sadjadi.Hadi
A Survey on Computer Security Patterns and Proposing a New Perspective
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
sadjadi.Hadi
computer security models and proposing a new perspective: A review paper
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Salehi.Mostafa
Multi-Level Ternary Quantization for Improving Sparsity and Computation in Embedded Deep Neural Networks
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Salehi.Mostafa
Multi-level ternary quantization for improving sparsity and computation in embedded deep neural networks
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
shabooei.saeid
Improving resource allocation in mobile edge computing using gray wolf and particle swarm optimization algorithms
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
shabooei.saeid
Improving Resource Allocation in Mobile Edge Computing Using Particle Swarm and Gray Wolf Optimization Algorithms
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
shayegan.Mohammad Javad
A Recommender System Based on the Analysis of Personality Traits in Telegram Social Network
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Shenassa.Mohammad Ebrahim
A Review on Hadith Text Processing Tasks
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Shenassa.Mohammad Ebrahim
A Review on Hadith Text Processing Tasks
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Shirali-Shahreza.Mohammad Hassan
Generalizing The Concept of Business Processes Structural Soundness from Classic Petri-nets to BPMN2.0 Process Models
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Shirali-Shahreza.Mohammad Hassan
Generalizing The Concept of Business Processes Structural Soundness from Classic Petri-nets to BPMN2.0 Process Models
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]