Abbasi.Ibrahim
Valuation of digital services in Iran: Empirical proof for Google and Instagram
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
Abbasi.Javad
Employing a meta-synthesis to present a framework for commercial banks’ preparedness indicators in use of blockchain technology
[
Vol.13,
Issue
49
,
50
- Autumn - WinterYear
1400]
Abbasi.Mohammadhassan
Designing a personalized e-learning system using learners' characteristics and implementing it with the gamification elements
[
Vol.13,
Issue
47
,
48
- Spring - SummerYear
1400]
abbasi.narges
Analysing students' learning through morning exercise using data mining techniques
[
Vol.13,
Issue
49
,
50
- Autumn - WinterYear
1400]
Abbasi.Zahra
An approach to prioritize quality dimensions of based on cloud computing using Multiple Criteria Decision Making method
[
Vol.14,
Issue
53
,
54
- Autumn - WinterYear
1401]
Abbasimehr.Hossein
A Novel Multi-Step Ahead Demand Forecasting Model Based on Deep Learning Techniques and Time Series Augmentation
[
Vol.14,
Issue
53
,
54
- Autumn - WinterYear
1401]
Abbasi-Shahkooh.Kolsoum
Extracting Innovation Strategies and Requirements for Telecommunication Companies: Case Study of Telecommunications Infrastructure Company
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
abbaspour.javad
Improvement of mean shift tracker for tracking of target with variable photometric pattern
[
Vol.4,
Issue
13
- SpringYear
]
Abdian.Mohammad Mahdi
Intrusion Detection Based on Cooperation on the Permissioned Blockchain Platform in the Internet of Things Using Machine Learning
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Abdian.Mohammad Mahdi
Intrusion Detection Based on Cooperation on the Permissioned Blockchain Platform in the Internet of Things Using Machine Learning
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Abdipour.Abdolali
The Impact of IQ Imbalance on the BER of Adaptive Modulation in the MIMO System
[
Vol.1,
Issue
1
- SpringYear
]
Abdipour.Abdolali
Design, simulation and performance comparison of radating elements of reflect array antenna
[
Vol.5,
Issue
15
- SummerYear
]
Abdolrazzagh-Nezhad.Majid
Comparing A Hybridization of Fuzzy Inference System and Particle Swarm Optimization Algorithm with Deep Learning to Predict Stock Prices
[
Vol.11,
Issue
41
,
42
- Autumn - WinterYear
1398]
Abdolrazzagh-Nezhad.Majid
Designing A New Genetic-Fuzzy Type 2 Approach to Evaluate Self-Adaptive Systems by Software Quality Indicators
[
Vol.16,
Issue
61
,
62
- Autumn - WinterYear
1403]
Adabi.Sepideh
An Intelligent Pricing System for Cloud Services aims at Increasing Implementation Simplicity and Flexibility
[
Vol.14,
Issue
53
,
54
- Autumn - WinterYear
1401]
adibi.zhinoos
A Combinational Model for Evaluating Organizational Readiness for Data Warehouse Implementation by Using Analytical Hierarchical Process
[
Vol.2,
Issue
3
- SummerYear
]
Afshar Kazemi.Mohamad Ali
Anomaly and Intrusion Detection through Datamining and Feature Selection using PSO Algorithm
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Afshar Kazemi.Mohamad Ali
Anomaly and Intrusion Detection Through Data Mining and Feature Selection using PSO Algorithm
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
aghaee.golnaz
Trust Management Based on User Feedback in Cloud Computing Environment by Using Cuckoo Optimization Algorithm
[
Vol.16,
Issue
61
,
62
- Autumn - WinterYear
1403]
aghaeizade.reza
Medial-axis Enhancement of Tubular Structures and its Application in the Extraction of Portal Veins
[
Vol.4,
Issue
13
- SpringYear
]
aghaeizade.reza
Reinforcement of the central axis of tubular structures and its application in extracting the central axis of the portal vein
[
Vol.4,
Issue
14
,
15
- Autumn - WinterYear
1391]
aghdasim.aghdasim
Identify and analyze decision points and key players in procurement process in the EPC companies
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
Ahari.Somayeh
A New Approach to Extract and Utilize Learners Social Relationships through Analyzing Forums Structure and Contents
[
Vol.4,
Issue
11
- AutumnYear
]
Ahari.Somayeh
Multimedia teaching and its effects on learning and retention of English grammar
[
Vol.4,
Issue
11
- AutumnYear
]
Ahari.Somayeh
The Evaluation of E-learning by Benchmarking Approach Iran Higher Education as a Case Study
[
Vol.4,
Issue
11
- AutumnYear
]
Ahari.Somayeh
Assessing the e-service quality of Payame Noor University
[
Vol.4,
Issue
11
- AutumnYear
]
Ahari.Somayeh
Ontology-Based Up gradation of Entrepreneurship Skills Using Educational Portals
[
Vol.4,
Issue
11
- AutumnYear
]
Ahari.Somayeh
Proposing a Model for Extracting Information from Textual Documents, Based on Text Mining in E-learning
[
Vol.4,
Issue
11
- AutumnYear
]
Ahari.Somayeh
Relation of emotional intelligence and trends of e-learning in organizations (Case study: Bank employees Alborz Province)
[
Vol.4,
Issue
11
- AutumnYear
]
Ahmadi.Hamid
A greedy new method based on the cascade model to calculate maximizing penetration in social networks
[
Vol.10,
Issue
37
,
38
- Autumn - WinterYear
1397]
Ahmadi.Mohammad Reza
Providing a New Solution in Selecting Suitable Databases for Storing Big Data in the National Information Network
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Ahmadi.Mohammad Reza
Presenting a novel solution to choose a proper database for storing big data in national network services
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Ahmadi.Parvin
A Horizon for Sentiment Analysis in Social Networks based on Interpreting Contents
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Ahmadi.Parvin
A Framework for Sentiment Analysis in Social Networks based on Interpreting Contents
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Ahmadian chashmi.hamidreza
A framework for establishing a national data vault for Data Governance institution
[
Vol.13,
Issue
49
,
50
- Autumn - WinterYear
1400]
Ahmadzadeh.Hamidreza
Design of Distributed Consensus Controller for Leader-Follower Singular Multi-Agent Systems in the Presence of Sensor Fault
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
ahsan.reza
Converting protein sequence to image for classification with convolutional neural network
[
Vol.12,
Issue
43
,
44
- Spring - SummerYear
1399]
akbar.ali
Applying genetic algorithm for automatic service identification based on quality metrics
[
Vol.6,
Issue
19
- AutumnYear
]
Akbari Emami.Shahnaz
Information Technology, Strategy Implementation, Information Systems, Strategic Planning, Input-Process-Outcome Framework
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
akbari.ahmad
Evaluation of SIP signaling implementation using QoS parameters
[
Vol.1,
Issue
1
- SpringYear
]
Akbari.Mohsen
Understanding the users’ initial trust of social networks
[
Vol.8,
Issue
27
- SpringYear
]
Akbari.Mohsen
Understanding the initial trust of users in social networks
[
Vol.8,
Issue
27
,
28
- Spring - SummerYear
1395]
Akhbari.Mehdi
Fault Diagnosis and Detection in Photovoltaic Systems Using Neural Network VGG16
[
Vol.16,
Issue
61
,
62
- Autumn - WinterYear
1403]
akhlaghi.fardin
DWT-SVD based Semi-Blind Digital Image Watermarking
[
Vol.2,
Issue
5
- Spring - SummerYear
]
akhlaghi.fardin
Semi-blind labeling of images using SVD in the field of discrete wavelet transform
[
Vol.2,
Issue
6
,
7
- Autumn - WinterYear
1389]
Akraminejad.Reza
WSTMOS: A Method For Optimizing Throughput, Energy, And Latency In Cloud Workflow Scheduling
[
Vol.15,
Issue
57
,
58
- Autumn - WinterYear
1402]
alagheband.basir
طراحی اولین پایگاه داده کلمات دستنویس کردی برای سیستم های تشخیص تصویری کلمات
[
Vol.5,
Issue
17
- Spring - SummerYear
]
albadvi.albadvi
Liquidity Risk Prediction Using News Sentiment Analysis
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
ali.ghalibaf
Improving performance of probe-based rate control mechanisms using classification: evaluation on an experimental testbed for High Throughput WLANs
[
Vol.12,
Issue
43
,
44
- Spring - SummerYear
1399]
Alimohamadi.Sajad
Providing an Intrusion Detection System in the Industrial Internet of Things Using the Gray Wolf Algorithm
[
Vol.16,
Issue
61
,
62
- Autumn - WinterYear
1403]
Alimoradi.Fatemeh
Synthesizing an image dataset for text detection and recognition in images
[
Vol.14,
Issue
53
,
54
- Autumn - WinterYear
1401]
alinezhad.ali
Integrating Data Envelopment Analysis and Decision Tree Models in Order to Evaluate Information Technology-Based Units
[
Vol.8,
Issue
27
- SpringYear
]
alinezhad.alireza
A Combination Method of DEA, DEMATEL and ANP for Evaluation of ERP Systems
[
Vol.12,
Issue
45
,
46
- Autumn - WinterYear
1399]
alipour.fazaneh
A Research Over the Obstacles and Influential Factors on Development of e-Learning Subjects from Perspective of Beneficiaries of CME Program in Jahrom University of Medical Sciences in 2012-2013
[
Vol.6,
Issue
21
- SpringYear
]
Aliyari.Shahram
A model information technology adoption in academic research projects in the filed ICT based on Information Technology Adoption Integrated Modeling (ITAIM)
[
Vol.11,
Issue
41
,
42
- Autumn - WinterYear
1398]
Alizadeh Noughabi.Havva
Generating Personalized Explanations for Twitter List Recommendations Using Semantic Similarity of Hashtags
[
Vol.16,
Issue
61
,
62
- Autumn - WinterYear
1403]
Al-Shohayyeb.Huda
Noor Analysis: A Benchmark Dataset for Evaluating Morphological Analysis Engines
[
Vol.15,
Issue
57
,
58
- Autumn - WinterYear
1402]
Amin Mousavi.Seyed Abdollah
Design and implementation of a survival model for patients with melanoma based on data mining algorithms
[
Vol.15,
Issue
57
,
58
- Autumn - WinterYear
1402]
Amini vlashani.Maede
Data-driven Marketing in Digital Businesses from Dynamic Capabilities View
[
Vol.14,
Issue
53
,
54
- Autumn - WinterYear
1401]
amini.Akbar
A framework for architecture the electronic trust in e-commerce:online shopping segment
[
Vol.15,
Issue
57
,
58
- Autumn - WinterYear
1402]
Amini.Amir
Integrating Data Envelopment Analysis and Decision Tree Models in Order to Evaluate Information Technology-Based Units
[
Vol.8,
Issue
27
- SpringYear
]
Amini.Amir
۹۳ / ۵٬۰۰۰ Integration of data envelopment analysis model and decision tree in order to evaluate units based on information technology
[
Vol.8,
Issue
27
,
28
- Spring - SummerYear
1395]
aminiazar.wahab
Provide A Lightweight Encryption Solution To secure Data In The Internet Of Things
[
Vol.16,
Issue
61
,
62
- Autumn - WinterYear
1403]
amintoosi.mahmood
The aware genetic algorithm of the best member, applied to graph coloring and metric-dimension of the graph problems
[
Vol.12,
Issue
43
,
44
- Spring - SummerYear
1399]
Amiri.Maryam
Document Clustering Based On Ontology and Fuzzy Approach
[
Vol.5,
Issue
17
- Spring - SummerYear
]
Amiri.Mostafa
Fuzzy Multicore Clustering of Big Data in the Hadoop Map Reduce Framework
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
Amiri.Samira
Improvement of the bulk sensitivity and FoM of the plasmonic nanodipole antenna array
[
Vol.9,
Issue
33
,
34
- Autumn - WinterYear
1396]
AmiriAra.Hamid
Joint Power Allocation Optimization of cooperative communication systems with Non-Orthogonal Multiple Access
[
Vol.12,
Issue
45
,
46
- Autumn - WinterYear
1399]
amrolahi.milad
context-aware travel recommender system exploiting from Geo-tagged photos
[
Vol.11,
Issue
41
,
42
- Autumn - WinterYear
1398]
anarinejad.abbas
Evaluation of e-learning with optimal mining approach 1 case study: Iran's higher education
[
Vol.4,
Issue
12
,
13
- Spring - SummerYear
1391]
ANSARI.ALI ASGHAR
Power Efficient allocation in C-RAN with Multi access technology selection approach
[
Vol.14,
Issue
53
,
54
- Autumn - WinterYear
1401]
ansarmohammadi.ali
Multi-level ternary quantization for improving sparsity and computation in embedded deep neural networks
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
ansarmohammadi.ali
Multi-Level Ternary Quantization for Improving Sparsity and Computation in Embedded Deep Neural Networks
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
arabsorkhi.abouzar
New Method to Improve Illumination Variations in Adult Images Based on Fuzzy Deep Neural Network
[
Vol.11,
Issue
41
,
42
- Autumn - WinterYear
1398]
arasteh.bahman
Investigating an Approach to Identify and Classify Mutants Based on the Characteristics of Mutants with Machine Learning Algorithms
[
Vol.16,
Issue
61
,
62
- Autumn - WinterYear
1403]
arefi.somayeh
Feature selection for author identification of Persian online short texts
[
Vol.13,
Issue
47
,
48
- Spring - SummerYear
1400]
arianyan.ehsan
High Performance Computing: Next Generation Requirements and Research Axes
[
Vol.14,
Issue
51
,
52
- Spring - SummerYear
1401]
arianyan.ehsan
Providing a New Solution in Selecting Suitable Databases for Storing Big Data in the National Information Network
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
arianyan.ehsan
Presenting a novel solution to choose a proper database for storing big data in national network services
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
arianyan.ehsan
Emerging technologies in future generations of high performance computing: introduction, taxonomy and future research directions
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
arianyan.ehsan
Improving IoT resource management using fog calculations and ant lion optimization algorithm
[
Vol.15,
Issue
57
,
58
- Autumn - WinterYear
1402]
aryanian.iman
Design, simulation and performance comparison of radating elements of reflect array antenna
[
Vol.5,
Issue
15
- SummerYear
]
asadi.bahareh
Adaptive rotation models and traffic patterns to reduce light loss in networks on optical chip
[
Vol.10,
Issue
35
,
36
- Spring - SummerYear
1397]
asemi.atefe
Investigating the Degree of Application of Professional Ethics and Vocational Qualifications by the Faculty Members of Virtual Universities of Isfahan and Medical Sciences University of Isfahan
[
Vol.6,
Issue
21
- SpringYear
]
ASGHARI ESTIAR.FARHAD
Valuation of digital services in Iran: Empirical proof for Google and Instagram
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
Asghari.Seyyed Amir
Increasing Total Throughput, Reducing Outage to Zero, and Reducing Power Consumption in a Cellular Network
[
Vol.14,
Issue
53
,
54
- Autumn - WinterYear
1401]
asghari.zeinab
Investigating an Approach to Identify and Classify Mutants Based on the Characteristics of Mutants with Machine Learning Algorithms
[
Vol.16,
Issue
61
,
62
- Autumn - WinterYear
1403]
Asgharian.Alireza
Extracting Innovation Strategies and Requirements for Telecommunication Companies: Case Study of Telecommunications Infrastructure Company
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
Asghariyan.Fatemeh
An Intrusion Detection System based on Deep Learning for CAN Bus
[
Vol.15,
Issue
57
,
58
- Autumn - WinterYear
1402]
ashouri.mina
Investigating the Effect of Hardware Parameters Adjustments on Energy Consumption in Thin Matrix Multiplication Algorithm on GPUs
[
Vol.9,
Issue
31
,
32
- Spring - SummerYear
1396]
attaran.ebrahim
Blind correction of camera lens aberration and de-centering error using modified Zernike model
[
Vol.7,
Issue
25
- Spring - SummerYear
]
ayagh.zahra
Understanding the users’ initial trust of social networks
[
Vol.8,
Issue
27
- SpringYear
]
Azarkasb.Seyed Omid
Fuzzy Multicore Clustering of Big Data in the Hadoop Map Reduce Framework
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
Azarnejad.Ardeshir
Routing improvement to control congestion in software defined networks by using distributed controllers
[
Vol.11,
Issue
39
,
40
- Spring - SummerYear
1398]
azharivs.azharivs
Evaluation of SIP signaling implementation using QoS parameters
[
Vol.1,
Issue
1
- SpringYear
]
Azimi.ُSamaneh
Fault Diagnosis and Detection in Photovoltaic Systems Using Neural Network VGG16
[
Vol.16,
Issue
61
,
62
- Autumn - WinterYear
1403]
Azimzadeh.Masomeh
Priority based Deployment of IoT Applications in Fog
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Azimzadeh.Masomeh
Community-Based Multi-Criteria Placement of Applications in the Fog Environment
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Azizi MehmanDoost.Mahdi
The framework of the national macro plan for transparency and information release based on the grounded theory method
[
Vol.15,
Issue
57
,
58
- Autumn - WinterYear
1402]