ahmadi.saeed
The future of Internet of Things in providing smart medical services to retirees
[
Vol.1,
Issue
1
,
1
- WinterYear
1402]
ahmadi.saeed
Phishing URL detection model based on machine learning
[
Vol.1,
Issue
2
- SpringYear
1403]
Allameh.Faezeh
Traffic signs Detection and Recognition based on deep learning using embedded systems
[
Vol.1,
Issue
1
,
1
- WinterYear
1402]
assareh.reza
Improving the performance of phishing attack detection systems based on synergy of neural network and Ali Baba and the forty thieves algorithm
[
Vol.1,
Issue
2
- SpringYear
1403]
Azizi.reza
Tasks scheduling in distributed fog layer and cloud computing systems using dung beetle optimization algorithm
[
Vol.1,
Issue
2
- SpringYear
1403]
B
Babaei.peyman
Traffic signs Detection and Recognition based on deep learning using embedded systems
[
Vol.1,
Issue
1
,
1
- WinterYear
1402]
E
eghbali.mohsen
Tasks scheduling in distributed fog layer and cloud computing systems using dung beetle optimization algorithm
[
Vol.1,
Issue
2
- SpringYear
1403]
G
ghaffari dizaji.reza
Investigating the method of intelligent defense mechanism against DDOS attacks of IOT
[
Vol.1,
Issue
1
,
1
- WinterYear
1402]
ghaffary.hamid reza
Facial recognition of masked people using MediaPipe Facemesh and deep learning algorithms
[
Vol.1,
Issue
2
- SpringYear
1403]
Ghahremani.Mehdi
Presenting a method to deal with DDOS attack in multimedia broadband wireless network
[
Vol.1,
Issue
2
- SpringYear
1403]
Ghobadi.Mostafa
Strategic Development and Innovation in Business Leveraging Artificial Intelligence and Blockchain Technology
[
Vol.1,
Issue
2
- SpringYear
1403]
H
Hajigholami.Mojtaba
Predicting stock prices using data mining methods.
[
Vol.1,
Issue
1
,
1
- WinterYear
1402]
Hesabi Moghaddam.Mansour
Facial recognition of masked people using MediaPipe Facemesh and deep learning algorithms
[
Vol.1,
Issue
2
- SpringYear
1403]
K
khazaiepoor.Mahdi
Facial recognition of masked people using MediaPipe Facemesh and deep learning algorithms
[
Vol.1,
Issue
2
- SpringYear
1403]
M
mobasheri.younes
Improving the performance of phishing attack detection systems based on synergy of neural network and Ali Baba and the forty thieves algorithm
[
Vol.1,
Issue
2
- SpringYear
1403]
Mozafari.Mostafa
Authenticating electronic documents using steganography and watermarking methods
[
Vol.1,
Issue
1
,
1
- WinterYear
1402]
S
shirmohammadi.Mohammad mehdi
Presenting a method to deal with DDOS attack in multimedia broadband wireless network
[
Vol.1,
Issue
2
- SpringYear
1403]
Y
Yadegar.MohammadMahdi
energy harvesting and management in IoT
[
Vol.1,
Issue
1
,
1
- WinterYear
1402]