K

  • kaedi.marjan Textual analysis of central bank news in forecasting long-term trend of Tehran stock exchange index [ Vol.12, Issue 43 , 44 - Spring - Summer Year 1399]
  • kahani.mohsen Generating Personalized Explanations for Twitter List Recommendations Using Semantic Similarity of Hashtags [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • kalantari.nadia Designing a Fuzzy Expert System for Selecting an Appropriate Contractor in Information Technology Outsourcing [ Vol.2, Issue 5 - Spring - Summer Year ]
  • kalantari.nadia Designing a fuzzy expert system for choosing the right contractor in information technology outsourcing [ Vol.2, Issue 6 , 7 - Autumn - Winter Year 1389]
  • Kalantari.Reza A Survey on Computer Security Patterns and Proposing a New Perspective [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Kalantari.Reza computer security models and proposing a new perspective: A review paper [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • kamareiy.malihe Matched grouping of learners in e-learning environment using council clustering method [ Vol.11, Issue 39 , 40 - Spring - Summer Year 1398]
  • Karamizadeh.Sasan New Method to Improve Illumination Variations in Adult Images Based on Fuzzy Deep Neural Network [ Vol.11, Issue 41 , 42 - Autumn - Winter Year 1398]
  • karbasi.mostafa Adaptive rotation models and traffic patterns to reduce light loss in networks on optical chip [ Vol.10, Issue 35 , 36 - Spring - Summer Year 1397]
  • Karbasi.Soheila Fast and accurate concept drift detection from event logs [ Vol.12, Issue 43 , 44 - Spring - Summer Year 1399]
  • kardan.AhmadAgha Presenting a model for extracting information from text documents, based on text-mining in the field of e-learning [ Vol.4, Issue 12 , 13 - Spring - Summer Year 1391]
  • kargari.mehrdad Liquidity Risk Prediction Using News Sentiment Analysis [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Karimi.Hossein The Effect of ICT Development on Economic and Political Risk: A Cross Country Study [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • karimi.keyvan Window-Shopping as an Effective Element to Improve Viral Marketing [ Vol.2, Issue 3 - Summer Year ]
  • Karimpour.Davod User recommendation in Telegram messenger by graph analysis and mathematical modeling of users' behavior [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • kaveh.manije Investigation the role of personality and individual differences on password security breaches: An Empirical Study [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • kavoshtehrani.masoud Improvement of mean shift tracker for tracking of target with variable photometric pattern [ Vol.4, Issue 13 - Spring Year ]
  • kavoshtehrani.masoud Modification of medium transfer detector for target tracking with variable radiation pattern [ Vol.4, Issue 14 , 15 - Autumn - Winter Year 1391]
  • kazemian.sirous A model information technology adoption in academic research projects in the filed ICT based on Information Technology Adoption Integrated Modeling (ITAIM) [ Vol.11, Issue 41 , 42 - Autumn - Winter Year 1398]
  • Keimasi.Masoud Employing a meta-synthesis to present a framework for commercial banks’ preparedness indicators in use of blockchain technology [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • Keramati.Mohammad Ali Anomaly and Intrusion Detection Through Data Mining and Feature Selection using PSO Algorithm [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Keramati.Mohammad Ali Anomaly and Intrusion Detection through Datamining and Feature Selection using PSO Algorithm [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Kermani.Aminolah Using Sentiment Analysis and Combining Classifiers for Spam Detection in Twitter [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • Keyhanipour.Amir Hosein Learning to Rank for the Persian Web Using the Layered Genetic Programming [ Vol.10, Issue 37 , 38 - Autumn - Winter Year 1397]
  • Keyhanipour.Amir Hosein Survey on the Applications of the Graph Theory in the Information Retrieval [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Keyhanipour.Amir Hosein Survey on the Applications of the Graph Theory in the Information Retrieval [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • khademzade.ahmad Adaptive rotation models and traffic patterns to reduce light loss in networks on optical chip [ Vol.10, Issue 35 , 36 - Spring - Summer Year 1397]
  • KHALAJJ.ELHAM Presenting the model for opinion mining at the document feature level for hotel users' reviews [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • khalili.ali Semiautomatic Creation of Enterprise Mashups Using Semantic Descriptions [ Vol.2, Issue 3 - Summer Year ]
  • Khalili.Zahra Employing a meta-synthesis to present a framework for commercial banks’ preparedness indicators in use of blockchain technology [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • Khansari.Mohammad Synthesizing an image dataset for text detection and recognition in images [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • Khansari.Mohammad A RPL-based Routing Algorithm for Multimedia Traffic for the Internet of Things [ Vol.13, Issue 47 , 48 - Spring - Summer Year 1400]
  • Khansari.Mohammad Explanation of Standardization Role in the Proposed Solutions for Privacy Protection in Health Data [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Khansari.Mohammad Explanation the role of standardization in the proposed solutions for privacy protection in health data [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • kharati.ehsan Increasing the value of collected data and reducing energy consumption by using network coding and mobile sinks in wireless sensor networks [ Vol.12, Issue 43 , 44 - Spring - Summer Year 1399]
  • Kharrat.Mahmood Providing a model for evaluating native electronic content in Iran based on value chain [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • Khashei.vahid The role of organizational factors on consumer buying behavior in social networks [ Vol.12, Issue 45 , 46 - Autumn - Winter Year 1399]
  • Khasteh.Seyed Hossein Fuzzy Multicore Clustering of Big Data in the Hadoop Map Reduce Framework [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Khasteh.Seyed Hossein Improving Efficiency of Finding Frequent Subgraphs in Graph Stream Using gMatrix Summarization [ Vol.12, Issue 45 , 46 - Autumn - Winter Year 1399]
  • khatan Lo.hasan Document Clustering Based On Ontology and Fuzzy Approach [ Vol.5, Issue 17 - Spring - Summer Year ]
  • Khatibi.Amid A Novel Method based on the Cocomo model to increase the accuracy of software projects effort estimates [ Vol.12, Issue 45 , 46 - Autumn - Winter Year 1399]
  • kherad.mahdi Comparing A Hybridization of Fuzzy Inference System and Particle Swarm Optimization Algorithm with Deep Learning to Predict Stock Prices [ Vol.11, Issue 41 , 42 - Autumn - Winter Year 1398]
  • Kherad.Mehdi Designing A New Genetic-Fuzzy Type 2 Approach to Evaluate Self-Adaptive Systems by Software Quality Indicators [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • khezr.nima Scheduling tasks in cloud environments using mapping framework - reduction and genetic algorithm [ Vol.10, Issue 37 , 38 - Autumn - Winter Year 1397]
  • Khodaverdian.Zeinab Predicting the workload of virtual machines in order to reduce energy consumption in cloud data centers using the combination of deep learning models [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • khorsandi.siavash Cyber Threats Foresight Against Iran Based on Attack Vector [ Vol.9, Issue 33 , 34 - Autumn - Winter Year 1396]
  • Khosroshahi.Mahan A Multi-Objective Differential Evolutionary Algorithm-based Approach for Resource Allocation in Cloud Computing Environment [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • Khosrozadeh.Ali Community Detection in Bipartite Networks Using HellRank Centrality Measure [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Khosrozadeh.Ali Community Detection in Bipartite Networks Using HellRank Centrality Measure [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • khotanloo.hassan A New Method to computational intelligence to improve network lifetime in wireless sensor networks [ Vol.7, Issue 23 - Summer Year ]
  • Khunjush.Farshad Investigating the Effects of Hardware Parameters on Power Consumptions in SPMV Algorithms on Graphics Processing Units (GPUs) [ Vol.9, Issue 31 - Spring - Summer Year ]
  • Khunjush.Farshad Investigating the Effect of Hardware Parameters Adjustments on Energy Consumption in Thin Matrix Multiplication Algorithm on GPUs [ Vol.9, Issue 31 , 32 - Spring - Summer Year 1396]
  • kiani.koorosh Design of Secure Communication System by Use of Synchronization of Chaotic Systems [ Vol.2, Issue 3 - Summer Year ]
  • Kiani.Vahid Two Fuzzy Virtual Force Algorithms to Improve Sensor Deployment in Wireless Sensor Networks [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • Koochari.Abbas Investigating an Approach to Identify and Classify Mutants Based on the Characteristics of Mutants with Machine Learning Algorithms [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]