abbasi.mehrdad
Improved analysis of LUG file-related bulk data using LLG
[
Vol.1,
Issue
2
- WinterYear
1402]
Aghaee Ghazvini.Golnaz
An Intrusion Detection System for Network Cyber Security Using Hybrid Feature Selection Algorithms
[
Vol.1,
Issue
2
- WinterYear
1402]
Aghaee Ghazvini.Golnaz
Improved analysis of LUG file-related bulk data using LLG
[
Vol.1,
Issue
2
- WinterYear
1402]
B
Bakhtiyari.Shaghayegh
A New Identity-Based Encryption Scheme Using Blockchain for Electronic Health System
[
Vol.1,
Issue
1
- AutumnYear
1402]
Banitalebi.Afsaneh
An optimal approach to detect anomalies in intrusion detection systems
[
Vol.1,
Issue
2
- WinterYear
1402]
F
Fazli.Mehdi
A survey of meta-heuristic methods for optimization problems
[
Vol.1,
Issue
1
- AutumnYear
1402]
H
Hasani Bafarani.Alireza
A New Identity-Based Encryption Scheme Using Blockchain for Electronic Health System
[
Vol.1,
Issue
1
- AutumnYear
1402]
Hossein-Nejad.Zahra
Social Spider Optimization Algorithm in Multimodal Medical Image Registration
[
Vol.1,
Issue
1
- AutumnYear
1402]
K
kaviani baghbadorani.farzaneh
EATE-RPL: Energy Aware Trust-based Efficient RPL for Internet of Things
[
Vol.1,
Issue
2
- WinterYear
1402]
Khosraviandehkordi.Pouya
FTRTA : Fault Tolerance and Reliable Transmissions Algorithm based on the Internet of Things
[
Vol.1,
Issue
2
- WinterYear
1402]
Kiyoumarsi.Farshad
Extending the Lifetime of Wireless Sensor Networks Using Fuzzy Clustering Algorithm Based on Trust Model
[
Vol.1,
Issue
1
- AutumnYear
1402]
kumarci.kaveh
Comparison optimization Computational model between Cellular Automata and Genetic programming in dynamic response of guyed tower under vibration force
[
Vol.1,
Issue
2
- WinterYear
1402]
M
Moghadas.Tahereh
A New Identity-Based Encryption Scheme Using Blockchain for Electronic Health System
[
Vol.1,
Issue
1
- AutumnYear
1402]
Mozafari Vanani.Mohsen
FTRTA : Fault Tolerance and Reliable Transmissions Algorithm based on the Internet of Things
[
Vol.1,
Issue
2
- WinterYear
1402]
N
Nasri.Mehdi
Social Spider Optimization Algorithm in Multimodal Medical Image Registration
[
Vol.1,
Issue
1
- AutumnYear
1402]
Nikmard.Babak
Improved analysis of LUG file-related bulk data using LLG
[
Vol.1,
Issue
2
- WinterYear
1402]
O
Oday Kamil.zahra
An Intrusion Detection System for Network Cyber Security Using Hybrid Feature Selection Algorithms
[
Vol.1,
Issue
2
- WinterYear
1402]
P
Pishdad.Azin
Improved analysis of LUG file-related bulk data using LLG
[
Vol.1,
Issue
2
- WinterYear
1402]
R
Rahimi Esfahani.Hamid
An Enhanced Rotor Side Converter Control of DFIG-Based Wind Turbines For Improving LVRT Capability During Balanced Grid Faults
[
Vol.1,
Issue
1
- AutumnYear
1402]
S
Soltanaghaei.Mohammadreza
EATE-RPL: Energy Aware Trust-based Efficient RPL for Internet of Things
[
Vol.1,
Issue
2
- WinterYear
1402]
Z
zamani Boroujeni.farsad
EATE-RPL: Energy Aware Trust-based Efficient RPL for Internet of Things
[
Vol.1,
Issue
2
- WinterYear
1402]
Zamani Dehkordi.Behzad
Extending the Lifetime of Wireless Sensor Networks Using Fuzzy Clustering Algorithm Based on Trust Model
[
Vol.1,
Issue
1
- AutumnYear
1402]