default search action
Ali Mohammad Afshin Hemmatyar
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2025
- [j17]Mehrdad Momen-Tayefeh, Mehrshad Momen-Tayefeh, S. AmirAli Gh. Ghahramani, Ali Mohammad Afshin Hemmatyar:
Channel estimation for Massive MIMO systems aided by intelligent reflecting surface using semi-super resolution GAN. Signal Process. 227: 109710 (2025) - 2024
- [j16]Shiva Shamaei, Siavash Bayat, Ali Mohammad Afshin Hemmatyar:
Interference-Aware Resource Allocation Algorithm for D2D-Enabled Cellular Networks Using Matching Theory. IEEE Trans. Netw. Serv. Manag. 21(1): 759-772 (2024) - 2022
- [j15]Monireh Allah Gholi Ghasri, Ali Mohammad Afshin Hemmatyar:
A New Dynamic Optimal M2M RF Interface Setting in Relay Selection Algorithm (DORSA) for IoT Applications. IEEE Access 10: 5327-5342 (2022) - [j14]Ehsan Khosravi, Ali Mohammad Afshin Hemmatyar, Mahdi Jafari Siavoshani, Behzad Moshiri:
Safe Deep Driving Behavior Detection (S3D). IEEE Access 10: 113827-113838 (2022) - [j13]Monireh Allah Gholi Ghasri, Ali Mohammad Afshin Hemmatyar:
A Generalized Framework for Joint Dynamic Optimal RF Interface Setting and Next-Hop Selection in IoT Networks With Similar Requests. IEEE Netw. Lett. 4(2): 68-72 (2022) - 2020
- [j12]Monireh Allah Gholi Ghasri, Ali Mohammad Afshin Hemmatyar, Siavash Bayat, Mostafa Mahdieh:
Novel Relay Selection Algorithms for Machine-to-Machine Communications With Static RF Interfaces Setting. IEEE Access 8: 189989-190008 (2020) - [j11]Mohammed Gharib, Ahmad Foroozani, Shahbaz Rezaei, Ali Mohammad Afshin Hemmatyar, Ali Movaghar:
An area-scalable human-based mobility model. Comput. Networks 177: 107300 (2020) - 2019
- [j10]Mahsa Ehsanpour, Siavash Bayat, Ali Mohammad Afshin Hemmatyar:
An efficient and social-aware distributed in-network caching scheme in named data networks using matching theory. Comput. Networks 158: 175-183 (2019) - [j9]Shiva Shamaei, Siavash Bayat, Ali Mohammad Afshin Hemmatyar:
Interference Management in D2D-Enabled Heterogeneous Cellular Networks Using Matching Theory. IEEE Trans. Mob. Comput. 18(9): 2091-2102 (2019) - 2017
- [j8]Seyyed Amir Ali Ghafourian Ghahramani, Ali Mohammad Afshin Hemmatyar:
A Graph-based Performance Analysis of the 802.11p MAC Protocol for Safety Communications in Highway Vehicular Ad Hoc Networks. Comput. J. 60(2): 185-209 (2017) - [j7]Amin Bazzazi, Mohammad Taghi Manzuri Shalmani, Ali Mohammad Afshin Hemmatyar:
Hardware Trojan Detection Based on Logical Testing. J. Electron. Test. 33(4): 381-395 (2017) - [j6]Seyyed Amir Ali Ghafourian Ghahramani, Ali Mohammad Afshin Hemmatyar:
A Hybrid Approach to Analyze the Impact of Vehicular Traffic on Performance of 802.11p Protocol for Safety Communications in Vehicular Ad Hoc Networks: A Quantitative Analysis. Wirel. Pers. Commun. 97(3): 4493-4528 (2017) - 2016
- [j5]Maryam Tahani, Ali Mohammad Afshin Hemmatyar, Hamid R. Rabiee, Maryam Ramezani:
Inferring Dynamic Diffusion Networks in Online Media. ACM Trans. Knowl. Discov. Data 10(4): 44:1-44:22 (2016) - [j4]Seyed Amir Ali Ghafourian Ghahramani, Ali Mohammad Afshin Hemmatyar, Kaveh Kavousi:
A Network Model for Vehicular Ad Hoc Networks: An Introduction to Obligatory Attachment Rule. IEEE Trans. Netw. Sci. Eng. 3(2): 82-94 (2016) - 2015
- [j3]Majid Ashouri, Hamed Yousefi, Javad Basiri, Ali Mohammad Afshin Hemmatyar, Ali Movaghar:
PDC: Prediction-based data-aware clustering in wireless sensor networks. J. Parallel Distributed Comput. 81-82: 24-35 (2015) - 2013
- [j2]Fatemeh Ghods, Hamed Yousefi, Ali Mohammad Afshin Hemmatyar, Ali Movaghar:
MC-MLAS: Multi-channel Minimum Latency Aggregation Scheduling in Wireless Sensor Networks. Comput. Networks 57(18): 3812-3825 (2013) - 2010
- [j1]Mohammad Rashtian, Omid Hashemipour, Ali Mohammad Afshin Hemmatyar:
A simple time domain approach to noise analysis of switched capacitor circuits. IEICE Electron. Express 7(11): 745-750 (2010)
Conference and Workshop Papers
- 2023
- [c9]Morteza Hosseinioun, Ali Mohammad Afshin Hemmatyar, Saeid Ahmadifar, Hojjat Samiee, S. AmirAli Gh. Ghahramani:
Detecting Community Structures in Patients with Peripheral Nervous System Disorders. COMPLEX NETWORKS (2) 2023: 172-184 - 2018
- [c8]Mahsa Ehsanpour, Siavash Bayat, Ali Mohammad Afshin Hemmatyar:
On Efficient and Social-Aware Object Allocation in Named Data Networks Using Matching Theory. ISCC 2018: 298-303 - 2015
- [c7]Mahsa Gharehkoolchian, Ali Mohammad Afshin Hemmatyar, Mohammad Izadi:
Improving Security Issues in MANET AODV Routing Protocol. ADHOCNETS 2015: 237-250 - 2014
- [c6]Ahmad Foroozani, Mohammed Gharib, Ali Mohammad Afshin Hemmatyar, Ali Movaghar:
A novel human mobility model for MANETs based on real data. ICCCN 2014: 1-7 - [c5]Zohre Fath Fathabadi, Sadegh Dorri Nogoorani, Ali Mohammad Afshin Hemmatyar:
CR-SMTC: Privacy preserving collusion-resistant multi-party trust computation. ISCISC 2014: 167-172 - 2013
- [c4]Seyyed Amir Ali Ghafourian Ghahramani, Ali Mohammad Afshin Hemmatyar:
A new hybrid model for performance evaluation of IEEE 802.11p broadcast mode in vehicular ad hoc networks: A numerical analysis. ICCVE 2013: 719-725 - 2012
- [c3]Majid Ashouri, Hamed Yousefi, Ali Mohammad Afshin Hemmatyar, Ali Movaghar:
FOMA: Flexible overlay multi-path data aggregation in wireless sensor networks. ISCC 2012: 508-511 - [c2]Mahdieh Inanloo, Majid Ashouri, Sanaz Gheibi, Ali Mohammad Afshin Hemmatyar:
A new approach for multi-source data prediction in Wireless Sensor Networks: Collaborative filtering. WCSP 2012: 1-6 - 2009
- [c1]M. J. Khaledi, A. M. A. Hemmatyar, Hamid Reza Rabiee, Seyed Morteza Mousavi, M. H. Khaledi:
Mobility Analyzer: A Framework for Analysis and Recognition of Mobility Traces in Mobile Ad-Hoc Networks. NTMS 2009: 1-5
Informal and Other Publications
- 2024
- [i6]Yasaman Seraj, Soheil Fadaei, Bardia Safaei, Ali Javadi, Amir Mahdi Hosseini Monazzah, Ali Mohammad Afshin Hemmatyar:
LIMO: Load-balanced Offloading with MAPE and Particle Swarm Optimization in Mobile Fog Networks. CoRR abs/2408.14218 (2024) - 2021
- [i5]Monireh Allah Gholi Ghasri, Ali Mohammad Afshin Hemmatyar:
A New Dynamic Optimal Relay Selection and RF interfaces Setting Algorithm (DORSA) in M2M of IoT Applications. CoRR abs/2105.09553 (2021) - [i4]Monireh Allah Gholi Ghasri, Ali Mohammad Afshin Hemmatyar:
A Framework for Dynamic Optimal Next-Hop Selection and RF Interface Setting in IoT with the Same Source Requests. CoRR abs/2106.02927 (2021) - 2019
- [i3]Monireh Allah Gholi Ghasri, Ali Mohammad Afshin Hemmatyar, Siavash Bayat, Mostafa Mahdieh:
Novel Relay Selection Algorithms for Machine-to-Machine Communications with a Static RF Interface Usage. CoRR abs/1908.10351 (2019) - 2018
- [i2]Shahbaz Rezaei, Ali Mohammad Afshin Hemmatyar:
Study of Uniform Jitter Mechanism for Metric-based Wireless Routing. CoRR abs/1802.00163 (2018) - [i1]Vahid Ranjbar, Ali Mohammad Afshin Hemmatyar:
A Low Overhead Cooperative-based Authentication Protocol for VANETs. CoRR abs/1810.06184 (2018)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-22 21:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint