Cloud computing: Vision, architecture and Characteristics FF Moghaddam, MB Rohani, M Ahmadi, T Khodadadi, K Madadipouya 2015 IEEE 6th control and system graduate research colloquium (ICSGRC), 1-6, 2015 | 49 | 2015 |
A literature review on recommender systems algorithms, techniques and evaluations K Madadipouya, S Chelliah BRAIN. Broad Research in Artificial Intelligence and Neuroscience 8 (2), 109-124, 2017 | 36 | 2017 |
A Review On The Strategic Use Of IT Applications In Achieving And Sustaining Competitive Advantage K Madadipouya International Journal of Managing Public Sector Information and …, 2015 | 27 | 2015 |
A new decision tree method for data mining in medicine K Madadipouya Advanced Computational Intelligence: An International Journal (ACII) 2 (3 …, 2015 | 24 | 2015 |
A reliable data protection model based on re-encryption concepts in cloud environments FF Moghaddam, M Vala, M Ahmadi, T Khodadadi, K Madadipouya 2015 IEEE 6th control and system graduate research colloquium (ICSGRC), 11-16, 2015 | 15 | 2015 |
A location-based movie recommender system using collaborative filtering K Madadipouya arXiv preprint arXiv:1508.01696, 2015 | 10 | 2015 |
A survey on data mining algorithms and techniques in medicine K Madadipouya JOIV: International Journal on Informatics Visualization 1 (3), 61-71, 2017 | 9 | 2017 |
An Examination and Evaluation of Agile Methodologies for Systems Development K Madadipouy Australas. J. Comput. Sci 2 (1), 1-17, 2015 | 9 | 2015 |
An Examination And Report On Potential Methods Of Strategic Location-Based Service Applications On Mobile Networks And Devices K Madadipouya International Journal of Managing Public Sector Information and …, 2014 | 7 | 2014 |
A method in security of wireless sensor network based on optimized artificial immune system in multi-agent environments J Morteza, M Hossein, M Kasra, F Mohammad, S Shahaboddin arXiv preprint arXiv:1508.01706, 2015 | 6 | 2015 |
A dynamic classification index to enhance data protection procedures in cloud-based environments FF Moghaddam, A Majd, M Ahmadi, T Khodadadi, K Madadipouya 2015 IEEE 6th Control and System Graduate Research Colloquium (ICSGRC), 17-22, 2015 | 5 | 2015 |
A Reliable User Authentication and Data Protection Model in Cloud Computing Environments M Ahmadi, M Vali, F Moghaddam, A Hakemi, K Madadipouya arXiv preprint arXiv:1508.01703, 2015 | 5 | 2015 |
Importance of software quality assurance to prevent and reduce software failures in medical devices: Therac-25 case study K Madadipouya Figshare, 2016 | 3* | 2016 |
A location-based recommender framework to improve accuracy in user-based collaborative filtering K Madadipouya International Journal on Computational Science & Applications (IJCSA) 5 (5 …, 2015 | 2* | 2015 |
A scientometric analysis of mobile recommender systems K Madadipouya, L Shuib, S Hamid International Journal of Mobile Communications 18 (5), 485-508, 2020 | 1 | 2020 |
Survey on how Web 2.0 can facilitate knowledge management K Madadipouya IJCER 2 (6), 693-695, 2013 | 1 | 2013 |
Critical Evaluation of Application Porting in Mobile Platforms K Madadipouya Journal of Engineering and Technology (JET) 6 (2), 9-17, 2015 | | 2015 |
Designing a Framework to Improve Locality in News Recommender Systems with Utilizing Collaborative Filtering K MADADIPOUYA Asia Pacific University, 2013 | | 2013 |