abaft.mojgan
A Reliable Routing Algorithm for Delay Sensitive Data in Body Area Networks
[
Vol.4,
Issue
4
- AutumnYear
2018]
Abdollahzadeh Aghbolagh.Mohsen
Fuzzy Clustering Based Routing in Wireless Body Area Networks to Increase the Life of Sensor Nodes
[
Vol.4,
Issue
3
- SummerYear
2018]
Adabi.Sahar
Metadata Enrichment for Automatic Data Entry Based on Relational Data Models
[
Vol.4,
Issue
3
- SummerYear
2018]
Adabi.Sahar
Formal Method in Service Composition in Heath Care Systems
[
Vol.4,
Issue
1
- WinterYear
2018]
ADARAMOLA.OJO
Network Parameters Evaluation in Vehicular Ad-hoc Network (VANET) Routing Protocols for Efficient Message Delivery in City Environment
[
Vol.4,
Issue
3
- SummerYear
2018]
ADARAMOLA.OJO
Network Investigation and Performance Analysis of ZigBee Technology using OPNET
[
Vol.4,
Issue
4
- AutumnYear
2018]
ADIGUN.OLATUNJI
Decentralized Fuzzy-PID Based Control Model for a Multivariable Liquid Level System
[
Vol.4,
Issue
4
- AutumnYear
2018]
Aghazarian.Vaheh
Statistical Analysis on IoT Research Trends: A Survey
[
Vol.4,
Issue
2
- SpringYear
2018]
akbarizadeh.gholamreza
Implementation of Random Forest Algorithm in Order to Use Big Data to Improve Real-Time Traffic Monitoring and Safety
[
Vol.4,
Issue
2
- SpringYear
2018]
B
B H.Swathi
IMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks
[
Vol.4,
Issue
2
- SpringYear
2018]
baatmaanghelich.zahra
Formal Method in Service Composition in Heath Care Systems
[
Vol.4,
Issue
1
- WinterYear
2018]
Bagheri Renani.Negin
A Review of Optical Routers in Photonic Networks-on-Chip: A Literature Survey
[
Vol.4,
Issue
3
- SummerYear
2018]
Bahramzadeh.Sahar
Statistical Analysis on IoT Research Trends: A Survey
[
Vol.4,
Issue
2
- SpringYear
2018]
Boruah.Minakshi
Evaluation of the Parameters Involved in the Iris Recognition System
[
Vol.4,
Issue
4
- AutumnYear
2018]
C
Chahardoli.Mostafa
Statistical Analysis on IoT Research Trends: A Survey
[
Vol.4,
Issue
2
- SpringYear
2018]
D
Dolatkia.Meysam
Metadata Enrichment for Automatic Data Entry Based on Relational Data Models
[
Vol.4,
Issue
3
- SummerYear
2018]
E
elameer.amer saleem
The Idea Of Using The Steganography As Encryption Tool
[
Vol.4,
Issue
1
- WinterYear
2018]
F
Faghihi.Alireza
Metadata Enrichment for Automatic Data Entry Based on Relational Data Models
[
Vol.4,
Issue
3
- SummerYear
2018]
faridi masouleh.marziyeh
The Impact of the Adoption Business Intelligence among Iranian Banks
[
Vol.4,
Issue
1
- WinterYear
2018]
fatholahzade.negin
Implementation of Random Forest Algorithm in Order to Use Big Data to Improve Real-Time Traffic Monitoring and Safety
[
Vol.4,
Issue
2
- SpringYear
2018]
H
H L.Gururaj
IMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks
[
Vol.4,
Issue
2
- SpringYear
2018]
Habibi.Rahimeh
Utilizes the Community Detection for Increase Trust using Multiplex Networks
[
Vol.4,
Issue
1
- WinterYear
2018]
Harounabadi.Ali
Utilizes the Community Detection for Increase Trust using Multiplex Networks
[
Vol.4,
Issue
1
- WinterYear
2018]
Hedayati.Alireza
Statistical Analysis on IoT Research Trends: A Survey
[
Vol.4,
Issue
2
- SpringYear
2018]
I
Ibrahim.Hamidah
An Effective Modality Conflict Model for Identifying Applicable Policies During Policy Evaluation
[
Vol.4,
Issue
4
- AutumnYear
2018]
K
Khalandi.Saman
A New Approach for Text Documents Classification with Invasive Weed Optimization and Naive Bayes Classifier
[
Vol.4,
Issue
3
- SummerYear
2018]
Khan.Azim
Survey on Perception of People Regarding Utilization of Computer Science & Information Technology in Manipulation of Big Data, Disease Detection & Drug Discovery
[
Vol.4,
Issue
4
- AutumnYear
2018]
Khatibi Bardsiri.Vahid
A New Optimized Hybrid Model Based On COCOMO to Increase the Accuracy of Software Cost Estimation
[
Vol.4,
Issue
1
- WinterYear
2018]
Khatibi.Amid
A New Architecture Based on Artificial Neural Network and PSO Algorithm for Estimating Software Development Effort
[
Vol.4,
Issue
1
- WinterYear
2018]
Khatibi.Amid
A New Approach to Solve N-Queen Problem with Parallel Genetic Algorithm
[
Vol.4,
Issue
2
- SpringYear
2018]
M
M.Hamsaveni
IMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks
[
Vol.4,
Issue
2
- SpringYear
2018]
Mohamadzadeh.Javad
A Reliable Routing Algorithm for Delay Sensitive Data in Body Area Networks
[
Vol.4,
Issue
4
- AutumnYear
2018]
Moradbeiky.Amin
A New Architecture Based on Artificial Neural Network and PSO Algorithm for Estimating Software Development Effort
[
Vol.4,
Issue
1
- WinterYear
2018]
motalebi.Mahdi
A Reliable Routing Algorithm for Delay Sensitive Data in Body Area Networks
[
Vol.4,
Issue
4
- AutumnYear
2018]
O
Olasina.Jamiu Rotimi
Network Investigation and Performance Analysis of ZigBee Technology using OPNET
[
Vol.4,
Issue
4
- AutumnYear
2018]
P
Pourmina.Mohammad Ali
Fuzzy Clustering Based Routing in Wireless Body Area Networks to Increase the Life of Sensor Nodes
[
Vol.4,
Issue
3
- SummerYear
2018]
R
Ramezanzad.Ali
Congestion estimation of router input ports in Network-on-Chip for efficient virtual allocation
[
Vol.4,
Issue
2
- SpringYear
2018]
Reshadi.Midia
Congestion estimation of router input ports in Network-on-Chip for efficient virtual allocation
[
Vol.4,
Issue
2
- SpringYear
2018]
Reza.Akram
Congestion estimation of router input ports in Network-on-Chip for efficient virtual allocation
[
Vol.4,
Issue
2
- SpringYear
2018]
REZAEE.MOHAMMAD SALEH
Formal Method in Service Composition in Heath Care Systems
[
Vol.4,
Issue
1
- WinterYear
2018]
romoozi.morteza
Implementation of Random Forest Algorithm in Order to Use Big Data to Improve Real-Time Traffic Monitoring and Safety
[
Vol.4,
Issue
2
- SpringYear
2018]
Rouhifar.Mehrin
Statistical Analysis on IoT Research Trends: A Survey
[
Vol.4,
Issue
2
- SpringYear
2018]
S
saljoughinejad.ramin
A New Optimized Hybrid Model Based On COCOMO to Increase the Accuracy of Software Cost Estimation
[
Vol.4,
Issue
1
- WinterYear
2018]
Sarowar.Md
Survey on Perception of People Regarding Utilization of Computer Science & Information Technology in Manipulation of Big Data, Disease Detection & Drug Discovery
[
Vol.4,
Issue
4
- AutumnYear
2018]
Shakil.Maruf
Survey on Perception of People Regarding Utilization of Computer Science & Information Technology in Manipulation of Big Data, Disease Detection & Drug Discovery
[
Vol.4,
Issue
4
- AutumnYear
2018]
shlig.ali
The Idea Of Using The Steganography As Encryption Tool
[
Vol.4,
Issue
1
- WinterYear
2018]
Sidi.Fatimah
An Effective Modality Conflict Model for Identifying Applicable Policies During Policy Evaluation
[
Vol.4,
Issue
4
- AutumnYear
2018]
T
Taheri Sarvetamin.Monire
A New Approach to Solve N-Queen Problem with Parallel Genetic Algorithm
[
Vol.4,
Issue
2
- SpringYear
2018]
Teo.Poh Kuang
An Effective Modality Conflict Model for Identifying Applicable Policies During Policy Evaluation
[
Vol.4,
Issue
4
- AutumnYear
2018]
U
Udzir.Nur Izura
An Effective Modality Conflict Model for Identifying Applicable Policies During Policy Evaluation
[
Vol.4,
Issue
4
- AutumnYear
2018]
Ullah.Mohammad
Survey on Perception of People Regarding Utilization of Computer Science & Information Technology in Manipulation of Big Data, Disease Detection & Drug Discovery
[
Vol.4,
Issue
4
- AutumnYear
2018]
V
V.Janhavi
IMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks
[
Vol.4,
Issue
2
- SpringYear
2018]
V.Megha
IMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks
[
Vol.4,
Issue
2
- SpringYear
2018]
Y
Yaghoubi.Elham
A Review of Optical Routers in Photonic Networks-on-Chip: A Literature Survey
[
Vol.4,
Issue
3
- SummerYear
2018]
Z
Zahedi.Mohammad Hadi
A New Approach to Solve N-Queen Problem with Parallel Genetic Algorithm
[
Vol.4,
Issue
2
- SpringYear
2018]