default search action
Ali Mohammad Saghiri
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j15]Ali Nikhalat Jahromi, Ali Mohammad Saghiri, Mohammad Reza Meybodi:
Asymmetric variable depth learning automaton and its application in defending against selfish mining attacks on bitcoin. Appl. Soft Comput. 170: 112416 (2025) - 2024
- [j14]Alireza Rezvanian, S. Mehdi Vahidipour, Ali Mohammad Saghiri:
CaAIS: Cellular Automata-Based Artificial Immune System for Dynamic Environments. Algorithms 17(1): 18 (2024) - [c5]Ali Nikhalat Jahromi, Ali Mohammad Saghiri, Mohammad Reza Meybodi:
Q-Defense: When Q-Learning Comes to Help Proof-of-Work Against the Selfish Mining Attack. ICAART (1) 2024: 37-46 - 2023
- [j13]Saeed Vasebi, Yeganeh M. Hayeri, Ali Mohammad Saghiri:
A Literature Review of Energy Optimal Adaptive Cruise Control Algorithms. IEEE Access 11: 13636-13646 (2023) - [j12]Saber Gholami, Ali Mohammad Saghiri, S. Mehdi Vahidipour, M. R. Meybodi:
HLA: a novel hybrid model based on fixed structure and variable structure learning automata. J. Exp. Theor. Artif. Intell. 35(2): 231-256 (2023) - [i2]Ali Nikhalat Jahromi, Ali Mohammad Saghiri, Mohammad Reza Meybodi:
Nik Defense: An Artificial Intelligence Based Defense Mechanism against Selfish Mining in Bitcoin. CoRR abs/2301.11463 (2023) - [i1]Ali Nikhalat Jahromi, Ali Mohammad Saghiri, Mohammad Reza Meybodi:
VDHLA: Variable Depth Hybrid Learning Automaton and Its Application to Defense Against the Selfish Mining Attack in Bitcoin. CoRR abs/2302.12096 (2023) - 2021
- [j11]Nahid Amirazodi, Ali Mohammad Saghiri, Mohammad Reza Meybodi:
A self-adaptive algorithm for super-peer selection considering the mobility of peers in cognitive mobile peer-to-peer networks. Int. J. Commun. Syst. 34(1) (2021) - [j10]Reza Mahmoudi, Siyavosh Roozi, Ali Mohammad Saghiri, Ali Mahmoudi:
Extracting Strategies for Improving Internet-of-Things-Based Home Industries in Iran: A Strengths, Weaknesses, Opportunities, and Threats Analysis. IEEE Trans. Engineering Management 68(2): 586-598 (2021) - [c4]Kamran Gholizadeh HamlAbadi, Monireh Vahdati, Ali Mohammad Saghiri, Agostino Forestiero:
Digital Twins in cancer: State-of-the-art and open research. CHASE 2021: 199-204 - [c3]Mohammad Mehdi Daliri Khomami, Alireza Rezvanian, Ali Mohammad Saghiri, Mohammad Reza Meybodi:
Solving Minimum Dominating Set in Multiplex Networks Using Learning Automata. CSICC 2021: 1-6
2010 – 2019
- 2018
- [b1]Alireza Rezvanian, Ali Mohammad Saghiri, Seyed Mehdi Vahidipour, Mehdi Esnaashari, Mohammad Reza Meybodi:
Recent Advances in Learning Automata. Studies in Computational Intelligence 754, Springer 2018, ISBN 978-3-319-72427-0, pp. 3-438 - [j9]Ali Mohammad Saghiri, Mohammad Reza Meybodi:
An adaptive super-peer selection algorithm considering peers capacity utilizing asynchronous dynamic cellular learning automata. Appl. Intell. 48(2): 271-299 (2018) - [j8]Ali Mohammad Saghiri, Mohammad Reza Meybodi:
On expediency of Closed Asynchronous Dynamic Cellular Learning Automata. J. Comput. Sci. 24: 371-378 (2018) - [j7]Ali Mohammad Saghiri, Mohammad Reza Meybodi:
Open asynchronous dynamic cellular learning automata and its application to allocation hub location problem. Knowl. Based Syst. 139: 149-169 (2018) - [j6]Nahid Amirazodi, Ali Mohammad Saghiri, Mohammad Reza Meybodi:
An adaptive algorithm for super-peer selection considering peer's capacity in mobile peer-to-peer networks based on learning automata. Peer-to-Peer Netw. Appl. 11(1): 74-89 (2018) - [c2]Monireh Vahdati, Kamran Gholizadeh HamlAbadi, Ali Mohammad Saghiri, Hassan Rashidi:
A Self-Organized Framework for Insurance Based on Internet of Things and Blockchain. FiCloud 2018: 169-175 - 2017
- [j5]Ali Mohammad Saghiri, Mohammad Reza Meybodi:
A closed asynchronous dynamic model of cellular learning automata and its application to peer-to-peer networks. Genet. Program. Evolvable Mach. 18(3): 313-349 (2017) - [j4]Ali Mohammad Saghiri, Mohammad Reza Meybodi:
A distributed adaptive landmark clustering algorithm based on mOverlay and learning automata for topology mismatch problem in unstructured peer-to-peer networks. Int. J. Commun. Syst. 30(3) (2017) - [j3]Sara Fathipour Deiman, Ali Mohammad Saghiri, Mohammad Reza Meybodi:
A Delay Aware Super-Peer Selection Algorithm for Gradient Topology Utilizing Learning Automata. Wirel. Pers. Commun. 95(3): 2611-2624 (2017) - 2016
- [j2]Ali Mohammad Saghiri, Mohammad Reza Meybodi:
An approach for designing cognitive engines in cognitive peer-to-peer networks. J. Netw. Comput. Appl. 70: 17-40 (2016) - [j1]Ali Mohammad Saghiri, Mohammad Reza Meybodi:
A Self-adaptive Algorithm for Topology Matching in Unstructured Peer-to-Peer Networks. J. Netw. Syst. Manag. 24(2): 393-426 (2016) - 2014
- [c1]Shahrbanoo Gholami, Mohammad Reza Meybodi, Ali Mohammad Saghiri:
A Learning Automata-Based Version of SG-1 Protocol for Super-Peer Selection in Peer-to-Peer Networks. IC2IT 2014: 189-201
Coauthor Index
aka: M. R. Meybodi
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 20:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint