A

  • Aajami.Mojtaba Constraint Search based Test Data Generation to cover Prime Paths in Structural Testing [ Vol.4, Issue 1 - Spring Year 1402]
  • Adabi.Sahar Description of the Distributed Architecture for Processing Streaming Social Network Data [ Vol.4, Issue 2 - Summer Year 1402]
  • Ajdani.Seyyed Mohammad Vertex Decomposability of Path Complexes Associated to Cycle Graphs [ Vol.4, Issue 3 - Autumn Year 1402]
  • Ajoudani.Mojtaba Development of a multi-agent recommender system for intelligent shopping assistants [ Vol.4, Issue 2 - Summer Year 1402]
  • Akbari Sefideh.Reza Adaptive-PGRP: Routing Algorithm Based on PGRP Algorithm with Adaptive Hello Messages in VANET [ Vol.4, Issue 4 - Winter Year 1402]
  • Amini Shirkoohi.Marzieh An algorithm for clustering of insurance products and users in a collaborative filtering-based insurance recommender system and evaluating its performance based on the insurance recommendation [ Vol.4, Issue 3 - Autumn Year 1402]
  • Asadi.Mehdi Hermite-Hadamard (HH) integral inequality for m,q-preinvex functions [ Vol.4, Issue 1 - Spring Year 1402]

D

  • Derakhshan-Barjoei.Pouya A New Protocol for Lightweight Anonymous Authentication with Leading Security in Wireless Sensor Networks Based on IoT [ Vol.4, Issue 3 - Autumn Year 1402]

F

  • farhadi.amirfarhad Unsupervised Domain Adaptation for image classification based on Deep Neural Networks [ Vol.4, Issue 1 - Spring Year 1402]
  • Fazli.Ebrahim Constraint Search based Test Data Generation to cover Prime Paths in Structural Testing [ Vol.4, Issue 1 - Spring Year 1402]

G

  • Ganjalipour.Ebrahim Joint Learning Approach with Attention-based Model for Semantic Textual Similarity [ Vol.4, Issue 4 - Winter Year 1402]
  • ganji.binazir Description of the Distributed Architecture for Processing Streaming Social Network Data [ Vol.4, Issue 2 - Summer Year 1402]
  • Ghafouri Vayghan.Robabeh Adaptive-PGRP: Routing Algorithm Based on PGRP Algorithm with Adaptive Hello Messages in VANET [ Vol.4, Issue 4 - Winter Year 1402]

H

  • Haghiri.Hadis The opinion mining of Digikala reviews by semi-supervised support vector machine [ Vol.4, Issue 1 - Spring Year 1402]
  • Hariri.Mahdi Face Recognition in Images Using Viola_Jones Method and Image Texture Analysis [ Vol.4, Issue 2 - Summer Year 1402]
  • Heydarzadeh.Narmineh Face Recognition in Images Using Viola_Jones Method and Image Texture Analysis [ Vol.4, Issue 2 - Summer Year 1402]
  • Hosseini Shirvani.Mirsaeid Metaheuristic Algorithms for Feature Selection in Intrusion Detection Systems: A Systematic Review [ Vol.4, Issue 3 - Autumn Year 1402]
  • Hosseinzadeh.Ali-Asghar Joint Learning Approach with Attention-based Model for Semantic Textual Similarity [ Vol.4, Issue 4 - Winter Year 1402]

J

  • Javdani Gandomani.Taghi A Comparative Analysis of Online, Semi-Online, and Offline E-Learning Models versus In-Person Education: A Case Study [ Vol.4, Issue 2 - Summer Year 1402]

K

  • Karami.elaahe Applying of Zhang neural network in time-varying nonlinear function optimization [ Vol.4, Issue 2 - Summer Year 1402]
  • Karimi.zohre The opinion mining of Digikala reviews by semi-supervised support vector machine [ Vol.4, Issue 1 - Spring Year 1402]
  • kordrostami.sohrab Joint Learning Approach with Attention-based Model for Semantic Textual Similarity [ Vol.4, Issue 4 - Winter Year 1402]

M

  • Madadi.Asghar Vertex Decomposability of Path Complexes Associated to Cycle Graphs [ Vol.4, Issue 3 - Autumn Year 1402]
  • Manthouri.Mohammad ParsAirCall: Automated Conversational IVR in Airport Call Center using Deep Transfer Learning [ Vol.4, Issue 2 - Summer Year 1402]
  • mirzarezaee.mitra Unsupervised Domain Adaptation for image classification based on Deep Neural Networks [ Vol.4, Issue 1 - Spring Year 1402]
  • Moradloo.Majid Estimation of flicker generating feeders index with combined sampling-simulation method [ Vol.4, Issue 4 - Winter Year 1402]
  • Mousavi.zeinab Applying of Zhang neural network in time-varying nonlinear function optimization [ Vol.4, Issue 2 - Summer Year 1402]
  • movaghari.ali Description of the Distributed Architecture for Processing Streaming Social Network Data [ Vol.4, Issue 2 - Summer Year 1402]

N

  • Nazarian.Peyman Estimation of flicker generating feeders index with combined sampling-simulation method [ Vol.4, Issue 4 - Winter Year 1402]
  • Nazarpour.Mohammad Using the Modified Colonial Competition Algorithm to Increase the Speed and Accuracy of the Intelligent Intrusion Detection System [ Vol.4, Issue 1 - Spring Year 1402]
  • Nezafati.Navid Using the Modified Colonial Competition Algorithm to Increase the Speed and Accuracy of the Intelligent Intrusion Detection System [ Vol.4, Issue 1 - Spring Year 1402]
  • noroozi.Erfaneh Presenting A Hybrid Method of Deep Neural Networks to Prevent Intrusion in Computer Networks [ Vol.4, Issue 4 - Winter Year 1402]

P

  • Pourardebil khah.yashar Metaheuristic Algorithms for Feature Selection in Intrusion Detection Systems: A Systematic Review [ Vol.4, Issue 3 - Autumn Year 1402]
  • Pournaghi.Seyed Morteza A Similarity Measure for Link Prediction in Social Network [ Vol.4, Issue 1 - Spring Year 1402]

R

  • Rahimzadeh.Ashkan Investigating the Reaction of Economic Complexity to Information and Communication Technology Shocks in Iran(Using the Vector auto Regressive Model) [ Vol.4, Issue 4 - Winter Year 1402]
  • Rahsepar Fard.Kheirolla A Similarity Measure for Link Prediction in Social Network [ Vol.4, Issue 1 - Spring Year 1402]
  • Rajabzadeh Asaar.Maryam A New Protocol for Lightweight Anonymous Authentication with Leading Security in Wireless Sensor Networks Based on IoT [ Vol.4, Issue 3 - Autumn Year 1402]
  • Ramak.Jafar Investigating the role of new media capabilities (platform: Instagram) on e-commerce (intention to buy women's clothing) according to the role of brand attitude [ Vol.4, Issue 3 - Autumn Year 1402]
  • Rezaee.Ali Description of the Distributed Architecture for Processing Streaming Social Network Data [ Vol.4, Issue 2 - Summer Year 1402]
  • roknaldini.mohsen Presenting A Hybrid Method of Deep Neural Networks to Prevent Intrusion in Computer Networks [ Vol.4, Issue 4 - Winter Year 1402]

S

  • Saadati.Zahra Solving the Multi-Objective Problem of IoT Service Placement in Fog Computing Using Reinforcement Learning Approaches [ Vol.4, Issue 3 - Autumn Year 1402]
  • Sarabadani.Ali A Similarity Measure for Link Prediction in Social Network [ Vol.4, Issue 1 - Spring Year 1402]
  • Sharifi.Arash Unsupervised Domain Adaptation for image classification based on Deep Neural Networks [ Vol.4, Issue 1 - Spring Year 1402]
  • Shaterzadeh.Ali An algorithm for clustering of insurance products and users in a collaborative filtering-based insurance recommender system and evaluating its performance based on the insurance recommendation [ Vol.4, Issue 3 - Autumn Year 1402]
  • Shokouhyar.Sajjad Using the Modified Colonial Competition Algorithm to Increase the Speed and Accuracy of the Intelligent Intrusion Detection System [ Vol.4, Issue 1 - Spring Year 1402]

T

  • Tehranipour.Soheil ParsAirCall: Automated Conversational IVR in Airport Call Center using Deep Transfer Learning [ Vol.4, Issue 2 - Summer Year 1402]
  • Teimouri Yansari.Ramazan Development of a multi-agent recommender system for intelligent shopping assistants [ Vol.4, Issue 2 - Summer Year 1402]
  • teshnehlab.mohammad Unsupervised Domain Adaptation for image classification based on Deep Neural Networks [ Vol.4, Issue 1 - Spring Year 1402]

Y

  • Yazdani.Samaneh ParsAirCall: Automated Conversational IVR in Airport Call Center using Deep Transfer Learning [ Vol.4, Issue 2 - Summer Year 1402]

Z

  • Zarei.Mani Solving the Multi-Objective Problem of IoT Service Placement in Fog Computing Using Reinforcement Learning Approaches [ Vol.4, Issue 3 - Autumn Year 1402]
  • Ziyaei.Hadi Strategic Analysis of Rostam's Death in Shahnameh: A Game Theory Perspective [ Vol.4, Issue 4 - Winter Year 1402]