Investigating the informativeness of technical indicators and news sentiment in financial market price prediction SA Farimani, MV Jahan, AM Fard, SRK Tabbakh Knowledge-Based Systems 247, 108742, 2022 | 76 | 2022 |
A Density Based Clustering Approach to Distinguish Between Web Robot and Human Requests to a Web Server M. Zabihi, M. Vafaei Jahan, J. Hamidzadeh The ISC International Journal of Information Security 6 (1), 1-13, 2014 | 40* | 2014 |
Adaptive and non-adaptive data hiding methods for grayscale images based on modulus function N Maleki, M Jalali, MV Jahan Egyptian Informatics Journal 15 (2), 115-127, 2014 | 29 | 2014 |
Generating pseudo-random numbers by combining two systems with complex behaviors SM Hosseini, H Karimi, MV Jahan Journal of Information Security and Applications 19 (2), 149-162, 2014 | 26 | 2014 |
From local search to global conclusions: migrating spin glass-based distributed portfolio selection MV Jahan, MR Akbarzadeh-Totonchi IEEE Transactions on Evolutionary Computation 14 (4), 591-601, 2010 | 24 | 2010 |
Anomalous behavior detection of marine vessels based on Hidden Markov Model KF Toloue, MV Jahan 2018 6th Iranian Joint Congress on Fuzzy and Intelligent Systems (CFIS), 10-12, 2018 | 20 | 2018 |
Collaborative filtering-based recommender systems by effective trust V Faridani, M Jalali, MV Jahan International Journal of Data Science and Analytics 3, 297-307, 2017 | 20 | 2017 |
Malware detection using Markov Blanket based on opcode sequences H Divandari, B Pechaz, MV Jahan 2015 International Congress on Technology, Communication and Knowledge …, 2015 | 19 | 2015 |
On the combination of self-organized systems to generate pseudo-random numbers H Karimi, SM Hosseini, MV Jahan Information Sciences 221, 371-388, 2013 | 19 | 2013 |
Metamorphic malware detection using linear discriminant analysis and graph similarity R Mirzazadeh, MH Moattar, MV Jahan 2015 5th International Conference on Computer and Knowledge Engineering …, 2015 | 18 | 2015 |
Analyzing new features of infected web content in detection of malicious web pages JH Nezhad, MV Jahan, M Tayarani-N, Z Sadrnezhad The ISC International Journal of Information Security 9 (2), 161-181, 2017 | 16* | 2017 |
An HMM for online signature verification based on velocity and hand movement directions MVJ Farimani, Saeede Anbaee Fuzzy and Intelligent Systems (CFIS), 2018 6th Iranian Joint Congress, 2018 | 15* | 2018 |
Malware detection using hidden Markov model based on Markov blanket feature selection method B Pechaz, MV Jahan, M Jalali 2015 International congress on technology, communication and knowledge …, 2015 | 15 | 2015 |
Extremal optimization vs. learning automata: Strategies for spin selection in portfolio selection problems MV Jahan, MR Akbarzadeh-T Applied Soft Computing 12 (10), 3276-3284, 2012 | 15 | 2012 |
From text representation to financial market prediction: A literature review SA Farimani, MV Jahan, A Milani Fard Information 13 (10), 466, 2022 | 14 | 2022 |
Chaos-based image encryption using a hybrid cellular automata and a DNA sequence AY Niyat, RMH Hei, MV Jahan 2015 International Congress on Technology, Communication and Knowledge …, 2015 | 14 | 2015 |
A RGB image encryption algorithm based on DNA sequence operation and hyper-chaotic system AY Niyat, RMH Hei, MV Jahan International Congress on Technology, Communication and Knowledge (ICTCK), 2015 | 14 | 2015 |
Leveraging latent economic concepts and sentiments in the news for market prediction SA Farimani, MV Jahan, AM Fard, G Haffari 2021 IEEE 8th International Conference on Data Science and Advanced …, 2021 | 13 | 2021 |
Swallow: resource and tag recommender system based on heat diffusion algorithm in social annotation systems VA Mahboob, M Jalali, MV Jahan, P Barekati Computational Intelligence 33 (1), 99-118, 2017 | 10 | 2017 |
Stock market prediction with hidden markov model M Farshchian, MV Jahan 2015 International Congress on Technology, Communication and Knowledge …, 2015 | 9 | 2015 |