About the journal
According to the letter No. 3/4817 dated 2007/9/02 of the Research Affairs Office of the Iranian Ministry of Science, Research and Technology and the statement of the vote of the Commission for the Review of Scientific Journals of the country on 2007/7/14, this journal has been awarded a scientific-research degree.
Journal of Information and Communication Technology (JICT) belongs to the "Iranian Information and Communication Technology Association" and is published with the collaboration of ICT Research Institute. The journal language is Farsi and it is an open-access bi-quarterly journal publishing high-quality scientific papers covering all aspects of the information and communication technologies including computer science and engineering, information technology, communication technology and information technology management. It is an interdisciplinary journal devoted to the publication of original articles, review articles, etc., considering the research ethics and academic rules and regulations.
All papers are subject to a blind reviewing process. The submitted manuscripts will be published after a thorough review and the editorial board's approval
-
Open Access Article
1 - An Overview on Replica Consistency Methods in Distributed Systems and Future Works
Mahsa BeigrezaeiIssue 61 , Vol. 16 , Autumn_Winter 2024 -
Open Access Article
2 - The Belief of Persian Text Mining Based on Deep Learning with Emotion-Word Separation
Hossein Alikarami AmirMasoud Bidgoli Hamid Haj Seyyed JavadiIssue 61 , Vol. 16 , Autumn_Winter 2024 -
Open Access Article
3 - Energy-Efficient Fixed-Point Hardware Accelerator for Embedded DNNs
Marzie Mastalizade Ali Ansarmohammadi Najme Nazari Mostafa SalehiIssue 61 , Vol. 16 , Autumn_Winter 2024 -
Open Access Article
4 - Dynamic Load Balancing Improvement in Software-Defined Networks Using Fuzzy Multi-Objective Programming Algorithms
Mohammadreza Forghani Mohammadreza Soltanaghaei koupaei Farsad Zamani BoroujeniIssue 61 , Vol. 16 , Autumn_Winter 2024 -
Open Access Article
5 - Improving Code Coverage Metrics for Discovering Vulnerabilities in Stateful Network Protocols using Hybrid Fuzzing
Hamid Rezaei Rahvard Mehdi Salkhordeh HaghighiIssue 61 , Vol. 16 , Autumn_Winter 2024 -
Open Access Article
6 - Presenting a Method for Agile Enterprise Architecture Modeling
Ali Razi Reza Rezaei Ahmad Ali YazdanpanahIssue 61 , Vol. 16 , Autumn_Winter 2024 -
Open Access Article
7 - The Local Strategic Model of Smart Police of The Islamic Republic of Iran
Ahmad Dolatkhah Mohammad Reza Movahedi Sefat Mehrab RamakIssue 61 , Vol. 16 , Autumn_Winter 2024 -
Open Access Article
8 - Designing A New Genetic-Fuzzy Type 2 Approach to Evaluate Self-Adaptive Systems by Software Quality Indicators
Majid Abdolrazzagh-Nezhad Eshrat Zargari Mehdi KheradIssue 61 , Vol. 16 , Autumn_Winter 2024 -
Open Access Article
9 - Trust Management Based on User Feedback in Cloud Computing Environment by Using Cuckoo Optimization Algorithm
Muqtada Soleimani Mobarake Golnaz Aghaee Babak NikmardIssue 61 , Vol. 16 , Autumn_Winter 2024 -
Open Access Article
10 - Energy Efficient Target (Rhynchophorus Ferrugineus) Tracking in Wireless Sensor Network Using the Cat Swarm Optimization Algorithm and Fuzzy Logic
Shayesteh TabatabaeiIssue 61 , Vol. 16 , Autumn_Winter 2024 -
Open Access Article
11 - Investigating an Approach to Identify and Classify Mutants Based on the Characteristics of Mutants with Machine Learning Algorithms
Zeinab Asghari Bahman Arasteh Abbas KoochariIssue 61 , Vol. 16 , Autumn_Winter 2024 -
Open Access Article
12 - Generating Personalized Explanations for Twitter List Recommendations Using Semantic Similarity of Hashtags
Havva Alizadeh Noughabi Behshid Behkamal Saleheh Naseri Mohsen KahaniIssue 61 , Vol. 16 , Autumn_Winter 2024 -
Open Access Article
13 - Providing a Blockchain-Based Method to Protect Users’ Privacy in Social Networks
Ibrahim Zamani Babgohari Monireh HosseiniIssue 61 , Vol. 16 , Autumn_Winter 2024 -
Open Access Article
14 - Providing an Intrusion Detection System in the Industrial Internet of Things Using the Gray Wolf Algorithm
Sajad Alimohamadi Mohammad FathiIssue 61 , Vol. 16 , Autumn_Winter 2024 -
Open Access Article
15 - Trust Based Link Prediction Using Fuzzy Computational Model in Social Networks
Fateme Hoseinkhani Ali Harounabadi ُُُُSaeed SetayeshiIssue 61 , Vol. 16 , Autumn_Winter 2024 -
Open Access Article
16 - Fault Diagnosis and Detection in Photovoltaic Systems Using Neural Network VGG16
ُSamaneh Azimi Mohammad Manthouri Mehdi AkhbariIssue 61 , Vol. 16 , Autumn_Winter 2024 -
Open Access Article
17 - The Relevance, Importance and Dependence of Critical Infrastructures of The Islamic Republic of Iran from a Cyber-Perspective
Abouzar Solat Rafiee Hossein Gharaee Garakani Fatemeh Saghafi Mohammad MalekiniaIssue 61 , Vol. 16 , Autumn_Winter 2024 -
Open Access Article
18 - Provide A Lightweight Encryption Solution To secure Data In The Internet Of Things
wahab aminiazar rasoul farahi fattameh dashtiIssue 61 , Vol. 16 , Autumn_Winter 2024
-
Open Access Article
1 - Determining the factors affecting the collective financing of knowledge-based IT companies
Ali Haji Gholam Saryazdi ali rajabzadeh ghotri alinaghi mashayekhi alireza hassanzadeIssue 37 , Vol. 10 , Autumn_Winter 2019 -
Open Access Article
2 - Image Processing of steel sheets for Defect Detection by using Gabor Wavelet
masoud shafiee mostafa sadeghiIssue 13 , Vol. 4 , Spring 1391 -
Open Access Article
3 - Provide a conceptual model to identify the quality of electronic services in the country's online stores
marziye rahmani Mohammad Fathian saied yaghoubiIssue 30 , Vol. 8 , Autumn_Winter 2016 -
Open Access Article
4 - A Satellite Control Method Using Laguerre Model Predictive Control Approach
shekoofeh jafari fesharaki farzad tihidkhah heydarali talebiIssue 15 , Vol. 5 , Summer 1392 -
Open Access Article
5 - پردازش تصاویر ورق های فولادی به منظور آشکارسازی عیوب به کمک موجک گابور
Mostafa Sadeghie masoud shafieeIssue 14 , Vol. 4 , Autumn_Winter 2012 -
Open Access Article
6 - An Investigation on the Effect of Multifactor Model of Improving Critical Thinking in E-learning Environments
mohammadreza nili jamshid heydari hossein moradiIssue 21 , Vol. 6 , Spring 1394 -
Open Access Article
7 - A model information technology adoption in academic research projects in the filed ICT based on Information Technology Adoption Integrated Modeling (ITAIM)
Shahram Aliyari masoud movahedi sirous kazemianIssue 41 , Vol. 11 , Autumn_Winter 2020 -
Open Access Article
8 - Evaluation of e-learning with optimal mining approach 1 case study: Iran's higher education
abbas anarinejad aliakbar safavi farshad moradiIssue 12 , Vol. 4 , Spring_Summer 2012 -
Open Access Article
9 - Designing a fuzzy expert system for choosing the right contractor in information technology outsourcing
nadia kalantari nadia kalantari alireza Hasanzadeh shaban elahiIssue 6 , Vol. 2 , Autumn_Winter 2010 -
Open Access Article
10 - طراحی اولین پایگاه داده کلمات دستنویس کردی برای سیستم های تشخیص تصویری کلمات
fatemeh daneshfar basir alagheband vahid sharafiIssue 17 , Vol. 5 , Spring_Summer 1393