About the journal
Recent Articles
-
Open Access Article
1 - A Solution for Implementing Zero Trust Architecture in Video Surveillance System
Seyed Ali Samouti * ، Sajad Tarhani ، Hesam HasanpourIssue 2 , Vol. 1 , Summer 2025 -
Open Access Article
2 - Performance Comparison of Caching Algorithms in Named Data Networks with a Focus on Mitigating Pollution Attacks and Optimizing the β Parameter
Atefeh Vaez shahrestani * ، Mohammad reza Khayyambashi ، Faramarz SafiIssue 2 , Vol. 1 , Summer 2025 -
Open Access Article
3 - Design and implementation of distributed systems for big data processing using artificial intelligence algorithms
Rahim Karimi *Issue 2 , Vol. 1 , Summer 2025 -
Open Access Article
4 - Convergence of Memetic Algorithms Through Neural Network Integration
Mohammadreza Dehghanimahoudabadi * ، Elham Dehghan tezerjaniIssue 2 , Vol. 1 , Summer 2025 -
Open Access Article
5 - Applications of the Osprey Optimization Algorithm in Distributed Systems: A Systematic Review
Saber Pahlavan ، Aliakbar Neghabi *Issue 2 , Vol. 1 , Summer 2025 -
Open Access Article
6 - An Attention-Based Bi-LSTM Architecture for Distinct Temporal Feature Extraction in EEG-Based Motor Imagery Classification
Hesam Hasanpour * ، Seyyed mahdi Ghezi ، Yasser Elmi SolaIssue 2 , Vol. 1 , Summer 2025
Most Viewed Articles
-
Open Access Article
1 - Improving the Handover Process Using Machine Learning Algorithms and Received Signal Strength Parameters
Babak Lotfi * ، Yasser Elmi SolaIssue 1 , Vol. 1 , Spring 2025 -
Open Access Article
2 - Evaluating and Comparing the Performance of the Alibaba and Forty Thieves Algorithm Compared to Selected Meta-heuristic Algorithms
Fatameh Delbari ، Ali akbar Neghabi * ، Jalal IziyIssue 1 , Vol. 1 , Spring 2025 -
Open Access Article
3 - Detection of Cyberbullying in social networks with deep learning based on CNN and LSTM neural network
Mohsen Eghbali ، Kamal Mirzaie * ، Reza AzizIssue 1 , Vol. 1 , Spring 2025 -
Open Access Article
4 - Improving Medical Image Segmentation Using Machine Learning: The Role of Optimization of Extracted Features in Convolutional Neural Networks
Moslem Kaviani ، Umm Kulthum Shahriari *Issue 1 , Vol. 1 , Spring 2025 -
Open Access Article
5 - Improved hybrid algorithm for detection of intrusion into computer networks
Safanaz Heidari ، Firozeh Razavi *Issue 1 , Vol. 1 , Spring 2025 -
Open Access Article
6 - A Solution for Implementing Zero Trust Architecture in Video Surveillance System
Seyed Ali Samouti * ، Sajad Tarhani ، Hesam HasanpourIssue 2 , Vol. 1 , Summer 2025 -
Open Access Article
7 - Increasing Community Detection Accuracy in Social Networks using Improved Label Diffusion Approach
Nafiseh Afkhami ، Nazbanou Farzaneh Bahalgardi ، Hassan Shakeri *Issue 1 , Vol. 1 , Spring 2025 -
Open Access Article
8 - Challenges and solutions to identify and prevent SYN attacks in the Internet of Things
Vesal ّFiroozi ، Hassan Shakeri * ، Hassan Raei SaniIssue 1 , Vol. 1 , Spring 2025 -
Open Access Article
9 - Applications of the Osprey Optimization Algorithm in Distributed Systems: A Systematic Review
Saber Pahlavan ، Aliakbar Neghabi *Issue 2 , Vol. 1 , Summer 2025 -
Open Access Article
10 - An Attention-Based Bi-LSTM Architecture for Distinct Temporal Feature Extraction in EEG-Based Motor Imagery Classification
Hesam Hasanpour * ، Seyyed mahdi Ghezi ، Yasser Elmi SolaIssue 2 , Vol. 1 , Summer 2025