A

  • ahmadi.saeed The future of Internet of Things in providing smart medical services to retirees [ Vol.1, Issue 1 , 1 - Winter Year 1402]
  • ahmadi.saeed Phishing URL detection model based on machine learning [ Vol.1, Issue 2 - Spring Year 1403]
  • Allameh.Faezeh Traffic signs Detection and Recognition based on deep learning using embedded systems [ Vol.1, Issue 1 , 1 - Winter Year 1402]
  • assareh.reza Improving the performance of phishing attack detection systems based on synergy of neural network and Ali Baba and the forty thieves algorithm [ Vol.1, Issue 2 - Spring Year 1403]
  • Azizi.reza Tasks scheduling in distributed fog layer and cloud computing systems using dung beetle optimization algorithm [ Vol.1, Issue 2 - Spring Year 1403]

B

  • Babaei.peyman Traffic signs Detection and Recognition based on deep learning using embedded systems [ Vol.1, Issue 1 , 1 - Winter Year 1402]
  • baghdadi.mohammad Security challenges in the field of cloud computing [ Vol.1, Issue 3 - Summer Year 1403]
  • Barati.Danial Development of a Multimodal Movie Recommendation System Using Graph Neural Networks and Fusion of Textual and Visual Features [ Vol.1, Issue 3 - Summer Year 1403]

D

  • Daneshjoo.Parisa Examining the Use of Firebase in Android Application Development [ Vol.1, Issue 3 - Summer Year 1403]
  • Daneshjoo.Parisa Review Scalable Access Management in IoT using Blockchain [ Vol.1, Issue 3 - Summer Year 1403]

E

  • eghbali.mohsen Tasks scheduling in distributed fog layer and cloud computing systems using dung beetle optimization algorithm [ Vol.1, Issue 2 - Spring Year 1403]

F

  • fazilat.kiarash Development of a Multimodal Movie Recommendation System Using Graph Neural Networks and Fusion of Textual and Visual Features [ Vol.1, Issue 3 - Summer Year 1403]

G

  • ghaffari dizaji.reza Investigating the method of intelligent defense mechanism against DDOS attacks of IOT [ Vol.1, Issue 1 , 1 - Winter Year 1402]
  • ghaffary.hamid reza Facial recognition of masked people using MediaPipe Facemesh and deep learning algorithms [ Vol.1, Issue 2 - Spring Year 1403]
  • Ghahremani.Mehdi Presenting a method to deal with DDOS attack in multimedia broadband wireless network [ Vol.1, Issue 2 - Spring Year 1403]
  • Ghobadi.Mostafa Strategic Development and Innovation in Business Leveraging Artificial Intelligence and Blockchain Technology [ Vol.1, Issue 2 - Spring Year 1403]

H

  • Hajigholami.Mojtaba Predicting stock prices using data mining methods. [ Vol.1, Issue 1 , 1 - Winter Year 1402]
  • Hesabi Moghaddam.Mansour Facial recognition of masked people using MediaPipe Facemesh and deep learning algorithms [ Vol.1, Issue 2 - Spring Year 1403]
  • heydarigojani.mohsen Security challenges in the field of cloud computing [ Vol.1, Issue 3 - Summer Year 1403]
  • Hosseini Kia.Mahsa Efficient routing and lifetime extension in wireless sensor network performance Using Masnui honey bee colony algorithm and sleep and wake algorithm [ Vol.1, Issue 3 - Summer Year 1403]

J

  • Jafari.Daniel Side channel attack detection based on improved support vector machine [ Vol.1, Issue 3 - Summer Year 1403]

K

  • khazaiepoor.Mahdi Facial recognition of masked people using MediaPipe Facemesh and deep learning algorithms [ Vol.1, Issue 2 - Spring Year 1403]

M

  • mahmoodnahrani.kiyarash Security challenges in the field of cloud computing [ Vol.1, Issue 3 - Summer Year 1403]
  • mirsharifi.seyyedmohammad Examining the Use of Firebase in Android Application Development [ Vol.1, Issue 3 - Summer Year 1403]
  • mobasheri.younes Improving the performance of phishing attack detection systems based on synergy of neural network and Ali Baba and the forty thieves algorithm [ Vol.1, Issue 2 - Spring Year 1403]
  • Mosaddegh.Ali Development of a Multimodal Movie Recommendation System Using Graph Neural Networks and Fusion of Textual and Visual Features [ Vol.1, Issue 3 - Summer Year 1403]
  • Mozafari.Mostafa Authenticating electronic documents using steganography and watermarking methods [ Vol.1, Issue 1 , 1 - Winter Year 1402]

Q

  • Qumarsi.Leila Review Scalable Access Management in IoT using Blockchain [ Vol.1, Issue 3 - Summer Year 1403]

S

  • shirmohammadi.Mohammad mehdi Presenting a method to deal with DDOS attack in multimedia broadband wireless network [ Vol.1, Issue 2 - Spring Year 1403]
  • shirmohammadi.Mohammad mehdi Efficient routing and lifetime extension in wireless sensor network performance Using Masnui honey bee colony algorithm and sleep and wake algorithm [ Vol.1, Issue 3 - Summer Year 1403]

Y