default search action
Seyed Mojtaba Hosseini Bamakan
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Peyman Tirandazi, Seyed Mojtaba Hosseini Bamakan, Mohammad Jafar Haddadpoor Jahromi:
Systematic Thinking Approach for Analyzing Individuals and Government Impact on COVID-19 Outbreak in Iran. Int. J. Inf. Technol. Decis. Mak. 23(1): 89-106 (2024) - 2023
- [j14]Saeed Banaeian Far, Azadeh Imani Rad, Seyed Mojtaba Hosseini Bamakan, Maryam Rajabzadeh Asaar:
Toward Metaverse of everything: Opportunities, challenges, and future directions of the next generation of visual/virtual communications. J. Netw. Comput. Appl. 217: 103675 (2023) - [j13]Jalil Vaziri, Dariush Farid, Mehdi Nazemi Ardakani, Seyed Mojtaba Hosseini Bamakan, MohammadAli Shahlaei:
A time-varying stock portfolio selection model based on optimized PSO-BiLSTM and multi-objective mathematical programming under budget constraints. Neural Comput. Appl. 35(25): 18445-18470 (2023) - [j12]Peyman Tirandazi, Seyed Mojtaba Hosseini Bamakan, Aref Toghroljerdi:
A review of studies on internet of everything as an enabler of neuromarketing methods and techniques. J. Supercomput. 79(7): 7835-7876 (2023) - [j11]Payam Porkar Rezaeiye, Kazem Razeghinia, Jafar Ahmad Abed Alzubi, Mehdi Gheisari, Amir Javadpour, Seyed Mojtaba Hosseini Bamakan, Christian Fernández-Campusano, Yang Liu:
Exploring a Mesh-Hub-Based Wireless Sensor Network for Smart Home Electrical Monitoring. Wirel. Pers. Commun. 133(4): 2067-2086 (2023) - 2022
- [c5]Saeed Banaeian Far, Seyed Mojtaba Hosseini Bamakan, Qiang Qu, Qingshan Jiang:
A Review of Non-fungible Tokens Applications in the Real-world and Metaverse. ITQM 2022: 755-762 - [c4]Mohammadsadegh Solouki, Seyed Mojtaba Hosseini Bamakan:
An In-depth Insight at Digital Ownership Through Dynamic NFTs. ITQM 2022: 875-882 - 2021
- [j10]Seyed Mojtaba Hosseini Bamakan, Najmeh Faregh, Ahad Zareravasan:
Di-ANFIS: an integrated blockchain-IoT-big data-enabled framework for evaluating service supply chain performance. J. Comput. Des. Eng. 8(2): 676-690 (2021) - 2020
- [j9]Seyed Mojtaba Hosseini Bamakan, Amirhossein Motavali, Alireza Babaei Bondarti:
A survey of blockchain consensus algorithms performance evaluation criteria. Expert Syst. Appl. 154: 113385 (2020) - [j8]Ildar Nurgaliev, Qiang Qu, Seyed Mojtaba Hosseini Bamakan, Muhammad Muzammal:
Matching user identities across social networks with limited profile data. Frontiers Comput. Sci. 14(6): 146809 (2020) - [j7]Yingjie Tian, Mahboubeh Mirzabagheri, Peyman Tirandazi, Seyed Mojtaba Hosseini Bamakan:
A non-convex semi-supervised approach to opinion spam detection by ramp-one class SVM. Inf. Process. Manag. 57(6): 102381 (2020)
2010 – 2019
- 2019
- [j6]Seyed Mojtaba Hosseini Bamakan, Ildar Nurgaliev, Qiang Qu:
Opinion leader detection: A methodological review. Expert Syst. Appl. 115: 200-222 (2019) - 2018
- [j5]Yingjie Tian, Mahboubeh Mirzabagheri, Seyed Mojtaba Hosseini Bamakan, Huadong Wang, Qiang Qu:
Ramp loss one-class support vector machine; A robust and effective approach to anomaly detection problems. Neurocomputing 310: 223-235 (2018) - 2017
- [j4]Seyed Mojtaba Hosseini Bamakan, Huadong Wang, Yong Shi:
Ramp loss K-Support Vector Classification-Regression; a robust and sparse multi-class approach to the intrusion detection problem. Knowl. Based Syst. 126: 113-126 (2017) - [c3]Huadong Wang, Jianyu Miao, Seyed Mojtaba Hosseini Bamakan, Lingfeng Niu, Yong Shi:
Large-scale Nonparallel Support Vector Ordinal Regression Solver. ICCS 2017: 1261-1270 - 2016
- [j3]Seyed Mojtaba Hosseini Bamakan, Huadong Wang, Yingjie Tian, Yong Shi:
An effective intrusion detection framework based on MCLP/SVM optimized by time-varying chaos particle swarm optimization. Neurocomputing 199: 90-102 (2016) - 2015
- [j2]Huadong Wang, Sicong Guo, Seyed Mojtaba Hosseini Bamakan, Yong Shi:
Homeomorphism Problems of Fuzzy Real Number Space and The Space of Bounded Functions with Same Monotonicity on [-1, 1]. Int. J. Comput. Commun. Control 10(6): 129-143 (2015) - [j1]Seyed Mojtaba Hosseini Bamakan, Mohammad Dehghanimohammadabadi:
A Weighted Monte Carlo Simulation Approach to Risk Assessment of Information Security Management System. Int. J. Enterp. Inf. Syst. 11(4): 63-79 (2015) - [c2]Seyed Mojtaba Hosseini Bamakan, Behnam Amiri, Mahboubeh Mirzabagheri, Yong Shi:
A New Intrusion Detection Approach Using PSO based Multiple Criteria Linear Programming. ITQM 2015: 231-237 - 2014
- [c1]Seyed Mojtaba Hosseini Bamakan, Peyman Gholami:
A Novel Feature Selection Method based on an Integrated Data Envelopment Analysis and Entropy Model. ITQM 2014: 632-638
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint