A

  • Abbasi.Ibrahim Valuation of digital services in Iran: Empirical proof for Google and Instagram [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Abbasi.Javad Employing a meta-synthesis to present a framework for commercial banks’ preparedness indicators in use of blockchain technology [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • Abbasi.Mohammadhassan Designing a personalized e-learning system using learners' characteristics and implementing it with the gamification elements [ Vol.13, Issue 47 , 48 - Spring - Summer Year 1400]
  • abbasi.narges Analysing students' learning through morning exercise using data mining techniques [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • Abbasi.Zahra An approach to prioritize quality dimensions of based on cloud computing using Multiple Criteria Decision Making method [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • Abbasimehr.Hossein A Novel Multi-Step Ahead Demand Forecasting Model Based on Deep Learning Techniques and Time Series Augmentation [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • Abbasi-Shahkooh.Kolsoum Extracting Innovation Strategies and Requirements for Telecommunication Companies: Case Study of Telecommunications Infrastructure Company [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • abbaspour.javad Improvement of mean shift tracker for tracking of target with variable photometric pattern [ Vol.4, Issue 13 - Spring Year ]
  • Abdian.Mohammad Mahdi Intrusion Detection Based on Cooperation on the Permissioned Blockchain Platform in the Internet of Things Using Machine Learning [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Abdian.Mohammad Mahdi Intrusion Detection Based on Cooperation on the Permissioned Blockchain Platform in the Internet of Things Using Machine Learning [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Abdipour.Abdolali The Impact of IQ Imbalance on the BER of Adaptive Modulation in the MIMO System [ Vol.1, Issue 1 - Spring Year ]
  • Abdipour.Abdolali Design, simulation and performance comparison of radating elements of reflect array antenna [ Vol.5, Issue 15 - Summer Year ]
  • Abdolrazzagh-Nezhad.Majid Comparing A Hybridization of Fuzzy Inference System and Particle Swarm Optimization Algorithm with Deep Learning to Predict Stock Prices [ Vol.11, Issue 41 , 42 - Autumn - Winter Year 1398]
  • Adabi.Sepideh An Intelligent Pricing System for Cloud Services aims at Increasing Implementation Simplicity and Flexibility [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • adibi.zhinoos A Combinational Model for Evaluating Organizational Readiness for Data Warehouse Implementation by Using Analytical Hierarchical Process [ Vol.2, Issue 3 - Summer Year ]
  • Afshar Kazemi.Mohamad Ali Anomaly and Intrusion Detection through Datamining and Feature Selection using PSO Algorithm [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Afshar Kazemi.Mohamad Ali Anomaly and Intrusion Detection Through Data Mining and Feature Selection using PSO Algorithm [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • aghaeizade.reza Reinforcement of the central axis of tubular structures and its application in extracting the central axis of the portal vein [ Vol.4, Issue 14 , 15 - Autumn - Winter Year 1391]
  • aghaeizade.reza Medial-axis Enhancement of Tubular Structures and its Application in the Extraction of Portal Veins [ Vol.4, Issue 13 - Spring Year ]
  • aghdasim.aghdasim Identify and analyze decision points and key players in procurement process in the EPC companies [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Ahari.Somayeh Relation of emotional intelligence and trends of e-learning in organizations (Case study: Bank employees Alborz Province) [ Vol.4, Issue 11 - Autumn Year ]
  • Ahari.Somayeh Multimedia teaching and its effects on learning and retention of English grammar [ Vol.4, Issue 11 - Autumn Year ]
  • Ahari.Somayeh Proposing a Model for Extracting Information from Textual Documents, Based on Text Mining in E-learning [ Vol.4, Issue 11 - Autumn Year ]
  • Ahari.Somayeh A New Approach to Extract and Utilize Learners Social Relationships through Analyzing Forums Structure and Contents [ Vol.4, Issue 11 - Autumn Year ]
  • Ahari.Somayeh Assessing the e-service quality of Payame Noor University [ Vol.4, Issue 11 - Autumn Year ]
  • Ahari.Somayeh The Evaluation of E-learning by Benchmarking Approach Iran Higher Education as a Case Study [ Vol.4, Issue 11 - Autumn Year ]
  • Ahari.Somayeh Ontology-Based Up gradation of Entrepreneurship Skills Using Educational Portals [ Vol.4, Issue 11 - Autumn Year ]
  • Ahmadi.Hamid A greedy new method based on the cascade model to calculate maximizing penetration in social networks [ Vol.10, Issue 37 , 38 - Autumn - Winter Year 1397]
  • Ahmadi.Mohammad Reza Presenting a novel solution to choose a proper database for storing big data in national network services [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Ahmadi.Mohammad Reza Providing a New Solution in Selecting Suitable Databases for Storing Big Data in the National Information Network [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Ahmadi.Parvin A Framework for Sentiment Analysis in Social Networks based on Interpreting Contents [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Ahmadi.Parvin A Horizon for Sentiment Analysis in Social Networks based on Interpreting Contents [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Ahmadian chashmi.hamidreza A framework for establishing a national data vault for Data Governance institution [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • Ahmadzadeh.Hamidreza Design of Distributed Consensus Controller for Leader-Follower Singular Multi-Agent Systems in the Presence of Sensor Fault [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • ahsan.reza Converting protein sequence to image for classification with convolutional neural network [ Vol.12, Issue 43 , 44 - Spring - Summer Year 1399]
  • akbar.ali Applying genetic algorithm for automatic service identification based on quality metrics [ Vol.6, Issue 19 - Autumn Year ]
  • Akbari Emami.Shahnaz Information Technology, Strategy Implementation, Information Systems, Strategic Planning, Input-Process-Outcome Framework [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • akbari.ahmad Evaluation of SIP signaling implementation using QoS parameters [ Vol.1, Issue 1 - Spring Year ]
  • Akbari.Mohsen Understanding the initial trust of users in social networks [ Vol.8, Issue 27 , 28 - Spring - Summer Year 1395]
  • Akbari.Mohsen Understanding the users’ initial trust of social networks [ Vol.8, Issue 27 - Spring Year ]
  • akhlaghi.fardin Semi-blind labeling of images using SVD in the field of discrete wavelet transform [ Vol.2, Issue 6 , 7 - Autumn - Winter Year 1389]
  • akhlaghi.fardin DWT-SVD based Semi-Blind Digital Image Watermarking [ Vol.2, Issue 5 - Spring - Summer Year ]
  • Akraminejad.Reza WSTMOS: A Method For Optimizing Throughput, Energy, And Latency In Cloud Workflow Scheduling [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • alagheband.basir طراحی اولین پایگاه داده کلمات دستنویس کردی برای سیستم های تشخیص تصویری کلمات [ Vol.5, Issue 17 - Spring - Summer Year ]
  • albadvi.albadvi Liquidity Risk Prediction Using News Sentiment Analysis [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • ali.ghalibaf Improving performance of probe-based rate control mechanisms using classification: evaluation on an experimental testbed for High Throughput WLANs [ Vol.12, Issue 43 , 44 - Spring - Summer Year 1399]
  • Alimoradi.Fatemeh Synthesizing an image dataset for text detection and recognition in images [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • alinezhad.ali Integrating Data Envelopment Analysis and Decision Tree Models in Order to Evaluate Information Technology-Based Units [ Vol.8, Issue 27 - Spring Year ]
  • alinezhad.alireza A Combination Method of DEA, DEMATEL and ANP for Evaluation of ERP Systems [ Vol.12, Issue 45 , 46 - Autumn - Winter Year 1399]
  • alipour.fazaneh A Research Over the Obstacles and Influential Factors on Development of e-Learning Subjects from Perspective of Beneficiaries of CME Program in Jahrom University of Medical Sciences in 2012-2013 [ Vol.6, Issue 21 - Spring Year ]
  • Aliyari.Shahram A model information technology adoption in academic research projects in the filed ICT based on Information Technology Adoption Integrated Modeling (ITAIM) [ Vol.11, Issue 41 , 42 - Autumn - Winter Year 1398]
  • Al-Shohayyeb.Huda Noor Analysis: A Benchmark Dataset for Evaluating Morphological Analysis Engines [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • Amin Mousavi.Seyed Abdollah Design and implementation of a survival model for patients with melanoma based on data mining algorithms [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • Amini vlashani.Maede Data-driven Marketing in Digital Businesses from Dynamic Capabilities View [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • amini.Akbar A framework for architecture the electronic trust in e-commerce:online shopping segment [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • Amini.Amir ۹۳ / ۵٬۰۰۰ Integration of data envelopment analysis model and decision tree in order to evaluate units based on information technology [ Vol.8, Issue 27 , 28 - Spring - Summer Year 1395]
  • Amini.Amir Integrating Data Envelopment Analysis and Decision Tree Models in Order to Evaluate Information Technology-Based Units [ Vol.8, Issue 27 - Spring Year ]
  • amintoosi.mahmood The aware genetic algorithm of the best member, applied to graph coloring and metric-dimension of the graph problems [ Vol.12, Issue 43 , 44 - Spring - Summer Year 1399]
  • Amiri.Maryam Document Clustering Based On Ontology and Fuzzy Approach [ Vol.5, Issue 17 - Spring - Summer Year ]
  • Amiri.Mostafa Fuzzy Multicore Clustering of Big Data in the Hadoop Map Reduce Framework [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Amiri.Samira Improvement of the bulk sensitivity and FoM of the plasmonic nanodipole antenna array [ Vol.9, Issue 33 , 34 - Autumn - Winter Year 1396]
  • AmiriAra.Hamid Joint Power Allocation Optimization of cooperative communication systems with Non-Orthogonal Multiple Access [ Vol.12, Issue 45 , 46 - Autumn - Winter Year 1399]
  • amrolahi.milad context-aware travel recommender system exploiting from Geo-tagged photos [ Vol.11, Issue 41 , 42 - Autumn - Winter Year 1398]
  • anarinejad.abbas Evaluation of e-learning with optimal mining approach 1 case study: Iran's higher education [ Vol.4, Issue 12 , 13 - Spring - Summer Year 1391]
  • ANSARI.ALI ASGHAR Power Efficient allocation in C-RAN with Multi access technology selection approach [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • ansarmohammadi.ali Multi-Level Ternary Quantization for Improving Sparsity and Computation in Embedded Deep Neural Networks [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • ansarmohammadi.ali Multi-level ternary quantization for improving sparsity and computation in embedded deep neural networks [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • arabsorkhi.abouzar New Method to Improve Illumination Variations in Adult Images Based on Fuzzy Deep Neural Network [ Vol.11, Issue 41 , 42 - Autumn - Winter Year 1398]
  • arefi.somayeh Feature selection for author identification of Persian online short texts [ Vol.13, Issue 47 , 48 - Spring - Summer Year 1400]
  • arianyan.ehsan Emerging technologies in future generations of high performance computing: introduction, taxonomy and future research directions [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • arianyan.ehsan High Performance Computing: Next Generation Requirements and Research Axes [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • arianyan.ehsan Improving IoT resource management using fog calculations and ant lion optimization algorithm [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • arianyan.ehsan Presenting a novel solution to choose a proper database for storing big data in national network services [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • arianyan.ehsan Providing a New Solution in Selecting Suitable Databases for Storing Big Data in the National Information Network [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • aryanian.iman Design, simulation and performance comparison of radating elements of reflect array antenna [ Vol.5, Issue 15 - Summer Year ]
  • asadi.bahareh Adaptive rotation models and traffic patterns to reduce light loss in networks on optical chip [ Vol.10, Issue 35 , 36 - Spring - Summer Year 1397]
  • asemi.atefe Investigating the Degree of Application of Professional Ethics and Vocational Qualifications by the Faculty Members of Virtual Universities of Isfahan and Medical Sciences University of Isfahan [ Vol.6, Issue 21 - Spring Year ]
  • ASGHARI ESTIAR.FARHAD Valuation of digital services in Iran: Empirical proof for Google and Instagram [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Asghari.Seyyed Amir Increasing Total Throughput, Reducing Outage to Zero, and Reducing Power Consumption in a Cellular Network [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • Asgharian.Alireza Extracting Innovation Strategies and Requirements for Telecommunication Companies: Case Study of Telecommunications Infrastructure Company [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Asghariyan.Fatemeh An Intrusion Detection System based on Deep Learning for CAN Bus [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • ashouri.mina Investigating the Effect of Hardware Parameters Adjustments on Energy Consumption in Thin Matrix Multiplication Algorithm on GPUs [ Vol.9, Issue 31 , 32 - Spring - Summer Year 1396]
  • attaran.ebrahim Blind correction of camera lens aberration and de-centering error using modified Zernike model [ Vol.7, Issue 25 - Spring - Summer Year ]
  • ayagh.zahra Understanding the users’ initial trust of social networks [ Vol.8, Issue 27 - Spring Year ]
  • Azarkasb.Seyed Omid Fuzzy Multicore Clustering of Big Data in the Hadoop Map Reduce Framework [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Azarnejad.Ardeshir Routing improvement to control congestion in software defined networks by using distributed controllers [ Vol.11, Issue 39 , 40 - Spring - Summer Year 1398]
  • azharivs.azharivs Evaluation of SIP signaling implementation using QoS parameters [ Vol.1, Issue 1 - Spring Year ]
  • Azimzadeh.Masomeh Community-Based Multi-Criteria Placement of Applications in the Fog Environment [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Azimzadeh.Masomeh Priority based Deployment of IoT Applications in Fog [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Azizi MehmanDoost.Mahdi The framework of the national macro plan for transparency and information release based on the grounded theory method [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]

B

  • babadi.sima Improving the entrepreneurial skills of Hastan-nagar capital by using the entrepreneurship training portal [ Vol.4, Issue 12 , 13 - Spring - Summer Year 1391]
  • Babaee.Hossein A Framework for Identifying and Ranking Criteria for Evaluating the Quality of Electronic Services (Case studies: Golestan website of Payame-noor university) [ Vol.5, Issue 18 , 19 - Autumn - Winter Year 1392]
  • Babazadeh.Sogol Providing a model for evaluating native electronic content in Iran based on value chain [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • badie.kambiz Using limited memory to store the most recent action in XCS learning classifier systems in maze problems [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • badie.kambiz A Framework for Sentiment Analysis in Social Networks based on Interpreting Contents [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • badie.kambiz A Horizon for Sentiment Analysis in Social Networks based on Interpreting Contents [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • bagheri.alireza Geometric embedding of the tree in points inside a polygon with minimum number of bends [ Vol.2, Issue 4 , 5 - Spring - Summer Year 1389]
  • bagheri.masoud Applying genetic algorithm for automatic service identification based on quality metrics [ Vol.6, Issue 19 - Autumn Year ]
  • bagherinejad.jafar A Model for impacts of Investment in IT on customer satisfaction, using Structural Equation Modeling and Path Analysis [ Vol.5, Issue 15 - Summer Year ]
  • bagherinejad.jafar A Combinational Model for Evaluating Organizational Readiness for Data Warehouse Implementation by Using Analytical Hierarchical Process [ Vol.2, Issue 3 - Summer Year ]
  • bahadorani baghbaderani.amin Routing of Multipartite Computer Networks Using Ant Genetic Algorithm [ Vol.9, Issue 31 , 32 - Spring - Summer Year 1396]
  • Bahadorifard.Reza Investigating the Relationship between Electronic Human Resource Management, Agility and Organizational Effectiveness in Organizations Under the Ministry of Communications and Information Technology [ Vol.12, Issue 45 , 46 - Autumn - Winter Year 1399]
  • baharloo.mahdiye An Improved Method for Detecting Phishing Websites Using Data Mining on Web Pages [ Vol.12, Issue 43 , 44 - Spring - Summer Year 1399]
  • Bahreini.Takavash Extracting Innovation Strategies and Requirements for Telecommunication Companies: Case Study of Telecommunications Infrastructure Company [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Bahri.Reza Design and fabrication of the E-field probe for the measurement of the electromagnetic fields in 5G frequency band [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • Bahri.Reza Energy procurement of a cellular base station in independent microgrids with electric vehicles and renewable energy sources: Mixed-integer nonlinear programming model [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • Bakhtiari.Saeed A Multi-Objective Differential Evolutionary Algorithm-based Approach for Resource Allocation in Cloud Computing Environment [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • bakhtiyari.saied Routing improvement to control congestion in software defined networks by using distributed controllers [ Vol.11, Issue 39 , 40 - Spring - Summer Year 1398]
  • Baraani.Ahmad Improving Opinion Aspect Extraction Using Domain Knowledge and Term Graph [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Baradaran.Sepideh A Review on Hadith Text Processing Tasks [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Baradaran.Sepideh A Review on Hadith Text Processing Tasks [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Baradaran.Vahid A Model for Evaluating Electronic Governance (e-governance) in Iran's Executive Sectors [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • Barkhoda.Sayed Wafa Improving imperialist competitive algorithm for solving the nodes placement problem in three-dimensional grid wireless sensor networks [ Vol.12, Issue 45 , 46 - Autumn - Winter Year 1399]
  • barzamini.roohollah Sliding mode control for congestion in TCP/IP networks [ Vol.2, Issue 6 , 7 - Autumn - Winter Year 1389]
  • barzamini.roohollah Sliding Mode Controller for TCP Congestion Control [ Vol.2, Issue 5 - Spring - Summer Year ]
  • beheshti.rahele Improving recommender systems with the help of Semantic Web [ Vol.9, Issue 31 , 32 - Spring - Summer Year 1396]
  • Beheshti.Zahra An Individual-Oriented Shuffled Frog Leaping Algorithm for Solving Vehicle Routing Problem [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • Behkamal.Behshid BIG DATA [ Vol.10, Issue 37 , 38 - Autumn - Winter Year 1397]
  • Binesh Marvasti.Mohammadreza Increasing Total Throughput, Reducing Outage to Zero, and Reducing Power Consumption in a Cellular Network [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • bobarshad.hossein Extracting hospital information technology architecture with the approach of implementation capability in Iran [ Vol.8, Issue 27 , 28 - Spring - Summer Year 1395]
  • bobarshad.hossein Extracting the Information Technology architecture of hospitals with approach of Implementing in Iran [ Vol.8, Issue 27 - Spring Year ]
  • borna.keyvan Using web analytics in forecasting the stock price of chemical products group in the stock exchange [ Vol.11, Issue 39 , 40 - Spring - Summer Year 1398]
  • Bouyer.Asgarali A greedy new method based on the cascade model to calculate maximizing penetration in social networks [ Vol.10, Issue 37 , 38 - Autumn - Winter Year 1397]

C

  • Chabok.Hossein A design of Rectangular Waveguide TM11 to TE10 Mode Converter for S-band Applications [ Vol.9, Issue 33 , 34 - Autumn - Winter Year 1396]
  • Cheraghali.Mohammad Hasan Identifying and Ranking Factors Affecting the Digital Transformation Strategy in Iran's Road Freight Transportation Industry Focusing on the Internet of Things and Data Analytics [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Cheraghali.Mohammad Hasan Identifying and ranking factors affecting the digital transformation strategy in Iran's road freight transportation industry focusing on the Internet of Things and data analytics [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]

D

  • daee.amir Using web analytics in forecasting the stock price of chemical products group in the stock exchange [ Vol.11, Issue 39 , 40 - Spring - Summer Year 1398]
  • daei.mohammadhassan Improving performance of probe-based rate control mechanisms using classification: evaluation on an experimental testbed for High Throughput WLANs [ Vol.12, Issue 43 , 44 - Spring - Summer Year 1399]
  • daneshfar.fatemeh طراحی اولین پایگاه داده کلمات دستنویس کردی برای سیستم های تشخیص تصویری کلمات [ Vol.5, Issue 17 - Spring - Summer Year ]
  • Daneshparvar.Mitra The role of organizational factors on consumer buying behavior in social networks [ Vol.12, Issue 45 , 46 - Autumn - Winter Year 1399]
  • danyali.danyali Semi-blind labeling of images using SVD in the field of discrete wavelet transform [ Vol.2, Issue 6 , 7 - Autumn - Winter Year 1389]
  • danyali.danyali DWT-SVD based Semi-Blind Digital Image Watermarking [ Vol.2, Issue 5 - Spring - Summer Year ]
  • Danyali.Habibollah The Participation of Three Brain Tissues in Alzheimer’s disease Diagnosis from Structural MRI [ Vol.9, Issue 33 , 34 - Autumn - Winter Year 1396]
  • dashti.seyed ebrahim Improving resource allocation in mobile edge computing using gray wolf and particle swarm optimization algorithms [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • dashti.seyed ebrahim Improving Resource Allocation in Mobile Edge Computing Using Particle Swarm and Gray Wolf Optimization Algorithms [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Dastghaibyfard.Gholamhossein Presenting a model for using mobile agents in distributed intrusion detection systems based on game theory [ Vol.8, Issue 27 , 28 - Spring - Summer Year 1395]
  • Dastghaibyfard.Gholamhossein A Novel Model for detecting intrusion with Mobile Agent and Game theory [ Vol.8, Issue 27 - Spring Year ]
  • Dastranj.Nasrin Extracting Innovation Strategies and Requirements for Telecommunication Companies: Case Study of Telecommunications Infrastructure Company [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • dehbashian.maryam Training of MLP neural network in image compression using GSA method [ Vol.2, Issue 6 , 7 - Autumn - Winter Year 1389]
  • dehbashian.maryam Training MLP Neural Network in Images Compression by GSA Method [ Vol.2, Issue 5 - Spring - Summer Year ]
  • dehdashti shahrokh.zohreh The role of organizational factors on consumer buying behavior in social networks [ Vol.12, Issue 45 , 46 - Autumn - Winter Year 1399]
  • Dehghan.Sogand The main components of evaluating the credibility of users according to organizational goals in the life cycle of big data [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Dehghani.Mohammad Javad New changes of local binary pattern and classification and segmentation of texture images of the seabed [ Vol.8, Issue 27 , 28 - Spring - Summer Year 1395]
  • Dehghani.Mohammad Javad Power Efficient allocation in C-RAN with Multi access technology selection approach [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • Dehghani.Mohammad Javad New changes of local binary patterns and classification and segmentation of seabed images [ Vol.8, Issue 27 - Spring Year ]
  • Dehyadegari.Masoud High Performance Computing: Next Generation Requirements and Research Axes [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • dianat.dianat Converting protein sequence to image for classification with convolutional neural network [ Vol.12, Issue 43 , 44 - Spring - Summer Year 1399]
  • dolatkhah.ahmad Face recognition and Liveness Detection Based on Speech Recognition for Electronical Authentication [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • Dorostkar Yaghouti.Behnam Face recognition and Liveness Detection Based on Speech Recognition for Electronical Authentication [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • doustari.mohammadali Classify and implement hardware trojans and provide a new way to detect them [ Vol.9, Issue 31 , 32 - Spring - Summer Year 1396]

E

  • Ebadati.Omid Mahdi Using web analytics in forecasting the stock price of chemical products group in the stock exchange [ Vol.11, Issue 39 , 40 - Spring - Summer Year 1398]
  • ebadzade.mohamad mehdi Using limited memory to store the most recent action in XCS learning classifier systems in maze problems [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Ebrahimi Lame.Nozar A Collaborative Filtering Movie Recommendation System Based on Users Correlation and Weighted K-Means with High Accuracy [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • ebrahimi.mansour Converting protein sequence to image for classification with convolutional neural network [ Vol.12, Issue 43 , 44 - Spring - Summer Year 1399]
  • ebrahimi.Seyyed Mohammad Introducing a genetic algorithm based Method for Community person's stance Detection in social media and news [ Vol.11, Issue 41 , 42 - Autumn - Winter Year 1398]
  • Edalatian Shariairi.Jamshid A value Co-creation model for Information and Communication Technology Entrepreneurial Ecosystem [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • Edalatpanah.Seyed Ahmad Predicting the workload of virtual machines in order to reduce energy consumption in cloud data centers using the combination of deep learning models [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Eftekhari.Seyed Ahmad Intrusion Detection Based on Cooperation on the Permissioned Blockchain Platform in the Internet of Things Using Machine Learning [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Eftekhari.Seyed Ahmad Intrusion Detection Based on Cooperation on the Permissioned Blockchain Platform in the Internet of Things Using Machine Learning [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Ehsani Boshla.Fatemeh High Performance Computing: Next Generation Requirements and Research Axes [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • Ehteshami.Mehran Identifying and Ranking Factors Affecting the Digital Transformation Strategy in Iran's Road Freight Transportation Industry Focusing on the Internet of Things and Data Analytics [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Ehteshami.Mehran Identifying and ranking factors affecting the digital transformation strategy in Iran's road freight transportation industry focusing on the Internet of Things and data analytics [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Elahi.Shaban Designing a fuzzy expert system for choosing the right contractor in information technology outsourcing [ Vol.2, Issue 6 , 7 - Autumn - Winter Year 1389]
  • Elahi.Shaban A Hybrid Neural Network Ensemble Model for Credit Risk Assessment [ Vol.6, Issue 20 , 21 - Spring - Summer Year 1393]
  • Elahi.Shaban Designing a Fuzzy Expert System for Selecting an Appropriate Contractor in Information Technology Outsourcing [ Vol.2, Issue 5 - Spring - Summer Year ]
  • Eliasi.Behrooz Open Data Accessing Policymaking in Iran, in the Aspect of Preserving Privacy and Personal Data Ownership [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • Eliasi.Behrooz Providing a model for evaluating native electronic content in Iran based on value chain [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • Ershadi.Mohammad Javad An approach to prioritize quality dimensions of based on cloud computing using Multiple Criteria Decision Making method [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • Eskandari.Ahmadreza Design and fabrication of the E-field probe for the measurement of the electromagnetic fields in 5G frequency band [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • Eslami.Mohsen Power Efficient allocation in C-RAN with Multi access technology selection approach [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • Esmaeeli.Alireza Extracting Innovation Strategies and Requirements for Telecommunication Companies: Case Study of Telecommunications Infrastructure Company [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Esmaeili.mahdi A comprehensive survey on the influence maximization problem in social networks [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • esmaeilpour.mansour A New Method to computational intelligence to improve network lifetime in wireless sensor networks [ Vol.7, Issue 23 - Summer Year ]
  • esmaili.arefeh Use of conditional generative adversarial network to produce synthetic data with the aim of improving the classification of users who publish fake news [ Vol.13, Issue 47 , 48 - Spring - Summer Year 1400]
  • Esnaashari.MohammadMahdi High Performance Computing: Next Generation Requirements and Research Axes [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • Esnaashari.MohammadMahdi Community-Based Multi-Criteria Placement of Applications in the Fog Environment [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Esnaashari.MohammadMahdi Priority based Deployment of IoT Applications in Fog [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Ezzati.Hashem The aware genetic algorithm of the best member, applied to graph coloring and metric-dimension of the graph problems [ Vol.12, Issue 43 , 44 - Spring - Summer Year 1399]

F

  • faez.karim Correcting camera lens misalignment using Zernik moments [ Vol.2, Issue 6 , 7 - Autumn - Winter Year 1389]
  • faez.karim Blind Correction of Lens Aberration Using Modified Zernike Moments [ Vol.2, Issue 5 - Spring - Summer Year ]
  • faez.karim Blind correction of camera lens aberration and de-centering error using modified Zernike model [ Vol.7, Issue 25 - Spring - Summer Year ]
  • fahimnia.fatima A framework for establishing a national data vault for Data Governance institution [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • Faraji Dizaji.Sajjad The Effect of ICT Development on Economic and Political Risk: A Cross Country Study [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • farasatkhah.maghsod Investigation on Faculty Members’ Competency Model in Virtual Environment Comment by the Faculty Members and Students (Based on Ormaner’s Model) [ Vol.6, Issue 21 - Spring Year ]
  • Fardinia.Mahdi Indigenous model of commercialization of complex technologies based on partnership in the ICT sector [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Farhoodi.Mojgan Presenting a new conceptual model for the field of big data and analyzing the data-driven business in Iran based on the proposed model [ Vol.13, Issue 47 , 48 - Spring - Summer Year 1400]
  • Farhoodi.Mojgan Persian Stance Detection Based On Multi-Classifier Fusion [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Farivar.Faezeh Stability Analysis of Networked Control Systems under Denial of Service Attacks using Switching System Theory [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • Farshi.Mohammad Measuring Similarity for Directed Path in Geometric Data [ Vol.12, Issue 45 , 46 - Autumn - Winter Year 1399]
  • Farzaneh.Mandana Extracting Innovation Strategies and Requirements for Telecommunication Companies: Case Study of Telecommunications Infrastructure Company [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Farzaneh.Mandana Providing a model for evaluating native electronic content in Iran based on value chain [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • Farzi.Saeed Use of conditional generative adversarial network to produce synthetic data with the aim of improving the classification of users who publish fake news [ Vol.13, Issue 47 , 48 - Spring - Summer Year 1400]
  • Fasanghari.Mahdi Design and fabrication of the E-field probe for the measurement of the electromagnetic fields in 5G frequency band [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • Fasanghari.Mahdi Comprehensive Interactive Maturity Model for Mobile government [ Vol.2, Issue 3 - Summer Year ]
  • Fatahi.Somayeh An approach to prioritize quality dimensions of based on cloud computing using Multiple Criteria Decision Making method [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • Fatemi.Yaghoub The Participation of Three Brain Tissues in Alzheimer’s disease Diagnosis from Structural MRI [ Vol.9, Issue 33 , 34 - Autumn - Winter Year 1396]
  • Fathian.Mohammad A conceptual model for identification of eservices quality in Iranian estores [ Vol.8, Issue 29 - Summer Year ]
  • Fathian.Mohammad Provide a conceptual model to identify the quality of electronic services in the country's online stores [ Vol.8, Issue 30 , 31 - Autumn - Winter Year 1395]
  • Fathian.Mohammad A proper method for the advertising email classification based on user’s profiles [ Vol.8, Issue 27 - Spring Year ]
  • Fathian.Mohammad COBIT A Suitable Framework for Measuring IT Governance in Organizations [ Vol.1, Issue 1 - Spring Year ]
  • fathiyan.mohammad Providing a suitable method for categorizing promotional e-mails based on user profiles [ Vol.8, Issue 27 , 28 - Spring - Summer Year 1395]
  • Feizpour.ٍElham The Ranking Lack of Success Factors of Electronic Commerce in Technical Infrastructure in Tile and Ceramic Factories in Meybod County [ Vol.8, Issue 29 - Summer Year ]
  • Feizpour.ٍElham Prioritization of e-commerce failure factors in technical infrastructure: Meybod city ceramic tile factories [ Vol.8, Issue 30 , 31 - Autumn - Winter Year 1395]
  • feyzi.amin using clustering in AODV routing protocol for vehicular ad-hoc networks on highway scenario [ Vol.8, Issue 29 - Summer Year ]
  • feyzi.amin Application of clustering in AODV routing protocol for intercity networks on the highway scenario [ Vol.8, Issue 30 , 31 - Autumn - Winter Year 1395]
  • Firozeh.Safora Information Technology, Strategy Implementation, Information Systems, Strategic Planning, Input-Process-Outcome Framework [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • forootan.faezeh Applying deep learning for improving the results of sentiment analysis of Persian comments of Online retail stores [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • forouza.amirhossein Reinforcement of the central axis of tubular structures and its application in extracting the central axis of the portal vein [ Vol.4, Issue 14 , 15 - Autumn - Winter Year 1391]
  • forouza.amirhossein Medial-axis Enhancement of Tubular Structures and its Application in the Extraction of Portal Veins [ Vol.4, Issue 13 - Spring Year ]

G

  • Gerami.Mohsen Pathology of software export development in Iran [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • Ghaffarzadegan.Mahshid Extracting Innovation Strategies and Requirements for Telecommunication Companies: Case Study of Telecommunications Infrastructure Company [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • ghanbari.elham A new algorithm based on ensemble learning for learning to rank in information retrieval [ Vol.7, Issue 25 - Spring - Summer Year ]
  • Ghasemi.Mohammad Exploring the antecedents and consequences of smart good governance using the fuzzy Delphi method (FDM) [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • ghasemian.fahime Performance Improvement of Automatic Language Identification Using GMM-SVM Method [ Vol.2, Issue 5 - Spring - Summer Year ]
  • Ghavami.Hossein Performance Analysis of Device to Device Communications Overlaying/Underlaying Cellular Network [ Vol.9, Issue 33 , 34 - Autumn - Winter Year 1396]
  • ghayori.majid Improvement of intrusion detection system on Industrial Internet of Things based on deep learning using metaheuristic algorithms [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • ghayori.majid Intrusion Detection Based on Cooperation on the Permissioned Blockchain Platform in the Internet of Things Using Machine Learning [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • ghayori.majid Incentive reward mechanism for Participants to the human computing system of Intrusion Detection Based on Game Theory [ Vol.12, Issue 43 , 44 - Spring - Summer Year 1399]
  • ghayori.majid Intrusion Detection Based on Cooperation on the Permissioned Blockchain Platform in the Internet of Things Using Machine Learning [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • ghazanfari.mehdi COBIT A Suitable Framework for Measuring IT Governance in Organizations [ Vol.1, Issue 1 - Spring Year ]
  • ghaznavi.mohammadbagher Classify and implement hardware trojans and provide a new way to detect them [ Vol.9, Issue 31 , 32 - Spring - Summer Year 1396]
  • ghodselahi.ahmad A Hybrid Neural Network Ensemble Model for Credit Risk Assessment [ Vol.6, Issue 20 , 21 - Spring - Summer Year 1393]
  • gholamian.mohammadreza Provide a method for customer segmentation using the RFM model in conditions of uncertainty [ Vol.8, Issue 30 , 31 - Autumn - Winter Year 1395]
  • gholipoor.niloofar Emerging technologies in future generations of high performance computing: introduction, taxonomy and future research directions [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Gholipour.Majid A Collaborative Filtering Movie Recommendation System Based on Users Correlation and Weighted K-Means with High Accuracy [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • Ghorbannia Delavar.Arash WSTMOS: A Method For Optimizing Throughput, Energy, And Latency In Cloud Workflow Scheduling [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • Gilanian Sadeghi.Mohammad Mehdi Community Detection in Bipartite Networks Using HellRank Centrality Measure [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Gilanian Sadeghi.Mohammad Mehdi Community Detection in Bipartite Networks Using HellRank Centrality Measure [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • golshani rosta.mehrab ali An Information Architecture Framework for Utilizing Social Networks in Iranian Higher Education System [ Vol.5, Issue 17 - Spring - Summer Year ]
  • Goodarzi.Babak New changes of local binary patterns and classification and segmentation of seabed images [ Vol.8, Issue 27 - Spring Year ]
  • Goodarzi.Babak New changes of local binary pattern and classification and segmentation of texture images of the seabed [ Vol.8, Issue 27 , 28 - Spring - Summer Year 1395]

H

  • habibollahian.ehsan Three-axis attitude control of a micro-satellite by magnetic actuators through-synthesis robust method [ Vol.5, Issue 15 - Summer Year ]
  • Haghighat Monfared.Jalal Indigenous model of commercialization of complex technologies based on partnership in the ICT sector [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Haghighathoseini.Atefehsadat Extracting the Information Technology architecture of hospitals with approach of Implementing in Iran [ Vol.8, Issue 27 - Spring Year ]
  • Haghighathoseini.Atefehsadat Extracting hospital information technology architecture with the approach of implementation capability in Iran [ Vol.8, Issue 27 , 28 - Spring - Summer Year 1395]
  • haghighathosseini.atefe Extracting the Information Technology architecture of hospitals with approach of Implementing in Iran [ Vol.8, Issue 27 - Spring Year ]
  • Haghighinasab.Manijeh A value Co-creation model for Information and Communication Technology Entrepreneurial Ecosystem [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • Hajebi.Elham Reduction of network load by mapping the application in the network on a chip using the discrete Harris hawk algorithm [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • Haji Gholam Saryazdi.Ali Determining the factors affecting the collective financing of knowledge-based IT companies [ Vol.10, Issue 37 , 38 - Autumn - Winter Year 1397]
  • hajiabdollah.Shaghayegh Improving polarity identification in sentiment analysis using sarcasm detection and machine learning algorithms in Persian tweets [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • hajmohseni.sadegh Classify and implement hardware trojans and provide a new way to detect them [ Vol.9, Issue 31 , 32 - Spring - Summer Year 1396]
  • hakimjavadi.ali Iran's Mobile Government Ecosystem Model, Stakeholders Identification and Analysis [ Vol.7, Issue 23 - Summer Year ]
  • hakimjavadi.ali Iran's companion government ecosystem model, analysis and recognition of the main players [ Vol.7, Issue 24 , 25 - Spring - Summer Year 1394]
  • hakkak.mohammad Provide a model of human resource knowledge architecture in knowledge-based organizations using a mixed approach [ Vol.11, Issue 39 , 40 - Spring - Summer Year 1398]
  • hamze.ali Improving recommender systems with the help of Semantic Web [ Vol.9, Issue 31 , 32 - Spring - Summer Year 1396]
  • hashemi G..S. Alireza A Neighbor-based Link Prediction Method for Bipartite Networks [ Vol.13, Issue 47 , 48 - Spring - Summer Year 1400]
  • hashemi G..S. Alireza Provide a new architecture for the decision support system to manage stock trading based on a combination of financial indicators [ Vol.9, Issue 31 , 32 - Spring - Summer Year 1396]
  • hashemi G..S. Alireza Generalizing The Concept of Business Processes Structural Soundness from Classic Petri-nets to BPMN2.0 Process Models [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • hashemi G..S. Alireza Generalizing The Concept of Business Processes Structural Soundness from Classic Petri-nets to BPMN2.0 Process Models [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Hashemi.Ali User recommendation in Telegram messenger by graph analysis and mathematical modeling of users' behavior [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • hashemi.MAHDI Modified orthogonal chaotic colonial competition algorithm and its application in improving pattern recognition in multilayer perceptron neural network [ Vol.10, Issue 35 , 36 - Spring - Summer Year 1397]
  • Hashemi.Mahdi Improving Opinion Aspect Extraction Using Domain Knowledge and Term Graph [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • hashemi.meisam Textual analysis of central bank news in forecasting long-term trend of Tehran stock exchange index [ Vol.12, Issue 43 , 44 - Spring - Summer Year 1399]
  • Hashemi.Sattar Provide a framework for enhancing the security of IoT-based smart homes using the IoT-A reference architecture [ Vol.10, Issue 35 , 36 - Spring - Summer Year 1397]
  • hashempour.raheb Face recognition and Liveness Detection Based on Speech Recognition for Electronical Authentication [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • hassani.hadise Determining optimal support vector machines in classification of hyperspectral images based on genetic algorithm [ Vol.4, Issue 14 , 15 - Autumn - Winter Year 1391]
  • hassani.hadise Determination of Optimum SVMs Based on Genetic Algorithm in Classification of Hyper spectral Imagery [ Vol.4, Issue 13 - Spring Year ]
  • hassanzade.alireza Determining the factors affecting the collective financing of knowledge-based IT companies [ Vol.10, Issue 37 , 38 - Autumn - Winter Year 1397]
  • hassanzade.alireza Designing a Fuzzy Expert System for Selecting an Appropriate Contractor in Information Technology Outsourcing [ Vol.2, Issue 5 - Spring - Summer Year ]
  • Haydari.Saeed Assessing E-Government Readiness in Iranian Universities, Case Study: Tarbiat Modares University [ Vol.12, Issue 43 , 44 - Spring - Summer Year 1399]
  • Hayeri Khyavi.Masoud Emerging technologies in future generations of high performance computing: introduction, taxonomy and future research directions [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • hazratgholizadeh.rahim A proper method for the advertising email classification based on user’s profiles [ Vol.8, Issue 27 - Spring Year ]
  • hazratgholizadeh.rahim Providing a suitable method for categorizing promotional e-mails based on user profiles [ Vol.8, Issue 27 , 28 - Spring - Summer Year 1395]
  • heidary.mohsen Analysis of the current situation ICT in rural areas of the country (using the Delphi Method) [ Vol.6, Issue 19 - Autumn Year ]
  • Helfroush.Mohammad Sadegh The Participation of Three Brain Tissues in Alzheimer’s disease Diagnosis from Structural MRI [ Vol.9, Issue 33 , 34 - Autumn - Winter Year 1396]
  • Hendijani.Rosa E-Government Service Supply Chain: Identifying Performance Evaluation Indicators (Case Study of e-Customs System in Iran) [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • Heshmati.Zainabolhoda An optimised hybrid method for ambulance dispatch based on complex networks and Artificial Intelligence [ Vol.7, Issue 23 - Summer Year ]
  • Heshmati.Zainabolhoda Providing an optimal method for dispatching an ambulance based on complex networks and artificial intelligence [ Vol.7, Issue 24 , 25 - Spring - Summer Year 1394]
  • Heshmati.Zainabolhoda Optimum modeling of patient satisfaction with the doctor based on machine learning methods [ Vol.7, Issue 24 , 25 - Spring - Summer Year 1394]
  • Heshmati.Zainabolhoda Optimized Modeling for satisfaction in the relationship between a physician and patient based on machine learnin methods [ Vol.7, Issue 23 - Summer Year ]
  • heydari.jamshid An Investigation on the Effect of Multifactor Model of Improving Critical Thinking in E-learning Environments [ Vol.6, Issue 21 - Spring Year ]
  • homayooni.maryam Evaluation of SIP signaling implementation using QoS parameters [ Vol.1, Issue 1 - Spring Year ]
  • homayoun.homayoun Performance Improvement of Automatic Language Identification Using GMM-SVM Method [ Vol.2, Issue 5 - Spring - Summer Year ]
  • honarparvaran.hamid Design a Model Of System Dynamics (SD) On The Policy Of Upgrading Indices Of Iran ICT Network [ Vol.8, Issue 29 - Summer Year ]
  • honarparvaran.hamid Designing a system dynamics model for upgrading policy Iran Information and Communication Technology Network Indicators [ Vol.8, Issue 30 , 31 - Autumn - Winter Year 1395]
  • Hossayni.Sayyed Ali A Review on Hadith Text Processing Tasks [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Hossayni.Sayyed Ali Noor Analysis: A Benchmark Dataset for Evaluating Morphological Analysis Engines [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • Hossayni.Sayyed Ali A Review on Hadith Text Processing Tasks [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Hosseinali-Zade.Sasan A review of the application of meta-heuristic algorithms in load balancing in cloud computing [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • hosseinfirooze.zaker A Fast Method to Compute Radiation Fields of Shaped Reflector Antennas by FFT [ Vol.1, Issue 2 , 3 - Autumn - Winter Year 1387]
  • Hosseini.Mohammad Reza The framework of the national macro plan for transparency and information release based on the grounded theory method [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • Hosseini.Seyed Abdolrasoul Exploring the antecedents and consequences of smart good governance using the fuzzy Delphi method (FDM) [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • Hosseini.Seyedeh Motahareh Identify and analyze decision points and key players in procurement process in the EPC companies [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Hosseinpour.Mehdi Open Data Accessing Policymaking in Iran, in the Aspect of Preserving Privacy and Personal Data Ownership [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • Hosseinzadeh.Elham Investigating the Information and Communication Technology Deployment Impact on Energy Expenditures of Iranian households (A Provincial Approach) [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • Hossieni bayan.Shaghayeghsadat High Performance Computing: Next Generation Requirements and Research Axes [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • houri.masa Medial-axis Enhancement of Tubular Structures and its Application in the Extraction of Portal Veins [ Vol.4, Issue 13 - Spring Year ]

J

  • Jabraeil Jamali.Mohammad Ali Design of FPGA-based processor for SHA-2 series cryptographic algorithms Design ترجمه‌های design اسمفراوانی طرح plan, design, layout, project, scheme, plot نقشه map, plan, plot, scheme, plat, chart زمینه background, context, ground, setting, base, terrain تدبیر measure, plan, contraption, gimmick, contrivance, scheme قصد intention, intent, purpose, attempt, will, determination طراح ریزی design خیال imagination, phantom, illusion, thought, fiction, mind فعل طرح کردن design, plan, draft, draw, lay, bring forth قصد کردن attempt, decide, design, meditate تخصیص دادن allot, allocate, apportion, consecrate, give, design تدبیر کردن devise, contrive, meditate, compass, machinate, design تعریف‌های design اسم ۱ a plan or drawing produced to show the look and function or workings of a building, garment, or other object before it is built or made. he has just unveiled his design for the new museum مترادف‌ها: planblueprintdrawingscale drawingsketchoutlinemapplotdiagramdelineationdraftdepictionrepresentationartist's impressionschememodelprototypeproposal ۲ an arrangement of lines or shapes created to form a pattern or decoration. pottery with a lovely blue and white design مترادف‌ها: patternmotifdevicestylearrangementcompositionmakeuplayoutconstitutionconfigurationorganizationconstructionshapeformformationfigure purpose, planning, or intention that exists or is thought to exist behind an action, fact, or material object. the appearance of design in the universe مترادف‌ها: intentionaimpurposeplanintentobjectiveobjectgoalendtargetpointhopedesirewishdreamaspirationambitionidea فعل ۱ decide upon the look and functioning of (a building, garment, or other object), by making a detailed drawing of it. a number of architectural students were designing a factory مترادف‌ها: plandraw plans ofdrawsketchoutlinemap outplotblock outdelineatedraftdepictinventoriginatecreatethink upcome up withdeviseformformulateconceivemakeproducedevelopfashionfabricateforgehatchcoindream up مترادف design اسم planpatternintention فعل planinventdream upintend ۹۱ مترادف دیگر [ Vol.10, Issue 37 , 38 - Autumn - Winter Year 1397]
  • Jafarali Jassbi.Somayyeh Community-Based Multi-Criteria Placement of Applications in the Fog Environment [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Jafarali Jassbi.Somayyeh Priority based Deployment of IoT Applications in Fog [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • jafari fesharaki.shekoofeh A Satellite Control Method Using Laguerre Model Predictive Control Approach [ Vol.5, Issue 15 - Summer Year ]
  • jafari novimipour.nima Scheduling tasks in cloud environments using mapping framework - reduction and genetic algorithm [ Vol.10, Issue 37 , 38 - Autumn - Winter Year 1397]
  • jafari novimipour.nima Using a multi-objective optimization algorithm for tasks allocate in the cloud-based systems to reduce energy consumption [ Vol.12, Issue 43 , 44 - Spring - Summer Year 1399]
  • Jafari.Bagher A novel metaheuristic algorithm and its discrete form for influence maximizing in complex networks [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • jafari.mahdi A New Algorithm for Fastintra-Frame Modes Selection in H.264/Avc Video Coding [ Vol.7, Issue 26 , 27 - Autumn - Winter Year 1394]
  • Jafari.Seyed Mohammadbagher Provide methodology for selecting IT project management strategy [ Vol.10, Issue 37 , 38 - Autumn - Winter Year 1397]
  • Jafari.Seyed Mohammadbagher Data-driven Marketing in Digital Businesses from Dynamic Capabilities View [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • jahanbakhsh.mojtaba Evaluation of SIP signaling implementation using QoS parameters [ Vol.1, Issue 1 - Spring Year ]
  • jam.Shahrokh Parametric analysis of a broadband Archimedean spiral antenna with cavity [ Vol.9, Issue 33 , 34 - Autumn - Winter Year 1396]
  • Jami Pour.Mona Information Technology, Strategy Implementation, Information Systems, Strategic Planning, Input-Process-Outcome Framework [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • jamipour.mona Provide methodology for selecting IT project management strategy [ Vol.10, Issue 37 , 38 - Autumn - Winter Year 1397]
  • Jampour.Mehdi An efficient Two Pathways Deep Architecture for Soccer Goal Recognition towards Soccer Highlight Summarization [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • Javidan.Javidan New changes of local binary pattern and classification and segmentation of texture images of the seabed [ Vol.8, Issue 27 , 28 - Spring - Summer Year 1395]
  • Javidan.Javidan New changes of local binary patterns and classification and segmentation of seabed images [ Vol.8, Issue 27 - Spring Year ]

K

  • kaedi.marjan Textual analysis of central bank news in forecasting long-term trend of Tehran stock exchange index [ Vol.12, Issue 43 , 44 - Spring - Summer Year 1399]
  • kalantari.nadia Designing a fuzzy expert system for choosing the right contractor in information technology outsourcing [ Vol.2, Issue 6 , 7 - Autumn - Winter Year 1389]
  • kalantari.nadia Designing a Fuzzy Expert System for Selecting an Appropriate Contractor in Information Technology Outsourcing [ Vol.2, Issue 5 - Spring - Summer Year ]
  • Kalantari.Reza computer security models and proposing a new perspective: A review paper [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Kalantari.Reza A Survey on Computer Security Patterns and Proposing a New Perspective [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • kamareiy.malihe Matched grouping of learners in e-learning environment using council clustering method [ Vol.11, Issue 39 , 40 - Spring - Summer Year 1398]
  • Karamizadeh.Sasan New Method to Improve Illumination Variations in Adult Images Based on Fuzzy Deep Neural Network [ Vol.11, Issue 41 , 42 - Autumn - Winter Year 1398]
  • karbasi.mostafa Adaptive rotation models and traffic patterns to reduce light loss in networks on optical chip [ Vol.10, Issue 35 , 36 - Spring - Summer Year 1397]
  • Karbasi.Soheila Fast and accurate concept drift detection from event logs [ Vol.12, Issue 43 , 44 - Spring - Summer Year 1399]
  • kardan.AhmadAgha Presenting a model for extracting information from text documents, based on text-mining in the field of e-learning [ Vol.4, Issue 12 , 13 - Spring - Summer Year 1391]
  • kargari.mehrdad Liquidity Risk Prediction Using News Sentiment Analysis [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Karimi.Hossein The Effect of ICT Development on Economic and Political Risk: A Cross Country Study [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • karimi.keyvan Window-Shopping as an Effective Element to Improve Viral Marketing [ Vol.2, Issue 3 - Summer Year ]
  • Karimpour.Davod User recommendation in Telegram messenger by graph analysis and mathematical modeling of users' behavior [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • kaveh.manije Investigation the role of personality and individual differences on password security breaches: An Empirical Study [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • kavoshtehrani.masoud Modification of medium transfer detector for target tracking with variable radiation pattern [ Vol.4, Issue 14 , 15 - Autumn - Winter Year 1391]
  • kavoshtehrani.masoud Improvement of mean shift tracker for tracking of target with variable photometric pattern [ Vol.4, Issue 13 - Spring Year ]
  • kazemian.sirous A model information technology adoption in academic research projects in the filed ICT based on Information Technology Adoption Integrated Modeling (ITAIM) [ Vol.11, Issue 41 , 42 - Autumn - Winter Year 1398]
  • Keimasi.Masoud Employing a meta-synthesis to present a framework for commercial banks’ preparedness indicators in use of blockchain technology [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • Keramati.Mohammad Ali Anomaly and Intrusion Detection through Datamining and Feature Selection using PSO Algorithm [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Keramati.Mohammad Ali Anomaly and Intrusion Detection Through Data Mining and Feature Selection using PSO Algorithm [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Kermani.Aminolah Using Sentiment Analysis and Combining Classifiers for Spam Detection in Twitter [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • Keyhanipour.Amir Hosein Learning to Rank for the Persian Web Using the Layered Genetic Programming [ Vol.10, Issue 37 , 38 - Autumn - Winter Year 1397]
  • Keyhanipour.Amir Hosein Survey on the Applications of the Graph Theory in the Information Retrieval [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Keyhanipour.Amir Hosein Survey on the Applications of the Graph Theory in the Information Retrieval [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • khademzade.ahmad Adaptive rotation models and traffic patterns to reduce light loss in networks on optical chip [ Vol.10, Issue 35 , 36 - Spring - Summer Year 1397]
  • KHALAJJ.ELHAM Presenting the model for opinion mining at the document feature level for hotel users' reviews [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • khalili.ali Semiautomatic Creation of Enterprise Mashups Using Semantic Descriptions [ Vol.2, Issue 3 - Summer Year ]
  • Khalili.Zahra Employing a meta-synthesis to present a framework for commercial banks’ preparedness indicators in use of blockchain technology [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • Khansari.Mohammad A RPL-based Routing Algorithm for Multimedia Traffic for the Internet of Things [ Vol.13, Issue 47 , 48 - Spring - Summer Year 1400]
  • Khansari.Mohammad Explanation of Standardization Role in the Proposed Solutions for Privacy Protection in Health Data [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Khansari.Mohammad Explanation the role of standardization in the proposed solutions for privacy protection in health data [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Khansari.Mohammad Synthesizing an image dataset for text detection and recognition in images [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • kharati.ehsan Increasing the value of collected data and reducing energy consumption by using network coding and mobile sinks in wireless sensor networks [ Vol.12, Issue 43 , 44 - Spring - Summer Year 1399]
  • Kharrat.Mahmood Providing a model for evaluating native electronic content in Iran based on value chain [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • Khashei.vahid The role of organizational factors on consumer buying behavior in social networks [ Vol.12, Issue 45 , 46 - Autumn - Winter Year 1399]
  • Khasteh.Seyed Hossein Fuzzy Multicore Clustering of Big Data in the Hadoop Map Reduce Framework [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Khasteh.Seyed Hossein Improving Efficiency of Finding Frequent Subgraphs in Graph Stream Using gMatrix Summarization [ Vol.12, Issue 45 , 46 - Autumn - Winter Year 1399]
  • khatan Lo.hasan Document Clustering Based On Ontology and Fuzzy Approach [ Vol.5, Issue 17 - Spring - Summer Year ]
  • Khatibi.Amid A Novel Method based on the Cocomo model to increase the accuracy of software projects effort estimates [ Vol.12, Issue 45 , 46 - Autumn - Winter Year 1399]
  • kherad.mahdi Comparing A Hybridization of Fuzzy Inference System and Particle Swarm Optimization Algorithm with Deep Learning to Predict Stock Prices [ Vol.11, Issue 41 , 42 - Autumn - Winter Year 1398]
  • khezr.nima Scheduling tasks in cloud environments using mapping framework - reduction and genetic algorithm [ Vol.10, Issue 37 , 38 - Autumn - Winter Year 1397]
  • Khodaverdian.Zeinab Predicting the workload of virtual machines in order to reduce energy consumption in cloud data centers using the combination of deep learning models [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • khorsandi.siavash Cyber Threats Foresight Against Iran Based on Attack Vector [ Vol.9, Issue 33 , 34 - Autumn - Winter Year 1396]
  • Khosroshahi.Mahan A Multi-Objective Differential Evolutionary Algorithm-based Approach for Resource Allocation in Cloud Computing Environment [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • Khosrozadeh.Ali Community Detection in Bipartite Networks Using HellRank Centrality Measure [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Khosrozadeh.Ali Community Detection in Bipartite Networks Using HellRank Centrality Measure [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • khotanloo.hassan A New Method to computational intelligence to improve network lifetime in wireless sensor networks [ Vol.7, Issue 23 - Summer Year ]
  • Khunjush.Farshad Investigating the Effect of Hardware Parameters Adjustments on Energy Consumption in Thin Matrix Multiplication Algorithm on GPUs [ Vol.9, Issue 31 , 32 - Spring - Summer Year 1396]
  • Khunjush.Farshad Investigating the Effects of Hardware Parameters on Power Consumptions in SPMV Algorithms on Graphics Processing Units (GPUs) [ Vol.9, Issue 31 - Spring - Summer Year ]
  • kiani.koorosh Design of Secure Communication System by Use of Synchronization of Chaotic Systems [ Vol.2, Issue 3 - Summer Year ]
  • Kiani.Vahid Two Fuzzy Virtual Force Algorithms to Improve Sensor Deployment in Wireless Sensor Networks [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]

L

  • lak.behzad Analysing students' learning through morning exercise using data mining techniques [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • Layeghi.Kamran Sentiment analysis for stock market predection with deep neural network: A case study for international corporate stock database [ Vol.13, Issue 47 , 48 - Spring - Summer Year 1400]
  • Layeghi.Kamran An efficient Two Pathways Deep Architecture for Soccer Goal Recognition towards Soccer Highlight Summarization [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • lormohammad hasani esfandghe.yahya Incentive reward mechanism for Participants to the human computing system of Intrusion Detection Based on Game Theory [ Vol.12, Issue 43 , 44 - Spring - Summer Year 1399]

M

  • madani.mohammadhosein Increasing data throughput in HF channel by decision feedback equalizer employing MC-FQRD-RLS algorithm and weight extraction in data mode [ Vol.5, Issue 15 - Summer Year ]
  • Mafi.Zohreh Test case Selection based on Test-Driven Development [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Mafi.Zohreh Regression Test Time Reduction in Test Driven Development [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Maghsoudi.Hamid Improved routing for load balancing in wireless sensor networks on the Internet of things, based on multiple ant colony algorithm [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • mahdinejadnouri.mohammad Increasing data throughput in HF channel by decision feedback equalizer employing MC-FQRD-RLS algorithm and weight extraction in data mode [ Vol.5, Issue 15 - Summer Year ]
  • mahjour.ali Provide a basic method for estimating software projects based on logical transactions [ Vol.9, Issue 31 , 32 - Spring - Summer Year 1396]
  • Mahyar.Hamidreza Community Detection in Bipartite Networks Using HellRank Centrality Measure [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Mahyar.Hamidreza Community Detection in Bipartite Networks Using HellRank Centrality Measure [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Majidnezhad.Vahid A novel metaheuristic algorithm and its discrete form for influence maximizing in complex networks [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • makhlooghi.morteza Semi-blind labeling of images using SVD in the field of discrete wavelet transform [ Vol.2, Issue 6 , 7 - Autumn - Winter Year 1389]
  • makhlooghi.morteza DWT-SVD based Semi-Blind Digital Image Watermarking [ Vol.2, Issue 5 - Spring - Summer Year ]
  • maleki.davood Presenting a novel solution to choose a proper database for storing big data in national network services [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • maleki.davood Providing a New Solution in Selecting Suitable Databases for Storing Big Data in the National Information Network [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • maleki.reza Persian digit recognition system in aerial writing based on depth image [ Vol.10, Issue 35 , 36 - Spring - Summer Year 1397]
  • Manavi Mofrad.Hosna Multi-Level Ternary Quantization for Improving Sparsity and Computation in Embedded Deep Neural Networks [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Manavi Mofrad.Hosna Multi-level ternary quantization for improving sparsity and computation in embedded deep neural networks [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • manian.amir Prioritization of e-commerce failure factors in technical infrastructure: Meybod city ceramic tile factories [ Vol.8, Issue 30 , 31 - Autumn - Winter Year 1395]
  • Mansoorizadeh.Muharram Discover product defect reports from the text of users' online comments [ Vol.10, Issue 35 , 36 - Spring - Summer Year 1397]
  • mansour.hakimeh Sentiment analysis for stock market predection with deep neural network: A case study for international corporate stock database [ Vol.13, Issue 47 , 48 - Spring - Summer Year 1400]
  • mansouri.bijan Provide a new architecture for the decision support system to manage stock trading based on a combination of financial indicators [ Vol.9, Issue 31 , 32 - Spring - Summer Year 1396]
  • Mansoury.Masoud Provide a new architecture for the decision support system to manage stock trading based on a combination of financial indicators [ Vol.9, Issue 31 , 32 - Spring - Summer Year 1396]
  • manzouri.mohammadtaghi A Novel Model based on Encoder-Decoder Architecture and Attention Mechanism for Automatic Abstractive Text Summarization [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • mashayekhi.alinaghi Determining the factors affecting the collective financing of knowledge-based IT companies [ Vol.10, Issue 37 , 38 - Autumn - Winter Year 1397]
  • Mazoochi.Mojtaba The framework of the national macro plan for transparency and information release based on the grounded theory method [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • Mazoochi.Mojtaba Synthesizing an image dataset for text detection and recognition in images [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • Mehrabani.Ghorbanali Identifying the Key Drivers of Digital Signature Implementation in Iran (Using Fuzzy Delphi Method) [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Mehrabani.Ghorbanali Identifying the Key Drivers of Digital Signature Implementation in Iran (using fuzzy Delphi method) [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Mehrabi.Javad Drivers, Obstacles and consequences of digital entrepreneurship in Iran's road freight transportation industry [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • mehraeen.mohammad Explanation of Standardization Role in the Proposed Solutions for Privacy Protection in Health Data [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • mehraeen.mohammad Explanation the role of standardization in the proposed solutions for privacy protection in health data [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • mehrshad.batool Explanation of Standardization Role in the Proposed Solutions for Privacy Protection in Health Data [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • mehrshad.batool Explanation the role of standardization in the proposed solutions for privacy protection in health data [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • memarmoghada.alireza Improvement of mean shift tracker for tracking of target with variable photometric pattern [ Vol.4, Issue 13 - Spring Year ]
  • Memarzadeh.Gholamreza Presenting the ICT Policies Implementation Model of the 6th Development Using the Neural Network Method [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Memarzadeh.Gholamreza Presenting the ICT Policies Implementation Model of the 6th Development Using the Neural Network Method [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • milani.farzaneh Investigating the effect of using various marketing strategies on social networks on gaining the trust of council customers Investigating ترجمه‌های investigate فعلفراوانی بررسی کردن investigate, check, peruse, survey, study رسیدگی کردن consider, attend, check, investigate, inspect, investigate استفسار کردن investigate وارسی کردن sift, investigate پژوهیدن investigate, inquire, research, search تحقیق کردن investigate, inquire, verify, assay, interrogate, question اطلاعات مقدماتی بدست اوردن investigate جستار کردن investigate تفتیش کردن inquire, inspect, investigate, revise باز جویی کردن examine, assay, inquire, interrogate, investigate, cross-examine تعریف‌های investigate فعل ۱ carry out a systematic or formal inquiry to discover and examine the facts of (an incident, allegation, etc.) so as to establish the truth. police are investigating the alleged beating مترادف‌ها: check outsuss outgive something the once-overscope outinquire intolook intogo intolook overprobeexplorescrutinizeconduct an investigation intoconduct an inquiry intomake inquiries abouttry to get to the bottom ofinspectanalyzestudyexamineconsiderresearchsearch/sift the evidence concerningpore overdelve intoauditevaluatefollow up مترادف investigate فعل check outsuss outgive something the once-overscope out inquire intolook intogo intolook overprobeexplorescrutinizeconduct an investigation intoconduct an inquiry intomake inquiries abouttry to get to the bottom ofinspectanalyzestudyexamineconsiderresearchsearch/sift the evidence concerningpore overdelve intoauditevaluatefollow up همچنین ببینید investigate [ Vol.11, Issue 39 , 40 - Spring - Summer Year 1398]
  • Minaei.Behrooz A Review on Hadith Text Processing Tasks [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Minaei.Behrooz Noor Analysis: A Benchmark Dataset for Evaluating Morphological Analysis Engines [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • Minaei.Behrooz A Review on Hadith Text Processing Tasks [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Minaei.Behrooz A comprehensive survey on the influence maximization problem in social networks [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • Minoofam.Seyyed Amir Hadi A Decision Support System based on Rough sets for Enterprise Planning under uncertainty [ Vol.13, Issue 47 , 48 - Spring - Summer Year 1400]
  • mirashk.hamed Liquidity Risk Prediction Using News Sentiment Analysis [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • miri.maryam A Research Over the Obstacles and Influential Factors on Development of e-Learning Subjects from Perspective of Beneficiaries of CME Program in Jahrom University of Medical Sciences in 2012-2013 [ Vol.6, Issue 21 - Spring Year ]
  • mirian.mirian Test case Selection based on Test-Driven Development [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • mirian.mirian Regression Test Time Reduction in Test Driven Development [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • mirmohammadsadeghi.hamid A Fast Method to Compute Radiation Fields of Shaped Reflector Antennas by FFT [ Vol.1, Issue 2 , 3 - Autumn - Winter Year 1387]
  • Mirsaeedghazi.Tahereh Providing a model for evaluating native electronic content in Iran based on value chain [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • Mirsaeedghazi.Tahereh Open Data Accessing Policymaking in Iran, in the Aspect of Preserving Privacy and Personal Data Ownership [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • Mirtaheri.Seyedeh Leili Improving IoT resource management using fog calculations and ant lion optimization algorithm [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • Mirtaheri.Seyedeh Leili Increasing Total Throughput, Reducing Outage to Zero, and Reducing Power Consumption in a Cellular Network [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • Mirzarezaee.Mitra Improving polarity identification in sentiment analysis using sarcasm detection and machine learning algorithms in Persian tweets [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • Moallem.Payman Modification of medium transfer detector for target tracking with variable radiation pattern [ Vol.4, Issue 14 , 15 - Autumn - Winter Year 1391]
  • Moallem.Payman Modified orthogonal chaotic colonial competition algorithm and its application in improving pattern recognition in multilayer perceptron neural network [ Vol.10, Issue 35 , 36 - Spring - Summer Year 1397]
  • Moallem.Payman Improvement of mean shift tracker for tracking of target with variable photometric pattern [ Vol.4, Issue 13 - Spring Year ]
  • Moeini.Ali Survey on the Applications of the Graph Theory in the Information Retrieval [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Moeini.Ali Survey on the Applications of the Graph Theory in the Information Retrieval [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • mohamadian.ََُAyoub Data-driven Marketing in Digital Businesses from Dynamic Capabilities View [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • mohamadrezaei larki.rezvan context-aware travel recommender system exploiting from Geo-tagged photos [ Vol.11, Issue 41 , 42 - Autumn - Winter Year 1398]
  • mohammadi.abbas The Impact of IQ Imbalance on the BER of Adaptive Modulation in the MIMO System [ Vol.1, Issue 1 - Spring Year ]
  • mohammadi.ali Designing a system dynamics model for upgrading policy Iran Information and Communication Technology Network Indicators [ Vol.8, Issue 30 , 31 - Autumn - Winter Year 1395]
  • mohammadi.amir Using a Hybrid PSO-GA Method for Capacitor Placement in Distribution Systems [ Vol.6, Issue 20 , 21 - Spring - Summer Year 1393]
  • mohammadi.majid Application of clustering in AODV routing protocol for intercity networks on the highway scenario [ Vol.8, Issue 30 , 31 - Autumn - Winter Year 1395]
  • mohammadi.majid A New Algorithm for Fastintra-Frame Modes Selection in H.264/Avc Video Coding [ Vol.7, Issue 26 , 27 - Autumn - Winter Year 1394]
  • Mohammadi.Nasim Three Dimensional Beamforming in Multi User Multi Antenna Cellular Networks with Randomly Distributed Users [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • Mohammadi.Nazila Presenting the ICT Policies Implementation Model of the 6th Development Using the Neural Network Method [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Mohammadi.Nazila Presenting the ICT Policies Implementation Model of the 6th Development Using the Neural Network Method [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Mohammadi.Shahram Persian digit recognition system in aerial writing based on depth image [ Vol.10, Issue 35 , 36 - Spring - Summer Year 1397]
  • mohammadi.shahriyar Presenting the model for opinion mining at the document feature level for hotel users' reviews [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • mohammadi.shahriyar The main components of evaluating the credibility of users according to organizational goals in the life cycle of big data [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • mohammadi.shahriyar Criteria for evaluating the effectiveness of social media users - a framework based on social media exploration [ Vol.11, Issue 39 , 40 - Spring - Summer Year 1398]
  • mohammadi.shahriyar Window-Shopping as an Effective Element to Improve Viral Marketing [ Vol.2, Issue 3 - Summer Year ]
  • mohammadi.shahriyar Semiautomatic Creation of Enterprise Mashups Using Semantic Descriptions [ Vol.2, Issue 3 - Summer Year ]
  • mohammadi.shahriyar A Study On Visual Cryptography and Providing a Proposed Method for Color Images Cryptography [ Vol.6, Issue 20 , 21 - Spring - Summer Year 1393]
  • mohammadi.sudabeh Improving imperialist competitive algorithm for solving the nodes placement problem in three-dimensional grid wireless sensor networks [ Vol.12, Issue 45 , 46 - Autumn - Winter Year 1399]
  • Mohammadnezhad Fadard.Mansoureh The effect of emotional intelligence of project managers on the effectiveness of team communication in Iranian research institutes (Case study: Research Institute of Communication and Information Technology) [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • MOHAMMADZADEH.AMIR Valuation of digital services in Iran: Empirical proof for Google and Instagram [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Mohebikhah.Bita Estimating the Value of Digital Economy Core Spillover in Iran [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • Mohtarami.amir A framework for architecture the electronic trust in e-commerce:online shopping segment [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • molaee fard.reza Presenting a web recommender system for user nose pages using DBSCAN clustering algorithm and machine learning SVM method. [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • Mollamotalebi.Mahdi Improving the load balancing in Cloud computing using a rapid SFL algorithm (R-SFLA) [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • moltaji.milad Investigation the role of personality and individual differences on password security breaches: An Empirical Study [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • Momtazi.Saeedeh Sentiment analysis for stock market predection with deep neural network: A case study for international corporate stock database [ Vol.13, Issue 47 , 48 - Spring - Summer Year 1400]
  • monadjemi.Amir Hassan Segmentation of exterior color images for the purpose of object recognition using histogram with double accuracy [ Vol.4, Issue 14 , 15 - Autumn - Winter Year 1391]
  • monadjemi.Amir Hassan Door detection based on car vision in outdoor scenes [ Vol.8, Issue 30 , 31 - Autumn - Winter Year 1395]
  • monadjemi.Amir Hassan Outdoor Color Scene Segmentation towards Object Detection using Dual-Resolution Histograms [ Vol.4, Issue 14 - Autumn - Winter Year 1391]
  • montazer.gholamali Designing a personalized e-learning system using learners' characteristics and implementing it with the gamification elements [ Vol.13, Issue 47 , 48 - Spring - Summer Year 1400]
  • montazer.gholamali Assessing E-Government Readiness in Iranian Universities, Case Study: Tarbiat Modares University [ Vol.12, Issue 43 , 44 - Spring - Summer Year 1399]
  • montazer.gholamali Matched grouping of learners in e-learning environment using council clustering method [ Vol.11, Issue 39 , 40 - Spring - Summer Year 1398]
  • montazer.gholamali Design and implementation of a fuzzy expert system for suspicious behavior detection in e-banking system [ Vol.1, Issue 1 - Spring Year ]
  • montazer.gholamali Automatic Sepration of Learnrs in Learning Groups Based on Identifying Learning Style from Their Behavior in Learning Environment [ Vol.6, Issue 21 - Spring Year ]
  • montazer.gholamali Optimal LO Selection in E-Learning Environment Using PSO Algorithm [ Vol.6, Issue 21 - Spring Year ]
  • moomivand.hussein An Investigation into the Provider Factors of Knowledge Management in the Kermanshah province Communication Company [ Vol.7, Issue 25 - Spring - Summer Year ]
  • Moradhassel.Niloufar Estimating the Value of Digital Economy Core Spillover in Iran [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • moradi.farshad Evaluation of e-learning with optimal mining approach 1 case study: Iran's higher education [ Vol.4, Issue 12 , 13 - Spring - Summer Year 1391]
  • Moradi.Gholamreza Design, simulation and performance comparison of radating elements of reflect array antenna [ Vol.5, Issue 15 - Summer Year ]
  • moradi.hossein An Investigation on the Effect of Multifactor Model of Improving Critical Thinking in E-learning Environments [ Vol.6, Issue 21 - Spring Year ]
  • moradi.mahmood A Managerial Examination of the Successful Parameters in the B2C Business [ Vol.5, Issue 17 - Spring - Summer Year ]
  • Morsali.Mehdi A review of the application of meta-heuristic algorithms in load balancing in cloud computing [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • Mortazavi kahangi.Azam sadtat Drivers, Obstacles and consequences of digital entrepreneurship in Iran's road freight transportation industry [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • Mortazavi.Farzaneh A RPL-based Routing Algorithm for Multimedia Traffic for the Internet of Things [ Vol.13, Issue 47 , 48 - Spring - Summer Year 1400]
  • mortazavi.saeed Explanation of Standardization Role in the Proposed Solutions for Privacy Protection in Health Data [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • mortazavi.saeed Explanation the role of standardization in the proposed solutions for privacy protection in health data [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • mosammami.shila A Managerial Examination of the Successful Parameters in the B2C Business [ Vol.5, Issue 17 - Spring - Summer Year ]
  • mosavi.najmoddin Provide a model of human resource knowledge architecture in knowledge-based organizations using a mixed approach [ Vol.11, Issue 39 , 40 - Spring - Summer Year 1398]
  • mosleh.mohammad Presenting a web recommender system for user nose pages using DBSCAN clustering algorithm and machine learning SVM method. [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • moslehi.zahra Classification of two-level data with hyperrectangles parallel to the coordinate axes [ Vol.7, Issue 26 , 27 - Autumn - Winter Year 1394]
  • moslehi.zahra Classifying Two Class data using Hyper Rectangle Parallel to the Coordinate Axes [ Vol.7, Issue 25 - Spring - Summer Year ]
  • moslehshirazi.alinaghi Designing a system dynamics model for upgrading policy Iran Information and Communication Technology Network Indicators [ Vol.8, Issue 30 , 31 - Autumn - Winter Year 1395]
  • movaghar.movaghar Community Detection in Bipartite Networks Using HellRank Centrality Measure [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • movaghar.movaghar Community Detection in Bipartite Networks Using HellRank Centrality Measure [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • movahedi.masoud A model information technology adoption in academic research projects in the filed ICT based on Information Technology Adoption Integrated Modeling (ITAIM) [ Vol.11, Issue 41 , 42 - Autumn - Winter Year 1398]
  • mozafari.azime A method for clustering customers using RFM model and grey numbers in terms of uncertainty [ Vol.8, Issue 29 - Summer Year ]
  • mozafari.azime Provide a method for customer segmentation using the RFM model in conditions of uncertainty [ Vol.8, Issue 30 , 31 - Autumn - Winter Year 1395]
  • mozafari.sahar WSTMOS: A Method For Optimizing Throughput, Energy, And Latency In Cloud Workflow Scheduling [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • Mozayani.َAmir Hossein Investigating the Information and Communication Technology Deployment Impact on Energy Expenditures of Iranian households (A Provincial Approach) [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • Mozayani.َAmir Hossein The Effect of ICT Development on Economic and Political Risk: A Cross Country Study [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]

N

  • Naderi.Shaghayegh Application identification through intelligent traffic classification [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Naderi.Shaghayegh Application Identification Through Intelligent Traffic Classification [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • naghdeforoshhs.mona Heuristic algorithms for pseudo-triangulation random point set in the plane [ Vol.5, Issue 16 , 17 - Spring - Summer Year 1392]
  • naghshineh.Nader A framework for establishing a national data vault for Data Governance institution [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • naji.hamidreza A Hybrid Neural Network Ensemble Model for Credit Risk Assessment [ Vol.6, Issue 20 , 21 - Spring - Summer Year 1393]
  • Najjar-Ghabel.Samad Automatic Lung Diseases Identification using Discrete Cosine Transform-based Features in Radiography Images [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Narimani.mahboobeh Investigating the Degree of Application of Professional Ethics and Vocational Qualifications by the Faculty Members of Virtual Universities of Isfahan and Medical Sciences University of Isfahan [ Vol.6, Issue 21 - Spring Year ]
  • nasehifar.vahid The role of organizational factors on consumer buying behavior in social networks [ Vol.12, Issue 45 , 46 - Autumn - Winter Year 1399]
  • nasrollahi.marziye Provide methodology for selecting IT project management strategy [ Vol.10, Issue 37 , 38 - Autumn - Winter Year 1397]
  • Nassiri.Mohammad Improving performance of probe-based rate control mechanisms using classification: evaluation on an experimental testbed for High Throughput WLANs [ Vol.12, Issue 43 , 44 - Spring - Summer Year 1399]
  • Nazari Soleimandarabi.Mojdeh Predicting the workload of virtual machines in order to reduce energy consumption in cloud data centers using the combination of deep learning models [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Nejadali.Mahnaz A New Algorithm for Fastintra-Frame Modes Selection in H.264/Avc Video Coding [ Vol.7, Issue 26 , 27 - Autumn - Winter Year 1394]
  • nemati.hasanali Prioritization of e-commerce failure factors in technical infrastructure: Meybod city ceramic tile factories [ Vol.8, Issue 30 , 31 - Autumn - Winter Year 1395]
  • nematifard.narges Discover product defect reports from the text of users' online comments [ Vol.10, Issue 35 , 36 - Spring - Summer Year 1397]
  • nematollahzadeh.mahmood Emerging technologies in future generations of high performance computing: introduction, taxonomy and future research directions [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Nezarat.Amin A Novel Model for detecting intrusion with Mobile Agent and Game theory [ Vol.8, Issue 27 - Spring Year ]
  • nikkhoo.mohammad Design of Secure Communication System by Use of Synchronization of Chaotic Systems [ Vol.2, Issue 3 - Summer Year ]
  • nili.mohammadreza An Investigation on the Effect of Multifactor Model of Improving Critical Thinking in E-learning Environments [ Vol.6, Issue 21 - Spring Year ]
  • noorani.fateme A Framework for Identifying and Ranking Criteria for Evaluating the Quality of Electronic Services (Case studies: Golestan website of Payame-noor university) [ Vol.5, Issue 18 , 19 - Autumn - Winter Year 1392]
  • norollah.ali Heuristic algorithms for pseudo-triangulation random point set in the plane [ Vol.5, Issue 16 , 17 - Spring - Summer Year 1392]
  • noroozy.Hamed Parametric analysis of a broadband Archimedean spiral antenna with cavity [ Vol.9, Issue 33 , 34 - Autumn - Winter Year 1396]
  • noroozy.Hamed A design of Rectangular Waveguide TM11 to TE10 Mode Converter for S-band Applications [ Vol.9, Issue 33 , 34 - Autumn - Winter Year 1396]
  • Nosrati Nahook.Hassan Introducing a new optimal energy method for targets tracking in wireless sensor network using a hunting search algorithm [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • nourazar.fateme A matching probability-based flood algorithm for mobile ad hoc networks [ Vol.2, Issue 6 , 7 - Autumn - Winter Year 1389]
  • nourazar.fateme Adaptive Probabilistic Flooding for Ad Hoc Networks [ Vol.2, Issue 5 - Spring - Summer Year ]
  • Nozhat.Najmeh Improving the directivity of the plasmonic sectoral horn nanoantenna using lens in its aperture [ Vol.9, Issue 33 , 34 - Autumn - Winter Year 1396]
  • Nozhat.Najmeh Improvement of the bulk sensitivity and FoM of the plasmonic nanodipole antenna array [ Vol.9, Issue 33 , 34 - Autumn - Winter Year 1396]

O

  • ojaghi.hamed Artefacts and Producers Mapping of Iran's Artificial Intelligence Ecosystem based on Transformational Levels [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • omrani.mahdi Cyber Threats Foresight Against Iran Based on Attack Vector [ Vol.9, Issue 33 , 34 - Autumn - Winter Year 1396]
  • oskouiezade.reza Effect of Menu Location on Visual Attention of Users of Websites [ Vol.5, Issue 17 - Spring - Summer Year ]

P

  • Padidaran Moghaddam.Farhang Improved routing for load balancing in wireless sensor networks on the Internet of things, based on multiple ant colony algorithm [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • Padidaran Moghaddam.Farhang Fake Websites Detection Improvement Using Multi-Layer Artificial Neural Network Classifier with Ant Lion Optimizer Algorithm [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Paki.Reza A Novel Multi-Step Ahead Demand Forecasting Model Based on Deep Learning Techniques and Time Series Augmentation [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • Pakniyat.Samane A design of Rectangular Waveguide TM11 to TE10 Mode Converter for S-band Applications [ Vol.9, Issue 33 , 34 - Autumn - Winter Year 1396]
  • palhang.palhang Classification of two-level data with hyperrectangles parallel to the coordinate axes [ Vol.7, Issue 26 , 27 - Autumn - Winter Year 1394]
  • palhang.palhang Classifying Two Class data using Hyper Rectangle Parallel to the Coordinate Axes [ Vol.7, Issue 25 - Spring - Summer Year ]
  • parsa.saeed Applying genetic algorithm for automatic service identification based on quality metrics [ Vol.6, Issue 19 - Autumn Year ]
  • Parsaei Fard.Saeideh Power Efficient allocation in C-RAN with Multi access technology selection approach [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • Pazari.Mohsen A value Co-creation model for Information and Communication Technology Entrepreneurial Ecosystem [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • Pedram.Mir Mohsen Improving polarity identification in sentiment analysis using sarcasm detection and machine learning algorithms in Persian tweets [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • Piran.Mohamad Javad An access control model for online social networks using user-to-user relationships [ Vol.12, Issue 45 , 46 - Autumn - Winter Year 1399]
  • pirmohamadiani.rojiar The main components of evaluating the credibility of users according to organizational goals in the life cycle of big data [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • pirmohammadiani.rojyar Criteria for evaluating the effectiveness of social media users - a framework based on social media exploration [ Vol.11, Issue 39 , 40 - Spring - Summer Year 1398]
  • Piroozmand.Maryam Survey on the Applications of the Graph Theory in the Information Retrieval [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Piroozmand.Maryam Survey on the Applications of the Graph Theory in the Information Retrieval [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Pishdar.Mohamad Modeling and evaluation of RPL routing protocol by colored Petri nets [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • Poormirzaee.Saeid Design of Distributed Consensus Controller for Leader-Follower Singular Multi-Agent Systems in the Presence of Sensor Fault [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Pouladsadeh.Ali Evaluation of Interpolation Methods for Estimating the Fading Channels in Digital TV Broadcasting [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • pour yousefi dargah.hossein Identification and Prioritization of Parameters Affecting Information Security Management System (Case Study: Social Security Branches of Guilan Province) [ Vol.10, Issue 35 , 36 - Spring - Summer Year 1397]
  • pourasad.yaghoub Modeling and simulation of the central generator of the pattern to produce curved-linear motions in the snake robot [ Vol.12, Issue 43 , 44 - Spring - Summer Year 1399]
  • Pourmahmood Aghababa.Mohammad Multicast computer network routing using genetic algorithm and ant colony [ Vol.9, Issue 31 - Spring - Summer Year ]
  • Pourmahmood Aghababa.Mohammad Routing of Multipartite Computer Networks Using Ant Genetic Algorithm [ Vol.9, Issue 31 , 32 - Spring - Summer Year 1396]
  • Poursoltani.Yahya Generalizing The Concept of Business Processes Structural Soundness from Classic Petri-nets to BPMN2.0 Process Models [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Poursoltani.Yahya Generalizing The Concept of Business Processes Structural Soundness from Classic Petri-nets to BPMN2.0 Process Models [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]

R

  • rabani.fateme Polar Diagram of Points with Moving Pole [ Vol.11, Issue 41 , 42 - Autumn - Winter Year 1398]
  • Rabiei.Leila Synthesizing an image dataset for text detection and recognition in images [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • Rabiei.Mohammad Applying deep learning for improving the results of sentiment analysis of Persian comments of Online retail stores [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • rafizadeh kasani.ramin Identification and Prioritization of Parameters Affecting Information Security Management System (Case Study: Social Security Branches of Guilan Province) [ Vol.10, Issue 35 , 36 - Spring - Summer Year 1397]
  • rahbar.kambiz Blind correction of camera lens aberration and de-centering error using modified Zernike model [ Vol.7, Issue 25 - Spring - Summer Year ]
  • rahbar.kambiz Correcting camera lens misalignment using Zernik moments [ Vol.2, Issue 6 , 7 - Autumn - Winter Year 1389]
  • rahbar.kambiz Blind Correction of Lens Aberration Using Modified Zernike Moments [ Vol.2, Issue 5 - Spring - Summer Year ]
  • Rahmani.Farzaneh Synthesizing an image dataset for text detection and recognition in images [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • rahmani.marziye Provide a conceptual model to identify the quality of electronic services in the country's online stores [ Vol.8, Issue 30 , 31 - Autumn - Winter Year 1395]
  • raja.mehdi A Novel Model for detecting intrusion with Mobile Agent and Game theory [ Vol.8, Issue 27 - Spring Year ]
  • Rajabi.Jan Mohammad Applying genetic algorithm for automatic service identification based on quality metrics [ Vol.6, Issue 19 - Autumn Year ]
  • rajabzadeh ghotri.ali The effect of Internet of Things (IOT) implementation on the Rail Freight Industry; A futures study approach [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • rajabzadeh ghotri.ali Explaining the adoption process of software-oriented networks (SDN) using the foundational data method and systems approach [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • rajabzadeh ghotri.ali Determining the factors affecting the collective financing of knowledge-based IT companies [ Vol.10, Issue 37 , 38 - Autumn - Winter Year 1397]
  • rajabzadeh ghotri.ali Design and implementation of a survival model for patients with melanoma based on data mining algorithms [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • Raji.Mohsen A Task Mapping and Scheduling Algorithm based on Genetic Algorithm for Embedded System Design [ Vol.13, Issue 47 , 48 - Spring - Summer Year 1400]
  • Raji.Mohsen An Intrusion Detection System based on Deep Learning for CAN Bus [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • ranaei.habibollah Designing a system dynamics model for upgrading policy Iran Information and Communication Technology Network Indicators [ Vol.8, Issue 30 , 31 - Autumn - Winter Year 1395]
  • Rashidi.Hassan A Decision Support System based on Rough sets for Enterprise Planning under uncertainty [ Vol.13, Issue 47 , 48 - Spring - Summer Year 1400]
  • rasouli.behtaj A Model for impacts of Investment in IT on customer satisfaction, using Structural Equation Modeling and Path Analysis [ Vol.5, Issue 15 - Summer Year ]
  • Rastegar.Mohammad Ali Liquidity Risk Prediction Using News Sentiment Analysis [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • rasti.javad Segmentation of exterior color images for the purpose of object recognition using histogram with double accuracy [ Vol.4, Issue 14 , 15 - Autumn - Winter Year 1391]
  • rasti.javad Outdoor Color Scene Segmentation towards Object Detection using Dual-Resolution Histograms [ Vol.4, Issue 14 - Autumn - Winter Year 1391]
  • ravaie.yahya Increasing data throughput in HF channel by decision feedback equalizer employing MC-FQRD-RLS algorithm and weight extraction in data mode [ Vol.5, Issue 15 - Summer Year ]
  • Ravanmehr.Reza context-aware travel recommender system exploiting from Geo-tagged photos [ Vol.11, Issue 41 , 42 - Autumn - Winter Year 1398]
  • Razavizadeh.S. Mohammad Three Dimensional Beamforming in Multi User Multi Antenna Cellular Networks with Randomly Distributed Users [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • Razi.Ali Agile Enterprise Architecture Modeling: Evaluating the Applicability of Six Modeling Standards based on Iran’s National EA Framework [ Vol.13, Issue 47 , 48 - Spring - Summer Year 1400]
  • reshadi.midia Adaptive rotation models and traffic patterns to reduce light loss in networks on optical chip [ Vol.10, Issue 35 , 36 - Spring - Summer Year 1397]
  • Rezaee.Ali Community-Based Multi-Criteria Placement of Applications in the Fog Environment [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Rezaee.Ali Priority based Deployment of IoT Applications in Fog [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • rezaei malek.narges Model to improve banking by Using customer knowledge management and Mobile Banking and Its Impact on Customer Loyalty [ Vol.9, Issue 31 - Spring - Summer Year ]
  • Rezaei.Fereidoon Anomaly and Intrusion Detection through Datamining and Feature Selection using PSO Algorithm [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Rezaei.Fereidoon Anomaly and Intrusion Detection Through Data Mining and Feature Selection using PSO Algorithm [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Rezaei.Mehran Textual analysis of central bank news in forecasting long-term trend of Tehran stock exchange index [ Vol.12, Issue 43 , 44 - Spring - Summer Year 1399]
  • rezaei.mohammad A model for improving banking services using customer knowledge management and mobile banking and examining its impact on customer loyalty in Bank Mellat [ Vol.9, Issue 31 , 32 - Spring - Summer Year 1396]
  • rezaei.mohammad sadegh Automatic Sepration of Learnrs in Learning Groups Based on Identifying Learning Style from Their Behavior in Learning Environment [ Vol.6, Issue 21 - Spring Year ]
  • rezaei.narges A model for improving banking services using customer knowledge management and mobile banking and examining its impact on customer loyalty in Bank Mellat [ Vol.9, Issue 31 , 32 - Spring - Summer Year 1396]

S

  • sabaei.sabaei A matching probability-based flood algorithm for mobile ad hoc networks [ Vol.2, Issue 6 , 7 - Autumn - Winter Year 1389]
  • sabaei.sabaei Adaptive Probabilistic Flooding for Ad Hoc Networks [ Vol.2, Issue 5 - Spring - Summer Year ]
  • saberi.nafise Personalized E-learning Environment Using Fuzzy Recommender System base on Combination of Learning Style and Cognitive Trait [ Vol.2, Issue 3 - Summer Year ]
  • Sadeghi B..Mahshid Fake Websites Detection Improvement Using Multi-Layer Artificial Neural Network Classifier with Ant Lion Optimizer Algorithm [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Sadeghi Bigham.Bahram Polar Diagram of Points with Moving Pole [ Vol.11, Issue 41 , 42 - Autumn - Winter Year 1398]
  • sadeghi hariri.mehrdad Modified orthogonal chaotic colonial competition algorithm and its application in improving pattern recognition in multilayer perceptron neural network [ Vol.10, Issue 35 , 36 - Spring - Summer Year 1397]
  • sadeghi.mostafa پردازش تصاویر ورق های فولادی به منظور آشکارسازی عیوب به کمک موجک گابور [ Vol.4, Issue 14 , 15 - Autumn - Winter Year 1391]
  • sadeghi.mostafa Image Processing of steel sheets for Defect Detection by using Gabor Wavelet [ Vol.4, Issue 13 - Spring Year ]
  • sadjadi.Hadi computer security models and proposing a new perspective: A review paper [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • sadjadi.Hadi A Survey on Computer Security Patterns and Proposing a New Perspective [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Sadr.Hossein Predicting the workload of virtual machines in order to reduce energy consumption in cloud data centers using the combination of deep learning models [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Sadr.Hossein An Intelligent Model for Multidimensional Personality Recognition of Users using Deep Learning Methods [ Vol.13, Issue 47 , 48 - Spring - Summer Year 1400]
  • saedi.abdollah Provide a model of human resource knowledge architecture in knowledge-based organizations using a mixed approach [ Vol.11, Issue 39 , 40 - Spring - Summer Year 1398]
  • Saeidi.Zeinab Measuring Similarity for Directed Path in Geometric Data [ Vol.12, Issue 45 , 46 - Autumn - Winter Year 1399]
  • Safari dehnavi.Vahid Stock market prediction using optimized grasshopper optimization algorithm and time series algorithms [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • Safari.Ehram The effect of emotional intelligence of project managers on the effectiveness of team communication in Iranian research institutes (Case study: Research Institute of Communication and Information Technology) [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • safari.mojtaba COBIT A Suitable Framework for Measuring IT Governance in Organizations [ Vol.1, Issue 1 - Spring Year ]
  • saghafi.fateme Comprehensive Interactive Maturity Model for Mobile government [ Vol.2, Issue 3 - Summer Year ]
  • saghafi.Fatemeh A Collaborative Filtering Movie Recommendation System Based on Users Correlation and Weighted K-Means with High Accuracy [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • saghafi.Fatemeh Indigenous model of commercialization of complex technologies based on partnership in the ICT sector [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • saghafi.Fatemeh Optimum modeling of patient satisfaction with the doctor based on machine learning methods [ Vol.7, Issue 24 , 25 - Spring - Summer Year 1394]
  • Saghafi.Fatemeh