List of Articles Open Access Article Abstract Page Full-Text 1 - An Overview on Replica Consistency Methods in Distributed Systems and Future Works Mahsa Beigrezaei Open Access Article Abstract Page Full-Text 2 - The Belief of Persian Text Mining Based on Deep Learning with Emotion-Word Separation Hossein Alikarami AmirMasoud Bidgoli Hamid Haj Seyyed Javadi Open Access Article Abstract Page Full-Text 3 - Energy-Efficient Fixed-Point Hardware Accelerator for Embedded DNNs Marzie Mastalizade Ali Ansarmohammadi Najme Nazari Mostafa Salehi Open Access Article Abstract Page Full-Text 4 - Dynamic Load Balancing Improvement in Software-Defined Networks Using Fuzzy Multi-Objective Programming Algorithms Mohammadreza Forghani Mohammadreza Soltanaghaei koupaei Farsad Zamani Boroujeni Open Access Article Abstract Page Full-Text 5 - Improving Code Coverage Metrics for Discovering Vulnerabilities in Stateful Network Protocols using Hybrid Fuzzing Hamid Rezaei Rahvard Mehdi Salkhordeh Haghighi Open Access Article Abstract Page Full-Text 6 - Presenting a Method for Agile Enterprise Architecture Modeling Ali Razi Reza Rezaei Ahmad Ali Yazdanpanah Open Access Article Abstract Page Full-Text 7 - The Local Strategic Model of Smart Police of The Islamic Republic of Iran Ahmad Dolatkhah Mohammad Reza Movahedi Sefat Mehrab Ramak Open Access Article Abstract Page Full-Text 8 - Designing A New Genetic-Fuzzy Type 2 Approach to Evaluate Self-Adaptive Systems by Software Quality Indicators Majid Abdolrazzagh-Nezhad Eshrat Zargari Mehdi Kherad Open Access Article Abstract Page Full-Text 9 - Trust Management Based on User Feedback in Cloud Computing Environment by Using Cuckoo Optimization Algorithm Muqtada Soleimani Mobarake Golnaz Aghaee Babak Nikmard Open Access Article Abstract Page Full-Text 10 - Energy Efficient Target (Rhynchophorus Ferrugineus) Tracking in Wireless Sensor Network Using the Cat Swarm Optimization Algorithm and Fuzzy Logic Shayesteh Tabatabaei Open Access Article Abstract Page Full-Text 11 - Investigating an Approach to Identify and Classify Mutants Based on the Characteristics of Mutants with Machine Learning Algorithms Zeinab Asghari Bahman Arasteh Abbas Koochari Open Access Article Abstract Page Full-Text 12 - Generating Personalized Explanations for Twitter List Recommendations Using Semantic Similarity of Hashtags Havva Alizadeh Noughabi Behshid Behkamal Saleheh Naseri Mohsen Kahani Open Access Article Abstract Page Full-Text 13 - Providing a Blockchain-Based Method to Protect Users’ Privacy in Social Networks Ibrahim Zamani Babgohari Monireh Hosseini Open Access Article Abstract Page Full-Text 14 - Providing an Intrusion Detection System in the Industrial Internet of Things Using the Gray Wolf Algorithm Sajad Alimohamadi Mohammad Fathi Open Access Article Abstract Page Full-Text 15 - Trust Based Link Prediction Using Fuzzy Computational Model in Social Networks Fateme Hoseinkhani Ali Harounabadi ُُُُSaeed Setayeshi Open Access Article Abstract Page Full-Text 16 - Fault Diagnosis and Detection in Photovoltaic Systems Using Neural Network VGG16 ُSamaneh Azimi Mohammad Manthouri Mehdi Akhbari Open Access Article Abstract Page Full-Text 17 - The Relevance, Importance and Dependence of Critical Infrastructures of The Islamic Republic of Iran from a Cyber-Perspective Abouzar Solat Rafiee Hossein Gharaee Garakani Fatemeh Saghafi Mohammad Malekinia Open Access Article Abstract Page Full-Text 18 - Provide A Lightweight Encryption Solution To secure Data In The Internet Of Things wahab aminiazar rasoul farahi fattameh dashti