Abdi.Hamdi
Economic Load Dispatch with Considering the Valve-Point Effects and Ramp Rate Limits of Generators Using Evolutionary Algorithms
[
Vol.5,
Issue
3
- SummerYear
2014]
Aghaee Ghazvini.Golnaz
An Analytical algorithm of component-Based Heterogeneous Software Architectural Styles performance prediction
[
Vol.5,
Issue
3
- SummerYear
2014]
Akbarimajd.Adel
Multi-Robot Foraging Based on Contract Net Protocol
[
Vol.5,
Issue
1
- WinterYear
2014]
Akbarimajd.Adel
Time-Distance Optimal Trajectory Planning For Mobile Robots On Straight And Circular Paths
[
Vol.5,
Issue
2
- SpringYear
2014]
Alinejad-Beromi.Yousef
Comparison of Conventional Salient-Pole Synchronous Generators and Permanent-Magnet-Assisted Salient-Pole Synchronous Generators based on Finite Element Analysis
[
Vol.5,
Issue
2
- SpringYear
2014]
Alipour.Majid
Improved Alignment of Bisulfite Sequencing Data Using CpG Islands
[
Vol.5,
Issue
2
- SpringYear
2014]
amini.nasrin
MRI and PET Image Fusion by Using Curvelet Transform
[
Vol.5,
Issue
4
- AutumnYear
2014]
Asgharpour-Alamdari.Hossein
Comparison of Conventional Salient-Pole Synchronous Generators and Permanent-Magnet-Assisted Salient-Pole Synchronous Generators based on Finite Element Analysis
[
Vol.5,
Issue
2
- SpringYear
2014]
Attarzadeh.Iman
Proposing a Novel Algorithm for Fault-Tolerant Relay Node Placement in Wireless Sensor Networks
[
Vol.5,
Issue
1
- WinterYear
2014]
azizifard.azin
Data Steganography on VoIP through Combination of Residue Number System and DNA Sequences
[
Vol.5,
Issue
2
- SpringYear
2014]
B
Barati.Hamid
Proposing a Novel Algorithm for Fault-Tolerant Relay Node Placement in Wireless Sensor Networks
[
Vol.5,
Issue
1
- WinterYear
2014]
Barati.Hamid
Data Steganography on VoIP through Combination of Residue Number System and DNA Sequences
[
Vol.5,
Issue
2
- SpringYear
2014]
Barghi Jond.Hossein
Multi-Robot Foraging Based on Contract Net Protocol
[
Vol.5,
Issue
1
- WinterYear
2014]
Barghi Jond.Hossein
Time-Distance Optimal Trajectory Planning For Mobile Robots On Straight And Circular Paths
[
Vol.5,
Issue
2
- SpringYear
2014]
Barjaste.Nadia
Improved Alignment of Bisulfite Sequencing Data Using CpG Islands
[
Vol.5,
Issue
2
- SpringYear
2014]
Behnam.Hamid
MRI and PET Image Fusion by Using Curvelet Transform
[
Vol.5,
Issue
4
- AutumnYear
2014]
E
ebrahimi.nafisa
Optimal Type-2 Fuzzy Controller for Anti-lock Braking Systems
[
Vol.5,
Issue
1
- WinterYear
2014]
ebrahimi.nafisa
Optimization of Bang-of-Bang TS-Fuzzy Based via DARLA Technique for ABS System
[
Vol.5,
Issue
3
- SummerYear
2014]
Eliasi.Ardalan
Novel Texture Description and Face Identification Methods by Defining Bridle Paths and Using Gabor Phases
[
Vol.5,
Issue
3
- SummerYear
2014]
Eliasi.Morteza
Novel Texture Description and Face Identification Methods by Defining Bridle Paths and Using Gabor Phases
[
Vol.5,
Issue
3
- SummerYear
2014]
Emadi.Sima
An Analytical algorithm of component-Based Heterogeneous Software Architectural Styles performance prediction
[
Vol.5,
Issue
3
- SummerYear
2014]
Esfandiari.Ahmad
Cuckoo Optimization Algorithm in Cutting Conditions During Machining
[
Vol.5,
Issue
2
- SpringYear
2014]
Esmaeilpour.Mansour
An Optimal Similarity Measure for Collaborative Filtering Using Firefly Algorithm
[
Vol.5,
Issue
3
- SummerYear
2014]
F
Fatemizadeh.Emad
MRI and PET Image Fusion by Using Curvelet Transform
[
Vol.5,
Issue
4
- AutumnYear
2014]
Fateri.Soheil
Intrusion Detection System in Computer Network Using Hybrid Algorithms (SVM and ABC)
[
Vol.5,
Issue
4
- AutumnYear
2014]
Forootan.Faraz
Presenting a New Text-Independent Speaker Verification System Based on Multi Model GMM
[
Vol.5,
Issue
4
- AutumnYear
2014]
G
Ghaderi.Reza
IPSO-SQP Algorithm for Solving Time Optimal Bang-Bang Control Problems and Its Application on Autonomous Underwater Vehicle
[
Vol.5,
Issue
2
- SpringYear
2014]
Gharaveisi.Ali Akbar
Optimal Type-2 Fuzzy Controller for Anti-lock Braking Systems
[
Vol.5,
Issue
1
- WinterYear
2014]
Gholami.Akram
Common Spatial Pattern for Human Identification Based on Finger Vein Images in Radon space
[
Vol.5,
Issue
4
- AutumnYear
2014]
Gholipour Goodarzi.Bahareh
Intrusion Detection System in Computer Network Using Hybrid Algorithms (SVM and ABC)
[
Vol.5,
Issue
4
- AutumnYear
2014]
Gursel Ozmen.Nurhan
Time-Distance Optimal Trajectory Planning For Mobile Robots On Straight And Circular Paths
[
Vol.5,
Issue
2
- SpringYear
2014]
H
Hadi.Behnaz
RISE Feedback Control Design for RLED Robot Manipulator Using Bees Algorithm
[
Vol.5,
Issue
4
- AutumnYear
2014]
Hasanabadi.Hosien
Detection of Pulmonary Nodules in CT Images Using Template Matching and Neural Classifier
[
Vol.5,
Issue
1
- WinterYear
2014]
Hassanpour.Hamid
Common Spatial Pattern for Human Identification Based on Finger Vein Images in Radon space
[
Vol.5,
Issue
4
- AutumnYear
2014]
Heydari.Elnaz
New Strategy for Stopping Sifting Process during Bio-signals De-nosing By EMD: In Case of Low Frequency Artifact Reduction from ECG and EMG
[
Vol.5,
Issue
4
- AutumnYear
2014]
Hosseinpour.Najmeh
Presenting a New Text-Independent Speaker Verification System Based on Multi Model GMM
[
Vol.5,
Issue
4
- AutumnYear
2014]
I
ilka.Reza
Comparison of Conventional Salient-Pole Synchronous Generators and Permanent-Magnet-Assisted Salient-Pole Synchronous Generators based on Finite Element Analysis
[
Vol.5,
Issue
2
- SpringYear
2014]
imaie.elham
Improving Short-Term Wind Power Prediction with Neural Network and ICA Algorithm and Input Feature Selection
[
Vol.5,
Issue
3
- SummerYear
2014]
J
Jaberi.Negar
On the Linearization of Zinc Models
[
Vol.5,
Issue
4
- AutumnYear
2014]
Jafarali Jassbi.Somayyeh
Taxonomy of Intelligent Transportation Systems (VANET): A Survey
[
Vol.5,
Issue
1
- WinterYear
2014]
jafari.abolfazl
Investigating the Effect of Black Hole Attack on AODV and DSR routing protocols in Wireless Ad Hoc network
[
Vol.5,
Issue
1
- WinterYear
2014]
javaherian.maryam
A Routing Algorithm based on Fuzzy Clustering and Minimum Cost Tree (FCMCT) in Wireless Sensor Network
[
Vol.5,
Issue
3
- SummerYear
2014]
Javidan.Reza
MAC Protocols in Underwater Wireless Sensor Networks: Issues and Simulations
[
Vol.5,
Issue
2
- SpringYear
2014]
K
Khosravi.Alireza
Observer based approach for a class of nonlinear systems using Rise feedback controller
[
Vol.5,
Issue
1
- WinterYear
2014]
Khosravi.Alireza
RISE Feedback Control Design for RLED Robot Manipulator Using Bees Algorithm
[
Vol.5,
Issue
4
- AutumnYear
2014]
L
lotfi.sadeq
Presenting a Fault Tolerant Mechanism for Buffering Fault in Network on Chips
[
Vol.5,
Issue
2
- SpringYear
2014]
M
Maghfoori Farsangi.Malihe
Order reduction by minimizing integral square error and H∞ norm of error
[
Vol.5,
Issue
1
- WinterYear
2014]
malekzadeh.milad
Observer based approach for a class of nonlinear systems using Rise feedback controller
[
Vol.5,
Issue
1
- WinterYear
2014]
Mehrnia.Mohammad
Data Steganography on VoIP through Combination of Residue Number System and DNA Sequences
[
Vol.5,
Issue
2
- SpringYear
2014]
Mohammadi.Reza
MAC Protocols in Underwater Wireless Sensor Networks: Issues and Simulations
[
Vol.5,
Issue
2
- SpringYear
2014]
Moshiri.Behzad
Fuzzy Threat Assessment on Service Availability with Data Fusion Approach
[
Vol.5,
Issue
4
- AutumnYear
2014]
Mosleh.Mohammad
Presenting a New Text-Independent Speaker Verification System Based on Multi Model GMM
[
Vol.5,
Issue
4
- AutumnYear
2014]
motameni.homayun
Chaotic Time Series Prediction by Auto Fuzzy Regression Model
[
Vol.5,
Issue
2
- SpringYear
2014]
movaghar.ali
Proposing a Novel Algorithm for Fault-Tolerant Relay Node Placement in Wireless Sensor Networks
[
Vol.5,
Issue
1
- WinterYear
2014]
N
Nabavi.Seyyed Yahya
MAC Protocols in Underwater Wireless Sensor Networks: Issues and Simulations
[
Vol.5,
Issue
2
- SpringYear
2014]
Naji.Mohsen
New Strategy for Stopping Sifting Process during Bio-signals De-nosing By EMD: In Case of Low Frequency Artifact Reduction from ECG and EMG
[
Vol.5,
Issue
4
- AutumnYear
2014]
Nasiri Soloklo.Hasan
Order reduction by minimizing integral square error and H∞ norm of error
[
Vol.5,
Issue
1
- WinterYear
2014]
navaezadeh.sedigheh
Investigating the Effect of Black Hole Attack on AODV and DSR routing protocols in Wireless Ad Hoc network
[
Vol.5,
Issue
1
- WinterYear
2014]
navaezadeh.sedigheh
Improving Reliability through Selecting Data in Grid Distributed System and Comparing it with Other Presented Algorithms
[
Vol.5,
Issue
2
- SpringYear
2014]
Nazari.Haleh
Chaotic Time Series Prediction by Auto Fuzzy Regression Model
[
Vol.5,
Issue
2
- SpringYear
2014]
P
Postizadeh.Tahereh
Data Steganography on VoIP through Combination of Residue Number System and DNA Sequences
[
Vol.5,
Issue
2
- SpringYear
2014]
R
Rafeh.Reza
On the Linearization of Zinc Models
[
Vol.5,
Issue
4
- AutumnYear
2014]
Ramzanpour.Mostafa
Economic Load Dispatch with Considering the Valve-Point Effects and Ramp Rate Limits of Generators Using Evolutionary Algorithms
[
Vol.5,
Issue
3
- SummerYear
2014]
Ranjbar N..Abolfazl
RISE Feedback Control Design for RLED Robot Manipulator Using Bees Algorithm
[
Vol.5,
Issue
4
- AutumnYear
2014]
Ranjbar Noei.Abolfazl
IPSO-SQP Algorithm for Solving Time Optimal Bang-Bang Control Problems and Its Application on Autonomous Underwater Vehicle
[
Vol.5,
Issue
2
- SpringYear
2014]
S
sadeghzadeh.mehdi
An Optimal Similarity Measure for Collaborative Filtering Using Firefly Algorithm
[
Vol.5,
Issue
3
- SummerYear
2014]
Sardeh Moghadam.Amin
Fuzzy Threat Assessment on Service Availability with Data Fusion Approach
[
Vol.5,
Issue
4
- AutumnYear
2014]
Sarhadi.Pouria
RISE Feedback Control Design for RLED Robot Manipulator Using Bees Algorithm
[
Vol.5,
Issue
4
- AutumnYear
2014]
Sedighi.Mohsen
Proposing a Novel Algorithm for Fault-Tolerant Relay Node Placement in Wireless Sensor Networks
[
Vol.5,
Issue
1
- WinterYear
2014]
Shahbakhti.Mohammad
New Strategy for Stopping Sifting Process during Bio-signals De-nosing By EMD: In Case of Low Frequency Artifact Reduction from ECG and EMG
[
Vol.5,
Issue
4
- AutumnYear
2014]
Sheikholeslami.Abdolreza
Improving Short-Term Wind Power Prediction with Neural Network and ICA Algorithm and Input Feature Selection
[
Vol.5,
Issue
3
- SummerYear
2014]
Shirazi.Babak
Chaotic Time Series Prediction by Auto Fuzzy Regression Model
[
Vol.5,
Issue
2
- SpringYear
2014]
shomalnasab.fatemeh
An Optimal Similarity Measure for Collaborative Filtering Using Firefly Algorithm
[
Vol.5,
Issue
3
- SummerYear
2014]
T
Taleshian.Tahereh
IPSO-SQP Algorithm for Solving Time Optimal Bang-Bang Control Problems and Its Application on Autonomous Underwater Vehicle
[
Vol.5,
Issue
2
- SpringYear
2014]
V
Vatanian Shanjani.Gholamreza
Taxonomy of Intelligent Transportation Systems (VANET): A Survey
[
Vol.5,
Issue
1
- WinterYear
2014]
Y
Yaghoubi.Zohreh
Novel Texture Description and Face Identification Methods by Defining Bridle Paths and Using Gabor Phases
[
Vol.5,
Issue
3
- SummerYear
2014]
Z
Zabihi.Mohsen
Detection of Pulmonary Nodules in CT Images Using Template Matching and Neural Classifier
[
Vol.5,
Issue
1
- WinterYear
2014]
zangeneh.Iman
Investigating the Effect of Black Hole Attack on AODV and DSR routing protocols in Wireless Ad Hoc network
[
Vol.5,
Issue
1
- WinterYear
2014]