About the journal
According to the letter No. 3/4817 dated 2007/9/02 of the Research Affairs Office of the Iranian Ministry of Science, Research and Technology and the statement of the vote of the Commission for the Review of Scientific Journals of the country on 2007/7/14, this journal has been awarded a scientific-research degree.
Journal of Information and Communication Technology (JICT) belongs to the "Iranian Information and Communication Technology Association" and is published with the collaboration of ICT Research Institute. The journal language is Farsi and it is an open-access bi-quarterly journal publishing high-quality scientific papers covering all aspects of the information and communication technologies including computer science and engineering, information technology, communication technology and information technology management. It is an interdisciplinary journal devoted to the publication of original articles, review articles, etc., considering the research ethics and academic rules and regulations.
All papers are subject to a blind reviewing process. The submitted manuscripts will be published after a thorough review and the editorial board's approval
-
Open Access Article
1 - Exploring the Role of Artificial Intelligence in the Law Domain: An Exploratory Approach
Omolbanin Kazemi Rad Mona Jami Pour Seyedeh Fatemeh FaghihiIssue 63 , Vol. 17 , Spring_Summer 2025 -
Open Access Article
2 - Challenges of Blockchain Implementation in Supply Chain: A Multi-Criteria Decision-Making Approach
Parnian Hendiazad Nasser Safaie Majid Mirzaee GhazaniIssue 63 , Vol. 17 , Spring_Summer 2025 -
Open Access Article
3 - Synthetic Photoplethysmogram (PPG) Generation Using Genetic Programming Based Generative Model
Fatemeh Ghasemi Fardin abdaliIssue 63 , Vol. 17 , Spring_Summer 2025 -
Open Access Article
4 - Analysis and Evaluation of the Impact of Sub-Indicators of e-Government Development Index (EGDI) and e-Participation Index (EPI) Using Time Series Data of the Middle East Countries During the Years 2003 to 2022
Atefeh Farazmand Farshad HakamizadehIssue 63 , Vol. 17 , Spring_Summer 2025 -
Open Access Article
5 - Reducing Energy Consumption in Tracking the Red Palm Weevil Using Wireless Sensor Networks and Nature-Inspired Evolutionary Algorithms (Fruit Fly Optimization Algorithm and Lion Swarm Optimization Algorithm)
Shayesteh Tabatabaei Hassan Nosrati NahookIssue 63 , Vol. 17 , Spring_Summer 2025 -
Open Access Article
6 - Analysis of Scenarios for the Use of Cryptocurrencies in the Islamic Republic of Iran
Ali Rostami Abouzar Arabsorkhi Mohsen Aghaee Mohammadali SakhaieIssue 63 , Vol. 17 , Spring_Summer 2025 -
Open Access Article
7 - Adaptive Real-Time Decision-Making in the IoT-Based Supply Chain Considering Gradual Orders
ّFatemeh Mohammadi Chinisaz S. Alireza Hashemi G. Saeed Sharifian KhortoomiIssue 63 , Vol. 17 , Spring_Summer 2025 -
Open Access Article
8 - Detecting Distributed Denial of Service Attacks in Software-Defined Networks with a Deep Learning Approach
Younes Mehdizadeh Mehdi SadeghzadehIssue 63 , Vol. 17 , Spring_Summer 2025 -
Open Access Article
9 - Confidential Payload Attribution on Encrypted Traffic of Enterprise Networks
Seyed Mohammad Hosseini amir hosein jahangir Mahdi SoltaniIssue 63 , Vol. 17 , Spring_Summer 2025 -
Open Access Article
10 - An Architecture, Implementation, and Evaluation of Internet of Healthcare Things Ecosystem Platform
Sayed Gholam Hassan Tabatabaei sarvenaz aghadavoudiIssue 63 , Vol. 17 , Spring_Summer 2025 -
Open Access Article
11 - Analysis of Traffic Data for Congestion Detection Using Machine Learning Algorithms
Nahid Amani Mohammad-Hossein Amerimehr Sara Efazati Ali JavidaniIssue 63 , Vol. 17 , Spring_Summer 2025 -
Open Access Article
12 - Digital Twin: Embracing the Fourth Industrial Revolution in Food Supply Chain Management (A Dynamic Analysis)
Hajar Soleymanizadeh Seyed mahmoud Zanjirchi Habib Zare Ahmadabadi Seyyed Habibollah MirghfooriIssue 63 , Vol. 17 , Spring_Summer 2025 -
Open Access Article
13 - Prioritizing Virtual Reality Functions in the B2B Customer Journey Using the Fuzzy SWARA Method
Zahra Nikoosefat Rad Pejman Jafari Farid AhmadiIssue 63 , Vol. 17 , Spring_Summer 2025 -
Open Access Article
14 - Online Estimation and Improvement of Cache Soft Error Vulnerability
Mohammad Moeini Jahromi Mohammad Hasan Ahmadilivani Mostafa SalehiIssue 63 , Vol. 17 , Spring_Summer 2025 -
Open Access Article
15 - A Framework for Technology Priority-Setting Using Fuzzy Inference Systems (Case study: Information Technology in Iran)
Amir Khodadadi Gholamali Montazer Seied Sepehr Ghazinori Mohammad Hoseini MoghadamIssue 63 , Vol. 17 , Spring_Summer 2025 -
Open Access Article
16 - A Novel Method Based on Tranco for Monitoring Cloud Service Providers
Davood Maleki Pejman Goudarzi Alireza Mansouri Neda Ghorbani Ehsan ArianyanIssue 63 , Vol. 17 , Spring_Summer 2025 -
Open Access Article
17 - A novel framework for policymaking and evaluation of digital government
Kolsoom Abbasi-Shahkooh Masoumeh Sadeghi Homeira Moghadami Mahmood Kharrat Sogoul Babazadeh Nasrin DastranjIssue 63 , Vol. 17 , Spring_Summer 2025 -
Open Access Article
18 - Improving the accuracy of detection botnet attacks in Internet of Things network by using MLP neural network
Safieh Siadat Amir TajfarIssue 63 , Vol. 17 , Spring_Summer 2025
-
Open Access Article
1 - Determining the factors affecting the collective financing of knowledge-based IT companies
Ali Haji Gholam Saryazdi ali rajabzadeh ghotri alinaghi mashayekhi alireza hassanzadeIssue 37 , Vol. 10 , Autumn_Winter 2019 -
Open Access Article
2 - Image Processing of steel sheets for Defect Detection by using Gabor Wavelet
masoud shafiee mostafa sadeghiIssue 13 , Vol. 4 , Spring 1391 -
Open Access Article
3 - A Satellite Control Method Using Laguerre Model Predictive Control Approach
shekoofeh jafari fesharaki farzad tihidkhah heydarali talebiIssue 15 , Vol. 5 , Summer 1392 -
Open Access Article
4 - Provide a conceptual model to identify the quality of electronic services in the country's online stores
marziye rahmani Mohammad Fathian saied yaghoubiIssue 30 , Vol. 8 , Autumn_Winter 2016 -
Open Access Article
5 - پردازش تصاویر ورق های فولادی به منظور آشکارسازی عیوب به کمک موجک گابور
Mostafa Sadeghie masoud shafieeIssue 14 , Vol. 4 , Autumn_Winter 2012 -
Open Access Article
6 - Evaluation of e-learning with optimal mining approach 1 case study: Iran's higher education
abbas anarinejad aliakbar safavi farshad moradiIssue 12 , Vol. 4 , Spring_Summer 2012 -
Open Access Article
7 - Designing a fuzzy expert system for choosing the right contractor in information technology outsourcing
nadia kalantari nadia kalantari alireza Hasanzadeh shaban elahiIssue 6 , Vol. 2 , Autumn_Winter 2010 -
Open Access Article
8 - An Investigation on the Effect of Multifactor Model of Improving Critical Thinking in E-learning Environments
mohammadreza nili jamshid heydari hossein moradiIssue 21 , Vol. 6 , Spring 1394 -
Open Access Article
9 - Cyber Threats Foresight Against Iran Based on Attack Vector
mahdi omrani masoud shafiee siavash khorsandiIssue 33 , Vol. 9 , Autumn_Winter 2017 -
Open Access Article
10 - Sliding mode control for congestion in TCP/IP networks
roohollah barzamini masoud shafieeIssue 6 , Vol. 2 , Autumn_Winter 2010