A

  • Abbasi.Javad Employing a meta-synthesis to present a framework for commercial banks’ preparedness indicators in use of blockchain technology [ Vol.13, Iss. 49 , 50 - Autumn - Winter Year 1400]
  • Abbasi.Mohammadhassan Designing a personalized e-learning system using learners' characteristics and implementing it with the gamification elements [ Vol.13, Iss. 47 , 48 - Spring - Summer Year 1400]
  • abbasi.narges Analysing students' learning through morning exercise using data mining techniques [ Vol.13, Iss. 49 , 50 - Autumn - Winter Year 1400]
  • abbaspour.javad Improvement of mean shift tracker for tracking of target with variable photometric pattern [ Vol.4, Iss. 13 - Spring Year ]
  • abdipour.abdolali The Impact of IQ Imbalance on the BER of Adaptive Modulation in the MIMO System [ Vol.1, Iss. 1 - Spring Year ]
  • abdipour.abdolali Design, simulation and performance comparison of radating elements of reflect array antenna [ Vol.5, Iss. 15 - Summer Year ]
  • Abdolrazzagh-Nezhad.Majid Comparing A Hybridization of Fuzzy Inference System and Particle Swarm Optimization Algorithm with Deep Learning to Predict Stock Prices [ Vol.11, Iss. 41 , 42 - Autumn - Winter Year 1398]
  • adibi.zhinoos A Combinational Model for Evaluating Organizational Readiness for Data Warehouse Implementation by Using Analytical Hierarchical Process [ Vol.2, Iss. 3 - Summer Year ]
  • aghaeizade.reza Medial-axis Enhancement of Tubular Structures and its Application in the Extraction of Portal Veins [ Vol.4, Iss. 13 - Spring Year ]
  • aghaeizade.reza [ Vol.4, Iss. 14 , 15 - Autumn - Winter Year 1391]
  • Ahari.Somayeh A New Approach to Extract and Utilize Learners Social Relationships through Analyzing Forums Structure and Contents [ Vol.4, Iss. 11 - Autumn Year ]
  • Ahari.Somayeh Multimedia teaching and its effects on learning and retention of English grammar [ Vol.4, Iss. 11 - Autumn Year ]
  • Ahari.Somayeh The Evaluation of E-learning by Benchmarking Approach Iran Higher Education as a Case Study [ Vol.4, Iss. 11 - Autumn Year ]
  • Ahari.Somayeh Assessing the e-service quality of Payame Noor University [ Vol.4, Iss. 11 - Autumn Year ]
  • Ahari.Somayeh Ontology-Based Up gradation of Entrepreneurship Skills Using Educational Portals [ Vol.4, Iss. 11 - Autumn Year ]
  • Ahari.Somayeh Proposing a Model for Extracting Information from Textual Documents, Based on Text Mining in E-learning [ Vol.4, Iss. 11 - Autumn Year ]
  • Ahari.Somayeh Relation of emotional intelligence and trends of e-learning in organizations (Case study: Bank employees Alborz Province) [ Vol.4, Iss. 11 - Autumn Year ]
  • Ahmadi.Hamid A greedy new method based on the cascade model to calculate maximizing penetration in social networks [ Vol.10, Iss. 37 , 38 - Autumn - Winter Year 1397]
  • Ahmadian chashmi.hamidreza A framework for establishing a national data vault for Data Governance institution [ Vol.13, Iss. 49 , 50 - Autumn - Winter Year 1400]
  • ahsan.reza Converting protein sequence to image for classification with convolutional neural network [ Vol.12, Iss. 43 , 44 - Spring - Summer Year 1399]
  • akbar.ali Applying genetic algorithm for automatic service identification based on quality metrics [ Vol.6, Iss. 19 - Autumn Year ]
  • akbari.ahmad Evaluation of SIP signaling implementation using QoS parameters [ Vol.1, Iss. 1 - Spring Year ]
  • Akbari.Mohsen [ Vol.8, Iss. 27 , 28 - Spring - Summer Year 1395]
  • Akbari.Mohsen Understanding the users’ initial trust of social networks [ Vol.8, Iss. 27 - Spring Year ]
  • akhlaghi.fardin [ Vol.2, Iss. 6 , 7 - Autumn - Winter Year 1389]
  • akhlaghi.fardin DWT-SVD based Semi-Blind Digital Image Watermarking [ Vol.2, Iss. 5 - Spring - Summer Year ]
  • alagheband.basir طراحی اولین پایگاه داده کلمات دستنویس کردی برای سیستم های تشخیص تصویری کلمات [ Vol.5, Iss. 17 - Spring - Summer Year ]
  • ali.ghalibaf Improving performance of probe-based rate control mechanisms using classification: evaluation on an experimental testbed for High Throughput WLANs [ Vol.12, Iss. 43 , 44 - Spring - Summer Year 1399]
  • alinezhad.ali Integrating Data Envelopment Analysis and Decision Tree Models in Order to Evaluate Information Technology-Based Units [ Vol.8, Iss. 27 - Spring Year ]
  • alinezhad.alireza A Combination Method of DEA, DEMATEL and ANP for Evaluation of ERP Systems [ Vol.12, Iss. 45 , 46 - Autumn - Winter Year 1399]
  • alipour.fazaneh A Research Over the Obstacles and Influential Factors on Development of e-Learning Subjects from Perspective of Beneficiaries of CME Program in Jahrom University of Medical Sciences in 2012-2013 [ Vol.6, Iss. 21 - Spring Year ]
  • Aliyari.Shahram A model information technology adoption in academic research projects in the filed ICT based on Information Technology Adoption Integrated Modeling (ITAIM) [ Vol.11, Iss. 41 , 42 - Autumn - Winter Year 1398]
  • Amini.Amir [ Vol.8, Iss. 27 , 28 - Spring - Summer Year 1395]
  • Amini.Amir Integrating Data Envelopment Analysis and Decision Tree Models in Order to Evaluate Information Technology-Based Units [ Vol.8, Iss. 27 - Spring Year ]
  • amintoosi.mahmood The aware genetic algorithm of the best member, applied to graph coloring and metric-dimension of the graph problems [ Vol.12, Iss. 43 , 44 - Spring - Summer Year 1399]
  • Amiri.Maryam Document Clustering Based On Ontology and Fuzzy Approach [ Vol.5, Iss. 17 - Spring - Summer Year ]
  • Amiri.Samira Improvement of the bulk sensitivity and FoM of the plasmonic nanodipole antenna array [ Vol.9, Iss. 33 , 34 - Autumn - Winter Year 1396]
  • AmiriAra.Hamid Joint Power Allocation Optimization of cooperative communication systems with Non-Orthogonal Multiple Access [ Vol.12, Iss. 45 , 46 - Autumn - Winter Year 1399]
  • amrolahi.milad context-aware travel recommender system exploiting from Geo-tagged photos [ Vol.11, Iss. 41 , 42 - Autumn - Winter Year 1398]
  • anarinejad.abbas [ Vol.4, Iss. 12 , 13 - Spring - Summer Year 1391]
  • arabsorkhi.abouzar New Method to Improve Illumination Variations in Adult Images Based on Fuzzy Deep Neural Network [ Vol.11, Iss. 41 , 42 - Autumn - Winter Year 1398]
  • arefi.somayeh Feature selection for author identification of Persian online short texts [ Vol.13, Iss. 47 , 48 - Spring - Summer Year 1400]
  • arianyan.ehsan High Performance Computing: Next Generation Requirements and Research Axes [ Vol.14, Iss. 51 , 52 - Spring - Summer Year 1401]
  • aryanian.iman Design, simulation and performance comparison of radating elements of reflect array antenna [ Vol.5, Iss. 15 - Summer Year ]
  • asadi.bahareh Adaptive rotation models and traffic patterns to reduce light loss in networks on optical chip [ Vol.10, Iss. 35 , 36 - Spring - Summer Year 1397]
  • asemi.atefe Investigating the Degree of Application of Professional Ethics and Vocational Qualifications by the Faculty Members of Virtual Universities of Isfahan and Medical Sciences University of Isfahan [ Vol.6, Iss. 21 - Spring Year ]
  • ashouri.mina Investigating the Effect of Hardware Parameters Adjustments on Energy Consumption in Thin Matrix Multiplication Algorithm on GPUs [ Vol.9, Iss. 31 , 32 - Spring - Summer Year 1396]
  • attaran.ebrahim Blind correction of camera lens aberration and de-centering error using modified Zernike model [ Vol.7, Iss. 25 - Spring - Summer Year ]
  • ayagh.zahra Understanding the users’ initial trust of social networks [ Vol.8, Iss. 27 - Spring Year ]
  • Azarnejad.Ardeshir Routing improvement to control congestion in software defined networks by using distributed controllers [ Vol.11, Iss. 39 , 40 - Spring - Summer Year 1398]
  • azharivs.azharivs Evaluation of SIP signaling implementation using QoS parameters [ Vol.1, Iss. 1 - Spring Year ]

B

  • babadi.sima [ Vol.4, Iss. 12 , 13 - Spring - Summer Year 1391]
  • Babaee.Hossein A Framework for Identifying and Ranking Criteria for Evaluating the Quality of Electronic Services (Case studies: Golestan website of Payame-noor university) [ Vol.5, Iss. 18 , 19 - Autumn - Winter Year 1392]
  • Babazadeh.Sogol Providing a model for evaluating native electronic content in Iran based on value chain [ Vol.13, Iss. 49 , 50 - Autumn - Winter Year 1400]
  • bagheri.alireza [ Vol.2, Iss. 4 , 5 - Spring - Summer Year 1389]
  • bagheri.masoud Applying genetic algorithm for automatic service identification based on quality metrics [ Vol.6, Iss. 19 - Autumn Year ]
  • bagherinejad.jafar A Combinational Model for Evaluating Organizational Readiness for Data Warehouse Implementation by Using Analytical Hierarchical Process [ Vol.2, Iss. 3 - Summer Year ]
  • bagherinejad.jafar A Model for impacts of Investment in IT on customer satisfaction, using Structural Equation Modeling and Path Analysis [ Vol.5, Iss. 15 - Summer Year ]
  • bahadorani baghbaderani.amin Routing of Multipartite Computer Networks Using Ant Genetic Algorithm [ Vol.9, Iss. 31 , 32 - Spring - Summer Year 1396]
  • Bahadorifard.Reza Investigating the Relationship between Electronic Human Resource Management, Agility and Organizational Effectiveness in Organizations Under the Ministry of Communications and Information Technology [ Vol.12, Iss. 45 , 46 - Autumn - Winter Year 1399]
  • baharloo.mahdiye An Improved Method for Detecting Phishing Websites Using Data Mining on Web Pages [ Vol.12, Iss. 43 , 44 - Spring - Summer Year 1399]
  • Bakhtiari.Saeed A Multi-Objective Differential Evolutionary Algorithm-based Approach for Resource Allocation in Cloud Computing Environment [ Vol.14, Iss. 51 , 52 - Spring - Summer Year 1401]
  • bakhtiyari.saied Routing improvement to control congestion in software defined networks by using distributed controllers [ Vol.11, Iss. 39 , 40 - Spring - Summer Year 1398]
  • Baradaran.Vahid A Model for Evaluating Electronic Governance (e-governance) in Iran's Executive Sectors [ Vol.13, Iss. 49 , 50 - Autumn - Winter Year 1400]
  • Barkhoda.Sayed Wafa Improving imperialist competitive algorithm for solving the nodes placement problem in three-dimensional grid wireless sensor networks [ Vol.12, Iss. 45 , 46 - Autumn - Winter Year 1399]
  • barzamini.roohollah [ Vol.2, Iss. 6 , 7 - Autumn - Winter Year 1389]
  • barzamini.roohollah Sliding Mode Controller for TCP Congestion Control [ Vol.2, Iss. 5 - Spring - Summer Year ]
  • beheshti.rahele Improving recommender systems with the help of Semantic Web [ Vol.9, Iss. 31 , 32 - Spring - Summer Year 1396]
  • Beheshti.Zahra An Individual-Oriented Shuffled Frog Leaping Algorithm for Solving Vehicle Routing Problem [ Vol.14, Iss. 51 , 52 - Spring - Summer Year 1401]
  • bobarshad.hossein [ Vol.8, Iss. 27 , 28 - Spring - Summer Year 1395]
  • bobarshad.hossein Extracting the Information Technology architecture of hospitals with approach of Implementing in Iran [ Vol.8, Iss. 27 - Spring Year ]
  • borna.keyvan Using web analytics in forecasting the stock price of chemical products group in the stock exchange [ Vol.11, Iss. 39 , 40 - Spring - Summer Year 1398]
  • Bouyer.Asgarali A greedy new method based on the cascade model to calculate maximizing penetration in social networks [ Vol.10, Iss. 37 , 38 - Autumn - Winter Year 1397]

C

  • Chabok.Hossein A design of Rectangular Waveguide TM11 to TE10 Mode Converter for S-band Applications [ Vol.9, Iss. 33 , 34 - Autumn - Winter Year 1396]

D

  • daee.amir Using web analytics in forecasting the stock price of chemical products group in the stock exchange [ Vol.11, Iss. 39 , 40 - Spring - Summer Year 1398]
  • daei.mohammadhassan Improving performance of probe-based rate control mechanisms using classification: evaluation on an experimental testbed for High Throughput WLANs [ Vol.12, Iss. 43 , 44 - Spring - Summer Year 1399]
  • daneshfar.fatemeh طراحی اولین پایگاه داده کلمات دستنویس کردی برای سیستم های تشخیص تصویری کلمات [ Vol.5, Iss. 17 - Spring - Summer Year ]
  • Daneshparvar.Mitra The role of organizational factors on consumer buying behavior in social networks [ Vol.12, Iss. 45 , 46 - Autumn - Winter Year 1399]
  • danyali.danyali [ Vol.2, Iss. 6 , 7 - Autumn - Winter Year 1389]
  • danyali.danyali DWT-SVD based Semi-Blind Digital Image Watermarking [ Vol.2, Iss. 5 - Spring - Summer Year ]
  • Danyali.Habibollah The Participation of Three Brain Tissues in Alzheimer’s disease Diagnosis from Structural MRI [ Vol.9, Iss. 33 , 34 - Autumn - Winter Year 1396]
  • Dastghaibyfard.Gholamhossein [ Vol.8, Iss. 27 , 28 - Spring - Summer Year 1395]
  • Dastghaibyfard.Gholamhossein A Novel Model for detecting intrusion with Mobile Agent and Game theory [ Vol.8, Iss. 27 - Spring Year ]
  • dehbashian.maryam [ Vol.2, Iss. 6 , 7 - Autumn - Winter Year 1389]
  • dehbashian.maryam Training MLP Neural Network in Images Compression by GSA Method [ Vol.2, Iss. 5 - Spring - Summer Year ]
  • dehdashti shahrokh.zohreh The role of organizational factors on consumer buying behavior in social networks [ Vol.12, Iss. 45 , 46 - Autumn - Winter Year 1399]
  • Dehghani.Mohammad Javad [ Vol.8, Iss. 27 , 28 - Spring - Summer Year 1395]
  • Dehghani.Mohammad Javad New changes of local binary patterns and classification and segmentation of seabed images [ Vol.8, Iss. 27 - Spring Year ]
  • Dehyadegari.Masoud High Performance Computing: Next Generation Requirements and Research Axes [ Vol.14, Iss. 51 , 52 - Spring - Summer Year 1401]
  • dianat.dianat Converting protein sequence to image for classification with convolutional neural network [ Vol.12, Iss. 43 , 44 - Spring - Summer Year 1399]
  • doustari.mohammadali Classify and implement hardware trojans and provide a new way to detect them [ Vol.9, Iss. 31 , 32 - Spring - Summer Year 1396]

E

  • Ebadati.Omid Mahdi Using web analytics in forecasting the stock price of chemical products group in the stock exchange [ Vol.11, Iss. 39 , 40 - Spring - Summer Year 1398]
  • Ebrahimi Lame.Nozar A Collaborative Filtering Movie Recommendation System Based on Users Correlation and Weighted K-Means with High Accuracy [ Vol.14, Iss. 51 , 52 - Spring - Summer Year 1401]
  • ebrahimi.mansour Converting protein sequence to image for classification with convolutional neural network [ Vol.12, Iss. 43 , 44 - Spring - Summer Year 1399]
  • ebrahimi.Seyyed Mohammad Introducing a genetic algorithm based Method for Community person's stance Detection in social media and news [ Vol.11, Iss. 41 , 42 - Autumn - Winter Year 1398]
  • Edalatian Shariairi.Jamshid A value Co-creation model for Information and Communication Technology Entrepreneurial Ecosystem [ Vol.13, Iss. 49 , 50 - Autumn - Winter Year 1400]
  • Ehsani Boshla.Fatemeh High Performance Computing: Next Generation Requirements and Research Axes [ Vol.14, Iss. 51 , 52 - Spring - Summer Year 1401]
  • Elahi.Shaban [ Vol.2, Iss. 6 , 7 - Autumn - Winter Year 1389]
  • Elahi.Shaban A Hybrid Neural Network Ensemble Model for Credit Risk Assessment [ Vol.6, Iss. 20 , 21 - Spring - Summer Year 1393]
  • Elahi.Shaban Designing a Fuzzy Expert System for Selecting an Appropriate Contractor in Information Technology Outsourcing [ Vol.2, Iss. 5 - Spring - Summer Year ]
  • Eliasi.Behrooz Providing a model for evaluating native electronic content in Iran based on value chain [ Vol.13, Iss. 49 , 50 - Autumn - Winter Year 1400]
  • Eliasi.Behrooz Open Data Accessing Policymaking in Iran, in the Aspect of Preserving Privacy and Personal Data Ownership [ Vol.14, Iss. 51 , 52 - Spring - Summer Year 1401]
  • esmaeilpour.mansour A New Method to computational intelligence to improve network lifetime in wireless sensor networks [ Vol.7, Iss. 23 - Summer Year ]
  • esmaili.arefeh Use of conditional generative adversarial network to produce synthetic data with the aim of improving the classification of users who publish fake news [ Vol.13, Iss. 47 , 48 - Spring - Summer Year 1400]
  • Esnaashari.MohammadMahdi High Performance Computing: Next Generation Requirements and Research Axes [ Vol.14, Iss. 51 , 52 - Spring - Summer Year 1401]
  • Ezzati.Hashem The aware genetic algorithm of the best member, applied to graph coloring and metric-dimension of the graph problems [ Vol.12, Iss. 43 , 44 - Spring - Summer Year 1399]

F

  • faez.karim [ Vol.2, Iss. 6 , 7 - Autumn - Winter Year 1389]
  • faez.karim Blind Correction of Lens Aberration Using Modified Zernike Moments [ Vol.2, Iss. 5 - Spring - Summer Year ]
  • faez.karim Blind correction of camera lens aberration and de-centering error using modified Zernike model [ Vol.7, Iss. 25 - Spring - Summer Year ]
  • fahimnia.fatima A framework for establishing a national data vault for Data Governance institution [ Vol.13, Iss. 49 , 50 - Autumn - Winter Year 1400]
  • farasatkhah.maghsod Investigation on Faculty Members’ Competency Model in Virtual Environment Comment by the Faculty Members and Students (Based on Ormaner’s Model) [ Vol.6, Iss. 21 - Spring Year ]
  • Farhoodi.Mojgan Presenting a new conceptual model for the field of big data and analyzing the data-driven business in Iran based on the proposed model [ Vol.13, Iss. 47 , 48 - Spring - Summer Year 1400]
  • Farivar.Faezeh Stability Analysis of Networked Control Systems under Denial of Service Attacks using Switching System Theory [ Vol.13, Iss. 49 , 50 - Autumn - Winter Year 1400]
  • Farshi.Mohammad Measuring Similarity for Directed Path in Geometric Data [ Vol.12, Iss. 45 , 46 - Autumn - Winter Year 1399]
  • Farzaneh.Mandana Providing a model for evaluating native electronic content in Iran based on value chain [ Vol.13, Iss. 49 , 50 - Autumn - Winter Year 1400]
  • Farzi.Saeed Use of conditional generative adversarial network to produce synthetic data with the aim of improving the classification of users who publish fake news [ Vol.13, Iss. 47 , 48 - Spring - Summer Year 1400]
  • Fasanghari.Mahdi Comprehensive Interactive Maturity Model for Mobile government [ Vol.2, Iss. 3 - Summer Year ]
  • Fatemi.Yaghoub The Participation of Three Brain Tissues in Alzheimer’s disease Diagnosis from Structural MRI [ Vol.9, Iss. 33 , 34 - Autumn - Winter Year 1396]
  • Fathian.Mohammad Provide a conceptual model to identify the quality of electronic services in the country's online stores [ Vol.8, Iss. 30 , 31 - Autumn - Winter Year 1395]
  • Fathian.Mohammad COBIT A Suitable Framework for Measuring IT Governance in Organizations [ Vol.1, Iss. 1 - Spring Year ]
  • Fathian.Mohammad A proper method for the advertising email classification based on user’s profiles [ Vol.8, Iss. 27 - Spring Year ]
  • Fathian.Mohammad A conceptual model for identification of eservices quality in Iranian estores [ Vol.8, Iss. 29 - Summer Year ]
  • fathiyan.mohammad [ Vol.8, Iss. 27 , 28 - Spring - Summer Year 1395]
  • Feizpour.ٍElham Prioritization of e-commerce failure factors in technical infrastructure: Meybod city ceramic tile factories [ Vol.8, Iss. 30 , 31 - Autumn - Winter Year 1395]
  • Feizpour.ٍElham The Ranking Lack of Success Factors of Electronic Commerce in Technical Infrastructure in Tile and Ceramic Factories in Meybod County [ Vol.8, Iss. 29 - Summer Year ]
  • feyzi.amin Application of clustering in AODV routing protocol for intercity networks on the highway scenario [ Vol.8, Iss. 30 , 31 - Autumn - Winter Year 1395]
  • feyzi.amin using clustering in AODV routing protocol for vehicular ad-hoc networks on highway scenario [ Vol.8, Iss. 29 - Summer Year ]
  • forouza.amirhossein Medial-axis Enhancement of Tubular Structures and its Application in the Extraction of Portal Veins [ Vol.4, Iss. 13 - Spring Year ]
  • forouza.amirhossein [ Vol.4, Iss. 14 , 15 - Autumn - Winter Year 1391]

G

  • Gerami.Mohsen Pathology of software export development in Iran [ Vol.14, Iss. 51 , 52 - Spring - Summer Year 1401]
  • ghanbari.elham A new algorithm based on ensemble learning for learning to rank in information retrieval [ Vol.7, Iss. 25 - Spring - Summer Year ]
  • Ghasemi.Mohammad Exploring the antecedents and consequences of smart good governance using the fuzzy Delphi method (FDM) [ Vol.14, Iss. 51 , 52 - Spring - Summer Year 1401]
  • ghasemian.fahime Performance Improvement of Automatic Language Identification Using GMM-SVM Method [ Vol.2, Iss. 5 - Spring - Summer Year ]
  • Ghavami.Hossein Performance Analysis of Device to Device Communications Overlaying/Underlaying Cellular Network [ Vol.9, Iss. 33 , 34 - Autumn - Winter Year 1396]
  • ghayori.majid Incentive reward mechanism for Participants to the human computing system of Intrusion Detection Based on Game Theory [ Vol.12, Iss. 43 , 44 - Spring - Summer Year 1399]
  • ghazanfari.mehdi COBIT A Suitable Framework for Measuring IT Governance in Organizations [ Vol.1, Iss. 1 - Spring Year ]
  • ghaznavi.mohammadbagher Classify and implement hardware trojans and provide a new way to detect them [ Vol.9, Iss. 31 , 32 - Spring - Summer Year 1396]
  • ghodselahi.ahmad A Hybrid Neural Network Ensemble Model for Credit Risk Assessment [ Vol.6, Iss. 20 , 21 - Spring - Summer Year 1393]
  • gholamian.mohammadreza Provide a method for customer segmentation using the RFM model in conditions of uncertainty [ Vol.8, Iss. 30 , 31 - Autumn - Winter Year 1395]
  • Gholipour.Majid A Collaborative Filtering Movie Recommendation System Based on Users Correlation and Weighted K-Means with High Accuracy [ Vol.14, Iss. 51 , 52 - Spring - Summer Year 1401]
  • golshani rosta.mehrab ali An Information Architecture Framework for Utilizing Social Networks in Iranian Higher Education System [ Vol.5, Iss. 17 - Spring - Summer Year ]
  • Goodarzi.Babak [ Vol.8, Iss. 27 , 28 - Spring - Summer Year 1395]
  • Goodarzi.Babak New changes of local binary patterns and classification and segmentation of seabed images [ Vol.8, Iss. 27 - Spring Year ]

H

  • habibollahian.ehsan Three-axis attitude control of a micro-satellite by magnetic actuators through-synthesis robust method [ Vol.5, Iss. 15 - Summer Year ]
  • Haghighathoseini.Atefehsadat [ Vol.8, Iss. 27 , 28 - Spring - Summer Year 1395]
  • Haghighathoseini.Atefehsadat Extracting the Information Technology architecture of hospitals with approach of Implementing in Iran [ Vol.8, Iss. 27 - Spring Year ]
  • haghighathosseini.atefe Extracting the Information Technology architecture of hospitals with approach of Implementing in Iran [ Vol.8, Iss. 27 - Spring Year ]
  • Haghighinasab.Manijeh A value Co-creation model for Information and Communication Technology Entrepreneurial Ecosystem [ Vol.13, Iss. 49 , 50 - Autumn - Winter Year 1400]
  • Hajebi.Elham Reduction of network load by mapping the application in the network on a chip using the discrete Harris hawk algorithm [ Vol.14, Iss. 51 , 52 - Spring - Summer Year 1401]
  • Haji Gholam Saryazdi.Ali Determining the factors affecting the collective financing of knowledge-based IT companies [ Vol.10, Iss. 37 , 38 - Autumn - Winter Year 1397]
  • hajmohseni.sadegh Classify and implement hardware trojans and provide a new way to detect them [ Vol.9, Iss. 31 , 32 - Spring - Summer Year 1396]
  • hakimjavadi.ali [ Vol.7, Iss. 24 , 25 - Spring - Summer Year 1394]
  • hakimjavadi.ali Iran's Mobile Government Ecosystem Model, Stakeholders Identification and Analysis [ Vol.7, Iss. 23 - Summer Year ]
  • hakkak.mohammad Provide a model of human resource knowledge architecture in knowledge-based organizations using a mixed approach [ Vol.11, Iss. 39 , 40 - Spring - Summer Year 1398]
  • hamze.ali Improving recommender systems with the help of Semantic Web [ Vol.9, Iss. 31 , 32 - Spring - Summer Year 1396]
  • hashemi G..S. Alireza Provide a new architecture for the decision support system to manage stock trading based on a combination of financial indicators [ Vol.9, Iss. 31 , 32 - Spring - Summer Year 1396]
  • hashemi G..S. Alireza A Neighbor-based Link Prediction Method for Bipartite Networks [ Vol.13, Iss. 47 , 48 - Spring - Summer Year 1400]
  • Hashemi.Ali User recommendation in Telegram messenger by graph analysis and mathematical modeling of users' behavior [ Vol.13, Iss. 49 , 50 - Autumn - Winter Year 1400]
  • hashemi.MAHDI Modified orthogonal chaotic colonial competition algorithm and its application in improving pattern recognition in multilayer perceptron neural network [ Vol.10, Iss. 35 , 36 - Spring - Summer Year 1397]
  • hashemi.meisam Textual analysis of central bank news in forecasting long-term trend of Tehran stock exchange index [ Vol.12, Iss. 43 , 44 - Spring - Summer Year 1399]
  • Hashemi.Sattar Provide a framework for enhancing the security of IoT-based smart homes using the IoT-A reference architecture [ Vol.10, Iss. 35 , 36 - Spring - Summer Year 1397]
  • hassani.hadise Determination of Optimum SVMs Based on Genetic Algorithm in Classification of Hyper spectral Imagery [ Vol.4, Iss. 13 - Spring Year ]
  • hassani.hadise [ Vol.4, Iss. 14 , 15 - Autumn - Winter Year 1391]
  • hassanzade.alireza Designing a Fuzzy Expert System for Selecting an Appropriate Contractor in Information Technology Outsourcing [ Vol.2, Iss. 5 - Spring - Summer Year ]
  • hassanzade.alireza Determining the factors affecting the collective financing of knowledge-based IT companies [ Vol.10, Iss. 37 , 38 - Autumn - Winter Year 1397]
  • Haydari.Saeed Assessing E-Government Readiness in Iranian Universities, Case Study: Tarbiat Modares University [ Vol.12, Iss. 43 , 44 - Spring - Summer Year 1399]
  • hazratgholizadeh.rahim [ Vol.8, Iss. 27 , 28 - Spring - Summer Year 1395]
  • hazratgholizadeh.rahim A proper method for the advertising email classification based on user’s profiles [ Vol.8, Iss. 27 - Spring Year ]
  • heidary.mohsen Analysis of the current situation ICT in rural areas of the country (using the Delphi Method) [ Vol.6, Iss. 19 - Autumn Year ]
  • Helfroush.Mohammad Sadegh The Participation of Three Brain Tissues in Alzheimer’s disease Diagnosis from Structural MRI [ Vol.9, Iss. 33 , 34 - Autumn - Winter Year 1396]
  • Heshmati.Zainabolhoda [ Vol.7, Iss. 24 , 25 - Spring - Summer Year 1394]
  • Heshmati.Zainabolhoda [ Vol.7, Iss. 24 , 25 - Spring - Summer Year 1394]
  • Heshmati.Zainabolhoda Optimized Modeling for satisfaction in the relationship between a physician and patient based on machine learnin methods [ Vol.7, Iss. 23 - Summer Year ]
  • Heshmati.Zainabolhoda An optimised hybrid method for ambulance dispatch based on complex networks and Artificial Intelligence [ Vol.7, Iss. 23 - Summer Year ]
  • heydari.jamshid An Investigation on the Effect of Multifactor Model of Improving Critical Thinking in E-learning Environments [ Vol.6, Iss. 21 - Spring Year ]
  • homayooni.maryam Evaluation of SIP signaling implementation using QoS parameters [ Vol.1, Iss. 1 - Spring Year ]
  • homayoun.homayoun Performance Improvement of Automatic Language Identification Using GMM-SVM Method [ Vol.2, Iss. 5 - Spring - Summer Year ]
  • honarparvaran.hamid Designing a system dynamics model for upgrading policy Iran Information and Communication Technology Network Indicators [ Vol.8, Iss. 30 , 31 - Autumn - Winter Year 1395]
  • honarparvaran.hamid Design a Model Of System Dynamics (SD) On The Policy Of Upgrading Indices Of Iran ICT Network [ Vol.8, Iss. 29 - Summer Year ]
  • hosseinfirooze.zaker A Fast Method to Compute Radiation Fields of Shaped Reflector Antennas by FFT [ Vol.1, Iss. 2 , 3 - Autumn - Winter Year 1387]
  • Hosseini.Seyed Abdolrasoul Exploring the antecedents and consequences of smart good governance using the fuzzy Delphi method (FDM) [ Vol.14, Iss. 51 , 52 - Spring - Summer Year 1401]
  • Hosseinpour.Mehdi Open Data Accessing Policymaking in Iran, in the Aspect of Preserving Privacy and Personal Data Ownership [ Vol.14, Iss. 51 , 52 - Spring - Summer Year 1401]
  • Hosseinzadeh.Elham Investigating the Information and Communication Technology Deployment Impact on Energy Expenditures of Iranian households (A Provincial Approach) [ Vol.13, Iss. 49 , 50 - Autumn - Winter Year 1400]
  • Hossieni bayan.Shaghayeghsadat High Performance Computing: Next Generation Requirements and Research Axes [ Vol.14, Iss. 51 , 52 - Spring - Summer Year 1401]
  • houri.masa Medial-axis Enhancement of Tubular Structures and its Application in the Extraction of Portal Veins [ Vol.4, Iss. 13 - Spring Year ]

J

  • Jabraeil Jamali.Mohammad Ali Design of FPGA-based processor for SHA-2 series cryptographic algorithms Design ترجمه‌های design اسمفراوانی طرح plan, design, layout, project, scheme, plot نقشه map, plan, plot, scheme, plat, chart زمینه background, context, ground, setting, base, terrain تدبیر measure, plan, contraption, gimmick, contrivance, scheme قصد intention, intent, purpose, attempt, will, determination طراح ریزی design خیال imagination, phantom, illusion, thought, fiction, mind فعل طرح کردن design, plan, draft, draw, lay, bring forth قصد کردن attempt, decide, design, meditate تخصیص دادن allot, allocate, apportion, consecrate, give, design تدبیر کردن devise, contrive, meditate, compass, machinate, design تعریف‌های design اسم ۱ a plan or drawing produced to show the look and function or workings of a building, garment, or other object before it is built or made. he has just unveiled his design for the new museum مترادف‌ها: planblueprintdrawingscale drawingsketchoutlinemapplotdiagramdelineationdraftdepictionrepresentationartist's impressionschememodelprototypeproposal ۲ an arrangement of lines or shapes created to form a pattern or decoration. pottery with a lovely blue and white design مترادف‌ها: patternmotifdevicestylearrangementcompositionmakeuplayoutconstitutionconfigurationorganizationconstructionshapeformformationfigure purpose, planning, or intention that exists or is thought to exist behind an action, fact, or material object. the appearance of design in the universe مترادف‌ها: intentionaimpurposeplanintentobjectiveobjectgoalendtargetpointhopedesirewishdreamaspirationambitionidea فعل ۱ decide upon the look and functioning of (a building, garment, or other object), by making a detailed drawing of it. a number of architectural students were designing a factory مترادف‌ها: plandraw plans ofdrawsketchoutlinemap outplotblock outdelineatedraftdepictinventoriginatecreatethink upcome up withdeviseformformulateconceivemakeproducedevelopfashionfabricateforgehatchcoindream up مترادف design اسم planpatternintention فعل planinventdream upintend ۹۱ مترادف دیگر [ Vol.10, Iss. 37 , 38 - Autumn - Winter Year 1397]
  • jafari fesharaki.shekoofeh A Satellite Control Method Using Laguerre Model Predictive Control Approach [ Vol.5, Iss. 15 - Summer Year ]
  • jafari novimipour.nima Scheduling tasks in cloud environments using mapping framework - reduction and genetic algorithm [ Vol.10, Iss. 37 , 38 - Autumn - Winter Year 1397]
  • jafari novimipour.nima Using a multi-objective optimization algorithm for tasks allocate in the cloud-based systems to reduce energy consumption [ Vol.12, Iss. 43 , 44 - Spring - Summer Year 1399]
  • jafari.mahdi A New Algorithm for Fastintra-Frame Modes Selection in H.264/Avc Video Coding [ Vol.7, Iss. 26 , 27 - Autumn - Winter Year 1394]
  • Jafari.Seyed Mohammadbagher Provide methodology for selecting IT project management strategy [ Vol.10, Iss. 37 , 38 - Autumn - Winter Year 1397]
  • jahanbakhsh.mojtaba Evaluation of SIP signaling implementation using QoS parameters [ Vol.1, Iss. 1 - Spring Year ]
  • jam.Shahrokh Parametric analysis of a broadband Archimedean spiral antenna with cavity [ Vol.9, Iss. 33 , 34 - Autumn - Winter Year 1396]
  • jamipour.mona Provide methodology for selecting IT project management strategy [ Vol.10, Iss. 37 , 38 - Autumn - Winter Year 1397]
  • Jampour.Mehdi An efficient Two Pathways Deep Architecture for Soccer Goal Recognition towards Soccer Highlight Summarization [ Vol.13, Iss. 49 , 50 - Autumn - Winter Year 1400]
  • Javidan.Javidan [ Vol.8, Iss. 27 , 28 - Spring - Summer Year 1395]
  • Javidan.Javidan New changes of local binary patterns and classification and segmentation of seabed images [ Vol.8, Iss. 27 - Spring Year ]

K

  • kaedi.marjan Textual analysis of central bank news in forecasting long-term trend of Tehran stock exchange index [ Vol.12, Iss. 43 , 44 - Spring - Summer Year 1399]
  • kalantari.nadia [ Vol.2, Iss. 6 , 7 - Autumn - Winter Year 1389]
  • kalantari.nadia Designing a Fuzzy Expert System for Selecting an Appropriate Contractor in Information Technology Outsourcing [ Vol.2, Iss. 5 - Spring - Summer Year ]
  • kamareiy.malihe Matched grouping of learners in e-learning environment using council clustering method [ Vol.11, Iss. 39 , 40 - Spring - Summer Year 1398]
  • Karamizadeh.Sasan New Method to Improve Illumination Variations in Adult Images Based on Fuzzy Deep Neural Network [ Vol.11, Iss. 41 , 42 - Autumn - Winter Year 1398]
  • karbasi.mostafa Adaptive rotation models and traffic patterns to reduce light loss in networks on optical chip [ Vol.10, Iss. 35 , 36 - Spring - Summer Year 1397]
  • Karbasi.Soheila Fast and accurate concept drift detection from event logs [ Vol.12, Iss. 43 , 44 - Spring - Summer Year 1399]
  • kardan.AhmadAgha [ Vol.4, Iss. 12 , 13 - Spring - Summer Year 1391]
  • karimi.keyvan Window-Shopping as an Effective Element to Improve Viral Marketing [ Vol.2, Iss. 3 - Summer Year ]
  • Karimpour.Davod User recommendation in Telegram messenger by graph analysis and mathematical modeling of users' behavior [ Vol.13, Iss. 49 , 50 - Autumn - Winter Year 1400]
  • kaveh.manije Investigation the role of personality and individual differences on password security breaches: An Empirical Study [ Vol.13, Iss. 49 , 50 - Autumn - Winter Year 1400]
  • kavoshtehrani.masoud Improvement of mean shift tracker for tracking of target with variable photometric pattern [ Vol.4, Iss. 13 - Spring Year ]
  • kavoshtehrani.masoud [ Vol.4, Iss. 14 , 15 - Autumn - Winter Year 1391]
  • kazemian.sirous A model information technology adoption in academic research projects in the filed ICT based on Information Technology Adoption Integrated Modeling (ITAIM) [ Vol.11, Iss. 41 , 42 - Autumn - Winter Year 1398]
  • Keimasi.Masoud Employing a meta-synthesis to present a framework for commercial banks’ preparedness indicators in use of blockchain technology [ Vol.13, Iss. 49 , 50 - Autumn - Winter Year 1400]
  • Kermani.Aminolah Using Sentiment Analysis and Combining Classifiers for Spam Detection in Twitter [ Vol.14, Iss. 51 , 52 - Spring - Summer Year 1401]
  • Keyhanipour.Amir Hosein Learning to Rank for the Persian Web Using the Layered Genetic Programming [ Vol.10, Iss. 37 , 38 - Autumn - Winter Year 1397]
  • khademzade.ahmad Adaptive rotation models and traffic patterns to reduce light loss in networks on optical chip [ Vol.10, Iss. 35 , 36 - Spring - Summer Year 1397]
  • KHALAJJ.ELHAM Presenting the model for opinion mining at the document feature level for hotel users' reviews [ Vol.13, Iss. 49 , 50 - Autumn - Winter Year 1400]
  • khalili.ali Semiautomatic Creation of Enterprise Mashups Using Semantic Descriptions [ Vol.2, Iss. 3 - Summer Year ]
  • Khalili.Zahra Employing a meta-synthesis to present a framework for commercial banks’ preparedness indicators in use of blockchain technology [ Vol.13, Iss. 49 , 50 - Autumn - Winter Year 1400]
  • Khansari.Mohammad A RPL-based Routing Algorithm for Multimedia Traffic for the Internet of Things [ Vol.13, Iss. 47 , 48 - Spring - Summer Year 1400]
  • kharati.ehsan Increasing the value of collected data and reducing energy consumption by using network coding and mobile sinks in wireless sensor networks [ Vol.12, Iss. 43 , 44 - Spring - Summer Year 1399]
  • Kharrat.Mahmood Providing a model for evaluating native electronic content in Iran based on value chain [ Vol.13, Iss. 49 , 50 - Autumn - Winter Year 1400]
  • Khashei.vahid The role of organizational factors on consumer buying behavior in social networks [ Vol.12, Iss. 45 , 46 - Autumn - Winter Year 1399]
  • Khasteh.Seyed Hossein Improving Efficiency of Finding Frequent Subgraphs in Graph Stream Using gMatrix Summarization [ Vol.12, Iss. 45 , 46 - Autumn - Winter Year 1399]
  • khatan Lo.hasan Document Clustering Based On Ontology and Fuzzy Approach [ Vol.5, Iss. 17 - Spring - Summer Year ]
  • Khatibi.Amid A Novel Method based on the Cocomo model to increase the accuracy of software projects effort estimates [ Vol.12, Iss. 45 , 46 - Autumn - Winter Year 1399]
  • kherad.mahdi Comparing A Hybridization of Fuzzy Inference System and Particle Swarm Optimization Algorithm with Deep Learning to Predict Stock Prices [ Vol.11, Iss. 41 , 42 - Autumn - Winter Year 1398]
  • khezr.nima Scheduling tasks in cloud environments using mapping framework - reduction and genetic algorithm [ Vol.10, Iss. 37 , 38 - Autumn - Winter Year 1397]
  • khorsandi.siavash Cyber Threats Foresight Against Iran Based on Attack Vector [ Vol.9, Iss. 33 , 34 - Autumn - Winter Year 1396]
  • Khosroshahi.Mahan A Multi-Objective Differential Evolutionary Algorithm-based Approach for Resource Allocation in Cloud Computing Environment [ Vol.14, Iss. 51 , 52 - Spring - Summer Year 1401]
  • khotanloo.hassan A New Method to computational intelligence to improve network lifetime in wireless sensor networks [ Vol.7, Iss. 23 - Summer Year ]
  • Khunjush.Farshad Investigating the Effect of Hardware Parameters Adjustments on Energy Consumption in Thin Matrix Multiplication Algorithm on GPUs [ Vol.9, Iss. 31 , 32 - Spring - Summer Year 1396]
  • Khunjush.Farshad Investigating the Effects of Hardware Parameters on Power Consumptions in SPMV Algorithms on Graphics Processing Units (GPUs) [ Vol.9, Iss. 31 - Spring - Summer Year ]
  • kiani.koorosh Design of Secure Communication System by Use of Synchronization of Chaotic Systems [ Vol.2, Iss. 3 - Summer Year ]
  • Kiani.Vahid Two Fuzzy Virtual Force Algorithms to Improve Sensor Deployment in Wireless Sensor Networks [ Vol.14, Iss. 51 , 52 - Spring - Summer Year 1401]

L

  • lak.behzad Analysing students' learning through morning exercise using data mining techniques [ Vol.13, Iss. 49 , 50 - Autumn - Winter Year 1400]
  • Layeghi.Kamran Sentiment analysis for stock market predection with deep neural network: A case study for international corporate stock database [ Vol.13, Iss. 47 , 48 - Spring - Summer Year 1400]
  • Layeghi.Kamran An efficient Two Pathways Deep Architecture for Soccer Goal Recognition towards Soccer Highlight Summarization [ Vol.13, Iss. 49 , 50 - Autumn - Winter Year 1400]
  • lormohammad hasani esfandghe.yahya Incentive reward mechanism for Participants to the human computing system of Intrusion Detection Based on Game Theory [ Vol.12, Iss. 43 , 44 - Spring - Summer Year 1399]

M

  • madani.mohammadhosein Increasing data throughput in HF channel by decision feedback equalizer employing MC-FQRD-RLS algorithm and weight extraction in data mode [ Vol.5, Iss. 15 - Summer Year ]
  • Maghsoudi.Hamid Improved routing for load balancing in wireless sensor networks on the Internet of things, based on multiple ant colony algorithm [ Vol.14, Iss. 51 , 52 - Spring - Summer Year 1401]
  • mahdinejadnouri.mohammad Increasing data throughput in HF channel by decision feedback equalizer employing MC-FQRD-RLS algorithm and weight extraction in data mode [ Vol.5, Iss. 15 - Summer Year ]
  • mahjour.ali Provide a basic method for estimating software projects based on logical transactions [ Vol.9, Iss. 31 , 32 - Spring - Summer Year 1396]
  • makhlooghi.morteza [ Vol.2, Iss. 6 , 7 - Autumn - Winter Year 1389]
  • makhlooghi.morteza DWT-SVD based Semi-Blind Digital Image Watermarking [ Vol.2, Iss. 5 - Spring - Summer Year ]
  • maleki.reza Persian digit recognition system in aerial writing based on depth image [ Vol.10, Iss. 35 , 36 - Spring - Summer Year 1397]
  • manian.amir Prioritization of e-commerce failure factors in technical infrastructure: Meybod city ceramic tile factories [ Vol.8, Iss. 30 , 31 - Autumn - Winter Year 1395]
  • Mansoorizadeh.Muharram Discover product defect reports from the text of users' online comments [ Vol.10, Iss. 35 , 36 - Spring - Summer Year 1397]
  • mansour.hakimeh Sentiment analysis for stock market predection with deep neural network: A case study for international corporate stock database [ Vol.13, Iss. 47 , 48 - Spring - Summer Year 1400]
  • mansouri.bijan Provide a new architecture for the decision support system to manage stock trading based on a combination of financial indicators [ Vol.9, Iss. 31 , 32 - Spring - Summer Year 1396]
  • Mansoury.Masoud Provide a new architecture for the decision support system to manage stock trading based on a combination of financial indicators [ Vol.9, Iss. 31 , 32 - Spring - Summer Year 1396]
  • manzouri.mohammadtaghi A Novel Model based on Encoder-Decoder Architecture and Attention Mechanism for Automatic Abstractive Text Summarization [ Vol.14, Iss. 51 , 52 - Spring - Summer Year 1401]
  • mashayekhi.alinaghi Determining the factors affecting the collective financing of knowledge-based IT companies [ Vol.10, Iss. 37 , 38 - Autumn - Winter Year 1397]
  • memarmoghada.alireza Improvement of mean shift tracker for tracking of target with variable photometric pattern [ Vol.4, Iss. 13 - Spring Year ]
  • milani.farzaneh Investigating the effect of using various marketing strategies on social networks on gaining the trust of council customers Investigating ترجمه‌های investigate فعلفراوانی بررسی کردن investigate, check, peruse, survey, study رسیدگی کردن consider, attend, check, investigate, inspect, investigate استفسار کردن investigate وارسی کردن sift, investigate پژوهیدن investigate, inquire, research, search تحقیق کردن investigate, inquire, verify, assay, interrogate, question اطلاعات مقدماتی بدست اوردن investigate جستار کردن investigate تفتیش کردن inquire, inspect, investigate, revise باز جویی کردن examine, assay, inquire, interrogate, investigate, cross-examine تعریف‌های investigate فعل ۱ carry out a systematic or formal inquiry to discover and examine the facts of (an incident, allegation, etc.) so as to establish the truth. police are investigating the alleged beating مترادف‌ها: check outsuss outgive something the once-overscope outinquire intolook intogo intolook overprobeexplorescrutinizeconduct an investigation intoconduct an inquiry intomake inquiries abouttry to get to the bottom ofinspectanalyzestudyexamineconsiderresearchsearch/sift the evidence concerningpore overdelve intoauditevaluatefollow up مترادف investigate فعل check outsuss outgive something the once-overscope out inquire intolook intogo intolook overprobeexplorescrutinizeconduct an investigation intoconduct an inquiry intomake inquiries abouttry to get to the bottom ofinspectanalyzestudyexamineconsiderresearchsearch/sift the evidence concerningpore overdelve intoauditevaluatefollow up همچنین ببینید investigate [ Vol.11, Iss. 39 , 40 - Spring - Summer Year 1398]
  • Minoofam.Seyyed Amir Hadi A Decision Support System based on Rough sets for Enterprise Planning under uncertainty [ Vol.13, Iss. 47 , 48 - Spring - Summer Year 1400]
  • miri.maryam A Research Over the Obstacles and Influential Factors on Development of e-Learning Subjects from Perspective of Beneficiaries of CME Program in Jahrom University of Medical Sciences in 2012-2013 [ Vol.6, Iss. 21 - Spring Year ]
  • mirmohammadsadeghi.hamid A Fast Method to Compute Radiation Fields of Shaped Reflector Antennas by FFT [ Vol.1, Iss. 2 , 3 - Autumn - Winter Year 1387]
  • Mirsaeedghazi.Tahereh Providing a model for evaluating native electronic content in Iran based on value chain [ Vol.13, Iss. 49 , 50 - Autumn - Winter Year 1400]
  • Mirsaeedghazi.Tahereh Open Data Accessing Policymaking in Iran, in the Aspect of Preserving Privacy and Personal Data Ownership [ Vol.14, Iss. 51 , 52 - Spring - Summer Year 1401]
  • Moallem.Payman Modified orthogonal chaotic colonial competition algorithm and its application in improving pattern recognition in multilayer perceptron neural network [ Vol.10, Iss. 35 , 36 - Spring - Summer Year 1397]
  • Moallem.Payman Improvement of mean shift tracker for tracking of target with variable photometric pattern [ Vol.4, Iss. 13 - Spring Year ]
  • Moallem.Payman [ Vol.4, Iss. 14 , 15 - Autumn - Winter Year 1391]
  • mohamadrezaei larki.rezvan context-aware travel recommender system exploiting from Geo-tagged photos [ Vol.11, Iss. 41 , 42 - Autumn - Winter Year 1398]
  • mohammadi.abbas The Impact of IQ Imbalance on the BER of Adaptive Modulation in the MIMO System [ Vol.1, Iss. 1 - Spring Year ]
  • mohammadi.ali Designing a system dynamics model for upgrading policy Iran Information and Communication Technology Network Indicators [ Vol.8, Iss. 30 , 31 - Autumn - Winter Year 1395]
  • mohammadi.amir Using a Hybrid PSO-GA Method for Capacitor Placement in Distribution Systems [ Vol.6, Iss. 20 , 21 - Spring - Summer Year 1393]
  • mohammadi.majid A New Algorithm for Fastintra-Frame Modes Selection in H.264/Avc Video Coding [ Vol.7, Iss. 26 , 27 - Autumn - Winter Year 1394]
  • mohammadi.majid Application of clustering in AODV routing protocol for intercity networks on the highway scenario [ Vol.8, Iss. 30 , 31 - Autumn - Winter Year 1395]
  • Mohammadi.Shahram Persian digit recognition system in aerial writing based on depth image [ Vol.10, Iss. 35 , 36 - Spring - Summer Year 1397]
  • mohammadi.shahriyar A Study On Visual Cryptography and Providing a Proposed Method for Color Images Cryptography [ Vol.6, Iss. 20 , 21 - Spring - Summer Year 1393]
  • mohammadi.shahriyar Window-Shopping as an Effective Element to Improve Viral Marketing [ Vol.2, Iss. 3 - Summer Year ]
  • mohammadi.shahriyar Semiautomatic Creation of Enterprise Mashups Using Semantic Descriptions [ Vol.2, Iss. 3 - Summer Year ]
  • mohammadi.shahriyar Criteria for evaluating the effectiveness of social media users - a framework based on social media exploration [ Vol.11, Iss. 39 , 40 - Spring - Summer Year 1398]
  • mohammadi.shahriyar Presenting the model for opinion mining at the document feature level for hotel users' reviews [ Vol.13, Iss. 49 , 50 - Autumn - Winter Year 1400]
  • mohammadi.sudabeh Improving imperialist competitive algorithm for solving the nodes placement problem in three-dimensional grid wireless sensor networks [ Vol.12, Iss. 45 , 46 - Autumn - Winter Year 1399]
  • moltaji.milad Investigation the role of personality and individual differences on password security breaches: An Empirical Study [ Vol.13, Iss. 49 , 50 - Autumn - Winter Year 1400]
  • Momtazi.Saeedeh Sentiment analysis for stock market predection with deep neural network: A case study for international corporate stock database [ Vol.13, Iss. 47 , 48 - Spring - Summer Year 1400]
  • monadjemi.Amir Hassan Door detection based on car vision in outdoor scenes [ Vol.8, Iss. 30 , 31 - Autumn - Winter Year 1395]
  • monadjemi.Amir Hassan Outdoor Color Scene Segmentation towards Object Detection using Dual-Resolution Histograms [ Vol.4, Iss. 14 - Autumn - Winter Year 1391]
  • monadjemi.Amir Hassan [ Vol.4, Iss. 14 , 15 - Autumn - Winter Year 1391]
  • montazer.gholamali Design and implementation of a fuzzy expert system for suspicious behavior detection in e-banking system [ Vol.1, Iss. 1 - Spring Year ]
  • montazer.gholamali Optimal LO Selection in E-Learning Environment Using PSO Algorithm [ Vol.6, Iss. 21 - Spring Year ]
  • montazer.gholamali Automatic Sepration of Learnrs in Learning Groups Based on Identifying Learning Style from Their Behavior in Learning Environment [ Vol.6, Iss. 21 - Spring Year ]
  • montazer.gholamali Matched grouping of learners in e-learning environment using council clustering method [ Vol.11, Iss. 39 , 40 - Spring - Summer Year 1398]
  • montazer.gholamali Assessing E-Government Readiness in Iranian Universities, Case Study: Tarbiat Modares University [ Vol.12, Iss. 43 , 44 - Spring - Summer Year 1399]
  • montazer.gholamali Designing a personalized e-learning system using learners' characteristics and implementing it with the gamification elements [ Vol.13, Iss. 47 , 48 - Spring - Summer Year 1400]
  • moomivand.hussein An Investigation into the Provider Factors of Knowledge Management in the Kermanshah province Communication Company [ Vol.7, Iss. 25 - Spring - Summer Year ]
  • moradi.farshad [ Vol.4, Iss. 12 , 13 - Spring - Summer Year 1391]
  • Moradi.Gholamreza Design, simulation and performance comparison of radating elements of reflect array antenna [ Vol.5, Iss. 15 - Summer Year ]
  • moradi.hossein An Investigation on the Effect of Multifactor Model of Improving Critical Thinking in E-learning Environments [ Vol.6, Iss. 21 - Spring Year ]
  • moradi.mahmood A Managerial Examination of the Successful Parameters in the B2C Business [ Vol.5, Iss. 17 - Spring - Summer Year ]
  • Mortazavi.Farzaneh A RPL-based Routing Algorithm for Multimedia Traffic for the Internet of Things [ Vol.13, Iss. 47 , 48 - Spring - Summer Year 1400]
  • mosammami.shila A Managerial Examination of the Successful Parameters in the B2C Business [ Vol.5, Iss. 17 - Spring - Summer Year ]
  • mosavi.najmoddin Provide a model of human resource knowledge architecture in knowledge-based organizations using a mixed approach [ Vol.11, Iss. 39 , 40 - Spring - Summer Year 1398]
  • moslehi.zahra [ Vol.7, Iss. 26 , 27 - Autumn - Winter Year 1394]
  • moslehi.zahra Classifying Two Class data using Hyper Rectangle Parallel to the Coordinate Axes [ Vol.7, Iss. 25 - Spring - Summer Year ]
  • moslehshirazi.alinaghi Designing a system dynamics model for upgrading policy Iran Information and Communication Technology Network Indicators [ Vol.8, Iss. 30 , 31 - Autumn - Winter Year 1395]
  • movahedi.masoud A model information technology adoption in academic research projects in the filed ICT based on Information Technology Adoption Integrated Modeling (ITAIM) [ Vol.11, Iss. 41 , 42 - Autumn - Winter Year 1398]
  • mozafari.azime Provide a method for customer segmentation using the RFM model in conditions of uncertainty [ Vol.8, Iss. 30 , 31 - Autumn - Winter Year 1395]
  • mozafari.azime A method for clustering customers using RFM model and grey numbers in terms of uncertainty [ Vol.8, Iss. 29 - Summer Year ]
  • Mozayani.َAmir Hossein Investigating the Information and Communication Technology Deployment Impact on Energy Expenditures of Iranian households (A Provincial Approach) [ Vol.13, Iss. 49 , 50 - Autumn - Winter Year 1400]

N

  • naghdeforoshhs.mona Heuristic algorithms for pseudo-triangulation random point set in the plane [ Vol.5, Iss. 16 , 17 - Spring - Summer Year 1392]
  • naghshineh.Nader A framework for establishing a national data vault for Data Governance institution [ Vol.13, Iss. 49 , 50 - Autumn - Winter Year 1400]
  • naji.hamidreza A Hybrid Neural Network Ensemble Model for Credit Risk Assessment [ Vol.6, Iss. 20 , 21 - Spring - Summer Year 1393]
  • Narimani.mahboobeh Investigating the Degree of Application of Professional Ethics and Vocational Qualifications by the Faculty Members of Virtual Universities of Isfahan and Medical Sciences University of Isfahan [ Vol.6, Iss. 21 - Spring Year ]
  • nasehifar.vahid The role of organizational factors on consumer buying behavior in social networks [ Vol.12, Iss. 45 , 46 - Autumn - Winter Year 1399]
  • nasrollahi.marziye Provide methodology for selecting IT project management strategy [ Vol.10, Iss. 37 , 38 - Autumn - Winter Year 1397]
  • Nassiri.Mohammad Improving performance of probe-based rate control mechanisms using classification: evaluation on an experimental testbed for High Throughput WLANs [ Vol.12, Iss. 43 , 44 - Spring - Summer Year 1399]
  • Nejadali.Mahnaz A New Algorithm for Fastintra-Frame Modes Selection in H.264/Avc Video Coding [ Vol.7, Iss. 26 , 27 - Autumn - Winter Year 1394]
  • nemati.hasanali Prioritization of e-commerce failure factors in technical infrastructure: Meybod city ceramic tile factories [ Vol.8, Iss. 30 , 31 - Autumn - Winter Year 1395]
  • nematifard.narges Discover product defect reports from the text of users' online comments [ Vol.10, Iss. 35 , 36 - Spring - Summer Year 1397]
  • Nezarat.Amin A Novel Model for detecting intrusion with Mobile Agent and Game theory [ Vol.8, Iss. 27 - Spring Year ]
  • nikkhoo.mohammad Design of Secure Communication System by Use of Synchronization of Chaotic Systems [ Vol.2, Iss. 3 - Summer Year ]
  • nili.mohammadreza An Investigation on the Effect of Multifactor Model of Improving Critical Thinking in E-learning Environments [ Vol.6, Iss. 21 - Spring Year ]
  • noorani.fateme A Framework for Identifying and Ranking Criteria for Evaluating the Quality of Electronic Services (Case studies: Golestan website of Payame-noor university) [ Vol.5, Iss. 18 , 19 - Autumn - Winter Year 1392]
  • norollah.ali Heuristic algorithms for pseudo-triangulation random point set in the plane [ Vol.5, Iss. 16 , 17 - Spring - Summer Year 1392]
  • noroozy.Hamed Parametric analysis of a broadband Archimedean spiral antenna with cavity [ Vol.9, Iss. 33 , 34 - Autumn - Winter Year 1396]
  • noroozy.Hamed A design of Rectangular Waveguide TM11 to TE10 Mode Converter for S-band Applications [ Vol.9, Iss. 33 , 34 - Autumn - Winter Year 1396]
  • Nosrati Nahook.Hassan Introducing a new optimal energy method for targets tracking in wireless sensor network using a hunting search algorithm [ Vol.14, Iss. 51 , 52 - Spring - Summer Year 1401]
  • nourazar.fateme [ Vol.2, Iss. 6 , 7 - Autumn - Winter Year 1389]
  • nourazar.fateme Adaptive Probabilistic Flooding for Ad Hoc Networks [ Vol.2, Iss. 5 - Spring - Summer Year ]
  • Nozhat.Najmeh Improving the directivity of the plasmonic sectoral horn nanoantenna using lens in its aperture [ Vol.9, Iss. 33 , 34 - Autumn - Winter Year 1396]
  • Nozhat.Najmeh Improvement of the bulk sensitivity and FoM of the plasmonic nanodipole antenna array [ Vol.9, Iss. 33 , 34 - Autumn - Winter Year 1396]

O

  • omrani.mahdi Cyber Threats Foresight Against Iran Based on Attack Vector [ Vol.9, Iss. 33 , 34 - Autumn - Winter Year 1396]
  • oskouiezade.reza Effect of Menu Location on Visual Attention of Users of Websites [ Vol.5, Iss. 17 - Spring - Summer Year ]

P

  • Padidaran Moghaddam.Farhang Improved routing for load balancing in wireless sensor networks on the Internet of things, based on multiple ant colony algorithm [ Vol.14, Iss. 51 , 52 - Spring - Summer Year 1401]
  • Pakniyat.Samane A design of Rectangular Waveguide TM11 to TE10 Mode Converter for S-band Applications [ Vol.9, Iss. 33 , 34 - Autumn - Winter Year 1396]
  • palhang.palhang [ Vol.7, Iss. 26 , 27 - Autumn - Winter Year 1394]
  • palhang.palhang Classifying Two Class data using Hyper Rectangle Parallel to the Coordinate Axes [ Vol.7, Iss. 25 - Spring - Summer Year ]
  • parsa.saeed Applying genetic algorithm for automatic service identification based on quality metrics [ Vol.6, Iss. 19 - Autumn Year ]
  • Pazari.Mohsen A value Co-creation model for Information and Communication Technology Entrepreneurial Ecosystem [ Vol.13, Iss. 49 , 50 - Autumn - Winter Year 1400]
  • Piran.Mohamad Javad An access control model for online social networks using user-to-user relationships [ Vol.12, Iss. 45 , 46 - Autumn - Winter Year 1399]
  • pirmohammadiani.rojyar Criteria for evaluating the effectiveness of social media users - a framework based on social media exploration [ Vol.11, Iss. 39 , 40 - Spring - Summer Year 1398]
  • pour yousefi dargah.hossein Identification and Prioritization of Parameters Affecting Information Security Management System (Case Study: Social Security Branches of Guilan Province) [ Vol.10, Iss. 35 , 36 - Spring - Summer Year 1397]
  • pourasad.yaghoub Modeling and simulation of the central generator of the pattern to produce curved-linear motions in the snake robot [ Vol.12, Iss. 43 , 44 - Spring - Summer Year 1399]
  • Pourmahmood Aghababa.Mohammad Routing of Multipartite Computer Networks Using Ant Genetic Algorithm [ Vol.9, Iss. 31 , 32 - Spring - Summer Year 1396]
  • Pourmahmood Aghababa.Mohammad Multicast computer network routing using genetic algorithm and ant colony [ Vol.9, Iss. 31 - Spring - Summer Year ]

R

  • rabani.fateme Polar Diagram of Points with Moving Pole [ Vol.11, Iss. 41 , 42 - Autumn - Winter Year 1398]
  • rafizadeh kasani.ramin Identification and Prioritization of Parameters Affecting Information Security Management System (Case Study: Social Security Branches of Guilan Province) [ Vol.10, Iss. 35 , 36 - Spring - Summer Year 1397]
  • rahbar.kambiz [ Vol.2, Iss. 6 , 7 - Autumn - Winter Year 1389]
  • rahbar.kambiz Blind Correction of Lens Aberration Using Modified Zernike Moments [ Vol.2, Iss. 5 - Spring - Summer Year ]
  • rahbar.kambiz Blind correction of camera lens aberration and de-centering error using modified Zernike model [ Vol.7, Iss. 25 - Spring - Summer Year ]
  • rahmani.marziye Provide a conceptual model to identify the quality of electronic services in the country's online stores [ Vol.8, Iss. 30 , 31 - Autumn - Winter Year 1395]
  • raja.mehdi A Novel Model for detecting intrusion with Mobile Agent and Game theory [ Vol.8, Iss. 27 - Spring Year ]
  • Rajabi.Jan Mohammad Applying genetic algorithm for automatic service identification based on quality metrics [ Vol.6, Iss. 19 - Autumn Year ]
  • rajabzadeh ghotri.ali Determining the factors affecting the collective financing of knowledge-based IT companies [ Vol.10, Iss. 37 , 38 - Autumn - Winter Year 1397]
  • rajabzadeh ghotri.ali Explaining the adoption process of software-oriented networks (SDN) using the foundational data method and systems approach [ Vol.14, Iss. 51 , 52 - Spring - Summer Year 1401]
  • Raji.Mohsen A Task Mapping and Scheduling Algorithm based on Genetic Algorithm for Embedded System Design [ Vol.13, Iss. 47 , 48 - Spring - Summer Year 1400]
  • ranaei.habibollah Designing a system dynamics model for upgrading policy Iran Information and Communication Technology Network Indicators [ Vol.8, Iss. 30 , 31 - Autumn - Winter Year 1395]
  • Rashidi.Hassan A Decision Support System based on Rough sets for Enterprise Planning under uncertainty [ Vol.13, Iss. 47 , 48 - Spring - Summer Year 1400]
  • rasouli.behtaj A Model for impacts of Investment in IT on customer satisfaction, using Structural Equation Modeling and Path Analysis [ Vol.5, Iss. 15 - Summer Year ]
  • rasti.javad Outdoor Color Scene Segmentation towards Object Detection using Dual-Resolution Histograms [ Vol.4, Iss. 14 - Autumn - Winter Year 1391]
  • rasti.javad [ Vol.4, Iss. 14 , 15 - Autumn - Winter Year 1391]
  • ravaie.yahya Increasing data throughput in HF channel by decision feedback equalizer employing MC-FQRD-RLS algorithm and weight extraction in data mode [ Vol.5, Iss. 15 - Summer Year ]
  • Ravanmehr.Reza context-aware travel recommender system exploiting from Geo-tagged photos [ Vol.11, Iss. 41 , 42 - Autumn - Winter Year 1398]
  • Razi.Ali Agile Enterprise Architecture Modeling: Evaluating the Applicability of Six Modeling Standards based on Iran’s National EA Framework [ Vol.13, Iss. 47 , 48 - Spring - Summer Year 1400]
  • reshadi.midia Adaptive rotation models and traffic patterns to reduce light loss in networks on optical chip [ Vol.10, Iss. 35 , 36 - Spring - Summer Year 1397]
  • rezaei malek.narges Model to improve banking by Using customer knowledge management and Mobile Banking and Its Impact on Customer Loyalty [ Vol.9, Iss. 31 - Spring - Summer Year ]
  • Rezaei.Mehran Textual analysis of central bank news in forecasting long-term trend of Tehran stock exchange index [ Vol.12, Iss. 43 , 44 - Spring - Summer Year 1399]
  • rezaei.mohammad A model for improving banking services using customer knowledge management and mobile banking and examining its impact on customer loyalty in Bank Mellat [ Vol.9, Iss. 31 , 32 - Spring - Summer Year 1396]
  • rezaei.mohammad sadegh Automatic Sepration of Learnrs in Learning Groups Based on Identifying Learning Style from Their Behavior in Learning Environment [ Vol.6, Iss. 21 - Spring Year ]
  • rezaei.narges A model for improving banking services using customer knowledge management and mobile banking and examining its impact on customer loyalty in Bank Mellat [ Vol.9, Iss. 31 , 32 - Spring - Summer Year 1396]

S

  • sabaei.sabaei [ Vol.2, Iss. 6 , 7 - Autumn - Winter Year 1389]
  • sabaei.sabaei Adaptive Probabilistic Flooding for Ad Hoc Networks [ Vol.2, Iss. 5 - Spring - Summer Year ]
  • saberi.nafise Personalized E-learning Environment Using Fuzzy Recommender System base on Combination of Learning Style and Cognitive Trait [ Vol.2, Iss. 3 - Summer Year ]
  • Sadeghi Bigham.Bahram Polar Diagram of Points with Moving Pole [ Vol.11, Iss. 41 , 42 - Autumn - Winter Year 1398]
  • sadeghi hariri.mehrdad Modified orthogonal chaotic colonial competition algorithm and its application in improving pattern recognition in multilayer perceptron neural network [ Vol.10, Iss. 35 , 36 - Spring - Summer Year 1397]
  • sadeghi.mostafa Image Processing of steel sheets for Defect Detection by using Gabor Wavelet [ Vol.4, Iss. 13 - Spring Year ]
  • sadeghi.mostafa [ Vol.4, Iss. 14 , 15 - Autumn - Winter Year 1391]
  • Sadr.Hossein An Intelligent Model for Multidimensional Personality Recognition of Users using Deep Learning Methods [ Vol.13, Iss. 47 , 48 - Spring - Summer Year 1400]
  • saedi.abdollah Provide a model of human resource knowledge architecture in knowledge-based organizations using a mixed approach [ Vol.11, Iss. 39 , 40 - Spring - Summer Year 1398]
  • Saeidi.Zeinab Measuring Similarity for Directed Path in Geometric Data [ Vol.12, Iss. 45 , 46 - Autumn - Winter Year 1399]
  • safari.mojtaba COBIT A Suitable Framework for Measuring IT Governance in Organizations [ Vol.1, Iss. 1 - Spring Year ]
  • saghafi.fateme Comprehensive Interactive Maturity Model for Mobile government [ Vol.2, Iss. 3 - Summer Year ]
  • saghafi.Fatemeh [ Vol.7, Iss. 24 , 25 - Spring - Summer Year 1394]
  • saghafi.Fatemeh A Collaborative Filtering Movie Recommendation System Based on Users Correlation and Weighted K-Means with High Accuracy [ Vol.14, Iss. 51 , 52 - Spring - Summer Year 1401]
  • Saghafi.Fatemeh Optimized Modeling for satisfaction in the relationship between a physician and patient based on machine learnin methods [ Vol.7, Iss. 23 - Summer Year ]
  • sakhaei nia.mahdi Discover product defect reports from the text of users' online comments [ Vol.10, Iss. 35 , 36 - Spring - Summer Year 1397]
  • sakhaei.mahdi Improving performance of probe-based rate control mechanisms using classification: evaluation on an experimental testbed for High Throughput WLANs [ Vol.12, Iss. 43 , 44 - Spring - Summer Year 1399]
  • salari.mahdieh A Novel Method based on the Cocomo model to increase the accuracy of software projects effort estimates [ Vol.12, Iss. 45 , 46 - Autumn - Winter Year 1399]
  • Salarzehi.Habibollah Exploring the antecedents and consequences of smart good governance using the fuzzy Delphi method (FDM) [ Vol.14, Iss. 51 , 52 - Spring - Summer Year 1401]
  • Saleh Gorgory.Maryam Pathology of software export development in Iran [ Vol.14, Iss. 51 , 52 - Spring - Summer Year 1401]
  • salehesfahani.mahmood A Framework for Identifying and Ranking Criteria for Evaluating the Quality of Electronic Services (Case studies: Golestan website of Payame-noor university) [ Vol.5, Iss. 18 , 19 - Autumn - Winter Year 1392]
  • salehi.rezvan Investigation the role of personality and individual differences on password security breaches: An Empirical Study [ Vol.13, Iss. 49 , 50 - Autumn - Winter Year 1400]
  • salkhordeh haghighi.mehdi Introducing a genetic algorithm based Method for Community person's stance Detection in social media and news [ Vol.11, Iss. 41 , 42 - Autumn - Winter Year 1398]
  • salkhordeh haghighi.mehdi Using Sentiment Analysis and Combining Classifiers for Spam Detection in Twitter [ Vol.14, Iss. 51 , 52 - Spring - Summer Year 1401]
  • Samadi.Behnam High Performance Computing: Next Generation Requirements and Research Axes [ Vol.14, Iss. 51 , 52 - Spring - Summer Year 1401]
  • samadzadegan.farhad Determination of Optimum SVMs Based on Genetic Algorithm in Classification of Hyper spectral Imagery [ Vol.4, Iss. 13 - Spring Year ]
  • samadzadegan.farhad [ Vol.4, Iss. 14 , 15 - Autumn - Winter Year 1391]
  • samie.mohammad ebrahim Improving recommender systems with the help of Semantic Web [ Vol.9, Iss. 31 , 32 - Spring - Summer Year 1396]
  • saroukhani.leila Design and implementation of a fuzzy expert system for suspicious behavior detection in e-banking system [ Vol.1, Iss. 1 - Spring Year ]
  • sato.youshi Medial-axis Enhancement of Tubular Structures and its Application in the Extraction of Portal Veins [ Vol.4, Iss. 13 - Spring Year ]
  • Sattari.Mohammad An Improved Method Based on Label Propagation and Greedy Approaches for Community Detection in Dynamic Social Networks [ Vol.12, Iss. 43 , 44 - Spring - Summer Year 1399]
  • Sattari-Naeini.Vahid Application of clustering in AODV routing protocol for intercity networks on the highway scenario [ Vol.8, Iss. 30 , 31 - Autumn - Winter Year 1395]
  • Sattari-Naeini.Vahid Reduction of network load by mapping the application in the network on a chip using the discrete Harris hawk algorithm [ Vol.14, Iss. 51 , 52 - Spring - Summer Year 1401]
  • SayadHaghighi.Mohammad Stability Analysis of Networked Control Systems under Denial of Service Attacks using Switching System Theory [ Vol.13, Iss. 49 , 50 - Autumn - Winter Year 1400]
  • sebti.ali Fast and accurate concept drift detection from event logs [ Vol.12, Iss. 43 , 44 - Spring - Summer Year 1399]
  • sedghahrabi.neda Design of FPGA-based processor for SHA-2 series cryptographic algorithms Design ترجمه‌های design اسمفراوانی طرح plan, design, layout, project, scheme, plot نقشه map, plan, plot, scheme, plat, chart زمینه background, context, ground, setting, base, terrain تدبیر measure, plan, contraption, gimmick, contrivance, scheme قصد intention, intent, purpose, attempt, will, determination طراح ریزی design خیال imagination, phantom, illusion, thought, fiction, mind فعل طرح کردن design, plan, draft, draw, lay, bring forth قصد کردن attempt, decide, design, meditate تخصیص دادن allot, allocate, apportion, consecrate, give, design تدبیر کردن devise, contrive, meditate, compass, machinate, design تعریف‌های design اسم ۱ a plan or drawing produced to show the look and function or workings of a building, garment, or other object before it is built or made. he has just unveiled his design for the new museum مترادف‌ها: planblueprintdrawingscale drawingsketchoutlinemapplotdiagramdelineationdraftdepictionrepresentationartist's impressionschememodelprototypeproposal ۲ an arrangement of lines or shapes created to form a pattern or decoration. pottery with a lovely blue and white design مترادف‌ها: patternmotifdevicestylearrangementcompositionmakeuplayoutconstitutionconfigurationorganizationconstructionshapeformformationfigure purpose, planning, or intention that exists or is thought to exist behind an action, fact, or material object. the appearance of design in the universe مترادف‌ها: intentionaimpurposeplanintentobjectiveobjectgoalendtargetpointhopedesirewishdreamaspirationambitionidea فعل ۱ decide upon the look and functioning of (a building, garment, or other object), by making a detailed drawing of it. a number of architectural students were designing a factory مترادف‌ها: plandraw plans ofdrawsketchoutlinemap outplotblock outdelineatedraftdepictinventoriginatecreatethink upcome up withdeviseformformulateconceivemakeproducedevelopfashionfabricateforgehatchcoindream up مترادف design اسم planpatternintention فعل planinventdream upintend ۹۱ مترادف دیگر [ Vol.10, Iss. 37 , 38 - Autumn - Winter Year 1397]
  • seif.fatemeh Effect of Menu Location on Visual Attention of Users of Websites [ Vol.5, Iss. 17 - Spring - Summer Year ]
  • Seirafian.vahid SPIHT-DCT hybrid method using Placement spatial scalability and Place - when encoding a video HDTV [ Vol.4, Iss. 14 - Autumn - Winter Year 1391]
  • Seirafian.vahid [ Vol.4, Iss. 14 , 15 - Autumn - Winter Year 1391]
  • sepahvand.reza Provide a model of human resource knowledge architecture in knowledge-based organizations using a mixed approach [ Vol.11, Iss. 39 , 40 - Spring - Summer Year 1398]
  • sepehri.akram [ Vol.2, Iss. 4 , 5 - Spring - Summer Year 1389]
  • sepehri.mehdi Iran's Mobile Government Ecosystem Model, Stakeholders Identification and Analysis [ Vol.7, Iss. 23 - Summer Year ]
  • shadmehr.mojtaba Optimized Modeling for satisfaction in the relationship between a physician and patient based on machine learnin methods [ Vol.7, Iss. 23 - Summer Year ]
  • shafaghizade.somaye Integrating Data Envelopment Analysis and Decision Tree Models in Order to Evaluate Information Technology-Based Units [ Vol.8, Iss. 27 - Spring Year ]
  • shafiee.masoud Cyber Threats Foresight Against Iran Based on Attack Vector [ Vol.9, Iss. 33 , 34 - Autumn - Winter Year 1396]
  • shafiee.masoud [ Vol.2, Iss. 6 , 7 - Autumn - Winter Year 1389]
  • shafiee.masoud Design of Secure Communication System by Use of Synchronization of Chaotic Systems [ Vol.2, Iss. 3 - Summer Year ]
  • shafiee.masoud Sliding Mode Controller for TCP Congestion Control [ Vol.2, Iss. 5 - Spring - Summer Year ]
  • shafiee.masoud Image Processing of steel sheets for Defect Detection by using Gabor Wavelet [ Vol.4, Iss. 13 - Spring Year ]
  • shafiee.masoud Three-axis attitude control of a micro-satellite by magnetic actuators through-synthesis robust method [ Vol.5, Iss. 15 - Summer Year ]
  • shafiee.masoud [ Vol.4, Iss. 14 , 15 - Autumn - Winter Year 1391]
  • shafiee.nafiseh [ Vol.7, Iss. 24 , 25 - Spring - Summer Year 1394]
  • shafiee.nafiseh Key Management in Digital Right Management Systems for Offline Mode [ Vol.7, Iss. 23 - Summer Year ]
  • Shafiezadeh.Soheila An Individual-Oriented Shuffled Frog Leaping Algorithm for Solving Vehicle Routing Problem [ Vol.14, Iss. 51 , 52 - Spring - Summer Year 1401]
  • Shahbahrami.Asadollah Identification and Prioritization of Parameters Affecting Information Security Management System (Case Study: Social Security Branches of Guilan Province) [ Vol.10, Iss. 35 , 36 - Spring - Summer Year 1397]
  • Shahbahrami.Asadollah A Managerial Examination of the Successful Parameters in the B2C Business [ Vol.5, Iss. 17 - Spring - Summer Year ]
  • Shahhosseini.Mohammadali Employing a meta-synthesis to present a framework for commercial banks’ preparedness indicators in use of blockchain technology [ Vol.13, Iss. 49 , 50 - Autumn - Winter Year 1400]
  • Shahmiri.Amir Shahab Beautiful and Meaningful Iranian Names Production by Genetic Algorithm using Artificial Neural Network-Based Fitness Function [ Vol.7, Iss. 25 - Spring - Summer Year ]
  • shahsavari.mehrdad Provide a basic method for estimating software projects based on logical transactions [ Vol.9, Iss. 31 , 32 - Spring - Summer Year 1396]
  • shahsavari.mehrdad Present an Initial Estimation Method for Logical Transaction-based Software Projects [ Vol.9, Iss. 31 - Spring - Summer Year ]
  • shajari.mahdi Key Management in Digital Right Management Systems for Offline Mode [ Vol.7, Iss. 23 - Summer Year ]
  • Shakery.Azadeh A new algorithm based on ensemble learning for learning to rank in information retrieval [ Vol.7, Iss. 25 - Spring - Summer Year ]
  • shamsollahi.sara Designing a Fuzzy Expert System for Selecting an Appropriate Contractor in Information Technology Outsourcing [ Vol.2, Iss. 5 - Spring - Summer Year ]
  • sharafi.vahid طراحی اولین پایگاه داده کلمات دستنویس کردی برای سیستم های تشخیص تصویری کلمات [ Vol.5, Iss. 17 - Spring - Summer Year ]
  • Sharifi.Ehsan Architectural tactics identification in source code based on a semantic approach [ Vol.14, Iss. 51 , 52 - Spring - Summer Year 1401]
  • Sharifi.Masumeh Improving the directivity of the plasmonic sectoral horn nanoantenna using lens in its aperture [ Vol.9, Iss. 33 , 34 - Autumn - Winter Year 1396]
  • Shaykhan.Mohammad Taghi Proposing a New Framework to Decreasing Delay in the Internet of Things by Using Computing Power of Fog [ Vol.13, Iss. 47 , 48 - Spring - Summer Year 1400]
  • Sheikhi.Hemmat Improving imperialist competitive algorithm for solving the nodes placement problem in three-dimensional grid wireless sensor networks [ Vol.12, Iss. 45 , 46 - Autumn - Winter Year 1399]
  • Shirvani Moghaddam.Shahriar Performance Analysis of Device to Device Communications Overlaying/Underlaying Cellular Network [ Vol.9, Iss. 33 , 34 - Autumn - Winter Year 1396]
  • shiry.saeed Beautiful and Meaningful Iranian Names Production by Genetic Algorithm using Artificial Neural Network-Based Fitness Function [ Vol.7, Iss. 25 - Spring - Summer Year ]
  • skch.skch Proposing a model for IT services based assessment approach, based on IT Governance Model [ Vol.7, Iss. 23 - Summer Year ]
  • Soleimani Nasab.Ehsan Outage and Throughput Analysis of Bidirectional Cognitive Amplify-and-Forward Relaying Networks with Wireless Power Transfer [ Vol.14, Iss. 51 , 52 - Spring - Summer Year 1401]
  • Sondossi.Golshan A Neighbor-based Link Prediction Method for Bipartite Networks [ Vol.13, Iss. 47 , 48 - Spring - Summer Year 1400]
  • sotoudeh.shahrouz Provide a framework for enhancing the security of IoT-based smart homes using the IoT-A reference architecture [ Vol.10, Iss. 35 , 36 - Spring - Summer Year 1397]

T

  • tabaghchimilan.sara Using a multi-objective optimization algorithm for tasks allocate in the cloud-based systems to reduce energy consumption [ Vol.12, Iss. 43 , 44 - Spring - Summer Year 1399]
  • tabatabaei.seyyed ahmad [ Vol.7, Iss. 24 , 25 - Spring - Summer Year 1394]
  • tabatabaei.seyyed ahmad Proposing a model for IT services based assessment approach, based on IT Governance Model [ Vol.7, Iss. 23 - Summer Year ]
  • Tabatabaei.Shayesteh Introducing a new optimal energy method for targets tracking in wireless sensor network using a hunting search algorithm [ Vol.14, Iss. 51 , 52 - Spring - Summer Year 1401]
  • Taghavifard.Mohammad Taghi Identification of the Factors and Indicators of the Model of Quality Assessment of the Game Industry Services on the Cloud Platform [ Vol.12, Iss. 45 , 46 - Autumn - Winter Year 1399]
  • taghiyareh.fataneh [ Vol.4, Iss. 12 , 13 - Spring - Summer Year 1391]
  • Taghizadeh.Alireza Explaining the adoption process of software-oriented networks (SDN) using the foundational data method and systems approach [ Vol.14, Iss. 51 , 52 - Spring - Summer Year 1401]
  • Tahayori.Hooman The Impact of IQ Imbalance on the BER of Adaptive Modulation in the MIMO System [ Vol.1, Iss. 1 - Spring Year ]
  • Tahayori.Hooman A new reinforcement learning based multi-agent method for traffic shaping and buffer allocation in routers [ Vol.1, Iss. 1 - Spring Year ]
  • Tahayori.Hooman Cross-layer Design for Congestion Control, Routing and Scheduling in Ad-hoc Wireless Networks with considering the Electrical Power of nodes [ Vol.1, Iss. 1 - Spring Year ]
  • Tahayori.Hooman Proposing an Information Retrieval Model Using Interval Numbers [ Vol.12, Iss. 45 , 46 - Autumn - Winter Year 1399]
  • taherkhani.fahime Heuristic algorithms for pseudo-triangulation random point set in the plane [ Vol.5, Iss. 16 , 17 - Spring - Summer Year 1392]
  • Tajeddini.Shima The Participation of Three Brain Tissues in Alzheimer’s disease Diagnosis from Structural MRI [ Vol.9, Iss. 33 , 34 - Autumn - Winter Year 1396]
  • talebi.heydarali A Satellite Control Method Using Laguerre Model Predictive Control Approach [ Vol.5, Iss. 15 - Summer Year ]
  • talebi.heydarali Three-axis attitude control of a micro-satellite by magnetic actuators through-synthesis robust method [ Vol.5, Iss. 15 - Summer Year ]
  • Talebi.Mehdi Door detection based on car vision in outdoor scenes [ Vol.8, Iss. 30 , 31 - Autumn - Winter Year 1395]
  • talebi.siamak SPIHT-DCT hybrid method using Placement spatial scalability and Place - when encoding a video HDTV [ Vol.4, Iss. 14 - Autumn - Winter Year 1391]
  • talebi.siamak [ Vol.4, Iss. 14 , 15 - Autumn - Winter Year 1391]
  • Talebi.Siamak Increasing the lifetime of underwater acoustic sensor networks by optimal relay node placement [ Vol.12, Iss. 45 , 46 - Autumn - Winter Year 1399]
  • talebian.faezeh [ Vol.7, Iss. 24 , 25 - Spring - Summer Year 1394]
  • talebian.faezeh A New Method to computational intelligence to improve network lifetime in wireless sensor networks [ Vol.7, Iss. 23 - Summer Year ]
  • Tayfeh-Mahmoudi.Maryam [ Vol.4, Iss. 12 , 13 - Spring - Summer Year 1391]
  • Teimouri.Mehdi [ Vol.7, Iss. 24 , 25 - Spring - Summer Year 1394]
  • Teimouri.Mehdi An optimised hybrid method for ambulance dispatch based on complex networks and Artificial Intelligence [ Vol.7, Iss. 23 - Summer Year ]
  • tihidkhah.farzad A Satellite Control Method Using Laguerre Model Predictive Control Approach [ Vol.5, Iss. 15 - Summer Year ]

V

  • vafaei.abbas Door detection based on car vision in outdoor scenes [ Vol.8, Iss. 30 , 31 - Autumn - Winter Year 1395]
  • vafaei.abbas Outdoor Color Scene Segmentation towards Object Detection using Dual-Resolution Histograms [ Vol.4, Iss. 14 - Autumn - Winter Year 1391]
  • vafaei.abbas [ Vol.4, Iss. 14 , 15 - Autumn - Winter Year 1391]
  • Varahram.mohammadmahdi Using a Hybrid PSO-GA Method for Capacitor Placement in Distribution Systems [ Vol.6, Iss. 20 , 21 - Spring - Summer Year 1393]
  • vasegh.morteza Modeling and simulation of the central generator of the pattern to produce curved-linear motions in the snake robot [ Vol.12, Iss. 43 , 44 - Spring - Summer Year 1399]
  • Veisi.Hadi [ Vol.7, Iss. 24 , 25 - Spring - Summer Year 1394]
  • Veisi.Hadi Optimized Modeling for satisfaction in the relationship between a physician and patient based on machine learnin methods [ Vol.7, Iss. 23 - Summer Year ]

Y

  • yaghoobi.mahdi Fast and accurate concept drift detection from event logs [ Vol.12, Iss. 43 , 44 - Spring - Summer Year 1399]
  • yaghoubi.saied Provide a conceptual model to identify the quality of electronic services in the country's online stores [ Vol.8, Iss. 30 , 31 - Autumn - Winter Year 1395]
  • Yaghubi.Nour Mohammad Exploring the antecedents and consequences of smart good governance using the fuzzy Delphi method (FDM) [ Vol.14, Iss. 51 , 52 - Spring - Summer Year 1401]
  • Yari.Alireza An Improved Method for Detecting Phishing Websites Using Data Mining on Web Pages [ Vol.12, Iss. 43 , 44 - Spring - Summer Year 1399]
  • Yazdanian.Vahid Pathology of software export development in Iran [ Vol.14, Iss. 51 , 52 - Spring - Summer Year 1401]

Z

  • zahedfar.kamran Understanding the users’ initial trust of social networks [ Vol.8, Iss. 27 - Spring Year ]
  • zahiri.hamid [ Vol.2, Iss. 6 , 7 - Autumn - Winter Year 1389]
  • zahiri.hamid Training MLP Neural Network in Images Compression by GSA Method [ Vol.2, Iss. 5 - Spring - Summer Year ]
  • zamani.bahare Beautiful and Meaningful Iranian Names Production by Genetic Algorithm using Artificial Neural Network-Based Fitness Function [ Vol.7, Iss. 25 - Spring - Summer Year ]
  • zamani.bibieshrat Investigating the Degree of Application of Professional Ethics and Vocational Qualifications by the Faculty Members of Virtual Universities of Isfahan and Medical Sciences University of Isfahan [ Vol.6, Iss. 21 - Spring Year ]
  • zamanifar.kamran An Improved Method Based on Label Propagation and Greedy Approaches for Community Detection in Dynamic Social Networks [ Vol.12, Iss. 43 , 44 - Spring - Summer Year 1399]
  • Zand Hesami.Hesam Presenting a new conceptual model for the field of big data and analyzing the data-driven business in Iran based on the proposed model [ Vol.13, Iss. 47 , 48 - Spring - Summer Year 1400]
  • Zangane.Amirhosein An efficient Two Pathways Deep Architecture for Soccer Goal Recognition towards Soccer Highlight Summarization [ Vol.13, Iss. 49 , 50 - Autumn - Winter Year 1400]
  • Zare Chahooki.Mohammad Ali User recommendation in Telegram messenger by graph analysis and mathematical modeling of users' behavior [ Vol.13, Iss. 49 , 50 - Autumn - Winter Year 1400]
  • zare.hadi Extracting the Information Technology architecture of hospitals with approach of Implementing in Iran [ Vol.8, Iss. 27 - Spring Year ]
  • Zare.Hadi [ Vol.7, Iss. 24 , 25 - Spring - Summer Year 1394]
  • Zare.Hadi [ Vol.8, Iss. 27 , 28 - Spring - Summer Year 1395]
  • Zare.Hadi An optimised hybrid method for ambulance dispatch based on complex networks and Artificial Intelligence [ Vol.7, Iss. 23 - Summer Year ]
  • Zareian-Jahromi.Ehsan Improving the directivity of the plasmonic sectoral horn nanoantenna using lens in its aperture [ Vol.9, Iss. 33 , 34 - Autumn - Winter Year 1396]
  • zarkeshzade.mehdi An optimised hybrid method for ambulance dispatch based on complex networks and Artificial Intelligence [ Vol.7, Iss. 23 - Summer Year ]
  • zeidabadinezhad.abolghasem A Fast Method to Compute Radiation Fields of Shaped Reflector Antennas by FFT [ Vol.1, Iss. 2 , 3 - Autumn - Winter Year 1387]
  • zenouzi.jafari Investigating the effect of using various marketing strategies on social networks on gaining the trust of council customers Investigating ترجمه‌های investigate فعلفراوانی بررسی کردن investigate, check, peruse, survey, study رسیدگی کردن consider, attend, check, investigate, inspect, investigate استفسار کردن investigate وارسی کردن sift, investigate پژوهیدن investigate, inquire, research, search تحقیق کردن investigate, inquire, verify, assay, interrogate, question اطلاعات مقدماتی بدست اوردن investigate جستار کردن investigate تفتیش کردن inquire, inspect, investigate, revise باز جویی کردن examine, assay, inquire, interrogate, investigate, cross-examine تعریف‌های investigate فعل ۱ carry out a systematic or formal inquiry to discover and examine the facts of (an incident, allegation, etc.) so as to establish the truth. police are investigating the alleged beating مترادف‌ها: check outsuss outgive something the once-overscope outinquire intolook intogo intolook overprobeexplorescrutinizeconduct an investigation intoconduct an inquiry intomake inquiries abouttry to get to the bottom ofinspectanalyzestudyexamineconsiderresearchsearch/sift the evidence concerningpore overdelve intoauditevaluatefollow up مترادف investigate فعل check outsuss outgive something the once-overscope out inquire intolook intogo intolook overprobeexplorescrutinizeconduct an investigation intoconduct an inquiry intomake inquiries abouttry to get to the bottom ofinspectanalyzestudyexamineconsiderresearchsearch/sift the evidence concerningpore overdelve intoauditevaluatefollow up همچنین ببینید investigate [ Vol.11, Iss. 39 , 40 - Spring - Summer Year 1398]
  • Ziaeipour.Elham Explaining the adoption process of software-oriented networks (SDN) using the foundational data method and systems approach [ Vol.14, Iss. 51 , 52 - Spring - Summer Year 1401]