H

  • Haghighat monfared.Jalal RFID-based decision support within maintenance management of urban tunnel systems [ Vol.5, Issue 1 - Winter Year 2016]
  • Hajhassan.Navid A Mechanism for Detecting and Identifying DoS attack in VANET [ Vol.7, Issue 1 - Winter Year 2018]
  • Hajivand.Mohammad Optimal Recloser Placement by Binary Differential Evolutionary Algorithm to Improve Reliability of Distribution System [ Vol.3, Issue 2 - Spring Year 2014]
  • Hajivand.Mohammad Optimal Placement of Static VAR Compensator to decrease Loadability Margin by a Novel Modified Particle Swarm Optimization Algorithm [ Vol.3, Issue 2 - Spring Year 2014]
  • Hassani.Iman SDN Security: A Survey [ Vol.7, Issue 1 - Winter Year 2018]
  • hatamy.rashin The role of Real option in e-business Risk management: The case of E-treasury project [ Vol.4, Issue 1 - Winter Year 2015]
  • heydari.mahboubeh A Review of BlockChain [ Vol.7, Issue 1 - Winter Year 2018]
  • hoseinzadeh.hasan Development Hough transform to detect straight lines using pre-processing filter [ Vol.4, Issue 2 - Spring Year 2015]
  • Hosseini.Rahil A Fuzzy Expert System for Diagnosis of Acute Lymphocytic Leukemia in Children [ Vol.4, Issue 2 - Spring Year 2015]
  • Hosseini.Rahil A Survey of Concurrency Control Algorithms in the Operating Systems [ Vol.3, Issue 2 - Spring Year 2014]
  • Hosseini.Rahil Edge Detection Based On Nearest Neighbor Linear Cellular Automata Rules and Fuzzy Rule Based System [ Vol.5, Issue 1 - Winter Year 2016]
  • hosseinikhah.sahar A Proposed Model for Assessing the Determinants of Enterprise Resource Planning Adoption and Satisfaction [ Vol.7, Issue 2 - Spring Year 2018]
  • hosseinpour.seyed reza Fault Identification using end-to-end data by imperialist competitive algorithm [ Vol.4, Issue 1 - Winter Year 2015]