 |
5G
A 3D Time-Variant Non-Stationary Hybrid Channel Model for Massive MIMO Systems [Volume 11, Number 2] |
 |
5G.
Power-Efficient Resource Allocation in Massive MIMO Aided Cloud RANs [Volume 10, Number 3] |
 |
5G.
Three-Step Optimization Algorithm in SCMA-based System for User Association and Resource Allocation in C-RAN [Volume 12, Number 2] |
 |
ABX Test
Wavelet-based Robust Voice conversion systems [Volume 1, Number 1] |
 |
ARAP
Forgery Attack is a Piece of Cake on a Class of Mutual Authentication Protocols [Volume 4, Number 3] |
 |
Affine Projection Algorithms
A New Fractional Adaptive Filtering Method and its Application in Speech Enhancement [Volume 7, Number 2] |
 |
Ambient Intelligence (AmI)
Energy-Efficient Human Activity Recognition on Smartphones: A Test-Cost Sensitive Approach [Volume 10, Number 3] |
 |
Artificial Neural Networks (ANN)
Analysing Probabilistic Support Vector Machine Based Localization In Wireless Sensor Networks [Volume 3, Number 2] |
 |
Artificial intelligence
A Review on Internet Traffic Classification Based on Artificial Intelligence Techniques [Volume 14, Number 2] |
 |
Attention mechanism
mproving the Performance of Text Sentiment Analysis using Deep Convolutional Neural Network Integrated with Hierarchical Attention Layer [Volume 11, Number 3] |
 |
Authentication
Using Blockchain to Improve the Security Of The X3DH Key Exchange Protocol [Volume 15, Number 3] |
 |
Authentication.
Improving the Security of Management Software of Smart Meters Networks [Volume 15, Number 4] |
 |
BPEL process
VE Architect-Driven Service-Oriented Business Network Process Realization [Volume 2, Number 4] |
 |
Band-pass microwave filter
Compact Band-Pass and Band-Reject Microwave Filters Using Partial H-Plane Waveguide and Dielectric Layers [Volume 6, Number 4] |
 |
Behavior
Masquerade Detection Using GUI Events in Windows Systems [Volume 3, Number 2] |
 |
Big data
Web Domains Ranking with Real User Traffic Based on the Big Data Platform [Volume 12, Number 1] |
 |
Bilingual dictionary
Evaluating Fidelity of Persian-English Sentence-Aligned Parallel Corpus [Volume 5, Number 3] |
 |
Blogosphere
Trend Detection and Prediction in Blogosphere based on Sentiment Analysis using PSO and Q-Learning [Volume 12, Number 1] |
 |
Bloom filter
Providing a Secure Protocol in Smart Metering Networks Based on the Internet of Things [Volume 11, Number 4] |
 |
Business Strategies
A Multi-Aspect Architecture with Co-alignment between Layers for Intra-Organizational Knowledge Networking Purposes [Volume 2, Number 3] |
 |
CNN.
Hyperspectral Image Super Resolution Using Anomaly Weighted Gabor Based CNN [Volume 15, Number 2] |
 |
CPN Tools
Cyber Attack Simulation for Operational Security Evaluation Using Coloured Petri Nets [Volume 4, Number 3] |
 |
CUDA
Accelarated Optical Character Recognition on Graphics Processing Units [Volume 5, Number 3] |
 |
Cell Division Technique.
Energy Efficient Power Allocation in MIMO-NOMA Systems with ZF Precoding Using Cell Division Technique [Volume 14, Number 3] |
 |
Chaotic Tent map
Image Encryption Using Tent Chaotic Map and Arnold Cat Map [Volume 4, Number 3] |
 |
Classification model
Investigating Sentiment Analysis of News in Stock Market Prediction Utilizing Machine Learning Technique [Volume 16, Number 3] |
 |
Cluster Head Selection
Non-Homogeneous Cluster Head Selection for Energy-Aware Hierarchical Routing Protocols in Wireless Sensor Networks [Volume 5, Number 1] |
 |
Collaborative filtering
A Multi-Dimensional Recommendation Framework for Learning Material by Naive Bayes Classifier [Volume 4, Number 3] |
 |
Communication cost
HHMap: A Novel Task Mapping for Heterogeneous & Homogeneous 3D NoCs with the Objective of Improving Energy Consumption [Volume 17, Number 1] |
 |
Compact compensator
Adaptive Methods for Joint Compensation of Power Amplifier Nonlinearity and Quadrature Modulator IQ Imbalance [Volume 1, Number 4] |
 |
Computational security
Efficient Verifiable Dynamic Threshold Secret Sharing Scheme Based on Elliptic Curves [Volume 7, Number 4] |
 |
Computer linguistics
Designing and Developing a Wordnet for Persian Nouns Pages [Volume 1, Number 3] |
 |
Conceptual model.
Digital Transformation Research: Identifying The Elements Influencing Digital Transformation at the National Level [Volume 16, Number 4] |
 |
Consumed Bandwidth Reduction.
Real-Timeness Improvement of CAN-based Industrial Networks Based on Criticality Level [Volume 13, Number 4] |
 |
Convolutional
Enhancement of Illumination scheme for Adult Image Recognition [Volume 9, Number 4] |
 |
Core Decomposition
On the Reselection of Seed Nodes in Independent Cascade Based Influence Maximization [Volume 10, Number 4] |
 |
Critical infrastructure.
A Novel Framework for Cyber Situational Awareness at the National Level [Volume 17, Number 1] |
 |
Cumulative Return
Adaptive Portfolio Optimization with Multi-Agent Deep Reinforcement Learning and Short-Term Performance Analysis [Volume 17, Number 3] |
 |
Cybersecurity
Defending Against Adversarial Attacks in Artificial Intelligence Technologies [Volume 17, Number 2] |
 |
D-FDTD
Design and Fabrication of an Optical Nanofilter based on Surface Plasmons [Volume 1, Number 2] |
 |
DMDS.
Collaborative Mappers based on Co-evolutionary Optimization Technique in MapReduce [Volume 14, Number 4] |
 |
DMTC-EBSC
DMTC-EBSC: A Novel Decision Making Technique in Cloud Environment Based on Extended BSC [Volume 7, Number 4] |
 |
Data Stream.
Hybrid of Active Learning and Dynamic Self-Training for Data Stream Classification [Volume 9, Number 4] |
 |
Data mining
Improving the Performance of E-Learning Systems Using Extracted Web Server Log File Suggestions [Volume 3, Number 1] |
 |
Density Based KNN
Density-Based K-Nearest Neighbor Active Learning for Improving Farsi-English Statistical Machine Translation System [Volume 7, Number 3] |
 |
Detection Accurate (DA).
ISOT: Distributed Selfish Node Detection in Internet of Things [Volume 10, Number 3] |
 |
Discrete Entropy
Digital Image Enhancement Through Bi-Histogram Equalization Using Entropy-Based Plateau Limit [Volume 14, Number 4] |
 |
Distributed intrusion detection.
Implementation of Intrusion Detection Systems in order to Detect Phishing in the Banking Industry [Volume 12, Number 2] |
 |
Double Auction model
Continuous Double Auction Scheduling in Federated Cloud Services [Volume 11, Number 1] |
 |
Double Shell Façade
Investigating the Sustainability of Energy Production and Consumption in Data Centers with the Design and Morphology Approach of the Building [Volume 12, Number 4] |
 |
Dynamic Interests
A New Adaptive Hybrid Recommender Framework for Learning Material Recommendation [Volume 5, Number 3] |
 |
Dynamic resource allocation
DDoS Traffic Modeling, Identification and Attack Mitigation to Cloud Hosted servers by Drift plus Penalty methods [Volume 8, Number 2] |
 |
EDF algorithm
Increasing the Total Efficiently Executed Work on Volunteer Computing Environment Based on Work Send Policy [Volume 5, Number 4] |
 |
EPC Class-1 Generation-2 standards
Analysis of an RFID Authentication Protocol in Accordance with EPC Standards [Volume 6, Number 4] |
 |
EPC Companies.
Implementing Process Mining Techniques to Analyze Performance in EPC Companies [Volume 14, Number 2] |
 |
Electromagnetic field simulation
An Improved Active Mixer Architecture for Millimeter Wave Applications [Volume 3, Number 2] |
 |
Encoder-decoder
Automatic License Plate Recognition using the Deep Learning Networks [Volume 17, Number 1] |
 |
Energy efficiency
Computing Energy Efficiency for a Cognitive Heterogeneous Satellite Network Based on Interference Management [Volume 12, Number 3] |
 |
Energy efficiency
A Dynamic Hybrid Precoding Structure for mmWave Massive MIMO Systems [Volume 16, Number 1] |
 |
Ensemble Isolation Forest
Auto-Encoder LSTM Methods for Anomaly-Based Web Application Firewallall [Volume 11, Number 3] |
 |
Entropy
A Novel Blind Spectrum Sensing Algorithm for Cognitive Radio Systems Based on Algorithmic Information Theory [Volume 3, Number 3] |
 |
Equal-gain combining
On the Distribution of the Sum of Independent Random Variables and Its Application [Volume 1, Number 1] |
 |
Error concealment
A Novel Still Image Error Concealment Using Fragile Watermarking in Wireless Image , Transmission and Packet-Switched Networks [Volume 1, Number 3] |
 |
Ethereum
Architectures for a Blockchain-based Decentralized Marketplace for Handicrafts [Volume 17, Number 2] |
 |
Evolutionary Computation
An Efficient Application Deployment in Fog [Volume 15, Number 3] |
 |
Evolutionary Methods
Learners Grouping in E-Learning Environment Using Evolutionary Fuzzy Clustering Approach [Volume 3, Number 1] |
 |
Evolutionary Optimization
An Optimized Deep Model for Bi-lingual Sentiment Analysis of Medical User Reviews [Volume 16, Number 1] |
 |
Evolutionary algorithm
Joint Use of RSA and Genetic Algorithm to Improve the Process of Image Encryption and Information Hiding [Volume 16, Number 4] |
 |
Expanding Population
PSO-based Scheduling Algorithm for Time and Cost Optimization in Mobile Grid [Volume 0, Number 0] |
 |
Expanding Population
PSO-Based Scheduling Algorithm for Time and Cost Optimization in Mobile Grid [Volume 10, Number 3] |
 |
FDR.
FDR Adjustment for Achieving Desired Minimum Distance of Marine ESIM from the Shore [Volume 14, Number 3] |
 |
Face Recognition
A New Fuzzy Convolutional Neural Network for Face Recognition to Classify Authorized and Unauthorized Persons [Volume 15, Number 1] |
 |
Fairness
A Fairness-Guaranteed Game-Theoretic Perspective in Multi-User Interference Channel [Volume 9, Number 4] |
 |
Farsi document
HWS: A Hierarchical Word Spotting Method for Farsi Printed Words Through Word Shape Coding [Volume 7, Number 2] |
 |
Feature Extraction
JPEG Compressed Domain Face Recognition:Different Stages and Different Features [Volume 4, Number 4] |
 |
Feature Selection
Intrusion Detection System Using SVM as Classifier and GA for Optimizing Feature Vectors [Volume 10, Number 1] |
 |
Feature extraction
Content-based Image Retrieval for Carpet
E-commerce Application
[Volume 13, Number 1] |
 |
Fertility
Phrase Alignments in Parallel Corpus Using Bootstrapping Approach [Volume 6, Number 3] |
 |
Framework.
A Framework for ICT-Oriented Sustainable Development through Mapping from ICT Concerns onto Sustainability Indicators [Volume 10, Number 4] |
 |
Fuzzy Inference Systems
A New Approach to Compute a Realistic Credibility Rank for Reviewers Using Fuzzy Inference [Volume 7, Number 1] |
 |
Fuzzy Logic
A Novel Protocol for Routing in Vehicular Ad hoc Network Based on Model-Based Reinforcement Learning and Fuzzy Logic [Volume 12, Number 4] |
 |
Fuzzy Logic.
A Framework for Optimal Fault Tolerance Protocol Selection Using Fuzzy Logic on
IoT Sensor Layer [Volume 10, Number 2] |
 |
Fuzzy logic
An Overload Window Control Method Based on Fuzzy Logic to Improve SIP Performance [Volume 6, Number 4] |
 |
GERAM
A Virtual Research Management Enterprise Architecture Using Axiomatic Design [Volume 6, Number 3] |
 |
GIS
A Model Based on Cellular Learning Automata for Improving the Intelligent Assistant Agents & Its Application in Earthquake Crisis Management [Volume 7, Number 1] |
 |
GPRLM
Performance Improvement of Language Identification Using Transcription Based Sequential Approaches & Sequential Kernels Based SVM [Volume 4, Number 2] |
 |
Generalized Bayesian estimator
Bayesian-Based Cooperative Framework for Spectrum Sensing in Cognitive Radio Networks [Volume 3, Number 3] |
 |
Generative Adversarial Network
Inverse Design of a Wide-Angle Wideband Programmable THz Reflectarray Through Generative Adversarial Networks [Volume 17, Number 3] |
 |
Genetic Algorithm
A Novel Method to Equalize Frequency-Selective MIMO Channels Using Genetic Algorithm and Singular Value Decomposition of Polynomial Matrice [Volume 1, Number 2] |
 |
Genetic Algorithm
A Two-Dimensional Maximum Likelihood Parameter Estimation of Г-Г Distribution for Free Space Optical Channels with Weak Turbulence Conditions [Volume 5, Number 4] |
 |
Genetic Algorithms
A New GA Approach Based on Pareto Ranking Strategy for Privacy Preserving of Association Rule Mining [Volume 2, Number 2] |
 |
Genetic Algorithms.
Cost Reduction Using SLA-Aware Genetic Algorithm for Consolidation of Virtual Machines in Cloud Data Centers [Volume 14, Number 2] |
 |
Graph
Persian to English Personal Name Transliteration Based On the Persian Web Contents [Volume 5, Number 1] |
 |
Graph Theory
Multi-Objective Response to Co-Resident Attacks in Cloud Environment [Volume 9, Number 3] |
 |
Grounded theory.
A Smart Contract Model in Knowledge-based Companies Based on Grounded Theory by Focusing on the Robotic Process Automation and Process Management Strategies [Volume 13, Number 2] |
 |
High gain
Gain and Bandwidth Enhancement of Slot Antenna Using Two Unprinted Dielectric Superstrate [Volume 8, Number 3] |
 |
Homogeneity.
Improving Image Dynamic Range For An Adaptive Quality Enhancement Using Gamma Correction [Volume 0, Number 0] |
 |
Hop Count
Decreasing the Average Delay, Connectivity, and Routing Load in Clustered Mobile Ad- Hoc Networks [Volume 10, Number 1] |
 |
Hybrid Spectrum
A Novel Strategy-Proof Auction Mechanism for Hybrid Spectrum Allocation [Volume 6, Number 2] |
 |
IRISL
An ERP Framework Based on Service Oriented Architecture and Cloud Computing Environment
Case: IRISL Container Department [Volume 10, Number 3] |
 |
Impcat Assessment
Impact Assessment for Cyber Security Situation Awareness [Volume 15, Number 3] |
 |
Integer programming
Optimum Selection of Modes Set for Adaptive Modulation and Coding based on Imperfect Channel State Information [Volume 8, Number 4] |
 |
Integral contour
Low Cost Millimeter Wave Duplexer Design Using Mixed Mode Matching and Integral Contour Methods [Volume 3, Number 2] |
 |
Integration
Introduce an Enhanced Hospital Information System Reference Architecture with ATAM Evaluation [Volume 16, Number 1] |
 |
Integration of integration
A Framework for Technology Foresight Based on Ontology Integration of the Most Famous Foresight Models [Volume 1, Number 4] |
 |
Intelligent Tutoring System
E-Learners’ Activity Categorization Based on Their Learning Styles Using ART Family Neural Network [Volume 4, Number 2] |
 |
Intersection
cMaxDriver: A Centrality Maximization Intersection Approach for Prediction of Cancer-Causing Genes in the Transcriptional Regulatory Network [Volume 14, Number 1] |
 |
Intrusion Prevention
An Attack Graph Based Method for Predictive Risk Evaluation of Zero-Day Attacks [Volume 9, Number 3] |
 |
IoT
Energy Efficient Distributed Anomaly Detection using Semi-Supervised Models in IoT [Volume 16, Number 1] |
 |
Job scheduling
Resource Reservation in Grid Networks based on Irregular Cellular Learning Automata [Volume 7, Number 3] |
 |
Joint sparsity
Massive MIMO Slow-varying Channel Estimation Using Tensor Sparsity [Volume 13, Number 1] |
 |
K-means clustering
A Proactive Context-Aware Self-Healing Scheme for 5G Using Machine Learning [Volume 10, Number 4] |
 |
LSTM
A Comparative Study of BERT-X for Sentiment Analysis and Stance Detection in Persian Social Media [Volume 16, Number 3] |
 |
Large Language Model (LLM)
EmoRecBiGRU: Emotion Recognition in Persian Tweets with a Transformer-based Model, Enhanced by Bidirectional GRU [Volume 16, Number 3] |
 |
Large-Scale Graph processing
A Review of the Distributed Methods for Large-Scale Social Network Analysis [Volume 6, Number 3] |
 |
Learner Modeling
Knowledge Evaluation Based on Learner Assessment and Utilizing Fuzzy System to Increase the Accuracy of Evaluation [Volume 3, Number 1] |
 |
Learning automata
Rule Scheduling in Active Database using Learning Automata [Volume 1, Number 4] |
 |
Learning with Errors (LWE)
Reducing The Computational Complexity of Fuzzy Identity-Based Encryption from Lattice [Volume 16, Number 1] |
 |
Linguistic Features
Recognizing Personality Traits using Twitter & Facebook for Arabic Speaking Users in Lebanon [Volume 15, Number 1] |
 |
Link-state routing
A Backup Routing Scheme for Mobile Ad-Hoc Networks [Volume 1, Number 3] |
 |
Linked Open Data
A metric Suite for Systematic Quality Assessment of Linked Open Data [Volume 8, Number 3] |
 |
Load Balancing
EDBPM: An Event-Driven Business Process Monitoring Mechanism [Volume 10, Number 2] |
 |
Local Binary Pattern(LBP)
Face Verification Using Local Binary Patterns and Sparse Representation Techniques [Volume 5, Number 4] |
 |
Longest Matching Prefix
Route Lookup Algorithms Using the Novel Idea of Coded Prefix Trees [Volume 4, Number 4] |
 |
Low Power.
A Partial Method for Calculating CNN Networks Based On Loop Tiling [Volume 15, Number 2] |
 |
Low-recourse Languages
Improving Persian Named Entity Recognition Through Multi Task Learning [Volume 13, Number 2] |
 |
MAC
A Mobility Based Cooperative MAC Protocol for Wireless Networks [Volume 5, Number 1] |
 |
MEMS
All Optical Logic Gates: A Tutorial [Volume 4, Number 3] |
 |
Manifold
Sparse, Robust and Discriminative Representation by Supervised Regularized Auto-encoder [Volume 11, Number 2] |
 |
Markov Clustering Algorithm (MCL)
A Novel Trust Evaluation Model Using Graph Clustering Approach [Volume 8, Number 1] |
 |
Markov chain
Proposing a New Algorithm for Predicting Short-Term and Long-Term Trust-ability in Cloud Computing [Volume 11, Number 2] |
 |
Maximum Achievable Capacity.
Transmit Power Optimization in Optical Coherent Transmission Systems: Analytical, Simulation, and Experimental Results [Volume 11, Number 1] |
 |
Maximum Likelihood
A Maximum Likehood Frequency Offset Estimation with Improved Range ad Performance in OFDM Systems [Volume 2, Number 1] |
 |
Meta-Path.
A Multilayered Complex Network Model for Image Retrieval [Volume 13, Number 4] |
 |
Meta-path
Ensemble Link Predictor for Heterogeneous Complex Networks [Volume 8, Number 1] |
 |
Metaheuristic.
IR-WCO2C: An Enhanced Multi Operators-Based Approach for Content-Aware Image Retargeting [Volume 12, Number 4] |
 |
Metaphoricity
Impact of Topic Modeling on Rule-Based Persian Metaphor Classification and its Frequency Estimation [Volume 7, Number 2] |
 |
Multi Label Classification
Claim Detection in Persian Twitter Posts [Volume 16, Number 3] |
 |
Multi-agent systems
A Distributed Optimization Approach for Multi-Agent Systems over Delaying Networks [Volume 13, Number 4] |
 |
Multi-classification
Persian Rumor Detection Using a MultiClassifier Fusion Approach [Volume 16, Number 4] |
 |
Multiple Access Channel
Classical -Quantum Multiple Access Channel with Secrecy Constraint: One-shot Rate Region [Volume 12, Number 2] |
 |
Mutual Information
A Method for Anomaly Detection in Big Data based on Support Vector Machine [Volume 11, Number 3] |
 |
NGN and IMS Security
Detecting Flood-based Attacks against SIP Proxy Servers and Clients using Engineered Feature Sets [Volume 8, Number 1] |
 |
Network lifetime
Optimized Task Scheduling for Estimation in Wireless Sensor Networks [Volume 5, Number 2] |
 |
OWA
Fake News Detection Based on Social Features by Ordered Weighted Averaging Fusion [Volume 12, Number 4] |
 |
Ontology
Predicting Network Attacks Using Ontology-Driven Inference [Volume 4, Number 2] |
 |
Ontology.
Improving Content-Based Recommender System For Clustering Documents Based on Ontology And New Hierarchical Clustering Method [Volume 14, Number 3] |
 |
Open Learner Model formatting
A Method to Improve Accuracy of Learner Model based on Knowledge and Belief of Learner [Volume 7, Number 1] |
 |
OpenFlow
SDTE: Software Defined Traffic Engineering for Improving Data Center Network Utilization [Volume 8, Number 1] |
 |
Optimal Partitioning
A Priority-based Fast Optimal Computation Offloading Planner for Mobile Cloud Computing [Volume 8, Number 1] |
 |
Optimization
New Phase Realization Approach for Implementation of Braodband Reflectarrays [Volume 13, Number 1] |
 |
Optimization
Efficient Policy-Aware Deployment of Business Process in Cloud Federation [Volume 10, Number 3] |
 |
Organizational Interoperability Framework
A New Framework for Enterprise Interoperability Based on Meta- synthesis Approach through Combination of Current Frameworks [Volume 1, Number 4] |
 |
Overlap community
Creating a Maximal Clique Graph to Improve Community Detection in SCoDA and OSLOM Algorithms [Volume 11, Number 4] |
 |
Overlap.
Arabic Handwritten Recognition Using Hybrid CNN, HMM and an Intelligent Network Based on Dentate Gyrus of the Brain [Volume 15, Number 2] |
 |
P-robustness
A P-Robust Stochastic DEA Model for Enterprise Architecture Scenario Selection [Volume 6, Number 4] |
 |
PPDM.
Classification and Evaluation of Privacy Preserving Data Mining Methods [Volume 12, Number 3] |
 |
PSL
Static Persian Sign Language Recognition Using Kernel-Based Feature Extraction [Volume 4, Number 1] |
 |
PSO
Preference Based PSO for Utility Optimization in Broadband Digital Economy [Volume 8, Number 4] |
 |
PSO
Hiding Fuzzy Sequential Patterns by a Multi-Objective Scheme [Volume 8, Number 3] |
 |
PSO Algorithm
Detection of E-commerce Attacks and Anomalies using Adaptive Neuro-Fuzzy Inference System and Firefly Optimization Algorithm [Volume 13, Number 1] |
 |
Packet Lost Evaluation
A New Method for Evaluating Video Quality of Experience on Content-Aware Packet Loss Effect Analysis [Volume 5, Number 4] |
 |
Parallel genetic algorithm
An Improved Parallel Genetic Algorithm for Optimal Sensor Placement of Wireless Sensor Networks [Volume 6, Number 3] |
 |
Particle Swarm Optimization (PSO)
Swarm intelligence grouping of e-learners using fuzzy inspired PSO method [Volume 6, Number 4] |
 |
Pattern detection
Inconsistency Repair to Improve the Alignment Results of Ontology Matchers [Volume 9, Number 1] |
 |
Perception-aware frameworks.
An In-Depth Comparative Analysis of Fake News Detection Approaches in Social Media: Methodologies, Challenges, and Future Directions [Volume 17, Number 3] |
 |
Performance Evaluation.
Spectrum Similarity-Based Quality Assessment Metric [Volume 14, Number 4] |
 |
Performance evaluation
DTIS: Destination Traffic Based Input Selection Strategy Based on Traffic Pattern for Network-on-Chip Systems [Volume 11, Number 3] |
 |
Performance-based metrics
Impact of Empowering Communication Technology Practices on Service Performance in Information Technology Sector [Volume 10, Number 2] |
 |
Persian
Automatic Synset Extraction from text documents using a Graph-Based Clustering Approach [Volume 11, Number 1] |
 |
Persian Language
Statistical Machine Translation (SMT) for Highly-Inflectional Scarce-Resource Language [Volume 5, Number 1] |
 |
Persian language
Persian Wordnet Construction using Supervised Learning [Volume 9, Number 2] |
 |
Persian language
Humor Detection in Persian: A Transformers-Based Approach [Volume 15, Number 1] |
 |
Persian language
Identifying Persian bots on Twitter; which feature is more important: Account Information or Tweet Contents? [Volume 15, Number 1] |
 |
Personality
Enhancement of educational games based on personality type indicators [Volume 9, Number 3] |
 |
Personalization
An Architecture for a Mobile Recommender System in Tourism [Volume 8, Number 2] |
 |
Power Control
Sequential Interference-Aware Admission Control in Underlay Cognitive Radio Networks [Volume 2, Number 4] |
 |
Power consumption.
A Power Saving Anti-Collision Algorithm with Tags Clustering and BIBD Method in RFID Systems [Volume 0, Number 0] |
 |
Pre-Emphasized Noise Reduction
8 kbps Speech Coding using KLMS Prediction, Look-Ahead Adaptive Quantization and Pre-Emphasized Noise Reduction [Volume 7, Number 3] |
 |
Precision
Adaptive Combinational Web Ranking Algorithm Using Coarse-grained and Fine-grained Features [Volume 1, Number 4] |
 |
Privacy
An Overview of Secure Communications for the Internet of Things [Volume 16, Number 2] |
 |
Probability density function.
Clustering Large-Scale Data using an Incremental Heap Self-Organizing Map [Volume 14, Number 2] |
 |
Public Key Cryptography
A Hybrid DOS-Tolerant PKC-Based Key Management System for WSNs [Volume 10, Number 3] |
 |
Public Key Infrastructure
A Framework to Create a Certificate for e-Commerce Secure Transaction Protocol [Volume 9, Number 1] |
 |
QoS
A Cross Layer Method for Efficient Video Delivery Based on TPGF Routing in WMSN [Volume 6, Number 1] |
 |
Quality of service
QoS-aware web service composition using Gray Wolf Optimizer [Volume 9, Number 1] |
 |
RBF network
Decision Feedback Channel Estimation for Alamouti Coded OFDM Systems [Volume 4, Number 3] |
 |
RDF
Converting and Completing RDF Based Ontology into Fuzzy Ontology Using Neural Tensor Network [Volume 11, Number 1] |
 |
Random Matrix Theory
An Improved Blind Spectrum Sensing Technique for Cognitive Radio Systems [Volume 3, Number 4] |
 |
Rate based control
A Reliable Transport Protocol for Wireless Sensor Networks [Volume 1, Number 3] |
 |
Rate based control
Priority Based Congestion Control and Partial Reliability Guaranty Protocol for Wireless Multimedia Sensor Networks [Volume 3, Number 4] |
 |
Recommender systems
A New Recommender System based on Cooperative Co-evolution Algorithm [Volume 1, Number 1] |
 |
Relation Assessment
Conflict Resolution in Data Integration Using the Relationship Between Entities [Volume 11, Number 2] |
 |
Remote Sensing
Fast GLCM and Gabor Filters for Texture Classification of Very High Resolution Remote Sensing Images [Volume 7, Number 3] |
 |
Rescorla-Wagner
The Emotional Promulgation of Social Norms in Social Networks Based on Structural Properties [Volume 10, Number 4] |
 |
Router placement
A Novel Adaptive Router Placement Scheme in Hybrid Wireless Optical Access Network [Volume 8, Number 1] |
 |
SMV
An Agent-Mediated Knowledge Management System in Call Centers Using SMV and TROPOS [Volume 1, Number 1] |
 |
SOAP
Scaling Up Performance of Web Services by Pre-Serialization Response Analysis [Volume 2, Number 2] |
 |
SQL Slammer
Simulating Benchmark Datasets for Worm Propagation Studies [Volume 12, Number 1] |
 |
Scheduling Algorithms
A Survey on Task Scheduling Algorithms in Cloud Computing for Fast Big Data Processing [Volume 13, Number 4] |
 |
Search-based algorithm
Software Re-Modularization Method Based on Many-Objective Function [Volume 16, Number 1] |
 |
Second Surveillance Radar (SSR)
Design and Implementation of An Aperture Coupled Microstrip IFF Antenna [Volume 1, Number 2] |
 |
Second Price Auction
Peris: A Novel Dynamic Bandwidth Allocation (DBA) Method with Second-Price Auction in Next Generation Military Networks Based on EPON Technology [Volume 2, Number 2] |
 |
Security
Ontological Modeling of Radio Frequency Identification(RFID)Attacks [Volume 4, Number 2] |
 |
Security
Domain Ontology to Distinguish Different Types of Rootkits [Volume 9, Number 3] |
 |
Security.
Security Enhancement in Open-Source Healthcare Developer Network using Graph Theory [Volume 13, Number 3] |
 |
Security.
Intrusion Detection System to Detect Insider Attack on RPL Routing Protocol Based on Destination Advertisement Object [Volume 13, Number 2] |
 |
Selection combining
Throughput Improvement of Cooperative System Using Adaptive Relaying & Adaptive Modulation [Volume 3, Number 4] |
 |
Sensitiviy Analysis
Sensitivity Analysis of Shielded Coupled Interconnects for RFIC Applications [Volume 3, Number 4] |
 |
Sensor-Cloud infrastructur.
Cloud-Based Large-Scale Sensor Networks: Motivation, Taxonomies, and Open Challenges [Volume 9, Number 4] |
 |
Separable convolutional
Facial Expression Recognition Based on Separable Convolution Network and Attention Mechanism [Volume 15, Number 4] |
 |
Sequencing
An Intelligent Method for Customizable Adaptive Learning Content Generation [Volume 3, Number 1] |
 |
Service
A Ranking Framework for Designing a Portal Based on Healthcare Solutions The Case of Cardiovascular Disease [Volume 8, Number 3] |
 |
Similarity measure
An Image Annotation Method Based on CM Similarity Measure and Hybrid Relevance Feedback [Volume 3, Number 4] |
 |
Sliding Window
Fuzzy Sequential Pattern Mining over Quantitative Streams [Volume 11, Number 1] |
 |
Smart Home
A Model for Selecting the Best Organizational Paradigm at Run Time for Self-Organizing Multi-Agent Systems; an IoT Case Study [Volume 11, Number 4] |
 |
Smoothing methods
Quality Improvement of Information Retrieval System Results by Document Classification [Volume 5, Number 3] |
 |
Social Media Corpus
A Graph-based Approach for Persian Entity Linking [Volume 12, Number 4] |
 |
Social Media Sentiment Analysis
An Improvement in Transformer-Based Sentiment Analysis in Persian Twitter [Volume 16, Number 3] |
 |
Social Networks.
Development and Improvement of Network Reduction Algorithms for Multilayer Networks [Volume 11, Number 4] |
 |
Social learning model.
An Inferential Naivety Model for Agents’ Learning in Social Networks [Volume 13, Number 3] |
 |
Soft Combination
A Low-Complexity Cyclostationary-Based Detection Method for Cooperative Spectrum Sensing in Cognitive Radio Networks [Volume 3, Number 3] |
 |
Soft maximum
A Weighted Soft-Max PNLMS Algorithm for Sparse System Identification [Volume 8, Number 3] |
 |
Sorting policies
Network Planning Policies for Joint Switching in Spectrally-Spatially Flexible Optical Networks [Volume 17, Number 4] |
 |
Sorting policies.
Network Planning Policies for Joint Switching in Spectrally-Spatially Flexible Optical Networks [Volume 10, Number 4] |
 |
Sparse learningPPDM.
Unsupervised Feature Selection Based on Low Dimensional Embedding and Subspace Learning [Volume 12, Number 3] |
 |
Stackelberg Game
An Opportunistic Cooperative Approach for Dynamic Spectrum Leasing in Cognitive Radio Networks [Volume 6, Number 1] |
 |
Strength Pareto Evolutionary Algorithm2 (SPEA2)
A Pareto-based Optimizer for Workflow Scheduling in Cloud Computing Environment [Volume 8, Number 1] |
 |
Sub-Channel Assignment.
Resource Management for a Multi-Channel Cognitive-NOMA D2D Network [Volume 14, Number 4] |
 |
Substrate Integrated Waveguide (SIW).
Employing Machine Learning Approach in Cavity Resonator Sensors for Characterization of Lossy Dielectrics [Volume 13, Number 3] |
 |
Superposition coding
Superposition Network Coding for Wireless Cooperative Communication [Volume 5, Number 2] |
 |
Supervised Learning
Artificial Immune Classifier (aiCLS): An Immune Inspired Supervised Machine Learning Method [Volume 4, Number 4] |
 |
System Architecture
Network Slicing on 3GPP 5G System Architecture; An End to End Approach [Volume 15, Number 4] |
 |
Systematic literature review
How Open Source Software Succeeds? A Review of Research on Success of Open Source Software [Volume 6, Number 2] |
 |
TDMA
Increase the Life of the Wireless Sensor Network by using an Energy-Sensitive Threshold Cross-layer Model [Volume 17, Number 3] |
 |
TLBO
Hub location Allocation Problem in Computer Networks Using Intelligent Optimization Algorithms [Volume 9, Number 4] |
 |
TS
Beamforming Design for Simultaneous Transmission and Reflection Reconfigurable Intelligent Surface Assisted Secure Wireless Communication by considering Imperfect CSI [Volume 17, Number 2] |
 |
Technology Service
A Hybrid Method for Measuring Service Supply Chain Performance Management in IT Service Providers [Volume 12, Number 3] |
 |
Test Bed
E-business Integrated Test Framework Model [Volume 4, Number 2] |
 |
Text and video features
Intelligent Content-based Categorization of Web pages Using Combination of Textual, Structural, and Visual Features [Volume 1, Number 4] |
 |
Texture
A Fuzzy Approach for Measuring Features Reliabilities in Particle Filtering Framework [Volume 1, Number 4] |
 |
Threat Hunting.
Ransomware Modeling Based on a Process Mining Approach [Volume 14, Number 3] |
 |
Time Domain Reflectometry.
Material Characterization Innovations in Microwave Measurement Laboratory of Amirkabir University of Technology [Volume 15, Number 3] |
 |
Time modulated array
A New Look at the Coding in Time-Modulated Arrays [Volume 13, Number 4] |
 |
Tourism
Content-Based Image Retrieval for Tourism Application Using Handheld Devices [Volume 4, Number 1] |
 |
Training Approach.
Deep Learning Based on Parallel CNNs for Pedestrian Detection [Volume 10, Number 4] |
 |
Translation Resource Combination
Learning to Exploit Different Translation Resources for Cross Language Information Retrieval [Volume 6, Number 1] |
 |
Translation obfuscation
Multi-type Obfuscation Corpus for CrossLingual Plagiarism Detection [Volume 17, Number 2] |
 |
Transmission Probability
Multi-Objective P- Epidemic Forwarding Method in Heterogeneous DTNs Using NSGA-II [Volume 11, Number 3] |
 |
Tree Adjoining Grammar
Using Synchronous TAG for Source-Side Reordering in SMT [Volume 5, Number 4] |
 |
Tree learner
Speech Acts Classification of Persian Language Texts Using Three Machine Leaming Methods [Volume 2, Number 1] |
 |
Trust value
Evaluating the Effect of Learner’s Knowledge, Background, and Attention’s on Trust Using Open Learner Model [Volume 5, Number 1] |
 |
Trustworthy Measure
Analysis and Evaluation of the Performance of Smart Wearable Systems Based on Internet of Things in the Healthcare Sector [Volume 17, Number 3] |
 |
Twitter
Identify the Subject and Content of Tweets on Twitter Using Multilayer Neural Network Method and Random Graphs [Volume 15, Number 1] |
 |
USO
Technology Roadmapping Framework: Case study of USO services in Iran [Volume 8, Number 4] |
 |
Ultra-wideband (UWB) antennas
Novel Approach to Ultra-Wideband Antenna Design [Volume 1, Number 2] |
 |
Variational Bayesian Expectation-Maximization (VB-EM) algorithm.
Enhanced Iterative Detection of Hierarchically Modulated Signals using VB-EM Algorithm [Volume 10, Number 1] |
 |
Video streaming
An Incentive Mechanism to Mitigate the Free-riding in VoD Streaming over Hybrid CDN-P2P Networks [Volume 10, Number 1] |
 |
Watterson Channel.
QAM and PSK Modulation Performance Analysis over Narrow Band HF Channel [Volume 0, Number 0] |
 |
Weakest Precondition Predicate Transformer
ON THE CORRECTNESS OF A TRANSLATION MAP BETWEEN SPECIFICATIONS IN Z AND SETL2 PROTOTYPE [Volume 1, Number 2] |
 |
Web Application
Deep Reinforcement Learning-based Exploration of Web Applications [Volume 16, Number 2] |
 |
Web Service Discovery
Fuzzy Clustering for Semantic Web Services Discovery based on Ontology [Volume 2, Number 3] |
 |
Web-based educational systems
Data Mining in the E-Learning Systems: A Virtual University Case Study [Volume 4, Number 2] |
 |
WiFi.
Convolutional Neural Network Based Human Activity Recognition using CSI [Volume 15, Number 2] |
 |
Wireless Sensor Networks
Analysis the Effects of Internet of Things Technology in Managing Supply Chain [Volume 8, Number 3] |
 |
Wireless backhaul
Characterization of Wireless Mesh Backhaul Networks with MIMO Systems [Volume 1, Number 3] |
 |
Wireless broadcast advantage
Online Multicast Routing in Multi-Channel Multi-Radio Wireless Mesh Networks using Network Coding [Volume 0, Number 0] |
 |
Wireless sensor network.
Energy Efficient Multi-Clustering Using Grey Wolf Optimizer in Wireless Sensor Network [Volume 14, Number 1] |
 |
WordNet
Pruning Concept Map to Geneate Ontology [Volume 9, Number 1] |
 |
World Wide Web
IECA: Intelligent Effective Crawling Algorithm for Web Pages [Volume 4, Number 4] |
 |
agent
The Impact of Structural Position on Opinion Leadership in Social Network [Volume 8, Number 4] |
 |
agent-based greedy algorithm
A Dynamic Resource Allocation Method for Virtual Datacenter Resources Using CoCo-VM Approach [Volume 5, Number 3] |
 |
analytical model
From Reliable Distributed System Toward Reliable Cloud by Cat Swarm Optimization [Volume 5, Number 4] |
 |
and Network function virtualization.
A Conceptual Framework and Architectural Considerations for Capability Enhancement in Software Defined Networks [Volume 10, Number 2] |
 |
attention.on
ChatParse: A New Application for Persian Bourse Chatbot [Volume 15, Number 2] |
 |
author profiling
Stance Detection Dataset for Persian Tweets [Volume 14, Number 4] |
 |
automatic annotation
An Automatic Image Annotation Technique Based on Coverage Ratio of Tags [Volume 4, Number 4] |
 |
banking.
A Novel Method for Measuring Banking Data Analysis Maturity Level: A Case Study [Volume 17, Number 1] |
 |
bit error rate
Joint Antenna Selection and Adaptive Modulation in MIMO Systems in the Presence of CSI Imperfection [Volume 3, Number 3] |
 |
calibration of RF
Design and Implementation of a TEM Cell with Piecewise Linear Tapering [Volume 9, Number 3] |
 |
cellular learning automata
A novel approach for learning improvement in interactive classroom environments using learning automata [Volume 9, Number 3] |
 |
challenges and Solutions
Publishing Persian Linked Data; Challenges and Lessons Learned [Volume 2, Number 3] |
 |
circular polarization and array antenna.
Two Ports SIW Array Antenna with Circular Polarization for 5G Base Station [Volume 11, Number 2] |
 |
classification
The combination of machine learning methods for intrusion detection system in the Internet of Things (IoT) [Volume 16, Number 4] |
 |
classification
Practical Detection of Click Spams Using Efficient Classification-Based Algorithms [Volume 10, Number 2] |
 |
clustering
A Cluster-Based Similarity Fusion Approach for Scaling-Up Collaborative Filtering Recommender System [Volume 6, Number 2] |
 |
clustering
A Clustering Based Feature Selection Approach to Detect Spam in Social Networks [Volume 7, Number 4] |
 |
co-occurrence matrix
Blind Color Image Steganalysis Based on Multi-Transform Combined Features Selected by a Hybrid of ANOVA and BPSO [Volume 2, Number 4] |
 |
codebook
Speaker-Dependent Speech Enhancement Using Codebook-based Synthesis for Low SNR Applications [Volume 5, Number 2] |
 |
cognitive radio
Deep Out-of-Band Radiation Reduction By Using Joint Filterbank and Cancellation Carriers in Cognitive Radios [Volume 5, Number 2] |
 |
color segmentation
Text Localization, Extraction and Inpainting in Color Images using Combined Structural and Textural Features [Volume 7, Number 2] |
 |
color sensing
Color Sensing AR-Based Approach for Supporting Vocabulary Learning in Children [Volume 12, Number 2] |
 |
comparison
A Framework for Evaluation of SQL Injection Detection and Prevention Tools [Volume 5, Number 3] |
 |
competition
ParsiAzma Challenges on Persian Text Analysis in Social Media [Volume 16, Number 3] |
 |
competitive neural text categorizer
Document Classification Using Novel Competitive Neural Text Classifier [Volume 2, Number 4] |
 |
concatenation
QC-LDPC Codes Construction by Concatenating of Circulant Matrices as Block-Columns [Volume 8, Number 2] |
 |
concept map assessment
Expert Finding System in E-Learning: Using Concept Maps [Volume 3, Number 1] |
 |
consumer complaining behavior
A Mutual Independent Cascade Model for Customer Behavior Propagation [Volume 5, Number 3] |
 |
convergence
Design of a Cellular Sugarscape Environment to Increase the Learning Speed in a Stochastic Multi-agent Network [Volume 3, Number 4] |
 |
correlation
Modified Wavelet-domain Adaptive Filtering Scheme for Stereophonic Acoustic Echo Cancellation in the Teleconferencing Application [Volume 1, Number 1] |
 |
cotent-based features
Analyzing Content-based Heuristics for Persian Web Spam Detection [Volume 6, Number 3] |
 |
customer behavior
A Stochastic Approach for Valuing Customers [Volume 9, Number 3] |
 |
customer lifetime value (CLV)
Customer Clustering Based on Customer Lifetime Value: A Case Study of an Iranian Bank [Volume 7, Number 2] |
 |
data fusion
Customizing Feature Decision Fusion Model using Information Gain, Chi-Square and Ordered Weighted Averaging for Text Classification [Volume 3, Number 2] |
 |
data mining.
Large-Scale Twitter Mining for Extracting the Psychological Impacts of COVID-19 [Volume 14, Number 2] |
 |
dataset
The Effect of Data Augmentation Techniques on Persian Stance Detection [Volume 15, Number 1] |
 |
datasets
Skin Classification for Adult Image Recognition Based on Combination of Gaussian and Weight-KNN [Volume 10, Number 2] |
 |
decision makers
Critical Success factors for implementing PACS Technology in Iran's Hospitals [Volume 9, Number 2] |
 |
deep neural network
Image Retrieval with Missing Regions by Reconstructing and Concatenating Content and Semantic Features [Volume 16, Number 2] |
 |
desease diagnosis.
The Eficient Alignment of Long DNA Sequences Using Divide and Conquer Approach [Volume 14, Number 3] |
 |
detector
Design and Calibration of E-Field Probe for Multi Cellular Technology Frequency Bands (2G, 3G,4G) [Volume 15, Number 4] |
 |
diffusion
Non-stationary Sparse System Identification over Adaptive Sensor Networks with Diffusion and Incremental Strategies [Volume 8, Number 4] |
 |
digital humanities.
Thematic Similarity Multiple-Choice Question Answering with Doc2Vec: A Step Toward Metaphorical Language Processing [Volume 12, Number 2] |
 |
direct lightpath
Energy Efficient Design Strategies of Translucent and Transparent IP Over WDM Networks [Volume 7, Number 1] |
 |
disclosure risk
TrPLS: Preserving Privacy in Trajectory Data Publishing by Personalized Local Suppression [Volume 6, Number 2] |
 |
distortion model
Using Dependency Tree Grammar to Enhance the Reordering Model of Statistical Machine Translation Systems [Volume 6, Number 4] |
 |
distributed learning algorithm.
Sensing Radius Adjustment in Wireless Sensor Networks: A Game Theoretical Approach [Volume 11, Number 4] |
 |
dynamic programming
A MinMax Routing Algorithm for Long Life Route Selection in MANETs [Volume 7, Number 4] |
 |
e-commerce
A New Hybrid Collaborative Recommender Using Semantic Web Technology and Demographic data [Volume 8, Number 2] |
 |
e-learning readiness framework
A Framework for Learner Preparation and Support in Academic E-learning Environment [Volume 3, Number 1] |
 |
effective rate.
The Effective Rate of MISO Systems over EGK Fading Channels [Volume 13, Number 1] |
 |
electronic voting system
A New Blind Signature Scheme Based on Improved ElGamal Signature Scheme [Volume 5, Number 1] |
 |
electronic voting system
A New Electronic Cash Protocol Using a Modified ElGamal and an Untraceable Signature Scheme [Volume 8, Number 2] |
 |
energy efficiency.
Spectral and Energy Efficiency WirelessPowered Massive-MIMO Heterogeneous
Network [Volume 14, Number 1] |
 |
energy efficiency.
Toward a Versatile IoT Communication Infrastructure [Volume 14, Number 1] |
 |
environmental influencing factors.rs
A New Framework Based on The Internet of Things to Improve the Quality of Education by Detection of Student Stress [Volume 15, Number 3] |
 |
extractive summarization
Extractive Text Summarization in Persian Language through Integrative Approaches [Volume 17, Number 1] |
 |
false alarm
JNAM: a new detector proposed for marine radars [Volume 7, Number 3] |
 |
false positive rate (FPR).
Selfish Node Detection Based on GA and Learning Automata in IoT [Volume 15, Number 1] |
 |
fault discovering and emplacement
OSDTM: an Offline-Structural Distributed Test Mechanism for Data Links in NoC [Volume 10, Number 4] |
 |
finance and banking
Credit Scoring Using Colonial Competitive Rule-based Classifier [Volume 3, Number 2] |
 |
flooding algorithms
A Novel Scheme for Fault-Tolerant And Higher Capacity Network on Chip [Volume 2, Number 1] |
 |
frame
FUCA: a Frame to Prevent the Generation of Useless results in the Dataflows Based on Cartesian Product for Convolutional Neural Network Accelerators [Volume 16, Number 4] |
 |
frequency selective channel
Cooperative Filter-and-Forward Beamforming in Cognitive Radio Relay Networks [Volume 5, Number 2] |
 |
frequency selective fading channel
A Hammerstein Diversity Combining Technique [Volume 2, Number 1] |
 |
frequency-selective fading channel
A Novel DS-CDMA Direction of Arrival Estimator for Frequency- Selective Fading Channel with Correlated Multipath by Using Beamforming Filter [Volume 3, Number 3] |
 |
full-duplex communication
Securing RIS-aided Wireless Networks Against Full Duplex Active Eavesdropping [Volume 17, Number 1] |
 |
generative models
A Probabilistic Topic Model based on an Arbitrary-Length Co-occurrence Window [Volume 9, Number 2] |
 |
genetic algorithm.
Optimizing LSTM Networks with Genetic and Q-Learning Algorithms for Persian COVID-19 Fake News Detection [Volume 17, Number 2] |
 |
gravitational search algorithm
Connection Optimization of a Neural Emotion Classifier Using Hybrid Gravitational Search Algorithms [Volume 7, Number 1] |
 |
group's characteristics
A Graph-Based Content Similarity Approach for User Recommendation in Telegram [Volume 13, Number 3] |
 |
guided filter.
PolSAR Classification Using Contextual Based Locality Preserving Projection and Guided Filtering [Volume 13, Number 2] |
 |
half mode substrate integrated waveguide (HMSIW)
Design Investigation of a Modified HMSIW Leaky Wave Antenna [Volume 6, Number 3] |
 |
hard threshold
Noise Reduction from Speech Signal based on Wavelet Transform and Kullback-Leibler Divergence [Volume 1, Number 1] |
 |
histogram
A Novel 3D Object Categorization and Retrieval System Using Geometric Features [Volume 4, Number 1] |
 |
hosting services for software development.
Structural Analysis of GitLab's Users and Projects Networks [Volume 12, Number 2] |
 |
hybrid antennas
Multiband Hybrid Loop/Monopole Slot/Planar Monopole Antenna for Mobile Phone Application [Volume 2, Number 1] |
 |
hyperspectral data
Spectral-Spatial Feature Transformations With Controlling Contextual Information Through Smoothing Filtering and Morphological Analysis [Volume 10, Number 1] |
 |
influential nodes
A Community-Based Method for Identifying Influential Nodes Using Network Embedding [Volume 14, Number 1] |
 |
influential users
A New Framework for Discovering Important Posts and Influential Users in Social Networks [Volume 11, Number 4] |
 |
information society measures
Taxonomy of Information Society Measures [Volume 3, Number 4] |
 |
informtion recovery
Design and Implementation of a Language Specific Crawler to Improve Crawling of Persian Web Documents [Volume 1, Number 4] |
 |
intersymbol interference (ISI)
Capacity Region of the Compound Multiple Access Channels with Common Message and in the Presence of Intersymbol Interference [Volume 6, Number 2] |
 |
kernel level attack
An Attack-Defense Model for the Binder on the Android Kernel Level [Volume 9, Number 2] |
 |
keyphrase ranking
Keyphrase Ranking Based on Second Order Co-Occurrence Analysis [Volume 7, Number 4] |
 |
language model
Content-Based Approach for Trfcking Concept Drift in Email Spam Filtering [Volume 2, Number 3] |
 |
least significant beats (LSB) steganography.
Optimum Group Pixel Matching Strategies for Image Steganography [Volume 13, Number 4] |
 |
levy-flight firefly algorithm
A Multilevel Thresholding Approach Based on L´evy-Flight Firefly Algorithm for Image Segmentation [Volume 4, Number 1] |
 |
link prediction
Recommending Friends in Social Networks By Users' Profiles And Using Classification Algorithms [Volume 10, Number 1] |
 |
mathematical method
A New Mathematical Method to Estimate Resources for E-commerce Application [Volume 2, Number 3] |
 |
mean shift
Efficient Object Tracking Using Optimized K-means Segmentation and Radial Basis Function Neural Networks [Volume 4, Number 1] |
 |
millimeter-wave
Design of a 4×8 Substrate Integrated Waveguide Butler Matrix with Sidelobe Suppression at 60 GHz [Volume 13, Number 1] |
 |
morphological analyzers
Corpus-Based Analysis for Multi-Token Units in Persian [Volume 1, Number 3] |
 |
multi agent system
A Scalable Algorithm to Solve Distributed Constraint Optimization [Volume 6, Number 2] |
 |
multi-layer perceptron
Using Hybrid of Eigenface and Imperialist Competition Algorithm for Feature Selection in Face Recognition [Volume 7, Number 3] |
 |
multi-sensor
Compressive Sensing in IoT-Based Multi-Sensor Wireless Sensor Networks
[Volume 11, Number 3] |
 |
multimodal features
A Semi-Supervised Method for Multimodal Classification of Consumer Videos [Volume 5, Number 1] |
 |
multiple classifier systems
Optimized Regression in Sensor Networks by Integration of Harmony Search and Particle Swarm Optimization [Volume 4, Number 2] |
 |
mutual information
The First Persian Context Sensitive Spell Checker [Volume 2, Number 2] |
 |
network vulnerability analysis
A Taxonomy for Network Vulnerabilities [Volume 2, Number 1] |
 |
noise classification
NMF-based Improvement of DNN and LSTM Pre-Training for Speech Enhancemet [Volume 15, Number 3] |
 |
non-linear dimension extraction
Improvement of Supervised Shape Retrieval by Learning the Manifold Space [Volume 4, Number 1] |
 |
ontology
Abstract
A Semantic Domain-Specific Framework to Assist Researchers in Screening Contents [Volume 6, Number 1] |
 |
optical ultra wideband code division
Combined Coding and Spread Spectrum Modulatin in Wideband Code Division Multiple Access Communication Systems [Volume 1, Number 2] |
 |
optimization algorithm
Improved Mapping Algorithms Performance in NoCs Design Based on Cellular Learning Automata [Volume 6, Number 1] |
 |
optimum-path forest
A Security Mechanism for Detecting Intrusions in Internet of Things Using Selected Features Based on MI-BGSA [Volume 9, Number 2] |
 |
overhead
Overhead Reduction In Delay Tolerant Networks [Volume 7, Number 1] |
 |
patch
Dynamic Risk Assessment System for the Vulnerability Scoring [Volume 9, Number 4] |
 |
performance
ARTEMIS: A Simulator Tool for Heterogeneous Network-on-Chip [Volume 9, Number 2] |
 |
personality
Personality-Based Matrix Factorization for Personalization in Recommender Systems [Volume 14, Number 1] |
 |
point process
A Stochastic Geometry Analysis of Hybrid Cellular-Adhoc CDMA Networks [Volume 3, Number 3] |
 |
population-based Fuzzy Neural Network
Automatic Test Case Generation for Modern Web Applications Using Population-Based Automatic Fuzzy Neural Network [Volume 6, Number 2] |
 |
power allocation
User Capacity Scaling Laws for Fading Broadcast Channels Affected by Channel Estimation [Volume 5, Number 4] |
 |
power allocation.
Energy Efficiency of Massive MIMO Cognitive Radio Networks in Presence of Smart Jamming [Volume 11, Number 3] |
 |
power distribution automation
Adaptive Autonomy Expert System in Smart Grid based on Deterministic Timed Petri Nets [Volume 2, Number 3] |
 |
principal component analysis(PCA)
A Novel Density based Clustering Method using Nearest and Farthest Neighbor with PCA [Volume 9, Number 2] |
 |
priorities of tasks.
LABTS: a Learning Automata-Based Task Scheduling algorithm in cloud computing [Volume 11, Number 2] |
 |
probability distribution image
A Visual Tracking Algorithm Based on CAMShift and Motion Segmentation [Volume 4, Number 3] |
 |
prosody
Hybrid of Evolutionary and Swarm Intelligence Algorithms for Prosody Modeling in Natural Speech Synthesis [Volume 8, Number 2] |
 |
quasi-structured pruning (QSP).
CNN Accelerator Adapted to Quasi Structured Pruning and Dense Mode [Volume 17, Number 3] |
 |
query refinement
Improving the Performance of Proposed Multi-Agent Domain Specific Search Engine Using Query Refinement Component [Volume 2, Number 4] |
 |
ratio mask
Binaural Speech Separation Using Binary and Ratio Time-Frequency Masks [Volume 6, Number 3] |
 |
recommender system
Addressing the New User Cold-Start Problem in Recommender Systems Using Ordered Weighted Averaging Operator [Volume 2, Number 4] |
 |
recommender systems
Towards Faster Performance of PROMETHEE II in a Lower Class of Complexity [Volume 2, Number 4] |
 |
rectangular waveguide.
Mathematical Formulation and Experimental Evaluation of Efficient 8-Way Microwave Radial Power Combiner for High Power Applications [Volume 15, Number 4] |
 |
relay and jammer selection
On Maximizing the Secrecy Rate in a Cooperative Wireless Network using Friendly Jammers [Volume 8, Number 3] |
 |
representative-based clustering
Mining Dynamic Communities based on a Novel Link-Clustering Algorithm [Volume 9, Number 1] |
 |
research ability improvement
An Ontology-based Framework for Organizing Research Support Contents inE-Learning Environment [Volume 3, Number 1] |
 |
resonant detector
Numerical Full wave Analysis and Modeling of Plasmonic HEMT Performance Using Hydrodynamic Model [Volume 11, Number 1] |
 |
respiration.
Performance Assessment of a Microwave Life-Detection System (MLDS): Modified Quadrature Receiver Versus a Harmonic Radar Architecture [Volume 12, Number 1] |
 |
scheduling
Optimum Routing and Scheduling in Wireless Nerworks [Volume 1, Number 2] |
 |
search algorithm
A Survey of Advanced Search Techniques in Unstructured P2P Networks [Volume 6, Number 1] |
 |
search-based software testing
Comparative Analytical Survey on SBST Challenges from the Perspective of the Test Techniques [Volume 14, Number 2] |
 |
secrecy
Transmitted Data Security in Non-Orthogonal Multiple Access Networks with Directional Modulation Based on User Location [Volume 15, Number 2] |
 |
security architecture
Security Framework of IoT-Based Smart Home [Volume 12, Number 1] |
 |
semi Markov decision process (SMDP)
A Sub-Optimal Policy for Connection Admission Control Mechanism in Cognitive Radio Sensor Networks [Volume 9, Number 1] |
 |
semi-distributed model
Optimization and Fully Distributed Analysis of Single Pole Single Throw Traveling Wave Switchesat Millimeter Wave Frequency Band [Volume 3, Number 2] |
 |
sentiment analysis
A Deep Learning Approach for Sarcasm Detection on Twitter [Volume 16, Number 3] |
 |
sequence pattern
Investigating Students' Temporal Behaviors and Evaluation of Faculty through Educational Data Mining [Volume 3, Number 1] |
 |
sequential pattern
EMOSS: An Efficient Algorithm to Hide Sequential Patterns [Volume 7, Number 4] |
 |
set-membership
The Unified Approach to Set-Membership and Selective Partial Update Adaptive Filtering Algorithms [Volume 2, Number 2] |
 |
sharing method
Context Aware Mental Model Sharing in Dynamic Inaccessible Environments [Volume 4, Number 4] |
 |
side information
A New Method for SLM-Based OFDM Systems without Side Information [Volume 7, Number 2] |
 |
signal-to-distortion ratio
VQ-based Approach to Single-Channel Audio Separation for Music and Speech Mixtures [Volume 2, Number 1] |
 |
sink node
Providing a Solution to Reduce Energy Consumption in IoT-Based WSNs Based on Node Activity Management [Volume 14, Number 4] |
 |
spectral efficiency.
Optimal Power Allocation Strategy for a D2D Network based Safety-Critical V2X Communication with Partial CSI [Volume 16, Number 2] |
 |
spherical antennas
Analysis Method for Spherical Dipole Antenna Array [Volume 5, Number 2] |
 |
stochastic geometry
Dimensioning of 5G Networks by Using Stochastic Geometry [Volume 13, Number 2] |
 |
streching
An Automatic Contrast Enhancement Technique Using Combination of Histogram-Based Methods [Volume 4, Number 1] |
 |
structural information
DSMN: A New Approach for Link Prediction in Multilplex Networks [Volume 14, Number 3] |
 |
subspace augmentation (SA)
Subspace-Based Approaches for Hybrid Millimeter-Wave Channel Estimation [Volume 9, Number 4] |
 |
sum rate
Spatial Interference Alignment in Relay-Assisted Multi-Cell Multi-User Networks [Volume 8, Number 4] |
 |
summary
GSSC: Graph Summarization based on both Structure and Concepts [Volume 9, Number 1] |
 |
surveillance systems
A Novel Descriptor for Pedestrian Detection in Video Sequences [Volume 2, Number 2] |
 |
task offloading
Resource Allocation optimization in fog Architecture Based Software-Defined Networks [Volume 15, Number 4] |
 |
technology acceptance model
A Hybrid Model for Evaluation of E-Learning User Satisfaction with TAM and ELQ Approach [Volume 16, Number 2] |
 |
time series
A Timelier Credit Card Fraud Detection by Mining Transaction Time Series [Volume 2, Number 3] |
 |
time series
Classification of Exchange Rate Prediction Methods with a Focus on Deep Learning Techniques [Volume 17, Number 2] |
 |
time-based hybrid weight
An Improved Recommender System Based on Forgetting Mechanism for User Interest-Drifting [Volume 4, Number 4] |
 |
traffic scene
Learning Motion Patterns in Traffic Scenes by Improved Group Sparse Topical Coding [Volume 8, Number 2] |
 |
transmitter optimization
Joint Power Adaptation and Interference Avoidance for Unlicensed Wireless Systems: A Game Theoretic Approach [Volume 3, Number 3] |
 |
transverse magnetic (TM) mode
Compact, Tunable and Narrowband Waveguide Filters Using TM Dual-Mode Cavities for Satellite Communication Applications [Volume 12, Number 3] |
 |
trust manager agent (TMA)
A Computational Trust Model for E-Commerce Systems: Concepts, Definitions and Evaluation Method [Volume 7, Number 2] |
 |
tutorial-like system
Quality Improvement of Interactive Tutorial-Like Systems by Use of Cellular Learning Automata [Volume 6, Number 4] |
 |
uncertainty
The Effect of Information Sharing on the Assessment of Supply Chain Performance in Uncertain Conditions [Volume 10, Number 2] |
 |
unused messages
Improving the Quality of Service in the VANET by Detecting and Removing Unused Messages [Volume 4, Number 3] |
 |
urban channel characterization
A Study of the Effect of Diffraction and Rough Surface Scattering Modeling on Ray Tracing Results in an Urban Environment at 60 GHz [Volume 3, Number 2] |
 |
virtual reality language
3D Triangular Mesh Digital Watermarking based on Median and Indices [Volume 1, Number 1] |
 |
visible light communication
On Error and Bitrate Tradeoff in Visible Light Communication System to ensure HEVC Video Quality [Volume 8, Number 4] |
 |
vowel sounds
A Robust Voice Activity Detection Based on Short Time Features of Audio Frames and Spectral Pattern of Vowel Sounds [Volume 2, Number 2] |
 |
water distribution grid.
Anomaly Detection in Non-Stationary Water Distribution Grids Using Fog Computing Architecture [Volume 13, Number 3] |
 |
web page ranking
Web Page Streams and Relevance Propagation for Topic Distillation [Volume 6, Number 1] |
 |
weight of links
A Routing Method in Smart Cities Based on Destination Type and Network Traffic Flow [Volume 16, Number 2] |
 |
weighted networks
Discovering Influencers for Spreading in Weighted Networks [Volume 7, Number 3] |
 |
wireless communication network
Optimum Indoor Signal Coverage of Dense Distributed Receivers via Ray Tracing Coupled with Genetic Algorithm [Volume 5, Number 2] |
 |
wireless sensor networks
Energy Based Clustering Self Organizing Map Protocol For Wireless Sensor Networks [Volume 7, Number 1] |
 |
zero crossing DPLL
Performance Analysis of Zero Crossing DPLL with Linearized Phase Detector [Volume 1, Number 3] |