T

  • tabarzad.mohammad Fuzzy Clustering Algorithm to Identify Sybil Attacks in Vehicular ad Hoc Networks [ Vol.16, Issue 2 - Summer Year 2023]
  • taghizabet.atiyeh An adaptive fuzzy-based algorithm with informed mutation for semi-supervised clustering [ Vol.18, Issue 2 - Summer Year 2025]
  • Taghizabet.Neda An adaptive fuzzy-based algorithm with informed mutation for semi-supervised clustering [ Vol.18, Issue 2 - Summer Year 2025]
  • tahami.ehsan The Effect of using Virtual Reality Game on Health and Fitness [ Vol.17, Issue 1 - Winter Year 2024]
  • tanha.jafar Enhancing the accuracy of quality-based Web Services classification through dataset feature enhancement [ Vol.18, Issue 2 - Summer Year 2025]
  • Tarokh.Jafar Determining COVID-19 Tweet Check-Worthiness: Based On Deep Learning Approach [ Vol.16, Issue 1 - Winter Year 2023]
  • Tarokh.Jafar Sales Budget Forecasting and Revision by Adaptive Network Fuzzy Base Inference System and Optimization Methods [ Vol.9, Issue 1 - Winter Year 2016]
  • Tarokh.Jafar A Novel Method for Selecting the Supplier Based on Association Rule Mining [ Vol.10, Issue 1 - Winter Year 2017]
  • Tarokh.Jafar A Knowledge Management Approach to Discovering Influential Users in Social Media [ Vol.11, Issue 1 - Winter Year 2018]
  • Tasnimi.Mahin Diagnosis of anomalies in Thyroid Gland Images Based on Feature Extraction from Capsule Network Architecture. [ Vol.14, Issue 2 - Summer Year 2021]
  • Tavoli.Reza Layered Defect Prediction Model for Software Product Lines Using Feature Fusion and Ensemble Classification [ Vol.18, Issue 2 - Summer Year 2025]
  • Tehranipour.Soheil A Novel Approach to Background Subtraction Using Visual Saliency Map [ Vol.8, Issue 2 - Summer Year 2015]
  • Toloie Ashlaghi.Abbas A Novel Classification Method: A Hybrid Approach Based on Large Margin Nearest Neighbor Classifier [ Vol.17, Issue 1 - Winter Year 2024]
  • Torghi haghighat.abolfazl A Rssi Based Localization Algorithm for WSN Using a Mobile Anchor Node [ Vol.8, Issue 1 - Winter Year 2015]
  • Torghi haghighat.abolfazl A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks [ Vol.6, Issue 2 - Summer Year 2013]
  • Torghi haghighat.abolfazl A Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks [ Vol.8, Issue 2 - Summer Year 2015]