ahmadi.saeed
The future of Internet of Things in providing smart medical services to retirees
[
Vol.1,
Issue
1
,
1
- WinterYear
1402]
ahmadi.saeed
Phishing URL detection model based on machine learning
[
Vol.1,
Issue
2
- SpringYear
1403]
Allameh.Faezeh
Traffic signs Detection and Recognition based on deep learning using embedded systems
[
Vol.1,
Issue
1
,
1
- WinterYear
1402]
assareh.reza
Improving the performance of phishing attack detection systems based on synergy of neural network and Ali Baba and the forty thieves algorithm
[
Vol.1,
Issue
2
- SpringYear
1403]
Azizi.reza
Tasks scheduling in distributed fog layer and cloud computing systems using dung beetle optimization algorithm
[
Vol.1,
Issue
2
- SpringYear
1403]
B
Babaei.peyman
Traffic signs Detection and Recognition based on deep learning using embedded systems
[
Vol.1,
Issue
1
,
1
- WinterYear
1402]
baghdadi.mohammad
Security challenges in the field of cloud computing
[
Vol.1,
Issue
3
- SummerYear
1403]
Barati.Danial
Development of a Multimodal Movie Recommendation System Using Graph Neural Networks and Fusion of Textual and Visual Features
[
Vol.1,
Issue
3
- SummerYear
1403]
D
Daneshjoo.Parisa
Examining the Use of Firebase in Android Application Development
[
Vol.1,
Issue
3
- SummerYear
1403]
Daneshjoo.Parisa
Review Scalable Access Management in IoT using Blockchain
[
Vol.1,
Issue
3
- SummerYear
1403]
E
eghbali.mohsen
Tasks scheduling in distributed fog layer and cloud computing systems using dung beetle optimization algorithm
[
Vol.1,
Issue
2
- SpringYear
1403]
F
fazilat.kiarash
Development of a Multimodal Movie Recommendation System Using Graph Neural Networks and Fusion of Textual and Visual Features
[
Vol.1,
Issue
3
- SummerYear
1403]
G
ghaffari dizaji.reza
Investigating the method of intelligent defense mechanism against DDOS attacks of IOT
[
Vol.1,
Issue
1
,
1
- WinterYear
1402]
ghaffary.hamid reza
Facial recognition of masked people using MediaPipe Facemesh and deep learning algorithms
[
Vol.1,
Issue
2
- SpringYear
1403]
Ghahremani.Mehdi
Presenting a method to deal with DDOS attack in multimedia broadband wireless network
[
Vol.1,
Issue
2
- SpringYear
1403]
Ghobadi.Mostafa
Strategic Development and Innovation in Business Leveraging Artificial Intelligence and Blockchain Technology
[
Vol.1,
Issue
2
- SpringYear
1403]
H
Hajigholami.Mojtaba
Predicting stock prices using data mining methods.
[
Vol.1,
Issue
1
,
1
- WinterYear
1402]
Hesabi Moghaddam.Mansour
Facial recognition of masked people using MediaPipe Facemesh and deep learning algorithms
[
Vol.1,
Issue
2
- SpringYear
1403]
heydarigojani.mohsen
Security challenges in the field of cloud computing
[
Vol.1,
Issue
3
- SummerYear
1403]
Hosseini Kia.Mahsa
Efficient routing and lifetime extension in wireless sensor network performance Using Masnui honey bee colony algorithm and sleep and wake algorithm
[
Vol.1,
Issue
3
- SummerYear
1403]
J
Jafari.Daniel
Side channel attack detection based on improved support vector machine
[
Vol.1,
Issue
3
- SummerYear
1403]
K
khazaiepoor.Mahdi
Facial recognition of masked people using MediaPipe Facemesh and deep learning algorithms
[
Vol.1,
Issue
2
- SpringYear
1403]
M
mahmoodnahrani.kiyarash
Security challenges in the field of cloud computing
[
Vol.1,
Issue
3
- SummerYear
1403]
mirsharifi.seyyedmohammad
Examining the Use of Firebase in Android Application Development
[
Vol.1,
Issue
3
- SummerYear
1403]
mobasheri.younes
Improving the performance of phishing attack detection systems based on synergy of neural network and Ali Baba and the forty thieves algorithm
[
Vol.1,
Issue
2
- SpringYear
1403]
Mosaddegh.Ali
Development of a Multimodal Movie Recommendation System Using Graph Neural Networks and Fusion of Textual and Visual Features
[
Vol.1,
Issue
3
- SummerYear
1403]
Mozafari.Mostafa
Authenticating electronic documents using steganography and watermarking methods
[
Vol.1,
Issue
1
,
1
- WinterYear
1402]
Q
Qumarsi.Leila
Review Scalable Access Management in IoT using Blockchain
[
Vol.1,
Issue
3
- SummerYear
1403]
S
shirmohammadi.Mohammad mehdi
Presenting a method to deal with DDOS attack in multimedia broadband wireless network
[
Vol.1,
Issue
2
- SpringYear
1403]
shirmohammadi.Mohammad mehdi
Efficient routing and lifetime extension in wireless sensor network performance Using Masnui honey bee colony algorithm and sleep and wake algorithm
[
Vol.1,
Issue
3
- SummerYear
1403]
Y
Yadegar.MohammadMahdi
energy harvesting and management in IoT
[
Vol.1,
Issue
1
,
1
- WinterYear
1402]