S

  • sabaei.sabaei Adaptive Probabilistic Flooding for Ad Hoc Networks [ Vol.2, Issue 5 - Spring - Summer Year ]
  • sabaei.sabaei A matching probability-based flood algorithm for mobile ad hoc networks [ Vol.2, Issue 6 , 7 - Autumn - Winter Year 1389]
  • saberi.nafise Personalized E-learning Environment Using Fuzzy Recommender System base on Combination of Learning Style and Cognitive Trait [ Vol.2, Issue 3 - Summer Year ]
  • Sadeghi B..Mahshid Fake Websites Detection Improvement Using Multi-Layer Artificial Neural Network Classifier with Ant Lion Optimizer Algorithm [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Sadeghi Bigham.Bahram Polar Diagram of Points with Moving Pole [ Vol.11, Issue 41 , 42 - Autumn - Winter Year 1398]
  • sadeghi hariri.mehrdad Modified orthogonal chaotic colonial competition algorithm and its application in improving pattern recognition in multilayer perceptron neural network [ Vol.10, Issue 35 , 36 - Spring - Summer Year 1397]
  • sadeghi.mostafa Image Processing of steel sheets for Defect Detection by using Gabor Wavelet [ Vol.4, Issue 13 - Spring Year ]
  • sadeghi.mostafa پردازش تصاویر ورق های فولادی به منظور آشکارسازی عیوب به کمک موجک گابور [ Vol.4, Issue 14 , 15 - Autumn - Winter Year 1391]
  • sadeghzadeh.mehdi Detecting Distributed Denial of Service Attacks in Software-Defined Networks with a Deep Learning Approach [ Vol.17, Issue 63 , 64 - Spring - Summer Year 1404]
  • sadjadi.Hadi computer security models and proposing a new perspective: A review paper [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • sadjadi.Hadi A Survey on Computer Security Patterns and Proposing a New Perspective [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Sadr.Hossein An Intelligent Model for Multidimensional Personality Recognition of Users using Deep Learning Methods [ Vol.13, Issue 47 , 48 - Spring - Summer Year 1400]
  • Sadr.Hossein Predicting the workload of virtual machines in order to reduce energy consumption in cloud data centers using the combination of deep learning models [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • saedi.abdollah Provide a model of human resource knowledge architecture in knowledge-based organizations using a mixed approach [ Vol.11, Issue 39 , 40 - Spring - Summer Year 1398]
  • Saeidi.Zeinab Measuring Similarity for Directed Path in Geometric Data [ Vol.12, Issue 45 , 46 - Autumn - Winter Year 1399]
  • Safaie.Nasser Challenges of Blockchain Implementation in Supply Chain: A Multi-Criteria Decision-Making Approach [ Vol.17, Issue 63 , 64 - Spring - Summer Year 1404]
  • Safari dehnavi.Vahid Stock market prediction using optimized grasshopper optimization algorithm and time series algorithms [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • Safari.Ehram The effect of emotional intelligence of project managers on the effectiveness of team communication in Iranian research institutes (Case study: Research Institute of Communication and Information Technology) [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • safari.mojtaba COBIT A Suitable Framework for Measuring IT Governance in Organizations [ Vol.1, Issue 1 - Spring Year ]
  • saghafi.fateme Comprehensive Interactive Maturity Model for Mobile government [ Vol.2, Issue 3 - Summer Year ]
  • saghafi.Fatemeh Optimum modeling of patient satisfaction with the doctor based on machine learning methods [ Vol.7, Issue 24 , 25 - Spring - Summer Year 1394]
  • saghafi.Fatemeh A Collaborative Filtering Movie Recommendation System Based on Users Correlation and Weighted K-Means with High Accuracy [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • saghafi.Fatemeh The Relevance, Importance and Dependence of Critical Infrastructures of The Islamic Republic of Iran from a Cyber-Perspective [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • saghafi.Fatemeh Indigenous model of commercialization of complex technologies based on partnership in the ICT sector [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Saghafi.Fatemeh Optimized Modeling for satisfaction in the relationship between a physician and patient based on machine learnin methods [ Vol.7, Issue 23 - Summer Year ]
  • Sahargahi.Vahideh A novel metaheuristic algorithm and its discrete form for influence maximizing in complex networks [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Saketi.Parviz Drivers, Obstacles and consequences of digital entrepreneurship in Iran's road freight transportation industry [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • sakhaei nia.mahdi Discover product defect reports from the text of users' online comments [ Vol.10, Issue 35 , 36 - Spring - Summer Year 1397]
  • sakhaei.mahdi Improving performance of probe-based rate control mechanisms using classification: evaluation on an experimental testbed for High Throughput WLANs [ Vol.12, Issue 43 , 44 - Spring - Summer Year 1399]
  • Sakhaie.Mohammadali Analysis of Scenarios for the Use of Cryptocurrencies in the Islamic Republic of Iran [ Vol.17, Issue 63 , 64 - Spring - Summer Year 1404]
  • salari.mahdieh A Novel Method based on the Cocomo model to increase the accuracy of software projects effort estimates [ Vol.12, Issue 45 , 46 - Autumn - Winter Year 1399]
  • Salarzehi.Habibollah Exploring the antecedents and consequences of smart good governance using the fuzzy Delphi method (FDM) [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • Saleh Gorgory.Maryam Pathology of software export development in Iran [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • salehesfahani.mahmood A Framework for Identifying and Ranking Criteria for Evaluating the Quality of Electronic Services (Case studies: Golestan website of Payame-noor university) [ Vol.5, Issue 18 , 19 - Autumn - Winter Year 1392]
  • Salehi.Mostafa Multi-level ternary quantization for improving sparsity and computation in embedded deep neural networks [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Salehi.Mostafa Energy-Efficient Fixed-Point Hardware Accelerator for Embedded DNNs [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • Salehi.Mostafa Multi-Level Ternary Quantization for Improving Sparsity and Computation in Embedded Deep Neural Networks [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Salehi.Mostafa Online Estimation and Improvement of Cache Soft Error Vulnerability [ Vol.17, Issue 63 , 64 - Spring - Summer Year 1404]
  • salehi.rezvan Investigation the role of personality and individual differences on password security breaches: An Empirical Study [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • Salimi.Kiomars Improving the load balancing in Cloud computing using a rapid SFL algorithm (R-SFLA) [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • salkhordeh haghighi.mehdi Introducing a genetic algorithm based Method for Community person's stance Detection in social media and news [ Vol.11, Issue 41 , 42 - Autumn - Winter Year 1398]
  • salkhordeh haghighi.mehdi Using Sentiment Analysis and Combining Classifiers for Spam Detection in Twitter [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • salkhordeh haghighi.mehdi Improving Code Coverage Metrics for Discovering Vulnerabilities in Stateful Network Protocols using Hybrid Fuzzing [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • Samadi.Behnam High Performance Computing: Next Generation Requirements and Research Axes [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • samadzadegan.farhad Determination of Optimum SVMs Based on Genetic Algorithm in Classification of Hyper spectral Imagery [ Vol.4, Issue 13 - Spring Year ]
  • samadzadegan.farhad Determining optimal support vector machines in classification of hyperspectral images based on genetic algorithm [ Vol.4, Issue 14 , 15 - Autumn - Winter Year 1391]
  • samie.mohammad ebrahim Improving recommender systems with the help of Semantic Web [ Vol.9, Issue 31 , 32 - Spring - Summer Year 1396]
  • sanaei.farinaz Design and implementation of a survival model for patients with melanoma based on data mining algorithms [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • Sanagoo ye Moharrer.MohammadAli Improving Sentiment Analysis in Persian text based on combination of Stacked Auto-Encoder and Transformer-BiLSTM-CNN [ Vol.17, Issue 65 , 65 - Autumn Year 1404]
  • sarlak.hosein The Analysis of User Reviews on Digikala with the Aim of Detecting Deceptive Opinions [ Vol.17, Issue 65 , 65 - Autumn Year 1404]
  • saroukhani.leila Design and implementation of a fuzzy expert system for suspicious behavior detection in e-banking system [ Vol.1, Issue 1 - Spring Year ]
  • sato.youshi Medial-axis Enhancement of Tubular Structures and its Application in the Extraction of Portal Veins [ Vol.4, Issue 13 - Spring Year ]
  • Sattari.Mohammad An Improved Method Based on Label Propagation and Greedy Approaches for Community Detection in Dynamic Social Networks [ Vol.12, Issue 43 , 44 - Spring - Summer Year 1399]
  • Sattari-Naeini.Vahid Application of clustering in AODV routing protocol for intercity networks on the highway scenario [ Vol.8, Issue 30 , 31 - Autumn - Winter Year 1395]
  • Sattari-Naeini.Vahid Reduction of network load by mapping the application in the network on a chip using the discrete Harris hawk algorithm [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • SayadHaghighi.Mohammad Stability Analysis of Networked Control Systems under Denial of Service Attacks using Switching System Theory [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • Sebghati.Mohammadali Evaluation of Interpolation Methods for Estimating the Fading Channels in Digital TV Broadcasting [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • sebti.ali Fast and accurate concept drift detection from event logs [ Vol.12, Issue 43 , 44 - Spring - Summer Year 1399]
  • sedghahrabi.neda طراحی پردازنده مبتنی بر FPGA برای الگوریتم‌های رمزنگاری سری SHA-2 [ Vol.10, Issue 37 , 38 - Autumn - Winter Year 1397]
  • seif.fatemeh Effect of Menu Location on Visual Attention of Users of Websites [ Vol.5, Issue 17 - Spring - Summer Year ]
  • Seifi.Younes Modeling and evaluation of RPL routing protocol by colored Petri nets [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • Seirafian.vahid SPIHT-DCT hybrid method using Placement spatial scalability and Place - when encoding a video HDTV [ Vol.4, Issue 14 - Autumn - Winter Year 1391]
  • Seirafian.vahid Applying the combined SPIHT-DCT method using spatial and spatial-temporal scaling to encode video images [ Vol.4, Issue 14 , 15 - Autumn - Winter Year 1391]
  • sepahvand.abdollah Emerging technologies in future generations of high performance computing: introduction, taxonomy and future research directions [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • sepahvand.reza Provide a model of human resource knowledge architecture in knowledge-based organizations using a mixed approach [ Vol.11, Issue 39 , 40 - Spring - Summer Year 1398]
  • sepehri.akram Geometric embedding of the tree in points inside a polygon with minimum number of bends [ Vol.2, Issue 4 , 5 - Spring - Summer Year 1389]
  • sepehri.mehdi Iran's Mobile Government Ecosystem Model, Stakeholders Identification and Analysis [ Vol.7, Issue 23 - Summer Year ]
  • setayeshi.saeed Trust Based Link Prediction Using Fuzzy Computational Model in Social Networks [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • Seyyedi Saravi.Mohsen Increasing Total Throughput, Reducing Outage to Zero, and Reducing Power Consumption in a Cellular Network [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • shabooei.saeid Improving resource allocation in mobile edge computing using gray wolf and particle swarm optimization algorithms [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • shabooei.saeid Improving Resource Allocation in Mobile Edge Computing Using Particle Swarm and Gray Wolf Optimization Algorithms [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • shadmehr.mojtaba Optimized Modeling for satisfaction in the relationship between a physician and patient based on machine learnin methods [ Vol.7, Issue 23 - Summer Year ]
  • shafaghizade.somaye Integrating Data Envelopment Analysis and Decision Tree Models in Order to Evaluate Information Technology-Based Units [ Vol.8, Issue 27 - Spring Year ]
  • shafiee.masoud Design of Secure Communication System by Use of Synchronization of Chaotic Systems [ Vol.2, Issue 3 - Summer Year ]
  • shafiee.masoud Sliding Mode Controller for TCP Congestion Control [ Vol.2, Issue 5 - Spring - Summer Year ]
  • shafiee.masoud Image Processing of steel sheets for Defect Detection by using Gabor Wavelet [ Vol.4, Issue 13 - Spring Year ]
  • shafiee.masoud Three-axis attitude control of a micro-satellite by magnetic actuators through-synthesis robust method [ Vol.5, Issue 15 - Summer Year ]
  • shafiee.masoud Cyber Threats Foresight Against Iran Based on Attack Vector [ Vol.9, Issue 33 , 34 - Autumn - Winter Year 1396]
  • shafiee.masoud پردازش تصاویر ورق های فولادی به منظور آشکارسازی عیوب به کمک موجک گابور [ Vol.4, Issue 14 , 15 - Autumn - Winter Year 1391]
  • shafiee.masoud Sliding mode control for congestion in TCP/IP networks [ Vol.2, Issue 6 , 7 - Autumn - Winter Year 1389]
  • shafiee.masoud Stock market prediction using optimized grasshopper optimization algorithm and time series algorithms [ Vol.14, Issue 53 , 54 - Autumn - Winter Year 1401]
  • Shafiee.masoud Design of Distributed Consensus Controller for Leader-Follower Singular Multi-Agent Systems in the Presence of Sensor Fault [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • shafiee.nafiseh Key Management in Digital Right Management Systems for Offline Mode [ Vol.7, Issue 23 - Summer Year ]
  • shafiee.nafiseh Key management in digital rights management systems in offline mode [ Vol.7, Issue 24 , 25 - Spring - Summer Year 1394]
  • Shafiezadeh.Soheila An Individual-Oriented Shuffled Frog Leaping Algorithm for Solving Vehicle Routing Problem [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • Shahbahrami.Asadollah A Managerial Examination of the Successful Parameters in the B2C Business [ Vol.5, Issue 17 - Spring - Summer Year ]
  • Shahbahrami.Asadollah Identification and Prioritization of Parameters Affecting Information Security Management System (Case Study: Social Security Branches of Guilan Province) [ Vol.10, Issue 35 , 36 - Spring - Summer Year 1397]
  • shahbazian.reza Improving IoT resource management using fog calculations and ant lion optimization algorithm [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • Shahhosseini.Mohammadali Employing a meta-synthesis to present a framework for commercial banks’ preparedness indicators in use of blockchain technology [ Vol.13, Issue 49 , 50 - Autumn - Winter Year 1400]
  • Shahmiri.Amir Shahab Beautiful and Meaningful Iranian Names Production by Genetic Algorithm using Artificial Neural Network-Based Fitness Function [ Vol.7, Issue 25 - Spring - Summer Year ]
  • shahmohammadi.Abdolreza The future of online branding with an emphasis on the impact of artificial intelligence in the horizon of 2025 [ Vol.17, Issue 65 , 65 - Autumn Year 1404]
  • shahsavari.mehrdad Present an Initial Estimation Method for Logical Transaction-based Software Projects [ Vol.9, Issue 31 - Spring - Summer Year ]
  • shahsavari.mehrdad Provide a basic method for estimating software projects based on logical transactions [ Vol.9, Issue 31 , 32 - Spring - Summer Year 1396]
  • shajari.mahdi Key Management in Digital Right Management Systems for Offline Mode [ Vol.7, Issue 23 - Summer Year ]
  • Shakery.Azadeh A new algorithm based on ensemble learning for learning to rank in information retrieval [ Vol.7, Issue 25 - Spring - Summer Year ]
  • Shams.Mohammadreza Improving Opinion Aspect Extraction Using Domain Knowledge and Term Graph [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • shams.payam Improving IoT resource management using fog calculations and ant lion optimization algorithm [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • shamsollahi.sara Designing a Fuzzy Expert System for Selecting an Appropriate Contractor in Information Technology Outsourcing [ Vol.2, Issue 5 - Spring - Summer Year ]
  • sharafi.vahid طراحی اولین پایگاه داده کلمات دستنویس کردی برای سیستم های تشخیص تصویری کلمات [ Vol.5, Issue 17 - Spring - Summer Year ]
  • Sharifi.Arash Using limited memory to store the most recent action in XCS learning classifier systems in maze problems [ Vol.15, Issue 55 , 56 - Spring - Summer Year 1402]
  • Sharifi.Ehsan Architectural tactics identification in source code based on a semantic approach [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • Sharifi.Masumeh Improving the directivity of the plasmonic sectoral horn nanoantenna using lens in its aperture [ Vol.9, Issue 33 , 34 - Autumn - Winter Year 1396]
  • Sharifian.Saeed Adaptive Real-Time Decision-Making in the IoT-Based Supply Chain Considering Gradual Orders [ Vol.17, Issue 63 , 64 - Spring - Summer Year 1404]
  • shayegan.Mohammad Javad A Recommender System Based on the Analysis of Personality Traits in Telegram Social Network [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Shaykhan.Mohammad Taghi Proposing a New Framework to Decreasing Delay in the Internet of Things by Using Computing Power of Fog [ Vol.13, Issue 47 , 48 - Spring - Summer Year 1400]
  • Sheikhi.Hemmat Improving imperialist competitive algorithm for solving the nodes placement problem in three-dimensional grid wireless sensor networks [ Vol.12, Issue 45 , 46 - Autumn - Winter Year 1399]
  • shekarchizadeh.ahmadreza The future of online branding with an emphasis on the impact of artificial intelligence in the horizon of 2025 [ Vol.17, Issue 65 , 65 - Autumn Year 1404]
  • Shenassa.Mohammad Ebrahim A Review on Hadith Text Processing Tasks [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Shenassa.Mohammad Ebrahim Noor Analysis: A Benchmark Dataset for Evaluating Morphological Analysis Engines [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • Shenassa.Mohammad Ebrahim A Review on Hadith Text Processing Tasks [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Shirali-Shahreza.Mohammad Hassan Generalizing The Concept of Business Processes Structural Soundness from Classic Petri-nets to BPMN2.0 Process Models [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Shirali-Shahreza.Mohammad Hassan Generalizing The Concept of Business Processes Structural Soundness from Classic Petri-nets to BPMN2.0 Process Models [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Shirvani Moghaddam.Shahriar Performance Analysis of Device to Device Communications Overlaying/Underlaying Cellular Network [ Vol.9, Issue 33 , 34 - Autumn - Winter Year 1396]
  • shiry.saeed Beautiful and Meaningful Iranian Names Production by Genetic Algorithm using Artificial Neural Network-Based Fitness Function [ Vol.7, Issue 25 - Spring - Summer Year ]
  • Siadat.Safieh Improving the accuracy of detection botnet attacks in Internet of Things network by using MLP neural network [ Vol.17, Issue 63 , 64 - Spring - Summer Year 1404]
  • skch.skch Proposing a model for IT services based assessment approach, based on IT Governance Model [ Vol.7, Issue 23 - Summer Year ]
  • soleimani mobarake.muqtada Trust Management Based on User Feedback in Cloud Computing Environment by Using Cuckoo Optimization Algorithm [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • Soleimani Nasab.Ehsan Outage and Throughput Analysis of Bidirectional Cognitive Amplify-and-Forward Relaying Networks with Wireless Power Transfer [ Vol.14, Issue 51 , 52 - Spring - Summer Year 1401]
  • Soleymani Roozbahani.Fatemeh Artefacts and Producers Mapping of Iran's Artificial Intelligence Ecosystem based on Transformational Levels [ Vol.15, Issue 57 , 58 - Autumn - Winter Year 1402]
  • Soleymanizadeh.Hajar Digital Twin: Embracing the Fourth Industrial Revolution in Food Supply Chain Management (A Dynamic Analysis) [ Vol.17, Issue 63 , 64 - Spring - Summer Year 1404]
  • Soltanaghaei koupaei.Mohammadreza Dynamic Load Balancing Improvement in Software-Defined Networks Using Fuzzy Multi-Objective Programming Algorithms [ Vol.16, Issue 61 , 62 - Autumn - Winter Year 1403]
  • Soltani.Mahdi Confidential Payload Attribution on Encrypted Traffic of Enterprise Networks [ Vol.17, Issue 63 , 64 - Spring - Summer Year 1404]
  • Sondossi.Golshan A Neighbor-based Link Prediction Method for Bipartite Networks [ Vol.13, Issue 47 , 48 - Spring - Summer Year 1400]
  • sotoudeh.shahrouz Provide a framework for enhancing the security of IoT-based smart homes using the IoT-A reference architecture [ Vol.10, Issue 35 , 36 - Spring - Summer Year 1397]