J

  • jafari.Maryam Discovering users` access patterns for web usage mining from web log files [ Vol.4, Issue 3 - Summer Year 2013]
  • Jahanbakhsh Gudakahriz.Sajjad Ad Hoc On-demand Non Overlapped Multipath Distance Vector Routing Protocol (AONOMDV) [ Vol.4, Issue 4 - Autumn Year 2013]
  • jamali.shahram VRED: An improvement over RED algorithm by using queue length growth velocity [ Vol.4, Issue 1 - Winter Year 2013]
  • jamali.shahram Ad Hoc On-demand Non Overlapped Multipath Distance Vector Routing Protocol (AONOMDV) [ Vol.4, Issue 4 - Autumn Year 2013]
  • Jamshidi.Yazdan A Lattice based Nearest Neighbor Classifier for Anomaly Intrusion Detection [ Vol.4, Issue 4 - Autumn Year 2013]
  • Javidan.Reza Unsupervised Texture Image Segmentation Using MRFEM Framework [ Vol.4, Issue 2 - Spring Year 2013]
  • Jazayeriy.Hamid Intrusion Detection System in Computer Networks Using Decision Tree and SVM Algorithms [ Vol.4, Issue 3 - Summer Year 2013]