List of Articles Open Access Article Abstract Page Full-Text 1 - Presenting a novel solution to choose a proper database for storing big data in national network services Mohammad Reza Ahmadi davood maleki ehsan arianyan Open Access Article Abstract Page Full-Text 2 - Priority based Deployment of IoT Applications in Fog Masomeh Azimzadeh Ali Rezaee Somayyeh Jafarali Jassbi MohammadMahdi Esnaashari Open Access Article Abstract Page Full-Text 3 - Identifying and ranking factors affecting the digital transformation strategy in Iran's road freight transportation industry focusing on the Internet of Things and data analytics Mehran Ehteshami Mohammad Hasan Cheraghali Bita Tabrizian Maryam Teimourian sefidehkhan Open Access Article Abstract Page Full-Text 4 - A Review on Hadith Text Processing Tasks Sepideh Baradaran Behrooz Minaei Mohammad Ebrahim Shenassa Sayyed Ali Hossayni Open Access Article Abstract Page Full-Text 5 - A Horizon for Sentiment Analysis in Social Networks based on Interpreting Contents Maryam Tayefeh Mahmoudi َAmirmansour Yadegari Parvin Ahmadi Kambiz Badie Open Access Article Abstract Page Full-Text 6 - Anomaly and Intrusion Detection through Datamining and Feature Selection using PSO Algorithm Fereidoon Rezaei Mohamad Ali Afshar Kazemi Mohammad Ali Keramati Open Access Article Abstract Page Full-Text 7 - Intrusion Detection Based on Cooperation on the Permissioned Blockchain Platform in the Internet of Things Using Machine Learning Mohammad Mahdi Abdian majid ghayori Seyed Ahmad Eftekhari Open Access Article Abstract Page Full-Text 8 - Improving resource allocation in mobile edge computing using gray wolf and particle swarm optimization algorithms seyed ebrahim dashti saeid shabooei Open Access Article Abstract Page Full-Text 9 - Multi-level ternary quantization for improving sparsity and computation in embedded deep neural networks Hosna Manavi Mofrad Seyed Ali ansarmohammadi Mostafa Salehi Open Access Article Abstract Page Full-Text 10 - computer security models and proposing a new perspective: A review paper Hadi sadjadi Reza Kalantari Open Access Article Abstract Page Full-Text 11 - Identifying the Key Drivers of Digital Signature Implementation in Iran (using fuzzy Delphi method) Ghorbanali Mehrabani Fatemeh Zargaran khouzani Open Access Article Abstract Page Full-Text 12 - Community Detection in Bipartite Networks Using HellRank Centrality Measure Ali Khosrozadeh Ali Movaghar Mohammad Mehdi Gilanian Sadeghi Hamidreza Mahyar Open Access Article Abstract Page Full-Text 13 - Generalizing The Concept of Business Processes Structural Soundness from Classic Petri-nets to BPMN2.0 Process Models Yahya Poursoltani Mohammad Hassan Shirali-Shahreza S. Alireza Hashemi Golpayegani Open Access Article Abstract Page Full-Text 14 - Presenting the ICT Policies Implementation Model of the 6th Development Using the Neural Network Method Nazila Mohammadi Gholamreza Memarzadeh Tehran Sedigheh Tootian Isfahani Open Access Article Abstract Page Full-Text 15 - Test case Selection based on Test-Driven Development Zohreh Mafi mirian mirian Open Access Article Abstract Page Full-Text 16 - Survey on the Applications of the Graph Theory in the Information Retrieval Maryam Piroozmand Amir Hosein Keyhanipour Ali Moeini Open Access Article Abstract Page Full-Text 17 - Application identification through intelligent traffic classification Shaghayegh Naderi Open Access Article Abstract Page Full-Text 18 - Explanation the role of standardization in the proposed solutions for privacy protection in health data batool mehrshad Mohammad mehraeen Mohammad Khansari saeed mortazavi Open Access Article Abstract Page Full-Text 19 - Persian Stance Detection Based On Multi-Classifier Fusion Mojgan Farhoodi Abbas Toloie Eshlaghy Open Access Article Abstract Page Full-Text 20 - A Recommender System Based on the Analysis of Personality Traits in Telegram Social Network Mohammad Javad shayegan mohadeseh valizadeh