• Home
  • Mohammad Kheyrandish
Mohammad Kheyrandish

Mohammad Kheyrandish
Dezful Branch, Islamic Azad University, Dezful, Iran · Department of Computer Engineering

Ph.D

About

27
Publications
1,589
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
87
Citations

Publications

Publications (27)
Article
Full-text available
As CMOS technology approaches its physical and technical limits, alternative technologies such as nanotechnology or quantum computing are needed to overcome the challenges of lithography, transistor scaling, interconnects, and miniaturization. This article introduces a novel nanotechnology that uses atomic-scale silicon dangling bonds (ASDB) to cre...
Article
Today, Complementary Metal-OxideSemiconductor (CMOS) technology faces critical challenges, such as power consumption and current leakage at the nanoscale. Therefore, Atomic Silicon Dangling Bond (ASDB) technology has been proposed as one of the best candidates to replace CMOS technology; due to its high-speed switching and low power consumption. Am...
Article
Full-text available
Atomic Silicon Dangling Bonds (ASDB) is an advanced emerging nanotechnology to replace CMOS technology; because it allows the designing of circuits with very high-speed and low-density. However, one of the most critical challenges in implementing circuits in ASDB nanotechnology is output stability and possible defects, such as DB omission, DB misal...
Article
Full-text available
Despite wide applicability of Voice over IP (VoIP), it’s highly vulnerable to various attacks. Most prominent ways to secure it employ intrusion detection systems (IDS); based on classification either clustering. So, despite presenting various clustering algorithms for intrusion detection, inherent characteristics of traffics and variety of attack...
Article
Full-text available
In recent years, researchers have considered quantum steganography and its various methods with the development and progress of research in computation theory and quantum signals processing. The destructive use of quantum steganography methods to establish illegal covert communications is rising, so it is essential to introduce ways to detect hidde...
Article
Full-text available
Watermarking is the process of embedding information into a host signal, and it’s a significant process when it enters into the copyright protection or digital works. In the near future, quantum computing will be developed and therefore the protection of quantum data will be a vital issue. This paper proposes a novel quantum reversible realization...
Article
Full-text available
Due to development of network and computer technology, safe storage, distribution and transmission of different media has become a significant issue. The use of cryptographic approaches plays a key role in securing images. Various cryptographic approaches have been proposed to protect images, some of which have failed due to high correlation betwee...
Article
Full-text available
Community detection is one of the critical research areas in the analysis of complex networks. Numerous algorithms have been devised for this purpose. Despite advances in this field, existing methods are far from accurately identifying the ground-truth community structures of many complex networks. In this paper, we propose a hybrid community detec...
Article
Full-text available
One of the crucial research areas in the analysis of complex social networks is the identification of communities. Since community detection is an NP-complete problem, numerous meta-heuristic approaches have been used for this problem, mostly taking “modularity” as the objective function. However, modularity-based optimization methods suffer from r...
Article
Wide utilization of audio files has attracted the attention of cyber-criminals to employ this media as a cover for their concealed communications. As a countermeasure and to protect cyberspace, several techniques have been introduced for steganalysis of various audio formats, such as MP3, VoIP, etc. The combination of machine learning and signal pr...
Article
Full-text available
Complex networks represent various real‐world systems. Overlapping community detection is one of the critical tasks in studying these networks and has significance to a wide variety of applications, including the exploration of online social networks because of the natural attitude of persons to participate in multiple communities at the same time....
Article
One of major problems in the wireless sensor networks is the barrier coverage problem. This problem deals with the ability to minimizing the probability of undetected penetration through the barrier (sensor network). The reliability and fault tolerance problems are very important for long strip barrier coverage sensor networks. Also, another design...
Article
Rapid growth in information technology and computer networks has resulted in the universal use of data transmission in the digital domain. However, the major challenge faced by digital data owners is protection of data against unauthorized copying and distribution. Digital watermark technology is starting to be considered a credible protection meth...
Article
Full-text available
The quick development and advance in information technology and computer networks have brought a more and more attention to data transmission in digital form. The main problem of owners and producers of digital products is to defend against distribution and unauthorized copying. An efficient solution for this disturbance is using the digital waterm...
Article
Among the various traditional approaches of pattern recognition, the statistical approach has been most intensively studied and used in practice. This paper presents a new classifier called MLAC for multiclass classification based on the learning automata. The proposed classifier using a soft decision method could find the optimal hyperplanes in so...
Article
Full-text available
Speech recognition is an efficient tool for interacting between human and machines; but the speech includes some undesirable components (disfluencies), sometimes, and is called spontaneous speech in these cases. This paper focuses on detecting some simple disfluencies in this speech type, using a Learning Cellular Automata. This is a set of cells t...
Article
In recent years, many methods have been introduced for speaker identification, each one includes high-level features or novel classifiers. In this paper we present a speaker identification system in terms of a classifier based on Learning Au-tomata. Indeed, in the proposed identification system, we use the Learning Automata classifier for speakers...
Article
Because of nodes mobility, one of important and fundamental issues in mobile sensor networks is how to cluster the nodes in network. The clustering is a method for best managing nodes energies, data collectting and sending information to base station and increasing network lifetime. In a wireless mobile network, the created clusters change continua...
Conference Paper
Full-text available
Because of nodes mobility, one of important and fundamental issues in mobile sensor networks is how to cluster the nodes in network. The clustering is a method for best managing nodes energies, data collectting and sending information to base station and increasing network lifetime. In a wireless mobile network, the created clusters change continua...
Conference Paper
Systolic arrays are a set of simple processors that they have placed beside each other based on specific pattern. Their properties such as regularity, local communications, ability of parallel and pipeline processing have introduced them as a useful structure for executing computational algorithms with high speed. In this paper, we will present a s...
Article
Abstract - One of the best current methods for modeling dynamic speech signal is using of HMM model. The speech recognition systems based on HMM can be able to compute the best likelihood measure between unknown input pattern and reference models by using Viterbi algorithm. Whereas such algorithm is based on dynamic programming, it consists of many...
Article
Pattern matching includes verifying the existence of a pattern in a given reference set. It has exact and approximate matching types. Most important algorithms for pattern matching are Brute-Force, Morris-Pratt, Boyer-Moore, Wu-Manber, Baeza-Yates-Navarro, Myers and Dynamic Programming Algorithm. Systolic Array is a set of simple processing cells t...
Article
A mobile Ad-hoc network is a set of mobile nodes that communicate with each other through the airwave. These networks have a high flexibility and have no central infrastructure or supervisor. In this type of networks, the topology is in change always, and the important problem in them is finding the path between source and destination. In this pape...
Conference Paper
This paper presents a systematic procedure to mapping uniform recurrent equations on to linear systolic arrays. In this method, a bijective transformation must be computed first. Then, by applying this transformation over the N-Dim index space of a uniform recurrent equation, a new index space will be obtained that includes a 1-Dim location and a (...

Network

Cited By