: A New Topology Control Protocol in Cognitive MANETs Based on Learning Automata
   ◂ Parisa Rahmani, Hamid Haj Seyyed Javadi, Hamidreza Bakhshi, Mehdi Hosseinzadeh
   ✔ 2017/08/23  1396/06/01
    Journal of Network and Systems Management

●  Detection and mitigation of pulse-delay attacks in pairwise-secured wireless sensor networks
   ◂ Tooska Dargahi, Hamid Haj Seyyed Javadi, Hosein Shafie, Payam Mousavi
   ✔ 2017/07/06  1396/04/15
     International Journal of High Performance Computing and Networking

●  A Novel Scalable Key Pre-distribution Scheme for Wireless Sensor Networks Based on Residual Design
   ◂ Vahid Modiri, Hamid Haj Seyyed Javadi, Mohaddese Anzani
   ✔ 2017/06/20  1396/03/30
    Wireless Personal Communications

●  Hypercube Bivariate-Based Key Management for Wireless Sensor Networks
   ◂ I. Qasemzadeh Kolagar, Hamid Haj Seyyed Javadi, M. Anzani
   ✔ 2017/06/13  1396/03/23
    Journal of Sciences, Islamic Republic of Iran

●  A Deterministic Multiple Key Space Scheme for Wireless Sensor Networks via Combinatorial Designs
   ◂ Ebrahim Ghasemzadeh, S. Hamid Haji Seyyed Javadi, Shahriar Bijani
   ✔ 2017/06/07  1396/03/17
    Journal of Communication Engineering

●  Securing Underwater Sensor Networks Against Routing Attacks
   ◂ Tooska Dargahi, Hamid Haj Seyyed Javadi, Hosein Shafiei
   ✔ 2017/05/25  1396/03/04
    Wireless Personal Communications

●  Key-management scheme for wireless sensor networks based on merging blocks of symmetric design
   ◂ Mohaddese Anzani, Hamid Haj Seyyed Javadi, Vahid Modirir
   ✔ 2017/04/20  1396/01/31
    Wireless Networks

●  Determining the Number of Accusations for Decision Making in Key Revocation Protocol for MANET
   ◂ Maryam Zarezadeh, Mohammadali Doostari, Hamid Haj Seyyed Javadi
   ✔ 2017/03/20  1395/12/30
    Journal of Computing and Security

●  A new method of trust mirroring estimation based on social networks parameters by fuzzy system
   ◂ Hossein Shirgahi, Mehran Mohsenzadeh, Hamid Haj Seyyed Javadi
   ✔ 2017/02/14  1395/11/26
    International Journal of Machine Learning and Cybernetics

●   New class of integral bipartite graphs with large diameter
   ◂ Alireza Fiuj Laali, Hamid Haj Seyyed Javadi
   ✔ 2017/01/14  1395/10/25
    Transactions on Combinatorics

●  A three level fuzzy system for evaluating the trust of single web services
   ◂ Hossein Shirgahi, Mehran Mohsenzadeh, Hamid Haj Seyyed Javadi
   ✔ 2017/01/12  1395/10/23
    Journal of Intelligent & Fuzzy Systems

●  On a generalization of NC-McCoy rings
   ◂ Mohammad Vahdani Mehrabadi, Shervin Sahebi, Hamid Haj Seyyed Javadi
   ✔ 2017/01/04  1395/10/15
    Miskolc Mathematical Notes

●  Hybrid Key Pre-distribution Scheme for Wireless Sensor Network Based on Combinatorial Design
   ◂ Hamid Haj Seyyed Javadi, Mohaddese. Anzani
   ✔ 2016/11/18  1395/08/28
    Journal of Advances in Computer Engineering and Technology

●  On a Generalization of f-Clean Rings
   ◂ Shervin Sahebi, Venus Rahmani, Hamid Haj Seyyed Javadi
   ✔ 2016/10/01  1395/07/10
    Journal of Computational and Theoretical Nanoscience

●  On Near Armendariz Ideals
   ◂ Kh. Khalilnezhad, Hamid Haj Seyyed Javadi
   ✔ 2016/07/26  1395/05/05
    Thai Journal of Mathematics

●  A deterministic Key Predistribution Method for Wireless Sensor Networks Based on Hypercube Multivariate Scheme
   ◂ M. Anzani, Hamid Haj Seyyed Javadi, A. Moeni
   ✔ 2016/07/12  1395/04/22
    Iranian Journal of Science and Technology, Transactions A: Science

●  On Complexity of Persian Orthography: L-Systems Approach
   ◂ Nassim Taghipour, Hamid Haj Seyyed Javadi, Mohammad Mahdi Dehshibi, Andrew Adamatzky
   ✔ 2016/07/06  1395/04/16
    Complex Systems

●  Trust estimation of the semantic web using semantic web clustering
   ◂ Hossein Shirgahi, Mehran Mohsenzadeh, Hamid Haj Seyyed Javadi
   ✔ 2016/06/28  1395/04/08
    Journal of Experimental & Theoretical Artificial Intelligence

●  Sink Location Service Based on Fano Plane in Wireless Sensor Networks
   ◂ Parisa Daneshjoo, Hamid Haj Seyyed Javadi, Hamid Reza Sharifi
   ✔ 2016/06/02  1395/03/13
    Journal of Communication Engineering

●  Solving the time-fractional diffusion equation via Sinc–Haar collocation method
   ◂ A. Pirkhedri, Hamid Haj Seyyed Javadi
   ✔ 2016/04/15  1395/01/27
    Applied Mathematics and Computation

●  Spectra of generalized corona of graphs
   ◂ A.R. Fiuj Laali, Hamid Haj Seyyed Javadi, Dariush Kiani
   ✔ 2016/03/15  1394/12/25
    Linear Algebra and Its Applications

●  Spectra of some special bipartite graphs
   ◂ A. R. Fiuj Laali, Hamid Haj Seyyed Javadi
   ✔ 2016/03/10  1394/12/20
    Miskolc Mathematical Notes

●  DEVELOPMENT OF A FUZZY EXPERT SYSTEM TO PRIORITIZE TRAFFIC CALMING PROJECTS
   ◂ Amir Falamarzi, Muhamad Nazri Borhan, Riza Atiq O. K. Rahmat, Samira Cheraghi, Hamid Haj Seyyed Javadi
   ✔ 2016/02/15  1394/11/26
    Jurnal Teknologi -Sciences & Engineering

●  A Novel Key Pre-Distribution Scheme for Wireless Sensor Networks
   ◂ Parisa Daneshjoo, Hamid Haj Seyyed Javadi, Mehdi Hosseinzadeh
   ✔ 2016/01/21  1394/11/01
    Journal of Computational and Theoretical Nanoscience

●  3D Path Planning Algorithm for Mobile Anchor-Assisted Positioning in Wireless Sensor Networks
   ◂ Hamid Reza Sharifi, Hamid Haj Seyyed Javadi
   ✔ 2015/09/05  1394/06/14
    Journal of Communication Engineering

●  A dynamic key management scheme for dynamic wireless sensor networks
   ◂ Seyed Hossein Erfani, Hamid Haj Seyyed Javadi, Amir Masoud Rahmani
   ✔ 2015/04/01  1394/01/12
    Security and Communication Networks

●  A note on generalized quasi-Baer rings
   ◂ M. Anzani, Haj Javadi
   ✔ 2014/11/17  1393/08/26
    Kragujevac Journal of Mathematics
   ❖ PDF

●  Numerical Algorithm Based on Haar-Sinc Collocation Method for Solving the Hyperbolic PDEs
   ◂ A. Pirkhedri, H. H. S. Javadi, H. R. Navidi
   ✔ 2014/11/16  1393/08/25
    Scientific World Journal
   ❖ PDF

●  On generalized AIP rings2014
   ◂ Hamid Haj Seyyed Javadi, Mohadese Anzani
   ✔ 2014/11/11  1393/08/20
    Iranian Journal of Science and Technology, Transactions A: Science

●  Key Predistribution Scheme for Clustered Hierarchical Wireless Sensor Networks based on Combinatorial Designs
   ◂ Masoumeh Javanbakht, Hossein Erfani, Hamid Haj Seyyed Javadi, Parisa Daneshjoo
   ✔ 2014/11/01  1393/08/10
    Security and Communication Networks
   ❖ PDF

●  On generalized AIP-rings
   ◂ M. Anzani, Hamid Haj Seyyed Javadi
   ✔ 2014/10/06  1393/07/14
    Iranian Journal of Science and Technology, Transactions A: Science
   ❖ PDF

●  Probabilistic Selection of Cluster-head based on the nearest possible Distance of Cluster-head
   ◂ Parisa Daneshjoo, Hamid Haj Seyyed Javadi, Mehdi Hosseinzadeh
   ✔ 2014/09/30  1393/07/08
    مهندسی برق مدرس=Modares Journal of Electrical Engineering- فنی و مهندسی مدرس سابق
   ❖ PDF

●  Application-specific hybrid symmetric design of key pre-distribution for wireless sensor networks
   ◂ Tooska Dargahi, Hamid Haj Seyyed Javadi, Mehdi Hosseinzadeh
   ✔ 2014/09/25  1393/07/03
    Security and Communication Networks
   ❖ PDF

●  Optimistic Selection of Cluster Heads Based on Facility Location Problem in Cluster-Based Routing Protocols
   ◂ Nafiseh Masaeli, Hamid Haj Seyyed Javadi, Elham Noori
   ✔ 2014/04/21  1393/02/01
    Wireless Personal Communications
   ❖ PDF

●  Spectral Galerkin Method For Solving Dynamic Stochastic Game
   ◂ Hamid Haj Seyyed Javadi, Hamid Navidi Ghaziani, PerKhedri, FATAHI, Jafarzadeh
   ✔ 2012/01/10  1390/10/20
    World Applied Science Journal
   ❖ PDF

●  solving MHD falkner-skac boundary-layer equation using collocation method based on ratiional legendre function with transformed hermite-gauss nodes
   ◂ Hamid Haj Seyyed Javadi
   ✔ 2011/10/01  1390/07/09
    World Applied Science Journal

●  Improvement of robot path planning using particle swarm optimization in dynamic environments with mobile obstacles and target
   ◂ Hamid Haj Seyyed Javadi, مریم یارمحمدی-حسین عرفانی
   ✔ 2011/03/03  1389/12/12
    Advanced Studies in Biology

●  An Improvement in Maximum Likelihood Location Estimation Algorithm in Sensor Networks
   ◂ Zeinab Abbasi, Ahmad Farahi, Hamid Haj Seyyed Javadi
   ✔ 2011/01/21  1389/11/01
    International Journal of Computer Science and Engineering Survey

●  A new distributed weighted multidimensional scaling algorithm localization in wireless sensor networks
   ◂ Fahime Dramami, Hamid Haj Seyyed Javadi, Ahmad Farahi
   ✔ 2011/01/21  1389/11/01
    Canadian Journal on Multimedia and Wireless Networks

●  Proposing a New Algorithm Based on Bees Behavior for Solving Graph Coloring
   ◂ Hamid Haj Seyyed Javadi
   ✔ 2010/12/22  1389/10/01
    INTERNATIONAL JOURNAL OF CONTEMPORARY MATHEMATICAL SCIENCES

●  Bee colony system :preciseness and speed in discrete optimization
   ◂ Hamid Haj Seyyed Javadi, صادق نوروزیان-حسین عرفانی-امیر مسعود رحمانی
   ✔ 2010/12/22  1389/10/01
    international Journal of Artificial Intelligence tools

●  Multi-Join Query Optimization Using the Bees Algorithm
   ◂ Mohammad Alamery, Ahmad Faraahi, Hamid Haj Seyyed Javadi, Sadegh Nourossana, Hossein Erfani
   ✔ 2010/03/21  1389/01/01
    Advances in Soft Computing- It,s Title Changed

●  BEE COLONY SYSTEM: PRECISENESS AND SPEED IN DISCRETE OPTIMIZATION
   ◂ Sadegh Nourossana, Hossein Erfani, Hamid Haj Seyyed Javadi, Amir Masoud Rahmani
   ✔ 2010/03/21  1389/01/01
    Advances in Intelligent and Soft Computing- It,s Title Changed

●  ON ARMENDARIZ IDEALS
   ◂ Hamid Haj Seyyed Javadi, Shaaban Qalandarzadeh
   ✔ 2010/03/21  1389/01/01
    Bulletin of the Korean Mathematical Society
   ❖ PDF

●  Polynomial extensions of generalized quasi-Baer rings
   ◂ Hamid Haj Seyyed Javadi, Shaaban Qalandarzadeh
   ✔ 2010/03/21  1389/01/01
    Ukrainian Mathematical Journal

●  A Meta Heuristic Solution for Closest Substring Problem Using Ant Colony System
   ◂ Hamid Haj Seyyed Javadi, Hamid Navidi Ghaziani, Askari Moghaddam, Hamid Navidi Ghaziani
   ✔ 2010/03/21  1389/01/01
    Advanced Studies in Biology

●  A Probabilistic Analysis for Greedy Paths
   ◂ Yashar Tavakoli, Hamid Haj Seyyed Javadi, Hossein Erfani
   ✔ 2008/08/29  1387/06/08
    American Institute of Physics

●  A Cellular Automata Based Algorithm for Path Planning in Multi-Agent Systems with a Common Goal
   ◂ Hamid Haj Seyyed Javadi, Yashar Tavakoli, sepide adabi
   ✔ 2008/07/01  1387/04/11
    International Journal of Computer Science and Network Security

●  Generalized Quasi-Baer Rings
   ◂ A. Moussavi, Hamid Haj Seyyed Javadi, E. Hashemi
   ✔ 2005/10/07  1384/07/15
    Communications in Algebra

●   Polynomial ?re extensions of Bear and p.p.-rings
   ◂ Hamid Haj Seyyed Javadi, E. Hashemi, A. Moussavi
   ✔ 2004/10/22  1383/08/01
    Bulletin of the Iranian Mathematical Society

Conference Papers (22)   Download XML   Download TXT

●  روشی برای جلوگیری از حمله 51 در سکه بیتی و مدل کردن ان با زنجیره ی مارکوف
   ◂ M.Shafiee, S.Javadi
   ✔ 2019/08/26  1398/06/04
    پنجاهمین کنفرانس سالانه ریاضی ایران
   ❖ PDF

●  SIMD Bpriori Algorithms
   ◂ F.S. Halataei, Hamid Haj Seyyed Javadi
   ✔ 2011/01/21  1389/11/01
    FOURTH European Symposium on Computer Modeling and Simulation

●  STATIC TASK SCHEDULING IN HOMOGENEOUS MULTIPROCESSOR SYSTEMS BASED ON GENETIC ALGORITHM
   ◂ Hamid Haj Seyyed Javadi
   ✔ 2010/07/24  1389/05/02
    Proceedings of the International Conference on ICSTE 2009

●  Solving the scheduling problem in multi-processor systems with communication cost and precedence using bee colony system
   ◂ Ali Hanani, Hamid Haj Seyyed Javadi, Sadegh Nourossana, Amir Masoud Rahmani
   ✔ 2010/07/23  1389/05/01
    INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING

●  image security sistem using recursive cellular automata substitution and permutation
   ◂ Hamid Haj Seyyed Javadi, Ebrahim Zarei Zefreh, Azam Sadeghiam
   ✔ 2010/07/13  1389/04/22
    دهمین کنفرانس سیستم های فازی ایران

●  بهبود کارایی الگوریتم کلنی مورچگان به وسیله جستجوی موضعی تقاطع (crossover) و جهش (mutation)
   ◂ Hamid Haj Seyyed Javadi, Hamid Navidi Ghaziani, Hamid Daman Garden
   ✔ 2010/05/05  1389/02/15
    سومین کنفرانس بین المللی انجمن ایرانی تحقیق در عملیات

●  طراحی مولد اعداد شبه تصادفی با استفاده از یک الگوریتم ژنتیک جدید
   ◂ Sima Sajjadi, Hamid Haj Seyyed Javadi, Fatemeh Nadali
   ✔ 2010/03/10  1388/12/19
    چهارمین کنفرانس ریاضی کاربردی ایران

●  الگوریتم پیوندی کلنی مورچگان و ژنتیک (HACO-GA) برای مسائل زمانبندی جایگشت خرید جریان (PFSP) با کمینه کردن زمان کل جریان
   ◂ Hamid Haj Seyyed Javadi, Hamid Navidi Ghaziani, Hamid Daman Garden
   ✔ 2010/03/10  1388/12/19
    چهارمین کنفرانس ریاضی کاربردی ایران

●  SIMD Bpriori Algorithms
   ◂ F.S. Halataei, Hamid Haj Seyyed Javadi
   ✔ 2010/02/24  1388/12/05
    Third UKSim European Symposium on Computer Modeling and Simulation

●  An energy aware cellular learning automata based routing algorithm for sensor networks
   ◂ Amir Hosein Fathy Navid, Hamid Haj Seyyed Javadi
   ✔ 2009/11/28  1388/09/07
    9th International Symposium on Communications and Information Technologies

●  Using Particle Swarm Optimization for Robot Path Planning in Dynamic Environments with Moving Obstacles and Target
   ◂ Amin Zargar Nasrollahy, Hamid Haj Seyyed Javadi
   ✔ 2009/11/25  1388/09/04
    Third UKSim European Symposium on Computer Modeling and Simulation

●  ICLEAR : Energy Aware Routing Protocol fo WSN Using Irregular Cellular Learning Automata
   ◂ Hamid Haj Seyyed Javadi, Amir Hossein Fathi Navid
   ✔ 2009/11/04  1388/08/13
    The 2009 IEEE Symposium on Industrial Electronics & Applications

●  Path Planning Algorithm for Mobile Robot Based on Multilayared Cellular Automata
   ◂ Hamid Haj Seyyed Javadi, Behmanesh, Erfani
   ✔ 2009/08/04  1388/05/13
    International Conferences of Mathematical Sciences

●  The Average Chebyshev Distance In A Grid
   ◂ Hamid Haj Seyyed Javadi, Tavakoli, Adabi
   ✔ 2009/08/04  1388/05/13
    International Conferences of Mathematical Sciences

●  Some Results About Algebraic Properties Of Generalized Cellular Automata
   ◂ Hamid Haj Seyyed Javadi, Dadsetani, Adabi
   ✔ 2009/08/04  1388/05/13
    International Conferences of Mathematical Sciences

●  An Algorithm for Robot Path Planning in Environments with Flashing Off-On Obstacles,Using Cellular Automata
   ◂ Hamid Haj Seyyed Javadi, Alaghmand, Ahmadi, Najafi
   ✔ 2009/08/04  1388/05/13
    International Conferences of Mathematical Sciences

●  Evaluation A Novel Cellular Automaton Based Energy-Conservating Solution In Mobile Wireless Sensor Networks
   ◂ Hamid Haj Seyyed Javadi, Adabi, Rezaee
   ✔ 2009/08/04  1388/05/13
    International conference of mathematical sciences

●  یک روش سریع در یافتن چهره در تصاویر RGB‌بر اساس دسته ماشین های بردار پشتیبان
   ◂ Hamid Haj Seyyed Javadi, Sajjad Tavassoli
   ✔ 2009/07/17  1388/04/26
    سومین کنگره مشترک سیستم هی فازی و هوشمند

●  Design an Efficient System for Intrusion Detection via Evolutionary Fuzzy System
   ◂ Abdolhamid Momenzadeh, Hamid Haj Seyyed Javadi, Mashallah Abbasi Dezfouli
   ✔ 2009/04/04  1388/01/15
     IEEE International Conference on Intelligent Computing and Intelligent Systems, 2009. .

●  استفده از سیستم دسته بندی فازی مبتنی بر جستجوی ممنوعه به منظور تشخیص نفوذ در شبکه های کامپیوتری
   ◂ Abdul Hamid Momenzadeh, Hamid Haj Seyyed Javadi
   ✔ 2008/11/11  1387/08/21
    IDMC2008

●  Generalized Mutrix Nearring of Generalized Quasi-Bear Nearring
   ◂ Hamid Haj Seyyed Javadi, Ghalandarzadeh, Malakoti Rad
   ✔ 2008/03/12  1386/12/22
    نوزدهمین سمینار جبر

●  Polynomial Extensions of Generalized Quasi Bear Rings
   ◂ Hamid Haj Seyyed Javadi, Ghalandarzadeh, Khoramdel
   ✔ 2008/03/12  1386/12/22
    نوزدهمین سمینار جبر

Thesis

●  H
   ◂ علی شهیدی کیا

●  Integrate blockchain loich IoT
   ◂ محمد گوهری

●  A secure cryptosystem for data sharing in dynamic cloud storage
   ◂ کبری علی محمدی

●  An enhanced model for searching on encrypted data with verifiability
   ◂ انیسه نجفی

●  A IoT cegnitive network topulogy control protocol based on learning automata
   ◂ علی بسمی

●  جلوگیری از حمله 51: تجزیه و تحلیل تصادفی از دو فاز اثبات کار در سکه بیتی
   ◂ محدثه شفیعی سروستانی

●  Entrpy-based source coding with linear time order
   ◂ پرویز قره باقری ترکی

●  طراحی یک سازوکار تشویقی مبتنی برشهرت برای حل مسایل شبکه های اشتراک فایل نظیر به نظیر
   ◂ مرتضی بابازاده شاره

●  ارایه یک طرح پیش توزیع کلید قطعی برای بهبود پارامترهای ارزیابی شبکه های حسگر بی سیم
   ◂ ابراهیم قاسم زاده کلاگر

●  ارایه الگوریتم توزیع شده کنترل توپولوژی در شبکه اقتضایی سیار شناختی
   ◂ پریسا رحمانی



H-Index Chart