Skip to main content

Showing 1–14 of 14 results for author: Meybodi, M R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2309.11316  [pdf

    cs.GT cs.AI

    Dynamic Pricing of Applications in Cloud Marketplaces using Game Theory

    Authors: Safiye Ghasemi, Mohammad Reza Meybodi, Mehdi Dehghan Takht-Fooladi, Amir Masoud Rahmani

    Abstract: The competitive nature of Cloud marketplaces as new concerns in delivery of services makes the pricing policies a crucial task for firms. so that, pricing strategies has recently attracted many researchers. Since game theory can handle such competing well this concern is addressed by designing a normal form game between providers in current research. A committee is considered in which providers re… ▽ More

    Submitted 20 September, 2023; originally announced September 2023.

  2. arXiv:2309.11312  [pdf

    cs.GT cs.AI

    A Competition-based Pricing Strategy in Cloud Markets using Regret Minimization Techniques

    Authors: S. Ghasemi, M. R. Meybodi, M. Dehghan, A. M. Rahmani

    Abstract: Cloud computing as a fairly new commercial paradigm, widely investigated by different researchers, already has a great range of challenges. Pricing is a major problem in Cloud computing marketplace; as providers are competing to attract more customers without knowing the pricing policies of each other. To overcome this lack of knowledge, we model their competition by an incomplete-information game… ▽ More

    Submitted 20 September, 2023; originally announced September 2023.

  3. arXiv:2309.11299  [pdf

    cs.DC cs.AI

    A Cost-Aware Mechanism for Optimized Resource Provisioning in Cloud Computing

    Authors: Safiye Ghasemi, Mohammad Reza Meybodi, Mehdi Dehghan Takht Fooladi, Amir Masoud Rahmani

    Abstract: Due to the recent wide use of computational resources in cloud computing, new resource provisioning challenges have been emerged. Resource provisioning techniques must keep total costs to a minimum while meeting the requirements of the requests. According to widely usage of cloud services, it seems more challenging to develop effective schemes for provisioning services cost-effectively; we have pr… ▽ More

    Submitted 20 September, 2023; originally announced September 2023.

  4. arXiv:2307.00529  [pdf, other

    cs.CR cs.LG

    New intelligent defense systems to reduce the risks of Selfish Mining and Double-Spending attacks using Learning Automata

    Authors: Seyed Ardalan Ghoreishi, Mohammad Reza Meybodi

    Abstract: In this paper, we address the critical challenges of double-spending and selfish mining attacks in blockchain-based digital currencies. Double-spending is a problem where the same tender is spent multiple times during a digital currency transaction, while selfish mining is an intentional alteration of a blockchain to increase rewards to one miner or a group of miners. We introduce a new attack tha… ▽ More

    Submitted 8 March, 2024; v1 submitted 2 July, 2023; originally announced July 2023.

  5. arXiv:2302.12096  [pdf, other

    cs.LG cs.AI cs.CR cs.DC

    VDHLA: Variable Depth Hybrid Learning Automaton and Its Application to Defense Against the Selfish Mining Attack in Bitcoin

    Authors: Ali Nikhalat-Jahromi, Ali Mohammad Saghiri, Mohammad Reza Meybodi

    Abstract: Learning Automaton (LA) is an adaptive self-organized model that improves its action-selection through interaction with an unknown environment. LA with finite action set can be classified into two main categories: fixed and variable structure. Furthermore, variable action-set learning automaton (VASLA) is one of the main subsets of variable structure learning automaton. In this paper, we propose V… ▽ More

    Submitted 15 February, 2023; originally announced February 2023.

  6. arXiv:2301.11463  [pdf, other

    cs.CR cs.AI cs.DC cs.LG

    Nik Defense: An Artificial Intelligence Based Defense Mechanism against Selfish Mining in Bitcoin

    Authors: Ali Nikhalat-Jahromi, Ali Mohammad Saghiri, Mohammad Reza Meybodi

    Abstract: The Bitcoin cryptocurrency has received much attention recently. In the network of Bitcoin, transactions are recorded in a ledger. In this network, the process of recording transactions depends on some nodes called miners that execute a protocol known as mining protocol. One of the significant aspects of mining protocol is incentive compatibility. However, literature has shown that Bitcoin mining'… ▽ More

    Submitted 14 February, 2023; v1 submitted 26 January, 2023; originally announced January 2023.

    Comments: Paper is submitted to Journal of IEEE Transactions on Dependable and Secure Computing

  7. arXiv:1409.1515  [pdf

    cs.NI

    A Coverage Monitoring algorithm based on Learning Automata for Wireless Sensor Networks

    Authors: Habib Mostafaei, Mehdi Esnaashari, Mohammad Reza Meybodi

    Abstract: To cover a set of targets with known locations within an area with limited or prohibited ground access using a wireless sensor network, one approach is to deploy the sensors remotely, from an aircraft. In this approach, the lack of precise sensor placement is compensated by redundant de-ployment of sensor nodes. This redundancy can also be used for extending the lifetime of the network, if a prope… ▽ More

    Submitted 4 September, 2014; originally announced September 2014.

  8. Online Channel Assignment in Multi-Radio Wireless Mesh Networks Using Learning Automata

    Authors: Ziaeddin Beheshtifard, Mohammad Reza Meybodi

    Abstract: In this paper, we look into the problem of channel assignment in multi-channel multi-radio wireless mesh networks. We propose a new learning automata based channel assignment scheme that adaptively improve network overall throughput by expecting channel state. Since the ability of sending packets via upstream links will be evaluation bases for assigning channels to radio interfaces on each node. W… ▽ More

    Submitted 14 May, 2014; originally announced May 2014.

    Comments: 7 pages, 4 figures

    Journal ref: International Journal of Soft Computing and Software Engineering [JSCSE], Vol. 3, No. 3, pp. 726-732, 2013

  9. arXiv:1311.7215  [pdf

    cs.AI cs.DM

    Solving Minimum Vertex Cover Problem Using Learning Automata

    Authors: Aylin Mousavian, Alireza Rezvanian, Mohammad Reza Meybodi

    Abstract: Minimum vertex cover problem is an NP-Hard problem with the aim of finding minimum number of vertices to cover graph. In this paper, a learning automaton based algorithm is proposed to find minimum vertex cover in graph. In the proposed algorithm, each vertex of graph is equipped with a learning automaton that has two actions in the candidate or non-candidate of the corresponding vertex cover set.… ▽ More

    Submitted 28 November, 2013; originally announced November 2013.

    Comments: 5 pages, 5 figures, conference

  10. Finding a Maximum Clique using Ant Colony Optimization and Particle Swarm Optimization in Social Networks

    Authors: Mohammad Soleimani-Pouri, Alireza Rezvanian, Mohammad Reza Meybodi

    Abstract: Interaction between users in online social networks plays a key role in social network analysis. One on important types of social group is full connected relation between some users, which known as clique structure. Therefore finding a maximum clique is essential for some analysis. In this paper, we proposed a new method using ant colony optimization algorithm and particle swarm optimization algor… ▽ More

    Submitted 28 November, 2013; originally announced November 2013.

    Comments: 4 pages, 3 figures, conference

  11. arXiv:1308.2772  [pdf, ps, other

    cs.AI

    Extended Distributed Learning Automata:A New Method for Solving Stochastic Graph Optimization Problems

    Authors: M. R. Mollakhalili Meybodi, M. R. Meybodi

    Abstract: In this paper, a new structure of cooperative learning automata so-called extended learning automata (eDLA) is introduced. Based on the proposed structure, a new iterative randomized heuristic algorithm for finding optimal sub-graph in a stochastic edge-weighted graph through sampling is proposed. It has been shown that the proposed algorithm based on new networked-structure can be to solve the op… ▽ More

    Submitted 13 August, 2013; originally announced August 2013.

  12. A Multi-Swarm Cellular PSO based on Clonal Selection Algorithm in Dynamic Environments

    Authors: Somayeh Nabizadeh, Alireza Rezvanian, Mohammd Reza Meybodi

    Abstract: Many real-world problems are dynamic optimization problems. In this case, the optima in the environment change dynamically. Therefore, traditional optimization algorithms disable to track and find optima. In this paper, a new multi-swarm cellular particle swarm optimization based on clonal selection algorithm (CPSOC) is proposed for dynamic environments. In the proposed algorithm, the search space… ▽ More

    Submitted 7 August, 2013; originally announced August 2013.

    Comments: 5 pages, 3 figures, conference paper

    Journal ref: 2012 International Conference on Informatics, Electronics & Vision (ICIEV 2012) 482-486

  13. arXiv:1307.8279  [pdf

    cs.AI cs.NE

    Tracking Extrema in Dynamic Environment using Multi-Swarm Cellular PSO with Local Search

    Authors: Somayeh Nabizadeh, Alireza Rezvanian, Mohammad Reza Meybodi

    Abstract: Many real-world phenomena can be modelled as dynamic optimization problems. In such cases, the environment problem changes dynamically and therefore, conventional methods are not capable of dealing with such problems. In this paper, a novel multi-swarm cellular particle swarm optimization algorithm is proposed by clustering and local search. In the proposed algorithm, the search space is partition… ▽ More

    Submitted 31 July, 2013; originally announced July 2013.

    Comments: 8 pages, 3 figures

    Journal ref: int j electron inform 1 (2012) 29-37

  14. arXiv:cs/0601132   

    cs.AI cs.NE

    A Study on the Global Convergence Time Complexity of Estimation of Distribution Algorithms

    Authors: R. Rastegar, M. R. Meybodi

    Abstract: The Estimation of Distribution Algorithm is a new class of population based search methods in that a probabilistic model of individuals is estimated based on the high quality individuals and used to generate the new individuals. In this paper we compute 1) some upper bounds on the number of iterations required for global convergence of EDA 2) the exact number of iterations needed for EDA to conv… ▽ More

    Submitted 2 April, 2019; v1 submitted 31 January, 2006; originally announced January 2006.

    Comments: Old paper with potential mistake