Current Issue Issue 46 Vol 12 Summer 2023 Submit Your Paper Published Issues Vol. 12 ✓ Issue 46 - Summer 2023 ✓ Issue 45 - Spring 2023 Vol. 11 ✓ Issue 44 - Winter 2023 ✓ Issue 43 - Autumn 2022 ✓ Issue 42 - Summer 2022 ✓ Issue 41 - Spring 2022 Vol. 10 ✓ Issue 40 - Winter 2022 ✓ Issue 39 - Winter 2021 ✓ Issue 38 - Autumn 2021 ✓ Issue 37 - Summer 2021 Vol. 9 ✓ Issue 36 - Spring 2021 ✓ Issue 35 - Winter 2020 ✓ Issue 34 - Autumn 2020 ✓ Issue 33 - Summer 2020 Vol. 8 ✓ Issue 32 - Spring 2020 ✓ Issue 31 - Winter 2019 ✓ Issue 30 - Autumn 2019 ✓ Issue 29 - Summer 2019 Vol. 7 ✓ Issue 28 - Spring 2019 ✓ Issue 27 - Winter 2018 ✓ Issue 26 - Autumn 2018 ✓ Issue 25 - Summer 2018 Vol. 6 ✓ Issue 24 - Spring 2018 ✓ Issue 23 - Winter 2017 ✓ Issue 22 - Autumn 2017 ✓ Issue 21 - Summer 2017 Vol. 5 ✓ Issue 20 - Spring 2017 ✓ Issue 19 - Winter 2016 ✓ Issue 18 - Autumn 2016 ✓ Issue 17 - Summer 2016 Vol. 4 ✓ Issue 16 - Spring 2016 ✓ Issue 15 - Winter 2015 ✓ Issue 14 - Autumn 2015 ✓ Issue 13 - Summer 2015 Vol. 3 ✓ Issue 12 - Spring 2015 ✓ Issue 11 - Winter 2014 ✓ Issue 10 - Autumn 2014 ✓ Issue 9 - Summer 2014 Vol. 2 ✓ Issue 8 - Spring 2014 ✓ Issue 7 - Winter 2013 ✓ Issue 6 - Autumn 2013 ✓ Issue 5 - Summer 2013 Vol. 1 ✓ Issue 4 - Autumn 2013 ✓ Issue 3 - Summer 2012 ✓ Issue 2 - Spring 2012 ✓ Issue 1 - Winter 2012 Menu • About Journal • Aims and Scope • Publication Ethics • Authors Guide Contact Journal Browse • Current Issue • By Issue • Author Index • By Subject • By Author
List of Articles Seyed Hossein HosseiniNazhad Open Access Article Abstract Page Full-Text 1 - Comparative Performance Analysis of AODV,DSR, TORA and OLSR Routing Protocols in MANET Using OPNET Elham NesabGharamaleki s.Hossein Hosseini Nejad Open Access Article Abstract Page Full-Text 2 - Image classification optimization models using the convolutional neural network (CNN) approach and embedded deep learning system AKBAR PAYANDAN Seyed Hossein Hosseini Nazhad Open Access Article Abstract Page Full-Text 3 - Increase the accuracy and optimization of crypto security systems cryptography using GQC method abolfazl mostafaee S.Hossein Hosseini Nejad Open Access Article Abstract Page Full-Text 4 - Survey of Confidentiality and trust in recommender systems Seyed Hossein HosseiniNazhad Morteza Abdi Reyhan Open Access Article Abstract Page Full-Text 5 - Image classification optimization models using the convolutional neural network ( CNN ) approach and embedded deep learning system AKBAR PAYANDAN Seyed Hossein HosseiniNazhad Open Access Article Abstract Page Full-Text 6 - Investigating the structure and challenges of the Internet of Things Zhila Mohamadian Seyed Hossein HosseiniNazhad Open Access Article Abstract Page Full-Text 7 - A Survey of Intelligent Operating Systems pouya shams ahari Seyed Hossein HosseiniNazhad Open Access Article Abstract Page Full-Text 8 - Design of MobileNet algorithm to optimize image classification in Convolutional Neural Network (CNN) and implementation on FPGA AKBAR PAYANDAN S. Hossein Hosseini Nejad Open Access Article Abstract Page Full-Text 9 - Design of MobileNet algorithm to optimize image classification in Convolutional Neural Network ( CNN ) and implementation on FPGA AKBAR PAYANDAN Seyed Hossein HosseiniNazhad Open Access Article Abstract Page Full-Text 10 - Routing Protocols of Mobile Ad-hoc Network MANET S.Hossein Hosseini Nejad Elham NesabGharamaleki