Modiri.Nasser
Developing a performance aware cloud infrastructure in e-learning system
[
Vol.2,
Issue
1
- SpringYear
1400]
Modiri.Nasser
Verification and Validation for Software Requirements
[
Vol.2,
Issue
4
- WinterYear
1400]
Modiri.Nasser
Strategic, Tactical, Technical, and Operational Requirements of Executive Organizations for Developing Cyber Security Vulnerability Calculator
[
Vol.2,
Issue
3
- AutumnYear
1400]
MohammadKhanihajikhagehlou.Behzad
A New Approach to The University Course Timetabling Problem based on Clustering Algorithms & Fuzzy Multi-Criteria Decision Making
[
Vol.2,
Issue
3
- AutumnYear
1400]
Mokarrami Sefidab.Sahar
Adversarial Attacks in a text sentiment Analysis model
[
Vol.2,
Issue
2
- SummerYear
1400]
Mokarrami.Mahdi
Adversarial Attacks in a text sentiment Analysis model
[
Vol.2,
Issue
2
- SummerYear
1400]
mokhtari.hamidreza
Verification and Validation for Software Requirements
[
Vol.2,
Issue
4
- WinterYear
1400]
Moradi.Ali
A Syndrome Based Decoding of Linear Codes Using Deep Learning Method
[
Vol.2,
Issue
2
- SummerYear
1400]
moradi.mahmoud
Use data mining to identify factors affecting students' academic failure
[
Vol.2,
Issue
1
- SpringYear
1400]
moradi.mahmoud
Use of ICD (International Classification of Diseases) to prepare medical data in decision support systems
[
Vol.2,
Issue
2
- SummerYear
1400]