Site Tops

:: Most Visited Articles
A Proactive Context-Aware Self-Healing Scheme for 5G Using Machine Learning (18070 Views)
Multi-Objective P- Epidemic Forwarding Method in Heterogeneous DTNs Using NSGA-II (4757 Views)
A Framework for Optimal Fault Tolerance Protocol Selection Using Fuzzy Logic on IoT Sensor Layer (4421 Views)
Low Cost Millimeter Wave Duplexer Design Using Mixed Mode Matching and Integral Contour Methods (3907 Views)
Enhancement of educational games based on personality type indicators (3839 Views)
Speaker-Dependent Speech Enhancement Using Codebook-based Synthesis for Low SNR Applications (3744 Views)
Customer Clustering Based on Customer Lifetime Value: A Case Study of an Iranian Bank (3682 Views)
Multi-Objective Response to Co-Resident Attacks in Cloud Environment (3658 Views)
Spatial Interference Alignment in Relay-Assisted Multi-Cell Multi-User Networks (3618 Views)
Persian to English Personal Name Transliteration Based On the Persian Web Contents (3595 Views)
Fast GLCM and Gabor Filters for Texture Classification of Very High Resolution Remote Sensing Images (3566 Views)
Persian Wordnet Construction using Supervised Learning (3562 Views)
An Opportunistic Cooperative Approach for Dynamic Spectrum Leasing in Cognitive Radio Networks (3539 Views)
Pruning Concept Map to Geneate Ontology (3533 Views)
Keyphrase Ranking Based on Second Order Co-Occurrence Analysis (3511 Views)
An Incentive Mechanism to Mitigate the Free-riding in VoD Streaming over Hybrid CDN-P2P Networks (3448 Views)
Decreasing the Average Delay, Connectivity, and Routing Load in Clustered Mobile Ad- Hoc Networks (3421 Views)
Spectral-Spatial Feature Transformations With Controlling Contextual Information Through Smoothing Filtering and Morphological Analysis (3406 Views)
Intrusion Detection System Using SVM as Classifier and GA for Optimizing Feature Vectors (3402 Views)
Analysis Method for Spherical Dipole Antenna Array (3386 Views)
All Optical Logic Gates: A Tutorial (3369 Views)
Learners Grouping in E-Learning Environment Using Evolutionary Fuzzy Clustering Approach (3365 Views)
Designing and Developing a Wordnet for Persian Nouns Pages (3355 Views)
A Reliable Transport Protocol for Wireless Sensor Networks (3341 Views)
Joint Power Adaptation and Interference Avoidance for Unlicensed Wireless Systems: A Game Theoretic Approach (3310 Views)
Impact of Topic Modeling on Rule-Based Persian Metaphor Classification and its Frequency Estimation (3249 Views)
HWS: A Hierarchical Word Spotting Method for Farsi Printed Words Through Word Shape Coding (3216 Views)
Improving the Performance of E-Learning Systems Using Extracted Web Server Log File Suggestions (3199 Views)
ON THE CORRECTNESS OF A TRANSLATION MAP BETWEEN SPECIFICATIONS IN Z AND SETL2 PROTOTYPE (3189 Views)
A Survey on Task Scheduling Algorithms in Cloud Computing for Fast Big Data Processing (3176 Views)
Analysis the Effects of Internet of Things Technology in Managing Supply Chain (3167 Views)
Hybrid of Evolutionary and Swarm Intelligence Algorithms for Prosody Modeling in Natural Speech Synthesis (3142 Views)
Recommending Friends in Social Networks By Users' Profiles And Using Classification Algorithms (3139 Views)
A Clustering Based Feature Selection Approach to Detect Spam in Social Networks (3131 Views)
EDBPM: An Event-Driven Business Process Monitoring Mechanism (3086 Views)
Decision Feedback Channel Estimation for Alamouti Coded OFDM Systems (3075 Views)
A Conceptual Framework and Architectural Considerations for Capability Enhancement in Software Defined Networks (3074 Views)
A Semi-Supervised Method for Multimodal Classification of Consumer Videos (3050 Views)
Enhanced Iterative Detection of Hierarchically Modulated Signals using VB-EM Algorithm (3045 Views)
Dynamic Risk Assessment System for the Vulnerability Scoring (3036 Views)
QoS-aware web service composition using Gray Wolf Optimizer (3013 Views)
IECA: Intelligent Effective Crawling Algorithm for Web Pages (3009 Views)
Phrase Alignments in Parallel Corpus Using Bootstrapping Approach (3006 Views)
From Reliable Distributed System Toward Reliable Cloud by Cat Swarm Optimization (2987 Views)
A Framework to Create a Certificate for e-Commerce Secure Transaction Protocol (2975 Views)
Analysis of an RFID Authentication Protocol in Accordance with EPC Standards (2975 Views)
A Secure Attribute-Based Keyword Search Scheme Against Keyword Guessing And Chosen Keyword Attack (2966 Views)
Using Hybrid of Eigenface and Imperialist Competition Algorithm for Feature Selection in Face Recognition (2956 Views)
Superposition Network Coding for Wireless Cooperative Communication (2947 Views)
A Framework for Evaluation of SQL Injection Detection and Prevention Tools (2942 Views)
Total Sum: 1009450