K

  • kahani.mohsen Generating Personalized Explanations for Twitter List Recommendations Using Semantic Similarity of Hashtags [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • Kalantari.Reza A Survey on Computer Security Patterns and Proposing a New Perspective [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Kalantari.Reza computer security models and proposing a new perspective: A review paper [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Keramati.Mohammad Ali Anomaly and Intrusion Detection Through Data Mining and Feature Selection using PSO Algorithm [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Keramati.Mohammad Ali Anomaly and Intrusion Detection through Datamining and Feature Selection using PSO Algorithm [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Keyhanipour.Amir Hosein Survey on the Applications of the Graph Theory in the Information Retrieval [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Keyhanipour.Amir Hosein Survey on the Applications of the Graph Theory in the Information Retrieval [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Khansari.Mohammad Explanation of Standardization Role in the Proposed Solutions for Privacy Protection in Health Data [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Khansari.Mohammad Explanation the role of standardization in the proposed solutions for privacy protection in health data [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Kherad.Mehdi Designing A New Genetic-Fuzzy Type 2 Approach to Evaluate Self-Adaptive Systems by Software Quality Indicators [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • Khosrozadeh.Ali Community Detection in Bipartite Networks Using HellRank Centrality Measure [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Khosrozadeh.Ali Community Detection in Bipartite Networks Using HellRank Centrality Measure [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Koochari.Abbas Investigating an Approach to Identify and Classify Mutants Based on the Characteristics of Mutants with Machine Learning Algorithms [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]