S

  • Sadatpour.Vahid A fault tolerance routing protocol considering defined reliability and energy consumption in wireless sensor networks [ Vol.1, Issue 1 - Winter Year 2015]
  • Sadiku.Suleiman Water Quality Index Estimation Model for Aquaculture System Using Artificial Neural Network [ Vol.5, Issue 3 - Summer Year 2019]
  • Safabakhsh.Reza Online multiple people tracking-by-detection in crowded scenes [ Vol.1, Issue 2 - Spring Year 2015]
  • Safaie.Aliasghar Mining Frequent Patterns in Uncertain and Relational Data Streams using the Landmark Windows [ Vol.1, Issue 4 - Autumn Year 2015]
  • Safari.Aref A Novel Fuzzy-C Means Image Segmentation Model for MRI Brain Tumor Diagnosis [ Vol.6, Issue 1 - Winter Year 2020]
  • saif.seyed mojtaba An Improved Imperialist Competitive Algorithm based on a new assimilation strategy [ Vol.2, Issue 2 - Spring Year 2016]
  • saljoughinejad.ramin A New Optimized Hybrid Model Based On COCOMO to Increase the Accuracy of Software Cost Estimation [ Vol.4, Issue 1 - Winter Year 2018]
  • sarikhani.rahil Improvement of effort estimation accuracy in software projects using a feature selection approach [ Vol.2, Issue 4 - Autumn Year 2016]
  • Sarowar.Md Survey on Perception of People Regarding Utilization of Computer Science & Information Technology in Manipulation of Big Data, Disease Detection & Drug Discovery [ Vol.4, Issue 4 - Autumn Year 2018]
  • Sattarivand.Mahdi A Genetic Programming-based trust model for P2P Networks [ Vol.1, Issue 2 - Spring Year 2015]
  • sedreh.zeynab Robot Path Planning Using Cellular Automata and Genetic Algorithm [ Vol.5, Issue 1 - Winter Year 2019]
  • Seif.Behzad Improving the security of wireless sensor networks using Game Theory [ Vol.7, Issue 2 - Spring Year 2021]
  • Seilsepour.Azam 2016 Olympic Games on Twitter: Sentiment Analysis of Sports Fans Tweets using Big Data Framework [ Vol.5, Issue 3 - Summer Year 2019]
  • Setayeshi.Saeed Recognizing the Emotional State Changes in Human Utterance by a Learning Statistical Method based on Gaussian Mixture Model [ Vol.3, Issue 2 - Spring Year 2017]
  • Seydi.Vahid Adaptive Rule-Base Influence Function Mechanism for Cultural Algorithm [ Vol.1, Issue 2 - Spring Year 2015]
  • Shabankhah.Mahmood Design Software Failure Mode and Effect Analysis using Fuzzy TOPSIS Based on Fuzzy Entropy [ Vol.6, Issue 3 - Summer Year 2020]
  • shah.Syed Atif Reengineering the Industrial CMMI [ Vol.4, Issue 3 - Summer Year 2018]
  • shahhoseini.Hamed Task Scheduling Algorithm Using Covariance Matrix Adaptation Evolution Strategy (CMA-ES) in Cloud Computing [ Vol.3, Issue 3 - Summer Year 2017]
  • shahmiri.lida Detecting and counting vehicles using adaptive background subtraction and morphological operators in real time systems [ Vol.5, Issue 4 - Autumn Year 2019]
  • shahpar.zahra Improvement of effort estimation accuracy in software projects using a feature selection approach [ Vol.2, Issue 4 - Autumn Year 2016]
  • Shakeri.Hassan Coverage Improvement In Wireless Sensor Networks Based On Fuzzy-Logic And Genetic Algorithm [ Vol.3, Issue 4 - Autumn Year 2017]
  • Shakil.Maruf Survey on Perception of People Regarding Utilization of Computer Science & Information Technology in Manipulation of Big Data, Disease Detection & Drug Discovery [ Vol.4, Issue 4 - Autumn Year 2018]
  • shamsinejad.Elham A Review of Anonymity Algorithms in Big Data [ Vol.7, Issue 3 - Summer Year 2021]
  • Sharafi.Avishan Adaptive Dynamic Data Placement Algorithm for Hadoop in Heterogeneous Environments [ Vol.2, Issue 4 - Autumn Year 2016]
  • Sharifi.Arash Recognizing the Emotional State Changes in Human Utterance by a Learning Statistical Method based on Gaussian Mixture Model [ Vol.3, Issue 2 - Spring Year 2017]
  • sharifi.mani Investigating the Factors Affecting the Readiness Level of IoT Technology Acceptance (Case Study: Financial Activists, Stock Exchange, and Financial Institutions) [ Vol.7, Issue 2 - Spring Year 2021]
  • Sheikhnajdy.Zahra An Improved Semantic Schema Matching Approach [ Vol.1, Issue 1 - Winter Year 2015]
  • shlig.ali The Idea Of Using The Steganography As Encryption Tool [ Vol.4, Issue 1 - Winter Year 2018]
  • Sidi.Fatimah An Effective Modality Conflict Model for Identifying Applicable Policies During Policy Evaluation [ Vol.4, Issue 4 - Autumn Year 2018]
  • Sima.Hamid Reza 2016 Olympic Games on Twitter: Sentiment Analysis of Sports Fans Tweets using Big Data Framework [ Vol.5, Issue 3 - Summer Year 2019]
  • Soleymanpour.Mona A new approach for data visualization problem [ Vol.1, Issue 4 - Autumn Year 2015]
  • soltani.nasim A review of methods for resource allocation and operational framework in cloud computing [ Vol.3, Issue 3 - Summer Year 2017]
  • soltani.somayeh Coverage Improvement In Wireless Sensor Networks Based On Fuzzy-Logic And Genetic Algorithm [ Vol.3, Issue 4 - Autumn Year 2017]
  • soltanshahi.minoo Diagnosis of hyperlipidemia in patients based on an artificial neural network with pso algorithm [ Vol.3, Issue 1 - Winter Year 2017]
  • soltanshahi.minoo Improving the palbimm scheduling algorithm for fault tolerance in cloud computing [ Vol.2, Issue 3 - Summer Year 2016]
  • Sonia Gharibzadeh.Sonia Optimal Trajectory Planning of a Box Transporter Mobile Robot [ Vol.2, Issue 3 - Summer Year 2016]
  • Subedi.Aroj Reconstruction of contour lines during the digitization of contour maps to build a digital elevation model [ Vol.6, Issue 4 - Autumn Year 2020]