default search action
Amir Hossein Mohajerzadeh
Person information
- affiliation: Ferdowsi University of Mashhad, Iran
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j19]Mohammad Amin Zare Soltani, Seyed-Amin Hosseini-Seno, Amir Hossein Mohajerzadeh:
Optimizing SDN resource allocation using fuzzy logic and VM mapping technique. Computing 107(1): 13 (2025) - 2024
- [j18]Zahra Rahimi, Reza Ghanbari, Amir Hossein Mohajerzadeh, Hamed Ahmadi:
3-D UAV Small Cell Base Station Positioning and Resource Allocation in Cellular Network: A Stochastic Optimization Approach. IEEE Internet Things J. 11(6): 10951-10963 (2024) - [j17]Mohammad Javad Sobouti, Haitham Y. Adarbah, Mojtaba Miraghajanian, Amir Hossein Mohajerzadeh, Mohammad Reza Chalak Qazani, Halim Yanikomeroglu:
Cooperative High-Rate and Low-Latency Transmission, Employing Two-Tier Narrow-Band Internet-of-Things and Bluetooth Low-Energy Networks. IEEE Open J. Commun. Soc. 5: 6135-6149 (2024) - [j16]Mohammad Javad Sobouti, Haitham Y. Adarbah, Afshin Alaghehband, Hamid Chitsaz, Amir Hossein Mohajerzadeh, Mehdi Sookhak, Seyed-Amin Hosseini-Seno, Abedin Vahedian, Fatemeh Afghah:
Efficient Fuzzy-Based 3-D Flying Base Station Positioning and Trajectory for Emergency Management in 5G and Beyond Cellular Networks. IEEE Syst. J. 18(2): 814-825 (2024) - [j15]Seyed Mohsen Safavi, Seyed-Amin Hosseini-Seno, Amir Hossein Mohajerzadeh:
An Adaptive Cell Switch Off framework to Increase Energy Efficiency in Cellular Networks. Wirel. Pers. Commun. 135(4): 2011-2037 (2024) - 2023
- [j14]Haitham Y. Adarbah, Mostafa Farhadi Moghadam, Rolou Lyn Rodriguez Maata, Amir Hossein Mohajerzadeh, Ali H. Al-Badi:
Security Challenges of Selective Forwarding Attack and Design a Secure ECDH-Based Authentication Protocol to Improve RPL Security. IEEE Access 11: 11268-11280 (2023) - 2022
- [j13]Zahra Rahimi, Mohammad Javad Sobouti, Reza Ghanbari, Seyed-Amin Hosseini-Seno, Amir Hossein Mohajerzadeh, Hamed Ahmadi, Halim Yanikomeroglu:
An Efficient 3-D Positioning Approach to Minimize Required UAVs for IoT Network Coverage. IEEE Internet Things J. 9(1): 558-571 (2022) - [c6]Zahra Rahimi, Reza Ghanbari, Amir Hossein Mohajerzadeh, Hamed Ahmadi, Mehdi Sookhak:
3D UAV BS Positioning and Backhaul Management in Cellular Network Via Stochastic Optimization. GLOBECOM 2022: 2169-2175 - [i4]Mehdi Sookhak, Amir Hossein Mohajerzadeh:
Joint position and trajectory optimization of flying base station in 5G cellular networks, based on users' current and predicted location. CoRR abs/2202.03832 (2022) - [i3]Mehdi Sookhak, Amir Hossein Mohajerzadeh:
FSM: FBS Set Management, An energy efficient multi-drone 3D trajectory approach in cellular networks. CoRR abs/2202.03834 (2022) - 2021
- [j12]Nedhal Ahmad Hamdi Qaiwmchi, Haleh Amintoosi, Amir Hossein Mohajerzadeh:
Intrusion Detection System Based on Gradient Corrected Online Sequential Extreme Learning Machine. IEEE Access 9: 4983-4999 (2021) - [j11]Mahsa Shadi, Saeid Abrishami, Amir Hossein Mohajerzadeh, Behrooz Zolfaghari:
Ready-time partitioning algorithm for computation offloading of workflow applications in mobile cloud computing. J. Supercomput. 77(6): 6408-6434 (2021) - 2020
- [j10]Mostafa Farhadi Moghadam, Mahdi Nikooghadam, Maytham Azhar Baqer Al Jabban, Mohammad Alishahi, Leili Mortazavi, Amir Hossein Mohajerzadeh:
An Efficient Authentication and Key Agreement Scheme Based on ECDH for Wireless Sensor Network. IEEE Access 8: 73182-73192 (2020) - [c5]Saideh Ahangary, Hamid Chitsaz, Mohammad Javad Sobouti, Amir Hossein Mohajerzadeh, Mohammad Hossein Yaghmaee, Hamed Ahmadi:
Reactive caching of viral content in 5G networks. CommNet 2020: 1-7
2010 – 2019
- 2019
- [j9]Behrouz Bolourian Haghighi, Amir Hossein Taherinia, Amir Hossein Mohajerzadeh:
TRLG: Fragile blind quad watermarking for image tamper detection and recovery by providing compact digests with optimized quality using LWT and GA. Inf. Sci. 486: 204-230 (2019) - [j8]Seyyed Hossein Soleymani, Amir Hossein Taherinia, Amir Hossein Mohajerzadeh:
WACA: a new blind robust watermarking method based on Arnold Cat map and amplified pseudo-noise strings with weak correlation. Multim. Tools Appl. 78(14): 19163-19179 (2019) - [j7]Zahra Izadi-Ghodousi, Mahsa Hosseinpour, Fatemeh Safaei, Amir Hossein Mohajerzadeh, Mohammad Alishahi:
An Efficient Target Tracking in Directional Sensor Networks Using Adapted Unscented Kalman Filter. Wirel. Pers. Commun. 109(3): 1925-1954 (2019) - 2018
- [j6]Amir Hossein Mohajerzadeh, Hasan Jahedinia, Zahra Izadi-Ghodousi, Dariush Abbasinezhad-Mood, Mahdi Salehi:
Efficient target tracking in directional sensor networks with selective target area's coverage. Telecommun. Syst. 68(1): 47-65 (2018) - [i2]Behrouz Bolourian Haghighi, Amir Hossein Taherinia, Amir Hossein Mohajerzadeh:
TRLG: Fragile blind quad watermarking for image tamper detection and recovery by providing compact digests with quality optimized using LWT and GA. CoRR abs/1803.02623 (2018) - [i1]Seyyed Hossein Soleymani, Amir Hossein Taherinia, Amir Hossein Mohajerzadeh:
A blind robust watermarking method based on Arnold Cat map and amplified pseudo-noise strings with weak correlation. CoRR abs/1804.11240 (2018) - 2015
- [j5]Amir Hossein Mohajerzadeh, Mohammad Hossein Yaghmaee, Afsane Zahmatkesh:
Efficient data collecting and target parameter estimation in wireless sensor networks. J. Netw. Comput. Appl. 57: 142-155 (2015) - [j4]Amir Hossein Mohajerzadeh, Mohammad Hossein Yaghmaee, Vahid Fakoor:
Total Data Collection Algorithm Based on Estimation Model for Wireless Sensor Network. Wirel. Pers. Commun. 81(2): 745-778 (2015) - 2014
- [j3]Abbas Ali Rezaee, Mohammad Hossein Yaghmaee, Amir Masoud Rahmani, Amir Hossein Mohajerzadeh:
HOCA: Healthcare Aware Optimized Congestion Avoidance and control protocol for wireless sensor networks. J. Netw. Comput. Appl. 37: 216-228 (2014) - 2013
- [j2]Nazbanoo Farzaneh, Reza Monsefi, Mohammad Hossein Yaghmaee, Amir Hossein Mohajerzadeh:
A novel congestion control protocol with AQM support for IP-based networks. Telecommun. Syst. 52(1): 229-244 (2013) - 2010
- [j1]Amir Hossein Mohajerzadeh, Mohammad Hossien Yaghmaee:
Tree Based Energy and Congestion Aware Routing Protocol for Wireless Sensor Networks. Wirel. Sens. Netw. 2(2): 161-167 (2010) - [c4]Amir Hossein Mohajerzadeh, Mohammad Hossein Yaghmaee, Reza Monsefi:
A QoS based data dissemination protocol for wireless multimedia sensor networks. IWACI 2010: 670-675
2000 – 2009
- 2009
- [c3]Amir Hossein Mohajerzadeh, Mohammad Hossein Yaghmaee:
An efficient energy aware routing protocol for real time traffic in wireless sensor networks. ICUMT 2009: 1-9 - [c2]Amir Hossein Mohajerzadeh, Mohammad Hossein Yaghmaee, Hadi Sadoghi Yazdi, Abbas Ali Rezaee:
A fair routing protocol using generic utility based approach in Wireless Sensor Networks. ICUMT 2009: 1-4 - 2008
- [c1]Zahra Eskandari, Mohammad Hossein Yaghmaee, Amir Hossein Mohajerzadeh:
Energy Efficient Spanning Tree for Data Aggregation in Wireless Sensor Networks. ICCCN 2008: 812-816
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-11 21:41 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint