Abdian.Mohammad Mahdi
Intrusion Detection Based on Cooperation on the Permissioned Blockchain Platform in the Internet of Things Using Machine Learning
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Abdian.Mohammad Mahdi
Intrusion Detection Based on Cooperation on the Permissioned Blockchain Platform in the Internet of Things Using Machine Learning
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Abdolrazzagh-Nezhad.Majid
Designing A New Genetic-Fuzzy Type 2 Approach to Evaluate Self-Adaptive Systems by Software Quality Indicators
[
Vol.16,
Issue
61
,
62
- Autumn - WinterYear
1403]
Afshar Kazemi.Mohamad Ali
Anomaly and Intrusion Detection Through Data Mining and Feature Selection using PSO Algorithm
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Afshar Kazemi.Mohamad Ali
Anomaly and Intrusion Detection through Datamining and Feature Selection using PSO Algorithm
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
aghaee.golnaz
Trust Management Based on User Feedback in Cloud Computing Environment by Using Cuckoo Optimization Algorithm
[
Vol.16,
Issue
61
,
62
- Autumn - WinterYear
1403]
Ahmadi.Mohammad Reza
Providing a New Solution in Selecting Suitable Databases for Storing Big Data in the National Information Network
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Ahmadi.Mohammad Reza
Presenting a novel solution to choose a proper database for storing big data in national network services
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Ahmadi.Parvin
A Framework for Sentiment Analysis in Social Networks based on Interpreting Contents
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Ahmadi.Parvin
A Horizon for Sentiment Analysis in Social Networks based on Interpreting Contents
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Akhbari.Mehdi
Fault Diagnosis and Detection in Photovoltaic Systems Using Neural Network VGG16
[
Vol.16,
Issue
61
,
62
- Autumn - WinterYear
1403]
Alimohamadi.Sajad
Providing an Intrusion Detection System in the Industrial Internet of Things Using the Gray Wolf Algorithm
[
Vol.16,
Issue
61
,
62
- Autumn - WinterYear
1403]
Alizadeh Noughabi.Havva
Generating Personalized Explanations for Twitter List Recommendations Using Semantic Similarity of Hashtags
[
Vol.16,
Issue
61
,
62
- Autumn - WinterYear
1403]
aminiazar.wahab
Provide A Lightweight Encryption Solution To secure Data In The Internet Of Things
[
Vol.16,
Issue
61
,
62
- Autumn - WinterYear
1403]
ansarmohammadi.ali
Multi-Level Ternary Quantization for Improving Sparsity and Computation in Embedded Deep Neural Networks
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
ansarmohammadi.ali
Multi-level ternary quantization for improving sparsity and computation in embedded deep neural networks
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
arasteh.bahman
Investigating an Approach to Identify and Classify Mutants Based on the Characteristics of Mutants with Machine Learning Algorithms
[
Vol.16,
Issue
61
,
62
- Autumn - WinterYear
1403]
arianyan.ehsan
Providing a New Solution in Selecting Suitable Databases for Storing Big Data in the National Information Network
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
arianyan.ehsan
Presenting a novel solution to choose a proper database for storing big data in national network services
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
asghari.zeinab
Investigating an Approach to Identify and Classify Mutants Based on the Characteristics of Mutants with Machine Learning Algorithms
[
Vol.16,
Issue
61
,
62
- Autumn - WinterYear
1403]
Azimi.ُSamaneh
Fault Diagnosis and Detection in Photovoltaic Systems Using Neural Network VGG16
[
Vol.16,
Issue
61
,
62
- Autumn - WinterYear
1403]
Azimzadeh.Masomeh
Community-Based Multi-Criteria Placement of Applications in the Fog Environment
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Azimzadeh.Masomeh
Priority based Deployment of IoT Applications in Fog
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]