Site Tops

:: Most Visited Articles
A Proactive Context-Aware Self-Healing Scheme for 5G Using Machine Learning (18070 Views)
Multi-Objective P- Epidemic Forwarding Method in Heterogeneous DTNs Using NSGA-II (4755 Views)
A Framework for Optimal Fault Tolerance Protocol Selection Using Fuzzy Logic on IoT Sensor Layer (4414 Views)
Low Cost Millimeter Wave Duplexer Design Using Mixed Mode Matching and Integral Contour Methods (3902 Views)
Enhancement of educational games based on personality type indicators (3838 Views)
Speaker-Dependent Speech Enhancement Using Codebook-based Synthesis for Low SNR Applications (3738 Views)
Customer Clustering Based on Customer Lifetime Value: A Case Study of an Iranian Bank (3678 Views)
Multi-Objective Response to Co-Resident Attacks in Cloud Environment (3653 Views)
Spatial Interference Alignment in Relay-Assisted Multi-Cell Multi-User Networks (3615 Views)
Persian to English Personal Name Transliteration Based On the Persian Web Contents (3594 Views)
Fast GLCM and Gabor Filters for Texture Classification of Very High Resolution Remote Sensing Images (3565 Views)
Persian Wordnet Construction using Supervised Learning (3556 Views)
An Opportunistic Cooperative Approach for Dynamic Spectrum Leasing in Cognitive Radio Networks (3537 Views)
Pruning Concept Map to Geneate Ontology (3526 Views)
Keyphrase Ranking Based on Second Order Co-Occurrence Analysis (3508 Views)
An Incentive Mechanism to Mitigate the Free-riding in VoD Streaming over Hybrid CDN-P2P Networks (3444 Views)
Decreasing the Average Delay, Connectivity, and Routing Load in Clustered Mobile Ad- Hoc Networks (3416 Views)
Spectral-Spatial Feature Transformations With Controlling Contextual Information Through Smoothing Filtering and Morphological Analysis (3403 Views)
Intrusion Detection System Using SVM as Classifier and GA for Optimizing Feature Vectors (3396 Views)
Analysis Method for Spherical Dipole Antenna Array (3383 Views)
All Optical Logic Gates: A Tutorial (3367 Views)
Learners Grouping in E-Learning Environment Using Evolutionary Fuzzy Clustering Approach (3360 Views)
Designing and Developing a Wordnet for Persian Nouns Pages (3351 Views)
A Reliable Transport Protocol for Wireless Sensor Networks (3336 Views)
Joint Power Adaptation and Interference Avoidance for Unlicensed Wireless Systems: A Game Theoretic Approach (3308 Views)
Impact of Topic Modeling on Rule-Based Persian Metaphor Classification and its Frequency Estimation (3245 Views)
HWS: A Hierarchical Word Spotting Method for Farsi Printed Words Through Word Shape Coding (3215 Views)
Improving the Performance of E-Learning Systems Using Extracted Web Server Log File Suggestions (3195 Views)
A Survey on Task Scheduling Algorithms in Cloud Computing for Fast Big Data Processing (3172 Views)
Analysis the Effects of Internet of Things Technology in Managing Supply Chain (3164 Views)
Hybrid of Evolutionary and Swarm Intelligence Algorithms for Prosody Modeling in Natural Speech Synthesis (3137 Views)
Recommending Friends in Social Networks By Users' Profiles And Using Classification Algorithms (3135 Views)
A Clustering Based Feature Selection Approach to Detect Spam in Social Networks (3129 Views)
EDBPM: An Event-Driven Business Process Monitoring Mechanism (3079 Views)
A Conceptual Framework and Architectural Considerations for Capability Enhancement in Software Defined Networks (3072 Views)
Decision Feedback Channel Estimation for Alamouti Coded OFDM Systems (3070 Views)
A Semi-Supervised Method for Multimodal Classification of Consumer Videos (3047 Views)
Enhanced Iterative Detection of Hierarchically Modulated Signals using VB-EM Algorithm (3036 Views)
Dynamic Risk Assessment System for the Vulnerability Scoring (3033 Views)
QoS-aware web service composition using Gray Wolf Optimizer (3006 Views)
Phrase Alignments in Parallel Corpus Using Bootstrapping Approach (3005 Views)
IECA: Intelligent Effective Crawling Algorithm for Web Pages (3004 Views)
From Reliable Distributed System Toward Reliable Cloud by Cat Swarm Optimization (2985 Views)
A Framework to Create a Certificate for e-Commerce Secure Transaction Protocol (2974 Views)
Analysis of an RFID Authentication Protocol in Accordance with EPC Standards (2973 Views)
A Secure Attribute-Based Keyword Search Scheme Against Keyword Guessing And Chosen Keyword Attack (2963 Views)
Using Hybrid of Eigenface and Imperialist Competition Algorithm for Feature Selection in Face Recognition (2951 Views)
Superposition Network Coding for Wireless Cooperative Communication (2941 Views)
A Framework for Evaluation of SQL Injection Detection and Prevention Tools (2937 Views)
Total Sum: 1007819