Keywords Index

All issues
:: 5G A 3D Time-Variant Non-Stationary Hybrid Channel Model for Massive MIMO Systems [Volume 11, Number 2]
:: 5G. Power-Efficient Resource Allocation in Massive MIMO Aided Cloud RANs [Volume 10, Number 3]
:: 5G. Three-Step Optimization Algorithm in SCMA-based System for User Association and Resource Allocation in C-RAN [Volume 12, Number 2]
:: ABX Test Wavelet-based Robust Voice conversion systems [Volume 1, Number 1]
:: ARAP Forgery Attack is a Piece of Cake on a Class of Mutual Authentication Protocols [Volume 4, Number 3]
:: Affine Projection Algorithms A New Fractional Adaptive Filtering Method and its Application in Speech Enhancement [Volume 7, Number 2]
:: Ambient Intelligence (AmI) Energy-Efficient Human Activity Recognition on Smartphones: A Test-Cost Sensitive Approach [Volume 10, Number 3]
:: Artificial Neural Networks (ANN) Analysing Probabilistic Support Vector Machine Based Localization In Wireless Sensor Networks [Volume 3, Number 2]
:: Artificial intelligence A Review on Internet Traffic Classification Based on Artificial Intelligence Techniques [Volume 14, Number 2]
:: Attention mechanism mproving the Performance of Text Sentiment Analysis using Deep Convolutional Neural Network Integrated with Hierarchical Attention Layer [Volume 11, Number 3]
:: Authentication Using Blockchain to Improve the Security Of The X3DH Key Exchange Protocol [Volume 15, Number 3]
:: Authentication. Improving the Security of Management Software of Smart Meters Networks [Volume 15, Number 4]
:: BPEL process VE Architect-Driven Service-Oriented Business Network Process Realization [Volume 2, Number 4]
:: Band-pass microwave filter Compact Band-Pass and Band-Reject Microwave Filters Using Partial H-Plane Waveguide and Dielectric Layers [Volume 6, Number 4]
:: Behavior Masquerade Detection Using GUI Events in Windows Systems [Volume 3, Number 2]
:: Big data Web Domains Ranking with Real User Traffic Based on the Big Data Platform [Volume 12, Number 1]
:: Bilingual dictionary Evaluating Fidelity of Persian-English Sentence-Aligned Parallel Corpus [Volume 5, Number 3]
:: Blogosphere Trend Detection and Prediction in Blogosphere based on Sentiment Analysis using PSO and Q-Learning [Volume 12, Number 1]
:: Bloom filter Providing a Secure Protocol in Smart Metering Networks Based on the Internet of Things [Volume 11, Number 4]
:: Business Strategies A Multi-Aspect Architecture with Co-alignment between Layers for Intra-Organizational Knowledge Networking Purposes [Volume 2, Number 3]
:: CNN. Hyperspectral Image Super Resolution Using Anomaly Weighted Gabor Based CNN [Volume 15, Number 2]
:: CPN Tools Cyber Attack Simulation for Operational Security Evaluation Using Coloured Petri Nets [Volume 4, Number 3]
:: CUDA Accelarated Optical Character Recognition on Graphics Processing Units [Volume 5, Number 3]
:: Cell Division Technique. Energy Efficient Power Allocation in MIMO-NOMA Systems with ZF Precoding Using Cell Division Technique [Volume 14, Number 3]
:: Chaotic Tent map Image Encryption Using Tent Chaotic Map and Arnold Cat Map [Volume 4, Number 3]
:: Classification model Investigating Sentiment Analysis of News in Stock Market Prediction Utilizing Machine Learning Technique [Volume 16, Number 3]
:: Cluster Head Selection Non-Homogeneous Cluster Head Selection for Energy-Aware Hierarchical Routing Protocols in Wireless Sensor Networks [Volume 5, Number 1]
:: Collaborative filtering A Multi-Dimensional Recommendation Framework for Learning Material by Naive Bayes Classifier [Volume 4, Number 3]
:: Communication cost HHMap: A Novel Task Mapping for Heterogeneous & Homogeneous 3D NoCs with the Objective of Improving Energy Consumption [Volume 17, Number 1]
:: Compact compensator Adaptive Methods for Joint Compensation of Power Amplifier Nonlinearity and Quadrature Modulator IQ Imbalance [Volume 1, Number 4]
:: Computational security Efficient Verifiable Dynamic Threshold Secret Sharing Scheme Based on Elliptic Curves [Volume 7, Number 4]
:: Computer linguistics Designing and Developing a Wordnet for Persian Nouns Pages [Volume 1, Number 3]
:: Conceptual model. Digital Transformation Research: Identifying The Elements Influencing Digital Transformation at the National Level [Volume 16, Number 4]
:: Consumed Bandwidth Reduction. Real-Timeness Improvement of CAN-based Industrial Networks Based on Criticality Level [Volume 13, Number 4]
:: Convolutional Enhancement of Illumination scheme for Adult Image Recognition [Volume 9, Number 4]
:: Core Decomposition On the Reselection of Seed Nodes in Independent Cascade Based Influence Maximization [Volume 10, Number 4]
:: Critical infrastructure. A Novel Framework for Cyber Situational Awareness at the National Level [Volume 17, Number 1]
:: Cumulative Return Adaptive Portfolio Optimization with Multi-Agent Deep Reinforcement Learning and Short-Term Performance Analysis [Volume 17, Number 3]
:: Cybersecurity Defending Against Adversarial Attacks in Artificial Intelligence Technologies [Volume 17, Number 2]
:: D-FDTD Design and Fabrication of an Optical Nanofilter based on Surface Plasmons [Volume 1, Number 2]
:: DMDS. Collaborative Mappers based on Co-evolutionary Optimization Technique in MapReduce [Volume 14, Number 4]
:: DMTC-EBSC DMTC-EBSC: A Novel Decision Making Technique in Cloud Environment Based on Extended BSC [Volume 7, Number 4]
:: Data Stream. Hybrid of Active Learning and Dynamic Self-Training for Data Stream Classification [Volume 9, Number 4]
:: Data mining Improving the Performance of E-Learning Systems Using Extracted Web Server Log File Suggestions [Volume 3, Number 1]
:: Density Based KNN Density-Based K-Nearest Neighbor Active Learning for Improving Farsi-English Statistical Machine Translation System [Volume 7, Number 3]
:: Detection Accurate (DA). ISOT: Distributed Selfish Node Detection in Internet of Things [Volume 10, Number 3]
:: Discrete Entropy Digital Image Enhancement Through Bi-Histogram Equalization Using Entropy-Based Plateau Limit [Volume 14, Number 4]
:: Distributed intrusion detection. Implementation of Intrusion Detection Systems in order to Detect Phishing in the Banking Industry [Volume 12, Number 2]
:: Double Auction model Continuous Double Auction Scheduling in Federated Cloud Services [Volume 11, Number 1]
:: Double Shell Façade Investigating the Sustainability of Energy Production and Consumption in Data Centers with the Design and Morphology Approach of the Building [Volume 12, Number 4]
:: Dynamic Interests A New Adaptive Hybrid Recommender Framework for Learning Material Recommendation [Volume 5, Number 3]
:: Dynamic resource allocation DDoS Traffic Modeling, Identification and Attack Mitigation to Cloud Hosted servers by Drift plus Penalty methods [Volume 8, Number 2]
:: EDF algorithm Increasing the Total Efficiently Executed Work on Volunteer Computing Environment Based on Work Send Policy [Volume 5, Number 4]
:: EPC Class-1 Generation-2 standards Analysis of an RFID Authentication Protocol in Accordance with EPC Standards [Volume 6, Number 4]
:: EPC Companies. Implementing Process Mining Techniques to Analyze Performance in EPC Companies [Volume 14, Number 2]
:: Electromagnetic field simulation An Improved Active Mixer Architecture for Millimeter Wave Applications [Volume 3, Number 2]
:: Encoder-decoder Automatic License Plate Recognition using the Deep Learning Networks [Volume 17, Number 1]
:: Energy efficiency Computing Energy Efficiency for a Cognitive Heterogeneous Satellite Network Based on Interference Management [Volume 12, Number 3]
:: Energy efficiency A Dynamic Hybrid Precoding Structure for mmWave Massive MIMO Systems [Volume 16, Number 1]
:: Ensemble Isolation Forest Auto-Encoder LSTM Methods for Anomaly-Based Web Application Firewallall [Volume 11, Number 3]
:: Entropy A Novel Blind Spectrum Sensing Algorithm for Cognitive Radio Systems Based on Algorithmic Information Theory [Volume 3, Number 3]
:: Equal-gain combining On the Distribution of the Sum of Independent Random Variables and Its Application [Volume 1, Number 1]
:: Error concealment A Novel Still Image Error Concealment Using Fragile Watermarking in Wireless Image , Transmission and Packet-Switched Networks [Volume 1, Number 3]
:: Ethereum Architectures for a Blockchain-based Decentralized Marketplace for Handicrafts [Volume 17, Number 2]
:: Evolutionary Computation An Efficient Application Deployment in Fog [Volume 15, Number 3]
:: Evolutionary Methods Learners Grouping in E-Learning Environment Using Evolutionary Fuzzy Clustering Approach [Volume 3, Number 1]
:: Evolutionary Optimization An Optimized Deep Model for Bi-lingual Sentiment Analysis of Medical User Reviews [Volume 16, Number 1]
:: Evolutionary algorithm Joint Use of RSA and Genetic Algorithm to Improve the Process of Image Encryption and Information Hiding [Volume 16, Number 4]
:: Expanding Population PSO-based Scheduling Algorithm for Time and Cost Optimization in Mobile Grid [Volume 0, Number 0]
:: Expanding Population PSO-Based Scheduling Algorithm for Time and Cost Optimization in Mobile Grid [Volume 10, Number 3]
:: FDR. FDR Adjustment for Achieving Desired Minimum Distance of Marine ESIM from the Shore [Volume 14, Number 3]
:: Face Recognition A New Fuzzy Convolutional Neural Network for Face Recognition to Classify Authorized and Unauthorized Persons [Volume 15, Number 1]
:: Fairness A Fairness-Guaranteed Game-Theoretic Perspective in Multi-User Interference Channel [Volume 9, Number 4]
:: Farsi document HWS: A Hierarchical Word Spotting Method for Farsi Printed Words Through Word Shape Coding [Volume 7, Number 2]
:: Feature Extraction JPEG Compressed Domain Face Recognition:Different Stages and Different Features [Volume 4, Number 4]
:: Feature Selection Intrusion Detection System Using SVM as Classifier and GA for Optimizing Feature Vectors [Volume 10, Number 1]
:: Feature extraction Content-based Image Retrieval for Carpet E-commerce Application [Volume 13, Number 1]
:: Fertility Phrase Alignments in Parallel Corpus Using Bootstrapping Approach [Volume 6, Number 3]
:: Framework. A Framework for ICT-Oriented Sustainable Development through Mapping from ICT Concerns onto Sustainability Indicators [Volume 10, Number 4]
:: Fuzzy Inference Systems A New Approach to Compute a Realistic Credibility Rank for Reviewers Using Fuzzy Inference [Volume 7, Number 1]
:: Fuzzy Logic A Novel Protocol for Routing in Vehicular Ad hoc Network Based on Model-Based Reinforcement Learning and Fuzzy Logic [Volume 12, Number 4]
:: Fuzzy Logic. A Framework for Optimal Fault Tolerance Protocol Selection Using Fuzzy Logic on IoT Sensor Layer [Volume 10, Number 2]
:: Fuzzy logic An Overload Window Control Method Based on Fuzzy Logic to Improve SIP Performance [Volume 6, Number 4]
:: GERAM A Virtual Research Management Enterprise Architecture Using Axiomatic Design [Volume 6, Number 3]
:: GIS A Model Based on Cellular Learning Automata for Improving the Intelligent Assistant Agents & Its Application in Earthquake Crisis Management [Volume 7, Number 1]
:: GPRLM Performance Improvement of Language Identification Using Transcription Based Sequential Approaches & Sequential Kernels Based SVM [Volume 4, Number 2]
:: Generalized Bayesian estimator Bayesian-Based Cooperative Framework for Spectrum Sensing in Cognitive Radio Networks [Volume 3, Number 3]
:: Generative Adversarial Network Inverse Design of a Wide-Angle Wideband Programmable THz Reflectarray Through Generative Adversarial Networks [Volume 17, Number 3]
:: Genetic Algorithm A Novel Method to Equalize Frequency-Selective MIMO Channels Using Genetic Algorithm and Singular Value Decomposition of Polynomial Matrice [Volume 1, Number 2]
:: Genetic Algorithm A Two-Dimensional Maximum Likelihood Parameter Estimation of Г-Г Distribution for Free Space Optical Channels with Weak Turbulence Conditions [Volume 5, Number 4]
:: Genetic Algorithms A New GA Approach Based on Pareto Ranking Strategy for Privacy Preserving of Association Rule Mining [Volume 2, Number 2]
:: Genetic Algorithms. Cost Reduction Using SLA-Aware Genetic Algorithm for Consolidation of Virtual Machines in Cloud Data Centers [Volume 14, Number 2]
:: Graph Persian to English Personal Name Transliteration Based On the Persian Web Contents [Volume 5, Number 1]
:: Graph Theory Multi-Objective Response to Co-Resident Attacks in Cloud Environment [Volume 9, Number 3]
:: Grounded theory. A Smart Contract Model in Knowledge-based Companies Based on Grounded Theory by Focusing on the Robotic Process Automation and Process Management Strategies [Volume 13, Number 2]
:: High gain Gain and Bandwidth Enhancement of Slot Antenna Using Two Unprinted Dielectric Superstrate [Volume 8, Number 3]
:: Homogeneity. Improving Image Dynamic Range For An Adaptive Quality Enhancement Using Gamma Correction [Volume 0, Number 0]
:: Hop Count Decreasing the Average Delay, Connectivity, and Routing Load in Clustered Mobile Ad- Hoc Networks [Volume 10, Number 1]
:: Hybrid Spectrum A Novel Strategy-Proof Auction Mechanism for Hybrid Spectrum Allocation [Volume 6, Number 2]
:: IRISL An ERP Framework Based on Service Oriented Architecture and Cloud Computing Environment Case: IRISL Container Department [Volume 10, Number 3]
:: Impcat Assessment Impact Assessment for Cyber Security Situation Awareness [Volume 15, Number 3]
:: Integer programming Optimum Selection of Modes Set for Adaptive Modulation and Coding based on Imperfect Channel State Information [Volume 8, Number 4]
:: Integral contour Low Cost Millimeter Wave Duplexer Design Using Mixed Mode Matching and Integral Contour Methods [Volume 3, Number 2]
:: Integration Introduce an Enhanced Hospital Information System Reference Architecture with ATAM Evaluation [Volume 16, Number 1]
:: Integration of integration A Framework for Technology Foresight Based on Ontology Integration of the Most Famous Foresight Models [Volume 1, Number 4]
:: Intelligent Tutoring System E-Learners’ Activity Categorization Based on Their Learning Styles Using ART Family Neural Network [Volume 4, Number 2]
:: Intersection cMaxDriver: A Centrality Maximization Intersection Approach for Prediction of Cancer-Causing Genes in the Transcriptional Regulatory Network [Volume 14, Number 1]
:: Intrusion Prevention An Attack Graph Based Method for Predictive Risk Evaluation of Zero-Day Attacks [Volume 9, Number 3]
:: IoT Energy Efficient Distributed Anomaly Detection using Semi-Supervised Models in IoT [Volume 16, Number 1]
:: Job scheduling Resource Reservation in Grid Networks based on Irregular Cellular Learning Automata [Volume 7, Number 3]
:: Joint sparsity Massive MIMO Slow-varying Channel Estimation Using Tensor Sparsity [Volume 13, Number 1]
:: K-means clustering A Proactive Context-Aware Self-Healing Scheme for 5G Using Machine Learning [Volume 10, Number 4]
:: LSTM A Comparative Study of BERT-X for Sentiment Analysis and Stance Detection in Persian Social Media [Volume 16, Number 3]
:: Large Language Model (LLM) EmoRecBiGRU: Emotion Recognition in Persian Tweets with a Transformer-based Model, Enhanced by Bidirectional GRU [Volume 16, Number 3]
:: Large-Scale Graph processing A Review of the Distributed Methods for Large-Scale Social Network Analysis [Volume 6, Number 3]
:: Learner Modeling Knowledge Evaluation Based on Learner Assessment and Utilizing Fuzzy System to Increase the Accuracy of Evaluation [Volume 3, Number 1]
:: Learning automata Rule Scheduling in Active Database using Learning Automata [Volume 1, Number 4]
:: Learning with Errors (LWE) Reducing The Computational Complexity of Fuzzy Identity-Based Encryption from Lattice [Volume 16, Number 1]
:: Linguistic Features Recognizing Personality Traits using Twitter & Facebook for Arabic Speaking Users in Lebanon [Volume 15, Number 1]
:: Link-state routing A Backup Routing Scheme for Mobile Ad-Hoc Networks [Volume 1, Number 3]
:: Linked Open Data A metric Suite for Systematic Quality Assessment of Linked Open Data [Volume 8, Number 3]
:: Load Balancing EDBPM: An Event-Driven Business Process Monitoring Mechanism [Volume 10, Number 2]
:: Local Binary Pattern(LBP) Face Verification Using Local Binary Patterns and Sparse Representation Techniques [Volume 5, Number 4]
:: Longest Matching Prefix Route Lookup Algorithms Using the Novel Idea of Coded Prefix Trees [Volume 4, Number 4]
:: Low Power. A Partial Method for Calculating CNN Networks Based On Loop Tiling [Volume 15, Number 2]
:: Low-recourse Languages Improving Persian Named Entity Recognition Through Multi Task Learning [Volume 13, Number 2]
:: MAC A Mobility Based Cooperative MAC Protocol for Wireless Networks [Volume 5, Number 1]
:: MEMS All Optical Logic Gates: A Tutorial [Volume 4, Number 3]
:: Manifold Sparse, Robust and Discriminative Representation by Supervised Regularized Auto-encoder [Volume 11, Number 2]
:: Markov Clustering Algorithm (MCL) A Novel Trust Evaluation Model Using Graph Clustering Approach [Volume 8, Number 1]
:: Markov chain Proposing a New Algorithm for Predicting Short-Term and Long-Term Trust-ability in Cloud Computing [Volume 11, Number 2]
:: Maximum Achievable Capacity. Transmit Power Optimization in Optical Coherent Transmission Systems: Analytical, Simulation, and Experimental Results [Volume 11, Number 1]
:: Maximum Likelihood A Maximum Likehood Frequency Offset Estimation with Improved Range ad Performance in OFDM Systems [Volume 2, Number 1]
:: Meta-Path. A Multilayered Complex Network Model for Image Retrieval [Volume 13, Number 4]
:: Meta-path Ensemble Link Predictor for Heterogeneous Complex Networks [Volume 8, Number 1]
:: Metaheuristic. IR-WCO2C: An Enhanced Multi Operators-Based Approach for Content-Aware Image Retargeting [Volume 12, Number 4]
:: Metaphoricity Impact of Topic Modeling on Rule-Based Persian Metaphor Classification and its Frequency Estimation [Volume 7, Number 2]
:: Multi Label Classification Claim Detection in Persian Twitter Posts [Volume 16, Number 3]
:: Multi-agent systems A Distributed Optimization Approach for Multi-Agent Systems over Delaying Networks [Volume 13, Number 4]
:: Multi-classification Persian Rumor Detection Using a MultiClassifier Fusion Approach [Volume 16, Number 4]
:: Multiple Access Channel Classical -Quantum Multiple Access Channel with Secrecy Constraint: One-shot Rate Region [Volume 12, Number 2]
:: Mutual Information A Method for Anomaly Detection in Big Data based on Support Vector Machine [Volume 11, Number 3]
:: NGN and IMS Security Detecting Flood-based Attacks against SIP Proxy Servers and Clients using Engineered Feature Sets [Volume 8, Number 1]
:: Network lifetime Optimized Task Scheduling for Estimation in Wireless Sensor Networks [Volume 5, Number 2]
:: OWA Fake News Detection Based on Social Features by Ordered Weighted Averaging Fusion [Volume 12, Number 4]
:: Ontology Predicting Network Attacks Using Ontology-Driven Inference [Volume 4, Number 2]
:: Ontology. Improving Content-Based Recommender System For Clustering Documents Based on Ontology And New Hierarchical Clustering Method [Volume 14, Number 3]
:: Open Learner Model formatting A Method to Improve Accuracy of Learner Model based on Knowledge and Belief of Learner [Volume 7, Number 1]
:: OpenFlow SDTE: Software Defined Traffic Engineering for Improving Data Center Network Utilization [Volume 8, Number 1]
:: Optimal Partitioning A Priority-based Fast Optimal Computation Offloading Planner for Mobile Cloud Computing [Volume 8, Number 1]
:: Optimization New Phase Realization Approach for Implementation of Braodband Reflectarrays [Volume 13, Number 1]
:: Optimization Efficient Policy-Aware Deployment of Business Process in Cloud Federation [Volume 10, Number 3]
:: Organizational Interoperability Framework A New Framework for Enterprise Interoperability Based on Meta- synthesis Approach through Combination of Current Frameworks [Volume 1, Number 4]
:: Overlap community Creating a Maximal Clique Graph to Improve Community Detection in SCoDA and OSLOM Algorithms [Volume 11, Number 4]
:: Overlap. Arabic Handwritten Recognition Using Hybrid CNN, HMM and an Intelligent Network Based on Dentate Gyrus of the Brain [Volume 15, Number 2]
:: P-robustness A P-Robust Stochastic DEA Model for Enterprise Architecture Scenario Selection [Volume 6, Number 4]
:: PPDM. Classification and Evaluation of Privacy Preserving Data Mining Methods [Volume 12, Number 3]
:: PSL Static Persian Sign Language Recognition Using Kernel-Based Feature Extraction [Volume 4, Number 1]
:: PSO Preference Based PSO for Utility Optimization in Broadband Digital Economy [Volume 8, Number 4]
:: PSO Hiding Fuzzy Sequential Patterns by a Multi-Objective Scheme [Volume 8, Number 3]
:: PSO Algorithm Detection of E-commerce Attacks and Anomalies using Adaptive Neuro-Fuzzy Inference System and Firefly Optimization Algorithm [Volume 13, Number 1]
:: Packet Lost Evaluation A New Method for Evaluating Video Quality of Experience on Content-Aware Packet Loss Effect Analysis [Volume 5, Number 4]
:: Parallel genetic algorithm An Improved Parallel Genetic Algorithm for Optimal Sensor Placement of Wireless Sensor Networks [Volume 6, Number 3]
:: Particle Swarm Optimization (PSO) Swarm intelligence grouping of e-learners using fuzzy inspired PSO method [Volume 6, Number 4]
:: Pattern detection Inconsistency Repair to Improve the Alignment Results of Ontology Matchers [Volume 9, Number 1]
:: Perception-aware frameworks. An In-Depth Comparative Analysis of Fake News Detection Approaches in Social Media: Methodologies, Challenges, and Future Directions [Volume 17, Number 3]
:: Performance Evaluation. Spectrum Similarity-Based Quality Assessment Metric [Volume 14, Number 4]
:: Performance evaluation DTIS: Destination Traffic Based Input Selection Strategy Based on Traffic Pattern for Network-on-Chip Systems [Volume 11, Number 3]
:: Performance-based metrics Impact of Empowering Communication Technology Practices on Service Performance in Information Technology Sector [Volume 10, Number 2]
:: Persian Automatic Synset Extraction from text documents using a Graph-Based Clustering Approach [Volume 11, Number 1]
:: Persian Language Statistical Machine Translation (SMT) for Highly-Inflectional Scarce-Resource Language [Volume 5, Number 1]
:: Persian language Persian Wordnet Construction using Supervised Learning [Volume 9, Number 2]
:: Persian language Humor Detection in Persian: A Transformers-Based Approach [Volume 15, Number 1]
:: Persian language Identifying Persian bots on Twitter; which feature is more important: Account Information or Tweet Contents? [Volume 15, Number 1]
:: Personality Enhancement of educational games based on personality type indicators [Volume 9, Number 3]
:: Personalization An Architecture for a Mobile Recommender System in Tourism [Volume 8, Number 2]
:: Power Control Sequential Interference-Aware Admission Control in Underlay Cognitive Radio Networks [Volume 2, Number 4]
:: Power consumption. A Power Saving Anti-Collision Algorithm with Tags Clustering and BIBD Method in RFID Systems [Volume 0, Number 0]
:: Pre-Emphasized Noise Reduction 8 kbps Speech Coding using KLMS Prediction, Look-Ahead Adaptive Quantization and Pre-Emphasized Noise Reduction [Volume 7, Number 3]
:: Precision Adaptive Combinational Web Ranking Algorithm Using Coarse-grained and Fine-grained Features [Volume 1, Number 4]
:: Privacy An Overview of Secure Communications for the Internet of Things [Volume 16, Number 2]
:: Probability density function. Clustering Large-Scale Data using an Incremental Heap Self-Organizing Map [Volume 14, Number 2]
:: Public Key Cryptography A Hybrid DOS-Tolerant PKC-Based Key Management System for WSNs [Volume 10, Number 3]
:: Public Key Infrastructure A Framework to Create a Certificate for e-Commerce Secure Transaction Protocol [Volume 9, Number 1]
:: QoS A Cross Layer Method for Efficient Video Delivery Based on TPGF Routing in WMSN [Volume 6, Number 1]
:: Quality of service QoS-aware web service composition using Gray Wolf Optimizer [Volume 9, Number 1]
:: RBF network Decision Feedback Channel Estimation for Alamouti Coded OFDM Systems [Volume 4, Number 3]
:: RDF Converting and Completing RDF Based Ontology into Fuzzy Ontology Using Neural Tensor Network [Volume 11, Number 1]
:: Random Matrix Theory An Improved Blind Spectrum Sensing Technique for Cognitive Radio Systems [Volume 3, Number 4]
:: Rate based control A Reliable Transport Protocol for Wireless Sensor Networks [Volume 1, Number 3]
:: Rate based control Priority Based Congestion Control and Partial Reliability Guaranty Protocol for Wireless Multimedia Sensor Networks [Volume 3, Number 4]
:: Recommender systems A New Recommender System based on Cooperative Co-evolution Algorithm [Volume 1, Number 1]
:: Relation Assessment Conflict Resolution in Data Integration Using the Relationship Between Entities [Volume 11, Number 2]
:: Remote Sensing Fast GLCM and Gabor Filters for Texture Classification of Very High Resolution Remote Sensing Images [Volume 7, Number 3]
:: Rescorla-Wagner The Emotional Promulgation of Social Norms in Social Networks Based on Structural Properties [Volume 10, Number 4]
:: Router placement A Novel Adaptive Router Placement Scheme in Hybrid Wireless Optical Access Network [Volume 8, Number 1]
:: SMV An Agent-Mediated Knowledge Management System in Call Centers Using SMV and TROPOS [Volume 1, Number 1]
:: SOAP Scaling Up Performance of Web Services by Pre-Serialization Response Analysis [Volume 2, Number 2]
:: SQL Slammer Simulating Benchmark Datasets for Worm Propagation Studies [Volume 12, Number 1]
:: Scheduling Algorithms A Survey on Task Scheduling Algorithms in Cloud Computing for Fast Big Data Processing [Volume 13, Number 4]
:: Search-based algorithm Software Re-Modularization Method Based on Many-Objective Function [Volume 16, Number 1]
:: Second Surveillance Radar (SSR) Design and Implementation of An Aperture Coupled Microstrip IFF Antenna [Volume 1, Number 2]
:: Second­ Price Auction Peris: A Novel Dynamic Bandwidth Allocation (DBA) Method with Second-Price Auction in Next Generation Military Networks Based on EPON Technology [Volume 2, Number 2]
:: Security Ontological Modeling of Radio Frequency Identification(RFID)Attacks [Volume 4, Number 2]
:: Security Domain Ontology to Distinguish Different Types of Rootkits [Volume 9, Number 3]
:: Security. Security Enhancement in Open-Source Healthcare Developer Network using Graph Theory [Volume 13, Number 3]
:: Security. Intrusion Detection System to Detect Insider Attack on RPL Routing Protocol Based on Destination Advertisement Object [Volume 13, Number 2]
:: Selection combining Throughput Improvement of Cooperative System Using Adaptive Relaying & Adaptive Modulation [Volume 3, Number 4]
:: Sensitiviy Analysis Sensitivity Analysis of Shielded Coupled Interconnects for RFIC Applications [Volume 3, Number 4]
:: Sensor-Cloud infrastructur. Cloud-Based Large-Scale Sensor Networks: Motivation, Taxonomies, and Open Challenges [Volume 9, Number 4]
:: Separable convolutional Facial Expression Recognition Based on Separable Convolution Network and Attention Mechanism [Volume 15, Number 4]
:: Sequencing An Intelligent Method for Customizable Adaptive Learning Content Generation [Volume 3, Number 1]
:: Service A Ranking Framework for Designing a Portal Based on Healthcare Solutions The Case of Cardiovascular Disease [Volume 8, Number 3]
:: Similarity measure An Image Annotation Method Based on CM Similarity Measure and Hybrid Relevance Feedback [Volume 3, Number 4]
:: Sliding Window Fuzzy Sequential Pattern Mining over Quantitative Streams [Volume 11, Number 1]
:: Smart Home A Model for Selecting the Best Organizational Paradigm at Run Time for Self-Organizing Multi-Agent Systems; an IoT Case Study [Volume 11, Number 4]
:: Smoothing methods Quality Improvement of Information Retrieval System Results by Document Classification [Volume 5, Number 3]
:: Social Media Corpus A Graph-based Approach for Persian Entity Linking [Volume 12, Number 4]
:: Social Media Sentiment Analysis An Improvement in Transformer-Based Sentiment Analysis in Persian Twitter [Volume 16, Number 3]
:: Social Networks. Development and Improvement of Network Reduction Algorithms for Multilayer Networks [Volume 11, Number 4]
:: Social learning model. An Inferential Naivety Model for Agents’ Learning in Social Networks [Volume 13, Number 3]
:: Soft Combination A Low-Complexity Cyclostationary-Based Detection Method for Cooperative Spectrum Sensing in Cognitive Radio Networks [Volume 3, Number 3]
:: Soft maximum A Weighted Soft-Max PNLMS Algorithm for Sparse System Identification [Volume 8, Number 3]
:: Sorting policies Network Planning Policies for Joint Switching in Spectrally-Spatially Flexible Optical Networks [Volume 17, Number 4]
:: Sorting policies. Network Planning Policies for Joint Switching in Spectrally-Spatially Flexible Optical Networks [Volume 10, Number 4]
:: Sparse learningPPDM. Unsupervised Feature Selection Based on Low Dimensional Embedding and Subspace Learning [Volume 12, Number 3]
:: Stackelberg Game An Opportunistic Cooperative Approach for Dynamic Spectrum Leasing in Cognitive Radio Networks [Volume 6, Number 1]
:: Strength Pareto Evolutionary Algorithm2 (SPEA2) A Pareto-based Optimizer for Workflow Scheduling in Cloud Computing Environment [Volume 8, Number 1]
:: Sub-Channel Assignment. Resource Management for a Multi-Channel Cognitive-NOMA D2D Network [Volume 14, Number 4]
:: Substrate Integrated Waveguide (SIW). Employing Machine Learning Approach in Cavity Resonator Sensors for Characterization of Lossy Dielectrics [Volume 13, Number 3]
:: Superposition coding Superposition Network Coding for Wireless Cooperative Communication [Volume 5, Number 2]
:: Supervised Learning Artificial Immune Classifier (aiCLS): An Immune Inspired Supervised Machine Learning Method [Volume 4, Number 4]
:: System Architecture Network Slicing on 3GPP 5G System Architecture; An End to End Approach [Volume 15, Number 4]
:: Systematic literature review How Open Source Software Succeeds? A Review of Research on Success of Open Source Software [Volume 6, Number 2]
:: TDMA Increase the Life of the Wireless Sensor Network by using an Energy-Sensitive Threshold Cross-layer Model [Volume 17, Number 3]
:: TLBO Hub location Allocation Problem in Computer Networks Using Intelligent Optimization Algorithms [Volume 9, Number 4]
:: TS Beamforming Design for Simultaneous Transmission and Reflection Reconfigurable Intelligent Surface Assisted Secure Wireless Communication by considering Imperfect CSI [Volume 17, Number 2]
:: Technology Service A Hybrid Method for Measuring Service Supply Chain Performance Management in IT Service Providers [Volume 12, Number 3]
:: Test Bed E-business Integrated Test Framework Model [Volume 4, Number 2]
:: Text and video features Intelligent Content-based Categorization of Web pages Using Combination of Textual, Structural, and Visual Features [Volume 1, Number 4]
:: Texture A Fuzzy Approach for Measuring Features Reliabilities in Particle Filtering Framework [Volume 1, Number 4]
:: Threat Hunting. Ransomware Modeling Based on a Process Mining Approach [Volume 14, Number 3]
:: Time Domain Reflectometry. Material Characterization Innovations in Microwave Measurement Laboratory of Amirkabir University of Technology [Volume 15, Number 3]
:: Time modulated array A New Look at the Coding in Time-Modulated Arrays [Volume 13, Number 4]
:: Tourism Content-Based Image Retrieval for Tourism Application Using Handheld Devices [Volume 4, Number 1]
:: Training Approach. Deep Learning Based on Parallel CNNs for Pedestrian Detection [Volume 10, Number 4]
:: Translation Resource Combination Learning to Exploit Different Translation Resources for Cross Language Information Retrieval [Volume 6, Number 1]
:: Translation obfuscation Multi-type Obfuscation Corpus for CrossLingual Plagiarism Detection [Volume 17, Number 2]
:: Transmission Probability Multi-Objective P- Epidemic Forwarding Method in Heterogeneous DTNs Using NSGA-II [Volume 11, Number 3]
:: Tree Adjoining Grammar Using Synchronous TAG for Source-Side Reordering in SMT [Volume 5, Number 4]
:: Tree learner Speech Acts Classification of Persian Language Texts Using Three Machine Leaming Methods [Volume 2, Number 1]
:: Trust value Evaluating the Effect of Learner’s Knowledge, Background, and Attention’s on Trust Using Open Learner Model [Volume 5, Number 1]
:: Trustworthy Measure Analysis and Evaluation of the Performance of Smart Wearable Systems Based on Internet of Things in the Healthcare Sector [Volume 17, Number 3]
:: Twitter Identify the Subject and Content of Tweets on Twitter Using Multilayer Neural Network Method and Random Graphs [Volume 15, Number 1]
:: USO Technology Roadmapping Framework: Case study of USO services in Iran [Volume 8, Number 4]
:: Ultra-wideband (UWB) antennas Novel Approach to Ultra-Wideband Antenna Design [Volume 1, Number 2]
:: Variational Bayesian Expectation-Maximization (VB-EM) algorithm. Enhanced Iterative Detection of Hierarchically Modulated Signals using VB-EM Algorithm [Volume 10, Number 1]
:: Video streaming An Incentive Mechanism to Mitigate the Free-riding in VoD Streaming over Hybrid CDN-P2P Networks [Volume 10, Number 1]
:: Watterson Channel. QAM and PSK Modulation Performance Analysis over Narrow Band HF Channel [Volume 0, Number 0]
:: Weakest Precondition Predicate Transformer ON THE CORRECTNESS OF A TRANSLATION MAP BETWEEN SPECIFICATIONS IN Z AND SETL2 PROTOTYPE [Volume 1, Number 2]
:: Web Application Deep Reinforcement Learning-based Exploration of Web Applications [Volume 16, Number 2]
:: Web Service Discovery Fuzzy Clustering for Semantic Web Services Discovery based on Ontology [Volume 2, Number 3]
:: Web-based educational systems Data Mining in the E-Learning Systems: A Virtual University Case Study [Volume 4, Number 2]
:: WiFi. Convolutional Neural Network Based Human Activity Recognition using CSI [Volume 15, Number 2]
:: Wireless Sensor Networks Analysis the Effects of Internet of Things Technology in Managing Supply Chain [Volume 8, Number 3]
:: Wireless backhaul Characterization of Wireless Mesh Backhaul Networks with MIMO Systems [Volume 1, Number 3]
:: Wireless broadcast advantage Online Multicast Routing in Multi-Channel Multi-Radio Wireless Mesh Networks using Network Coding [Volume 0, Number 0]
:: Wireless sensor network. Energy Efficient Multi-Clustering Using Grey Wolf Optimizer in Wireless Sensor Network [Volume 14, Number 1]
:: WordNet Pruning Concept Map to Geneate Ontology [Volume 9, Number 1]
:: World Wide Web IECA: Intelligent Effective Crawling Algorithm for Web Pages [Volume 4, Number 4]
:: agent The Impact of Structural Position on Opinion Leadership in Social Network [Volume 8, Number 4]
:: agent-based greedy algorithm A Dynamic Resource Allocation Method for Virtual Datacenter Resources Using CoCo-VM Approach [Volume 5, Number 3]
:: analytical model From Reliable Distributed System Toward Reliable Cloud by Cat Swarm Optimization [Volume 5, Number 4]
:: and Network function virtualization. A Conceptual Framework and Architectural Considerations for Capability Enhancement in Software Defined Networks [Volume 10, Number 2]
:: attention.on ChatParse: A New Application for Persian Bourse Chatbot [Volume 15, Number 2]
:: author profiling Stance Detection Dataset for Persian Tweets [Volume 14, Number 4]
:: automatic annotation An Automatic Image Annotation Technique Based on Coverage Ratio of Tags [Volume 4, Number 4]
:: banking. A Novel Method for Measuring Banking Data Analysis Maturity Level: A Case Study [Volume 17, Number 1]
:: bit error rate Joint Antenna Selection and Adaptive Modulation in MIMO Systems in the Presence of CSI Imperfection [Volume 3, Number 3]
:: calibration of RF Design and Implementation of a TEM Cell with Piecewise Linear Tapering [Volume 9, Number 3]
:: cellular learning automata A novel approach for learning improvement in interactive classroom environments using learning automata [Volume 9, Number 3]
:: challenges and Solutions Publishing Persian Linked Data; Challenges and Lessons Learned [Volume 2, Number 3]
:: circular polarization and array antenna. Two Ports SIW Array Antenna with Circular Polarization for 5G Base Station [Volume 11, Number 2]
:: classification The combination of machine learning methods for intrusion detection system in the Internet of Things (IoT) [Volume 16, Number 4]
:: classification Practical Detection of Click Spams Using Efficient Classification-Based Algorithms [Volume 10, Number 2]
:: clustering A Cluster-Based Similarity Fusion Approach for Scaling-Up Collaborative Filtering Recommender System [Volume 6, Number 2]
:: clustering A Clustering Based Feature Selection Approach to Detect Spam in Social Networks [Volume 7, Number 4]
:: co-occurrence matrix Blind Color Image Steganalysis Based on Multi-Transform Combined Features Selected by a Hybrid of ANOVA and BPSO [Volume 2, Number 4]
:: codebook Speaker-Dependent Speech Enhancement Using Codebook-based Synthesis for Low SNR Applications [Volume 5, Number 2]
:: cognitive radio Deep Out-of-Band Radiation Reduction By Using Joint Filterbank and Cancellation Carriers in Cognitive Radios [Volume 5, Number 2]
:: color segmentation Text Localization, Extraction and Inpainting in Color Images using Combined Structural and Textural Features [Volume 7, Number 2]
:: color sensing Color Sensing AR-Based Approach for Supporting Vocabulary Learning in Children [Volume 12, Number 2]
:: comparison A Framework for Evaluation of SQL Injection Detection and Prevention Tools [Volume 5, Number 3]
:: competition ParsiAzma Challenges on Persian Text Analysis in Social Media [Volume 16, Number 3]
:: competitive neural text categorizer Document Classification Using Novel Competitive Neural Text Classifier [Volume 2, Number 4]
:: concatenation QC-LDPC Codes Construction by Concatenating of Circulant Matrices as Block-Columns [Volume 8, Number 2]
:: concept map assessment Expert Finding System in E-Learning: Using Concept Maps [Volume 3, Number 1]
:: consumer complaining behavior A Mutual Independent Cascade Model for Customer Behavior Propagation [Volume 5, Number 3]
:: convergence Design of a Cellular Sugarscape Environment to Increase the Learning Speed in a Stochastic Multi-agent Network [Volume 3, Number 4]
:: correlation Modified Wavelet-domain Adaptive Filtering Scheme for Stereophonic Acoustic Echo Cancellation in the Teleconferencing Application [Volume 1, Number 1]
:: cotent-based features Analyzing Content-based Heuristics for Persian Web Spam Detection [Volume 6, Number 3]
:: customer behavior A Stochastic Approach for Valuing Customers [Volume 9, Number 3]
:: customer lifetime value (CLV) Customer Clustering Based on Customer Lifetime Value: A Case Study of an Iranian Bank [Volume 7, Number 2]
:: data fusion Customizing Feature Decision Fusion Model using Information Gain, Chi-Square and Ordered Weighted Averaging for Text Classification [Volume 3, Number 2]
:: data mining. Large-Scale Twitter Mining for Extracting the Psychological Impacts of COVID-19 [Volume 14, Number 2]
:: dataset The Effect of Data Augmentation Techniques on Persian Stance Detection [Volume 15, Number 1]
:: datasets Skin Classification for Adult Image Recognition Based on Combination of Gaussian and Weight-KNN [Volume 10, Number 2]
:: decision makers Critical Success factors for implementing PACS Technology in Iran's Hospitals [Volume 9, Number 2]
:: deep neural network Image Retrieval with Missing Regions by Reconstructing and Concatenating Content and Semantic Features [Volume 16, Number 2]
:: desease diagnosis. The Eficient Alignment of Long DNA Sequences Using Divide and Conquer Approach [Volume 14, Number 3]
:: detector Design and Calibration of E-Field Probe for Multi Cellular Technology Frequency Bands (2G, 3G,4G) [Volume 15, Number 4]
:: diffusion Non-stationary Sparse System Identification over Adaptive Sensor Networks with Diffusion and Incremental Strategies [Volume 8, Number 4]
:: digital humanities. Thematic Similarity Multiple-Choice Question Answering with Doc2Vec: A Step Toward Metaphorical Language Processing [Volume 12, Number 2]
:: direct lightpath Energy Efficient Design Strategies of Translucent and Transparent IP Over WDM Networks [Volume 7, Number 1]
:: disclosure risk TrPLS: Preserving Privacy in Trajectory Data Publishing by Personalized Local Suppression [Volume 6, Number 2]
:: distortion model Using Dependency Tree Grammar to Enhance the Reordering Model of Statistical Machine Translation Systems [Volume 6, Number 4]
:: distributed learning algorithm. Sensing Radius Adjustment in Wireless Sensor Networks: A Game Theoretical Approach [Volume 11, Number 4]
:: dynamic programming A MinMax Routing Algorithm for Long Life Route Selection in MANETs [Volume 7, Number 4]
:: e-commerce A New Hybrid Collaborative Recommender Using Semantic Web Technology and Demographic data [Volume 8, Number 2]
:: e-learning readiness framework A Framework for Learner Preparation and Support in Academic E-learning Environment [Volume 3, Number 1]
:: effective rate. The Effective Rate of MISO Systems over EGK Fading Channels [Volume 13, Number 1]
:: electronic voting system A New Blind Signature Scheme Based on Improved ElGamal Signature Scheme [Volume 5, Number 1]
:: electronic voting system A New Electronic Cash Protocol Using a Modified ElGamal and an Untraceable Signature Scheme [Volume 8, Number 2]
:: energy efficiency. Spectral and Energy Efficiency WirelessPowered Massive-MIMO Heterogeneous Network [Volume 14, Number 1]
:: energy efficiency. Toward a Versatile IoT Communication Infrastructure [Volume 14, Number 1]
:: environmental influencing factors.rs A New Framework Based on The Internet of Things to Improve the Quality of Education by Detection of Student Stress [Volume 15, Number 3]
:: extractive summarization Extractive Text Summarization in Persian Language through Integrative Approaches [Volume 17, Number 1]
:: false alarm JNAM: a new detector proposed for marine radars [Volume 7, Number 3]
:: false positive rate (FPR). Selfish Node Detection Based on GA and Learning Automata in IoT [Volume 15, Number 1]
:: fault discovering and emplacement OSDTM: an Offline-Structural Distributed Test Mechanism for Data Links in NoC [Volume 10, Number 4]
:: finance and banking Credit Scoring Using Colonial Competitive Rule-based Classifier [Volume 3, Number 2]
:: flooding algorithms A Novel Scheme for Fault-Tolerant And Higher Capacity Network on Chip [Volume 2, Number 1]
:: frame FUCA: a Frame to Prevent the Generation of Useless results in the Dataflows Based on Cartesian Product for Convolutional Neural Network Accelerators [Volume 16, Number 4]
:: frequency selective channel Cooperative Filter-and-Forward Beamforming in Cognitive Radio Relay Networks [Volume 5, Number 2]
:: frequency selective fading channel A Hammerstein Diversity Combining Technique [Volume 2, Number 1]
:: frequency-selective fading channel A Novel DS-CDMA Direction of Arrival Estimator for Frequency- Selective Fading Channel with Correlated Multipath by Using Beamforming Filter [Volume 3, Number 3]
:: full-duplex communication Securing RIS-aided Wireless Networks Against Full Duplex Active Eavesdropping [Volume 17, Number 1]
:: generative models A Probabilistic Topic Model based on an Arbitrary-Length Co-occurrence Window [Volume 9, Number 2]
:: genetic algorithm. Optimizing LSTM Networks with Genetic and Q-Learning Algorithms for Persian COVID-19 Fake News Detection [Volume 17, Number 2]
:: gravitational search algorithm Connection Optimization of a Neural Emotion Classifier Using Hybrid Gravitational Search Algorithms [Volume 7, Number 1]
:: group's characteristics A Graph-Based Content Similarity Approach for User Recommendation in Telegram [Volume 13, Number 3]
:: guided filter. PolSAR Classification Using Contextual Based Locality Preserving Projection and Guided Filtering [Volume 13, Number 2]
:: half mode substrate integrated waveguide (HMSIW) Design Investigation of a Modified HMSIW Leaky Wave Antenna [Volume 6, Number 3]
:: hard threshold Noise Reduction from Speech Signal based on Wavelet Transform and Kullback-Leibler Divergence [Volume 1, Number 1]
:: histogram A Novel 3D Object Categorization and Retrieval System Using Geometric Features [Volume 4, Number 1]
:: hosting services for software development. Structural Analysis of GitLab's Users and Projects Networks [Volume 12, Number 2]
:: hybrid antennas Multiband Hybrid Loop/Monopole Slot/Planar Monopole Antenna for Mobile Phone Application [Volume 2, Number 1]
:: hyperspectral data Spectral-Spatial Feature Transformations With Controlling Contextual Information Through Smoothing Filtering and Morphological Analysis [Volume 10, Number 1]
:: influential nodes A Community-Based Method for Identifying Influential Nodes Using Network Embedding [Volume 14, Number 1]
:: influential users A New Framework for Discovering Important Posts and Influential Users in Social Networks [Volume 11, Number 4]
:: information society measures Taxonomy of Information Society Measures [Volume 3, Number 4]
:: informtion recovery Design and Implementation of a Language Specific Crawler to Improve Crawling of Persian Web Documents [Volume 1, Number 4]
:: intersymbol interference (ISI) Capacity Region of the Compound Multiple Access Channels with Common Message and in the Presence of Intersymbol Interference [Volume 6, Number 2]
:: kernel level attack An Attack-Defense Model for the Binder on the Android Kernel Level [Volume 9, Number 2]
:: keyphrase ranking Keyphrase Ranking Based on Second Order Co-Occurrence Analysis [Volume 7, Number 4]
:: language model Content-Based Approach for Trfcking Concept Drift in Email Spam Filtering [Volume 2, Number 3]
:: least significant beats (LSB) steganography. Optimum Group Pixel Matching Strategies for Image Steganography [Volume 13, Number 4]
:: levy-flight firefly algorithm A Multilevel Thresholding Approach Based on L´evy-Flight Firefly Algorithm for Image Segmentation [Volume 4, Number 1]
:: link prediction Recommending Friends in Social Networks By Users' Profiles And Using Classification Algorithms [Volume 10, Number 1]
:: mathematical method A New Mathematical Method to Estimate Resources for E-commerce Application [Volume 2, Number 3]
:: mean shift Efficient Object Tracking Using Optimized K-means Segmentation and Radial Basis Function Neural Networks [Volume 4, Number 1]
:: millimeter-wave Design of a 4×8 Substrate Integrated Waveguide Butler Matrix with Sidelobe Suppression at 60 GHz [Volume 13, Number 1]
:: morphological analyzers Corpus-Based Analysis for Multi-Token Units in Persian [Volume 1, Number 3]
:: multi agent system A Scalable Algorithm to Solve Distributed Constraint Optimization [Volume 6, Number 2]
:: multi-layer perceptron Using Hybrid of Eigenface and Imperialist Competition Algorithm for Feature Selection in Face Recognition [Volume 7, Number 3]
:: multi-sensor Compressive Sensing in IoT-Based Multi-Sensor Wireless Sensor Networks [Volume 11, Number 3]
:: multimodal features A Semi-Supervised Method for Multimodal Classification of Consumer Videos [Volume 5, Number 1]
:: multiple classifier systems Optimized Regression in Sensor Networks by Integration of Harmony Search and Particle Swarm Optimization [Volume 4, Number 2]
:: mutual information The First Persian Context Sensitive Spell Checker [Volume 2, Number 2]
:: network vulnerability analysis A Taxonomy for Network Vulnerabilities [Volume 2, Number 1]
:: noise classification NMF-based Improvement of DNN and LSTM Pre-Training for Speech Enhancemet [Volume 15, Number 3]
:: non-linear dimension extraction Improvement of Supervised Shape Retrieval by Learning the Manifold Space [Volume 4, Number 1]
:: ontology Abstract A Semantic Domain-Specific Framework to Assist Researchers in Screening Contents [Volume 6, Number 1]
:: optical ultra wideband code division Combined Coding and Spread Spectrum Modulatin in Wideband Code Division Multiple Access Communication Systems [Volume 1, Number 2]
:: optimization algorithm Improved Mapping Algorithms Performance in NoCs Design Based on Cellular Learning Automata [Volume 6, Number 1]
:: optimum-path forest A Security Mechanism for Detecting Intrusions in Internet of Things Using Selected Features Based on MI-BGSA [Volume 9, Number 2]
:: overhead Overhead Reduction In Delay Tolerant Networks [Volume 7, Number 1]
:: patch Dynamic Risk Assessment System for the Vulnerability Scoring [Volume 9, Number 4]
:: performance ARTEMIS: A Simulator Tool for Heterogeneous Network-on-Chip [Volume 9, Number 2]
:: personality Personality-Based Matrix Factorization for Personalization in Recommender Systems [Volume 14, Number 1]
:: point process A Stochastic Geometry Analysis of Hybrid Cellular-Adhoc CDMA Networks [Volume 3, Number 3]
:: population-based Fuzzy Neural Network Automatic Test Case Generation for Modern Web Applications Using Population-Based Automatic Fuzzy Neural Network [Volume 6, Number 2]
:: power allocation User Capacity Scaling Laws for Fading Broadcast Channels Affected by Channel Estimation [Volume 5, Number 4]
:: power allocation. Energy Efficiency of Massive MIMO Cognitive Radio Networks in Presence of Smart Jamming [Volume 11, Number 3]
:: power distribution automation Adaptive Autonomy Expert System in Smart Grid based on Deterministic Timed Petri Nets [Volume 2, Number 3]
:: principal component analysis(PCA) A Novel Density based Clustering Method using Nearest and Farthest Neighbor with PCA [Volume 9, Number 2]
:: priorities of tasks. LABTS: a Learning Automata-Based Task Scheduling algorithm in cloud computing [Volume 11, Number 2]
:: probability distribution image A Visual Tracking Algorithm Based on CAMShift and Motion Segmentation [Volume 4, Number 3]
:: prosody Hybrid of Evolutionary and Swarm Intelligence Algorithms for Prosody Modeling in Natural Speech Synthesis [Volume 8, Number 2]
:: quasi-structured pruning (QSP). CNN Accelerator Adapted to Quasi Structured Pruning and Dense Mode [Volume 17, Number 3]
:: query refinement Improving the Performance of Proposed Multi-Agent Domain Specific Search Engine Using Query Refinement Component [Volume 2, Number 4]
:: ratio mask Binaural Speech Separation Using Binary and Ratio Time-Frequency Masks [Volume 6, Number 3]
:: recommender system Addressing the New User Cold-Start Problem in Recommender Systems Using Ordered Weighted Averaging Operator [Volume 2, Number 4]
:: recommender systems Towards Faster Performance of PROMETHEE II in a Lower Class of Complexity [Volume 2, Number 4]
:: rectangular waveguide. Mathematical Formulation and Experimental Evaluation of Efficient 8-Way Microwave Radial Power Combiner for High Power Applications [Volume 15, Number 4]
:: relay and jammer selection On Maximizing the Secrecy Rate in a Cooperative Wireless Network using Friendly Jammers [Volume 8, Number 3]
:: representative-based clustering Mining Dynamic Communities based on a Novel Link-Clustering Algorithm [Volume 9, Number 1]
:: research ability improvement An Ontology-based Framework for Organizing Research Support Contents inE-Learning Environment [Volume 3, Number 1]
:: resonant detector Numerical Full wave Analysis and Modeling of Plasmonic HEMT Performance Using Hydrodynamic Model [Volume 11, Number 1]
:: respiration. Performance Assessment of a Microwave Life-Detection System (MLDS): Modified Quadrature Receiver Versus a Harmonic Radar Architecture [Volume 12, Number 1]
:: scheduling Optimum Routing and Scheduling in Wireless Nerworks [Volume 1, Number 2]
:: search algorithm A Survey of Advanced Search Techniques in Unstructured P2P Networks [Volume 6, Number 1]
:: search-based software testing Comparative Analytical Survey on SBST Challenges from the Perspective of the Test Techniques [Volume 14, Number 2]
:: secrecy Transmitted Data Security in Non-Orthogonal Multiple Access Networks with Directional Modulation Based on User Location [Volume 15, Number 2]
:: security architecture Security Framework of IoT-Based Smart Home [Volume 12, Number 1]
:: semi Markov decision process (SMDP) A Sub-Optimal Policy for Connection Admission Control Mechanism in Cognitive Radio Sensor Networks [Volume 9, Number 1]
:: semi-distributed model Optimization and Fully Distributed Analysis of Single Pole Single Throw Traveling Wave Switchesat Millimeter Wave Frequency Band [Volume 3, Number 2]
:: sentiment analysis A Deep Learning Approach for Sarcasm Detection on Twitter [Volume 16, Number 3]
:: sequence pattern Investigating Students' Temporal Behaviors and Evaluation of Faculty through Educational Data Mining [Volume 3, Number 1]
:: sequential pattern EMOSS: An Efficient Algorithm to Hide Sequential Patterns [Volume 7, Number 4]
:: set-membership The Unified Approach to Set-Membership and Selective Partial Update Adaptive Filtering Algorithms [Volume 2, Number 2]
:: sharing method Context Aware Mental Model Sharing in Dynamic Inaccessible Environments [Volume 4, Number 4]
:: side information A New Method for SLM-Based OFDM Systems without Side Information [Volume 7, Number 2]
:: signal-to-distortion ratio VQ-based Approach to Single-Channel Audio Separation for Music and Speech Mixtures [Volume 2, Number 1]
:: sink node Providing a Solution to Reduce Energy Consumption in IoT-Based WSNs Based on Node Activity Management [Volume 14, Number 4]
:: spectral efficiency. Optimal Power Allocation Strategy for a D2D Network based Safety-Critical V2X Communication with Partial CSI [Volume 16, Number 2]
:: spherical antennas Analysis Method for Spherical Dipole Antenna Array [Volume 5, Number 2]
:: stochastic geometry Dimensioning of 5G Networks by Using Stochastic Geometry [Volume 13, Number 2]
:: streching An Automatic Contrast Enhancement Technique Using Combination of Histogram-Based Methods [Volume 4, Number 1]
:: structural information DSMN: A New Approach for Link Prediction in Multilplex Networks [Volume 14, Number 3]
:: subspace augmentation (SA) Subspace-Based Approaches for Hybrid Millimeter-Wave Channel Estimation [Volume 9, Number 4]
:: sum rate Spatial Interference Alignment in Relay-Assisted Multi-Cell Multi-User Networks [Volume 8, Number 4]
:: summary GSSC: Graph Summarization based on both Structure and Concepts [Volume 9, Number 1]
:: surveillance systems A Novel Descriptor for Pedestrian Detection in Video Sequences [Volume 2, Number 2]
:: task offloading Resource Allocation optimization in fog Architecture Based Software-Defined Networks [Volume 15, Number 4]
:: technology acceptance model A Hybrid Model for Evaluation of E-Learning User Satisfaction with TAM and ELQ Approach [Volume 16, Number 2]
:: time series A Timelier Credit Card Fraud Detection by Mining Transaction Time Series [Volume 2, Number 3]
:: time series Classification of Exchange Rate Prediction Methods with a Focus on Deep Learning Techniques [Volume 17, Number 2]
:: time-based hybrid weight An Improved Recommender System Based on Forgetting Mechanism for User Interest-Drifting [Volume 4, Number 4]
:: traffic scene Learning Motion Patterns in Traffic Scenes by Improved Group Sparse Topical Coding [Volume 8, Number 2]
:: transmitter optimization Joint Power Adaptation and Interference Avoidance for Unlicensed Wireless Systems: A Game Theoretic Approach [Volume 3, Number 3]
:: transverse magnetic (TM) mode Compact, Tunable and Narrowband Waveguide Filters Using TM Dual-Mode Cavities for Satellite Communication Applications [Volume 12, Number 3]
:: trust manager agent (TMA) A Computational Trust Model for E-Commerce Systems: Concepts, Definitions and Evaluation Method [Volume 7, Number 2]
:: tutorial-like system Quality Improvement of Interactive Tutorial-Like Systems by Use of Cellular Learning Automata [Volume 6, Number 4]
:: uncertainty The Effect of Information Sharing on the Assessment of Supply Chain Performance in Uncertain Conditions [Volume 10, Number 2]
:: unused messages Improving the Quality of Service in the VANET by Detecting and Removing Unused Messages [Volume 4, Number 3]
:: urban channel characterization A Study of the Effect of Diffraction and Rough Surface Scattering Modeling on Ray Tracing Results in an Urban Environment at 60 GHz [Volume 3, Number 2]
:: virtual reality language 3D Triangular Mesh Digital Watermarking based on Median and Indices [Volume 1, Number 1]
:: visible light communication On Error and Bitrate Tradeoff in Visible Light Communication System to ensure HEVC Video Quality [Volume 8, Number 4]
:: vowel sounds A Robust Voice Activity Detection Based on Short Time Features of Audio Frames and Spectral Pattern of Vowel Sounds [Volume 2, Number 2]
:: water distribution grid. Anomaly Detection in Non-Stationary Water Distribution Grids Using Fog Computing Architecture [Volume 13, Number 3]
:: web page ranking Web Page Streams and Relevance Propagation for Topic Distillation [Volume 6, Number 1]
:: weight of links A Routing Method in Smart Cities Based on Destination Type and Network Traffic Flow [Volume 16, Number 2]
:: weighted networks Discovering Influencers for Spreading in Weighted Networks [Volume 7, Number 3]
:: wireless communication network Optimum Indoor Signal Coverage of Dense Distributed Receivers via Ray Tracing Coupled with Genetic Algorithm [Volume 5, Number 2]
:: wireless sensor networks Energy Based Clustering Self Organizing Map Protocol For Wireless Sensor Networks [Volume 7, Number 1]
:: zero crossing DPLL Performance Analysis of Zero Crossing DPLL with Linearized Phase Detector [Volume 1, Number 3]