A

  • abbasi.mehrdad Improved analysis of LUG file-related bulk data using LLG [ Vol.1, Issue 2 - Winter Year 1402]
  • Abedian.Ahmad reza Calculation of conductivity limit for fixed temperature limited plates using panel numerical method [ Vol.2, Issue 1 - Spring Year 1403]
  • Aghaee Ghazvini.Golnaz Improved analysis of LUG file-related bulk data using LLG [ Vol.1, Issue 2 - Winter Year 1402]
  • Aghaee Ghazvini.Golnaz An Intrusion Detection System for Network Cyber Security Using Hybrid Feature Selection Algorithms [ Vol.1, Issue 2 - Winter Year 1402]

B

  • Bakhtiyari.Shaghayegh A New Identity-Based Encryption Scheme Using Blockchain for Electronic Health System [ Vol.1, Issue 1 - Autumn Year 1402]
  • Banitalebi.Afsaneh An optimal approach to detect anomalies in intrusion detection systems [ Vol.1, Issue 2 - Winter Year 1402]
  • Banitalebidehkordi.Alireza Using the fuzzy methods to examine changes in brain lesions and atrophy from MRI images for rapid diagnosis of MS [ Vol.2, Issue 1 - Spring Year 1403]

F

  • Fazli.Mehdi A survey of meta-heuristic methods for optimization problems [ Vol.1, Issue 1 - Autumn Year 1402]

H

  • Heidarian.Shahram BICYCLIC GRAPHS WITH MINIMUM AND MAXIMUM FORGOTTEN AND INVERSE DEGREE INDICES [ Vol.2, Issue 1 - Spring Year 1403]
  • Hossein-Nejad.Zahra Social Spider Optimization Algorithm in Multimodal Medical Image Registration [ Vol.1, Issue 1 - Autumn Year 1402]

J

  • Javdani Gandomani.Taghi Comparison of Pre-Trained models in Extractive Text Summarization of Mobile User Reviews [ Vol.2, Issue 1 - Spring Year 1403]

K

  • kaviani baghbadorani.farzaneh EATE-RPL: Energy Aware Trust-based Efficient RPL for Internet of Things [ Vol.1, Issue 2 - Winter Year 1402]
  • Khaksar Haghani.ّFarhad BICYCLIC GRAPHS WITH MINIMUM AND MAXIMUM FORGOTTEN AND INVERSE DEGREE INDICES [ Vol.2, Issue 1 - Spring Year 1403]
  • Khosraviandehkordi.Pouya FTRTA : Fault Tolerance and Reliable Transmissions Algorithm based on the Internet of Things [ Vol.1, Issue 2 - Winter Year 1402]
  • Khosraviandehkordi.Pouya A Comprehensive Review on Service Function Chaining in Networking Environments [ Vol.2, Issue 1 - Spring Year 1403]
  • Kiyoumarsi.Farshad Extending the Lifetime of Wireless Sensor Networks Using Fuzzy Clustering Algorithm Based on Trust Model [ Vol.1, Issue 1 - Autumn Year 1402]
  • kumarci.kaveh Comparison optimization Computational model between Cellular Automata and Genetic programming in dynamic response of guyed tower under vibration force [ Vol.1, Issue 2 - Winter Year 1402]

M

  • manian.mohammad ali BICYCLIC GRAPHS WITH MINIMUM AND MAXIMUM FORGOTTEN AND INVERSE DEGREE INDICES [ Vol.2, Issue 1 - Spring Year 1403]
  • Moghadas.Tahereh A New Identity-Based Encryption Scheme Using Blockchain for Electronic Health System [ Vol.1, Issue 1 - Autumn Year 1402]
  • mohsenifar.narjes INTRODUCING TWO CLASSES OF OPTIMAL CODES DERIVED FROM ONE WEIGHT F qFq[u]-ADDITIVE CODES [ Vol.2, Issue 1 - Spring Year 1403]
  • Mozafari Vanani.Mohsen FTRTA : Fault Tolerance and Reliable Transmissions Algorithm based on the Internet of Things [ Vol.1, Issue 2 - Winter Year 1402]

N

  • Nabiollahi Najafabadi.Akbar Comparison of Pre-Trained models in Extractive Text Summarization of Mobile User Reviews [ Vol.2, Issue 1 - Spring Year 1403]
  • Nasri.Mehdi Social Spider Optimization Algorithm in Multimodal Medical Image Registration [ Vol.1, Issue 1 - Autumn Year 1402]
  • Nikmard.Babak Improved analysis of LUG file-related bulk data using LLG [ Vol.1, Issue 2 - Winter Year 1402]

O

  • Oday Kamil.zahra An Intrusion Detection System for Network Cyber Security Using Hybrid Feature Selection Algorithms [ Vol.1, Issue 2 - Winter Year 1402]

P

  • Pishdad.Azin Improved analysis of LUG file-related bulk data using LLG [ Vol.1, Issue 2 - Winter Year 1402]

R

  • Raeiszadeh.ّFarhad Calculation of conductivity limit for fixed temperature limited plates using panel numerical method [ Vol.2, Issue 1 - Spring Year 1403]
  • Rahimi Esfahani.Hamid An Enhanced Rotor Side Converter Control of DFIG-Based Wind Turbines For Improving LVRT Capability During Balanced Grid Faults [ Vol.1, Issue 1 - Autumn Year 1402]
  • rastegari.hamid Comparison of Pre-Trained models in Extractive Text Summarization of Mobile User Reviews [ Vol.2, Issue 1 - Spring Year 1403]
  • Razavi Dehkordi.Mehrdad Comparison of Pre-Trained models in Extractive Text Summarization of Mobile User Reviews [ Vol.2, Issue 1 - Spring Year 1403]

S

  • sadeghi.sadegh INTRODUCING TWO CLASSES OF OPTIMAL CODES DERIVED FROM ONE WEIGHT F qFq[u]-ADDITIVE CODES [ Vol.2, Issue 1 - Spring Year 1403]
  • Soltanaghaei.Mohammadreza EATE-RPL: Energy Aware Trust-based Efficient RPL for Internet of Things [ Vol.1, Issue 2 - Winter Year 1402]

Z

  • zamani Boroujeni.farsad EATE-RPL: Energy Aware Trust-based Efficient RPL for Internet of Things [ Vol.1, Issue 2 - Winter Year 1402]
  • Zamani Dehkordi.Behzad Extending the Lifetime of Wireless Sensor Networks Using Fuzzy Clustering Algorithm Based on Trust Model [ Vol.1, Issue 1 - Autumn Year 1402]