About the journal
Recent Articles
-
Open Access Article
1 - Tasks scheduling in distributed fog layer and cloud computing systems using dung beetle optimization algorithm
mohsen eghbali * ، reza azizIssue 2 , Vol. 1 , Spring 2024 -
Open Access Article
2 - Facial recognition of masked people using MediaPipe Facemesh and deep learning algorithms
Mansour Hesabi Moghaddam ، Hamid Reza Ghaffary * ، Mahdi khazaiepoorIssue 2 , Vol. 1 , Spring 2024 -
Open Access Article
3 - Improving the performance of phishing attack detection systems based on synergy of neural network and Ali Baba and the forty thieves algorithm
reza assareh * ، younes mobasheriIssue 2 , Vol. 1 , Spring 2024 -
Open Access Article
4 - Strategic Development and Innovation in Business Leveraging Artificial Intelligence and Blockchain Technology
Mostafa Ghobadi *Issue 2 , Vol. 1 , Spring 2024 -
Open Access Article
5 - Presenting a method to deal with DDOS attack in multimedia broadband wireless network
Mehdi Ghahremani * ، Mohammad mehdi shirmohammadiIssue 2 , Vol. 1 , Spring 2024 -
Open Access Article
6 - Phishing URL detection model based on machine learning
پریسا دانشجو * ، saeed ahmadiIssue 2 , Vol. 1 , Spring 2024
Most Viewed Articles
-
Open Access Article
1 - Predicting stock prices using data mining methods.
پریسا دانشجو * ، Mojtaba HajigholamiIssue 1 , Vol. 1 , Winter 2024 -
Open Access Article
2 - Traffic signs Detection and Recognition based on deep learning using embedded systems
peyman Babaei * ، Faezeh AllamehIssue 1 , Vol. 1 , Winter 2024 -
Open Access Article
3 - Authenticating electronic documents using steganography and watermarking methods
پریسا دانشجو * ، Mostafa MozafariIssue 1 , Vol. 1 , Winter 2024 -
Open Access Article
4 - The future of Internet of Things in providing smart medical services to retirees
پریسا دانشجو * ، saeed ahmadiIssue 1 , Vol. 1 , Winter 2024 -
Open Access Article
5 - energy harvesting and management in IoT
پریسا دانشجو * ، MohammadMahdi YadegarIssue 1 , Vol. 1 , Winter 2024 -
Open Access Article
6 - Investigating the method of intelligent defense mechanism against DDOS attacks of IOT
پریسا دانشجو * ، reza ghaffari dizajiIssue 1 , Vol. 1 , Winter 2024 -
Open Access Article
7 - Phishing URL detection model based on machine learning
پریسا دانشجو * ، saeed ahmadiIssue 2 , Vol. 1 , Spring 2024 -
Open Access Article
8 - Tasks scheduling in distributed fog layer and cloud computing systems using dung beetle optimization algorithm
mohsen eghbali * ، reza azizIssue 2 , Vol. 1 , Spring 2024 -
Open Access Article
9 - Improving the performance of phishing attack detection systems based on synergy of neural network and Ali Baba and the forty thieves algorithm
reza assareh * ، younes mobasheriIssue 2 , Vol. 1 , Spring 2024 -
Open Access Article
10 - Facial recognition of masked people using MediaPipe Facemesh and deep learning algorithms
Mansour Hesabi Moghaddam ، Hamid Reza Ghaffary * ، Mahdi khazaiepoorIssue 2 , Vol. 1 , Spring 2024