Afkhami.Nafiseh
Increasing Community Detection Accuracy in Social Networks using Improved Label Diffusion Approach
[
Vol.1,
Issue
1
- SpringYear
1404]
Azizi.reza
Detection of Cyberbullying in social networks with deep learning based on CNN and LSTM neural network
[
Vol.1,
Issue
1
- SpringYear
1404]
D
dehghan tezerjani.elham
Convergence of Memetic Algorithms Through Neural Network Integration
[
Vol.1,
Issue
2
- SummerYear
1404]
dehghanimahoudabadi.mohammadreza
Convergence of Memetic Algorithms Through Neural Network Integration
[
Vol.1,
Issue
2
- SummerYear
1404]
Delbari.Fatameh
Evaluating and Comparing the Performance of the Alibaba and Forty Thieves Algorithm Compared to Selected Meta-heuristic Algorithms
[
Vol.1,
Issue
1
- SpringYear
1404]
E
eghbali.mohsen
Detection of Cyberbullying in social networks with deep learning based on CNN and LSTM neural network
[
Vol.1,
Issue
1
- SpringYear
1404]
Elmi Sola.Yasser
Improving the Handover Process Using Machine Learning Algorithms and Received Signal Strength Parameters
[
Vol.1,
Issue
1
- SpringYear
1404]
Elmi Sola.Yasser
An Attention-Based Bi-LSTM Architecture for Distinct Temporal Feature Extraction in EEG-Based Motor Imagery Classification
[
Vol.1,
Issue
2
- SummerYear
1404]
F
Farzaneh Bahalgardi.Nazbanou
Increasing Community Detection Accuracy in Social Networks using Improved Label Diffusion Approach
[
Vol.1,
Issue
1
- SpringYear
1404]
G
ghezi.seyyed mahdi
An Attention-Based Bi-LSTM Architecture for Distinct Temporal Feature Extraction in EEG-Based Motor Imagery Classification
[
Vol.1,
Issue
2
- SummerYear
1404]
H
hasanpour.hesam
An Attention-Based Bi-LSTM Architecture for Distinct Temporal Feature Extraction in EEG-Based Motor Imagery Classification
[
Vol.1,
Issue
2
- SummerYear
1404]
Hasanpour.Hesam
A Solution for Implementing Zero Trust Architecture in Video Surveillance System
[
Vol.1,
Issue
2
- SummerYear
1404]
heidari.safanaz
Improved hybrid algorithm for detection of intrusion into computer networks
[
Vol.1,
Issue
1
- SpringYear
1404]
I
Iziy.Jalal
Evaluating and Comparing the Performance of the Alibaba and Forty Thieves Algorithm Compared to Selected Meta-heuristic Algorithms
[
Vol.1,
Issue
1
- SpringYear
1404]
K
Karimi.Rahim
Design and implementation of distributed systems for big data processing using artificial intelligence algorithms
[
Vol.1,
Issue
2
- SummerYear
1404]
kaviani.moslem
Improving Medical Image Segmentation Using Machine Learning: The Role of Optimization of Extracted Features in Convolutional Neural Networks
[
Vol.1,
Issue
1
- SpringYear
1404]
Khayyambashi.Mohammad reza
Performance Comparison of Caching Algorithms in Named Data Networks with a Focus on Mitigating Pollution Attacks and Optimizing the β Parameter
[
Vol.1,
Issue
2
- SummerYear
1404]
L
Lotfi.Babak
Improving the Handover Process Using Machine Learning Algorithms and Received Signal Strength Parameters
[
Vol.1,
Issue
1
- SpringYear
1404]
M
Mirzaie.Kamal
Detection of Cyberbullying in social networks with deep learning based on CNN and LSTM neural network
[
Vol.1,
Issue
1
- SpringYear
1404]
N
Neghabi.Ali akbar
Applications of the Osprey Optimization Algorithm in Distributed Systems: A Systematic Review
[
Vol.1,
Issue
2
- SummerYear
1404]
P
Pahlavan.Saber
Applications of the Osprey Optimization Algorithm in Distributed Systems: A Systematic Review
[
Vol.1,
Issue
2
- SummerYear
1404]
R
razavi.firozeh
Improved hybrid algorithm for detection of intrusion into computer networks
[
Vol.1,
Issue
1
- SpringYear
1404]
S
safi.faramarz
Performance Comparison of Caching Algorithms in Named Data Networks with a Focus on Mitigating Pollution Attacks and Optimizing the β Parameter
[
Vol.1,
Issue
2
- SummerYear
1404]
Samouti.Seyed Ali
A Solution for Implementing Zero Trust Architecture in Video Surveillance System
[
Vol.1,
Issue
2
- SummerYear
1404]
Shahriari.Umm Kulthum
Improving Medical Image Segmentation Using Machine Learning: The Role of Optimization of Extracted Features in Convolutional Neural Networks
[
Vol.1,
Issue
1
- SpringYear
1404]
Shakeri.Hassan
Challenges and solutions to identify and prevent SYN attacks in the Internet of Things
[
Vol.1,
Issue
1
- SpringYear
1404]
Shakeri.Hassan
Increasing Community Detection Accuracy in Social Networks using Improved Label Diffusion Approach
[
Vol.1,
Issue
1
- SpringYear
1404]
T
Tarhani.Sajad
A Solution for Implementing Zero Trust Architecture in Video Surveillance System
[
Vol.1,
Issue
2
- SummerYear
1404]
V
vaez shahrestani.atefeh
Performance Comparison of Caching Algorithms in Named Data Networks with a Focus on Mitigating Pollution Attacks and Optimizing the β Parameter
[
Vol.1,
Issue
2
- SummerYear
1404]