Ali Hosseinalipour

ORCID: 0000-0003-0840-9102
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Energy Efficient Wireless Sensor Networks
  • Indoor and Outdoor Localization Technologies
  • Mobile Ad Hoc Networks
  • Metaheuristic Optimization Algorithms Research
  • IoT-based Smart Home Systems
  • Sentiment Analysis and Opinion Mining
  • Text and Document Classification Technologies
  • Network Security and Intrusion Detection
  • Advanced Text Analysis Techniques
  • Wireless Networks and Protocols
  • Energy Harvesting in Wireless Networks
  • Face and Expression Recognition
  • Cancer Immunotherapy and Biomarkers
  • Advanced Software Engineering Methodologies
  • Software System Performance and Reliability
  • Immunotherapy and Immune Responses
  • vaccines and immunoinformatics approaches
  • Optimization and Search Problems
  • Software Engineering Research
  • Educational Technology and Assessment
  • Distributed and Parallel Computing Systems
  • Spam and Phishing Detection
  • Evolutionary Algorithms and Applications
  • Educational Methods and Technology
  • Internet Traffic Analysis and Secure E-voting

Islamic Azad University, Tehran
2012-2024

Islamic Azad University of Urmia
2021

Islamic Azad University, Khoy Branch
2014

Islamic Azad University of Tabriz
2010

Abstract Communication via email has expanded dramatically in recent decades due to its cost-effectiveness, convenience, speed, and utility for a variety of contexts, including social, scientific, cultural, political, authentication, advertising applications. Spam is an sent large number individuals or organizations without the recipient's desire request. It increasingly becoming harmful part traffic can negatively affect usability systems. Such emails consume network bandwidth as well...

10.1007/s00521-022-07148-x article EN cc-by Neural Computing and Applications 2022-03-29

Abstract The growing use of the Internet with its vulnerabilities has necessitated adoption Intrusion Detection Systems (IDS) to assure security. IDSs are protective systems that detect outsider infiltrations, unauthorised accesses and malfunctions occurring in computer networks. Intrusions can be detected reported network administrator by using various pieces information such as port scanning irregular traffic detection. detection is a classification problem, identifying effective features...

10.1007/s12652-023-04571-3 article EN cc-by Journal of Ambient Intelligence and Humanized Computing 2023-03-10

Abstract Automated sentiment analysis is considered an area in natural language processing research that seeks to understand a text author's mood, thoughts, and feelings. New opportunities challenges have arisen this field due the popularity accessibility of variety resources ideas, such as online review websites, personal blogs, social media. Feature selection, which can be conducted using metaheuristic algorithms, one steps analysis. It crucial use high-performing algorithms for feature...

10.1007/s13042-022-01670-z article EN cc-by International Journal of Machine Learning and Cybernetics 2022-10-15

Clustering in wireless sensor networks is one of the crucial methods for increasing network lifetime. There are many algorithms clustering. LEACH algorithm important clusters based network. In this paper we proposed a new clustering method distribute several sensors with high-energy managing cluster heads and decrease their responsibilities These used as gateway between head base station. The simulation results shows, protocol probability failure nodes lifetime WSNs.

10.4156/ijact.vol2.issue2.11 article EN International Journal of Advancements in Computing Technology 2010-06-30

A bstract Different nature‐inspired meta‐heuristic algorithms have been proposed to solve optimization problems. One of these is called social spider (SSO) algorithm. Spiders' natural behaviors inspired them find the bait position by detecting vibrations in their web. Although SSO algorithm has good accuracy achieving optimal solutions, it suffers from a low convergence rate. In this paper, we attempted improve changing its motion and mating parameters. To provide practical example using new...

10.1002/cpe.6325 article EN Concurrency and Computation Practice and Experience 2021-04-15

Clustering in wireless sensor networks is one of the crucial methods for increasing network lifetime. There are many algorithms clustering. One cluster based algorithm LEACH algorithm. In this paper we proposed a new clustering method done symmetrically and best node with respect to remained energy distance other nodes comparing each that selected as head. Although protocol didn't use GPS but could find geographical position so easily. performance via computer simulation was evaluated...

10.1109/iccnt.2010.103 article EN 2010-01-01

Clustering in wireless sensor networks is one of the crucial methods for increasing network lifetime. There are many algorithms clustering. One important cluster based algorithm LEACH algorithm. In this paper we proposed a new clustering method We distribute several sensors with high-energy managing head and to decrease their responsibilities network. The performance via computer simulation was evaluated compared other algorithms. results show high

10.48550/arxiv.1003.1472 preprint EN cc-by-nc-sa arXiv (Cornell University) 2010-01-01

Limitation of energy consumption that impress lifetime sensor network directly, is one the major challenges in wireless networks.In this paper, a confident communication protocol presented include low for networks dispense monotonous cargo between sensors and increases lifetime.This cluster-Based originated from combination DBS clustering by using cellular learning automata.Based on proposed protocol, cluster head nodes are identified various phases based parameters: 1) amount node 2)...

10.5120/15508-4281 article EN International Journal of Computer Applications 2014-02-28

Abstract One of the most important and costly stages in software development is maintenance. Understanding structure will make it easier to maintain more efficiently. Clustering modules thought be an effective reverse engineering technique for deriving structural models from source code. In module clustering, essential objectives are minimize connections between produced clusters, maximize internal within created clustering quality. Finding appropriate system model considered NP‐complete...

10.1111/exsy.13228 article EN Expert Systems 2023-01-23

In recent years, wireless sensor networks are in great use applications like disaster management, combat field reconnaissance, border protection and safe care.Although, much research has been done on networks, but the quality of service (QoS) there not enough researches.Since these widely used many areas, different QoS parameters contrast with traditional such as network coverage, optimal number active nodes, lifetime energy consumption.We have proposed an automata-based scheduling method to...

10.5120/15509-4282 article EN International Journal of Computer Applications 2014-02-28

Clustering in wireless sensor networks is one of the crucial methods for increasing network lifetime. There are many algorithms clustering. One cluster based algorithm LEACH algorithm. In this paper we proposed a new clustering method done symmetrically and best node with respect to remained energy distance other nodes comparing each that selected as head. Although protocol didn’t use GPS but could find geographical position so easily. However, failures higher level hierarchy e.g....

10.4028/www.scientific.net/amr.433-440.3223 article EN Advanced materials research 2012-01-03
Coming Soon ...