Mehdi Sadeghzadeh

Learn More
During the last decades, universal economy has experienced money laundering and its destructive impact on the economy of the countries. Money laundering is the process of converting or transferring an asset in order to conceal its illegal source or assist someone that is involved in such crimes. Criminals generally attempt to clean the sources of the funds(More)
The fuzzy object oriented database model is often used to handle the existing imprecise and complicated objects for many real-world applications. The main focus of this paper is on fuzzy queries and tries to analyze a complicated and complex query to get more meaningful and closer responses. The method permits the user to provide the possibility of(More)
The routing problem is a multi-objective optimization problem with a set of constraints. An ideal routing algorithm should strive to find an optimum path for packet transmission within a specified time so as to satisfy the Quality of Service (QoS). This paper presents a method based on non-dominated sorting genetic algorithm-II (NSGA-II) for solving routing(More)
The ad hoc network is a system of network elements that combine to form a network requiring little or no planning. This may not be feasible as nodes can enter and leave the network. In such networks, each node can receive the packet (host) and the packet sender (router) to act. The goal of routing is finding paths that meet the needs of the network and(More)
Computational visual attention modeling is a topic of increasing importance in machine understanding of images. The model with the-0 norm as constraint is an NP hard problem. How to find the global optimal solution is a difficult point of this area. For Biogeography-based optimization (BBO) is good at solving NP hard problem, a dictionary learning method(More)
Losses caused by malware are irrecoverable. Detection of malicious activity is the most challenge in the security of computing systems because current virulent executable are using sophisticated polymorphism and metamorphism techniques. It make difficult for analyzers to investigate their code statically. In this paper, we present a data mining approach to(More)
The Internet has dramatically changed the relationship among people and their relationships with others people and made the valuable information available for the users. Email is the service, which the Internet provides today for its own users; this service has attracted most of the users' attention due to the low cost. Along with the numerous benefits of(More)