B

  • B H.Swathi IMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks [ Vol.4, Issue 2 - Spring Year 2018]
  • B H.Swathi Routing Hole Handling Techniques for Wireless Sensor Networks: A Review [ Vol.6, Issue 2 - Spring Year 2020]
  • baatmaanghelich.zahra Formal Method in Service Composition in Heath Care Systems [ Vol.4, Issue 1 - Winter Year 2018]
  • babaei.hamed Using fuzzy c-means clustering algorithm for common lecturer timetabling among departments [ Vol.3, Issue 1 - Winter Year 2017]
  • Bagheri Renani.Negin A Review of Optical Routers in Photonic Networks-on-Chip: A Literature Survey [ Vol.4, Issue 3 - Summer Year 2018]
  • bagheri.kobra E2DR: Energy Efficient Data Replication in Data Grid [ Vol.2, Issue 3 - Summer Year 2016]
  • bagheri.maryam Improvement of the mechanism of congestion avoidance in mobile networks [ Vol.2, Issue 2 - Spring Year 2016]
  • Bahramzadeh.Sahar Statistical Analysis on IoT Research Trends: A Survey [ Vol.4, Issue 2 - Spring Year 2018]
  • bahri.reza Typical Ka band Satellite Beacon Receiver Design for Propagation Experimentation [ Vol.1, Issue 2 - Spring Year 2015]
  • Bakhshi.HamidReza Combining Harmony search algorithm and Ant Colony Optimization algorithm to increase the lifetime of Wireless Sensor Networks [ Vol.1, Issue 3 - Summer Year 2015]
  • Bala.Jibril Performance Evaluation of the Effect of Optimally Tuned IMC and PID Controllers on a Poultry Feed Dispensing System [ Vol.6, Issue 4 - Autumn Year 2020]
  • Balavendran Joseph.Rani Deepika Intrinsic vs. Extrinsic Motivation in an Interactive Engineering Game [ Vol.5, Issue 1 - Winter Year 2019]
  • BAMASOOD.ZAHER Document Analysis And Classification Based On Passing Window [ Vol.6, Issue 1 - Winter Year 2020]
  • Bani Rostam.Touraj A Review of Fraud Detection Algorithms for Electronic Payment Card Transactions [ Vol.7, Issue 3 - Summer Year 2021]
  • BaniRostam.Hamid A Review of Fraud Detection Algorithms for Electronic Payment Card Transactions [ Vol.7, Issue 3 - Summer Year 2021]
  • banirostam.toraj A New Method for Intrusion Detection Using Genetic Algorithm and Neural network [ Vol.3, Issue 4 - Autumn Year 2017]
  • banirostam.toraj A Review of Anonymity Algorithms in Big Data [ Vol.7, Issue 3 - Summer Year 2021]
  • Barati.Ali A Survey on Routing Protocols in Vehicular Ad hoc Network [ Vol.7, Issue 3 - Summer Year 2021]
  • Barati.Hamid A Survey on Routing Protocols in Vehicular Ad hoc Network [ Vol.7, Issue 3 - Summer Year 2021]
  • barati.zahra Type-2 Fuzzy Logic Approach To Increase The Accuracy Of Software Development Effort Estimation [ Vol.2, Issue 4 - Autumn Year 2016]
  • Barazandeh.Danial A Novel Fuzzy-C Means Image Segmentation Model for MRI Brain Tumor Diagnosis [ Vol.6, Issue 1 - Winter Year 2020]
  • Barghi Jond.Hossein Optimal Trajectory Planning of a Box Transporter Mobile Robot [ Vol.2, Issue 3 - Summer Year 2016]
  • Barkhan.Masoud Designing and implementing a system for Automatic recognition of Persian letters by Lip-reading using image processing methods [ Vol.5, Issue 2 - Spring Year 2019]
  • barzegar.razieh Revolution in E-Learning by the Modern Educational Model in Mobile Learning [ Vol.2, Issue 1 - Winter Year 2016]
  • Big-Alabo.Ameze A MATLAB / SIMULINK BASED FAULT ANALYSIS OF SMALL HYDROPOWER PLANT [ Vol.5, Issue 4 - Autumn Year 2019]
  • Boruah.Minakshi Evaluation of the Parameters Involved in the Iris Recognition System [ Vol.4, Issue 4 - Autumn Year 2018]
  • Bozorgi Elize.Marzieh A Genetic Based Resource Management Algorithm Considering Energy Efficiency in Cloud Computing Systems [ Vol.3, Issue 4 - Autumn Year 2017]
  • Bozorgzadeh.Elham A Survey on Routing Protocols in Vehicular Ad hoc Network [ Vol.7, Issue 3 - Summer Year 2021]