default search action
Mohammad Fathian
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j49]Reza Aalikhani, Mohammad Fathian, Mohammad Reza Rasouli:
Comparative Analysis of Classification-Based and Regression-Based Predictive Process Monitoring Models for Accurate and Time-Efficient Remaining Time Prediction. IEEE Access 12: 67063-67093 (2024) - [j48]Morteza Rakhshaninejad, Mohammad Fathian, Reza Shirkoohi, Farnaz Barzinpour, Amir H. Gandomi:
Refining breast cancer biomarker discovery and drug targeting through an advanced data-driven approach. BMC Bioinform. 25(1): 33 (2024) - [j47]Nasibeh Pouti, Mohammad Taghi Taghavifard, Mohammad Reza Taghva, Mohammad Fathian:
Adopting Social Banking: A Socio-Technical Innovation of Service-Oriented Social Commerce. Int. J. Inf. Technol. Decis. Mak. 23(5): 1777-1833 (2024) - [j46]Samira Ebrahimi, Mohammad Fathian, Seyyed-Mahdi Hosseini-Motlagh:
Coordinating Location Information Sharing Strategy in a Sustainable Dual-Channel Closed-Loop Supply Chain. IEEE Trans. Syst. Man Cybern. Syst. 54(6): 3525-3533 (2024) - [i3]Mahsa Azarshab, Mohammad Fathian, Babak Amiri:
An enhanced Teaching-Learning-Based Optimization (TLBO) with Grey Wolf Optimizer (GWO) for text feature selection and clustering. CoRR abs/2402.11839 (2024) - 2023
- [j45]Babak Nouri-Moghaddam, Mehdi Ghazanfari, Mohammad Fathian:
A novel bio-inspired hybrid multi-filter wrapper gene selection method with ensemble classifier for microarray data. Neural Comput. Appl. 35(16): 11531-11561 (2023) - [j44]Saeed NasehiMoghaddam, Mohammad Fathian, Babak Amiri:
Alternate Solutions for Influence Maximization: Beyond theoretical approximation by the Genetic Algorithm Framework. Swarm Evol. Comput. 83: 101424 (2023) - [j43]Saeed NasehiMoghaddam, Mohammad Fathian, Babak Amiri:
Risk-Averse Influence Maximization. J. Supercomput. 79(3): 2519-2569 (2023) - 2022
- [j42]Morteza Rakhshaninejad, Mohammad Fathian, Babak Amiri, Navid Yazdanjue:
An Ensemble-Based Credit Card Fraud Detection Algorithm Using an Efficient Voting Strategy. Comput. J. 65(8): 1998-2015 (2022) - [j41]Nasibeh Pouti, Mohammad Taghi Taghavifard, Mohammad Reza Taghva, Mohammad Fathian:
Determining the factors affecting the acceptance of social commerce in service-oriented businesses using the fuzzy Delphi method. Int. J. Electron. Bus. 17(2): 135-161 (2022) - [j40]Mohammad Reza Razian, Mohammad Fathian, Rami Bahsoon, Adel Nadjaran Toosi, Rajkumar Buyya:
Service composition in dynamic environments: A systematic review and future directions. J. Syst. Softw. 188: 111290 (2022) - 2021
- [j39]Babak Nouri-Moghaddam, Mehdi Ghazanfari, Mohammad Fathian:
A novel multi-objective forest optimization algorithm for wrapper feature selection. Expert Syst. Appl. 175: 114737 (2021) - [j38]Mohammad Reza Razian, Mohammad Fathian, Huaming Wu, Ahmad Akbari, Rajkumar Buyya:
SAIoT: Scalable Anomaly-Aware Services Composition in CloudIoT Environments. IEEE Internet Things J. 8(5): 3665-3677 (2021) - [i2]Babak Nouri-Moghaddam, Mehdi Ghazanfari, Mohammad Fathian:
A Novel Bio-Inspired Hybrid Multi-Filter Wrapper Gene Selection Method with Ensemble Classifier for Microarray Data. CoRR abs/2101.00819 (2021) - [i1]Alireza Seifousadati, Saeid Ghasemshirazi, Mohammad Fathian:
A Machine Learning Approach for DDoS Detection on IoT Devices. CoRR abs/2110.14911 (2021) - 2020
- [j37]Mohammad Fathian, Hossein Sharifi, Elnaz Nasirzadeh:
Conceptualizing the Role of Gamification in Contemporary Enterprises. IEEE Access 8: 220188-220204 (2020) - [j36]Mohammad Amini, Mohammad Fathian, Mehdi Ghazanfari:
A BOA-based adaptive strategy with multi-party perspective for automated multilateral negotiations. Appl. Intell. 50(9): 2718-2748 (2020) - [j35]Hamed Kalantari, Mehdi Ghazanfari, Mohammad Fathian, Kamran Shahanaghi:
Multi-objective optimization model in a heterogeneous weighted network through key nodes identification in overlapping communities. Comput. Ind. Eng. 144: 106413 (2020) - [j34]Navid Yazdanjue, Mohammad Fathian, Babak Amiri:
Evolutionary Algorithms For k-Anonymity In Social Networks Based On Clustering Approach. Comput. J. 63(7): 1039-1062 (2020) - [j33]Elnaz Nasirzadeh, Mohammad Fathian:
Investigating the effect of gamification elements on bank customers to personalize gamified systems. Int. J. Hum. Comput. Stud. 143: 102469 (2020) - [j32]Mohammad Reza Razian, Mohammad Fathian, Rajkumar Buyya:
ARC: Anomaly-aware Robust Cloud-integrated IoT service composition based on uncertainty in advertised quality of service values. J. Syst. Softw. 164: 110557 (2020) - [j31]Javid Jouzdani, Mohammad Fathian, Ahmad Makui, Mehdi Heydari:
Robust design and planning for a multi-mode multi-product supply network: a dairy industry case study. Oper. Res. 20(3): 1811-1840 (2020)
2010 – 2019
- 2018
- [j30]Mohammad Fathian, Javid Jouzdani, Mehdi Heydari, Ahmad Makui:
Location and transportation planning in supply chains under uncertainty and congestion by using an improved electromagnetism-like algorithm. J. Intell. Manuf. 29(7): 1447-1464 (2018) - [j29]Hesam Ghiasi, Mohammad Fathian Brojeny, Mohammad Reza Gholamian:
A reputation system for e-marketplaces based on pairwise comparison. Knowl. Inf. Syst. 56(3): 613-636 (2018) - 2017
- [j28]Amir-Mohsen Karimi-Majd, Mohammad Fathian:
Multiobjective approach for detecting communities in heterogeneous networks. Comput. Intell. 33(4): 980-1004 (2017) - [j27]Amir-Mohsen Karimi-Majd, Mohammad Fathian, Mohammad Reza Gholamian:
Behavior-based indices for evaluating communities in online social networks. Intell. Data Anal. 21(1): 205-220 (2017) - [j26]Mohammad Fathian, Mohamad Saei-Shahi, Ahmad Makui:
A New Optimization Model for Reliable Team Formation Problem Considering Experts' Collaboration Network. IEEE Trans. Engineering Management 64(4): 586-593 (2017) - 2016
- [j25]Mohammad Fathian, Yaser Hoseinpoor, Behrouz Minaei-Bidgoli:
Offering a hybrid approach of data mining to predict the customer churn based on bagging and boosting methods. Kybernetes 45(5): 732-743 (2016) - [j24]Mohammad Fathian, Gholam Reza Shiran, Ahmad Reza Jafarian-Moghaddam:
Erratum to: Two New Clustering Algorithms for Vehicular Ad-Hoc Network Based on Ant Colony System. Wirel. Pers. Commun. 87(4): 1435 (2016) - [j23]Mohammad Fathian, Gholam Reza Shiran, Ahmad Reza Jafarian-Moghaddam:
Erratum to: Two New Clustering Algorithms for Vehicular Ad-Hoc Network Based on Ant Colony System. Wirel. Pers. Commun. 88(2): 413 (2016) - 2015
- [j22]Amir-Mohsen Karimi-Majd, Mohammad Fathian, Babak Amiri:
A hybrid artificial immune network for detecting communities in complex networks. Computing 97(5): 483-507 (2015) - [j21]Mohammad Fathian, Ahmad Reza Jafarian-Moghaddam:
New clustering algorithms for vehicular ad-hoc network in a highway communication environment. Wirel. Networks 21(8): 2765-2780 (2015) - [j20]Mohammad Fathian, Gholam Reza Shiran, Ahmad Reza Jafarian-Moghaddam:
Two New Clustering Algorithms for Vehicular Ad-Hoc Network Based on Ant Colony System. Wirel. Pers. Commun. 83(1): 473-491 (2015) - 2014
- [j19]Javid Jouzdani, Farnaz Barzinpour, Mohammad Ali Shafia, Mohammad Fathian:
Applying Simulated Annealing to a generalized Cell Formation Problem considering Alternative Routings and Machine reliability. Asia Pac. J. Oper. Res. 31(4) (2014) - [j18]Javid Jouzdani, Mohammad Fathian:
A linear MmTSP formulation of robust location-routing problem: a dairy products supply chain case study. Int. J. Appl. Decis. Sci. 7(3): 327-342 (2014) - [j17]Zahra Tabaei, Mohammad Fathian:
Measuring and analysing customer satisfaction with multi-criteria satisfaction analysis (MUSA) model: an electronic retailing case study. Int. J. Bus. Inf. Syst. 15(2): 189-204 (2014) - [j16]Ebrahim Teimoury, Issa Chambar, Mohammad Reza Gholamian, Mohammad Fathian:
Designing an ontology-based multi-agent system for supply chain performance measurement using graph traversal. Int. J. Comput. Integr. Manuf. 27(12): 1160-1174 (2014) - [j15]Zahra Tabaei, Mohammad Fathian:
A novel utility-based model for identifying the customer value in online shopping. Int. J. Electron. Bus. 11(2): 119-152 (2014) - 2013
- [j14]Neda AleEbrahim, Mohammad Fathian:
Summarising customer online reviews using a new text mining approach. Int. J. Bus. Inf. Syst. 13(3): 343-358 (2013) - [j13]Hiwa Farughi, Babak Yousefi Yegane, Mohammad Fathian:
A new critical path method and a memetic algorithm for flexible job shop scheduling with overlapping operations. Simul. 89(3): 264-277 (2013) - 2012
- [j12]Somayeh Naderi Vesal, Mohammad Fathian:
Efficient and secure credit card payment protocol for mobile devices. Int. J. Inf. Comput. Secur. 5(2): 105-114 (2012) - 2011
- [c6]Mohammad Siami, Mohammad R. Gholamian, Javad Basiri, Mohammad Fathian:
An Application of Locally Linear Model Tree Algorithm for Predictive Accuracy of Credit Scoring. MEDI 2011: 133-142 - 2010
- [j11]Yoones Asgharzadeh Sekhavat, Mohammad Fathian:
Mining frequent itemsets in the presence of malicious participants. IET Inf. Secur. 4(2): 80-92 (2010) - [j10]Yoones Asgharzadeh Sekhavat, Mohammad Fathian, Mohammad Reza Gholamian, Somayeh Alizadeh:
Mining important association rules based on the RFMD technique. Int. J. Data Anal. Tech. Strateg. 2(1): 1-21 (2010) - [j9]Ismail Akbari, Mohammad Fathian:
A novel algorithm for ontology matching. J. Inf. Sci. 36(3): 324-334 (2010) - [c5]Mehdi Ghazanfari, Mohammad Fathian, Mostafa Jafari, Saeed Rouhani:
Process Mining Approach to Promote Business Intelligence in Iranian Detectives' Police. NDT (1) 2010: 135-142 - [c4]Saeed Rouhani, Mohammad Fathian, Mostafa Jafari, Peyman Akhavan:
Solving the Problem of Flow Shop Scheduling by Neural Network Approach. NDT (2) 2010: 172-183
2000 – 2009
- 2009
- [j8]Mohammad Fathian, Seyed Jafar Sadjadi, Samaneh Sajadi:
Optimal pricing model for electronic products. Comput. Ind. Eng. 56(1): 255-259 (2009) - [j7]Roxana Fekri, Alireza Aliahmadi, Mohammad Fathian:
Identifying the cause and effect factors of agile NPD process with fuzzy DEMATEL method: the case of Iranian companies. J. Intell. Manuf. 20(6): 637-648 (2009) - [c3]Mohammad Karami, Mohammad Fathian:
A robust trust establishment framework using Dempster-Shafer theory for MANETs. ICITST 2009: 1-7 - 2008
- [j6]Mohammad Fathian, Maryam Sotoudehriazi, Peyman Akhavan, Ali Amin Moghaddam:
How to Assess Knowledge Management: Developing a Quantitative Model. Int. J. Electron. Bus. Manag. 6(1): 10-20 (2008) - [j5]Yoones Asgharzadeh Sekhavat, Mohammad Fathian:
Efficient anonymous secure auction schema (ASAS) without fully trustworthy auctioneer. Inf. Manag. Comput. Secur. 16(3): 288-304 (2008) - 2007
- [j4]Mohammad Fathian, Babak Amiri, Ali Maroosi:
Application of honey-bee mating optimization algorithm on clustering. Appl. Math. Comput. 190(2): 1502-1513 (2007) - [j3]Mehdi Ghazanfari, Somayeh Alizadeh, Mohammad Fathian, Dimitris E. Koulouriotis:
Comparing simulated annealing and genetic algorithm in learning FCM. Appl. Math. Comput. 192(1): 56-68 (2007) - [j2]Mohammad Saidi-Mehrabad, Mohammad Fathian Brojeny:
The development of an expert system for effective selection and appointment of the jobs applicants in human resource management. Comput. Ind. Eng. 53(2): 306-312 (2007) - [c2]Mohammad Jafari, Mohammad Fathian:
Management Advantages of Object Classification in Role-Based Access Control (RBAC). ASIAN 2007: 95-110 - [c1]Mohammad Fathian, Babak Amiri:
Investigation of Effective Factors on e-Readiness of Iranian Manufacturing SMEs. ITNG 2007: 1101-1106 - 2006
- [j1]Mohsen Ziaee, Mohammad Fathian, Seyed Jafar Sadjadi:
A modular approach to ERP system selection: A case study. Inf. Manag. Comput. Secur. 14(5): 485-495 (2006)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint