A

  • Abbasi.Ibrahim Valuation of digital services in Iran: Empirical proof for Google and Instagram [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Abbasi.Javad Employing a meta-synthesis to present a framework for commercial banks’ preparedness indicators in use of blockchain technology [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • Abbasi.Mohammadhassan Designing a personalized e-learning system using learners' characteristics and implementing it with the gamification elements [ Vol.13, Issue 47 , 48 - Spring - Summer Year 1400]
  • abbasi.narges Analysing students' learning through morning exercise using data mining techniques [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • Abbasi.Zahra An approach to prioritize quality dimensions of based on cloud computing using Multiple Criteria Decision Making method [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • Abbasimehr.Hossein A Novel Multi-Step Ahead Demand Forecasting Model Based on Deep Learning Techniques and Time Series Augmentation [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • Abbasi-Shahkooh.Kolsoum Extracting Innovation Strategies and Requirements for Telecommunication Companies: Case Study of Telecommunications Infrastructure Company [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • abbaspour.javad Improvement of mean shift tracker for tracking of target with variable photometric pattern [ Vol.4, Issue 13 - Spring Year ]
  • Abdian.Mohammad Mahdi Intrusion Detection Based on Cooperation on the Permissioned Blockchain Platform in the Internet of Things Using Machine Learning [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Abdian.Mohammad Mahdi Intrusion Detection Based on Cooperation on the Permissioned Blockchain Platform in the Internet of Things Using Machine Learning [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Abdipour.Abdolali Design, simulation and performance comparison of radating elements of reflect array antenna [ Vol.5, Issue 15 - Summer Year ]
  • Abdipour.Abdolali The Impact of IQ Imbalance on the BER of Adaptive Modulation in the MIMO System [ Vol.1, Issue 1 - Spring Year ]
  • Abdolrazzagh-Nezhad.Majid Designing A New Genetic-Fuzzy Type 2 Approach to Evaluate Self-Adaptive Systems by Software Quality Indicators [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • Abdolrazzagh-Nezhad.Majid Comparing A Hybridization of Fuzzy Inference System and Particle Swarm Optimization Algorithm with Deep Learning to Predict Stock Prices [ Vol.11, Issue 41 , 42 - Autumn - Winter Year 1398]
  • Adabi.Sepideh An Intelligent Pricing System for Cloud Services aims at Increasing Implementation Simplicity and Flexibility [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • adibi.zhinoos A Combinational Model for Evaluating Organizational Readiness for Data Warehouse Implementation by Using Analytical Hierarchical Process [ Vol.2, Issue 3 - Summer Year ]
  • Afshar Kazemi.Mohamad Ali Anomaly and Intrusion Detection Through Data Mining and Feature Selection using PSO Algorithm [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Afshar Kazemi.Mohamad Ali Anomaly and Intrusion Detection through Datamining and Feature Selection using PSO Algorithm [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • aghaee.golnaz Trust Management Based on User Feedback in Cloud Computing Environment by Using Cuckoo Optimization Algorithm [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • aghaeizade.reza Medial-axis Enhancement of Tubular Structures and its Application in the Extraction of Portal Veins [ Vol.4, Issue 13 - Spring Year ]
  • aghaeizade.reza Reinforcement of the central axis of tubular structures and its application in extracting the central axis of the portal vein [ Vol.4, Issue 14 , 15 - Autumn - Winter Year 1391]
  • aghdasim.aghdasim Identify and analyze decision points and key players in procurement process in the EPC companies [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Ahari.Somayeh Relation of emotional intelligence and trends of e-learning in organizations (Case study: Bank employees Alborz Province) [ Vol.4, Issue 11 - Autumn Year ]
  • Ahari.Somayeh The Evaluation of E-learning by Benchmarking Approach Iran Higher Education as a Case Study [ Vol.4, Issue 11 - Autumn Year ]
  • Ahari.Somayeh Ontology-Based Up gradation of Entrepreneurship Skills Using Educational Portals [ Vol.4, Issue 11 - Autumn Year ]
  • Ahari.Somayeh Assessing the e-service quality of Payame Noor University [ Vol.4, Issue 11 - Autumn Year ]
  • Ahari.Somayeh Proposing a Model for Extracting Information from Textual Documents, Based on Text Mining in E-learning [ Vol.4, Issue 11 - Autumn Year ]
  • Ahari.Somayeh A New Approach to Extract and Utilize Learners Social Relationships through Analyzing Forums Structure and Contents [ Vol.4, Issue 11 - Autumn Year ]
  • Ahari.Somayeh Multimedia teaching and its effects on learning and retention of English grammar [ Vol.4, Issue 11 - Autumn Year ]
  • Ahmadi.Hamid A greedy new method based on the cascade model to calculate maximizing penetration in social networks [ Vol.10, Issue 37 , 38 - Autumn - Winter Year 1397]
  • Ahmadi.Mohammad Reza Presenting a novel solution to choose a proper database for storing big data in national network services [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Ahmadi.Mohammad Reza Providing a New Solution in Selecting Suitable Databases for Storing Big Data in the National Information Network [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Ahmadi.Parvin A Horizon for Sentiment Analysis in Social Networks based on Interpreting Contents [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Ahmadi.Parvin A Framework for Sentiment Analysis in Social Networks based on Interpreting Contents [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Ahmadian chashmi.hamidreza A framework for establishing a national data vault for Data Governance institution [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • Ahmadzadeh.Hamidreza Design of Distributed Consensus Controller for Leader-Follower Singular Multi-Agent Systems in the Presence of Sensor Fault [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • ahsan.reza Converting protein sequence to image for classification with convolutional neural network [ Vol.12, Issue 43 , 44 - Spring - Summer Year 1399]
  • akbar.ali Applying genetic algorithm for automatic service identification based on quality metrics [ Vol.6, Issue 19 - Autumn Year ]
  • Akbari Emami.Shahnaz Information Technology, Strategy Implementation, Information Systems, Strategic Planning, Input-Process-Outcome Framework [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • akbari.ahmad Evaluation of SIP signaling implementation using QoS parameters [ Vol.1, Issue 1 - Spring Year ]
  • Akbari.Mohsen Understanding the users’ initial trust of social networks [ Vol.8, Issue 27 - Spring Year ]
  • Akbari.Mohsen Understanding the initial trust of users in social networks [ Vol.8, Issue 27 , 28 - Spring - Summer Year 1395]
  • Akhbari.Mehdi Fault Diagnosis and Detection in Photovoltaic Systems Using Neural Network VGG16 [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • akhlaghi.fardin DWT-SVD based Semi-Blind Digital Image Watermarking [ Vol.2, Issue 5 - Spring - Summer Year ]
  • akhlaghi.fardin Semi-blind labeling of images using SVD in the field of discrete wavelet transform [ Vol.2, Issue 6 , 7 - Autumn - Winter Year 1389]
  • Akraminejad.Reza WSTMOS: A Method For Optimizing Throughput, Energy, And Latency In Cloud Workflow Scheduling [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • alagheband.basir طراحی اولین پایگاه داده کلمات دستنویس کردی برای سیستم های تشخیص تصویری کلمات [ Vol.5, Issue 17 - Spring - Summer Year ]
  • albadvi.albadvi Liquidity Risk Prediction Using News Sentiment Analysis [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • ali.ghalibaf Improving performance of probe-based rate control mechanisms using classification: evaluation on an experimental testbed for High Throughput WLANs [ Vol.12, Issue 43 , 44 - Spring - Summer Year 1399]
  • Alimohamadi.Sajad Providing an Intrusion Detection System in the Industrial Internet of Things Using the Gray Wolf Algorithm [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • Alimoradi.Fatemeh Synthesizing an image dataset for text detection and recognition in images [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • alinezhad.ali Integrating Data Envelopment Analysis and Decision Tree Models in Order to Evaluate Information Technology-Based Units [ Vol.8, Issue 27 - Spring Year ]
  • alinezhad.alireza A Combination Method of DEA, DEMATEL and ANP for Evaluation of ERP Systems [ Vol.12, Issue 45 , 46 - Autumn - Winter Year 1399]
  • alipour.fazaneh A Research Over the Obstacles and Influential Factors on Development of e-Learning Subjects from Perspective of Beneficiaries of CME Program in Jahrom University of Medical Sciences in 2012-2013 [ Vol.6, Issue 21 - Spring Year ]
  • Aliyari.Shahram A model information technology adoption in academic research projects in the filed ICT based on Information Technology Adoption Integrated Modeling (ITAIM) [ Vol.11, Issue 41 , 42 - Autumn - Winter Year 1398]
  • Alizadeh Noughabi.Havva Generating Personalized Explanations for Twitter List Recommendations Using Semantic Similarity of Hashtags [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • Al-Shohayyeb.Huda Noor Analysis: A Benchmark Dataset for Evaluating Morphological Analysis Engines [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • Amin Mousavi.Seyed Abdollah Design and implementation of a survival model for patients with melanoma based on data mining algorithms [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • Amini vlashani.Maede Data-driven Marketing in Digital Businesses from Dynamic Capabilities View [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • amini.Akbar A framework for architecture the electronic trust in e-commerce:online shopping segment [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • Amini.Amir Integrating Data Envelopment Analysis and Decision Tree Models in Order to Evaluate Information Technology-Based Units [ Vol.8, Issue 27 - Spring Year ]
  • Amini.Amir ۹۳ / ۵٬۰۰۰ Integration of data envelopment analysis model and decision tree in order to evaluate units based on information technology [ Vol.8, Issue 27 , 28 - Spring - Summer Year 1395]
  • aminiazar.wahab Provide A Lightweight Encryption Solution To secure Data In The Internet Of Things [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • amintoosi.mahmood The aware genetic algorithm of the best member, applied to graph coloring and metric-dimension of the graph problems [ Vol.12, Issue 43 , 44 - Spring - Summer Year 1399]
  • Amiri.Maryam Document Clustering Based On Ontology and Fuzzy Approach [ Vol.5, Issue 17 - Spring - Summer Year ]
  • Amiri.Mostafa Fuzzy Multicore Clustering of Big Data in the Hadoop Map Reduce Framework [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Amiri.Samira Improvement of the bulk sensitivity and FoM of the plasmonic nanodipole antenna array [ Vol.9, Issue 33 , 34 - Autumn - Winter Year 1396]
  • AmiriAra.Hamid Joint Power Allocation Optimization of cooperative communication systems with Non-Orthogonal Multiple Access [ Vol.12, Issue 45 , 46 - Autumn - Winter Year 1399]
  • amrolahi.milad context-aware travel recommender system exploiting from Geo-tagged photos [ Vol.11, Issue 41 , 42 - Autumn - Winter Year 1398]
  • anarinejad.abbas Evaluation of e-learning with optimal mining approach 1 case study: Iran's higher education [ Vol.4, Issue 12 , 13 - Spring - Summer Year 1391]
  • ANSARI.ALI ASGHAR Power Efficient allocation in C-RAN with Multi access technology selection approach [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • ansarmohammadi.ali Energy-Efficient Fixed-Point Hardware Accelerator for Embedded DNNs [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • ansarmohammadi.ali Multi-Level Ternary Quantization for Improving Sparsity and Computation in Embedded Deep Neural Networks [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • ansarmohammadi.ali Multi-level ternary quantization for improving sparsity and computation in embedded deep neural networks [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • arabsorkhi.abouzar New Method to Improve Illumination Variations in Adult Images Based on Fuzzy Deep Neural Network [ Vol.11, Issue 41 , 42 - Autumn - Winter Year 1398]
  • arasteh.bahman Investigating an Approach to Identify and Classify Mutants Based on the Characteristics of Mutants with Machine Learning Algorithms [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • arefi.somayeh Feature selection for author identification of Persian online short texts [ Vol.13, Issue 47 , 48 - Spring - Summer Year 1400]
  • arianyan.ehsan Improving IoT resource management using fog calculations and ant lion optimization algorithm [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • arianyan.ehsan Presenting a novel solution to choose a proper database for storing big data in national network services [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • arianyan.ehsan High Performance Computing: Next Generation Requirements and Research Axes [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • arianyan.ehsan Providing a New Solution in Selecting Suitable Databases for Storing Big Data in the National Information Network [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • arianyan.ehsan Emerging technologies in future generations of high performance computing: introduction, taxonomy and future research directions [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • aryanian.iman Design, simulation and performance comparison of radating elements of reflect array antenna [ Vol.5, Issue 15 - Summer Year ]
  • asadi.bahareh Adaptive rotation models and traffic patterns to reduce light loss in networks on optical chip [ Vol.10, Issue 35 , 36 - Spring - Summer Year 1397]
  • asemi.atefe Investigating the Degree of Application of Professional Ethics and Vocational Qualifications by the Faculty Members of Virtual Universities of Isfahan and Medical Sciences University of Isfahan [ Vol.6, Issue 21 - Spring Year ]
  • ASGHARI ESTIAR.FARHAD Valuation of digital services in Iran: Empirical proof for Google and Instagram [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Asghari.Seyyed Amir Increasing Total Throughput, Reducing Outage to Zero, and Reducing Power Consumption in a Cellular Network [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • asghari.zeinab Investigating an Approach to Identify and Classify Mutants Based on the Characteristics of Mutants with Machine Learning Algorithms [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • Asgharian.Alireza Extracting Innovation Strategies and Requirements for Telecommunication Companies: Case Study of Telecommunications Infrastructure Company [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Asghariyan.Fatemeh An Intrusion Detection System based on Deep Learning for CAN Bus [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • ashouri.mina Investigating the Effect of Hardware Parameters Adjustments on Energy Consumption in Thin Matrix Multiplication Algorithm on GPUs [ Vol.9, Issue 31 , 32 - Spring - Summer Year 1396]
  • attaran.ebrahim Blind correction of camera lens aberration and de-centering error using modified Zernike model [ Vol.7, Issue 25 - Spring - Summer Year ]
  • ayagh.zahra Understanding the users’ initial trust of social networks [ Vol.8, Issue 27 - Spring Year ]
  • Azarkasb.Seyed Omid Fuzzy Multicore Clustering of Big Data in the Hadoop Map Reduce Framework [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Azarnejad.Ardeshir Routing improvement to control congestion in software defined networks by using distributed controllers [ Vol.11, Issue 39 , 40 - Spring - Summer Year 1398]
  • azharivs.azharivs Evaluation of SIP signaling implementation using QoS parameters [ Vol.1, Issue 1 - Spring Year ]
  • Azimi.ُSamaneh Fault Diagnosis and Detection in Photovoltaic Systems Using Neural Network VGG16 [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • Azimzadeh.Masomeh Priority based Deployment of IoT Applications in Fog [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Azimzadeh.Masomeh Community-Based Multi-Criteria Placement of Applications in the Fog Environment [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Azizi MehmanDoost.Mahdi The framework of the national macro plan for transparency and information release based on the grounded theory method [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]

B

  • babadi.sima Improving the entrepreneurial skills of Hastan-nagar capital by using the entrepreneurship training portal [ Vol.4, Issue 12 , 13 - Spring - Summer Year 1391]
  • Babaee.Hossein A Framework for Identifying and Ranking Criteria for Evaluating the Quality of Electronic Services (Case studies: Golestan website of Payame-noor university) [ Vol.5, Issue 18 , 19 - Autumn - Winter Year 1392]
  • Babazadeh.Sogol Providing a model for evaluating native electronic content in Iran based on value chain [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • badie.kambiz Using limited memory to store the most recent action in XCS learning classifier systems in maze problems [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • badie.kambiz A Horizon for Sentiment Analysis in Social Networks based on Interpreting Contents [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • badie.kambiz A Framework for Sentiment Analysis in Social Networks based on Interpreting Contents [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • bagheri.alireza Geometric embedding of the tree in points inside a polygon with minimum number of bends [ Vol.2, Issue 4 , 5 - Spring - Summer Year 1389]
  • bagheri.masoud Applying genetic algorithm for automatic service identification based on quality metrics [ Vol.6, Issue 19 - Autumn Year ]
  • bagherinejad.jafar A Model for impacts of Investment in IT on customer satisfaction, using Structural Equation Modeling and Path Analysis [ Vol.5, Issue 15 - Summer Year ]
  • bagherinejad.jafar A Combinational Model for Evaluating Organizational Readiness for Data Warehouse Implementation by Using Analytical Hierarchical Process [ Vol.2, Issue 3 - Summer Year ]
  • bahadorani baghbaderani.amin Routing of Multipartite Computer Networks Using Ant Genetic Algorithm [ Vol.9, Issue 31 , 32 - Spring - Summer Year 1396]
  • Bahadorifard.Reza Investigating the Relationship between Electronic Human Resource Management, Agility and Organizational Effectiveness in Organizations Under the Ministry of Communications and Information Technology [ Vol.12, Issue 45 , 46 - Autumn - Winter Year 1399]
  • baharloo.mahdiye An Improved Method for Detecting Phishing Websites Using Data Mining on Web Pages [ Vol.12, Issue 43 , 44 - Spring - Summer Year 1399]
  • Bahreini.Takavash Extracting Innovation Strategies and Requirements for Telecommunication Companies: Case Study of Telecommunications Infrastructure Company [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Bahri.Reza Energy procurement of a cellular base station in independent microgrids with electric vehicles and renewable energy sources: Mixed-integer nonlinear programming model [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • Bahri.Reza Design and fabrication of the E-field probe for the measurement of the electromagnetic fields in 5G frequency band [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • Bakhtiari.Saeed A Multi-Objective Differential Evolutionary Algorithm-based Approach for Resource Allocation in Cloud Computing Environment [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • bakhtiyari.saied Routing improvement to control congestion in software defined networks by using distributed controllers [ Vol.11, Issue 39 , 40 - Spring - Summer Year 1398]
  • Baraani.Ahmad Improving Opinion Aspect Extraction Using Domain Knowledge and Term Graph [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Baradaran.Sepideh A Review on Hadith Text Processing Tasks [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Baradaran.Sepideh A Review on Hadith Text Processing Tasks [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Baradaran.Vahid A Model for Evaluating Electronic Governance (e-governance) in Iran's Executive Sectors [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • Barkhoda.Sayed Wafa Improving imperialist competitive algorithm for solving the nodes placement problem in three-dimensional grid wireless sensor networks [ Vol.12, Issue 45 , 46 - Autumn - Winter Year 1399]
  • barzamini.roohollah Sliding Mode Controller for TCP Congestion Control [ Vol.2, Issue 5 - Spring - Summer Year ]
  • barzamini.roohollah Sliding mode control for congestion in TCP/IP networks [ Vol.2, Issue 6 , 7 - Autumn - Winter Year 1389]
  • beheshti.rahele Improving recommender systems with the help of Semantic Web [ Vol.9, Issue 31 , 32 - Spring - Summer Year 1396]
  • Beheshti.Zahra An Individual-Oriented Shuffled Frog Leaping Algorithm for Solving Vehicle Routing Problem [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • Behkamal.Behshid Generating Personalized Explanations for Twitter List Recommendations Using Semantic Similarity of Hashtags [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • Behkamal.Behshid BIG DATA [ Vol.10, Issue 37 , 38 - Autumn - Winter Year 1397]
  • beigrezai.mahsa An Overview on Replica Consistency Methods in Distributed Systems and Future Works [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • Bidgoli.AmirMasoud The Belief of Persian Text Mining Based on Deep Learning with Emotion-Word Separation [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • Binesh Marvasti.Mohammadreza Increasing Total Throughput, Reducing Outage to Zero, and Reducing Power Consumption in a Cellular Network [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • bobarshad.hossein Extracting the Information Technology architecture of hospitals with approach of Implementing in Iran [ Vol.8, Issue 27 - Spring Year ]
  • bobarshad.hossein Extracting hospital information technology architecture with the approach of implementation capability in Iran [ Vol.8, Issue 27 , 28 - Spring - Summer Year 1395]
  • borna.keyvan Using web analytics in forecasting the stock price of chemical products group in the stock exchange [ Vol.11, Issue 39 , 40 - Spring - Summer Year 1398]
  • Bouyer.Asgarali A greedy new method based on the cascade model to calculate maximizing penetration in social networks [ Vol.10, Issue 37 , 38 - Autumn - Winter Year 1397]

C

  • Chabok.Hossein A design of Rectangular Waveguide TM11 to TE10 Mode Converter for S-band Applications [ Vol.9, Issue 33 , 34 - Autumn - Winter Year 1396]
  • Cheraghali.Mohammad Hasan Identifying and ranking factors affecting the digital transformation strategy in Iran's road freight transportation industry focusing on the Internet of Things and data analytics [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Cheraghali.Mohammad Hasan Identifying and Ranking Factors Affecting the Digital Transformation Strategy in Iran's Road Freight Transportation Industry Focusing on the Internet of Things and Data Analytics [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]

D

  • daee.amir Using web analytics in forecasting the stock price of chemical products group in the stock exchange [ Vol.11, Issue 39 , 40 - Spring - Summer Year 1398]
  • daei.mohammadhassan Improving performance of probe-based rate control mechanisms using classification: evaluation on an experimental testbed for High Throughput WLANs [ Vol.12, Issue 43 , 44 - Spring - Summer Year 1399]
  • daneshfar.fatemeh طراحی اولین پایگاه داده کلمات دستنویس کردی برای سیستم های تشخیص تصویری کلمات [ Vol.5, Issue 17 - Spring - Summer Year ]
  • Daneshparvar.Mitra The role of organizational factors on consumer buying behavior in social networks [ Vol.12, Issue 45 , 46 - Autumn - Winter Year 1399]
  • danyali.danyali DWT-SVD based Semi-Blind Digital Image Watermarking [ Vol.2, Issue 5 - Spring - Summer Year ]
  • danyali.danyali Semi-blind labeling of images using SVD in the field of discrete wavelet transform [ Vol.2, Issue 6 , 7 - Autumn - Winter Year 1389]
  • Danyali.Habibollah The Participation of Three Brain Tissues in Alzheimer’s disease Diagnosis from Structural MRI [ Vol.9, Issue 33 , 34 - Autumn - Winter Year 1396]
  • dashti.fattameh Provide A Lightweight Encryption Solution To secure Data In The Internet Of Things [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • dashti.seyed ebrahim Improving resource allocation in mobile edge computing using gray wolf and particle swarm optimization algorithms [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • dashti.seyed ebrahim Improving Resource Allocation in Mobile Edge Computing Using Particle Swarm and Gray Wolf Optimization Algorithms [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Dastghaibyfard.Gholamhossein A Novel Model for detecting intrusion with Mobile Agent and Game theory [ Vol.8, Issue 27 - Spring Year ]
  • Dastghaibyfard.Gholamhossein Presenting a model for using mobile agents in distributed intrusion detection systems based on game theory [ Vol.8, Issue 27 , 28 - Spring - Summer Year 1395]
  • Dastranj.Nasrin Extracting Innovation Strategies and Requirements for Telecommunication Companies: Case Study of Telecommunications Infrastructure Company [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • dehbashian.maryam Training MLP Neural Network in Images Compression by GSA Method [ Vol.2, Issue 5 - Spring - Summer Year ]
  • dehbashian.maryam Training of MLP neural network in image compression using GSA method [ Vol.2, Issue 6 , 7 - Autumn - Winter Year 1389]
  • dehdashti shahrokh.zohreh The role of organizational factors on consumer buying behavior in social networks [ Vol.12, Issue 45 , 46 - Autumn - Winter Year 1399]
  • Dehghan.Sogand The main components of evaluating the credibility of users according to organizational goals in the life cycle of big data [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Dehghani.Mohammad Javad New changes of local binary patterns and classification and segmentation of seabed images [ Vol.8, Issue 27 - Spring Year ]
  • Dehghani.Mohammad Javad New changes of local binary pattern and classification and segmentation of texture images of the seabed [ Vol.8, Issue 27 , 28 - Spring - Summer Year 1395]
  • Dehghani.Mohammad Javad Power Efficient allocation in C-RAN with Multi access technology selection approach [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • Dehyadegari.Masoud High Performance Computing: Next Generation Requirements and Research Axes [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • dianat.dianat Converting protein sequence to image for classification with convolutional neural network [ Vol.12, Issue 43 , 44 - Spring - Summer Year 1399]
  • dolatkhah.ahmad The Local Strategic Model of Smart Police of The Islamic Republic of Iran [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • dolatkhah.ahmad Face recognition and Liveness Detection Based on Speech Recognition for Electronical Authentication [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • Dorostkar Yaghouti.Behnam Face recognition and Liveness Detection Based on Speech Recognition for Electronical Authentication [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • doustari.mohammadali Classify and implement hardware trojans and provide a new way to detect them [ Vol.9, Issue 31 , 32 - Spring - Summer Year 1396]

E

  • Ebadati.Omid Mahdi Using web analytics in forecasting the stock price of chemical products group in the stock exchange [ Vol.11, Issue 39 , 40 - Spring - Summer Year 1398]
  • ebadzade.mohamad mehdi Using limited memory to store the most recent action in XCS learning classifier systems in maze problems [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Ebrahimi Lame.Nozar A Collaborative Filtering Movie Recommendation System Based on Users Correlation and Weighted K-Means with High Accuracy [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • ebrahimi.mansour Converting protein sequence to image for classification with convolutional neural network [ Vol.12, Issue 43 , 44 - Spring - Summer Year 1399]
  • ebrahimi.Seyyed Mohammad Introducing a genetic algorithm based Method for Community person's stance Detection in social media and news [ Vol.11, Issue 41 , 42 - Autumn - Winter Year 1398]
  • Edalatian Shariairi.Jamshid A value Co-creation model for Information and Communication Technology Entrepreneurial Ecosystem [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • Edalatpanah.Seyed Ahmad Predicting the workload of virtual machines in order to reduce energy consumption in cloud data centers using the combination of deep learning models [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Eftekhari.Seyed Ahmad Intrusion Detection Based on Cooperation on the Permissioned Blockchain Platform in the Internet of Things Using Machine Learning [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Eftekhari.Seyed Ahmad Intrusion Detection Based on Cooperation on the Permissioned Blockchain Platform in the Internet of Things Using Machine Learning [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Ehsani Boshla.Fatemeh High Performance Computing: Next Generation Requirements and Research Axes [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • Ehteshami.Mehran Identifying and ranking factors affecting the digital transformation strategy in Iran's road freight transportation industry focusing on the Internet of Things and data analytics [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Ehteshami.Mehran Identifying and Ranking Factors Affecting the Digital Transformation Strategy in Iran's Road Freight Transportation Industry Focusing on the Internet of Things and Data Analytics [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Elahi.Shaban A Hybrid Neural Network Ensemble Model for Credit Risk Assessment [ Vol.6, Issue 20 , 21 - Spring - Summer Year 1393]
  • Elahi.Shaban Designing a Fuzzy Expert System for Selecting an Appropriate Contractor in Information Technology Outsourcing [ Vol.2, Issue 5 - Spring - Summer Year ]
  • Elahi.Shaban Designing a fuzzy expert system for choosing the right contractor in information technology outsourcing [ Vol.2, Issue 6 , 7 - Autumn - Winter Year 1389]
  • Eliasi.Behrooz Providing a model for evaluating native electronic content in Iran based on value chain [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • Eliasi.Behrooz Open Data Accessing Policymaking in Iran, in the Aspect of Preserving Privacy and Personal Data Ownership [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • Ershadi.Mohammad Javad An approach to prioritize quality dimensions of based on cloud computing using Multiple Criteria Decision Making method [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • Eskandari.Ahmadreza Design and fabrication of the E-field probe for the measurement of the electromagnetic fields in 5G frequency band [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • Eslami.Mohsen Power Efficient allocation in C-RAN with Multi access technology selection approach [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • Esmaeeli.Alireza Extracting Innovation Strategies and Requirements for Telecommunication Companies: Case Study of Telecommunications Infrastructure Company [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Esmaeili.mahdi A comprehensive survey on the influence maximization problem in social networks [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • esmaeilpour.mansour A New Method to computational intelligence to improve network lifetime in wireless sensor networks [ Vol.7, Issue 23 - Summer Year ]
  • esmaili.arefeh Use of conditional generative adversarial network to produce synthetic data with the aim of improving the classification of users who publish fake news [ Vol.13, Issue 47 , 48 - Spring - Summer Year 1400]
  • Esnaashari.MohammadMahdi Priority based Deployment of IoT Applications in Fog [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Esnaashari.MohammadMahdi High Performance Computing: Next Generation Requirements and Research Axes [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • Esnaashari.MohammadMahdi Community-Based Multi-Criteria Placement of Applications in the Fog Environment [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Ezzati.Hashem The aware genetic algorithm of the best member, applied to graph coloring and metric-dimension of the graph problems [ Vol.12, Issue 43 , 44 - Spring - Summer Year 1399]

F

  • faez.karim Blind Correction of Lens Aberration Using Modified Zernike Moments [ Vol.2, Issue 5 - Spring - Summer Year ]
  • faez.karim Blind correction of camera lens aberration and de-centering error using modified Zernike model [ Vol.7, Issue 25 - Spring - Summer Year ]
  • faez.karim Correcting camera lens misalignment using Zernik moments [ Vol.2, Issue 6 , 7 - Autumn - Winter Year 1389]
  • fahimnia.fatima A framework for establishing a national data vault for Data Governance institution [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • farahi.rasoul Provide A Lightweight Encryption Solution To secure Data In The Internet Of Things [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • Faraji Dizaji.Sajjad The Effect of ICT Development on Economic and Political Risk: A Cross Country Study [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • farasatkhah.maghsod Investigation on Faculty Members’ Competency Model in Virtual Environment Comment by the Faculty Members and Students (Based on Ormaner’s Model) [ Vol.6, Issue 21 - Spring Year ]
  • Fardinia.Mahdi Indigenous model of commercialization of complex technologies based on partnership in the ICT sector [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Farhoodi.Mojgan Presenting a new conceptual model for the field of big data and analyzing the data-driven business in Iran based on the proposed model [ Vol.13, Issue 47 , 48 - Spring - Summer Year 1400]
  • Farhoodi.Mojgan Persian Stance Detection Based On Multi-Classifier Fusion [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Farivar.Faezeh Stability Analysis of Networked Control Systems under Denial of Service Attacks using Switching System Theory [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • Farshi.Mohammad Measuring Similarity for Directed Path in Geometric Data [ Vol.12, Issue 45 , 46 - Autumn - Winter Year 1399]
  • Farzaneh.Mandana Providing a model for evaluating native electronic content in Iran based on value chain [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • Farzaneh.Mandana Extracting Innovation Strategies and Requirements for Telecommunication Companies: Case Study of Telecommunications Infrastructure Company [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Farzi.Saeed Use of conditional generative adversarial network to produce synthetic data with the aim of improving the classification of users who publish fake news [ Vol.13, Issue 47 , 48 - Spring - Summer Year 1400]
  • Fasanghari.Mahdi Comprehensive Interactive Maturity Model for Mobile government [ Vol.2, Issue 3 - Summer Year ]
  • Fasanghari.Mahdi Design and fabrication of the E-field probe for the measurement of the electromagnetic fields in 5G frequency band [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • Fatahi.Somayeh An approach to prioritize quality dimensions of based on cloud computing using Multiple Criteria Decision Making method [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • Fatemi.Yaghoub The Participation of Three Brain Tissues in Alzheimer’s disease Diagnosis from Structural MRI [ Vol.9, Issue 33 , 34 - Autumn - Winter Year 1396]
  • Fathi.Mohammad Providing an Intrusion Detection System in the Industrial Internet of Things Using the Gray Wolf Algorithm [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • Fathian.Mohammad A proper method for the advertising email classification based on user’s profiles [ Vol.8, Issue 27 - Spring Year ]
  • Fathian.Mohammad COBIT A Suitable Framework for Measuring IT Governance in Organizations [ Vol.1, Issue 1 - Spring Year ]
  • Fathian.Mohammad A conceptual model for identification of eservices quality in Iranian estores [ Vol.8, Issue 29 - Summer Year ]
  • Fathian.Mohammad Provide a conceptual model to identify the quality of electronic services in the country's online stores [ Vol.8, Issue 30 , 31 - Autumn - Winter Year 1395]
  • fathiyan.mohammad Providing a suitable method for categorizing promotional e-mails based on user profiles [ Vol.8, Issue 27 , 28 - Spring - Summer Year 1395]
  • Feizpour.ٍElham Prioritization of e-commerce failure factors in technical infrastructure: Meybod city ceramic tile factories [ Vol.8, Issue 30 , 31 - Autumn - Winter Year 1395]
  • Feizpour.ٍElham The Ranking Lack of Success Factors of Electronic Commerce in Technical Infrastructure in Tile and Ceramic Factories in Meybod County [ Vol.8, Issue 29 - Summer Year ]
  • feyzi.amin using clustering in AODV routing protocol for vehicular ad-hoc networks on highway scenario [ Vol.8, Issue 29 - Summer Year ]
  • feyzi.amin Application of clustering in AODV routing protocol for intercity networks on the highway scenario [ Vol.8, Issue 30 , 31 - Autumn - Winter Year 1395]
  • Firozeh.Safora Information Technology, Strategy Implementation, Information Systems, Strategic Planning, Input-Process-Outcome Framework [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • forghani.mohammadreza Dynamic Load Balancing Improvement in Software-Defined Networks Using Fuzzy Multi-Objective Programming Algorithms [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • forootan.faezeh Applying deep learning for improving the results of sentiment analysis of Persian comments of Online retail stores [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • forouza.amirhossein Medial-axis Enhancement of Tubular Structures and its Application in the Extraction of Portal Veins [ Vol.4, Issue 13 - Spring Year ]
  • forouza.amirhossein Reinforcement of the central axis of tubular structures and its application in extracting the central axis of the portal vein [ Vol.4, Issue 14 , 15 - Autumn - Winter Year 1391]

G

  • Gerami.Mohsen Pathology of software export development in Iran [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • Ghaffarzadegan.Mahshid Extracting Innovation Strategies and Requirements for Telecommunication Companies: Case Study of Telecommunications Infrastructure Company [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • ghanbari.elham A new algorithm based on ensemble learning for learning to rank in information retrieval [ Vol.7, Issue 25 - Spring - Summer Year ]
  • Gharaee Garakani.Hossein The Relevance, Importance and Dependence of Critical Infrastructures of The Islamic Republic of Iran from a Cyber-Perspective [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • gharaee.Hosain The Relevance, Importance and Dependence of Critical Infrastructures of The Islamic Republic of Iran from a Cyber-Perspective [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • Ghasemi.Mohammad Exploring the antecedents and consequences of smart good governance using the fuzzy Delphi method (FDM) [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • ghasemian.fahime Performance Improvement of Automatic Language Identification Using GMM-SVM Method [ Vol.2, Issue 5 - Spring - Summer Year ]
  • Ghavami.Hossein Performance Analysis of Device to Device Communications Overlaying/Underlaying Cellular Network [ Vol.9, Issue 33 , 34 - Autumn - Winter Year 1396]
  • ghayori.majid Intrusion Detection Based on Cooperation on the Permissioned Blockchain Platform in the Internet of Things Using Machine Learning [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • ghayori.majid Improvement of intrusion detection system on Industrial Internet of Things based on deep learning using metaheuristic algorithms [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • ghayori.majid Intrusion Detection Based on Cooperation on the Permissioned Blockchain Platform in the Internet of Things Using Machine Learning [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • ghayori.majid Incentive reward mechanism for Participants to the human computing system of Intrusion Detection Based on Game Theory [ Vol.12, Issue 43 , 44 - Spring - Summer Year 1399]
  • ghazanfari.mehdi COBIT A Suitable Framework for Measuring IT Governance in Organizations [ Vol.1, Issue 1 - Spring Year ]
  • ghaznavi.mohammadbagher Classify and implement hardware trojans and provide a new way to detect them [ Vol.9, Issue 31 , 32 - Spring - Summer Year 1396]
  • ghodselahi.ahmad A Hybrid Neural Network Ensemble Model for Credit Risk Assessment [ Vol.6, Issue 20 , 21 - Spring - Summer Year 1393]
  • gholamian.mohammadreza Provide a method for customer segmentation using the RFM model in conditions of uncertainty [ Vol.8, Issue 30 , 31 - Autumn - Winter Year 1395]
  • gholipoor.niloofar Emerging technologies in future generations of high performance computing: introduction, taxonomy and future research directions [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Gholipour.Majid A Collaborative Filtering Movie Recommendation System Based on Users Correlation and Weighted K-Means with High Accuracy [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • Ghorbannia Delavar.Arash WSTMOS: A Method For Optimizing Throughput, Energy, And Latency In Cloud Workflow Scheduling [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • Gilanian Sadeghi.Mohammad Mehdi Community Detection in Bipartite Networks Using HellRank Centrality Measure [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Gilanian Sadeghi.Mohammad Mehdi Community Detection in Bipartite Networks Using HellRank Centrality Measure [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • golshani rosta.mehrab ali An Information Architecture Framework for Utilizing Social Networks in Iranian Higher Education System [ Vol.5, Issue 17 - Spring - Summer Year ]
  • Goodarzi.Babak New changes of local binary patterns and classification and segmentation of seabed images [ Vol.8, Issue 27 - Spring Year ]
  • Goodarzi.Babak New changes of local binary pattern and classification and segmentation of texture images of the seabed [ Vol.8, Issue 27 , 28 - Spring - Summer Year 1395]

H

  • habibollahian.ehsan Three-axis attitude control of a micro-satellite by magnetic actuators through-synthesis robust method [ Vol.5, Issue 15 - Summer Year ]
  • Haghighat Monfared.Jalal Indigenous model of commercialization of complex technologies based on partnership in the ICT sector [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Haghighathoseini.Atefehsadat Extracting hospital information technology architecture with the approach of implementation capability in Iran [ Vol.8, Issue 27 , 28 - Spring - Summer Year 1395]
  • Haghighathoseini.Atefehsadat Extracting the Information Technology architecture of hospitals with approach of Implementing in Iran [ Vol.8, Issue 27 - Spring Year ]
  • haghighathosseini.atefe Extracting the Information Technology architecture of hospitals with approach of Implementing in Iran [ Vol.8, Issue 27 - Spring Year ]
  • Haghighinasab.Manijeh A value Co-creation model for Information and Communication Technology Entrepreneurial Ecosystem [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • Haj Seyyed Javadi.Hamid The Belief of Persian Text Mining Based on Deep Learning with Emotion-Word Separation [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • Hajebi.Elham Reduction of network load by mapping the application in the network on a chip using the discrete Harris hawk algorithm [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • Haji Gholam Saryazdi.Ali Determining the factors affecting the collective financing of knowledge-based IT companies [ Vol.10, Issue 37 , 38 - Autumn - Winter Year 1397]
  • hajiabdollah.Shaghayegh Improving polarity identification in sentiment analysis using sarcasm detection and machine learning algorithms in Persian tweets [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • hajmohseni.sadegh Classify and implement hardware trojans and provide a new way to detect them [ Vol.9, Issue 31 , 32 - Spring - Summer Year 1396]
  • hakimjavadi.ali Iran's Mobile Government Ecosystem Model, Stakeholders Identification and Analysis [ Vol.7, Issue 23 - Summer Year ]
  • hakimjavadi.ali Iran's companion government ecosystem model, analysis and recognition of the main players [ Vol.7, Issue 24 , 25 - Spring - Summer Year 1394]
  • hakkak.mohammad Provide a model of human resource knowledge architecture in knowledge-based organizations using a mixed approach [ Vol.11, Issue 39 , 40 - Spring - Summer Year 1398]
  • hamze.ali Improving recommender systems with the help of Semantic Web [ Vol.9, Issue 31 , 32 - Spring - Summer Year 1396]
  • Harounabadi.Ali Trust Based Link Prediction Using Fuzzy Computational Model in Social Networks [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • hashemi G..S. Alireza A Neighbor-based Link Prediction Method for Bipartite Networks [ Vol.13, Issue 47 , 48 - Spring - Summer Year 1400]
  • hashemi G..S. Alireza Generalizing The Concept of Business Processes Structural Soundness from Classic Petri-nets to BPMN2.0 Process Models [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • hashemi G..S. Alireza Generalizing The Concept of Business Processes Structural Soundness from Classic Petri-nets to BPMN2.0 Process Models [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • hashemi G..S. Alireza Provide a new architecture for the decision support system to manage stock trading based on a combination of financial indicators [ Vol.9, Issue 31 , 32 - Spring - Summer Year 1396]
  • Hashemi.Ali User recommendation in Telegram messenger by graph analysis and mathematical modeling of users' behavior [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • hashemi.MAHDI Modified orthogonal chaotic colonial competition algorithm and its application in improving pattern recognition in multilayer perceptron neural network [ Vol.10, Issue 35 , 36 - Spring - Summer Year 1397]
  • Hashemi.Mahdi Improving Opinion Aspect Extraction Using Domain Knowledge and Term Graph [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • hashemi.meisam Textual analysis of central bank news in forecasting long-term trend of Tehran stock exchange index [ Vol.12, Issue 43 , 44 - Spring - Summer Year 1399]
  • Hashemi.Sattar Provide a framework for enhancing the security of IoT-based smart homes using the IoT-A reference architecture [ Vol.10, Issue 35 , 36 - Spring - Summer Year 1397]
  • hashempour.raheb Face recognition and Liveness Detection Based on Speech Recognition for Electronical Authentication [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • hassani.hadise Determination of Optimum SVMs Based on Genetic Algorithm in Classification of Hyper spectral Imagery [ Vol.4, Issue 13 - Spring Year ]
  • hassani.hadise Determining optimal support vector machines in classification of hyperspectral images based on genetic algorithm [ Vol.4, Issue 14 , 15 - Autumn - Winter Year 1391]
  • hassanzade.alireza Designing a Fuzzy Expert System for Selecting an Appropriate Contractor in Information Technology Outsourcing [ Vol.2, Issue 5 - Spring - Summer Year ]
  • hassanzade.alireza Determining the factors affecting the collective financing of knowledge-based IT companies [ Vol.10, Issue 37 , 38 - Autumn - Winter Year 1397]
  • Haydari.Saeed Assessing E-Government Readiness in Iranian Universities, Case Study: Tarbiat Modares University [ Vol.12, Issue 43 , 44 - Spring - Summer Year 1399]
  • Hayeri Khyavi.Masoud Emerging technologies in future generations of high performance computing: introduction, taxonomy and future research directions [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • hazratgholizadeh.rahim Providing a suitable method for categorizing promotional e-mails based on user profiles [ Vol.8, Issue 27 , 28 - Spring - Summer Year 1395]
  • hazratgholizadeh.rahim A proper method for the advertising email classification based on user’s profiles [ Vol.8, Issue 27 - Spring Year ]
  • heidary.mohsen Analysis of the current situation ICT in rural areas of the country (using the Delphi Method) [ Vol.6, Issue 19 - Autumn Year ]
  • Helfroush.Mohammad Sadegh The Participation of Three Brain Tissues in Alzheimer’s disease Diagnosis from Structural MRI [ Vol.9, Issue 33 , 34 - Autumn - Winter Year 1396]
  • Hendijani.Rosa E-Government Service Supply Chain: Identifying Performance Evaluation Indicators (Case Study of e-Customs System in Iran) [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • Heshmati.Zainabolhoda Optimized Modeling for satisfaction in the relationship between a physician and patient based on machine learnin methods [ Vol.7, Issue 23 - Summer Year ]
  • Heshmati.Zainabolhoda An optimised hybrid method for ambulance dispatch based on complex networks and Artificial Intelligence [ Vol.7, Issue 23 - Summer Year ]
  • Heshmati.Zainabolhoda Optimum modeling of patient satisfaction with the doctor based on machine learning methods [ Vol.7, Issue 24 , 25 - Spring - Summer Year 1394]
  • Heshmati.Zainabolhoda Providing an optimal method for dispatching an ambulance based on complex networks and artificial intelligence [ Vol.7, Issue 24 , 25 - Spring - Summer Year 1394]
  • heydari.jamshid An Investigation on the Effect of Multifactor Model of Improving Critical Thinking in E-learning Environments [ Vol.6, Issue 21 - Spring Year ]
  • homayooni.maryam Evaluation of SIP signaling implementation using QoS parameters [ Vol.1, Issue 1 - Spring Year ]
  • homayoun.homayoun Performance Improvement of Automatic Language Identification Using GMM-SVM Method [ Vol.2, Issue 5 - Spring - Summer Year ]
  • honarparvaran.hamid Designing a system dynamics model for upgrading policy Iran Information and Communication Technology Network Indicators [ Vol.8, Issue 30 , 31 - Autumn - Winter Year 1395]
  • honarparvaran.hamid Design a Model Of System Dynamics (SD) On The Policy Of Upgrading Indices Of Iran ICT Network [ Vol.8, Issue 29 - Summer Year ]
  • Hosein khani.Fateme Trust Based Link Prediction Using Fuzzy Computational Model in Social Networks [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • Hossayni.Sayyed Ali Noor Analysis: A Benchmark Dataset for Evaluating Morphological Analysis Engines [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • Hossayni.Sayyed Ali A Review on Hadith Text Processing Tasks [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Hossayni.Sayyed Ali A Review on Hadith Text Processing Tasks [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Hosseinali-Zade.Sasan A review of the application of meta-heuristic algorithms in load balancing in cloud computing [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • hosseinfirooze.zaker A Fast Method to Compute Radiation Fields of Shaped Reflector Antennas by FFT [ Vol.1, Issue 2 , 3 - Autumn - Winter Year 1387]
  • Hosseini.Mohammad Reza The framework of the national macro plan for transparency and information release based on the grounded theory method [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • Hosseini.Monireh Providing a Blockchain-Based Method to Protect Users’ Privacy in Social Networks [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • Hosseini.Seyed Abdolrasoul Exploring the antecedents and consequences of smart good governance using the fuzzy Delphi method (FDM) [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • Hosseini.Seyedeh Motahareh Identify and analyze decision points and key players in procurement process in the EPC companies [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Hosseinpour.Mehdi Open Data Accessing Policymaking in Iran, in the Aspect of Preserving Privacy and Personal Data Ownership [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • Hosseinzadeh.Elham Investigating the Information and Communication Technology Deployment Impact on Energy Expenditures of Iranian households (A Provincial Approach) [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • Hossieni bayan.Shaghayeghsadat High Performance Computing: Next Generation Requirements and Research Axes [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • houri.masa Medial-axis Enhancement of Tubular Structures and its Application in the Extraction of Portal Veins [ Vol.4, Issue 13 - Spring Year ]

J

  • Jabraeil Jamali.Mohammad Ali Design of FPGA-based processor for SHA-2 series cryptographic algorithms Design ترجمه‌های design اسمفراوانی طرح plan, design, layout, project, scheme, plot نقشه map, plan, plot, scheme, plat, chart زمینه background, context, ground, setting, base, terrain تدبیر measure, plan, contraption, gimmick, contrivance, scheme قصد intention, intent, purpose, attempt, will, determination طراح ریزی design خیال imagination, phantom, illusion, thought, fiction, mind فعل طرح کردن design, plan, draft, draw, lay, bring forth قصد کردن attempt, decide, design, meditate تخصیص دادن allot, allocate, apportion, consecrate, give, design تدبیر کردن devise, contrive, meditate, compass, machinate, design تعریف‌های design اسم ۱ a plan or drawing produced to show the look and function or workings of a building, garment, or other object before it is built or made. he has just unveiled his design for the new museum مترادف‌ها: planblueprintdrawingscale drawingsketchoutlinemapplotdiagramdelineationdraftdepictionrepresentationartist's impressionschememodelprototypeproposal ۲ an arrangement of lines or shapes created to form a pattern or decoration. pottery with a lovely blue and white design مترادف‌ها: patternmotifdevicestylearrangementcompositionmakeuplayoutconstitutionconfigurationorganizationconstructionshapeformformationfigure purpose, planning, or intention that exists or is thought to exist behind an action, fact, or material object. the appearance of design in the universe مترادف‌ها: intentionaimpurposeplanintentobjectiveobjectgoalendtargetpointhopedesirewishdreamaspirationambitionidea فعل ۱ decide upon the look and functioning of (a building, garment, or other object), by making a detailed drawing of it. a number of architectural students were designing a factory مترادف‌ها: plandraw plans ofdrawsketchoutlinemap outplotblock outdelineatedraftdepictinventoriginatecreatethink upcome up withdeviseformformulateconceivemakeproducedevelopfashionfabricateforgehatchcoindream up مترادف design اسم planpatternintention فعل planinventdream upintend ۹۱ مترادف دیگر [ Vol.10, Issue 37 , 38 - Autumn - Winter Year 1397]
  • Jafarali Jassbi.Somayyeh Priority based Deployment of IoT Applications in Fog [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Jafarali Jassbi.Somayyeh Community-Based Multi-Criteria Placement of Applications in the Fog Environment [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • jafari fesharaki.shekoofeh A Satellite Control Method Using Laguerre Model Predictive Control Approach [ Vol.5, Issue 15 - Summer Year ]
  • jafari novimipour.nima Scheduling tasks in cloud environments using mapping framework - reduction and genetic algorithm [ Vol.10, Issue 37 , 38 - Autumn - Winter Year 1397]
  • jafari novimipour.nima Using a multi-objective optimization algorithm for tasks allocate in the cloud-based systems to reduce energy consumption [ Vol.12, Issue 43 , 44 - Spring - Summer Year 1399]
  • Jafari.Bagher A novel metaheuristic algorithm and its discrete form for influence maximizing in complex networks [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • jafari.mahdi A New Algorithm for Fastintra-Frame Modes Selection in H.264/Avc Video Coding [ Vol.7, Issue 26 , 27 - Autumn - Winter Year 1394]
  • Jafari.Seyed Mohammadbagher Provide methodology for selecting IT project management strategy [ Vol.10, Issue 37 , 38 - Autumn - Winter Year 1397]
  • Jafari.Seyed Mohammadbagher Data-driven Marketing in Digital Businesses from Dynamic Capabilities View [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • jahanbakhsh.mojtaba Evaluation of SIP signaling implementation using QoS parameters [ Vol.1, Issue 1 - Spring Year ]
  • jam.Shahrokh Parametric analysis of a broadband Archimedean spiral antenna with cavity [ Vol.9, Issue 33 , 34 - Autumn - Winter Year 1396]
  • Jami Pour.Mona Information Technology, Strategy Implementation, Information Systems, Strategic Planning, Input-Process-Outcome Framework [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • jamipour.mona Provide methodology for selecting IT project management strategy [ Vol.10, Issue 37 , 38 - Autumn - Winter Year 1397]
  • Jampour.Mehdi An efficient Two Pathways Deep Architecture for Soccer Goal Recognition towards Soccer Highlight Summarization [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • Javidan.Javidan New changes of local binary patterns and classification and segmentation of seabed images [ Vol.8, Issue 27 - Spring Year ]
  • Javidan.Javidan New changes of local binary pattern and classification and segmentation of texture images of the seabed [ Vol.8, Issue 27 , 28 - Spring - Summer Year 1395]

K

  • kaedi.marjan Textual analysis of central bank news in forecasting long-term trend of Tehran stock exchange index [ Vol.12, Issue 43 , 44 - Spring - Summer Year 1399]
  • kahani.mohsen Generating Personalized Explanations for Twitter List Recommendations Using Semantic Similarity of Hashtags [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • kalantari.nadia Designing a Fuzzy Expert System for Selecting an Appropriate Contractor in Information Technology Outsourcing [ Vol.2, Issue 5 - Spring - Summer Year ]
  • kalantari.nadia Designing a fuzzy expert system for choosing the right contractor in information technology outsourcing [ Vol.2, Issue 6 , 7 - Autumn - Winter Year 1389]
  • Kalantari.Reza computer security models and proposing a new perspective: A review paper [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Kalantari.Reza A Survey on Computer Security Patterns and Proposing a New Perspective [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • kamareiy.malihe Matched grouping of learners in e-learning environment using council clustering method [ Vol.11, Issue 39 , 40 - Spring - Summer Year 1398]
  • Karamizadeh.Sasan New Method to Improve Illumination Variations in Adult Images Based on Fuzzy Deep Neural Network [ Vol.11, Issue 41 , 42 - Autumn - Winter Year 1398]
  • karbasi.mostafa Adaptive rotation models and traffic patterns to reduce light loss in networks on optical chip [ Vol.10, Issue 35 , 36 - Spring - Summer Year 1397]
  • Karbasi.Soheila Fast and accurate concept drift detection from event logs [ Vol.12, Issue 43 , 44 - Spring - Summer Year 1399]
  • kardan.AhmadAgha Presenting a model for extracting information from text documents, based on text-mining in the field of e-learning [ Vol.4, Issue 12 , 13 - Spring - Summer Year 1391]
  • kargari.mehrdad Liquidity Risk Prediction Using News Sentiment Analysis [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Karimi.Hossein The Effect of ICT Development on Economic and Political Risk: A Cross Country Study [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • karimi.keyvan Window-Shopping as an Effective Element to Improve Viral Marketing [ Vol.2, Issue 3 - Summer Year ]
  • Karimpour.Davod User recommendation in Telegram messenger by graph analysis and mathematical modeling of users' behavior [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • kaveh.manije Investigation the role of personality and individual differences on password security breaches: An Empirical Study [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • kavoshtehrani.masoud Improvement of mean shift tracker for tracking of target with variable photometric pattern [ Vol.4, Issue 13 - Spring Year ]
  • kavoshtehrani.masoud Modification of medium transfer detector for target tracking with variable radiation pattern [ Vol.4, Issue 14 , 15 - Autumn - Winter Year 1391]
  • kazemian.sirous A model information technology adoption in academic research projects in the filed ICT based on Information Technology Adoption Integrated Modeling (ITAIM) [ Vol.11, Issue 41 , 42 - Autumn - Winter Year 1398]
  • Keimasi.Masoud Employing a meta-synthesis to present a framework for commercial banks’ preparedness indicators in use of blockchain technology [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • Keramati.Mohammad Ali Anomaly and Intrusion Detection Through Data Mining and Feature Selection using PSO Algorithm [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Keramati.Mohammad Ali Anomaly and Intrusion Detection through Datamining and Feature Selection using PSO Algorithm [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Kermani.Aminolah Using Sentiment Analysis and Combining Classifiers for Spam Detection in Twitter [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • Keyhanipour.Amir Hosein Survey on the Applications of the Graph Theory in the Information Retrieval [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Keyhanipour.Amir Hosein Survey on the Applications of the Graph Theory in the Information Retrieval [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Keyhanipour.Amir Hosein Learning to Rank for the Persian Web Using the Layered Genetic Programming [ Vol.10, Issue 37 , 38 - Autumn - Winter Year 1397]
  • khademzade.ahmad Adaptive rotation models and traffic patterns to reduce light loss in networks on optical chip [ Vol.10, Issue 35 , 36 - Spring - Summer Year 1397]
  • KHALAJJ.ELHAM Presenting the model for opinion mining at the document feature level for hotel users' reviews [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • khalili.ali Semiautomatic Creation of Enterprise Mashups Using Semantic Descriptions [ Vol.2, Issue 3 - Summer Year ]
  • Khalili.Zahra Employing a meta-synthesis to present a framework for commercial banks’ preparedness indicators in use of blockchain technology [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • Khansari.Mohammad A RPL-based Routing Algorithm for Multimedia Traffic for the Internet of Things [ Vol.13, Issue 47 , 48 - Spring - Summer Year 1400]
  • Khansari.Mohammad Explanation of Standardization Role in the Proposed Solutions for Privacy Protection in Health Data [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Khansari.Mohammad Explanation the role of standardization in the proposed solutions for privacy protection in health data [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Khansari.Mohammad Synthesizing an image dataset for text detection and recognition in images [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • kharati.ehsan Increasing the value of collected data and reducing energy consumption by using network coding and mobile sinks in wireless sensor networks [ Vol.12, Issue 43 , 44 - Spring - Summer Year 1399]
  • Kharrat.Mahmood Providing a model for evaluating native electronic content in Iran based on value chain [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • Khashei.vahid The role of organizational factors on consumer buying behavior in social networks [ Vol.12, Issue 45 , 46 - Autumn - Winter Year 1399]
  • Khasteh.Seyed Hossein Fuzzy Multicore Clustering of Big Data in the Hadoop Map Reduce Framework [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Khasteh.Seyed Hossein Improving Efficiency of Finding Frequent Subgraphs in Graph Stream Using gMatrix Summarization [ Vol.12, Issue 45 , 46 - Autumn - Winter Year 1399]
  • khatan Lo.hasan Document Clustering Based On Ontology and Fuzzy Approach [ Vol.5, Issue 17 - Spring - Summer Year ]
  • Khatibi.Amid A Novel Method based on the Cocomo model to increase the accuracy of software projects effort estimates [ Vol.12, Issue 45 , 46 - Autumn - Winter Year 1399]
  • kherad.mahdi Comparing A Hybridization of Fuzzy Inference System and Particle Swarm Optimization Algorithm with Deep Learning to Predict Stock Prices [ Vol.11, Issue 41 , 42 - Autumn - Winter Year 1398]
  • Kherad.Mehdi Designing A New Genetic-Fuzzy Type 2 Approach to Evaluate Self-Adaptive Systems by Software Quality Indicators [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • khezr.nima Scheduling tasks in cloud environments using mapping framework - reduction and genetic algorithm [ Vol.10, Issue 37 , 38 - Autumn - Winter Year 1397]
  • Khodaverdian.Zeinab Predicting the workload of virtual machines in order to reduce energy consumption in cloud data centers using the combination of deep learning models [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • khorsandi.siavash Cyber Threats Foresight Against Iran Based on Attack Vector [ Vol.9, Issue 33 , 34 - Autumn - Winter Year 1396]
  • Khosroshahi.Mahan A Multi-Objective Differential Evolutionary Algorithm-based Approach for Resource Allocation in Cloud Computing Environment [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • Khosrozadeh.Ali Community Detection in Bipartite Networks Using HellRank Centrality Measure [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Khosrozadeh.Ali Community Detection in Bipartite Networks Using HellRank Centrality Measure [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • khotanloo.hassan A New Method to computational intelligence to improve network lifetime in wireless sensor networks [ Vol.7, Issue 23 - Summer Year ]
  • Khunjush.Farshad Investigating the Effects of Hardware Parameters on Power Consumptions in SPMV Algorithms on Graphics Processing Units (GPUs) [ Vol.9, Issue 31 - Spring - Summer Year ]
  • Khunjush.Farshad Investigating the Effect of Hardware Parameters Adjustments on Energy Consumption in Thin Matrix Multiplication Algorithm on GPUs [ Vol.9, Issue 31 , 32 - Spring - Summer Year 1396]
  • kiani.koorosh Design of Secure Communication System by Use of Synchronization of Chaotic Systems [ Vol.2, Issue 3 - Summer Year ]
  • Kiani.Vahid Two Fuzzy Virtual Force Algorithms to Improve Sensor Deployment in Wireless Sensor Networks [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • Koochari.Abbas Investigating an Approach to Identify and Classify Mutants Based on the Characteristics of Mutants with Machine Learning Algorithms [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]

L

  • lak.behzad Analysing students' learning through morning exercise using data mining techniques [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • Layeghi.Kamran Sentiment analysis for stock market predection with deep neural network: A case study for international corporate stock database [ Vol.13, Issue 47 , 48 - Spring - Summer Year 1400]
  • Layeghi.Kamran An efficient Two Pathways Deep Architecture for Soccer Goal Recognition towards Soccer Highlight Summarization [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • lormohammad hasani esfandghe.yahya Incentive reward mechanism for Participants to the human computing system of Intrusion Detection Based on Game Theory [ Vol.12, Issue 43 , 44 - Spring - Summer Year 1399]

M

  • madani.mohammadhosein Increasing data throughput in HF channel by decision feedback equalizer employing MC-FQRD-RLS algorithm and weight extraction in data mode [ Vol.5, Issue 15 - Summer Year ]
  • Mafi.Zohreh Test case Selection based on Test-Driven Development [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Mafi.Zohreh Regression Test Time Reduction in Test Driven Development [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Maghsoudi.Hamid Improved routing for load balancing in wireless sensor networks on the Internet of things, based on multiple ant colony algorithm [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • mahdinejadnouri.mohammad Increasing data throughput in HF channel by decision feedback equalizer employing MC-FQRD-RLS algorithm and weight extraction in data mode [ Vol.5, Issue 15 - Summer Year ]
  • mahjour.ali Provide a basic method for estimating software projects based on logical transactions [ Vol.9, Issue 31 , 32 - Spring - Summer Year 1396]
  • Mahyar.Hamidreza Community Detection in Bipartite Networks Using HellRank Centrality Measure [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Mahyar.Hamidreza Community Detection in Bipartite Networks Using HellRank Centrality Measure [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Majidnezhad.Vahid A novel metaheuristic algorithm and its discrete form for influence maximizing in complex networks [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • makhlooghi.morteza DWT-SVD based Semi-Blind Digital Image Watermarking [ Vol.2, Issue 5 - Spring - Summer Year ]
  • makhlooghi.morteza Semi-blind labeling of images using SVD in the field of discrete wavelet transform [ Vol.2, Issue 6 , 7 - Autumn - Winter Year 1389]
  • maleki.davood Presenting a novel solution to choose a proper database for storing big data in national network services [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • maleki.davood Providing a New Solution in Selecting Suitable Databases for Storing Big Data in the National Information Network [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • maleki.reza Persian digit recognition system in aerial writing based on depth image [ Vol.10, Issue 35 , 36 - Spring - Summer Year 1397]
  • Malekinia.Mohammad The Relevance, Importance and Dependence of Critical Infrastructures of The Islamic Republic of Iran from a Cyber-Perspective [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • Manavi Mofrad.Hosna Multi-Level Ternary Quantization for Improving Sparsity and Computation in Embedded Deep Neural Networks [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Manavi Mofrad.Hosna Multi-level ternary quantization for improving sparsity and computation in embedded deep neural networks [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • manian.amir Prioritization of e-commerce failure factors in technical infrastructure: Meybod city ceramic tile factories [ Vol.8, Issue 30 , 31 - Autumn - Winter Year 1395]
  • Mansoorizadeh.Muharram Discover product defect reports from the text of users' online comments [ Vol.10, Issue 35 , 36 - Spring - Summer Year 1397]
  • mansour.hakimeh Sentiment analysis for stock market predection with deep neural network: A case study for international corporate stock database [ Vol.13, Issue 47 , 48 - Spring - Summer Year 1400]
  • mansouri.bijan Provide a new architecture for the decision support system to manage stock trading based on a combination of financial indicators [ Vol.9, Issue 31 , 32 - Spring - Summer Year 1396]
  • Mansoury.Masoud Provide a new architecture for the decision support system to manage stock trading based on a combination of financial indicators [ Vol.9, Issue 31 , 32 - Spring - Summer Year 1396]
  • Manthouri.Mohammad Fault Diagnosis and Detection in Photovoltaic Systems Using Neural Network VGG16 [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • manzouri.mohammadtaghi A Novel Model based on Encoder-Decoder Architecture and Attention Mechanism for Automatic Abstractive Text Summarization [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • mashayekhi.alinaghi Determining the factors affecting the collective financing of knowledge-based IT companies [ Vol.10, Issue 37 , 38 - Autumn - Winter Year 1397]
  • Mastalizade.Marzie Energy-Efficient Fixed-Point Hardware Accelerator for Embedded DNNs [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • Mazoochi.Mojtaba The framework of the national macro plan for transparency and information release based on the grounded theory method [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • Mazoochi.Mojtaba Synthesizing an image dataset for text detection and recognition in images [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • Mehrabani.Ghorbanali Identifying the Key Drivers of Digital Signature Implementation in Iran (using fuzzy Delphi method) [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Mehrabani.Ghorbanali Identifying the Key Drivers of Digital Signature Implementation in Iran (Using Fuzzy Delphi Method) [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Mehrabi.Javad Drivers, Obstacles and consequences of digital entrepreneurship in Iran's road freight transportation industry [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • mehraeen.mohammad Explanation of Standardization Role in the Proposed Solutions for Privacy Protection in Health Data [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • mehraeen.mohammad Explanation the role of standardization in the proposed solutions for privacy protection in health data [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • mehrshad.batool Explanation of Standardization Role in the Proposed Solutions for Privacy Protection in Health Data [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • mehrshad.batool Explanation the role of standardization in the proposed solutions for privacy protection in health data [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • memarmoghada.alireza Improvement of mean shift tracker for tracking of target with variable photometric pattern [ Vol.4, Issue 13 - Spring Year ]
  • Memarzadeh.Gholamreza Presenting the ICT Policies Implementation Model of the 6th Development Using the Neural Network Method [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Memarzadeh.Gholamreza Presenting the ICT Policies Implementation Model of the 6th Development Using the Neural Network Method [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • milani.farzaneh Investigating the effect of using various marketing strategies on social networks on gaining the trust of council customers Investigating ترجمه‌های investigate فعلفراوانی بررسی کردن investigate, check, peruse, survey, study رسیدگی کردن consider, attend, check, investigate, inspect, investigate استفسار کردن investigate وارسی کردن sift, investigate پژوهیدن investigate, inquire, research, search تحقیق کردن investigate, inquire, verify, assay, interrogate, question اطلاعات مقدماتی بدست اوردن investigate جستار کردن investigate تفتیش کردن inquire, inspect, investigate, revise باز جویی کردن examine, assay, inquire, interrogate, investigate, cross-examine تعریف‌های investigate فعل ۱ carry out a systematic or formal inquiry to discover and examine the facts of (an incident, allegation, etc.) so as to establish the truth. police are investigating the alleged beating مترادف‌ها: check outsuss outgive something the once-overscope outinquire intolook intogo intolook overprobeexplorescrutinizeconduct an investigation intoconduct an inquiry intomake inquiries abouttry to get to the bottom ofinspectanalyzestudyexamineconsiderresearchsearch/sift the evidence concerningpore overdelve intoauditevaluatefollow up مترادف investigate فعل check outsuss outgive something the once-overscope out inquire intolook intogo intolook overprobeexplorescrutinizeconduct an investigation intoconduct an inquiry intomake inquiries abouttry to get to the bottom ofinspectanalyzestudyexamineconsiderresearchsearch/sift the evidence concerningpore overdelve intoauditevaluatefollow up همچنین ببینید investigate [ Vol.11, Issue 39 , 40 - Spring - Summer Year 1398]
  • Minaei.Behrooz Noor Analysis: A Benchmark Dataset for Evaluating Morphological Analysis Engines [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • Minaei.Behrooz A Review on Hadith Text Processing Tasks [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Minaei.Behrooz A Review on Hadith Text Processing Tasks [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Minaei.Behrooz A comprehensive survey on the influence maximization problem in social networks [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • Minoofam.Seyyed Amir Hadi A Decision Support System based on Rough sets for Enterprise Planning under uncertainty [ Vol.13, Issue 47 , 48 - Spring - Summer Year 1400]
  • mirashk.hamed Liquidity Risk Prediction Using News Sentiment Analysis [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • miri.maryam A Research Over the Obstacles and Influential Factors on Development of e-Learning Subjects from Perspective of Beneficiaries of CME Program in Jahrom University of Medical Sciences in 2012-2013 [ Vol.6, Issue 21 - Spring Year ]
  • mirian.mirian Test case Selection based on Test-Driven Development [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • mirian.mirian Regression Test Time Reduction in Test Driven Development [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • mirmohammadsadeghi.hamid A Fast Method to Compute Radiation Fields of Shaped Reflector Antennas by FFT [ Vol.1, Issue 2 , 3 - Autumn - Winter Year 1387]
  • Mirsaeedghazi.Tahereh Providing a model for evaluating native electronic content in Iran based on value chain [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • Mirsaeedghazi.Tahereh Open Data Accessing Policymaking in Iran, in the Aspect of Preserving Privacy and Personal Data Ownership [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • Mirtaheri.Seyedeh Leili Improving IoT resource management using fog calculations and ant lion optimization algorithm [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • Mirtaheri.Seyedeh Leili Increasing Total Throughput, Reducing Outage to Zero, and Reducing Power Consumption in a Cellular Network [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • Mirzarezaee.Mitra Improving polarity identification in sentiment analysis using sarcasm detection and machine learning algorithms in Persian tweets [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • Moallem.Payman Modified orthogonal chaotic colonial competition algorithm and its application in improving pattern recognition in multilayer perceptron neural network [ Vol.10, Issue 35 , 36 - Spring - Summer Year 1397]
  • Moallem.Payman Improvement of mean shift tracker for tracking of target with variable photometric pattern [ Vol.4, Issue 13 - Spring Year ]
  • Moallem.Payman Modification of medium transfer detector for target tracking with variable radiation pattern [ Vol.4, Issue 14 , 15 - Autumn - Winter Year 1391]
  • Moeini.Ali Survey on the Applications of the Graph Theory in the Information Retrieval [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Moeini.Ali Survey on the Applications of the Graph Theory in the Information Retrieval [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • mohamadian.ََُAyoub Data-driven Marketing in Digital Businesses from Dynamic Capabilities View [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • mohamadrezaei larki.rezvan context-aware travel recommender system exploiting from Geo-tagged photos [ Vol.11, Issue 41 , 42 - Autumn - Winter Year 1398]
  • mohammadi.abbas The Impact of IQ Imbalance on the BER of Adaptive Modulation in the MIMO System [ Vol.1, Issue 1 - Spring Year ]
  • mohammadi.ali Designing a system dynamics model for upgrading policy Iran Information and Communication Technology Network Indicators [ Vol.8, Issue 30 , 31 - Autumn - Winter Year 1395]
  • mohammadi.amir Using a Hybrid PSO-GA Method for Capacitor Placement in Distribution Systems [ Vol.6, Issue 20 , 21 - Spring - Summer Year 1393]
  • mohammadi.majid A New Algorithm for Fastintra-Frame Modes Selection in H.264/Avc Video Coding [ Vol.7, Issue 26 , 27 - Autumn - Winter Year 1394]
  • mohammadi.majid Application of clustering in AODV routing protocol for intercity networks on the highway scenario [ Vol.8, Issue 30 , 31 - Autumn - Winter Year 1395]
  • Mohammadi.Nasim Three Dimensional Beamforming in Multi User Multi Antenna Cellular Networks with Randomly Distributed Users [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • Mohammadi.Nazila Presenting the ICT Policies Implementation Model of the 6th Development Using the Neural Network Method [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Mohammadi.Nazila Presenting the ICT Policies Implementation Model of the 6th Development Using the Neural Network Method [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Mohammadi.Shahram Persian digit recognition system in aerial writing based on depth image [ Vol.10, Issue 35 , 36 - Spring - Summer Year 1397]
  • mohammadi.shahriyar Presenting the model for opinion mining at the document feature level for hotel users' reviews [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • mohammadi.shahriyar Semiautomatic Creation of Enterprise Mashups Using Semantic Descriptions [ Vol.2, Issue 3 - Summer Year ]
  • mohammadi.shahriyar Window-Shopping as an Effective Element to Improve Viral Marketing [ Vol.2, Issue 3 - Summer Year ]
  • mohammadi.shahriyar A Study On Visual Cryptography and Providing a Proposed Method for Color Images Cryptography [ Vol.6, Issue 20 , 21 - Spring - Summer Year 1393]
  • mohammadi.shahriyar The main components of evaluating the credibility of users according to organizational goals in the life cycle of big data [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • mohammadi.shahriyar Criteria for evaluating the effectiveness of social media users - a framework based on social media exploration [ Vol.11, Issue 39 , 40 - Spring - Summer Year 1398]
  • mohammadi.sudabeh Improving imperialist competitive algorithm for solving the nodes placement problem in three-dimensional grid wireless sensor networks [ Vol.12, Issue 45 , 46 - Autumn - Winter Year 1399]
  • Mohammadnezhad Fadard.Mansoureh The effect of emotional intelligence of project managers on the effectiveness of team communication in Iranian research institutes (Case study: Research Institute of Communication and Information Technology) [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • MOHAMMADZADEH.AMIR Valuation of digital services in Iran: Empirical proof for Google and Instagram [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Mohebikhah.Bita Estimating the Value of Digital Economy Core Spillover in Iran [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • Mohtarami.amir A framework for architecture the electronic trust in e-commerce:online shopping segment [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • molaee fard.reza Presenting a web recommender system for user nose pages using DBSCAN clustering algorithm and machine learning SVM method. [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • Mollamotalebi.Mahdi Improving the load balancing in Cloud computing using a rapid SFL algorithm (R-SFLA) [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • moltaji.milad Investigation the role of personality and individual differences on password security breaches: An Empirical Study [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • Momtazi.Saeedeh Sentiment analysis for stock market predection with deep neural network: A case study for international corporate stock database [ Vol.13, Issue 47 , 48 - Spring - Summer Year 1400]
  • monadjemi.Amir Hassan Outdoor Color Scene Segmentation towards Object Detection using Dual-Resolution Histograms [ Vol.4, Issue 14 - Autumn - Winter Year 1391]
  • monadjemi.Amir Hassan Segmentation of exterior color images for the purpose of object recognition using histogram with double accuracy [ Vol.4, Issue 14 , 15 - Autumn - Winter Year 1391]
  • monadjemi.Amir Hassan Door detection based on car vision in outdoor scenes [ Vol.8, Issue 30 , 31 - Autumn - Winter Year 1395]
  • montazer.gholamali Designing a personalized e-learning system using learners' characteristics and implementing it with the gamification elements [ Vol.13, Issue 47 , 48 - Spring - Summer Year 1400]
  • montazer.gholamali Design and implementation of a fuzzy expert system for suspicious behavior detection in e-banking system [ Vol.1, Issue 1 - Spring Year ]
  • montazer.gholamali Automatic Sepration of Learnrs in Learning Groups Based on Identifying Learning Style from Their Behavior in Learning Environment [ Vol.6, Issue 21 - Spring Year ]
  • montazer.gholamali Optimal LO Selection in E-Learning Environment Using PSO Algorithm [ Vol.6, Issue 21 - Spring Year ]
  • montazer.gholamali Assessing E-Government Readiness in Iranian Universities, Case Study: Tarbiat Modares University [ Vol.12, Issue 43 , 44 - Spring - Summer Year 1399]
  • montazer.gholamali Matched grouping of learners in e-learning environment using council clustering method [ Vol.11, Issue 39 , 40 - Spring - Summer Year 1398]
  • moomivand.hussein An Investigation into the Provider Factors of Knowledge Management in the Kermanshah province Communication Company [ Vol.7, Issue 25 - Spring - Summer Year ]
  • Moradhassel.Niloufar Estimating the Value of Digital Economy Core Spillover in Iran [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • moradi.farshad Evaluation of e-learning with optimal mining approach 1 case study: Iran's higher education [ Vol.4, Issue 12 , 13 - Spring - Summer Year 1391]
  • Moradi.Gholamreza Design, simulation and performance comparison of radating elements of reflect array antenna [ Vol.5, Issue 15 - Summer Year ]
  • moradi.hossein An Investigation on the Effect of Multifactor Model of Improving Critical Thinking in E-learning Environments [ Vol.6, Issue 21 - Spring Year ]
  • moradi.mahmood A Managerial Examination of the Successful Parameters in the B2C Business [ Vol.5, Issue 17 - Spring - Summer Year ]
  • Morsali.Mehdi A review of the application of meta-heuristic algorithms in load balancing in cloud computing [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • Mortazavi kahangi.Azam sadtat Drivers, Obstacles and consequences of digital entrepreneurship in Iran's road freight transportation industry [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • Mortazavi.Farzaneh A RPL-based Routing Algorithm for Multimedia Traffic for the Internet of Things [ Vol.13, Issue 47 , 48 - Spring - Summer Year 1400]
  • mortazavi.saeed Explanation of Standardization Role in the Proposed Solutions for Privacy Protection in Health Data [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • mortazavi.saeed Explanation the role of standardization in the proposed solutions for privacy protection in health data [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • mosammami.shila A Managerial Examination of the Successful Parameters in the B2C Business [ Vol.5, Issue 17 - Spring - Summer Year ]
  • mosavi.najmoddin Provide a model of human resource knowledge architecture in knowledge-based organizations using a mixed approach [ Vol.11, Issue 39 , 40 - Spring - Summer Year 1398]
  • mosleh.mohammad Presenting a web recommender system for user nose pages using DBSCAN clustering algorithm and machine learning SVM method. [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • moslehi.zahra Classifying Two Class data using Hyper Rectangle Parallel to the Coordinate Axes [ Vol.7, Issue 25 - Spring - Summer Year ]
  • moslehi.zahra Classification of two-level data with hyperrectangles parallel to the coordinate axes [ Vol.7, Issue 26 , 27 - Autumn - Winter Year 1394]
  • moslehshirazi.alinaghi Designing a system dynamics model for upgrading policy Iran Information and Communication Technology Network Indicators [ Vol.8, Issue 30 , 31 - Autumn - Winter Year 1395]
  • movaghar.movaghar Community Detection in Bipartite Networks Using HellRank Centrality Measure [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • movaghar.movaghar Community Detection in Bipartite Networks Using HellRank Centrality Measure [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • movahedi sefat.mohammad reza The Local Strategic Model of Smart Police of The Islamic Republic of Iran [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • movahedi.masoud A model information technology adoption in academic research projects in the filed ICT based on Information Technology Adoption Integrated Modeling (ITAIM) [ Vol.11, Issue 41 , 42 - Autumn - Winter Year 1398]
  • mozafari.azime Provide a method for customer segmentation using the RFM model in conditions of uncertainty [ Vol.8, Issue 30 , 31 - Autumn - Winter Year 1395]
  • mozafari.azime A method for clustering customers using RFM model and grey numbers in terms of uncertainty [ Vol.8, Issue 29 - Summer Year ]
  • mozafari.sahar WSTMOS: A Method For Optimizing Throughput, Energy, And Latency In Cloud Workflow Scheduling [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • Mozayani.َAmir Hossein Investigating the Information and Communication Technology Deployment Impact on Energy Expenditures of Iranian households (A Provincial Approach) [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • Mozayani.َAmir Hossein The Effect of ICT Development on Economic and Political Risk: A Cross Country Study [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]

N

  • Naderi.Shaghayegh Application identification through intelligent traffic classification [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Naderi.Shaghayegh Application Identification Through Intelligent Traffic Classification [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • naghdeforoshhs.mona Heuristic algorithms for pseudo-triangulation random point set in the plane [ Vol.5, Issue 16 , 17 - Spring - Summer Year 1392]
  • naghshineh.Nader A framework for establishing a national data vault for Data Governance institution [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • naji.hamidreza A Hybrid Neural Network Ensemble Model for Credit Risk Assessment [ Vol.6, Issue 20 , 21 - Spring - Summer Year 1393]
  • Najjar-Ghabel.Samad Automatic Lung Diseases Identification using Discrete Cosine Transform-based Features in Radiography Images [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Narimani.mahboobeh Investigating the Degree of Application of Professional Ethics and Vocational Qualifications by the Faculty Members of Virtual Universities of Isfahan and Medical Sciences University of Isfahan [ Vol.6, Issue 21 - Spring Year ]
  • nasehifar.vahid The role of organizational factors on consumer buying behavior in social networks [ Vol.12, Issue 45 , 46 - Autumn - Winter Year 1399]
  • Naseri.Saleheh Generating Personalized Explanations for Twitter List Recommendations Using Semantic Similarity of Hashtags [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • nasrollahi.marziye Provide methodology for selecting IT project management strategy [ Vol.10, Issue 37 , 38 - Autumn - Winter Year 1397]
  • Nassiri.Mohammad Improving performance of probe-based rate control mechanisms using classification: evaluation on an experimental testbed for High Throughput WLANs [ Vol.12, Issue 43 , 44 - Spring - Summer Year 1399]
  • Nazari Soleimandarabi.Mojdeh Predicting the workload of virtual machines in order to reduce energy consumption in cloud data centers using the combination of deep learning models [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Nazari.Najme Energy-Efficient Fixed-Point Hardware Accelerator for Embedded DNNs [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • Nejadali.Mahnaz A New Algorithm for Fastintra-Frame Modes Selection in H.264/Avc Video Coding [ Vol.7, Issue 26 , 27 - Autumn - Winter Year 1394]
  • nemati.hasanali Prioritization of e-commerce failure factors in technical infrastructure: Meybod city ceramic tile factories [ Vol.8, Issue 30 , 31 - Autumn - Winter Year 1395]
  • nematifard.narges Discover product defect reports from the text of users' online comments [ Vol.10, Issue 35 , 36 - Spring - Summer Year 1397]
  • nematollahzadeh.mahmood Emerging technologies in future generations of high performance computing: introduction, taxonomy and future research directions [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Nezarat.Amin A Novel Model for detecting intrusion with Mobile Agent and Game theory [ Vol.8, Issue 27 - Spring Year ]
  • nikkhoo.mohammad Design of Secure Communication System by Use of Synchronization of Chaotic Systems [ Vol.2, Issue 3 - Summer Year ]
  • nikmard.babak Trust Management Based on User Feedback in Cloud Computing Environment by Using Cuckoo Optimization Algorithm [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • nili.mohammadreza An Investigation on the Effect of Multifactor Model of Improving Critical Thinking in E-learning Environments [ Vol.6, Issue 21 - Spring Year ]
  • noorani.fateme A Framework for Identifying and Ranking Criteria for Evaluating the Quality of Electronic Services (Case studies: Golestan website of Payame-noor university) [ Vol.5, Issue 18 , 19 - Autumn - Winter Year 1392]
  • norollah.ali Heuristic algorithms for pseudo-triangulation random point set in the plane [ Vol.5, Issue 16 , 17 - Spring - Summer Year 1392]
  • noroozy.Hamed Parametric analysis of a broadband Archimedean spiral antenna with cavity [ Vol.9, Issue 33 , 34 - Autumn - Winter Year 1396]
  • noroozy.Hamed A design of Rectangular Waveguide TM11 to TE10 Mode Converter for S-band Applications [ Vol.9, Issue 33 , 34 - Autumn - Winter Year 1396]
  • Nosrati Nahook.Hassan Introducing a new optimal energy method for targets tracking in wireless sensor network using a hunting search algorithm [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • nourazar.fateme Adaptive Probabilistic Flooding for Ad Hoc Networks [ Vol.2, Issue 5 - Spring - Summer Year ]
  • nourazar.fateme A matching probability-based flood algorithm for mobile ad hoc networks [ Vol.2, Issue 6 , 7 - Autumn - Winter Year 1389]
  • Nozhat.Najmeh Improvement of the bulk sensitivity and FoM of the plasmonic nanodipole antenna array [ Vol.9, Issue 33 , 34 - Autumn - Winter Year 1396]
  • Nozhat.Najmeh Improving the directivity of the plasmonic sectoral horn nanoantenna using lens in its aperture [ Vol.9, Issue 33 , 34 - Autumn - Winter Year 1396]

O

  • ojaghi.hamed Artefacts and Producers Mapping of Iran's Artificial Intelligence Ecosystem based on Transformational Levels [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • omrani.mahdi Cyber Threats Foresight Against Iran Based on Attack Vector [ Vol.9, Issue 33 , 34 - Autumn - Winter Year 1396]
  • oskouiezade.reza Effect of Menu Location on Visual Attention of Users of Websites [ Vol.5, Issue 17 - Spring - Summer Year ]

P

  • Padidaran Moghaddam.Farhang Fake Websites Detection Improvement Using Multi-Layer Artificial Neural Network Classifier with Ant Lion Optimizer Algorithm [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Padidaran Moghaddam.Farhang Improved routing for load balancing in wireless sensor networks on the Internet of things, based on multiple ant colony algorithm [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • Paki.Reza A Novel Multi-Step Ahead Demand Forecasting Model Based on Deep Learning Techniques and Time Series Augmentation [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • Pakniyat.Samane A design of Rectangular Waveguide TM11 to TE10 Mode Converter for S-band Applications [ Vol.9, Issue 33 , 34 - Autumn - Winter Year 1396]
  • palhang.palhang Classifying Two Class data using Hyper Rectangle Parallel to the Coordinate Axes [ Vol.7, Issue 25 - Spring - Summer Year ]
  • palhang.palhang Classification of two-level data with hyperrectangles parallel to the coordinate axes [ Vol.7, Issue 26 , 27 - Autumn - Winter Year 1394]
  • parsa.saeed Applying genetic algorithm for automatic service identification based on quality metrics [ Vol.6, Issue 19 - Autumn Year ]
  • Parsaei Fard.Saeideh Power Efficient allocation in C-RAN with Multi access technology selection approach [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • Pazari.Mohsen A value Co-creation model for Information and Communication Technology Entrepreneurial Ecosystem [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • Pedram.Mir Mohsen Improving polarity identification in sentiment analysis using sarcasm detection and machine learning algorithms in Persian tweets [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • Piran.Mohamad Javad An access control model for online social networks using user-to-user relationships [ Vol.12, Issue 45 , 46 - Autumn - Winter Year 1399]
  • pirmohamadiani.rojiar The main components of evaluating the credibility of users according to organizational goals in the life cycle of big data [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • pirmohammadiani.rojyar Criteria for evaluating the effectiveness of social media users - a framework based on social media exploration [ Vol.11, Issue 39 , 40 - Spring - Summer Year 1398]
  • Piroozmand.Maryam Survey on the Applications of the Graph Theory in the Information Retrieval [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Piroozmand.Maryam Survey on the Applications of the Graph Theory in the Information Retrieval [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Pishdar.Mohamad Modeling and evaluation of RPL routing protocol by colored Petri nets [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • Poormirzaee.Saeid Design of Distributed Consensus Controller for Leader-Follower Singular Multi-Agent Systems in the Presence of Sensor Fault [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Pouladsadeh.Ali Evaluation of Interpolation Methods for Estimating the Fading Channels in Digital TV Broadcasting [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • pour yousefi dargah.hossein Identification and Prioritization of Parameters Affecting Information Security Management System (Case Study: Social Security Branches of Guilan Province) [ Vol.10, Issue 35 , 36 - Spring - Summer Year 1397]
  • pourasad.yaghoub Modeling and simulation of the central generator of the pattern to produce curved-linear motions in the snake robot [ Vol.12, Issue 43 , 44 - Spring - Summer Year 1399]
  • Pourmahmood Aghababa.Mohammad Multicast computer network routing using genetic algorithm and ant colony [ Vol.9, Issue 31 - Spring - Summer Year ]
  • Pourmahmood Aghababa.Mohammad Routing of Multipartite Computer Networks Using Ant Genetic Algorithm [ Vol.9, Issue 31 , 32 - Spring - Summer Year 1396]
  • Poursoltani.Yahya Generalizing The Concept of Business Processes Structural Soundness from Classic Petri-nets to BPMN2.0 Process Models [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Poursoltani.Yahya Generalizing The Concept of Business Processes Structural Soundness from Classic Petri-nets to BPMN2.0 Process Models [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]

R

  • rabani.fateme Polar Diagram of Points with Moving Pole [ Vol.11, Issue 41 , 42 - Autumn - Winter Year 1398]
  • Rabiei.Leila Synthesizing an image dataset for text detection and recognition in images [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • Rabiei.Mohammad Applying deep learning for improving the results of sentiment analysis of Persian comments of Online retail stores [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • rafizadeh kasani.ramin Identification and Prioritization of Parameters Affecting Information Security Management System (Case Study: Social Security Branches of Guilan Province) [ Vol.10, Issue 35 , 36 - Spring - Summer Year 1397]
  • rahbar.kambiz Blind Correction of Lens Aberration Using Modified Zernike Moments [ Vol.2, Issue 5 - Spring - Summer Year ]
  • rahbar.kambiz Correcting camera lens misalignment using Zernik moments [ Vol.2, Issue 6 , 7 - Autumn - Winter Year 1389]
  • rahbar.kambiz Blind correction of camera lens aberration and de-centering error using modified Zernike model [ Vol.7, Issue 25 - Spring - Summer Year ]
  • Rahmani.Farzaneh Synthesizing an image dataset for text detection and recognition in images [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • rahmani.marziye Provide a conceptual model to identify the quality of electronic services in the country's online stores [ Vol.8, Issue 30 , 31 - Autumn - Winter Year 1395]
  • raja.mehdi A Novel Model for detecting intrusion with Mobile Agent and Game theory [ Vol.8, Issue 27 - Spring Year ]
  • Rajabi.Jan Mohammad Applying genetic algorithm for automatic service identification based on quality metrics [ Vol.6, Issue 19 - Autumn Year ]
  • rajabzadeh ghotri.ali Design and implementation of a survival model for patients with melanoma based on data mining algorithms [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • rajabzadeh ghotri.ali The effect of Internet of Things (IOT) implementation on the Rail Freight Industry; A futures study approach [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • rajabzadeh ghotri.ali Explaining the adoption process of software-oriented networks (SDN) using the foundational data method and systems approach [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • rajabzadeh ghotri.ali Determining the factors affecting the collective financing of knowledge-based IT companies [ Vol.10, Issue 37 , 38 - Autumn - Winter Year 1397]
  • Raji.Mohsen A Task Mapping and Scheduling Algorithm based on Genetic Algorithm for Embedded System Design [ Vol.13, Issue 47 , 48 - Spring - Summer Year 1400]
  • Raji.Mohsen An Intrusion Detection System based on Deep Learning for CAN Bus [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • ramak.mehrab The Local Strategic Model of Smart Police of The Islamic Republic of Iran [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • ranaei.habibollah Designing a system dynamics model for upgrading policy Iran Information and Communication Technology Network Indicators [ Vol.8, Issue 30 , 31 - Autumn - Winter Year 1395]
  • Rashidi.Hassan A Decision Support System based on Rough sets for Enterprise Planning under uncertainty [ Vol.13, Issue 47 , 48 - Spring - Summer Year 1400]
  • rasouli.behtaj A Model for impacts of Investment in IT on customer satisfaction, using Structural Equation Modeling and Path Analysis [ Vol.5, Issue 15 - Summer Year ]
  • Rastegar.Mohammad Ali Liquidity Risk Prediction Using News Sentiment Analysis [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • rasti.javad Outdoor Color Scene Segmentation towards Object Detection using Dual-Resolution Histograms [ Vol.4, Issue 14 - Autumn - Winter Year 1391]
  • rasti.javad Segmentation of exterior color images for the purpose of object recognition using histogram with double accuracy [ Vol.4, Issue 14 , 15 - Autumn - Winter Year 1391]
  • ravaie.yahya Increasing data throughput in HF channel by decision feedback equalizer employing MC-FQRD-RLS algorithm and weight extraction in data mode [ Vol.5, Issue 15 - Summer Year ]
  • Ravanmehr.Reza context-aware travel recommender system exploiting from Geo-tagged photos [ Vol.11, Issue 41 , 42 - Autumn - Winter Year 1398]
  • Razavizadeh.S. Mohammad Three Dimensional Beamforming in Multi User Multi Antenna Cellular Networks with Randomly Distributed Users [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • Razi.Ali Agile Enterprise Architecture Modeling: Evaluating the Applicability of Six Modeling Standards based on Iran’s National EA Framework [ Vol.13, Issue 47 , 48 - Spring - Summer Year 1400]
  • Razi.Ali Presenting a Method for Agile Enterprise Architecture Modeling [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • reshadi.midia Adaptive rotation models and traffic patterns to reduce light loss in networks on optical chip [ Vol.10, Issue 35 , 36 - Spring - Summer Year 1397]
  • Rezaee.Ali Priority based Deployment of IoT Applications in Fog [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Rezaee.Ali Community-Based Multi-Criteria Placement of Applications in the Fog Environment [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • rezaei malek.narges Model to improve banking by Using customer knowledge management and Mobile Banking and Its Impact on Customer Loyalty [ Vol.9, Issue 31 - Spring - Summer Year ]
  • Rezaei Rahvard.Hamid Improving Code Coverage Metrics for Discovering Vulnerabilities in Stateful Network Protocols using Hybrid Fuzzing [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • Rezaei.Fereidoon Anomaly and Intrusion Detection Through Data Mining and Feature Selection using PSO Algorithm [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Rezaei.Fereidoon Anomaly and Intrusion Detection through Datamining and Feature Selection using PSO Algorithm [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Rezaei.Mehran Textual analysis of central bank news in forecasting long-term trend of Tehran stock exchange index [ Vol.12, Issue 43 , 44 - Spring - Summer Year 1399]
  • rezaei.mohammad A model for improving banking services using customer knowledge management and mobile banking and examining its impact on customer loyalty in Bank Mellat [ Vol.9, Issue 31 , 32 - Spring - Summer Year 1396]
  • rezaei.mohammad sadegh Automatic Sepration of Learnrs in Learning Groups Based on Identifying Learning Style from Their Behavior in Learning Environment [ Vol.6, Issue 21 - Spring Year ]
  • rezaei.narges A model for improving banking services using customer knowledge management and mobile banking and examining its impact on customer loyalty in Bank Mellat [ Vol.9, Issue 31 , 32 - Spring - Summer Year 1396]

S

  • sabaei.sabaei Adaptive Probabilistic Flooding for Ad Hoc Networks [ Vol.2, Issue 5 - Spring - Summer Year ]
  • sabaei.sabaei A matching probability-based flood algorithm for mobile ad hoc networks [ Vol.2, Issue 6 , 7 - Autumn - Winter Year 1389]
  • saberi.nafise Personalized E-learning Environment Using Fuzzy Recommender System base on Combination of Learning Style and Cognitive Trait [ Vol.2, Issue 3 - Summer Year ]
  • Sadeghi B..Mahshid Fake Websites Detection Improvement Using Multi-Layer Artificial Neural Network Classifier with Ant Lion Optimizer Algorithm [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Sadeghi Bigham.Bahram Polar Diagram of Points with Moving Pole [ Vol.11, Issue 41 , 42 - Autumn - Winter Year 1398]
  • sadeghi hariri.mehrdad Modified orthogonal chaotic colonial competition algorithm and its application in improving pattern recognition in multilayer perceptron neural network [ Vol.10, Issue 35 , 36 - Spring - Summer Year 1397]
  • sadeghi.mostafa Image Processing of steel sheets for Defect Detection by using Gabor Wavelet [ Vol.4, Issue 13 - Spring Year ]
  • sadeghi.mostafa پردازش تصاویر ورق های فولادی به منظور آشکارسازی عیوب به کمک موجک گابور [ Vol.4, Issue 14 , 15 - Autumn - Winter Year 1391]
  • sadjadi.Hadi computer security models and proposing a new perspective: A review paper [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • sadjadi.Hadi A Survey on Computer Security Patterns and Proposing a New Perspective [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Sadr.Hossein An Intelligent Model for Multidimensional Personality Recognition of Users using Deep Learning Methods [ Vol.13, Issue 47 , 48 - Spring - Summer Year 1400]
  • Sadr.Hossein Predicting the workload of virtual machines in order to reduce energy consumption in cloud data centers using the combination of deep learning models [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • saedi.abdollah Provide a model of human resource knowledge architecture in knowledge-based organizations using a mixed approach [ Vol.11, Issue 39 , 40 - Spring - Summer Year 1398]
  • Saeidi.Zeinab Measuring Similarity for Directed Path in Geometric Data [ Vol.12, Issue 45 , 46 - Autumn - Winter Year 1399]
  • Safari dehnavi.Vahid Stock market prediction using optimized grasshopper optimization algorithm and time series algorithms [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • Safari.Ehram The effect of emotional intelligence of project managers on the effectiveness of team communication in Iranian research institutes (Case study: Research Institute of Communication and Information Technology) [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • safari.mojtaba COBIT A Suitable Framework for Measuring IT Governance in Organizations [ Vol.1, Issue 1 - Spring Year ]
  • saghafi.fateme Comprehensive Interactive Maturity Model for Mobile government [ Vol.2, Issue 3 - Summer Year ]
  • saghafi.Fatemeh A Collaborative Filtering Movie Recommendation System Based on Users Correlation and Weighted K-Means with High Accuracy [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • saghafi.Fatemeh The Relevance, Importance and Dependence of Critical Infrastructures of The Islamic Republic of Iran from a Cyber-Perspective [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • saghafi.Fatemeh Indigenous model of commercialization of complex technologies based on partnership in the ICT sector [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • saghafi.Fatemeh Optimum modeling of patient satisfaction with the doctor based on machine learning methods [ Vol.7, Issue 24 , 25 - Spring - Summer Year 1394]
  • Saghafi.Fatemeh Optimized Modeling for satisfaction in the relationship between a physician and patient based on machine learnin methods [ Vol.7, Issue 23 - Summer Year ]
  • Sahargahi.Vahideh A novel metaheuristic algorithm and its discrete form for influence maximizing in complex networks [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Saketi.Parviz Drivers, Obstacles and consequences of digital entrepreneurship in Iran's road freight transportation industry [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • sakhaei nia.mahdi Discover product defect reports from the text of users' online comments [ Vol.10, Issue 35 , 36 - Spring - Summer Year 1397]
  • sakhaei.mahdi Improving performance of probe-based rate control mechanisms using classification: evaluation on an experimental testbed for High Throughput WLANs [ Vol.12, Issue 43 , 44 - Spring - Summer Year 1399]
  • salari.mahdieh A Novel Method based on the Cocomo model to increase the accuracy of software projects effort estimates [ Vol.12, Issue 45 , 46 - Autumn - Winter Year 1399]
  • Salarzehi.Habibollah Exploring the antecedents and consequences of smart good governance using the fuzzy Delphi method (FDM) [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • Saleh Gorgory.Maryam Pathology of software export development in Iran [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • salehesfahani.mahmood A Framework for Identifying and Ranking Criteria for Evaluating the Quality of Electronic Services (Case studies: Golestan website of Payame-noor university) [ Vol.5, Issue 18 , 19 - Autumn - Winter Year 1392]
  • Salehi.Mostafa Energy-Efficient Fixed-Point Hardware Accelerator for Embedded DNNs [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • Salehi.Mostafa Multi-Level Ternary Quantization for Improving Sparsity and Computation in Embedded Deep Neural Networks [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Salehi.Mostafa Multi-level ternary quantization for improving sparsity and computation in embedded deep neural networks [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • salehi.rezvan Investigation the role of personality and individual differences on password security breaches: An Empirical Study [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • Salimi.Kiomars Improving the load balancing in Cloud computing using a rapid SFL algorithm (R-SFLA) [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • salkhordeh haghighi.mehdi Using Sentiment Analysis and Combining Classifiers for Spam Detection in Twitter [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • salkhordeh haghighi.mehdi Improving Code Coverage Metrics for Discovering Vulnerabilities in Stateful Network Protocols using Hybrid Fuzzing [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • salkhordeh haghighi.mehdi Introducing a genetic algorithm based Method for Community person's stance Detection in social media and news [ Vol.11, Issue 41 , 42 - Autumn - Winter Year 1398]
  • Samadi.Behnam High Performance Computing: Next Generation Requirements and Research Axes [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • samadzadegan.farhad Determination of Optimum SVMs Based on Genetic Algorithm in Classification of Hyper spectral Imagery [ Vol.4, Issue 13 - Spring Year ]
  • samadzadegan.farhad Determining optimal support vector machines in classification of hyperspectral images based on genetic algorithm [ Vol.4, Issue 14 , 15 - Autumn - Winter Year 1391]
  • samie.mohammad ebrahim Improving recommender systems with the help of Semantic Web [ Vol.9, Issue 31 , 32 - Spring - Summer Year 1396]
  • sanaei.farinaz Design and implementation of a survival model for patients with melanoma based on data mining algorithms [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • saroukhani.leila Design and implementation of a fuzzy expert system for suspicious behavior detection in e-banking system [ Vol.1, Issue 1 - Spring Year ]
  • sato.youshi Medial-axis Enhancement of Tubular Structures and its Application in the Extraction of Portal Veins [ Vol.4, Issue 13 - Spring Year ]
  • Sattari.Mohammad An Improved Method Based on Label Propagation and Greedy Approaches for Community Detection in Dynamic Social Networks [ Vol.12, Issue 43 , 44 - Spring - Summer Year 1399]
  • Sattari-Naeini.Vahid Reduction of network load by mapping the application in the network on a chip using the discrete Harris hawk algorithm [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • Sattari-Naeini.Vahid Application of clustering in AODV routing protocol for intercity networks on the highway scenario [ Vol.8, Issue 30 , 31 - Autumn - Winter Year 1395]
  • SayadHaghighi.Mohammad Stability Analysis of Networked Control Systems under Denial of Service Attacks using Switching System Theory [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • Sebghati.Mohammadali Evaluation of Interpolation Methods for Estimating the Fading Channels in Digital TV Broadcasting [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • sebti.ali Fast and accurate concept drift detection from event logs [ Vol.12, Issue 43 , 44 - Spring - Summer Year 1399]
  • sedghahrabi.neda Design of FPGA-based processor for SHA-2 series cryptographic algorithms Design ترجمه‌های design اسمفراوانی طرح plan, design, layout, project, scheme, plot نقشه map, plan, plot, scheme, plat, chart زمینه background, context, ground, setting, base, terrain تدبیر measure, plan, contraption, gimmick, contrivance, scheme قصد intention, intent, purpose, attempt, will, determination طراح ریزی design خیال imagination, phantom, illusion, thought, fiction, mind فعل طرح کردن design, plan, draft, draw, lay, bring forth قصد کردن attempt, decide, design, meditate تخصیص دادن allot, allocate, apportion, consecrate, give, design تدبیر کردن devise, contrive, meditate, compass, machinate, design تعریف‌های design اسم ۱ a plan or drawing produced to show the look and function or workings of a building, garment, or other object before it is built or made. he has just unveiled his design for the new museum مترادف‌ها: planblueprintdrawingscale drawingsketchoutlinemapplotdiagramdelineationdraftdepictionrepresentationartist's impressionschememodelprototypeproposal ۲ an arrangement of lines or shapes created to form a pattern or decoration. pottery with a lovely blue and white design مترادف‌ها: patternmotifdevicestylearrangementcompositionmakeuplayoutconstitutionconfigurationorganizationconstructionshapeformformationfigure purpose, planning, or intention that exists or is thought to exist behind an action, fact, or material object. the appearance of design in the universe مترادف‌ها: intentionaimpurposeplanintentobjectiveobjectgoalendtargetpointhopedesirewishdreamaspirationambitionidea فعل ۱ decide upon the look and functioning of (a building, garment, or other object), by making a detailed drawing of it. a number of architectural students were designing a factory مترادف‌ها: plandraw plans ofdrawsketchoutlinemap outplotblock outdelineatedraftdepictinventoriginatecreatethink upcome up withdeviseformformulateconceivemakeproducedevelopfashionfabricateforgehatchcoindream up مترادف design اسم planpatternintention فعل planinventdream upintend ۹۱ مترادف دیگر [ Vol.10, Issue 37 , 38 - Autumn - Winter Year 1397]
  • seif.fatemeh Effect of Menu Location on Visual Attention of Users of Websites [ Vol.5, Issue 17 - Spring - Summer Year ]
  • Seifi.Younes Modeling and evaluation of RPL routing protocol by colored Petri nets [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • Seirafian.vahid SPIHT-DCT hybrid method using Placement spatial scalability and Place - when encoding a video HDTV [ Vol.4, Issue 14 - Autumn - Winter Year 1391]
  • Seirafian.vahid Applying the combined SPIHT-DCT method using spatial and spatial-temporal scaling to encode video images [ Vol.4, Issue 14 , 15 - Autumn - Winter Year 1391]
  • sepahvand.abdollah Emerging technologies in future generations of high performance computing: introduction, taxonomy and future research directions [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • sepahvand.reza Provide a model of human resource knowledge architecture in knowledge-based organizations using a mixed approach [ Vol.11, Issue 39 , 40 - Spring - Summer Year 1398]
  • sepehri.akram Geometric embedding of the tree in points inside a polygon with minimum number of bends [ Vol.2, Issue 4 , 5 - Spring - Summer Year 1389]
  • sepehri.mehdi Iran's Mobile Government Ecosystem Model, Stakeholders Identification and Analysis [ Vol.7, Issue 23 - Summer Year ]
  • setayeshi.saeed Trust Based Link Prediction Using Fuzzy Computational Model in Social Networks [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • Seyyedi Saravi.Mohsen Increasing Total Throughput, Reducing Outage to Zero, and Reducing Power Consumption in a Cellular Network [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • shabooei.saeid Improving resource allocation in mobile edge computing using gray wolf and particle swarm optimization algorithms [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • shabooei.saeid Improving Resource Allocation in Mobile Edge Computing Using Particle Swarm and Gray Wolf Optimization Algorithms [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • shadmehr.mojtaba Optimized Modeling for satisfaction in the relationship between a physician and patient based on machine learnin methods [ Vol.7, Issue 23 - Summer Year ]
  • shafaghizade.somaye Integrating Data Envelopment Analysis and Decision Tree Models in Order to Evaluate Information Technology-Based Units [ Vol.8, Issue 27 - Spring Year ]
  • shafiee.masoud Sliding Mode Controller for TCP Congestion Control [ Vol.2, Issue 5 - Spring - Summer Year ]
  • shafiee.masoud Three-axis attitude control of a micro-satellite by magnetic actuators through-synthesis robust method [ Vol.5, Issue 15 - Summer Year ]
  • shafiee.masoud Image Processing of steel sheets for Defect Detection by using Gabor Wavelet [ Vol.4, Issue 13 - Spring Year ]
  • shafiee.masoud Design of Secure Communication System by Use of Synchronization of Chaotic Systems [ Vol.2, Issue 3 - Summer Year ]
  • shafiee.masoud پردازش تصاویر ورق های فولادی به منظور آشکارسازی عیوب به کمک موجک گابور [ Vol.4, Issue 14 , 15 - Autumn - Winter Year 1391]
  • shafiee.masoud Cyber Threats Foresight Against Iran Based on Attack Vector [ Vol.9, Issue 33 , 34 - Autumn - Winter Year 1396]
  • shafiee.masoud Stock market prediction using optimized grasshopper optimization algorithm and time series algorithms [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • shafiee.masoud Sliding mode control for congestion in TCP/IP networks [ Vol.2, Issue 6 , 7 - Autumn - Winter Year 1389]
  • Shafiee.masoud Design of Distributed Consensus Controller for Leader-Follower Singular Multi-Agent Systems in the Presence of Sensor Fault [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • shafiee.nafiseh Key management in digital rights management systems in offline mode [ Vol.7, Issue 24 , 25 - Spring - Summer Year 1394]
  • shafiee.nafiseh Key Management in Digital Right Management Systems for Offline Mode [ Vol.7, Issue 23 - Summer Year ]
  • Shafiezadeh.Soheila An Individual-Oriented Shuffled Frog Leaping Algorithm for Solving Vehicle Routing Problem [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • Shahbahrami.Asadollah Identification and Prioritization of Parameters Affecting Information Security Management System (Case Study: Social Security Branches of Guilan Province) [ Vol.10, Issue 35 , 36 - Spring - Summer Year 1397]
  • Shahbahrami.Asadollah A Managerial Examination of the Successful Parameters in the B2C Business [ Vol.5, Issue 17 - Spring - Summer Year ]
  • shahbazian.reza Improving IoT resource management using fog calculations and ant lion optimization algorithm [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • Shahhosseini.Mohammadali Employing a meta-synthesis to present a framework for commercial banks’ preparedness indicators in use of blockchain technology [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • Shahmiri.Amir Shahab Beautiful and Meaningful Iranian Names Production by Genetic Algorithm using Artificial Neural Network-Based Fitness Function [ Vol.7, Issue 25 - Spring - Summer Year ]
  • shahsavari.mehrdad Provide a basic method for estimating software projects based on logical transactions [ Vol.9, Issue 31 , 32 - Spring - Summer Year 1396]
  • shahsavari.mehrdad Present an Initial Estimation Method for Logical Transaction-based Software Projects [ Vol.9, Issue 31 - Spring - Summer Year ]
  • shajari.mahdi Key Management in Digital Right Management Systems for Offline Mode [ Vol.7, Issue 23 - Summer Year ]
  • Shakery.Azadeh A new algorithm based on ensemble learning for learning to rank in information retrieval [ Vol.7, Issue 25 - Spring - Summer Year ]
  • Shams.Mohammadreza Improving Opinion Aspect Extraction Using Domain Knowledge and Term Graph [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • shams.payam Improving IoT resource management using fog calculations and ant lion optimization algorithm [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • shamsollahi.sara Designing a Fuzzy Expert System for Selecting an Appropriate Contractor in Information Technology Outsourcing [ Vol.2, Issue 5 - Spring - Summer Year ]
  • sharafi.vahid طراحی اولین پایگاه داده کلمات دستنویس کردی برای سیستم های تشخیص تصویری کلمات [ Vol.5, Issue 17 - Spring - Summer Year ]
  • Sharifi.Arash Using limited memory to store the most recent action in XCS learning classifier systems in maze problems [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Sharifi.Ehsan Architectural tactics identification in source code based on a semantic approach [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • Sharifi.Masumeh Improving the directivity of the plasmonic sectoral horn nanoantenna using lens in its aperture [ Vol.9, Issue 33 , 34 - Autumn - Winter Year 1396]
  • shayegan.Mohammad Javad A Recommender System Based on the Analysis of Personality Traits in Telegram Social Network [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Shaykhan.Mohammad Taghi Proposing a New Framework to Decreasing Delay in the Internet of Things by Using Computing Power of Fog [ Vol.13, Issue 47 , 48 - Spring - Summer Year 1400]
  • Sheikhi.Hemmat Improving imperialist competitive algorithm for solving the nodes placement problem in three-dimensional grid wireless sensor networks [ Vol.12, Issue 45 , 46 - Autumn - Winter Year 1399]
  • Shenassa.Mohammad Ebrahim Noor Analysis: A Benchmark Dataset for Evaluating Morphological Analysis Engines [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • Shenassa.Mohammad Ebrahim A Review on Hadith Text Processing Tasks [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Shenassa.Mohammad Ebrahim A Review on Hadith Text Processing Tasks [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Shirali-Shahreza.Mohammad Hassan Generalizing The Concept of Business Processes Structural Soundness from Classic Petri-nets to BPMN2.0 Process Models [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Shirali-Shahreza.Mohammad Hassan Generalizing The Concept of Business Processes Structural Soundness from Classic Petri-nets to BPMN2.0 Process Models [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Shirvani Moghaddam.Shahriar Performance Analysis of Device to Device Communications Overlaying/Underlaying Cellular Network [ Vol.9, Issue 33 , 34 - Autumn - Winter Year 1396]
  • shiry.saeed Beautiful and Meaningful Iranian Names Production by Genetic Algorithm using Artificial Neural Network-Based Fitness Function [ Vol.7, Issue 25 - Spring - Summer Year ]
  • skch.skch Proposing a model for IT services based assessment approach, based on IT Governance Model [ Vol.7, Issue 23 - Summer Year ]
  • soleimani mobarake.muqtada Trust Management Based on User Feedback in Cloud Computing Environment by Using Cuckoo Optimization Algorithm [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • Soleimani Nasab.Ehsan Outage and Throughput Analysis of Bidirectional Cognitive Amplify-and-Forward Relaying Networks with Wireless Power Transfer [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • Soleymani Roozbahani.Fatemeh Artefacts and Producers Mapping of Iran's Artificial Intelligence Ecosystem based on Transformational Levels [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • Soltanaghaei koupaei.Mohammadreza Dynamic Load Balancing Improvement in Software-Defined Networks Using Fuzzy Multi-Objective Programming Algorithms [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • Sondossi.Golshan A Neighbor-based Link Prediction Method for Bipartite Networks [ Vol.13, Issue 47 , 48 - Spring - Summer Year 1400]
  • sotoudeh.shahrouz Provide a framework for enhancing the security of IoT-based smart homes using the IoT-A reference architecture [ Vol.10, Issue 35 , 36 - Spring - Summer Year 1397]

T

  • tabaghchimilan.sara Using a multi-objective optimization algorithm for tasks allocate in the cloud-based systems to reduce energy consumption [ Vol.12, Issue 43 , 44 - Spring - Summer Year 1399]
  • tabatabaei.seyyed ahmad Proposing a model for IT services based assessment approach, based on IT Governance Model [ Vol.7, Issue 23 - Summer Year ]
  • tabatabaei.seyyed ahmad Providing a model for evaluating information technology services based on an approach based on information technology governance models [ Vol.7, Issue 24 , 25 - Spring - Summer Year 1394]
  • Tabatabaei.Shayesteh Improving energy consumption in the Internet of Things using the Krill Herd optimization algorithm and mobile sink [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Tabatabaei.Shayesteh Introducing a new optimal energy method for targets tracking in wireless sensor network using a hunting search algorithm [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • Tabatabaei.Shayesteh Energy Efficient Target (Rhynchophorus Ferrugineus) Tracking in Wireless Sensor Network Using the Cat Swarm Optimization Algorithm and Fuzzy Logic [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • Tabrizian.Bita Identifying and ranking factors affecting the digital transformation strategy in Iran's road freight transportation industry focusing on the Internet of Things and data analytics [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Tabrizian.Bita Identifying and Ranking Factors Affecting the Digital Transformation Strategy in Iran's Road Freight Transportation Industry Focusing on the Internet of Things and Data Analytics [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Taghavi Afshord.Saeed A novel metaheuristic algorithm and its discrete form for influence maximizing in complex networks [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Taghavifard.Mohammad Taghi Identification of the Factors and Indicators of the Model of Quality Assessment of the Game Industry Services on the Cloud Platform [ Vol.12, Issue 45 , 46 - Autumn - Winter Year 1399]
  • taghipour.reza The framework of the national macro plan for transparency and information release based on the grounded theory method [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • Taghiyareh.Fataneh Content and structural analysis of online forums in order to extract users' social relationships and use them in grouping mechanisms. [ Vol.4, Issue 12 , 13 - Spring - Summer Year 1391]
  • Taghizadeh.Alireza Explaining the adoption process of software-oriented networks (SDN) using the foundational data method and systems approach [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • Tahayori.Hooman The Impact of IQ Imbalance on the BER of Adaptive Modulation in the MIMO System [ Vol.1, Issue 1 - Spring Year ]
  • Tahayori.Hooman Cross-layer Design for Congestion Control, Routing and Scheduling in Ad-hoc Wireless Networks with considering the Electrical Power of nodes [ Vol.1, Issue 1 - Spring Year ]
  • Tahayori.Hooman A new reinforcement learning based multi-agent method for traffic shaping and buffer allocation in routers [ Vol.1, Issue 1 - Spring Year ]
  • Tahayori.Hooman Proposing an Information Retrieval Model Using Interval Numbers [ Vol.12, Issue 45 , 46 - Autumn - Winter Year 1399]
  • taherinia.mohsen A comprehensive survey on the influence maximization problem in social networks [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • taherkhani.fahime Heuristic algorithms for pseudo-triangulation random point set in the plane [ Vol.5, Issue 16 , 17 - Spring - Summer Year 1392]
  • Tajeddini.Shima The Participation of Three Brain Tissues in Alzheimer’s disease Diagnosis from Structural MRI [ Vol.9, Issue 33 , 34 - Autumn - Winter Year 1396]
  • talebi.heydarali A Satellite Control Method Using Laguerre Model Predictive Control Approach [ Vol.5, Issue 15 - Summer Year ]
  • talebi.heydarali Three-axis attitude control of a micro-satellite by magnetic actuators through-synthesis robust method [ Vol.5, Issue 15 - Summer Year ]
  • Talebi.Mehdi Door detection based on car vision in outdoor scenes [ Vol.8, Issue 30 , 31 - Autumn - Winter Year 1395]
  • Talebi.Mohammad Liquidity Risk Prediction Using News Sentiment Analysis [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • talebi.siamak SPIHT-DCT hybrid method using Placement spatial scalability and Place - when encoding a video HDTV [ Vol.4, Issue 14 - Autumn - Winter Year 1391]
  • talebi.siamak Applying the combined SPIHT-DCT method using spatial and spatial-temporal scaling to encode video images [ Vol.4, Issue 14 , 15 - Autumn - Winter Year 1391]
  • Talebi.Siamak Increasing the lifetime of underwater acoustic sensor networks by optimal relay node placement [ Vol.12, Issue 45 , 46 - Autumn - Winter Year 1399]
  • talebian.faezeh A New Method to computational intelligence to improve network lifetime in wireless sensor networks [ Vol.7, Issue 23 - Summer Year ]
  • talebian.faezeh Presenting a method based on computational intelligence to improve energy consumption in smart wireless sensor networks [ Vol.7, Issue 24 , 25 - Spring - Summer Year 1394]
  • Taraz Monfared.Noureddin The effect of Internet of Things (IOT) implementation on the Rail Freight Industry; A futures study approach [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Tayfeh-Mahmoudi.Maryam A Horizon for Sentiment Analysis in Social Networks based on Interpreting Contents [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Tayfeh-Mahmoudi.Maryam A Framework for Sentiment Analysis in Social Networks based on Interpreting Contents [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Tayfeh-Mahmoudi.Maryam Improving the entrepreneurial skills of Hastan-nagar capital by using the entrepreneurship training portal [ Vol.4, Issue 12 , 13 - Spring - Summer Year 1391]
  • Teimouri.Mehdi An optimised hybrid method for ambulance dispatch based on complex networks and Artificial Intelligence [ Vol.7, Issue 23 - Summer Year ]
  • Teimouri.Mehdi Providing an optimal method for dispatching an ambulance based on complex networks and artificial intelligence [ Vol.7, Issue 24 , 25 - Spring - Summer Year 1394]
  • Teimourian sefidehkhan.Maryam Identifying and ranking factors affecting the digital transformation strategy in Iran's road freight transportation industry focusing on the Internet of Things and data analytics [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Teimourian sefidehkhan.Maryam Identifying and Ranking Factors Affecting the Digital Transformation Strategy in Iran's Road Freight Transportation Industry Focusing on the Internet of Things and Data Analytics [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • tihidkhah.farzad A Satellite Control Method Using Laguerre Model Predictive Control Approach [ Vol.5, Issue 15 - Summer Year ]
  • Toloie Eshlaghy.Abbas Design and implementation of a survival model for patients with melanoma based on data mining algorithms [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • Toloie Eshlaghy.Abbas Persian Stance Detection Based On Multi-Classifier Fusion [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • tootian.sedigheh Presenting the ICT Policies Implementation Model of the 6th Development Using the Neural Network Method [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • tootian.sedigheh Presenting the ICT Policies Implementation Model of the 6th Development Using the Neural Network Method [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Toroghi Haghighat.Abolfazl A review of the application of meta-heuristic algorithms in load balancing in cloud computing [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]

V

  • vafaei.abbas Outdoor Color Scene Segmentation towards Object Detection using Dual-Resolution Histograms [ Vol.4, Issue 14 - Autumn - Winter Year 1391]
  • vafaei.abbas Segmentation of exterior color images for the purpose of object recognition using histogram with double accuracy [ Vol.4, Issue 14 , 15 - Autumn - Winter Year 1391]
  • vafaei.abbas Door detection based on car vision in outdoor scenes [ Vol.8, Issue 30 , 31 - Autumn - Winter Year 1395]
  • valizadeh.mohadeseh A Recommender System Based on the Analysis of Personality Traits in Telegram Social Network [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Varahram.mohammadmahdi Using a Hybrid PSO-GA Method for Capacitor Placement in Distribution Systems [ Vol.6, Issue 20 , 21 - Spring - Summer Year 1393]
  • vasegh.morteza Modeling and simulation of the central generator of the pattern to produce curved-linear motions in the snake robot [ Vol.12, Issue 43 , 44 - Spring - Summer Year 1399]
  • Veisi.Hadi Optimized Modeling for satisfaction in the relationship between a physician and patient based on machine learnin methods [ Vol.7, Issue 23 - Summer Year ]
  • Veisi.Hadi Optimum modeling of patient satisfaction with the doctor based on machine learning methods [ Vol.7, Issue 24 , 25 - Spring - Summer Year 1394]

Y

  • Yadegari.َAmirmansour A Horizon for Sentiment Analysis in Social Networks based on Interpreting Contents [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Yadegari.َAmirmansour A Framework for Sentiment Analysis in Social Networks based on Interpreting Contents [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • yaghoobi.mahdi Fast and accurate concept drift detection from event logs [ Vol.12, Issue 43 , 44 - Spring - Summer Year 1399]
  • yaghoubi.saied Provide a conceptual model to identify the quality of electronic services in the country's online stores [ Vol.8, Issue 30 , 31 - Autumn - Winter Year 1395]
  • Yaghubi.Nour Mohammad Exploring the antecedents and consequences of smart good governance using the fuzzy Delphi method (FDM) [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • Yari.Alireza An Improved Method for Detecting Phishing Websites Using Data Mining on Web Pages [ Vol.12, Issue 43 , 44 - Spring - Summer Year 1399]
  • Yazdani.Samaneh An Intelligent Pricing System for Cloud Services aims at Increasing Implementation Simplicity and Flexibility [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • Yazdanian.Vahid Pathology of software export development in Iran [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • Yazdanian.Vahid Design and fabrication of the E-field probe for the measurement of the electromagnetic fields in 5G frequency band [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • Yazdanpanah.Ahmad Ali Agile Enterprise Architecture Modeling: Evaluating the Applicability of Six Modeling Standards based on Iran’s National EA Framework [ Vol.13, Issue 47 , 48 - Spring - Summer Year 1400]
  • Yazdanpanah.Ahmad Ali Presenting a Method for Agile Enterprise Architecture Modeling [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • Yousefi.Ali Using limited memory to store the most recent action in XCS learning classifier systems in maze problems [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Yousefi.Shamim Automatic Lung Diseases Identification using Discrete Cosine Transform-based Features in Radiography Images [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]

Z

  • zahedfar.kamran Understanding the users’ initial trust of social networks [ Vol.8, Issue 27 - Spring Year ]
  • zahiri.hamid Training MLP Neural Network in Images Compression by GSA Method [ Vol.2, Issue 5 - Spring - Summer Year ]
  • zahiri.hamid Training of MLP neural network in image compression using GSA method [ Vol.2, Issue 6 , 7 - Autumn - Winter Year 1389]
  • Zamani Boroujeni.Dr. Farsa Dynamic Load Balancing Improvement in Software-Defined Networks Using Fuzzy Multi-Objective Programming Algorithms [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • Zamani.Abraham Providing a Blockchain-Based Method to Protect Users’ Privacy in Social Networks [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • zamani.bahare Beautiful and Meaningful Iranian Names Production by Genetic Algorithm using Artificial Neural Network-Based Fitness Function [ Vol.7, Issue 25 - Spring - Summer Year ]
  • zamani.bibieshrat Investigating the Degree of Application of Professional Ethics and Vocational Qualifications by the Faculty Members of Virtual Universities of Isfahan and Medical Sciences University of Isfahan [ Vol.6, Issue 21 - Spring Year ]
  • zamanifar.kamran An Improved Method Based on Label Propagation and Greedy Approaches for Community Detection in Dynamic Social Networks [ Vol.12, Issue 43 , 44 - Spring - Summer Year 1399]
  • Zand Hesami.Hesam Presenting a new conceptual model for the field of big data and analyzing the data-driven business in Iran based on the proposed model [ Vol.13, Issue 47 , 48 - Spring - Summer Year 1400]
  • Zandieh.Mahboubeh An Intelligent Pricing System for Cloud Services aims at Increasing Implementation Simplicity and Flexibility [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • Zangane.Amirhosein An efficient Two Pathways Deep Architecture for Soccer Goal Recognition towards Soccer Highlight Summarization [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • Zare Chahooki.Mohammad Ali User recommendation in Telegram messenger by graph analysis and mathematical modeling of users' behavior [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • zare.hadi Extracting the Information Technology architecture of hospitals with approach of Implementing in Iran [ Vol.8, Issue 27 - Spring Year ]
  • Zare.Hadi An optimised hybrid method for ambulance dispatch based on complex networks and Artificial Intelligence [ Vol.7, Issue 23 - Summer Year ]
  • Zare.Hadi Extracting hospital information technology architecture with the approach of implementation capability in Iran [ Vol.8, Issue 27 , 28 - Spring - Summer Year 1395]
  • Zare.Hadi Providing an optimal method for dispatching an ambulance based on complex networks and artificial intelligence [ Vol.7, Issue 24 , 25 - Spring - Summer Year 1394]
  • zare.jalal E-Government Service Supply Chain: Identifying Performance Evaluation Indicators (Case Study of e-Customs System in Iran) [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • Zareian-Jahromi.Ehsan Improving the directivity of the plasmonic sectoral horn nanoantenna using lens in its aperture [ Vol.9, Issue 33 , 34 - Autumn - Winter Year 1396]
  • Zargaran khouzani.Fatemeh Identifying the Key Drivers of Digital Signature Implementation in Iran (using fuzzy Delphi method) [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Zargaran khouzani.Fatemeh Identifying the Key Drivers of Digital Signature Implementation in Iran (Using Fuzzy Delphi Method) [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Zargari.Eshrat Designing A New Genetic-Fuzzy Type 2 Approach to Evaluate Self-Adaptive Systems by Software Quality Indicators [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • zarkeshzade.mehdi An optimised hybrid method for ambulance dispatch based on complex networks and Artificial Intelligence [ Vol.7, Issue 23 - Summer Year ]
  • zeidabadinezhad.abolghasem A Fast Method to Compute Radiation Fields of Shaped Reflector Antennas by FFT [ Vol.1, Issue 2 , 3 - Autumn - Winter Year 1387]
  • zenouzi.jafari Investigating the effect of using various marketing strategies on social networks on gaining the trust of council customers Investigating ترجمه‌های investigate فعلفراوانی بررسی کردن investigate, check, peruse, survey, study رسیدگی کردن consider, attend, check, investigate, inspect, investigate استفسار کردن investigate وارسی کردن sift, investigate پژوهیدن investigate, inquire, research, search تحقیق کردن investigate, inquire, verify, assay, interrogate, question اطلاعات مقدماتی بدست اوردن investigate جستار کردن investigate تفتیش کردن inquire, inspect, investigate, revise باز جویی کردن examine, assay, inquire, interrogate, investigate, cross-examine تعریف‌های investigate فعل ۱ carry out a systematic or formal inquiry to discover and examine the facts of (an incident, allegation, etc.) so as to establish the truth. police are investigating the alleged beating مترادف‌ها: check outsuss outgive something the once-overscope outinquire intolook intogo intolook overprobeexplorescrutinizeconduct an investigation intoconduct an inquiry intomake inquiries abouttry to get to the bottom ofinspectanalyzestudyexamineconsiderresearchsearch/sift the evidence concerningpore overdelve intoauditevaluatefollow up مترادف investigate فعل check outsuss outgive something the once-overscope out inquire intolook intogo intolook overprobeexplorescrutinizeconduct an investigation intoconduct an inquiry intomake inquiries abouttry to get to the bottom ofinspectanalyzestudyexamineconsiderresearchsearch/sift the evidence concerningpore overdelve intoauditevaluatefollow up همچنین ببینید investigate [ Vol.11, Issue 39 , 40 - Spring - Summer Year 1398]
  • zeraatkarmoghaddam.mohammadreza Improvement of intrusion detection system on Industrial Internet of Things based on deep learning using metaheuristic algorithms [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • zeynali.saeed Energy procurement of a cellular base station in independent microgrids with electric vehicles and renewable energy sources: Mixed-integer nonlinear programming model [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • Ziaeipour.Elham Explaining the adoption process of software-oriented networks (SDN) using the foundational data method and systems approach [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • Zohoorian Nadali.Iman Artefacts and Producers Mapping of Iran's Artificial Intelligence Ecosystem based on Transformational Levels [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]