F

  • Faez.Karim Facial Expression Recognition Based on Structural Changes in Facial Skin [ Vol.5, Issue 1 - Winter Year 2012]
  • Faez.Karim MHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security [ Vol.9, Issue 1 - Winter Year 2016]
  • Faez.Karim Comparison of Different Linear Filter Design Methods for Handling Ocular Artifacts in Brain Computer Interface System [ Vol.7, Issue 1 - Winter Year 2014]
  • Fakharian.Ahmad Control of a Hyperchaotic System Via Generalized Backstepping Method [ Vol.5, Issue 2 - Summer Year 2012]
  • Fakharian.Ahmad A Back-Stepping Controller Scheme for Altitude Subsystem of Hypersonic Missile with ANFIS Algorithm [ Vol.12, Issue 1 - Winter Year 2019]
  • Fakharian.Ahmad Switching H2/H∞ Controller Design for Linear Singular Perturbation Systems [ Vol.3, Issue 2 - Summer Year 2010]
  • Fakharian.Ahmad Solving linear and nonlinear optimal control problem using modified adomian decomposition method [ Vol.1, Issue 1 - Winter Year 2008]
  • Fakharian.Ahmad Solving Path Following Problem for Car-Like Robot in the Presence of Sliding Effect via LMI Formulation [ Vol.10, Issue 2 - Summer Year 2017]
  • Fakharian.Ahmad Design and Simulation of Adaptive Neuro Fuzzy Inference Based Controller for Chaotic Lorenz System. [ Vol.11, Issue 1 - Winter Year 2018]
  • Farahani.Mohammad Turning P2P Networks into DDoS Engines: A Survey [ Vol.3, Issue 2 - Summer Year 2010]
  • farahmandjou.majid Self-Cleaning Measurement of Nano-Sized Photoactive TiO2 [ Vol.7, Issue 2 - Summer Year 2014]
  • Farhadi.Hamid Turning P2P Networks into DDoS Engines: A Survey [ Vol.3, Issue 2 - Summer Year 2010]
  • Farhoodi.Mojgan A Survey of Fake News: definition, features, detection approaches, crisis management process and open research issues [ Vol.17, Issue 2 - Summer Year 2024]
  • Farjaminezhad.Rasoul Soft Error Rate Estimation of Logic Circuits Using Recurrent Neural Networks [ Vol.12, Issue 2 - Summer Year 2019]
  • farsi.Mohammad ali A New Approach to Promote Safety in the Software Life Cycle [ Vol.12, Issue 1 - Winter Year 2019]
  • fartash.mahdi Types of Communication in Vehicular Ad-Hoc Networks: Various Techniques and Current Challenges in this Field [ Vol.15, Issue 1 - Winter Year 2022]
  • Fathi Ahmadsaraei.Maryam A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks [ Vol.6, Issue 2 - Summer Year 2013]
  • Fathi Ahmadsaraei.Maryam A Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks [ Vol.8, Issue 2 - Summer Year 2015]
  • fathi.alireza An Optimal Defect-free Synthesis of Four-bar Mechanisms by Using Constrained APT-FPSO Algorithm [ Vol.12, Issue 2 - Summer Year 2019]
  • fazel asl.vahid An Improved Real-Time Noise Removal Method in Video StreamBased on Pipe-and-Filter Architecture [ Vol.14, Issue 1 - Winter Year 2021]
  • Fekri-Ershad.Shervan Efficient Content-Based Video Retrieval in HEVC Standard Using Auto-Correloblock: A Novel Approach [ Vol.17, Issue 2 - Summer Year 2024]
  • foolad.shima Visual Tracking using Learning Histogram of Oriented Gradients by SVM on Mobile Robot [ Vol.11, Issue 2 - Summer Year 2018]