G

  • Gerami.Mohsen Pathology of software export development in Iran [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • Ghaffarzadegan.Mahshid Extracting Innovation Strategies and Requirements for Telecommunication Companies: Case Study of Telecommunications Infrastructure Company [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • ghanbari.elham A new algorithm based on ensemble learning for learning to rank in information retrieval [ Vol.7, Issue 25 - Spring - Summer Year ]
  • Ghasemi.Mohammad Exploring the antecedents and consequences of smart good governance using the fuzzy Delphi method (FDM) [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • ghasemian.fahime Performance Improvement of Automatic Language Identification Using GMM-SVM Method [ Vol.2, Issue 5 - Spring - Summer Year ]
  • Ghavami.Hossein Performance Analysis of Device to Device Communications Overlaying/Underlaying Cellular Network [ Vol.9, Issue 33 , 34 - Autumn - Winter Year 1396]
  • ghayori.majid Improvement of intrusion detection system on Industrial Internet of Things based on deep learning using metaheuristic algorithms [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • ghayori.majid Incentive reward mechanism for Participants to the human computing system of Intrusion Detection Based on Game Theory [ Vol.12, Issue 43 , 44 - Spring - Summer Year 1399]
  • ghayori.majid Intrusion Detection Based on Cooperation on the Permissioned Blockchain Platform in the Internet of Things Using Machine Learning [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • ghayori.majid Intrusion Detection Based on Cooperation on the Permissioned Blockchain Platform in the Internet of Things Using Machine Learning [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • ghazanfari.mehdi COBIT A Suitable Framework for Measuring IT Governance in Organizations [ Vol.1, Issue 1 - Spring Year ]
  • ghaznavi.mohammadbagher Classify and implement hardware trojans and provide a new way to detect them [ Vol.9, Issue 31 , 32 - Spring - Summer Year 1396]
  • ghodselahi.ahmad A Hybrid Neural Network Ensemble Model for Credit Risk Assessment [ Vol.6, Issue 20 , 21 - Spring - Summer Year 1393]
  • gholamian.mohammadreza Provide a method for customer segmentation using the RFM model in conditions of uncertainty [ Vol.8, Issue 30 , 31 - Autumn - Winter Year 1395]
  • gholipoor.niloofar Emerging technologies in future generations of high performance computing: introduction, taxonomy and future research directions [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Gholipour.Majid A Collaborative Filtering Movie Recommendation System Based on Users Correlation and Weighted K-Means with High Accuracy [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • Ghorbannia Delavar.Arash WSTMOS: A Method For Optimizing Throughput, Energy, And Latency In Cloud Workflow Scheduling [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • Gilanian Sadeghi.Mohammad Mehdi Community Detection in Bipartite Networks Using HellRank Centrality Measure [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Gilanian Sadeghi.Mohammad Mehdi Community Detection in Bipartite Networks Using HellRank Centrality Measure [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • golshani rosta.mehrab ali An Information Architecture Framework for Utilizing Social Networks in Iranian Higher Education System [ Vol.5, Issue 17 - Spring - Summer Year ]
  • Goodarzi.Babak New changes of local binary patterns and classification and segmentation of seabed images [ Vol.8, Issue 27 - Spring Year ]
  • Goodarzi.Babak New changes of local binary pattern and classification and segmentation of texture images of the seabed [ Vol.8, Issue 27 , 28 - Spring - Summer Year 1395]