A

  • Abdian.Mohammad Mahdi Intrusion Detection Based on Cooperation on the Permissioned Blockchain Platform in the Internet of Things Using Machine Learning [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Abdian.Mohammad Mahdi Intrusion Detection Based on Cooperation on the Permissioned Blockchain Platform in the Internet of Things Using Machine Learning [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Abdolrazzagh-Nezhad.Majid Designing A New Genetic-Fuzzy Type 2 Approach to Evaluate Self-Adaptive Systems by Software Quality Indicators [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • Afshar Kazemi.Mohamad Ali Anomaly and Intrusion Detection Through Data Mining and Feature Selection using PSO Algorithm [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Afshar Kazemi.Mohamad Ali Anomaly and Intrusion Detection through Datamining and Feature Selection using PSO Algorithm [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • aghaee.golnaz Trust Management Based on User Feedback in Cloud Computing Environment by Using Cuckoo Optimization Algorithm [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • Ahmadi.Mohammad Reza Providing a New Solution in Selecting Suitable Databases for Storing Big Data in the National Information Network [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Ahmadi.Mohammad Reza Presenting a novel solution to choose a proper database for storing big data in national network services [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Ahmadi.Parvin A Framework for Sentiment Analysis in Social Networks based on Interpreting Contents [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Ahmadi.Parvin A Horizon for Sentiment Analysis in Social Networks based on Interpreting Contents [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Akhbari.Mehdi Fault Diagnosis and Detection in Photovoltaic Systems Using Neural Network VGG16 [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • Alimohamadi.Sajad Providing an Intrusion Detection System in the Industrial Internet of Things Using the Gray Wolf Algorithm [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • Alizadeh Noughabi.Havva Generating Personalized Explanations for Twitter List Recommendations Using Semantic Similarity of Hashtags [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • aminiazar.wahab Provide A Lightweight Encryption Solution To secure Data In The Internet Of Things [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • ansarmohammadi.ali Multi-Level Ternary Quantization for Improving Sparsity and Computation in Embedded Deep Neural Networks [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • ansarmohammadi.ali Multi-level ternary quantization for improving sparsity and computation in embedded deep neural networks [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • ansarmohammadi.ali Energy-Efficient Fixed-Point Hardware Accelerator for Embedded DNNs [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • arasteh.bahman Investigating an Approach to Identify and Classify Mutants Based on the Characteristics of Mutants with Machine Learning Algorithms [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • arianyan.ehsan Providing a New Solution in Selecting Suitable Databases for Storing Big Data in the National Information Network [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • arianyan.ehsan Presenting a novel solution to choose a proper database for storing big data in national network services [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • asghari.zeinab Investigating an Approach to Identify and Classify Mutants Based on the Characteristics of Mutants with Machine Learning Algorithms [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • Azimi.ُSamaneh Fault Diagnosis and Detection in Photovoltaic Systems Using Neural Network VGG16 [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • Azimzadeh.Masomeh Community-Based Multi-Criteria Placement of Applications in the Fog Environment [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Azimzadeh.Masomeh Priority based Deployment of IoT Applications in Fog [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]