A

  • Aajami.Mojtaba Constraint Search based Test Data Generation to cover Prime Paths in Structural Testing [ Vol.4, Issue 1 - Spring Year 1402]
  • Aajami.Mojtaba A New Method to Improve Energy Consumption in Wireless Camera Sensor Networks [ Vol.5, Issue 1 - Spring Year 1403]
  • abbasi.naser Applications of Virtual Reality and Augmented Reality in Education [ Vol.2, Issue 3 - Autumn Year 1400]
  • abbasi.neda Dynamic Migration of SDN-based Switches to Distribute Control Layer Load and Increase Efficiency Using Ryu Controller [ Vol.3, Issue 4 - Winter Year 1401]
  • abbaszadeh.edris The effect of the organizational approach in knowledge sharing on the performance of information security management [ Vol.3, Issue 1 - Spring Year 1401]
  • Adabi.Sahar Description of the Distributed Architecture for Processing Streaming Social Network Data [ Vol.4, Issue 2 - Summer Year 1402]
  • Adeli.Ebrahim Intrusions detection system in the cloud computing using heterogeneity detection technique [ Vol.3, Issue 1 - Spring Year 1401]
  • Afsardeir.Mahsa A new algorithm for data clustering using combination of genetic and Fireflies algorithms [ Vol.2, Issue 4 - Winter Year 1400]
  • Afsardeir.mansoure A new algorithm for data clustering using combination of genetic and Fireflies algorithms [ Vol.2, Issue 4 - Winter Year 1400]
  • Afzali.Mehdi Use of ICD (International Classification of Diseases) to prepare medical data in decision support systems [ Vol.2, Issue 2 - Summer Year 1400]
  • Afzali.Mehdi A new approach for data cleaning to improve quality of data warehouse [ Vol.1, Issue 2 - Winter Year 1399]
  • Afzali.Mehdi Increasing the accuracy of identifying overlapping communities using weighted edges [ Vol.1, Issue 1 - Autumn Year 1399]
  • Afzali.Mehdi Use data mining to identify factors affecting students' academic failure [ Vol.2, Issue 1 - Spring Year 1400]
  • ahmadi.bahar Software risk prediction by Grasshopper Optimization Algorithm and Machine learning [ Vol.3, Issue 3 - Autumn Year 1401]
  • Ahmadian.Sajad A Trust-based Recommender System Using an Improved Particle Swarm Optimization Algorithm [ Vol.5, Issue 1 - Spring Year 1403]
  • Ahmadifar.hamidreza Adversarial Attacks in a text sentiment Analysis model [ Vol.2, Issue 2 - Summer Year 1400]
  • Ajdani.Seyyed Mohammad Vertex Decomposability of Path Complexes Associated to Cycle Graphs [ Vol.4, Issue 3 - Autumn Year 1402]
  • Ajoudani.Mojtaba Development of a multi-agent recommender system for intelligent shopping assistants [ Vol.4, Issue 2 - Summer Year 1402]
  • Akbari Sefideh.Reza Adaptive-PGRP: Routing Algorithm Based on PGRP Algorithm with Adaptive Hello Messages in VANET [ Vol.4, Issue 4 - Winter Year 1402]
  • Akhlaghpour.Mohammad Providing a Solution Based on Fuzzy Logic to Reduce False Positive Alarms in The Intrusion Detection System [ Vol.2, Issue 4 - Winter Year 1400]
  • Amini Shirkoohi.Marzieh An algorithm for clustering of insurance products and users in a collaborative filtering-based insurance recommender system and evaluating its performance based on the insurance recommendation [ Vol.4, Issue 3 - Autumn Year 1402]
  • Amiri.Ali A Novel Semi-Supervised Approach for Improving efficiency of E-Learning [ Vol.3, Issue 3 - Autumn Year 1401]
  • amiri.امیری Identification and ranking of factors influencing the attraction of health tourists by hospitals based on the Lassol communication model using the fuzzy TOPSIS technique. [ Vol.5, Issue 1 - Spring Year 1403]
  • Ansaripour.Sadegh Comparison of the classification methods in software development effort estimation [ Vol.3, Issue 2 - Summer Year 1401]
  • Asadi.Mehdi Hermite-Hadamard (HH) integral inequality for m,q-preinvex functions [ Vol.4, Issue 1 - Spring Year 1402]
  • asghari.seyed amir SDC-causing Error Detection and Mitigation Based on Failure rate Prediction without Fault Injection [ Vol.3, Issue 4 - Winter Year 1401]
  • Ashtiani.Mehrdad A Two-Layered Trust Management Approach in Software Defined Wireless Sensor Networks [ Vol.2, Issue 3 - Autumn Year 1400]
  • azarbayejani.mina Investigating the effect of electronic recommendation stimuli on acceptance of banking along with initial trust [ Vol.1, Issue 2 - Winter Year 1399]

B

  • Babaei,.hamed A New Approach to The University Course Timetabling Problem based on Clustering Algorithms & Fuzzy Multi-Criteria Decision Making [ Vol.2, Issue 3 - Autumn Year 1400]
  • Babaei.Rasul Presentation a secure structure for designing and implementing a comprehensive system of geographical marking of the country's places [ Vol.1, Issue 1 - Autumn Year 1399]
  • babakhani.khadijeh Applications of Virtual Reality and Augmented Reality in Education [ Vol.2, Issue 3 - Autumn Year 1400]
  • baharvand.meisam Determination of thermal distribution in compact substations [ Vol.1, Issue 1 - Autumn Year 1399]
  • Bakeshlo.Maryam A New Approach Based on Deep Learning Algorithms to Study Effective Factors of Using Social Networks on Students’ Performance [ Vol.3, Issue 4 - Winter Year 1401]
  • Bakouei.Faezeh Numerical solution of nonlinear fractional pantograph differential equations with boundary conditions using Jacobi polynomials [ Vol.2, Issue 1 - Spring Year 1400]
  • Balaee kodehi.Javad Provide a new approach to identify and detect credit card fraud using ANN - ICA [ Vol.3, Issue 2 - Summer Year 1401]
  • Barari.Yaser Optimal allocation of electric vehicle charging parking lots in the distribution system with reliability evaluation [ Vol.5, Issue 2 - Summer Year 1403]
  • bayat.javad A New Method to Improve Energy Consumption in Wireless Camera Sensor Networks [ Vol.5, Issue 1 - Spring Year 1403]
  • Bazargani.Mahdi Presenting a novel method based on collaborative filtering for nearest neighbor detection in recommender systems [ Vol.1, Issue 1 - Autumn Year 1399]
  • bazargani.mehdi Investigate The Relationship Between product evaluation and Consumer Acceptance of the Intention to Repurchase in the E-commerce Environment (Case Study: Digikala) [ Vol.3, Issue 3 - Autumn Year 1401]

C

  • chenari.khadijeh Types of e-learning and Expert-Based Evaluation [ Vol.1, Issue 1 - Autumn Year 1399]
  • cheshomi.ali A MLP Neural Network Approach for Validation of Health Insurance Customers in Big Data Environments [ Vol.5, Issue 2 - Summer Year 1403]

D

  • Davoudi.Maryam A smart clinical Lab Assistant: From design to build [ Vol.2, Issue 2 - Summer Year 1400]
  • Derakhshan-Barjoei.Pouya A New Protocol for Lightweight Anonymous Authentication with Leading Security in Wireless Sensor Networks Based on IoT [ Vol.4, Issue 3 - Autumn Year 1402]

E

  • Ebadati Esfahani.Navid Mohammad A Two-Layered Trust Management Approach in Software Defined Wireless Sensor Networks [ Vol.2, Issue 3 - Autumn Year 1400]
  • Ebrahimi Salari.Taghi A MLP Neural Network Approach for Validation of Health Insurance Customers in Big Data Environments [ Vol.5, Issue 2 - Summer Year 1403]
  • Ehtesham Rasii.Reza The effect of the organizational approach in knowledge sharing on the performance of information security management [ Vol.3, Issue 1 - Spring Year 1401]
  • eskandari.davod A New Approach to The University Course Timetabling Problem based on Clustering Algorithms & Fuzzy Multi-Criteria Decision Making [ Vol.2, Issue 3 - Autumn Year 1400]
  • Eskandari.Marzieh Platform-Based Business Strategy [ Vol.1, Issue 1 - Autumn Year 1399]
  • Eskandari.Marzieh HEAL: Hybrid Education and Learning in STEM [ Vol.1, Issue 2 - Winter Year 1399]
  • Eyvazi.moluk Detection of Accelerated Osteointegration in Surface Modified Dental Implants with Sensor Nodes Located in Wireless Network of Body Areas [ Vol.3, Issue 3 - Autumn Year 1401]
  • Ezazi.Yasamin Parkinson’s disease detection using EEG signals analysis based on Walsh Hadamard transform [ Vol.2, Issue 2 - Summer Year 1400]

F

  • Fallah Tafti.Mehdi Comparison of Linear and Non-linear Support Vector Machine Method with Linear Regression for Short-term Prediction of Queue Length Parameter and Arrival Volume of Intersection Approach for Adaptive Control of Individual Traffic Lights [ Vol.3, Issue 2 - Summer Year 1401]
  • Fallah Tafti.Mehdi Evaluating the Performance of Intelligent Traffic Signals Based on Firefly Algorithm Applied in an Adaptive Control System [ Vol.3, Issue 3 - Autumn Year 1401]
  • FALLAH TORBEHBAR.SHAHROKH A blind and robust video watermarking method based on hybrid 3-D transform [ Vol.2, Issue 4 - Winter Year 1400]
  • fareghzadeh.nafiseh Developing a performance aware cloud infrastructure in e-learning system [ Vol.2, Issue 1 - Spring Year 1400]
  • farhadi.amirfarhad Unsupervised Domain Adaptation for image classification based on Deep Neural Networks [ Vol.4, Issue 1 - Spring Year 1402]
  • faridpour.maryam Optimizing Smart Building Energy Consumption through Integrated Thermal and Electrical Energy Management with Demand-Side Control [ Vol.5, Issue 1 - Spring Year 1403]
  • Fazeli.Mahdi SDC-causing Error Detection and Mitigation Based on Failure rate Prediction without Fault Injection [ Vol.3, Issue 4 - Winter Year 1401]
  • Fazli.Ebrahim Constraint Search based Test Data Generation to cover Prime Paths in Structural Testing [ Vol.4, Issue 1 - Spring Year 1402]
  • Feili.Ardalan Developing a strategy for the use of the Internet of Things in Shiraz residential buildings with a combined DANP-SWOT approach [ Vol.3, Issue 2 - Summer Year 1401]

G

  • Ganjalipour.Ebrahim Joint Learning Approach with Attention-based Model for Semantic Textual Similarity [ Vol.4, Issue 4 - Winter Year 1402]
  • ganji.binazir Description of the Distributed Architecture for Processing Streaming Social Network Data [ Vol.4, Issue 2 - Summer Year 1402]
  • Ghaderyan.Peyvand Differential Information Extraction of Electroencephalogram Signals for Obsessive-Compulsive Disorder Detection [ Vol.2, Issue 1 - Spring Year 1400]
  • Ghaderyan.Peyvand Parkinson’s disease detection using EEG signals analysis based on Walsh Hadamard transform [ Vol.2, Issue 2 - Summer Year 1400]
  • Ghafouri Vayghan.Robabeh Adaptive-PGRP: Routing Algorithm Based on PGRP Algorithm with Adaptive Hello Messages in VANET [ Vol.4, Issue 4 - Winter Year 1402]
  • GHAREBAGHI.FARHAD A Novel Semi-Supervised Approach for Improving efficiency of E-Learning [ Vol.3, Issue 3 - Autumn Year 1401]
  • ghasemi nezhad.Yaser Improving Company Performance with Emphasis on Acquisition and Utilization of Market Intelligence: A Case Study of Mellat Bank [ Vol.2, Issue 3 - Autumn Year 1400]
  • Ghasemian.Fatemeh A Novel Semi-Supervised Technique for Selecting Appropriate Sperm in Infertility Treatment [ Vol.2, Issue 1 - Spring Year 1400]
  • Gonbadi.Leila Sentiment Analysis of People’s opinion about Iranian National Cars with BERT [ Vol.3, Issue 4 - Winter Year 1401]

H

  • Haghiri.Hadis The opinion mining of Digikala reviews by semi-supervised support vector machine [ Vol.4, Issue 1 - Spring Year 1402]
  • HajiZadeh.Peyman Improving Company Performance with Emphasis on Acquisition and Utilization of Market Intelligence: A Case Study of Mellat Bank [ Vol.2, Issue 3 - Autumn Year 1400]
  • Hamzelou.Nasrin A Two-Layered Trust Management Approach in Software Defined Wireless Sensor Networks [ Vol.2, Issue 3 - Autumn Year 1400]
  • Hariri.Mahdi Improve the Quality of Mammogram Images by Image Processing Techniques [ Vol.3, Issue 1 - Spring Year 1401]
  • Hariri.Mahdi Face Recognition in Images Using Viola_Jones Method and Image Texture Analysis [ Vol.4, Issue 2 - Summer Year 1402]
  • hasanabadi.Ismael Improving Company Performance with Emphasis on Acquisition and Utilization of Market Intelligence: A Case Study of Mellat Bank [ Vol.2, Issue 3 - Autumn Year 1400]
  • hasanzadeh.mohammadreza A New Approach to The University Course Timetabling Problem based on Clustering Algorithms & Fuzzy Multi-Criteria Decision Making [ Vol.2, Issue 3 - Autumn Year 1400]
  • Hashemi.Seyyed Mohammad R. Leveraging Machine Learning for Optimal Trade Entry Point Identification in the Cryptocurrency Market [ Vol.5, Issue 2 - Summer Year 1403]
  • Hashemi.Seyyed Mohammad R. Optimizing Smart Building Energy Consumption through Integrated Thermal and Electrical Energy Management with Demand-Side Control [ Vol.5, Issue 1 - Spring Year 1403]
  • hemmati.hamid Identifying and prioritizing the barriers of using Instgaram for developing small businesses in Karaj [ Vol.2, Issue 3 - Autumn Year 1400]
  • Heydarzadeh.Narmineh Face Recognition in Images Using Viola_Jones Method and Image Texture Analysis [ Vol.4, Issue 2 - Summer Year 1402]
  • Hosseini Shirvani.Mirsaeid Metaheuristic Algorithms for Feature Selection in Intrusion Detection Systems: A Systematic Review [ Vol.4, Issue 3 - Autumn Year 1402]
  • Hosseinzadeh.Ali-Asghar Joint Learning Approach with Attention-based Model for Semantic Textual Similarity [ Vol.4, Issue 4 - Winter Year 1402]
  • Hossinnezhad.Rozbeh Intrusions detection system in the cloud computing using heterogeneity detection technique [ Vol.3, Issue 1 - Spring Year 1401]

J

  • jabbari.fariba Evaluating the Performance of Intelligent Traffic Signals Based on Firefly Algorithm Applied in an Adaptive Control System [ Vol.3, Issue 3 - Autumn Year 1401]
  • jafari,.Mostafa Types of e-learning and Expert-Based Evaluation [ Vol.1, Issue 1 - Autumn Year 1399]
  • Jafari.Mahdi A Comparative Study of Open-Source Software for Deployment and Management of Cloud Computing Utilizing a Big Data Processing Quality Model [ Vol.2, Issue 4 - Winter Year 1400]
  • Javdani Gandomani.Taghi Software risk prediction by Grasshopper Optimization Algorithm and Machine learning [ Vol.3, Issue 3 - Autumn Year 1401]
  • Javdani Gandomani.Taghi An Algorithm to Measure the Attention Rate of Mobile Application Users using App Reviews [ Vol.5, Issue 2 - Summer Year 1403]
  • Javdani Gandomani.Taghi A Comparative Analysis of Online, Semi-Online, and Offline E-Learning Models versus In-Person Education: A Case Study [ Vol.4, Issue 2 - Summer Year 1402]
  • Javdani Gandomani.Taghi Comparison of the classification methods in software development effort estimation [ Vol.3, Issue 2 - Summer Year 1401]
  • Joz Ashoori.Amir QoS Management Solution in Software Defined Networking using Ryu Controller [ Vol.3, Issue 1 - Spring Year 1401]

K

  • kaffash.ali An Effective and Lightweight Intrusion Detection for IoT based on Fog and Cloud using KNN Classification [ Vol.5, Issue 2 - Summer Year 1403]
  • Kalbasi.Amir A Comparative Study of Open-Source Software for Deployment and Management of Cloud Computing Utilizing a Big Data Processing Quality Model [ Vol.2, Issue 4 - Winter Year 1400]
  • kamel.seyed reza An Effective and Lightweight Intrusion Detection for IoT based on Fog and Cloud using KNN Classification [ Vol.5, Issue 2 - Summer Year 1403]
  • Karami.elaahe Applying of Zhang neural network in time-varying nonlinear function optimization [ Vol.4, Issue 2 - Summer Year 1402]
  • Karimi.Shiva QoS Management Solution in Software Defined Networking using Ryu Controller [ Vol.3, Issue 1 - Spring Year 1401]
  • Karimi.Shiva Dynamic Migration of SDN-based Switches to Distribute Control Layer Load and Increase Efficiency Using Ryu Controller [ Vol.3, Issue 4 - Winter Year 1401]
  • Karimi.zohre The opinion mining of Digikala reviews by semi-supervised support vector machine [ Vol.4, Issue 1 - Spring Year 1402]
  • Karimpour.Jaber Presentation a secure structure for designing and implementing a comprehensive system of geographical marking of the country's places [ Vol.1, Issue 1 - Autumn Year 1399]
  • Khavasi.Ali.A A Framework For Using Network Virtualization Functions For Video Streams [ Vol.1, Issue 2 - Winter Year 1399]
  • Kheirabadi.Maryam An Effective and Lightweight Intrusion Detection for IoT based on Fog and Cloud using KNN Classification [ Vol.5, Issue 2 - Summer Year 1403]
  • Khosravi-farsani.Hadi Software risk prediction by Grasshopper Optimization Algorithm and Machine learning [ Vol.3, Issue 3 - Autumn Year 1401]
  • kooshan moghadam.mohammad ali Comparison of Linear and Non-linear Support Vector Machine Method with Linear Regression for Short-term Prediction of Queue Length Parameter and Arrival Volume of Intersection Approach for Adaptive Control of Individual Traffic Lights [ Vol.3, Issue 2 - Summer Year 1401]
  • kordrostami.sohrab Joint Learning Approach with Attention-based Model for Semantic Textual Similarity [ Vol.4, Issue 4 - Winter Year 1402]

M

  • Madadi.Asghar Vertex Decomposability of Path Complexes Associated to Cycle Graphs [ Vol.4, Issue 3 - Autumn Year 1402]
  • Manteqipour.Mahnaz Designing a hybrid model for classification of imbalanced data in the field of third party insurance [ Vol.3, Issue 2 - Summer Year 1401]
  • Manthouri.Mohammad ParsAirCall: Automated Conversational IVR in Airport Call Center using Deep Transfer Learning [ Vol.4, Issue 2 - Summer Year 1402]
  • Manzari.Farzaneh Differential Information Extraction of Electroencephalogram Signals for Obsessive-Compulsive Disorder Detection [ Vol.2, Issue 1 - Spring Year 1400]
  • Mirroshandel.Seyed Abolghasem A Novel Semi-Supervised Technique for Selecting Appropriate Sperm in Infertility Treatment [ Vol.2, Issue 1 - Spring Year 1400]
  • Mirroshandel.Seyed Abolghasem Adversarial Attacks in a text sentiment Analysis model [ Vol.2, Issue 2 - Summer Year 1400]
  • mirzarezaee.mitra Unsupervised Domain Adaptation for image classification based on Deep Neural Networks [ Vol.4, Issue 1 - Spring Year 1402]
  • Modiri.Nasser Preventive security architecture of computer systems [ Vol.1, Issue 2 - Winter Year 1399]
  • Modiri.Nasser Developing a performance aware cloud infrastructure in e-learning system [ Vol.2, Issue 1 - Spring Year 1400]
  • Modiri.Nasser Verification and Validation for Software Requirements [ Vol.2, Issue 4 - Winter Year 1400]
  • Modiri.Nasser Strategic, Tactical, Technical, and Operational Requirements of Executive Organizations for Developing Cyber Security Vulnerability Calculator [ Vol.2, Issue 3 - Autumn Year 1400]
  • Mohammadi.Leila A Review of Photoacoustic Imaging Modalities in Medical Applications [ Vol.5, Issue 2 - Summer Year 1403]
  • MohammadKhanihajikhagehlou.Behzad A New Approach to The University Course Timetabling Problem based on Clustering Algorithms & Fuzzy Multi-Criteria Decision Making [ Vol.2, Issue 3 - Autumn Year 1400]
  • mohammadzadeh.javad Investigating the Effect of Changing the Distance between Nanomachines on Increasing the Efficiency of Message Delivery Using Chemotaxis and Network Connectivity Nano Communicative Bacteria [ Vol.3, Issue 4 - Winter Year 1401]
  • Mokarrami Sefidab.Sahar Adversarial Attacks in a text sentiment Analysis model [ Vol.2, Issue 2 - Summer Year 1400]
  • Mokarrami.Mahdi Adversarial Attacks in a text sentiment Analysis model [ Vol.2, Issue 2 - Summer Year 1400]
  • mokhtari.hamidreza Verification and Validation for Software Requirements [ Vol.2, Issue 4 - Winter Year 1400]
  • Moradi.Ali A Syndrome Based Decoding of Linear Codes Using Deep Learning Method [ Vol.2, Issue 2 - Summer Year 1400]
  • Moradi.Alireza Optimizing Smart Building Energy Consumption through Integrated Thermal and Electrical Energy Management with Demand-Side Control [ Vol.5, Issue 1 - Spring Year 1403]
  • moradi.mahmoud Use data mining to identify factors affecting students' academic failure [ Vol.2, Issue 1 - Spring Year 1400]
  • moradi.mahmoud Use of ICD (International Classification of Diseases) to prepare medical data in decision support systems [ Vol.2, Issue 2 - Summer Year 1400]
  • Moradloo.Majid Estimation of flicker generating feeders index with combined sampling-simulation method [ Vol.4, Issue 4 - Winter Year 1402]
  • mousavi.seyyed hamidreza A new method in the security of encryption systems by unbalanced gates [ Vol.3, Issue 2 - Summer Year 1401]
  • Mousavi.zeinab Applying of Zhang neural network in time-varying nonlinear function optimization [ Vol.4, Issue 2 - Summer Year 1402]
  • movaghari.ali Description of the Distributed Architecture for Processing Streaming Social Network Data [ Vol.4, Issue 2 - Summer Year 1402]
  • Muzashi Sharafabadi.Ali Mohammad Identification and ranking of factors influencing the attraction of health tourists by hospitals based on the Lassol communication model using the fuzzy TOPSIS technique. [ Vol.5, Issue 1 - Spring Year 1403]

N

  • Nabiollahi Najafabadi.Akbar An Algorithm to Measure the Attention Rate of Mobile Application Users using App Reviews [ Vol.5, Issue 2 - Summer Year 1403]
  • naderloo.lida Presenting a model for Multi-layer Dynamic Social Networks to discover Influential Groups based on a combination of Developing Frog-Leaping Algorithm and C-means Clustering [ Vol.3, Issue 3 - Autumn Year 1401]
  • Najafy.Hassan Improve the Quality of Mammogram Images by Image Processing Techniques [ Vol.3, Issue 1 - Spring Year 1401]
  • Nazarian.Peyman Definition of Bus Priority Vector to Solve Distribution Load Flow for Radial Networks using MATLAB [ Vol.2, Issue 4 - Winter Year 1400]
  • Nazarian.Peyman Estimation of flicker generating feeders index with combined sampling-simulation method [ Vol.4, Issue 4 - Winter Year 1402]
  • Nazarpour.Mohammad Using the Modified Colonial Competition Algorithm to Increase the Speed and Accuracy of the Intelligent Intrusion Detection System [ Vol.4, Issue 1 - Spring Year 1402]
  • nemat.maysam Investigate The Relationship Between product evaluation and Consumer Acceptance of the Intention to Repurchase in the E-commerce Environment (Case Study: Digikala) [ Vol.3, Issue 3 - Autumn Year 1401]
  • Nemati.Somayeh Numerical solution of nonlinear fractional pantograph differential equations with boundary conditions using Jacobi polynomials [ Vol.2, Issue 1 - Spring Year 1400]
  • nematizadh.hosseyn Improving the security of image watermarking based on the combination of discrete wavelet transform, singular value decomposition and discrete cosine conversion methods [ Vol.3, Issue 1 - Spring Year 1401]
  • Nezafati.Navid Using the Modified Colonial Competition Algorithm to Increase the Speed and Accuracy of the Intelligent Intrusion Detection System [ Vol.4, Issue 1 - Spring Year 1402]
  • noroozi.Erfaneh Presenting A Hybrid Method of Deep Neural Networks to Prevent Intrusion in Computer Networks [ Vol.4, Issue 4 - Winter Year 1402]
  • Nourizadeh.Shokouh Types of e-learning and Expert-Based Evaluation [ Vol.1, Issue 1 - Autumn Year 1399]

O

  • Olyaee.Mohammad Hossein A Trust-based Recommender System Using an Improved Particle Swarm Optimization Algorithm [ Vol.5, Issue 1 - Spring Year 1403]

P

  • Pakdel Azar.Omid Implementing a Realtime Localization System based on Zigbee protocol [ Vol.3, Issue 1 - Spring Year 1401]
  • Pouladzadeh.Yasaman Preventive security architecture of computer systems [ Vol.1, Issue 2 - Winter Year 1399]
  • Pourardebil khah.yashar Metaheuristic Algorithms for Feature Selection in Intrusion Detection Systems: A Systematic Review [ Vol.4, Issue 3 - Autumn Year 1402]
  • Pournaghi.Seyed Morteza A Similarity Measure for Link Prediction in Social Network [ Vol.4, Issue 1 - Spring Year 1402]

R

  • Rahimkhani.parisa Designing a hybrid model for classification of imbalanced data in the field of third party insurance [ Vol.3, Issue 2 - Summer Year 1401]
  • Rahimzadeh.Ashkan Investigating the Reaction of Economic Complexity to Information and Communication Technology Shocks in Iran(Using the Vector auto Regressive Model) [ Vol.4, Issue 4 - Winter Year 1402]
  • rahmaninia.maryam An Online group feature selection algorithm using mutual information [ Vol.5, Issue 1 - Spring Year 1403]
  • rahmaninia.maryam An Online group feature selection algorithm using mutual information [ Vol.5, Issue 1 - Spring Year 1403]
  • Rahsepar Fard.Kheirolla A Similarity Measure for Link Prediction in Social Network [ Vol.4, Issue 1 - Spring Year 1402]
  • raiesi ardali.Tayebe Investigating the Effect of Changing the Distance between Nanomachines on Increasing the Efficiency of Message Delivery Using Chemotaxis and Network Connectivity Nano Communicative Bacteria [ Vol.3, Issue 4 - Winter Year 1401]
  • Rajabizadeh.Iman Strategic, Tactical, Technical, and Operational Requirements of Executive Organizations for Developing Cyber Security Vulnerability Calculator [ Vol.2, Issue 3 - Autumn Year 1400]
  • Rajabzadeh Asaar.Maryam A New Protocol for Lightweight Anonymous Authentication with Leading Security in Wireless Sensor Networks Based on IoT [ Vol.4, Issue 3 - Autumn Year 1402]
  • rajaee.behroz Applications of Virtual Reality and Augmented Reality in Education [ Vol.2, Issue 3 - Autumn Year 1400]
  • Ramak.Jafar Investigating the role of new media capabilities (platform: Instagram) on e-commerce (intention to buy women's clothing) according to the role of brand attitude [ Vol.4, Issue 3 - Autumn Year 1402]
  • Ranjbar.Niloofar Sentiment Analysis of People’s opinion about Iranian National Cars with BERT [ Vol.3, Issue 4 - Winter Year 1401]
  • rastegari.hamid An Algorithm to Measure the Attention Rate of Mobile Application Users using App Reviews [ Vol.5, Issue 2 - Summer Year 1403]
  • Razavi Dehkordi.Mehrdad An Algorithm to Measure the Attention Rate of Mobile Application Users using App Reviews [ Vol.5, Issue 2 - Summer Year 1403]
  • Rezaee.Ali Description of the Distributed Architecture for Processing Streaming Social Network Data [ Vol.4, Issue 2 - Summer Year 1402]
  • Rezaeian.Fatemeh A smart clinical Lab Assistant: From design to build [ Vol.2, Issue 2 - Summer Year 1400]
  • roknaldini.mohsen Presenting A Hybrid Method of Deep Neural Networks to Prevent Intrusion in Computer Networks [ Vol.4, Issue 4 - Winter Year 1402]

S

  • Saadati.Zahra Solving the Multi-Objective Problem of IoT Service Placement in Fog Computing Using Reinforcement Learning Approaches [ Vol.4, Issue 3 - Autumn Year 1402]
  • Saadeghvaziri.Mohamad Ala HEAL: Hybrid Education and Learning in STEM [ Vol.1, Issue 2 - Winter Year 1399]
  • sabzevari.kiomars Power Sharing Between Islanded Microgrid Inverters by Modifying the Droop Control Method [ Vol.3, Issue 4 - Winter Year 1401]
  • Sadeghi Bigham.Bahram HEAL: Hybrid Education and Learning in STEM [ Vol.1, Issue 2 - Winter Year 1399]
  • Sadeghi Bigham.Saba A smart clinical Lab Assistant: From design to build [ Vol.2, Issue 2 - Summer Year 1400]
  • Safaeian.Mehdi A new method in the security of encryption systems by unbalanced gates [ Vol.3, Issue 2 - Summer Year 1401]
  • Salari.Golsa A smart clinical Lab Assistant: From design to build [ Vol.2, Issue 2 - Summer Year 1400]
  • salimi.jafar Applications of Virtual Reality and Augmented Reality in Education [ Vol.2, Issue 3 - Autumn Year 1400]
  • Sarabadani.Ali A Similarity Measure for Link Prediction in Social Network [ Vol.4, Issue 1 - Spring Year 1402]
  • saravi moghadam.nahid Investigating the effect of electronic recommendation stimuli on acceptance of banking along with initial trust [ Vol.1, Issue 2 - Winter Year 1399]
  • Sattari Naeini.Vahid Investigating the Effect of Changing the Distance between Nanomachines on Increasing the Efficiency of Message Delivery Using Chemotaxis and Network Connectivity Nano Communicative Bacteria [ Vol.3, Issue 4 - Winter Year 1401]
  • Seifi.Ahmad A MLP Neural Network Approach for Validation of Health Insurance Customers in Big Data Environments [ Vol.5, Issue 2 - Summer Year 1403]
  • Shahnavaz.Ali A new approach for data cleaning to improve quality of data warehouse [ Vol.1, Issue 2 - Winter Year 1399]
  • Sharifi.Arash Unsupervised Domain Adaptation for image classification based on Deep Neural Networks [ Vol.4, Issue 1 - Spring Year 1402]
  • Shaterzadeh.Ali An algorithm for clustering of insurance products and users in a collaborative filtering-based insurance recommender system and evaluating its performance based on the insurance recommendation [ Vol.4, Issue 3 - Autumn Year 1402]
  • Shokouhyar.Sajjad Using the Modified Colonial Competition Algorithm to Increase the Speed and Accuracy of the Intelligent Intrusion Detection System [ Vol.4, Issue 1 - Spring Year 1402]
  • shokri saravi.Fatemeh Platform-Based Business Strategy [ Vol.1, Issue 1 - Autumn Year 1399]
  • Shouri.Saeed A MLP Neural Network Approach for Validation of Health Insurance Customers in Big Data Environments [ Vol.5, Issue 2 - Summer Year 1403]

T

  • Tahghighi Sharabian.Mohammad Improvement of IOT Security in ZigBee Network Using AES256 Algorithm [ Vol.1, Issue 2 - Winter Year 1399]
  • Tahghighi Sharabian.Mohammad Improving the security of image watermarking based on the combination of discrete wavelet transform, singular value decomposition and discrete cosine conversion methods [ Vol.3, Issue 1 - Spring Year 1401]
  • Tahghighi Sharabyan.Mohammad Provide a new approach to identify and detect credit card fraud using ANN - ICA [ Vol.3, Issue 2 - Summer Year 1401]
  • Tahghighi Sharabyan.Mohammad A New Approach Based on Deep Learning Algorithms to Study Effective Factors of Using Social Networks on Students’ Performance [ Vol.3, Issue 4 - Winter Year 1401]
  • Tahghighi Sharabyan.Mohammad Presenting a model for Multi-layer Dynamic Social Networks to discover Influential Groups based on a combination of Developing Frog-Leaping Algorithm and C-means Clustering [ Vol.3, Issue 3 - Autumn Year 1401]
  • Tahghighi Sharabyan.Mohammad A Syndrome Based Decoding of Linear Codes Using Deep Learning Method [ Vol.2, Issue 2 - Summer Year 1400]
  • tahmasebi.reza Developing a strategy for the use of the Internet of Things in Shiraz residential buildings with a combined DANP-SWOT approach [ Vol.3, Issue 2 - Summer Year 1401]
  • Tavakkoli.Asefeh A Novel Semi-Supervised Technique for Selecting Appropriate Sperm in Infertility Treatment [ Vol.2, Issue 1 - Spring Year 1400]
  • Tehranipour.Soheil ParsAirCall: Automated Conversational IVR in Airport Call Center using Deep Transfer Learning [ Vol.4, Issue 2 - Summer Year 1402]
  • Teimouri Yansari.Ramazan Development of a multi-agent recommender system for intelligent shopping assistants [ Vol.4, Issue 2 - Summer Year 1402]
  • teshnehlab.mohammad Unsupervised Domain Adaptation for image classification based on Deep Neural Networks [ Vol.4, Issue 1 - Spring Year 1402]
  • Teymouri.Iraj Increasing the accuracy of identifying overlapping communities using weighted edges [ Vol.1, Issue 1 - Autumn Year 1399]

Y

  • Yakhchi.Moona SDC-causing Error Detection and Mitigation Based on Failure rate Prediction without Fault Injection [ Vol.3, Issue 4 - Winter Year 1401]
  • Yavari.Abulfazl Leveraging Machine Learning for Optimal Trade Entry Point Identification in the Cryptocurrency Market [ Vol.5, Issue 2 - Summer Year 1403]
  • Yazdani.Samaneh ParsAirCall: Automated Conversational IVR in Airport Call Center using Deep Transfer Learning [ Vol.4, Issue 2 - Summer Year 1402]
  • youzbashi.alireza Investigating the effect of electronic recommendation stimuli on acceptance of banking along with initial trust [ Vol.1, Issue 2 - Winter Year 1399]

Z

  • Zand.MohammadJavad Improvement of IOT Security in ZigBee Network Using AES256 Algorithm [ Vol.1, Issue 2 - Winter Year 1399]
  • Zarei.Mani Solving the Multi-Objective Problem of IoT Service Placement in Fog Computing Using Reinforcement Learning Approaches [ Vol.4, Issue 3 - Autumn Year 1402]
  • Zarepour Nasirabadi.Ebrahim Investigating the effect of electronic recommendation stimuli on acceptance of banking along with initial trust [ Vol.1, Issue 2 - Winter Year 1399]
  • Zargari.ّFarzad A blind and robust video watermarking method based on hybrid 3-D transform [ Vol.2, Issue 4 - Winter Year 1400]
  • Ziyaei.Hadi Strategic Analysis of Rostam's Death in Shahnameh: A Game Theory Perspective [ Vol.4, Issue 4 - Winter Year 1402]