A

  • Afkhami.Nafiseh Increasing Community Detection Accuracy in Social Networks using Improved Label Diffusion Approach [ Vol.1, Issue 1 - Spring Year 1404]
  • Azizi.reza Detection of Cyberbullying in social networks with deep learning based on CNN and LSTM neural network [ Vol.1, Issue 1 - Spring Year 1404]

D

  • dehghan tezerjani.elham Convergence of Memetic Algorithms Through Neural Network Integration [ Vol.1, Issue 2 - Summer Year 1404]
  • dehghanimahoudabadi.mohammadreza Convergence of Memetic Algorithms Through Neural Network Integration [ Vol.1, Issue 2 - Summer Year 1404]
  • Delbari.Fatameh Evaluating and Comparing the Performance of the Alibaba and Forty Thieves Algorithm Compared to Selected Meta-heuristic Algorithms [ Vol.1, Issue 1 - Spring Year 1404]

E

  • eghbali.mohsen Detection of Cyberbullying in social networks with deep learning based on CNN and LSTM neural network [ Vol.1, Issue 1 - Spring Year 1404]
  • Elmi Sola.Yasser Improving the Handover Process Using Machine Learning Algorithms and Received Signal Strength Parameters [ Vol.1, Issue 1 - Spring Year 1404]
  • Elmi Sola.Yasser An Attention-Based Bi-LSTM Architecture for Distinct Temporal Feature Extraction in EEG-Based Motor Imagery Classification [ Vol.1, Issue 2 - Summer Year 1404]

F

  • Farzaneh Bahalgardi.Nazbanou Increasing Community Detection Accuracy in Social Networks using Improved Label Diffusion Approach [ Vol.1, Issue 1 - Spring Year 1404]

G

  • ghezi.seyyed mahdi An Attention-Based Bi-LSTM Architecture for Distinct Temporal Feature Extraction in EEG-Based Motor Imagery Classification [ Vol.1, Issue 2 - Summer Year 1404]

H

  • hasanpour.hesam An Attention-Based Bi-LSTM Architecture for Distinct Temporal Feature Extraction in EEG-Based Motor Imagery Classification [ Vol.1, Issue 2 - Summer Year 1404]
  • Hasanpour.Hesam A Solution for Implementing Zero Trust Architecture in Video Surveillance System [ Vol.1, Issue 2 - Summer Year 1404]
  • heidari.safanaz Improved hybrid algorithm for detection of intrusion into computer networks [ Vol.1, Issue 1 - Spring Year 1404]

I

  • Iziy.Jalal Evaluating and Comparing the Performance of the Alibaba and Forty Thieves Algorithm Compared to Selected Meta-heuristic Algorithms [ Vol.1, Issue 1 - Spring Year 1404]

K

  • Karimi.Rahim Design and implementation of distributed systems for big data processing using artificial intelligence algorithms [ Vol.1, Issue 2 - Summer Year 1404]
  • kaviani.moslem Improving Medical Image Segmentation Using Machine Learning: The Role of Optimization of Extracted Features in Convolutional Neural Networks [ Vol.1, Issue 1 - Spring Year 1404]
  • Khayyambashi.Mohammad reza Performance Comparison of Caching Algorithms in Named Data Networks with a Focus on Mitigating Pollution Attacks and Optimizing the β Parameter [ Vol.1, Issue 2 - Summer Year 1404]

L

  • Lotfi.Babak Improving the Handover Process Using Machine Learning Algorithms and Received Signal Strength Parameters [ Vol.1, Issue 1 - Spring Year 1404]

M

  • Mirzaie.Kamal Detection of Cyberbullying in social networks with deep learning based on CNN and LSTM neural network [ Vol.1, Issue 1 - Spring Year 1404]

N

  • Neghabi.Ali akbar Applications of the Osprey Optimization Algorithm in Distributed Systems: A Systematic Review [ Vol.1, Issue 2 - Summer Year 1404]

P

  • Pahlavan.Saber Applications of the Osprey Optimization Algorithm in Distributed Systems: A Systematic Review [ Vol.1, Issue 2 - Summer Year 1404]

R

  • razavi.firozeh Improved hybrid algorithm for detection of intrusion into computer networks [ Vol.1, Issue 1 - Spring Year 1404]

S

  • safi.faramarz Performance Comparison of Caching Algorithms in Named Data Networks with a Focus on Mitigating Pollution Attacks and Optimizing the β Parameter [ Vol.1, Issue 2 - Summer Year 1404]
  • Samouti.Seyed Ali A Solution for Implementing Zero Trust Architecture in Video Surveillance System [ Vol.1, Issue 2 - Summer Year 1404]
  • Shahriari.Umm Kulthum Improving Medical Image Segmentation Using Machine Learning: The Role of Optimization of Extracted Features in Convolutional Neural Networks [ Vol.1, Issue 1 - Spring Year 1404]
  • Shakeri.Hassan Challenges and solutions to identify and prevent SYN attacks in the Internet of Things [ Vol.1, Issue 1 - Spring Year 1404]
  • Shakeri.Hassan Increasing Community Detection Accuracy in Social Networks using Improved Label Diffusion Approach [ Vol.1, Issue 1 - Spring Year 1404]

T

  • Tarhani.Sajad A Solution for Implementing Zero Trust Architecture in Video Surveillance System [ Vol.1, Issue 2 - Summer Year 1404]

V

  • vaez shahrestani.atefeh Performance Comparison of Caching Algorithms in Named Data Networks with a Focus on Mitigating Pollution Attacks and Optimizing the β Parameter [ Vol.1, Issue 2 - Summer Year 1404]