Site Tops

:: Most Visited Articles
A Framework for Optimal Fault Tolerance Protocol Selection Using Fuzzy Logic on IoT Sensor Layer (2542 Views)
Speaker-Dependent Speech Enhancement Using Codebook-based Synthesis for Low SNR Applications (2131 Views)
Multi-Objective Response to Co-Resident Attacks in Cloud Environment (1912 Views)
Spatial Interference Alignment in Relay-Assisted Multi-Cell Multi-User Networks (1898 Views)
An Opportunistic Cooperative Approach for Dynamic Spectrum Leasing in Cognitive Radio Networks (1889 Views)
Analysis Method for Spherical Dipole Antenna Array (1869 Views)
Persian Wordnet Construction using Supervised Learning (1856 Views)
Persian to English Personal Name Transliteration Based On the Persian Web Contents (1839 Views)
Fast GLCM and Gabor Filters for Texture Classification of Very High Resolution Remote Sensing Images (1829 Views)
Designing and Developing a Wordnet for Persian Nouns Pages (1790 Views)
Pruning Concept Map to Geneate Ontology (1754 Views)
An Incentive Mechanism to Mitigate the Free-riding in VoD Streaming over Hybrid CDN-P2P Networks (1754 Views)
All Optical Logic Gates: A Tutorial (1722 Views)
Joint Power Adaptation and Interference Avoidance for Unlicensed Wireless Systems: A Game Theoretic Approach (1703 Views)
A Reliable Transport Protocol for Wireless Sensor Networks (1702 Views)
Spectral-Spatial Feature Transformations With Controlling Contextual Information Through Smoothing Filtering and Morphological Analysis (1696 Views)
Low Cost Millimeter Wave Duplexer Design Using Mixed Mode Matching and Integral Contour Methods (1689 Views)
Decreasing the Average Delay, Connectivity, and Routing Load in Clustered Mobile Ad- Hoc Networks (1659 Views)
Keyphrase Ranking Based on Second Order Co-Occurrence Analysis (1656 Views)
Hybrid of Evolutionary and Swarm Intelligence Algorithms for Prosody Modeling in Natural Speech Synthesis (1627 Views)
Learners Grouping in E-Learning Environment Using Evolutionary Fuzzy Clustering Approach (1610 Views)
Intrusion Detection System Using SVM as Classifier and GA for Optimizing Feature Vectors (1581 Views)
HWS: A Hierarchical Word Spotting Method for Farsi Printed Words Through Word Shape Coding (1564 Views)
A Backup Routing Scheme for Mobile Ad-Hoc Networks (1560 Views)
Customer Clustering Based on Customer Lifetime Value: A Case Study of an Iranian Bank (1539 Views)
A Clustering Based Feature Selection Approach to Detect Spam in Social Networks (1490 Views)
Recommending Friends in Social Networks By Users' Profiles And Using Classification Algorithms (1488 Views)
ON THE CORRECTNESS OF A TRANSLATION MAP BETWEEN SPECIFICATIONS IN Z AND SETL2 PROTOTYPE (1485 Views)
The Effect of Information Sharing on the Assessment of Supply Chain Performance in Uncertain Conditions (1483 Views)
Analysis the Effects of Internet of Things Technology in Managing Supply Chain (1462 Views)
A Conceptual Framework and Architectural Considerations for Capability Enhancement in Software Defined Networks (1456 Views)
A Survey of Advanced Search Techniques in Unstructured P2P Networks (1447 Views)
Enhanced Iterative Detection of Hierarchically Modulated Signals using VB-EM Algorithm (1441 Views)
EDBPM: An Event-Driven Business Process Monitoring Mechanism (1428 Views)
QoS-aware web service composition using Gray Wolf Optimizer (1400 Views)
Non-stationary Sparse System Identification over Adaptive Sensor Networks with Diffusion and Incremental Strategies (1396 Views)
A Secure Attribute-Based Keyword Search Scheme Against Keyword Guessing And Chosen Keyword Attack (1380 Views)
A Timelier Credit Card Fraud Detection by Mining Transaction Time Series (1377 Views)
Impact of Empowering Communication Technology Practices on Service Performance in Information Technology Sector (1371 Views)
A Framework to Create a Certificate for e-Commerce Secure Transaction Protocol (1369 Views)
An Attack-Defense Model for the Binder on the Android Kernel Level (1365 Views)
How Open Source Software Succeeds? A Review of Research on Success of Open Source Software (1359 Views)
Skin Classification for Adult Image Recognition Based on Combination of Gaussian and Weight-KNN (1355 Views)
Using Hybrid of Eigenface and Imperialist Competition Algorithm for Feature Selection in Face Recognition (1354 Views)
Practical Detection of Click Spams Using Efficient Classification-Based Algorithms (1345 Views)
From Reliable Distributed System Toward Reliable Cloud by Cat Swarm Optimization (1336 Views)
A New Adaptive Hybrid Recommender Framework for Learning Material Recommendation (1329 Views)
A New Fractional Adaptive Filtering Method and its Application in Speech Enhancement (1328 Views)
A Fairness-Guaranteed Game-Theoretic Perspective in Multi-User Interference Channel (1327 Views)
DMTC-EBSC: A Novel Decision Making Technique in Cloud Environment Based on Extended BSC (1326 Views)
Total Sum: 354103