default search action
Shahram Jamali
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j34]Bahman Varastan, Shahram Jamali, Reza Fotohi:
Hardening of the Internet of Things by using an intrusion detection system based on deep learning. Clust. Comput. 27(3): 2465-2488 (2024) - [j33]Mohsen Khani, Shahram Jamali, Mohammad Karim Sohrabi:
Three-layer data center-based intelligent slice admission control algorithm for C-RAN using approximate reinforcement learning. Clust. Comput. 27(5): 5893-5911 (2024) - [j32]Seyed Reza Zahedi, Shahram Jamali:
A hybrid model for VNF deployment capable of responding to online requests at network edge. Comput. Networks 247: 110385 (2024) - [j31]Mohsen Khani, Mohammad Mohsen Sadr, Shahram Jamali:
Deep reinforcement learning-based resource allocation in multi-access edge computing. Concurr. Comput. Pract. Exp. 36(15) (2024) - [j30]Mohsen Khani, Shahram Jamali, Mohammad Karim Sohrabi, Mohammad Mohsen Sadr, Ali Ghaffari:
Resource allocation in 5G cloud-RAN using deep reinforcement learning algorithms: A review. Trans. Emerg. Telecommun. Technol. 35(1) (2024) - [j29]Mohsen Khani, Shahram Jamali, Mohammad Karim Sohrabi:
Approximate Q-learning-based (AQL) network slicing in mobile edge-cloud for delay-sensitive services. J. Supercomput. 80(3): 4226-4247 (2024) - [j28]Samira Rajabi, Samane Asgari, Shahram Jamali, Reza Fotohi:
An Intrusion Detection System Using the Artificial Neural Network-based Approach and Firefly Algorithm. Wirel. Pers. Commun. 137(4): 2409-2440 (2024) - 2023
- [j27]Mina Soltani Siapoush, Shahram Jamali, Amin Badirzadeh:
Software-defined networking enabled big data tasks scheduling: A tabu search approach. J. Commun. Networks 25(1): 111-120 (2023) - [j26]Mohsen Khani, Shahram Jamali, Mohammad Karim Sohrabi:
An Enhanced Deep Reinforcement Learning-based Slice Acceptance Control System (EDRL-SACS) for Cloud-Radio Access Network. Phys. Commun. 61: 102188 (2023) - 2022
- [j25]Seyed Reza Zahedi, Shahram Jamali, Peyman Bayat:
EmcFIS: Evolutionary multi-criteria Fuzzy Inference System for virtual network function placement and routing. Appl. Soft Comput. 117: 108427 (2022) - [j24]Seyed Reza Zahedi, Shahram Jamali, Peyman Bayat:
A power-efficient and performance-aware online virtual network function placement in SDN/NFV-enabled networks. Comput. Networks 205: 108753 (2022) - [j23]Amin Khansoltani, Shahram Jamali, Reza Fotohi:
A Request Redirection Algorithm in Content Delivery Network: Using PROMETHEE Approach. Wirel. Pers. Commun. 126(2): 1145-1175 (2022) - 2021
- [j22]Mahzad Mahdavisharif, Shahram Jamali, Reza Fotohi:
Big Data-Aware Intrusion Detection System in Communication Networks: a Deep Learning Approach. J. Grid Comput. 19(4): 46 (2021) - [j21]Shahram Jamali, Mir Mahmoud Talebi, Reza Fotohi:
Congestion control in high-speed networks using the probabilistic estimation approach. Int. J. Commun. Syst. 34(7) (2021) - [j20]Shahram Jamali, Maryam Abbasalizadeh:
Cost-aware co-locating of services in Internet of Things by using multicriteria decision making. Int. J. Commun. Syst. 34(16) (2021) - [j19]Samane Asgari, Shahram Jamali, Reza Fotohi, Mahdi Nooshyar:
Performance-aware placement and chaining scheme for virtualized network functions: a particle swarm optimization approach. J. Supercomput. 77(11): 12209-12229 (2021) - [i5]Shahram Jamali, Mir Mahmoud Talebi, Reza Fotohi:
Congestion control in high-speed networks using the probabilistic estimation approach. CoRR abs/2103.09639 (2021) - [i4]Samane Asgari, Shahram Jamali, Reza Fotohi, Mahdi Nooshyar:
Performance-aware placement and chaining scheme for virtualized network functions: a particle swarm optimization approach. CoRR abs/2105.05248 (2021)
2010 – 2019
- 2019
- [j18]Shahram Jamali, Amin Badirzadeh, Mina Soltani Siapoush:
On the use of the genetic programming for balanced load distribution in software-defined networks. Digit. Commun. Networks 5(4): 288-296 (2019) - [c6]Akbar Majidi, Xiaofeng Gao, Nazila Jahanbakhsh, Shahram Jamali, Jiaqi Zheng, Guihai Chen:
Deep-RL: Deep Reinforcement Learning for Marking-Aware via per-Port in Data Centers. ICPADS 2019: 392-395 - 2018
- [j17]Hadi Zare Fatin, Shahram Jamali, Gholamreza Zareh Fatin:
Data Replication in Large Scale Content Delivery Networks: A Genetic Algorithm Approach. J. Circuits Syst. Comput. 27(12): 1850189:1-1850189:25 (2018) - 2017
- [j16]Shahram Jamali, Mohammad Sadeq Garshasbi:
Fault localization algorithm in computer networks by employing a genetic algorithm. J. Exp. Theor. Artif. Intell. 29(1): 157-174 (2017) - [j15]Shahram Jamali, Sepideh Malektaji, Morteza Analoui:
An imperialist competitive algorithm for virtual machine placement in cloud computing. J. Exp. Theor. Artif. Intell. 29(3): 575-596 (2017) - [j14]Shahram Jamali, Parisa Jafarzadeh:
An intelligent intrusion detection system by using hierarchically structured learning automata. Neural Comput. Appl. 28(5): 1001-1008 (2017) - [j13]Shahram Jamali, Reza Fotohi:
DAWA: Defending against wormhole attack in MANETs by using fuzzy logic and artificial immune system. J. Supercomput. 73(12): 5173-5196 (2017) - [c5]Hamid Reza Qavami, Shahram Jamali, Mohammad Kazem Akbari, Bahman Javadi:
A Learning Automata Based Dynamic Resource Provisioning in Cloud Computing Environments. PDCAT 2017: 502-509 - 2016
- [j12]Hossein Shad Manaman, Shahram Jamali, Abolfazl AleAhmad:
Online reputation measurement of companies based on user-generated content in online social networks. Comput. Hum. Behav. 54: 94-100 (2016) - 2015
- [j11]Shahram Jamali, Neda Alipasandi, Bita Alipasandi:
TCP Pegas: A PSO-based improvement over TCP Vegas. Appl. Soft Comput. 32: 164-174 (2015) - [j10]Shahram Jamali, Mahdi Hatami:
Coverage Aware Scheduling in Wireless Sensor Networks: An Optimal Placement Approach. Wirel. Pers. Commun. 85(3): 1689-1699 (2015) - 2014
- [j9]Shahram Jamali, Vahid Shaker:
Defense against SYN flooding attacks: A particle swarm optimization approach. Comput. Electr. Eng. 40(6): 2013-2025 (2014) - [i3]Reza Azad, Babak Azad, Nabil Belhaj Khalifa, Shahram Jamali:
Real-Time Human-Computer Interaction Based on Face and Hand Gesture Recognition. CoRR abs/1408.1549 (2014) - 2013
- [j8]Shahram Jamali, Seyyed Nasser Seyyed Hashemi, Amir-Masoud Eftekhari-Moghadam:
On the use of a full information feedback to stabilize RED. J. Netw. Comput. Appl. 36(2): 858-869 (2013) - [c4]Hamid Reza Qavami, Shahram Jamali, Mohammad K. Akbari, Bahman Javadi:
Dynamic Resource Provisioning in Cloud Computing: A Heuristic Markovian Approach. CloudComp 2013: 102-111 - 2012
- [j7]Shahram Jamali, Gholam Shaker:
PSO-SFDD: Defense against SYN flooding DoS attacks by employing PSO algorithm. Comput. Math. Appl. 63(1): 214-221 (2012) - [i2]Masoud Bekravi, Shahram Jamali, Gholam Shaker:
Defense against SYN-Flood Denial of Service Attacks Based on Learning Automata. CoRR abs/1208.5037 (2012) - 2011
- [j6]Shahram Jamali, Morteza Analoui:
Globally stable and high-performance Internet congestion control through a computational inspiration from nature. Sci. China Inf. Sci. 54(6): 1251-1263 (2011) - 2010
- [j5]Shahram Jamali, Seyed Reza Zahedi:
An improvement over RED algorithm by using particle swarm optimization. IEICE Electron. Express 7(17): 1276-1282 (2010) - [j4]Shahram Jamali, Morteza Analoui:
Predator-prey system: an optimiser that solves a linear programming. Int. J. Bio Inspired Comput. 2(5): 333-339 (2010) - [c3]Shapour Jodi Begdillo, Hekmat Mohamamdzadeh, Shahram Jamali, Ali Norouzi:
Stable route selection in ODMRP with energy based strategy. PIMRC 2010: 1741-1745
2000 – 2009
- 2009
- [i1]Shahram Jamali, Morteza Analoui:
Congestion Control in the Internet by Employing a Ratio dependent Plant Herbivore Carnivorous Model. CoRR abs/0910.2028 (2009) - 2008
- [j3]Morteza Analoui, Shahram Jamali:
Congestion Control in the Internet: Inspiration from Balanced Food Chains in the Nature. J. Netw. Syst. Manag. 16(1): 1-10 (2008) - 2007
- [j2]Shahram Jamali, Morteza Analoui:
Internet congestion control using nature population control tactics. Ecol. Informatics 2(4): 337-352 (2007) - [j1]Morteza Analoui, Shahram Jamali:
Equation-Based Congestion Control in the Internet Biologic Environment. Trans. Comp. Sys. Biology 8: 42-62 (2007) - [c2]Morteza Analoui, Shahram Jamali:
Nature-Inspired Congestion Control: Using a Realistic Predator-Prey Model. IWINAC (1) 2007: 416-426 - [p1]Morteza Analoui, Shahram Jamali:
Bio-Inspired Congestion Control: Conceptual Framework, Algorithm and Discussion. Advances in Biologically Inspired Information Systems 2007: 63-80 - 2006
- [c1]Morteza Analoui, Shahram Jamali:
A conceptual framework for bio-inspired congestion control in communication networks. BIONETICS 2006: 38
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint