About the journal
Recent Articles
-
Open Access Article
1 - Tasks scheduling in distributed fog layer and cloud computing systems using dung beetle optimization algorithm
mohsen eghbali reza azizIssue 2 , Vol. 1 , Spring 2024 -
Open Access Article
2 - Facial recognition of masked people using MediaPipe Facemesh and deep learning algorithms
Mansour Hesabi Moghaddam Hamid Reza Ghaffary Mahdi khazaiepoorIssue 2 , Vol. 1 , Spring 2024 -
Open Access Article
3 - Improving the performance of phishing attack detection systems based on synergy of neural network and Ali Baba and the forty thieves algorithm
reza assareh younes mobasheriIssue 2 , Vol. 1 , Spring 2024 -
Open Access Article
4 - Strategic Development and Innovation in Business Leveraging Artificial Intelligence and Blockchain Technology
Mostafa GhobadiIssue 2 , Vol. 1 , Spring 2024 -
Open Access Article
5 - Presenting a method to deal with DDOS attack in multimedia broadband wireless network
Mehdi Ghahremani Mohammad mehdi shirmohammadiIssue 2 , Vol. 1 , Spring 2024 -
Open Access Article
6 - Phishing URL detection model based on machine learning
پریسا دانشجو saeed ahmadiIssue 2 , Vol. 1 , Spring 2024
Most Viewed Articles
-
Open Access Article
1 - Predicting stock prices using data mining methods.
پریسا دانشجو Mojtaba HajigholamiIssue 1 , Vol. 1 , Winter 2024 -
Open Access Article
2 - Authenticating electronic documents using steganography and watermarking methods
پریسا دانشجو Mostafa MozafariIssue 1 , Vol. 1 , Winter 2024 -
Open Access Article
3 - The future of Internet of Things in providing smart medical services to retirees
پریسا دانشجو saeed ahmadiIssue 1 , Vol. 1 , Winter 2024 -
Open Access Article
4 - Traffic signs Detection and Recognition based on deep learning using embedded systems
peyman Babaei Faezeh AllamehIssue 1 , Vol. 1 , Winter 2024 -
Open Access Article
5 - Investigating the method of intelligent defense mechanism against DDOS attacks of IOT
پریسا دانشجو reza ghaffari dizajiIssue 1 , Vol. 1 , Winter 2024 -
Open Access Article
6 - energy harvesting and management in IoT
پریسا دانشجو MohammadMahdi YadegarIssue 1 , Vol. 1 , Winter 2024 -
Open Access Article
7 - Tasks scheduling in distributed fog layer and cloud computing systems using dung beetle optimization algorithm
mohsen eghbali reza azizIssue 2 , Vol. 1 , Spring 2024 -
Open Access Article
8 - Phishing URL detection model based on machine learning
پریسا دانشجو saeed ahmadiIssue 2 , Vol. 1 , Spring 2024 -
Open Access Article
9 - Facial recognition of masked people using MediaPipe Facemesh and deep learning algorithms
Mansour Hesabi Moghaddam Hamid Reza Ghaffary Mahdi khazaiepoorIssue 2 , Vol. 1 , Spring 2024 -
Open Access Article
10 - Improving the performance of phishing attack detection systems based on synergy of neural network and Ali Baba and the forty thieves algorithm
reza assareh younes mobasheriIssue 2 , Vol. 1 , Spring 2024