چاپ
CV
IAUN
Islamic Azad University, Najafabad Branch

 1- Personal Information  
First Name : Mohammad
Last Name : Naderi Dehkordi
E-mail : naderi@iaun.ac.ir | m_naderi_d@yahoo.com
Work Address : Islamic Azad University, Najafabad Branch, Esfahan
Academic Rank :Assistant Professor


 2- Education Background  
Academic Degree Education Field University Country Year
B.Sc Software Engineering IUT IRAN 1999
M.Sc Software Engineering IAUN IRAN 2001
Ph.D Software Engineering SRBIAU IRAN 2009


 3- Educational Experience  
Row Specialized Courses Taught Degree
1 ذخيره و بازيابي اطلاعات کارشناسي
2 اصول طراحي پايگاه داده کارشناسي
3 سمينار کارشناسي ارشد
4 روش تحقيق کارشناسي ارشد
5 مباحث پيشرفته در مهندسي نرم افزار (داده کاوي با حفظ حريم خصوصي) کارشناسي ارشد
6 پايگاه داده پيشرفته کارشناسي ارشد
7 پايگاه داده توزيع شده دكتري
8 مباحث پيشرفته در تئوري اطلاعات دكتري


 4- Research Interests  
Row Fields of Investigation and Specialized
1 Data Mining
2 Privacy Preserving Data Mining
3 Privacy Preserving in Social Networks
4 Mobile Database Management Systems


 5- Research Activities    5-1) Paper Published in Journals  
Row Article title Journal Name Year Volume Article Printed Pages
1 A fast graph modification method for social network anonymization Expert Systems With Applications 2021 180 115148
2 Predicting the Helpfulness Score of Product Reviews Using an Evidential Score Fusion Method IEEE Access 2020 8 82662 - 82687
3 Privacy-preserving in association rule mining using an improved discrete binary artificial bee colony Expert Systems With Applications 2020 144 1-19
4 TSRAM: A time-saving k-degree anonymization method in social network Expert Systems With Applications 2019 125 378-396
5 SNI: Supervised Anonymization Technique to Publish Social Networks Having Multiple Sensitive Labels Security and Communication Networks 2019 2019 1-23
6 EVELOPMENT OF ANFIS-PSO, SVR-PSO, AND ANN-PSO HYBRID INTELLIGENT MODELS FOR PREDICTING THE COMPRESSIVE STRENGTH OF CONCRETE International Journal of Optimaization in Civil Engineering 2018 8-4 547-563
7 Sensitive association rules hiding using electromagnetic field optimization algorithm Expert Systems With Applications 2018 114 155-172
8 Dynamic data clustering by combining improved discrete artificial bee colony algorithm with fuzzy logic International Journal of Bio-Inspired Computation 2018 12-3 164-172
9 Double Clustering Method in Hiding Association Rules Journal of Advances in Computer Research 2016 7 67-87
10 Introducing an algorithm for use to hide sensitive association rules through perturb technique Journal of Artificial Intelligence and Data Mining 2016 4-2 219-227
11 Association rule hiding using cuckoo optimization algorithm Expert Systems With Applications 2016 64 340-351
12 A survey on association rule hiding methods International Journal of Computer Science and Information Security 2016 14-7 854-860
13 A heuristic algorithm for quick hiding of association rules ACSIJ Advances in Computer Science: an International Journal 2015 4 16-21
14 Privacy Preserving in Association Rule Mining ACSIJ Advances in Computer Science: an International Journal 2015 4 22-29
15 A survey on privacy preserving association rule mining Advances in Computer Science: an International Journal 2015 4 41-48
16 Sensitive Representative Association Rules International Journal of Advanced Research in Computer Science and Software Engineering 2015 5 102-107
17 An Algorithm for Hiding Sensitive Frequent Itemsets International journal of advances in soft computing and its applications 2015 7 51-63
18 A Hybrid Approach to Privacy Preserving in Association Rules Mining ACSIJ Advances in Computer Science: an International Journal 2014 3 69-72
19 A New Approach Based on Genetic Algorithm for Prioritizing Quality Scenarios in Enterprise Architecture Evaluation International Journal of Computer Science Engineering 2014 3 21-31
20 Improved MMR Technique for Extractive Text Summarization International Journal of Mechatronics, Electrical and Computer Technology 2014 4 589-601
21 Hiding Sensitive Association Rules by Elimination Selective Item among R.H.S Items for each Selective Transaction Indian Journal of Science and Technology 2014 7 826-832
22 A Novel Method to Determine the Effect of Software Architectural Decisions Based On Quality Attributes ARPN Journal of Systems and Software 2014 4 96-100
23 A Method for Hiding Association rules with Minimum Changes in Database International Journal of Advances in Computer Science 2014 3 83-90
24 Hiding Sensitive Association Rules by Distorting RHS Items International Journal of Engineering and Innovative Technology 2013 3 232-237
25 A Novel Association Rule Hiding Approach in OLAP Data Cubes Indian Journal of Science and Technology 2013 6 4063-4075
26 A New Model for Recommender Systems based on Data Sources Integration International Journal of Information and Communication Technology Research 2013 3 27-33
27 An Efficient Prefix Tree for Incremental Frequent Pattern Mining International Journal of Information and Communication Technology Research 2013 3 49-55
28 A Novel Method of Significant Words Identification in Text Summarization JOURNAL OF EMERGING TECHNOLOGIES IN WEB INTELLIGENCE 2012 4 252-258
29 Improving Performance of Search Engines Based on Fuzzy Classification Indian Journal of Science and Technology 2012 5 3607-3611
30 Control and Analysis of an Omnidirectional Autonomous Robot Based on Software Approach and Multimedia Database Journal of Control Engineering and Applied Informatics 2012 14 65-72
31 XML Documents Clustering based on Frequent and Rare Tag Sequences with Automated Support Thresholds International Review on Computers and Software 2012 7 1-10
32 A New Effective Criterion to Select Sentences in Extractive Text Summarization Journal of Telecommunication, Electronic and Computer Engineering 2012 4 49-52
33 A New GA Approach Based on Pareto Ranking Strategy for Privacy Preserving of Association Rule Mining International Journal of Information and Communication Technology 2010 2 29-41
34 A Novel Method for Privacy Preserving in Association Rule Mining Based on Genetic Algorithms JOURNAL OF SOFTWARE 2009 4 555-562
35 A new approach for sensitive association rules hiding International Journal of Rapid Manufacturing 2009 1 128-149
36 A NEW APPROACH BASED ON WEIGHTED SUM IN GENETIC ALGORITHM FOR SENSITIVE ASSOCIATION RULE HIDING Far East Journal of Experimental and Theoretical Artificial Intelligence 2009 4 45-71
37 A New Hybrid Operation in OLAP Data Cubes International Journal of Computer Science and Software Technology 2008 1 45-50
38 Publishing Health Information Without Distortion While Balancing Desired Privacy Preserving and Utility Journal of Intelligent Procedures in Electrical Technology 2021 12-47 13-34

 5-2) Papers Presented at the Conference  
Row Article title Conference Name Conference Location Year
1 Review and Evaluation Alzheimer Disease Detection Method First International Conference on Computer Science and Engineering Najafabad branch, Islamic Azad University 2017
2 Intrusion Detection using Machine Learning: Review First International Conference on Computer Science and Engineering Najafabad branch, Islamic Azad University 2017
3 Approaches in using topical and focused crawler First International Conference on Computer Science and Engineering Najafabad Branch, Islamic Azad University 2017
4 Methods of Mining communities in social networks First International Conference on Computer Science and Engineering Najafabad Branch, Islamci Azad University 2017
5 Evaluating the Similarity of Web Service Policies Using Flexible Parameter Matching 1ntemational Conference on Measurement, Information and Control Harbin 2012
6 Mapping UML State Machine Diagram And WS-CDL For Modeling Participant’s Behavioral Scenarios International Conference on Computer Science and Information Technology Pattaya, Thailand 2011
7 Multi Level Exceptions Mining in OLAP Data Cubes International Conference on Computer and Communication Engineering Kuala Lumpur 2008
8 مروري بر روشهاي حفظ حريم خصوصي در امنيت پايگاه داده تراکنشي دومين همايش ملي علوم و مهندسي كامپيوتر Najafabad 1393
9 الگوريتم تلفيقي با رويکرد اکتشافي بهمنظور حفظ حريم خصوصي در استخراج قواعد انجمني دومين همايش ملي علوم و مهندسي کامپيوتر 7 1393
10 الگوريتم رتبه بندي دادههاي نيمه ساختيافته HITS دومين همايش ملي علوم و مهندسي کامپيوتر دانشگاه آزاد اسلامي واحد نجف آباد 1393
11 بررسي و مقايسه‌ي رويكردهاي مبتني بر معيار محبوبيت جهت كاهش مشكل شروع سرد كاربر جديد پنجمين كنفرانس بين المللي فناوري اطلاعات و دانش دانشگاه شيراز 1392
12 روشي جديد براي اولويت بندي سناريوهاي كيفي در فرآيند ارزيابي معماري سازماني با استفاده از الگوريتم ژنتيك کنفرانس بين المللي کامپيوتر، فناوري اطلاعات و رسانه هاي ديجيتال نمايشگاه بين المللي فناوري اطلاعات و رسانه هاي ديجيتال 1392
13 اولويت بندي سناريوهاي کيفي در ارزيابي معماري سازماني با استفاده از الگوريتم ژنتيک دهمين همايش ملي کامپيوتر و سيستم هاي هوشمند دانشگاه صنعتي اميرکبير 1392
14 ارائه يک الگوريتم بهبود يافته با حداقل گمشدگي قواعد براي حفظ حريم خصوصي در داده کاوي دومين کنفرانس بين المللي مديريت، کارآفريني و توسعه اقتصادي قم 1392
15 چارچوبي براي افزايش قابليت استفاده از تصميمات معماري نرم افزار مهندسي کامپيوتر و توسعه پايدار مشهد 1392
16 اصلاح خوشه بندي K-Means توسط الگوريتم ژنتيک بهبوديافته هفتمين کنفرانس داده کاوي ايران تهران 1392
17 ارائه الگوريتم بهبود يافته پنهان سازي قواعد حساس با حداقل گمشدگي قواعد در داده کاوي با حفظ حريم خصوصي هفتمين کنفرانس داده کاوي ايران تهران 1392
18 ارائه يک الگوريتم با حداقل تعداد قواعد ساختگي در فرآيند کشف قوانين وابستگي با حفظ حريم خصوصي هفتمين کنفرانس داده کاوي ايران تهران 1392
19 ارائه متدي به منظور کاهش ميزان شکست در داده کاوي با حفظ حريم خصوصي هفتمين کنفرانس داده کاوي ايران تهران 1392
20 بهينه سازي مديريت المان هاي شهري با ارائه الگوريتمي جهت کشف قواعد وابستگي فضائي اولين کنفرانس ملي رويکردهاي نوين در مهندسي کامپيوتر و بازيابي اطلاعات ايران رودسر 1392
21 الگوريتم SIF-IDF اصلاح شده جهت پنهان سازي مجموعه هاي عناصر تکرار شونده حساس اولين کنفرانس ملي رويکردهاي نوين در مهندسي کامپيوتر و بازيابي اطلاعات ايران رودسر 1392
22 مروري بر مخفي سازي قواعد وابستگي: رويکرد اکتشافي اولين کنفرانس ملي رويکردهاي نوين در مهندسي کامپيوتر و بازيابي اطلاعات ايران رودسر 1392
23 ارائه مدلي براي کاويدن فعل و انفعالي زيرگراف هاي پرتکرار از گراف هاي تراکنشي اولين کنفرانس ملي رويکردهاي نوين در مهندسي کامپيوتر و بازيابي اطلاعات ايران رودسر 1392
24 بررسي و ارزيابي روش طبقه بندي مبتني بر قوانين انجمني چندگانه اولين کنفرانس ملي بازيابي اطلاعات ايران رودسر 1392
25 مقايسه و تحليل برترين روشهاي حفاظت از حريم خصوصي در داده کاوي توزيع شده پىجمين کىفرانس داده کاوي ايران تهران 1390

 5-3) Completed Research Plans  
Row Title Responsibility Project Kind
1 Privacy Preserving of Data Cubes in Multi-Dimentional Data Mining Director Internal Grant

 5-4) Compilation and Books  
Row Title Compilation Kind Compilation Publishing Date Publisher
1 Privacy Preserving Data Mining Compilation 2017 Danesh Pazhuhan Barin
2 Mobile Database System Translation 2014 Islamic Azad University-Najafabad Branch

 5-5) Initiative, Innovation and Invention, and Valuable Asrbdy  
Row Title Registration Place Reference Confirmed Date

 5-6) Awards and Honors  
Row Institution Title Festival Date Reference Award Announcement
1 Islamic Azad University-Najafabad Branch Top Researcher Award 2010
2 Islamic Azad University-Najafabad Branch Top Researcher Award 2014

 5-7) Lecturer Of Workshop  
Row Title Date
1 Security and Privacy Preserving in Data Mining Workshop 11/03/2014


 6- Executive Experience  
Row Title Executive Year
1 Vice-Chairman for Education 2009
2 Dean of Computer Engineering Faculty 2017