Sina Ahmadi

Sina Ahmadi

Master of Technology

About

9
Publications
965
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
85
Citations

Publications

Publications (9)
Article
Full-text available
Due to the importance of accurate diagnosis and prompt treatment of this condition, the medical world is searching for a solution for its early detection and efficient treatment. Heart disease is one of the leading causes of death in modern society. With the development of computer science today, this issue can be resolved using computers. Data min...
Article
By combining centrality measures and community detection, a better insight into the nature of the evolution of important nodes in complex networks is obtained. Meanwhile, the dynamic identification of important nodes in complex networks can be enhanced by considering both local and global characteristics. Local characteristics focus on the immediat...
Article
Full-text available
Understanding the drug solubility behavior is likely the first essential requirement for designing the supercritical technology for pharmaceutical processing. Therefore, this study utilizes different machine learning scenarios to simulate the solubility of twelve non-steroidal anti-inflammatory drugs (NSAIDs) in the supercritical carbon dioxide (SC...
Article
Full-text available
Understanding the drug solubility behavior is likely the first essential requirement for designing the supercritical technology for pharmaceutical processing. Therefore, this study utilizes different machine learning scenarios to simulate the solubility of twelve non-steroidal anti-inflammatory drugs (NSAIDs) in the supercritical carbon dioxide (SC...
Article
Deep eutectic solvents (DES) are a new class of green solvents. Reliable characterization of DESs is a prerequisite for their successful applications. The molar heat capacity (Cp) is likely an essential thermal property often measured through expensive and time-consuming experimentations. Hence, it is necessary to derive an accurate model for Cp ca...
Article
Full-text available
Phishing is a social engineering technique used to deceive users, which means trying to obtain confidential information such as username, password or bank account information. One of the most important challenges on the Internet today is the risk of phishing attack and Internet scams. These attacks cost the United States billions of dollars a year....
Preprint
Full-text available
Phishing is a social engineering technique used to deceive users, which means trying to obtain confidential information such as username, password or bank account information. One of the most important challenges on the Internet today is the risk of phishing attack and Internet scams. These attacks cost the United States billions of dollars a year....
Article
Full-text available
Phishing is a social engineering technique used to deceive users, which means trying to obtain confidential information such as username, password or bank account information. One of the most important challenges on the Internet today is the risk of phishing attack and Internet scams. These attacks cost the United States billions of dollars a year....

Network

Cited By