List of articles (by subject) Multimedia Processing, Communications Systems, Intelligent Systems
-
Open Access Article
1 - Adaptive-PGRP: Routing Algorithm Based on PGRP Algorithm with Adaptive Hello Messages in VANET
Robabeh Ghafouri Vayghan Reza Akbari Sefideh -
Open Access Article
2 - Investigate The Relationship Between product evaluation and Consumer Acceptance of the Intention to Repurchase in the E-commerce Environment (Case Study: Digikala)
maysam nemat homa Doroudi mehdi bazargani -
Open Access Article
3 - Parkinson’s disease detection using EEG signals analysis based on Walsh Hadamard transform
Yasamin Ezazi Peyvand Ghaderyan -
Open Access Article
4 - Improvement of IOT Security in ZigBee Network Using AES256 Algorithm
MohammadJavad Zand Mohammad Tahghighi Sharabian -
Open Access Article
5 - Investigating the role of new media capabilities (platform: Instagram) on e-commerce (intention to buy women's clothing) according to the role of brand attitude
Jafar Ramak homa Doroudi -
Open Access Article
6 - Increasing the accuracy of identifying overlapping communities using weighted edges
Iraj Teymouri Mehdi Afzali -
Open Access Article
7 - Comparison of the classification methods in software development effort estimation
Sadegh Ansaripour Taghi Javdani Gandomani -
Open Access Article
8 - Preventive security architecture of computer systems
Yasaman Pouladzadeh Nasser Modiri -
Open Access Article
9 - Presentation a secure structure for designing and implementing a comprehensive system of geographical marking of the country's places
Rasul Babaei Jaber Karimpour -
Open Access Article
10 - Developing a performance aware cloud infrastructure in e-learning system
nafiseh fareghzadeh Nasser Modiri -
Open Access Article
11 - Adaptive analysis of graphical structural metric for anomaly detection in social networks
Mojtaba Aajami Naser Asgari -
Open Access Article
12 - Determination of thermal distribution in compact substations
meisam baharvand -
Open Access Article
13 - Types of e-learning and Expert-Based Evaluation
Mostafa jafari khadijeh chenari Shokouh Nourizadeh Vahed Dehkordi -
Open Access Article
14 - A Framework For Using Network Virtualization Functions For Video Streams
Ali Asghar Khavasi -
Open Access Article
15 - Effect of customer attitude in Internet Banking(Case study: Refah Bank Customers)
shadi Adibifard -
Open Access Article
16 - QoS Management Solution in Software Defined Networking using Ryu Controller
Shiva Karimi Amir Joz Ashoori -
Open Access Article
17 - Use data mining to identify factors affecting students' academic failure
Mahmood Najafi Mehdi Afzali Mahmood Moradi -
Open Access Article
18 - Solving the Multi-Objective Problem of IoT Service Placement in Fog Computing Using Reinforcement Learning Approaches
Zahra Saadati Mani Zarei -
Open Access Article
19 - Use of ICD (International Classification of Diseases) to prepare medical data in decision support systems
Forough Sadat Hosseini Mehdi Afzali Mahmood Moradi -
Open Access Article
20 - A new approach for data cleaning to improve quality of data warehouse
Ali Shahnavaz Mehdi Afzali Shima Rahimzadeh -
Open Access Article
21 - A Novel Semi-Supervised Technique for Selecting Appropriate Sperm in Infertility Treatment
Asefeh Tavakkoli Seyed Abolghasem Mirroshandel Fatemeh Ghasemian -
Open Access Article
22 - Designing a hybrid model for classification of imbalanced data in the field of third party insurance
Mahnaz Manteqipour parisa Rahimkhani -
Open Access Article
23 - Platform-Based Business Strategy
Marzieh Eskandari Fatemeh shokri saravi -
Open Access Article
24 - HEAL: Hybrid Education and Learning in STEM
Marzieh Eskandari Mohamad Ala Saadeghvaziri Bahram Sadeghi Bigham -
Open Access Article
25 - Investigating the effect of electronic recommendation stimuli on acceptance of banking along with initial trust
Ebrahim Zarepour Nasirabadi alireza youzbashi mina azarbayejani nahid saravi moghadam -
Open Access Article
26 - Verification and Validation for Software Requirements
Hamidreza Mokhtari Nasser Modiri -
Open Access Article
27 - Differential Information Extraction of Electroencephalogram Signals for Obsessive-Compulsive Disorder Detection
Farzaneh Manzari Peyvand Ghaderyan -
Open Access Article
28 - Strategic, Tactical, Technical, and Operational Requirements of Executive Organizations for Developing Cyber Security Vulnerability Calculator
Iman Rajabizadeh Nasser Modiri -
Open Access Article
29 - A Syndrome Based Decoding of Linear Codes Using Deep Learning Method
Ali Moradi Mohammad Tahghighi Sharabyan -
Open Access Article
30 - Presenting a model for Multi-layer Dynamic Social Networks to discover Influential Groups based on a combination of Developing Frog-Leaping Algorithm and C-means Clustering
lida naderloo Mohammad Tahghighi Sharabyan -
Open Access Article
31 - Presenting a novel method based on collaborative filtering for nearest neighbor detection in recommender systems
Mahdi Bazargani Zeinab Homayounpour -
Open Access Article
32 - Identifying and prioritizing the barriers of using Instgaram for developing small businesses in Karaj
hamid hemmati homa Doroudi -
Open Access Article
33 - A New Approach to The University Course Timetabling Problem based on Clustering Algorithms & Fuzzy Multi-Criteria Decision Making
behzad mohammadkhani hamed Babaei, davod eskandari mohammadreza hasanzadeh -
Open Access Article
34 - A smart clinical Lab Assistant: From design to build
Saba Sadeghi Bigham Golsa Salari Fatemeh Rezaeian Maryam Davoudi -
Open Access Article
35 - Provide a new approach to identify and detect credit card fraud using ANN - ICA
Javad Balaee kodehi Mohammad Tahghighi Sharabyan -
Open Access Article
36 - Improving Company Performance with Emphasis on Acquisition and Utilization of Market Intelligence: A Case Study of Mellat Bank
peyman hajizade yaser ghaseminejad Ismael hasanabadi Jalal Panahi -
Open Access Article
37 - Hermite-Hadamard (HH) integral inequality for m,q-preinvex functions
Mehdi Asadi -
Open Access Article
38 - Vertex Decomposability of Path Complexes Associated to Cycle Graphs
Seyyed Mohammad Ajdani Kamal Ahmadi Asghar Madadi -
Open Access Article
39 - Detection of Accelerated Osteointegration in Surface Modified Dental Implants with Sensor Nodes Located in Wireless Network of Body Areas
moluk Eyvazi -
Open Access Article
40 - Improving the security of image watermarking based on the combination of discrete wavelet transform, singular value decomposition and discrete cosine conversion methods
hossein nematizadeh Mohammad Tahghighi Sharabian -
Open Access Article
41 - Comparison of Linear and Non-linear Support Vector Machine Method with Linear Regression for Short-term Prediction of Queue Length Parameter and Arrival Volume of Intersection Approach for Adaptive Control of Individual Traffic Lights
mohammad ali kooshan moghadam Mehdi Fallah Tafti -
Open Access Article
42 - Definition of Bus Priority Vector to Solve Distribution Load Flow for Radial Networks using MATLAB
Peyman Nazarian -
Open Access Article
43 - Adversarial Attacks in a text sentiment Analysis model
Sahar Mokarrami Sefidab Seyed Abolghasem Mirroshandel hamidreza Ahmadifar Mahdi Mokarrami -
Open Access Article
44 - Evaluating the Performance of Intelligent Traffic Signals Based on Firefly Algorithm Applied in an Adaptive Control System
fariba jabbari Mehdi Fallah Tafti -
Open Access Article
45 - A New Method to Improve Energy Consumption in Wireless Camera Sensor Networks
javad bayat Shiva Karimi -
Open Access Article
46 - Presenting A Hybrid Method of Deep Neural Networks to Prevent Intrusion in Computer Networks
Mohsen Roknaldini Erfaneh Noroozi -
Open Access Article
47 - A Comparative Study of Open-Source Software for Deployment and Management of Cloud Computing Utilizing a Big Data Processing Quality Model
Mahdi Jafari Amir Kalbasi -
Open Access Article
48 - Numerical solution of nonlinear fractional pantograph differential equations with boundary conditions using Jacobi polynomials
Somayeh Nemati Faezeh Bakouei -
Open Access Article
49 - A New Approach Based on Deep Learning Algorithms to Study Effective Factors of Using Social Networks on Students’ Performance
Maryam Bakeshlo Mohammad Tahghighi Sharabyan -
Open Access Article
50 - Power Sharing Between Islanded Microgrid Inverters by Modifying the Droop Control Method
kiomars sabzevari -
Open Access Article
51 - Applications of Virtual Reality and Augmented Reality in Education
behroz rajaee jafar salimi naser abbasi khadijeh babakhani -
Open Access Article
52 - A Two-Layered Trust Management Approach in Software Defined Wireless Sensor Networks
Navid Mohammad Ebadati Esfahani Mehrdad Ashtiani Nasrin Hamzelou -
Open Access Article
53 - A new method in the security of encryption systems by unbalanced gates
seyyed hamidreza mousavi mehdi safaeian Amir Hassan Ahmadi Ghaleh -
Open Access Article
54 - Estimation of flicker generating feeders index with combined sampling-simulation method
Peyman Nazarian Majid Moradloo -
Open Access Article
55 - ParsAirCall: Automated Conversational IVR in Airport Call Center using Deep Transfer Learning
Soheil Tehranipour Mohammad Manthouri Samaneh Yazdani -
Open Access Article
56 - A blind and robust video watermarking method based on hybrid 3-D transform
SHAHROKH FALLAH TORBEHBAR ّFarzad Zargari -
Open Access Article
57 - Intrusions detection system in the cloud computing using heterogeneity detection technique
Ali Ghaffari Rozbeh Hossinnezhad -
Open Access Article
58 - Providing a Solution Based on Fuzzy Logic to Reduce False Positive Alarms in The Intrusion Detection System
Mohammad Akhlaghpour -
Open Access Article
59 - A new algorithm for data clustering using combination of genetic and Fireflies algorithms
Mahsa Afsardeir mansoure Afsardeir -
Open Access Article
60 - A Trust-based Recommender System Using an Improved Particle Swarm Optimization Algorithm
Sajad Ahmadian Mohammad Hossein Olyaee -
Open Access Article
61 - The effect of the organizational approach in knowledge sharing on the performance of information security management
edris abbaszadeh mohamadreza sanaei Reza Ehtesham Rasii -
Open Access Article
62 - Implementing a Realtime Localization System based on Zigbee protocol
Omid Pakdel Azar -
Open Access Article
63 - Dynamic Migration of SDN-based Switches to Distribute Control Layer Load and Increase Efficiency Using Ryu Controller
neda abbasi Shiva Karimi -
Open Access Article
64 - Constraint Search based Test Data Generation to cover Prime Paths in Structural Testing
Ebrahim Fazli Mojtaba Aajami -
Open Access Article
65 - A Novel Semi-Supervised Approach for Improving efficiency of E-Learning
FARHAD GHAREBAGHI Ali Amiri -
Open Access Article
66 - Improve the Quality of Mammogram Images by Image Processing Techniques
Mahdi Hariri Hassan Najafy -
Open Access Article
67 - Developing a strategy for the use of the Internet of Things in Shiraz residential buildings with a combined DANP-SWOT approach
reza tahmasebi ardalan feili -
Open Access Article
68 - Software risk prediction by Grasshopper Optimization Algorithm and Machine learning
bahar ahmadi Hadi Khosravi-farsani Taghi Javdani Gandomani -
Open Access Article
69 - Investigating the Effect of Changing the Distance between Nanomachines on Increasing the Efficiency of Message Delivery Using Chemotaxis and Network Connectivity Nano Communicative Bacteria
Tayebe raiesi ardali vahid satari naeini javad mohammadzadeh -
Open Access Article
70 - Development of a multi-agent recommender system for intelligent shopping assistants
Ramazan Teimouri Yansari Mojtaba Ajoudani -
Open Access Article
71 - Joint Learning Approach with Attention-based Model for Semantic Textual Similarity
Ebrahim Ganjalipour Amir Hossein Refahi Sheikhani Sohrab Kordrostami Ali asghar Hosseinzadeh -
Open Access Article
72 - Identification and ranking of factors influencing the attraction of health tourists by hospitals based on the Lassol communication model using the fuzzy TOPSIS technique.
maryam amiri ali mohamad sharifi mazid abadi shahnaz hashemi -
Open Access Article
73 - SDC-causing Error Detection and Mitigation Based on Failure rate Prediction without Fault Injection
Moona Yakhchi Mahdi Fazeli Seyed Amir Asghari Toochai -
Open Access Article
74 - Applying of Zhang neural network in time-varying nonlinear function optimization
elaahe Karami zeinab Mousavi Kobra Gholami -
Open Access Article
75 - Unsupervised Domain Adaptation for image classification based on Deep Neural Networks
Amirfarhad Farhadi Mitra Mirzarezaee Arash Sharifi Mohammad Teshnehlab -
Open Access Article
76 - Sentiment Analysis of People’s opinion about Iranian National Cars with BERT
Leila Gonbadi Niloofar Ranjbar -
Open Access Article
77 - A Similarity Measure for Link Prediction in Social Network
Ali Sarabadani Kheirollah RahseparFard Seyed Morteza Pournaghi -
Open Access Article
78 - An Online group feature selection algorithm using mutual information
maryam rahmaninia sondos bahadori -
Open Access Article
79 - Using the Modified Colonial Competition Algorithm to Increase the Speed and Accuracy of the Intelligent Intrusion Detection System
Mohammad Nazarpour Navid Nezafati Sajjad Shokouhyar -
Open Access Article
80 - An Algorithm to Measure the Attention Rate of Mobile Application Users using App Reviews
Mehrdad Razavi Dehkordi Hamid Rastegari Akbar Nabiollahi Najafabadi Taghi Javdani Gandomani -
Open Access Article
81 - An algorithm for clustering of insurance products and users in a collaborative filtering-based insurance recommender system and evaluating its performance based on the insurance recommendation
Marzieh Amini Shirkoohi Mohammadreza Yamaghani -
Open Access Article
82 - Face Recognition in Images Using Viola_Jones Method and Image Texture Analysis
Mahdi Hariri Narmineh Heydarzadeh -
Open Access Article
83 - Optimal allocation of electric vehicle charging parking lots in the distribution system with reliability evaluation
Mohammadreza Fadavi Amiri Yaser Barari -
Open Access Article
84 - A New Protocol for Lightweight Anonymous Authentication with Leading Security in Wireless Sensor Networks Based on IoT
Maryam Rajabzadeh Asaar Pouya Derakhshan Barjoei -
Open Access Article
85 - A Review of Photoacoustic Imaging Modalities in Medical Applications
Leila Mohammadi -
Open Access Article
86 - Sampled-Data Flocking of Multi-Agent Systems Under the Cyber-Attack Problem
سحر یزدانی -
Open Access Article
87 - The opinion mining of Digikala reviews by semi-supervised support vector machine
zohre Karimi Hadis Haghiri -
Open Access Article
88 - An Effective and Lightweight Intrusion Detection for IoT based on Fog and Cloud using KNN Classification
ali kaffash Seyed Reza Kamel Tabbakh Farizani Maryam Kheirabadi -
Open Access Article
89 - Improving the Accuracy of the Intrusion Detection System in the IoT by Machine Learning and Clustering Algorithms
Javad Pashaei Barbin Mahdi Jalali -
Open Access Article
90 - Investigating the Reaction of Economic Complexity to Information and Communication Technology Shocks in Iran(Using the Vector auto Regressive Model)
Ashkan Rahimzadeh -
Open Access Article
91 - A Comparative Analysis of Online, Semi-Online, and Offline E-Learning Models versus In-Person Education: A Case Study
Taghi Javdani Gandomani -
Open Access Article
92 - Description of the Distributed Architecture for Processing Streaming Social Network Data
binazir ganji Ali Rezaee Sahar Adabi ali movaghari -
Open Access Article
93 - Temporal Operators in representing fuzzy spatio-temporal regions using direction-based method
Majid Saidi Mobarakeh Mohammad Davarpanah Jazi -
Open Access Article
94 - A novel approach for School bus routing using White Shark Optimizer algorithm
Mohammad Salemifar Mohammad reza Mohammadrezaei -
Open Access Article
95 - Optimizing Smart Building Energy Consumption through Integrated Thermal and Electrical Energy Management with Demand-Side Control
Alireza Moradi Seyyed Mohammad R. Hashemi maryam faridpour -
Open Access Article
96 - Leveraging Machine Learning for Optimal Trade Entry Point Identification in the Cryptocurrency Market
Abulfazl Yavari Hasan Aama Seyyed Mohammad R. Hashemi -
Open Access Article
97 - A MLP Neural Network Approach for Validation of Health Insurance Customers in Big Data Environments
Saeed Shouri ali cheshomi Ahmad Seifi Rasoul Ramezani Taghi Ebrahimi Salari -
Open Access Article
98 - Strategic Analysis of Rostam's Death in Shahnameh: A Game Theory Perspective
Hadi Ziyaei Majid Eshaghi -
Open Access Article
99 - Metaheuristic Algorithms for Feature Selection in Intrusion Detection Systems: A Systematic Review
yashar Pourardebil khah Mirsaeid Hosseini Shirvani Homayun Motameni -
Open Access Article
100 - An Overview on Advanced Technologies and Challenges of Driver Assistance Systems
Mahdi Seyfipoor Mohadeseh Parvizi Siamak Mohammadi -
Open Access Article
101 - The model of using artificial intelligence in the provision of electronic services of mobile phone operators
Arezou Sadri Deeba Walizadeh Bahador Meysam Madanipour