Aajami.Mojtaba
Constraint Search based Test Data Generation to cover Prime Paths in Structural Testing
[
Vol.4,
Issue
1
- SpringYear
1402]
Aajami.Mojtaba
A New Method to Improve Energy Consumption in Wireless Camera Sensor Networks
[
Vol.5,
Issue
1
- SpringYear
1403]
abbasi.naser
Applications of Virtual Reality and Augmented Reality in Education
[
Vol.2,
Issue
3
- AutumnYear
1400]
abbasi.neda
Dynamic Migration of SDN-based Switches to Distribute Control Layer Load and Increase Efficiency Using Ryu Controller
[
Vol.3,
Issue
4
- WinterYear
1401]
abbaszadeh.edris
The effect of the organizational approach in knowledge sharing on the performance of information security management
[
Vol.3,
Issue
1
- SpringYear
1401]
Adabi.Sahar
Description of the Distributed Architecture for Processing Streaming Social Network Data
[
Vol.4,
Issue
2
- SummerYear
1402]
Adeli.Ebrahim
Intrusions detection system in the cloud computing using heterogeneity detection technique
[
Vol.3,
Issue
1
- SpringYear
1401]
Afsardeir.Mahsa
A new algorithm for data clustering using combination of genetic and Fireflies algorithms
[
Vol.2,
Issue
4
- WinterYear
1400]
Afsardeir.mansoure
A new algorithm for data clustering using combination of genetic and Fireflies algorithms
[
Vol.2,
Issue
4
- WinterYear
1400]
Afzali.Mehdi
Use of ICD (International Classification of Diseases) to prepare medical data in decision support systems
[
Vol.2,
Issue
2
- SummerYear
1400]
Afzali.Mehdi
Increasing the accuracy of identifying overlapping communities using weighted edges
[
Vol.1,
Issue
1
- AutumnYear
1399]
Afzali.Mehdi
Use data mining to identify factors affecting students' academic failure
[
Vol.2,
Issue
1
- SpringYear
1400]
Afzali.Mehdi
A new approach for data cleaning to improve quality of data warehouse
[
Vol.1,
Issue
2
- WinterYear
1399]
ahmadi.bahar
Software risk prediction by Grasshopper Optimization Algorithm and Machine learning
[
Vol.3,
Issue
3
- AutumnYear
1401]
Ahmadian.Sajad
A Trust-based Recommender System Using an Improved Particle Swarm Optimization Algorithm
[
Vol.5,
Issue
1
- SpringYear
1403]
Ahmadifar.hamidreza
Adversarial Attacks in a text sentiment Analysis model
[
Vol.2,
Issue
2
- SummerYear
1400]
Ajdani.Seyyed Mohammad
Vertex Decomposability of Path Complexes Associated to Cycle Graphs
[
Vol.4,
Issue
3
- AutumnYear
1402]
Ajoudani.Mojtaba
Development of a multi-agent recommender system for intelligent shopping assistants
[
Vol.4,
Issue
2
- SummerYear
1402]
Akbari Sefideh.Reza
Adaptive-PGRP: Routing Algorithm Based on PGRP Algorithm with Adaptive Hello Messages in VANET
[
Vol.4,
Issue
4
- WinterYear
1402]
Akhlaghpour.Mohammad
Providing a Solution Based on Fuzzy Logic to Reduce False Positive Alarms in The Intrusion Detection System
[
Vol.2,
Issue
4
- WinterYear
1400]
Amini Shirkoohi.Marzieh
An algorithm for clustering of insurance products and users in a collaborative filtering-based insurance recommender system and evaluating its performance based on the insurance recommendation
[
Vol.4,
Issue
3
- AutumnYear
1402]
Amiri.Ali
A Novel Semi-Supervised Approach for Improving efficiency of E-Learning
[
Vol.3,
Issue
3
- AutumnYear
1401]
amiri.امیری
Identification and ranking of factors influencing the attraction of health tourists by hospitals based on the Lassol communication model using the fuzzy TOPSIS technique.
[
Vol.5,
Issue
1
- SpringYear
1403]
Ansaripour.Sadegh
Comparison of the classification methods in software development effort estimation
[
Vol.3,
Issue
2
- SummerYear
1401]
Asadi.Mehdi
Hermite-Hadamard (HH) integral inequality for m,q-preinvex functions
[
Vol.4,
Issue
1
- SpringYear
1402]
Asgari.Naser
Adaptive analysis of graphical structural metric for anomaly detection in social networks
[
Vol.2,
Issue
1
- SpringYear
1400]
asghari.seyed amir
SDC-causing Error Detection and Mitigation Based on Failure rate Prediction without Fault Injection
[
Vol.3,
Issue
4
- WinterYear
1401]
Ashtiani.Mehrdad
A Two-Layered Trust Management Approach in Software Defined Wireless Sensor Networks
[
Vol.2,
Issue
3
- AutumnYear
1400]
azarbayejani.mina
Investigating the effect of electronic recommendation stimuli on acceptance of banking along with initial trust
[
Vol.1,
Issue
2
- WinterYear
1399]
B
Babaei,.hamed
A New Approach to The University Course Timetabling Problem based on Clustering Algorithms & Fuzzy Multi-Criteria Decision Making
[
Vol.2,
Issue
3
- AutumnYear
1400]
Babaei.Rasul
Presentation a secure structure for designing and implementing a comprehensive system of geographical marking of the country's places
[
Vol.1,
Issue
1
- AutumnYear
1399]
babakhani.khadijeh
Applications of Virtual Reality and Augmented Reality in Education
[
Vol.2,
Issue
3
- AutumnYear
1400]
baharvand.meisam
Determination of thermal distribution in compact substations
[
Vol.1,
Issue
1
- AutumnYear
1399]
Bakeshlo.Maryam
A New Approach Based on Deep Learning Algorithms to Study Effective Factors of Using Social Networks on Students’ Performance
[
Vol.3,
Issue
4
- WinterYear
1401]
Bakouei.Faezeh
Numerical solution of nonlinear fractional pantograph differential equations with boundary conditions using Jacobi polynomials
[
Vol.2,
Issue
1
- SpringYear
1400]
Balaee kodehi.Javad
Provide a new approach to identify and detect credit card fraud using ANN - ICA
[
Vol.3,
Issue
2
- SummerYear
1401]
Barari.Yaser
Optimal allocation of electric vehicle charging parking lots in the distribution system with reliability evaluation
[
Vol.5,
Issue
2
- SummerYear
1403]
bayat.javad
A New Method to Improve Energy Consumption in Wireless Camera Sensor Networks
[
Vol.5,
Issue
1
- SpringYear
1403]
Bazargani.Mahdi
Presenting a novel method based on collaborative filtering for nearest neighbor detection in recommender systems
[
Vol.1,
Issue
1
- AutumnYear
1399]
bazargani.mehdi
Investigate The Relationship Between product evaluation and Consumer Acceptance of the Intention to Repurchase in the
E-commerce Environment (Case Study: Digikala)
[
Vol.3,
Issue
3
- AutumnYear
1401]
C
chenari.khadijeh
Types of e-learning and Expert-Based Evaluation
[
Vol.1,
Issue
1
- AutumnYear
1399]
cheshomi.ali
A MLP Neural Network Approach for Validation of Health Insurance Customers in Big Data Environments
[
Vol.5,
Issue
2
- SummerYear
1403]
D
davarpanah jazi.mohammad
Temporal Operators in representing fuzzy spatio-temporal regions using direction-based method
[
Vol.5,
Issue
3
- AutumnYear
1403]
Davoudi.Maryam
A smart clinical Lab Assistant: From design to build
[
Vol.2,
Issue
2
- SummerYear
1400]
Derakhshan-Barjoei.Pouya
A New Protocol for Lightweight Anonymous Authentication with Leading Security in Wireless Sensor Networks Based on IoT
[
Vol.4,
Issue
3
- AutumnYear
1402]
E
Ebadati Esfahani.Navid Mohammad
A Two-Layered Trust Management Approach in Software Defined Wireless Sensor Networks
[
Vol.2,
Issue
3
- AutumnYear
1400]
Ebrahimi Salari.Taghi
A MLP Neural Network Approach for Validation of Health Insurance Customers in Big Data Environments
[
Vol.5,
Issue
2
- SummerYear
1403]
Ehtesham Rasii.Reza
The effect of the organizational approach in knowledge sharing on the performance of information security management
[
Vol.3,
Issue
1
- SpringYear
1401]
eskandari.davod
A New Approach to The University Course Timetabling Problem based on Clustering Algorithms & Fuzzy Multi-Criteria Decision Making
[
Vol.2,
Issue
3
- AutumnYear
1400]
Eskandari.Marzieh
HEAL: Hybrid Education and Learning in STEM
[
Vol.1,
Issue
2
- WinterYear
1399]
Eyvazi.moluk
Detection of Accelerated Osteointegration in Surface Modified Dental Implants with Sensor Nodes Located in Wireless Network of Body Areas
[
Vol.3,
Issue
3
- AutumnYear
1401]
Ezazi.Yasamin
Parkinson’s disease detection using EEG signals analysis based on Walsh Hadamard transform
[
Vol.2,
Issue
2
- SummerYear
1400]
F
Fallah Tafti.Mehdi
Comparison of Linear and Non-linear Support Vector Machine Method with Linear Regression for Short-term Prediction of Queue Length Parameter and Arrival Volume of Intersection Approach for Adaptive Control of Individual Traffic Lights
[
Vol.3,
Issue
2
- SummerYear
1401]
Fallah Tafti.Mehdi
Evaluating the Performance of Intelligent Traffic Signals Based on Firefly Algorithm Applied in an Adaptive Control System
[
Vol.3,
Issue
3
- AutumnYear
1401]
FALLAH TORBEHBAR.SHAHROKH
A blind and robust video watermarking method based on hybrid 3-D transform
[
Vol.2,
Issue
4
- WinterYear
1400]
fareghzadeh.nafiseh
Developing a performance aware cloud infrastructure in e-learning system
[
Vol.2,
Issue
1
- SpringYear
1400]
farhadi.amirfarhad
Unsupervised Domain Adaptation for image classification based on Deep Neural Networks
[
Vol.4,
Issue
1
- SpringYear
1402]
faridpour.maryam
Optimizing Smart Building Energy Consumption through Integrated Thermal and Electrical Energy Management with Demand-Side Control
[
Vol.5,
Issue
1
- SpringYear
1403]
Fazeli.Mahdi
SDC-causing Error Detection and Mitigation Based on Failure rate Prediction without Fault Injection
[
Vol.3,
Issue
4
- WinterYear
1401]
Fazli.Ebrahim
Constraint Search based Test Data Generation to cover Prime Paths in Structural Testing
[
Vol.4,
Issue
1
- SpringYear
1402]
Feili.Ardalan
Developing a strategy for the use of the Internet of Things in Shiraz residential buildings with a combined DANP-SWOT approach
[
Vol.3,
Issue
2
- SummerYear
1401]
G
Ganjalipour.Ebrahim
Joint Learning Approach with Attention-based Model for Semantic Textual Similarity
[
Vol.4,
Issue
4
- WinterYear
1402]
ganji.binazir
Description of the Distributed Architecture for Processing Streaming Social Network Data
[
Vol.4,
Issue
2
- SummerYear
1402]
Ghaderyan.Peyvand
Differential Information Extraction of Electroencephalogram Signals for Obsessive-Compulsive Disorder Detection
[
Vol.2,
Issue
1
- SpringYear
1400]
Ghaderyan.Peyvand
Parkinson’s disease detection using EEG signals analysis based on Walsh Hadamard transform
[
Vol.2,
Issue
2
- SummerYear
1400]
Ghafouri Vayghan.Robabeh
Adaptive-PGRP: Routing Algorithm Based on PGRP Algorithm with Adaptive Hello Messages in VANET
[
Vol.4,
Issue
4
- WinterYear
1402]
GHAREBAGHI.FARHAD
A Novel Semi-Supervised Approach for Improving efficiency of E-Learning
[
Vol.3,
Issue
3
- AutumnYear
1401]
ghasemi nezhad.Yaser
Improving Company Performance with Emphasis on Acquisition and Utilization of Market Intelligence: A Case Study of Mellat Bank
[
Vol.2,
Issue
3
- AutumnYear
1400]
Ghasemian.Fatemeh
A Novel Semi-Supervised Technique for Selecting Appropriate Sperm in Infertility Treatment
[
Vol.2,
Issue
1
- SpringYear
1400]
Gonbadi.Leila
Sentiment Analysis of People’s opinion about Iranian National Cars with BERT
[
Vol.3,
Issue
4
- WinterYear
1401]
H
Haghiri.Hadis
The opinion mining of Digikala reviews by semi-supervised support vector machine
[
Vol.4,
Issue
1
- SpringYear
1402]
HajiZadeh.Peyman
Improving Company Performance with Emphasis on Acquisition and Utilization of Market Intelligence: A Case Study of Mellat Bank
[
Vol.2,
Issue
3
- AutumnYear
1400]
Hamzelou.Nasrin
A Two-Layered Trust Management Approach in Software Defined Wireless Sensor Networks
[
Vol.2,
Issue
3
- AutumnYear
1400]
Hariri.Mahdi
Improve the Quality of Mammogram Images by Image Processing Techniques
[
Vol.3,
Issue
1
- SpringYear
1401]
Hariri.Mahdi
Face Recognition in Images Using Viola_Jones Method and Image Texture Analysis
[
Vol.4,
Issue
2
- SummerYear
1402]
hasanabadi.Ismael
Improving Company Performance with Emphasis on Acquisition and Utilization of Market Intelligence: A Case Study of Mellat Bank
[
Vol.2,
Issue
3
- AutumnYear
1400]
hasanzadeh.mohammadreza
A New Approach to The University Course Timetabling Problem based on Clustering Algorithms & Fuzzy Multi-Criteria Decision Making
[
Vol.2,
Issue
3
- AutumnYear
1400]
Hashemi.Seyyed Mohammad R.
Optimizing Smart Building Energy Consumption through Integrated Thermal and Electrical Energy Management with Demand-Side Control
[
Vol.5,
Issue
1
- SpringYear
1403]
Hashemi.Seyyed Mohammad R.
Leveraging Machine Learning for Optimal Trade Entry Point Identification in the Cryptocurrency Market
[
Vol.5,
Issue
2
- SummerYear
1403]
hemmati.hamid
Identifying and prioritizing the barriers of using Instgaram for developing small businesses in Karaj
[
Vol.2,
Issue
3
- AutumnYear
1400]
Heydarzadeh.Narmineh
Face Recognition in Images Using Viola_Jones Method and Image Texture Analysis
[
Vol.4,
Issue
2
- SummerYear
1402]
Hosseini Shirvani.Mirsaeid
Metaheuristic Algorithms for Feature Selection in Intrusion Detection Systems: A Systematic Review
[
Vol.4,
Issue
3
- AutumnYear
1402]
Hosseinzadeh.Ali-Asghar
Joint Learning Approach with Attention-based Model for Semantic Textual Similarity
[
Vol.4,
Issue
4
- WinterYear
1402]
Hossinnezhad.Rozbeh
Intrusions detection system in the cloud computing using heterogeneity detection technique
[
Vol.3,
Issue
1
- SpringYear
1401]
J
jabbari.fariba
Evaluating the Performance of Intelligent Traffic Signals Based on Firefly Algorithm Applied in an Adaptive Control System
[
Vol.3,
Issue
3
- AutumnYear
1401]
jafari,.Mostafa
Types of e-learning and Expert-Based Evaluation
[
Vol.1,
Issue
1
- AutumnYear
1399]
Jafari.Mahdi
A Comparative Study of Open-Source Software for Deployment and Management of Cloud Computing Utilizing a Big Data Processing Quality Model
[
Vol.2,
Issue
4
- WinterYear
1400]
jalali.Mahdi
Improving the Accuracy of the Intrusion Detection System in the IoT by Machine Learning and Clustering Algorithms
[
Vol.5,
Issue
3
- AutumnYear
1403]
Javdani Gandomani.Taghi
An Algorithm to Measure the Attention Rate of Mobile Application Users using App Reviews
[
Vol.5,
Issue
2
- SummerYear
1403]
Javdani Gandomani.Taghi
Comparison of the classification methods in software development effort estimation
[
Vol.3,
Issue
2
- SummerYear
1401]
Javdani Gandomani.Taghi
A Comparative Analysis of Online, Semi-Online, and Offline E-Learning Models versus In-Person Education: A Case Study
[
Vol.4,
Issue
2
- SummerYear
1402]
Javdani Gandomani.Taghi
Software risk prediction by Grasshopper Optimization Algorithm and Machine learning
[
Vol.3,
Issue
3
- AutumnYear
1401]
Joz Ashoori.Amir
QoS Management Solution in Software Defined Networking using Ryu Controller
[
Vol.3,
Issue
1
- SpringYear
1401]
K
kaffash.ali
An Effective and Lightweight Intrusion Detection for IoT based on Fog and Cloud using KNN Classification
[
Vol.5,
Issue
2
- SummerYear
1403]
Kalbasi.Amir
A Comparative Study of Open-Source Software for Deployment and Management of Cloud Computing Utilizing a Big Data Processing Quality Model
[
Vol.2,
Issue
4
- WinterYear
1400]
kamel.seyed reza
An Effective and Lightweight Intrusion Detection for IoT based on Fog and Cloud using KNN Classification
[
Vol.5,
Issue
2
- SummerYear
1403]
Karami.elaahe
Applying of Zhang neural network in time-varying nonlinear function optimization
[
Vol.4,
Issue
2
- SummerYear
1402]
Karimi.Shiva
QoS Management Solution in Software Defined Networking using Ryu Controller
[
Vol.3,
Issue
1
- SpringYear
1401]
Karimi.Shiva
Dynamic Migration of SDN-based Switches to Distribute Control Layer Load and Increase Efficiency Using Ryu Controller
[
Vol.3,
Issue
4
- WinterYear
1401]
Karimi.zohre
The opinion mining of Digikala reviews by semi-supervised support vector machine
[
Vol.4,
Issue
1
- SpringYear
1402]
Karimpour.Jaber
Presentation a secure structure for designing and implementing a comprehensive system of geographical marking of the country's places
[
Vol.1,
Issue
1
- AutumnYear
1399]
Khavasi.Ali.A
A Framework For Using Network Virtualization Functions For Video Streams
[
Vol.1,
Issue
2
- WinterYear
1399]
Kheirabadi.Maryam
An Effective and Lightweight Intrusion Detection for IoT based on Fog and Cloud using KNN Classification
[
Vol.5,
Issue
2
- SummerYear
1403]
Khosravi-farsani.Hadi
Software risk prediction by Grasshopper Optimization Algorithm and Machine learning
[
Vol.3,
Issue
3
- AutumnYear
1401]
kooshan moghadam.mohammad ali
Comparison of Linear and Non-linear Support Vector Machine Method with Linear Regression for Short-term Prediction of Queue Length Parameter and Arrival Volume of Intersection Approach for Adaptive Control of Individual Traffic Lights
[
Vol.3,
Issue
2
- SummerYear
1401]
kordrostami.sohrab
Joint Learning Approach with Attention-based Model for Semantic Textual Similarity
[
Vol.4,
Issue
4
- WinterYear
1402]
M
Madadi.Asghar
Vertex Decomposability of Path Complexes Associated to Cycle Graphs
[
Vol.4,
Issue
3
- AutumnYear
1402]
Madanipour.Meysam
The model of using artificial intelligence in the provision of electronic services of mobile phone operators
[
Vol.5,
Issue
3
- AutumnYear
1403]
Manteqipour.Mahnaz
Designing a hybrid model for classification of imbalanced data in the field of third party insurance
[
Vol.3,
Issue
2
- SummerYear
1401]
Manthouri.Mohammad
ParsAirCall: Automated Conversational IVR in Airport Call Center using Deep Transfer Learning
[
Vol.4,
Issue
2
- SummerYear
1402]
Manzari.Farzaneh
Differential Information Extraction of Electroencephalogram Signals for Obsessive-Compulsive Disorder Detection
[
Vol.2,
Issue
1
- SpringYear
1400]
Mirroshandel.Seyed Abolghasem
A Novel Semi-Supervised Technique for Selecting Appropriate Sperm in Infertility Treatment
[
Vol.2,
Issue
1
- SpringYear
1400]
mirzarezaee.mitra
Unsupervised Domain Adaptation for image classification based on Deep Neural Networks
[
Vol.4,
Issue
1
- SpringYear
1402]
Modiri.Nasser
Developing a performance aware cloud infrastructure in e-learning system
[
Vol.2,
Issue
1
- SpringYear
1400]
Modiri.Nasser
Verification and Validation for Software Requirements
[
Vol.2,
Issue
4
- WinterYear
1400]
Modiri.Nasser
Strategic, Tactical, Technical, and Operational Requirements of Executive Organizations for Developing Cyber Security Vulnerability Calculator
[
Vol.2,
Issue
3
- AutumnYear
1400]
Modiri.Nasser
Preventive security architecture of computer systems
[
Vol.1,
Issue
2
- WinterYear
1399]
Mohammadi.Leila
A Review of Photoacoustic Imaging Modalities in Medical Applications
[
Vol.5,
Issue
2
- SummerYear
1403]
Mohammadi.Siamak
An Overview on Advanced Technologies and Challenges of Driver Assistance Systems
[
Vol.5,
Issue
3
- AutumnYear
1403]
MohammadKhanihajikhagehlou.Behzad
A New Approach to The University Course Timetabling Problem based on Clustering Algorithms & Fuzzy Multi-Criteria Decision Making
[
Vol.2,
Issue
3
- AutumnYear
1400]
Mohammadrezaei.Mohammad reza
A novel approach for School bus routing using White Shark Optimizer algorithm
[
Vol.5,
Issue
3
- AutumnYear
1403]
mohammadzadeh.javad
Investigating the Effect of Changing the Distance between Nanomachines on Increasing the Efficiency of Message Delivery Using Chemotaxis and Network Connectivity Nano Communicative Bacteria
[
Vol.3,
Issue
4
- WinterYear
1401]
Mokarrami Sefidab.Sahar
Adversarial Attacks in a text sentiment Analysis model
[
Vol.2,
Issue
2
- SummerYear
1400]
Mokarrami.Mahdi
Adversarial Attacks in a text sentiment Analysis model
[
Vol.2,
Issue
2
- SummerYear
1400]
mokhtari.hamidreza
Verification and Validation for Software Requirements
[
Vol.2,
Issue
4
- WinterYear
1400]
Moradi.Ali
A Syndrome Based Decoding of Linear Codes Using Deep Learning Method
[
Vol.2,
Issue
2
- SummerYear
1400]
Moradi.Alireza
Optimizing Smart Building Energy Consumption through Integrated Thermal and Electrical Energy Management with Demand-Side Control
[
Vol.5,
Issue
1
- SpringYear
1403]
moradi.mahmoud
Use of ICD (International Classification of Diseases) to prepare medical data in decision support systems
[
Vol.2,
Issue
2
- SummerYear
1400]
moradi.mahmoud
Use data mining to identify factors affecting students' academic failure
[
Vol.2,
Issue
1
- SpringYear
1400]
Moradloo.Majid
Estimation of flicker generating feeders index with combined sampling-simulation method
[
Vol.4,
Issue
4
- WinterYear
1402]
mousavi.seyyed hamidreza
A new method in the security of encryption systems by unbalanced gates
[
Vol.3,
Issue
2
- SummerYear
1401]
Mousavi.zeinab
Applying of Zhang neural network in time-varying nonlinear function optimization
[
Vol.4,
Issue
2
- SummerYear
1402]
movaghari.ali
Description of the Distributed Architecture for Processing Streaming Social Network Data
[
Vol.4,
Issue
2
- SummerYear
1402]
Muzashi Sharafabadi.Ali Mohammad
Identification and ranking of factors influencing the attraction of health tourists by hospitals based on the Lassol communication model using the fuzzy TOPSIS technique.
[
Vol.5,
Issue
1
- SpringYear
1403]
N
Nabiollahi Najafabadi.Akbar
An Algorithm to Measure the Attention Rate of Mobile Application Users using App Reviews
[
Vol.5,
Issue
2
- SummerYear
1403]
naderloo.lida
Presenting a model for Multi-layer Dynamic Social Networks to discover Influential Groups based on a combination of Developing Frog-Leaping Algorithm and C-means Clustering
[
Vol.3,
Issue
3
- AutumnYear
1401]
Najafi.Mahmood
Use data mining to identify factors affecting students' academic failure
[
Vol.2,
Issue
1
- SpringYear
1400]
Najafy.Hassan
Improve the Quality of Mammogram Images by Image Processing Techniques
[
Vol.3,
Issue
1
- SpringYear
1401]
Nazarian.Peyman
Definition of Bus Priority Vector to Solve Distribution Load Flow for Radial Networks using MATLAB
[
Vol.2,
Issue
4
- WinterYear
1400]
Nazarian.Peyman
Estimation of flicker generating feeders index with combined sampling-simulation method
[
Vol.4,
Issue
4
- WinterYear
1402]
Nazarpour.Mohammad
Using the Modified Colonial Competition Algorithm to Increase the Speed and Accuracy of the Intelligent Intrusion Detection System
[
Vol.4,
Issue
1
- SpringYear
1402]
nemat.maysam
Investigate The Relationship Between product evaluation and Consumer Acceptance of the Intention to Repurchase in the
E-commerce Environment (Case Study: Digikala)
[
Vol.3,
Issue
3
- AutumnYear
1401]
Nemati.Somayeh
Numerical solution of nonlinear fractional pantograph differential equations with boundary conditions using Jacobi polynomials
[
Vol.2,
Issue
1
- SpringYear
1400]
nematizadh.hosseyn
Improving the security of image watermarking based on the combination of discrete wavelet transform, singular value decomposition and discrete cosine conversion methods
[
Vol.3,
Issue
1
- SpringYear
1401]
Nezafati.Navid
Using the Modified Colonial Competition Algorithm to Increase the Speed and Accuracy of the Intelligent Intrusion Detection System
[
Vol.4,
Issue
1
- SpringYear
1402]
noroozi.Erfaneh
Presenting A Hybrid Method of Deep Neural Networks to Prevent Intrusion in Computer Networks
[
Vol.4,
Issue
4
- WinterYear
1402]
Nourizadeh.Shokouh
Types of e-learning and Expert-Based Evaluation
[
Vol.1,
Issue
1
- AutumnYear
1399]
O
Olyaee.Mohammad Hossein
A Trust-based Recommender System Using an Improved Particle Swarm Optimization Algorithm
[
Vol.5,
Issue
1
- SpringYear
1403]
P
Pakdel Azar.Omid
Implementing a Realtime Localization System based on Zigbee protocol
[
Vol.3,
Issue
1
- SpringYear
1401]
Parvizi.Mohadeseh
An Overview on Advanced Technologies and Challenges of Driver Assistance Systems
[
Vol.5,
Issue
3
- AutumnYear
1403]
Pashaei Barbin.Javad
Improving the Accuracy of the Intrusion Detection System in the IoT by Machine Learning and Clustering Algorithms
[
Vol.5,
Issue
3
- AutumnYear
1403]
Pouladzadeh.Yasaman
Preventive security architecture of computer systems
[
Vol.1,
Issue
2
- WinterYear
1399]
Pourardebil khah.yashar
Metaheuristic Algorithms for Feature Selection in Intrusion Detection Systems: A Systematic Review
[
Vol.4,
Issue
3
- AutumnYear
1402]
Pournaghi.Seyed Morteza
A Similarity Measure for Link Prediction in Social Network
[
Vol.4,
Issue
1
- SpringYear
1402]
R
Rahimkhani.parisa
Designing a hybrid model for classification of imbalanced data in the field of third party insurance
[
Vol.3,
Issue
2
- SummerYear
1401]
Rahimzadeh.Ashkan
Investigating the Reaction of Economic Complexity to Information and Communication Technology Shocks in Iran(Using the Vector auto Regressive Model)
[
Vol.4,
Issue
4
- WinterYear
1402]
rahmaninia.maryam
An Online group feature selection algorithm using mutual information
[
Vol.5,
Issue
1
- SpringYear
1403]
rahmaninia.maryam
An Online group feature selection algorithm using mutual information
[
Vol.5,
Issue
1
- SpringYear
1403]
Rahsepar Fard.Kheirolla
A Similarity Measure for Link Prediction in Social Network
[
Vol.4,
Issue
1
- SpringYear
1402]
raiesi ardali.Tayebe
Investigating the Effect of Changing the Distance between Nanomachines on Increasing the Efficiency of Message Delivery Using Chemotaxis and Network Connectivity Nano Communicative Bacteria
[
Vol.3,
Issue
4
- WinterYear
1401]
Rajabizadeh.Iman
Strategic, Tactical, Technical, and Operational Requirements of Executive Organizations for Developing Cyber Security Vulnerability Calculator
[
Vol.2,
Issue
3
- AutumnYear
1400]
Rajabzadeh Asaar.Maryam
A New Protocol for Lightweight Anonymous Authentication with Leading Security in Wireless Sensor Networks Based on IoT
[
Vol.4,
Issue
3
- AutumnYear
1402]
rajaee.behroz
Applications of Virtual Reality and Augmented Reality in Education
[
Vol.2,
Issue
3
- AutumnYear
1400]
Ramak.Jafar
Investigating the role of new media capabilities (platform: Instagram) on e-commerce (intention to buy women's clothing) according to the role of brand attitude
[
Vol.4,
Issue
3
- AutumnYear
1402]
Ranjbar.Niloofar
Sentiment Analysis of People’s opinion about Iranian National Cars with BERT
[
Vol.3,
Issue
4
- WinterYear
1401]
rastegari.hamid
An Algorithm to Measure the Attention Rate of Mobile Application Users using App Reviews
[
Vol.5,
Issue
2
- SummerYear
1403]
Razavi Dehkordi.Mehrdad
An Algorithm to Measure the Attention Rate of Mobile Application Users using App Reviews
[
Vol.5,
Issue
2
- SummerYear
1403]
Rezaee.Ali
Description of the Distributed Architecture for Processing Streaming Social Network Data
[
Vol.4,
Issue
2
- SummerYear
1402]
Rezaeian.Fatemeh
A smart clinical Lab Assistant: From design to build
[
Vol.2,
Issue
2
- SummerYear
1400]
roknaldini.mohsen
Presenting A Hybrid Method of Deep Neural Networks to Prevent Intrusion in Computer Networks
[
Vol.4,
Issue
4
- WinterYear
1402]
S
Saadati.Zahra
Solving the Multi-Objective Problem of IoT Service Placement in Fog Computing Using Reinforcement Learning Approaches
[
Vol.4,
Issue
3
- AutumnYear
1402]
sabzevari.kiomars
Power Sharing Between Islanded Microgrid Inverters by Modifying the Droop Control Method
[
Vol.3,
Issue
4
- WinterYear
1401]
Sadeghi Bigham.Bahram
HEAL: Hybrid Education and Learning in STEM
[
Vol.1,
Issue
2
- WinterYear
1399]
Sadeghi Bigham.Saba
A smart clinical Lab Assistant: From design to build
[
Vol.2,
Issue
2
- SummerYear
1400]
Sadri.Arezou
The model of using artificial intelligence in the provision of electronic services of mobile phone operators
[
Vol.5,
Issue
3
- AutumnYear
1403]
Safaeian.Mehdi
A new method in the security of encryption systems by unbalanced gates
[
Vol.3,
Issue
2
- SummerYear
1401]
saidi mobarakeh.majid
Temporal Operators in representing fuzzy spatio-temporal regions using direction-based method
[
Vol.5,
Issue
3
- AutumnYear
1403]
Salari.Golsa
A smart clinical Lab Assistant: From design to build
[
Vol.2,
Issue
2
- SummerYear
1400]
Salemifar.Mohammad
A novel approach for School bus routing using White Shark Optimizer algorithm
[
Vol.5,
Issue
3
- AutumnYear
1403]
salimi.jafar
Applications of Virtual Reality and Augmented Reality in Education
[
Vol.2,
Issue
3
- AutumnYear
1400]
Sarabadani.Ali
A Similarity Measure for Link Prediction in Social Network
[
Vol.4,
Issue
1
- SpringYear
1402]
saravi moghadam.nahid
Investigating the effect of electronic recommendation stimuli on acceptance of banking along with initial trust
[
Vol.1,
Issue
2
- WinterYear
1399]
Sattari Naeini.Vahid
Investigating the Effect of Changing the Distance between Nanomachines on Increasing the Efficiency of Message Delivery Using Chemotaxis and Network Connectivity Nano Communicative Bacteria
[
Vol.3,
Issue
4
- WinterYear
1401]
Seifi.Ahmad
A MLP Neural Network Approach for Validation of Health Insurance Customers in Big Data Environments
[
Vol.5,
Issue
2
- SummerYear
1403]
Seyfipoor.Mahdi
An Overview on Advanced Technologies and Challenges of Driver Assistance Systems
[
Vol.5,
Issue
3
- AutumnYear
1403]
Shahnavaz.Ali
A new approach for data cleaning to improve quality of data warehouse
[
Vol.1,
Issue
2
- WinterYear
1399]
Sharifi.Arash
Unsupervised Domain Adaptation for image classification based on Deep Neural Networks
[
Vol.4,
Issue
1
- SpringYear
1402]
Shaterzadeh.Ali
An algorithm for clustering of insurance products and users in a collaborative filtering-based insurance recommender system and evaluating its performance based on the insurance recommendation
[
Vol.4,
Issue
3
- AutumnYear
1402]
Shokouhyar.Sajjad
Using the Modified Colonial Competition Algorithm to Increase the Speed and Accuracy of the Intelligent Intrusion Detection System
[
Vol.4,
Issue
1
- SpringYear
1402]
Shouri.Saeed
A MLP Neural Network Approach for Validation of Health Insurance Customers in Big Data Environments
[
Vol.5,
Issue
2
- SummerYear
1403]
T
Tahghighi Sharabian.Mohammad
Improvement of IOT Security in ZigBee Network Using AES256 Algorithm
[
Vol.1,
Issue
2
- WinterYear
1399]
Tahghighi Sharabian.Mohammad
Improving the security of image watermarking based on the combination of discrete wavelet transform, singular value decomposition and discrete cosine conversion methods
[
Vol.3,
Issue
1
- SpringYear
1401]
Tahghighi Sharabyan.Mohammad
Presenting a model for Multi-layer Dynamic Social Networks to discover Influential Groups based on a combination of Developing Frog-Leaping Algorithm and C-means Clustering
[
Vol.3,
Issue
3
- AutumnYear
1401]
Tahghighi Sharabyan.Mohammad
Provide a new approach to identify and detect credit card fraud using ANN - ICA
[
Vol.3,
Issue
2
- SummerYear
1401]
Tahghighi Sharabyan.Mohammad
A New Approach Based on Deep Learning Algorithms to Study Effective Factors of Using Social Networks on Students’ Performance
[
Vol.3,
Issue
4
- WinterYear
1401]
Tahghighi Sharabyan.Mohammad
A Syndrome Based Decoding of Linear Codes Using Deep Learning Method
[
Vol.2,
Issue
2
- SummerYear
1400]
tahmasebi.reza
Developing a strategy for the use of the Internet of Things in Shiraz residential buildings with a combined DANP-SWOT approach
[
Vol.3,
Issue
2
- SummerYear
1401]
Tavakkoli.Asefeh
A Novel Semi-Supervised Technique for Selecting Appropriate Sperm in Infertility Treatment
[
Vol.2,
Issue
1
- SpringYear
1400]
Tehranipour.Soheil
ParsAirCall: Automated Conversational IVR in Airport Call Center using Deep Transfer Learning
[
Vol.4,
Issue
2
- SummerYear
1402]
Teimouri Yansari.Ramazan
Development of a multi-agent recommender system for intelligent shopping assistants
[
Vol.4,
Issue
2
- SummerYear
1402]
teshnehlab.mohammad
Unsupervised Domain Adaptation for image classification based on Deep Neural Networks
[
Vol.4,
Issue
1
- SpringYear
1402]
Teymouri.Iraj
Increasing the accuracy of identifying overlapping communities using weighted edges
[
Vol.1,
Issue
1
- AutumnYear
1399]
W
Walizadeh Bahador.Deeba
The model of using artificial intelligence in the provision of electronic services of mobile phone operators
[
Vol.5,
Issue
3
- AutumnYear
1403]
Y
Yakhchi.Moona
SDC-causing Error Detection and Mitigation Based on Failure rate Prediction without Fault Injection
[
Vol.3,
Issue
4
- WinterYear
1401]
Yavari.Abulfazl
Leveraging Machine Learning for Optimal Trade Entry Point Identification in the Cryptocurrency Market
[
Vol.5,
Issue
2
- SummerYear
1403]
Yazdani.Samaneh
ParsAirCall: Automated Conversational IVR in Airport Call Center using Deep Transfer Learning
[
Vol.4,
Issue
2
- SummerYear
1402]
youzbashi.alireza
Investigating the effect of electronic recommendation stimuli on acceptance of banking along with initial trust
[
Vol.1,
Issue
2
- WinterYear
1399]
Z
Zand.MohammadJavad
Improvement of IOT Security in ZigBee Network Using AES256 Algorithm
[
Vol.1,
Issue
2
- WinterYear
1399]
Zarei.Mani
Solving the Multi-Objective Problem of IoT Service Placement in Fog Computing Using Reinforcement Learning Approaches
[
Vol.4,
Issue
3
- AutumnYear
1402]
Zarepour Nasirabadi.Ebrahim
Investigating the effect of electronic recommendation stimuli on acceptance of banking along with initial trust
[
Vol.1,
Issue
2
- WinterYear
1399]
Zargari.ّFarzad
A blind and robust video watermarking method based on hybrid 3-D transform
[
Vol.2,
Issue
4
- WinterYear
1400]
Ziyaei.Hadi
Strategic Analysis of Rostam's Death in Shahnameh: A Game Theory Perspective
[
Vol.4,
Issue
4
- WinterYear
1402]