Authors Index

All issues
:: Damia , Amirhossein Optimizing LSTM Networks with Genetic and Q-Learning Algorithms for Persian COVID-19 Fake News Detection [Volume 17, Number 2]
:: Khan Mohammadi , Erfaneh Optimizing LSTM Networks with Genetic and Q-Learning Algorithms for Persian COVID-19 Fake News Detection [Volume 17, Number 2]
:: Yarahmadi, Mohamad Optimizing LSTM Networks with Genetic and Q-Learning Algorithms for Persian COVID-19 Fake News Detection [Volume 17, Number 2]
:: Salehi, Mojtaba Optimizing LSTM Networks with Genetic and Q-Learning Algorithms for Persian COVID-19 Fake News Detection [Volume 17, Number 2]
:: Khakzadi, Ali Adaptive Portfolio Optimization with Multi-Agent Deep Reinforcement Learning and Short-Term Performance Analysis [Volume 17, Number 3]
:: Assadzadeh, Alireza Adaptive Portfolio Optimization with Multi-Agent Deep Reinforcement Learning and Short-Term Performance Analysis [Volume 17, Number 3]
:: Bayani, Ali Adaptive Portfolio Optimization with Multi-Agent Deep Reinforcement Learning and Short-Term Performance Analysis [Volume 17, Number 3]
:: Kargar, Masoud Adaptive Portfolio Optimization with Multi-Agent Deep Reinforcement Learning and Short-Term Performance Analysis [Volume 17, Number 3]
:: Sharbaf Movassaghpour, Shahin Adaptive Portfolio Optimization with Multi-Agent Deep Reinforcement Learning and Short-Term Performance Analysis [Volume 17, Number 3]
:: Moin, Mohammad-Shahram Analysis and Evaluation of the Performance of Smart Wearable Systems Based on Internet of Things in the Healthcare Sector [Volume 17, Number 3]
:: Goodarzi, Marjan Analysis and Evaluation of the Performance of Smart Wearable Systems Based on Internet of Things in the Healthcare Sector [Volume 17, Number 3]
:: Oveisi, ُShahrzad Analysis and Evaluation of the Performance of Smart Wearable Systems Based on Internet of Things in the Healthcare Sector [Volume 17, Number 3]
:: Arab Sorkhi, Abouzar An In-Depth Comparative Analysis of Fake News Detection Approaches in Social Media: Methodologies, Challenges, and Future Directions [Volume 17, Number 3]
:: Tafazzoli, Tala An In-Depth Comparative Analysis of Fake News Detection Approaches in Social Media: Methodologies, Challenges, and Future Directions [Volume 17, Number 3]
:: Maghami, Mohammad Hossein CNN Accelerator Adapted to Quasi Structured Pruning and Dense Mode [Volume 17, Number 3]
:: Amiri, Parviz CNN Accelerator Adapted to Quasi Structured Pruning and Dense Mode [Volume 17, Number 3]
:: Sadough, Amirhossein CNN Accelerator Adapted to Quasi Structured Pruning and Dense Mode [Volume 17, Number 3]
:: Gharaee, Hossein CNN Accelerator Adapted to Quasi Structured Pruning and Dense Mode [Volume 17, Number 3]
:: Hajipour, Pedram Increase the Life of the Wireless Sensor Network by using an Energy-Sensitive Threshold Cross-layer Model [Volume 17, Number 3]
:: Eslami, Mahdi Increase the Life of the Wireless Sensor Network by using an Energy-Sensitive Threshold Cross-layer Model [Volume 17, Number 3]
:: Hamzeh Taleghani, Hamidreza Increase the Life of the Wireless Sensor Network by using an Energy-Sensitive Threshold Cross-layer Model [Volume 17, Number 3]
:: Hosseini, Keyhan Inverse Design of a Wide-Angle Wideband Programmable THz Reflectarray Through Generative Adversarial Networks [Volume 17, Number 3]
:: Yahaghi, Ali Inverse Design of a Wide-Angle Wideband Programmable THz Reflectarray Through Generative Adversarial Networks [Volume 17, Number 3]
:: Khajeh, Ali Inverse Design of a Wide-Angle Wideband Programmable THz Reflectarray Through Generative Adversarial Networks [Volume 17, Number 3]
:: Yousefi, Pezhman Inverse Design of a Wide-Angle Wideband Programmable THz Reflectarray Through Generative Adversarial Networks [Volume 17, Number 3]
:: Alizadeh, Behrooz Network Planning Policies for Joint Switching in Spectrally-Spatially Flexible Optical Networks [Volume 17, Number 4]
:: Ghaffarpour Rahbar, Akbar Network Planning Policies for Joint Switching in Spectrally-Spatially Flexible Optical Networks [Volume 17, Number 4]
:: Yaghubi-Namaad, Mohsen Network Planning Policies for Joint Switching in Spectrally-Spatially Flexible Optical Networks [Volume 17, Number 4]
:: Radfar, Reza Classification of Exchange Rate Prediction Methods with a Focus on Deep Learning Techniques [Volume 17, Number 2]
:: Toloie Eshlaghy, Abbas Classification of Exchange Rate Prediction Methods with a Focus on Deep Learning Techniques [Volume 17, Number 2]
:: Mortazavian Farsani, Seyed Jafar Classification of Exchange Rate Prediction Methods with a Focus on Deep Learning Techniques [Volume 17, Number 2]
:: Mohtaj , Salar Multi-type Obfuscation Corpus for CrossLingual Plagiarism Detection [Volume 17, Number 2]
:: Asghari, Habibollah Multi-type Obfuscation Corpus for CrossLingual Plagiarism Detection [Volume 17, Number 2]
:: Mohtarami, Amir Architectures for a Blockchain-based Decentralized Marketplace for Handicrafts [Volume 17, Number 2]
:: Ghasemi, Amin Architectures for a Blockchain-based Decentralized Marketplace for Handicrafts [Volume 17, Number 2]
:: Yadegari , Amirmansour Defending Against Adversarial Attacks in Artificial Intelligence Technologies [Volume 17, Number 2]
:: Karamizadeh , Sasan Defending Against Adversarial Attacks in Artificial Intelligence Technologies [Volume 17, Number 2]
:: Sajjadi, Seyed Hadi Defending Against Adversarial Attacks in Artificial Intelligence Technologies [Volume 17, Number 2]
:: Mohamed-pour, Kamal Beamforming Design for Simultaneous Transmission and Reflection Reconfigurable Intelligent Surface Assisted Secure Wireless Communication by considering Imperfect CSI [Volume 17, Number 2]
:: Shahcheragh, Seyedeh Reyhane Beamforming Design for Simultaneous Transmission and Reflection Reconfigurable Intelligent Surface Assisted Secure Wireless Communication by considering Imperfect CSI [Volume 17, Number 2]
:: Gharaee, Hossein A Novel Framework for Cyber Situational Awareness at the National Level [Volume 17, Number 1]
:: Enayati, Alireza A Novel Framework for Cyber Situational Awareness at the National Level [Volume 17, Number 1]
:: Imanimehr, Fatemeh A Novel Framework for Cyber Situational Awareness at the National Level [Volume 17, Number 1]
:: Aghazarian, Vahe HHMap: A Novel Task Mapping for Heterogeneous & Homogeneous 3D NoCs with the Objective of Improving Energy Consumption [Volume 17, Number 1]
:: Rezaie, Oldooz HHMap: A Novel Task Mapping for Heterogeneous & Homogeneous 3D NoCs with the Objective of Improving Energy Consumption [Volume 17, Number 1]
:: Mansouri, Alireza A Novel Method for Measuring Banking Data Analysis Maturity Level: A Case Study [Volume 17, Number 1]
:: Mirzaei, Sahar A Novel Method for Measuring Banking Data Analysis Maturity Level: A Case Study [Volume 17, Number 1]
:: Askarai, Elham Automatic License Plate Recognition using the Deep Learning Networks [Volume 17, Number 1]
:: Motamed, Sara Automatic License Plate Recognition using the Deep Learning Networks [Volume 17, Number 1]
:: Rabiei, mohammad Extractive Text Summarization in Persian Language through Integrative Approaches [Volume 17, Number 1]
:: Razavizadeh, S. Mohammad Securing RIS-aided Wireless Networks Against Full Duplex Active Eavesdropping [Volume 17, Number 1]
:: Zakeri, Atefeh Securing RIS-aided Wireless Networks Against Full Duplex Active Eavesdropping [Volume 17, Number 1]
:: Moeini, Ali A Hybrid Model for Evaluation of E-Learning User Satisfaction with TAM and ELQ Approach [Volume 16, Number 2]
:: Sabzian, Azin A Hybrid Model for Evaluation of E-Learning User Satisfaction with TAM and ELQ Approach [Volume 16, Number 2]
:: Sayardoost Tabrizi, Sina A Hybrid Model for Evaluation of E-Learning User Satisfaction with TAM and ELQ Approach [Volume 16, Number 2]
:: Jafari Farsani, Nasim A Dynamic Hybrid Precoding Structure for mmWave Massive MIMO Systems [Volume 16, Number 1]
:: Mohamed-pour, Kamal A Dynamic Hybrid Precoding Structure for mmWave Massive MIMO Systems [Volume 16, Number 1]
:: Moradi, Amirreza A Dynamic Hybrid Precoding Structure for mmWave Massive MIMO Systems [Volume 16, Number 1]
:: Mansouri , Alireza Performance Evaluation of Internet Domain Ranking Methodologies [Volume 16, Number 4]
:: Maleki, Davood Performance Evaluation of Internet Domain Ranking Methodologies [Volume 16, Number 4]
:: Goudarzi, Pejman Performance Evaluation of Internet Domain Ranking Methodologies [Volume 16, Number 4]
:: Hajipour, Pedram Joint Use of RSA and Genetic Algorithm to Improve the Process of Image Encryption and Information Hiding [Volume 16, Number 4]
:: Mirzaei, Mohammad Joint Use of RSA and Genetic Algorithm to Improve the Process of Image Encryption and Information Hiding [Volume 16, Number 4]
:: Biglou, Ramin Joint Use of RSA and Genetic Algorithm to Improve the Process of Image Encryption and Information Hiding [Volume 16, Number 4]
:: Hakamizadeh, Farshad Digital Transformation Research: Identifying The Elements Influencing Digital Transformation at the National Level [Volume 16, Number 4]
:: Farazmand, Atefeh Digital Transformation Research: Identifying The Elements Influencing Digital Transformation at the National Level [Volume 16, Number 4]
:: Alipour, Seyyed Mohammadhossein Digital Transformation Research: Identifying The Elements Influencing Digital Transformation at the National Level [Volume 16, Number 4]
:: Mirsarraf, Seyed Mohammadreza Persian Rumor Detection Using a MultiClassifier Fusion Approach [Volume 16, Number 4]
:: Farhoodi, Mojgan Persian Rumor Detection Using a MultiClassifier Fusion Approach [Volume 16, Number 4]
:: Mahmoudi, Maryam Persian Rumor Detection Using a MultiClassifier Fusion Approach [Volume 16, Number 4]
:: Mansouri, Alireza Persian Rumor Detection Using a MultiClassifier Fusion Approach [Volume 16, Number 4]
:: Erfani Majd , Nasser The combination of machine learning methods for intrusion detection system in the Internet of Things (IoT) [Volume 16, Number 4]
:: Nataj Solhdar, Mohammad Hassan The combination of machine learning methods for intrusion detection system in the Internet of Things (IoT) [Volume 16, Number 4]
:: Reza, Akram FUCA: a Frame to Prevent the Generation of Useless results in the Dataflows Based on Cartesian Product for Convolutional Neural Network Accelerators [Volume 16, Number 4]
:: Khademzadeh, Ahmad FUCA: a Frame to Prevent the Generation of Useless results in the Dataflows Based on Cartesian Product for Convolutional Neural Network Accelerators [Volume 16, Number 4]
:: NarimanJahan, Babak FUCA: a Frame to Prevent the Generation of Useless results in the Dataflows Based on Cartesian Product for Convolutional Neural Network Accelerators [Volume 16, Number 4]
:: Koochari, Abbas Investigating Sentiment Analysis of News in Stock Market Prediction Utilizing Machine Learning Technique [Volume 16, Number 3]
:: Alizadeh, Sasan H Investigating Sentiment Analysis of News in Stock Market Prediction Utilizing Machine Learning Technique [Volume 16, Number 3]
:: Moin, Mohammad-Shahram Investigating Sentiment Analysis of News in Stock Market Prediction Utilizing Machine Learning Technique [Volume 16, Number 3]
:: Ranjbaran, Golshid Investigating Sentiment Analysis of News in Stock Market Prediction Utilizing Machine Learning Technique [Volume 16, Number 3]
:: Kojouri, Sara A Deep Learning Approach for Sarcasm Detection on Twitter [Volume 16, Number 3]
:: Shayegan, Mohammad Javad A Deep Learning Approach for Sarcasm Detection on Twitter [Volume 16, Number 3]
:: Mahdavi Mortazavi, Morteza EmoRecBiGRU: Emotion Recognition in Persian Tweets with a Transformer-based Model, Enhanced by Bidirectional GRU [Volume 16, Number 3]
:: Shamsfard, Mehrnoush EmoRecBiGRU: Emotion Recognition in Persian Tweets with a Transformer-based Model, Enhanced by Bidirectional GRU [Volume 16, Number 3]
:: Sarlakifar, Faezeh EmoRecBiGRU: Emotion Recognition in Persian Tweets with a Transformer-based Model, Enhanced by Bidirectional GRU [Volume 16, Number 3]
:: Farhoodi, Mojgan Claim Detection in Persian Twitter Posts [Volume 16, Number 3]
:: Davoudi Shamsi, Mona Claim Detection in Persian Twitter Posts [Volume 16, Number 3]
:: Nassajian, Minoo Claim Detection in Persian Twitter Posts [Volume 16, Number 3]
:: Bokaei, Mohammad Hadi Claim Detection in Persian Twitter Posts [Volume 16, Number 3]
:: Farhoodi, Mojgan An Improvement in Transformer-Based Sentiment Analysis in Persian Twitter [Volume 16, Number 3]
:: Yazdani, Ali An Improvement in Transformer-Based Sentiment Analysis in Persian Twitter [Volume 16, Number 3]
:: Heydari, Hadi An Improvement in Transformer-Based Sentiment Analysis in Persian Twitter [Volume 16, Number 3]
:: Zeinali, Hossein A Comparative Study of BERT-X for Sentiment Analysis and Stance Detection in Persian Social Media [Volume 16, Number 3]
:: Mazochi, Alireza A Comparative Study of BERT-X for Sentiment Analysis and Stance Detection in Persian Social Media [Volume 16, Number 3]
:: Sobhi, Mohamad A Comparative Study of BERT-X for Sentiment Analysis and Stance Detection in Persian Social Media [Volume 16, Number 3]
:: Bokaei , Mohammad Hadi ParsiAzma Challenges on Persian Text Analysis in Social Media [Volume 16, Number 3]
:: Mahmoudi, Maryam ParsiAzma Challenges on Persian Text Analysis in Social Media [Volume 16, Number 3]
:: Farhoodi, Mojgan ParsiAzma Challenges on Persian Text Analysis in Social Media [Volume 16, Number 3]
:: Beheshtifard, Ziaeddin Image Retrieval with Missing Regions by Reconstructing and Concatenating Content and Semantic Features [Volume 16, Number 2]
:: Rahbar, Kambiz Image Retrieval with Missing Regions by Reconstructing and Concatenating Content and Semantic Features [Volume 16, Number 2]
:: Taheri, Fatemeh Image Retrieval with Missing Regions by Reconstructing and Concatenating Content and Semantic Features [Volume 16, Number 2]
:: Milani Fard, Amin Deep Reinforcement Learning-based Exploration of Web Applications [Volume 16, Number 2]
:: Jahangard Rafsanjani, Amir Deep Reinforcement Learning-based Exploration of Web Applications [Volume 16, Number 2]
:: Abbasnezhad, Mohammadreza Deep Reinforcement Learning-based Exploration of Web Applications [Volume 16, Number 2]
:: Vafadoost, Peyman An Overview of Secure Communications for the Internet of Things [Volume 16, Number 2]
:: Zoljalali Moghaddam, Seyed Ali An Overview of Secure Communications for the Internet of Things [Volume 16, Number 2]
:: Mazoochi, Mojtaba A Routing Method in Smart Cities Based on Destination Type and Network Traffic Flow [Volume 16, Number 2]
:: Moradi, Mohammad A Routing Method in Smart Cities Based on Destination Type and Network Traffic Flow [Volume 16, Number 2]
:: Ardebilipour, Mehrdad Optimal Power Allocation Strategy for a D2D Network based Safety-Critical V2X Communication with Partial CSI [Volume 16, Number 2]
:: Zeraatkar Moghaddam, Javad Optimal Power Allocation Strategy for a D2D Network based Safety-Critical V2X Communication with Partial CSI [Volume 16, Number 2]
:: Arezoomand, Masoud Design and Calibration of E-Field Probe for Multi Cellular Technology Frequency Bands (2G, 3G,4G) [Volume 15, Number 4]
:: Maddah hosseini, Seyed hashem Design and Calibration of E-Field Probe for Multi Cellular Technology Frequency Bands (2G, 3G,4G) [Volume 15, Number 4]
:: Skandari, Ahmadreza Design and Calibration of E-Field Probe for Multi Cellular Technology Frequency Bands (2G, 3G,4G) [Volume 15, Number 4]
:: Bahri, Reza Design and Calibration of E-Field Probe for Multi Cellular Technology Frequency Bands (2G, 3G,4G) [Volume 15, Number 4]
:: Kheirdoost, Ali Mathematical Formulation and Experimental Evaluation of Efficient 8-Way Microwave Radial Power Combiner for High Power Applications [Volume 15, Number 4]
:: Ahmadi, Behzad Mathematical Formulation and Experimental Evaluation of Efficient 8-Way Microwave Radial Power Combiner for High Power Applications [Volume 15, Number 4]
:: Esnaashari, Mehdi An Efficient Application Deployment in Fog [Volume 15, Number 3]
:: Jafarali Jassbi, Somayyeh An Efficient Application Deployment in Fog [Volume 15, Number 3]
:: Rezaee, Ali An Efficient Application Deployment in Fog [Volume 15, Number 3]
:: Azimzadeh, Masomeh An Efficient Application Deployment in Fog [Volume 15, Number 3]
:: Mohammadi, Shahram Hyperspectral Image Super Resolution Using Anomaly Weighted Gabor Based CNN [Volume 15, Number 2]
:: Imani, Maryam Hyperspectral Image Super Resolution Using Anomaly Weighted Gabor Based CNN [Volume 15, Number 2]
:: Farajzadeh, Ali Hyperspectral Image Super Resolution Using Anomaly Weighted Gabor Based CNN [Volume 15, Number 2]
:: Sadeghinia , Mohammad Identify the Subject and Content of Tweets on Twitter Using Multilayer Neural Network Method and Random Graphs [Volume 15, Number 1]
:: Gerami , Mohsen Identify the Subject and Content of Tweets on Twitter Using Multilayer Neural Network Method and Random Graphs [Volume 15, Number 1]
:: Yazdanian, Vahid Identify the Subject and Content of Tweets on Twitter Using Multilayer Neural Network Method and Random Graphs [Volume 15, Number 1]
:: Motadel, Mohamadreza The Effect of Data Augmentation Techniques on Persian Stance Detection [Volume 15, Number 1]
:: Toloie Eshlaghi, Abbas The Effect of Data Augmentation Techniques on Persian Stance Detection [Volume 15, Number 1]
:: Farhoodi, Mojgan The Effect of Data Augmentation Techniques on Persian Stance Detection [Volume 15, Number 1]
:: Asadpour, Masoud Recognizing Personality Traits using Twitter & Facebook for Arabic Speaking Users in Lebanon [Volume 15, Number 1]
:: Dandash, Mokhaiber Recognizing Personality Traits using Twitter & Facebook for Arabic Speaking Users in Lebanon [Volume 15, Number 1]
:: Rabiei, Leila Identifying Persian bots on Twitter; which feature is more important: Account Information or Tweet Contents? [Volume 15, Number 1]
:: Rahmani, Farzaneh Identifying Persian bots on Twitter; which feature is more important: Account Information or Tweet Contents? [Volume 15, Number 1]
:: Asadi, Nasrin Identifying Persian bots on Twitter; which feature is more important: Account Information or Tweet Contents? [Volume 15, Number 1]
:: Mazoochi, Mojtaba Identifying Persian bots on Twitter; which feature is more important: Account Information or Tweet Contents? [Volume 15, Number 1]
:: Hashembigi, Fatemeh Introduce an Enhanced Hospital Information System Reference Architecture with ATAM Evaluation [Volume 16, Number 1]
:: Asosheh, Abbas Introduce an Enhanced Hospital Information System Reference Architecture with ATAM Evaluation [Volume 16, Number 1]
:: Moshiri, Fatemeh Introduce an Enhanced Hospital Information System Reference Architecture with ATAM Evaluation [Volume 16, Number 1]
:: Salehi Chegani, Reza An Optimized Deep Model for Bi-lingual Sentiment Analysis of Medical User Reviews [Volume 16, Number 1]
:: Nemati, Shahla An Optimized Deep Model for Bi-lingual Sentiment Analysis of Medical User Reviews [Volume 16, Number 1]
:: Morsali, Fatemeh Software Re-Modularization Method Based on Many-Objective Function [Volume 16, Number 1]
:: Karimi Zandian, Zahra Software Re-Modularization Method Based on Many-Objective Function [Volume 16, Number 1]
:: Keyvanpour, Mohammad Reza Software Re-Modularization Method Based on Many-Objective Function [Volume 16, Number 1]
:: Moattar, Seyed Mohammad Hossein Reducing The Computational Complexity of Fuzzy Identity-Based Encryption from Lattice [Volume 16, Number 1]
:: Jabbehdari, Sam Reducing The Computational Complexity of Fuzzy Identity-Based Encryption from Lattice [Volume 16, Number 1]
:: Haj Seyyed Javadi, Hamid Reducing The Computational Complexity of Fuzzy Identity-Based Encryption from Lattice [Volume 16, Number 1]
:: Khajouei-Nejad, Sedigheh Reducing The Computational Complexity of Fuzzy Identity-Based Encryption from Lattice [Volume 16, Number 1]
:: Bushehrian, Omid Energy Efficient Distributed Anomaly Detection using Semi-Supervised Models in IoT [Volume 16, Number 1]
:: Shabani, Mostafa Energy Efficient Distributed Anomaly Detection using Semi-Supervised Models in IoT [Volume 16, Number 1]
:: Broumandnia, Ali Resource Allocation optimization in fog Architecture Based Software-Defined Networks [Volume 15, Number 4]
:: Rahmani, Amir Masoud Resource Allocation optimization in fog Architecture Based Software-Defined Networks [Volume 15, Number 4]
:: Khadem Zadeh, Ahmad Resource Allocation optimization in fog Architecture Based Software-Defined Networks [Volume 15, Number 4]
:: sheikhi nejad, sepideh Resource Allocation optimization in fog Architecture Based Software-Defined Networks [Volume 15, Number 4]
:: Rezaei, Fatemeh Improving the Security of Management Software of Smart Meters Networks [Volume 15, Number 4]
:: Mirsharifi, Mahdiyehsadat Improving the Security of Management Software of Smart Meters Networks [Volume 15, Number 4]
:: Nejati, Payam Facial Expression Recognition Based on Separable Convolution Network and Attention Mechanism [Volume 15, Number 4]
:: Farrokhi Afsharyan, Mostafa Facial Expression Recognition Based on Separable Convolution Network and Attention Mechanism [Volume 15, Number 4]
:: Khani Yengikand, Amir Facial Expression Recognition Based on Separable Convolution Network and Attention Mechanism [Volume 15, Number 4]
:: Yazdani, Naser Network Slicing on 3GPP 5G System Architecture; An End to End Approach [Volume 15, Number 4]
:: Bayat Mokhtari, Mohamad Ali Network Slicing on 3GPP 5G System Architecture; An End to End Approach [Volume 15, Number 4]
:: Seyedin, Sanaz NMF-based Improvement of DNN and LSTM Pre-Training for Speech Enhancemet [Volume 15, Number 3]
:: Safari Dehnavi, Razieh NMF-based Improvement of DNN and LSTM Pre-Training for Speech Enhancemet [Volume 15, Number 3]
:: Siadat, Safieh A New Framework Based on The Internet of Things to Improve the Quality of Education by Detection of Student Stress [Volume 15, Number 3]
:: Tajfar, Amir Houshang A New Framework Based on The Internet of Things to Improve the Quality of Education by Detection of Student Stress [Volume 15, Number 3]
:: Montazer, Gholam Ali Using Blockchain to Improve the Security Of The X3DH Key Exchange Protocol [Volume 15, Number 3]
:: Chaharsooghi, Kamal Using Blockchain to Improve the Security Of The X3DH Key Exchange Protocol [Volume 15, Number 3]
:: Mousavi, Sayed Javad Using Blockchain to Improve the Security Of The X3DH Key Exchange Protocol [Volume 15, Number 3]
:: Moradi, Gholamreza Material Characterization Innovations in Microwave Measurement Laboratory of Amirkabir University of Technology [Volume 15, Number 3]
:: Niksefat, Salman Impact Assessment for Cyber Security Situation Awareness [Volume 15, Number 3]
:: Sadeghiyan , Babak Impact Assessment for Cyber Security Situation Awareness [Volume 15, Number 3]
:: Dehghan, Motahareh Impact Assessment for Cyber Security Situation Awareness [Volume 15, Number 3]
:: FarahaniNia , Sina Impact Assessment for Cyber Security Situation Awareness [Volume 15, Number 3]
:: Seyedin, Sanaz ChatParse: A New Application for Persian Bourse Chatbot [Volume 15, Number 2]
:: Shahedi, Ali ChatParse: A New Application for Persian Bourse Chatbot [Volume 15, Number 2]
:: Shahverdi , Hossein Convolutional Neural Network Based Human Activity Recognition using CSI [Volume 15, Number 2]
:: Ghorashi , Seyed Ali Convolutional Neural Network Based Human Activity Recognition using CSI [Volume 15, Number 2]
:: Shahbazian, Reza Convolutional Neural Network Based Human Activity Recognition using CSI [Volume 15, Number 2]
:: Asvadi , Reza Convolutional Neural Network Based Human Activity Recognition using CSI [Volume 15, Number 2]
:: Fard Moshiri, Parisa Convolutional Neural Network Based Human Activity Recognition using CSI [Volume 15, Number 2]
:: Raiesdana , Somayeh Arabic Handwritten Recognition Using Hybrid CNN, HMM and an Intelligent Network Based on Dentate Gyrus of the Brain [Volume 15, Number 2]
:: Bastanfard , Azam Arabic Handwritten Recognition Using Hybrid CNN, HMM and an Intelligent Network Based on Dentate Gyrus of the Brain [Volume 15, Number 2]
:: Teshnehlab, Mohammad Arabic Handwritten Recognition Using Hybrid CNN, HMM and an Intelligent Network Based on Dentate Gyrus of the Brain [Volume 15, Number 2]
:: Modhej , Nazal Arabic Handwritten Recognition Using Hybrid CNN, HMM and an Intelligent Network Based on Dentate Gyrus of the Brain [Volume 15, Number 2]
:: Barangi, Reza A Partial Method for Calculating CNN Networks Based On Loop Tiling [Volume 15, Number 2]
:: Fathy, Mahmood A Partial Method for Calculating CNN Networks Based On Loop Tiling [Volume 15, Number 2]
:: Beitollahi, Hakem A Partial Method for Calculating CNN Networks Based On Loop Tiling [Volume 15, Number 2]
:: Ali A.D. Farahani, Ali A Partial Method for Calculating CNN Networks Based On Loop Tiling [Volume 15, Number 2]
:: Khodadadi, HamidReza Transmitted Data Security in Non-Orthogonal Multiple Access Networks with Directional Modulation Based on User Location [Volume 15, Number 2]
:: Falsafi, Sepahdar Transmitted Data Security in Non-Orthogonal Multiple Access Networks with Directional Modulation Based on User Location [Volume 15, Number 2]
:: Mobini, Zahra Spectral and Energy Efficiency WirelessPowered Massive-MIMO Heterogeneous Network [Volume 14, Number 1]
:: Mohammadi, Mohammadali Spectral and Energy Efficiency WirelessPowered Massive-MIMO Heterogeneous Network [Volume 14, Number 1]
:: Haghgoy, Sepideh Spectral and Energy Efficiency WirelessPowered Massive-MIMO Heterogeneous Network [Volume 14, Number 1]
:: Keyvanpour, Mohammad Reza Comparative Analytical Survey on SBST Challenges from the Perspective of the Test Techniques [Volume 14, Number 2]
:: Kashefi Gargari , Sepideh Comparative Analytical Survey on SBST Challenges from the Perspective of the Test Techniques [Volume 14, Number 2]
:: Gharaee Garakani, Hossein A Review on Internet Traffic Classification Based on Artificial Intelligence Techniques [Volume 14, Number 2]
:: Naderi, Shaghayegh A Review on Internet Traffic Classification Based on Artificial Intelligence Techniques [Volume 14, Number 2]
:: Malek, Mohammad Pooya A Review on Internet Traffic Classification Based on Artificial Intelligence Techniques [Volume 14, Number 2]
:: Akhavan-Safar, Mostafa cMaxDriver: A Centrality Maximization Intersection Approach for Prediction of Cancer-Causing Genes in the Transcriptional Regulatory Network [Volume 14, Number 1]
:: Teimourpour, Babak cMaxDriver: A Centrality Maximization Intersection Approach for Prediction of Cancer-Causing Genes in the Transcriptional Regulatory Network [Volume 14, Number 1]
:: Lashgari, Sajedeh cMaxDriver: A Centrality Maximization Intersection Approach for Prediction of Cancer-Causing Genes in the Transcriptional Regulatory Network [Volume 14, Number 1]
:: Navidi , Hamidreza A Novel Strategy-Proof Auction Mechanism for Hybrid Spectrum Allocation [Volume 6, Number 2]
:: Bakhshi , Hamidreza A Novel Strategy-Proof Auction Mechanism for Hybrid Spectrum Allocation [Volume 6, Number 2]
:: Pourmina , Mohammad Ali A Novel Strategy-Proof Auction Mechanism for Hybrid Spectrum Allocation [Volume 6, Number 2]
:: Mazoochi , Mojtaba A Novel Strategy-Proof Auction Mechanism for Hybrid Spectrum Allocation [Volume 6, Number 2]
:: Rahmani, Farzaneh A New Framework for Discovering Important Posts and Influential Users in Social Networks [Volume 11, Number 4]
:: Mazoochi, Mojtaba A New Framework for Discovering Important Posts and Influential Users in Social Networks [Volume 11, Number 4]
:: Rabiei, Leila A New Framework for Discovering Important Posts and Influential Users in Social Networks [Volume 11, Number 4]
:: Bagheri, Maryam Web Domains Ranking with Real User Traffic Based on the Big Data Platform [Volume 12, Number 1]
:: Mazoochi, Mojtaba Web Domains Ranking with Real User Traffic Based on the Big Data Platform [Volume 12, Number 1]
:: Rabiei, Leila Web Domains Ranking with Real User Traffic Based on the Big Data Platform [Volume 12, Number 1]
:: Shirali-Shahreza, Mohammad Hasan Humor Detection in Persian: A Transformers-Based Approach [Volume 15, Number 1]
:: Najafi-Lapavandani, Fateme Humor Detection in Persian: A Transformers-Based Approach [Volume 15, Number 1]
:: Amin Mousavi, Seyed Abdollah A New Fuzzy Convolutional Neural Network for Face Recognition to Classify Authorized and Unauthorized Persons [Volume 15, Number 1]
:: Radfar, Reza A New Fuzzy Convolutional Neural Network for Face Recognition to Classify Authorized and Unauthorized Persons [Volume 15, Number 1]
:: Afshar Kazemi, Mohammad Ali A New Fuzzy Convolutional Neural Network for Face Recognition to Classify Authorized and Unauthorized Persons [Volume 15, Number 1]
:: Navid Mahmoudabadi, Navid A New Fuzzy Convolutional Neural Network for Face Recognition to Classify Authorized and Unauthorized Persons [Volume 15, Number 1]
:: Khademzadeh, Ahmad Selfish Node Detection Based on GA and Learning Automata in IoT [Volume 15, Number 1]
:: Gharaee, Hossein Selfish Node Detection Based on GA and Learning Automata in IoT [Volume 15, Number 1]
:: Nopahari, Solmaz Selfish Node Detection Based on GA and Learning Automata in IoT [Volume 15, Number 1]
:: Davoudi, Mona Stance Detection Dataset for Persian Tweets [Volume 14, Number 4]
:: Farhoodi, Mojgan Stance Detection Dataset for Persian Tweets [Volume 14, Number 4]
:: Bokaei, Mohammad Hadi Stance Detection Dataset for Persian Tweets [Volume 14, Number 4]
:: Imani , Maryam Spectrum Similarity-Based Quality Assessment Metric [Volume 14, Number 4]
:: Ghassemian, Hassan Spectrum Similarity-Based Quality Assessment Metric [Volume 14, Number 4]
:: Aghapour Maleki, Shiva Spectrum Similarity-Based Quality Assessment Metric [Volume 14, Number 4]
:: Rahbar, Kambiz Digital Image Enhancement Through Bi-Histogram Equalization Using Entropy-Based Plateau Limit [Volume 14, Number 4]
:: Safardoulabi, Vida Digital Image Enhancement Through Bi-Histogram Equalization Using Entropy-Based Plateau Limit [Volume 14, Number 4]
:: Maleki, Davood Collaborative Mappers based on Co-evolutionary Optimization Technique in MapReduce [Volume 14, Number 4]
:: Ahmadi, Mohammad Reza Collaborative Mappers based on Co-evolutionary Optimization Technique in MapReduce [Volume 14, Number 4]
:: Isvandi, Maryam Providing a Solution to Reduce Energy Consumption in IoT-Based WSNs Based on Node Activity Management [Volume 14, Number 4]
:: Ardebilipour, Mehrdad Resource Management for a Multi-Channel Cognitive-NOMA D2D Network [Volume 14, Number 4]
:: Zeraatkar Moghaddam, Javad Resource Management for a Multi-Channel Cognitive-NOMA D2D Network [Volume 14, Number 4]
:: Hourali, Mansoureh Improving Content-Based Recommender System For Clustering Documents Based on Ontology And New Hierarchical Clustering Method [Volume 14, Number 3]
:: Hourali, Maryam Improving Content-Based Recommender System For Clustering Documents Based on Ontology And New Hierarchical Clustering Method [Volume 14, Number 3]
:: Attarzadeh, Iman Ransomware Modeling Based on a Process Mining Approach [Volume 14, Number 3]
:: Aghamohammadpour, Ali Ransomware Modeling Based on a Process Mining Approach [Volume 14, Number 3]
:: Mahdipour, Ebrahim Ransomware Modeling Based on a Process Mining Approach [Volume 14, Number 3]
:: Imani, Nima Energy Efficient Power Allocation in MIMO-NOMA Systems with ZF Precoding Using Cell Division Technique [Volume 14, Number 3]
:: Nangir, Mahdi Energy Efficient Power Allocation in MIMO-NOMA Systems with ZF Precoding Using Cell Division Technique [Volume 14, Number 3]
:: Sakhaei Gharagezlou, Abdolrasoul Energy Efficient Power Allocation in MIMO-NOMA Systems with ZF Precoding Using Cell Division Technique [Volume 14, Number 3]
:: Roghieh Karimzadeh Baee, Roghieh FDR Adjustment for Achieving Desired Minimum Distance of Marine ESIM from the Shore [Volume 14, Number 3]
:: Shahidzadeh , Saber FDR Adjustment for Achieving Desired Minimum Distance of Marine ESIM from the Shore [Volume 14, Number 3]
:: Hajipour, Pedram FDR Adjustment for Achieving Desired Minimum Distance of Marine ESIM from the Shore [Volume 14, Number 3]
:: Doost, Roghayeh FDR Adjustment for Achieving Desired Minimum Distance of Marine ESIM from the Shore [Volume 14, Number 3]
:: Hatami, Mojtaba The Eficient Alignment of Long DNA Sequences Using Divide and Conquer Approach [Volume 14, Number 3]
:: Behkmal, Behshid The Eficient Alignment of Long DNA Sequences Using Divide and Conquer Approach [Volume 14, Number 3]
:: Babaei , Samira The Eficient Alignment of Long DNA Sequences Using Divide and Conquer Approach [Volume 14, Number 3]
:: Naghibzadeh, Mahmoud The Eficient Alignment of Long DNA Sequences Using Divide and Conquer Approach [Volume 14, Number 3]
:: Abdollahpouri, Alireza DSMN: A New Approach for Link Prediction in Multilplex Networks [Volume 14, Number 3]
:: Samira Rafiee, Samira Rafiee DSMN: A New Approach for Link Prediction in Multilplex Networks [Volume 14, Number 3]
:: Mahdipour, Ebrahim An Inferential Naivety Model for Agents’ Learning in Social Networks [Volume 13, Number 3]
:: Setayeshi, Saeed An Inferential Naivety Model for Agents’ Learning in Social Networks [Volume 13, Number 3]
:: Rezaei, Zeinab An Inferential Naivety Model for Agents’ Learning in Social Networks [Volume 13, Number 3]
:: Hashemi, Ali A Graph-Based Content Similarity Approach for User Recommendation in Telegram [Volume 13, Number 3]
:: Zare Chahooki, Zare Chahooki A Graph-Based Content Similarity Approach for User Recommendation in Telegram [Volume 13, Number 3]
:: Karimpour , Davod A Graph-Based Content Similarity Approach for User Recommendation in Telegram [Volume 13, Number 3]
:: Nataj Solhdar, Mohammad Hassan A Feature Selection Method Base on Fisher Score for Detecting SVM-Based Network Intrusions [Volume 13, Number 3]
:: Abazari , Farzaneh Security Enhancement in Open-Source Healthcare Developer Network using Graph Theory [Volume 13, Number 3]
:: Pouladi , Farhad Security Enhancement in Open-Source Healthcare Developer Network using Graph Theory [Volume 13, Number 3]
:: Sadat Cheraghchi, Hamideh Security Enhancement in Open-Source Healthcare Developer Network using Graph Theory [Volume 13, Number 3]
:: Fasanghari, Mehdi Security Enhancement in Open-Source Healthcare Developer Network using Graph Theory [Volume 13, Number 3]
:: Bushehrian, Omid Anomaly Detection in Non-Stationary Water Distribution Grids Using Fog Computing Architecture [Volume 13, Number 3]
:: AvazAghaei, Mohammad Reza Anomaly Detection in Non-Stationary Water Distribution Grids Using Fog Computing Architecture [Volume 13, Number 3]
:: Mirzaie, Sara Anomaly Detection in Non-Stationary Water Distribution Grids Using Fog Computing Architecture [Volume 13, Number 3]
:: Mansoor, Wathiq Large-Scale Twitter Mining for Extracting the Psychological Impacts of COVID-19 [Volume 14, Number 2]
:: Hajiabadi, Hamideh Large-Scale Twitter Mining for Extracting the Psychological Impacts of COVID-19 [Volume 14, Number 2]
:: Mosafer, Reyhane Large-Scale Twitter Mining for Extracting the Psychological Impacts of COVID-19 [Volume 14, Number 2]
:: Jamalian, Mohadese Large-Scale Twitter Mining for Extracting the Psychological Impacts of COVID-19 [Volume 14, Number 2]
:: Abbasi, Sajedeh Large-Scale Twitter Mining for Extracting the Psychological Impacts of COVID-19 [Volume 14, Number 2]
:: Salmani, Fatemeh Large-Scale Twitter Mining for Extracting the Psychological Impacts of COVID-19 [Volume 14, Number 2]
:: Hajiabadi, Mahdi Large-Scale Twitter Mining for Extracting the Psychological Impacts of COVID-19 [Volume 14, Number 2]
:: Azizi, Faezeh Large-Scale Twitter Mining for Extracting the Psychological Impacts of COVID-19 [Volume 14, Number 2]
:: Vahdat-Nejad, Hamed Large-Scale Twitter Mining for Extracting the Psychological Impacts of COVID-19 [Volume 14, Number 2]
:: Albadvi, Amir Implementing Process Mining Techniques to Analyze Performance in EPC Companies [Volume 14, Number 2]
:: Teimourpour, Babak Implementing Process Mining Techniques to Analyze Performance in EPC Companies [Volume 14, Number 2]
:: Aghdasi, Mohammad Implementing Process Mining Techniques to Analyze Performance in EPC Companies [Volume 14, Number 2]
:: Hosseini, Seyedeh Motahareh Implementing Process Mining Techniques to Analyze Performance in EPC Companies [Volume 14, Number 2]
:: Sadat Cheraghchi, Hamideh Clustering Large-Scale Data using an Incremental Heap Self-Organizing Map [Volume 14, Number 2]
:: Bahrami, Helena Clustering Large-Scale Data using an Incremental Heap Self-Organizing Map [Volume 14, Number 2]
:: Fasanghari , Mehdi Clustering Large-Scale Data using an Incremental Heap Self-Organizing Map [Volume 14, Number 2]
:: Monshizadeh Naeen, Hossein Cost Reduction Using SLA-Aware Genetic Algorithm for Consolidation of Virtual Machines in Cloud Data Centers [Volume 14, Number 2]
:: Gelbukh, Alexander Personality-Based Matrix Factorization for Personalization in Recommender Systems [Volume 14, Number 1]
:: Tohidi, Nasim Personality-Based Matrix Factorization for Personalization in Recommender Systems [Volume 14, Number 1]
:: Dadkhah, Chitra Personality-Based Matrix Factorization for Personalization in Recommender Systems [Volume 14, Number 1]
:: Ghezelji, Mazyar Personality-Based Matrix Factorization for Personalization in Recommender Systems [Volume 14, Number 1]
:: Keyvanpour, Mohammad Reza A Community-Based Method for Identifying Influential Nodes Using Network Embedding [Volume 14, Number 1]
:: Vafaei, Narges A Community-Based Method for Identifying Influential Nodes Using Network Embedding [Volume 14, Number 1]
:: Rahmani , Amir Masoud Toward a Versatile IoT Communication Infrastructure [Volume 14, Number 1]
:: Khademzadeh, Ahmad Toward a Versatile IoT Communication Infrastructure [Volume 14, Number 1]
:: Mousavi, Seyed Mehdi Toward a Versatile IoT Communication Infrastructure [Volume 14, Number 1]
:: Mazinani, Sayyed Majid Energy Efficient Multi-Clustering Using Grey Wolf Optimizer in Wireless Sensor Network [Volume 14, Number 1]
:: Ghorbanvirdi, Maryam Energy Efficient Multi-Clustering Using Grey Wolf Optimizer in Wireless Sensor Network [Volume 14, Number 1]
:: Esnaashari, Mohammad Mehdi A Novel Protocol for Routing in Vehicular Ad hoc Network Based on Model-Based Reinforcement Learning and Fuzzy Logic [Volume 12, Number 4]
:: Dehghan, Mehdi A Novel Protocol for Routing in Vehicular Ad hoc Network Based on Model-Based Reinforcement Learning and Fuzzy Logic [Volume 12, Number 4]
:: Sargolzaey, Hadi A Novel Protocol for Routing in Vehicular Ad hoc Network Based on Model-Based Reinforcement Learning and Fuzzy Logic [Volume 12, Number 4]
:: Jafarzadeh, Omid A Novel Protocol for Routing in Vehicular Ad hoc Network Based on Model-Based Reinforcement Learning and Fuzzy Logic [Volume 12, Number 4]
:: Sharifi, Mohsen A Survey on Task Scheduling Algorithms in Cloud Computing for Fast Big Data Processing [Volume 13, Number 4]
:: Jalalian, Zahra A Survey on Task Scheduling Algorithms in Cloud Computing for Fast Big Data Processing [Volume 13, Number 4]
:: Toosi, Ramin Optimum Group Pixel Matching Strategies for Image Steganography [Volume 13, Number 4]
:: Sarreshtedari, Saeed Optimum Group Pixel Matching Strategies for Image Steganography [Volume 13, Number 4]
:: Ali Akhaee, Mohammad Ali Optimum Group Pixel Matching Strategies for Image Steganography [Volume 13, Number 4]
:: Shahanaghi, Alireza Optimum Group Pixel Matching Strategies for Image Steganography [Volume 13, Number 4]
:: Falahati, Abolfazl The Effective Rate of MISO Systems over EGK Fading Channels [Volume 13, Number 1]
:: Salimian Rizi, Fereshteh The Effective Rate of MISO Systems over EGK Fading Channels [Volume 13, Number 1]
:: Rahiimi, Farshad A Distributed Optimization Approach for Multi-Agent Systems over Delaying Networks [Volume 13, Number 4]
:: Neshat, Mohammad A New Look at the Coding in Time-Modulated Arrays [Volume 13, Number 4]
:: Sadeghi, Ehsan A New Look at the Coding in Time-Modulated Arrays [Volume 13, Number 4]
:: Gholami, Mehdi A New Look at the Coding in Time-Modulated Arrays [Volume 13, Number 4]
:: Akhbari, Bahareh Classical -Quantum Multiple Access Channel with Secrecy Constraint: One-shot Rate Region [Volume 12, Number 2]
:: Aghaee, Hadi Classical -Quantum Multiple Access Channel with Secrecy Constraint: One-shot Rate Region [Volume 12, Number 2]
:: Grami, Mohsen Implementation of Intrusion Detection Systems in order to Detect Phishing in the Banking Industry [Volume 12, Number 2]
:: Sahifa , Abdullah Implementation of Intrusion Detection Systems in order to Detect Phishing in the Banking Industry [Volume 12, Number 2]
:: Yazdanian, Vahid Investigating the Sustainability of Energy Production and Consumption in Data Centers with the Design and Morphology Approach of the Building [Volume 12, Number 4]
:: Gerami, Mohsen Investigating the Sustainability of Energy Production and Consumption in Data Centers with the Design and Morphology Approach of the Building [Volume 12, Number 4]
:: Maskani, Farshad Investigating the Sustainability of Energy Production and Consumption in Data Centers with the Design and Morphology Approach of the Building [Volume 12, Number 4]
:: Moradi, Gholamreza Employing Machine Learning Approach in Cavity Resonator Sensors for Characterization of Lossy Dielectrics [Volume 13, Number 3]
:: Kazemi, Kianoosh Employing Machine Learning Approach in Cavity Resonator Sensors for Characterization of Lossy Dielectrics [Volume 13, Number 3]
:: Moghadam Charkari, Nasrollah A Multilayered Complex Network Model for Image Retrieval [Volume 13, Number 4]
:: i Shakibian, Hadi A Multilayered Complex Network Model for Image Retrieval [Volume 13, Number 4]
:: Sedaghat, Yasser Real-Timeness Improvement of CAN-based Industrial Networks Based on Criticality Level [Volume 13, Number 4]
:: Ghodsollahee, Ismail Real-Timeness Improvement of CAN-based Industrial Networks Based on Criticality Level [Volume 13, Number 4]
:: Soltani, Roya A Smart Contract Model in Knowledge-based Companies Based on Grounded Theory by Focusing on the Robotic Process Automation and Process Management Strategies [Volume 13, Number 2]
:: Toloie, Abbas A Smart Contract Model in Knowledge-based Companies Based on Grounded Theory by Focusing on the Robotic Process Automation and Process Management Strategies [Volume 13, Number 2]
:: Mousavi, Seyyed Alireza A Smart Contract Model in Knowledge-based Companies Based on Grounded Theory by Focusing on the Robotic Process Automation and Process Management Strategies [Volume 13, Number 2]
:: Moridi, Zahra A Smart Contract Model in Knowledge-based Companies Based on Grounded Theory by Focusing on the Robotic Process Automation and Process Management Strategies [Volume 13, Number 2]
:: Nouri, Mohammad Improving Persian Named Entity Recognition Through Multi Task Learning [Volume 13, Number 2]
:: Sepahvand, Abdolah Improving Persian Named Entity Recognition Through Multi Task Learning [Volume 13, Number 2]
:: Bokaei, Mohammad Hadi Improving Persian Named Entity Recognition Through Multi Task Learning [Volume 13, Number 2]
:: Imani, Maryam PolSAR Classification Using Contextual Based Locality Preserving Projection and Guided Filtering [Volume 13, Number 2]
:: Bakhtiyari Shahri, Ahmad Bakhtiyari Shahri Intrusion Detection System to Detect Insider Attack on RPL Routing Protocol Based on Destination Advertisement Object [Volume 13, Number 2]
:: Jahantigh, Nadiya Jahantigh Intrusion Detection System to Detect Insider Attack on RPL Routing Protocol Based on Destination Advertisement Object [Volume 13, Number 2]
:: Mozaffaripour, Mahdi Dimensioning of 5G Networks by Using Stochastic Geometry [Volume 13, Number 2]
:: Samakoush Galougah, Siminfar Dimensioning of 5G Networks by Using Stochastic Geometry [Volume 13, Number 2]
:: Seyed Ali Razavi Parizi, Razavi Parizi Design of Compact Transverse Slot Array Antenna Using Corrugated H plane Horn [Volume 13, Number 2]
:: Ostovarzadeh, Mohammad Hossein Design of Compact Transverse Slot Array Antenna Using Corrugated H plane Horn [Volume 13, Number 2]
:: Mohanna, Farahnaz Content-based Image Retrieval for Carpet E-commerce Application [Volume 13, Number 1]
:: Rezaei, Mehdi Content-based Image Retrieval for Carpet E-commerce Application [Volume 13, Number 1]
:: Shahabi, Mehdi Reza Content-based Image Retrieval for Carpet E-commerce Application [Volume 13, Number 1]
:: Keramati, Mohammad Ali Detection of E-commerce Attacks and Anomalies using Adaptive Neuro-Fuzzy Inference System and Firefly Optimization Algorithm [Volume 13, Number 1]
:: Afshar Kazemi, Mohammad Ali Detection of E-commerce Attacks and Anomalies using Adaptive Neuro-Fuzzy Inference System and Firefly Optimization Algorithm [Volume 13, Number 1]
:: Rezaei, Fereidoon Detection of E-commerce Attacks and Anomalies using Adaptive Neuro-Fuzzy Inference System and Firefly Optimization Algorithm [Volume 13, Number 1]
:: Azghani, Masoumeh Massive MIMO Slow-varying Channel Estimation Using Tensor Sparsity [Volume 13, Number 1]
:: Sadeghi, Nasser Massive MIMO Slow-varying Channel Estimation Using Tensor Sparsity [Volume 13, Number 1]
:: Mousavi, Seyed Mostafa New Phase Realization Approach for Implementation of Braodband Reflectarrays [Volume 13, Number 1]
:: Rafaei-Booket, Mahmood New Phase Realization Approach for Implementation of Braodband Reflectarrays [Volume 13, Number 1]
:: Ghorbani , Ayaz Design of a 4×8 Substrate Integrated Waveguide Butler Matrix with Sidelobe Suppression at 60 GHz [Volume 13, Number 1]
:: Moradi, Gholamreza Design of a 4×8 Substrate Integrated Waveguide Butler Matrix with Sidelobe Suppression at 60 GHz [Volume 13, Number 1]
:: Mehrzad, Zahra Design of a 4×8 Substrate Integrated Waveguide Butler Matrix with Sidelobe Suppression at 60 GHz [Volume 13, Number 1]
:: Fakhrian, Farzane A Graph-based Approach for Persian Entity Linking [Volume 12, Number 4]
:: Minaei-Bidgoli, Behrouz A Graph-based Approach for Persian Entity Linking [Volume 12, Number 4]
:: Asgari-Bidhendi, Majid A Graph-based Approach for Persian Entity Linking [Volume 12, Number 4]
:: Eshaghian, Nasim Fake News Detection Based on Social Features by Ordered Weighted Averaging Fusion [Volume 12, Number 4]
:: Salkhordeh Haghighi, Mehdi Fake News Detection Based on Social Features by Ordered Weighted Averaging Fusion [Volume 12, Number 4]
:: Mehrmolaei , Soheila IR-WCO2C: An Enhanced Multi Operators-Based Approach for Content-Aware Image Retargeting [Volume 12, Number 4]
:: Ahmadzadeh Hosseini, Hoda Sadaat IR-WCO2C: An Enhanced Multi Operators-Based Approach for Content-Aware Image Retargeting [Volume 12, Number 4]
:: Keyvanpour, Mohammadreza IR-WCO2C: An Enhanced Multi Operators-Based Approach for Content-Aware Image Retargeting [Volume 12, Number 4]
:: Reshadi, Midia A Novel Method for Separation of Two Speech Signals Recorded with Two Microphones [Volume 12, Number 4]
:: Rabiee, Azam A Novel Method for Separation of Two Speech Signals Recorded with Two Microphones [Volume 12, Number 4]
:: Setayeshi, Saeed A Novel Method for Separation of Two Speech Signals Recorded with Two Microphones [Volume 12, Number 4]
:: Zohrevandi , Mahbanou A Novel Method for Separation of Two Speech Signals Recorded with Two Microphones [Volume 12, Number 4]
:: Arabsorkhi, Abouzar A Hybrid Method for Measuring Service Supply Chain Performance Management in IT Service Providers [Volume 12, Number 3]
:: Moeini, Ali A Hybrid Method for Measuring Service Supply Chain Performance Management in IT Service Providers [Volume 12, Number 3]
:: Kalantari, Reza A Hybrid Method for Measuring Service Supply Chain Performance Management in IT Service Providers [Volume 12, Number 3]
:: H. Alizadeh, Sasan Unsupervised Feature Selection Based on Low Dimensional Embedding and Subspace Learning [Volume 12, Number 3]
:: Ghatee, Mehdi Unsupervised Feature Selection Based on Low Dimensional Embedding and Subspace Learning [Volume 12, Number 3]
:: Ghasemi Parsa, Ghasemi Parsa Unsupervised Feature Selection Based on Low Dimensional Embedding and Subspace Learning [Volume 12, Number 3]
:: Zare, Hadi Unsupervised Feature Selection Based on Low Dimensional Embedding and Subspace Learning [Volume 12, Number 3]
:: Keyvanpour , MohammadReza Classification and Evaluation of Privacy Preserving Data Mining Methods [Volume 12, Number 3]
:: Nasiri , Negar Classification and Evaluation of Privacy Preserving Data Mining Methods [Volume 12, Number 3]
:: Babamir, Seyed Morteza [Volume 12, Number 3]
:: Ebadifard, Fatemeh [Volume 12, Number 3]
:: Safdarkhani, Hadi Compact, Tunable and Narrowband Waveguide Filters Using TM Dual-Mode Cavities for Satellite Communication Applications [Volume 12, Number 3]
:: Kheirdoost, Ali Compact, Tunable and Narrowband Waveguide Filters Using TM Dual-Mode Cavities for Satellite Communication Applications [Volume 12, Number 3]
:: Eskandari , Ahmadreza Compact, Tunable and Narrowband Waveguide Filters Using TM Dual-Mode Cavities for Satellite Communication Applications [Volume 12, Number 3]
:: Shahzadi, Ali Computing Energy Efficiency for a Cognitive Heterogeneous Satellite Network Based on Interference Management [Volume 12, Number 3]
:: Hajipour, Pedram Computing Energy Efficiency for a Cognitive Heterogeneous Satellite Network Based on Interference Management [Volume 12, Number 3]
:: Bahrak, Behnam Structural Analysis of GitLab's Users and Projects Networks [Volume 12, Number 2]
:: Shahsavan, Faraz Structural Analysis of GitLab's Users and Projects Networks [Volume 12, Number 2]
:: Sabri, Nazanin Structural Analysis of GitLab's Users and Projects Networks [Volume 12, Number 2]
:: Safari, Hadi Structural Analysis of GitLab's Users and Projects Networks [Volume 12, Number 2]
:: Sameti, Hossein Thematic Similarity Multiple-Choice Question Answering with Doc2Vec: A Step Toward Metaphorical Language Processing [Volume 12, Number 2]
:: Hadi Bokaei, Mohammad Hadi Thematic Similarity Multiple-Choice Question Answering with Doc2Vec: A Step Toward Metaphorical Language Processing [Volume 12, Number 2]
:: Soroosh Akef, Soroosh Thematic Similarity Multiple-Choice Question Answering with Doc2Vec: A Step Toward Metaphorical Language Processing [Volume 12, Number 2]
:: Yassini, Parham Color Sensing AR-Based Approach for Supporting Vocabulary Learning in Children [Volume 12, Number 2]
:: Zamiri Zeraati, Farnaz Color Sensing AR-Based Approach for Supporting Vocabulary Learning in Children [Volume 12, Number 2]
:: Tayefeh Mahmoudi, Maryam Color Sensing AR-Based Approach for Supporting Vocabulary Learning in Children [Volume 12, Number 2]
:: Bakhshi, Hamidreza Three-Step Optimization Algorithm in SCMA-based System for User Association and Resource Allocation in C-RAN [Volume 12, Number 2]
:: Farhadi Zavleh, Armin Three-Step Optimization Algorithm in SCMA-based System for User Association and Resource Allocation in C-RAN [Volume 12, Number 2]
:: Ravanmehr, Reza Trend Detection and Prediction in Blogosphere based on Sentiment Analysis using PSO and Q-Learning [Volume 12, Number 1]
:: Mohamadrezaei , Rezvan Trend Detection and Prediction in Blogosphere based on Sentiment Analysis using PSO and Q-Learning [Volume 12, Number 1]
:: Sadeghiyan, Babak Simulating Benchmark Datasets for Worm Propagation Studies [Volume 12, Number 1]
:: Asgari, Sara Simulating Benchmark Datasets for Worm Propagation Studies [Volume 12, Number 1]
:: Gharaee Garakani, Hossein Security Framework of IoT-Based Smart Home [Volume 12, Number 1]
:: Hashemi , Sattar Security Framework of IoT-Based Smart Home [Volume 12, Number 1]
:: Sotoudeh, Shahrouz Security Framework of IoT-Based Smart Home [Volume 12, Number 1]
:: Nassiri, Mahdi Performance Assessment of a Microwave Life-Detection System (MLDS): Modified Quadrature Receiver Versus a Harmonic Radar Architecture [Volume 12, Number 1]
:: Saberkari , Alireza Performance Assessment of a Microwave Life-Detection System (MLDS): Modified Quadrature Receiver Versus a Harmonic Radar Architecture [Volume 12, Number 1]
:: Baghersalimi , Gholamreza Performance Assessment of a Microwave Life-Detection System (MLDS): Modified Quadrature Receiver Versus a Harmonic Radar Architecture [Volume 12, Number 1]
:: Abyar , Kamyar Performance Assessment of a Microwave Life-Detection System (MLDS): Modified Quadrature Receiver Versus a Harmonic Radar Architecture [Volume 12, Number 1]
:: Moeini, Ali Creating a Maximal Clique Graph to Improve Community Detection in SCoDA and OSLOM Algorithms [Volume 11, Number 4]
:: Sabour, Sasan Creating a Maximal Clique Graph to Improve Community Detection in SCoDA and OSLOM Algorithms [Volume 11, Number 4]
:: Moradi, Parham A Text Classification Method Based on Combination of Information Gain and Graph Clustering [Volume 11, Number 4]
:: Zamani, Fatemeh A Text Classification Method Based on Combination of Information Gain and Graph Clustering [Volume 11, Number 4]
:: Rahimi, Shadi A Text Classification Method Based on Combination of Information Gain and Graph Clustering [Volume 11, Number 4]
:: Abdollahpouri, Alireza A Text Classification Method Based on Combination of Information Gain and Graph Clustering [Volume 11, Number 4]
:: hajipour, pedram Providing a Secure Protocol in Smart Metering Networks Based on the Internet of Things [Volume 11, Number 4]
:: Shahsavan, Mona Providing a Secure Protocol in Smart Metering Networks Based on the Internet of Things [Volume 11, Number 4]
:: Eslami, Mahdi Providing a Secure Protocol in Smart Metering Networks Based on the Internet of Things [Volume 11, Number 4]
:: Ebrahimi, Morteza Development and Improvement of Network Reduction Algorithms for Multilayer Networks [Volume 11, Number 4]
:: Ahmadi, Sayyed Hamid Reza Development and Improvement of Network Reduction Algorithms for Multilayer Networks [Volume 11, Number 4]
:: Moheb, Moheb Development and Improvement of Network Reduction Algorithms for Multilayer Networks [Volume 11, Number 4]
:: Teshnelab, Mohammad mproving the Performance of Text Sentiment Analysis using Deep Convolutional Neural Network Integrated with Hierarchical Attention Layer [Volume 11, Number 3]
:: Pedram, Mir Mohsen mproving the Performance of Text Sentiment Analysis using Deep Convolutional Neural Network Integrated with Hierarchical Attention Layer [Volume 11, Number 3]
:: Sadr, Hossein mproving the Performance of Text Sentiment Analysis using Deep Convolutional Neural Network Integrated with Hierarchical Attention Layer [Volume 11, Number 3]
:: Sedighian Kashi, Saeed Auto-Encoder LSTM Methods for Anomaly-Based Web Application Firewallall [Volume 11, Number 3]
:: Teshnehlab, Mohammad Auto-Encoder LSTM Methods for Anomaly-Based Web Application Firewallall [Volume 11, Number 3]
:: Mehralian, Soheil Auto-Encoder LSTM Methods for Anomaly-Based Web Application Firewallall [Volume 11, Number 3]
:: Moradi Vartouni, Ali Auto-Encoder LSTM Methods for Anomaly-Based Web Application Firewallall [Volume 11, Number 3]
:: Reshadi, Midia DTIS: Destination Traffic Based Input Selection Strategy Based on Traffic Pattern for Network-on-Chip Systems [Volume 11, Number 3]
:: Khademzadeh, Ahmad DTIS: Destination Traffic Based Input Selection Strategy Based on Traffic Pattern for Network-on-Chip Systems [Volume 11, Number 3]
:: Mehranzadeh, Amin DTIS: Destination Traffic Based Input Selection Strategy Based on Traffic Pattern for Network-on-Chip Systems [Volume 11, Number 3]
:: Sheikhan, Mansour Compressive Sensing in IoT-Based Multi-Sensor Wireless Sensor Networks [Volume 11, Number 3]
:: Tabataba Vakili, Vahid Compressive Sensing in IoT-Based Multi-Sensor Wireless Sensor Networks [Volume 11, Number 3]
:: Ghaderi, Mohammad Reza Compressive Sensing in IoT-Based Multi-Sensor Wireless Sensor Networks [Volume 11, Number 3]
:: Darmani, Yousef Multi-Objective P- Epidemic Forwarding Method in Heterogeneous DTNs Using NSGA-II [Volume 11, Number 3]
:: Karimi, Shiva Multi-Objective P- Epidemic Forwarding Method in Heterogeneous DTNs Using NSGA-II [Volume 11, Number 3]
:: Razavizadeh, S. Mohammad Energy Efficiency of Massive MIMO Cognitive Radio Networks in Presence of Smart Jamming [Volume 11, Number 3]
:: Kahaei, Mohammad Hossein Energy Efficiency of Massive MIMO Cognitive Radio Networks in Presence of Smart Jamming [Volume 11, Number 3]
:: Zamanian, S. Fatemeh Energy Efficiency of Massive MIMO Cognitive Radio Networks in Presence of Smart Jamming [Volume 11, Number 3]
:: Shayegan, Mohammad Javad A Method for Anomaly Detection in Big Data based on Support Vector Machine [Volume 11, Number 3]
:: Harimi, Masoud A Method for Anomaly Detection in Big Data based on Support Vector Machine [Volume 11, Number 3]
:: Tamaddondar, Mohammad Mehdi A 3D Time-Variant Non-Stationary Hybrid Channel Model for Massive MIMO Systems [Volume 11, Number 2]
:: Khosravi, Samiyeh Proposing a New Algorithm for Predicting Short-Term and Long-Term Trust-ability in Cloud Computing [Volume 11, Number 2]
:: Hosseinzadeh, Mehdi LABTS: a Learning Automata-Based Task Scheduling algorithm in cloud computing [Volume 11, Number 2]
:: khademzadeh, ahmad LABTS: a Learning Automata-Based Task Scheduling algorithm in cloud computing [Volume 11, Number 2]
:: zekrizadeh, neda LABTS: a Learning Automata-Based Task Scheduling algorithm in cloud computing [Volume 11, Number 2]
:: Farajian, Nima Sparse, Robust and Discriminative Representation by Supervised Regularized Auto-encoder [Volume 11, Number 2]
:: Mobini, Zahra Wireless-powered Cooperative Spectrum Sharing Networks with Full-duplex and NOMA Transmissions [Volume 11, Number 2]
:: Mohammadi, Mohammadali Wireless-powered Cooperative Spectrum Sharing Networks with Full-duplex and NOMA Transmissions [Volume 11, Number 2]
:: Hakimi, Azar Wireless-powered Cooperative Spectrum Sharing Networks with Full-duplex and NOMA Transmissions [Volume 11, Number 2]
:: Sarraf Shirazi, Reza Two Ports SIW Array Antenna with Circular Polarization for 5G Base Station [Volume 11, Number 2]
:: Moradi, Gholamreza Two Ports SIW Array Antenna with Circular Polarization for 5G Base Station [Volume 11, Number 2]
:: Shirichian, Mehdi Two Ports SIW Array Antenna with Circular Polarization for 5G Base Station [Volume 11, Number 2]
:: Badie, Kambiz Conflict Resolution in Data Integration Using the Relationship Between Entities [Volume 11, Number 2]
:: Sharifi, Arash Conflict Resolution in Data Integration Using the Relationship Between Entities [Volume 11, Number 2]
:: Ahmadi, Ali Conflict Resolution in Data Integration Using the Relationship Between Entities [Volume 11, Number 2]
:: Nakhaei , Zeinab Conflict Resolution in Data Integration Using the Relationship Between Entities [Volume 11, Number 2]
:: arabsorkhi, abouzar A Novel Model for MSSP Maturity Assessment [Volume 11, Number 1]
:: Gholami Merhabadi, Mohammad A Novel Model for MSSP Maturity Assessment [Volume 11, Number 1]
:: kassaee, massoud A Novel Model for MSSP Maturity Assessment [Volume 11, Number 1]
:: Menhaj, Mohammad Bagher Converting and Completing RDF Based Ontology into Fuzzy Ontology Using Neural Tensor Network [Volume 11, Number 1]
:: Keyvanpour, Mohammadreza Converting and Completing RDF Based Ontology into Fuzzy Ontology Using Neural Tensor Network [Volume 11, Number 1]
:: Abedini, Farhad Converting and Completing RDF Based Ontology into Fuzzy Ontology Using Neural Tensor Network [Volume 11, Number 1]
:: Saedi, Chakaveh Automatic Synset Extraction from text documents using a Graph-Based Clustering Approach [Volume 11, Number 1]
:: Minaei-Bidgoli, Behrouz Automatic Synset Extraction from text documents using a Graph-Based Clustering Approach [Volume 11, Number 1]
:: Khorasani, Mahsa Automatic Synset Extraction from text documents using a Graph-Based Clustering Approach [Volume 11, Number 1]
:: Askarpour, Amir Nader Numerical Full wave Analysis and Modeling of Plasmonic HEMT Performance Using Hydrodynamic Model [Volume 11, Number 1]
:: Abdipour, Abdolali Numerical Full wave Analysis and Modeling of Plasmonic HEMT Performance Using Hydrodynamic Model [Volume 11, Number 1]
:: Daneshmandian, Farzaneh Numerical Full wave Analysis and Modeling of Plasmonic HEMT Performance Using Hydrodynamic Model [Volume 11, Number 1]
:: Ranjbar Rafie, Davood Transmit Power Optimization in Optical Coherent Transmission Systems: Analytical, Simulation, and Experimental Results [Volume 11, Number 1]
:: Hashemi, Mahdi Transmit Power Optimization in Optical Coherent Transmission Systems: Analytical, Simulation, and Experimental Results [Volume 11, Number 1]
:: Emami, Ali Transmit Power Optimization in Optical Coherent Transmission Systems: Analytical, Simulation, and Experimental Results [Volume 11, Number 1]
:: Beyranvand, Hamzeh Transmit Power Optimization in Optical Coherent Transmission Systems: Analytical, Simulation, and Experimental Results [Volume 11, Number 1]
:: Habibi, Mehdi Transmit Power Optimization in Optical Coherent Transmission Systems: Analytical, Simulation, and Experimental Results [Volume 11, Number 1]
:: Hashemi, Ramin Transmit Power Optimization in Optical Coherent Transmission Systems: Analytical, Simulation, and Experimental Results [Volume 11, Number 1]
:: Ganjtabesh, Ahmad Fuzzy Sequential Pattern Mining over Quantitative Streams [Volume 11, Number 1]
:: Eshghi , Farshad Fuzzy Sequential Pattern Mining over Quantitative Streams [Volume 11, Number 1]
:: Kelarestaghi , Manoochehr Fuzzy Sequential Pattern Mining over Quantitative Streams [Volume 11, Number 1]
:: Shakeri, Omid Fuzzy Sequential Pattern Mining over Quantitative Streams [Volume 11, Number 1]
:: Nasiriasayesh, Hamidreza Continuous Double Auction Scheduling in Federated Cloud Services [Volume 11, Number 1]
:: Yari, Alireza Continuous Double Auction Scheduling in Federated Cloud Services [Volume 11, Number 1]
:: Hosseinpour, Mohaddeseh Continuous Double Auction Scheduling in Federated Cloud Services [Volume 11, Number 1]
:: Dadashtabar, Kourosh Sensing Radius Adjustment in Wireless Sensor Networks: A Game Theoretical Approach [Volume 11, Number 4]
:: Shirazi, Hossein Sensing Radius Adjustment in Wireless Sensor Networks: A Game Theoretical Approach [Volume 11, Number 4]
:: Golrasan, Elham Sensing Radius Adjustment in Wireless Sensor Networks: A Game Theoretical Approach [Volume 11, Number 4]
:: Sarhangi, Saeid OSDTM: an Offline-Structural Distributed Test Mechanism for Data Links in NoC [Volume 10, Number 4]
:: Reshadi, Midia OSDTM: an Offline-Structural Distributed Test Mechanism for Data Links in NoC [Volume 10, Number 4]
:: Badie, Kambiz OSDTM: an Offline-Structural Distributed Test Mechanism for Data Links in NoC [Volume 10, Number 4]
:: Khademzadeh, Ahmad OSDTM: an Offline-Structural Distributed Test Mechanism for Data Links in NoC [Volume 10, Number 4]
:: Aghaei, Babak OSDTM: an Offline-Structural Distributed Test Mechanism for Data Links in NoC [Volume 10, Number 4]
:: Yari, Alireza Efficient Policy-Aware Deployment of Business Process in Cloud Federation [Volume 10, Number 3]
:: Nasiriasayesh, Hamidreza Efficient Policy-Aware Deployment of Business Process in Cloud Federation [Volume 10, Number 3]
:: Alizadeh, Behrooz Network Planning Policies for Joint Switching in Spectrally-Spatially Flexible Optical Networks [Volume 10, Number 4]
:: Ghaffarpour Rahbar, Akbar Network Planning Policies for Joint Switching in Spectrally-Spatially Flexible Optical Networks [Volume 10, Number 4]
:: Yaghubi-Namaad, Mohsen Network Planning Policies for Joint Switching in Spectrally-Spatially Flexible Optical Networks [Volume 10, Number 4]
:: Zahedi, Shamsossadat A Framework for ICT-Oriented Sustainable Development through Mapping from ICT Concerns onto Sustainability Indicators [Volume 10, Number 4]
:: Azadnia, Mohammad A Framework for ICT-Oriented Sustainable Development through Mapping from ICT Concerns onto Sustainability Indicators [Volume 10, Number 4]
:: Fazli, Mohammad Amin The Emotional Promulgation of Social Norms in Social Networks Based on Structural Properties [Volume 10, Number 4]
:: Habibi, Jafar The Emotional Promulgation of Social Norms in Social Networks Based on Structural Properties [Volume 10, Number 4]
:: Sajadi, Seyed Hadi The Emotional Promulgation of Social Norms in Social Networks Based on Structural Properties [Volume 10, Number 4]
:: Ahmadi, Ali Deep Learning Based on Parallel CNNs for Pedestrian Detection [Volume 10, Number 4]
:: Saeidi, Mahmoud Deep Learning Based on Parallel CNNs for Pedestrian Detection [Volume 10, Number 4]
:: Joda, Roghayeh A Proactive Context-Aware Self-Healing Scheme for 5G Using Machine Learning [Volume 10, Number 4]
:: Akbari, Mohammad A Proactive Context-Aware Self-Healing Scheme for 5G Using Machine Learning [Volume 10, Number 4]
:: Nikmanesh, Shirin A Proactive Context-Aware Self-Healing Scheme for 5G Using Machine Learning [Volume 10, Number 4]
:: Asadpour, Masoud On the Reselection of Seed Nodes in Independent Cascade Based Influence Maximization [Volume 10, Number 4]
:: Faili, Heshaam On the Reselection of Seed Nodes in Independent Cascade Based Influence Maximization [Volume 10, Number 4]
:: Vardasbi, Ali On the Reselection of Seed Nodes in Independent Cascade Based Influence Maximization [Volume 10, Number 4]
:: Hatefi, Seyed Morteza The Effect of Information Sharing on the Assessment of Supply Chain Performance in Uncertain Conditions [Volume 10, Number 2]
:: Izadbakhsh, Hamidreza The Effect of Information Sharing on the Assessment of Supply Chain Performance in Uncertain Conditions [Volume 10, Number 2]
:: Mohamadi Janaki, Daryosh The Effect of Information Sharing on the Assessment of Supply Chain Performance in Uncertain Conditions [Volume 10, Number 2]
:: Rahmani, Amir Masoud ISOT: Distributed Selfish Node Detection in Internet of Things [Volume 10, Number 3]
:: Khademzadeh, Ahmad ISOT: Distributed Selfish Node Detection in Internet of Things [Volume 10, Number 3]
:: Gharaee Garakani, Hossein ISOT: Distributed Selfish Node Detection in Internet of Things [Volume 10, Number 3]
:: Nobahary, Solmaz ISOT: Distributed Selfish Node Detection in Internet of Things [Volume 10, Number 3]
:: Afshinfar, Arash An ERP Framework Based on Service Oriented Architecture and Cloud Computing Environment Case: IRISL Container Department [Volume 10, Number 3]
:: Farjami, Yaghoub An ERP Framework Based on Service Oriented Architecture and Cloud Computing Environment Case: IRISL Container Department [Volume 10, Number 3]
:: Asosheh, Abbas An ERP Framework Based on Service Oriented Architecture and Cloud Computing Environment Case: IRISL Container Department [Volume 10, Number 3]
:: Fadishei, Hamid Energy-Efficient Human Activity Recognition on Smartphones: A Test-Cost Sensitive Approach [Volume 10, Number 3]
:: Aref, Mohammad Reza A Hybrid DOS-Tolerant PKC-Based Key Management System for WSNs [Volume 10, Number 3]
:: Payandeh, Ali A Hybrid DOS-Tolerant PKC-Based Key Management System for WSNs [Volume 10, Number 3]
:: Ghasemzadeh, Hamzeh A Hybrid DOS-Tolerant PKC-Based Key Management System for WSNs [Volume 10, Number 3]
:: Pedram, Hossein Power-Efficient Resource Allocation in Massive MIMO Aided Cloud RANs [Volume 10, Number 3]
:: Taheri, Hassan Power-Efficient Resource Allocation in Massive MIMO Aided Cloud RANs [Volume 10, Number 3]
:: Parsaeefard, Saeedeh Power-Efficient Resource Allocation in Massive MIMO Aided Cloud RANs [Volume 10, Number 3]
:: Amani, Nahid Power-Efficient Resource Allocation in Massive MIMO Aided Cloud RANs [Volume 10, Number 3]
:: Zakeri, Fahimeh PSO-Based Scheduling Algorithm for Time and Cost Optimization in Mobile Grid [Volume 10, Number 3]
:: Golsorkhtabaramiri, Mehdi PSO-Based Scheduling Algorithm for Time and Cost Optimization in Mobile Grid [Volume 10, Number 3]
:: Sharifi, Mohsen EDBPM: An Event-Driven Business Process Monitoring Mechanism [Volume 10, Number 2]
:: Allahdadi, Farshad EDBPM: An Event-Driven Business Process Monitoring Mechanism [Volume 10, Number 2]
:: Fardbastani, Mohammad Ali EDBPM: An Event-Driven Business Process Monitoring Mechanism [Volume 10, Number 2]
:: Zarifzadeh, Sajjad Practical Detection of Click Spams Using Efficient Classification-Based Algorithms [Volume 10, Number 2]
:: Fallah, Mahdieh Practical Detection of Click Spams Using Efficient Classification-Based Algorithms [Volume 10, Number 2]
:: Arabsorkhi, Abouzar Skin Classification for Adult Image Recognition Based on Combination of Gaussian and Weight-KNN [Volume 10, Number 2]
:: Karamizadeh, Sasan Skin Classification for Adult Image Recognition Based on Combination of Gaussian and Weight-KNN [Volume 10, Number 2]
:: Sheikhy, Ayyub Impact of Empowering Communication Technology Practices on Service Performance in Information Technology Sector [Volume 10, Number 2]
:: Salajegheh, Sanjar Impact of Empowering Communication Technology Practices on Service Performance in Information Technology Sector [Volume 10, Number 2]
:: Mollahosseini, Ali Impact of Empowering Communication Technology Practices on Service Performance in Information Technology Sector [Volume 10, Number 2]
:: Nasiri, Rouhollah Impact of Empowering Communication Technology Practices on Service Performance in Information Technology Sector [Volume 10, Number 2]
:: Haghparast, Majid A Framework for Optimal Fault Tolerance Protocol Selection Using Fuzzy Logic on IoT Sensor Layer [Volume 10, Number 2]
:: Khadem-Zadeh, Ahmad A Framework for Optimal Fault Tolerance Protocol Selection Using Fuzzy Logic on IoT Sensor Layer [Volume 10, Number 2]
:: Nazari Cheraghlou, Mehdi A Framework for Optimal Fault Tolerance Protocol Selection Using Fuzzy Logic on IoT Sensor Layer [Volume 10, Number 2]
:: Vaezpour, Elaheh A Conceptual Framework and Architectural Considerations for Capability Enhancement in Software Defined Networks [Volume 10, Number 2]
:: Yeganeh, Hassan A Conceptual Framework and Architectural Considerations for Capability Enhancement in Software Defined Networks [Volume 10, Number 2]
:: Seyfe, Babak A Fairness-Guaranteed Game-Theoretic Perspective in Multi-User Interference Channel [Volume 9, Number 4]
:: Ebrahimkhani, Atena A Fairness-Guaranteed Game-Theoretic Perspective in Multi-User Interference Channel [Volume 9, Number 4]
:: Akhbari, Bahareh A Fairness-Guaranteed Game-Theoretic Perspective in Multi-User Interference Channel [Volume 9, Number 4]
:: Peyravi , Farzad An Agent-Mediated Knowledge Management System in Call Centers Using SMV and TROPOS [Volume 1, Number 1]
:: Taghiyareh , Fattaneh An Agent-Mediated Knowledge Management System in Call Centers Using SMV and TROPOS [Volume 1, Number 1]
:: Pashaei , Kaveh An Agent-Mediated Knowledge Management System in Call Centers Using SMV and TROPOS [Volume 1, Number 1]
:: Ahmadi , Mohammad Reza A New Recommender System based on Cooperative Co-evolution Algorithm [Volume 1, Number 1]
:: Lotfizad , Mojtaba Modified Wavelet-domain Adaptive Filtering Scheme for Stereophonic Acoustic Echo Cancellation in the Teleconferencing Application [Volume 1, Number 1]
:: Bekrani , Mehdi Modified Wavelet-domain Adaptive Filtering Scheme for Stereophonic Acoustic Echo Cancellation in the Teleconferencing Application [Volume 1, Number 1]
:: Akbari , Ahmad Noise Reduction from Speech Signal based on Wavelet Transform and Kullback-Leibler Divergence [Volume 1, Number 1]
:: Tabibian , Shima Noise Reduction from Speech Signal based on Wavelet Transform and Kullback-Leibler Divergence [Volume 1, Number 1]
:: Tinati , Mohammad Ali Wavelet-based Robust Voice conversion systems [Volume 1, Number 1]
:: Farhid , Morteza Wavelet-based Robust Voice conversion systems [Volume 1, Number 1]
:: Moghaddam Charkari , Nasrollah 3D Triangular Mesh Digital Watermarking based on Median and Indices [Volume 1, Number 1]
:: Farid , Reza 3D Triangular Mesh Digital Watermarking based on Median and Indices [Volume 1, Number 1]
:: Azmi , Paeiz On the Distribution of the Sum of Independent Random Variables and Its Application [Volume 1, Number 1]
:: Samimi , Hossein On the Distribution of the Sum of Independent Random Variables and Its Application [Volume 1, Number 1]
:: Nasiri Kenari , Masoumeh Combined Coding and Spread Spectrum Modulatin in Wideband Code Division Multiple Access Communication Systems [Volume 1, Number 2]
:: Granpayeh , Nosratollah Design and Fabrication of an Optical Nanofilter based on Surface Plasmons [Volume 1, Number 2]
:: Abrishamian , Mohammad Sadegh Design and Fabrication of an Optical Nanofilter based on Surface Plasmons [Volume 1, Number 2]
:: Pakizeh , Tavakol Design and Fabrication of an Optical Nanofilter based on Surface Plasmons [Volume 1, Number 2]
:: Mirian Hossinabadi , Seyyed Hassan ON THE CORRECTNESS OF A TRANSLATION MAP BETWEEN SPECIFICATIONS IN Z AND SETL2 PROTOTYPE [Volume 1, Number 2]
:: Changizi , Behnaz ON THE CORRECTNESS OF A TRANSLATION MAP BETWEEN SPECIFICATIONS IN Z AND SETL2 PROTOTYPE [Volume 1, Number 2]
:: Golestani , Seyed Jamaleddin Optimum Routing and Scheduling in Wireless Nerworks [Volume 1, Number 2]
:: Sadat Moayedian , Naghmeh Optimum Routing and Scheduling in Wireless Nerworks [Volume 1, Number 2]
:: Rajabzadeh , Morteza A Novel Method to Equalize Frequency-Selective MIMO Channels Using Genetic Algorithm and Singular Value Decomposition of Polynomial Matrice [Volume 1, Number 2]
:: Khoshbin , Hossein A Novel Method to Equalize Frequency-Selective MIMO Channels Using Genetic Algorithm and Singular Value Decomposition of Polynomial Matrice [Volume 1, Number 2]
:: Ahadi Akhlaghi , Iman A Novel Method to Equalize Frequency-Selective MIMO Channels Using Genetic Algorithm and Singular Value Decomposition of Polynomial Matrice [Volume 1, Number 2]
:: Mirmohammad Sadeghi , Hamid Design and Implementation of An Aperture Coupled Microstrip IFF Antenna [Volume 1, Number 2]
:: Eskandari , Hamidreza Design and Implementation of An Aperture Coupled Microstrip IFF Antenna [Volume 1, Number 2]
:: Askari , Gholamreza Design and Implementation of An Aperture Coupled Microstrip IFF Antenna [Volume 1, Number 2]
:: Niroo Jazi , Mahmood Design and Implementation of An Aperture Coupled Microstrip IFF Antenna [Volume 1, Number 2]
:: Abolghasemi , Ali Novel Approach to Ultra-Wideband Antenna Design [Volume 1, Number 2]
:: Fardis , Masoum Novel Approach to Ultra-Wideband Antenna Design [Volume 1, Number 2]
:: Paran , Kian Novel Approach to Ultra-Wideband Antenna Design [Volume 1, Number 2]
:: Bijankhan , Mahmoud Corpus-Based Analysis for Multi-Token Units in Persian [Volume 1, Number 3]
:: Sharifi Atashgah , Masoud Corpus-Based Analysis for Multi-Token Units in Persian [Volume 1, Number 3]
:: Arab Yarmohammadi , Mahsa Designing and Developing a Wordnet for Persian Nouns Pages [Volume 1, Number 3]
:: Shamsfard , Mehrnoush Designing and Developing a Wordnet for Persian Nouns Pages [Volume 1, Number 3]
:: Asi , Seyed Mostafa Designing and Developing a Wordnet for Persian Nouns Pages [Volume 1, Number 3]
:: Ehsani , Akbar Designing and Developing a Wordnet for Persian Nouns Pages [Volume 1, Number 3]
:: AI-Araji , Saleh Performance Analysis of Zero Crossing DPLL with Linearized Phase Detector [Volume 1, Number 3]
:: Nasir , Qassim Performance Analysis of Zero Crossing DPLL with Linearized Phase Detector [Volume 1, Number 3]
:: Adjeroh , Donald A Reliable Transport Protocol for Wireless Sensor Networks [Volume 1, Number 3]
:: Yaghmaee Moghaddam , Mohammad Hossien A Reliable Transport Protocol for Wireless Sensor Networks [Volume 1, Number 3]
:: Nooshyar , Mahdi A Novel Still Image Error Concealment Using Fragile Watermarking in Wireless Image , Transmission and Packet-Switched Networks [Volume 1, Number 3]
:: Musevi niya , Javad A Novel Still Image Error Concealment Using Fragile Watermarking in Wireless Image , Transmission and Packet-Switched Networks [Volume 1, Number 3]
:: Aghagolzadeh, Ali A Novel Still Image Error Concealment Using Fragile Watermarking in Wireless Image , Transmission and Packet-Switched Networks [Volume 1, Number 3]
:: Bashiri , Davood A Novel Still Image Error Concealment Using Fragile Watermarking in Wireless Image , Transmission and Packet-Switched Networks [Volume 1, Number 3]
:: Mohammadi , Abbas Characterization of Wireless Mesh Backhaul Networks with MIMO Systems [Volume 1, Number 3]
:: Haghighizadeh, Navin Characterization of Wireless Mesh Backhaul Networks with MIMO Systems [Volume 1, Number 3]
:: Nasser , Nidal A Backup Routing Scheme for Mobile Ad-Hoc Networks [Volume 1, Number 3]
:: Esmailpour , Amir A Backup Routing Scheme for Mobile Ad-Hoc Networks [Volume 1, Number 3]
:: Kabir , Ehsanollah A Fuzzy Approach for Measuring Features Reliabilities in Particle Filtering Framework [Volume 1, Number 4]
:: Armanfard , Narges A Fuzzy Approach for Measuring Features Reliabilities in Particle Filtering Framework [Volume 1, Number 4]
:: Komeili , Majid A Fuzzy Approach for Measuring Features Reliabilities in Particle Filtering Framework [Volume 1, Number 4]
:: Tabataba Vakili , Vahid Adaptive Methods for Joint Compensation of Power Amplifier Nonlinearity and Quadrature Modulator IQ Imbalance [Volume 1, Number 4]
:: Zareian , Hassan Adaptive Methods for Joint Compensation of Power Amplifier Nonlinearity and Quadrature Modulator IQ Imbalance [Volume 1, Number 4]
:: Meybodi, Mohammad Reza Rule Scheduling in Active Database using Learning Automata [Volume 1, Number 4]
:: Rasoolzadegan , Abbas Rule Scheduling in Active Database using Learning Automata [Volume 1, Number 4]
:: Keyhanipour , Amir Hossein Adaptive Combinational Web Ranking Algorithm Using Coarse-grained and Fine-grained Features [Volume 1, Number 4]
:: Yazdani , Nasser Adaptive Combinational Web Ranking Algorithm Using Coarse-grained and Fine-grained Features [Volume 1, Number 4]
:: Azadnia , Mohammad Adaptive Combinational Web Ranking Algorithm Using Coarse-grained and Fine-grained Features [Volume 1, Number 4]
:: Zareh Bidoki , Ali Mohammad Adaptive Combinational Web Ranking Algorithm Using Coarse-grained and Fine-grained Features [Volume 1, Number 4]
:: Badie , Kambiz A Framework for Technology Foresight Based on Ontology Integration of the Most Famous Foresight Models [Volume 1, Number 4]
:: Fasanghari, Mahdi A Framework for Technology Foresight Based on Ontology Integration of the Most Famous Foresight Models [Volume 1, Number 4]
:: Mohamedpour, Maryam A Framework for Technology Foresight Based on Ontology Integration of the Most Famous Foresight Models [Volume 1, Number 4]
:: Mohammadi Takami , Mohsen Intelligent Content-based Categorization of Web pages Using Combination of Textual, Structural, and Visual Features [Volume 1, Number 4]
:: Zamanian , Mahdi Intelligent Content-based Categorization of Web pages Using Combination of Textual, Structural, and Visual Features [Volume 1, Number 4]
:: Ahmadi , Ali Intelligent Content-based Categorization of Web pages Using Combination of Textual, Structural, and Visual Features [Volume 1, Number 4]
:: Aleahmad , Abolfazl Design and Implementation of a Language Specific Crawler to Improve Crawling of Persian Web Documents [Volume 1, Number 4]
:: Yari , Alireza Design and Implementation of a Language Specific Crawler to Improve Crawling of Persian Web Documents [Volume 1, Number 4]
:: Azimzadeh , Masomeh Design and Implementation of a Language Specific Crawler to Improve Crawling of Persian Web Documents [Volume 1, Number 4]
:: Badie , Kambiz A New Framework for Enterprise Interoperability Based on Meta- synthesis Approach through Combination of Current Frameworks [Volume 1, Number 4]
:: Abbasi Shahkooh, Kolsoom A New Framework for Enterprise Interoperability Based on Meta- synthesis Approach through Combination of Current Frameworks [Volume 1, Number 4]
:: Sadeghi , Masoumeh A New Framework for Enterprise Interoperability Based on Meta- synthesis Approach through Combination of Current Frameworks [Volume 1, Number 4]
:: Dastranj Mamaghani , Nasrin A New Framework for Enterprise Interoperability Based on Meta- synthesis Approach through Combination of Current Frameworks [Volume 1, Number 4]
:: Soltani Panah , Arezou Speech Acts Classification of Persian Language Texts Using Three Machine Leaming Methods [Volume 2, Number 1]
:: Homayounpour, Mohammad Mehdi Speech Acts Classification of Persian Language Texts Using Three Machine Leaming Methods [Volume 2, Number 1]
:: Molavi-kakhki , Mohammad A Hammerstein Diversity Combining Technique [Volume 2, Number 1]
:: Aminian, Amir Masoud A Hammerstein Diversity Combining Technique [Volume 2, Number 1]
:: Raiyat Aliabadi , Mohammad A Novel Scheme for Fault-Tolerant And Higher Capacity Network on Chip [Volume 2, Number 1]
:: Khadem zadeh , Ahmad A Novel Scheme for Fault-Tolerant And Higher Capacity Network on Chip [Volume 2, Number 1]
:: Raiyat Aliabadi , Maryam A Novel Scheme for Fault-Tolerant And Higher Capacity Network on Chip [Volume 2, Number 1]
:: Berenjkoub , Mehdi A Taxonomy for Network Vulnerabilities [Volume 2, Number 1]
:: Hendessi , Faramarz A Taxonomy for Network Vulnerabilities [Volume 2, Number 1]
:: Hajian , Sara A Taxonomy for Network Vulnerabilities [Volume 2, Number 1]
:: Ghobadi , Changiz Multiband Hybrid Loop/Monopole Slot/Planar Monopole Antenna for Mobile Phone Application [Volume 2, Number 1]
:: Nourinia , Javad Multiband Hybrid Loop/Monopole Slot/Planar Monopole Antenna for Mobile Phone Application [Volume 2, Number 1]
:: Rezaee , Morteza Multiband Hybrid Loop/Monopole Slot/Planar Monopole Antenna for Mobile Phone Application [Volume 2, Number 1]
:: Kahaei , Mohammad Hossein A Maximum Likehood Frequency Offset Estimation with Improved Range ad Performance in OFDM Systems [Volume 2, Number 1]
:: Nezamfar , Hooman A Maximum Likehood Frequency Offset Estimation with Improved Range ad Performance in OFDM Systems [Volume 2, Number 1]
:: Sheikhzadeh Nadjar , Hamid VQ-based Approach to Single-Channel Audio Separation for Music and Speech Mixtures [Volume 2, Number 1]
:: Sayadiyan , Abolghasem VQ-based Approach to Single-Channel Audio Separation for Music and Speech Mixtures [Volume 2, Number 1]
:: Mowlaee , Pejman VQ-based Approach to Single-Channel Audio Separation for Music and Speech Mixtures [Volume 2, Number 1]
:: Palangi , Hamid The Unified Approach to Set-Membership and Selective Partial Update Adaptive Filtering Algorithms [Volume 2, Number 2]
:: Shams Esfand Abadi , Mohammad The Unified Approach to Set-Membership and Selective Partial Update Adaptive Filtering Algorithms [Volume 2, Number 2]
:: Azadnia , Mohammad The First Persian Context Sensitive Spell Checker [Volume 2, Number 2]
:: Faili , Heshaam The First Persian Context Sensitive Spell Checker [Volume 2, Number 2]
:: Minaei Bidgoli , Behrouz Scaling Up Performance of Web Services by Pre-Serialization Response Analysis [Volume 2, Number 2]
:: Saadat , Parinaz Scaling Up Performance of Web Services by Pre-Serialization Response Analysis [Volume 2, Number 2]
:: Khadem zadeh, Ahmad A New GA Approach Based on Pareto Ranking Strategy for Privacy Preserving of Association Rule Mining [Volume 2, Number 2]
:: Badie , Kambiz A New GA Approach Based on Pareto Ranking Strategy for Privacy Preserving of Association Rule Mining [Volume 2, Number 2]
:: Naderi Dehkordi , Mohammad A New GA Approach Based on Pareto Ranking Strategy for Privacy Preserving of Association Rule Mining [Volume 2, Number 2]
:: Fesharaki , Mehdi Peris: A Novel Dynamic Bandwidth Allocation (DBA) Method with Second-Price Auction in Next Generation Military Networks Based on EPON Technology [Volume 2, Number 2]
:: Hedayati , Alireza Peris: A Novel Dynamic Bandwidth Allocation (DBA) Method with Second-Price Auction in Next Generation Military Networks Based on EPON Technology [Volume 2, Number 2]
:: Homayounpour , Mohammad Mehdi A Robust Voice Activity Detection Based on Short Time Features of Audio Frames and Spectral Pattern of Vowel Sounds [Volume 2, Number 2]
:: Moattar , Mohammad Hossein A Robust Voice Activity Detection Based on Short Time Features of Audio Frames and Spectral Pattern of Vowel Sounds [Volume 2, Number 2]
:: Kabir , Ehsanollah A Novel Descriptor for Pedestrian Detection in Video Sequences [Volume 2, Number 2]
:: Komeili , Majid A Novel Descriptor for Pedestrian Detection in Video Sequences [Volume 2, Number 2]
:: Armanfard , Narges A Novel Descriptor for Pedestrian Detection in Video Sequences [Volume 2, Number 2]
:: Shakery , Azadeh Content-Based Approach for Trfcking Concept Drift in Email Spam Filtering [Volume 2, Number 3]
:: Seyedhossein, Leila Content-Based Approach for Trfcking Concept Drift in Email Spam Filtering [Volume 2, Number 3]
:: Basiri , Javad Content-Based Approach for Trfcking Concept Drift in Email Spam Filtering [Volume 2, Number 3]
:: Zi Hayat , Morteza Content-Based Approach for Trfcking Concept Drift in Email Spam Filtering [Volume 2, Number 3]
:: Lucas , Caro Adaptive Autonomy Expert System in Smart Grid based on Deterministic Timed Petri Nets [Volume 2, Number 3]
:: Lesani , Hamid Adaptive Autonomy Expert System in Smart Grid based on Deterministic Timed Petri Nets [Volume 2, Number 3]
:: Fereidunian , Alireza Adaptive Autonomy Expert System in Smart Grid based on Deterministic Timed Petri Nets [Volume 2, Number 3]
:: Sharifi Kolarijani , Mohammad Amin Adaptive Autonomy Expert System in Smart Grid based on Deterministic Timed Petri Nets [Volume 2, Number 3]
:: Zamani , Mohammad Ali Adaptive Autonomy Expert System in Smart Grid based on Deterministic Timed Petri Nets [Volume 2, Number 3]
:: Asoshesh , Abbas A New Mathematical Method to Estimate Resources for E-commerce Application [Volume 2, Number 3]
:: Pourjavaheri , Leili A New Mathematical Method to Estimate Resources for E-commerce Application [Volume 2, Number 3]
:: Kharrat , Mahmood A Multi-Aspect Architecture with Co-alignment between Layers for Intra-Organizational Knowledge Networking Purposes [Volume 2, Number 3]
:: Beig , Leila A Multi-Aspect Architecture with Co-alignment between Layers for Intra-Organizational Knowledge Networking Purposes [Volume 2, Number 3]
:: S. Mirian , Maryam A Multi-Aspect Architecture with Co-alignment between Layers for Intra-Organizational Knowledge Networking Purposes [Volume 2, Number 3]
:: Hashemi , Mahmoud Reza A Timelier Credit Card Fraud Detection by Mining Transaction Time Series [Volume 2, Number 3]
:: Seyedhossein , Leila A Timelier Credit Card Fraud Detection by Mining Transaction Time Series [Volume 2, Number 3]
:: Dadkhah , Mahboobeh Publishing Persian Linked Data; Challenges and Lessons Learned [Volume 2, Number 3]
:: Behkamal , Behshid Publishing Persian Linked Data; Challenges and Lessons Learned [Volume 2, Number 3]
:: Kahani , Mohsen Publishing Persian Linked Data; Challenges and Lessons Learned [Volume 2, Number 3]
:: Paydar , Samad Publishing Persian Linked Data; Challenges and Lessons Learned [Volume 2, Number 3]
:: Shakery , Azadeh Fuzzy Clustering for Semantic Web Services Discovery based on Ontology [Volume 2, Number 3]
:: Taghiyareh , Fattaneh Fuzzy Clustering for Semantic Web Services Discovery based on Ontology [Volume 2, Number 3]
:: Gholamzadeh, Nayereh Fuzzy Clustering for Semantic Web Services Discovery based on Ontology [Volume 2, Number 3]
:: Zihayat , Morteza Addressing the New User Cold-Start Problem in Recommender Systems Using Ordered Weighted Averaging Operator [Volume 2, Number 4]
:: Moshiri , Behzad Addressing the New User Cold-Start Problem in Recommender Systems Using Ordered Weighted Averaging Operator [Volume 2, Number 4]
:: Shakery , Azadeh Addressing the New User Cold-Start Problem in Recommender Systems Using Ordered Weighted Averaging Operator [Volume 2, Number 4]
:: Basiri , Javad Addressing the New User Cold-Start Problem in Recommender Systems Using Ordered Weighted Averaging Operator [Volume 2, Number 4]
:: Nazemi , Eslam Improving the Performance of Proposed Multi-Agent Domain Specific Search Engine Using Query Refinement Component [Volume 2, Number 4]
:: Hajimani , Elmira Improving the Performance of Proposed Multi-Agent Domain Specific Search Engine Using Query Refinement Component [Volume 2, Number 4]
:: Shamsfard , Mehrnoush VE Architect-Driven Service-Oriented Business Network Process Realization [Volume 2, Number 4]
:: Aghdasi , Mohammad VE Architect-Driven Service-Oriented Business Network Process Realization [Volume 2, Number 4]
:: Khoshkbarforoushha, Alireza VE Architect-Driven Service-Oriented Business Network Process Realization [Volume 2, Number 4]
:: Razavizadeh , Seyyed Mohammad Sequential Interference-Aware Admission Control in Underlay Cognitive Radio Networks [Volume 2, Number 4]
:: Ghasemi , Abdorasoul Sequential Interference-Aware Admission Control in Underlay Cognitive Radio Networks [Volume 2, Number 4]
:: Farmahini Farahani , Masoumeh Sequential Interference-Aware Admission Control in Underlay Cognitive Radio Networks [Volume 2, Number 4]
:: Naghibi Sistani , Mohammad Bagher Document Classification Using Novel Competitive Neural Text Classifier [Volume 2, Number 4]
:: Farshchi , Seyyed Mohammad Reza Document Classification Using Novel Competitive Neural Text Classifier [Volume 2, Number 4]
:: Niknafs , Ali Akbar Towards Faster Performance of PROMETHEE II in a Lower Class of Complexity [Volume 2, Number 4]
:: Moghaddam Charkari , Nasrollah Towards Faster Performance of PROMETHEE II in a Lower Class of Complexity [Volume 2, Number 4]
:: Niknafs , Arash Towards Faster Performance of PROMETHEE II in a Lower Class of Complexity [Volume 2, Number 4]
:: Moin , Mohammad Shahram Blind Color Image Steganalysis Based on Multi-Transform Combined Features Selected by a Hybrid of ANOVA and BPSO [Volume 2, Number 4]
:: Sheikhan , Mansour Blind Color Image Steganalysis Based on Multi-Transform Combined Features Selected by a Hybrid of ANOVA and BPSO [Volume 2, Number 4]
:: Pezhmanpour , Mansoureh Blind Color Image Steganalysis Based on Multi-Transform Combined Features Selected by a Hybrid of ANOVA and BPSO [Volume 2, Number 4]
:: Golsorkhtabaramiri, Mehdi PSO-based Scheduling Algorithm for Time and Cost Optimization in Mobile Grid [Volume 0, Number 0]
:: Zakeri, Fahimeh PSO-based Scheduling Algorithm for Time and Cost Optimization in Mobile Grid [Volume 0, Number 0]
:: Farzinvash, Leili Online Multicast Routing in Multi-Channel Multi-Radio Wireless Mesh Networks using Network Coding [Volume 0, Number 0]
:: Mohamed-pour, Kamal QAM and PSK Modulation Performance Analysis over Narrow Band HF Channel [Volume 0, Number 0]
:: Ismail, Ahmad QAM and PSK Modulation Performance Analysis over Narrow Band HF Channel [Volume 0, Number 0]
:: Khademzadeh, Ahmad A Power Saving Anti-Collision Algorithm with Tags Clustering and BIBD Method in RFID Systems [Volume 0, Number 0]
:: Hossienzadeh, Mehdi A Power Saving Anti-Collision Algorithm with Tags Clustering and BIBD Method in RFID Systems [Volume 0, Number 0]
:: Chekin, Mohsen A Power Saving Anti-Collision Algorithm with Tags Clustering and BIBD Method in RFID Systems [Volume 0, Number 0]
:: Asadi Amiri, Sekine Improving Image Dynamic Range For An Adaptive Quality Enhancement Using Gamma Correction [Volume 0, Number 0]
:: Hassanpour, Hamid Improving Image Dynamic Range For An Adaptive Quality Enhancement Using Gamma Correction [Volume 0, Number 0]
:: Khademzadeh, Ahmad Decreasing the Average Delay, Connectivity, and Routing Load in Clustered Mobile Ad- Hoc Networks [Volume 10, Number 1]
:: Reshadi, Midia Decreasing the Average Delay, Connectivity, and Routing Load in Clustered Mobile Ad- Hoc Networks [Volume 10, Number 1]
:: Sabaei, Masoud Decreasing the Average Delay, Connectivity, and Routing Load in Clustered Mobile Ad- Hoc Networks [Volume 10, Number 1]
:: Assareh, Reza Decreasing the Average Delay, Connectivity, and Routing Load in Clustered Mobile Ad- Hoc Networks [Volume 10, Number 1]
:: Sadough, Seyed Mohammad Sajad Enhanced Iterative Detection of Hierarchically Modulated Signals using VB-EM Algorithm [Volume 10, Number 1]
:: Azad, Mahsa Enhanced Iterative Detection of Hierarchically Modulated Signals using VB-EM Algorithm [Volume 10, Number 1]
:: Harounabadi, Ali Recommending Friends in Social Networks By Users' Profiles And Using Classification Algorithms [Volume 10, Number 1]
:: Dashtizadeh , Paria Recommending Friends in Social Networks By Users' Profiles And Using Classification Algorithms [Volume 10, Number 1]
:: Ghaeini, Hamid Reza An Incentive Mechanism to Mitigate the Free-riding in VoD Streaming over Hybrid CDN-P2P Networks [Volume 10, Number 1]
:: Akbari , Behzad An Incentive Mechanism to Mitigate the Free-riding in VoD Streaming over Hybrid CDN-P2P Networks [Volume 10, Number 1]
:: Ghaffari Sheshjavani , Abdollah An Incentive Mechanism to Mitigate the Free-riding in VoD Streaming over Hybrid CDN-P2P Networks [Volume 10, Number 1]
:: Eghlidos , Taraneh A Secure Attribute-Based Keyword Search Scheme Against Keyword Guessing And Chosen Keyword Attack [Volume 10, Number 1]
:: Mohajeri, Javad A Secure Attribute-Based Keyword Search Scheme Against Keyword Guessing And Chosen Keyword Attack [Volume 10, Number 1]
:: Ameri, Mohammad Hassan A Secure Attribute-Based Keyword Search Scheme Against Keyword Guessing And Chosen Keyword Attack [Volume 10, Number 1]
:: Yousefipoor, Vahid A Secure Attribute-Based Keyword Search Scheme Against Keyword Guessing And Chosen Keyword Attack [Volume 10, Number 1]
:: Hosseinvand, Hamid Intrusion Detection System Using SVM as Classifier and GA for Optimizing Feature Vectors [Volume 10, Number 1]
:: Fekri, Maryam Intrusion Detection System Using SVM as Classifier and GA for Optimizing Feature Vectors [Volume 10, Number 1]
:: Gharaee, Hossein Intrusion Detection System Using SVM as Classifier and GA for Optimizing Feature Vectors [Volume 10, Number 1]
:: Ghassemian , Hassan Spectral-Spatial Feature Transformations With Controlling Contextual Information Through Smoothing Filtering and Morphological Analysis [Volume 10, Number 1]
:: imani, Maryam Spectral-Spatial Feature Transformations With Controlling Contextual Information Through Smoothing Filtering and Morphological Analysis [Volume 10, Number 1]
:: Hendijanifard , Fatemeh Expert Finding System in E-Learning: Using Concept Maps [Volume 3, Number 1]
:: Kardan , Ahmad Expert Finding System in E-Learning: Using Concept Maps [Volume 3, Number 1]
:: Amiri , Ali Improving the Performance of E-Learning Systems Using Extracted Web Server Log File Suggestions [Volume 3, Number 1]
:: Maghsoudi , Behrooz Improving the Performance of E-Learning Systems Using Extracted Web Server Log File Suggestions [Volume 3, Number 1]
:: Sulaimany , Sadegh Improving the Performance of E-Learning Systems Using Extracted Web Server Log File Suggestions [Volume 3, Number 1]
:: Taghiyareh , Fattaneh Investigating Students' Temporal Behaviors and Evaluation of Faculty through Educational Data Mining [Volume 3, Number 1]
:: Orooji , Fatemeh Investigating Students' Temporal Behaviors and Evaluation of Faculty through Educational Data Mining [Volume 3, Number 1]
:: Tavakoli , Maryam An Intelligent Method for Customizable Adaptive Learning Content Generation [Volume 3, Number 1]
:: Gholipour , Ameneh An Intelligent Method for Customizable Adaptive Learning Content Generation [Volume 3, Number 1]
:: Mazaheri , Arya An Intelligent Method for Customizable Adaptive Learning Content Generation [Volume 3, Number 1]
:: Haghshenas , Ehsan An Intelligent Method for Customizable Adaptive Learning Content Generation [Volume 3, Number 1]
:: Eghbali , Neda A Framework for Learner Preparation and Support in Academic E-learning Environment [Volume 3, Number 1]
:: Kardan , Ahmad A Framework for Learner Preparation and Support in Academic E-learning Environment [Volume 3, Number 1]
:: Kharrat , Mahmood A Framework for Learner Preparation and Support in Academic E-learning Environment [Volume 3, Number 1]
:: MirsaeedGhazi , Tahereh A Framework for Learner Preparation and Support in Academic E-learning Environment [Volume 3, Number 1]
:: Nadjar Araabi, Babak An Ontology-based Framework for Organizing Research Support Contents inE-Learning Environment [Volume 3, Number 1]
:: Taghiyareh, Fattaneh An Ontology-based Framework for Organizing Research Support Contents inE-Learning Environment [Volume 3, Number 1]
:: Tayefeh Mahmoudi , Maryam An Ontology-based Framework for Organizing Research Support Contents inE-Learning Environment [Volume 3, Number 1]
:: Montazer , Gholam Ali Learners Grouping in E-Learning Environment Using Evolutionary Fuzzy Clustering Approach [Volume 3, Number 1]
:: Ghorbani , Fatemeh Learners Grouping in E-Learning Environment Using Evolutionary Fuzzy Clustering Approach [Volume 3, Number 1]
:: Ghalamkari , Abdolreza Knowledge Evaluation Based on Learner Assessment and Utilizing Fuzzy System to Increase the Accuracy of Evaluation [Volume 3, Number 1]
:: Naghibizadeh Meybodi , Seyed Mohsen Knowledge Evaluation Based on Learner Assessment and Utilizing Fuzzy System to Increase the Accuracy of Evaluation [Volume 3, Number 1]
:: Tadayon Tabrizi , Ghamarnaz Knowledge Evaluation Based on Learner Assessment and Utilizing Fuzzy System to Increase the Accuracy of Evaluation [Volume 3, Number 1]
:: kardan , Ahmad Knowledge Evaluation Based on Learner Assessment and Utilizing Fuzzy System to Increase the Accuracy of Evaluation [Volume 3, Number 1]
:: Sadeghyan , Babak Masquerade Detection Using GUI Events in Windows Systems [Volume 3, Number 2]
:: Kaghazgaran , Parisa Masquerade Detection Using GUI Events in Windows Systems [Volume 3, Number 2]
:: Noorhoseini , Seyed Majid Analysing Probabilistic Support Vector Machine Based Localization In Wireless Sensor Networks [Volume 3, Number 2]
:: Samadian , Reza Analysing Probabilistic Support Vector Machine Based Localization In Wireless Sensor Networks [Volume 3, Number 2]
:: Gholamian , Mohammad Reza Credit Scoring Using Colonial Competitive Rule-based Classifier [Volume 3, Number 2]
:: Siami , Mohammad Credit Scoring Using Colonial Competitive Rule-based Classifier [Volume 3, Number 2]
:: Taghiyareh , Fattaneh Credit Scoring Using Colonial Competitive Rule-based Classifier [Volume 3, Number 2]
:: Basiri , Javad Credit Scoring Using Colonial Competitive Rule-based Classifier [Volume 3, Number 2]
:: Tayefeh Mahmoudi , Maryam Customizing Feature Decision Fusion Model using Information Gain, Chi-Square and Ordered Weighted Averaging for Text Classification [Volume 3, Number 2]
:: Yazdani , Nasser Customizing Feature Decision Fusion Model using Information Gain, Chi-Square and Ordered Weighted Averaging for Text Classification [Volume 3, Number 2]
:: Moshiri , Behzad Customizing Feature Decision Fusion Model using Information Gain, Chi-Square and Ordered Weighted Averaging for Text Classification [Volume 3, Number 2]
:: Ghaderi , Mohammad Ali Customizing Feature Decision Fusion Model using Information Gain, Chi-Square and Ordered Weighted Averaging for Text Classification [Volume 3, Number 2]
:: Farzaneh , Forouhar A Study of the Effect of Diffraction and Rough Surface Scattering Modeling on Ray Tracing Results in an Urban Environment at 60 GHz [Volume 3, Number 2]
:: Shishegar , Amir Ahmad A Study of the Effect of Diffraction and Rough Surface Scattering Modeling on Ray Tracing Results in an Urban Environment at 60 GHz [Volume 3, Number 2]
:: Eslami Rasekh , Maryam A Study of the Effect of Diffraction and Rough Surface Scattering Modeling on Ray Tracing Results in an Urban Environment at 60 GHz [Volume 3, Number 2]
:: Afrooz , Kambiz Optimization and Fully Distributed Analysis of Single Pole Single Throw Traveling Wave Switchesat Millimeter Wave Frequency Band [Volume 3, Number 2]
:: Abdipour , Abdolali Optimization and Fully Distributed Analysis of Single Pole Single Throw Traveling Wave Switchesat Millimeter Wave Frequency Band [Volume 3, Number 2]
:: Moradi , Gholamreza Optimization and Fully Distributed Analysis of Single Pole Single Throw Traveling Wave Switchesat Millimeter Wave Frequency Band [Volume 3, Number 2]
:: Khoshniyat , Hamed Optimization and Fully Distributed Analysis of Single Pole Single Throw Traveling Wave Switchesat Millimeter Wave Frequency Band [Volume 3, Number 2]
:: Yousefi , Behnaz Low Cost Millimeter Wave Duplexer Design Using Mixed Mode Matching and Integral Contour Methods [Volume 3, Number 2]
:: Henke , Heino Low Cost Millimeter Wave Duplexer Design Using Mixed Mode Matching and Integral Contour Methods [Volume 3, Number 2]
:: Banai , Ali Low Cost Millimeter Wave Duplexer Design Using Mixed Mode Matching and Integral Contour Methods [Volume 3, Number 2]
:: Ghanadi , Mehdi Low Cost Millimeter Wave Duplexer Design Using Mixed Mode Matching and Integral Contour Methods [Volume 3, Number 2]
:: Kamarei , Mahmoud An Improved Active Mixer Architecture for Millimeter Wave Applications [Volume 3, Number 2]
:: Zeinolabedinzadeh , Saeed An Improved Active Mixer Architecture for Millimeter Wave Applications [Volume 3, Number 2]
:: Khoshbin Ghasem, Hossein A Novel DS-CDMA Direction of Arrival Estimator for Frequency- Selective Fading Channel with Correlated Multipath by Using Beamforming Filter [Volume 3, Number 3]
:: Hosseini Karani , S. Bagher A Novel DS-CDMA Direction of Arrival Estimator for Frequency- Selective Fading Channel with Correlated Multipath by Using Beamforming Filter [Volume 3, Number 3]
:: Abed Hodtani , Ghosheh A Novel DS-CDMA Direction of Arrival Estimator for Frequency- Selective Fading Channel with Correlated Multipath by Using Beamforming Filter [Volume 3, Number 3]
:: Samsami Khodadad , Farid A Novel DS-CDMA Direction of Arrival Estimator for Frequency- Selective Fading Channel with Correlated Multipath by Using Beamforming Filter [Volume 3, Number 3]
:: Navaie , Keivan A Stochastic Geometry Analysis of Hybrid Cellular-Adhoc CDMA Networks [Volume 3, Number 3]
:: Banivaheb , Neda A Stochastic Geometry Analysis of Hybrid Cellular-Adhoc CDMA Networks [Volume 3, Number 3]
:: Ardebilipour , Mehrdad Joint Power Adaptation and Interference Avoidance for Unlicensed Wireless Systems: A Game Theoretic Approach [Volume 3, Number 3]
:: Mahboobi , Behrad Joint Power Adaptation and Interference Avoidance for Unlicensed Wireless Systems: A Game Theoretic Approach [Volume 3, Number 3]
:: Beheshti , Seyed Mohsen Joint Power Adaptation and Interference Avoidance for Unlicensed Wireless Systems: A Game Theoretic Approach [Volume 3, Number 3]
:: Abdipour , Abdolali Joint Antenna Selection and Adaptive Modulation in MIMO Systems in the Presence of CSI Imperfection [Volume 3, Number 3]
:: Mohammadi , Abbas Joint Antenna Selection and Adaptive Modulation in MIMO Systems in the Presence of CSI Imperfection [Volume 3, Number 3]
:: Hamedanian , Mahshad Joint Antenna Selection and Adaptive Modulation in MIMO Systems in the Presence of CSI Imperfection [Volume 3, Number 3]
:: Abolhassani , Bahman A Novel Blind Spectrum Sensing Algorithm for Cognitive Radio Systems Based on Algorithmic Information Theory [Volume 3, Number 3]
:: Balaneshin Kordan , Saeid A Novel Blind Spectrum Sensing Algorithm for Cognitive Radio Systems Based on Algorithmic Information Theory [Volume 3, Number 3]
:: Salari , Soheil Bayesian-Based Cooperative Framework for Spectrum Sensing in Cognitive Radio Networks [Volume 3, Number 3]
:: Ahmadian , Mahmoud Bayesian-Based Cooperative Framework for Spectrum Sensing in Cognitive Radio Networks [Volume 3, Number 3]
:: Reisi , Nima Bayesian-Based Cooperative Framework for Spectrum Sensing in Cognitive Radio Networks [Volume 3, Number 3]
:: Jamali Kooshkghazi , Vahid Bayesian-Based Cooperative Framework for Spectrum Sensing in Cognitive Radio Networks [Volume 3, Number 3]
:: Sadeghi , Hamed A Low-Complexity Cyclostationary-Based Detection Method for Cooperative Spectrum Sensing in Cognitive Radio Networks [Volume 3, Number 3]
:: Azmi , Paeiz A Low-Complexity Cyclostationary-Based Detection Method for Cooperative Spectrum Sensing in Cognitive Radio Networks [Volume 3, Number 3]
:: Arezumand , Hamid A Low-Complexity Cyclostationary-Based Detection Method for Cooperative Spectrum Sensing in Cognitive Radio Networks [Volume 3, Number 3]
:: Khadem Zadeh , Ahmad Design of a Cellular Sugarscape Environment to Increase the Learning Speed in a Stochastic Multi-agent Network [Volume 3, Number 4]
:: Setayeshi , Saeed Design of a Cellular Sugarscape Environment to Increase the Learning Speed in a Stochastic Multi-agent Network [Volume 3, Number 4]
:: Nourafza , Nasim Design of a Cellular Sugarscape Environment to Increase the Learning Speed in a Stochastic Multi-agent Network [Volume 3, Number 4]
:: Masoumi , Nasser Sensitivity Analysis of Shielded Coupled Interconnects for RFIC Applications [Volume 3, Number 4]
:: Moghaddam Tabrizi , Mohammad Sensitivity Analysis of Shielded Coupled Interconnects for RFIC Applications [Volume 3, Number 4]
:: Adjeroh , Donald Priority Based Congestion Control and Partial Reliability Guaranty Protocol for Wireless Multimedia Sensor Networks [Volume 3, Number 4]
:: Yaghmaee Moghaddam , Mohammad Hossein Priority Based Congestion Control and Partial Reliability Guaranty Protocol for Wireless Multimedia Sensor Networks [Volume 3, Number 4]
:: Rahmati , Mehdi Throughput Improvement of Cooperative System Using Adaptive Relaying & Adaptive Modulation [Volume 3, Number 4]
:: Vakil , Vahideh Throughput Improvement of Cooperative System Using Adaptive Relaying & Adaptive Modulation [Volume 3, Number 4]
:: Sadough , Seyed Mohammad Sajad An Improved Blind Spectrum Sensing Technique for Cognitive Radio Systems [Volume 3, Number 4]
:: Sadeghi Ivrigh , Siavash An Improved Blind Spectrum Sensing Technique for Cognitive Radio Systems [Volume 3, Number 4]
:: Tafaghodi Khajavi , Navid An Improved Blind Spectrum Sensing Technique for Cognitive Radio Systems [Volume 3, Number 4]
:: Eftekhari Moghadam, Amir masoud An Image Annotation Method Based on CM Similarity Measure and Hybrid Relevance Feedback [Volume 3, Number 4]
:: Javani , Mehran An Image Annotation Method Based on CM Similarity Measure and Hybrid Relevance Feedback [Volume 3, Number 4]
:: Hanafizadeh , Payam Taxonomy of Information Society Measures [Volume 3, Number 4]
:: Rezaei , Mehdi Content-Based Image Retrieval for Tourism Application Using Handheld Devices [Volume 4, Number 1]
:: Mohanna , Farahnaz Content-Based Image Retrieval for Tourism Application Using Handheld Devices [Volume 4, Number 1]
:: Raisi , Zobeir Content-Based Image Retrieval for Tourism Application Using Handheld Devices [Volume 4, Number 1]
:: Moghadam Charkari , Nasrollah Improvement of Supervised Shape Retrieval by Learning the Manifold Space [Volume 4, Number 1]
:: Zare Chahooki, Mohammad Ali Improvement of Supervised Shape Retrieval by Learning the Manifold Space [Volume 4, Number 1]
:: Ghani Shayesteh , Mahrokh An Automatic Contrast Enhancement Technique Using Combination of Histogram-Based Methods [Volume 4, Number 1]
:: Soleymani , Roghayeh An Automatic Contrast Enhancement Technique Using Combination of Histogram-Based Methods [Volume 4, Number 1]
:: Baleghi , Yasser Efficient Object Tracking Using Optimized K-means Segmentation and Radial Basis Function Neural Networks [Volume 4, Number 1]
:: Karami , MohammadReza Efficient Object Tracking Using Optimized K-means Segmentation and Radial Basis Function Neural Networks [Volume 4, Number 1]
:: Asvadi , Alireza Efficient Object Tracking Using Optimized K-means Segmentation and Radial Basis Function Neural Networks [Volume 4, Number 1]
:: P.R. Hasanzadeh , Reza Static Persian Sign Language Recognition Using Kernel-Based Feature Extraction [Volume 4, Number 1]
:: Nahvi , Manoochehr Static Persian Sign Language Recognition Using Kernel-Based Feature Extraction [Volume 4, Number 1]
:: Moghaddam , Milad Static Persian Sign Language Recognition Using Kernel-Based Feature Extraction [Volume 4, Number 1]
:: Ebrahimnezhad , Hossein A Novel 3D Object Categorization and Retrieval System Using Geometric Features [Volume 4, Number 1]
:: Ramezani , Mohammad A Novel 3D Object Categorization and Retrieval System Using Geometric Features [Volume 4, Number 1]
:: Eftekhari Moghadam , Amir Masoud A Multilevel Thresholding Approach Based on L´evy-Flight Firefly Algorithm for Image Segmentation [Volume 4, Number 1]
:: Vojodi , Hakimeh A Multilevel Thresholding Approach Based on L´evy-Flight Firefly Algorithm for Image Segmentation [Volume 4, Number 1]
:: Hassanzadeh , Tahereh A Multilevel Thresholding Approach Based on L´evy-Flight Firefly Algorithm for Image Segmentation [Volume 4, Number 1]
:: Ghanbari , Vahid Data Mining in the E-Learning Systems: A Virtual University Case Study [Volume 4, Number 2]
:: Hani, SSeyed Hassan Data Mining in the E-Learning Systems: A Virtual University Case Study [Volume 4, Number 2]
:: Minaei Bidgoli , Behrouz Data Mining in the E-Learning Systems: A Virtual University Case Study [Volume 4, Number 2]
:: Delavar , Mahshid Ontological Modeling of Radio Frequency Identification(RFID)Attacks [Volume 4, Number 2]
:: Salahi , Ahmad Ontological Modeling of Radio Frequency Identification(RFID)Attacks [Volume 4, Number 2]
:: Asosheh , Abbas E-business Integrated Test Framework Model [Volume 4, Number 2]
:: Vejdan Tamar, Pasha E-business Integrated Test Framework Model [Volume 4, Number 2]
:: Homayounpour , Mohammad Mehdi Performance Improvement of Language Identification Using Transcription Based Sequential Approaches & Sequential Kernels Based SVM [Volume 4, Number 2]
:: Hosseini Amereei, Seyed Abbas Performance Improvement of Language Identification Using Transcription Based Sequential Approaches & Sequential Kernels Based SVM [Volume 4, Number 2]
:: Ansarinia , Morteza Predicting Network Attacks Using Ontology-Driven Inference [Volume 4, Number 2]
:: Salahi , Ahmad Predicting Network Attacks Using Ontology-Driven Inference [Volume 4, Number 2]
:: Khoshniat , Hessam E-Learners’ Activity Categorization Based on Their Learning Styles Using ART Family Neural Network [Volume 4, Number 2]
:: Montazer , Gholam Ali E-Learners’ Activity Categorization Based on Their Learning Styles Using ART Family Neural Network [Volume 4, Number 2]
:: Moghadam Charkari , Nasrollah Optimized Regression in Sensor Networks by Integration of Harmony Search and Particle Swarm Optimization [Volume 4, Number 2]
:: Shakibian , Hadi Optimized Regression in Sensor Networks by Integration of Harmony Search and Particle Swarm Optimization [Volume 4, Number 2]
:: Mahaki , Leili Improving the Quality of Service in the VANET by Detecting and Removing Unused Messages [Volume 4, Number 3]
:: Fathy , Mahmood Improving the Quality of Service in the VANET by Detecting and Removing Unused Messages [Volume 4, Number 3]
:: Sayadi , Mohammad Javad Improving the Quality of Service in the VANET by Detecting and Removing Unused Messages [Volume 4, Number 3]
:: Fathy , Mahmood A Visual Tracking Algorithm Based on CAMShift and Motion Segmentation [Volume 4, Number 3]
:: Emami , Ebrahim A Visual Tracking Algorithm Based on CAMShift and Motion Segmentation [Volume 4, Number 3]
:: Granpayeh , Nosrat All Optical Logic Gates: A Tutorial [Volume 4, Number 3]
:: Davoodi , Fatemeh All Optical Logic Gates: A Tutorial [Volume 4, Number 3]
:: Abdollahi Azgomi , Mohammad Cyber Attack Simulation for Operational Security Evaluation Using Coloured Petri Nets [Volume 4, Number 3]
:: Ashtiani , Mehrdad Cyber Attack Simulation for Operational Security Evaluation Using Coloured Petri Nets [Volume 4, Number 3]
:: Chai , Qi Forgery Attack is a Piece of Cake on a Class of Mutual Authentication Protocols [Volume 4, Number 3]
:: Luo , Yiyuan Forgery Attack is a Piece of Cake on a Class of Mutual Authentication Protocols [Volume 4, Number 3]
:: Naderi , Majid Forgery Attack is a Piece of Cake on a Class of Mutual Authentication Protocols [Volume 4, Number 3]
:: Safkhani , Masoumeh Forgery Attack is a Piece of Cake on a Class of Mutual Authentication Protocols [Volume 4, Number 3]
:: Bagheri , Nasour Forgery Attack is a Piece of Cake on a Class of Mutual Authentication Protocols [Volume 4, Number 3]
:: Eshghi , Mohammad Image Encryption Using Tent Chaotic Map and Arnold Cat Map [Volume 4, Number 3]
:: Hasani , Elham Image Encryption Using Tent Chaotic Map and Arnold Cat Map [Volume 4, Number 3]
:: Hosseini Andargoli , Seyed Mehdi Decision Feedback Channel Estimation for Alamouti Coded OFDM Systems [Volume 4, Number 3]
:: Mohamedpour , Kamal Decision Feedback Channel Estimation for Alamouti Coded OFDM Systems [Volume 4, Number 3]
:: Hoseinzade , Masoud Decision Feedback Channel Estimation for Alamouti Coded OFDM Systems [Volume 4, Number 3]
:: Nakhai Kamalabadi , Isa A Multi-Dimensional Recommendation Framework for Learning Material by Naive Bayes Classifier [Volume 4, Number 3]
:: Salehi , Mojtaba A Multi-Dimensional Recommendation Framework for Learning Material by Naive Bayes Classifier [Volume 4, Number 3]
:: Moghaddam Charkari, Nasrollah An Improved Recommender System Based on Forgetting Mechanism for User Interest-Drifting [Volume 4, Number 4]
:: Taghi Hamidi Beheshti, Mohammad An Improved Recommender System Based on Forgetting Mechanism for User Interest-Drifting [Volume 4, Number 4]
:: Tavakolian , Rozita An Improved Recommender System Based on Forgetting Mechanism for User Interest-Drifting [Volume 4, Number 4]
:: Eftekhari Moghadam , Amir Masoud Artificial Immune Classifier (aiCLS): An Immune Inspired Supervised Machine Learning Method [Volume 4, Number 4]
:: Ehsani , Seyed Amir Artificial Immune Classifier (aiCLS): An Immune Inspired Supervised Machine Learning Method [Volume 4, Number 4]
:: Badie , Kambiz Context Aware Mental Model Sharing in Dynamic Inaccessible Environments [Volume 4, Number 4]
:: Saffar , Mohammad Context Aware Mental Model Sharing in Dynamic Inaccessible Environments [Volume 4, Number 4]
:: Taghiyareh , Fattaneh Context Aware Mental Model Sharing in Dynamic Inaccessible Environments [Volume 4, Number 4]
:: Salehi , Sajjad Context Aware Mental Model Sharing in Dynamic Inaccessible Environments [Volume 4, Number 4]
:: Zareh Bidoki , Ali Mohammad IECA: Intelligent Effective Crawling Algorithm for Web Pages [Volume 4, Number 4]
:: Golshani , Mohammad Amin IECA: Intelligent Effective Crawling Algorithm for Web Pages [Volume 4, Number 4]
:: Zargari , Farzad An Automatic Image Annotation Technique Based on Coverage Ratio of Tags [Volume 4, Number 4]
:: Abdolhoseini , Ali An Automatic Image Annotation Technique Based on Coverage Ratio of Tags [Volume 4, Number 4]
:: Sepas Moghaddam , Alireza JPEG Compressed Domain Face Recognition:Different Stages and Different Features [Volume 4, Number 4]
:: Moin , Mohammad Shahram JPEG Compressed Domain Face Recognition:Different Stages and Different Features [Volume 4, Number 4]
:: Hashemi , Masoud Reza Route Lookup Algorithms Using the Novel Idea of Coded Prefix Trees [Volume 4, Number 4]
:: Saidi , Hossein Route Lookup Algorithms Using the Novel Idea of Coded Prefix Trees [Volume 4, Number 4]
:: Behdadfar , Mohammad Route Lookup Algorithms Using the Novel Idea of Coded Prefix Trees [Volume 4, Number 4]
:: Mansouri , Mohsen A New Blind Signature Scheme Based on Improved ElGamal Signature Scheme [Volume 5, Number 1]
:: Zaghian , Ali A New Blind Signature Scheme Based on Improved ElGamal Signature Scheme [Volume 5, Number 1]
:: Yari , Alireza Persian to English Personal Name Transliteration Based On the Persian Web Contents [Volume 5, Number 1]
:: Zareh Bidoki , Ali Mohammad Persian to English Personal Name Transliteration Based On the Persian Web Contents [Volume 5, Number 1]
:: Haghollahi , Zohre Persian to English Personal Name Transliteration Based On the Persian Web Contents [Volume 5, Number 1]
:: Khadivi , Shahram Statistical Machine Translation (SMT) for Highly-Inflectional Scarce-Resource Language [Volume 5, Number 1]
:: Faili, Hesham Statistical Machine Translation (SMT) for Highly-Inflectional Scarce-Resource Language [Volume 5, Number 1]
:: Namdar , Saman Statistical Machine Translation (SMT) for Highly-Inflectional Scarce-Resource Language [Volume 5, Number 1]
:: Noorani , Seyede Fatemeh Evaluating the Effect of Learner’s Knowledge, Background, and Attention’s on Trust Using Open Learner Model [Volume 5, Number 1]
:: Modaberi , Somayeh Evaluating the Effect of Learner’s Knowledge, Background, and Attention’s on Trust Using Open Learner Model [Volume 5, Number 1]
:: A. Kardan , Ahmad Evaluating the Effect of Learner’s Knowledge, Background, and Attention’s on Trust Using Open Learner Model [Volume 5, Number 1]
:: Kasaei , Shohreh A Semi-Supervised Method for Multimodal Classification of Consumer Videos [Volume 5, Number 1]
:: Tavassolipour , Mostafa A Semi-Supervised Method for Multimodal Classification of Consumer Videos [Volume 5, Number 1]
:: Karimian , Mahmood A Semi-Supervised Method for Multimodal Classification of Consumer Videos [Volume 5, Number 1]
:: Saadat , Mahmood Non-Homogeneous Cluster Head Selection for Energy-Aware Hierarchical Routing Protocols in Wireless Sensor Networks [Volume 5, Number 1]
:: Saadat , Reza Non-Homogeneous Cluster Head Selection for Energy-Aware Hierarchical Routing Protocols in Wireless Sensor Networks [Volume 5, Number 1]
:: Fahimi , Mina A Mobility Based Cooperative MAC Protocol for Wireless Networks [Volume 5, Number 1]
:: Ghasemi , Abdorasoul A Mobility Based Cooperative MAC Protocol for Wireless Networks [Volume 5, Number 1]
:: Soleiman Meiguni , Javad Analysis Method for Spherical Dipole Antenna Array [Volume 5, Number 2]
:: Kamyab , Manoochehr Analysis Method for Spherical Dipole Antenna Array [Volume 5, Number 2]
:: Hosseinbeig , Ahmad Analysis Method for Spherical Dipole Antenna Array [Volume 5, Number 2]
:: Sayadian , Abolghasem Speaker-Dependent Speech Enhancement Using Codebook-based Synthesis for Low SNR Applications [Volume 5, Number 2]
:: Doost, Roghayeh Speaker-Dependent Speech Enhancement Using Codebook-based Synthesis for Low SNR Applications [Volume 5, Number 2]
:: Fakoor , Vahid Optimized Task Scheduling for Estimation in Wireless Sensor Networks [Volume 5, Number 2]
:: Yaghmaee , Mohammad Hossein Optimized Task Scheduling for Estimation in Wireless Sensor Networks [Volume 5, Number 2]
:: Mohajerzadeh , Amir Hossein Optimized Task Scheduling for Estimation in Wireless Sensor Networks [Volume 5, Number 2]
:: Saeedi Sourck, Hamid Superposition Network Coding for Wireless Cooperative Communication [Volume 5, Number 2]
:: Omidi , Mohammad Javad Superposition Network Coding for Wireless Cooperative Communication [Volume 5, Number 2]
:: Fazeli , Ali Superposition Network Coding for Wireless Cooperative Communication [Volume 5, Number 2]
:: Razavizadeh , Seyed Mohammad Cooperative Filter-and-Forward Beamforming in Cognitive Radio Relay Networks [Volume 5, Number 2]
:: Kahaei , Mohammad Hossein Cooperative Filter-and-Forward Beamforming in Cognitive Radio Relay Networks [Volume 5, Number 2]
:: Mohammadkhani, Saeideh Cooperative Filter-and-Forward Beamforming in Cognitive Radio Relay Networks [Volume 5, Number 2]
:: Fakhraie , Sied Mehdi Deep Out-of-Band Radiation Reduction By Using Joint Filterbank and Cancellation Carriers in Cognitive Radios [Volume 5, Number 2]
:: Aliasgari , Mohammad Deep Out-of-Band Radiation Reduction By Using Joint Filterbank and Cancellation Carriers in Cognitive Radios [Volume 5, Number 2]
:: Tavakoli , Saeed Optimum Indoor Signal Coverage of Dense Distributed Receivers via Ray Tracing Coupled with Genetic Algorithm [Volume 5, Number 2]
:: Ahmadi Shokouh , Javad Optimum Indoor Signal Coverage of Dense Distributed Receivers via Ray Tracing Coupled with Genetic Algorithm [Volume 5, Number 2]
:: Talepour , Zeinab Optimum Indoor Signal Coverage of Dense Distributed Receivers via Ray Tracing Coupled with Genetic Algorithm [Volume 5, Number 2]
:: brahim , Suhaimi I A Framework for Evaluation of SQL Injection Detection and Prevention Tools [Volume 5, Number 3]
:: Tajpour , Atefeh A Framework for Evaluation of SQL Injection Detection and Prevention Tools [Volume 5, Number 3]
:: Yari , Alireza Quality Improvement of Information Retrieval System Results by Document Classification [Volume 5, Number 3]
:: Shiry Ghidary , Saeed Quality Improvement of Information Retrieval System Results by Document Classification [Volume 5, Number 3]
:: Farhoodi , Mojgan Quality Improvement of Information Retrieval System Results by Document Classification [Volume 5, Number 3]
:: Taghiyareh , Fattaneh A Mutual Independent Cascade Model for Customer Behavior Propagation [Volume 5, Number 3]
:: Nazemian , Ali A Mutual Independent Cascade Model for Customer Behavior Propagation [Volume 5, Number 3]
:: Ghaznavi Ghoushchi , Mohammad Bagher A New Adaptive Hybrid Recommender Framework for Learning Material Recommendation [Volume 5, Number 3]
:: Nakhai Kamalabadi , Isa A New Adaptive Hybrid Recommender Framework for Learning Material Recommendation [Volume 5, Number 3]
:: Salehi , Mojtaba A New Adaptive Hybrid Recommender Framework for Learning Material Recommendation [Volume 5, Number 3]
:: Analoui , Morteza Evaluating Fidelity of Persian-English Sentence-Aligned Parallel Corpus [Volume 5, Number 3]
:: Mashayekhi , Masoomeh Evaluating Fidelity of Persian-English Sentence-Aligned Parallel Corpus [Volume 5, Number 3]
:: Motamedi , Mohammad Accelarated Optical Character Recognition on Graphics Processing Units [Volume 5, Number 3]
:: Arianyan , Iman Accelarated Optical Character Recognition on Graphics Processing Units [Volume 5, Number 3]
:: Motamedi , Seyed Ahmad Accelarated Optical Character Recognition on Graphics Processing Units [Volume 5, Number 3]
:: Arianyan , Ehsan Accelarated Optical Character Recognition on Graphics Processing Units [Volume 5, Number 3]
:: Ahmadi , Mohammad Reza A Dynamic Resource Allocation Method for Virtual Datacenter Resources Using CoCo-VM Approach [Volume 5, Number 3]
:: Abed Hodtani , Ghosheh Capacity Region of the Compound Multiple Access Channels with Common Message and in the Presence of Intersymbol Interference [Volume 6, Number 2]
:: Seyedin, Seyed Alireza Capacity Region of the Compound Multiple Access Channels with Common Message and in the Presence of Intersymbol Interference [Volume 6, Number 2]
:: Monemizadeh , Mostafa Capacity Region of the Compound Multiple Access Channels with Common Message and in the Presence of Intersymbol Interference [Volume 6, Number 2]
:: Akbari , Mohammad Kazem Increasing the Total Efficiently Executed Work on Volunteer Computing Environment Based on Work Send Policy [Volume 5, Number 4]
:: Kianpishe , Tayebe Increasing the Total Efficiently Executed Work on Volunteer Computing Environment Based on Work Send Policy [Volume 5, Number 4]
:: Arabsorkhi , Mohsen Using Synchronous TAG for Source-Side Reordering in SMT [Volume 5, Number 4]
:: Faili , Heshaam Using Synchronous TAG for Source-Side Reordering in SMT [Volume 5, Number 4]
:: Fadaei , Hakimeh Using Synchronous TAG for Source-Side Reordering in SMT [Volume 5, Number 4]
:: Mansouri , Amin Using Synchronous TAG for Source-Side Reordering in SMT [Volume 5, Number 4]
:: Sadeghi , Mohammad Taghi Face Verification Using Local Binary Patterns and Sparse Representation Techniques [Volume 5, Number 4]
:: Amidi , Yalda Face Verification Using Local Binary Patterns and Sparse Representation Techniques [Volume 5, Number 4]
:: Akbari , Behzad A New Method for Evaluating Video Quality of Experience on Content-Aware Packet Loss Effect Analysis [Volume 5, Number 4]
:: Mandegar , Amir Hossein A New Method for Evaluating Video Quality of Experience on Content-Aware Packet Loss Effect Analysis [Volume 5, Number 4]
:: Mehrjoo , Mehri A Two-Dimensional Maximum Likelihood Parameter Estimation of Г-Г Distribution for Free Space Optical Channels with Weak Turbulence Conditions [Volume 5, Number 4]
:: Kazeminia , Mahdi A Two-Dimensional Maximum Likelihood Parameter Estimation of Г-Г Distribution for Free Space Optical Channels with Weak Turbulence Conditions [Volume 5, Number 4]
:: Yazdani , Nasser From Reliable Distributed System Toward Reliable Cloud by Cat Swarm Optimization [Volume 5, Number 4]
:: Faragardi , Hamid Reza From Reliable Distributed System Toward Reliable Cloud by Cat Swarm Optimization [Volume 5, Number 4]
:: Shojaee , Reza From Reliable Distributed System Toward Reliable Cloud by Cat Swarm Optimization [Volume 5, Number 4]
:: Keshavarz , Hengameh User Capacity Scaling Laws for Fading Broadcast Channels Affected by Channel Estimation [Volume 5, Number 4]
:: Eslami , Ali User Capacity Scaling Laws for Fading Broadcast Channels Affected by Channel Estimation [Volume 5, Number 4]
:: Taghiyareh , Fattaneh A Semantic Domain-Specific Framework to Assist Researchers in Screening Contents [Volume 6, Number 1]
:: Tayefeh Mahmoudi , Maryam A Semantic Domain-Specific Framework to Assist Researchers in Screening Contents [Volume 6, Number 1]
:: Faili , Heshaam Learning to Exploit Different Translation Resources for Cross Language Information Retrieval [Volume 6, Number 1]
:: Shakery , Azadeh Learning to Exploit Different Translation Resources for Cross Language Information Retrieval [Volume 6, Number 1]
:: Azarbonyad , Hosein Learning to Exploit Different Translation Resources for Cross Language Information Retrieval [Volume 6, Number 1]
:: Zareh Bidoki , Ali Mohammad Web Page Streams and Relevance Propagation for Topic Distillation [Volume 6, Number 1]
:: Golshani , Mohammad Amin Web Page Streams and Relevance Propagation for Topic Distillation [Volume 6, Number 1]
:: Hosseinzadeh , Mehdi Improved Mapping Algorithms Performance in NoCs Design Based on Cellular Learning Automata [Volume 6, Number 1]
:: Khademzadeh , Ahmad Improved Mapping Algorithms Performance in NoCs Design Based on Cellular Learning Automata [Volume 6, Number 1]
:: Keley , Mohammad Bagher Improved Mapping Algorithms Performance in NoCs Design Based on Cellular Learning Automata [Volume 6, Number 1]
:: Pakravan , Mohammad Reza A Survey of Advanced Search Techniques in Unstructured P2P Networks [Volume 6, Number 1]
:: Sharifkhani , Fatemeh A Survey of Advanced Search Techniques in Unstructured P2P Networks [Volume 6, Number 1]
:: Khansari , Mohammad A Cross Layer Method for Efficient Video Delivery Based on TPGF Routing in WMSN [Volume 6, Number 1]
:: Sheikh Bagheri Arjmand , Mehdi A Cross Layer Method for Efficient Video Delivery Based on TPGF Routing in WMSN [Volume 6, Number 1]
:: Aghaeinia , Hassan An Opportunistic Cooperative Approach for Dynamic Spectrum Leasing in Cognitive Radio Networks [Volume 6, Number 1]
:: Ghamari Adian , Mehdi An Opportunistic Cooperative Approach for Dynamic Spectrum Leasing in Cognitive Radio Networks [Volume 6, Number 1]
:: Abadi , Mahdi TrPLS: Preserving Privacy in Trajectory Data Publishing by Personalized Local Suppression [Volume 6, Number 2]
:: Ghasemi Komishani , Elahe TrPLS: Preserving Privacy in Trajectory Data Publishing by Personalized Local Suppression [Volume 6, Number 2]
:: Manian , Amir How Open Source Software Succeeds? A Review of Research on Success of Open Source Software [Volume 6, Number 2]
:: Khansari , Mohammad How Open Source Software Succeeds? A Review of Research on Success of Open Source Software [Volume 6, Number 2]
:: Amrollahi , Alireza How Open Source Software Succeeds? A Review of Research on Success of Open Source Software [Volume 6, Number 2]
:: Afsharchi , Mohsen A Scalable Algorithm to Solve Distributed Constraint Optimization [Volume 6, Number 2]
:: Bigdeli , Elnaz A Scalable Algorithm to Solve Distributed Constraint Optimization [Volume 6, Number 2]
:: Rahmaninia , Maryam A Scalable Algorithm to Solve Distributed Constraint Optimization [Volume 6, Number 2]
:: Tarokh , Mohammad Jafar A Cluster-Based Similarity Fusion Approach for Scaling-Up Collaborative Filtering Recommender System [Volume 6, Number 2]
:: Gohari , Faezeh Sadat A Cluster-Based Similarity Fusion Approach for Scaling-Up Collaborative Filtering Recommender System [Volume 6, Number 2]
:: Homayouni , Hajar Automatic Test Case Generation for Modern Web Applications Using Population-Based Automatic Fuzzy Neural Network [Volume 6, Number 2]
:: Keyvanpour , Mohammad Reza Automatic Test Case Generation for Modern Web Applications Using Population-Based Automatic Fuzzy Neural Network [Volume 6, Number 2]
:: Faili , Heshaam Phrase Alignments in Parallel Corpus Using Bootstrapping Approach [Volume 6, Number 3]
:: Tavakoli , Leila Phrase Alignments in Parallel Corpus Using Bootstrapping Approach [Volume 6, Number 3]
:: Zarrinkalam , Fattane A Review of the Distributed Methods for Large-Scale Social Network Analysis [Volume 6, Number 3]
:: Abrishami , Saeid A Review of the Distributed Methods for Large-Scale Social Network Analysis [Volume 6, Number 3]
:: Kahani , Mohsen A Review of the Distributed Methods for Large-Scale Social Network Analysis [Volume 6, Number 3]
:: Dastranj , Nasrin A Virtual Research Management Enterprise Architecture Using Axiomatic Design [Volume 6, Number 3]
:: Sadeghi , Masoomeh A Virtual Research Management Enterprise Architecture Using Axiomatic Design [Volume 6, Number 3]
:: Asosheh , Abbas A Virtual Research Management Enterprise Architecture Using Axiomatic Design [Volume 6, Number 3]
:: Sharifi , Ali A Virtual Research Management Enterprise Architecture Using Axiomatic Design [Volume 6, Number 3]
:: Shakery , Azadeh Analyzing Content-based Heuristics for Persian Web Spam Detection [Volume 6, Number 3]
:: Rabbani , Elahe Analyzing Content-based Heuristics for Persian Web Spam Detection [Volume 6, Number 3]
:: Sheikhzadeh , Hamid Binaural Speech Separation Using Binary and Ratio Time-Frequency Masks [Volume 6, Number 3]
:: Soltanian-Zadeh , Hamid Binaural Speech Separation Using Binary and Ratio Time-Frequency Masks [Volume 6, Number 3]
:: Abutalebi , Hamidreza Binaural Speech Separation Using Binary and Ratio Time-Frequency Masks [Volume 6, Number 3]
:: Mahmoodzadeh , Azar Binaural Speech Separation Using Binary and Ratio Time-Frequency Masks [Volume 6, Number 3]
:: Teshnehlab , Mohammad An Improved Parallel Genetic Algorithm for Optimal Sensor Placement of Wireless Sensor Networks [Volume 6, Number 3]
:: Kolangari , Sara An Improved Parallel Genetic Algorithm for Optimal Sensor Placement of Wireless Sensor Networks [Volume 6, Number 3]
:: H. Neshati , Mohammad Design Investigation of a Modified HMSIW Leaky Wave Antenna [Volume 6, Number 3]
:: Razavi , Seyed Ali Design Investigation of a Modified HMSIW Leaky Wave Antenna [Volume 6, Number 3]
:: Faili , Heshaam Using Dependency Tree Grammar to Enhance the Reordering Model of Statistical Machine Translation Systems [Volume 6, Number 4]
:: Khadivi , Shahram Using Dependency Tree Grammar to Enhance the Reordering Model of Statistical Machine Translation Systems [Volume 6, Number 4]
:: Rahimi , Zahra Using Dependency Tree Grammar to Enhance the Reordering Model of Statistical Machine Translation Systems [Volume 6, Number 4]
:: Ahmadi , Ali Quality Improvement of Interactive Tutorial-Like Systems by Use of Cellular Learning Automata [Volume 6, Number 4]
:: Hajary , Hajar Quality Improvement of Interactive Tutorial-Like Systems by Use of Cellular Learning Automata [Volume 6, Number 4]
:: Montazer , Gholam Ali Swarm intelligence grouping of e-learners using fuzzy inspired PSO method [Volume 6, Number 4]
:: Ghorbani , Fatemeh Swarm intelligence grouping of e-learners using fuzzy inspired PSO method [Volume 6, Number 4]
:: Taghipour Anvari , Reza A P-Robust Stochastic DEA Model for Enterprise Architecture Scenario Selection [Volume 6, Number 4]
:: Razmi , Jafar A P-Robust Stochastic DEA Model for Enterprise Architecture Scenario Selection [Volume 6, Number 4]
:: Amalnick , Mohsen Sadegh A P-Robust Stochastic DEA Model for Enterprise Architecture Scenario Selection [Volume 6, Number 4]
:: Fasanghari , Mehdi A P-Robust Stochastic DEA Model for Enterprise Architecture Scenario Selection [Volume 6, Number 4]
:: Yaghmaee Moghaddam , Mohammad Hossein An Overload Window Control Method Based on Fuzzy Logic to Improve SIP Performance [Volume 6, Number 4]
:: Montazerolghaem, Ahmad Reza An Overload Window Control Method Based on Fuzzy Logic to Improve SIP Performance [Volume 6, Number 4]
:: Aref , Mohammad Reza Analysis of an RFID Authentication Protocol in Accordance with EPC Standards [Volume 6, Number 4]
:: Baghery , Karim Analysis of an RFID Authentication Protocol in Accordance with EPC Standards [Volume 6, Number 4]
:: Bakhshi , Hamidreza Analysis of an RFID Authentication Protocol in Accordance with EPC Standards [Volume 6, Number 4]
:: Abdolmaleki , Behzad Analysis of an RFID Authentication Protocol in Accordance with EPC Standards [Volume 6, Number 4]
:: Ghorbaninejad Foumani, Habib Compact Band-Pass and Band-Reject Microwave Filters Using Partial H-Plane Waveguide and Dielectric Layers [Volume 6, Number 4]
:: Ghajar , Ali Compact Band-Pass and Band-Reject Microwave Filters Using Partial H-Plane Waveguide and Dielectric Layers [Volume 6, Number 4]
:: Tarokh, Mohammad Jafar A New Approach to Compute a Realistic Credibility Rank for Reviewers Using Fuzzy Inference [Volume 7, Number 1]
:: Abbasimehr , Hossein A New Approach to Compute a Realistic Credibility Rank for Reviewers Using Fuzzy Inference [Volume 7, Number 1]
:: Modaberi , Somayeh A Method to Improve Accuracy of Learner Model based on Knowledge and Belief of Learner [Volume 7, Number 1]
:: Noorani , Seyede Fatemeh A Method to Improve Accuracy of Learner Model based on Knowledge and Belief of Learner [Volume 7, Number 1]
:: A. Kardan , Ahmad A Method to Improve Accuracy of Learner Model based on Knowledge and Belief of Learner [Volume 7, Number 1]
:: Gharavian , Davood Connection Optimization of a Neural Emotion Classifier Using Hybrid Gravitational Search Algorithms [Volume 7, Number 1]
:: Abbasnezhad Arabi , Mahdi Connection Optimization of a Neural Emotion Classifier Using Hybrid Gravitational Search Algorithms [Volume 7, Number 1]
:: Sheikhan , Mansour Connection Optimization of a Neural Emotion Classifier Using Hybrid Gravitational Search Algorithms [Volume 7, Number 1]
:: Khademi , Maryam A Model Based on Cellular Learning Automata for Improving the Intelligent Assistant Agents & Its Application in Earthquake Crisis Management [Volume 7, Number 1]
:: Ahmadi, Ali A Model Based on Cellular Learning Automata for Improving the Intelligent Assistant Agents & Its Application in Earthquake Crisis Management [Volume 7, Number 1]
:: Khani , Maryam A Model Based on Cellular Learning Automata for Improving the Intelligent Assistant Agents & Its Application in Earthquake Crisis Management [Volume 7, Number 1]
:: Mousavi Madani , Fariborz Energy Efficient Design Strategies of Translucent and Transparent IP Over WDM Networks [Volume 7, Number 1]
:: Mohammadi , Karim Overhead Reduction In Delay Tolerant Networks [Volume 7, Number 1]
:: Omidvar , Azadeh Overhead Reduction In Delay Tolerant Networks [Volume 7, Number 1]
:: Enami , Neda Energy Based Clustering Self Organizing Map Protocol For Wireless Sensor Networks [Volume 7, Number 1]
:: Barari , Morteza Energy Based Clustering Self Organizing Map Protocol For Wireless Sensor Networks [Volume 7, Number 1]
:: Dadashtabar Ahmadi , Kourosh Energy Based Clustering Self Organizing Map Protocol For Wireless Sensor Networks [Volume 7, Number 1]
:: Tarokh , Mohammad Jafar Customer Clustering Based on Customer Lifetime Value: A Case Study of an Iranian Bank [Volume 7, Number 2]
:: Nekooei , Arezoo Customer Clustering Based on Customer Lifetime Value: A Case Study of an Iranian Bank [Volume 7, Number 2]
:: Mozaffari , Saeed HWS: A Hierarchical Word Spotting Method for Farsi Printed Words Through Word Shape Coding [Volume 7, Number 2]
:: Tavoli , Reza HWS: A Hierarchical Word Spotting Method for Farsi Printed Words Through Word Shape Coding [Volume 7, Number 2]
:: Keyvanpour , Mohammadreza HWS: A Hierarchical Word Spotting Method for Farsi Printed Words Through Word Shape Coding [Volume 7, Number 2]
:: Ashtiani , Mehrdad A Computational Trust Model for E-Commerce Systems: Concepts, Definitions and Evaluation Method [Volume 7, Number 2]
:: Abdollahi Azgomi , Mohammad A Computational Trust Model for E-Commerce Systems: Concepts, Definitions and Evaluation Method [Volume 7, Number 2]
:: Divsalar , Mehrnoush A Computational Trust Model for E-Commerce Systems: Concepts, Definitions and Evaluation Method [Volume 7, Number 2]
:: Rahimi, Afshin Impact of Topic Modeling on Rule-Based Persian Metaphor Classification and its Frequency Estimation [Volume 7, Number 2]
:: Khosravizadeh, Parvaneh Impact of Topic Modeling on Rule-Based Persian Metaphor Classification and its Frequency Estimation [Volume 7, Number 2]
:: Abdi Ghavidel , Hadi Impact of Topic Modeling on Rule-Based Persian Metaphor Classification and its Frequency Estimation [Volume 7, Number 2]
:: Behrad , Alireza Text Localization, Extraction and Inpainting in Color Images using Combined Structural and Textural Features [Volume 7, Number 2]
:: Khodadadi Azadboni , Mohammad Text Localization, Extraction and Inpainting in Color Images using Combined Structural and Textural Features [Volume 7, Number 2]
:: Musevi Niya , Javad A New Method for SLM-Based OFDM Systems without Side Information [Volume 7, Number 2]
:: Meymanatabadi , Saber A New Method for SLM-Based OFDM Systems without Side Information [Volume 7, Number 2]
:: Ghalamiosgouei, Sina A New Fractional Adaptive Filtering Method and its Application in Speech Enhancement [Volume 7, Number 2]
:: Geravanchizadeh , Masoud A New Fractional Adaptive Filtering Method and its Application in Speech Enhancement [Volume 7, Number 2]
:: Sheikhan , Mansour Resource Reservation in Grid Networks based on Irregular Cellular Learning Automata [Volume 7, Number 3]
:: Khademzadeh , Ahmad Resource Reservation in Grid Networks based on Irregular Cellular Learning Automata [Volume 7, Number 3]
:: Rezaei , Sara Resource Reservation in Grid Networks based on Irregular Cellular Learning Automata [Volume 7, Number 3]
:: Tarokh , Mohammad Jafar Discovering Influencers for Spreading in Weighted Networks [Volume 7, Number 3]
:: Rezaei , Zahra Discovering Influencers for Spreading in Weighted Networks [Volume 7, Number 3]
:: Khademi , Maryam Using Hybrid of Eigenface and Imperialist Competition Algorithm for Feature Selection in Face Recognition [Volume 7, Number 3]
:: Sheikhan , Mansour Using Hybrid of Eigenface and Imperialist Competition Algorithm for Feature Selection in Face Recognition [Volume 7, Number 3]
:: Yousefi Darestani , Mohammad Reza Using Hybrid of Eigenface and Imperialist Competition Algorithm for Feature Selection in Face Recognition [Volume 7, Number 3]
:: Khadivi , Shahram Density-Based K-Nearest Neighbor Active Learning for Improving Farsi-English Statistical Machine Translation System [Volume 7, Number 3]
:: Safabakhsh , Reza Density-Based K-Nearest Neighbor Active Learning for Improving Farsi-English Statistical Machine Translation System [Volume 7, Number 3]
:: Bakhshaei , Somayeh Density-Based K-Nearest Neighbor Active Learning for Improving Farsi-English Statistical Machine Translation System [Volume 7, Number 3]
:: Ghassemian , Hassan Fast GLCM and Gabor Filters for Texture Classification of Very High Resolution Remote Sensing Images [Volume 7, Number 3]
:: Mirzapour , Fardin Fast GLCM and Gabor Filters for Texture Classification of Very High Resolution Remote Sensing Images [Volume 7, Number 3]
:: Savoji , Mohammad Hassan 8 kbps Speech Coding using KLMS Prediction, Look-Ahead Adaptive Quantization and Pre-Emphasized Noise Reduction [Volume 7, Number 3]
:: Alipoor , Ghasem 8 kbps Speech Coding using KLMS Prediction, Look-Ahead Adaptive Quantization and Pre-Emphasized Noise Reduction [Volume 7, Number 3]
:: Jamshidi , Jahan JNAM: a new detector proposed for marine radars [Volume 7, Number 3]
:: Naseri , Ali JNAM: a new detector proposed for marine radars [Volume 7, Number 3]
:: Rahbarinia , Babak EMOSS: An Efficient Algorithm to Hide Sequential Patterns [Volume 7, Number 4]
:: Badie , Kambiz EMOSS: An Efficient Algorithm to Hide Sequential Patterns [Volume 7, Number 4]
:: Pedram , Mir Mohsen EMOSS: An Efficient Algorithm to Hide Sequential Patterns [Volume 7, Number 4]
:: Behbahani, Olya Sadat EMOSS: An Efficient Algorithm to Hide Sequential Patterns [Volume 7, Number 4]
:: Shanbehzadeh, Jamshid Keyphrase Ranking Based on Second Order Co-Occurrence Analysis [Volume 7, Number 4]
:: Hoseini , Mojtaba Keyphrase Ranking Based on Second Order Co-Occurrence Analysis [Volume 7, Number 4]
:: Shahsavar Haghighi , Hosein Keyphrase Ranking Based on Second Order Co-Occurrence Analysis [Volume 7, Number 4]
:: Farhoodi , Mojgan DMTC-EBSC: A Novel Decision Making Technique in Cloud Environment Based on Extended BSC [Volume 7, Number 4]
:: Arianyan , Ehsan DMTC-EBSC: A Novel Decision Making Technique in Cloud Environment Based on Extended BSC [Volume 7, Number 4]
:: Maleki , Davood DMTC-EBSC: A Novel Decision Making Technique in Cloud Environment Based on Extended BSC [Volume 7, Number 4]
:: Ahmadi , Mohammad Reza DMTC-EBSC: A Novel Decision Making Technique in Cloud Environment Based on Extended BSC [Volume 7, Number 4]
:: Tadayon , Mohammad Hesam Efficient Verifiable Dynamic Threshold Secret Sharing Scheme Based on Elliptic Curves [Volume 7, Number 4]
:: Alaei , Amir Efficient Verifiable Dynamic Threshold Secret Sharing Scheme Based on Elliptic Curves [Volume 7, Number 4]
:: Karimi , Firoozeh A Clustering Based Feature Selection Approach to Detect Spam in Social Networks [Volume 7, Number 4]
:: Sohrabi , Mohammad Karim A Clustering Based Feature Selection Approach to Detect Spam in Social Networks [Volume 7, Number 4]
:: Mollaei , Mahmood A MinMax Routing Algorithm for Long Life Route Selection in MANETs [Volume 7, Number 4]
:: Ghasemi , Abdorasoul A MinMax Routing Algorithm for Long Life Route Selection in MANETs [Volume 7, Number 4]
:: Ebrahimzadeh, Ataollah Digital Modulation Classification Using the Bees Algorithm and Probabilistic Neural Network Based on Higher Order Statistics [Volume 7, Number 4]
:: Hakimi , Saeed Digital Modulation Classification Using the Bees Algorithm and Probabilistic Neural Network Based on Higher Order Statistics [Volume 7, Number 4]
:: Pujolle , Guy A Priority-based Fast Optimal Computation Offloading Planner for Mobile Cloud Computing [Volume 8, Number 1]
:: Movahedi , Zeinab A Priority-based Fast Optimal Computation Offloading Planner for Mobile Cloud Computing [Volume 8, Number 1]
:: Goudarzi , Mohammad A Priority-based Fast Optimal Computation Offloading Planner for Mobile Cloud Computing [Volume 8, Number 1]
:: Raahemi , Bijan Detecting Flood-based Attacks against SIP Proxy Servers and Clients using Engineered Feature Sets [Volume 8, Number 1]
:: Akbari , Ahmad Detecting Flood-based Attacks against SIP Proxy Servers and Clients using Engineered Feature Sets [Volume 8, Number 1]
:: Asgharian , Hassan Detecting Flood-based Attacks against SIP Proxy Servers and Clients using Engineered Feature Sets [Volume 8, Number 1]
:: Tarokh , Mohammad Jafar A Novel Trust Evaluation Model Using Graph Clustering Approach [Volume 8, Number 1]
:: Mahmoodyar , Mohammad Ali A Novel Trust Evaluation Model Using Graph Clustering Approach [Volume 8, Number 1]
:: Akbari , Behzad SDTE: Software Defined Traffic Engineering for Improving Data Center Network Utilization [Volume 8, Number 1]
:: Tajiki , Mohammad Mahdi SDTE: Software Defined Traffic Engineering for Improving Data Center Network Utilization [Volume 8, Number 1]
:: Khoshbakht , Marzieh SDTE: Software Defined Traffic Engineering for Improving Data Center Network Utilization [Volume 8, Number 1]
:: Jalili , Saeed Ensemble Link Predictor for Heterogeneous Complex Networks [Volume 8, Number 1]
:: Moghadam Charkari, Nasrollah Ensemble Link Predictor for Heterogeneous Complex Networks [Volume 8, Number 1]
:: Shakibian , Hadi Ensemble Link Predictor for Heterogeneous Complex Networks [Volume 8, Number 1]
:: Mousavi Madani , Fariborz A Novel Adaptive Router Placement Scheme in Hybrid Wireless Optical Access Network [Volume 8, Number 1]
:: Babamir , Seyed Morteza A Pareto-based Optimizer for Workflow Scheduling in Cloud Computing Environment [Volume 8, Number 1]
:: Khalili , Azade A Pareto-based Optimizer for Workflow Scheduling in Cloud Computing Environment [Volume 8, Number 1]
:: Mohammadi , Mohammad QC-LDPC Codes Construction by Concatenating of Circulant Matrices as Block-Columns [Volume 8, Number 2]
:: Tadayon , Mohammad Hesam QC-LDPC Codes Construction by Concatenating of Circulant Matrices as Block-Columns [Volume 8, Number 2]
:: Tarokh , Mohammad Jafar A New Hybrid Collaborative Recommender Using Semantic Web Technology and Demographic data [Volume 8, Number 2]
:: Gohari , Faezeh Sadat A New Hybrid Collaborative Recommender Using Semantic Web Technology and Demographic data [Volume 8, Number 2]
:: Sheikhan , Mansour Hybrid of Evolutionary and Swarm Intelligence Algorithms for Prosody Modeling in Natural Speech Synthesis [Volume 8, Number 2]
:: Zolrahmi , Forough An Architecture for a Mobile Recommender System in Tourism [Volume 8, Number 2]
:: Mousavi , Seyed Mohammad Reza An Architecture for a Mobile Recommender System in Tourism [Volume 8, Number 2]
:: Hosseini , Monireh An Architecture for a Mobile Recommender System in Tourism [Volume 8, Number 2]
:: Salahi , Ahmad DDoS Traffic Modeling, Identification and Attack Mitigation to Cloud Hosted servers by Drift plus Penalty methods [Volume 8, Number 2]
:: Mansouri , Mohsen A New Electronic Cash Protocol Using a Modified ElGamal and an Untraceable Signature Scheme [Volume 8, Number 2]
:: Zaghian , Ali A New Electronic Cash Protocol Using a Modified ElGamal and an Untraceable Signature Scheme [Volume 8, Number 2]
:: Tabandeh , Mahmoud Learning Motion Patterns in Traffic Scenes by Improved Group Sparse Topical Coding [Volume 8, Number 2]
:: Gholampour , Iman Learning Motion Patterns in Traffic Scenes by Improved Group Sparse Topical Coding [Volume 8, Number 2]
:: Ahmadi , Parvin Learning Motion Patterns in Traffic Scenes by Improved Group Sparse Topical Coding [Volume 8, Number 2]
:: Badie , Kambiz Hiding Fuzzy Sequential Patterns by a Multi-Objective Scheme [Volume 8, Number 3]
:: Pedram , Mir Mohsen Hiding Fuzzy Sequential Patterns by a Multi-Objective Scheme [Volume 8, Number 3]
:: Behbahani , Olya Sadat Hiding Fuzzy Sequential Patterns by a Multi-Objective Scheme [Volume 8, Number 3]
:: Behroozi , Hamid On Maximizing the Secrecy Rate in a Cooperative Wireless Network using Friendly Jammers [Volume 8, Number 3]
:: Hatami , Mohammad On Maximizing the Secrecy Rate in a Cooperative Wireless Network using Friendly Jammers [Volume 8, Number 3]
:: Assadi , Vahid A Ranking Framework for Designing a Portal Based on Healthcare Solutions The Case of Cardiovascular Disease [Volume 8, Number 3]
:: Baradaran , Vahid A Ranking Framework for Designing a Portal Based on Healthcare Solutions The Case of Cardiovascular Disease [Volume 8, Number 3]
:: Hadizadeh , Anita A Ranking Framework for Designing a Portal Based on Healthcare Solutions The Case of Cardiovascular Disease [Volume 8, Number 3]
:: Sepehri , Modammad Mehdi A Ranking Framework for Designing a Portal Based on Healthcare Solutions The Case of Cardiovascular Disease [Volume 8, Number 3]
:: Sazvar , Majid A metric Suite for Systematic Quality Assessment of Linked Open Data [Volume 8, Number 3]
:: Bagheri , Ebrahim A metric Suite for Systematic Quality Assessment of Linked Open Data [Volume 8, Number 3]
:: Kahani , Mohsen A metric Suite for Systematic Quality Assessment of Linked Open Data [Volume 8, Number 3]
:: Behkamal , Behshid A metric Suite for Systematic Quality Assessment of Linked Open Data [Volume 8, Number 3]
:: Gheysari , Mohammad Analysis the Effects of Internet of Things Technology in Managing Supply Chain [Volume 8, Number 3]
:: Tajfar , Amir Houshang Analysis the Effects of Internet of Things Technology in Managing Supply Chain [Volume 8, Number 3]
:: Zayyani , Hadi A Weighted Soft-Max PNLMS Algorithm for Sparse System Identification [Volume 8, Number 3]
:: Bekrani , Mehdi A Weighted Soft-Max PNLMS Algorithm for Sparse System Identification [Volume 8, Number 3]
:: Ghorbaninejad , Habib Gain and Bandwidth Enhancement of Slot Antenna Using Two Unprinted Dielectric Superstrate [Volume 8, Number 3]
:: Fakhte , Rasoul Gain and Bandwidth Enhancement of Slot Antenna Using Two Unprinted Dielectric Superstrate [Volume 8, Number 3]
:: Mozayani , Nasser Preference Based PSO for Utility Optimization in Broadband Digital Economy [Volume 8, Number 4]
:: Mansourifar , Leila Preference Based PSO for Utility Optimization in Broadband Digital Economy [Volume 8, Number 4]
:: Taghiyareh , Fattaneh The Impact of Structural Position on Opinion Leadership in Social Network [Volume 8, Number 4]
:: Salehi , Sajjad The Impact of Structural Position on Opinion Leadership in Social Network [Volume 8, Number 4]
:: Kharrat , Mahmood Technology Roadmapping Framework: Case study of USO services in Iran [Volume 8, Number 4]
:: Mirsaeedghazi , Tahereh Technology Roadmapping Framework: Case study of USO services in Iran [Volume 8, Number 4]
:: Abbasi Shahkooh , Kolsoom Technology Roadmapping Framework: Case study of USO services in Iran [Volume 8, Number 4]
:: Dastranj , Nasrin Technology Roadmapping Framework: Case study of USO services in Iran [Volume 8, Number 4]
:: Mahin Zaeem , Reza Optimum Selection of Modes Set for Adaptive Modulation and Coding based on Imperfect Channel State Information [Volume 8, Number 4]
:: Taki , Mehrdad Optimum Selection of Modes Set for Adaptive Modulation and Coding based on Imperfect Channel State Information [Volume 8, Number 4]
:: Musevi Niya , Mir Javad On Error and Bitrate Tradeoff in Visible Light Communication System to ensure HEVC Video Quality [Volume 8, Number 4]
:: Seyedarabi , Hadi On Error and Bitrate Tradeoff in Visible Light Communication System to ensure HEVC Video Quality [Volume 8, Number 4]
:: Abdollahzadeh , Milad On Error and Bitrate Tradeoff in Visible Light Communication System to ensure HEVC Video Quality [Volume 8, Number 4]
:: Alizadeh Ghazijahani , Hamed On Error and Bitrate Tradeoff in Visible Light Communication System to ensure HEVC Video Quality [Volume 8, Number 4]
:: Gobadi , Changiz Non-stationary Sparse System Identification over Adaptive Sensor Networks with Diffusion and Incremental Strategies [Volume 8, Number 4]
:: Mostafapour , Ehsan Non-stationary Sparse System Identification over Adaptive Sensor Networks with Diffusion and Incremental Strategies [Volume 8, Number 4]
:: Aliabadi , Amin Non-stationary Sparse System Identification over Adaptive Sensor Networks with Diffusion and Incremental Strategies [Volume 8, Number 4]
:: Bazdar , Amir Non-stationary Sparse System Identification over Adaptive Sensor Networks with Diffusion and Incremental Strategies [Volume 8, Number 4]
:: Mohamed-pour, Kamal Spatial Interference Alignment in Relay-Assisted Multi-Cell Multi-User Networks [Volume 8, Number 4]
:: H. Bastami , Ali Spatial Interference Alignment in Relay-Assisted Multi-Cell Multi-User Networks [Volume 8, Number 4]
:: Golestani , Ali Spatial Interference Alignment in Relay-Assisted Multi-Cell Multi-User Networks [Volume 8, Number 4]
:: Taghiyareh , Fattaneh Pruning Concept Map to Geneate Ontology [Volume 9, Number 1]
:: Mosharraf , Maedeh Pruning Concept Map to Geneate Ontology [Volume 9, Number 1]
:: Zakerolhosseini , Ali Mining Dynamic Communities based on a Novel Link-Clustering Algorithm [Volume 9, Number 1]
:: Cheraghchi , Hamideh Sadat Mining Dynamic Communities based on a Novel Link-Clustering Algorithm [Volume 9, Number 1]
:: Kangavari , Mohammadreza GSSC: Graph Summarization based on both Structure and Concepts [Volume 9, Number 1]
:: Ashrafi Payaman , Nosratali GSSC: Graph Summarization based on both Structure and Concepts [Volume 9, Number 1]
:: Alishirvani , Nasrin A Framework to Create a Certificate for e-Commerce Secure Transaction Protocol [Volume 9, Number 1]
:: Naghibzadeh , Mahmoud Inconsistency Repair to Improve the Alignment Results of Ontology Matchers [Volume 9, Number 1]
:: Behkamal , Bahareh Inconsistency Repair to Improve the Alignment Results of Ontology Matchers [Volume 9, Number 1]
:: Babamir , Seyed Morteza QoS-aware web service composition using Gray Wolf Optimizer [Volume 9, Number 1]
:: Karimi , Meysam QoS-aware web service composition using Gray Wolf Optimizer [Volume 9, Number 1]
:: Berangi , Reza A Sub-Optimal Policy for Connection Admission Control Mechanism in Cognitive Radio Sensor Networks [Volume 9, Number 1]
:: Hosseini , Elahe sadat A Sub-Optimal Policy for Connection Admission Control Mechanism in Cognitive Radio Sensor Networks [Volume 9, Number 1]
:: Takabi , Hassan Multi-Objective Response to Co-Resident Attacks in Cloud Environment [Volume 9, Number 3]
:: Analoui , Morteza Multi-Objective Response to Co-Resident Attacks in Cloud Environment [Volume 9, Number 3]
:: Abazari , Farzaneh Multi-Objective Response to Co-Resident Attacks in Cloud Environment [Volume 9, Number 3]
:: Reshadi , Midia ARTEMIS: A Simulator Tool for Heterogeneous Network-on-Chip [Volume 9, Number 2]
:: Khadem Zadeh, Ahmad ARTEMIS: A Simulator Tool for Heterogeneous Network-on-Chip [Volume 9, Number 2]
:: Vardi , Fatemeh ARTEMIS: A Simulator Tool for Heterogeneous Network-on-Chip [Volume 9, Number 2]
:: Bostani , Hamid A Security Mechanism for Detecting Intrusions in Internet of Things Using Selected Features Based on MI-BGSA [Volume 9, Number 2]
:: Sheikhan , Mansour A Security Mechanism for Detecting Intrusions in Internet of Things Using Selected Features Based on MI-BGSA [Volume 9, Number 2]
:: Khansari , Mohammad Critical Success factors for implementing PACS Technology in Iran's Hospitals [Volume 9, Number 2]
:: Heydari , Mahmood Critical Success factors for implementing PACS Technology in Iran's Hospitals [Volume 9, Number 2]
:: Heshmati , Zainabolhoda Critical Success factors for implementing PACS Technology in Iran's Hospitals [Volume 9, Number 2]
:: Saghafi , Fatemeh Critical Success factors for implementing PACS Technology in Iran's Hospitals [Volume 9, Number 2]
:: Fadaee , Marzieh Persian Wordnet Construction using Supervised Learning [Volume 9, Number 2]
:: Faili , Heshaam Persian Wordnet Construction using Supervised Learning [Volume 9, Number 2]
:: Mousavi , Zahra Persian Wordnet Construction using Supervised Learning [Volume 9, Number 2]
:: Javidan , Reza A Novel Density based Clustering Method using Nearest and Farthest Neighbor with PCA [Volume 9, Number 2]
:: Faroughi , Azadeh A Novel Density based Clustering Method using Nearest and Farthest Neighbor with PCA [Volume 9, Number 2]
:: Mashayekhi , Hoda A Probabilistic Topic Model based on an Arbitrary-Length Co-occurrence Window [Volume 9, Number 2]
:: Zahedi , Morteza A Probabilistic Topic Model based on an Arbitrary-Length Co-occurrence Window [Volume 9, Number 2]
:: Rahimi , Marziea A Probabilistic Topic Model based on an Arbitrary-Length Co-occurrence Window [Volume 9, Number 2]
:: Daryabar , Farid An Attack-Defense Model for the Binder on the Android Kernel Level [Volume 9, Number 2]
:: Tadayon , Mohammad Hesam An Attack-Defense Model for the Binder on the Android Kernel Level [Volume 9, Number 2]
:: Salehi , majid An Attack-Defense Model for the Binder on the Android Kernel Level [Volume 9, Number 2]
:: Noori , Narges Design and Implementation of a TEM Cell with Piecewise Linear Tapering [Volume 9, Number 3]
:: Kalantari Meybodi, Mohsen Design and Implementation of a TEM Cell with Piecewise Linear Tapering [Volume 9, Number 3]
:: Arezoomand , Masoud Design and Implementation of a TEM Cell with Piecewise Linear Tapering [Volume 9, Number 3]
:: EsmaeiliGookeh , Mahsa A Stochastic Approach for Valuing Customers [Volume 9, Number 3]
:: Tarokh , Mohammadjafar A Stochastic Approach for Valuing Customers [Volume 9, Number 3]
:: Khani , Maryam A novel approach for learning improvement in interactive classroom environments using learning automata [Volume 9, Number 3]
:: Ahmadi , Ali A novel approach for learning improvement in interactive classroom environments using learning automata [Volume 9, Number 3]
:: Hajary , Hajar A novel approach for learning improvement in interactive classroom environments using learning automata [Volume 9, Number 3]
:: Abdoli , Mohammad Hossein Enhancement of educational games based on personality type indicators [Volume 9, Number 3]
:: Taghiyareh , Fattaneh Enhancement of educational games based on personality type indicators [Volume 9, Number 3]
:: Shabihi , Negar Enhancement of educational games based on personality type indicators [Volume 9, Number 3]
:: Enayatizadeh , Javad Domain Ontology to Distinguish Different Types of Rootkits [Volume 9, Number 3]
:: salahi , ahmad Domain Ontology to Distinguish Different Types of Rootkits [Volume 9, Number 3]
:: Keramati, Marjan An Attack Graph Based Method for Predictive Risk Evaluation of Zero-Day Attacks [Volume 9, Number 3]
:: Keramati, Marjan Dynamic Risk Assessment System for the Vulnerability Scoring [Volume 9, Number 4]
:: Arabsorkhi, Abouzar Enhancement of Illumination scheme for Adult Image Recognition [Volume 9, Number 4]
:: Karamizadeh, Sasan Enhancement of Illumination scheme for Adult Image Recognition [Volume 9, Number 4]
:: Khoshbin Ghomash, H. Subspace-Based Approaches for Hybrid Millimeter-Wave Channel Estimation [Volume 9, Number 4]
:: Shakhsi Dastgahian, M. Subspace-Based Approaches for Hybrid Millimeter-Wave Channel Estimation [Volume 9, Number 4]
:: Haghani, Sogol Hybrid of Active Learning and Dynamic Self-Training for Data Stream Classification [Volume 9, Number 4]
:: Kholghi, Mahnoosh Hybrid of Active Learning and Dynamic Self-Training for Data Stream Classification [Volume 9, Number 4]
:: Keyvanpour, MohammadReza Hybrid of Active Learning and Dynamic Self-Training for Data Stream Classification [Volume 9, Number 4]
:: Khademzadeh, Ahmad Hub location Allocation Problem in Computer Networks Using Intelligent Optimization Algorithms [Volume 9, Number 4]
:: Hartoonian, Armond Hub location Allocation Problem in Computer Networks Using Intelligent Optimization Algorithms [Volume 9, Number 4]
:: Yaghmaee, Mahamad Hossein Cloud-Based Large-Scale Sensor Networks: Motivation, Taxonomies, and Open Challenges [Volume 9, Number 4]
:: Banaie, Fatemeh Cloud-Based Large-Scale Sensor Networks: Motivation, Taxonomies, and Open Challenges [Volume 9, Number 4]
:: Hosseini, Seyed Amin Cloud-Based Large-Scale Sensor Networks: Motivation, Taxonomies, and Open Challenges [Volume 9, Number 4]