Site Tops

:: Most Visited Articles
A Framework for Optimal Fault Tolerance Protocol Selection Using Fuzzy Logic on IoT Sensor Layer (2725 Views)
Speaker-Dependent Speech Enhancement Using Codebook-based Synthesis for Low SNR Applications (2265 Views)
Multi-Objective Response to Co-Resident Attacks in Cloud Environment (2054 Views)
Spatial Interference Alignment in Relay-Assisted Multi-Cell Multi-User Networks (2034 Views)
An Opportunistic Cooperative Approach for Dynamic Spectrum Leasing in Cognitive Radio Networks (2020 Views)
Persian Wordnet Construction using Supervised Learning (2012 Views)
Persian to English Personal Name Transliteration Based On the Persian Web Contents (2003 Views)
Fast GLCM and Gabor Filters for Texture Classification of Very High Resolution Remote Sensing Images (1985 Views)
Analysis Method for Spherical Dipole Antenna Array (1962 Views)
Pruning Concept Map to Geneate Ontology (1922 Views)
Designing and Developing a Wordnet for Persian Nouns Pages (1908 Views)
An Incentive Mechanism to Mitigate the Free-riding in VoD Streaming over Hybrid CDN-P2P Networks (1877 Views)
Low Cost Millimeter Wave Duplexer Design Using Mixed Mode Matching and Integral Contour Methods (1876 Views)
All Optical Logic Gates: A Tutorial (1848 Views)
Joint Power Adaptation and Interference Avoidance for Unlicensed Wireless Systems: A Game Theoretic Approach (1841 Views)
Keyphrase Ranking Based on Second Order Co-Occurrence Analysis (1840 Views)
A Reliable Transport Protocol for Wireless Sensor Networks (1837 Views)
Spectral-Spatial Feature Transformations With Controlling Contextual Information Through Smoothing Filtering and Morphological Analysis (1834 Views)
Decreasing the Average Delay, Connectivity, and Routing Load in Clustered Mobile Ad- Hoc Networks (1798 Views)
Hybrid of Evolutionary and Swarm Intelligence Algorithms for Prosody Modeling in Natural Speech Synthesis (1770 Views)
Learners Grouping in E-Learning Environment Using Evolutionary Fuzzy Clustering Approach (1750 Views)
Intrusion Detection System Using SVM as Classifier and GA for Optimizing Feature Vectors (1733 Views)
HWS: A Hierarchical Word Spotting Method for Farsi Printed Words Through Word Shape Coding (1720 Views)
Customer Clustering Based on Customer Lifetime Value: A Case Study of an Iranian Bank (1713 Views)
Recommending Friends in Social Networks By Users' Profiles And Using Classification Algorithms (1651 Views)
    ... More
:: Most Downloaded Articles
Analysis the Effects of Internet of Things Technology in Managing Supply Chain (1421 Downloads)
Persian to English Personal Name Transliteration Based On the Persian Web Contents (1333 Downloads)
All Optical Logic Gates: A Tutorial (1199 Downloads)
A Framework for Optimal Fault Tolerance Protocol Selection Using Fuzzy Logic on IoT Sensor Layer (1180 Downloads)
Customer Clustering Based on Customer Lifetime Value: A Case Study of an Iranian Bank (1068 Downloads)
Fast GLCM and Gabor Filters for Texture Classification of Very High Resolution Remote Sensing Images (1042 Downloads)
A Conceptual Framework and Architectural Considerations for Capability Enhancement in Software Defined Networks (1039 Downloads)
Critical Success factors for implementing PACS Technology in Iran's Hospitals (924 Downloads)
A Priority-based Fast Optimal Computation Offloading Planner for Mobile Cloud Computing (917 Downloads)
Intrusion Detection System Using SVM as Classifier and GA for Optimizing Feature Vectors (913 Downloads)
The Effect of Information Sharing on the Assessment of Supply Chain Performance in Uncertain Conditions (909 Downloads)
Overhead Reduction In Delay Tolerant Networks (895 Downloads)
Non-stationary Sparse System Identification over Adaptive Sensor Networks with Diffusion and Incremental Strategies (895 Downloads)
QoS-aware web service composition using Gray Wolf Optimizer (890 Downloads)
An Incentive Mechanism to Mitigate the Free-riding in VoD Streaming over Hybrid CDN-P2P Networks (878 Downloads)
Spectral-Spatial Feature Transformations With Controlling Contextual Information Through Smoothing Filtering and Morphological Analysis (876 Downloads)
Persian Wordnet Construction using Supervised Learning (869 Downloads)
A Clustering Based Feature Selection Approach to Detect Spam in Social Networks (854 Downloads)
An Attack Graph Based Method for Predictive Risk Evaluation of Zero-Day Attacks (852 Downloads)
A Framework to Create a Certificate for e-Commerce Secure Transaction Protocol (851 Downloads)
Hub location Allocation Problem in Computer Networks Using Intelligent Optimization Algorithms (842 Downloads)
A Model Based on Cellular Learning Automata for Improving the Intelligent Assistant Agents & Its Application in Earthquake Crisis Management (841 Downloads)
Impact of Topic Modeling on Rule-Based Persian Metaphor Classification and its Frequency Estimation (840 Downloads)
A Secure Attribute-Based Keyword Search Scheme Against Keyword Guessing And Chosen Keyword Attack (837 Downloads)
SDTE: Software Defined Traffic Engineering for Improving Data Center Network Utilization (833 Downloads)
    ... More
:: Most studied contents
Editorial Board ( 14282 view)
About the Journal ( 3944 view)
Submission Preparation Checklist ( 3692 view)
Information For Authors ( 2967 view)
Contact ( 2958 view)
New Journal website launched ( 2814 view)
Aims & Scopes ( 2469 view)
Reviewers List ( 464 view)
Reviewers ( 440 view)
Indexing Databases ( 440 view)
Editorial and Publishing Process ( 429 view)
PUBLICATION ETHICS ( 426 view)
Editorial and Publishing Process ( 408 view)
Editorial and Publishing Process ( 407 view)
Editorial and Publishing Process ( 398 view)
welcome ( 392 view)
Registration Information ( 383 view)
    ... More
:: Most sent contents
welcome ( 1 send)
    ... More
:: Most printed contents
Submission Preparation Checklist ( 871 print)
Information For Authors ( 429 print)
New Journal website launched ( 369 print)
About the Journal ( 361 print)
Contact ( 342 print)
Aims & Scopes ( 323 print)
Editorial Board ( 297 print)
welcome ( 200 print)
Reviewers ( 106 print)
Editorial and Publishing Process ( 103 print)
Indexing Databases ( 101 print)
Reviewers List ( 95 print)
PUBLICATION ETHICS ( 92 print)
Editorial and Publishing Process ( 88 print)
Registration Information ( 87 print)
Editorial and Publishing Process ( 79 print)
Editorial and Publishing Process ( 78 print)
    ... More