abbasi.mehrdad
Improved analysis of LUG file-related bulk data using LLG
[
Vol.1,
Issue
2
- WinterYear
1402]
Abedian.Ahmad reza
Calculation of conductivity limit for fixed temperature limited plates using panel numerical method
[
Vol.2,
Issue
1
- SpringYear
1403]
Aghaee Ghazvini.Golnaz
An Intrusion Detection System for Network Cyber Security Using Hybrid Feature Selection Algorithms
[
Vol.1,
Issue
2
- WinterYear
1402]
Aghaee Ghazvini.Golnaz
Improved analysis of LUG file-related bulk data using LLG
[
Vol.1,
Issue
2
- WinterYear
1402]
Ahmad.Mohd Hamdan
A Brief Review of Different Methods of Building Energy Optimization in Hot & Humid Malaysian Climate
[
Vol.2,
Issue
2
- SummerYear
1403]
B
Bakhtiyari.Shaghayegh
A New Identity-Based Encryption Scheme Using Blockchain for Electronic Health System
[
Vol.1,
Issue
1
- AutumnYear
1402]
Banitalebi.Afsaneh
An optimal approach to detect anomalies in intrusion detection systems
[
Vol.1,
Issue
2
- WinterYear
1402]
Banitalebidehkordi.Alireza
Using the fuzzy methods to examine changes in brain lesions and atrophy from MRI images for rapid diagnosis of MS
[
Vol.2,
Issue
1
- SpringYear
1403]
C
Chegeni.Vahid
Key Pre-distribution Based on Block Complementation Design in Internet of Things Security
[
Vol.2,
Issue
2
- SummerYear
1403]
E
Esmaeil zadeh.ُSoleyman
Simulation of the effect of a crack on the free vibration of a rectangular plate using the finite element method
[
Vol.2,
Issue
2
- SummerYear
1403]
F
Fazli.Mehdi
A survey of meta-heuristic methods for optimization problems
[
Vol.1,
Issue
1
- AutumnYear
1402]
H
Haghani.Ahmad
Simulation of the effect of a crack on the free vibration of a rectangular plate using the finite element method
[
Vol.2,
Issue
2
- SummerYear
1403]
Haj Seyyed Javadi.Hamid
Key Pre-distribution Based on Block Complementation Design in Internet of Things Security
[
Vol.2,
Issue
2
- SummerYear
1403]
Hasani Bafarani.Alireza
A New Identity-Based Encryption Scheme Using Blockchain for Electronic Health System
[
Vol.1,
Issue
1
- AutumnYear
1402]
Heidarian.Shahram
BICYCLIC GRAPHS WITH MINIMUM AND MAXIMUM FORGOTTEN AND INVERSE DEGREE INDICES
[
Vol.2,
Issue
1
- SpringYear
1403]
Hossein-Nejad.Zahra
Social Spider Optimization Algorithm in Multimodal Medical Image Registration
[
Vol.1,
Issue
1
- AutumnYear
1402]
J
Javdani Gandomani.Taghi
Comparison of Pre-Trained models in Extractive Text Summarization of Mobile User Reviews
[
Vol.2,
Issue
1
- SpringYear
1403]
K
kaviani baghbadorani.farzaneh
EATE-RPL: Energy Aware Trust-based Efficient RPL for Internet of Things
[
Vol.1,
Issue
2
- WinterYear
1402]
Khaksar Haghani.ّFarhad
BICYCLIC GRAPHS WITH MINIMUM AND MAXIMUM FORGOTTEN AND INVERSE DEGREE INDICES
[
Vol.2,
Issue
1
- SpringYear
1403]
Khosraviandehkordi.Pouya
A Comprehensive Review on Service Function Chaining in Networking Environments
[
Vol.2,
Issue
1
- SpringYear
1403]
Khosraviandehkordi.Pouya
FTRTA : Fault Tolerance and Reliable Transmissions Algorithm based on the Internet of Things
[
Vol.1,
Issue
2
- WinterYear
1402]
Kiyoumarsi.Farshad
Extending the Lifetime of Wireless Sensor Networks Using Fuzzy Clustering Algorithm Based on Trust Model
[
Vol.1,
Issue
1
- AutumnYear
1402]
kumarci.kaveh
Comparison optimization Computational model between Cellular Automata and Genetic programming in dynamic response of guyed tower under vibration force
[
Vol.1,
Issue
2
- WinterYear
1402]
M
manian.mohammad ali
BICYCLIC GRAPHS WITH MINIMUM AND MAXIMUM FORGOTTEN AND INVERSE DEGREE INDICES
[
Vol.2,
Issue
1
- SpringYear
1403]
Moazami Goudarzi.Mohammad Reza
Key Pre-distribution Based on Block Complementation Design in Internet of Things Security
[
Vol.2,
Issue
2
- SummerYear
1403]
Moghadas.Tahereh
A New Identity-Based Encryption Scheme Using Blockchain for Electronic Health System
[
Vol.1,
Issue
1
- AutumnYear
1402]
mohsenifar.najmeh
Investigating the Impact of Distributed Generation (DG) in Radial Distribution Networks and Optimizing Protective Devices Using the PSO Optimization Algorithm
[
Vol.2,
Issue
2
- SummerYear
1403]
mohsenifar.narjes
INTRODUCING TWO CLASSES OF OPTIMAL CODES DERIVED FROM ONE WEIGHT F qFq[u]-ADDITIVE CODES
[
Vol.2,
Issue
1
- SpringYear
1403]
mohsenifar.narjes
Investigating the Impact of Distributed Generation (DG) in Radial Distribution Networks and Optimizing Protective Devices Using the PSO Optimization Algorithm
[
Vol.2,
Issue
2
- SummerYear
1403]
Moradi.Behrang
A Brief Review of Different Methods of Building Energy Optimization in Hot & Humid Malaysian Climate
[
Vol.2,
Issue
2
- SummerYear
1403]
Mozafari Vanani.Mohsen
FTRTA : Fault Tolerance and Reliable Transmissions Algorithm based on the Internet of Things
[
Vol.1,
Issue
2
- WinterYear
1402]
N
Nabiollahi Najafabadi.Akbar
Comparison of Pre-Trained models in Extractive Text Summarization of Mobile User Reviews
[
Vol.2,
Issue
1
- SpringYear
1403]
Nasri.Mehdi
Social Spider Optimization Algorithm in Multimodal Medical Image Registration
[
Vol.1,
Issue
1
- AutumnYear
1402]
Nikmard.Babak
Improved analysis of LUG file-related bulk data using LLG
[
Vol.1,
Issue
2
- WinterYear
1402]
Noorbakhsh.Seyed Mohammad
A Brief Review of Different Methods of Building Energy Optimization in Hot & Humid Malaysian Climate
[
Vol.2,
Issue
2
- SummerYear
1403]
O
Oday Kamil.zahra
An Intrusion Detection System for Network Cyber Security Using Hybrid Feature Selection Algorithms
[
Vol.1,
Issue
2
- WinterYear
1402]
P
Pishdad.Azin
Improved analysis of LUG file-related bulk data using LLG
[
Vol.1,
Issue
2
- WinterYear
1402]
R
Raeisi.Heidar Ali
A Brief Review of Different Methods of Building Energy Optimization in Hot & Humid Malaysian Climate
[
Vol.2,
Issue
2
- SummerYear
1403]
Raeiszadeh.ّFarhad
Calculation of conductivity limit for fixed temperature limited plates using panel numerical method
[
Vol.2,
Issue
1
- SpringYear
1403]
Rahimi Esfahani.Hamid
An Enhanced Rotor Side Converter Control of DFIG-Based Wind Turbines For Improving LVRT Capability During Balanced Grid Faults
[
Vol.1,
Issue
1
- AutumnYear
1402]
rastegari.hamid
Comparison of Pre-Trained models in Extractive Text Summarization of Mobile User Reviews
[
Vol.2,
Issue
1
- SpringYear
1403]
Razavi Dehkordi.Mehrdad
Comparison of Pre-Trained models in Extractive Text Summarization of Mobile User Reviews
[
Vol.2,
Issue
1
- SpringYear
1403]
Riahi.Rashid
Using Soft Computing Tools and Chaos Theory in Predicting the Behavior of the Deformed Stadium System
[
Vol.2,
Issue
2
- SummerYear
1403]
S
sadeghi.sadegh
INTRODUCING TWO CLASSES OF OPTIMAL CODES DERIVED FROM ONE WEIGHT F qFq[u]-ADDITIVE CODES
[
Vol.2,
Issue
1
- SpringYear
1403]
Soltanaghaei.Mohammadreza
EATE-RPL: Energy Aware Trust-based Efficient RPL for Internet of Things
[
Vol.1,
Issue
2
- WinterYear
1402]
Z
zamani Boroujeni.farsad
EATE-RPL: Energy Aware Trust-based Efficient RPL for Internet of Things
[
Vol.1,
Issue
2
- WinterYear
1402]
Zamani Dehkordi.Behzad
Extending the Lifetime of Wireless Sensor Networks Using Fuzzy Clustering Algorithm Based on Trust Model
[
Vol.1,
Issue
1
- AutumnYear
1402]