A

  • ahmadi.saeed The future of Internet of Things in providing smart medical services to retirees [ Vol.1, Issue 1 , 1 - Winter Year 1402]
  • ahmadi.saeed Phishing URL detection model based on machine learning [ Vol.1, Issue 2 - Spring Year 1403]
  • Allameh.Faezeh Traffic signs Detection and Recognition based on deep learning using embedded systems [ Vol.1, Issue 1 , 1 - Winter Year 1402]
  • assareh.reza Improving the performance of phishing attack detection systems based on synergy of neural network and Ali Baba and the forty thieves algorithm [ Vol.1, Issue 2 - Spring Year 1403]
  • Azizi.reza Tasks scheduling in distributed fog layer and cloud computing systems using dung beetle optimization algorithm [ Vol.1, Issue 2 - Spring Year 1403]

B

  • Babaei.peyman Traffic signs Detection and Recognition based on deep learning using embedded systems [ Vol.1, Issue 1 , 1 - Winter Year 1402]

E

  • eghbali.mohsen Tasks scheduling in distributed fog layer and cloud computing systems using dung beetle optimization algorithm [ Vol.1, Issue 2 - Spring Year 1403]

G

  • ghaffari dizaji.reza Investigating the method of intelligent defense mechanism against DDOS attacks of IOT [ Vol.1, Issue 1 , 1 - Winter Year 1402]
  • ghaffary.hamid reza Facial recognition of masked people using MediaPipe Facemesh and deep learning algorithms [ Vol.1, Issue 2 - Spring Year 1403]
  • Ghahremani.Mehdi Presenting a method to deal with DDOS attack in multimedia broadband wireless network [ Vol.1, Issue 2 - Spring Year 1403]
  • Ghobadi.Mostafa Strategic Development and Innovation in Business Leveraging Artificial Intelligence and Blockchain Technology [ Vol.1, Issue 2 - Spring Year 1403]

H

  • Hajigholami.Mojtaba Predicting stock prices using data mining methods. [ Vol.1, Issue 1 , 1 - Winter Year 1402]
  • Hesabi Moghaddam.Mansour Facial recognition of masked people using MediaPipe Facemesh and deep learning algorithms [ Vol.1, Issue 2 - Spring Year 1403]

K

  • khazaiepoor.Mahdi Facial recognition of masked people using MediaPipe Facemesh and deep learning algorithms [ Vol.1, Issue 2 - Spring Year 1403]

M

  • mobasheri.younes Improving the performance of phishing attack detection systems based on synergy of neural network and Ali Baba and the forty thieves algorithm [ Vol.1, Issue 2 - Spring Year 1403]
  • Mozafari.Mostafa Authenticating electronic documents using steganography and watermarking methods [ Vol.1, Issue 1 , 1 - Winter Year 1402]

S

  • shirmohammadi.Mohammad mehdi Presenting a method to deal with DDOS attack in multimedia broadband wireless network [ Vol.1, Issue 2 - Spring Year 1403]

Y