A

  • Abdian.Mohammad Mahdi Intrusion Detection Based on Cooperation on the Permissioned Blockchain Platform in the Internet of Things Using Machine Learning [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Abdian.Mohammad Mahdi Intrusion Detection Based on Cooperation on the Permissioned Blockchain Platform in the Internet of Things Using Machine Learning [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Afshar Kazemi.Mohamad Ali Anomaly and Intrusion Detection Through Data Mining and Feature Selection using PSO Algorithm [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Afshar Kazemi.Mohamad Ali Anomaly and Intrusion Detection through Datamining and Feature Selection using PSO Algorithm [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Ahmadi.Mohammad Reza Providing a New Solution in Selecting Suitable Databases for Storing Big Data in the National Information Network [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Ahmadi.Mohammad Reza Presenting a novel solution to choose a proper database for storing big data in national network services [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Ahmadi.Parvin A Framework for Sentiment Analysis in Social Networks based on Interpreting Contents [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Ahmadi.Parvin A Horizon for Sentiment Analysis in Social Networks based on Interpreting Contents [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • ansarmohammadi.ali Multi-Level Ternary Quantization for Improving Sparsity and Computation in Embedded Deep Neural Networks [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • ansarmohammadi.ali Multi-level ternary quantization for improving sparsity and computation in embedded deep neural networks [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • arianyan.ehsan Providing a New Solution in Selecting Suitable Databases for Storing Big Data in the National Information Network [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • arianyan.ehsan Presenting a novel solution to choose a proper database for storing big data in national network services [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Azimzadeh.Masomeh Community-Based Multi-Criteria Placement of Applications in the Fog Environment [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Azimzadeh.Masomeh Priority based Deployment of IoT Applications in Fog [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]

B

  • badie.kambiz A Framework for Sentiment Analysis in Social Networks based on Interpreting Contents [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • badie.kambiz A Horizon for Sentiment Analysis in Social Networks based on Interpreting Contents [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Baradaran.Sepideh A Review on Hadith Text Processing Tasks [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Baradaran.Sepideh A Review on Hadith Text Processing Tasks [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]

C

  • Cheraghali.Mohammad Hasan Identifying and Ranking Factors Affecting the Digital Transformation Strategy in Iran's Road Freight Transportation Industry Focusing on the Internet of Things and Data Analytics [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Cheraghali.Mohammad Hasan Identifying and ranking factors affecting the digital transformation strategy in Iran's road freight transportation industry focusing on the Internet of Things and data analytics [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]

D

  • dashti.seyed ebrahim Improving Resource Allocation in Mobile Edge Computing Using Particle Swarm and Gray Wolf Optimization Algorithms [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • dashti.seyed ebrahim Improving resource allocation in mobile edge computing using gray wolf and particle swarm optimization algorithms [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]

E

  • Eftekhari.Seyed Ahmad Intrusion Detection Based on Cooperation on the Permissioned Blockchain Platform in the Internet of Things Using Machine Learning [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Eftekhari.Seyed Ahmad Intrusion Detection Based on Cooperation on the Permissioned Blockchain Platform in the Internet of Things Using Machine Learning [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Ehteshami.Mehran Identifying and Ranking Factors Affecting the Digital Transformation Strategy in Iran's Road Freight Transportation Industry Focusing on the Internet of Things and Data Analytics [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Ehteshami.Mehran Identifying and ranking factors affecting the digital transformation strategy in Iran's road freight transportation industry focusing on the Internet of Things and data analytics [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Esnaashari.MohammadMahdi Community-Based Multi-Criteria Placement of Applications in the Fog Environment [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Esnaashari.MohammadMahdi Priority based Deployment of IoT Applications in Fog [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]

F

  • Farhoodi.Mojgan Persian Stance Detection Based On Multi-Classifier Fusion [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]

G

  • ghayori.majid Intrusion Detection Based on Cooperation on the Permissioned Blockchain Platform in the Internet of Things Using Machine Learning [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • ghayori.majid Intrusion Detection Based on Cooperation on the Permissioned Blockchain Platform in the Internet of Things Using Machine Learning [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Gilanian Sadeghi.Mohammad Mehdi Community Detection in Bipartite Networks Using HellRank Centrality Measure [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Gilanian Sadeghi.Mohammad Mehdi Community Detection in Bipartite Networks Using HellRank Centrality Measure [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]

H

  • hashemi G..S. Alireza Generalizing The Concept of Business Processes Structural Soundness from Classic Petri-nets to BPMN2.0 Process Models [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • hashemi G..S. Alireza Generalizing The Concept of Business Processes Structural Soundness from Classic Petri-nets to BPMN2.0 Process Models [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Hossayni.Sayyed Ali A Review on Hadith Text Processing Tasks [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Hossayni.Sayyed Ali A Review on Hadith Text Processing Tasks [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]

J

  • Jafarali Jassbi.Somayyeh Community-Based Multi-Criteria Placement of Applications in the Fog Environment [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Jafarali Jassbi.Somayyeh Priority based Deployment of IoT Applications in Fog [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]

K

  • Kalantari.Reza A Survey on Computer Security Patterns and Proposing a New Perspective [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Kalantari.Reza computer security models and proposing a new perspective: A review paper [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Keramati.Mohammad Ali Anomaly and Intrusion Detection Through Data Mining and Feature Selection using PSO Algorithm [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Keramati.Mohammad Ali Anomaly and Intrusion Detection through Datamining and Feature Selection using PSO Algorithm [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Keyhanipour.Amir Hosein Survey on the Applications of the Graph Theory in the Information Retrieval [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Keyhanipour.Amir Hosein Survey on the Applications of the Graph Theory in the Information Retrieval [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Khansari.Mohammad Explanation of Standardization Role in the Proposed Solutions for Privacy Protection in Health Data [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Khansari.Mohammad Explanation the role of standardization in the proposed solutions for privacy protection in health data [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Khosrozadeh.Ali Community Detection in Bipartite Networks Using HellRank Centrality Measure [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Khosrozadeh.Ali Community Detection in Bipartite Networks Using HellRank Centrality Measure [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]

M

  • Mafi.Zohreh Regression Test Time Reduction in Test Driven Development [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Mafi.Zohreh Test case Selection based on Test-Driven Development [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Mahyar.Hamidreza Community Detection in Bipartite Networks Using HellRank Centrality Measure [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Mahyar.Hamidreza Community Detection in Bipartite Networks Using HellRank Centrality Measure [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • maleki.davood Providing a New Solution in Selecting Suitable Databases for Storing Big Data in the National Information Network [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • maleki.davood Presenting a novel solution to choose a proper database for storing big data in national network services [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Manavi Mofrad.Hosna Multi-Level Ternary Quantization for Improving Sparsity and Computation in Embedded Deep Neural Networks [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Manavi Mofrad.Hosna Multi-level ternary quantization for improving sparsity and computation in embedded deep neural networks [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Mehrabani.Ghorbanali Identifying the Key Drivers of Digital Signature Implementation in Iran (Using Fuzzy Delphi Method) [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Mehrabani.Ghorbanali Identifying the Key Drivers of Digital Signature Implementation in Iran (using fuzzy Delphi method) [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • mehraeen.mohammad Explanation of Standardization Role in the Proposed Solutions for Privacy Protection in Health Data [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • mehraeen.mohammad Explanation the role of standardization in the proposed solutions for privacy protection in health data [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • mehrshad.batool Explanation of Standardization Role in the Proposed Solutions for Privacy Protection in Health Data [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • mehrshad.batool Explanation the role of standardization in the proposed solutions for privacy protection in health data [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Memarzadeh.Gholamreza Presenting the ICT Policies Implementation Model of the 6th Development Using the Neural Network Method [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Memarzadeh.Gholamreza Presenting the ICT Policies Implementation Model of the 6th Development Using the Neural Network Method [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Minaei.Behrooz A Review on Hadith Text Processing Tasks [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Minaei.Behrooz A Review on Hadith Text Processing Tasks [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • mirian.mirian Regression Test Time Reduction in Test Driven Development [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • mirian.mirian Test case Selection based on Test-Driven Development [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Moeini.Ali Survey on the Applications of the Graph Theory in the Information Retrieval [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Moeini.Ali Survey on the Applications of the Graph Theory in the Information Retrieval [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Mohammadi.Nazila Presenting the ICT Policies Implementation Model of the 6th Development Using the Neural Network Method [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Mohammadi.Nazila Presenting the ICT Policies Implementation Model of the 6th Development Using the Neural Network Method [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • mortazavi.saeed Explanation of Standardization Role in the Proposed Solutions for Privacy Protection in Health Data [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • mortazavi.saeed Explanation the role of standardization in the proposed solutions for privacy protection in health data [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • movaghar.movaghar Community Detection in Bipartite Networks Using HellRank Centrality Measure [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • movaghar.movaghar Community Detection in Bipartite Networks Using HellRank Centrality Measure [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]

N

  • Naderi.Shaghayegh Application Identification Through Intelligent Traffic Classification [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Naderi.Shaghayegh Application identification through intelligent traffic classification [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]

P

  • Piroozmand.Maryam Survey on the Applications of the Graph Theory in the Information Retrieval [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Piroozmand.Maryam Survey on the Applications of the Graph Theory in the Information Retrieval [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Poursoltani.Yahya Generalizing The Concept of Business Processes Structural Soundness from Classic Petri-nets to BPMN2.0 Process Models [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Poursoltani.Yahya Generalizing The Concept of Business Processes Structural Soundness from Classic Petri-nets to BPMN2.0 Process Models [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]

R

  • Rezaee.Ali Community-Based Multi-Criteria Placement of Applications in the Fog Environment [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Rezaee.Ali Priority based Deployment of IoT Applications in Fog [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Rezaei.Fereidoon Anomaly and Intrusion Detection Through Data Mining and Feature Selection using PSO Algorithm [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Rezaei.Fereidoon Anomaly and Intrusion Detection through Datamining and Feature Selection using PSO Algorithm [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]

S

  • sadjadi.Hadi A Survey on Computer Security Patterns and Proposing a New Perspective [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • sadjadi.Hadi computer security models and proposing a new perspective: A review paper [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Salehi.Mostafa Multi-Level Ternary Quantization for Improving Sparsity and Computation in Embedded Deep Neural Networks [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Salehi.Mostafa Multi-level ternary quantization for improving sparsity and computation in embedded deep neural networks [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • shabooei.saeid Improving Resource Allocation in Mobile Edge Computing Using Particle Swarm and Gray Wolf Optimization Algorithms [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • shabooei.saeid Improving resource allocation in mobile edge computing using gray wolf and particle swarm optimization algorithms [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • shayegan.Mohammad Javad A Recommender System Based on the Analysis of Personality Traits in Telegram Social Network [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Shenassa.Mohammad Ebrahim A Review on Hadith Text Processing Tasks [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Shenassa.Mohammad Ebrahim A Review on Hadith Text Processing Tasks [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Shirali-Shahreza.Mohammad Hassan Generalizing The Concept of Business Processes Structural Soundness from Classic Petri-nets to BPMN2.0 Process Models [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Shirali-Shahreza.Mohammad Hassan Generalizing The Concept of Business Processes Structural Soundness from Classic Petri-nets to BPMN2.0 Process Models [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]

T

  • Tabrizian.Bita Identifying and Ranking Factors Affecting the Digital Transformation Strategy in Iran's Road Freight Transportation Industry Focusing on the Internet of Things and Data Analytics [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Tabrizian.Bita Identifying and ranking factors affecting the digital transformation strategy in Iran's road freight transportation industry focusing on the Internet of Things and data analytics [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Tayfeh-Mahmoudi.Maryam A Framework for Sentiment Analysis in Social Networks based on Interpreting Contents [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Tayfeh-Mahmoudi.Maryam A Horizon for Sentiment Analysis in Social Networks based on Interpreting Contents [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Teimourian sefidehkhan.Maryam Identifying and Ranking Factors Affecting the Digital Transformation Strategy in Iran's Road Freight Transportation Industry Focusing on the Internet of Things and Data Analytics [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Teimourian sefidehkhan.Maryam Identifying and ranking factors affecting the digital transformation strategy in Iran's road freight transportation industry focusing on the Internet of Things and data analytics [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Toloie Eshlaghy.Abbas Persian Stance Detection Based On Multi-Classifier Fusion [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • tootian.sedigheh Presenting the ICT Policies Implementation Model of the 6th Development Using the Neural Network Method [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • tootian.sedigheh Presenting the ICT Policies Implementation Model of the 6th Development Using the Neural Network Method [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]

V

  • valizadeh.mohadeseh A Recommender System Based on the Analysis of Personality Traits in Telegram Social Network [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]

Y

  • Yadegari.َAmirmansour A Framework for Sentiment Analysis in Social Networks based on Interpreting Contents [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Yadegari.َAmirmansour A Horizon for Sentiment Analysis in Social Networks based on Interpreting Contents [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]

Z

  • Zargaran khouzani.Fatemeh Identifying the Key Drivers of Digital Signature Implementation in Iran (Using Fuzzy Delphi Method) [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]
  • Zargaran khouzani.Fatemeh Identifying the Key Drivers of Digital Signature Implementation in Iran (using fuzzy Delphi method) [ Vol.16, Issue 59 , 60 - Spring - Summer Year 1403]