kaedi.marjan
Textual analysis of central bank news in forecasting long-term trend of Tehran stock exchange index
[
Vol.12,
Issue
43
,
44
- Spring - SummerYear
1399]
kalantari.nadia
Designing a Fuzzy Expert System for Selecting an Appropriate Contractor in Information Technology Outsourcing
[
Vol.2,
Issue
5
- Spring - SummerYear
]
kalantari.nadia
Designing a fuzzy expert system for choosing the right contractor in information technology outsourcing
[
Vol.2,
Issue
6
,
7
- Autumn - WinterYear
1389]
Kalantari.Reza
A Survey on Computer Security Patterns and Proposing a New Perspective
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Kalantari.Reza
computer security models and proposing a new perspective: A review paper
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
kamareiy.malihe
Matched grouping of learners in e-learning environment using council clustering method
[
Vol.11,
Issue
39
,
40
- Spring - SummerYear
1398]
Karamizadeh.Sasan
New Method to Improve Illumination Variations in Adult Images Based on Fuzzy Deep Neural Network
[
Vol.11,
Issue
41
,
42
- Autumn - WinterYear
1398]
karbasi.mostafa
Adaptive rotation models and traffic patterns to reduce light loss in networks on optical chip
[
Vol.10,
Issue
35
,
36
- Spring - SummerYear
1397]
Karbasi.Soheila
Fast and accurate concept drift detection from event logs
[
Vol.12,
Issue
43
,
44
- Spring - SummerYear
1399]
kardan.AhmadAgha
Presenting a model for extracting information from text documents, based on text-mining in the field of e-learning
[
Vol.4,
Issue
12
,
13
- Spring - SummerYear
1391]
kargari.mehrdad
Liquidity Risk Prediction Using News Sentiment Analysis
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
Karimi.Hossein
The Effect of ICT Development on Economic and Political Risk: A Cross Country Study
[
Vol.14,
Issue
53
,
54
- Autumn - WinterYear
1401]
karimi.keyvan
Window-Shopping as an Effective Element to Improve Viral Marketing
[
Vol.2,
Issue
3
- SummerYear
]
Karimpour.Davod
User recommendation in Telegram messenger by graph analysis and mathematical modeling of users' behavior
[
Vol.13,
Issue
49
,
50
- Autumn - WinterYear
1400]
kaveh.manije
Investigation the role of personality and individual differences on password security breaches: An Empirical Study
[
Vol.13,
Issue
49
,
50
- Autumn - WinterYear
1400]
kavoshtehrani.masoud
Improvement of mean shift tracker for tracking of target with variable photometric pattern
[
Vol.4,
Issue
13
- SpringYear
]
kavoshtehrani.masoud
Modification of medium transfer detector for target tracking with variable radiation pattern
[
Vol.4,
Issue
14
,
15
- Autumn - WinterYear
1391]
kazemian.sirous
A model information technology adoption in academic research projects in the filed ICT based on Information Technology Adoption Integrated Modeling (ITAIM)
[
Vol.11,
Issue
41
,
42
- Autumn - WinterYear
1398]
Keimasi.Masoud
Employing a meta-synthesis to present a framework for commercial banks’ preparedness indicators in use of blockchain technology
[
Vol.13,
Issue
49
,
50
- Autumn - WinterYear
1400]
Keramati.Mohammad Ali
Anomaly and Intrusion Detection Through Data Mining and Feature Selection using PSO Algorithm
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Keramati.Mohammad Ali
Anomaly and Intrusion Detection through Datamining and Feature Selection using PSO Algorithm
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Kermani.Aminolah
Using Sentiment Analysis and Combining Classifiers for Spam Detection in Twitter
[
Vol.14,
Issue
51
,
52
- Spring - SummerYear
1401]
Keyhanipour.Amir Hosein
Learning to Rank for the Persian Web Using the Layered Genetic Programming
[
Vol.10,
Issue
37
,
38
- Autumn - WinterYear
1397]
Keyhanipour.Amir Hosein
Survey on the Applications of the Graph Theory in the Information Retrieval
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Keyhanipour.Amir Hosein
Survey on the Applications of the Graph Theory in the Information Retrieval
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
khademzade.ahmad
Adaptive rotation models and traffic patterns to reduce light loss in networks on optical chip
[
Vol.10,
Issue
35
,
36
- Spring - SummerYear
1397]
KHALAJJ.ELHAM
Presenting the model for opinion mining at the document feature level for hotel users' reviews
[
Vol.13,
Issue
49
,
50
- Autumn - WinterYear
1400]
khalili.ali
Semiautomatic Creation of Enterprise Mashups Using Semantic Descriptions
[
Vol.2,
Issue
3
- SummerYear
]
Khalili.Zahra
Employing a meta-synthesis to present a framework for commercial banks’ preparedness indicators in use of blockchain technology
[
Vol.13,
Issue
49
,
50
- Autumn - WinterYear
1400]
Khansari.Mohammad
A RPL-based Routing Algorithm for Multimedia Traffic for the Internet of Things
[
Vol.13,
Issue
47
,
48
- Spring - SummerYear
1400]
Khansari.Mohammad
Explanation of Standardization Role in the Proposed Solutions for Privacy Protection in Health Data
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Khansari.Mohammad
Synthesizing an image dataset for text detection and recognition in images
[
Vol.14,
Issue
53
,
54
- Autumn - WinterYear
1401]
Khansari.Mohammad
Explanation the role of standardization in the proposed solutions for privacy protection in health data
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
kharati.ehsan
Increasing the value of collected data and reducing energy consumption by using network coding and mobile sinks in wireless sensor networks
[
Vol.12,
Issue
43
,
44
- Spring - SummerYear
1399]
Kharrat.Mahmood
Providing a model for evaluating native electronic content in Iran based on value chain
[
Vol.13,
Issue
49
,
50
- Autumn - WinterYear
1400]
Khashei.vahid
The role of organizational factors on consumer buying behavior in social networks
[
Vol.12,
Issue
45
,
46
- Autumn - WinterYear
1399]
Khasteh.Seyed Hossein
Fuzzy Multicore Clustering of Big Data in the Hadoop Map Reduce Framework
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
Khasteh.Seyed Hossein
Improving Efficiency of Finding Frequent Subgraphs in Graph Stream Using gMatrix Summarization
[
Vol.12,
Issue
45
,
46
- Autumn - WinterYear
1399]
khatan Lo.hasan
Document Clustering Based On Ontology and Fuzzy Approach
[
Vol.5,
Issue
17
- Spring - SummerYear
]
Khatibi.Amid
A Novel Method based on the Cocomo model to increase the accuracy of software projects effort estimates
[
Vol.12,
Issue
45
,
46
- Autumn - WinterYear
1399]
kherad.mahdi
Comparing A Hybridization of Fuzzy Inference System and Particle Swarm Optimization Algorithm with Deep Learning to Predict Stock Prices
[
Vol.11,
Issue
41
,
42
- Autumn - WinterYear
1398]
khezr.nima
Scheduling tasks in cloud environments using mapping framework - reduction and genetic algorithm
[
Vol.10,
Issue
37
,
38
- Autumn - WinterYear
1397]
Khodaverdian.Zeinab
Predicting the workload of virtual machines in order to reduce energy consumption in cloud data centers using the combination of deep learning models
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
khorsandi.siavash
Cyber Threats Foresight Against Iran Based on Attack Vector
[
Vol.9,
Issue
33
,
34
- Autumn - WinterYear
1396]
Khosroshahi.Mahan
A Multi-Objective Differential Evolutionary Algorithm-based Approach for Resource Allocation in Cloud Computing Environment
[
Vol.14,
Issue
51
,
52
- Spring - SummerYear
1401]
Khosrozadeh.Ali
Community Detection in Bipartite Networks Using HellRank Centrality Measure
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Khosrozadeh.Ali
Community Detection in Bipartite Networks Using HellRank Centrality Measure
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
khotanloo.hassan
A New Method to computational intelligence to improve network lifetime in wireless sensor networks
[
Vol.7,
Issue
23
- SummerYear
]
Khunjush.Farshad
Investigating the Effect of Hardware Parameters Adjustments on Energy Consumption in Thin Matrix Multiplication Algorithm on GPUs
[
Vol.9,
Issue
31
,
32
- Spring - SummerYear
1396]
Khunjush.Farshad
Investigating the Effects of Hardware Parameters on Power Consumptions in SPMV Algorithms on Graphics Processing Units (GPUs)
[
Vol.9,
Issue
31
- Spring - SummerYear
]
kiani.koorosh
Design of Secure Communication System by Use of Synchronization of Chaotic Systems
[
Vol.2,
Issue
3
- SummerYear
]
Kiani.Vahid
Two Fuzzy Virtual Force Algorithms to Improve Sensor Deployment in Wireless Sensor Networks
[
Vol.14,
Issue
51
,
52
- Spring - SummerYear
1401]