A

  • abbasi.mehrdad Improved analysis of LUG file-related bulk data using LLG [ Vol.1, Issue 2 - Winter Year 1402]
  • Abedian.Ahmad reza Calculation of conductivity limit for fixed temperature limited plates using panel numerical method [ Vol.2, Issue 1 - Spring Year 1403]
  • Aghaee Ghazvini.Golnaz An Intrusion Detection System for Network Cyber Security Using Hybrid Feature Selection Algorithms [ Vol.1, Issue 2 - Winter Year 1402]
  • Aghaee Ghazvini.Golnaz Improved analysis of LUG file-related bulk data using LLG [ Vol.1, Issue 2 - Winter Year 1402]
  • Ahmad.Mohd Hamdan A Brief Review of Different Methods of Building Energy Optimization in Hot & Humid Malaysian Climate [ Vol.2, Issue 2 - Summer Year 1403]

B

  • Bakhtiyari.Shaghayegh A New Identity-Based Encryption Scheme Using Blockchain for Electronic Health System [ Vol.1, Issue 1 - Autumn Year 1402]
  • Banitalebi.Afsaneh An optimal approach to detect anomalies in intrusion detection systems [ Vol.1, Issue 2 - Winter Year 1402]
  • Banitalebidehkordi.Alireza Using the fuzzy methods to examine changes in brain lesions and atrophy from MRI images for rapid diagnosis of MS [ Vol.2, Issue 1 - Spring Year 1403]

C

  • Chegeni.Vahid Key Pre-distribution Based on Block Complementation Design in Internet of Things Security [ Vol.2, Issue 2 - Summer Year 1403]

E

  • Esmaeil zadeh.ُSoleyman Simulation of the effect of a crack on the free vibration of a rectangular plate using the finite element method [ Vol.2, Issue 2 - Summer Year 1403]

F

  • Fazli.Mehdi A survey of meta-heuristic methods for optimization problems [ Vol.1, Issue 1 - Autumn Year 1402]

H

  • Haghani.Ahmad Simulation of the effect of a crack on the free vibration of a rectangular plate using the finite element method [ Vol.2, Issue 2 - Summer Year 1403]
  • Haj Seyyed Javadi.Hamid Key Pre-distribution Based on Block Complementation Design in Internet of Things Security [ Vol.2, Issue 2 - Summer Year 1403]
  • Hasani Bafarani.Alireza A New Identity-Based Encryption Scheme Using Blockchain for Electronic Health System [ Vol.1, Issue 1 - Autumn Year 1402]
  • Heidarian.Shahram BICYCLIC GRAPHS WITH MINIMUM AND MAXIMUM FORGOTTEN AND INVERSE DEGREE INDICES [ Vol.2, Issue 1 - Spring Year 1403]
  • Hossein-Nejad.Zahra Social Spider Optimization Algorithm in Multimodal Medical Image Registration [ Vol.1, Issue 1 - Autumn Year 1402]

J

  • Javdani Gandomani.Taghi Comparison of Pre-Trained models in Extractive Text Summarization of Mobile User Reviews [ Vol.2, Issue 1 - Spring Year 1403]

K

  • kaviani baghbadorani.farzaneh EATE-RPL: Energy Aware Trust-based Efficient RPL for Internet of Things [ Vol.1, Issue 2 - Winter Year 1402]
  • Khaksar Haghani.ّFarhad BICYCLIC GRAPHS WITH MINIMUM AND MAXIMUM FORGOTTEN AND INVERSE DEGREE INDICES [ Vol.2, Issue 1 - Spring Year 1403]
  • Khosraviandehkordi.Pouya A Comprehensive Review on Service Function Chaining in Networking Environments [ Vol.2, Issue 1 - Spring Year 1403]
  • Khosraviandehkordi.Pouya FTRTA : Fault Tolerance and Reliable Transmissions Algorithm based on the Internet of Things [ Vol.1, Issue 2 - Winter Year 1402]
  • Kiyoumarsi.Farshad Extending the Lifetime of Wireless Sensor Networks Using Fuzzy Clustering Algorithm Based on Trust Model [ Vol.1, Issue 1 - Autumn Year 1402]
  • kumarci.kaveh Comparison optimization Computational model between Cellular Automata and Genetic programming in dynamic response of guyed tower under vibration force [ Vol.1, Issue 2 - Winter Year 1402]

M

  • manian.mohammad ali BICYCLIC GRAPHS WITH MINIMUM AND MAXIMUM FORGOTTEN AND INVERSE DEGREE INDICES [ Vol.2, Issue 1 - Spring Year 1403]
  • Moazami Goudarzi.Mohammad Reza Key Pre-distribution Based on Block Complementation Design in Internet of Things Security [ Vol.2, Issue 2 - Summer Year 1403]
  • Moghadas.Tahereh A New Identity-Based Encryption Scheme Using Blockchain for Electronic Health System [ Vol.1, Issue 1 - Autumn Year 1402]
  • mohsenifar.najmeh Investigating the Impact of Distributed Generation (DG) in Radial Distribution Networks and Optimizing Protective Devices Using the PSO Optimization Algorithm [ Vol.2, Issue 2 - Summer Year 1403]
  • mohsenifar.narjes INTRODUCING TWO CLASSES OF OPTIMAL CODES DERIVED FROM ONE WEIGHT F qFq[u]-ADDITIVE CODES [ Vol.2, Issue 1 - Spring Year 1403]
  • mohsenifar.narjes Investigating the Impact of Distributed Generation (DG) in Radial Distribution Networks and Optimizing Protective Devices Using the PSO Optimization Algorithm [ Vol.2, Issue 2 - Summer Year 1403]
  • Moradi.Behrang A Brief Review of Different Methods of Building Energy Optimization in Hot & Humid Malaysian Climate [ Vol.2, Issue 2 - Summer Year 1403]
  • Mozafari Vanani.Mohsen FTRTA : Fault Tolerance and Reliable Transmissions Algorithm based on the Internet of Things [ Vol.1, Issue 2 - Winter Year 1402]

N

  • Nabiollahi Najafabadi.Akbar Comparison of Pre-Trained models in Extractive Text Summarization of Mobile User Reviews [ Vol.2, Issue 1 - Spring Year 1403]
  • Nasri.Mehdi Social Spider Optimization Algorithm in Multimodal Medical Image Registration [ Vol.1, Issue 1 - Autumn Year 1402]
  • Nikmard.Babak Improved analysis of LUG file-related bulk data using LLG [ Vol.1, Issue 2 - Winter Year 1402]
  • Noorbakhsh.Seyed Mohammad A Brief Review of Different Methods of Building Energy Optimization in Hot & Humid Malaysian Climate [ Vol.2, Issue 2 - Summer Year 1403]

O

  • Oday Kamil.zahra An Intrusion Detection System for Network Cyber Security Using Hybrid Feature Selection Algorithms [ Vol.1, Issue 2 - Winter Year 1402]

P

  • Pishdad.Azin Improved analysis of LUG file-related bulk data using LLG [ Vol.1, Issue 2 - Winter Year 1402]

R

  • Raeisi.Heidar Ali A Brief Review of Different Methods of Building Energy Optimization in Hot & Humid Malaysian Climate [ Vol.2, Issue 2 - Summer Year 1403]
  • Raeiszadeh.ّFarhad Calculation of conductivity limit for fixed temperature limited plates using panel numerical method [ Vol.2, Issue 1 - Spring Year 1403]
  • Rahimi Esfahani.Hamid An Enhanced Rotor Side Converter Control of DFIG-Based Wind Turbines For Improving LVRT Capability During Balanced Grid Faults [ Vol.1, Issue 1 - Autumn Year 1402]
  • rastegari.hamid Comparison of Pre-Trained models in Extractive Text Summarization of Mobile User Reviews [ Vol.2, Issue 1 - Spring Year 1403]
  • Razavi Dehkordi.Mehrdad Comparison of Pre-Trained models in Extractive Text Summarization of Mobile User Reviews [ Vol.2, Issue 1 - Spring Year 1403]
  • Riahi.Rashid Using Soft Computing Tools and Chaos Theory in Predicting the Behavior of the Deformed Stadium System [ Vol.2, Issue 2 - Summer Year 1403]

S

  • sadeghi.sadegh INTRODUCING TWO CLASSES OF OPTIMAL CODES DERIVED FROM ONE WEIGHT F qFq[u]-ADDITIVE CODES [ Vol.2, Issue 1 - Spring Year 1403]
  • Soltanaghaei.Mohammadreza EATE-RPL: Energy Aware Trust-based Efficient RPL for Internet of Things [ Vol.1, Issue 2 - Winter Year 1402]

Z

  • zamani Boroujeni.farsad EATE-RPL: Energy Aware Trust-based Efficient RPL for Internet of Things [ Vol.1, Issue 2 - Winter Year 1402]
  • Zamani Dehkordi.Behzad Extending the Lifetime of Wireless Sensor Networks Using Fuzzy Clustering Algorithm Based on Trust Model [ Vol.1, Issue 1 - Autumn Year 1402]