List of Articles Open Access Article Abstract Page Full-Text 1 - A New Control Flow Checking Method to Improve Reliability of Embedded Systems Hamed Nikookar Ahmad Patooghy Open Access Article Abstract Page Full-Text 2 - Providing an Image Watermarking Scheme Based on Chaotic Sequence and Cosine Transform, to Strengthen Interaction with a Variety of Software Attacks Mostafa Boroumandzadeh Open Access Article Abstract Page Full-Text 3 - A Hybrid Algorithm Based on Firefly Algorithm and Differential Evolution for Global Optimization Sosan Sarbazfard Ahmad Jafarian Open Access Article Abstract Page Full-Text 4 - An Improved W-LEACH Routing Protocol in Wireless Sensor Network Farhad Rad Zahra Moghtaderinasab Hamid Parvin Open Access Article Abstract Page Full-Text 5 - Using Heavy-Tailed Levy Model in Nonsubsampled Shearlet Transform Domain for Ultrasound Image Despeckling Saeed Jafari Sedigheh Ghofrani Open Access Article Abstract Page Full-Text 6 - Providing a Method to Identify Malicious Users in Electronic Banking System Using Fuzzy Clustering Techniques Leila Pourabdi Ali Harounabadi Open Access Article Abstract Page Full-Text 7 - GASA: Presentation of an Initiative Method Based on Genetic Algorithm for Task Scheduling in the Cloud Environment Somayeh Taherian Dehkordi Vahid Khatibi Bardsiri Open Access Article Abstract Page Full-Text 8 - SDN-based Defending Against ARP Poisoning Attack Zeynab Sasan Majid Salehi Open Access Article Abstract Page Full-Text 9 - An Efficient Model for Lip-reading in Persian Language Based on Visual Word and Fast Furrier Transform Combined with Neural Network Khadijeh Mirzaei Talarposhti Mehrzad Khaki Jamei