Mohammad Harizi

Mohammad Harizi
  • Student of Ph.D.
  • PhD Student at Islamic Azad University Boroujerd Branch

About

5
Publications
2,137
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
12
Citations
Introduction
Lightweight cryptography 4-bit Sboxes
Current institution
Islamic Azad University Boroujerd Branch
Current position
  • PhD Student
Additional affiliations
January 2006 - October 2019
Islamic Azad University, Ramhormoz Branch, Ramhormoz, Iran
Position
  • Instructor

Publications

Publications (5)
Article
Full-text available
The dispersion of data warehouses in the current world of information is a challenge which causes their owners or beneficiaries to have difficulty understanding and perceiving the relevant and existing data. What defines a data warehouse is metadata. Put another way, metadata plays a vital role in introducing and identifying data warehouses. This p...
Article
Full-text available
ne of the subjects related to software engineering is software measurement. Software measurement itself includes different topics that estimating software size is one of them. Various methods have been proposed for estimating software size. Each studies this topic from specific approach. Since UML is a well-known notation for representing object-or...
Conference Paper
XML queries are based on path expressions which are equal to a combination of some elements connected to each other in a tree pattern structure, called query tree pattern (QTP). The main operation in XML query processing is to find the nodes that match the given QTP in the document. A number of methods have offered for QTP matching; but the majorit...
Conference Paper
Previous researches, in the filed of XML databases, have been done to evaluate XML queries with AND-branches. However, as far as we know, very little work has examined the efficient processing of XML queries with NOT-predicates. Also these methods have to process all of the query nodes in the document when dealing with queries with NOT-branch. In t...

Questions

Question (1)
Question
Dear researchers, I want some fast publish and free journals in cryptography(block ciphers) and data security domains. Can you introduce me?

Network

Cited By