H. Hamidi

H. Hamidi
Khaje Nasir Toosi University of Technology | KNTU

About

38
Publications
5,178
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
712
Citations

Publications

Publications (38)
Article
Introduction: The Iranian Ministry of Health has announced that when a heart attack occurs, 50% of patients die within the first hours after a heart attack. The purpose of this article is to provide a system for 24-hour patient monitoring, prevention of heart attack and reduction of mortality. Methods: In this original research study, by reviewing...
Article
The current study aims at presenting a model to investigate the feature selection of health services website and its effect on increasing the role of Myocardial Infarction prediction and online health marketing through the case study of the Shahid Rajaee Heart Specialized Hospital, Iran. Considering research objectives, this study is a practical re...
Article
The increasing usage of smartphones, the increasing acceptance of electronic learning (e-learning), the improvement of the status of mobile networks and global internet as well as the need to flexibility in learning process have been led to the emergence of a phenomenon called mobile learning (m-learning). M-learning is not limited to time and plac...
Article
Full-text available
The objective of this research is to realize a composite nonlinear feedback control approach for a class of linear and nonlinear systems with parallel-distributed compensation along with sliding mode control technique. The proposed composite nonlinear feedback control approach consists of two parts. In a word, the first part provides the stability...
Article
This paper aimed to investigate the effect of mobile learning (m-learning) on student satisfaction, as well as internal and external factors affecting the m-learning. In this regard, first the factors that can impact positively or negatively on the m-learning have been investigated, and then, the m-learning impact on student satisfaction has been s...
Article
Internet of things is a new pattern in wireless communications of things. The basic theory of IoT is the comprehensive presence of different kinds of things in surrounding environment. The three main dimensions of data security in the Internet are integration, privacy and availability. One of the major tools for maintaining the security of Internet...
Article
Customer relationship management (CRM) is always considered as an essential task for increasing customer satisfaction for mobile banking (m-banking), and it is, like other areas of marketing, constantly evolving and updating. Also the vast use of the mobile banking by internet users, persuades electronic banking to use customer relationship managem...
Article
This paper analyzed the adoption of using mobile learning (m-learning) in higher education. Mobile Learning as a model of e-learning refers to the acquisition of knowledge, skills and attitudes by utilizing mobile technologies. With the increasing coverage of mobile networks, learning services can play the increasing and effective role in education...
Article
Retraction: Hamidi H, Fazely K. Analysis of the essential factors for challenges of mobile learning adoption in education. Computer Applications in Engineering Education, 2018. doi: 10.1002/cae.21993 The above article from the Computer Applications in Engineering Education, published online on 28 June 2018 in Wiley Online Library as Early View (htt...
Article
The growing trend of ageing has created many challenges. One of these challenges is the rehabilitation of individuals who take time, resources and manpower. The motivation for this study is to propose an ontology-based automatic design methodology for use in intelligent rehabilitation systems in the Internet of things (IoTs). For interconnection, a...
Article
Full-text available
Considering the rapid growth, complications and treatment side-effects of MI, so using data mining techniques seems necessary. On the other hand, in real-world MI cases are much less compared to healthy cases. The traditional algorithms for imbalanced problems lead to very low Sensitivity, thus, we propose a cost sensitive SMO model that utilizes a...
Article
In this paper the authors proposed a database sampling framework that aims to minimize the time necessary to produce a sample database. They argue that the performance of current relational database sampling techniques that maintain the data integrity of the sample database is low and a faster strategy needs to be devised. The sampling method targe...
Article
Full-text available
This paper proposes a parallel distributed compensation-based composite nonlinear feedback (CNF) control approach for a class of constrained nonlinear systems, which is described based on Takagi–Sugeno (T-S) fuzzy models with input saturation. By producing invariant sets, the sufficient conditions guarantee the asymptotic stability of the closed-lo...
Article
Full-text available
According to the crucial role of gas turbines in electricity production without significant harmful effects on the environment, this paper is aimed at the modeling and simulation of a particular type of these systems known as V94.2. Gas turbine is an instrument for power generation, which is capable of producing a vast amount of energy by consideri...
Article
This paper presents a reliable model for mobile codes in distributed networks, which represents reliable mobile agent execution. The model ensures non-blocking mobile agent execution and forces the once property without relying on correct fault detection. A mobile agent execution is blocking if a fault of agent prevents the agent from continuing in...
Article
Full-text available
In this article, we propose a switching adaptive control for trajectory tracking of unmanned aircraft systems. The switching adaptive control method is designed to overcome the wind disturbance and achieve a proper tracking performance for control systems. In the suggested system, the wind disturbance is regarded as a finite set of uncertainties; a...
Article
Exchanges in electronic market accomplishes through electronic channels. An electronic market is a meeting point for both the shoppers and the sellers. This article aims for the impact of cultural and security orientation on the customer perception of the seller's ethics regarding the customers' loyalty. A heuristic method is applied to examine dim...
Article
This paper introduces a method for improving the association rules that will also help improve the performance of recommender systems. Combining sampling and parallelism in the process, the proposed method, in addition to help perform the process more quickly, better quality rules will be generated. The proposed method and the dataset will be segme...
Article
The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distri...
Article
In this article, a new combined approach of a decision tree and clustering is presented to predict the transmission of genetic diseases. In this article, the performance of these algorithms is compared for more accurate prediction of disease transmission under the same condition and based on a series of measures like the positive predictive value,...
Article
Full-text available
Regarding the fact that stored data occupies a large space in organizations and retention systems and information management that has been resulted in gigantic data warehouses, the need for extracting an appropriate model is felt increasingly. Text mining is one of the most significant methods for extracting a useful and appropriate model that help...
Article
Full-text available
Background Myocardial infarction (MI) occurs due to heart muscle death that costs like human life, which is higher than the treatment costs. This study aimed to present an MI prediction model using classification data mining methods, which consider the imbalance nature of the problem. Methods We enrolled 455 healthy and 295 myocardial infarction c...
Article
Intelligent traffic management can be considered one of the most promising solutions to contemporary traffic problems. The traffic in transportation associated with emergency conditions including psychiatric improvement in transport network, allocation of variable traffic flows, reducing the number of the crowded traffic roads and paths as well as...
Article
In this paper, a mechanism is designed for integration of inertial navigation system information (INS) and global positioning system information (GPS). In this type of system a series of mathematical and filtering algorithms with Tightly Coupled techniques with several objectives such as application of integrated navigation algorithms, precise calc...
Article
The transformation technique relies on the comparison of parity values computed in two ways. The fault detection structures are developed and they not only detected subsystem faults but also corrected faults introduced in the data processing system. Concurrent parity values techniques are very useful in detecting numerical error in the data process...
Article
Full-text available
Background and aims: The use of imaging such as X-rays may have an important role in early diagnosis, staging, planning treatment and monitoring of patients during treatment. Radiology ward staff is at risk of low-dose occupational exposure. Therefore, this study aimed to evaluate the biological effects of low dose occupational exposure to ionizing...
Article
In this article the hybrid optimization algorithm of differential evolution and particle swarm is introduced for designing the fuzzy rule base of a fuzzy controller. For a specific number of rules, a hybrid algorithm for optimizing all open parameters was used to reach maximum accuracy in training. The considered hybrid computational approach inclu...
Article
New technologies and their uses have always had complex economic, social, cultural, and legal implications, with accompanying concerns about negative consequences. So it will probably be with the IoT and their use of data and attendant location privacy concerns. It must be recognized that management and control of information privacy may not be suf...
Article
Enterprise resource planning (ERP) system is an information system that supports and integrates many facets of a business, sales, and marketing. ERP system success depends on the rigor of the ERP Implementation processes. Scope creep, inadequate allocation of human resources over time, and vendor management are some common problems associated with...
Article
Although decreasing rate of death in developed countries because of Myocardial Infarction, it is turned to the leading cause of death in developing countries. Data mining approaches can be utilized to predict occurrence of Myocardial Infarction. Because of the side effects of using Angioplasty as main method for diagnosing Myocardial Infarction, pr...
Article
Today, the interests of an organization cannot be obtained by a single company, because the companies try to focus their business on the activities which are worthwhile to be focused on and they outsource other activities. In this paper, we proposed a conceptual framework and examined it to find the effect of some of the individual, organizational,...
Conference Paper
Full-text available
امروزه موتورهای جستجوی مختلفی برای دستیابی به اطلاعات مورد نیاز از میان انبوه مطالب موجود در وب استفاده می شوند، که برای جمع آوری داده ها به خزنده های وب وابسته هستند. خزنده وب یکی از مهم ترین مولفه های موتور جستجو می باشد که وظیفه آن دریافت صفحات وب جهت شاخص گذاری توسط موتور جستجو است. علاوه بر موتور های جستجو از خزنده های وب برای اهدافی مانند داد...
Article
To select an enterprise resource planning (ERP) system is time consuming due to the resource constraints, the software complexity, and the different of alternatives. A comprehensively systematic selection policy for ERP system is very important to the success of ERP project. In this paper, we propose a fuzzy analytic hierarchy process (FAHP) method...
Conference Paper
This paper compares two telecommunication standards for plaintext transmission over Session Initiation Protocol (SIP): SIP extension for Text over Internet Protocol (ToIP) and SIP extension for Instant Messaging (IM). ToIP provides a real-time text service, while IM provides a near realtime text service. Originally, SIP is a Voice over Internet Pro...
Chapter
The Algorithm-Based Fault Tolerance (ABFT) approach transforms a system that does not tolerate a specific type of faults, called the Fault-Intolerant system, to a system that provides a specific level of fault tolerance, namely recovery. The ABFT philosophy leads directly to a model from which error correction can be developed. By employing an ABFT...
Article
We present a new approach to fault tolerance for High Performance Computing system. An important consideration in the design of high performance multiprocessor systems is to ensure the correctness of the results computed in the presence of transient and intermittent failures. Concurrent error detection and correction have been applied to such syste...
Chapter
The reliable execution of mobile agents is a very important design issue in building mobile agent systems and many fault-tolerant schemes have been proposed so far. Security is a major problem of mobile agent systems, especially when monetary transactions are concerned. Security for the partners involved is handled by encryption methods based on a...
Article
Full-text available
Mobile agents are no longer a theoretical issue since different architectures for their realization have been proposed. With the increasing market of electronic commerce it becomes an interesting aspect to use autonomous mobile agents for electronic business transactions. Being involved in money transactions, supplementary security features for mob...

Network

Cited By