sabaei.sabaei
Adaptive Probabilistic Flooding for Ad Hoc Networks
[
Vol.2,
Issue
5
- Spring - SummerYear
]
sabaei.sabaei
A matching probability-based flood algorithm for mobile ad hoc networks
[
Vol.2,
Issue
6
,
7
- Autumn - WinterYear
1389]
saberi.nafise
Personalized E-learning Environment Using Fuzzy Recommender System base on Combination of Learning Style and Cognitive Trait
[
Vol.2,
Issue
3
- SummerYear
]
Sadeghi B..Mahshid
Fake Websites Detection Improvement Using Multi-Layer Artificial Neural Network Classifier with Ant Lion Optimizer Algorithm
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
Sadeghi Bigham.Bahram
Polar Diagram of Points with Moving Pole
[
Vol.11,
Issue
41
,
42
- Autumn - WinterYear
1398]
sadeghi hariri.mehrdad
Modified orthogonal chaotic colonial competition algorithm and its application in improving pattern recognition in multilayer perceptron neural network
[
Vol.10,
Issue
35
,
36
- Spring - SummerYear
1397]
sadeghi.mostafa
Image Processing of steel sheets for Defect Detection by using Gabor Wavelet
[
Vol.4,
Issue
13
- SpringYear
]
sadeghi.mostafa
پردازش تصاویر ورق های فولادی به منظور آشکارسازی عیوب به کمک موجک گابور
[
Vol.4,
Issue
14
,
15
- Autumn - WinterYear
1391]
sadeghzadeh.mehdi
Detecting Distributed Denial of Service Attacks in Software-Defined Networks with a Deep Learning Approach
[
Vol.17,
Issue
63
,
64
- Spring - SummerYear
1404]
sadjadi.Hadi
computer security models and proposing a new perspective: A review paper
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
sadjadi.Hadi
A Survey on Computer Security Patterns and Proposing a New Perspective
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Sadr.Hossein
An Intelligent Model for Multidimensional Personality Recognition of Users using Deep Learning Methods
[
Vol.13,
Issue
47
,
48
- Spring - SummerYear
1400]
Sadr.Hossein
Predicting the workload of virtual machines in order to reduce energy consumption in cloud data centers using the combination of deep learning models
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
saedi.abdollah
Provide a model of human resource knowledge architecture in knowledge-based organizations using a mixed approach
[
Vol.11,
Issue
39
,
40
- Spring - SummerYear
1398]
Saeidi.Zeinab
Measuring Similarity for Directed Path in Geometric Data
[
Vol.12,
Issue
45
,
46
- Autumn - WinterYear
1399]
Safaie.Nasser
Challenges of Blockchain Implementation in Supply Chain: A Multi-Criteria Decision-Making Approach
[
Vol.17,
Issue
63
,
64
- Spring - SummerYear
1404]
Safari dehnavi.Vahid
Stock market prediction using optimized grasshopper optimization algorithm and time series algorithms
[
Vol.14,
Issue
53
,
54
- Autumn - WinterYear
1401]
Safari.Ehram
The effect of emotional intelligence of project managers on the effectiveness of team communication in Iranian research institutes (Case study: Research Institute of Communication and Information Technology)
[
Vol.15,
Issue
57
,
58
- Autumn - WinterYear
1402]
safari.mojtaba
COBIT A Suitable Framework for Measuring IT Governance in Organizations
[
Vol.1,
Issue
1
- SpringYear
]
saghafi.fateme
Comprehensive Interactive Maturity Model for Mobile government
[
Vol.2,
Issue
3
- SummerYear
]
saghafi.Fatemeh
Optimum modeling of patient satisfaction with the doctor based on machine learning methods
[
Vol.7,
Issue
24
,
25
- Spring - SummerYear
1394]
saghafi.Fatemeh
A Collaborative Filtering Movie Recommendation System Based on Users Correlation and Weighted K-Means with High Accuracy
[
Vol.14,
Issue
51
,
52
- Spring - SummerYear
1401]
saghafi.Fatemeh
The Relevance, Importance and Dependence of Critical Infrastructures of The Islamic Republic of Iran from a Cyber-Perspective
[
Vol.16,
Issue
61
,
62
- Autumn - WinterYear
1403]
saghafi.Fatemeh
Indigenous model of commercialization of complex technologies based on partnership in the ICT sector
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
Saghafi.Fatemeh
Optimized Modeling for satisfaction in the relationship between a physician and patient based on machine learnin methods
[
Vol.7,
Issue
23
- SummerYear
]
Sahargahi.Vahideh
A novel metaheuristic algorithm and its discrete form for influence maximizing in complex networks
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
Saketi.Parviz
Drivers, Obstacles and consequences of digital entrepreneurship in Iran's road freight transportation industry
[
Vol.15,
Issue
57
,
58
- Autumn - WinterYear
1402]
sakhaei nia.mahdi
Discover product defect reports from the text of users' online comments
[
Vol.10,
Issue
35
,
36
- Spring - SummerYear
1397]
sakhaei.mahdi
Improving performance of probe-based rate control mechanisms using classification: evaluation on an experimental testbed for High Throughput WLANs
[
Vol.12,
Issue
43
,
44
- Spring - SummerYear
1399]
Sakhaie.Mohammadali
Analysis of Scenarios for the Use of Cryptocurrencies in the Islamic Republic of Iran
[
Vol.17,
Issue
63
,
64
- Spring - SummerYear
1404]
salari.mahdieh
A Novel Method based on the Cocomo model to increase the accuracy of software projects effort estimates
[
Vol.12,
Issue
45
,
46
- Autumn - WinterYear
1399]
Salarzehi.Habibollah
Exploring the antecedents and consequences of smart good governance using the fuzzy Delphi method (FDM)
[
Vol.14,
Issue
51
,
52
- Spring - SummerYear
1401]
Saleh Gorgory.Maryam
Pathology of software export development in Iran
[
Vol.14,
Issue
51
,
52
- Spring - SummerYear
1401]
salehesfahani.mahmood
A Framework for Identifying and Ranking Criteria for Evaluating the Quality of Electronic Services (Case studies: Golestan website of Payame-noor university)
[
Vol.5,
Issue
18
,
19
- Autumn - WinterYear
1392]
Salehi.Mostafa
Multi-level ternary quantization for improving sparsity and computation in embedded deep neural networks
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Salehi.Mostafa
Multi-Level Ternary Quantization for Improving Sparsity and Computation in Embedded Deep Neural Networks
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Salehi.Mostafa
Online Estimation and Improvement of Cache Soft Error Vulnerability
[
Vol.17,
Issue
63
,
64
- Spring - SummerYear
1404]
salehi.rezvan
Investigation the role of personality and individual differences on password security breaches: An Empirical Study
[
Vol.13,
Issue
49
,
50
- Autumn - WinterYear
1400]
Salimi.Kiomars
Improving the load balancing in Cloud computing using a rapid SFL algorithm (R-SFLA)
[
Vol.15,
Issue
57
,
58
- Autumn - WinterYear
1402]
salkhordeh haghighi.mehdi
Introducing a genetic algorithm based Method for Community person's stance Detection in social media and news
[
Vol.11,
Issue
41
,
42
- Autumn - WinterYear
1398]
salkhordeh haghighi.mehdi
Using Sentiment Analysis and Combining Classifiers for Spam Detection in Twitter
[
Vol.14,
Issue
51
,
52
- Spring - SummerYear
1401]
salkhordeh haghighi.mehdi
Improving Code Coverage Metrics for Discovering Vulnerabilities in Stateful Network Protocols using Hybrid Fuzzing
[
Vol.16,
Issue
61
,
62
- Autumn - WinterYear
1403]
Samadi.Behnam
High Performance Computing: Next Generation Requirements and Research Axes
[
Vol.14,
Issue
51
,
52
- Spring - SummerYear
1401]
samadzadegan.farhad
Determination of Optimum SVMs Based on Genetic Algorithm in Classification of Hyper spectral Imagery
[
Vol.4,
Issue
13
- SpringYear
]
samadzadegan.farhad
Determining optimal support vector machines in classification of hyperspectral images based on genetic algorithm
[
Vol.4,
Issue
14
,
15
- Autumn - WinterYear
1391]
samie.mohammad ebrahim
Improving recommender systems with the help of Semantic Web
[
Vol.9,
Issue
31
,
32
- Spring - SummerYear
1396]
sanaei.farinaz
Design and implementation of a survival model for patients with melanoma based on data mining algorithms
[
Vol.15,
Issue
57
,
58
- Autumn - WinterYear
1402]
Sanagoo ye Moharrer.MohammadAli
Improving Sentiment Analysis in Persian text based on combination of Stacked Auto-Encoder and Transformer-BiLSTM-CNN
[
Vol.17,
Issue
65
,
65
- AutumnYear
1404]
sarlak.hosein
The Analysis of User Reviews on Digikala with the Aim of Detecting Deceptive Opinions
[
Vol.17,
Issue
65
,
65
- AutumnYear
1404]
saroukhani.leila
Design and implementation of a fuzzy expert system for suspicious behavior detection in e-banking system
[
Vol.1,
Issue
1
- SpringYear
]
sato.youshi
Medial-axis Enhancement of Tubular Structures and its Application in the Extraction of Portal Veins
[
Vol.4,
Issue
13
- SpringYear
]
Sattari.Mohammad
An Improved Method Based on Label Propagation and Greedy Approaches for Community Detection in Dynamic Social Networks
[
Vol.12,
Issue
43
,
44
- Spring - SummerYear
1399]
Sattari-Naeini.Vahid
Application of clustering in AODV routing protocol for intercity networks on the highway scenario
[
Vol.8,
Issue
30
,
31
- Autumn - WinterYear
1395]
Sattari-Naeini.Vahid
Reduction of network load by mapping the application in the network on a chip using the discrete Harris hawk algorithm
[
Vol.14,
Issue
51
,
52
- Spring - SummerYear
1401]
SayadHaghighi.Mohammad
Stability Analysis of Networked Control Systems under Denial of Service Attacks using Switching System Theory
[
Vol.13,
Issue
49
,
50
- Autumn - WinterYear
1400]
Sebghati.Mohammadali
Evaluation of Interpolation Methods for Estimating the Fading Channels in Digital TV Broadcasting
[
Vol.15,
Issue
57
,
58
- Autumn - WinterYear
1402]
sebti.ali
Fast and accurate concept drift detection from event logs
[
Vol.12,
Issue
43
,
44
- Spring - SummerYear
1399]
sedghahrabi.neda
طراحی پردازنده مبتنی بر FPGA برای الگوریتمهای رمزنگاری سری SHA-2
[
Vol.10,
Issue
37
,
38
- Autumn - WinterYear
1397]
seif.fatemeh
Effect of Menu Location on Visual Attention of Users of Websites
[
Vol.5,
Issue
17
- Spring - SummerYear
]
Seifi.Younes
Modeling and evaluation of RPL routing protocol by colored Petri nets
[
Vol.14,
Issue
53
,
54
- Autumn - WinterYear
1401]
Seirafian.vahid
SPIHT-DCT hybrid method using Placement spatial scalability and Place - when encoding a video HDTV
[
Vol.4,
Issue
14
- Autumn - WinterYear
1391]
Seirafian.vahid
Applying the combined SPIHT-DCT method using spatial and spatial-temporal scaling to encode video images
[
Vol.4,
Issue
14
,
15
- Autumn - WinterYear
1391]
sepahvand.abdollah
Emerging technologies in future generations of high performance computing: introduction, taxonomy and future research directions
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
sepahvand.reza
Provide a model of human resource knowledge architecture in knowledge-based organizations using a mixed approach
[
Vol.11,
Issue
39
,
40
- Spring - SummerYear
1398]
sepehri.akram
Geometric embedding of the tree in points inside a polygon with minimum number of bends
[
Vol.2,
Issue
4
,
5
- Spring - SummerYear
1389]
sepehri.mehdi
Iran's Mobile Government Ecosystem Model, Stakeholders Identification and Analysis
[
Vol.7,
Issue
23
- SummerYear
]
setayeshi.saeed
Trust Based Link Prediction Using Fuzzy Computational Model in Social Networks
[
Vol.16,
Issue
61
,
62
- Autumn - WinterYear
1403]
Seyyedi Saravi.Mohsen
Increasing Total Throughput, Reducing Outage to Zero, and Reducing Power Consumption in a Cellular Network
[
Vol.14,
Issue
53
,
54
- Autumn - WinterYear
1401]
shabooei.saeid
Improving resource allocation in mobile edge computing using gray wolf and particle swarm optimization algorithms
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
shabooei.saeid
Improving Resource Allocation in Mobile Edge Computing Using Particle Swarm and Gray Wolf Optimization Algorithms
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
shadmehr.mojtaba
Optimized Modeling for satisfaction in the relationship between a physician and patient based on machine learnin methods
[
Vol.7,
Issue
23
- SummerYear
]
shafaghizade.somaye
Integrating Data Envelopment Analysis and Decision Tree Models in Order to Evaluate Information Technology-Based Units
[
Vol.8,
Issue
27
- SpringYear
]
shafiee.masoud
Design of Secure Communication System by Use of Synchronization of Chaotic Systems
[
Vol.2,
Issue
3
- SummerYear
]
shafiee.masoud
Sliding Mode Controller for TCP Congestion Control
[
Vol.2,
Issue
5
- Spring - SummerYear
]
shafiee.masoud
Image Processing of steel sheets for Defect Detection by using Gabor Wavelet
[
Vol.4,
Issue
13
- SpringYear
]
shafiee.masoud
Three-axis attitude control of a micro-satellite by magnetic actuators through-synthesis robust method
[
Vol.5,
Issue
15
- SummerYear
]
shafiee.masoud
Cyber Threats Foresight Against Iran Based on Attack Vector
[
Vol.9,
Issue
33
,
34
- Autumn - WinterYear
1396]
shafiee.masoud
پردازش تصاویر ورق های فولادی به منظور آشکارسازی عیوب به کمک موجک گابور
[
Vol.4,
Issue
14
,
15
- Autumn - WinterYear
1391]
shafiee.masoud
Sliding mode control for congestion in TCP/IP networks
[
Vol.2,
Issue
6
,
7
- Autumn - WinterYear
1389]
shafiee.masoud
Stock market prediction using optimized grasshopper optimization algorithm and time series algorithms
[
Vol.14,
Issue
53
,
54
- Autumn - WinterYear
1401]
Shafiee.masoud
Design of Distributed Consensus Controller for Leader-Follower Singular Multi-Agent Systems in the Presence of Sensor Fault
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
shafiee.nafiseh
Key Management in Digital Right Management Systems for Offline Mode
[
Vol.7,
Issue
23
- SummerYear
]
shafiee.nafiseh
Key management in digital rights management systems in offline mode
[
Vol.7,
Issue
24
,
25
- Spring - SummerYear
1394]
Shafiezadeh.Soheila
An Individual-Oriented Shuffled Frog Leaping Algorithm for Solving Vehicle Routing Problem
[
Vol.14,
Issue
51
,
52
- Spring - SummerYear
1401]
Shahbahrami.Asadollah
A Managerial Examination of the Successful Parameters in the B2C Business
[
Vol.5,
Issue
17
- Spring - SummerYear
]
Shahbahrami.Asadollah
Identification and Prioritization of Parameters Affecting Information Security Management System (Case Study: Social Security Branches of Guilan Province)
[
Vol.10,
Issue
35
,
36
- Spring - SummerYear
1397]
shahbazian.reza
Improving IoT resource management using fog calculations and ant lion optimization algorithm
[
Vol.15,
Issue
57
,
58
- Autumn - WinterYear
1402]
Shahhosseini.Mohammadali
Employing a meta-synthesis to present a framework for commercial banks’ preparedness indicators in use of blockchain technology
[
Vol.13,
Issue
49
,
50
- Autumn - WinterYear
1400]
Shahmiri.Amir Shahab
Beautiful and Meaningful Iranian Names Production by Genetic Algorithm using Artificial Neural Network-Based Fitness Function
[
Vol.7,
Issue
25
- Spring - SummerYear
]
shahmohammadi.Abdolreza
The future of online branding with an emphasis on the impact of artificial intelligence in the horizon of 2025
[
Vol.17,
Issue
65
,
65
- AutumnYear
1404]
shahsavari.mehrdad
Present an Initial Estimation Method for Logical Transaction-based Software Projects
[
Vol.9,
Issue
31
- Spring - SummerYear
]
shahsavari.mehrdad
Provide a basic method for estimating software projects based on logical transactions
[
Vol.9,
Issue
31
,
32
- Spring - SummerYear
1396]
shajari.mahdi
Key Management in Digital Right Management Systems for Offline Mode
[
Vol.7,
Issue
23
- SummerYear
]
Shakery.Azadeh
A new algorithm based on ensemble learning for learning to rank in information retrieval
[
Vol.7,
Issue
25
- Spring - SummerYear
]
Shams.Mohammadreza
Improving Opinion Aspect Extraction Using Domain Knowledge and Term Graph
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
shams.payam
Improving IoT resource management using fog calculations and ant lion optimization algorithm
[
Vol.15,
Issue
57
,
58
- Autumn - WinterYear
1402]
shamsollahi.sara
Designing a Fuzzy Expert System for Selecting an Appropriate Contractor in Information Technology Outsourcing
[
Vol.2,
Issue
5
- Spring - SummerYear
]
sharafi.vahid
طراحی اولین پایگاه داده کلمات دستنویس کردی برای سیستم های تشخیص تصویری کلمات
[
Vol.5,
Issue
17
- Spring - SummerYear
]
Sharifi.Arash
Using limited memory to store the most recent action in XCS learning classifier systems in maze problems
[
Vol.15,
Issue
55
,
56
- Spring - SummerYear
1402]
Sharifi.Ehsan
Architectural tactics identification in source code based on a semantic approach
[
Vol.14,
Issue
51
,
52
- Spring - SummerYear
1401]
Sharifi.Masumeh
Improving the directivity of the plasmonic sectoral horn nanoantenna using lens in its aperture
[
Vol.9,
Issue
33
,
34
- Autumn - WinterYear
1396]
Sharifian.Saeed
Adaptive Real-Time Decision-Making in the IoT-Based Supply Chain Considering Gradual Orders
[
Vol.17,
Issue
63
,
64
- Spring - SummerYear
1404]
shayegan.Mohammad Javad
A Recommender System Based on the Analysis of Personality Traits in Telegram Social Network
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Shaykhan.Mohammad Taghi
Proposing a New Framework to Decreasing Delay in the Internet of Things by Using Computing Power of Fog
[
Vol.13,
Issue
47
,
48
- Spring - SummerYear
1400]
Sheikhi.Hemmat
Improving imperialist competitive algorithm for solving the nodes placement problem in three-dimensional grid wireless sensor networks
[
Vol.12,
Issue
45
,
46
- Autumn - WinterYear
1399]
shekarchizadeh.ahmadreza
The future of online branding with an emphasis on the impact of artificial intelligence in the horizon of 2025
[
Vol.17,
Issue
65
,
65
- AutumnYear
1404]
Shenassa.Mohammad Ebrahim
A Review on Hadith Text Processing Tasks
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Shenassa.Mohammad Ebrahim
Noor Analysis: A Benchmark Dataset for Evaluating Morphological Analysis Engines
[
Vol.15,
Issue
57
,
58
- Autumn - WinterYear
1402]
Shenassa.Mohammad Ebrahim
A Review on Hadith Text Processing Tasks
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Shirali-Shahreza.Mohammad Hassan
Generalizing The Concept of Business Processes Structural Soundness from Classic Petri-nets to BPMN2.0 Process Models
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Shirali-Shahreza.Mohammad Hassan
Generalizing The Concept of Business Processes Structural Soundness from Classic Petri-nets to BPMN2.0 Process Models
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
shiry.saeed
Beautiful and Meaningful Iranian Names Production by Genetic Algorithm using Artificial Neural Network-Based Fitness Function
[
Vol.7,
Issue
25
- Spring - SummerYear
]
Siadat.Safieh
Improving the accuracy of detection botnet attacks in Internet of Things network by using MLP neural network
[
Vol.17,
Issue
63
,
64
- Spring - SummerYear
1404]
skch.skch
Proposing a model for IT services based assessment approach, based on IT Governance Model
[
Vol.7,
Issue
23
- SummerYear
]
soleimani mobarake.muqtada
Trust Management Based on User Feedback in Cloud Computing Environment by Using Cuckoo Optimization Algorithm
[
Vol.16,
Issue
61
,
62
- Autumn - WinterYear
1403]
Soleimani Nasab.Ehsan
Outage and Throughput Analysis of Bidirectional Cognitive Amplify-and-Forward Relaying Networks with Wireless Power Transfer
[
Vol.14,
Issue
51
,
52
- Spring - SummerYear
1401]
Soleymani Roozbahani.Fatemeh
Artefacts and Producers Mapping of Iran's Artificial Intelligence Ecosystem based on Transformational Levels
[
Vol.15,
Issue
57
,
58
- Autumn - WinterYear
1402]
Soleymanizadeh.Hajar
Digital Twin: Embracing the Fourth Industrial Revolution in Food Supply Chain Management (A Dynamic Analysis)
[
Vol.17,
Issue
63
,
64
- Spring - SummerYear
1404]
Soltani.Mahdi
Confidential Payload Attribution on Encrypted Traffic of Enterprise Networks
[
Vol.17,
Issue
63
,
64
- Spring - SummerYear
1404]
Sondossi.Golshan
A Neighbor-based Link Prediction Method for Bipartite Networks
[
Vol.13,
Issue
47
,
48
- Spring - SummerYear
1400]
sotoudeh.shahrouz
Provide a framework for enhancing the security of IoT-based smart homes using the IoT-A reference architecture
[
Vol.10,
Issue
35
,
36
- Spring - SummerYear
1397]