S

  • sadjadi.Hadi A Survey on Computer Security Patterns and Proposing a New Perspective [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • sadjadi.Hadi computer security models and proposing a new perspective: A review paper [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Salehi.Mostafa Multi-Level Ternary Quantization for Improving Sparsity and Computation in Embedded Deep Neural Networks [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Salehi.Mostafa Multi-level ternary quantization for improving sparsity and computation in embedded deep neural networks [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • shabooei.saeid Improving resource allocation in mobile edge computing using gray wolf and particle swarm optimization algorithms [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • shabooei.saeid Improving Resource Allocation in Mobile Edge Computing Using Particle Swarm and Gray Wolf Optimization Algorithms [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • shayegan.Mohammad Javad A Recommender System Based on the Analysis of Personality Traits in Telegram Social Network [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Shenassa.Mohammad Ebrahim A Review on Hadith Text Processing Tasks [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Shenassa.Mohammad Ebrahim A Review on Hadith Text Processing Tasks [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Shirali-Shahreza.Mohammad Hassan Generalizing The Concept of Business Processes Structural Soundness from Classic Petri-nets to BPMN2.0 Process Models [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Shirali-Shahreza.Mohammad Hassan Generalizing The Concept of Business Processes Structural Soundness from Classic Petri-nets to BPMN2.0 Process Models [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]