A

  • abbasi.mehrdad Improved analysis of LUG file-related bulk data using LLG [ Vol.1, Issue 2 - Winter Year 1402]
  • Aghaee Ghazvini.Golnaz Improved analysis of LUG file-related bulk data using LLG [ Vol.1, Issue 2 - Winter Year 1402]
  • Aghaee Ghazvini.Golnaz An Intrusion Detection System for Network Cyber Security Using Hybrid Feature Selection Algorithms [ Vol.1, Issue 2 - Winter Year 1402]

B

  • Bakhtiyari.Shaghayegh A New Identity-Based Encryption Scheme Using Blockchain for Electronic Health System [ Vol.1, Issue 1 - Autumn Year 1402]
  • Banitalebi.Afsaneh An optimal approach to detect anomalies in intrusion detection systems [ Vol.1, Issue 2 - Winter Year 1402]

F

  • Fazli.Mehdi A survey of meta-heuristic methods for optimization problems [ Vol.1, Issue 1 - Autumn Year 1402]

H

  • Hasani Bafarani.Alireza A New Identity-Based Encryption Scheme Using Blockchain for Electronic Health System [ Vol.1, Issue 1 - Autumn Year 1402]
  • Hossein-Nejad.Zahra Social Spider Optimization Algorithm in Multimodal Medical Image Registration [ Vol.1, Issue 1 - Autumn Year 1402]

K

  • kaviani baghbadorani.farzaneh EATE-RPL: Energy Aware Trust-based Efficient RPL for Internet of Things [ Vol.1, Issue 2 - Winter Year 1402]
  • Khosraviandehkordi.Pouya FTRTA : Fault Tolerance and Reliable Transmissions Algorithm based on the Internet of Things [ Vol.1, Issue 2 - Winter Year 1402]
  • Kiyoumarsi.Farshad Extending the Lifetime of Wireless Sensor Networks Using Fuzzy Clustering Algorithm Based on Trust Model [ Vol.1, Issue 1 - Autumn Year 1402]
  • kumarci.kaveh Comparison optimization Computational model between Cellular Automata and Genetic programming in dynamic response of guyed tower under vibration force [ Vol.1, Issue 2 - Winter Year 1402]

M

  • Moghadas.Tahereh A New Identity-Based Encryption Scheme Using Blockchain for Electronic Health System [ Vol.1, Issue 1 - Autumn Year 1402]
  • Mozafari Vanani.Mohsen FTRTA : Fault Tolerance and Reliable Transmissions Algorithm based on the Internet of Things [ Vol.1, Issue 2 - Winter Year 1402]

N

  • Nasri.Mehdi Social Spider Optimization Algorithm in Multimodal Medical Image Registration [ Vol.1, Issue 1 - Autumn Year 1402]
  • Nikmard.Babak Improved analysis of LUG file-related bulk data using LLG [ Vol.1, Issue 2 - Winter Year 1402]

O

  • Oday Kamil.zahra An Intrusion Detection System for Network Cyber Security Using Hybrid Feature Selection Algorithms [ Vol.1, Issue 2 - Winter Year 1402]

P

  • Pishdad.Azin Improved analysis of LUG file-related bulk data using LLG [ Vol.1, Issue 2 - Winter Year 1402]

R

  • Rahimi Esfahani.Hamid An Enhanced Rotor Side Converter Control of DFIG-Based Wind Turbines For Improving LVRT Capability During Balanced Grid Faults [ Vol.1, Issue 1 - Autumn Year 1402]

S

  • Soltanaghaei.Mohammadreza EATE-RPL: Energy Aware Trust-based Efficient RPL for Internet of Things [ Vol.1, Issue 2 - Winter Year 1402]

Z

  • zamani Boroujeni.farsad EATE-RPL: Energy Aware Trust-based Efficient RPL for Internet of Things [ Vol.1, Issue 2 - Winter Year 1402]
  • Zamani Dehkordi.Behzad Extending the Lifetime of Wireless Sensor Networks Using Fuzzy Clustering Algorithm Based on Trust Model [ Vol.1, Issue 1 - Autumn Year 1402]