List of Articles
-
Open Access Article
1 - An Overview on Replica Consistency Methods in Distributed Systems and Future Works
Mahsa Beigrezaei -
Open Access Article
2 - The Belief of Persian Text Mining Based on Deep Learning with Emotion-Word Separation
Hossein Alikarami AmirMasoud Bidgoli Hamid Haj Seyyed Javadi -
Open Access Article
3 - Energy-Efficient Fixed-Point Hardware Accelerator for Embedded DNNs
Marzie Mastalizade Ali Ansarmohammadi Najme Nazari Mostafa Salehi -
Open Access Article
4 - Dynamic Load Balancing Improvement in Software-Defined Networks Using Fuzzy Multi-Objective Programming Algorithms
Mohammadreza Forghani Mohammadreza Soltanaghaei koupaei Farsad Zamani Boroujeni -
Open Access Article
5 - Improving Code Coverage Metrics for Discovering Vulnerabilities in Stateful Network Protocols using Hybrid Fuzzing
Hamid Rezaei Rahvard Mehdi Salkhordeh Haghighi -
Open Access Article
6 - Presenting a Method for Agile Enterprise Architecture Modeling
Ali Razi Reza Rezaei Ahmad Ali Yazdanpanah -
Open Access Article
7 - The Local Strategic Model of Smart Police of The Islamic Republic of Iran
Ahmad Dolatkhah Mohammad Reza Movahedi Sefat Mehrab Ramak -
Open Access Article
8 - Designing A New Genetic-Fuzzy Type 2 Approach to Evaluate Self-Adaptive Systems by Software Quality Indicators
Majid Abdolrazzagh-Nezhad Eshrat Zargari Mehdi Kherad -
Open Access Article
9 - Trust Management Based on User Feedback in Cloud Computing Environment by Using Cuckoo Optimization Algorithm
Muqtada Soleimani Mobarake Golnaz Aghaee Babak Nikmard -
Open Access Article
10 - Energy Efficient Target (Rhynchophorus Ferrugineus) Tracking in Wireless Sensor Network Using the Cat Swarm Optimization Algorithm and Fuzzy Logic
Shayesteh Tabatabaei -
Open Access Article
11 - Investigating an Approach to Identify and Classify Mutants Based on the Characteristics of Mutants with Machine Learning Algorithms
Zeinab Asghari Bahman Arasteh Abbas Koochari -
Open Access Article
12 - Generating Personalized Explanations for Twitter List Recommendations Using Semantic Similarity of Hashtags
Havva Alizadeh Noughabi Behshid Behkamal Saleheh Naseri Mohsen Kahani -
Open Access Article
13 - Providing a Blockchain-Based Method to Protect Users’ Privacy in Social Networks
Ibrahim Zamani Babgohari Monireh Hosseini -
Open Access Article
14 - Providing an Intrusion Detection System in the Industrial Internet of Things Using the Gray Wolf Algorithm
Sajad Alimohamadi Mohammad Fathi -
Open Access Article
15 - Trust Based Link Prediction Using Fuzzy Computational Model in Social Networks
Fateme Hoseinkhani Ali Harounabadi ُُُُSaeed Setayeshi -
Open Access Article
16 - Fault Diagnosis and Detection in Photovoltaic Systems Using Neural Network VGG16
ُSamaneh Azimi Mohammad Manthouri Mehdi Akhbari -
Open Access Article
17 - The Relevance, Importance and Dependence of Critical Infrastructures of The Islamic Republic of Iran from a Cyber-Perspective
Abouzar Solat Rafiee Hossein Gharaee Garakani Fatemeh Saghafi Mohammad Malekinia -
Open Access Article
18 - Provide A Lightweight Encryption Solution To secure Data In The Internet Of Things
wahab aminiazar rasoul farahi fattameh dashti