Abbasi.Ibrahim
Valuation of digital services in Iran: Empirical proof for Google and Instagram
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
Abbasi.Javad
Employing a meta-synthesis to present a framework for commercial banks’ preparedness indicators in use of blockchain technology
[
Vol.13,
Issue
49
,
50
- Autumn - WinterYear
1400]
Abbasi.Mohammadhassan
Designing a personalized e-learning system using learners' characteristics and implementing it with the gamification elements
[
Vol.13,
Issue
47
,
48
- Spring - SummerYear
1400]
abbasi.narges
Analysing students' learning through morning exercise using data mining techniques
[
Vol.13,
Issue
49
,
50
- Autumn - WinterYear
1400]
Abbasi.Zahra
An approach to prioritize quality dimensions of based on cloud computing using Multiple Criteria Decision Making method
[
Vol.14,
Issue
53
,
54
- Autumn - WinterYear
1401]
Abbasimehr.Hossein
A Novel Multi-Step Ahead Demand Forecasting Model Based on Deep Learning Techniques and Time Series Augmentation
[
Vol.14,
Issue
53
,
54
- Autumn - WinterYear
1401]
Abbasi-Shahkooh.Kolsoum
Extracting Innovation Strategies and Requirements for Telecommunication Companies: Case Study of Telecommunications Infrastructure Company
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
Abbasi-Shahkooh.Kolsoum
A novel framework for policymaking and evaluation of digital government
[
Vol.17,
Issue
63
,
64
- Spring - SummerYear
1404]
abbaspour.javad
Improvement of mean shift tracker for tracking of target with variable photometric pattern
[
Vol.4,
Issue
13
- SpringYear
]
abdali.Fardin
Synthetic Photoplethysmogram (PPG) Generation Using Genetic Programming Based Generative Model
[
Vol.17,
Issue
63
,
64
- Spring - SummerYear
1404]
Abdian.Mohammad Mahdi
Intrusion Detection Based on Cooperation on the Permissioned Blockchain Platform in the Internet of Things Using Machine Learning
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Abdian.Mohammad Mahdi
Intrusion Detection Based on Cooperation on the Permissioned Blockchain Platform in the Internet of Things Using Machine Learning
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Abdipour.Abdolali
The Impact of IQ Imbalance on the BER of Adaptive Modulation in the MIMO System
[
Vol.1,
Issue
1
- SpringYear
]
Abdipour.Abdolali
Design, simulation and performance comparison of radating elements of reflect array antenna
[
Vol.5,
Issue
15
- SummerYear
]
Abdolrazzagh-Nezhad.Majid
Designing A New Genetic-Fuzzy Type 2 Approach to Evaluate Self-Adaptive Systems by Software Quality Indicators
[
Vol.16,
Issue
61
,
62
- Autumn - WinterYear
1403]
Abdolrazzagh-Nezhad.Majid
Comparing A Hybridization of Fuzzy Inference System and Particle Swarm Optimization Algorithm with Deep Learning to Predict Stock Prices
[
Vol.11,
Issue
41
,
42
- Autumn - WinterYear
1398]
Adabi.Sepideh
An Intelligent Pricing System for Cloud Services aims at Increasing Implementation Simplicity and Flexibility
[
Vol.14,
Issue
53
,
54
- Autumn - WinterYear
1401]
adibi.zhinoos
A Combinational Model for Evaluating Organizational Readiness for Data Warehouse Implementation by Using Analytical Hierarchical Process
[
Vol.2,
Issue
3
- SummerYear
]
Afshar Kazemi.Mohamad Ali
Anomaly and Intrusion Detection through Datamining and Feature Selection using PSO Algorithm
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Afshar Kazemi.Mohamad Ali
Anomaly and Intrusion Detection Through Data Mining and Feature Selection using PSO Algorithm
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Aftabi.Seyyede Zahra
UsERQA: An LLM-Driven User-Aware Community Question Answering System
[
Vol.17,
Issue
65
,
65
- AutumnYear
1404]
aghadavoudi.sarvenaz
An Architecture, Implementation, and Evaluation of Internet of Healthcare Things Ecosystem Platform
[
Vol.17,
Issue
63
,
64
- Spring - SummerYear
1404]
aghaee.golnaz
Trust Management Based on User Feedback in Cloud Computing Environment by Using Cuckoo Optimization Algorithm
[
Vol.16,
Issue
61
,
62
- Autumn - WinterYear
1403]
Aghaee.Mohsen
Analysis of Scenarios for the Use of Cryptocurrencies in the Islamic Republic of Iran
[
Vol.17,
Issue
63
,
64
- Spring - SummerYear
1404]
aghaeizade.reza
Reinforcement of the central axis of tubular structures and its application in extracting the central axis of the portal vein
[
Vol.4,
Issue
14
,
15
- Autumn - WinterYear
1391]
aghaeizade.reza
Medial-axis Enhancement of Tubular Structures and its Application in the Extraction of Portal Veins
[
Vol.4,
Issue
13
- SpringYear
]
aghdasim.aghdasim
Identify and analyze decision points and key players in procurement process in the EPC companies
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
Ahari.Somayeh
The Evaluation of E-learning by Benchmarking Approach Iran Higher Education as a Case Study
[
Vol.4,
Issue
11
- AutumnYear
]
Ahari.Somayeh
Relation of emotional intelligence and trends of e-learning in organizations (Case study: Bank employees Alborz Province)
[
Vol.4,
Issue
11
- AutumnYear
]
Ahari.Somayeh
Assessing the e-service quality of Payame Noor University
[
Vol.4,
Issue
11
- AutumnYear
]
Ahari.Somayeh
Ontology-Based Up gradation of Entrepreneurship Skills Using Educational Portals
[
Vol.4,
Issue
11
- AutumnYear
]
Ahari.Somayeh
Proposing a Model for Extracting Information from Textual Documents, Based on Text Mining in E-learning
[
Vol.4,
Issue
11
- AutumnYear
]
Ahari.Somayeh
A New Approach to Extract and Utilize Learners Social Relationships through Analyzing Forums Structure and Contents
[
Vol.4,
Issue
11
- AutumnYear
]
Ahari.Somayeh
Multimedia teaching and its effects on learning and retention of English grammar
[
Vol.4,
Issue
11
- AutumnYear
]
Ahmadi.Farid
Prioritizing Virtual Reality Functions in the B2B Customer Journey Using the Fuzzy SWARA Method
[
Vol.17,
Issue
63
,
64
- Spring - SummerYear
1404]
Ahmadi.Hamid
A greedy new method based on the cascade model to calculate maximizing penetration in social networks
[
Vol.10,
Issue
37
,
38
- Autumn - WinterYear
1397]
Ahmadi.Mohammad Reza
Presenting a novel solution to choose a proper database for storing big data in national network services
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Ahmadi.Mohammad Reza
Providing a New Solution in Selecting Suitable Databases for Storing Big Data in the National Information Network
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Ahmadi.Parvin
A Horizon for Sentiment Analysis in Social Networks based on Interpreting Contents
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Ahmadi.Parvin
A Framework for Sentiment Analysis in Social Networks based on Interpreting Contents
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Ahmadian chashmi.hamidreza
A framework for establishing a national data vault for Data Governance institution
[
Vol.13,
Issue
49
,
50
- Autumn - WinterYear
1400]
ahmadilivani.mohammad hasan
Online Estimation and Improvement of Cache Soft Error Vulnerability
[
Vol.17,
Issue
63
,
64
- Spring - SummerYear
1404]
Ahmadzadeh.Hamidreza
Design of Distributed Consensus Controller for Leader-Follower Singular Multi-Agent Systems in the Presence of Sensor Fault
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
ahsan.reza
Converting protein sequence to image for classification with convolutional neural network
[
Vol.12,
Issue
43
,
44
- Spring - SummerYear
1399]
akbar.ali
Applying genetic algorithm for automatic service identification based on quality metrics
[
Vol.6,
Issue
19
- AutumnYear
]
Akbari Emami.Shahnaz
Information Technology, Strategy Implementation, Information Systems, Strategic Planning, Input-Process-Outcome Framework
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
akbari.ahmad
Evaluation of SIP signaling implementation using QoS parameters
[
Vol.1,
Issue
1
- SpringYear
]
Akbari.Mohsen
Understanding the initial trust of users in social networks
[
Vol.8,
Issue
27
,
28
- Spring - SummerYear
1395]
Akbari.Mohsen
Understanding the users’ initial trust of social networks
[
Vol.8,
Issue
27
- SpringYear
]
Akhbari.Mehdi
Fault Diagnosis and Detection in Photovoltaic Systems Using Neural Network VGG16
[
Vol.16,
Issue
61
,
62
- Autumn - WinterYear
1403]
akhlaghi.fardin
Semi-blind labeling of images using SVD in the field of discrete wavelet transform
[
Vol.2,
Issue
6
,
7
- Autumn - WinterYear
1389]
akhlaghi.fardin
DWT-SVD based Semi-Blind Digital Image Watermarking
[
Vol.2,
Issue
5
- Spring - SummerYear
]
Akhshabi.Majid
Application of Artificial Intelligence in the Art of Music A Systematic Review
[
Vol.17,
Issue
65
,
65
- AutumnYear
1404]
Akraminejad.Reza
WSTMOS: A Method For Optimizing Throughput, Energy, And Latency In Cloud Workflow Scheduling
[
Vol.15,
Issue
57
,
58
- Autumn - WinterYear
1402]
alagheband.basir
طراحی اولین پایگاه داده کلمات دستنویس کردی برای سیستم های تشخیص تصویری کلمات
[
Vol.5,
Issue
17
- Spring - SummerYear
]
albadvi.albadvi
Liquidity Risk Prediction Using News Sentiment Analysis
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
ali.ghalibaf
Improving performance of probe-based rate control mechanisms using classification: evaluation on an experimental testbed for High Throughput WLANs
[
Vol.12,
Issue
43
,
44
- Spring - SummerYear
1399]
Alimohamadi.Sajad
Providing an Intrusion Detection System in the Industrial Internet of Things Using the Gray Wolf Algorithm
[
Vol.16,
Issue
61
,
62
- Autumn - WinterYear
1403]
Alimoradi.Fatemeh
Synthesizing an image dataset for text detection and recognition in images
[
Vol.14,
Issue
53
,
54
- Autumn - WinterYear
1401]
alinezhad.ali
Integrating Data Envelopment Analysis and Decision Tree Models in Order to Evaluate Information Technology-Based Units
[
Vol.8,
Issue
27
- SpringYear
]
alinezhad.alireza
A Combination Method of DEA, DEMATEL and ANP for Evaluation of ERP Systems
[
Vol.12,
Issue
45
,
46
- Autumn - WinterYear
1399]
alipour.fazaneh
A Research Over the Obstacles and Influential Factors on Development of e-Learning Subjects from Perspective of Beneficiaries of CME Program in Jahrom University of Medical Sciences in 2012-2013
[
Vol.6,
Issue
21
- SpringYear
]
Aliyari.Shahram
A model information technology adoption in academic research projects in the filed ICT based on Information Technology Adoption Integrated Modeling (ITAIM)
[
Vol.11,
Issue
41
,
42
- Autumn - WinterYear
1398]
Alizadeh Noughabi.Havva
Generating Personalized Explanations for Twitter List Recommendations Using Semantic Similarity of Hashtags
[
Vol.16,
Issue
61
,
62
- Autumn - WinterYear
1403]
Al-Shohayyeb.Huda
Noor Analysis: A Benchmark Dataset for Evaluating Morphological Analysis Engines
[
Vol.15,
Issue
57
,
58
- Autumn - WinterYear
1402]
Amani.Nahid
Analysis of Traffic Data for Congestion Detection Using Machine Learning Algorithms
[
Vol.17,
Issue
63
,
64
- Spring - SummerYear
1404]
Amerimehr.Mohammad-Hossein
Analysis of Traffic Data for Congestion Detection Using Machine Learning Algorithms
[
Vol.17,
Issue
63
,
64
- Spring - SummerYear
1404]
Amin Mousavi.Seyed Abdollah
Design and implementation of a survival model for patients with melanoma based on data mining algorithms
[
Vol.15,
Issue
57
,
58
- Autumn - WinterYear
1402]
Amini vlashani.Maede
Data-driven Marketing in Digital Businesses from Dynamic Capabilities View
[
Vol.14,
Issue
53
,
54
- Autumn - WinterYear
1401]
amini.Akbar
A framework for architecture the electronic trust in e-commerce:online shopping segment
[
Vol.15,
Issue
57
,
58
- Autumn - WinterYear
1402]
Amini.Amir
۹۳ / ۵٬۰۰۰ Integration of data envelopment analysis model and decision tree in order to evaluate units based on information technology
[
Vol.8,
Issue
27
,
28
- Spring - SummerYear
1395]
Amini.Amir
Integrating Data Envelopment Analysis and Decision Tree Models in Order to Evaluate Information Technology-Based Units
[
Vol.8,
Issue
27
- SpringYear
]
aminiazar.wahab
Provide A Lightweight Encryption Solution To secure Data In The Internet Of Things
[
Vol.16,
Issue
61
,
62
- Autumn - WinterYear
1403]
amintoosi.mahmood
The aware genetic algorithm of the best member, applied to graph coloring and metric-dimension of the graph problems
[
Vol.12,
Issue
43
,
44
- Spring - SummerYear
1399]
Amiri.Maryam
Document Clustering Based On Ontology and Fuzzy Approach
[
Vol.5,
Issue
17
- Spring - SummerYear
]
Amiri.Mostafa
Fuzzy Multicore Clustering of Big Data in the Hadoop Map Reduce Framework
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
Amiri.Samira
Improvement of the bulk sensitivity and FoM of the plasmonic nanodipole antenna array
[
Vol.9,
Issue
33
,
34
- Autumn - WinterYear
1396]
Amiri.yosef
The future of online branding with an emphasis on the impact of artificial intelligence in the horizon of 2025
[
Vol.17,
Issue
65
,
65
- AutumnYear
1404]
AmiriAra.Hamid
Joint Power Allocation Optimization of cooperative communication systems with Non-Orthogonal Multiple Access
[
Vol.12,
Issue
45
,
46
- Autumn - WinterYear
1399]
amrolahi.milad
context-aware travel recommender system exploiting from Geo-tagged photos
[
Vol.11,
Issue
41
,
42
- Autumn - WinterYear
1398]
anarinejad.abbas
Evaluation of e-learning with optimal mining approach 1 case study: Iran's higher education
[
Vol.4,
Issue
12
,
13
- Spring - SummerYear
1391]
ANSARI.ALI ASGHAR
Power Efficient allocation in C-RAN with Multi access technology selection approach
[
Vol.14,
Issue
53
,
54
- Autumn - WinterYear
1401]
ansarmohammadi.ali
Multi-level ternary quantization for improving sparsity and computation in embedded deep neural networks
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
ansarmohammadi.ali
Multi-Level Ternary Quantization for Improving Sparsity and Computation in Embedded Deep Neural Networks
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
arabsorkhi.abouzar
Analysis of Scenarios for the Use of Cryptocurrencies in the Islamic Republic of Iran
[
Vol.17,
Issue
63
,
64
- Spring - SummerYear
1404]
arabsorkhi.abouzar
New Method to Improve Illumination Variations in Adult Images Based on Fuzzy Deep Neural Network
[
Vol.11,
Issue
41
,
42
- Autumn - WinterYear
1398]
arasteh.bahman
Investigating an Approach to Identify and Classify Mutants Based on the Characteristics of Mutants with Machine Learning Algorithms
[
Vol.16,
Issue
61
,
62
- Autumn - WinterYear
1403]
arefi.somayeh
Feature selection for author identification of Persian online short texts
[
Vol.13,
Issue
47
,
48
- Spring - SummerYear
1400]
arianyan.ehsan
A Novel Method Based on Tranco for Monitoring Cloud Service Providers
[
Vol.17,
Issue
63
,
64
- Spring - SummerYear
1404]
arianyan.ehsan
Emerging technologies in future generations of high performance computing: introduction, taxonomy and future research directions
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
arianyan.ehsan
Presenting a novel solution to choose a proper database for storing big data in national network services
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
arianyan.ehsan
Providing a New Solution in Selecting Suitable Databases for Storing Big Data in the National Information Network
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
arianyan.ehsan
High Performance Computing: Next Generation Requirements and Research Axes
[
Vol.14,
Issue
51
,
52
- Spring - SummerYear
1401]
arianyan.ehsan
Improving IoT resource management using fog calculations and ant lion optimization algorithm
[
Vol.15,
Issue
57
,
58
- Autumn - WinterYear
1402]
aryanian.iman
Design, simulation and performance comparison of radating elements of reflect array antenna
[
Vol.5,
Issue
15
- SummerYear
]
asadi.bahareh
Adaptive rotation models and traffic patterns to reduce light loss in networks on optical chip
[
Vol.10,
Issue
35
,
36
- Spring - SummerYear
1397]
asemi.atefe
Investigating the Degree of Application of Professional Ethics and Vocational Qualifications by the Faculty Members of Virtual Universities of Isfahan and Medical Sciences University of Isfahan
[
Vol.6,
Issue
21
- SpringYear
]
ASGHARI ESTIAR.FARHAD
Valuation of digital services in Iran: Empirical proof for Google and Instagram
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
Asghari.Seyyed Amir
Increasing Total Throughput, Reducing Outage to Zero, and Reducing Power Consumption in a Cellular Network
[
Vol.14,
Issue
53
,
54
- Autumn - WinterYear
1401]
asghari.zeinab
Investigating an Approach to Identify and Classify Mutants Based on the Characteristics of Mutants with Machine Learning Algorithms
[
Vol.16,
Issue
61
,
62
- Autumn - WinterYear
1403]
Asgharian.Alireza
Extracting Innovation Strategies and Requirements for Telecommunication Companies: Case Study of Telecommunications Infrastructure Company
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
Asghariyan.Fatemeh
An Intrusion Detection System based on Deep Learning for CAN Bus
[
Vol.15,
Issue
57
,
58
- Autumn - WinterYear
1402]
ashouri.mina
Investigating the Effect of Hardware Parameters Adjustments on Energy Consumption in Thin Matrix Multiplication Algorithm on GPUs
[
Vol.9,
Issue
31
,
32
- Spring - SummerYear
1396]
attaran.ebrahim
Blind correction of camera lens aberration and de-centering error using modified Zernike model
[
Vol.7,
Issue
25
- Spring - SummerYear
]
ayagh.zahra
Understanding the users’ initial trust of social networks
[
Vol.8,
Issue
27
- SpringYear
]
Azarkasb.Seyed Omid
Fuzzy Multicore Clustering of Big Data in the Hadoop Map Reduce Framework
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
Azarnejad.Ardeshir
Routing improvement to control congestion in software defined networks by using distributed controllers
[
Vol.11,
Issue
39
,
40
- Spring - SummerYear
1398]
azharivs.azharivs
Evaluation of SIP signaling implementation using QoS parameters
[
Vol.1,
Issue
1
- SpringYear
]
Azimi.ُSamaneh
Fault Diagnosis and Detection in Photovoltaic Systems Using Neural Network VGG16
[
Vol.16,
Issue
61
,
62
- Autumn - WinterYear
1403]
Azimzadeh.Masomeh
Priority based Deployment of IoT Applications in Fog
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Azimzadeh.Masomeh
Community-Based Multi-Criteria Placement of Applications in the Fog Environment
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Azizi MehmanDoost.Mahdi
The framework of the national macro plan for transparency and information release based on the grounded theory method
[
Vol.15,
Issue
57
,
58
- Autumn - WinterYear
1402]
B
babadi.sima
Improving the entrepreneurial skills of Hastan-nagar capital by using the entrepreneurship training portal
[
Vol.4,
Issue
12
,
13
- Spring - SummerYear
1391]
Babaee.Hossein
A Framework for Identifying and Ranking Criteria for Evaluating the Quality of Electronic Services (Case studies: Golestan website of Payame-noor university)
[
Vol.5,
Issue
18
,
19
- Autumn - WinterYear
1392]
Babazadeh.Sogol
Providing a model for evaluating native electronic content in Iran based on value chain
[
Vol.13,
Issue
49
,
50
- Autumn - WinterYear
1400]
badie.kambiz
A Horizon for Sentiment Analysis in Social Networks based on Interpreting Contents
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
badie.kambiz
A Framework for Sentiment Analysis in Social Networks based on Interpreting Contents
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
badie.kambiz
Using limited memory to store the most recent action in XCS learning classifier systems in maze problems
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
bagheri.alireza
Geometric embedding of the tree in points inside a polygon with minimum number of bends
[
Vol.2,
Issue
4
,
5
- Spring - SummerYear
1389]
bagheri.masoud
Applying genetic algorithm for automatic service identification based on quality metrics
[
Vol.6,
Issue
19
- AutumnYear
]
bagherinejad.jafar
A Model for impacts of Investment in IT on customer satisfaction, using Structural Equation Modeling and Path Analysis
[
Vol.5,
Issue
15
- SummerYear
]
bagherinejad.jafar
A Combinational Model for Evaluating Organizational Readiness for Data Warehouse Implementation by Using Analytical Hierarchical Process
[
Vol.2,
Issue
3
- SummerYear
]
bahadorani baghbaderani.amin
Routing of Multipartite Computer Networks Using Ant Genetic Algorithm
[
Vol.9,
Issue
31
,
32
- Spring - SummerYear
1396]
Bahadorifard.Reza
Investigating the Relationship between Electronic Human Resource Management, Agility and Organizational Effectiveness in Organizations Under the Ministry of Communications and Information Technology
[
Vol.12,
Issue
45
,
46
- Autumn - WinterYear
1399]
baharloo.mahdiye
An Improved Method for Detecting Phishing Websites Using Data Mining on Web Pages
[
Vol.12,
Issue
43
,
44
- Spring - SummerYear
1399]
Bahreini.Takavash
Extracting Innovation Strategies and Requirements for Telecommunication Companies: Case Study of Telecommunications Infrastructure Company
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
Bahri.Reza
Design and fabrication of the E-field probe for the measurement of the electromagnetic fields in 5G frequency band
[
Vol.14,
Issue
53
,
54
- Autumn - WinterYear
1401]
Bahri.Reza
Energy procurement of a cellular base station in independent microgrids with electric vehicles and renewable energy sources: Mixed-integer nonlinear programming model
[
Vol.15,
Issue
57
,
58
- Autumn - WinterYear
1402]
Bakhtiari.Saeed
A Multi-Objective Differential Evolutionary Algorithm-based Approach for Resource Allocation in Cloud Computing Environment
[
Vol.14,
Issue
51
,
52
- Spring - SummerYear
1401]
bakhtiyari.saied
Routing improvement to control congestion in software defined networks by using distributed controllers
[
Vol.11,
Issue
39
,
40
- Spring - SummerYear
1398]
BaniRostam.Touraj
Automatic identification of personality traits using X contents based on Myers Briggs index
[
Vol.17,
Issue
65
,
65
- AutumnYear
1404]
Baraani.Ahmad
Improving Opinion Aspect Extraction Using Domain Knowledge and Term Graph
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
Baradaran.Sepideh
A Review on Hadith Text Processing Tasks
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Baradaran.Sepideh
A Review on Hadith Text Processing Tasks
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Baradaran.Vahid
A Model for Evaluating Electronic Governance (e-governance) in Iran's Executive Sectors
[
Vol.13,
Issue
49
,
50
- Autumn - WinterYear
1400]
Barkhoda.Sayed Wafa
Improving imperialist competitive algorithm for solving the nodes placement problem in three-dimensional grid wireless sensor networks
[
Vol.12,
Issue
45
,
46
- Autumn - WinterYear
1399]
barzamini.roohollah
Sliding mode control for congestion in TCP/IP networks
[
Vol.2,
Issue
6
,
7
- Autumn - WinterYear
1389]
barzamini.roohollah
Sliding Mode Controller for TCP Congestion Control
[
Vol.2,
Issue
5
- Spring - SummerYear
]
beheshti.rahele
Improving recommender systems with the help of Semantic Web
[
Vol.9,
Issue
31
,
32
- Spring - SummerYear
1396]
Beheshti.Zahra
An Individual-Oriented Shuffled Frog Leaping Algorithm for Solving Vehicle Routing Problem
[
Vol.14,
Issue
51
,
52
- Spring - SummerYear
1401]
Behkamal.Behshid
Generating Personalized Explanations for Twitter List Recommendations Using Semantic Similarity of Hashtags
[
Vol.16,
Issue
61
,
62
- Autumn - WinterYear
1403]
Behkamal.Behshid
BIG DATA
[
Vol.10,
Issue
37
,
38
- Autumn - WinterYear
1397]
beigrezai.mahsa
An Overview on Replica Consistency Methods in Distributed Systems and Future Works
[
Vol.16,
Issue
61
,
62
- Autumn - WinterYear
1403]
Bidgoli.AmirMasoud
The Belief of Persian Text Mining Based on Deep Learning with Emotion-Word Separation
[
Vol.16,
Issue
61
,
62
- Autumn - WinterYear
1403]
Binesh Marvasti.Mohammadreza
Increasing Total Throughput, Reducing Outage to Zero, and Reducing Power Consumption in a Cellular Network
[
Vol.14,
Issue
53
,
54
- Autumn - WinterYear
1401]
bobarshad.hossein
Extracting hospital information technology architecture with the approach of implementation capability in Iran
[
Vol.8,
Issue
27
,
28
- Spring - SummerYear
1395]
bobarshad.hossein
Extracting the Information Technology architecture of hospitals with approach of Implementing in Iran
[
Vol.8,
Issue
27
- SpringYear
]
borna.keyvan
Using web analytics in forecasting the stock price of chemical products group in the stock exchange
[
Vol.11,
Issue
39
,
40
- Spring - SummerYear
1398]
Bouyer.Asgarali
A greedy new method based on the cascade model to calculate maximizing penetration in social networks
[
Vol.10,
Issue
37
,
38
- Autumn - WinterYear
1397]
C
Chabok.Hossein
A design of Rectangular Waveguide TM11 to TE10 Mode Converter for S-band Applications
[
Vol.9,
Issue
33
,
34
- Autumn - WinterYear
1396]
Cheraghali.Mohammad Hasan
Identifying and ranking factors affecting the digital transformation strategy in Iran's road freight transportation industry focusing on the Internet of Things and data analytics
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Cheraghali.Mohammad Hasan
Identifying and Ranking Factors Affecting the Digital Transformation Strategy in Iran's Road Freight Transportation Industry Focusing on the Internet of Things and Data Analytics
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
D
daee.amir
Using web analytics in forecasting the stock price of chemical products group in the stock exchange
[
Vol.11,
Issue
39
,
40
- Spring - SummerYear
1398]
daei.mohammadhassan
Improving performance of probe-based rate control mechanisms using classification: evaluation on an experimental testbed for High Throughput WLANs
[
Vol.12,
Issue
43
,
44
- Spring - SummerYear
1399]
Dami.Sina
Improving Sentiment Analysis in Persian text based on combination of Stacked Auto-Encoder and Transformer-BiLSTM-CNN
[
Vol.17,
Issue
65
,
65
- AutumnYear
1404]
daneshfar.fatemeh
طراحی اولین پایگاه داده کلمات دستنویس کردی برای سیستم های تشخیص تصویری کلمات
[
Vol.5,
Issue
17
- Spring - SummerYear
]
Daneshparvar.Mitra
The role of organizational factors on consumer buying behavior in social networks
[
Vol.12,
Issue
45
,
46
- Autumn - WinterYear
1399]
danyali.danyali
Semi-blind labeling of images using SVD in the field of discrete wavelet transform
[
Vol.2,
Issue
6
,
7
- Autumn - WinterYear
1389]
danyali.danyali
DWT-SVD based Semi-Blind Digital Image Watermarking
[
Vol.2,
Issue
5
- Spring - SummerYear
]
Danyali.Habibollah
The Participation of Three Brain Tissues in Alzheimer’s disease Diagnosis from Structural MRI
[
Vol.9,
Issue
33
,
34
- Autumn - WinterYear
1396]
dashti.fattameh
Provide A Lightweight Encryption Solution To secure Data In The Internet Of Things
[
Vol.16,
Issue
61
,
62
- Autumn - WinterYear
1403]
dashti.seyed ebrahim
Improving resource allocation in mobile edge computing using gray wolf and particle swarm optimization algorithms
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
dashti.seyed ebrahim
Improving Resource Allocation in Mobile Edge Computing Using Particle Swarm and Gray Wolf Optimization Algorithms
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Dastghaibyfard.Gholamhossein
A Novel Model for detecting intrusion with Mobile Agent and Game theory
[
Vol.8,
Issue
27
- SpringYear
]
Dastghaibyfard.Gholamhossein
Presenting a model for using mobile agents in distributed intrusion detection systems based on game theory
[
Vol.8,
Issue
27
,
28
- Spring - SummerYear
1395]
Dastranj.Nasrin
Extracting Innovation Strategies and Requirements for Telecommunication Companies: Case Study of Telecommunications Infrastructure Company
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
Dastranj.Nasrin
A novel framework for policymaking and evaluation of digital government
[
Vol.17,
Issue
63
,
64
- Spring - SummerYear
1404]
dehbashian.maryam
Training of MLP neural network in image compression using GSA method
[
Vol.2,
Issue
6
,
7
- Autumn - WinterYear
1389]
dehbashian.maryam
Training MLP Neural Network in Images Compression by GSA Method
[
Vol.2,
Issue
5
- Spring - SummerYear
]
dehdashti shahrokh.zohreh
The role of organizational factors on consumer buying behavior in social networks
[
Vol.12,
Issue
45
,
46
- Autumn - WinterYear
1399]
Dehghan.Sogand
The main components of evaluating the credibility of users according to organizational goals in the life cycle of big data
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
Dehghani.Mohammad Javad
New changes of local binary pattern and classification and segmentation of texture images of the seabed
[
Vol.8,
Issue
27
,
28
- Spring - SummerYear
1395]
Dehghani.Mohammad Javad
New changes of local binary patterns and classification and segmentation of seabed images
[
Vol.8,
Issue
27
- SpringYear
]
Dehghani.Mohammad Javad
Power Efficient allocation in C-RAN with Multi access technology selection approach
[
Vol.14,
Issue
53
,
54
- Autumn - WinterYear
1401]
Dehyadegari.Masoud
High Performance Computing: Next Generation Requirements and Research Axes
[
Vol.14,
Issue
51
,
52
- Spring - SummerYear
1401]
dianat.dianat
Converting protein sequence to image for classification with convolutional neural network
[
Vol.12,
Issue
43
,
44
- Spring - SummerYear
1399]
dolatkhah.ahmad
The Local Strategic Model of Smart Police of The Islamic Republic of Iran
[
Vol.16,
Issue
61
,
62
- Autumn - WinterYear
1403]
dolatkhah.ahmad
Face recognition and Liveness Detection Based on Speech Recognition for Electronical Authentication
[
Vol.15,
Issue
57
,
58
- Autumn - WinterYear
1402]
Dorostkar Yaghouti.Behnam
Face recognition and Liveness Detection Based on Speech Recognition for Electronical Authentication
[
Vol.15,
Issue
57
,
58
- Autumn - WinterYear
1402]
doustari.mohammadali
Classify and implement hardware trojans and provide a new way to detect them
[
Vol.9,
Issue
31
,
32
- Spring - SummerYear
1396]
E
Ebadati.Omid Mahdi
Using web analytics in forecasting the stock price of chemical products group in the stock exchange
[
Vol.11,
Issue
39
,
40
- Spring - SummerYear
1398]
ebadzade.mohamad mehdi
Using limited memory to store the most recent action in XCS learning classifier systems in maze problems
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
Ebrahimi Lame.Nozar
A Collaborative Filtering Movie Recommendation System Based on Users Correlation and Weighted K-Means with High Accuracy
[
Vol.14,
Issue
51
,
52
- Spring - SummerYear
1401]
ebrahimi.mansour
Converting protein sequence to image for classification with convolutional neural network
[
Vol.12,
Issue
43
,
44
- Spring - SummerYear
1399]
ebrahimi.Seyyed Mohammad
Introducing a genetic algorithm based Method for Community person's stance Detection in social media and news
[
Vol.11,
Issue
41
,
42
- Autumn - WinterYear
1398]
Edalatian Shariairi.Jamshid
A value Co-creation model for Information and Communication Technology Entrepreneurial Ecosystem
[
Vol.13,
Issue
49
,
50
- Autumn - WinterYear
1400]
Edalatpanah.Seyed Ahmad
Predicting the workload of virtual machines in order to reduce energy consumption in cloud data centers using the combination of deep learning models
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
Efazati.Sara
Analysis of Traffic Data for Congestion Detection Using Machine Learning Algorithms
[
Vol.17,
Issue
63
,
64
- Spring - SummerYear
1404]
Eftekhari.Seyed Ahmad
Intrusion Detection Based on Cooperation on the Permissioned Blockchain Platform in the Internet of Things Using Machine Learning
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Eftekhari.Seyed Ahmad
Intrusion Detection Based on Cooperation on the Permissioned Blockchain Platform in the Internet of Things Using Machine Learning
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Ehsani Boshla.Fatemeh
High Performance Computing: Next Generation Requirements and Research Axes
[
Vol.14,
Issue
51
,
52
- Spring - SummerYear
1401]
Ehteshami.Mehran
Identifying and ranking factors affecting the digital transformation strategy in Iran's road freight transportation industry focusing on the Internet of Things and data analytics
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Ehteshami.Mehran
Identifying and Ranking Factors Affecting the Digital Transformation Strategy in Iran's Road Freight Transportation Industry Focusing on the Internet of Things and Data Analytics
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Elahi.Shaban
Designing a fuzzy expert system for choosing the right contractor in information technology outsourcing
[
Vol.2,
Issue
6
,
7
- Autumn - WinterYear
1389]
Elahi.Shaban
A Hybrid Neural Network Ensemble Model for Credit Risk Assessment
[
Vol.6,
Issue
20
,
21
- Spring - SummerYear
1393]
Elahi.Shaban
Designing a Fuzzy Expert System for Selecting an Appropriate Contractor in Information Technology Outsourcing
[
Vol.2,
Issue
5
- Spring - SummerYear
]
Eliasi.Behrooz
Open Data Accessing Policymaking in Iran, in the Aspect of Preserving Privacy and Personal Data Ownership
[
Vol.14,
Issue
51
,
52
- Spring - SummerYear
1401]
Eliasi.Behrooz
Providing a model for evaluating native electronic content in Iran based on value chain
[
Vol.13,
Issue
49
,
50
- Autumn - WinterYear
1400]
Ershadi.Mohammad Javad
An approach to prioritize quality dimensions of based on cloud computing using Multiple Criteria Decision Making method
[
Vol.14,
Issue
53
,
54
- Autumn - WinterYear
1401]
Eskandari.Ahmadreza
Design and fabrication of the E-field probe for the measurement of the electromagnetic fields in 5G frequency band
[
Vol.14,
Issue
53
,
54
- Autumn - WinterYear
1401]
Eslami.Mohsen
Power Efficient allocation in C-RAN with Multi access technology selection approach
[
Vol.14,
Issue
53
,
54
- Autumn - WinterYear
1401]
Esmaeeli.Alireza
Extracting Innovation Strategies and Requirements for Telecommunication Companies: Case Study of Telecommunications Infrastructure Company
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
Esmaeili.mahdi
A comprehensive survey on the influence maximization problem in social networks
[
Vol.14,
Issue
53
,
54
- Autumn - WinterYear
1401]
esmaeilpour.mansour
A New Method to computational intelligence to improve network lifetime in wireless sensor networks
[
Vol.7,
Issue
23
- SummerYear
]
esmaili.arefeh
Use of conditional generative adversarial network to produce synthetic data with the aim of improving the classification of users who publish fake news
[
Vol.13,
Issue
47
,
48
- Spring - SummerYear
1400]
Esnaashari.MohammadMahdi
Priority based Deployment of IoT Applications in Fog
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Esnaashari.MohammadMahdi
High Performance Computing: Next Generation Requirements and Research Axes
[
Vol.14,
Issue
51
,
52
- Spring - SummerYear
1401]
Esnaashari.MohammadMahdi
Community-Based Multi-Criteria Placement of Applications in the Fog Environment
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Ezzati.Hashem
The aware genetic algorithm of the best member, applied to graph coloring and metric-dimension of the graph problems
[
Vol.12,
Issue
43
,
44
- Spring - SummerYear
1399]
F
faez.karim
Correcting camera lens misalignment using Zernik moments
[
Vol.2,
Issue
6
,
7
- Autumn - WinterYear
1389]
faez.karim
Blind Correction of Lens Aberration Using Modified Zernike Moments
[
Vol.2,
Issue
5
- Spring - SummerYear
]
faez.karim
Blind correction of camera lens aberration and de-centering error using modified Zernike model
[
Vol.7,
Issue
25
- Spring - SummerYear
]
Faghihi.Seyedeh Fatemeh
Exploring the Role of Artificial Intelligence in the Law Domain: An Exploratory Approach
[
Vol.17,
Issue
63
,
64
- Spring - SummerYear
1404]
fahimnia.fatima
A framework for establishing a national data vault for Data Governance institution
[
Vol.13,
Issue
49
,
50
- Autumn - WinterYear
1400]
farahi.rasoul
Provide A Lightweight Encryption Solution To secure Data In The Internet Of Things
[
Vol.16,
Issue
61
,
62
- Autumn - WinterYear
1403]
Faraji Dizaji.Sajjad
The Effect of ICT Development on Economic and Political Risk: A Cross Country Study
[
Vol.14,
Issue
53
,
54
- Autumn - WinterYear
1401]
farasatkhah.maghsod
Investigation on Faculty Members’ Competency Model in Virtual Environment Comment by the Faculty Members and Students (Based on Ormaner’s Model)
[
Vol.6,
Issue
21
- SpringYear
]
Farazmand.Atefeh
Analysis and Evaluation of the Impact of Sub-Indicators of e-Government Development Index (EGDI) and e-Participation Index (EPI) Using Time Series Data of the Middle East Countries During the Years 2003 to 2022
[
Vol.17,
Issue
63
,
64
- Spring - SummerYear
1404]
Fardinia.Mahdi
Indigenous model of commercialization of complex technologies based on partnership in the ICT sector
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
Farhoodi.Mojgan
Creation of Persian dataset for sentiment analysis in texts published in social networks
[
Vol.17,
Issue
65
,
65
- AutumnYear
1404]
Farhoodi.Mojgan
Persian Stance Detection Based On Multi-Classifier Fusion
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Farhoodi.Mojgan
Presenting a new conceptual model for the field of big data and analyzing the data-driven business in Iran based on the proposed model
[
Vol.13,
Issue
47
,
48
- Spring - SummerYear
1400]
Farivar.Faezeh
Stability Analysis of Networked Control Systems under Denial of Service Attacks using Switching System Theory
[
Vol.13,
Issue
49
,
50
- Autumn - WinterYear
1400]
Farshi.Mohammad
Measuring Similarity for Directed Path in Geometric Data
[
Vol.12,
Issue
45
,
46
- Autumn - WinterYear
1399]
Farzaneh.Mandana
Extracting Innovation Strategies and Requirements for Telecommunication Companies: Case Study of Telecommunications Infrastructure Company
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
Farzaneh.Mandana
Providing a model for evaluating native electronic content in Iran based on value chain
[
Vol.13,
Issue
49
,
50
- Autumn - WinterYear
1400]
Farzi.Saeed
Use of conditional generative adversarial network to produce synthetic data with the aim of improving the classification of users who publish fake news
[
Vol.13,
Issue
47
,
48
- Spring - SummerYear
1400]
Farzi.Saeed
UsERQA: An LLM-Driven User-Aware Community Question Answering System
[
Vol.17,
Issue
65
,
65
- AutumnYear
1404]
Fasanghari.Mahdi
Design and fabrication of the E-field probe for the measurement of the electromagnetic fields in 5G frequency band
[
Vol.14,
Issue
53
,
54
- Autumn - WinterYear
1401]
Fasanghari.Mahdi
Comprehensive Interactive Maturity Model for Mobile government
[
Vol.2,
Issue
3
- SummerYear
]
Fatahi.Somayeh
An approach to prioritize quality dimensions of based on cloud computing using Multiple Criteria Decision Making method
[
Vol.14,
Issue
53
,
54
- Autumn - WinterYear
1401]
Fatemi.Yaghoub
The Participation of Three Brain Tissues in Alzheimer’s disease Diagnosis from Structural MRI
[
Vol.9,
Issue
33
,
34
- Autumn - WinterYear
1396]
Fathi.Mohammad
Providing an Intrusion Detection System in the Industrial Internet of Things Using the Gray Wolf Algorithm
[
Vol.16,
Issue
61
,
62
- Autumn - WinterYear
1403]
Fathian.Mohammad
Provide a conceptual model to identify the quality of electronic services in the country's online stores
[
Vol.8,
Issue
30
,
31
- Autumn - WinterYear
1395]
Fathian.Mohammad
A proper method for the advertising email classification based on user’s profiles
[
Vol.8,
Issue
27
- SpringYear
]
Fathian.Mohammad
COBIT A Suitable Framework for Measuring IT Governance in Organizations
[
Vol.1,
Issue
1
- SpringYear
]
Fathian.Mohammad
A conceptual model for identification of eservices quality in Iranian estores
[
Vol.8,
Issue
29
- SummerYear
]
fathiyan.mohammad
Providing a suitable method for categorizing promotional e-mails based on user profiles
[
Vol.8,
Issue
27
,
28
- Spring - SummerYear
1395]
Feizpour.ٍElham
Prioritization of e-commerce failure factors in technical infrastructure: Meybod city ceramic tile factories
[
Vol.8,
Issue
30
,
31
- Autumn - WinterYear
1395]
Feizpour.ٍElham
The Ranking Lack of Success Factors of Electronic Commerce in Technical Infrastructure in Tile and Ceramic Factories in Meybod County
[
Vol.8,
Issue
29
- SummerYear
]
feyzi.amin
Application of clustering in AODV routing protocol for intercity networks on the highway scenario
[
Vol.8,
Issue
30
,
31
- Autumn - WinterYear
1395]
feyzi.amin
using clustering in AODV routing protocol for vehicular ad-hoc networks on highway scenario
[
Vol.8,
Issue
29
- SummerYear
]
Firozeh.Safora
Information Technology, Strategy Implementation, Information Systems, Strategic Planning, Input-Process-Outcome Framework
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
forootan.faezeh
Applying deep learning for improving the results of sentiment analysis of Persian comments of Online retail stores
[
Vol.15,
Issue
57
,
58
- Autumn - WinterYear
1402]
forouza.amirhossein
Reinforcement of the central axis of tubular structures and its application in extracting the central axis of the portal vein
[
Vol.4,
Issue
14
,
15
- Autumn - WinterYear
1391]
forouza.amirhossein
Medial-axis Enhancement of Tubular Structures and its Application in the Extraction of Portal Veins
[
Vol.4,
Issue
13
- SpringYear
]
G
Gerami.Mohsen
Pathology of software export development in Iran
[
Vol.14,
Issue
51
,
52
- Spring - SummerYear
1401]
Ghaffarzadegan.Mahshid
Extracting Innovation Strategies and Requirements for Telecommunication Companies: Case Study of Telecommunications Infrastructure Company
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
ghanbari.elham
A new algorithm based on ensemble learning for learning to rank in information retrieval
[
Vol.7,
Issue
25
- Spring - SummerYear
]
Gharaee Garakani.Hossein
The Relevance, Importance and Dependence of Critical Infrastructures of The Islamic Republic of Iran from a Cyber-Perspective
[
Vol.16,
Issue
61
,
62
- Autumn - WinterYear
1403]
gharaee.Hosain
The Relevance, Importance and Dependence of Critical Infrastructures of The Islamic Republic of Iran from a Cyber-Perspective
[
Vol.16,
Issue
61
,
62
- Autumn - WinterYear
1403]
Ghasemi.Fateme
Synthetic Photoplethysmogram (PPG) Generation Using Genetic Programming Based Generative Model
[
Vol.17,
Issue
63
,
64
- Spring - SummerYear
1404]
Ghasemi.Mohammad
Exploring the antecedents and consequences of smart good governance using the fuzzy Delphi method (FDM)
[
Vol.14,
Issue
51
,
52
- Spring - SummerYear
1401]
ghasemian.fahime
Performance Improvement of Automatic Language Identification Using GMM-SVM Method
[
Vol.2,
Issue
5
- Spring - SummerYear
]
ghayori.majid
Intrusion Detection Based on Cooperation on the Permissioned Blockchain Platform in the Internet of Things Using Machine Learning
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
ghayori.majid
Improvement of intrusion detection system on Industrial Internet of Things based on deep learning using metaheuristic algorithms
[
Vol.15,
Issue
57
,
58
- Autumn - WinterYear
1402]
ghayori.majid
Incentive reward mechanism for Participants to the human computing system of Intrusion Detection Based on Game Theory
[
Vol.12,
Issue
43
,
44
- Spring - SummerYear
1399]
ghayori.majid
Intrusion Detection Based on Cooperation on the Permissioned Blockchain Platform in the Internet of Things Using Machine Learning
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
ghazanfari.mehdi
COBIT A Suitable Framework for Measuring IT Governance in Organizations
[
Vol.1,
Issue
1
- SpringYear
]
ghazinori.seied sepehr
A Framework for Technology Priority-Setting Using Fuzzy Inference Systems (Case study: Information Technology in Iran)
[
Vol.17,
Issue
63
,
64
- Spring - SummerYear
1404]
ghaznavi.mohammadbagher
Classify and implement hardware trojans and provide a new way to detect them
[
Vol.9,
Issue
31
,
32
- Spring - SummerYear
1396]
ghodselahi.ahmad
A Hybrid Neural Network Ensemble Model for Credit Risk Assessment
[
Vol.6,
Issue
20
,
21
- Spring - SummerYear
1393]
gholamian.mohammadreza
Provide a method for customer segmentation using the RFM model in conditions of uncertainty
[
Vol.8,
Issue
30
,
31
- Autumn - WinterYear
1395]
gholipoor.niloofar
Emerging technologies in future generations of high performance computing: introduction, taxonomy and future research directions
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
Ghorbani.Neda
A Novel Method Based on Tranco for Monitoring Cloud Service Providers
[
Vol.17,
Issue
63
,
64
- Spring - SummerYear
1404]
Ghorbannia Delavar.Arash
WSTMOS: A Method For Optimizing Throughput, Energy, And Latency In Cloud Workflow Scheduling
[
Vol.15,
Issue
57
,
58
- Autumn - WinterYear
1402]
Gilanian Sadeghi.Mohammad Mehdi
Community Detection in Bipartite Networks Using HellRank Centrality Measure
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Gilanian Sadeghi.Mohammad Mehdi
Community Detection in Bipartite Networks Using HellRank Centrality Measure
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
golshani rosta.mehrab ali
An Information Architecture Framework for Utilizing Social Networks in Iranian Higher Education System
[
Vol.5,
Issue
17
- Spring - SummerYear
]
Goodarzi.Babak
New changes of local binary pattern and classification and segmentation of texture images of the seabed
[
Vol.8,
Issue
27
,
28
- Spring - SummerYear
1395]
Goodarzi.Babak
New changes of local binary patterns and classification and segmentation of seabed images
[
Vol.8,
Issue
27
- SpringYear
]
Goudarzi.Pejman
A Novel Method Based on Tranco for Monitoring Cloud Service Providers
[
Vol.17,
Issue
63
,
64
- Spring - SummerYear
1404]
H
habibollahian.ehsan
Three-axis attitude control of a micro-satellite by magnetic actuators through-synthesis robust method
[
Vol.5,
Issue
15
- SummerYear
]
Hadizadeh.Anita
Analysis of the Impact of Artificial Intelligence Application in the Employment Sector and Proposing Priority Solutions for Iran
[
Vol.17,
Issue
65
,
65
- AutumnYear
1404]
Haghighat Monfared.Jalal
Indigenous model of commercialization of complex technologies based on partnership in the ICT sector
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
Haghighathoseini.Atefehsadat
Extracting hospital information technology architecture with the approach of implementation capability in Iran
[
Vol.8,
Issue
27
,
28
- Spring - SummerYear
1395]
Haghighathoseini.Atefehsadat
Extracting the Information Technology architecture of hospitals with approach of Implementing in Iran
[
Vol.8,
Issue
27
- SpringYear
]
haghighathosseini.atefe
Extracting the Information Technology architecture of hospitals with approach of Implementing in Iran
[
Vol.8,
Issue
27
- SpringYear
]
Haghighinasab.Manijeh
A value Co-creation model for Information and Communication Technology Entrepreneurial Ecosystem
[
Vol.13,
Issue
49
,
50
- Autumn - WinterYear
1400]
Haj Seyyed Javadi.Hamid
The Belief of Persian Text Mining Based on Deep Learning with Emotion-Word Separation
[
Vol.16,
Issue
61
,
62
- Autumn - WinterYear
1403]
Hajebi.Elham
Reduction of network load by mapping the application in the network on a chip using the discrete Harris hawk algorithm
[
Vol.14,
Issue
51
,
52
- Spring - SummerYear
1401]
Haji Gholam Saryazdi.Ali
Determining the factors affecting the collective financing of knowledge-based IT companies
[
Vol.10,
Issue
37
,
38
- Autumn - WinterYear
1397]
hajiabdollah.Shaghayegh
Improving polarity identification in sentiment analysis using sarcasm detection and machine learning algorithms in Persian tweets
[
Vol.14,
Issue
53
,
54
- Autumn - WinterYear
1401]
hajmohseni.sadegh
Classify and implement hardware trojans and provide a new way to detect them
[
Vol.9,
Issue
31
,
32
- Spring - SummerYear
1396]
Hakamizadeh.Farshad
Analysis and Evaluation of the Impact of Sub-Indicators of e-Government Development Index (EGDI) and e-Participation Index (EPI) Using Time Series Data of the Middle East Countries During the Years 2003 to 2022
[
Vol.17,
Issue
63
,
64
- Spring - SummerYear
1404]
hakimjavadi.ali
Iran's companion government ecosystem model, analysis and recognition of the main players
[
Vol.7,
Issue
24
,
25
- Spring - SummerYear
1394]
hakimjavadi.ali
Iran's Mobile Government Ecosystem Model, Stakeholders Identification and Analysis
[
Vol.7,
Issue
23
- SummerYear
]
hakkak.mohammad
Provide a model of human resource knowledge architecture in knowledge-based organizations using a mixed approach
[
Vol.11,
Issue
39
,
40
- Spring - SummerYear
1398]
hamze.ali
Improving recommender systems with the help of Semantic Web
[
Vol.9,
Issue
31
,
32
- Spring - SummerYear
1396]
Harounabadi.Ali
Trust Based Link Prediction Using Fuzzy Computational Model in Social Networks
[
Vol.16,
Issue
61
,
62
- Autumn - WinterYear
1403]
hashemi G..S. Alireza
Adaptive Real-Time Decision-Making in the IoT-Based Supply Chain Considering Gradual Orders
[
Vol.17,
Issue
63
,
64
- Spring - SummerYear
1404]
hashemi G..S. Alireza
Provide a new architecture for the decision support system to manage stock trading based on a combination of financial indicators
[
Vol.9,
Issue
31
,
32
- Spring - SummerYear
1396]
hashemi G..S. Alireza
Generalizing The Concept of Business Processes Structural Soundness from Classic Petri-nets to BPMN2.0 Process Models
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
hashemi G..S. Alireza
Generalizing The Concept of Business Processes Structural Soundness from Classic Petri-nets to BPMN2.0 Process Models
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
hashemi G..S. Alireza
A Neighbor-based Link Prediction Method for Bipartite Networks
[
Vol.13,
Issue
47
,
48
- Spring - SummerYear
1400]
Hashemi.Ali
User recommendation in Telegram messenger by graph analysis and mathematical modeling of users' behavior
[
Vol.13,
Issue
49
,
50
- Autumn - WinterYear
1400]
hashemi.MAHDI
Modified orthogonal chaotic colonial competition algorithm and its application in improving pattern recognition in multilayer perceptron neural network
[
Vol.10,
Issue
35
,
36
- Spring - SummerYear
1397]
Hashemi.Mahdi
Improving Opinion Aspect Extraction Using Domain Knowledge and Term Graph
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
hashemi.meisam
Textual analysis of central bank news in forecasting long-term trend of Tehran stock exchange index
[
Vol.12,
Issue
43
,
44
- Spring - SummerYear
1399]
Hashemi.Sattar
Provide a framework for enhancing the security of IoT-based smart homes using the IoT-A reference architecture
[
Vol.10,
Issue
35
,
36
- Spring - SummerYear
1397]
hashempour.raheb
Face recognition and Liveness Detection Based on Speech Recognition for Electronical Authentication
[
Vol.15,
Issue
57
,
58
- Autumn - WinterYear
1402]
hassani.hadise
Determining optimal support vector machines in classification of hyperspectral images based on genetic algorithm
[
Vol.4,
Issue
14
,
15
- Autumn - WinterYear
1391]
hassani.hadise
Determination of Optimum SVMs Based on Genetic Algorithm in Classification of Hyper spectral Imagery
[
Vol.4,
Issue
13
- SpringYear
]
Hassanzadeh.Alireza
Determining the factors affecting the collective financing of knowledge-based IT companies
[
Vol.10,
Issue
37
,
38
- Autumn - WinterYear
1397]
Hassanzadeh.Alireza
Designing a Fuzzy Expert System for Selecting an Appropriate Contractor in Information Technology Outsourcing
[
Vol.2,
Issue
5
- Spring - SummerYear
]
Haydari.Saeed
Assessing E-Government Readiness in Iranian Universities, Case Study: Tarbiat Modares University
[
Vol.12,
Issue
43
,
44
- Spring - SummerYear
1399]
Hayeri Khyavi.Masoud
Emerging technologies in future generations of high performance computing: introduction, taxonomy and future research directions
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
hazratgholizadeh.rahim
Providing a suitable method for categorizing promotional e-mails based on user profiles
[
Vol.8,
Issue
27
,
28
- Spring - SummerYear
1395]
hazratgholizadeh.rahim
A proper method for the advertising email classification based on user’s profiles
[
Vol.8,
Issue
27
- SpringYear
]
heidary.mohsen
Analysis of the current situation ICT in rural areas of the country (using the Delphi Method)
[
Vol.6,
Issue
19
- AutumnYear
]
Helfroush.Mohammad Sadegh
The Participation of Three Brain Tissues in Alzheimer’s disease Diagnosis from Structural MRI
[
Vol.9,
Issue
33
,
34
- Autumn - WinterYear
1396]
Hendiazad.Parnian
Challenges of Blockchain Implementation in Supply Chain: A Multi-Criteria Decision-Making Approach
[
Vol.17,
Issue
63
,
64
- Spring - SummerYear
1404]
Hendijani.Rosa
E-Government Service Supply Chain: Identifying Performance Evaluation Indicators (Case Study of e-Customs System in Iran)
[
Vol.14,
Issue
53
,
54
- Autumn - WinterYear
1401]
Heshmati.Zainabolhoda
Optimum modeling of patient satisfaction with the doctor based on machine learning methods
[
Vol.7,
Issue
24
,
25
- Spring - SummerYear
1394]
Heshmati.Zainabolhoda
Providing an optimal method for dispatching an ambulance based on complex networks and artificial intelligence
[
Vol.7,
Issue
24
,
25
- Spring - SummerYear
1394]
Heshmati.Zainabolhoda
An optimised hybrid method for ambulance dispatch based on complex networks and Artificial Intelligence
[
Vol.7,
Issue
23
- SummerYear
]
Heshmati.Zainabolhoda
Optimized Modeling for satisfaction in the relationship between a physician and patient based on machine learnin methods
[
Vol.7,
Issue
23
- SummerYear
]
heydari.jamshid
An Investigation on the Effect of Multifactor Model of Improving Critical Thinking in E-learning Environments
[
Vol.6,
Issue
21
- SpringYear
]
homayooni.maryam
Evaluation of SIP signaling implementation using QoS parameters
[
Vol.1,
Issue
1
- SpringYear
]
Homayounpour.Mohammad Mehdi
Performance Improvement of Automatic Language Identification Using GMM-SVM Method
[
Vol.2,
Issue
5
- Spring - SummerYear
]
honarparvaran.hamid
Designing a system dynamics model for upgrading policy Iran Information and Communication Technology Network Indicators
[
Vol.8,
Issue
30
,
31
- Autumn - WinterYear
1395]
honarparvaran.hamid
Design a Model Of System Dynamics (SD) On The Policy Of Upgrading Indices Of Iran ICT Network
[
Vol.8,
Issue
29
- SummerYear
]
Hosein khani.Fateme
Trust Based Link Prediction Using Fuzzy Computational Model in Social Networks
[
Vol.16,
Issue
61
,
62
- Autumn - WinterYear
1403]
Hossayni.Sayyed Ali
Noor Analysis: A Benchmark Dataset for Evaluating Morphological Analysis Engines
[
Vol.15,
Issue
57
,
58
- Autumn - WinterYear
1402]
Hossayni.Sayyed Ali
A Review on Hadith Text Processing Tasks
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Hossayni.Sayyed Ali
A Review on Hadith Text Processing Tasks
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Hosseinali-Zade.Sasan
A review of the application of meta-heuristic algorithms in load balancing in cloud computing
[
Vol.14,
Issue
53
,
54
- Autumn - WinterYear
1401]
hosseinfirooze.zaker
A Fast Method to Compute Radiation Fields of Shaped Reflector Antennas by FFT
[
Vol.1,
Issue
2
,
3
- Autumn - WinterYear
1387]
Hosseini.Mohammad Reza
The framework of the national macro plan for transparency and information release based on the grounded theory method
[
Vol.15,
Issue
57
,
58
- Autumn - WinterYear
1402]
Hosseini.Monireh
Providing a Blockchain-Based Method to Protect Users’ Privacy in Social Networks
[
Vol.16,
Issue
61
,
62
- Autumn - WinterYear
1403]
Hosseini.Seyed Abdolrasoul
Exploring the antecedents and consequences of smart good governance using the fuzzy Delphi method (FDM)
[
Vol.14,
Issue
51
,
52
- Spring - SummerYear
1401]
Hosseini.Seyed Mohammad
Confidential Payload Attribution on Encrypted Traffic of Enterprise Networks
[
Vol.17,
Issue
63
,
64
- Spring - SummerYear
1404]
Hosseini.Seyedeh Motahareh
Identify and analyze decision points and key players in procurement process in the EPC companies
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
Hosseinpour.Mehdi
Open Data Accessing Policymaking in Iran, in the Aspect of Preserving Privacy and Personal Data Ownership
[
Vol.14,
Issue
51
,
52
- Spring - SummerYear
1401]
Hosseinzadeh.Elham
Investigating the Information and Communication Technology Deployment Impact on Energy Expenditures of Iranian households (A Provincial Approach)
[
Vol.13,
Issue
49
,
50
- Autumn - WinterYear
1400]
Hossieni bayan.Shaghayeghsadat
High Performance Computing: Next Generation Requirements and Research Axes
[
Vol.14,
Issue
51
,
52
- Spring - SummerYear
1401]
houri.masa
Medial-axis Enhancement of Tubular Structures and its Application in the Extraction of Portal Veins
[
Vol.4,
Issue
13
- SpringYear
]
J
Jabraeil Jamali.Mohammad Ali
طراحی پردازنده مبتنی بر FPGA برای الگوریتمهای رمزنگاری سری SHA-2
[
Vol.10,
Issue
37
,
38
- Autumn - WinterYear
1397]
Jafarali Jassbi.Somayyeh
Priority based Deployment of IoT Applications in Fog
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Jafarali Jassbi.Somayyeh
Community-Based Multi-Criteria Placement of Applications in the Fog Environment
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
jafari fesharaki.shekoofeh
A Satellite Control Method Using Laguerre Model Predictive Control Approach
[
Vol.5,
Issue
15
- SummerYear
]
jafari novimipour.nima
Scheduling tasks in cloud environments using mapping framework - reduction and genetic algorithm
[
Vol.10,
Issue
37
,
38
- Autumn - WinterYear
1397]
jafari novimipour.nima
Using a multi-objective optimization algorithm for tasks allocate in the cloud-based systems to reduce energy consumption
[
Vol.12,
Issue
43
,
44
- Spring - SummerYear
1399]
Jafari.Bagher
A novel metaheuristic algorithm and its discrete form for influence maximizing in complex networks
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
jafari.mahdi
A New Algorithm for Fastintra-Frame Modes Selection in H.264/Avc Video Coding
[
Vol.7,
Issue
26
,
27
- Autumn - WinterYear
1394]
jafari.pejman
Prioritizing Virtual Reality Functions in the B2B Customer Journey Using the Fuzzy SWARA Method
[
Vol.17,
Issue
63
,
64
- Spring - SummerYear
1404]
Jafari.Seyed Mohammadbagher
Provide methodology for selecting IT project management strategy
[
Vol.10,
Issue
37
,
38
- Autumn - WinterYear
1397]
Jafari.Seyed Mohammadbagher
Data-driven Marketing in Digital Businesses from Dynamic Capabilities View
[
Vol.14,
Issue
53
,
54
- Autumn - WinterYear
1401]
jahanbakhsh.mojtaba
Evaluation of SIP signaling implementation using QoS parameters
[
Vol.1,
Issue
1
- SpringYear
]
jahangir.amir hosein
Confidential Payload Attribution on Encrypted Traffic of Enterprise Networks
[
Vol.17,
Issue
63
,
64
- Spring - SummerYear
1404]
jam.Shahrokh
Parametric analysis of a broadband Archimedean spiral antenna with cavity
[
Vol.9,
Issue
33
,
34
- Autumn - WinterYear
1396]
Jami Pour.Mona
Information Technology, Strategy Implementation, Information Systems, Strategic Planning, Input-Process-Outcome Framework
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
Jami Pour.Mona
Exploring the Role of Artificial Intelligence in the Law Domain: An Exploratory Approach
[
Vol.17,
Issue
63
,
64
- Spring - SummerYear
1404]
jamipour.mona
Provide methodology for selecting IT project management strategy
[
Vol.10,
Issue
37
,
38
- Autumn - WinterYear
1397]
Jampour.Mehdi
An efficient Two Pathways Deep Architecture for Soccer Goal Recognition towards Soccer Highlight Summarization
[
Vol.13,
Issue
49
,
50
- Autumn - WinterYear
1400]
Javidan.Javidan
New changes of local binary pattern and classification and segmentation of texture images of the seabed
[
Vol.8,
Issue
27
,
28
- Spring - SummerYear
1395]
Javidan.Javidan
New changes of local binary patterns and classification and segmentation of seabed images
[
Vol.8,
Issue
27
- SpringYear
]
Javidani.Ali
Analysis of Traffic Data for Congestion Detection Using Machine Learning Algorithms
[
Vol.17,
Issue
63
,
64
- Spring - SummerYear
1404]
K
kaedi.marjan
Textual analysis of central bank news in forecasting long-term trend of Tehran stock exchange index
[
Vol.12,
Issue
43
,
44
- Spring - SummerYear
1399]
kahani.mohsen
Generating Personalized Explanations for Twitter List Recommendations Using Semantic Similarity of Hashtags
[
Vol.16,
Issue
61
,
62
- Autumn - WinterYear
1403]
kalantari.nadia
Designing a fuzzy expert system for choosing the right contractor in information technology outsourcing
[
Vol.2,
Issue
6
,
7
- Autumn - WinterYear
1389]
kalantari.nadia
Designing a Fuzzy Expert System for Selecting an Appropriate Contractor in Information Technology Outsourcing
[
Vol.2,
Issue
5
- Spring - SummerYear
]
Kalantari.Reza
computer security models and proposing a new perspective: A review paper
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Kalantari.Reza
A Survey on Computer Security Patterns and Proposing a New Perspective
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Kalhor.Melika
Automatic identification of personality traits using X contents based on Myers Briggs index
[
Vol.17,
Issue
65
,
65
- AutumnYear
1404]
kamareiy.malihe
Matched grouping of learners in e-learning environment using council clustering method
[
Vol.11,
Issue
39
,
40
- Spring - SummerYear
1398]
Karamizadeh.Sasan
New Method to Improve Illumination Variations in Adult Images Based on Fuzzy Deep Neural Network
[
Vol.11,
Issue
41
,
42
- Autumn - WinterYear
1398]
karbasi.mostafa
Adaptive rotation models and traffic patterns to reduce light loss in networks on optical chip
[
Vol.10,
Issue
35
,
36
- Spring - SummerYear
1397]
Karbasi.Soheila
Fast and accurate concept drift detection from event logs
[
Vol.12,
Issue
43
,
44
- Spring - SummerYear
1399]
kardan.AhmadAgha
Presenting a model for extracting information from text documents, based on text-mining in the field of e-learning
[
Vol.4,
Issue
12
,
13
- Spring - SummerYear
1391]
kargari.mehrdad
Liquidity Risk Prediction Using News Sentiment Analysis
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
Karimi.Hossein
The Effect of ICT Development on Economic and Political Risk: A Cross Country Study
[
Vol.14,
Issue
53
,
54
- Autumn - WinterYear
1401]
karimi.keyvan
Window-Shopping as an Effective Element to Improve Viral Marketing
[
Vol.2,
Issue
3
- SummerYear
]
Karimpour.Davod
User recommendation in Telegram messenger by graph analysis and mathematical modeling of users' behavior
[
Vol.13,
Issue
49
,
50
- Autumn - WinterYear
1400]
kaveh.manije
Investigation the role of personality and individual differences on password security breaches: An Empirical Study
[
Vol.13,
Issue
49
,
50
- Autumn - WinterYear
1400]
kavoshtehrani.masoud
Modification of medium transfer detector for target tracking with variable radiation pattern
[
Vol.4,
Issue
14
,
15
- Autumn - WinterYear
1391]
kavoshtehrani.masoud
Improvement of mean shift tracker for tracking of target with variable photometric pattern
[
Vol.4,
Issue
13
- SpringYear
]
Kazemi Rad.Omolbanin
Exploring the Role of Artificial Intelligence in the Law Domain: An Exploratory Approach
[
Vol.17,
Issue
63
,
64
- Spring - SummerYear
1404]
kazemian.sirous
A model information technology adoption in academic research projects in the filed ICT based on Information Technology Adoption Integrated Modeling (ITAIM)
[
Vol.11,
Issue
41
,
42
- Autumn - WinterYear
1398]
Keimasi.Masoud
Employing a meta-synthesis to present a framework for commercial banks’ preparedness indicators in use of blockchain technology
[
Vol.13,
Issue
49
,
50
- Autumn - WinterYear
1400]
Keramati.Mohammad Ali
Anomaly and Intrusion Detection through Datamining and Feature Selection using PSO Algorithm
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Keramati.Mohammad Ali
Anomaly and Intrusion Detection Through Data Mining and Feature Selection using PSO Algorithm
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Kermani.Aminolah
Using Sentiment Analysis and Combining Classifiers for Spam Detection in Twitter
[
Vol.14,
Issue
51
,
52
- Spring - SummerYear
1401]
Keyhanipour.Amir Hosein
Survey on the Applications of the Graph Theory in the Information Retrieval
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Keyhanipour.Amir Hosein
Learning to Rank for the Persian Web Using the Layered Genetic Programming
[
Vol.10,
Issue
37
,
38
- Autumn - WinterYear
1397]
Keyhanipour.Amir Hosein
Survey on the Applications of the Graph Theory in the Information Retrieval
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
khademzade.ahmad
Adaptive rotation models and traffic patterns to reduce light loss in networks on optical chip
[
Vol.10,
Issue
35
,
36
- Spring - SummerYear
1397]
KHALAJJ.ELHAM
Presenting the model for opinion mining at the document feature level for hotel users' reviews
[
Vol.13,
Issue
49
,
50
- Autumn - WinterYear
1400]
khalili.ali
Semiautomatic Creation of Enterprise Mashups Using Semantic Descriptions
[
Vol.2,
Issue
3
- SummerYear
]
Khalili.Zahra
Employing a meta-synthesis to present a framework for commercial banks’ preparedness indicators in use of blockchain technology
[
Vol.13,
Issue
49
,
50
- Autumn - WinterYear
1400]
Khansari.Mohammad
Explanation of Standardization Role in the Proposed Solutions for Privacy Protection in Health Data
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Khansari.Mohammad
Explanation the role of standardization in the proposed solutions for privacy protection in health data
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Khansari.Mohammad
A RPL-based Routing Algorithm for Multimedia Traffic for the Internet of Things
[
Vol.13,
Issue
47
,
48
- Spring - SummerYear
1400]
Khansari.Mohammad
Synthesizing an image dataset for text detection and recognition in images
[
Vol.14,
Issue
53
,
54
- Autumn - WinterYear
1401]
kharati.ehsan
Increasing the value of collected data and reducing energy consumption by using network coding and mobile sinks in wireless sensor networks
[
Vol.12,
Issue
43
,
44
- Spring - SummerYear
1399]
Kharrat.Mahmood
A novel framework for policymaking and evaluation of digital government
[
Vol.17,
Issue
63
,
64
- Spring - SummerYear
1404]
Kharrat.Mahmood
Providing a model for evaluating native electronic content in Iran based on value chain
[
Vol.13,
Issue
49
,
50
- Autumn - WinterYear
1400]
Khashei.vahid
The role of organizational factors on consumer buying behavior in social networks
[
Vol.12,
Issue
45
,
46
- Autumn - WinterYear
1399]
Khasteh.Seyed Hossein
Fuzzy Multicore Clustering of Big Data in the Hadoop Map Reduce Framework
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
Khasteh.Seyed Hossein
Improving Efficiency of Finding Frequent Subgraphs in Graph Stream Using gMatrix Summarization
[
Vol.12,
Issue
45
,
46
- Autumn - WinterYear
1399]
khatan Lo.hasan
Document Clustering Based On Ontology and Fuzzy Approach
[
Vol.5,
Issue
17
- Spring - SummerYear
]
Khatibi.Amid
A Novel Method based on the Cocomo model to increase the accuracy of software projects effort estimates
[
Vol.12,
Issue
45
,
46
- Autumn - WinterYear
1399]
kherad.mahdi
Comparing A Hybridization of Fuzzy Inference System and Particle Swarm Optimization Algorithm with Deep Learning to Predict Stock Prices
[
Vol.11,
Issue
41
,
42
- Autumn - WinterYear
1398]
Kherad.Mehdi
Designing A New Genetic-Fuzzy Type 2 Approach to Evaluate Self-Adaptive Systems by Software Quality Indicators
[
Vol.16,
Issue
61
,
62
- Autumn - WinterYear
1403]
khezr.nima
Scheduling tasks in cloud environments using mapping framework - reduction and genetic algorithm
[
Vol.10,
Issue
37
,
38
- Autumn - WinterYear
1397]
Khodadadi.Amir
A Framework for Technology Priority-Setting Using Fuzzy Inference Systems (Case study: Information Technology in Iran)
[
Vol.17,
Issue
63
,
64
- Spring - SummerYear
1404]
Khodaverdian.Zeinab
Predicting the workload of virtual machines in order to reduce energy consumption in cloud data centers using the combination of deep learning models
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
khorsandi.siavash
Cyber Threats Foresight Against Iran Based on Attack Vector
[
Vol.9,
Issue
33
,
34
- Autumn - WinterYear
1396]
Khosroshahi.Mahan
A Multi-Objective Differential Evolutionary Algorithm-based Approach for Resource Allocation in Cloud Computing Environment
[
Vol.14,
Issue
51
,
52
- Spring - SummerYear
1401]
Khosrozadeh.Ali
Community Detection in Bipartite Networks Using HellRank Centrality Measure
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Khosrozadeh.Ali
Community Detection in Bipartite Networks Using HellRank Centrality Measure
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
khotanloo.hassan
A New Method to computational intelligence to improve network lifetime in wireless sensor networks
[
Vol.7,
Issue
23
- SummerYear
]
Khunjush.Farshad
Investigating the Effect of Hardware Parameters Adjustments on Energy Consumption in Thin Matrix Multiplication Algorithm on GPUs
[
Vol.9,
Issue
31
,
32
- Spring - SummerYear
1396]
Khunjush.Farshad
Investigating the Effects of Hardware Parameters on Power Consumptions in SPMV Algorithms on Graphics Processing Units (GPUs)
[
Vol.9,
Issue
31
- Spring - SummerYear
]
kiani.koorosh
Design of Secure Communication System by Use of Synchronization of Chaotic Systems
[
Vol.2,
Issue
3
- SummerYear
]
Kiani.Vahid
Two Fuzzy Virtual Force Algorithms to Improve Sensor Deployment in Wireless Sensor Networks
[
Vol.14,
Issue
51
,
52
- Spring - SummerYear
1401]
Koochari.Abbas
Investigating an Approach to Identify and Classify Mutants Based on the Characteristics of Mutants with Machine Learning Algorithms
[
Vol.16,
Issue
61
,
62
- Autumn - WinterYear
1403]
L
lak.behzad
Analysing students' learning through morning exercise using data mining techniques
[
Vol.13,
Issue
49
,
50
- Autumn - WinterYear
1400]
Layeghi.Kamran
Sentiment analysis for stock market predection with deep neural network: A case study for international corporate stock database
[
Vol.13,
Issue
47
,
48
- Spring - SummerYear
1400]
Layeghi.Kamran
An efficient Two Pathways Deep Architecture for Soccer Goal Recognition towards Soccer Highlight Summarization
[
Vol.13,
Issue
49
,
50
- Autumn - WinterYear
1400]
lormohammad hasani esfandghe.yahya
Incentive reward mechanism for Participants to the human computing system of Intrusion Detection Based on Game Theory
[
Vol.12,
Issue
43
,
44
- Spring - SummerYear
1399]
M
madani.mohammadhosein
Increasing data throughput in HF channel by decision feedback equalizer employing MC-FQRD-RLS algorithm and weight extraction in data mode
[
Vol.5,
Issue
15
- SummerYear
]
Mafi.Zohreh
Regression Test Time Reduction in Test Driven Development
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Mafi.Zohreh
Test case Selection based on Test-Driven Development
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Maghsoudi.Hamid
Improved routing for load balancing in wireless sensor networks on the Internet of things, based on multiple ant colony algorithm
[
Vol.14,
Issue
51
,
52
- Spring - SummerYear
1401]
mahdinejadnouri.mohammad
Increasing data throughput in HF channel by decision feedback equalizer employing MC-FQRD-RLS algorithm and weight extraction in data mode
[
Vol.5,
Issue
15
- SummerYear
]
mahjour.ali
Provide a basic method for estimating software projects based on logical transactions
[
Vol.9,
Issue
31
,
32
- Spring - SummerYear
1396]
Mahyar.Hamidreza
Community Detection in Bipartite Networks Using HellRank Centrality Measure
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Mahyar.Hamidreza
Community Detection in Bipartite Networks Using HellRank Centrality Measure
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Majidnezhad.Vahid
A novel metaheuristic algorithm and its discrete form for influence maximizing in complex networks
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
makhlooghi.morteza
Semi-blind labeling of images using SVD in the field of discrete wavelet transform
[
Vol.2,
Issue
6
,
7
- Autumn - WinterYear
1389]
makhlooghi.morteza
DWT-SVD based Semi-Blind Digital Image Watermarking
[
Vol.2,
Issue
5
- Spring - SummerYear
]
maleki.davood
A Novel Method Based on Tranco for Monitoring Cloud Service Providers
[
Vol.17,
Issue
63
,
64
- Spring - SummerYear
1404]
maleki.davood
Presenting a novel solution to choose a proper database for storing big data in national network services
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
maleki.davood
Providing a New Solution in Selecting Suitable Databases for Storing Big Data in the National Information Network
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
maleki.reza
Persian digit recognition system in aerial writing based on depth image
[
Vol.10,
Issue
35
,
36
- Spring - SummerYear
1397]
Malekinia.Mohammad
The Relevance, Importance and Dependence of Critical Infrastructures of The Islamic Republic of Iran from a Cyber-Perspective
[
Vol.16,
Issue
61
,
62
- Autumn - WinterYear
1403]
Manavi Mofrad.Hosna
Multi-level ternary quantization for improving sparsity and computation in embedded deep neural networks
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Manavi Mofrad.Hosna
Multi-Level Ternary Quantization for Improving Sparsity and Computation in Embedded Deep Neural Networks
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
manian.amir
Prioritization of e-commerce failure factors in technical infrastructure: Meybod city ceramic tile factories
[
Vol.8,
Issue
30
,
31
- Autumn - WinterYear
1395]
Mansoorizadeh.Muharram
Discover product defect reports from the text of users' online comments
[
Vol.10,
Issue
35
,
36
- Spring - SummerYear
1397]
mansour.hakimeh
Sentiment analysis for stock market predection with deep neural network: A case study for international corporate stock database
[
Vol.13,
Issue
47
,
48
- Spring - SummerYear
1400]
Mansouri.Alireza
A Novel Method Based on Tranco for Monitoring Cloud Service Providers
[
Vol.17,
Issue
63
,
64
- Spring - SummerYear
1404]
Mansouri.Alireza
Computational Models of Opinion Formation in Social Networks and Their Dimensions
[
Vol.17,
Issue
65
,
65
- AutumnYear
1404]
mansouri.bijan
Provide a new architecture for the decision support system to manage stock trading based on a combination of financial indicators
[
Vol.9,
Issue
31
,
32
- Spring - SummerYear
1396]
Mansoury.Masoud
Provide a new architecture for the decision support system to manage stock trading based on a combination of financial indicators
[
Vol.9,
Issue
31
,
32
- Spring - SummerYear
1396]
Manthouri.Mohammad
Fault Diagnosis and Detection in Photovoltaic Systems Using Neural Network VGG16
[
Vol.16,
Issue
61
,
62
- Autumn - WinterYear
1403]
manzouri.mohammadtaghi
A Novel Model based on Encoder-Decoder Architecture and Attention Mechanism for Automatic Abstractive Text Summarization
[
Vol.14,
Issue
51
,
52
- Spring - SummerYear
1401]
mashayekhi.alinaghi
Determining the factors affecting the collective financing of knowledge-based IT companies
[
Vol.10,
Issue
37
,
38
- Autumn - WinterYear
1397]
Mazoochi.Mojtaba
The framework of the national macro plan for transparency and information release based on the grounded theory method
[
Vol.15,
Issue
57
,
58
- Autumn - WinterYear
1402]
Mazoochi.Mojtaba
Synthesizing an image dataset for text detection and recognition in images
[
Vol.14,
Issue
53
,
54
- Autumn - WinterYear
1401]
mehdizadeh.younes
Detecting Distributed Denial of Service Attacks in Software-Defined Networks with a Deep Learning Approach
[
Vol.17,
Issue
63
,
64
- Spring - SummerYear
1404]
Mehrabani.Ghorbanali
Identifying the Key Drivers of Digital Signature Implementation in Iran (using fuzzy Delphi method)
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Mehrabani.Ghorbanali
Identifying the Key Drivers of Digital Signature Implementation in Iran (Using Fuzzy Delphi Method)
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Mehrabi.Javad
Drivers, Obstacles and consequences of digital entrepreneurship in Iran's road freight transportation industry
[
Vol.15,
Issue
57
,
58
- Autumn - WinterYear
1402]
mehraeen.mohammad
Explanation of Standardization Role in the Proposed Solutions for Privacy Protection in Health Data
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
mehraeen.mohammad
Explanation the role of standardization in the proposed solutions for privacy protection in health data
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
mehrshad.batool
Explanation of Standardization Role in the Proposed Solutions for Privacy Protection in Health Data
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
mehrshad.batool
Explanation the role of standardization in the proposed solutions for privacy protection in health data
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
memarmoghada.alireza
Improvement of mean shift tracker for tracking of target with variable photometric pattern
[
Vol.4,
Issue
13
- SpringYear
]
Memarzadeh.Gholamreza
Presenting the ICT Policies Implementation Model of the 6th Development Using the Neural Network Method
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Memarzadeh.Gholamreza
Presenting the ICT Policies Implementation Model of the 6th Development Using the Neural Network Method
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
milani.farzaneh
بررسی تاثیر استفاده از انواع استراتژی¬های بازاریابی در شبکههای اجتماعی بر جلب اعتماد مشتریان شورایی
[
Vol.11,
Issue
39
,
40
- Spring - SummerYear
1398]
Minaei.Behrooz
Noor Analysis: A Benchmark Dataset for Evaluating Morphological Analysis Engines
[
Vol.15,
Issue
57
,
58
- Autumn - WinterYear
1402]
Minaei.Behrooz
A Review on Hadith Text Processing Tasks
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Minaei.Behrooz
A Review on Hadith Text Processing Tasks
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Minaei.Behrooz
A comprehensive survey on the influence maximization problem in social networks
[
Vol.14,
Issue
53
,
54
- Autumn - WinterYear
1401]
Minoofam.Seyyed Amir Hadi
A Decision Support System based on Rough sets for Enterprise Planning under uncertainty
[
Vol.13,
Issue
47
,
48
- Spring - SummerYear
1400]
mirashk.hamed
Liquidity Risk Prediction Using News Sentiment Analysis
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
Mirghfoori.Seyyed Habibollah
Digital Twin: Embracing the Fourth Industrial Revolution in Food Supply Chain Management (A Dynamic Analysis)
[
Vol.17,
Issue
63
,
64
- Spring - SummerYear
1404]
miri.maryam
A Research Over the Obstacles and Influential Factors on Development of e-Learning Subjects from Perspective of Beneficiaries of CME Program in Jahrom University of Medical Sciences in 2012-2013
[
Vol.6,
Issue
21
- SpringYear
]
mirian.mirian
Regression Test Time Reduction in Test Driven Development
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
mirian.mirian
Test case Selection based on Test-Driven Development
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
mirmohammadsadeghi.hamid
A Fast Method to Compute Radiation Fields of Shaped Reflector Antennas by FFT
[
Vol.1,
Issue
2
,
3
- Autumn - WinterYear
1387]
Mirsaeedghazi.Tahereh
Providing a model for evaluating native electronic content in Iran based on value chain
[
Vol.13,
Issue
49
,
50
- Autumn - WinterYear
1400]
Mirsaeedghazi.Tahereh
Open Data Accessing Policymaking in Iran, in the Aspect of Preserving Privacy and Personal Data Ownership
[
Vol.14,
Issue
51
,
52
- Spring - SummerYear
1401]
Mirtaheri.Seyedeh Leili
Improving IoT resource management using fog calculations and ant lion optimization algorithm
[
Vol.15,
Issue
57
,
58
- Autumn - WinterYear
1402]
Mirtaheri.Seyedeh Leili
Increasing Total Throughput, Reducing Outage to Zero, and Reducing Power Consumption in a Cellular Network
[
Vol.14,
Issue
53
,
54
- Autumn - WinterYear
1401]
Mirzaee Ghazani.Majid
Challenges of Blockchain Implementation in Supply Chain: A Multi-Criteria Decision-Making Approach
[
Vol.17,
Issue
63
,
64
- Spring - SummerYear
1404]
Mirzarezaee.Mitra
Automatic identification of personality traits using X contents based on Myers Briggs index
[
Vol.17,
Issue
65
,
65
- AutumnYear
1404]
Mirzarezaee.Mitra
Improving polarity identification in sentiment analysis using sarcasm detection and machine learning algorithms in Persian tweets
[
Vol.14,
Issue
53
,
54
- Autumn - WinterYear
1401]
Moallem.Payman
Modification of medium transfer detector for target tracking with variable radiation pattern
[
Vol.4,
Issue
14
,
15
- Autumn - WinterYear
1391]
Moallem.Payman
Improvement of mean shift tracker for tracking of target with variable photometric pattern
[
Vol.4,
Issue
13
- SpringYear
]
Moallem.Payman
Modified orthogonal chaotic colonial competition algorithm and its application in improving pattern recognition in multilayer perceptron neural network
[
Vol.10,
Issue
35
,
36
- Spring - SummerYear
1397]
moeini jahromi.mohammad
Online Estimation and Improvement of Cache Soft Error Vulnerability
[
Vol.17,
Issue
63
,
64
- Spring - SummerYear
1404]
Moeini.Ali
Survey on the Applications of the Graph Theory in the Information Retrieval
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Moeini.Ali
Survey on the Applications of the Graph Theory in the Information Retrieval
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
mohamadian.ََُAyoub
Data-driven Marketing in Digital Businesses from Dynamic Capabilities View
[
Vol.14,
Issue
53
,
54
- Autumn - WinterYear
1401]
Mohammadi Chinisaz.ّFatemeh
Adaptive Real-Time Decision-Making in the IoT-Based Supply Chain Considering Gradual Orders
[
Vol.17,
Issue
63
,
64
- Spring - SummerYear
1404]
mohammadi.abbas
The Impact of IQ Imbalance on the BER of Adaptive Modulation in the MIMO System
[
Vol.1,
Issue
1
- SpringYear
]
mohammadi.ali
Designing a system dynamics model for upgrading policy Iran Information and Communication Technology Network Indicators
[
Vol.8,
Issue
30
,
31
- Autumn - WinterYear
1395]
mohammadi.amir
Using a Hybrid PSO-GA Method for Capacitor Placement in Distribution Systems
[
Vol.6,
Issue
20
,
21
- Spring - SummerYear
1393]
mohammadi.majid
Application of clustering in AODV routing protocol for intercity networks on the highway scenario
[
Vol.8,
Issue
30
,
31
- Autumn - WinterYear
1395]
mohammadi.majid
A New Algorithm for Fastintra-Frame Modes Selection in H.264/Avc Video Coding
[
Vol.7,
Issue
26
,
27
- Autumn - WinterYear
1394]
Mohammadi.Nasim
Three Dimensional Beamforming in Multi User Multi Antenna Cellular Networks with Randomly Distributed Users
[
Vol.14,
Issue
53
,
54
- Autumn - WinterYear
1401]
Mohammadi.Nazila
Presenting the ICT Policies Implementation Model of the 6th Development Using the Neural Network Method
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Mohammadi.Nazila
Presenting the ICT Policies Implementation Model of the 6th Development Using the Neural Network Method
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Mohammadi.Shahram
Persian digit recognition system in aerial writing based on depth image
[
Vol.10,
Issue
35
,
36
- Spring - SummerYear
1397]
mohammadi.shahriyar
The main components of evaluating the credibility of users according to organizational goals in the life cycle of big data
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
mohammadi.shahriyar
Criteria for evaluating the effectiveness of social media users - a framework based on social media exploration
[
Vol.11,
Issue
39
,
40
- Spring - SummerYear
1398]
mohammadi.shahriyar
Semiautomatic Creation of Enterprise Mashups Using Semantic Descriptions
[
Vol.2,
Issue
3
- SummerYear
]
mohammadi.shahriyar
Window-Shopping as an Effective Element to Improve Viral Marketing
[
Vol.2,
Issue
3
- SummerYear
]
mohammadi.shahriyar
Presenting the model for opinion mining at the document feature level for hotel users' reviews
[
Vol.13,
Issue
49
,
50
- Autumn - WinterYear
1400]
mohammadi.shahriyar
A Study On Visual Cryptography and Providing a Proposed Method for Color Images Cryptography
[
Vol.6,
Issue
20
,
21
- Spring - SummerYear
1393]
mohammadi.sudabeh
Improving imperialist competitive algorithm for solving the nodes placement problem in three-dimensional grid wireless sensor networks
[
Vol.12,
Issue
45
,
46
- Autumn - WinterYear
1399]
Mohammadi.Zahra
Increasing the lifetime of underwater acoustic sensor networks by optimal relay node placement
[
Vol.12,
Issue
45
,
46
- Autumn - WinterYear
1399]
Mohammadnezhad Fadard.Mansoureh
The effect of emotional intelligence of project managers on the effectiveness of team communication in Iranian research institutes (Case study: Research Institute of Communication and Information Technology)
[
Vol.15,
Issue
57
,
58
- Autumn - WinterYear
1402]
MOHAMMADZADEH.AMIR
Valuation of digital services in Iran: Empirical proof for Google and Instagram
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
Mohebikhah.Bita
Estimating the Value of Digital Economy Core Spillover in Iran
[
Vol.15,
Issue
57
,
58
- Autumn - WinterYear
1402]
Mohtarami.amir
A framework for architecture the electronic trust in e-commerce:online shopping segment
[
Vol.15,
Issue
57
,
58
- Autumn - WinterYear
1402]
molaee fard.reza
Presenting a web recommender system for user nose pages using DBSCAN clustering algorithm and machine learning SVM method.
[
Vol.15,
Issue
57
,
58
- Autumn - WinterYear
1402]
Mollamotalebi.Mahdi
Improving the load balancing in Cloud computing using a rapid SFL algorithm (R-SFLA)
[
Vol.15,
Issue
57
,
58
- Autumn - WinterYear
1402]
moltaji.milad
Investigation the role of personality and individual differences on password security breaches: An Empirical Study
[
Vol.13,
Issue
49
,
50
- Autumn - WinterYear
1400]
Momtazi.Saeedeh
Sentiment analysis for stock market predection with deep neural network: A case study for international corporate stock database
[
Vol.13,
Issue
47
,
48
- Spring - SummerYear
1400]
monadjemi.Amir Hassan
Door detection based on car vision in outdoor scenes
[
Vol.8,
Issue
30
,
31
- Autumn - WinterYear
1395]
monadjemi.Amir Hassan
Segmentation of exterior color images for the purpose of object recognition using histogram with double accuracy
[
Vol.4,
Issue
14
,
15
- Autumn - WinterYear
1391]
monadjemi.Amir Hassan
Outdoor Color Scene Segmentation towards Object Detection using Dual-Resolution Histograms
[
Vol.4,
Issue
14
- Autumn - WinterYear
1391]
montazer.gholamali
Assessing E-Government Readiness in Iranian Universities, Case Study: Tarbiat Modares University
[
Vol.12,
Issue
43
,
44
- Spring - SummerYear
1399]
montazer.gholamali
A Framework for Technology Priority-Setting Using Fuzzy Inference Systems (Case study: Information Technology in Iran)
[
Vol.17,
Issue
63
,
64
- Spring - SummerYear
1404]
montazer.gholamali
Matched grouping of learners in e-learning environment using council clustering method
[
Vol.11,
Issue
39
,
40
- Spring - SummerYear
1398]
montazer.gholamali
Automatic Sepration of Learnrs in Learning Groups Based on Identifying Learning Style from Their Behavior in Learning Environment
[
Vol.6,
Issue
21
- SpringYear
]
montazer.gholamali
Design and implementation of a fuzzy expert system for suspicious behavior detection in e-banking system
[
Vol.1,
Issue
1
- SpringYear
]
montazer.gholamali
Optimal LO Selection in E-Learning Environment Using PSO Algorithm
[
Vol.6,
Issue
21
- SpringYear
]
montazer.gholamali
Designing a personalized e-learning system using learners' characteristics and implementing it with the gamification elements
[
Vol.13,
Issue
47
,
48
- Spring - SummerYear
1400]
moomivand.hussein
An Investigation into the Provider Factors of Knowledge Management in the Kermanshah province Communication Company
[
Vol.7,
Issue
25
- Spring - SummerYear
]
Moradhassel.Niloufar
Estimating the Value of Digital Economy Core Spillover in Iran
[
Vol.15,
Issue
57
,
58
- Autumn - WinterYear
1402]
moradi.farshad
Evaluation of e-learning with optimal mining approach 1 case study: Iran's higher education
[
Vol.4,
Issue
12
,
13
- Spring - SummerYear
1391]
Moradi.Gholamreza
Design, simulation and performance comparison of radating elements of reflect array antenna
[
Vol.5,
Issue
15
- SummerYear
]
moradi.hossein
An Investigation on the Effect of Multifactor Model of Improving Critical Thinking in E-learning Environments
[
Vol.6,
Issue
21
- SpringYear
]
moradi.mahmood
A Managerial Examination of the Successful Parameters in the B2C Business
[
Vol.5,
Issue
17
- Spring - SummerYear
]
Morsali.Mehdi
A review of the application of meta-heuristic algorithms in load balancing in cloud computing
[
Vol.14,
Issue
53
,
54
- Autumn - WinterYear
1401]
Mortazavi kahangi.Azam sadtat
Drivers, Obstacles and consequences of digital entrepreneurship in Iran's road freight transportation industry
[
Vol.15,
Issue
57
,
58
- Autumn - WinterYear
1402]
Mortazavi.Azam Sadat
Analysis of the Impact of Artificial Intelligence Application in the Employment Sector and Proposing Priority Solutions for Iran
[
Vol.17,
Issue
65
,
65
- AutumnYear
1404]
Mortazavi.Farzaneh
A RPL-based Routing Algorithm for Multimedia Traffic for the Internet of Things
[
Vol.13,
Issue
47
,
48
- Spring - SummerYear
1400]
mortazavi.saeed
Explanation of Standardization Role in the Proposed Solutions for Privacy Protection in Health Data
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
mortazavi.saeed
Explanation the role of standardization in the proposed solutions for privacy protection in health data
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
mosammami.shila
A Managerial Examination of the Successful Parameters in the B2C Business
[
Vol.5,
Issue
17
- Spring - SummerYear
]
mosavi.najmoddin
Provide a model of human resource knowledge architecture in knowledge-based organizations using a mixed approach
[
Vol.11,
Issue
39
,
40
- Spring - SummerYear
1398]
mosleh.mohammad
Presenting a web recommender system for user nose pages using DBSCAN clustering algorithm and machine learning SVM method.
[
Vol.15,
Issue
57
,
58
- Autumn - WinterYear
1402]
moslehi.zahra
Classification of two-level data with hyperrectangles parallel to the coordinate axes
[
Vol.7,
Issue
26
,
27
- Autumn - WinterYear
1394]
moslehi.zahra
Classifying Two Class data using Hyper Rectangle Parallel to the Coordinate Axes
[
Vol.7,
Issue
25
- Spring - SummerYear
]
moslehshirazi.alinaghi
Designing a system dynamics model for upgrading policy Iran Information and Communication Technology Network Indicators
[
Vol.8,
Issue
30
,
31
- Autumn - WinterYear
1395]
movaghar.movaghar
Community Detection in Bipartite Networks Using HellRank Centrality Measure
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
movaghar.movaghar
Community Detection in Bipartite Networks Using HellRank Centrality Measure
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
movahedi sefat.mohammad reza
The Local Strategic Model of Smart Police of The Islamic Republic of Iran
[
Vol.16,
Issue
61
,
62
- Autumn - WinterYear
1403]
movahedi.masoud
A model information technology adoption in academic research projects in the filed ICT based on Information Technology Adoption Integrated Modeling (ITAIM)
[
Vol.11,
Issue
41
,
42
- Autumn - WinterYear
1398]
mozafari.azime
Provide a method for customer segmentation using the RFM model in conditions of uncertainty
[
Vol.8,
Issue
30
,
31
- Autumn - WinterYear
1395]
mozafari.azime
A method for clustering customers using RFM model and grey numbers in terms of uncertainty
[
Vol.8,
Issue
29
- SummerYear
]
mozafari.sahar
WSTMOS: A Method For Optimizing Throughput, Energy, And Latency In Cloud Workflow Scheduling
[
Vol.15,
Issue
57
,
58
- Autumn - WinterYear
1402]
Mozayani.َAmir Hossein
Investigating the Information and Communication Technology Deployment Impact on Energy Expenditures of Iranian households (A Provincial Approach)
[
Vol.13,
Issue
49
,
50
- Autumn - WinterYear
1400]
Mozayani.َAmir Hossein
The Effect of ICT Development on Economic and Political Risk: A Cross Country Study
[
Vol.14,
Issue
53
,
54
- Autumn - WinterYear
1401]
N
Naderi.Shaghayegh
Application identification through intelligent traffic classification
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Naderi.Shaghayegh
Application Identification Through Intelligent Traffic Classification
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
naghdeforoshhs.mona
Heuristic algorithms for pseudo-triangulation random point set in the plane
[
Vol.5,
Issue
16
,
17
- Spring - SummerYear
1392]
naghshineh.Nader
A framework for establishing a national data vault for Data Governance institution
[
Vol.13,
Issue
49
,
50
- Autumn - WinterYear
1400]
naji.hamidreza
A Hybrid Neural Network Ensemble Model for Credit Risk Assessment
[
Vol.6,
Issue
20
,
21
- Spring - SummerYear
1393]
Najjar-Ghabel.Samad
Automatic Lung Diseases Identification using Discrete Cosine Transform-based Features in Radiography Images
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
Narimani.mahboobeh
Investigating the Degree of Application of Professional Ethics and Vocational Qualifications by the Faculty Members of Virtual Universities of Isfahan and Medical Sciences University of Isfahan
[
Vol.6,
Issue
21
- SpringYear
]
nasehifar.vahid
The role of organizational factors on consumer buying behavior in social networks
[
Vol.12,
Issue
45
,
46
- Autumn - WinterYear
1399]
Naseri.Saleheh
Generating Personalized Explanations for Twitter List Recommendations Using Semantic Similarity of Hashtags
[
Vol.16,
Issue
61
,
62
- Autumn - WinterYear
1403]
nasrollahi.marziye
Provide methodology for selecting IT project management strategy
[
Vol.10,
Issue
37
,
38
- Autumn - WinterYear
1397]
Nassiri.Mohammad
Improving performance of probe-based rate control mechanisms using classification: evaluation on an experimental testbed for High Throughput WLANs
[
Vol.12,
Issue
43
,
44
- Spring - SummerYear
1399]
Nazari Soleimandarabi.Mojdeh
Predicting the workload of virtual machines in order to reduce energy consumption in cloud data centers using the combination of deep learning models
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
Nejadali.Mahnaz
A New Algorithm for Fastintra-Frame Modes Selection in H.264/Avc Video Coding
[
Vol.7,
Issue
26
,
27
- Autumn - WinterYear
1394]
nemati.hasanali
Prioritization of e-commerce failure factors in technical infrastructure: Meybod city ceramic tile factories
[
Vol.8,
Issue
30
,
31
- Autumn - WinterYear
1395]
nematifard.narges
Discover product defect reports from the text of users' online comments
[
Vol.10,
Issue
35
,
36
- Spring - SummerYear
1397]
nematollahzadeh.mahmood
Emerging technologies in future generations of high performance computing: introduction, taxonomy and future research directions
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
Nezarat.Amin
A Novel Model for detecting intrusion with Mobile Agent and Game theory
[
Vol.8,
Issue
27
- SpringYear
]
nikkhoo.mohammad
Design of Secure Communication System by Use of Synchronization of Chaotic Systems
[
Vol.2,
Issue
3
- SummerYear
]
nikmard.babak
Trust Management Based on User Feedback in Cloud Computing Environment by Using Cuckoo Optimization Algorithm
[
Vol.16,
Issue
61
,
62
- Autumn - WinterYear
1403]
Nikoosefat Rad.Zahra
Prioritizing Virtual Reality Functions in the B2B Customer Journey Using the Fuzzy SWARA Method
[
Vol.17,
Issue
63
,
64
- Spring - SummerYear
1404]
nili.mohammadreza
An Investigation on the Effect of Multifactor Model of Improving Critical Thinking in E-learning Environments
[
Vol.6,
Issue
21
- SpringYear
]
noorani.fateme
A Framework for Identifying and Ranking Criteria for Evaluating the Quality of Electronic Services (Case studies: Golestan website of Payame-noor university)
[
Vol.5,
Issue
18
,
19
- Autumn - WinterYear
1392]
norollah.ali
Heuristic algorithms for pseudo-triangulation random point set in the plane
[
Vol.5,
Issue
16
,
17
- Spring - SummerYear
1392]
noroozy.Hamed
A design of Rectangular Waveguide TM11 to TE10 Mode Converter for S-band Applications
[
Vol.9,
Issue
33
,
34
- Autumn - WinterYear
1396]
noroozy.Hamed
Parametric analysis of a broadband Archimedean spiral antenna with cavity
[
Vol.9,
Issue
33
,
34
- Autumn - WinterYear
1396]
Nosrati Nahook.Hassan
Introducing a new optimal energy method for targets tracking in wireless sensor network using a hunting search algorithm
[
Vol.14,
Issue
51
,
52
- Spring - SummerYear
1401]
Nosrati Nahook.Hassan
Reducing Energy Consumption in Tracking the Red Palm Weevil Using Wireless Sensor Networks and Nature-Inspired Evolutionary Algorithms (Fruit Fly Optimization Algorithm and Lion Swarm Optimization Algorithm)
[
Vol.17,
Issue
63
,
64
- Spring - SummerYear
1404]
nourazar.fateme
A matching probability-based flood algorithm for mobile ad hoc networks
[
Vol.2,
Issue
6
,
7
- Autumn - WinterYear
1389]
nourazar.fateme
Adaptive Probabilistic Flooding for Ad Hoc Networks
[
Vol.2,
Issue
5
- Spring - SummerYear
]
Nozhat.Najmeh
Improvement of the bulk sensitivity and FoM of the plasmonic nanodipole antenna array
[
Vol.9,
Issue
33
,
34
- Autumn - WinterYear
1396]
Nozhat.Najmeh
Improving the directivity of the plasmonic sectoral horn nanoantenna using lens in its aperture
[
Vol.9,
Issue
33
,
34
- Autumn - WinterYear
1396]
O
ojaghi.hamed
Artefacts and Producers Mapping of Iran's Artificial Intelligence Ecosystem based on Transformational Levels
[
Vol.15,
Issue
57
,
58
- Autumn - WinterYear
1402]
omrani.mahdi
Cyber Threats Foresight Against Iran Based on Attack Vector
[
Vol.9,
Issue
33
,
34
- Autumn - WinterYear
1396]
oskouiezade.reza
Effect of Menu Location on Visual Attention of Users of Websites
[
Vol.5,
Issue
17
- Spring - SummerYear
]
P
Padidaran Moghaddam.Farhang
Fake Websites Detection Improvement Using Multi-Layer Artificial Neural Network Classifier with Ant Lion Optimizer Algorithm
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
Padidaran Moghaddam.Farhang
Improved routing for load balancing in wireless sensor networks on the Internet of things, based on multiple ant colony algorithm
[
Vol.14,
Issue
51
,
52
- Spring - SummerYear
1401]
Paki.Reza
A Novel Multi-Step Ahead Demand Forecasting Model Based on Deep Learning Techniques and Time Series Augmentation
[
Vol.14,
Issue
53
,
54
- Autumn - WinterYear
1401]
Pakniyat.Samane
A design of Rectangular Waveguide TM11 to TE10 Mode Converter for S-band Applications
[
Vol.9,
Issue
33
,
34
- Autumn - WinterYear
1396]
palhang.palhang
Classification of two-level data with hyperrectangles parallel to the coordinate axes
[
Vol.7,
Issue
26
,
27
- Autumn - WinterYear
1394]
palhang.palhang
Classifying Two Class data using Hyper Rectangle Parallel to the Coordinate Axes
[
Vol.7,
Issue
25
- Spring - SummerYear
]
parsa.saeed
Applying genetic algorithm for automatic service identification based on quality metrics
[
Vol.6,
Issue
19
- AutumnYear
]
Parsaei Fard.Saeideh
Power Efficient allocation in C-RAN with Multi access technology selection approach
[
Vol.14,
Issue
53
,
54
- Autumn - WinterYear
1401]
Pazari.Mohsen
A value Co-creation model for Information and Communication Technology Entrepreneurial Ecosystem
[
Vol.13,
Issue
49
,
50
- Autumn - WinterYear
1400]
Pedram.Mir Mohsen
Improving polarity identification in sentiment analysis using sarcasm detection and machine learning algorithms in Persian tweets
[
Vol.14,
Issue
53
,
54
- Autumn - WinterYear
1401]
Piran.Mohamad Javad
An access control model for online social networks using user-to-user relationships
[
Vol.12,
Issue
45
,
46
- Autumn - WinterYear
1399]
pirmohamadiani.rojiar
The main components of evaluating the credibility of users according to organizational goals in the life cycle of big data
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
pirmohammadiani.rojyar
Criteria for evaluating the effectiveness of social media users - a framework based on social media exploration
[
Vol.11,
Issue
39
,
40
- Spring - SummerYear
1398]
Piroozmand.Maryam
Survey on the Applications of the Graph Theory in the Information Retrieval
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Piroozmand.Maryam
Survey on the Applications of the Graph Theory in the Information Retrieval
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Pishdar.Mohamad
Modeling and evaluation of RPL routing protocol by colored Petri nets
[
Vol.14,
Issue
53
,
54
- Autumn - WinterYear
1401]
Poormirzaee.Saeid
Design of Distributed Consensus Controller for Leader-Follower Singular Multi-Agent Systems in the Presence of Sensor Fault
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
Pouladsadeh.Ali
Evaluation of Interpolation Methods for Estimating the Fading Channels in Digital TV Broadcasting
[
Vol.15,
Issue
57
,
58
- Autumn - WinterYear
1402]
pour yousefi dargah.hossein
Identification and Prioritization of Parameters Affecting Information Security Management System (Case Study: Social Security Branches of Guilan Province)
[
Vol.10,
Issue
35
,
36
- Spring - SummerYear
1397]
pourasad.yaghoub
Modeling and simulation of the central generator of the pattern to produce curved-linear motions in the snake robot
[
Vol.12,
Issue
43
,
44
- Spring - SummerYear
1399]
Pourmahmood Aghababa.Mohammad
Routing of Multipartite Computer Networks Using Ant Genetic Algorithm
[
Vol.9,
Issue
31
,
32
- Spring - SummerYear
1396]
Pourmahmood Aghababa.Mohammad
Multicast computer network routing using genetic algorithm and ant colony
[
Vol.9,
Issue
31
- Spring - SummerYear
]
Poursoltani.Yahya
Generalizing The Concept of Business Processes Structural Soundness from Classic Petri-nets to BPMN2.0 Process Models
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Poursoltani.Yahya
Generalizing The Concept of Business Processes Structural Soundness from Classic Petri-nets to BPMN2.0 Process Models
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
R
rabani.fateme
Polar Diagram of Points with Moving Pole
[
Vol.11,
Issue
41
,
42
- Autumn - WinterYear
1398]
Rabiei.Leila
Synthesizing an image dataset for text detection and recognition in images
[
Vol.14,
Issue
53
,
54
- Autumn - WinterYear
1401]
Rabiei.Mohammad
Applying deep learning for improving the results of sentiment analysis of Persian comments of Online retail stores
[
Vol.15,
Issue
57
,
58
- Autumn - WinterYear
1402]
rafizadeh kasani.ramin
Identification and Prioritization of Parameters Affecting Information Security Management System (Case Study: Social Security Branches of Guilan Province)
[
Vol.10,
Issue
35
,
36
- Spring - SummerYear
1397]
rahbar.kambiz
Correcting camera lens misalignment using Zernik moments
[
Vol.2,
Issue
6
,
7
- Autumn - WinterYear
1389]
rahbar.kambiz
Blind Correction of Lens Aberration Using Modified Zernike Moments
[
Vol.2,
Issue
5
- Spring - SummerYear
]
rahbar.kambiz
Blind correction of camera lens aberration and de-centering error using modified Zernike model
[
Vol.7,
Issue
25
- Spring - SummerYear
]
Rahmani.Farzaneh
Synthesizing an image dataset for text detection and recognition in images
[
Vol.14,
Issue
53
,
54
- Autumn - WinterYear
1401]
rahmani.marziye
Provide a conceptual model to identify the quality of electronic services in the country's online stores
[
Vol.8,
Issue
30
,
31
- Autumn - WinterYear
1395]
raja.mehdi
A Novel Model for detecting intrusion with Mobile Agent and Game theory
[
Vol.8,
Issue
27
- SpringYear
]
Rajabi.Jan Mohammad
Applying genetic algorithm for automatic service identification based on quality metrics
[
Vol.6,
Issue
19
- AutumnYear
]
rajabzadeh ghotri.ali
Determining the factors affecting the collective financing of knowledge-based IT companies
[
Vol.10,
Issue
37
,
38
- Autumn - WinterYear
1397]
rajabzadeh ghotri.ali
The effect of Internet of Things (IOT) implementation on the Rail Freight Industry; A futures study approach
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
rajabzadeh ghotri.ali
Design and implementation of a survival model for patients with melanoma based on data mining algorithms
[
Vol.15,
Issue
57
,
58
- Autumn - WinterYear
1402]
rajabzadeh ghotri.ali
Explaining the adoption process of software-oriented networks (SDN) using the foundational data method and systems approach
[
Vol.14,
Issue
51
,
52
- Spring - SummerYear
1401]
Raji.Mohsen
A Task Mapping and Scheduling Algorithm based on Genetic Algorithm for Embedded System Design
[
Vol.13,
Issue
47
,
48
- Spring - SummerYear
1400]
Raji.Mohsen
An Intrusion Detection System based on Deep Learning for CAN Bus
[
Vol.15,
Issue
57
,
58
- Autumn - WinterYear
1402]
ramak.mehrab
The Local Strategic Model of Smart Police of The Islamic Republic of Iran
[
Vol.16,
Issue
61
,
62
- Autumn - WinterYear
1403]
ranaei.habibollah
Designing a system dynamics model for upgrading policy Iran Information and Communication Technology Network Indicators
[
Vol.8,
Issue
30
,
31
- Autumn - WinterYear
1395]
Rashidi.Hassan
A Decision Support System based on Rough sets for Enterprise Planning under uncertainty
[
Vol.13,
Issue
47
,
48
- Spring - SummerYear
1400]
rasouli.behtaj
A Model for impacts of Investment in IT on customer satisfaction, using Structural Equation Modeling and Path Analysis
[
Vol.5,
Issue
15
- SummerYear
]
Rastegar.Mohammad Ali
Liquidity Risk Prediction Using News Sentiment Analysis
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
rasti.javad
Segmentation of exterior color images for the purpose of object recognition using histogram with double accuracy
[
Vol.4,
Issue
14
,
15
- Autumn - WinterYear
1391]
rasti.javad
Outdoor Color Scene Segmentation towards Object Detection using Dual-Resolution Histograms
[
Vol.4,
Issue
14
- Autumn - WinterYear
1391]
ravaie.yahya
Increasing data throughput in HF channel by decision feedback equalizer employing MC-FQRD-RLS algorithm and weight extraction in data mode
[
Vol.5,
Issue
15
- SummerYear
]
Ravanmehr.Reza
context-aware travel recommender system exploiting from Geo-tagged photos
[
Vol.11,
Issue
41
,
42
- Autumn - WinterYear
1398]
Razavizadeh.S. Mohammad
Three Dimensional Beamforming in Multi User Multi Antenna Cellular Networks with Randomly Distributed Users
[
Vol.14,
Issue
53
,
54
- Autumn - WinterYear
1401]
Razi.Ali
Agile Enterprise Architecture Modeling: Evaluating the Applicability of Six Modeling Standards based on Iran’s National EA Framework
[
Vol.13,
Issue
47
,
48
- Spring - SummerYear
1400]
Razi.Ali
Presenting a Method for Agile Enterprise Architecture Modeling
[
Vol.16,
Issue
61
,
62
- Autumn - WinterYear
1403]
reshadi.midia
Adaptive rotation models and traffic patterns to reduce light loss in networks on optical chip
[
Vol.10,
Issue
35
,
36
- Spring - SummerYear
1397]
Rezaee.Ali
Priority based Deployment of IoT Applications in Fog
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Rezaee.Ali
Community-Based Multi-Criteria Placement of Applications in the Fog Environment
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
rezaei malek.narges
Model to improve banking by Using customer knowledge management and Mobile Banking and Its Impact on Customer Loyalty
[
Vol.9,
Issue
31
- Spring - SummerYear
]
Rezaei Rahvard.Hamid
Improving Code Coverage Metrics for Discovering Vulnerabilities in Stateful Network Protocols using Hybrid Fuzzing
[
Vol.16,
Issue
61
,
62
- Autumn - WinterYear
1403]
Rezaei.Fereidoon
Anomaly and Intrusion Detection through Datamining and Feature Selection using PSO Algorithm
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Rezaei.Fereidoon
Anomaly and Intrusion Detection Through Data Mining and Feature Selection using PSO Algorithm
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Rezaei.Mehran
Textual analysis of central bank news in forecasting long-term trend of Tehran stock exchange index
[
Vol.12,
Issue
43
,
44
- Spring - SummerYear
1399]
rezaei.mohammad
A model for improving banking services using customer knowledge management and mobile banking and examining its impact on customer loyalty in Bank Mellat
[
Vol.9,
Issue
31
,
32
- Spring - SummerYear
1396]
rezaei.mohammad sadegh
Automatic Sepration of Learnrs in Learning Groups Based on Identifying Learning Style from Their Behavior in Learning Environment
[
Vol.6,
Issue
21
- SpringYear
]
rezaei.narges
A model for improving banking services using customer knowledge management and mobile banking and examining its impact on customer loyalty in Bank Mellat
[
Vol.9,
Issue
31
,
32
- Spring - SummerYear
1396]
Rostami.ali
Analysis of Scenarios for the Use of Cryptocurrencies in the Islamic Republic of Iran
[
Vol.17,
Issue
63
,
64
- Spring - SummerYear
1404]
S
sabaei.sabaei
A matching probability-based flood algorithm for mobile ad hoc networks
[
Vol.2,
Issue
6
,
7
- Autumn - WinterYear
1389]
sabaei.sabaei
Adaptive Probabilistic Flooding for Ad Hoc Networks
[
Vol.2,
Issue
5
- Spring - SummerYear
]
saberi.nafise
Personalized E-learning Environment Using Fuzzy Recommender System base on Combination of Learning Style and Cognitive Trait
[
Vol.2,
Issue
3
- SummerYear
]
Sadeghi B..Mahshid
Fake Websites Detection Improvement Using Multi-Layer Artificial Neural Network Classifier with Ant Lion Optimizer Algorithm
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
Sadeghi Bigham.Bahram
Polar Diagram of Points with Moving Pole
[
Vol.11,
Issue
41
,
42
- Autumn - WinterYear
1398]
sadeghi hariri.mehrdad
Modified orthogonal chaotic colonial competition algorithm and its application in improving pattern recognition in multilayer perceptron neural network
[
Vol.10,
Issue
35
,
36
- Spring - SummerYear
1397]
sadeghi.mostafa
پردازش تصاویر ورق های فولادی به منظور آشکارسازی عیوب به کمک موجک گابور
[
Vol.4,
Issue
14
,
15
- Autumn - WinterYear
1391]
sadeghi.mostafa
Image Processing of steel sheets for Defect Detection by using Gabor Wavelet
[
Vol.4,
Issue
13
- SpringYear
]
sadeghzadeh.mehdi
Detecting Distributed Denial of Service Attacks in Software-Defined Networks with a Deep Learning Approach
[
Vol.17,
Issue
63
,
64
- Spring - SummerYear
1404]
sadjadi.Hadi
computer security models and proposing a new perspective: A review paper
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
sadjadi.Hadi
A Survey on Computer Security Patterns and Proposing a New Perspective
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Sadr.Hossein
Predicting the workload of virtual machines in order to reduce energy consumption in cloud data centers using the combination of deep learning models
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
Sadr.Hossein
An Intelligent Model for Multidimensional Personality Recognition of Users using Deep Learning Methods
[
Vol.13,
Issue
47
,
48
- Spring - SummerYear
1400]
saedi.abdollah
Provide a model of human resource knowledge architecture in knowledge-based organizations using a mixed approach
[
Vol.11,
Issue
39
,
40
- Spring - SummerYear
1398]
Saeidi.Zeinab
Measuring Similarity for Directed Path in Geometric Data
[
Vol.12,
Issue
45
,
46
- Autumn - WinterYear
1399]
Safaie.Nasser
Challenges of Blockchain Implementation in Supply Chain: A Multi-Criteria Decision-Making Approach
[
Vol.17,
Issue
63
,
64
- Spring - SummerYear
1404]
Safari dehnavi.Vahid
Stock market prediction using optimized grasshopper optimization algorithm and time series algorithms
[
Vol.14,
Issue
53
,
54
- Autumn - WinterYear
1401]
Safari.Ehram
The effect of emotional intelligence of project managers on the effectiveness of team communication in Iranian research institutes (Case study: Research Institute of Communication and Information Technology)
[
Vol.15,
Issue
57
,
58
- Autumn - WinterYear
1402]
safari.mojtaba
COBIT A Suitable Framework for Measuring IT Governance in Organizations
[
Vol.1,
Issue
1
- SpringYear
]
saghafi.fateme
Comprehensive Interactive Maturity Model for Mobile government
[
Vol.2,
Issue
3
- SummerYear
]
saghafi.Fatemeh
Indigenous model of commercialization of complex technologies based on partnership in the ICT sector
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
saghafi.Fatemeh
A Collaborative Filtering Movie Recommendation System Based on Users Correlation and Weighted K-Means with High Accuracy
[
Vol.14,
Issue
51
,
52
- Spring - SummerYear
1401]
saghafi.Fatemeh
Optimum modeling of patient satisfaction with the doctor based on machine learning methods
[
Vol.7,
Issue
24
,
25
- Spring - SummerYear
1394]
saghafi.Fatemeh
The Relevance, Importance and Dependence of Critical Infrastructures of The Islamic Republic of Iran from a Cyber-Perspective
[
Vol.16,
Issue
61
,
62
- Autumn - WinterYear
1403]
Saghafi.Fatemeh
Optimized Modeling for satisfaction in the relationship between a physician and patient based on machine learnin methods
[
Vol.7,
Issue
23
- SummerYear
]
Sahargahi.Vahideh
A novel metaheuristic algorithm and its discrete form for influence maximizing in complex networks
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
Saketi.Parviz
Drivers, Obstacles and consequences of digital entrepreneurship in Iran's road freight transportation industry
[
Vol.15,
Issue
57
,
58
- Autumn - WinterYear
1402]
sakhaei nia.mahdi
Discover product defect reports from the text of users' online comments
[
Vol.10,
Issue
35
,
36
- Spring - SummerYear
1397]
sakhaei.mahdi
Improving performance of probe-based rate control mechanisms using classification: evaluation on an experimental testbed for High Throughput WLANs
[
Vol.12,
Issue
43
,
44
- Spring - SummerYear
1399]
Sakhaie.Mohammadali
Analysis of Scenarios for the Use of Cryptocurrencies in the Islamic Republic of Iran
[
Vol.17,
Issue
63
,
64
- Spring - SummerYear
1404]
salari.mahdieh
A Novel Method based on the Cocomo model to increase the accuracy of software projects effort estimates
[
Vol.12,
Issue
45
,
46
- Autumn - WinterYear
1399]
Salarzehi.Habibollah
Exploring the antecedents and consequences of smart good governance using the fuzzy Delphi method (FDM)
[
Vol.14,
Issue
51
,
52
- Spring - SummerYear
1401]
Saleh Gorgory.Maryam
Pathology of software export development in Iran
[
Vol.14,
Issue
51
,
52
- Spring - SummerYear
1401]
salehesfahani.mahmood
A Framework for Identifying and Ranking Criteria for Evaluating the Quality of Electronic Services (Case studies: Golestan website of Payame-noor university)
[
Vol.5,
Issue
18
,
19
- Autumn - WinterYear
1392]
Salehi.Mostafa
Multi-level ternary quantization for improving sparsity and computation in embedded deep neural networks
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Salehi.Mostafa
Online Estimation and Improvement of Cache Soft Error Vulnerability
[
Vol.17,
Issue
63
,
64
- Spring - SummerYear
1404]
Salehi.Mostafa
Multi-Level Ternary Quantization for Improving Sparsity and Computation in Embedded Deep Neural Networks
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
salehi.rezvan
Investigation the role of personality and individual differences on password security breaches: An Empirical Study
[
Vol.13,
Issue
49
,
50
- Autumn - WinterYear
1400]
Salimi.Kiomars
Improving the load balancing in Cloud computing using a rapid SFL algorithm (R-SFLA)
[
Vol.15,
Issue
57
,
58
- Autumn - WinterYear
1402]
salkhordeh haghighi.mehdi
Improving Code Coverage Metrics for Discovering Vulnerabilities in Stateful Network Protocols using Hybrid Fuzzing
[
Vol.16,
Issue
61
,
62
- Autumn - WinterYear
1403]
salkhordeh haghighi.mehdi
Introducing a genetic algorithm based Method for Community person's stance Detection in social media and news
[
Vol.11,
Issue
41
,
42
- Autumn - WinterYear
1398]
salkhordeh haghighi.mehdi
Using Sentiment Analysis and Combining Classifiers for Spam Detection in Twitter
[
Vol.14,
Issue
51
,
52
- Spring - SummerYear
1401]
Samadi.Behnam
High Performance Computing: Next Generation Requirements and Research Axes
[
Vol.14,
Issue
51
,
52
- Spring - SummerYear
1401]
samadzadegan.farhad
Determining optimal support vector machines in classification of hyperspectral images based on genetic algorithm
[
Vol.4,
Issue
14
,
15
- Autumn - WinterYear
1391]
samadzadegan.farhad
Determination of Optimum SVMs Based on Genetic Algorithm in Classification of Hyper spectral Imagery
[
Vol.4,
Issue
13
- SpringYear
]
samie.mohammad ebrahim
Improving recommender systems with the help of Semantic Web
[
Vol.9,
Issue
31
,
32
- Spring - SummerYear
1396]
sanaei.farinaz
Design and implementation of a survival model for patients with melanoma based on data mining algorithms
[
Vol.15,
Issue
57
,
58
- Autumn - WinterYear
1402]
Sanagoo ye Moharrer.MohammadAli
Improving Sentiment Analysis in Persian text based on combination of Stacked Auto-Encoder and Transformer-BiLSTM-CNN
[
Vol.17,
Issue
65
,
65
- AutumnYear
1404]
sarlak.hosein
The Analysis of User Reviews on Digikala with the Aim of Detecting Deceptive Opinions
[
Vol.17,
Issue
65
,
65
- AutumnYear
1404]
saroukhani.leila
Design and implementation of a fuzzy expert system for suspicious behavior detection in e-banking system
[
Vol.1,
Issue
1
- SpringYear
]
sato.youshi
Medial-axis Enhancement of Tubular Structures and its Application in the Extraction of Portal Veins
[
Vol.4,
Issue
13
- SpringYear
]
Sattari.Mohammad
An Improved Method Based on Label Propagation and Greedy Approaches for Community Detection in Dynamic Social Networks
[
Vol.12,
Issue
43
,
44
- Spring - SummerYear
1399]
Sattari-Naeini.Vahid
Application of clustering in AODV routing protocol for intercity networks on the highway scenario
[
Vol.8,
Issue
30
,
31
- Autumn - WinterYear
1395]
Sattari-Naeini.Vahid
Reduction of network load by mapping the application in the network on a chip using the discrete Harris hawk algorithm
[
Vol.14,
Issue
51
,
52
- Spring - SummerYear
1401]
SayadHaghighi.Mohammad
Stability Analysis of Networked Control Systems under Denial of Service Attacks using Switching System Theory
[
Vol.13,
Issue
49
,
50
- Autumn - WinterYear
1400]
Sebghati.Mohammadali
Evaluation of Interpolation Methods for Estimating the Fading Channels in Digital TV Broadcasting
[
Vol.15,
Issue
57
,
58
- Autumn - WinterYear
1402]
sebti.ali
Fast and accurate concept drift detection from event logs
[
Vol.12,
Issue
43
,
44
- Spring - SummerYear
1399]
sedghahrabi.neda
طراحی پردازنده مبتنی بر FPGA برای الگوریتمهای رمزنگاری سری SHA-2
[
Vol.10,
Issue
37
,
38
- Autumn - WinterYear
1397]
seif.fatemeh
Effect of Menu Location on Visual Attention of Users of Websites
[
Vol.5,
Issue
17
- Spring - SummerYear
]
Seifi.Younes
Modeling and evaluation of RPL routing protocol by colored Petri nets
[
Vol.14,
Issue
53
,
54
- Autumn - WinterYear
1401]
Seirafian.vahid
Applying the combined SPIHT-DCT method using spatial and spatial-temporal scaling to encode video images
[
Vol.4,
Issue
14
,
15
- Autumn - WinterYear
1391]
Seirafian.vahid
SPIHT-DCT hybrid method using Placement spatial scalability and Place - when encoding a video HDTV
[
Vol.4,
Issue
14
- Autumn - WinterYear
1391]
sepahvand.abdollah
Emerging technologies in future generations of high performance computing: introduction, taxonomy and future research directions
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
sepahvand.reza
Provide a model of human resource knowledge architecture in knowledge-based organizations using a mixed approach
[
Vol.11,
Issue
39
,
40
- Spring - SummerYear
1398]
sepehri.akram
Geometric embedding of the tree in points inside a polygon with minimum number of bends
[
Vol.2,
Issue
4
,
5
- Spring - SummerYear
1389]
sepehri.mehdi
Iran's Mobile Government Ecosystem Model, Stakeholders Identification and Analysis
[
Vol.7,
Issue
23
- SummerYear
]
setayeshi.saeed
Trust Based Link Prediction Using Fuzzy Computational Model in Social Networks
[
Vol.16,
Issue
61
,
62
- Autumn - WinterYear
1403]
Seyyedi Saravi.Mohsen
Increasing Total Throughput, Reducing Outage to Zero, and Reducing Power Consumption in a Cellular Network
[
Vol.14,
Issue
53
,
54
- Autumn - WinterYear
1401]
shabooei.saeid
Improving resource allocation in mobile edge computing using gray wolf and particle swarm optimization algorithms
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
shabooei.saeid
Improving Resource Allocation in Mobile Edge Computing Using Particle Swarm and Gray Wolf Optimization Algorithms
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
shadmehr.mojtaba
Optimized Modeling for satisfaction in the relationship between a physician and patient based on machine learnin methods
[
Vol.7,
Issue
23
- SummerYear
]
shafaghizade.somaye
Integrating Data Envelopment Analysis and Decision Tree Models in Order to Evaluate Information Technology-Based Units
[
Vol.8,
Issue
27
- SpringYear
]
shafiee.masoud
Cyber Threats Foresight Against Iran Based on Attack Vector
[
Vol.9,
Issue
33
,
34
- Autumn - WinterYear
1396]
shafiee.masoud
پردازش تصاویر ورق های فولادی به منظور آشکارسازی عیوب به کمک موجک گابور
[
Vol.4,
Issue
14
,
15
- Autumn - WinterYear
1391]
shafiee.masoud
Sliding mode control for congestion in TCP/IP networks
[
Vol.2,
Issue
6
,
7
- Autumn - WinterYear
1389]
shafiee.masoud
Sliding Mode Controller for TCP Congestion Control
[
Vol.2,
Issue
5
- Spring - SummerYear
]
shafiee.masoud
Image Processing of steel sheets for Defect Detection by using Gabor Wavelet
[
Vol.4,
Issue
13
- SpringYear
]
shafiee.masoud
Design of Secure Communication System by Use of Synchronization of Chaotic Systems
[
Vol.2,
Issue
3
- SummerYear
]
shafiee.masoud
Three-axis attitude control of a micro-satellite by magnetic actuators through-synthesis robust method
[
Vol.5,
Issue
15
- SummerYear
]
shafiee.masoud
Stock market prediction using optimized grasshopper optimization algorithm and time series algorithms
[
Vol.14,
Issue
53
,
54
- Autumn - WinterYear
1401]
Shafiee.masoud
Design of Distributed Consensus Controller for Leader-Follower Singular Multi-Agent Systems in the Presence of Sensor Fault
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
shafiee.nafiseh
Key management in digital rights management systems in offline mode
[
Vol.7,
Issue
24
,
25
- Spring - SummerYear
1394]
shafiee.nafiseh
Key Management in Digital Right Management Systems for Offline Mode
[
Vol.7,
Issue
23
- SummerYear
]
Shafiezadeh.Soheila
An Individual-Oriented Shuffled Frog Leaping Algorithm for Solving Vehicle Routing Problem
[
Vol.14,
Issue
51
,
52
- Spring - SummerYear
1401]
Shahbahrami.Asadollah
Identification and Prioritization of Parameters Affecting Information Security Management System (Case Study: Social Security Branches of Guilan Province)
[
Vol.10,
Issue
35
,
36
- Spring - SummerYear
1397]
Shahbahrami.Asadollah
A Managerial Examination of the Successful Parameters in the B2C Business
[
Vol.5,
Issue
17
- Spring - SummerYear
]
shahbazian.reza
Improving IoT resource management using fog calculations and ant lion optimization algorithm
[
Vol.15,
Issue
57
,
58
- Autumn - WinterYear
1402]
Shahhosseini.Mohammadali
Employing a meta-synthesis to present a framework for commercial banks’ preparedness indicators in use of blockchain technology
[
Vol.13,
Issue
49
,
50
- Autumn - WinterYear
1400]
Shahmiri.Amir Shahab
Beautiful and Meaningful Iranian Names Production by Genetic Algorithm using Artificial Neural Network-Based Fitness Function
[
Vol.7,
Issue
25
- Spring - SummerYear
]
shahmohammadi.Abdolreza
The future of online branding with an emphasis on the impact of artificial intelligence in the horizon of 2025
[
Vol.17,
Issue
65
,
65
- AutumnYear
1404]
shahsavari.mehrdad
Provide a basic method for estimating software projects based on logical transactions
[
Vol.9,
Issue
31
,
32
- Spring - SummerYear
1396]
shahsavari.mehrdad
Present an Initial Estimation Method for Logical Transaction-based Software Projects
[
Vol.9,
Issue
31
- Spring - SummerYear
]
shajari.mahdi
Key Management in Digital Right Management Systems for Offline Mode
[
Vol.7,
Issue
23
- SummerYear
]
Shakery.Azadeh
A new algorithm based on ensemble learning for learning to rank in information retrieval
[
Vol.7,
Issue
25
- Spring - SummerYear
]
Shams.Mohammadreza
Improving Opinion Aspect Extraction Using Domain Knowledge and Term Graph
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
shams.payam
Improving IoT resource management using fog calculations and ant lion optimization algorithm
[
Vol.15,
Issue
57
,
58
- Autumn - WinterYear
1402]
shamsollahi.sara
Designing a Fuzzy Expert System for Selecting an Appropriate Contractor in Information Technology Outsourcing
[
Vol.2,
Issue
5
- Spring - SummerYear
]
sharafi.vahid
طراحی اولین پایگاه داده کلمات دستنویس کردی برای سیستم های تشخیص تصویری کلمات
[
Vol.5,
Issue
17
- Spring - SummerYear
]
Sharifi.Arash
Using limited memory to store the most recent action in XCS learning classifier systems in maze problems
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
Sharifi.Ehsan
Architectural tactics identification in source code based on a semantic approach
[
Vol.14,
Issue
51
,
52
- Spring - SummerYear
1401]
Sharifi.Masumeh
Improving the directivity of the plasmonic sectoral horn nanoantenna using lens in its aperture
[
Vol.9,
Issue
33
,
34
- Autumn - WinterYear
1396]
Sharifian.Saeed
Adaptive Real-Time Decision-Making in the IoT-Based Supply Chain Considering Gradual Orders
[
Vol.17,
Issue
63
,
64
- Spring - SummerYear
1404]
shayegan.Mohammad Javad
A Recommender System Based on the Analysis of Personality Traits in Telegram Social Network
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Shaykhan.Mohammad Taghi
Proposing a New Framework to Decreasing Delay in the Internet of Things by Using Computing Power of Fog
[
Vol.13,
Issue
47
,
48
- Spring - SummerYear
1400]
Sheikhi.Hemmat
Improving imperialist competitive algorithm for solving the nodes placement problem in three-dimensional grid wireless sensor networks
[
Vol.12,
Issue
45
,
46
- Autumn - WinterYear
1399]
shekarchizadeh.ahmadreza
The future of online branding with an emphasis on the impact of artificial intelligence in the horizon of 2025
[
Vol.17,
Issue
65
,
65
- AutumnYear
1404]
Shenassa.Mohammad Ebrahim
Noor Analysis: A Benchmark Dataset for Evaluating Morphological Analysis Engines
[
Vol.15,
Issue
57
,
58
- Autumn - WinterYear
1402]
Shenassa.Mohammad Ebrahim
A Review on Hadith Text Processing Tasks
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Shenassa.Mohammad Ebrahim
A Review on Hadith Text Processing Tasks
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Shirali-Shahreza.Mohammad Hassan
Generalizing The Concept of Business Processes Structural Soundness from Classic Petri-nets to BPMN2.0 Process Models
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Shirali-Shahreza.Mohammad Hassan
Generalizing The Concept of Business Processes Structural Soundness from Classic Petri-nets to BPMN2.0 Process Models
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
shiry.saeed
Beautiful and Meaningful Iranian Names Production by Genetic Algorithm using Artificial Neural Network-Based Fitness Function
[
Vol.7,
Issue
25
- Spring - SummerYear
]
Siadat.Safieh
Improving the accuracy of detection botnet attacks in Internet of Things network by using MLP neural network
[
Vol.17,
Issue
63
,
64
- Spring - SummerYear
1404]
skch.skch
Proposing a model for IT services based assessment approach, based on IT Governance Model
[
Vol.7,
Issue
23
- SummerYear
]
soleimani mobarake.muqtada
Trust Management Based on User Feedback in Cloud Computing Environment by Using Cuckoo Optimization Algorithm
[
Vol.16,
Issue
61
,
62
- Autumn - WinterYear
1403]
Soleimani Nasab.Ehsan
Outage and Throughput Analysis of Bidirectional Cognitive Amplify-and-Forward Relaying Networks with Wireless Power Transfer
[
Vol.14,
Issue
51
,
52
- Spring - SummerYear
1401]
Soleymani Roozbahani.Fatemeh
Artefacts and Producers Mapping of Iran's Artificial Intelligence Ecosystem based on Transformational Levels
[
Vol.15,
Issue
57
,
58
- Autumn - WinterYear
1402]
Soleymanizadeh.Hajar
Digital Twin: Embracing the Fourth Industrial Revolution in Food Supply Chain Management (A Dynamic Analysis)
[
Vol.17,
Issue
63
,
64
- Spring - SummerYear
1404]
Soltani.Mahdi
Confidential Payload Attribution on Encrypted Traffic of Enterprise Networks
[
Vol.17,
Issue
63
,
64
- Spring - SummerYear
1404]
Sondossi.Golshan
A Neighbor-based Link Prediction Method for Bipartite Networks
[
Vol.13,
Issue
47
,
48
- Spring - SummerYear
1400]
sotoudeh.shahrouz
Provide a framework for enhancing the security of IoT-based smart homes using the IoT-A reference architecture
[
Vol.10,
Issue
35
,
36
- Spring - SummerYear
1397]
T
tabaghchimilan.sara
Using a multi-objective optimization algorithm for tasks allocate in the cloud-based systems to reduce energy consumption
[
Vol.12,
Issue
43
,
44
- Spring - SummerYear
1399]
tabatabaei.seyyed ahmad
Providing a model for evaluating information technology services based on an approach based on information technology governance models
[
Vol.7,
Issue
24
,
25
- Spring - SummerYear
1394]
tabatabaei.seyyed ahmad
Proposing a model for IT services based assessment approach, based on IT Governance Model
[
Vol.7,
Issue
23
- SummerYear
]
Tabatabaei.Shayesteh
Introducing a new optimal energy method for targets tracking in wireless sensor network using a hunting search algorithm
[
Vol.14,
Issue
51
,
52
- Spring - SummerYear
1401]
Tabatabaei.Shayesteh
Reducing Energy Consumption in Tracking the Red Palm Weevil Using Wireless Sensor Networks and Nature-Inspired Evolutionary Algorithms (Fruit Fly Optimization Algorithm and Lion Swarm Optimization Algorithm)
[
Vol.17,
Issue
63
,
64
- Spring - SummerYear
1404]
Tabatabaei.Shayesteh
Improving energy consumption in the Internet of Things using the Krill Herd optimization algorithm and mobile sink
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
Tabatabaei.Shayesteh
Energy Efficient Target (Rhynchophorus Ferrugineus) Tracking in Wireless Sensor Network Using the Cat Swarm Optimization Algorithm and Fuzzy Logic
[
Vol.16,
Issue
61
,
62
- Autumn - WinterYear
1403]
tabatabaie.seyed gholamhasan
An Architecture, Implementation, and Evaluation of Internet of Healthcare Things Ecosystem Platform
[
Vol.17,
Issue
63
,
64
- Spring - SummerYear
1404]
Tabrizian.Bita
Identifying and ranking factors affecting the digital transformation strategy in Iran's road freight transportation industry focusing on the Internet of Things and data analytics
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Tabrizian.Bita
Identifying and Ranking Factors Affecting the Digital Transformation Strategy in Iran's Road Freight Transportation Industry Focusing on the Internet of Things and Data Analytics
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Taghavi Afshord.Saeed
A novel metaheuristic algorithm and its discrete form for influence maximizing in complex networks
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
Taghavifard.Mohammad Taghi
Identification of the Factors and Indicators of the Model of Quality Assessment of the Game Industry Services on the Cloud Platform
[
Vol.12,
Issue
45
,
46
- Autumn - WinterYear
1399]
taghipour.reza
The framework of the national macro plan for transparency and information release based on the grounded theory method
[
Vol.15,
Issue
57
,
58
- Autumn - WinterYear
1402]
Taghiyareh.Fataneh
Content and structural analysis of online forums in order to extract users' social relationships and use them in grouping mechanisms.
[
Vol.4,
Issue
12
,
13
- Spring - SummerYear
1391]
Taghizadeh.Alireza
Explaining the adoption process of software-oriented networks (SDN) using the foundational data method and systems approach
[
Vol.14,
Issue
51
,
52
- Spring - SummerYear
1401]
Tahayori.Hooman
The Impact of IQ Imbalance on the BER of Adaptive Modulation in the MIMO System
[
Vol.1,
Issue
1
- SpringYear
]
Tahayori.Hooman
Proposing an Information Retrieval Model Using Interval Numbers
[
Vol.12,
Issue
45
,
46
- Autumn - WinterYear
1399]
Tahayori.Hooman
Cross-layer Design for Congestion Control, Routing and Scheduling in Ad-hoc Wireless Networks with considering the Electrical Power of nodes
[
Vol.1,
Issue
1
- SpringYear
]
Tahayori.Hooman
A new reinforcement learning based multi-agent method for traffic shaping and buffer allocation in routers
[
Vol.1,
Issue
1
- SpringYear
]
taherinia.mohsen
A comprehensive survey on the influence maximization problem in social networks
[
Vol.14,
Issue
53
,
54
- Autumn - WinterYear
1401]
taherkhani.fahime
Heuristic algorithms for pseudo-triangulation random point set in the plane
[
Vol.5,
Issue
16
,
17
- Spring - SummerYear
1392]
Tajeddini.Shima
The Participation of Three Brain Tissues in Alzheimer’s disease Diagnosis from Structural MRI
[
Vol.9,
Issue
33
,
34
- Autumn - WinterYear
1396]
Tajfar.Amir
Improving the accuracy of detection botnet attacks in Internet of Things network by using MLP neural network
[
Vol.17,
Issue
63
,
64
- Spring - SummerYear
1404]
talebi.heydarali
A Satellite Control Method Using Laguerre Model Predictive Control Approach
[
Vol.5,
Issue
15
- SummerYear
]
talebi.heydarali
Three-axis attitude control of a micro-satellite by magnetic actuators through-synthesis robust method
[
Vol.5,
Issue
15
- SummerYear
]
Talebi.Mehdi
Door detection based on car vision in outdoor scenes
[
Vol.8,
Issue
30
,
31
- Autumn - WinterYear
1395]
Talebi.Mohammad
Liquidity Risk Prediction Using News Sentiment Analysis
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
talebi.siamak
Applying the combined SPIHT-DCT method using spatial and spatial-temporal scaling to encode video images
[
Vol.4,
Issue
14
,
15
- Autumn - WinterYear
1391]
talebi.siamak
SPIHT-DCT hybrid method using Placement spatial scalability and Place - when encoding a video HDTV
[
Vol.4,
Issue
14
- Autumn - WinterYear
1391]
Talebi.Siamak
Increasing the lifetime of underwater acoustic sensor networks by optimal relay node placement
[
Vol.12,
Issue
45
,
46
- Autumn - WinterYear
1399]
talebian.faezeh
Presenting a method based on computational intelligence to improve energy consumption in smart wireless sensor networks
[
Vol.7,
Issue
24
,
25
- Spring - SummerYear
1394]
talebian.faezeh
A New Method to computational intelligence to improve network lifetime in wireless sensor networks
[
Vol.7,
Issue
23
- SummerYear
]
Taraz Monfared.Noureddin
The effect of Internet of Things (IOT) implementation on the Rail Freight Industry; A futures study approach
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
Tayfeh-Mahmoudi.Maryam
A Horizon for Sentiment Analysis in Social Networks based on Interpreting Contents
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Tayfeh-Mahmoudi.Maryam
Improving the entrepreneurial skills of Hastan-nagar capital by using the entrepreneurship training portal
[
Vol.4,
Issue
12
,
13
- Spring - SummerYear
1391]
Tayfeh-Mahmoudi.Maryam
A Framework for Sentiment Analysis in Social Networks based on Interpreting Contents
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Teimouri.Mehdi
Providing an optimal method for dispatching an ambulance based on complex networks and artificial intelligence
[
Vol.7,
Issue
24
,
25
- Spring - SummerYear
1394]
Teimouri.Mehdi
An optimised hybrid method for ambulance dispatch based on complex networks and Artificial Intelligence
[
Vol.7,
Issue
23
- SummerYear
]
Teimourian sefidehkhan.Maryam
Identifying and ranking factors affecting the digital transformation strategy in Iran's road freight transportation industry focusing on the Internet of Things and data analytics
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Teimourian sefidehkhan.Maryam
Identifying and Ranking Factors Affecting the Digital Transformation Strategy in Iran's Road Freight Transportation Industry Focusing on the Internet of Things and Data Analytics
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
tihidkhah.farzad
A Satellite Control Method Using Laguerre Model Predictive Control Approach
[
Vol.5,
Issue
15
- SummerYear
]
Toloie Eshlaghy.Abbas
Design and implementation of a survival model for patients with melanoma based on data mining algorithms
[
Vol.15,
Issue
57
,
58
- Autumn - WinterYear
1402]
Toloie Eshlaghy.Abbas
Persian Stance Detection Based On Multi-Classifier Fusion
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
tootian.sedigheh
Presenting the ICT Policies Implementation Model of the 6th Development Using the Neural Network Method
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
tootian.sedigheh
Presenting the ICT Policies Implementation Model of the 6th Development Using the Neural Network Method
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Toroghi Haghighat.Abolfazl
A review of the application of meta-heuristic algorithms in load balancing in cloud computing
[
Vol.14,
Issue
53
,
54
- Autumn - WinterYear
1401]
V
vafaei.abbas
Door detection based on car vision in outdoor scenes
[
Vol.8,
Issue
30
,
31
- Autumn - WinterYear
1395]
vafaei.abbas
Segmentation of exterior color images for the purpose of object recognition using histogram with double accuracy
[
Vol.4,
Issue
14
,
15
- Autumn - WinterYear
1391]
vafaei.abbas
Outdoor Color Scene Segmentation towards Object Detection using Dual-Resolution Histograms
[
Vol.4,
Issue
14
- Autumn - WinterYear
1391]
valizadeh.mohadeseh
A Recommender System Based on the Analysis of Personality Traits in Telegram Social Network
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Varahram.mohammadmahdi
Using a Hybrid PSO-GA Method for Capacitor Placement in Distribution Systems
[
Vol.6,
Issue
20
,
21
- Spring - SummerYear
1393]
vasegh.morteza
Modeling and simulation of the central generator of the pattern to produce curved-linear motions in the snake robot
[
Vol.12,
Issue
43
,
44
- Spring - SummerYear
1399]
Veisi.Hadi
Optimum modeling of patient satisfaction with the doctor based on machine learning methods
[
Vol.7,
Issue
24
,
25
- Spring - SummerYear
1394]
Veisi.Hadi
Optimized Modeling for satisfaction in the relationship between a physician and patient based on machine learnin methods
[
Vol.7,
Issue
23
- SummerYear
]
Y
Yadegari.َAmirmansour
A Horizon for Sentiment Analysis in Social Networks based on Interpreting Contents
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Yadegari.َAmirmansour
A Framework for Sentiment Analysis in Social Networks based on Interpreting Contents
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
yaghoobi.mahdi
Fast and accurate concept drift detection from event logs
[
Vol.12,
Issue
43
,
44
- Spring - SummerYear
1399]
yaghoubi.saied
Provide a conceptual model to identify the quality of electronic services in the country's online stores
[
Vol.8,
Issue
30
,
31
- Autumn - WinterYear
1395]
Yaghubi.Nour Mohammad
Exploring the antecedents and consequences of smart good governance using the fuzzy Delphi method (FDM)
[
Vol.14,
Issue
51
,
52
- Spring - SummerYear
1401]
Yari.Alireza
An Improved Method for Detecting Phishing Websites Using Data Mining on Web Pages
[
Vol.12,
Issue
43
,
44
- Spring - SummerYear
1399]
Yazdani.Samaneh
An Intelligent Pricing System for Cloud Services aims at Increasing Implementation Simplicity and Flexibility
[
Vol.14,
Issue
53
,
54
- Autumn - WinterYear
1401]
Yazdanian.Vahid
Design and fabrication of the E-field probe for the measurement of the electromagnetic fields in 5G frequency band
[
Vol.14,
Issue
53
,
54
- Autumn - WinterYear
1401]
Yazdanian.Vahid
Pathology of software export development in Iran
[
Vol.14,
Issue
51
,
52
- Spring - SummerYear
1401]
Yazdanpanah.Ahmad Ali
Agile Enterprise Architecture Modeling: Evaluating the Applicability of Six Modeling Standards based on Iran’s National EA Framework
[
Vol.13,
Issue
47
,
48
- Spring - SummerYear
1400]
Yazdanpanah.Ahmad Ali
Presenting a Method for Agile Enterprise Architecture Modeling
[
Vol.16,
Issue
61
,
62
- Autumn - WinterYear
1403]
Yeganeh.Hassan
Analysis of the Impact of Artificial Intelligence Application in the Employment Sector and Proposing Priority Solutions for Iran
[
Vol.17,
Issue
65
,
65
- AutumnYear
1404]
Yousefi.Ali
Using limited memory to store the most recent action in XCS learning classifier systems in maze problems
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
Yousefi.Shamim
Automatic Lung Diseases Identification using Discrete Cosine Transform-based Features in Radiography Images
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
Z
zahedfar.kamran
Understanding the users’ initial trust of social networks
[
Vol.8,
Issue
27
- SpringYear
]
zahiri.hamid
Training of MLP neural network in image compression using GSA method
[
Vol.2,
Issue
6
,
7
- Autumn - WinterYear
1389]
zahiri.hamid
Training MLP Neural Network in Images Compression by GSA Method
[
Vol.2,
Issue
5
- Spring - SummerYear
]
Zamani Boroujeni.Dr. Farsa
Dynamic Load Balancing Improvement in Software-Defined Networks Using Fuzzy Multi-Objective Programming Algorithms
[
Vol.16,
Issue
61
,
62
- Autumn - WinterYear
1403]
Zamani.Abraham
Providing a Blockchain-Based Method to Protect Users’ Privacy in Social Networks
[
Vol.16,
Issue
61
,
62
- Autumn - WinterYear
1403]
zamani.bahare
Beautiful and Meaningful Iranian Names Production by Genetic Algorithm using Artificial Neural Network-Based Fitness Function
[
Vol.7,
Issue
25
- Spring - SummerYear
]
zamani.bibieshrat
Investigating the Degree of Application of Professional Ethics and Vocational Qualifications by the Faculty Members of Virtual Universities of Isfahan and Medical Sciences University of Isfahan
[
Vol.6,
Issue
21
- SpringYear
]
zamanifar.kamran
An Improved Method Based on Label Propagation and Greedy Approaches for Community Detection in Dynamic Social Networks
[
Vol.12,
Issue
43
,
44
- Spring - SummerYear
1399]
Zand Hesami.Hesam
Presenting a new conceptual model for the field of big data and analyzing the data-driven business in Iran based on the proposed model
[
Vol.13,
Issue
47
,
48
- Spring - SummerYear
1400]
Zandieh.Mahboubeh
An Intelligent Pricing System for Cloud Services aims at Increasing Implementation Simplicity and Flexibility
[
Vol.14,
Issue
53
,
54
- Autumn - WinterYear
1401]
Zangane.Amirhosein
An efficient Two Pathways Deep Architecture for Soccer Goal Recognition towards Soccer Highlight Summarization
[
Vol.13,
Issue
49
,
50
- Autumn - WinterYear
1400]
Zanjirchi.Seyed mahmoud
Digital Twin: Embracing the Fourth Industrial Revolution in Food Supply Chain Management (A Dynamic Analysis)
[
Vol.17,
Issue
63
,
64
- Spring - SummerYear
1404]
Zare Ahmadabadi.Habib
Digital Twin: Embracing the Fourth Industrial Revolution in Food Supply Chain Management (A Dynamic Analysis)
[
Vol.17,
Issue
63
,
64
- Spring - SummerYear
1404]
Zare Chahooki.Mohammad Ali
User recommendation in Telegram messenger by graph analysis and mathematical modeling of users' behavior
[
Vol.13,
Issue
49
,
50
- Autumn - WinterYear
1400]
zare.hadi
Extracting the Information Technology architecture of hospitals with approach of Implementing in Iran
[
Vol.8,
Issue
27
- SpringYear
]
Zare.Hadi
Providing an optimal method for dispatching an ambulance based on complex networks and artificial intelligence
[
Vol.7,
Issue
24
,
25
- Spring - SummerYear
1394]
Zare.Hadi
Extracting hospital information technology architecture with the approach of implementation capability in Iran
[
Vol.8,
Issue
27
,
28
- Spring - SummerYear
1395]
Zare.Hadi
An optimised hybrid method for ambulance dispatch based on complex networks and Artificial Intelligence
[
Vol.7,
Issue
23
- SummerYear
]
zare.jalal
E-Government Service Supply Chain: Identifying Performance Evaluation Indicators (Case Study of e-Customs System in Iran)
[
Vol.14,
Issue
53
,
54
- Autumn - WinterYear
1401]
Zareian-Jahromi.Ehsan
Improving the directivity of the plasmonic sectoral horn nanoantenna using lens in its aperture
[
Vol.9,
Issue
33
,
34
- Autumn - WinterYear
1396]
Zargaran khouzani.Fatemeh
Identifying the Key Drivers of Digital Signature Implementation in Iran (using fuzzy Delphi method)
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Zargaran khouzani.Fatemeh
Identifying the Key Drivers of Digital Signature Implementation in Iran (Using Fuzzy Delphi Method)
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Zargari.Eshrat
Designing A New Genetic-Fuzzy Type 2 Approach to Evaluate Self-Adaptive Systems by Software Quality Indicators
[
Vol.16,
Issue
61
,
62
- Autumn - WinterYear
1403]
zarkeshzade.mehdi
An optimised hybrid method for ambulance dispatch based on complex networks and Artificial Intelligence
[
Vol.7,
Issue
23
- SummerYear
]
zeidabadinezhad.abolghasem
A Fast Method to Compute Radiation Fields of Shaped Reflector Antennas by FFT
[
Vol.1,
Issue
2
,
3
- Autumn - WinterYear
1387]
zenouzi.jafari
بررسی تاثیر استفاده از انواع استراتژی¬های بازاریابی در شبکههای اجتماعی بر جلب اعتماد مشتریان شورایی
[
Vol.11,
Issue
39
,
40
- Spring - SummerYear
1398]
zeraatkarmoghaddam.mohammadreza
Improvement of intrusion detection system on Industrial Internet of Things based on deep learning using metaheuristic algorithms
[
Vol.15,
Issue
57
,
58
- Autumn - WinterYear
1402]
zeynali.saeed
Energy procurement of a cellular base station in independent microgrids with electric vehicles and renewable energy sources: Mixed-integer nonlinear programming model
[
Vol.15,
Issue
57
,
58
- Autumn - WinterYear
1402]
Ziaeipour.Elham
Explaining the adoption process of software-oriented networks (SDN) using the foundational data method and systems approach
[
Vol.14,
Issue
51
,
52
- Spring - SummerYear
1401]
Zohoorian Nadali.Iman
Artefacts and Producers Mapping of Iran's Artificial Intelligence Ecosystem based on Transformational Levels
[
Vol.15,
Issue
57
,
58
- Autumn - WinterYear
1402]