abdi.fatemeh
Mining Frequent Patterns in Uncertain and Relational Data Streams using the Landmark Windows
[
Vol.1,
Issue
4
- AutumnYear
2015]
Abdollahzadeh Aghbolagh.Mohsen
Fuzzy Clustering Based Routing in Wireless Body Area Networks to Increase the Life of Sensor Nodes
[
Vol.4,
Issue
3
- SummerYear
2018]
Abtahi.Mehdi
Chaotic dynamic analysis and nonlinear control of blood glucose regulation system in type 1 diabetic patients
[
Vol.5,
Issue
2
- SpringYear
2019]
Adabi.Sahar
Metadata Enrichment for Automatic Data Entry Based on Relational Data Models
[
Vol.4,
Issue
3
- SummerYear
2018]
Adabi.Sahar
Workflow Scheduling on Hybrid Fog-Cloud Environment Based on a Novel Critical Path Extraction Algorithm
[
Vol.7,
Issue
2
- SpringYear
2021]
Adabi.Sahar
Formal Method in Service Composition in Heath Care Systems
[
Vol.4,
Issue
1
- WinterYear
2018]
adabi.sepideh
A Near Optimal Approach in Choosing The Appropriate Physical Machines for Live Virtual Machines Migration in Cloud Computing
[
Vol.1,
Issue
3
- SummerYear
2015]
Adabi.Sepideh
Improving QoS in VANETs: A Survey
[
Vol.3,
Issue
3
- SummerYear
2017]
ADARAMOLA.OJO
Network Parameters Evaluation in Vehicular Ad-hoc Network (VANET) Routing Protocols for Efficient Message Delivery in City Environment
[
Vol.4,
Issue
3
- SummerYear
2018]
ADARAMOLA.OJO
Network Investigation and Performance Analysis of ZigBee Technology using OPNET
[
Vol.4,
Issue
4
- AutumnYear
2018]
ADIGUN.OLATUNJI
Decentralized Fuzzy-PID Based Control Model for a Multivariable Liquid Level System
[
Vol.4,
Issue
4
- AutumnYear
2018]
ADIGUN.OLATUNJI
Coastal Water Level Prediction Model Using Adaptive Neuro-fuzzy Inference System
[
Vol.5,
Issue
1
- WinterYear
2019]
Aghazarian.Vaheh
Statistical Analysis on IoT Research Trends: A Survey
[
Vol.4,
Issue
2
- SpringYear
2018]
Ahangari.Ali
HF-Blocker: Detection of Distributed Denial of Service Attacks Based On Botnets
[
Vol.1,
Issue
3
- SummerYear
2015]
Ahmadieh khanehsar.mojtaba
Nonlinear System Identification Using Hammerstein-Wiener Neural Network and subspace algorithms
[
Vol.1,
Issue
3
- SummerYear
2015]
Ahmadinia.Mohammad
A Multi-layer Architecture Based on MCDM Methods to Select the Best E-Readiness Assessment Model According to SWOT Analysis
[
Vol.3,
Issue
2
- SpringYear
2017]
ahmadipourlaghari.fereshteh
Tags Re-ranking Using Multi-level Features in Automatic Image Annotation
[
Vol.5,
Issue
4
- AutumnYear
2019]
Ahvar.Ehsan
EIDA: An Energy-Intrusion aware Data Aggregation Technique for Wireless Sensor Networks
[
Vol.2,
Issue
1
- WinterYear
2016]
Aibinu.Musa
Water Quality Index Estimation Model for Aquaculture System Using Artificial Neural Network
[
Vol.5,
Issue
3
- SummerYear
2019]
Ajao.Lukman
Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines
[
Vol.5,
Issue
2
- SpringYear
2019]
Akbari Torkestani.Javad
Intelligent Resource Allocation in Fog Computing: A Learning Automata Approach
[
Vol.7,
Issue
1
- WinterYear
2021]
Akbarimajd.Adel
Optimal Trajectory Planning of a Box Transporter Mobile Robot
[
Vol.2,
Issue
3
- SummerYear
2016]
akbarizadeh.gholamreza
Implementation of Random Forest Algorithm in Order to Use Big Data to Improve Real-Time Traffic Monitoring and Safety
[
Vol.4,
Issue
2
- SpringYear
2018]
Ali Mohsin Alhameedawi.Karrar
PEML-E: EEG eye state classification using ensembles and machine learning methods
[
Vol.7,
Issue
2
- SpringYear
2021]
Ali.Ali
Using a Neural Network instead of IKM in 2R Planar Robot to follow rectangular path
[
Vol.6,
Issue
2
- SpringYear
2020]
Ali.Dr. Mohammad Hanif
A Detailed Exploration of Usability Statistics and Application Rating Based on Wireless Protocols
[
Vol.6,
Issue
1
- WinterYear
2020]
Alizadeh.Fattah
Designing and implementing a system for Automatic recognition of Persian letters by Lip-reading using image processing methods
[
Vol.5,
Issue
2
- SpringYear
2019]
Allayear.Shaikh Muhammad
A Fuzzy TOPSIS Approach for Big Data Analytics Platform Selection
[
Vol.5,
Issue
1
- WinterYear
2019]
Ameh.Ameh
Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines
[
Vol.5,
Issue
2
- SpringYear
2019]
Amirshahi.Alireza
A Fuzzy Realistic Mobility Model for Ad hoc Networks
[
Vol.1,
Issue
1
- WinterYear
2015]
amirshahi.bita
A hybrid meta-heuristic algorithm based on ABC and Firefly algorithms
[
Vol.1,
Issue
4
- AutumnYear
2015]
Amirshahi.Bita
Improvement of the mechanism of congestion avoidance in mobile networks
[
Vol.2,
Issue
2
- SpringYear
2016]
Amirshahi.Bita
HF-Blocker: Detection of Distributed Denial of Service Attacks Based On Botnets
[
Vol.1,
Issue
3
- SummerYear
2015]
amjad.samira
A Novel Hybrid Approach for Email Spam Detection based on Scatter Search Algorithm and K-Nearest Neighbors
[
Vol.5,
Issue
3
- SummerYear
2019]
Anzani.Mohaddese
Hybrid Key pre-distribution scheme for wireless sensor network based on combinatorial design
[
Vol.1,
Issue
3
- SummerYear
2015]
Arulogun.Tayo
Performance Evaluation of the Effect of Optimally Tuned IMC and PID Controllers on a Poultry Feed Dispensing System
[
Vol.6,
Issue
4
- AutumnYear
2020]
Asgarnezhad.Razieh
PEML-E: EEG eye state classification using ensembles and machine learning methods
[
Vol.7,
Issue
2
- SpringYear
2021]
Ashrafidoost.Reza
Recognizing the Emotional State Changes in Human Utterance by a Learning Statistical Method based on Gaussian Mixture Model
[
Vol.3,
Issue
2
- SpringYear
2017]
ashtari mahini.maryam
Nonlinear System Identification Using Hammerstein-Wiener Neural Network and subspace algorithms
[
Vol.1,
Issue
3
- SummerYear
2015]
Assarian.Mohammad
A Fuzzy Realistic Mobility Model for Ad hoc Networks
[
Vol.1,
Issue
1
- WinterYear
2015]
Azimi Doosti.Bahar
The impact of behavioral factors on Propensity toward indebtedness Case Study: Indebted customers of Maskan Bank, Tehran province (Geographic regions: East)
[
Vol.3,
Issue
3
- SummerYear
2017]
azizi.zoleikha
Energy optimization based on routing protocols in wireless sensor network
[
Vol.3,
Issue
4
- AutumnYear
2017]