default search action
Mojtaba Alizadeh
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j22]Mojtaba Alizadeh, Mohammad Hesam Tadayon, Alireza Jolfaei:
Secure ticket-based authentication method for IoT applications. Digit. Commun. Networks 9(3): 710-716 (2023) - 2022
- [j21]Saman Shojae Chaeikar, Mojtaba Alizadeh, Mohammad Hesam Tadayon, Alireza Jolfaei:
An intelligent cryptographic key management model for secure communications in distributed industrial intelligent systems. Int. J. Intell. Syst. 37(12): 10158-10171 (2022) - [c3]Farnaz Arab, Mazdak Zamani, Sasan Karamizadeh, Mojtaba Alizadeh, Saman Shojae Chaeikar, Touraj Khodadadi:
Comparison of Data Hiding Techniques for Video Watermarking Applications. ICCCS 2022: 168-173 - 2021
- [j20]S. Mohammadreza Ebrahimi, Milad Malekzadeh, Mojtaba Alizadeh, S. Hassan HosseinNia:
Parameter identification of nonlinear system using an improved Lozi map based chaotic optimization algorithm (ILCOA). Evol. Syst. 12(2): 255-272 (2021) - [j19]Azana Hafizah Mohd Aman, Wan Haslina Hassan, Shilan Sameen, Zainab Senan Attarbashi, Mojtaba Alizadeh, Liza Abdul Latiff:
IoMT amid COVID-19 pandemic: Application, architecture, technology, and security. J. Netw. Comput. Appl. 174: 102886 (2021) - [j18]Mojtaba Alizadeh, Mohammad Hesam Tadayon, Kouichi Sakurai, Hiroaki Anada, Alireza Jolfaei:
A Secure Ticket-Based Authentication Mechanism for Proxy Mobile IPv6 Networks in Volunteer Computing. ACM Trans. Internet Techn. 21(4): 82:1-82:16 (2021)
2010 – 2019
- 2019
- [j17]Hossein Ahmadi, Goli Arji, Leila Shahmoradi, Reza Safdari, Mehrbakhsh Nilashi, Mojtaba Alizadeh:
The application of internet of things in healthcare: a systematic literature review and classification. Univers. Access Inf. Soc. 18(4): 837-869 (2019) - 2018
- [j16]Mojtaba Alizadeh, S. F. Bagheri, Ehsan Bahrami Samani, Saeid Ghobadi, S. Nadarajah:
Exponentiated power Lindley power series class of distributions: Theory and applications. Commun. Stat. Simul. Comput. 47(9): 2499-2531 (2018) - [j15]Ali Shabani, Saralees Nadarajah, Mojtaba Alizadeh:
The (α, β)-cut control charts for process average based on the generalised intuitionistic fuzzy number. Int. J. Syst. Sci. 49(2): 392-406 (2018) - 2017
- [j14]Mojtaba Alizadeh, S. Nadarajah, Mahdi Doostparast, Abbas Parchami, Mashaallah Mashinchi:
On confidence bounds for one-parameter exponential families. Commun. Stat. Simul. Comput. 46(2): 1569-1582 (2017) - [j13]Kianoush Fathi, Seyyed Fazel Bagheri, Mojtaba Alizadeh, Mohammad Alizadeh:
A study of methods for estimating in the exponentiated Gumbel distribution. J. Stat. Theory Appl. 16(1): 81-95 (2017) - [c2]Mojtaba Alizadeh, Mohammad Hesam Tadayon, Kouichi Sakurai, Sabariah Baharun, Hiroaki Anada, Mazdak Zamani, Akram M. Zeki, Shehzad Ashraf Chaudhry, Muhammad Khurram Khan:
Comments and improvements of "HOTA: Handover optimized ticket-based authentication in network-based mobility management". ICIN 2017: 112-116 - 2016
- [j12]S. F. Bagheri, Mojtaba Alizadeh, S. Nadarajah:
Efficient Estimation of the PDF and the CDF of the Exponentiated Gumbel Distribution. Commun. Stat. Simul. Comput. 45(1): 339-361 (2016) - [j11]S. F. Bagheri, Mojtaba Alizadeh, S. Nadarajah, Einolah Deiri:
Efficient Estimation of the PDF and the CDF of the Weibull Extension Model. Commun. Stat. Simul. Comput. 45(6): 2191-2207 (2016) - [j10]Milad Malekzadeh, Jalil Sadati, Mojtaba Alizadeh:
Adaptive PID controller design for wing rock suppression using self-recurrent wavelet neural network identifier. Evol. Syst. 7(4): 267-275 (2016) - [j9]Mojtaba Alizadeh, Saeid Abolfazli, Mazdak Zamani, Sabariah Baharun, Kouichi Sakurai:
Authentication in mobile cloud computing: A survey. J. Netw. Comput. Appl. 61: 59-80 (2016) - 2015
- [j8]Morteza Tofighi, Mojtaba Alizadeh, Soheil Ganjefar, Morteza Alizadeh:
Direct adaptive power system stabilizer design using fuzzy wavelet neural network with self-recurrent consequent part. Appl. Soft Comput. 28: 514-526 (2015) - [j7]Leila Ranjbari, Amir H. Shirdel, M. Aslahi-Shahri, S. Anbari, Ali Ebrahimi, M. Darvishi, Mojtaba Alizadeh, Rasoul Rahmani, Mehdi Seyedmahmoudian:
Designing precision fuzzy controller for load swing of an overhead crane. Neural Comput. Appl. 26(7): 1555-1560 (2015) - [j6]Babak Emami Abarghouei, Ali Farrokhtala, Mojtaba Alizadeh:
DNACK: False Data Detection Based on Negative Acknowledgment and Digital Signature on Mobile Ad-hoc Network. Wirel. Pers. Commun. 83(1): 1-15 (2015) - 2014
- [j5]Ehsan Amiri, Hassan Keshavarz, Mojtaba Alizadeh, Mazdak Zamani, Touraj Khodadadi:
Energy Efficient Routing in Wireless Sensor Networks Based on Fuzzy Ant Colony Optimization. Int. J. Distributed Sens. Networks 10 (2014) - [j4]Saeid Abolfazli, Zohreh Sanaei, Mojtaba Alizadeh, Abdullah Gani, Feng Xia:
An experimental analysis on cloud-based mobile augmentation in mobile cloud computing. IEEE Trans. Consumer Electron. 60(1): 146-154 (2014) - [i1]Jafar Shayan, Ahmad Azarnik, Suriayati Chuprat, Sasan Karamizadeh, Mojtaba Alizadeh:
Identifying Benefits and risks associated with utilizing cloud computing. CoRR abs/1401.5155 (2014) - 2013
- [j3]Mojtaba Alizadeh, Soheil Ganjefar, Morteza Alizadeh:
Wavelet neural adaptive proportional plus conventional integral-derivative controller design of SSSC for transient stability improvement. Eng. Appl. Artif. Intell. 26(9): 2227-2242 (2013) - [j2]Mojtaba Alizadeh, Morteza Tofighi:
Full-adaptive THEN-part equipped fuzzy wavelet neural controller design of FACTS devices to suppress inter-area oscillations. Neurocomputing 118: 157-170 (2013) - [j1]Mojtaba Alizadeh, Morteza Alizadeh, Soheil Ganjefar:
Simultaneous coordinated design of PSS and SSSC using improved Lozi map based chaotic optimization algorithm (ILCOA). Neurocomputing 122: 181-192 (2013) - [c1]Mojtaba Alizadeh, Wan Haslina Hassan:
Challenges and opportunities of Mobile Cloud Computing. IWCMC 2013: 660-666
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:53 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint