Name
Affiliation
Papers
MARJAN KUCHAKI RAFSANJANI
Shahid Bahonar Univ Kerman, Fac Math & Comp, Dept Comp Sci, Kerman, Iran
42
Collaborators
Citations 
PageRank 
47
76
16.18
Referers 
Referees 
References 
232
639
258
Search Limit
100639
Title
Citations
PageRank
Year
Cluster head selection using hesitant fuzzy and firefly algorithm in wireless sensor networks00.342022
Multiobjective whale optimization algorithm-based feature selection for intelligent systems00.342022
PCG/PCGML evaluations: Introducing panda evaluation using the soft launch00.342022
Fuzzy Multi-Hop Clustering Protocol: Selection Fuzzy Input Parameters And Rule Tuning For Wsns10.342021
Efficient and Secure Routing Protocol Based on Artificial Intelligence Algorithms With UAV-Assisted for Vehicular Ad Hoc Networks in Intelligent Transportation Systems100.472021
A Trust Infrastructure Based Authentication Method For Clustered Vehicular Ad Hoc Networks30.382021
An Energy Aware Grouping Memetic Algorithm To Schedule The Sensing Activity In Wsns-Based Iot For Smart Cities20.422021
Online One Pass Clustering Of Data Streams Based On Growing Neural Gas And Fuzzy Inference Systems00.342021
Energy Refining Balance With Ant Colony System For Cloud Placement Machines10.352021
Intrusion Detection System Using A New Fuzzy Rule-Based Classification System Based On Genetic Algorithm00.342021
A novel image encryption scheme based on multi-directional diffusion technique and integrated chaotic map00.342021
A survey on security challenges in cloud computing: issues, threats, and solutions40.402020
A new hybrid genetic algorithm for job shop scheduling problem00.342020
QMM-VANET: An Efficient Clustering Algorithm Based on QoS and Monitoring of Malicious Vehicles in Vehicular Ad Hoc Networks00.342020
Cluster-based routing protocols in wireless sensor networks: A survey based on methodology80.442019
A supplier offer modification approach based on fuzzy systems for automated negotiation in e-commerce.00.342018
F-Ant: an effective routing protocol for ant colony optimization based on fuzzy logic in vehicular ad hoc networks.50.402018
A New Genetic Algorithm to Optimize Mobile Data Offloading in Smart Grids.00.342018
Some connections between BCK-algebras and n-ary block codes00.342018
Erratum to: A supplier offer modification approach based on fuzzy systems for automated negotiation in e-commerce.40.392018
An Anomaly Detection System Based on Clustering and Fuzzy Set Theory in VANETs.00.342018
Memetic fuzzy clustering protocol for wireless sensor networks: Shuffled frog leaping algorithm.40.402018
Hierarchical distributed management clustering protocol for wireless sensor networks.20.362017
Chaotic Time Series Prediction By Artificial Neural Networks60.822016
A Fuzzy Multi-objective Linear Programming Model Based on Interval-valued Intuitionistic Fuzzy Sets for Supplier Selection00.342016
Edge Detection In Digital Images Using Ant Colony Optimization00.342015
Optimizing Image Steganography By Combining The Ga And Ica00.342015
A similarity-based mechanism to control genetic algorithm and local search hybridization to solve traveling salesman problem10.382015
On codes based on BCK-algebras.20.582014
A fuzzy system approach to multilateral automated negotiation in B2C e-commerce30.382014
Distributed denial of service attacks and detection mechanisms10.422014
QARIMA: A new approach to prediction in queue theory.20.362014
A multi-agent based model for collective purchasing in electronic commerce.30.442013
Intrusion Detection Techniques for Detecting Misbehaving Nodes20.462011
QAIDS: Quantitative and Agent based Intrusion Detection System10.362011
Comment on the Improvement of an Efficient ID-Based RSA Mutlisignature.00.342011
A new approach for energy and delay trade-off intra-clustering routing in WSNs30.392011
Determination of IDS Agent Nodes Based on Three-Tiered Key Management Framework for MANET00.342010
A Hybrid Routing Algorithm Based on Ant Colony and ZHLS Routing Protocol for MANET.50.472010
An Efficient Method For Detecting Misbehaving Zone Manager In Manet00.342010
An Optimal Method for Detecting Internal and External Intrusion in MANET.20.352010
Intrusion Detection in Database Systems.10.352010