A

  • abbasi.naser Applications of Virtual Reality and Augmented Reality in Education [ Vol.2, Issue 3 - Autumn Year 1400]
  • Afsardeir.Mahsa A new algorithm for data clustering using combination of genetic and Fireflies algorithms [ Vol.2, Issue 4 - Winter Year 1400]
  • Afsardeir.mansoure A new algorithm for data clustering using combination of genetic and Fireflies algorithms [ Vol.2, Issue 4 - Winter Year 1400]
  • Afzali.Mehdi Use data mining to identify factors affecting students' academic failure [ Vol.2, Issue 1 - Spring Year 1400]
  • Afzali.Mehdi Use of ICD (International Classification of Diseases) to prepare medical data in decision support systems [ Vol.2, Issue 2 - Summer Year 1400]
  • Ahmadifar.hamidreza Adversarial Attacks in a text sentiment Analysis model [ Vol.2, Issue 2 - Summer Year 1400]
  • Akhlaghpour.Mohammad Providing a Solution Based on Fuzzy Logic to Reduce False Positive Alarms in The Intrusion Detection System [ Vol.2, Issue 4 - Winter Year 1400]
  • Asgari.Naser Adaptive analysis of graphical structural metric for anomaly detection in social networks [ Vol.2, Issue 1 - Spring Year 1400]
  • Ashtiani.Mehrdad A Two-Layered Trust Management Approach in Software Defined Wireless Sensor Networks [ Vol.2, Issue 3 - Autumn Year 1400]

B

  • Babaei,.hamed A New Approach to The University Course Timetabling Problem based on Clustering Algorithms & Fuzzy Multi-Criteria Decision Making [ Vol.2, Issue 3 - Autumn Year 1400]
  • babakhani.khadijeh Applications of Virtual Reality and Augmented Reality in Education [ Vol.2, Issue 3 - Autumn Year 1400]
  • Bakouei.Faezeh Numerical solution of nonlinear fractional pantograph differential equations with boundary conditions using Jacobi polynomials [ Vol.2, Issue 1 - Spring Year 1400]

D

  • Davoudi.Maryam A smart clinical Lab Assistant: From design to build [ Vol.2, Issue 2 - Summer Year 1400]

E

  • Ebadati Esfahani.Navid Mohammad A Two-Layered Trust Management Approach in Software Defined Wireless Sensor Networks [ Vol.2, Issue 3 - Autumn Year 1400]
  • eskandari.davod A New Approach to The University Course Timetabling Problem based on Clustering Algorithms & Fuzzy Multi-Criteria Decision Making [ Vol.2, Issue 3 - Autumn Year 1400]
  • Ezazi.Yasamin Parkinson’s disease detection using EEG signals analysis based on Walsh Hadamard transform [ Vol.2, Issue 2 - Summer Year 1400]

F

  • FALLAH TORBEHBAR.SHAHROKH A blind and robust video watermarking method based on hybrid 3-D transform [ Vol.2, Issue 4 - Winter Year 1400]
  • fareghzadeh.nafiseh Developing a performance aware cloud infrastructure in e-learning system [ Vol.2, Issue 1 - Spring Year 1400]

G

  • Ghaderyan.Peyvand Differential Information Extraction of Electroencephalogram Signals for Obsessive-Compulsive Disorder Detection [ Vol.2, Issue 1 - Spring Year 1400]
  • Ghaderyan.Peyvand Parkinson’s disease detection using EEG signals analysis based on Walsh Hadamard transform [ Vol.2, Issue 2 - Summer Year 1400]
  • ghasemi nezhad.Yaser Improving Company Performance with Emphasis on Acquisition and Utilization of Market Intelligence: A Case Study of Mellat Bank [ Vol.2, Issue 3 - Autumn Year 1400]
  • Ghasemian.Fatemeh A Novel Semi-Supervised Technique for Selecting Appropriate Sperm in Infertility Treatment [ Vol.2, Issue 1 - Spring Year 1400]

H

  • HajiZadeh.Peyman Improving Company Performance with Emphasis on Acquisition and Utilization of Market Intelligence: A Case Study of Mellat Bank [ Vol.2, Issue 3 - Autumn Year 1400]
  • Hamzelou.Nasrin A Two-Layered Trust Management Approach in Software Defined Wireless Sensor Networks [ Vol.2, Issue 3 - Autumn Year 1400]
  • hasanabadi.Ismael Improving Company Performance with Emphasis on Acquisition and Utilization of Market Intelligence: A Case Study of Mellat Bank [ Vol.2, Issue 3 - Autumn Year 1400]
  • hasanzadeh.mohammadreza A New Approach to The University Course Timetabling Problem based on Clustering Algorithms & Fuzzy Multi-Criteria Decision Making [ Vol.2, Issue 3 - Autumn Year 1400]
  • hemmati.hamid Identifying and prioritizing the barriers of using Instgaram for developing small businesses in Karaj [ Vol.2, Issue 3 - Autumn Year 1400]

J

  • Jafari.Mahdi A Comparative Study of Open-Source Software for Deployment and Management of Cloud Computing Utilizing a Big Data Processing Quality Model [ Vol.2, Issue 4 - Winter Year 1400]

K

  • Kalbasi.Amir A Comparative Study of Open-Source Software for Deployment and Management of Cloud Computing Utilizing a Big Data Processing Quality Model [ Vol.2, Issue 4 - Winter Year 1400]

M

  • Manzari.Farzaneh Differential Information Extraction of Electroencephalogram Signals for Obsessive-Compulsive Disorder Detection [ Vol.2, Issue 1 - Spring Year 1400]
  • Mirroshandel.Seyed Abolghasem A Novel Semi-Supervised Technique for Selecting Appropriate Sperm in Infertility Treatment [ Vol.2, Issue 1 - Spring Year 1400]
  • Mirroshandel.Seyed Abolghasem Adversarial Attacks in a text sentiment Analysis model [ Vol.2, Issue 2 - Summer Year 1400]
  • Modiri.Nasser Strategic, Tactical, Technical, and Operational Requirements of Executive Organizations for Developing Cyber Security Vulnerability Calculator [ Vol.2, Issue 3 - Autumn Year 1400]
  • Modiri.Nasser Verification and Validation for Software Requirements [ Vol.2, Issue 4 - Winter Year 1400]
  • Modiri.Nasser Developing a performance aware cloud infrastructure in e-learning system [ Vol.2, Issue 1 - Spring Year 1400]
  • MohammadKhanihajikhagehlou.Behzad A New Approach to The University Course Timetabling Problem based on Clustering Algorithms & Fuzzy Multi-Criteria Decision Making [ Vol.2, Issue 3 - Autumn Year 1400]
  • Mokarrami Sefidab.Sahar Adversarial Attacks in a text sentiment Analysis model [ Vol.2, Issue 2 - Summer Year 1400]
  • Mokarrami.Mahdi Adversarial Attacks in a text sentiment Analysis model [ Vol.2, Issue 2 - Summer Year 1400]
  • mokhtari.hamidreza Verification and Validation for Software Requirements [ Vol.2, Issue 4 - Winter Year 1400]
  • Moradi.Ali A Syndrome Based Decoding of Linear Codes Using Deep Learning Method [ Vol.2, Issue 2 - Summer Year 1400]
  • moradi.mahmoud Use data mining to identify factors affecting students' academic failure [ Vol.2, Issue 1 - Spring Year 1400]
  • moradi.mahmoud Use of ICD (International Classification of Diseases) to prepare medical data in decision support systems [ Vol.2, Issue 2 - Summer Year 1400]

N

  • Najafi.Mahmood Use data mining to identify factors affecting students' academic failure [ Vol.2, Issue 1 - Spring Year 1400]
  • Nazarian.Peyman Definition of Bus Priority Vector to Solve Distribution Load Flow for Radial Networks using MATLAB [ Vol.2, Issue 4 - Winter Year 1400]
  • Nemati.Somayeh Numerical solution of nonlinear fractional pantograph differential equations with boundary conditions using Jacobi polynomials [ Vol.2, Issue 1 - Spring Year 1400]

R

  • Rajabizadeh.Iman Strategic, Tactical, Technical, and Operational Requirements of Executive Organizations for Developing Cyber Security Vulnerability Calculator [ Vol.2, Issue 3 - Autumn Year 1400]
  • rajaee.behroz Applications of Virtual Reality and Augmented Reality in Education [ Vol.2, Issue 3 - Autumn Year 1400]
  • Rezaeian.Fatemeh A smart clinical Lab Assistant: From design to build [ Vol.2, Issue 2 - Summer Year 1400]

S

  • Sadeghi Bigham.Saba A smart clinical Lab Assistant: From design to build [ Vol.2, Issue 2 - Summer Year 1400]
  • Salari.Golsa A smart clinical Lab Assistant: From design to build [ Vol.2, Issue 2 - Summer Year 1400]
  • salimi.jafar Applications of Virtual Reality and Augmented Reality in Education [ Vol.2, Issue 3 - Autumn Year 1400]

T

  • Tahghighi Sharabyan.Mohammad A Syndrome Based Decoding of Linear Codes Using Deep Learning Method [ Vol.2, Issue 2 - Summer Year 1400]
  • Tavakkoli.Asefeh A Novel Semi-Supervised Technique for Selecting Appropriate Sperm in Infertility Treatment [ Vol.2, Issue 1 - Spring Year 1400]

Z

  • Zargari.ّFarzad A blind and robust video watermarking method based on hybrid 3-D transform [ Vol.2, Issue 4 - Winter Year 1400]