Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Shahriar Mohammadi is active.

Publication


Featured researches published by Shahriar Mohammadi.


international symposium on electronic commerce and security | 2008

ECC-Based Biometric Signature: A New Approach in Electronic Banking Security

Shahriar Mohammadi; Sanaz Abedi

Internet banking is the provision of banking services over the internet that gives people the opportunity of easy access to their banking activities. This paper focuses on the security of internet banking. It expresses that by the combination of two common mechanisms, PKI and biometric, a higher level of security can be achieved that resolves the key management problem. This paper presents a biometric signature based on the ECC (elliptic curve cryptography) algorithm that has some advantages in comparison with the RSA-based biometric signature. The major advantage that dramatically improves security aspects in electronic banking is that using the ECC algorithm to create a biometric signature, it becomes possible to create public and private keys without storing and transmitting any private information anywhere.


Journal of Business & Industrial Marketing | 2013

Linking power, risk, and governance: a survey research in new product development relationships

Afshar Bazyar; Ebrahim Teimoury; Mehdi N. Fesharaki; Alireza Moini; Shahriar Mohammadi

Purpose – Inter‐organizational arrangements are increasingly playing an important role in new product development (NPD). This article aims to investigate the links among power, risk, and governance in these kinds of relationships.Design/methodology/approach – The authors investigated the links based on the data collected from 112 respondents representing 112 different NPD relationships.Findings – The results of structural equation modeling revealed that, in the situation where coercive power is imbalanced between partner firms, the weaker partner perceives relational risk while imbalances in non‐coercive power do not influence relational risk perception significantly. The results also showed that relational risk perception is strongly associated with governance modes in such a way that negatively influences trust and the norm of information sharing, and positively affects vertical control, respectively. Further investigations revealed that the influence of power bases on governance modes was mediated thro...


Procedia Computer Science | 2011

Compare failure prediction models based on feature selection technique: empirical case from Iran

Sarah Ashoori; Shahriar Mohammadi

Abstract Due to the uncertainty of the current business environment and global competition, not only the failure prediction of corporations is very important, but also it is so crucial to prevent the wasting of individual’s capital. Failure of corporation does not take place at overnight. Warning signals of a company heading for business failure emerge much earlier than the actual failure. Therefore, these signals could be used as input variables in prediction models, to predict the failure in advance. Along with the advancement of artificial intelligence and database technology, data mining techniques are applied universally to management problems such as failure prediction of corporations since 1990s. The most used models for failure prediction are the neural networks. A huge amount of information about the corporations that derived from financial reports could be used to determine the failure of companies, but it needs much time and human resources. Selection of financial variables or features is very important stage in process of business failure prediction. In this study, 2 prediction models would be compared with each other in 3 stages. These models are neural networks that named “MultiLayer Perceptron”. One of these models is trained with original dataset and the other one is trained with a dataset contained the selection of features of original data set. The comparison of prediction models is based on accuracy of them and the type I and II errors.


international conference signal processing systems | 2010

A high level security mechanism for Internet polls

Shahriar Mohammadi; Hossein Abbasimehr

Nowadays Internet Polls are becoming more and more important as they are being used on a large scale. Being a web application a poll can suffer from a variety of attack. Recently automated web tools are used to attack Internet Polls in order to alter the results via automatic voting. Several protection methods introduced to stop automatic voting including IP Locking, cookie-based, and Human Interaction Proof. In this article, existing methods for protection are examined and also we have proposed an innovative solution, which considerably increases the security of Internet polls and the reliability of their results. The proposed solution has two phases: the construction phase in which the poll content and CAPTCHA test are created and the utilization phase, in which vote counting operation is done. The CAPTCHA that is used in the proposed method is an image-based CAPTCHA. For the aim of voting, an Internet user has to drag his or her desired poll option expressed in form of movable text object and drop it on to the picture of an object indicated by the CAPTCHA. The proposed method is fair, robust, and resistant. One of the main advantages of the method is that it can be used by all ages.


International Journal of Fuzzy System Applications archive | 2012

Selecting Adequate Security Mechanisms in E-Business Processes Using Fuzzy TOPSIS

Shahriar Mohammadi; Sina Golara; Nasim Mousavi

Security mechanisms are substantial to an e-business environment. While many security mechanisms have been developed to secure e-business processes EBP and networks, little attention is given to actual process of a systematic decision making. In most cases strongest security level available is selected. In many cases there are low risks and threats associated with the processes and the use of strong security wastes the available resources. In this paper the authors developed a practical multiple criteria decision making model based on the group fuzzy technique for order preference by similarity to ideal solution GFTOPSIS for choosing adequate security mechanism for e-business processes and making a trade-off between security and other important factors in the enterprise. Data was acquired from experts and implemented fuzzy approach. The authors differentiated four phases in the EBP. Each phase of the process which has specific security requirements thus we suggested the use of specified security mechanisms for each phase which improves the efficiency of the system.


international conference on industrial and information systems | 2010

A new scheduling algorithm for server farms load balancing

Ehsan Saboori; Shahriar Mohammadi; Shafigh Parsazad

this paper describes a new scheduling algorithm to distribute jobs in server farm systems. The proposed algorithm overcomes the starvation caused by SRPT (Shortest Remaining Processing Time). This algorithm is used in process scheduling in operating system approach. The algorithm was developed to be used in dispatcher scheduling. This algorithm is non-preemptive discipline, similar to SRPT, in which the priority of each job depends on its estimated run time, and also the amount of time it has spent on waiting. Tasks in the servers are served in order of priority to optimize the system response time. The experiments show that the mean round around time is reduced in the server farm system.


international conference on e-business engineering | 2009

Using an Enterprise Mashup Infrastructure for Just-in-Time Management of Situational Projects

Shahriar Mohammadi; Ali Khalili; Sarah Ashoori

The recent advent of web mashups that enable ad hoc integration of information and services from multiple disparate resources brings into the spotlight a new approach for managing situational projects in organizations. Situational projects are unpredictable and transient projects within an organization that come with limited number of users with specific needs. Handling these projects differs from traditional project management approaches. They need rapid and good enough solutions. In this paper a simple and organized approach for managing situational projects is proposed. The proposed approach tries to handle situational projects by creating a mashup infrastructure in the organization. There are three types of participants in our approach: Mashup manager, mashup resource analyst and mashup resource builder. Cooperation between these participants results in managing a situational project. Furthermore a meaningful real world scenario is defined to describe different steps of the approach. In addition, advantages of the proposed approach are identified and challenges of using web mashups along with guidelines to cope with them are expressed.


international conference on management of innovation and technology | 2008

An assistant for large scale software project management: Hybrid of agents and semantic web services

Ali Habibi Badradabi; Shahriar Mohammadi

Most Software projects fail because the project managers often ignore the previous experiences and are not aware about the best practices. On the other hand, in response to the challenges of globalization and formation of the international teams whose members are distributed on the world; software project management (SPM) environment has been changed since two decade ago. In this paper we present a value chain for SPMpsilas activities adopted from porterpsilas value chain and then we investigate a combination of a multi-agent system and an agent-based semantic web service architecture namely AGORA as a technique to support SPM in a distributed environment.


Telematics and Informatics | 2017

Word of Mouth impact on the adoption of mobile banking in Iran

Daniel Mehrad; Shahriar Mohammadi

Word of Mouth has an effect on Perceived Ease of using.Word of Mouth has an effect on Perceived usefulness.Word of Mouth has an effect on Trust.Word of Mouth has an effect on user attitudes.Word of Mouth has an effect on intention to continue using mobile banking. PurposeThe purpose of this paper is to explore word of mouth impact on the adoption of mobile banking in Iran. This study provides insights into factors affecting the adoption of mobile banking in Iran. Design/methodology/approachBased on the consumer data collected through a survey, structural equations modeling and path analysis were employed to test the research model. FindingsThe results revealed that Word of Mouth was found to be the main factor affecting users attitudes toward the use of mobile banking. Word of Mouth positive impact on other factors affecting the adoption of mobile banking was also approved. Research limitations/implicationsThe major limitations of the paper is that it studies only the Internet users and non-users are not considered. Originality/valueThere are a number of factors efficiently on the adoption of mobile banking. Many researchers worked on the relationship between these parameters and their effect on each them. However, none have paid attention to the word of mouth impact of the adoption of mobile banking. In this study, for the first time, the word of mouth factor impact on the adoption of mobile banking in Iran is considered as the main contribution of the paper.


annual acis international conference on computer and information science | 2008

A New Approach on Interactive SOA Security Model Based on Automata

Hamidreza Amouzegar; Shahriar Mohammadi; Mohammad Jafar Tarokh; Anahita Naghilouye Hidaji

Service oriented architecture is a new important approach for all electronic devices and applications such as e-payment systems. Statelessness of basic service architecture model is based on four principles: loose coupling, abstraction, autonomy, and security. Statelessness eliminates a lot of benefits in service providing. This paper presents automata-based model for interactive services and focuses on security for interactive SOA in state-full environments. The purpose of this paper is to propose a new extended solution for e-applications to communicate simpler while session management is been done by server helps the client to have better development and interaction.

Collaboration


Dive into the Shahriar Mohammadi's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Arash Barfar

University of South Florida

View shared research outputs
Top Co-Authors

Avatar

Zaki Malik

Wayne State University

View shared research outputs
Researchain Logo
Decentralizing Knowledge