H

  • H L.Gururaj IMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks [ Vol.4, Issue 2 - Spring Year 2018]
  • H L.Gururaj Routing Hole Handling Techniques for Wireless Sensor Networks: A Review [ Vol.6, Issue 2 - Spring Year 2020]
  • Habibi Najafi.M. EIDA: An Energy-Intrusion aware Data Aggregation Technique for Wireless Sensor Networks [ Vol.2, Issue 1 - Winter Year 2016]
  • Habibi.Rahimeh Utilizes the Community Detection for Increase Trust using Multiplex Networks [ Vol.4, Issue 1 - Winter Year 2018]
  • habqa.fatima The Kinematic Analysis Of Four Degrees Of Freedom For A Medical Robot And Control It By Labview And Arduino Mega2560 (Simulation And Implementation) [ Vol.6, Issue 1 - Winter Year 2020]
  • Haggi.Sevda An Optimization K-Modes Clustering Algorithm with Elephant Herding Optimization Algorithm for Crime Clustering [ Vol.6, Issue 2 - Spring Year 2020]
  • Haj Seyed Javadi.Haj Hamid Detecting Active Bot Networks Based on DNS Traffic Analysis [ Vol.5, Issue 3 - Summer Year 2019]
  • Haj Seyyed Javadi.Hamid Hybrid Key pre-distribution scheme for wireless sensor network based on combinatorial design [ Vol.1, Issue 3 - Summer Year 2015]
  • Haj Seyyed Javadi.Hamid An efficient solution for management of pre-distribution in wireless sensor networks [ Vol.2, Issue 2 - Spring Year 2016]
  • Haj Seyyed Javadi.Hamid Topology Control in Wireless Sensor Network using Fuzzy Logic [ Vol.1, Issue 2 - Spring Year 2015]
  • Haque.Dr. A. K. M. Fazlul A Detailed Exploration of Usability Statistics and Application Rating Based on Wireless Protocols [ Vol.6, Issue 1 - Winter Year 2020]
  • Harounabadi.Ali Utilizes the Community Detection for Increase Trust using Multiplex Networks [ Vol.4, Issue 1 - Winter Year 2018]
  • Hasan.Md. Samaun A Fuzzy TOPSIS Approach for Big Data Analytics Platform Selection [ Vol.5, Issue 1 - Winter Year 2019]
  • Hasanzadeh.Mohammad Reza An Overview of the Concepts, Classifications, and Methods of Population Initialization in Metaheuristic Algorithms [ Vol.7, Issue 1 - Winter Year 2021]
  • Hedayati.Alireza Statistical Analysis on IoT Research Trends: A Survey [ Vol.4, Issue 2 - Spring Year 2018]
  • hejazi jouybari.seyed navid Detecting and counting vehicles using adaptive background subtraction and morphological operators in real time systems [ Vol.5, Issue 4 - Autumn Year 2019]
  • Hosseinalipour.Ali An Optimization-based Learning Black Widow Optimization Algorithm for Text Psychology [ Vol.7, Issue 1 - Winter Year 2021]
  • Hosseini Shirvani.Mirsaeid Energy-aware and Reliable Service Placement of IoT applications on Fog Computing Platforms by Utilizing Whale Optimization Algorithm [ Vol.7, Issue 1 - Winter Year 2021]
  • Hosseini.Rahil A Fuzzy-GA Approach for Parameter Optimization of A Fuzzy Expert System for Diagnosis of Acute Lymphocytic Leukemia in Children [ Vol.2, Issue 2 - Spring Year 2016]
  • Hosseinpanahi.sahar Improve Spam Detection in the Internet Using Feature Selection based on the Metahuristic Algorithms [ Vol.7, Issue 2 - Spring Year 2021]
  • hosseinzadeh moghadam.mohammadreza A New Method for Intrusion Detection Using Genetic Algorithm and Neural network [ Vol.3, Issue 4 - Autumn Year 2017]
  • Hosseinzadeh.Farzad A Novel ICA-based Estimator for Software Cost Estimation [ Vol.1, Issue 4 - Autumn Year 2015]
  • Hosseinzadeh.Mehdi Overflow Detection in Residue Number System, Moduli Set {2n-1,2n,2n+1} [ Vol.2, Issue 1 - Winter Year 2016]
  • Hosseinzadeh.mhdi Analysis of Users’ Opinions about Reasons for Divorce [ Vol.2, Issue 4 - Autumn Year 2016]
  • Hosseinzadeh.mhdi A fault tolerance routing protocol considering defined reliability and energy consumption in wireless sensor networks [ Vol.1, Issue 1 - Winter Year 2015]