 |
Damia , Amirhossein
Optimizing LSTM Networks with Genetic and Q-Learning Algorithms for Persian COVID-19 Fake News Detection [Volume 17, Number 2] |
 |
Khan Mohammadi , Erfaneh
Optimizing LSTM Networks with Genetic and Q-Learning Algorithms for Persian COVID-19 Fake News Detection [Volume 17, Number 2] |
 |
Yarahmadi, Mohamad
Optimizing LSTM Networks with Genetic and Q-Learning Algorithms for Persian COVID-19 Fake News Detection [Volume 17, Number 2] |
 |
Salehi, Mojtaba
Optimizing LSTM Networks with Genetic and Q-Learning Algorithms for Persian COVID-19 Fake News Detection [Volume 17, Number 2] |
 |
Khakzadi, Ali
Adaptive Portfolio Optimization with Multi-Agent Deep Reinforcement Learning and Short-Term Performance Analysis [Volume 17, Number 3] |
 |
Assadzadeh, Alireza
Adaptive Portfolio Optimization with Multi-Agent Deep Reinforcement Learning and Short-Term Performance Analysis [Volume 17, Number 3] |
 |
Bayani, Ali
Adaptive Portfolio Optimization with Multi-Agent Deep Reinforcement Learning and Short-Term Performance Analysis [Volume 17, Number 3] |
 |
Kargar, Masoud
Adaptive Portfolio Optimization with Multi-Agent Deep Reinforcement Learning and Short-Term Performance Analysis [Volume 17, Number 3] |
 |
Sharbaf Movassaghpour, Shahin
Adaptive Portfolio Optimization with Multi-Agent Deep Reinforcement Learning and Short-Term Performance Analysis [Volume 17, Number 3] |
 |
Moin, Mohammad-Shahram
Analysis and Evaluation of the Performance of Smart Wearable Systems Based on Internet of Things in the Healthcare Sector [Volume 17, Number 3] |
 |
Goodarzi, Marjan
Analysis and Evaluation of the Performance of Smart Wearable Systems Based on Internet of Things in the Healthcare Sector [Volume 17, Number 3] |
 |
Oveisi, ُShahrzad
Analysis and Evaluation of the Performance of Smart Wearable Systems Based on Internet of Things in the Healthcare Sector [Volume 17, Number 3] |
 |
Arab Sorkhi, Abouzar
An In-Depth Comparative Analysis of Fake News Detection Approaches in Social Media: Methodologies, Challenges, and Future Directions [Volume 17, Number 3] |
 |
Tafazzoli, Tala
An In-Depth Comparative Analysis of Fake News Detection Approaches in Social Media: Methodologies, Challenges, and Future Directions [Volume 17, Number 3] |
 |
Maghami, Mohammad Hossein
CNN Accelerator Adapted to Quasi Structured Pruning and Dense Mode [Volume 17, Number 3] |
 |
Amiri, Parviz
CNN Accelerator Adapted to Quasi Structured Pruning and Dense Mode [Volume 17, Number 3] |
 |
Sadough, Amirhossein
CNN Accelerator Adapted to Quasi Structured Pruning and Dense Mode [Volume 17, Number 3] |
 |
Gharaee, Hossein
CNN Accelerator Adapted to Quasi Structured Pruning and Dense Mode [Volume 17, Number 3] |
 |
Hajipour, Pedram
Increase the Life of the Wireless Sensor Network by using an Energy-Sensitive Threshold Cross-layer Model [Volume 17, Number 3] |
 |
Eslami, Mahdi
Increase the Life of the Wireless Sensor Network by using an Energy-Sensitive Threshold Cross-layer Model [Volume 17, Number 3] |
 |
Hamzeh Taleghani, Hamidreza
Increase the Life of the Wireless Sensor Network by using an Energy-Sensitive Threshold Cross-layer Model [Volume 17, Number 3] |
 |
Hosseini, Keyhan
Inverse Design of a Wide-Angle Wideband Programmable THz Reflectarray Through Generative Adversarial Networks [Volume 17, Number 3] |
 |
Yahaghi, Ali
Inverse Design of a Wide-Angle Wideband Programmable THz Reflectarray Through Generative Adversarial Networks [Volume 17, Number 3] |
 |
Khajeh, Ali
Inverse Design of a Wide-Angle Wideband Programmable THz Reflectarray Through Generative Adversarial Networks [Volume 17, Number 3] |
 |
Yousefi, Pezhman
Inverse Design of a Wide-Angle Wideband Programmable THz Reflectarray Through Generative Adversarial Networks [Volume 17, Number 3] |
 |
Alizadeh, Behrooz
Network Planning Policies for Joint Switching in Spectrally-Spatially Flexible Optical Networks [Volume 17, Number 4] |
 |
Ghaffarpour Rahbar, Akbar
Network Planning Policies for Joint Switching in Spectrally-Spatially Flexible Optical Networks [Volume 17, Number 4] |
 |
Yaghubi-Namaad, Mohsen
Network Planning Policies for Joint Switching in Spectrally-Spatially Flexible Optical Networks [Volume 17, Number 4] |
 |
Radfar, Reza
Classification of Exchange Rate Prediction Methods with a Focus on Deep Learning Techniques [Volume 17, Number 2] |
 |
Toloie Eshlaghy, Abbas
Classification of Exchange Rate Prediction Methods with a Focus on Deep Learning Techniques [Volume 17, Number 2] |
 |
Mortazavian Farsani, Seyed Jafar
Classification of Exchange Rate Prediction Methods with a Focus on Deep Learning Techniques [Volume 17, Number 2] |
 |
Mohtaj , Salar
Multi-type Obfuscation Corpus for CrossLingual Plagiarism Detection [Volume 17, Number 2] |
 |
Asghari, Habibollah
Multi-type Obfuscation Corpus for CrossLingual Plagiarism Detection [Volume 17, Number 2] |
 |
Mohtarami, Amir
Architectures for a Blockchain-based Decentralized Marketplace for Handicrafts [Volume 17, Number 2] |
 |
Ghasemi, Amin
Architectures for a Blockchain-based Decentralized Marketplace for Handicrafts [Volume 17, Number 2] |
 |
Yadegari , Amirmansour
Defending Against Adversarial Attacks in Artificial Intelligence Technologies [Volume 17, Number 2] |
 |
Karamizadeh , Sasan
Defending Against Adversarial Attacks in Artificial Intelligence Technologies [Volume 17, Number 2] |
 |
Sajjadi, Seyed Hadi
Defending Against Adversarial Attacks in Artificial Intelligence Technologies [Volume 17, Number 2] |
 |
Mohamed-pour, Kamal
Beamforming Design for Simultaneous Transmission and Reflection Reconfigurable Intelligent Surface Assisted Secure Wireless Communication by considering Imperfect CSI [Volume 17, Number 2] |
 |
Shahcheragh, Seyedeh Reyhane
Beamforming Design for Simultaneous Transmission and Reflection Reconfigurable Intelligent Surface Assisted Secure Wireless Communication by considering Imperfect CSI [Volume 17, Number 2] |
 |
Gharaee, Hossein
A Novel Framework for Cyber Situational Awareness at the National Level [Volume 17, Number 1] |
 |
Enayati, Alireza
A Novel Framework for Cyber Situational Awareness at the National Level [Volume 17, Number 1] |
 |
Imanimehr, Fatemeh
A Novel Framework for Cyber Situational Awareness at the National Level [Volume 17, Number 1] |
 |
Aghazarian, Vahe
HHMap: A Novel Task Mapping for Heterogeneous & Homogeneous 3D NoCs with the Objective of Improving Energy Consumption [Volume 17, Number 1] |
 |
Rezaie, Oldooz
HHMap: A Novel Task Mapping for Heterogeneous & Homogeneous 3D NoCs with the Objective of Improving Energy Consumption [Volume 17, Number 1] |
 |
Mansouri, Alireza
A Novel Method for Measuring Banking Data Analysis Maturity Level: A Case Study [Volume 17, Number 1] |
 |
Mirzaei, Sahar
A Novel Method for Measuring Banking Data Analysis Maturity Level: A Case Study [Volume 17, Number 1] |
 |
Askarai, Elham
Automatic License Plate Recognition using the Deep Learning Networks [Volume 17, Number 1] |
 |
Motamed, Sara
Automatic License Plate Recognition using the Deep Learning Networks [Volume 17, Number 1] |
 |
Rabiei, mohammad
Extractive Text Summarization in Persian Language through Integrative Approaches [Volume 17, Number 1] |
 |
Razavizadeh, S. Mohammad
Securing RIS-aided Wireless Networks Against Full Duplex Active Eavesdropping [Volume 17, Number 1] |
 |
Zakeri, Atefeh
Securing RIS-aided Wireless Networks Against Full Duplex Active Eavesdropping [Volume 17, Number 1] |
 |
Moeini, Ali
A Hybrid Model for Evaluation of E-Learning User Satisfaction with TAM and ELQ Approach [Volume 16, Number 2] |
 |
Sabzian, Azin
A Hybrid Model for Evaluation of E-Learning User Satisfaction with TAM and ELQ Approach [Volume 16, Number 2] |
 |
Sayardoost Tabrizi, Sina
A Hybrid Model for Evaluation of E-Learning User Satisfaction with TAM and ELQ Approach [Volume 16, Number 2] |
 |
Jafari Farsani, Nasim
A Dynamic Hybrid Precoding Structure for mmWave Massive MIMO Systems [Volume 16, Number 1] |
 |
Mohamed-pour, Kamal
A Dynamic Hybrid Precoding Structure for mmWave Massive MIMO Systems [Volume 16, Number 1] |
 |
Moradi, Amirreza
A Dynamic Hybrid Precoding Structure for mmWave Massive MIMO Systems [Volume 16, Number 1] |
 |
Mansouri , Alireza
Performance Evaluation of Internet Domain Ranking Methodologies [Volume 16, Number 4] |
 |
Maleki, Davood
Performance Evaluation of Internet Domain Ranking Methodologies [Volume 16, Number 4] |
 |
Goudarzi, Pejman
Performance Evaluation of Internet Domain Ranking Methodologies [Volume 16, Number 4] |
 |
Hajipour, Pedram
Joint Use of RSA and Genetic Algorithm to Improve the Process of Image Encryption and Information Hiding [Volume 16, Number 4] |
 |
Mirzaei, Mohammad
Joint Use of RSA and Genetic Algorithm to Improve the Process of Image Encryption and Information Hiding [Volume 16, Number 4] |
 |
Biglou, Ramin
Joint Use of RSA and Genetic Algorithm to Improve the Process of Image Encryption and Information Hiding [Volume 16, Number 4] |
 |
Hakamizadeh, Farshad
Digital Transformation Research: Identifying The Elements Influencing Digital Transformation at the National Level [Volume 16, Number 4] |
 |
Farazmand, Atefeh
Digital Transformation Research: Identifying The Elements Influencing Digital Transformation at the National Level [Volume 16, Number 4] |
 |
Alipour, Seyyed Mohammadhossein
Digital Transformation Research: Identifying The Elements Influencing Digital Transformation at the National Level [Volume 16, Number 4] |
 |
Mirsarraf, Seyed Mohammadreza
Persian Rumor Detection Using a MultiClassifier Fusion Approach [Volume 16, Number 4] |
 |
Farhoodi, Mojgan
Persian Rumor Detection Using a MultiClassifier Fusion Approach [Volume 16, Number 4] |
 |
Mahmoudi, Maryam
Persian Rumor Detection Using a MultiClassifier Fusion Approach [Volume 16, Number 4] |
 |
Mansouri, Alireza
Persian Rumor Detection Using a MultiClassifier Fusion Approach [Volume 16, Number 4] |
 |
Erfani Majd , Nasser
The combination of machine learning methods for intrusion detection system in the Internet of Things (IoT) [Volume 16, Number 4] |
 |
Nataj Solhdar, Mohammad Hassan
The combination of machine learning methods for intrusion detection system in the Internet of Things (IoT) [Volume 16, Number 4] |
 |
Reza, Akram
FUCA: a Frame to Prevent the Generation of Useless results in the Dataflows Based on Cartesian Product for Convolutional Neural Network Accelerators [Volume 16, Number 4] |
 |
Khademzadeh, Ahmad
FUCA: a Frame to Prevent the Generation of Useless results in the Dataflows Based on Cartesian Product for Convolutional Neural Network Accelerators [Volume 16, Number 4] |
 |
NarimanJahan, Babak
FUCA: a Frame to Prevent the Generation of Useless results in the Dataflows Based on Cartesian Product for Convolutional Neural Network Accelerators [Volume 16, Number 4] |
 |
Koochari, Abbas
Investigating Sentiment Analysis of News in Stock Market Prediction Utilizing Machine Learning Technique [Volume 16, Number 3] |
 |
Alizadeh, Sasan H
Investigating Sentiment Analysis of News in Stock Market Prediction Utilizing Machine Learning Technique [Volume 16, Number 3] |
 |
Moin, Mohammad-Shahram
Investigating Sentiment Analysis of News in Stock Market Prediction Utilizing Machine Learning Technique [Volume 16, Number 3] |
 |
Ranjbaran, Golshid
Investigating Sentiment Analysis of News in Stock Market Prediction Utilizing Machine Learning Technique [Volume 16, Number 3] |
 |
Kojouri, Sara
A Deep Learning Approach for Sarcasm Detection on Twitter [Volume 16, Number 3] |
 |
Shayegan, Mohammad Javad
A Deep Learning Approach for Sarcasm Detection on Twitter [Volume 16, Number 3] |
 |
Mahdavi Mortazavi, Morteza
EmoRecBiGRU: Emotion Recognition in Persian Tweets with a Transformer-based Model, Enhanced by Bidirectional GRU [Volume 16, Number 3] |
 |
Shamsfard, Mehrnoush
EmoRecBiGRU: Emotion Recognition in Persian Tweets with a Transformer-based Model, Enhanced by Bidirectional GRU [Volume 16, Number 3] |
 |
Sarlakifar, Faezeh
EmoRecBiGRU: Emotion Recognition in Persian Tweets with a Transformer-based Model, Enhanced by Bidirectional GRU [Volume 16, Number 3] |
 |
Farhoodi, Mojgan
Claim Detection in Persian Twitter Posts [Volume 16, Number 3] |
 |
Davoudi Shamsi, Mona
Claim Detection in Persian Twitter Posts [Volume 16, Number 3] |
 |
Nassajian, Minoo
Claim Detection in Persian Twitter Posts [Volume 16, Number 3] |
 |
Bokaei, Mohammad Hadi
Claim Detection in Persian Twitter Posts [Volume 16, Number 3] |
 |
Farhoodi, Mojgan
An Improvement in Transformer-Based Sentiment Analysis in Persian Twitter [Volume 16, Number 3] |
 |
Yazdani, Ali
An Improvement in Transformer-Based Sentiment Analysis in Persian Twitter [Volume 16, Number 3] |
 |
Heydari, Hadi
An Improvement in Transformer-Based Sentiment Analysis in Persian Twitter [Volume 16, Number 3] |
 |
Zeinali, Hossein
A Comparative Study of BERT-X for Sentiment Analysis and Stance Detection in Persian Social Media [Volume 16, Number 3] |
 |
Mazochi, Alireza
A Comparative Study of BERT-X for Sentiment Analysis and Stance Detection in Persian Social Media [Volume 16, Number 3] |
 |
Sobhi, Mohamad
A Comparative Study of BERT-X for Sentiment Analysis and Stance Detection in Persian Social Media [Volume 16, Number 3] |
 |
Bokaei , Mohammad Hadi
ParsiAzma Challenges on Persian Text Analysis in Social Media [Volume 16, Number 3] |
 |
Mahmoudi, Maryam
ParsiAzma Challenges on Persian Text Analysis in Social Media [Volume 16, Number 3] |
 |
Farhoodi, Mojgan
ParsiAzma Challenges on Persian Text Analysis in Social Media [Volume 16, Number 3] |
 |
Beheshtifard, Ziaeddin
Image Retrieval with Missing Regions by Reconstructing and Concatenating Content and Semantic Features [Volume 16, Number 2] |
 |
Rahbar, Kambiz
Image Retrieval with Missing Regions by Reconstructing and Concatenating Content and Semantic Features [Volume 16, Number 2] |
 |
Taheri, Fatemeh
Image Retrieval with Missing Regions by Reconstructing and Concatenating Content and Semantic Features [Volume 16, Number 2] |
 |
Milani Fard, Amin
Deep Reinforcement Learning-based Exploration of Web Applications [Volume 16, Number 2] |
 |
Jahangard Rafsanjani, Amir
Deep Reinforcement Learning-based Exploration of Web Applications [Volume 16, Number 2] |
 |
Abbasnezhad, Mohammadreza
Deep Reinforcement Learning-based Exploration of Web Applications [Volume 16, Number 2] |
 |
Vafadoost, Peyman
An Overview of Secure Communications for the Internet of Things [Volume 16, Number 2] |
 |
Zoljalali Moghaddam, Seyed Ali
An Overview of Secure Communications for the Internet of Things [Volume 16, Number 2] |
 |
Mazoochi, Mojtaba
A Routing Method in Smart Cities Based on Destination Type and Network Traffic Flow [Volume 16, Number 2] |
 |
Moradi, Mohammad
A Routing Method in Smart Cities Based on Destination Type and Network Traffic Flow [Volume 16, Number 2] |
 |
Ardebilipour, Mehrdad
Optimal Power Allocation Strategy for a D2D Network based Safety-Critical V2X Communication with Partial CSI [Volume 16, Number 2] |
 |
Zeraatkar Moghaddam, Javad
Optimal Power Allocation Strategy for a D2D Network based Safety-Critical V2X Communication with Partial CSI [Volume 16, Number 2] |
 |
Arezoomand, Masoud
Design and Calibration of E-Field Probe for Multi Cellular Technology Frequency Bands (2G, 3G,4G) [Volume 15, Number 4] |
 |
Maddah hosseini, Seyed hashem
Design and Calibration of E-Field Probe for Multi Cellular Technology Frequency Bands (2G, 3G,4G) [Volume 15, Number 4] |
 |
Skandari, Ahmadreza
Design and Calibration of E-Field Probe for Multi Cellular Technology Frequency Bands (2G, 3G,4G) [Volume 15, Number 4] |
 |
Bahri, Reza
Design and Calibration of E-Field Probe for Multi Cellular Technology Frequency Bands (2G, 3G,4G) [Volume 15, Number 4] |
 |
Kheirdoost, Ali
Mathematical Formulation and Experimental Evaluation of Efficient 8-Way Microwave Radial Power Combiner for High Power Applications [Volume 15, Number 4] |
 |
Ahmadi, Behzad
Mathematical Formulation and Experimental Evaluation of Efficient 8-Way Microwave Radial Power Combiner for High Power Applications [Volume 15, Number 4] |
 |
Esnaashari, Mehdi
An Efficient Application Deployment in Fog [Volume 15, Number 3] |
 |
Jafarali Jassbi, Somayyeh
An Efficient Application Deployment in Fog [Volume 15, Number 3] |
 |
Rezaee, Ali
An Efficient Application Deployment in Fog [Volume 15, Number 3] |
 |
Azimzadeh, Masomeh
An Efficient Application Deployment in Fog [Volume 15, Number 3] |
 |
Mohammadi, Shahram
Hyperspectral Image Super Resolution Using Anomaly Weighted Gabor Based CNN [Volume 15, Number 2] |
 |
Imani, Maryam
Hyperspectral Image Super Resolution Using Anomaly Weighted Gabor Based CNN [Volume 15, Number 2] |
 |
Farajzadeh, Ali
Hyperspectral Image Super Resolution Using Anomaly Weighted Gabor Based CNN [Volume 15, Number 2] |
 |
Sadeghinia , Mohammad
Identify the Subject and Content of Tweets on Twitter Using Multilayer Neural Network Method and Random Graphs [Volume 15, Number 1] |
 |
Gerami , Mohsen
Identify the Subject and Content of Tweets on Twitter Using Multilayer Neural Network Method and Random Graphs [Volume 15, Number 1] |
 |
Yazdanian, Vahid
Identify the Subject and Content of Tweets on Twitter Using Multilayer Neural Network Method and Random Graphs [Volume 15, Number 1] |
 |
Motadel, Mohamadreza
The Effect of Data Augmentation Techniques on Persian Stance Detection [Volume 15, Number 1] |
 |
Toloie Eshlaghi, Abbas
The Effect of Data Augmentation Techniques on Persian Stance Detection [Volume 15, Number 1] |
 |
Farhoodi, Mojgan
The Effect of Data Augmentation Techniques on Persian Stance Detection [Volume 15, Number 1] |
 |
Asadpour, Masoud
Recognizing Personality Traits using Twitter & Facebook for Arabic Speaking Users in Lebanon [Volume 15, Number 1] |
 |
Dandash, Mokhaiber
Recognizing Personality Traits using Twitter & Facebook for Arabic Speaking Users in Lebanon [Volume 15, Number 1] |
 |
Rabiei, Leila
Identifying Persian bots on Twitter; which feature is more important: Account Information or Tweet Contents? [Volume 15, Number 1] |
 |
Rahmani, Farzaneh
Identifying Persian bots on Twitter; which feature is more important: Account Information or Tweet Contents? [Volume 15, Number 1] |
 |
Asadi, Nasrin
Identifying Persian bots on Twitter; which feature is more important: Account Information or Tweet Contents? [Volume 15, Number 1] |
 |
Mazoochi, Mojtaba
Identifying Persian bots on Twitter; which feature is more important: Account Information or Tweet Contents? [Volume 15, Number 1] |
 |
Hashembigi, Fatemeh
Introduce an Enhanced Hospital Information System Reference Architecture with ATAM Evaluation [Volume 16, Number 1] |
 |
Asosheh, Abbas
Introduce an Enhanced Hospital Information System Reference Architecture with ATAM Evaluation [Volume 16, Number 1] |
 |
Moshiri, Fatemeh
Introduce an Enhanced Hospital Information System Reference Architecture with ATAM Evaluation [Volume 16, Number 1] |
 |
Salehi Chegani, Reza
An Optimized Deep Model for Bi-lingual Sentiment Analysis of Medical User Reviews [Volume 16, Number 1] |
 |
Nemati, Shahla
An Optimized Deep Model for Bi-lingual Sentiment Analysis of Medical User Reviews [Volume 16, Number 1] |
 |
Morsali, Fatemeh
Software Re-Modularization Method Based on Many-Objective Function [Volume 16, Number 1] |
 |
Karimi Zandian, Zahra
Software Re-Modularization Method Based on Many-Objective Function [Volume 16, Number 1] |
 |
Keyvanpour, Mohammad Reza
Software Re-Modularization Method Based on Many-Objective Function [Volume 16, Number 1] |
 |
Moattar, Seyed Mohammad Hossein
Reducing The Computational Complexity of Fuzzy Identity-Based Encryption from Lattice [Volume 16, Number 1] |
 |
Jabbehdari, Sam
Reducing The Computational Complexity of Fuzzy Identity-Based Encryption from Lattice [Volume 16, Number 1] |
 |
Haj Seyyed Javadi, Hamid
Reducing The Computational Complexity of Fuzzy Identity-Based Encryption from Lattice [Volume 16, Number 1] |
 |
Khajouei-Nejad, Sedigheh
Reducing The Computational Complexity of Fuzzy Identity-Based Encryption from Lattice [Volume 16, Number 1] |
 |
Bushehrian, Omid
Energy Efficient Distributed Anomaly Detection using Semi-Supervised Models in IoT [Volume 16, Number 1] |
 |
Shabani, Mostafa
Energy Efficient Distributed Anomaly Detection using Semi-Supervised Models in IoT [Volume 16, Number 1] |
 |
Broumandnia, Ali
Resource Allocation optimization in fog Architecture Based Software-Defined Networks [Volume 15, Number 4] |
 |
Rahmani, Amir Masoud
Resource Allocation optimization in fog Architecture Based Software-Defined Networks [Volume 15, Number 4] |
 |
Khadem Zadeh, Ahmad
Resource Allocation optimization in fog Architecture Based Software-Defined Networks [Volume 15, Number 4] |
 |
sheikhi nejad, sepideh
Resource Allocation optimization in fog Architecture Based Software-Defined Networks [Volume 15, Number 4] |
 |
Rezaei, Fatemeh
Improving the Security of Management Software of Smart Meters Networks [Volume 15, Number 4] |
 |
Mirsharifi, Mahdiyehsadat
Improving the Security of Management Software of Smart Meters Networks [Volume 15, Number 4] |
 |
Nejati, Payam
Facial Expression Recognition Based on Separable Convolution Network and Attention Mechanism [Volume 15, Number 4] |
 |
Farrokhi Afsharyan, Mostafa
Facial Expression Recognition Based on Separable Convolution Network and Attention Mechanism [Volume 15, Number 4] |
 |
Khani Yengikand, Amir
Facial Expression Recognition Based on Separable Convolution Network and Attention Mechanism [Volume 15, Number 4] |
 |
Yazdani, Naser
Network Slicing on 3GPP 5G System Architecture; An End to End Approach [Volume 15, Number 4] |
 |
Bayat Mokhtari, Mohamad Ali
Network Slicing on 3GPP 5G System Architecture; An End to End Approach [Volume 15, Number 4] |
 |
Seyedin, Sanaz
NMF-based Improvement of DNN and LSTM Pre-Training for Speech Enhancemet [Volume 15, Number 3] |
 |
Safari Dehnavi, Razieh
NMF-based Improvement of DNN and LSTM Pre-Training for Speech Enhancemet [Volume 15, Number 3] |
 |
Siadat, Safieh
A New Framework Based on The Internet of Things to Improve the Quality of Education by Detection of Student Stress [Volume 15, Number 3] |
 |
Tajfar, Amir Houshang
A New Framework Based on The Internet of Things to Improve the Quality of Education by Detection of Student Stress [Volume 15, Number 3] |
 |
Montazer, Gholam Ali
Using Blockchain to Improve the Security Of The X3DH Key Exchange Protocol [Volume 15, Number 3] |
 |
Chaharsooghi, Kamal
Using Blockchain to Improve the Security Of The X3DH Key Exchange Protocol [Volume 15, Number 3] |
 |
Mousavi, Sayed Javad
Using Blockchain to Improve the Security Of The X3DH Key Exchange Protocol [Volume 15, Number 3] |
 |
Moradi, Gholamreza
Material Characterization Innovations in Microwave Measurement Laboratory of Amirkabir University of Technology [Volume 15, Number 3] |
 |
Niksefat, Salman
Impact Assessment for Cyber Security Situation Awareness [Volume 15, Number 3] |
 |
Sadeghiyan , Babak
Impact Assessment for Cyber Security Situation Awareness [Volume 15, Number 3] |
 |
Dehghan, Motahareh
Impact Assessment for Cyber Security Situation Awareness [Volume 15, Number 3] |
 |
FarahaniNia , Sina
Impact Assessment for Cyber Security Situation Awareness [Volume 15, Number 3] |
 |
Seyedin, Sanaz
ChatParse: A New Application for Persian Bourse Chatbot [Volume 15, Number 2] |
 |
Shahedi, Ali
ChatParse: A New Application for Persian Bourse Chatbot [Volume 15, Number 2] |
 |
Shahverdi , Hossein
Convolutional Neural Network Based Human Activity Recognition using CSI [Volume 15, Number 2] |
 |
Ghorashi , Seyed Ali
Convolutional Neural Network Based Human Activity Recognition using CSI [Volume 15, Number 2] |
 |
Shahbazian, Reza
Convolutional Neural Network Based Human Activity Recognition using CSI [Volume 15, Number 2] |
 |
Asvadi , Reza
Convolutional Neural Network Based Human Activity Recognition using CSI [Volume 15, Number 2] |
 |
Fard Moshiri, Parisa
Convolutional Neural Network Based Human Activity Recognition using CSI [Volume 15, Number 2] |
 |
Raiesdana , Somayeh
Arabic Handwritten Recognition Using Hybrid CNN, HMM and an Intelligent Network Based on Dentate Gyrus of the Brain [Volume 15, Number 2] |
 |
Bastanfard , Azam
Arabic Handwritten Recognition Using Hybrid CNN, HMM and an Intelligent Network Based on Dentate Gyrus of the Brain [Volume 15, Number 2] |
 |
Teshnehlab, Mohammad
Arabic Handwritten Recognition Using Hybrid CNN, HMM and an Intelligent Network Based on Dentate Gyrus of the Brain [Volume 15, Number 2] |
 |
Modhej , Nazal
Arabic Handwritten Recognition Using Hybrid CNN, HMM and an Intelligent Network Based on Dentate Gyrus of the Brain [Volume 15, Number 2] |
 |
Barangi, Reza
A Partial Method for Calculating CNN Networks Based On Loop Tiling [Volume 15, Number 2] |
 |
Fathy, Mahmood
A Partial Method for Calculating CNN Networks Based On Loop Tiling [Volume 15, Number 2] |
 |
Beitollahi, Hakem
A Partial Method for Calculating CNN Networks Based On Loop Tiling [Volume 15, Number 2] |
 |
Ali A.D. Farahani, Ali
A Partial Method for Calculating CNN Networks Based On Loop Tiling [Volume 15, Number 2] |
 |
Khodadadi, HamidReza
Transmitted Data Security in Non-Orthogonal Multiple Access Networks with Directional Modulation Based on User Location [Volume 15, Number 2] |
 |
Falsafi, Sepahdar
Transmitted Data Security in Non-Orthogonal Multiple Access Networks with Directional Modulation Based on User Location [Volume 15, Number 2] |
 |
Mobini, Zahra
Spectral and Energy Efficiency WirelessPowered Massive-MIMO Heterogeneous
Network [Volume 14, Number 1] |
 |
Mohammadi, Mohammadali
Spectral and Energy Efficiency WirelessPowered Massive-MIMO Heterogeneous
Network [Volume 14, Number 1] |
 |
Haghgoy, Sepideh
Spectral and Energy Efficiency WirelessPowered Massive-MIMO Heterogeneous
Network [Volume 14, Number 1] |
 |
Keyvanpour, Mohammad Reza
Comparative Analytical Survey on SBST Challenges from the Perspective of the Test Techniques [Volume 14, Number 2] |
 |
Kashefi Gargari , Sepideh
Comparative Analytical Survey on SBST Challenges from the Perspective of the Test Techniques [Volume 14, Number 2] |
 |
Gharaee Garakani, Hossein
A Review on Internet Traffic Classification Based on Artificial Intelligence Techniques [Volume 14, Number 2] |
 |
Naderi, Shaghayegh
A Review on Internet Traffic Classification Based on Artificial Intelligence Techniques [Volume 14, Number 2] |
 |
Malek, Mohammad Pooya
A Review on Internet Traffic Classification Based on Artificial Intelligence Techniques [Volume 14, Number 2] |
 |
Akhavan-Safar, Mostafa
cMaxDriver: A Centrality Maximization Intersection Approach for Prediction of Cancer-Causing Genes in the Transcriptional Regulatory Network [Volume 14, Number 1] |
 |
Teimourpour, Babak
cMaxDriver: A Centrality Maximization Intersection Approach for Prediction of Cancer-Causing Genes in the Transcriptional Regulatory Network [Volume 14, Number 1] |
 |
Lashgari, Sajedeh
cMaxDriver: A Centrality Maximization Intersection Approach for Prediction of Cancer-Causing Genes in the Transcriptional Regulatory Network [Volume 14, Number 1] |
 |
Navidi , Hamidreza
A Novel Strategy-Proof Auction Mechanism for Hybrid Spectrum Allocation [Volume 6, Number 2] |
 |
Bakhshi , Hamidreza
A Novel Strategy-Proof Auction Mechanism for Hybrid Spectrum Allocation [Volume 6, Number 2] |
 |
Pourmina , Mohammad Ali
A Novel Strategy-Proof Auction Mechanism for Hybrid Spectrum Allocation [Volume 6, Number 2] |
 |
Mazoochi , Mojtaba
A Novel Strategy-Proof Auction Mechanism for Hybrid Spectrum Allocation [Volume 6, Number 2] |
 |
Rahmani, Farzaneh
A New Framework for Discovering Important Posts and Influential Users in Social Networks [Volume 11, Number 4] |
 |
Mazoochi, Mojtaba
A New Framework for Discovering Important Posts and Influential Users in Social Networks [Volume 11, Number 4] |
 |
Rabiei, Leila
A New Framework for Discovering Important Posts and Influential Users in Social Networks [Volume 11, Number 4] |
 |
Bagheri, Maryam
Web Domains Ranking with Real User Traffic Based on the Big Data Platform [Volume 12, Number 1] |
 |
Mazoochi, Mojtaba
Web Domains Ranking with Real User Traffic Based on the Big Data Platform [Volume 12, Number 1] |
 |
Rabiei, Leila
Web Domains Ranking with Real User Traffic Based on the Big Data Platform [Volume 12, Number 1] |
 |
Shirali-Shahreza, Mohammad Hasan
Humor Detection in Persian: A Transformers-Based Approach [Volume 15, Number 1] |
 |
Najafi-Lapavandani, Fateme
Humor Detection in Persian: A Transformers-Based Approach [Volume 15, Number 1] |
 |
Amin Mousavi, Seyed Abdollah
A New Fuzzy Convolutional Neural Network for Face Recognition to Classify Authorized and Unauthorized Persons [Volume 15, Number 1] |
 |
Radfar, Reza
A New Fuzzy Convolutional Neural Network for Face Recognition to Classify Authorized and Unauthorized Persons [Volume 15, Number 1] |
 |
Afshar Kazemi, Mohammad Ali
A New Fuzzy Convolutional Neural Network for Face Recognition to Classify Authorized and Unauthorized Persons [Volume 15, Number 1] |
 |
Navid Mahmoudabadi, Navid
A New Fuzzy Convolutional Neural Network for Face Recognition to Classify Authorized and Unauthorized Persons [Volume 15, Number 1] |
 |
Khademzadeh, Ahmad
Selfish Node Detection Based on GA and Learning Automata in IoT [Volume 15, Number 1] |
 |
Gharaee, Hossein
Selfish Node Detection Based on GA and Learning Automata in IoT [Volume 15, Number 1] |
 |
Nopahari, Solmaz
Selfish Node Detection Based on GA and Learning Automata in IoT [Volume 15, Number 1] |
 |
Davoudi, Mona
Stance Detection Dataset for Persian Tweets [Volume 14, Number 4] |
 |
Farhoodi, Mojgan
Stance Detection Dataset for Persian Tweets [Volume 14, Number 4] |
 |
Bokaei, Mohammad Hadi
Stance Detection Dataset for Persian Tweets [Volume 14, Number 4] |
 |
Imani , Maryam
Spectrum Similarity-Based Quality Assessment Metric [Volume 14, Number 4] |
 |
Ghassemian, Hassan
Spectrum Similarity-Based Quality Assessment Metric [Volume 14, Number 4] |
 |
Aghapour Maleki, Shiva
Spectrum Similarity-Based Quality Assessment Metric [Volume 14, Number 4] |
 |
Rahbar, Kambiz
Digital Image Enhancement Through Bi-Histogram Equalization Using Entropy-Based Plateau Limit [Volume 14, Number 4] |
 |
Safardoulabi, Vida
Digital Image Enhancement Through Bi-Histogram Equalization Using Entropy-Based Plateau Limit [Volume 14, Number 4] |
 |
Maleki, Davood
Collaborative Mappers based on Co-evolutionary Optimization Technique in MapReduce [Volume 14, Number 4] |
 |
Ahmadi, Mohammad Reza
Collaborative Mappers based on Co-evolutionary Optimization Technique in MapReduce [Volume 14, Number 4] |
 |
Isvandi, Maryam
Providing a Solution to Reduce Energy Consumption in IoT-Based WSNs Based on Node Activity Management [Volume 14, Number 4] |
 |
Ardebilipour, Mehrdad
Resource Management for a Multi-Channel Cognitive-NOMA D2D Network [Volume 14, Number 4] |
 |
Zeraatkar Moghaddam, Javad
Resource Management for a Multi-Channel Cognitive-NOMA D2D Network [Volume 14, Number 4] |
 |
Hourali, Mansoureh
Improving Content-Based Recommender System For Clustering Documents Based on Ontology And New Hierarchical Clustering Method [Volume 14, Number 3] |
 |
Hourali, Maryam
Improving Content-Based Recommender System For Clustering Documents Based on Ontology And New Hierarchical Clustering Method [Volume 14, Number 3] |
 |
Attarzadeh, Iman
Ransomware Modeling Based on a Process Mining Approach [Volume 14, Number 3] |
 |
Aghamohammadpour, Ali
Ransomware Modeling Based on a Process Mining Approach [Volume 14, Number 3] |
 |
Mahdipour, Ebrahim
Ransomware Modeling Based on a Process Mining Approach [Volume 14, Number 3] |
 |
Imani, Nima
Energy Efficient Power Allocation in MIMO-NOMA Systems with ZF Precoding Using Cell Division Technique [Volume 14, Number 3] |
 |
Nangir, Mahdi
Energy Efficient Power Allocation in MIMO-NOMA Systems with ZF Precoding Using Cell Division Technique [Volume 14, Number 3] |
 |
Sakhaei Gharagezlou, Abdolrasoul
Energy Efficient Power Allocation in MIMO-NOMA Systems with ZF Precoding Using Cell Division Technique [Volume 14, Number 3] |
 |
Roghieh Karimzadeh Baee, Roghieh
FDR Adjustment for Achieving Desired Minimum Distance of Marine ESIM from the Shore [Volume 14, Number 3] |
 |
Shahidzadeh , Saber
FDR Adjustment for Achieving Desired Minimum Distance of Marine ESIM from the Shore [Volume 14, Number 3] |
 |
Hajipour, Pedram
FDR Adjustment for Achieving Desired Minimum Distance of Marine ESIM from the Shore [Volume 14, Number 3] |
 |
Doost, Roghayeh
FDR Adjustment for Achieving Desired Minimum Distance of Marine ESIM from the Shore [Volume 14, Number 3] |
 |
Hatami, Mojtaba
The Eficient Alignment of Long DNA Sequences Using Divide and Conquer Approach [Volume 14, Number 3] |
 |
Behkmal, Behshid
The Eficient Alignment of Long DNA Sequences Using Divide and Conquer Approach [Volume 14, Number 3] |
 |
Babaei , Samira
The Eficient Alignment of Long DNA Sequences Using Divide and Conquer Approach [Volume 14, Number 3] |
 |
Naghibzadeh, Mahmoud
The Eficient Alignment of Long DNA Sequences Using Divide and Conquer Approach [Volume 14, Number 3] |
 |
Abdollahpouri, Alireza
DSMN: A New Approach for Link Prediction in Multilplex Networks [Volume 14, Number 3] |
 |
Samira Rafiee, Samira Rafiee
DSMN: A New Approach for Link Prediction in Multilplex Networks [Volume 14, Number 3] |
 |
Mahdipour, Ebrahim
An Inferential Naivety Model for Agents’ Learning in Social Networks [Volume 13, Number 3] |
 |
Setayeshi, Saeed
An Inferential Naivety Model for Agents’ Learning in Social Networks [Volume 13, Number 3] |
 |
Rezaei, Zeinab
An Inferential Naivety Model for Agents’ Learning in Social Networks [Volume 13, Number 3] |
 |
Hashemi, Ali
A Graph-Based Content Similarity Approach for User Recommendation in Telegram [Volume 13, Number 3] |
 |
Zare Chahooki, Zare Chahooki
A Graph-Based Content Similarity Approach for User Recommendation in Telegram [Volume 13, Number 3] |
 |
Karimpour , Davod
A Graph-Based Content Similarity Approach for User Recommendation in Telegram [Volume 13, Number 3] |
 |
Nataj Solhdar, Mohammad Hassan
A Feature Selection Method Base on Fisher Score for Detecting SVM-Based Network Intrusions [Volume 13, Number 3] |
 |
Abazari , Farzaneh
Security Enhancement in Open-Source Healthcare Developer Network using Graph Theory [Volume 13, Number 3] |
 |
Pouladi , Farhad
Security Enhancement in Open-Source Healthcare Developer Network using Graph Theory [Volume 13, Number 3] |
 |
Sadat Cheraghchi, Hamideh
Security Enhancement in Open-Source Healthcare Developer Network using Graph Theory [Volume 13, Number 3] |
 |
Fasanghari, Mehdi
Security Enhancement in Open-Source Healthcare Developer Network using Graph Theory [Volume 13, Number 3] |
 |
Bushehrian, Omid
Anomaly Detection in Non-Stationary Water Distribution Grids Using Fog Computing Architecture [Volume 13, Number 3] |
 |
AvazAghaei, Mohammad Reza
Anomaly Detection in Non-Stationary Water Distribution Grids Using Fog Computing Architecture [Volume 13, Number 3] |
 |
Mirzaie, Sara
Anomaly Detection in Non-Stationary Water Distribution Grids Using Fog Computing Architecture [Volume 13, Number 3] |
 |
Mansoor, Wathiq
Large-Scale Twitter Mining for Extracting the Psychological Impacts of COVID-19 [Volume 14, Number 2] |
 |
Hajiabadi, Hamideh
Large-Scale Twitter Mining for Extracting the Psychological Impacts of COVID-19 [Volume 14, Number 2] |
 |
Mosafer, Reyhane
Large-Scale Twitter Mining for Extracting the Psychological Impacts of COVID-19 [Volume 14, Number 2] |
 |
Jamalian, Mohadese
Large-Scale Twitter Mining for Extracting the Psychological Impacts of COVID-19 [Volume 14, Number 2] |
 |
Abbasi, Sajedeh
Large-Scale Twitter Mining for Extracting the Psychological Impacts of COVID-19 [Volume 14, Number 2] |
 |
Salmani, Fatemeh
Large-Scale Twitter Mining for Extracting the Psychological Impacts of COVID-19 [Volume 14, Number 2] |
 |
Hajiabadi, Mahdi
Large-Scale Twitter Mining for Extracting the Psychological Impacts of COVID-19 [Volume 14, Number 2] |
 |
Azizi, Faezeh
Large-Scale Twitter Mining for Extracting the Psychological Impacts of COVID-19 [Volume 14, Number 2] |
 |
Vahdat-Nejad, Hamed
Large-Scale Twitter Mining for Extracting the Psychological Impacts of COVID-19 [Volume 14, Number 2] |
 |
Albadvi, Amir
Implementing Process Mining Techniques to Analyze Performance in EPC Companies [Volume 14, Number 2] |
 |
Teimourpour, Babak
Implementing Process Mining Techniques to Analyze Performance in EPC Companies [Volume 14, Number 2] |
 |
Aghdasi, Mohammad
Implementing Process Mining Techniques to Analyze Performance in EPC Companies [Volume 14, Number 2] |
 |
Hosseini, Seyedeh Motahareh
Implementing Process Mining Techniques to Analyze Performance in EPC Companies [Volume 14, Number 2] |
 |
Sadat Cheraghchi, Hamideh
Clustering Large-Scale Data using an Incremental Heap Self-Organizing Map [Volume 14, Number 2] |
 |
Bahrami, Helena
Clustering Large-Scale Data using an Incremental Heap Self-Organizing Map [Volume 14, Number 2] |
 |
Fasanghari , Mehdi
Clustering Large-Scale Data using an Incremental Heap Self-Organizing Map [Volume 14, Number 2] |
 |
Monshizadeh Naeen, Hossein
Cost Reduction Using SLA-Aware Genetic Algorithm for Consolidation of Virtual Machines in Cloud Data Centers [Volume 14, Number 2] |
 |
Gelbukh, Alexander
Personality-Based Matrix Factorization for Personalization in Recommender Systems [Volume 14, Number 1] |
 |
Tohidi, Nasim
Personality-Based Matrix Factorization for Personalization in Recommender Systems [Volume 14, Number 1] |
 |
Dadkhah, Chitra
Personality-Based Matrix Factorization for Personalization in Recommender Systems [Volume 14, Number 1] |
 |
Ghezelji, Mazyar
Personality-Based Matrix Factorization for Personalization in Recommender Systems [Volume 14, Number 1] |
 |
Keyvanpour, Mohammad Reza
A Community-Based Method for Identifying Influential Nodes Using Network Embedding [Volume 14, Number 1] |
 |
Vafaei, Narges
A Community-Based Method for Identifying Influential Nodes Using Network Embedding [Volume 14, Number 1] |
 |
Rahmani , Amir Masoud
Toward a Versatile IoT Communication Infrastructure [Volume 14, Number 1] |
 |
Khademzadeh, Ahmad
Toward a Versatile IoT Communication Infrastructure [Volume 14, Number 1] |
 |
Mousavi, Seyed Mehdi
Toward a Versatile IoT Communication Infrastructure [Volume 14, Number 1] |
 |
Mazinani, Sayyed Majid
Energy Efficient Multi-Clustering Using Grey Wolf Optimizer in Wireless Sensor Network [Volume 14, Number 1] |
 |
Ghorbanvirdi, Maryam
Energy Efficient Multi-Clustering Using Grey Wolf Optimizer in Wireless Sensor Network [Volume 14, Number 1] |
 |
Esnaashari, Mohammad Mehdi
A Novel Protocol for Routing in Vehicular Ad hoc Network Based on Model-Based Reinforcement Learning and Fuzzy Logic [Volume 12, Number 4] |
 |
Dehghan, Mehdi
A Novel Protocol for Routing in Vehicular Ad hoc Network Based on Model-Based Reinforcement Learning and Fuzzy Logic [Volume 12, Number 4] |
 |
Sargolzaey, Hadi
A Novel Protocol for Routing in Vehicular Ad hoc Network Based on Model-Based Reinforcement Learning and Fuzzy Logic [Volume 12, Number 4] |
 |
Jafarzadeh, Omid
A Novel Protocol for Routing in Vehicular Ad hoc Network Based on Model-Based Reinforcement Learning and Fuzzy Logic [Volume 12, Number 4] |
 |
Sharifi, Mohsen
A Survey on Task Scheduling Algorithms in Cloud Computing for Fast Big Data Processing [Volume 13, Number 4] |
 |
Jalalian, Zahra
A Survey on Task Scheduling Algorithms in Cloud Computing for Fast Big Data Processing [Volume 13, Number 4] |
 |
Toosi, Ramin
Optimum Group Pixel Matching Strategies for Image Steganography [Volume 13, Number 4] |
 |
Sarreshtedari, Saeed
Optimum Group Pixel Matching Strategies for Image Steganography [Volume 13, Number 4] |
 |
Ali Akhaee, Mohammad Ali
Optimum Group Pixel Matching Strategies for Image Steganography [Volume 13, Number 4] |
 |
Shahanaghi, Alireza
Optimum Group Pixel Matching Strategies for Image Steganography [Volume 13, Number 4] |
 |
Falahati, Abolfazl
The Effective Rate of MISO Systems over EGK Fading Channels [Volume 13, Number 1] |
 |
Salimian Rizi, Fereshteh
The Effective Rate of MISO Systems over EGK Fading Channels [Volume 13, Number 1] |
 |
Rahiimi, Farshad
A Distributed Optimization Approach for Multi-Agent Systems over Delaying Networks [Volume 13, Number 4] |
 |
Neshat, Mohammad
A New Look at the Coding in Time-Modulated Arrays [Volume 13, Number 4] |
 |
Sadeghi, Ehsan
A New Look at the Coding in Time-Modulated Arrays [Volume 13, Number 4] |
 |
Gholami, Mehdi
A New Look at the Coding in Time-Modulated Arrays [Volume 13, Number 4] |
 |
Akhbari, Bahareh
Classical -Quantum Multiple Access Channel with Secrecy Constraint: One-shot Rate Region [Volume 12, Number 2] |
 |
Aghaee, Hadi
Classical -Quantum Multiple Access Channel with Secrecy Constraint: One-shot Rate Region [Volume 12, Number 2] |
 |
Grami, Mohsen
Implementation of Intrusion Detection Systems in order to Detect Phishing in the Banking Industry [Volume 12, Number 2] |
 |
Sahifa , Abdullah
Implementation of Intrusion Detection Systems in order to Detect Phishing in the Banking Industry [Volume 12, Number 2] |
 |
Yazdanian, Vahid
Investigating the Sustainability of Energy Production and Consumption in Data Centers with the Design and Morphology Approach of the Building [Volume 12, Number 4] |
 |
Gerami, Mohsen
Investigating the Sustainability of Energy Production and Consumption in Data Centers with the Design and Morphology Approach of the Building [Volume 12, Number 4] |
 |
Maskani, Farshad
Investigating the Sustainability of Energy Production and Consumption in Data Centers with the Design and Morphology Approach of the Building [Volume 12, Number 4] |
 |
Moradi, Gholamreza
Employing Machine Learning Approach in Cavity Resonator Sensors for Characterization of Lossy Dielectrics [Volume 13, Number 3] |
 |
Kazemi, Kianoosh
Employing Machine Learning Approach in Cavity Resonator Sensors for Characterization of Lossy Dielectrics [Volume 13, Number 3] |
 |
Moghadam Charkari, Nasrollah
A Multilayered Complex Network Model for Image Retrieval [Volume 13, Number 4] |
 |
i Shakibian, Hadi
A Multilayered Complex Network Model for Image Retrieval [Volume 13, Number 4] |
 |
Sedaghat, Yasser
Real-Timeness Improvement of CAN-based Industrial Networks Based on Criticality Level [Volume 13, Number 4] |
 |
Ghodsollahee, Ismail
Real-Timeness Improvement of CAN-based Industrial Networks Based on Criticality Level [Volume 13, Number 4] |
 |
Soltani, Roya
A Smart Contract Model in Knowledge-based Companies Based on Grounded Theory by Focusing on the Robotic Process Automation and Process Management Strategies [Volume 13, Number 2] |
 |
Toloie, Abbas
A Smart Contract Model in Knowledge-based Companies Based on Grounded Theory by Focusing on the Robotic Process Automation and Process Management Strategies [Volume 13, Number 2] |
 |
Mousavi, Seyyed Alireza
A Smart Contract Model in Knowledge-based Companies Based on Grounded Theory by Focusing on the Robotic Process Automation and Process Management Strategies [Volume 13, Number 2] |
 |
Moridi, Zahra
A Smart Contract Model in Knowledge-based Companies Based on Grounded Theory by Focusing on the Robotic Process Automation and Process Management Strategies [Volume 13, Number 2] |
 |
Nouri, Mohammad
Improving Persian Named Entity Recognition Through Multi Task Learning [Volume 13, Number 2] |
 |
Sepahvand, Abdolah
Improving Persian Named Entity Recognition Through Multi Task Learning [Volume 13, Number 2] |
 |
Bokaei, Mohammad Hadi
Improving Persian Named Entity Recognition Through Multi Task Learning [Volume 13, Number 2] |
 |
Imani, Maryam
PolSAR Classification Using Contextual Based Locality Preserving Projection and Guided Filtering [Volume 13, Number 2] |
 |
Bakhtiyari Shahri, Ahmad Bakhtiyari Shahri
Intrusion Detection System to Detect Insider Attack on RPL Routing Protocol Based on Destination Advertisement Object [Volume 13, Number 2] |
 |
Jahantigh, Nadiya Jahantigh
Intrusion Detection System to Detect Insider Attack on RPL Routing Protocol Based on Destination Advertisement Object [Volume 13, Number 2] |
 |
Mozaffaripour, Mahdi
Dimensioning of 5G Networks by Using Stochastic Geometry [Volume 13, Number 2] |
 |
Samakoush Galougah, Siminfar
Dimensioning of 5G Networks by Using Stochastic Geometry [Volume 13, Number 2] |
 |
Seyed Ali Razavi Parizi, Razavi Parizi
Design of Compact Transverse Slot Array Antenna Using Corrugated H plane Horn [Volume 13, Number 2] |
 |
Ostovarzadeh, Mohammad Hossein
Design of Compact Transverse Slot Array Antenna Using Corrugated H plane Horn [Volume 13, Number 2] |
 |
Mohanna, Farahnaz
Content-based Image Retrieval for Carpet
E-commerce Application
[Volume 13, Number 1] |
 |
Rezaei, Mehdi
Content-based Image Retrieval for Carpet
E-commerce Application
[Volume 13, Number 1] |
 |
Shahabi, Mehdi Reza
Content-based Image Retrieval for Carpet
E-commerce Application
[Volume 13, Number 1] |
 |
Keramati, Mohammad Ali
Detection of E-commerce Attacks and Anomalies using Adaptive Neuro-Fuzzy Inference System and Firefly Optimization Algorithm [Volume 13, Number 1] |
 |
Afshar Kazemi, Mohammad Ali
Detection of E-commerce Attacks and Anomalies using Adaptive Neuro-Fuzzy Inference System and Firefly Optimization Algorithm [Volume 13, Number 1] |
 |
Rezaei, Fereidoon
Detection of E-commerce Attacks and Anomalies using Adaptive Neuro-Fuzzy Inference System and Firefly Optimization Algorithm [Volume 13, Number 1] |
 |
Azghani, Masoumeh
Massive MIMO Slow-varying Channel Estimation Using Tensor Sparsity [Volume 13, Number 1] |
 |
Sadeghi, Nasser
Massive MIMO Slow-varying Channel Estimation Using Tensor Sparsity [Volume 13, Number 1] |
 |
Mousavi, Seyed Mostafa
New Phase Realization Approach for Implementation of Braodband Reflectarrays [Volume 13, Number 1] |
 |
Rafaei-Booket, Mahmood
New Phase Realization Approach for Implementation of Braodband Reflectarrays [Volume 13, Number 1] |
 |
Ghorbani , Ayaz
Design of a 4×8 Substrate Integrated Waveguide Butler Matrix with Sidelobe Suppression at 60 GHz [Volume 13, Number 1] |
 |
Moradi, Gholamreza
Design of a 4×8 Substrate Integrated Waveguide Butler Matrix with Sidelobe Suppression at 60 GHz [Volume 13, Number 1] |
 |
Mehrzad, Zahra
Design of a 4×8 Substrate Integrated Waveguide Butler Matrix with Sidelobe Suppression at 60 GHz [Volume 13, Number 1] |
 |
Fakhrian, Farzane
A Graph-based Approach for Persian Entity Linking [Volume 12, Number 4] |
 |
Minaei-Bidgoli, Behrouz
A Graph-based Approach for Persian Entity Linking [Volume 12, Number 4] |
 |
Asgari-Bidhendi, Majid
A Graph-based Approach for Persian Entity Linking [Volume 12, Number 4] |
 |
Eshaghian, Nasim
Fake News Detection Based on Social Features by Ordered Weighted Averaging Fusion [Volume 12, Number 4] |
 |
Salkhordeh Haghighi, Mehdi
Fake News Detection Based on Social Features by Ordered Weighted Averaging Fusion [Volume 12, Number 4] |
 |
Mehrmolaei , Soheila
IR-WCO2C: An Enhanced Multi Operators-Based Approach for Content-Aware Image Retargeting [Volume 12, Number 4] |
 |
Ahmadzadeh Hosseini, Hoda Sadaat
IR-WCO2C: An Enhanced Multi Operators-Based Approach for Content-Aware Image Retargeting [Volume 12, Number 4] |
 |
Keyvanpour, Mohammadreza
IR-WCO2C: An Enhanced Multi Operators-Based Approach for Content-Aware Image Retargeting [Volume 12, Number 4] |
 |
Reshadi, Midia
A Novel Method for Separation of Two Speech Signals Recorded with Two Microphones [Volume 12, Number 4] |
 |
Rabiee, Azam
A Novel Method for Separation of Two Speech Signals Recorded with Two Microphones [Volume 12, Number 4] |
 |
Setayeshi, Saeed
A Novel Method for Separation of Two Speech Signals Recorded with Two Microphones [Volume 12, Number 4] |
 |
Zohrevandi , Mahbanou
A Novel Method for Separation of Two Speech Signals Recorded with Two Microphones [Volume 12, Number 4] |
 |
Arabsorkhi, Abouzar
A Hybrid Method for Measuring Service Supply Chain Performance Management in IT Service Providers [Volume 12, Number 3] |
 |
Moeini, Ali
A Hybrid Method for Measuring Service Supply Chain Performance Management in IT Service Providers [Volume 12, Number 3] |
 |
Kalantari, Reza
A Hybrid Method for Measuring Service Supply Chain Performance Management in IT Service Providers [Volume 12, Number 3] |
 |
H. Alizadeh, Sasan
Unsupervised Feature Selection Based on Low Dimensional Embedding and Subspace Learning [Volume 12, Number 3] |
 |
Ghatee, Mehdi
Unsupervised Feature Selection Based on Low Dimensional Embedding and Subspace Learning [Volume 12, Number 3] |
 |
Ghasemi Parsa, Ghasemi Parsa
Unsupervised Feature Selection Based on Low Dimensional Embedding and Subspace Learning [Volume 12, Number 3] |
 |
Zare, Hadi
Unsupervised Feature Selection Based on Low Dimensional Embedding and Subspace Learning [Volume 12, Number 3] |
 |
Keyvanpour , MohammadReza
Classification and Evaluation of Privacy Preserving Data Mining Methods [Volume 12, Number 3] |
 |
Nasiri , Negar
Classification and Evaluation of Privacy Preserving Data Mining Methods [Volume 12, Number 3] |
 |
Babamir, Seyed Morteza
[Volume 12, Number 3] |
 |
Ebadifard, Fatemeh
[Volume 12, Number 3] |
 |
Safdarkhani, Hadi
Compact, Tunable and Narrowband Waveguide Filters Using TM Dual-Mode Cavities for Satellite Communication Applications [Volume 12, Number 3] |
 |
Kheirdoost, Ali
Compact, Tunable and Narrowband Waveguide Filters Using TM Dual-Mode Cavities for Satellite Communication Applications [Volume 12, Number 3] |
 |
Eskandari , Ahmadreza
Compact, Tunable and Narrowband Waveguide Filters Using TM Dual-Mode Cavities for Satellite Communication Applications [Volume 12, Number 3] |
 |
Shahzadi, Ali
Computing Energy Efficiency for a Cognitive Heterogeneous Satellite Network Based on Interference Management [Volume 12, Number 3] |
 |
Hajipour, Pedram
Computing Energy Efficiency for a Cognitive Heterogeneous Satellite Network Based on Interference Management [Volume 12, Number 3] |
 |
Bahrak, Behnam
Structural Analysis of GitLab's Users and Projects Networks [Volume 12, Number 2] |
 |
Shahsavan, Faraz
Structural Analysis of GitLab's Users and Projects Networks [Volume 12, Number 2] |
 |
Sabri, Nazanin
Structural Analysis of GitLab's Users and Projects Networks [Volume 12, Number 2] |
 |
Safari, Hadi
Structural Analysis of GitLab's Users and Projects Networks [Volume 12, Number 2] |
 |
Sameti, Hossein
Thematic Similarity Multiple-Choice Question Answering with Doc2Vec: A Step Toward Metaphorical Language Processing [Volume 12, Number 2] |
 |
Hadi Bokaei, Mohammad Hadi
Thematic Similarity Multiple-Choice Question Answering with Doc2Vec: A Step Toward Metaphorical Language Processing [Volume 12, Number 2] |
 |
Soroosh Akef, Soroosh
Thematic Similarity Multiple-Choice Question Answering with Doc2Vec: A Step Toward Metaphorical Language Processing [Volume 12, Number 2] |
 |
Yassini, Parham
Color Sensing AR-Based Approach for Supporting Vocabulary Learning in Children [Volume 12, Number 2] |
 |
Zamiri Zeraati, Farnaz
Color Sensing AR-Based Approach for Supporting Vocabulary Learning in Children [Volume 12, Number 2] |
 |
Tayefeh Mahmoudi, Maryam
Color Sensing AR-Based Approach for Supporting Vocabulary Learning in Children [Volume 12, Number 2] |
 |
Bakhshi, Hamidreza
Three-Step Optimization Algorithm in SCMA-based System for User Association and Resource Allocation in C-RAN [Volume 12, Number 2] |
 |
Farhadi Zavleh, Armin
Three-Step Optimization Algorithm in SCMA-based System for User Association and Resource Allocation in C-RAN [Volume 12, Number 2] |
 |
Ravanmehr, Reza
Trend Detection and Prediction in Blogosphere based on Sentiment Analysis using PSO and Q-Learning [Volume 12, Number 1] |
 |
Mohamadrezaei , Rezvan
Trend Detection and Prediction in Blogosphere based on Sentiment Analysis using PSO and Q-Learning [Volume 12, Number 1] |
 |
Sadeghiyan, Babak
Simulating Benchmark Datasets for Worm Propagation Studies [Volume 12, Number 1] |
 |
Asgari, Sara
Simulating Benchmark Datasets for Worm Propagation Studies [Volume 12, Number 1] |
 |
Gharaee Garakani, Hossein
Security Framework of IoT-Based Smart Home [Volume 12, Number 1] |
 |
Hashemi , Sattar
Security Framework of IoT-Based Smart Home [Volume 12, Number 1] |
 |
Sotoudeh, Shahrouz
Security Framework of IoT-Based Smart Home [Volume 12, Number 1] |
 |
Nassiri, Mahdi
Performance Assessment of a Microwave Life-Detection System (MLDS): Modified Quadrature Receiver Versus a Harmonic Radar Architecture [Volume 12, Number 1] |
 |
Saberkari , Alireza
Performance Assessment of a Microwave Life-Detection System (MLDS): Modified Quadrature Receiver Versus a Harmonic Radar Architecture [Volume 12, Number 1] |
 |
Baghersalimi , Gholamreza
Performance Assessment of a Microwave Life-Detection System (MLDS): Modified Quadrature Receiver Versus a Harmonic Radar Architecture [Volume 12, Number 1] |
 |
Abyar , Kamyar
Performance Assessment of a Microwave Life-Detection System (MLDS): Modified Quadrature Receiver Versus a Harmonic Radar Architecture [Volume 12, Number 1] |
 |
Moeini, Ali
Creating a Maximal Clique Graph to Improve Community Detection in SCoDA and OSLOM Algorithms [Volume 11, Number 4] |
 |
Sabour, Sasan
Creating a Maximal Clique Graph to Improve Community Detection in SCoDA and OSLOM Algorithms [Volume 11, Number 4] |
 |
Moradi, Parham
A Text Classification Method Based on Combination of Information Gain and Graph Clustering [Volume 11, Number 4] |
 |
Zamani, Fatemeh
A Text Classification Method Based on Combination of Information Gain and Graph Clustering [Volume 11, Number 4] |
 |
Rahimi, Shadi
A Text Classification Method Based on Combination of Information Gain and Graph Clustering [Volume 11, Number 4] |
 |
Abdollahpouri, Alireza
A Text Classification Method Based on Combination of Information Gain and Graph Clustering [Volume 11, Number 4] |
 |
hajipour, pedram
Providing a Secure Protocol in Smart Metering Networks Based on the Internet of Things [Volume 11, Number 4] |
 |
Shahsavan, Mona
Providing a Secure Protocol in Smart Metering Networks Based on the Internet of Things [Volume 11, Number 4] |
 |
Eslami, Mahdi
Providing a Secure Protocol in Smart Metering Networks Based on the Internet of Things [Volume 11, Number 4] |
 |
Ebrahimi, Morteza
Development and Improvement of Network Reduction Algorithms for Multilayer Networks [Volume 11, Number 4] |
 |
Ahmadi, Sayyed Hamid Reza
Development and Improvement of Network Reduction Algorithms for Multilayer Networks [Volume 11, Number 4] |
 |
Moheb, Moheb
Development and Improvement of Network Reduction Algorithms for Multilayer Networks [Volume 11, Number 4] |
 |
Teshnelab, Mohammad
mproving the Performance of Text Sentiment Analysis using Deep Convolutional Neural Network Integrated with Hierarchical Attention Layer [Volume 11, Number 3] |
 |
Pedram, Mir Mohsen
mproving the Performance of Text Sentiment Analysis using Deep Convolutional Neural Network Integrated with Hierarchical Attention Layer [Volume 11, Number 3] |
 |
Sadr, Hossein
mproving the Performance of Text Sentiment Analysis using Deep Convolutional Neural Network Integrated with Hierarchical Attention Layer [Volume 11, Number 3] |
 |
Sedighian Kashi, Saeed
Auto-Encoder LSTM Methods for Anomaly-Based Web Application Firewallall [Volume 11, Number 3] |
 |
Teshnehlab, Mohammad
Auto-Encoder LSTM Methods for Anomaly-Based Web Application Firewallall [Volume 11, Number 3] |
 |
Mehralian, Soheil
Auto-Encoder LSTM Methods for Anomaly-Based Web Application Firewallall [Volume 11, Number 3] |
 |
Moradi Vartouni, Ali
Auto-Encoder LSTM Methods for Anomaly-Based Web Application Firewallall [Volume 11, Number 3] |
 |
Reshadi, Midia
DTIS: Destination Traffic Based Input Selection Strategy Based on Traffic Pattern for Network-on-Chip Systems [Volume 11, Number 3] |
 |
Khademzadeh, Ahmad
DTIS: Destination Traffic Based Input Selection Strategy Based on Traffic Pattern for Network-on-Chip Systems [Volume 11, Number 3] |
 |
Mehranzadeh, Amin
DTIS: Destination Traffic Based Input Selection Strategy Based on Traffic Pattern for Network-on-Chip Systems [Volume 11, Number 3] |
 |
Sheikhan, Mansour
Compressive Sensing in IoT-Based Multi-Sensor Wireless Sensor Networks
[Volume 11, Number 3] |
 |
Tabataba Vakili, Vahid
Compressive Sensing in IoT-Based Multi-Sensor Wireless Sensor Networks
[Volume 11, Number 3] |
 |
Ghaderi, Mohammad Reza
Compressive Sensing in IoT-Based Multi-Sensor Wireless Sensor Networks
[Volume 11, Number 3] |
 |
Darmani, Yousef
Multi-Objective P- Epidemic Forwarding Method in Heterogeneous DTNs Using NSGA-II [Volume 11, Number 3] |
 |
Karimi, Shiva
Multi-Objective P- Epidemic Forwarding Method in Heterogeneous DTNs Using NSGA-II [Volume 11, Number 3] |
 |
Razavizadeh, S. Mohammad
Energy Efficiency of Massive MIMO Cognitive Radio Networks in Presence of Smart Jamming [Volume 11, Number 3] |
 |
Kahaei, Mohammad Hossein
Energy Efficiency of Massive MIMO Cognitive Radio Networks in Presence of Smart Jamming [Volume 11, Number 3] |
 |
Zamanian, S. Fatemeh
Energy Efficiency of Massive MIMO Cognitive Radio Networks in Presence of Smart Jamming [Volume 11, Number 3] |
 |
Shayegan, Mohammad Javad
A Method for Anomaly Detection in Big Data based on Support Vector Machine [Volume 11, Number 3] |
 |
Harimi, Masoud
A Method for Anomaly Detection in Big Data based on Support Vector Machine [Volume 11, Number 3] |
 |
Tamaddondar, Mohammad Mehdi
A 3D Time-Variant Non-Stationary Hybrid Channel Model for Massive MIMO Systems [Volume 11, Number 2] |
 |
Khosravi, Samiyeh
Proposing a New Algorithm for Predicting Short-Term and Long-Term Trust-ability in Cloud Computing [Volume 11, Number 2] |
 |
Hosseinzadeh, Mehdi
LABTS: a Learning Automata-Based Task Scheduling algorithm in cloud computing [Volume 11, Number 2] |
 |
khademzadeh, ahmad
LABTS: a Learning Automata-Based Task Scheduling algorithm in cloud computing [Volume 11, Number 2] |
 |
zekrizadeh, neda
LABTS: a Learning Automata-Based Task Scheduling algorithm in cloud computing [Volume 11, Number 2] |
 |
Farajian, Nima
Sparse, Robust and Discriminative Representation by Supervised Regularized Auto-encoder [Volume 11, Number 2] |
 |
Mobini, Zahra
Wireless-powered Cooperative Spectrum Sharing Networks with Full-duplex and NOMA Transmissions [Volume 11, Number 2] |
 |
Mohammadi, Mohammadali
Wireless-powered Cooperative Spectrum Sharing Networks with Full-duplex and NOMA Transmissions [Volume 11, Number 2] |
 |
Hakimi, Azar
Wireless-powered Cooperative Spectrum Sharing Networks with Full-duplex and NOMA Transmissions [Volume 11, Number 2] |
 |
Sarraf Shirazi, Reza
Two Ports SIW Array Antenna with Circular Polarization for 5G Base Station [Volume 11, Number 2] |
 |
Moradi, Gholamreza
Two Ports SIW Array Antenna with Circular Polarization for 5G Base Station [Volume 11, Number 2] |
 |
Shirichian, Mehdi
Two Ports SIW Array Antenna with Circular Polarization for 5G Base Station [Volume 11, Number 2] |
 |
Badie, Kambiz
Conflict Resolution in Data Integration Using the Relationship Between Entities [Volume 11, Number 2] |
 |
Sharifi, Arash
Conflict Resolution in Data Integration Using the Relationship Between Entities [Volume 11, Number 2] |
 |
Ahmadi, Ali
Conflict Resolution in Data Integration Using the Relationship Between Entities [Volume 11, Number 2] |
 |
Nakhaei , Zeinab
Conflict Resolution in Data Integration Using the Relationship Between Entities [Volume 11, Number 2] |
 |
arabsorkhi, abouzar
A Novel Model for MSSP Maturity Assessment [Volume 11, Number 1] |
 |
Gholami Merhabadi, Mohammad
A Novel Model for MSSP Maturity Assessment [Volume 11, Number 1] |
 |
kassaee, massoud
A Novel Model for MSSP Maturity Assessment [Volume 11, Number 1] |
 |
Menhaj, Mohammad Bagher
Converting and Completing RDF Based Ontology into Fuzzy Ontology Using Neural Tensor Network [Volume 11, Number 1] |
 |
Keyvanpour, Mohammadreza
Converting and Completing RDF Based Ontology into Fuzzy Ontology Using Neural Tensor Network [Volume 11, Number 1] |
 |
Abedini, Farhad
Converting and Completing RDF Based Ontology into Fuzzy Ontology Using Neural Tensor Network [Volume 11, Number 1] |
 |
Saedi, Chakaveh
Automatic Synset Extraction from text documents using a Graph-Based Clustering Approach [Volume 11, Number 1] |
 |
Minaei-Bidgoli, Behrouz
Automatic Synset Extraction from text documents using a Graph-Based Clustering Approach [Volume 11, Number 1] |
 |
Khorasani, Mahsa
Automatic Synset Extraction from text documents using a Graph-Based Clustering Approach [Volume 11, Number 1] |
 |
Askarpour, Amir Nader
Numerical Full wave Analysis and Modeling of Plasmonic HEMT Performance Using Hydrodynamic Model [Volume 11, Number 1] |
 |
Abdipour, Abdolali
Numerical Full wave Analysis and Modeling of Plasmonic HEMT Performance Using Hydrodynamic Model [Volume 11, Number 1] |
 |
Daneshmandian, Farzaneh
Numerical Full wave Analysis and Modeling of Plasmonic HEMT Performance Using Hydrodynamic Model [Volume 11, Number 1] |
 |
Ranjbar Rafie, Davood
Transmit Power Optimization in Optical Coherent Transmission Systems: Analytical, Simulation, and Experimental Results [Volume 11, Number 1] |
 |
Hashemi, Mahdi
Transmit Power Optimization in Optical Coherent Transmission Systems: Analytical, Simulation, and Experimental Results [Volume 11, Number 1] |
 |
Emami, Ali
Transmit Power Optimization in Optical Coherent Transmission Systems: Analytical, Simulation, and Experimental Results [Volume 11, Number 1] |
 |
Beyranvand, Hamzeh
Transmit Power Optimization in Optical Coherent Transmission Systems: Analytical, Simulation, and Experimental Results [Volume 11, Number 1] |
 |
Habibi, Mehdi
Transmit Power Optimization in Optical Coherent Transmission Systems: Analytical, Simulation, and Experimental Results [Volume 11, Number 1] |
 |
Hashemi, Ramin
Transmit Power Optimization in Optical Coherent Transmission Systems: Analytical, Simulation, and Experimental Results [Volume 11, Number 1] |
 |
Ganjtabesh, Ahmad
Fuzzy Sequential Pattern Mining over Quantitative Streams [Volume 11, Number 1] |
 |
Eshghi , Farshad
Fuzzy Sequential Pattern Mining over Quantitative Streams [Volume 11, Number 1] |
 |
Kelarestaghi , Manoochehr
Fuzzy Sequential Pattern Mining over Quantitative Streams [Volume 11, Number 1] |
 |
Shakeri, Omid
Fuzzy Sequential Pattern Mining over Quantitative Streams [Volume 11, Number 1] |
 |
Nasiriasayesh, Hamidreza
Continuous Double Auction Scheduling in Federated Cloud Services [Volume 11, Number 1] |
 |
Yari, Alireza
Continuous Double Auction Scheduling in Federated Cloud Services [Volume 11, Number 1] |
 |
Hosseinpour, Mohaddeseh
Continuous Double Auction Scheduling in Federated Cloud Services [Volume 11, Number 1] |
 |
Dadashtabar, Kourosh
Sensing Radius Adjustment in Wireless Sensor Networks: A Game Theoretical Approach [Volume 11, Number 4] |
 |
Shirazi, Hossein
Sensing Radius Adjustment in Wireless Sensor Networks: A Game Theoretical Approach [Volume 11, Number 4] |
 |
Golrasan, Elham
Sensing Radius Adjustment in Wireless Sensor Networks: A Game Theoretical Approach [Volume 11, Number 4] |
 |
Sarhangi, Saeid
OSDTM: an Offline-Structural Distributed Test Mechanism for Data Links in NoC [Volume 10, Number 4] |
 |
Reshadi, Midia
OSDTM: an Offline-Structural Distributed Test Mechanism for Data Links in NoC [Volume 10, Number 4] |
 |
Badie, Kambiz
OSDTM: an Offline-Structural Distributed Test Mechanism for Data Links in NoC [Volume 10, Number 4] |
 |
Khademzadeh, Ahmad
OSDTM: an Offline-Structural Distributed Test Mechanism for Data Links in NoC [Volume 10, Number 4] |
 |
Aghaei, Babak
OSDTM: an Offline-Structural Distributed Test Mechanism for Data Links in NoC [Volume 10, Number 4] |
 |
Yari, Alireza
Efficient Policy-Aware Deployment of Business Process in Cloud Federation [Volume 10, Number 3] |
 |
Nasiriasayesh, Hamidreza
Efficient Policy-Aware Deployment of Business Process in Cloud Federation [Volume 10, Number 3] |
 |
Alizadeh, Behrooz
Network Planning Policies for Joint Switching in Spectrally-Spatially Flexible Optical Networks [Volume 10, Number 4] |
 |
Ghaffarpour Rahbar, Akbar
Network Planning Policies for Joint Switching in Spectrally-Spatially Flexible Optical Networks [Volume 10, Number 4] |
 |
Yaghubi-Namaad, Mohsen
Network Planning Policies for Joint Switching in Spectrally-Spatially Flexible Optical Networks [Volume 10, Number 4] |
 |
Zahedi, Shamsossadat
A Framework for ICT-Oriented Sustainable Development through Mapping from ICT Concerns onto Sustainability Indicators [Volume 10, Number 4] |
 |
Azadnia, Mohammad
A Framework for ICT-Oriented Sustainable Development through Mapping from ICT Concerns onto Sustainability Indicators [Volume 10, Number 4] |
 |
Fazli, Mohammad Amin
The Emotional Promulgation of Social Norms in Social Networks Based on Structural Properties [Volume 10, Number 4] |
 |
Habibi, Jafar
The Emotional Promulgation of Social Norms in Social Networks Based on Structural Properties [Volume 10, Number 4] |
 |
Sajadi, Seyed Hadi
The Emotional Promulgation of Social Norms in Social Networks Based on Structural Properties [Volume 10, Number 4] |
 |
Ahmadi, Ali
Deep Learning Based on Parallel CNNs for Pedestrian Detection [Volume 10, Number 4] |
 |
Saeidi, Mahmoud
Deep Learning Based on Parallel CNNs for Pedestrian Detection [Volume 10, Number 4] |
 |
Joda, Roghayeh
A Proactive Context-Aware Self-Healing Scheme for 5G Using Machine Learning [Volume 10, Number 4] |
 |
Akbari, Mohammad
A Proactive Context-Aware Self-Healing Scheme for 5G Using Machine Learning [Volume 10, Number 4] |
 |
Nikmanesh, Shirin
A Proactive Context-Aware Self-Healing Scheme for 5G Using Machine Learning [Volume 10, Number 4] |
 |
Asadpour, Masoud
On the Reselection of Seed Nodes in Independent Cascade Based Influence Maximization [Volume 10, Number 4] |
 |
Faili, Heshaam
On the Reselection of Seed Nodes in Independent Cascade Based Influence Maximization [Volume 10, Number 4] |
 |
Vardasbi, Ali
On the Reselection of Seed Nodes in Independent Cascade Based Influence Maximization [Volume 10, Number 4] |
 |
Hatefi, Seyed Morteza
The Effect of Information Sharing on the Assessment of Supply Chain Performance in Uncertain Conditions [Volume 10, Number 2] |
 |
Izadbakhsh, Hamidreza
The Effect of Information Sharing on the Assessment of Supply Chain Performance in Uncertain Conditions [Volume 10, Number 2] |
 |
Mohamadi Janaki, Daryosh
The Effect of Information Sharing on the Assessment of Supply Chain Performance in Uncertain Conditions [Volume 10, Number 2] |
 |
Rahmani, Amir Masoud
ISOT: Distributed Selfish Node Detection in Internet of Things [Volume 10, Number 3] |
 |
Khademzadeh, Ahmad
ISOT: Distributed Selfish Node Detection in Internet of Things [Volume 10, Number 3] |
 |
Gharaee Garakani, Hossein
ISOT: Distributed Selfish Node Detection in Internet of Things [Volume 10, Number 3] |
 |
Nobahary, Solmaz
ISOT: Distributed Selfish Node Detection in Internet of Things [Volume 10, Number 3] |
 |
Afshinfar, Arash
An ERP Framework Based on Service Oriented Architecture and Cloud Computing Environment
Case: IRISL Container Department [Volume 10, Number 3] |
 |
Farjami, Yaghoub
An ERP Framework Based on Service Oriented Architecture and Cloud Computing Environment
Case: IRISL Container Department [Volume 10, Number 3] |
 |
Asosheh, Abbas
An ERP Framework Based on Service Oriented Architecture and Cloud Computing Environment
Case: IRISL Container Department [Volume 10, Number 3] |
 |
Fadishei, Hamid
Energy-Efficient Human Activity Recognition on Smartphones: A Test-Cost Sensitive Approach [Volume 10, Number 3] |
 |
Aref, Mohammad Reza
A Hybrid DOS-Tolerant PKC-Based Key Management System for WSNs [Volume 10, Number 3] |
 |
Payandeh, Ali
A Hybrid DOS-Tolerant PKC-Based Key Management System for WSNs [Volume 10, Number 3] |
 |
Ghasemzadeh, Hamzeh
A Hybrid DOS-Tolerant PKC-Based Key Management System for WSNs [Volume 10, Number 3] |
 |
Pedram, Hossein
Power-Efficient Resource Allocation in Massive MIMO Aided Cloud RANs [Volume 10, Number 3] |
 |
Taheri, Hassan
Power-Efficient Resource Allocation in Massive MIMO Aided Cloud RANs [Volume 10, Number 3] |
 |
Parsaeefard, Saeedeh
Power-Efficient Resource Allocation in Massive MIMO Aided Cloud RANs [Volume 10, Number 3] |
 |
Amani, Nahid
Power-Efficient Resource Allocation in Massive MIMO Aided Cloud RANs [Volume 10, Number 3] |
 |
Zakeri, Fahimeh
PSO-Based Scheduling Algorithm for Time and Cost Optimization in Mobile Grid [Volume 10, Number 3] |
 |
Golsorkhtabaramiri, Mehdi
PSO-Based Scheduling Algorithm for Time and Cost Optimization in Mobile Grid [Volume 10, Number 3] |
 |
Sharifi, Mohsen
EDBPM: An Event-Driven Business Process Monitoring Mechanism [Volume 10, Number 2] |
 |
Allahdadi, Farshad
EDBPM: An Event-Driven Business Process Monitoring Mechanism [Volume 10, Number 2] |
 |
Fardbastani, Mohammad Ali
EDBPM: An Event-Driven Business Process Monitoring Mechanism [Volume 10, Number 2] |
 |
Zarifzadeh, Sajjad
Practical Detection of Click Spams Using Efficient Classification-Based Algorithms [Volume 10, Number 2] |
 |
Fallah, Mahdieh
Practical Detection of Click Spams Using Efficient Classification-Based Algorithms [Volume 10, Number 2] |
 |
Arabsorkhi, Abouzar
Skin Classification for Adult Image Recognition Based on Combination of Gaussian and Weight-KNN [Volume 10, Number 2] |
 |
Karamizadeh, Sasan
Skin Classification for Adult Image Recognition Based on Combination of Gaussian and Weight-KNN [Volume 10, Number 2] |
 |
Sheikhy, Ayyub
Impact of Empowering Communication Technology Practices on Service Performance in Information Technology Sector [Volume 10, Number 2] |
 |
Salajegheh, Sanjar
Impact of Empowering Communication Technology Practices on Service Performance in Information Technology Sector [Volume 10, Number 2] |
 |
Mollahosseini, Ali
Impact of Empowering Communication Technology Practices on Service Performance in Information Technology Sector [Volume 10, Number 2] |
 |
Nasiri, Rouhollah
Impact of Empowering Communication Technology Practices on Service Performance in Information Technology Sector [Volume 10, Number 2] |
 |
Haghparast, Majid
A Framework for Optimal Fault Tolerance Protocol Selection Using Fuzzy Logic on
IoT Sensor Layer [Volume 10, Number 2] |
 |
Khadem-Zadeh, Ahmad
A Framework for Optimal Fault Tolerance Protocol Selection Using Fuzzy Logic on
IoT Sensor Layer [Volume 10, Number 2] |
 |
Nazari Cheraghlou, Mehdi
A Framework for Optimal Fault Tolerance Protocol Selection Using Fuzzy Logic on
IoT Sensor Layer [Volume 10, Number 2] |
 |
Vaezpour, Elaheh
A Conceptual Framework and Architectural Considerations for Capability Enhancement in Software Defined Networks [Volume 10, Number 2] |
 |
Yeganeh, Hassan
A Conceptual Framework and Architectural Considerations for Capability Enhancement in Software Defined Networks [Volume 10, Number 2] |
 |
Seyfe, Babak
A Fairness-Guaranteed Game-Theoretic Perspective in Multi-User Interference Channel [Volume 9, Number 4] |
 |
Ebrahimkhani, Atena
A Fairness-Guaranteed Game-Theoretic Perspective in Multi-User Interference Channel [Volume 9, Number 4] |
 |
Akhbari, Bahareh
A Fairness-Guaranteed Game-Theoretic Perspective in Multi-User Interference Channel [Volume 9, Number 4] |
 |
Peyravi , Farzad
An Agent-Mediated Knowledge Management System in Call Centers Using SMV and TROPOS [Volume 1, Number 1] |
 |
Taghiyareh , Fattaneh
An Agent-Mediated Knowledge Management System in Call Centers Using SMV and TROPOS [Volume 1, Number 1] |
 |
Pashaei , Kaveh
An Agent-Mediated Knowledge Management System in Call Centers Using SMV and TROPOS [Volume 1, Number 1] |
 |
Ahmadi , Mohammad Reza
A New Recommender System based on Cooperative Co-evolution Algorithm [Volume 1, Number 1] |
 |
Lotfizad , Mojtaba
Modified Wavelet-domain Adaptive Filtering Scheme for Stereophonic Acoustic Echo Cancellation in the Teleconferencing Application [Volume 1, Number 1] |
 |
Bekrani , Mehdi
Modified Wavelet-domain Adaptive Filtering Scheme for Stereophonic Acoustic Echo Cancellation in the Teleconferencing Application [Volume 1, Number 1] |
 |
Akbari , Ahmad
Noise Reduction from Speech Signal based on Wavelet Transform and Kullback-Leibler Divergence [Volume 1, Number 1] |
 |
Tabibian , Shima
Noise Reduction from Speech Signal based on Wavelet Transform and Kullback-Leibler Divergence [Volume 1, Number 1] |
 |
Tinati , Mohammad Ali
Wavelet-based Robust Voice conversion systems [Volume 1, Number 1] |
 |
Farhid , Morteza
Wavelet-based Robust Voice conversion systems [Volume 1, Number 1] |
 |
Moghaddam Charkari , Nasrollah
3D Triangular Mesh Digital Watermarking based on Median and Indices [Volume 1, Number 1] |
 |
Farid , Reza
3D Triangular Mesh Digital Watermarking based on Median and Indices [Volume 1, Number 1] |
 |
Azmi , Paeiz
On the Distribution of the Sum of Independent Random Variables and Its Application [Volume 1, Number 1] |
 |
Samimi , Hossein
On the Distribution of the Sum of Independent Random Variables and Its Application [Volume 1, Number 1] |
 |
Nasiri Kenari , Masoumeh
Combined Coding and Spread Spectrum Modulatin in Wideband Code Division Multiple Access Communication Systems [Volume 1, Number 2] |
 |
Granpayeh , Nosratollah
Design and Fabrication of an Optical Nanofilter based on Surface Plasmons [Volume 1, Number 2] |
 |
Abrishamian , Mohammad Sadegh
Design and Fabrication of an Optical Nanofilter based on Surface Plasmons [Volume 1, Number 2] |
 |
Pakizeh , Tavakol
Design and Fabrication of an Optical Nanofilter based on Surface Plasmons [Volume 1, Number 2] |
 |
Mirian Hossinabadi , Seyyed Hassan
ON THE CORRECTNESS OF A TRANSLATION MAP BETWEEN SPECIFICATIONS IN Z AND SETL2 PROTOTYPE [Volume 1, Number 2] |
 |
Changizi , Behnaz
ON THE CORRECTNESS OF A TRANSLATION MAP BETWEEN SPECIFICATIONS IN Z AND SETL2 PROTOTYPE [Volume 1, Number 2] |
 |
Golestani , Seyed Jamaleddin
Optimum Routing and Scheduling in Wireless Nerworks [Volume 1, Number 2] |
 |
Sadat Moayedian , Naghmeh
Optimum Routing and Scheduling in Wireless Nerworks [Volume 1, Number 2] |
 |
Rajabzadeh , Morteza
A Novel Method to Equalize Frequency-Selective MIMO Channels Using Genetic Algorithm and Singular Value Decomposition of Polynomial Matrice [Volume 1, Number 2] |
 |
Khoshbin , Hossein
A Novel Method to Equalize Frequency-Selective MIMO Channels Using Genetic Algorithm and Singular Value Decomposition of Polynomial Matrice [Volume 1, Number 2] |
 |
Ahadi Akhlaghi , Iman
A Novel Method to Equalize Frequency-Selective MIMO Channels Using Genetic Algorithm and Singular Value Decomposition of Polynomial Matrice [Volume 1, Number 2] |
 |
Mirmohammad Sadeghi , Hamid
Design and Implementation of An Aperture Coupled Microstrip IFF Antenna [Volume 1, Number 2] |
 |
Eskandari , Hamidreza
Design and Implementation of An Aperture Coupled Microstrip IFF Antenna [Volume 1, Number 2] |
 |
Askari , Gholamreza
Design and Implementation of An Aperture Coupled Microstrip IFF Antenna [Volume 1, Number 2] |
 |
Niroo Jazi , Mahmood
Design and Implementation of An Aperture Coupled Microstrip IFF Antenna [Volume 1, Number 2] |
 |
Abolghasemi , Ali
Novel Approach to Ultra-Wideband Antenna Design [Volume 1, Number 2] |
 |
Fardis , Masoum
Novel Approach to Ultra-Wideband Antenna Design [Volume 1, Number 2] |
 |
Paran , Kian
Novel Approach to Ultra-Wideband Antenna Design [Volume 1, Number 2] |
 |
Bijankhan , Mahmoud
Corpus-Based Analysis for Multi-Token Units in Persian [Volume 1, Number 3] |
 |
Sharifi Atashgah , Masoud
Corpus-Based Analysis for Multi-Token Units in Persian [Volume 1, Number 3] |
 |
Arab Yarmohammadi , Mahsa
Designing and Developing a Wordnet for Persian Nouns Pages [Volume 1, Number 3] |
 |
Shamsfard , Mehrnoush
Designing and Developing a Wordnet for Persian Nouns Pages [Volume 1, Number 3] |
 |
Asi , Seyed Mostafa
Designing and Developing a Wordnet for Persian Nouns Pages [Volume 1, Number 3] |
 |
Ehsani , Akbar
Designing and Developing a Wordnet for Persian Nouns Pages [Volume 1, Number 3] |
 |
AI-Araji , Saleh
Performance Analysis of Zero Crossing DPLL with Linearized Phase Detector [Volume 1, Number 3] |
 |
Nasir , Qassim
Performance Analysis of Zero Crossing DPLL with Linearized Phase Detector [Volume 1, Number 3] |
 |
Adjeroh , Donald
A Reliable Transport Protocol for Wireless Sensor Networks [Volume 1, Number 3] |
 |
Yaghmaee Moghaddam , Mohammad Hossien
A Reliable Transport Protocol for Wireless Sensor Networks [Volume 1, Number 3] |
 |
Nooshyar , Mahdi
A Novel Still Image Error Concealment Using Fragile Watermarking in Wireless Image , Transmission and Packet-Switched Networks [Volume 1, Number 3] |
 |
Musevi niya , Javad
A Novel Still Image Error Concealment Using Fragile Watermarking in Wireless Image , Transmission and Packet-Switched Networks [Volume 1, Number 3] |
 |
Aghagolzadeh, Ali
A Novel Still Image Error Concealment Using Fragile Watermarking in Wireless Image , Transmission and Packet-Switched Networks [Volume 1, Number 3] |
 |
Bashiri , Davood
A Novel Still Image Error Concealment Using Fragile Watermarking in Wireless Image , Transmission and Packet-Switched Networks [Volume 1, Number 3] |
 |
Mohammadi , Abbas
Characterization of Wireless Mesh Backhaul Networks with MIMO Systems [Volume 1, Number 3] |
 |
Haghighizadeh, Navin
Characterization of Wireless Mesh Backhaul Networks with MIMO Systems [Volume 1, Number 3] |
 |
Nasser , Nidal
A Backup Routing Scheme for Mobile Ad-Hoc Networks [Volume 1, Number 3] |
 |
Esmailpour , Amir
A Backup Routing Scheme for Mobile Ad-Hoc Networks [Volume 1, Number 3] |
 |
Kabir , Ehsanollah
A Fuzzy Approach for Measuring Features Reliabilities in Particle Filtering Framework [Volume 1, Number 4] |
 |
Armanfard , Narges
A Fuzzy Approach for Measuring Features Reliabilities in Particle Filtering Framework [Volume 1, Number 4] |
 |
Komeili , Majid
A Fuzzy Approach for Measuring Features Reliabilities in Particle Filtering Framework [Volume 1, Number 4] |
 |
Tabataba Vakili , Vahid
Adaptive Methods for Joint Compensation of Power Amplifier Nonlinearity and Quadrature Modulator IQ Imbalance [Volume 1, Number 4] |
 |
Zareian , Hassan
Adaptive Methods for Joint Compensation of Power Amplifier Nonlinearity and Quadrature Modulator IQ Imbalance [Volume 1, Number 4] |
 |
Meybodi, Mohammad Reza
Rule Scheduling in Active Database using Learning Automata [Volume 1, Number 4] |
 |
Rasoolzadegan , Abbas
Rule Scheduling in Active Database using Learning Automata [Volume 1, Number 4] |
 |
Keyhanipour , Amir Hossein
Adaptive Combinational Web Ranking Algorithm Using Coarse-grained and Fine-grained Features [Volume 1, Number 4] |
 |
Yazdani , Nasser
Adaptive Combinational Web Ranking Algorithm Using Coarse-grained and Fine-grained Features [Volume 1, Number 4] |
 |
Azadnia , Mohammad
Adaptive Combinational Web Ranking Algorithm Using Coarse-grained and Fine-grained Features [Volume 1, Number 4] |
 |
Zareh Bidoki , Ali Mohammad
Adaptive Combinational Web Ranking Algorithm Using Coarse-grained and Fine-grained Features [Volume 1, Number 4] |
 |
Badie , Kambiz
A Framework for Technology Foresight Based on Ontology Integration of the Most Famous Foresight Models [Volume 1, Number 4] |
 |
Fasanghari, Mahdi
A Framework for Technology Foresight Based on Ontology Integration of the Most Famous Foresight Models [Volume 1, Number 4] |
 |
Mohamedpour, Maryam
A Framework for Technology Foresight Based on Ontology Integration of the Most Famous Foresight Models [Volume 1, Number 4] |
 |
Mohammadi Takami , Mohsen
Intelligent Content-based Categorization of Web pages Using Combination of Textual, Structural, and Visual Features [Volume 1, Number 4] |
 |
Zamanian , Mahdi
Intelligent Content-based Categorization of Web pages Using Combination of Textual, Structural, and Visual Features [Volume 1, Number 4] |
 |
Ahmadi , Ali
Intelligent Content-based Categorization of Web pages Using Combination of Textual, Structural, and Visual Features [Volume 1, Number 4] |
 |
Aleahmad , Abolfazl
Design and Implementation of a Language Specific Crawler to Improve Crawling of Persian Web Documents [Volume 1, Number 4] |
 |
Yari , Alireza
Design and Implementation of a Language Specific Crawler to Improve Crawling of Persian Web Documents [Volume 1, Number 4] |
 |
Azimzadeh , Masomeh
Design and Implementation of a Language Specific Crawler to Improve Crawling of Persian Web Documents [Volume 1, Number 4] |
 |
Badie , Kambiz
A New Framework for Enterprise Interoperability Based on Meta- synthesis Approach through Combination of Current Frameworks [Volume 1, Number 4] |
 |
Abbasi Shahkooh, Kolsoom
A New Framework for Enterprise Interoperability Based on Meta- synthesis Approach through Combination of Current Frameworks [Volume 1, Number 4] |
 |
Sadeghi , Masoumeh
A New Framework for Enterprise Interoperability Based on Meta- synthesis Approach through Combination of Current Frameworks [Volume 1, Number 4] |
 |
Dastranj Mamaghani , Nasrin
A New Framework for Enterprise Interoperability Based on Meta- synthesis Approach through Combination of Current Frameworks [Volume 1, Number 4] |
 |
Soltani Panah , Arezou
Speech Acts Classification of Persian Language Texts Using Three Machine Leaming Methods [Volume 2, Number 1] |
 |
Homayounpour, Mohammad Mehdi
Speech Acts Classification of Persian Language Texts Using Three Machine Leaming Methods [Volume 2, Number 1] |
 |
Molavi-kakhki , Mohammad
A Hammerstein Diversity Combining Technique [Volume 2, Number 1] |
 |
Aminian, Amir Masoud
A Hammerstein Diversity Combining Technique [Volume 2, Number 1] |
 |
Raiyat Aliabadi , Mohammad
A Novel Scheme for Fault-Tolerant And Higher Capacity Network on Chip [Volume 2, Number 1] |
 |
Khadem zadeh , Ahmad
A Novel Scheme for Fault-Tolerant And Higher Capacity Network on Chip [Volume 2, Number 1] |
 |
Raiyat Aliabadi , Maryam
A Novel Scheme for Fault-Tolerant And Higher Capacity Network on Chip [Volume 2, Number 1] |
 |
Berenjkoub , Mehdi
A Taxonomy for Network Vulnerabilities [Volume 2, Number 1] |
 |
Hendessi , Faramarz
A Taxonomy for Network Vulnerabilities [Volume 2, Number 1] |
 |
Hajian , Sara
A Taxonomy for Network Vulnerabilities [Volume 2, Number 1] |
 |
Ghobadi , Changiz
Multiband Hybrid Loop/Monopole Slot/Planar Monopole Antenna for Mobile Phone Application [Volume 2, Number 1] |
 |
Nourinia , Javad
Multiband Hybrid Loop/Monopole Slot/Planar Monopole Antenna for Mobile Phone Application [Volume 2, Number 1] |
 |
Rezaee , Morteza
Multiband Hybrid Loop/Monopole Slot/Planar Monopole Antenna for Mobile Phone Application [Volume 2, Number 1] |
 |
Kahaei , Mohammad Hossein
A Maximum Likehood Frequency Offset Estimation with Improved Range ad Performance in OFDM Systems [Volume 2, Number 1] |
 |
Nezamfar , Hooman
A Maximum Likehood Frequency Offset Estimation with Improved Range ad Performance in OFDM Systems [Volume 2, Number 1] |
 |
Sheikhzadeh Nadjar , Hamid
VQ-based Approach to Single-Channel Audio Separation for Music and Speech Mixtures [Volume 2, Number 1] |
 |
Sayadiyan , Abolghasem
VQ-based Approach to Single-Channel Audio Separation for Music and Speech Mixtures [Volume 2, Number 1] |
 |
Mowlaee , Pejman
VQ-based Approach to Single-Channel Audio Separation for Music and Speech Mixtures [Volume 2, Number 1] |
 |
Palangi , Hamid
The Unified Approach to Set-Membership and Selective Partial Update Adaptive Filtering Algorithms [Volume 2, Number 2] |
 |
Shams Esfand Abadi , Mohammad
The Unified Approach to Set-Membership and Selective Partial Update Adaptive Filtering Algorithms [Volume 2, Number 2] |
 |
Azadnia , Mohammad
The First Persian Context Sensitive Spell Checker [Volume 2, Number 2] |
 |
Faili , Heshaam
The First Persian Context Sensitive Spell Checker [Volume 2, Number 2] |
 |
Minaei Bidgoli , Behrouz
Scaling Up Performance of Web Services by Pre-Serialization Response Analysis [Volume 2, Number 2] |
 |
Saadat , Parinaz
Scaling Up Performance of Web Services by Pre-Serialization Response Analysis [Volume 2, Number 2] |
 |
Khadem zadeh, Ahmad
A New GA Approach Based on Pareto Ranking Strategy for Privacy Preserving of Association Rule Mining [Volume 2, Number 2] |
 |
Badie , Kambiz
A New GA Approach Based on Pareto Ranking Strategy for Privacy Preserving of Association Rule Mining [Volume 2, Number 2] |
 |
Naderi Dehkordi , Mohammad
A New GA Approach Based on Pareto Ranking Strategy for Privacy Preserving of Association Rule Mining [Volume 2, Number 2] |
 |
Fesharaki , Mehdi
Peris: A Novel Dynamic Bandwidth Allocation (DBA) Method with Second-Price Auction in Next Generation Military Networks Based on EPON Technology [Volume 2, Number 2] |
 |
Hedayati , Alireza
Peris: A Novel Dynamic Bandwidth Allocation (DBA) Method with Second-Price Auction in Next Generation Military Networks Based on EPON Technology [Volume 2, Number 2] |
 |
Homayounpour , Mohammad Mehdi
A Robust Voice Activity Detection Based on Short Time Features of Audio Frames and Spectral Pattern of Vowel Sounds [Volume 2, Number 2] |
 |
Moattar , Mohammad Hossein
A Robust Voice Activity Detection Based on Short Time Features of Audio Frames and Spectral Pattern of Vowel Sounds [Volume 2, Number 2] |
 |
Kabir , Ehsanollah
A Novel Descriptor for Pedestrian Detection in Video Sequences [Volume 2, Number 2] |
 |
Komeili , Majid
A Novel Descriptor for Pedestrian Detection in Video Sequences [Volume 2, Number 2] |
 |
Armanfard , Narges
A Novel Descriptor for Pedestrian Detection in Video Sequences [Volume 2, Number 2] |
 |
Shakery , Azadeh
Content-Based Approach for Trfcking Concept Drift in Email Spam Filtering [Volume 2, Number 3] |
 |
Seyedhossein, Leila
Content-Based Approach for Trfcking Concept Drift in Email Spam Filtering [Volume 2, Number 3] |
 |
Basiri , Javad
Content-Based Approach for Trfcking Concept Drift in Email Spam Filtering [Volume 2, Number 3] |
 |
Zi Hayat , Morteza
Content-Based Approach for Trfcking Concept Drift in Email Spam Filtering [Volume 2, Number 3] |
 |
Lucas , Caro
Adaptive Autonomy Expert System in Smart Grid based on Deterministic Timed Petri Nets [Volume 2, Number 3] |
 |
Lesani , Hamid
Adaptive Autonomy Expert System in Smart Grid based on Deterministic Timed Petri Nets [Volume 2, Number 3] |
 |
Fereidunian , Alireza
Adaptive Autonomy Expert System in Smart Grid based on Deterministic Timed Petri Nets [Volume 2, Number 3] |
 |
Sharifi Kolarijani , Mohammad Amin
Adaptive Autonomy Expert System in Smart Grid based on Deterministic Timed Petri Nets [Volume 2, Number 3] |
 |
Zamani , Mohammad Ali
Adaptive Autonomy Expert System in Smart Grid based on Deterministic Timed Petri Nets [Volume 2, Number 3] |
 |
Asoshesh , Abbas
A New Mathematical Method to Estimate Resources for E-commerce Application [Volume 2, Number 3] |
 |
Pourjavaheri , Leili
A New Mathematical Method to Estimate Resources for E-commerce Application [Volume 2, Number 3] |
 |
Kharrat , Mahmood
A Multi-Aspect Architecture with Co-alignment between Layers for Intra-Organizational Knowledge Networking Purposes [Volume 2, Number 3] |
 |
Beig , Leila
A Multi-Aspect Architecture with Co-alignment between Layers for Intra-Organizational Knowledge Networking Purposes [Volume 2, Number 3] |
 |
S. Mirian , Maryam
A Multi-Aspect Architecture with Co-alignment between Layers for Intra-Organizational Knowledge Networking Purposes [Volume 2, Number 3] |
 |
Hashemi , Mahmoud Reza
A Timelier Credit Card Fraud Detection by Mining Transaction Time Series [Volume 2, Number 3] |
 |
Seyedhossein , Leila
A Timelier Credit Card Fraud Detection by Mining Transaction Time Series [Volume 2, Number 3] |
 |
Dadkhah , Mahboobeh
Publishing Persian Linked Data; Challenges and Lessons Learned [Volume 2, Number 3] |
 |
Behkamal , Behshid
Publishing Persian Linked Data; Challenges and Lessons Learned [Volume 2, Number 3] |
 |
Kahani , Mohsen
Publishing Persian Linked Data; Challenges and Lessons Learned [Volume 2, Number 3] |
 |
Paydar , Samad
Publishing Persian Linked Data; Challenges and Lessons Learned [Volume 2, Number 3] |
 |
Shakery , Azadeh
Fuzzy Clustering for Semantic Web Services Discovery based on Ontology [Volume 2, Number 3] |
 |
Taghiyareh , Fattaneh
Fuzzy Clustering for Semantic Web Services Discovery based on Ontology [Volume 2, Number 3] |
 |
Gholamzadeh, Nayereh
Fuzzy Clustering for Semantic Web Services Discovery based on Ontology [Volume 2, Number 3] |
 |
Zihayat , Morteza
Addressing the New User Cold-Start Problem in Recommender Systems Using Ordered Weighted Averaging Operator [Volume 2, Number 4] |
 |
Moshiri , Behzad
Addressing the New User Cold-Start Problem in Recommender Systems Using Ordered Weighted Averaging Operator [Volume 2, Number 4] |
 |
Shakery , Azadeh
Addressing the New User Cold-Start Problem in Recommender Systems Using Ordered Weighted Averaging Operator [Volume 2, Number 4] |
 |
Basiri , Javad
Addressing the New User Cold-Start Problem in Recommender Systems Using Ordered Weighted Averaging Operator [Volume 2, Number 4] |
 |
Nazemi , Eslam
Improving the Performance of Proposed Multi-Agent Domain Specific Search Engine Using Query Refinement Component [Volume 2, Number 4] |
 |
Hajimani , Elmira
Improving the Performance of Proposed Multi-Agent Domain Specific Search Engine Using Query Refinement Component [Volume 2, Number 4] |
 |
Shamsfard , Mehrnoush
VE Architect-Driven Service-Oriented Business Network Process Realization [Volume 2, Number 4] |
 |
Aghdasi , Mohammad
VE Architect-Driven Service-Oriented Business Network Process Realization [Volume 2, Number 4] |
 |
Khoshkbarforoushha, Alireza
VE Architect-Driven Service-Oriented Business Network Process Realization [Volume 2, Number 4] |
 |
Razavizadeh , Seyyed Mohammad
Sequential Interference-Aware Admission Control in Underlay Cognitive Radio Networks [Volume 2, Number 4] |
 |
Ghasemi , Abdorasoul
Sequential Interference-Aware Admission Control in Underlay Cognitive Radio Networks [Volume 2, Number 4] |
 |
Farmahini Farahani , Masoumeh
Sequential Interference-Aware Admission Control in Underlay Cognitive Radio Networks [Volume 2, Number 4] |
 |
Naghibi Sistani , Mohammad Bagher
Document Classification Using Novel Competitive Neural Text Classifier [Volume 2, Number 4] |
 |
Farshchi , Seyyed Mohammad Reza
Document Classification Using Novel Competitive Neural Text Classifier [Volume 2, Number 4] |
 |
Niknafs , Ali Akbar
Towards Faster Performance of PROMETHEE II in a Lower Class of Complexity [Volume 2, Number 4] |
 |
Moghaddam Charkari , Nasrollah
Towards Faster Performance of PROMETHEE II in a Lower Class of Complexity [Volume 2, Number 4] |
 |
Niknafs , Arash
Towards Faster Performance of PROMETHEE II in a Lower Class of Complexity [Volume 2, Number 4] |
 |
Moin , Mohammad Shahram
Blind Color Image Steganalysis Based on Multi-Transform Combined Features Selected by a Hybrid of ANOVA and BPSO [Volume 2, Number 4] |
 |
Sheikhan , Mansour
Blind Color Image Steganalysis Based on Multi-Transform Combined Features Selected by a Hybrid of ANOVA and BPSO [Volume 2, Number 4] |
 |
Pezhmanpour , Mansoureh
Blind Color Image Steganalysis Based on Multi-Transform Combined Features Selected by a Hybrid of ANOVA and BPSO [Volume 2, Number 4] |
 |
Golsorkhtabaramiri, Mehdi
PSO-based Scheduling Algorithm for Time and Cost Optimization in Mobile Grid [Volume 0, Number 0] |
 |
Zakeri, Fahimeh
PSO-based Scheduling Algorithm for Time and Cost Optimization in Mobile Grid [Volume 0, Number 0] |
 |
Farzinvash, Leili
Online Multicast Routing in Multi-Channel Multi-Radio Wireless Mesh Networks using Network Coding [Volume 0, Number 0] |
 |
Mohamed-pour, Kamal
QAM and PSK Modulation Performance Analysis over Narrow Band HF Channel [Volume 0, Number 0] |
 |
Ismail, Ahmad
QAM and PSK Modulation Performance Analysis over Narrow Band HF Channel [Volume 0, Number 0] |
 |
Khademzadeh, Ahmad
A Power Saving Anti-Collision Algorithm with Tags Clustering and BIBD Method in RFID Systems [Volume 0, Number 0] |
 |
Hossienzadeh, Mehdi
A Power Saving Anti-Collision Algorithm with Tags Clustering and BIBD Method in RFID Systems [Volume 0, Number 0] |
 |
Chekin, Mohsen
A Power Saving Anti-Collision Algorithm with Tags Clustering and BIBD Method in RFID Systems [Volume 0, Number 0] |
 |
Asadi Amiri, Sekine
Improving Image Dynamic Range For An Adaptive Quality Enhancement Using Gamma Correction [Volume 0, Number 0] |
 |
Hassanpour, Hamid
Improving Image Dynamic Range For An Adaptive Quality Enhancement Using Gamma Correction [Volume 0, Number 0] |
 |
Khademzadeh, Ahmad
Decreasing the Average Delay, Connectivity, and Routing Load in Clustered Mobile Ad- Hoc Networks [Volume 10, Number 1] |
 |
Reshadi, Midia
Decreasing the Average Delay, Connectivity, and Routing Load in Clustered Mobile Ad- Hoc Networks [Volume 10, Number 1] |
 |
Sabaei, Masoud
Decreasing the Average Delay, Connectivity, and Routing Load in Clustered Mobile Ad- Hoc Networks [Volume 10, Number 1] |
 |
Assareh, Reza
Decreasing the Average Delay, Connectivity, and Routing Load in Clustered Mobile Ad- Hoc Networks [Volume 10, Number 1] |
 |
Sadough, Seyed Mohammad Sajad
Enhanced Iterative Detection of Hierarchically Modulated Signals using VB-EM Algorithm [Volume 10, Number 1] |
 |
Azad, Mahsa
Enhanced Iterative Detection of Hierarchically Modulated Signals using VB-EM Algorithm [Volume 10, Number 1] |
 |
Harounabadi, Ali
Recommending Friends in Social Networks By Users' Profiles And Using Classification Algorithms [Volume 10, Number 1] |
 |
Dashtizadeh , Paria
Recommending Friends in Social Networks By Users' Profiles And Using Classification Algorithms [Volume 10, Number 1] |
 |
Ghaeini, Hamid Reza
An Incentive Mechanism to Mitigate the Free-riding in VoD Streaming over Hybrid CDN-P2P Networks [Volume 10, Number 1] |
 |
Akbari , Behzad
An Incentive Mechanism to Mitigate the Free-riding in VoD Streaming over Hybrid CDN-P2P Networks [Volume 10, Number 1] |
 |
Ghaffari Sheshjavani , Abdollah
An Incentive Mechanism to Mitigate the Free-riding in VoD Streaming over Hybrid CDN-P2P Networks [Volume 10, Number 1] |
 |
Eghlidos , Taraneh
A Secure Attribute-Based Keyword Search Scheme Against Keyword Guessing And Chosen Keyword Attack [Volume 10, Number 1] |
 |
Mohajeri, Javad
A Secure Attribute-Based Keyword Search Scheme Against Keyword Guessing And Chosen Keyword Attack [Volume 10, Number 1] |
 |
Ameri, Mohammad Hassan
A Secure Attribute-Based Keyword Search Scheme Against Keyword Guessing And Chosen Keyword Attack [Volume 10, Number 1] |
 |
Yousefipoor, Vahid
A Secure Attribute-Based Keyword Search Scheme Against Keyword Guessing And Chosen Keyword Attack [Volume 10, Number 1] |
 |
Hosseinvand, Hamid
Intrusion Detection System Using SVM as Classifier and GA for Optimizing Feature Vectors [Volume 10, Number 1] |
 |
Fekri, Maryam
Intrusion Detection System Using SVM as Classifier and GA for Optimizing Feature Vectors [Volume 10, Number 1] |
 |
Gharaee, Hossein
Intrusion Detection System Using SVM as Classifier and GA for Optimizing Feature Vectors [Volume 10, Number 1] |
 |
Ghassemian , Hassan
Spectral-Spatial Feature Transformations With Controlling Contextual Information Through Smoothing Filtering and Morphological Analysis [Volume 10, Number 1] |
 |
imani, Maryam
Spectral-Spatial Feature Transformations With Controlling Contextual Information Through Smoothing Filtering and Morphological Analysis [Volume 10, Number 1] |
 |
Hendijanifard , Fatemeh
Expert Finding System in E-Learning: Using Concept Maps [Volume 3, Number 1] |
 |
Kardan , Ahmad
Expert Finding System in E-Learning: Using Concept Maps [Volume 3, Number 1] |
 |
Amiri , Ali
Improving the Performance of E-Learning Systems Using Extracted Web Server Log File Suggestions [Volume 3, Number 1] |
 |
Maghsoudi , Behrooz
Improving the Performance of E-Learning Systems Using Extracted Web Server Log File Suggestions [Volume 3, Number 1] |
 |
Sulaimany , Sadegh
Improving the Performance of E-Learning Systems Using Extracted Web Server Log File Suggestions [Volume 3, Number 1] |
 |
Taghiyareh , Fattaneh
Investigating Students' Temporal Behaviors and Evaluation of Faculty through Educational Data Mining [Volume 3, Number 1] |
 |
Orooji , Fatemeh
Investigating Students' Temporal Behaviors and Evaluation of Faculty through Educational Data Mining [Volume 3, Number 1] |
 |
Tavakoli , Maryam
An Intelligent Method for Customizable Adaptive Learning Content Generation [Volume 3, Number 1] |
 |
Gholipour , Ameneh
An Intelligent Method for Customizable Adaptive Learning Content Generation [Volume 3, Number 1] |
 |
Mazaheri , Arya
An Intelligent Method for Customizable Adaptive Learning Content Generation [Volume 3, Number 1] |
 |
Haghshenas , Ehsan
An Intelligent Method for Customizable Adaptive Learning Content Generation [Volume 3, Number 1] |
 |
Eghbali , Neda
A Framework for Learner Preparation and Support in Academic E-learning Environment [Volume 3, Number 1] |
 |
Kardan , Ahmad
A Framework for Learner Preparation and Support in Academic E-learning Environment [Volume 3, Number 1] |
 |
Kharrat , Mahmood
A Framework for Learner Preparation and Support in Academic E-learning Environment [Volume 3, Number 1] |
 |
MirsaeedGhazi , Tahereh
A Framework for Learner Preparation and Support in Academic E-learning Environment [Volume 3, Number 1] |
 |
Nadjar Araabi, Babak
An Ontology-based Framework for Organizing Research Support Contents inE-Learning Environment [Volume 3, Number 1] |
 |
Taghiyareh, Fattaneh
An Ontology-based Framework for Organizing Research Support Contents inE-Learning Environment [Volume 3, Number 1] |
 |
Tayefeh Mahmoudi , Maryam
An Ontology-based Framework for Organizing Research Support Contents inE-Learning Environment [Volume 3, Number 1] |
 |
Montazer , Gholam Ali
Learners Grouping in E-Learning Environment Using Evolutionary Fuzzy Clustering Approach [Volume 3, Number 1] |
 |
Ghorbani , Fatemeh
Learners Grouping in E-Learning Environment Using Evolutionary Fuzzy Clustering Approach [Volume 3, Number 1] |
 |
Ghalamkari , Abdolreza
Knowledge Evaluation Based on Learner Assessment and Utilizing Fuzzy System to Increase the Accuracy of Evaluation [Volume 3, Number 1] |
 |
Naghibizadeh Meybodi , Seyed Mohsen
Knowledge Evaluation Based on Learner Assessment and Utilizing Fuzzy System to Increase the Accuracy of Evaluation [Volume 3, Number 1] |
 |
Tadayon Tabrizi , Ghamarnaz
Knowledge Evaluation Based on Learner Assessment and Utilizing Fuzzy System to Increase the Accuracy of Evaluation [Volume 3, Number 1] |
 |
kardan , Ahmad
Knowledge Evaluation Based on Learner Assessment and Utilizing Fuzzy System to Increase the Accuracy of Evaluation [Volume 3, Number 1] |
 |
Sadeghyan , Babak
Masquerade Detection Using GUI Events in Windows Systems [Volume 3, Number 2] |
 |
Kaghazgaran , Parisa
Masquerade Detection Using GUI Events in Windows Systems [Volume 3, Number 2] |
 |
Noorhoseini , Seyed Majid
Analysing Probabilistic Support Vector Machine Based Localization In Wireless Sensor Networks [Volume 3, Number 2] |
 |
Samadian , Reza
Analysing Probabilistic Support Vector Machine Based Localization In Wireless Sensor Networks [Volume 3, Number 2] |
 |
Gholamian , Mohammad Reza
Credit Scoring Using Colonial Competitive Rule-based Classifier [Volume 3, Number 2] |
 |
Siami , Mohammad
Credit Scoring Using Colonial Competitive Rule-based Classifier [Volume 3, Number 2] |
 |
Taghiyareh , Fattaneh
Credit Scoring Using Colonial Competitive Rule-based Classifier [Volume 3, Number 2] |
 |
Basiri , Javad
Credit Scoring Using Colonial Competitive Rule-based Classifier [Volume 3, Number 2] |
 |
Tayefeh Mahmoudi , Maryam
Customizing Feature Decision Fusion Model using Information Gain, Chi-Square and Ordered Weighted Averaging for Text Classification [Volume 3, Number 2] |
 |
Yazdani , Nasser
Customizing Feature Decision Fusion Model using Information Gain, Chi-Square and Ordered Weighted Averaging for Text Classification [Volume 3, Number 2] |
 |
Moshiri , Behzad
Customizing Feature Decision Fusion Model using Information Gain, Chi-Square and Ordered Weighted Averaging for Text Classification [Volume 3, Number 2] |
 |
Ghaderi , Mohammad Ali
Customizing Feature Decision Fusion Model using Information Gain, Chi-Square and Ordered Weighted Averaging for Text Classification [Volume 3, Number 2] |
 |
Farzaneh , Forouhar
A Study of the Effect of Diffraction and Rough Surface Scattering Modeling on Ray Tracing Results in an Urban Environment at 60 GHz [Volume 3, Number 2] |
 |
Shishegar , Amir Ahmad
A Study of the Effect of Diffraction and Rough Surface Scattering Modeling on Ray Tracing Results in an Urban Environment at 60 GHz [Volume 3, Number 2] |
 |
Eslami Rasekh , Maryam
A Study of the Effect of Diffraction and Rough Surface Scattering Modeling on Ray Tracing Results in an Urban Environment at 60 GHz [Volume 3, Number 2] |
 |
Afrooz , Kambiz
Optimization and Fully Distributed Analysis of Single Pole Single Throw Traveling Wave Switchesat Millimeter Wave Frequency Band [Volume 3, Number 2] |
 |
Abdipour , Abdolali
Optimization and Fully Distributed Analysis of Single Pole Single Throw Traveling Wave Switchesat Millimeter Wave Frequency Band [Volume 3, Number 2] |
 |
Moradi , Gholamreza
Optimization and Fully Distributed Analysis of Single Pole Single Throw Traveling Wave Switchesat Millimeter Wave Frequency Band [Volume 3, Number 2] |
 |
Khoshniyat , Hamed
Optimization and Fully Distributed Analysis of Single Pole Single Throw Traveling Wave Switchesat Millimeter Wave Frequency Band [Volume 3, Number 2] |
 |
Yousefi , Behnaz
Low Cost Millimeter Wave Duplexer Design Using Mixed Mode Matching and Integral Contour Methods [Volume 3, Number 2] |
 |
Henke , Heino
Low Cost Millimeter Wave Duplexer Design Using Mixed Mode Matching and Integral Contour Methods [Volume 3, Number 2] |
 |
Banai , Ali
Low Cost Millimeter Wave Duplexer Design Using Mixed Mode Matching and Integral Contour Methods [Volume 3, Number 2] |
 |
Ghanadi , Mehdi
Low Cost Millimeter Wave Duplexer Design Using Mixed Mode Matching and Integral Contour Methods [Volume 3, Number 2] |
 |
Kamarei , Mahmoud
An Improved Active Mixer Architecture for Millimeter Wave Applications [Volume 3, Number 2] |
 |
Zeinolabedinzadeh , Saeed
An Improved Active Mixer Architecture for Millimeter Wave Applications [Volume 3, Number 2] |
 |
Khoshbin Ghasem, Hossein
A Novel DS-CDMA Direction of Arrival Estimator for Frequency- Selective Fading Channel with Correlated Multipath by Using Beamforming Filter [Volume 3, Number 3] |
 |
Hosseini Karani , S. Bagher
A Novel DS-CDMA Direction of Arrival Estimator for Frequency- Selective Fading Channel with Correlated Multipath by Using Beamforming Filter [Volume 3, Number 3] |
 |
Abed Hodtani , Ghosheh
A Novel DS-CDMA Direction of Arrival Estimator for Frequency- Selective Fading Channel with Correlated Multipath by Using Beamforming Filter [Volume 3, Number 3] |
 |
Samsami Khodadad , Farid
A Novel DS-CDMA Direction of Arrival Estimator for Frequency- Selective Fading Channel with Correlated Multipath by Using Beamforming Filter [Volume 3, Number 3] |
 |
Navaie , Keivan
A Stochastic Geometry Analysis of Hybrid Cellular-Adhoc CDMA Networks [Volume 3, Number 3] |
 |
Banivaheb , Neda
A Stochastic Geometry Analysis of Hybrid Cellular-Adhoc CDMA Networks [Volume 3, Number 3] |
 |
Ardebilipour , Mehrdad
Joint Power Adaptation and Interference Avoidance for Unlicensed Wireless Systems: A Game Theoretic Approach [Volume 3, Number 3] |
 |
Mahboobi , Behrad
Joint Power Adaptation and Interference Avoidance for Unlicensed Wireless Systems: A Game Theoretic Approach [Volume 3, Number 3] |
 |
Beheshti , Seyed Mohsen
Joint Power Adaptation and Interference Avoidance for Unlicensed Wireless Systems: A Game Theoretic Approach [Volume 3, Number 3] |
 |
Abdipour , Abdolali
Joint Antenna Selection and Adaptive Modulation in MIMO Systems in the Presence of CSI Imperfection [Volume 3, Number 3] |
 |
Mohammadi , Abbas
Joint Antenna Selection and Adaptive Modulation in MIMO Systems in the Presence of CSI Imperfection [Volume 3, Number 3] |
 |
Hamedanian , Mahshad
Joint Antenna Selection and Adaptive Modulation in MIMO Systems in the Presence of CSI Imperfection [Volume 3, Number 3] |
 |
Abolhassani , Bahman
A Novel Blind Spectrum Sensing Algorithm for Cognitive Radio Systems Based on Algorithmic Information Theory [Volume 3, Number 3] |
 |
Balaneshin Kordan , Saeid
A Novel Blind Spectrum Sensing Algorithm for Cognitive Radio Systems Based on Algorithmic Information Theory [Volume 3, Number 3] |
 |
Salari , Soheil
Bayesian-Based Cooperative Framework for Spectrum Sensing in Cognitive Radio Networks [Volume 3, Number 3] |
 |
Ahmadian , Mahmoud
Bayesian-Based Cooperative Framework for Spectrum Sensing in Cognitive Radio Networks [Volume 3, Number 3] |
 |
Reisi , Nima
Bayesian-Based Cooperative Framework for Spectrum Sensing in Cognitive Radio Networks [Volume 3, Number 3] |
 |
Jamali Kooshkghazi , Vahid
Bayesian-Based Cooperative Framework for Spectrum Sensing in Cognitive Radio Networks [Volume 3, Number 3] |
 |
Sadeghi , Hamed
A Low-Complexity Cyclostationary-Based Detection Method for Cooperative Spectrum Sensing in Cognitive Radio Networks [Volume 3, Number 3] |
 |
Azmi , Paeiz
A Low-Complexity Cyclostationary-Based Detection Method for Cooperative Spectrum Sensing in Cognitive Radio Networks [Volume 3, Number 3] |
 |
Arezumand , Hamid
A Low-Complexity Cyclostationary-Based Detection Method for Cooperative Spectrum Sensing in Cognitive Radio Networks [Volume 3, Number 3] |
 |
Khadem Zadeh , Ahmad
Design of a Cellular Sugarscape Environment to Increase the Learning Speed in a Stochastic Multi-agent Network [Volume 3, Number 4] |
 |
Setayeshi , Saeed
Design of a Cellular Sugarscape Environment to Increase the Learning Speed in a Stochastic Multi-agent Network [Volume 3, Number 4] |
 |
Nourafza , Nasim
Design of a Cellular Sugarscape Environment to Increase the Learning Speed in a Stochastic Multi-agent Network [Volume 3, Number 4] |
 |
Masoumi , Nasser
Sensitivity Analysis of Shielded Coupled Interconnects for RFIC Applications [Volume 3, Number 4] |
 |
Moghaddam Tabrizi , Mohammad
Sensitivity Analysis of Shielded Coupled Interconnects for RFIC Applications [Volume 3, Number 4] |
 |
Adjeroh , Donald
Priority Based Congestion Control and Partial Reliability Guaranty Protocol for Wireless Multimedia Sensor Networks [Volume 3, Number 4] |
 |
Yaghmaee Moghaddam , Mohammad Hossein
Priority Based Congestion Control and Partial Reliability Guaranty Protocol for Wireless Multimedia Sensor Networks [Volume 3, Number 4] |
 |
Rahmati , Mehdi
Throughput Improvement of Cooperative System Using Adaptive Relaying & Adaptive Modulation [Volume 3, Number 4] |
 |
Vakil , Vahideh
Throughput Improvement of Cooperative System Using Adaptive Relaying & Adaptive Modulation [Volume 3, Number 4] |
 |
Sadough , Seyed Mohammad Sajad
An Improved Blind Spectrum Sensing Technique for Cognitive Radio Systems [Volume 3, Number 4] |
 |
Sadeghi Ivrigh , Siavash
An Improved Blind Spectrum Sensing Technique for Cognitive Radio Systems [Volume 3, Number 4] |
 |
Tafaghodi Khajavi , Navid
An Improved Blind Spectrum Sensing Technique for Cognitive Radio Systems [Volume 3, Number 4] |
 |
Eftekhari Moghadam, Amir masoud
An Image Annotation Method Based on CM Similarity Measure and Hybrid Relevance Feedback [Volume 3, Number 4] |
 |
Javani , Mehran
An Image Annotation Method Based on CM Similarity Measure and Hybrid Relevance Feedback [Volume 3, Number 4] |
 |
Hanafizadeh , Payam
Taxonomy of Information Society Measures [Volume 3, Number 4] |
 |
Rezaei , Mehdi
Content-Based Image Retrieval for Tourism Application Using Handheld Devices [Volume 4, Number 1] |
 |
Mohanna , Farahnaz
Content-Based Image Retrieval for Tourism Application Using Handheld Devices [Volume 4, Number 1] |
 |
Raisi , Zobeir
Content-Based Image Retrieval for Tourism Application Using Handheld Devices [Volume 4, Number 1] |
 |
Moghadam Charkari , Nasrollah
Improvement of Supervised Shape Retrieval by Learning the Manifold Space [Volume 4, Number 1] |
 |
Zare Chahooki, Mohammad Ali
Improvement of Supervised Shape Retrieval by Learning the Manifold Space [Volume 4, Number 1] |
 |
Ghani Shayesteh , Mahrokh
An Automatic Contrast Enhancement Technique Using Combination of Histogram-Based Methods [Volume 4, Number 1] |
 |
Soleymani , Roghayeh
An Automatic Contrast Enhancement Technique Using Combination of Histogram-Based Methods [Volume 4, Number 1] |
 |
Baleghi , Yasser
Efficient Object Tracking Using Optimized K-means Segmentation and Radial Basis Function Neural Networks [Volume 4, Number 1] |
 |
Karami , MohammadReza
Efficient Object Tracking Using Optimized K-means Segmentation and Radial Basis Function Neural Networks [Volume 4, Number 1] |
 |
Asvadi , Alireza
Efficient Object Tracking Using Optimized K-means Segmentation and Radial Basis Function Neural Networks [Volume 4, Number 1] |
 |
P.R. Hasanzadeh , Reza
Static Persian Sign Language Recognition Using Kernel-Based Feature Extraction [Volume 4, Number 1] |
 |
Nahvi , Manoochehr
Static Persian Sign Language Recognition Using Kernel-Based Feature Extraction [Volume 4, Number 1] |
 |
Moghaddam , Milad
Static Persian Sign Language Recognition Using Kernel-Based Feature Extraction [Volume 4, Number 1] |
 |
Ebrahimnezhad , Hossein
A Novel 3D Object Categorization and Retrieval System Using Geometric Features [Volume 4, Number 1] |
 |
Ramezani , Mohammad
A Novel 3D Object Categorization and Retrieval System Using Geometric Features [Volume 4, Number 1] |
 |
Eftekhari Moghadam , Amir Masoud
A Multilevel Thresholding Approach Based on L´evy-Flight Firefly Algorithm for Image Segmentation [Volume 4, Number 1] |
 |
Vojodi , Hakimeh
A Multilevel Thresholding Approach Based on L´evy-Flight Firefly Algorithm for Image Segmentation [Volume 4, Number 1] |
 |
Hassanzadeh , Tahereh
A Multilevel Thresholding Approach Based on L´evy-Flight Firefly Algorithm for Image Segmentation [Volume 4, Number 1] |
 |
Ghanbari , Vahid
Data Mining in the E-Learning Systems: A Virtual University Case Study [Volume 4, Number 2] |
 |
Hani, SSeyed Hassan
Data Mining in the E-Learning Systems: A Virtual University Case Study [Volume 4, Number 2] |
 |
Minaei Bidgoli , Behrouz
Data Mining in the E-Learning Systems: A Virtual University Case Study [Volume 4, Number 2] |
 |
Delavar , Mahshid
Ontological Modeling of Radio Frequency Identification(RFID)Attacks [Volume 4, Number 2] |
 |
Salahi , Ahmad
Ontological Modeling of Radio Frequency Identification(RFID)Attacks [Volume 4, Number 2] |
 |
Asosheh , Abbas
E-business Integrated Test Framework Model [Volume 4, Number 2] |
 |
Vejdan Tamar, Pasha
E-business Integrated Test Framework Model [Volume 4, Number 2] |
 |
Homayounpour , Mohammad Mehdi
Performance Improvement of Language Identification Using Transcription Based Sequential Approaches & Sequential Kernels Based SVM [Volume 4, Number 2] |
 |
Hosseini Amereei, Seyed Abbas
Performance Improvement of Language Identification Using Transcription Based Sequential Approaches & Sequential Kernels Based SVM [Volume 4, Number 2] |
 |
Ansarinia , Morteza
Predicting Network Attacks Using Ontology-Driven Inference [Volume 4, Number 2] |
 |
Salahi , Ahmad
Predicting Network Attacks Using Ontology-Driven Inference [Volume 4, Number 2] |
 |
Khoshniat , Hessam
E-Learners’ Activity Categorization Based on Their Learning Styles Using ART Family Neural Network [Volume 4, Number 2] |
 |
Montazer , Gholam Ali
E-Learners’ Activity Categorization Based on Their Learning Styles Using ART Family Neural Network [Volume 4, Number 2] |
 |
Moghadam Charkari , Nasrollah
Optimized Regression in Sensor Networks by Integration of Harmony Search and Particle Swarm Optimization [Volume 4, Number 2] |
 |
Shakibian , Hadi
Optimized Regression in Sensor Networks by Integration of Harmony Search and Particle Swarm Optimization [Volume 4, Number 2] |
 |
Mahaki , Leili
Improving the Quality of Service in the VANET by Detecting and Removing Unused Messages [Volume 4, Number 3] |
 |
Fathy , Mahmood
Improving the Quality of Service in the VANET by Detecting and Removing Unused Messages [Volume 4, Number 3] |
 |
Sayadi , Mohammad Javad
Improving the Quality of Service in the VANET by Detecting and Removing Unused Messages [Volume 4, Number 3] |
 |
Fathy , Mahmood
A Visual Tracking Algorithm Based on CAMShift and Motion Segmentation [Volume 4, Number 3] |
 |
Emami , Ebrahim
A Visual Tracking Algorithm Based on CAMShift and Motion Segmentation [Volume 4, Number 3] |
 |
Granpayeh , Nosrat
All Optical Logic Gates: A Tutorial [Volume 4, Number 3] |
 |
Davoodi , Fatemeh
All Optical Logic Gates: A Tutorial [Volume 4, Number 3] |
 |
Abdollahi Azgomi , Mohammad
Cyber Attack Simulation for Operational Security Evaluation Using Coloured Petri Nets [Volume 4, Number 3] |
 |
Ashtiani , Mehrdad
Cyber Attack Simulation for Operational Security Evaluation Using Coloured Petri Nets [Volume 4, Number 3] |
 |
Chai , Qi
Forgery Attack is a Piece of Cake on a Class of Mutual Authentication Protocols [Volume 4, Number 3] |
 |
Luo , Yiyuan
Forgery Attack is a Piece of Cake on a Class of Mutual Authentication Protocols [Volume 4, Number 3] |
 |
Naderi , Majid
Forgery Attack is a Piece of Cake on a Class of Mutual Authentication Protocols [Volume 4, Number 3] |
 |
Safkhani , Masoumeh
Forgery Attack is a Piece of Cake on a Class of Mutual Authentication Protocols [Volume 4, Number 3] |
 |
Bagheri , Nasour
Forgery Attack is a Piece of Cake on a Class of Mutual Authentication Protocols [Volume 4, Number 3] |
 |
Eshghi , Mohammad
Image Encryption Using Tent Chaotic Map and Arnold Cat Map [Volume 4, Number 3] |
 |
Hasani , Elham
Image Encryption Using Tent Chaotic Map and Arnold Cat Map [Volume 4, Number 3] |
 |
Hosseini Andargoli , Seyed Mehdi
Decision Feedback Channel Estimation for Alamouti Coded OFDM Systems [Volume 4, Number 3] |
 |
Mohamedpour , Kamal
Decision Feedback Channel Estimation for Alamouti Coded OFDM Systems [Volume 4, Number 3] |
 |
Hoseinzade , Masoud
Decision Feedback Channel Estimation for Alamouti Coded OFDM Systems [Volume 4, Number 3] |
 |
Nakhai Kamalabadi , Isa
A Multi-Dimensional Recommendation Framework for Learning Material by Naive Bayes Classifier [Volume 4, Number 3] |
 |
Salehi , Mojtaba
A Multi-Dimensional Recommendation Framework for Learning Material by Naive Bayes Classifier [Volume 4, Number 3] |
 |
Moghaddam Charkari, Nasrollah
An Improved Recommender System Based on Forgetting Mechanism for User Interest-Drifting [Volume 4, Number 4] |
 |
Taghi Hamidi Beheshti, Mohammad
An Improved Recommender System Based on Forgetting Mechanism for User Interest-Drifting [Volume 4, Number 4] |
 |
Tavakolian , Rozita
An Improved Recommender System Based on Forgetting Mechanism for User Interest-Drifting [Volume 4, Number 4] |
 |
Eftekhari Moghadam , Amir Masoud
Artificial Immune Classifier (aiCLS): An Immune Inspired Supervised Machine Learning Method [Volume 4, Number 4] |
 |
Ehsani , Seyed Amir
Artificial Immune Classifier (aiCLS): An Immune Inspired Supervised Machine Learning Method [Volume 4, Number 4] |
 |
Badie , Kambiz
Context Aware Mental Model Sharing in Dynamic Inaccessible Environments [Volume 4, Number 4] |
 |
Saffar , Mohammad
Context Aware Mental Model Sharing in Dynamic Inaccessible Environments [Volume 4, Number 4] |
 |
Taghiyareh , Fattaneh
Context Aware Mental Model Sharing in Dynamic Inaccessible Environments [Volume 4, Number 4] |
 |
Salehi , Sajjad
Context Aware Mental Model Sharing in Dynamic Inaccessible Environments [Volume 4, Number 4] |
 |
Zareh Bidoki , Ali Mohammad
IECA: Intelligent Effective Crawling Algorithm for Web Pages [Volume 4, Number 4] |
 |
Golshani , Mohammad Amin
IECA: Intelligent Effective Crawling Algorithm for Web Pages [Volume 4, Number 4] |
 |
Zargari , Farzad
An Automatic Image Annotation Technique Based on Coverage Ratio of Tags [Volume 4, Number 4] |
 |
Abdolhoseini , Ali
An Automatic Image Annotation Technique Based on Coverage Ratio of Tags [Volume 4, Number 4] |
 |
Sepas Moghaddam , Alireza
JPEG Compressed Domain Face Recognition:Different Stages and Different Features [Volume 4, Number 4] |
 |
Moin , Mohammad Shahram
JPEG Compressed Domain Face Recognition:Different Stages and Different Features [Volume 4, Number 4] |
 |
Hashemi , Masoud Reza
Route Lookup Algorithms Using the Novel Idea of Coded Prefix Trees [Volume 4, Number 4] |
 |
Saidi , Hossein
Route Lookup Algorithms Using the Novel Idea of Coded Prefix Trees [Volume 4, Number 4] |
 |
Behdadfar , Mohammad
Route Lookup Algorithms Using the Novel Idea of Coded Prefix Trees [Volume 4, Number 4] |
 |
Mansouri , Mohsen
A New Blind Signature Scheme Based on Improved ElGamal Signature Scheme [Volume 5, Number 1] |
 |
Zaghian , Ali
A New Blind Signature Scheme Based on Improved ElGamal Signature Scheme [Volume 5, Number 1] |
 |
Yari , Alireza
Persian to English Personal Name Transliteration Based On the Persian Web Contents [Volume 5, Number 1] |
 |
Zareh Bidoki , Ali Mohammad
Persian to English Personal Name Transliteration Based On the Persian Web Contents [Volume 5, Number 1] |
 |
Haghollahi , Zohre
Persian to English Personal Name Transliteration Based On the Persian Web Contents [Volume 5, Number 1] |
 |
Khadivi , Shahram
Statistical Machine Translation (SMT) for Highly-Inflectional Scarce-Resource Language [Volume 5, Number 1] |
 |
Faili, Hesham
Statistical Machine Translation (SMT) for Highly-Inflectional Scarce-Resource Language [Volume 5, Number 1] |
 |
Namdar , Saman
Statistical Machine Translation (SMT) for Highly-Inflectional Scarce-Resource Language [Volume 5, Number 1] |
 |
Noorani , Seyede Fatemeh
Evaluating the Effect of Learner’s Knowledge, Background, and Attention’s on Trust Using Open Learner Model [Volume 5, Number 1] |
 |
Modaberi , Somayeh
Evaluating the Effect of Learner’s Knowledge, Background, and Attention’s on Trust Using Open Learner Model [Volume 5, Number 1] |
 |
A. Kardan , Ahmad
Evaluating the Effect of Learner’s Knowledge, Background, and Attention’s on Trust Using Open Learner Model [Volume 5, Number 1] |
 |
Kasaei , Shohreh
A Semi-Supervised Method for Multimodal Classification of Consumer Videos [Volume 5, Number 1] |
 |
Tavassolipour , Mostafa
A Semi-Supervised Method for Multimodal Classification of Consumer Videos [Volume 5, Number 1] |
 |
Karimian , Mahmood
A Semi-Supervised Method for Multimodal Classification of Consumer Videos [Volume 5, Number 1] |
 |
Saadat , Mahmood
Non-Homogeneous Cluster Head Selection for Energy-Aware Hierarchical Routing Protocols in Wireless Sensor Networks [Volume 5, Number 1] |
 |
Saadat , Reza
Non-Homogeneous Cluster Head Selection for Energy-Aware Hierarchical Routing Protocols in Wireless Sensor Networks [Volume 5, Number 1] |
 |
Fahimi , Mina
A Mobility Based Cooperative MAC Protocol for Wireless Networks [Volume 5, Number 1] |
 |
Ghasemi , Abdorasoul
A Mobility Based Cooperative MAC Protocol for Wireless Networks [Volume 5, Number 1] |
 |
Soleiman Meiguni , Javad
Analysis Method for Spherical Dipole Antenna Array [Volume 5, Number 2] |
 |
Kamyab , Manoochehr
Analysis Method for Spherical Dipole Antenna Array [Volume 5, Number 2] |
 |
Hosseinbeig , Ahmad
Analysis Method for Spherical Dipole Antenna Array [Volume 5, Number 2] |
 |
Sayadian , Abolghasem
Speaker-Dependent Speech Enhancement Using Codebook-based Synthesis for Low SNR Applications [Volume 5, Number 2] |
 |
Doost, Roghayeh
Speaker-Dependent Speech Enhancement Using Codebook-based Synthesis for Low SNR Applications [Volume 5, Number 2] |
 |
Fakoor , Vahid
Optimized Task Scheduling for Estimation in Wireless Sensor Networks [Volume 5, Number 2] |
 |
Yaghmaee , Mohammad Hossein
Optimized Task Scheduling for Estimation in Wireless Sensor Networks [Volume 5, Number 2] |
 |
Mohajerzadeh , Amir Hossein
Optimized Task Scheduling for Estimation in Wireless Sensor Networks [Volume 5, Number 2] |
 |
Saeedi Sourck, Hamid
Superposition Network Coding for Wireless Cooperative Communication [Volume 5, Number 2] |
 |
Omidi , Mohammad Javad
Superposition Network Coding for Wireless Cooperative Communication [Volume 5, Number 2] |
 |
Fazeli , Ali
Superposition Network Coding for Wireless Cooperative Communication [Volume 5, Number 2] |
 |
Razavizadeh , Seyed Mohammad
Cooperative Filter-and-Forward Beamforming in Cognitive Radio Relay Networks [Volume 5, Number 2] |
 |
Kahaei , Mohammad Hossein
Cooperative Filter-and-Forward Beamforming in Cognitive Radio Relay Networks [Volume 5, Number 2] |
 |
Mohammadkhani, Saeideh
Cooperative Filter-and-Forward Beamforming in Cognitive Radio Relay Networks [Volume 5, Number 2] |
 |
Fakhraie , Sied Mehdi
Deep Out-of-Band Radiation Reduction By Using Joint Filterbank and Cancellation Carriers in Cognitive Radios [Volume 5, Number 2] |
 |
Aliasgari , Mohammad
Deep Out-of-Band Radiation Reduction By Using Joint Filterbank and Cancellation Carriers in Cognitive Radios [Volume 5, Number 2] |
 |
Tavakoli , Saeed
Optimum Indoor Signal Coverage of Dense Distributed Receivers via Ray Tracing Coupled with Genetic Algorithm [Volume 5, Number 2] |
 |
Ahmadi Shokouh , Javad
Optimum Indoor Signal Coverage of Dense Distributed Receivers via Ray Tracing Coupled with Genetic Algorithm [Volume 5, Number 2] |
 |
Talepour , Zeinab
Optimum Indoor Signal Coverage of Dense Distributed Receivers via Ray Tracing Coupled with Genetic Algorithm [Volume 5, Number 2] |
 |
brahim , Suhaimi I
A Framework for Evaluation of SQL Injection Detection and Prevention Tools [Volume 5, Number 3] |
 |
Tajpour , Atefeh
A Framework for Evaluation of SQL Injection Detection and Prevention Tools [Volume 5, Number 3] |
 |
Yari , Alireza
Quality Improvement of Information Retrieval System Results by Document Classification [Volume 5, Number 3] |
 |
Shiry Ghidary , Saeed
Quality Improvement of Information Retrieval System Results by Document Classification [Volume 5, Number 3] |
 |
Farhoodi , Mojgan
Quality Improvement of Information Retrieval System Results by Document Classification [Volume 5, Number 3] |
 |
Taghiyareh , Fattaneh
A Mutual Independent Cascade Model for Customer Behavior Propagation [Volume 5, Number 3] |
 |
Nazemian , Ali
A Mutual Independent Cascade Model for Customer Behavior Propagation [Volume 5, Number 3] |
 |
Ghaznavi Ghoushchi , Mohammad Bagher
A New Adaptive Hybrid Recommender Framework for Learning Material Recommendation [Volume 5, Number 3] |
 |
Nakhai Kamalabadi , Isa
A New Adaptive Hybrid Recommender Framework for Learning Material Recommendation [Volume 5, Number 3] |
 |
Salehi , Mojtaba
A New Adaptive Hybrid Recommender Framework for Learning Material Recommendation [Volume 5, Number 3] |
 |
Analoui , Morteza
Evaluating Fidelity of Persian-English Sentence-Aligned Parallel Corpus [Volume 5, Number 3] |
 |
Mashayekhi , Masoomeh
Evaluating Fidelity of Persian-English Sentence-Aligned Parallel Corpus [Volume 5, Number 3] |
 |
Motamedi , Mohammad
Accelarated Optical Character Recognition on Graphics Processing Units [Volume 5, Number 3] |
 |
Arianyan , Iman
Accelarated Optical Character Recognition on Graphics Processing Units [Volume 5, Number 3] |
 |
Motamedi , Seyed Ahmad
Accelarated Optical Character Recognition on Graphics Processing Units [Volume 5, Number 3] |
 |
Arianyan , Ehsan
Accelarated Optical Character Recognition on Graphics Processing Units [Volume 5, Number 3] |
 |
Ahmadi , Mohammad Reza
A Dynamic Resource Allocation Method for Virtual Datacenter Resources Using CoCo-VM Approach [Volume 5, Number 3] |
 |
Abed Hodtani , Ghosheh
Capacity Region of the Compound Multiple Access Channels with Common Message and in the Presence of Intersymbol Interference [Volume 6, Number 2] |
 |
Seyedin, Seyed Alireza
Capacity Region of the Compound Multiple Access Channels with Common Message and in the Presence of Intersymbol Interference [Volume 6, Number 2] |
 |
Monemizadeh , Mostafa
Capacity Region of the Compound Multiple Access Channels with Common Message and in the Presence of Intersymbol Interference [Volume 6, Number 2] |
 |
Akbari , Mohammad Kazem
Increasing the Total Efficiently Executed Work on Volunteer Computing Environment Based on Work Send Policy [Volume 5, Number 4] |
 |
Kianpishe , Tayebe
Increasing the Total Efficiently Executed Work on Volunteer Computing Environment Based on Work Send Policy [Volume 5, Number 4] |
 |
Arabsorkhi , Mohsen
Using Synchronous TAG for Source-Side Reordering in SMT [Volume 5, Number 4] |
 |
Faili , Heshaam
Using Synchronous TAG for Source-Side Reordering in SMT [Volume 5, Number 4] |
 |
Fadaei , Hakimeh
Using Synchronous TAG for Source-Side Reordering in SMT [Volume 5, Number 4] |
 |
Mansouri , Amin
Using Synchronous TAG for Source-Side Reordering in SMT [Volume 5, Number 4] |
 |
Sadeghi , Mohammad Taghi
Face Verification Using Local Binary Patterns and Sparse Representation Techniques [Volume 5, Number 4] |
 |
Amidi , Yalda
Face Verification Using Local Binary Patterns and Sparse Representation Techniques [Volume 5, Number 4] |
 |
Akbari , Behzad
A New Method for Evaluating Video Quality of Experience on Content-Aware Packet Loss Effect Analysis [Volume 5, Number 4] |
 |
Mandegar , Amir Hossein
A New Method for Evaluating Video Quality of Experience on Content-Aware Packet Loss Effect Analysis [Volume 5, Number 4] |
 |
Mehrjoo , Mehri
A Two-Dimensional Maximum Likelihood Parameter Estimation of Г-Г Distribution for Free Space Optical Channels with Weak Turbulence Conditions [Volume 5, Number 4] |
 |
Kazeminia , Mahdi
A Two-Dimensional Maximum Likelihood Parameter Estimation of Г-Г Distribution for Free Space Optical Channels with Weak Turbulence Conditions [Volume 5, Number 4] |
 |
Yazdani , Nasser
From Reliable Distributed System Toward Reliable Cloud by Cat Swarm Optimization [Volume 5, Number 4] |
 |
Faragardi , Hamid Reza
From Reliable Distributed System Toward Reliable Cloud by Cat Swarm Optimization [Volume 5, Number 4] |
 |
Shojaee , Reza
From Reliable Distributed System Toward Reliable Cloud by Cat Swarm Optimization [Volume 5, Number 4] |
 |
Keshavarz , Hengameh
User Capacity Scaling Laws for Fading Broadcast Channels Affected by Channel Estimation [Volume 5, Number 4] |
 |
Eslami , Ali
User Capacity Scaling Laws for Fading Broadcast Channels Affected by Channel Estimation [Volume 5, Number 4] |
 |
Taghiyareh , Fattaneh
A Semantic Domain-Specific Framework to Assist Researchers in Screening Contents [Volume 6, Number 1] |
 |
Tayefeh Mahmoudi , Maryam
A Semantic Domain-Specific Framework to Assist Researchers in Screening Contents [Volume 6, Number 1] |
 |
Faili , Heshaam
Learning to Exploit Different Translation Resources for Cross Language Information Retrieval [Volume 6, Number 1] |
 |
Shakery , Azadeh
Learning to Exploit Different Translation Resources for Cross Language Information Retrieval [Volume 6, Number 1] |
 |
Azarbonyad , Hosein
Learning to Exploit Different Translation Resources for Cross Language Information Retrieval [Volume 6, Number 1] |
 |
Zareh Bidoki , Ali Mohammad
Web Page Streams and Relevance Propagation for Topic Distillation [Volume 6, Number 1] |
 |
Golshani , Mohammad Amin
Web Page Streams and Relevance Propagation for Topic Distillation [Volume 6, Number 1] |
 |
Hosseinzadeh , Mehdi
Improved Mapping Algorithms Performance in NoCs Design Based on Cellular Learning Automata [Volume 6, Number 1] |
 |
Khademzadeh , Ahmad
Improved Mapping Algorithms Performance in NoCs Design Based on Cellular Learning Automata [Volume 6, Number 1] |
 |
Keley , Mohammad Bagher
Improved Mapping Algorithms Performance in NoCs Design Based on Cellular Learning Automata [Volume 6, Number 1] |
 |
Pakravan , Mohammad Reza
A Survey of Advanced Search Techniques in Unstructured P2P Networks [Volume 6, Number 1] |
 |
Sharifkhani , Fatemeh
A Survey of Advanced Search Techniques in Unstructured P2P Networks [Volume 6, Number 1] |
 |
Khansari , Mohammad
A Cross Layer Method for Efficient Video Delivery Based on TPGF Routing in WMSN [Volume 6, Number 1] |
 |
Sheikh Bagheri Arjmand , Mehdi
A Cross Layer Method for Efficient Video Delivery Based on TPGF Routing in WMSN [Volume 6, Number 1] |
 |
Aghaeinia , Hassan
An Opportunistic Cooperative Approach for Dynamic Spectrum Leasing in Cognitive Radio Networks [Volume 6, Number 1] |
 |
Ghamari Adian , Mehdi
An Opportunistic Cooperative Approach for Dynamic Spectrum Leasing in Cognitive Radio Networks [Volume 6, Number 1] |
 |
Abadi , Mahdi
TrPLS: Preserving Privacy in Trajectory Data Publishing by Personalized Local Suppression [Volume 6, Number 2] |
 |
Ghasemi Komishani , Elahe
TrPLS: Preserving Privacy in Trajectory Data Publishing by Personalized Local Suppression [Volume 6, Number 2] |
 |
Manian , Amir
How Open Source Software Succeeds? A Review of Research on Success of Open Source Software [Volume 6, Number 2] |
 |
Khansari , Mohammad
How Open Source Software Succeeds? A Review of Research on Success of Open Source Software [Volume 6, Number 2] |
 |
Amrollahi , Alireza
How Open Source Software Succeeds? A Review of Research on Success of Open Source Software [Volume 6, Number 2] |
 |
Afsharchi , Mohsen
A Scalable Algorithm to Solve Distributed Constraint Optimization [Volume 6, Number 2] |
 |
Bigdeli , Elnaz
A Scalable Algorithm to Solve Distributed Constraint Optimization [Volume 6, Number 2] |
 |
Rahmaninia , Maryam
A Scalable Algorithm to Solve Distributed Constraint Optimization [Volume 6, Number 2] |
 |
Tarokh , Mohammad Jafar
A Cluster-Based Similarity Fusion Approach for Scaling-Up Collaborative Filtering Recommender System [Volume 6, Number 2] |
 |
Gohari , Faezeh Sadat
A Cluster-Based Similarity Fusion Approach for Scaling-Up Collaborative Filtering Recommender System [Volume 6, Number 2] |
 |
Homayouni , Hajar
Automatic Test Case Generation for Modern Web Applications Using Population-Based Automatic Fuzzy Neural Network [Volume 6, Number 2] |
 |
Keyvanpour , Mohammad Reza
Automatic Test Case Generation for Modern Web Applications Using Population-Based Automatic Fuzzy Neural Network [Volume 6, Number 2] |
 |
Faili , Heshaam
Phrase Alignments in Parallel Corpus Using Bootstrapping Approach [Volume 6, Number 3] |
 |
Tavakoli , Leila
Phrase Alignments in Parallel Corpus Using Bootstrapping Approach [Volume 6, Number 3] |
 |
Zarrinkalam , Fattane
A Review of the Distributed Methods for Large-Scale Social Network Analysis [Volume 6, Number 3] |
 |
Abrishami , Saeid
A Review of the Distributed Methods for Large-Scale Social Network Analysis [Volume 6, Number 3] |
 |
Kahani , Mohsen
A Review of the Distributed Methods for Large-Scale Social Network Analysis [Volume 6, Number 3] |
 |
Dastranj , Nasrin
A Virtual Research Management Enterprise Architecture Using Axiomatic Design [Volume 6, Number 3] |
 |
Sadeghi , Masoomeh
A Virtual Research Management Enterprise Architecture Using Axiomatic Design [Volume 6, Number 3] |
 |
Asosheh , Abbas
A Virtual Research Management Enterprise Architecture Using Axiomatic Design [Volume 6, Number 3] |
 |
Sharifi , Ali
A Virtual Research Management Enterprise Architecture Using Axiomatic Design [Volume 6, Number 3] |
 |
Shakery , Azadeh
Analyzing Content-based Heuristics for Persian Web Spam Detection [Volume 6, Number 3] |
 |
Rabbani , Elahe
Analyzing Content-based Heuristics for Persian Web Spam Detection [Volume 6, Number 3] |
 |
Sheikhzadeh , Hamid
Binaural Speech Separation Using Binary and Ratio Time-Frequency Masks [Volume 6, Number 3] |
 |
Soltanian-Zadeh , Hamid
Binaural Speech Separation Using Binary and Ratio Time-Frequency Masks [Volume 6, Number 3] |
 |
Abutalebi , Hamidreza
Binaural Speech Separation Using Binary and Ratio Time-Frequency Masks [Volume 6, Number 3] |
 |
Mahmoodzadeh , Azar
Binaural Speech Separation Using Binary and Ratio Time-Frequency Masks [Volume 6, Number 3] |
 |
Teshnehlab , Mohammad
An Improved Parallel Genetic Algorithm for Optimal Sensor Placement of Wireless Sensor Networks [Volume 6, Number 3] |
 |
Kolangari , Sara
An Improved Parallel Genetic Algorithm for Optimal Sensor Placement of Wireless Sensor Networks [Volume 6, Number 3] |
 |
H. Neshati , Mohammad
Design Investigation of a Modified HMSIW Leaky Wave Antenna [Volume 6, Number 3] |
 |
Razavi , Seyed Ali
Design Investigation of a Modified HMSIW Leaky Wave Antenna [Volume 6, Number 3] |
 |
Faili , Heshaam
Using Dependency Tree Grammar to Enhance the Reordering Model of Statistical Machine Translation Systems [Volume 6, Number 4] |
 |
Khadivi , Shahram
Using Dependency Tree Grammar to Enhance the Reordering Model of Statistical Machine Translation Systems [Volume 6, Number 4] |
 |
Rahimi , Zahra
Using Dependency Tree Grammar to Enhance the Reordering Model of Statistical Machine Translation Systems [Volume 6, Number 4] |
 |
Ahmadi , Ali
Quality Improvement of Interactive Tutorial-Like Systems by Use of Cellular Learning Automata [Volume 6, Number 4] |
 |
Hajary , Hajar
Quality Improvement of Interactive Tutorial-Like Systems by Use of Cellular Learning Automata [Volume 6, Number 4] |
 |
Montazer , Gholam Ali
Swarm intelligence grouping of e-learners using fuzzy inspired PSO method [Volume 6, Number 4] |
 |
Ghorbani , Fatemeh
Swarm intelligence grouping of e-learners using fuzzy inspired PSO method [Volume 6, Number 4] |
 |
Taghipour Anvari , Reza
A P-Robust Stochastic DEA Model for Enterprise Architecture Scenario Selection [Volume 6, Number 4] |
 |
Razmi , Jafar
A P-Robust Stochastic DEA Model for Enterprise Architecture Scenario Selection [Volume 6, Number 4] |
 |
Amalnick , Mohsen Sadegh
A P-Robust Stochastic DEA Model for Enterprise Architecture Scenario Selection [Volume 6, Number 4] |
 |
Fasanghari , Mehdi
A P-Robust Stochastic DEA Model for Enterprise Architecture Scenario Selection [Volume 6, Number 4] |
 |
Yaghmaee Moghaddam , Mohammad Hossein
An Overload Window Control Method Based on Fuzzy Logic to Improve SIP Performance [Volume 6, Number 4] |
 |
Montazerolghaem, Ahmad Reza
An Overload Window Control Method Based on Fuzzy Logic to Improve SIP Performance [Volume 6, Number 4] |
 |
Aref , Mohammad Reza
Analysis of an RFID Authentication Protocol in Accordance with EPC Standards [Volume 6, Number 4] |
 |
Baghery , Karim
Analysis of an RFID Authentication Protocol in Accordance with EPC Standards [Volume 6, Number 4] |
 |
Bakhshi , Hamidreza
Analysis of an RFID Authentication Protocol in Accordance with EPC Standards [Volume 6, Number 4] |
 |
Abdolmaleki , Behzad
Analysis of an RFID Authentication Protocol in Accordance with EPC Standards [Volume 6, Number 4] |
 |
Ghorbaninejad Foumani, Habib
Compact Band-Pass and Band-Reject Microwave Filters Using Partial H-Plane Waveguide and Dielectric Layers [Volume 6, Number 4] |
 |
Ghajar , Ali
Compact Band-Pass and Band-Reject Microwave Filters Using Partial H-Plane Waveguide and Dielectric Layers [Volume 6, Number 4] |
 |
Tarokh, Mohammad Jafar
A New Approach to Compute a Realistic Credibility Rank for Reviewers Using Fuzzy Inference [Volume 7, Number 1] |
 |
Abbasimehr , Hossein
A New Approach to Compute a Realistic Credibility Rank for Reviewers Using Fuzzy Inference [Volume 7, Number 1] |
 |
Modaberi , Somayeh
A Method to Improve Accuracy of Learner Model based on Knowledge and Belief of Learner [Volume 7, Number 1] |
 |
Noorani , Seyede Fatemeh
A Method to Improve Accuracy of Learner Model based on Knowledge and Belief of Learner [Volume 7, Number 1] |
 |
A. Kardan , Ahmad
A Method to Improve Accuracy of Learner Model based on Knowledge and Belief of Learner [Volume 7, Number 1] |
 |
Gharavian , Davood
Connection Optimization of a Neural Emotion Classifier Using Hybrid Gravitational Search Algorithms [Volume 7, Number 1] |
 |
Abbasnezhad Arabi , Mahdi
Connection Optimization of a Neural Emotion Classifier Using Hybrid Gravitational Search Algorithms [Volume 7, Number 1] |
 |
Sheikhan , Mansour
Connection Optimization of a Neural Emotion Classifier Using Hybrid Gravitational Search Algorithms [Volume 7, Number 1] |
 |
Khademi , Maryam
A Model Based on Cellular Learning Automata for Improving the Intelligent Assistant Agents & Its Application in Earthquake Crisis Management [Volume 7, Number 1] |
 |
Ahmadi, Ali
A Model Based on Cellular Learning Automata for Improving the Intelligent Assistant Agents & Its Application in Earthquake Crisis Management [Volume 7, Number 1] |
 |
Khani , Maryam
A Model Based on Cellular Learning Automata for Improving the Intelligent Assistant Agents & Its Application in Earthquake Crisis Management [Volume 7, Number 1] |
 |
Mousavi Madani , Fariborz
Energy Efficient Design Strategies of Translucent and Transparent IP Over WDM Networks [Volume 7, Number 1] |
 |
Mohammadi , Karim
Overhead Reduction In Delay Tolerant Networks [Volume 7, Number 1] |
 |
Omidvar , Azadeh
Overhead Reduction In Delay Tolerant Networks [Volume 7, Number 1] |
 |
Enami , Neda
Energy Based Clustering Self Organizing Map Protocol For Wireless Sensor Networks [Volume 7, Number 1] |
 |
Barari , Morteza
Energy Based Clustering Self Organizing Map Protocol For Wireless Sensor Networks [Volume 7, Number 1] |
 |
Dadashtabar Ahmadi , Kourosh
Energy Based Clustering Self Organizing Map Protocol For Wireless Sensor Networks [Volume 7, Number 1] |
 |
Tarokh , Mohammad Jafar
Customer Clustering Based on Customer Lifetime Value: A Case Study of an Iranian Bank [Volume 7, Number 2] |
 |
Nekooei , Arezoo
Customer Clustering Based on Customer Lifetime Value: A Case Study of an Iranian Bank [Volume 7, Number 2] |
 |
Mozaffari , Saeed
HWS: A Hierarchical Word Spotting Method for Farsi Printed Words Through Word Shape Coding [Volume 7, Number 2] |
 |
Tavoli , Reza
HWS: A Hierarchical Word Spotting Method for Farsi Printed Words Through Word Shape Coding [Volume 7, Number 2] |
 |
Keyvanpour , Mohammadreza
HWS: A Hierarchical Word Spotting Method for Farsi Printed Words Through Word Shape Coding [Volume 7, Number 2] |
 |
Ashtiani , Mehrdad
A Computational Trust Model for E-Commerce Systems: Concepts, Definitions and Evaluation Method [Volume 7, Number 2] |
 |
Abdollahi Azgomi , Mohammad
A Computational Trust Model for E-Commerce Systems: Concepts, Definitions and Evaluation Method [Volume 7, Number 2] |
 |
Divsalar , Mehrnoush
A Computational Trust Model for E-Commerce Systems: Concepts, Definitions and Evaluation Method [Volume 7, Number 2] |
 |
Rahimi, Afshin
Impact of Topic Modeling on Rule-Based Persian Metaphor Classification and its Frequency Estimation [Volume 7, Number 2] |
 |
Khosravizadeh, Parvaneh
Impact of Topic Modeling on Rule-Based Persian Metaphor Classification and its Frequency Estimation [Volume 7, Number 2] |
 |
Abdi Ghavidel , Hadi
Impact of Topic Modeling on Rule-Based Persian Metaphor Classification and its Frequency Estimation [Volume 7, Number 2] |
 |
Behrad , Alireza
Text Localization, Extraction and Inpainting in Color Images using Combined Structural and Textural Features [Volume 7, Number 2] |
 |
Khodadadi Azadboni , Mohammad
Text Localization, Extraction and Inpainting in Color Images using Combined Structural and Textural Features [Volume 7, Number 2] |
 |
Musevi Niya , Javad
A New Method for SLM-Based OFDM Systems without Side Information [Volume 7, Number 2] |
 |
Meymanatabadi , Saber
A New Method for SLM-Based OFDM Systems without Side Information [Volume 7, Number 2] |
 |
Ghalamiosgouei, Sina
A New Fractional Adaptive Filtering Method and its Application in Speech Enhancement [Volume 7, Number 2] |
 |
Geravanchizadeh , Masoud
A New Fractional Adaptive Filtering Method and its Application in Speech Enhancement [Volume 7, Number 2] |
 |
Sheikhan , Mansour
Resource Reservation in Grid Networks based on Irregular Cellular Learning Automata [Volume 7, Number 3] |
 |
Khademzadeh , Ahmad
Resource Reservation in Grid Networks based on Irregular Cellular Learning Automata [Volume 7, Number 3] |
 |
Rezaei , Sara
Resource Reservation in Grid Networks based on Irregular Cellular Learning Automata [Volume 7, Number 3] |
 |
Tarokh , Mohammad Jafar
Discovering Influencers for Spreading in Weighted Networks [Volume 7, Number 3] |
 |
Rezaei , Zahra
Discovering Influencers for Spreading in Weighted Networks [Volume 7, Number 3] |
 |
Khademi , Maryam
Using Hybrid of Eigenface and Imperialist Competition Algorithm for Feature Selection in Face Recognition [Volume 7, Number 3] |
 |
Sheikhan , Mansour
Using Hybrid of Eigenface and Imperialist Competition Algorithm for Feature Selection in Face Recognition [Volume 7, Number 3] |
 |
Yousefi Darestani , Mohammad Reza
Using Hybrid of Eigenface and Imperialist Competition Algorithm for Feature Selection in Face Recognition [Volume 7, Number 3] |
 |
Khadivi , Shahram
Density-Based K-Nearest Neighbor Active Learning for Improving Farsi-English Statistical Machine Translation System [Volume 7, Number 3] |
 |
Safabakhsh , Reza
Density-Based K-Nearest Neighbor Active Learning for Improving Farsi-English Statistical Machine Translation System [Volume 7, Number 3] |
 |
Bakhshaei , Somayeh
Density-Based K-Nearest Neighbor Active Learning for Improving Farsi-English Statistical Machine Translation System [Volume 7, Number 3] |
 |
Ghassemian , Hassan
Fast GLCM and Gabor Filters for Texture Classification of Very High Resolution Remote Sensing Images [Volume 7, Number 3] |
 |
Mirzapour , Fardin
Fast GLCM and Gabor Filters for Texture Classification of Very High Resolution Remote Sensing Images [Volume 7, Number 3] |
 |
Savoji , Mohammad Hassan
8 kbps Speech Coding using KLMS Prediction, Look-Ahead Adaptive Quantization and Pre-Emphasized Noise Reduction [Volume 7, Number 3] |
 |
Alipoor , Ghasem
8 kbps Speech Coding using KLMS Prediction, Look-Ahead Adaptive Quantization and Pre-Emphasized Noise Reduction [Volume 7, Number 3] |
 |
Jamshidi , Jahan
JNAM: a new detector proposed for marine radars [Volume 7, Number 3] |
 |
Naseri , Ali
JNAM: a new detector proposed for marine radars [Volume 7, Number 3] |
 |
Rahbarinia , Babak
EMOSS: An Efficient Algorithm to Hide Sequential Patterns [Volume 7, Number 4] |
 |
Badie , Kambiz
EMOSS: An Efficient Algorithm to Hide Sequential Patterns [Volume 7, Number 4] |
 |
Pedram , Mir Mohsen
EMOSS: An Efficient Algorithm to Hide Sequential Patterns [Volume 7, Number 4] |
 |
Behbahani, Olya Sadat
EMOSS: An Efficient Algorithm to Hide Sequential Patterns [Volume 7, Number 4] |
 |
Shanbehzadeh, Jamshid
Keyphrase Ranking Based on Second Order Co-Occurrence Analysis [Volume 7, Number 4] |
 |
Hoseini , Mojtaba
Keyphrase Ranking Based on Second Order Co-Occurrence Analysis [Volume 7, Number 4] |
 |
Shahsavar Haghighi , Hosein
Keyphrase Ranking Based on Second Order Co-Occurrence Analysis [Volume 7, Number 4] |
 |
Farhoodi , Mojgan
DMTC-EBSC: A Novel Decision Making Technique in Cloud Environment Based on Extended BSC [Volume 7, Number 4] |
 |
Arianyan , Ehsan
DMTC-EBSC: A Novel Decision Making Technique in Cloud Environment Based on Extended BSC [Volume 7, Number 4] |
 |
Maleki , Davood
DMTC-EBSC: A Novel Decision Making Technique in Cloud Environment Based on Extended BSC [Volume 7, Number 4] |
 |
Ahmadi , Mohammad Reza
DMTC-EBSC: A Novel Decision Making Technique in Cloud Environment Based on Extended BSC [Volume 7, Number 4] |
 |
Tadayon , Mohammad Hesam
Efficient Verifiable Dynamic Threshold Secret Sharing Scheme Based on Elliptic Curves [Volume 7, Number 4] |
 |
Alaei , Amir
Efficient Verifiable Dynamic Threshold Secret Sharing Scheme Based on Elliptic Curves [Volume 7, Number 4] |
 |
Karimi , Firoozeh
A Clustering Based Feature Selection Approach to Detect Spam in Social Networks [Volume 7, Number 4] |
 |
Sohrabi , Mohammad Karim
A Clustering Based Feature Selection Approach to Detect Spam in Social Networks [Volume 7, Number 4] |
 |
Mollaei , Mahmood
A MinMax Routing Algorithm for Long Life Route Selection in MANETs [Volume 7, Number 4] |
 |
Ghasemi , Abdorasoul
A MinMax Routing Algorithm for Long Life Route Selection in MANETs [Volume 7, Number 4] |
 |
Ebrahimzadeh, Ataollah
Digital Modulation Classification Using the Bees Algorithm and Probabilistic Neural Network Based on Higher Order Statistics [Volume 7, Number 4] |
 |
Hakimi , Saeed
Digital Modulation Classification Using the Bees Algorithm and Probabilistic Neural Network Based on Higher Order Statistics [Volume 7, Number 4] |
 |
Pujolle , Guy
A Priority-based Fast Optimal Computation Offloading Planner for Mobile Cloud Computing [Volume 8, Number 1] |
 |
Movahedi , Zeinab
A Priority-based Fast Optimal Computation Offloading Planner for Mobile Cloud Computing [Volume 8, Number 1] |
 |
Goudarzi , Mohammad
A Priority-based Fast Optimal Computation Offloading Planner for Mobile Cloud Computing [Volume 8, Number 1] |
 |
Raahemi , Bijan
Detecting Flood-based Attacks against SIP Proxy Servers and Clients using Engineered Feature Sets [Volume 8, Number 1] |
 |
Akbari , Ahmad
Detecting Flood-based Attacks against SIP Proxy Servers and Clients using Engineered Feature Sets [Volume 8, Number 1] |
 |
Asgharian , Hassan
Detecting Flood-based Attacks against SIP Proxy Servers and Clients using Engineered Feature Sets [Volume 8, Number 1] |
 |
Tarokh , Mohammad Jafar
A Novel Trust Evaluation Model Using Graph Clustering Approach [Volume 8, Number 1] |
 |
Mahmoodyar , Mohammad Ali
A Novel Trust Evaluation Model Using Graph Clustering Approach [Volume 8, Number 1] |
 |
Akbari , Behzad
SDTE: Software Defined Traffic Engineering for Improving Data Center Network Utilization [Volume 8, Number 1] |
 |
Tajiki , Mohammad Mahdi
SDTE: Software Defined Traffic Engineering for Improving Data Center Network Utilization [Volume 8, Number 1] |
 |
Khoshbakht , Marzieh
SDTE: Software Defined Traffic Engineering for Improving Data Center Network Utilization [Volume 8, Number 1] |
 |
Jalili , Saeed
Ensemble Link Predictor for Heterogeneous Complex Networks [Volume 8, Number 1] |
 |
Moghadam Charkari, Nasrollah
Ensemble Link Predictor for Heterogeneous Complex Networks [Volume 8, Number 1] |
 |
Shakibian , Hadi
Ensemble Link Predictor for Heterogeneous Complex Networks [Volume 8, Number 1] |
 |
Mousavi Madani , Fariborz
A Novel Adaptive Router Placement Scheme in Hybrid Wireless Optical Access Network [Volume 8, Number 1] |
 |
Babamir , Seyed Morteza
A Pareto-based Optimizer for Workflow Scheduling in Cloud Computing Environment [Volume 8, Number 1] |
 |
Khalili , Azade
A Pareto-based Optimizer for Workflow Scheduling in Cloud Computing Environment [Volume 8, Number 1] |
 |
Mohammadi , Mohammad
QC-LDPC Codes Construction by Concatenating of Circulant Matrices as Block-Columns [Volume 8, Number 2] |
 |
Tadayon , Mohammad Hesam
QC-LDPC Codes Construction by Concatenating of Circulant Matrices as Block-Columns [Volume 8, Number 2] |
 |
Tarokh , Mohammad Jafar
A New Hybrid Collaborative Recommender Using Semantic Web Technology and Demographic data [Volume 8, Number 2] |
 |
Gohari , Faezeh Sadat
A New Hybrid Collaborative Recommender Using Semantic Web Technology and Demographic data [Volume 8, Number 2] |
 |
Sheikhan , Mansour
Hybrid of Evolutionary and Swarm Intelligence Algorithms for Prosody Modeling in Natural Speech Synthesis [Volume 8, Number 2] |
 |
Zolrahmi , Forough
An Architecture for a Mobile Recommender System in Tourism [Volume 8, Number 2] |
 |
Mousavi , Seyed Mohammad Reza
An Architecture for a Mobile Recommender System in Tourism [Volume 8, Number 2] |
 |
Hosseini , Monireh
An Architecture for a Mobile Recommender System in Tourism [Volume 8, Number 2] |
 |
Salahi , Ahmad
DDoS Traffic Modeling, Identification and Attack Mitigation to Cloud Hosted servers by Drift plus Penalty methods [Volume 8, Number 2] |
 |
Mansouri , Mohsen
A New Electronic Cash Protocol Using a Modified ElGamal and an Untraceable Signature Scheme [Volume 8, Number 2] |
 |
Zaghian , Ali
A New Electronic Cash Protocol Using a Modified ElGamal and an Untraceable Signature Scheme [Volume 8, Number 2] |
 |
Tabandeh , Mahmoud
Learning Motion Patterns in Traffic Scenes by Improved Group Sparse Topical Coding [Volume 8, Number 2] |
 |
Gholampour , Iman
Learning Motion Patterns in Traffic Scenes by Improved Group Sparse Topical Coding [Volume 8, Number 2] |
 |
Ahmadi , Parvin
Learning Motion Patterns in Traffic Scenes by Improved Group Sparse Topical Coding [Volume 8, Number 2] |
 |
Badie , Kambiz
Hiding Fuzzy Sequential Patterns by a Multi-Objective Scheme [Volume 8, Number 3] |
 |
Pedram , Mir Mohsen
Hiding Fuzzy Sequential Patterns by a Multi-Objective Scheme [Volume 8, Number 3] |
 |
Behbahani , Olya Sadat
Hiding Fuzzy Sequential Patterns by a Multi-Objective Scheme [Volume 8, Number 3] |
 |
Behroozi , Hamid
On Maximizing the Secrecy Rate in a Cooperative Wireless Network using Friendly Jammers [Volume 8, Number 3] |
 |
Hatami , Mohammad
On Maximizing the Secrecy Rate in a Cooperative Wireless Network using Friendly Jammers [Volume 8, Number 3] |
 |
Assadi , Vahid
A Ranking Framework for Designing a Portal Based on Healthcare Solutions The Case of Cardiovascular Disease [Volume 8, Number 3] |
 |
Baradaran , Vahid
A Ranking Framework for Designing a Portal Based on Healthcare Solutions The Case of Cardiovascular Disease [Volume 8, Number 3] |
 |
Hadizadeh , Anita
A Ranking Framework for Designing a Portal Based on Healthcare Solutions The Case of Cardiovascular Disease [Volume 8, Number 3] |
 |
Sepehri , Modammad Mehdi
A Ranking Framework for Designing a Portal Based on Healthcare Solutions The Case of Cardiovascular Disease [Volume 8, Number 3] |
 |
Sazvar , Majid
A metric Suite for Systematic Quality Assessment of Linked Open Data [Volume 8, Number 3] |
 |
Bagheri , Ebrahim
A metric Suite for Systematic Quality Assessment of Linked Open Data [Volume 8, Number 3] |
 |
Kahani , Mohsen
A metric Suite for Systematic Quality Assessment of Linked Open Data [Volume 8, Number 3] |
 |
Behkamal , Behshid
A metric Suite for Systematic Quality Assessment of Linked Open Data [Volume 8, Number 3] |
 |
Gheysari , Mohammad
Analysis the Effects of Internet of Things Technology in Managing Supply Chain [Volume 8, Number 3] |
 |
Tajfar , Amir Houshang
Analysis the Effects of Internet of Things Technology in Managing Supply Chain [Volume 8, Number 3] |
 |
Zayyani , Hadi
A Weighted Soft-Max PNLMS Algorithm for Sparse System Identification [Volume 8, Number 3] |
 |
Bekrani , Mehdi
A Weighted Soft-Max PNLMS Algorithm for Sparse System Identification [Volume 8, Number 3] |
 |
Ghorbaninejad , Habib
Gain and Bandwidth Enhancement of Slot Antenna Using Two Unprinted Dielectric Superstrate [Volume 8, Number 3] |
 |
Fakhte , Rasoul
Gain and Bandwidth Enhancement of Slot Antenna Using Two Unprinted Dielectric Superstrate [Volume 8, Number 3] |
 |
Mozayani , Nasser
Preference Based PSO for Utility Optimization in Broadband Digital Economy [Volume 8, Number 4] |
 |
Mansourifar , Leila
Preference Based PSO for Utility Optimization in Broadband Digital Economy [Volume 8, Number 4] |
 |
Taghiyareh , Fattaneh
The Impact of Structural Position on Opinion Leadership in Social Network [Volume 8, Number 4] |
 |
Salehi , Sajjad
The Impact of Structural Position on Opinion Leadership in Social Network [Volume 8, Number 4] |
 |
Kharrat , Mahmood
Technology Roadmapping Framework: Case study of USO services in Iran [Volume 8, Number 4] |
 |
Mirsaeedghazi , Tahereh
Technology Roadmapping Framework: Case study of USO services in Iran [Volume 8, Number 4] |
 |
Abbasi Shahkooh , Kolsoom
Technology Roadmapping Framework: Case study of USO services in Iran [Volume 8, Number 4] |
 |
Dastranj , Nasrin
Technology Roadmapping Framework: Case study of USO services in Iran [Volume 8, Number 4] |
 |
Mahin Zaeem , Reza
Optimum Selection of Modes Set for Adaptive Modulation and Coding based on Imperfect Channel State Information [Volume 8, Number 4] |
 |
Taki , Mehrdad
Optimum Selection of Modes Set for Adaptive Modulation and Coding based on Imperfect Channel State Information [Volume 8, Number 4] |
 |
Musevi Niya , Mir Javad
On Error and Bitrate Tradeoff in Visible Light Communication System to ensure HEVC Video Quality [Volume 8, Number 4] |
 |
Seyedarabi , Hadi
On Error and Bitrate Tradeoff in Visible Light Communication System to ensure HEVC Video Quality [Volume 8, Number 4] |
 |
Abdollahzadeh , Milad
On Error and Bitrate Tradeoff in Visible Light Communication System to ensure HEVC Video Quality [Volume 8, Number 4] |
 |
Alizadeh Ghazijahani , Hamed
On Error and Bitrate Tradeoff in Visible Light Communication System to ensure HEVC Video Quality [Volume 8, Number 4] |
 |
Gobadi , Changiz
Non-stationary Sparse System Identification over Adaptive Sensor Networks with Diffusion and Incremental Strategies [Volume 8, Number 4] |
 |
Mostafapour , Ehsan
Non-stationary Sparse System Identification over Adaptive Sensor Networks with Diffusion and Incremental Strategies [Volume 8, Number 4] |
 |
Aliabadi , Amin
Non-stationary Sparse System Identification over Adaptive Sensor Networks with Diffusion and Incremental Strategies [Volume 8, Number 4] |
 |
Bazdar , Amir
Non-stationary Sparse System Identification over Adaptive Sensor Networks with Diffusion and Incremental Strategies [Volume 8, Number 4] |
 |
Mohamed-pour, Kamal
Spatial Interference Alignment in Relay-Assisted Multi-Cell Multi-User Networks [Volume 8, Number 4] |
 |
H. Bastami , Ali
Spatial Interference Alignment in Relay-Assisted Multi-Cell Multi-User Networks [Volume 8, Number 4] |
 |
Golestani , Ali
Spatial Interference Alignment in Relay-Assisted Multi-Cell Multi-User Networks [Volume 8, Number 4] |
 |
Taghiyareh , Fattaneh
Pruning Concept Map to Geneate Ontology [Volume 9, Number 1] |
 |
Mosharraf , Maedeh
Pruning Concept Map to Geneate Ontology [Volume 9, Number 1] |
 |
Zakerolhosseini , Ali
Mining Dynamic Communities based on a Novel Link-Clustering Algorithm [Volume 9, Number 1] |
 |
Cheraghchi , Hamideh Sadat
Mining Dynamic Communities based on a Novel Link-Clustering Algorithm [Volume 9, Number 1] |
 |
Kangavari , Mohammadreza
GSSC: Graph Summarization based on both Structure and Concepts [Volume 9, Number 1] |
 |
Ashrafi Payaman , Nosratali
GSSC: Graph Summarization based on both Structure and Concepts [Volume 9, Number 1] |
 |
Alishirvani , Nasrin
A Framework to Create a Certificate for e-Commerce Secure Transaction Protocol [Volume 9, Number 1] |
 |
Naghibzadeh , Mahmoud
Inconsistency Repair to Improve the Alignment Results of Ontology Matchers [Volume 9, Number 1] |
 |
Behkamal , Bahareh
Inconsistency Repair to Improve the Alignment Results of Ontology Matchers [Volume 9, Number 1] |
 |
Babamir , Seyed Morteza
QoS-aware web service composition using Gray Wolf Optimizer [Volume 9, Number 1] |
 |
Karimi , Meysam
QoS-aware web service composition using Gray Wolf Optimizer [Volume 9, Number 1] |
 |
Berangi , Reza
A Sub-Optimal Policy for Connection Admission Control Mechanism in Cognitive Radio Sensor Networks [Volume 9, Number 1] |
 |
Hosseini , Elahe sadat
A Sub-Optimal Policy for Connection Admission Control Mechanism in Cognitive Radio Sensor Networks [Volume 9, Number 1] |
 |
Takabi , Hassan
Multi-Objective Response to Co-Resident Attacks in Cloud Environment [Volume 9, Number 3] |
 |
Analoui , Morteza
Multi-Objective Response to Co-Resident Attacks in Cloud Environment [Volume 9, Number 3] |
 |
Abazari , Farzaneh
Multi-Objective Response to Co-Resident Attacks in Cloud Environment [Volume 9, Number 3] |
 |
Reshadi , Midia
ARTEMIS: A Simulator Tool for Heterogeneous Network-on-Chip [Volume 9, Number 2] |
 |
Khadem Zadeh, Ahmad
ARTEMIS: A Simulator Tool for Heterogeneous Network-on-Chip [Volume 9, Number 2] |
 |
Vardi , Fatemeh
ARTEMIS: A Simulator Tool for Heterogeneous Network-on-Chip [Volume 9, Number 2] |
 |
Bostani , Hamid
A Security Mechanism for Detecting Intrusions in Internet of Things Using Selected Features Based on MI-BGSA [Volume 9, Number 2] |
 |
Sheikhan , Mansour
A Security Mechanism for Detecting Intrusions in Internet of Things Using Selected Features Based on MI-BGSA [Volume 9, Number 2] |
 |
Khansari , Mohammad
Critical Success factors for implementing PACS Technology in Iran's Hospitals [Volume 9, Number 2] |
 |
Heydari , Mahmood
Critical Success factors for implementing PACS Technology in Iran's Hospitals [Volume 9, Number 2] |
 |
Heshmati , Zainabolhoda
Critical Success factors for implementing PACS Technology in Iran's Hospitals [Volume 9, Number 2] |
 |
Saghafi , Fatemeh
Critical Success factors for implementing PACS Technology in Iran's Hospitals [Volume 9, Number 2] |
 |
Fadaee , Marzieh
Persian Wordnet Construction using Supervised Learning [Volume 9, Number 2] |
 |
Faili , Heshaam
Persian Wordnet Construction using Supervised Learning [Volume 9, Number 2] |
 |
Mousavi , Zahra
Persian Wordnet Construction using Supervised Learning [Volume 9, Number 2] |
 |
Javidan , Reza
A Novel Density based Clustering Method using Nearest and Farthest Neighbor with PCA [Volume 9, Number 2] |
 |
Faroughi , Azadeh
A Novel Density based Clustering Method using Nearest and Farthest Neighbor with PCA [Volume 9, Number 2] |
 |
Mashayekhi , Hoda
A Probabilistic Topic Model based on an Arbitrary-Length Co-occurrence Window [Volume 9, Number 2] |
 |
Zahedi , Morteza
A Probabilistic Topic Model based on an Arbitrary-Length Co-occurrence Window [Volume 9, Number 2] |
 |
Rahimi , Marziea
A Probabilistic Topic Model based on an Arbitrary-Length Co-occurrence Window [Volume 9, Number 2] |
 |
Daryabar , Farid
An Attack-Defense Model for the Binder on the Android Kernel Level [Volume 9, Number 2] |
 |
Tadayon , Mohammad Hesam
An Attack-Defense Model for the Binder on the Android Kernel Level [Volume 9, Number 2] |
 |
Salehi , majid
An Attack-Defense Model for the Binder on the Android Kernel Level [Volume 9, Number 2] |
 |
Noori , Narges
Design and Implementation of a TEM Cell with Piecewise Linear Tapering [Volume 9, Number 3] |
 |
Kalantari Meybodi, Mohsen
Design and Implementation of a TEM Cell with Piecewise Linear Tapering [Volume 9, Number 3] |
 |
Arezoomand , Masoud
Design and Implementation of a TEM Cell with Piecewise Linear Tapering [Volume 9, Number 3] |
 |
EsmaeiliGookeh , Mahsa
A Stochastic Approach for Valuing Customers [Volume 9, Number 3] |
 |
Tarokh , Mohammadjafar
A Stochastic Approach for Valuing Customers [Volume 9, Number 3] |
 |
Khani , Maryam
A novel approach for learning improvement in interactive classroom environments using learning automata [Volume 9, Number 3] |
 |
Ahmadi , Ali
A novel approach for learning improvement in interactive classroom environments using learning automata [Volume 9, Number 3] |
 |
Hajary , Hajar
A novel approach for learning improvement in interactive classroom environments using learning automata [Volume 9, Number 3] |
 |
Abdoli , Mohammad Hossein
Enhancement of educational games based on personality type indicators [Volume 9, Number 3] |
 |
Taghiyareh , Fattaneh
Enhancement of educational games based on personality type indicators [Volume 9, Number 3] |
 |
Shabihi , Negar
Enhancement of educational games based on personality type indicators [Volume 9, Number 3] |
 |
Enayatizadeh , Javad
Domain Ontology to Distinguish Different Types of Rootkits [Volume 9, Number 3] |
 |
salahi , ahmad
Domain Ontology to Distinguish Different Types of Rootkits [Volume 9, Number 3] |
 |
Keramati, Marjan
An Attack Graph Based Method for Predictive Risk Evaluation of Zero-Day Attacks [Volume 9, Number 3] |
 |
Keramati, Marjan
Dynamic Risk Assessment System for the Vulnerability Scoring [Volume 9, Number 4] |
 |
Arabsorkhi, Abouzar
Enhancement of Illumination scheme for Adult Image Recognition [Volume 9, Number 4] |
 |
Karamizadeh, Sasan
Enhancement of Illumination scheme for Adult Image Recognition [Volume 9, Number 4] |
 |
Khoshbin Ghomash, H.
Subspace-Based Approaches for Hybrid Millimeter-Wave Channel Estimation [Volume 9, Number 4] |
 |
Shakhsi Dastgahian, M.
Subspace-Based Approaches for Hybrid Millimeter-Wave Channel Estimation [Volume 9, Number 4] |
 |
Haghani, Sogol
Hybrid of Active Learning and Dynamic Self-Training for Data Stream Classification [Volume 9, Number 4] |
 |
Kholghi, Mahnoosh
Hybrid of Active Learning and Dynamic Self-Training for Data Stream Classification [Volume 9, Number 4] |
 |
Keyvanpour, MohammadReza
Hybrid of Active Learning and Dynamic Self-Training for Data Stream Classification [Volume 9, Number 4] |
 |
Khademzadeh, Ahmad
Hub location Allocation Problem in Computer Networks Using Intelligent Optimization Algorithms [Volume 9, Number 4] |
 |
Hartoonian, Armond
Hub location Allocation Problem in Computer Networks Using Intelligent Optimization Algorithms [Volume 9, Number 4] |
 |
Yaghmaee, Mahamad Hossein
Cloud-Based Large-Scale Sensor Networks: Motivation, Taxonomies, and Open Challenges [Volume 9, Number 4] |
 |
Banaie, Fatemeh
Cloud-Based Large-Scale Sensor Networks: Motivation, Taxonomies, and Open Challenges [Volume 9, Number 4] |
 |
Hosseini, Seyed Amin
Cloud-Based Large-Scale Sensor Networks: Motivation, Taxonomies, and Open Challenges [Volume 9, Number 4] |