- Quantum Computing Algorithms and Architecture
- Quantum Information and Cryptography
- Quantum-Dot Cellular Automata
- Quantum Mechanics and Applications
- Metaheuristic Optimization Algorithms Research
- Evolutionary Algorithms and Applications
- Advanced Multi-Objective Optimization Algorithms
- Market Dynamics and Volatility
- Neural Networks and Reservoir Computing
- Stock Market Forecasting Methods
- Text and Document Classification Technologies
- Service-Oriented Architecture and Web Services
- Fractional Differential Equations Solutions
- Spam and Phishing Detection
- Chaos control and synchronization
- Advanced Memory and Neural Computing
- Parallel Computing and Optimization Techniques
- Advancements in Semiconductor Devices and Circuit Design
- Semantic Web and Ontologies
- Distributed and Parallel Computing Systems
- Petroleum Processing and Analysis
- Neural Networks and Applications
- Numerical Methods and Algorithms
- Machine Learning and Data Classification
- Advanced Database Systems and Queries
Islamic Azad University, Tehran
2023-2025
Islamic Azad University, Mashhad
2016-2024
University of Isfahan
2023
Centre for Quantum Technologies
2018
Singapore University of Technology and Design
2018
National University of Singapore
2018
Amirkabir University of Technology
2011-2017
Ferdowsi University of Mashhad
2010-2012
Traditional techniques for detecting materials have been unable to coordinate with the advancement of material science today due their low accuracy and high cost. Accordingly, machine learning (ML) improves prediction efficiency in high-entropy alloys’ (HEAs’) phase prediction. Unlike traditional alloys, HEAs consist at least five elements equal or near-equal atomic sizes. In a previous approach, we presented an HEA interaction network based on its descriptors. this study, is predicted using...
In the modern era, unauthorized access to health information systems (HIS) and electronic records (EHR) must be prevented. subject of data management (HDM), cyber-attacks are one important security risks. Medical information, such as EHR is delivered over an open network. Various approaches technologies used ensure medical information. One technology encryption, which protects images. This paper proposes efficient hybrid encryption algorithm secure digital imaging communications (DICOM) in...
<title>Abstract</title> The increasing availability of large-scale Metal-Organic Framework (MOF) datasets presents significant challenges for efficient analysis and knowledge extraction. In our previous work, we introduced a novel approach to represent MOF data as similarity graphs, enabling network-based MOFs. However, these graphs often become extremely dense, limiting interpretability scalability. this propose an Inverse Link Prediction (ILP)-based sparsification framework that leverages...
Financial markets are complex and dynamic, accurately predicting market trends is crucial for traders financial analysts. Ichimoku-based features have gained significant attention in analysis due to their ability capture essential signals patterns. This compression retains patterns related trends, support/resistance levels, trading signals. The reduced dimensionality improves computational efficiency could allow more accurate predictive modeling by traders. However, real-world testing needed...
Materials data science and machine learning (ML) are pivotal in advancing cancer treatment strategies beyond traditional methods like chemotherapy. Nanotherapeutics, which merge nanotechnology with targeted drug delivery, exemplify this advancement by offering improved precision reduced side effects therapy. The development of these nanotherapeutic agents depends critically on understanding nanoparticle (NP) properties their biological interactions, often analyzed through molecular dynamics...
Abstract As quantum computation grows, the number of qubits involved in a given computer increases. But due to physical limitations single device, should be performed distributed system. In this paper, new model based on matrix representation circuits is proposed. Then, using model, we propose novel approach for reducing teleportations circuit. The proposed method consists two phases: pre-processing phase and optimization phase. phase, it considers bi-partitioning by Non-Dominated Sorting...
The quantum-inspired genetic algorithm (QGA), which combines quantum mechanics concepts and GA to enhance search capability, has been popular provides an efficient mechanism. This paper proposes a modified QGA, called dynamic QGA (DQGA). proposed utilizes lengthening chromosome strategy for balanced smooth transition between exploration exploitation phases avoid local optima premature convergence. Apart from that, novel adaptive look-up table rotation gates is presented boost the algorithm’s...
Multiprocessor task scheduling is a well known NP-hard problem and numerous methods have been proposed to optimally solve it. The objective makespan minimization, i.e. we want the last complete as early possible. Simulated Annealing (SA) has considered very good tool for complex nonlinear optimization problem, such multiprocessor scheduling. However, major disadvantage of technique that it extremely slow. List-based algorithms are regarded having acceptable results. In this paper use list...
The importance of crude oil is undeniable nowadays. Therefore, forecasting its price vital for many industries and countries to specify their strategies. In this regard, studies have been performed predict the other forms energy sources' prices as accurately possible. Nevertheless, because high fluctuation prices, problem still needs more work be solved. This study proposes a stacked ensemble model that consists three main parts: an extreme gradient boosting machine (XGBM), light (LGBM),...
Quantum logic decomposition refers to decomposing a given quantum gate set of physically implementable gates. An approach has been presented decompose arbitrary diagonal gates multiplexed-rotation around z axis. In this article, special class gates, namely Hermitian is considered and new perspective the problem with respect these presented. It first shown that can be decomposed solely consists multiple-controlled Z Then binary representation for introduced. representations form basis vector...
Quantum key distribution uses quantum mechanics to guarantee secure communication. BB84 is a widely used that provides way for two parties, sender, Alice, and receiver, Bob, share an unconditionally in the presence of eavesdropper, Eve. In new approach, we view this protocol as three player static game which Alice Bob are cooperative players Eve competitive one. our model Alice's Bob's objective maximize probability detecting Eve, while Eve's minimize probability. Using show how theory can...
Abstract In the new age, most medical digital imaging and media objects (DICOMs) contain images related demographic information about patients, which must be kept secret. One of techniques used to secure is encryption. This study suggests a robust hybrid cryptography algorithm ensure DICOM privacy. The proposed uses DNA RNA encryption algorithms. suggested algorithm, in phase, image encrypted using rules, XOR operator, chaotic map function, first cipher created. then sent into where truth...
"Ontology matching" aims to find semantic correspondences between entities of different ontologies. Achieving interoperability in building the Semantic Web highly relies on matching It has been shown that integrating multiple individual matchers explore aspects similarities ontologies leads better results than just using one matcher. Thus, similarity aggregation is an important and yet difficult step developing ontology systems. Previously, a harmony based adaptive approach (called HADAPT)...