1
Improving Fairness in Recommender System
Mahsa Borji & Mehdi Shajari
October 2021
2
Determination of optimized payment process in system based-on financial assets of a social network members
Mohammad Choromzadeh & Mehdi Shajari
October 2021
3
privacy improving in smart contracts blockchain based in healthcare
Mohsen Rahnamaei & Mehdi Shajari
May 2021
4
Increasing participation in distributed networks using blockchain technology and incentive engineering
Mohammad Ali Shahsavand Ananloo & Mehdi Shajari
December 2020
5
an adaptive model for e-Advertisement websites user interface using network analsysis and mining approach
Fatemeh Eslami Bidgoli & Mehdi Shajari
September 2020
6
Enhancing consensus mechanisms in block chain technology
Mozhdeh Hemati Boroujeni & Mehdi Shajari
December 2019
7
Use of Blockchain and Smartcontract to Improve Privacy in Health Information
Saeed Toosi & Mehdi Shajari
December 2019
8
Synchronization and Performance Management of IoT Devices Based on Smart Contracts Using Blockchain
Mohammadsalar Arbabi & Mehdi Shajari
December 2018
9
A Framework to Identify Families of Advanced Persistent Threats
Mohammad Ali Shafiee & Mehdi Shajari
December 2018
10
Improving Voip Attack Detection Using Honeypots
Neda Heshmatian & Mehdi Shajari
December 2018
11
diagnosis of sleep disorders using data mining and internet of things
Hamid Gorji & Mehdi Shajari
October 2018
12
automatic categorization of persian recruiting advertisements based on short text mining methods
Maryam Oliyaei & Mehdi Shajari
September 2018
13
Forecasting the news impact on different aspects of social media users political opinions
Seyed Mohammad Moein Hosseini Manesh & Mehdi Shajari
September 2018
14
Designing and Implementing a Deception Network with Inteligent and Dynamic Configuration
Bahareh Parhizkari & Mehdi Shajari
September 2018
15
design and implementation of a centralized secure in-app mobile payment system
Seyed Abolfazl Hashemi & Mehdi Shajari
March 2018
16
Enhancing the attack detection system of industrial networks with honeypots
Nasrollah Mousavi & Mehdi Shajari
February 2018
17
Desing and Implementation of an IOT SSH Honeypot and the related Sandbox for IOTattack analysis
Erfan Ostovari & Mehdi Shajari
September 2017
18
A Method for Improvement of Detecting Drive- by Download Attacks
Reza Gharineh & Mehdi Shajari
July 2017
19
A Trust and Reputation Model based on Fuzzy Sentiment Analysis
Safa Savafi & Mehdi Shajari
March 2017
20
Design and Implementation of a Two-phase Decision Support System for University System for University Course Timetabling Problem with Genetic Algorithm
Omid Bolourian & Mehdi Shajari
March 2017
21
Payment Transactions Fraud Detection Based on a Hybrid Model and Dynamic Uyamic Users Behavior
Sanaz Nami & Mehdi Shajari
February 2017
22
Model checking of availablity property in systems modeled in petrinet language
Masoud Safa & Mehdi Shajari
February 2017
23
An Enhanced Recommendation System Using Co-Clustering and Information Fusion in Collaborative Filtering
Samira Mohammad Rezaei & Mehdi Shajari
October 2016
24
an enhanced node link strength algorithm for link prediction in networks with heterogeneous relation
Omid Kharaji & Mehdi Shajari
May 2016
25
Presenting a fuzzy multi criteria decision
making algorithm for online negotiation
Seyedeh Arghavan Razavieh & Mehdi Shajari
March 2016
26
Introducing a technique for predicting stock market, using Twitters classification based on the precision of their prediction in variable time slots
Ehsan Mesbah & Mehdi Shajari
March 2016
27
a model for stock market prediction by social media analysis
Saeed Seifollahi & Mehdi Shajari
February 2016
28
a hybrid model for detecting expertise level in social networks
Farzaneh Abolghasemi & Mehdi Shajari
February 2016
29
Domain-Specific Recommendation Systems Using Collaborative Filtering in Online Social Network
Hamed Nekoomanesh Haghighi & Mehdi Shajari
February 2016
30
Propose a new architecture based on Enterprise Service Bus(ESB) to build agile electronic marketplaces
Reza Davari Davarani & Mehdi Shajari
October 2015
31
An enhanced model for trust management in social networks using node’s social status
Shadi Hariri & Mehdi Shajari
August 2015
32
Small-Sized Enterprise Information Security Managment Improvement-Choosing Organization Specific Security Controls on ISO/IEC 27001
Seyedeh Roshanak Shahrokni & Mehdi Shajari
May 2015
33
Information Security Managment Improvement for PSPs-Choosing Organization Specific Security Controls on ISO/IEC 27001
Yashar Najafzadeh Zonouz & Mehdi Shajari
May 2015
34
Improving the performance of hybrid recommender systems by an optimized clustering algorithm
Seyyedeh Negar Afrasiabi & Mehdi Shajari
May 2015
35
requirement analysis , design and implementation of the user interface for a news site
Zahra Keihany & Mehdi Shajari
March 2015
36
representing an access control architecture for pervasive computing based on UCON model
Narges Jannesar & Mehdi Shajari
February 2015
37
An efficient cryptography based digital right management system
Nafiseh Shafiei & Mehdi Shajari
February 2015
38
Authentication based anti phishing browser plug in
Arash Akbari Hamed & Mehdi Shajari
January 2015
39
Using community detection techniques in online social networks for automated privacy control
Ardavan Eskandari & Mehdi Shajari
November 2014
40
Testing open- source jpos payment switch using model- based techniques
Mohammad Valizadeh & Mehdi Shajari
October 2014
41
Designing A user-oriented ranking algorithm for search engines in Farsi web
Niloofar Hayati & Mehdi Shajari
October 2014
42
The application of Artifical Intelligence in E-Commerce with focus on stock price forecasting of Gohd and Silver Mining Corporatios
Amirhossein Roshanzamir & Mehdi Shajari
October 2014
43
Design and implementation of a secure proximity payment system
Rahman Malboosbaf & Mehdi Shajari
August 2014
44
Desining a Banking Fraud Detetion System based on Business Intelligent
Hoda Sheikholeslamigarvandani & Mehdi Shajari
May 2014
45
designing and implementing an efficient method for online exam
Nariman Mohseni & Mehdi Shajari
April 2014
46
Design and implemention of an Effective Algorithm Text Classification in IT Documents
Nazanin Zad & Mehdi Shajari
April 2014
47
intrusion response based on fuzzy decision making and risk assessment
Samaneh Berenjian & Mehdi Shajari
February 2014
48
:An Improvement on Information Security Management-Choosing Security Controls based on Organization Type in ISO/IEC2700
Maryam Shahpasand & Mehdi Shajari
February 2014
49
web spam detection using propagationtrust and distrust
Mahsa Pourbafrani & Mehdi Shajari
October 2013
50
alert correlation with ontology based clustring
Mahdiyeh Barzegar & Mehdi Shajari
October 2013
51
management system of security for industrial control systems in nisoc company
Karim Dawodmatori & Mehdi Shajari
October 2013
52
large scale recommender systems, evaluation and improvement
Seyed Mohammad Samadi & Mehdi Shajari
October 2013
53
Automated tag-based classification and ranking of Persian news articles
Babak Haj Azim Zanjani & Mehdi Shajari
October 2013
54
an improved method for phishing web sites detection
Hossain Kordestani & Mehdi Shajari
June 2013
55
Implementation of lottery fraud detection in bank industry through business intelligence
Arezoo Kheiltash & Mehdi Shajari
May 2013
56
Prototype design of a business in the virtual value chain in the maskan bank(the most consistent virtual value chain business with the state bank)
Samane Shariati & Mehdi Shajari
May 2013
57
enhancing the performance of shellcode detection using CPU emulation
Javad Khodaverdi & Mehdi Shajari
February 2013
58
enhancement of recommender system utility using social network analysis
Mohsen Raeesi & Mehdi Shajari
October 2012
59
enhancing recommender systems performance by using reputation and trust mechanism
Masoud Mansoury & Mehdi Shajari
October 2012
60
A framework of banking integrated information systems
Majid Mashhadi & Mehdi Shajari
May 2012
61
enhanced crawling by wed pages ranking
Forough Hosseinian & Mehdi Shajari
May 2012
62
an architecture for applying UCON model in cloud computing
Tina Tavizi & Mehdi Shajari
February 2012
63
automatic signature generation for polymorphic worms based on iterative alignment algorithms
Arezoo Rahmani & Mehdi Shajari
February 2012
64
design and Implementing Customer Demand Prediction system
Zohreh Soltanmohammadi & Mehdi Shajari
October 2011
65
design of a decision model for prioritizing suspicious payment card trensactions using a BI approach
Mohammad Reza Harati Nik & Mehdi Shajari
October 2011
66
a model for evaluation of crierion and end to endquality of service in next generation networks
Masoumeh Khoshbakhtian & Mehdi Shajari
October 2011
67
security improvement of recommender systems by analysis and modeling of influence based attacks
Mohammad Amin Morid & Mehdi Shajari
September 2011
68
using business intelligence for strategic planning in insurace companies
Mohammadhossein Barkhordari & Mehdi Shajari
September 2011
69
performance evaluation of open source agents in tac scm
Armita Jalalitalab & Mehdi Shajari
May 2011
70
toward new graphical password method and investigation on its efficency and security
Omidreza Bagheri & Mehdi Shajari
May 2011
71
discovery of employment and entrepreneurship opportunities in electronics damghan
Ameneh Gholami Mayani & Mehdi Shajari
May 2011
72
a proposal for suitable micropayment model for iranian banking industry
Samira Besharatian & Mehdi Shajari
May 2011
73
SIM cloning detection in telecommunication networks using anomaly approach
Mona Bokharaeineia & Mehdi Shajari
February 2011
74
Implementing a method to achieve service continuity in a sample eauction using Web-Services technology
Vahid Shavikloo Moradi & Mehdi Shajari
October 2010
75
A hybrid approach to increase security of recommcnder systems
Ghazaleh Aghili Dehkordi & Mehdi Shajari
October 2010
76
Utilization of proxy certificates for improving the functionality of digital signatures in mobile devices
Mohammad Hasan Samadani & Mehdi Shajari
July 2010
77
Automatic generation of polymorphic worm signature
Razieh Eskandari & Mehdi Shajari
July 2010
78
Afuzzy adaptive news dissemination
Mahdi Kereshteh & Mehdi Shajari
May 2010
79
E- readiness EValuation for E- banking IN iran, basdon A new analytical model
Ali Akbar Samandi & Mehdi Shajari
May 2010
80
Design and implementation of rich internet and enterprise applications in accordance with business and IT alignment
Seyed Kaveh Razavi & Mehdi Shajari
May 2010
81
Desingn and protoyping of an electronic to desing an
Esmaeil Faraji Joubani & Mehdi Shajari
May 2010
82
privacy-preserving inference on semantic Web
Layla Pournajaf & Mehdi Shajari
July 2009
83
Enhanced alert correlation and attacker intent recognition using machine learning techniques
Mahsa Erfan & Mehdi Shajari
July 2009
84
Define Policies & Procedures for using in a Data center according to ISO 27000
Shahram Ababaei & Mehdi Shajari
May 2009
85
Transaction/operational risk in e-banking
Angineh Beyki & Mehdi Shajari
May 2009
86
Analy Designing and Implementing atool for isms
Milad Eftekharian & Mehdi Shajari
May 2009
87
Design and Implementation of a Mobile Shopping Payment System
Fatemeh Hajjaran & Mehdi Shajari
May 2009
88
Semantic Web Concepts in Identity Management
Parissa Bakhshi & Mehdi Shajari
May 2009
89
Implentation of an Agent-Based ZMeta-Search Engine
Pegah Charkhchi & Mehdi Shajari
May 2009
90
Creating Islamic Trust Model for Ecommerce
Seyed Hossein Mirshamsaddini & Mehdi Shajari
March 2009
91
Design of a Customer Relationship and Satisfaction Management System in Banks Systems
Babak Saberi Jodaei & Mehdi Shajari
March 2009
92
Database threat identification and risk mitigation
Arash Shahkarami & Mehdi Shajari
September 2008
93
Human Resource Management at Tehran Municipality
Azadeh Khodamy & Mehdi Shajari
September 2008
94
A Localized Model for Internet Voting
Abasali Jannatdoust & Mehdi Shajari
April 2008
95
Proposing the Required tools for auditing a Small Information Technology Department with Information Security Management Approach
Ashkan Monadjemi & Mehdi Shajari
April 2008
96
Over View on Information Security Management and Define a Frame-work for Risk Assessment/Identification, and Mitigation in Banks
Sara Hosseini Abdollahi & Mehdi Shajari
April 2008
97
Separating user interface from model using design patterns
Kamran Morovaty Shanjany & Mehdi Shajari
April 2008
98
Lightweight protocols in mobile payment
Neda Admadi & Mehdi Shajari
March 2008
99
Risk Management and Assessment in Oil and Gas Projects
Ali Aminlou & Mehdi Shajari
November 2007
100
Using Fuzzy Multi-Attribute Decision Making to Information Security Risk Assessment
Mehdi Hassanabadi & Mehdi Shajari
November 2007
101
Adaptive Website Generator
Peyman Ardalani & Mehdi Shajari
October 2007