List of articles (by subject) General
-
Open Access Article
1 - Cyber Threats Foresight Against Iran Based on Attack Vector
mahdi omrani masoud shafiee siavash khorsandi -
Open Access Article
2 - The Participation of Three Brain Tissues in Alzheimer’s disease Diagnosis from Structural MRI
Shima Tajeddini Habibollah Danyali Mohammad Sadegh Helfroush Yaghoub Fatemi -
Open Access Article
3 - Parametric analysis of a broadband Archimedean spiral antenna with cavity
Hamed noroozy Shahrokh jam -
Open Access Article
4 - Performance Analysis of Device to Device Communications Overlaying/Underlaying Cellular Network
Hossein Ghavami Shahriar Shirvani Moghaddam -
Open Access Article
5 - Modified orthogonal chaotic colonial competition algorithm and its application in improving pattern recognition in multilayer perceptron neural network
Payman Moallem mehrdad sadeghi hariri MAHDI hashemi -
Open Access Article
6 - Adaptive rotation models and traffic patterns to reduce light loss in networks on optical chip
bahareh asadi midia reshadi Ahmad khademzade mostafa karbasi -
Open Access Article
7 - Provide a framework for enhancing the security of IoT-based smart homes using the IoT-A reference architecture
Sattar Hashemi shahrouz sotoudeh -
Open Access Article
8 - Persian digit recognition system in aerial writing based on depth image
reza maleki Shahram Mohammadi -
Open Access Article
9 - Identification and Prioritization of Parameters Affecting Information Security Management System (Case Study: Social Security Branches of Guilan Province)
Asadollah Shahbahrami ramin rafizadeh kasani hossein pour yousefi dargah -
Open Access Article
10 - Discover product defect reports from the text of users' online comments
narges nematifard Muharram Mansoorizadeh mahdi sakhaei nia -
Open Access Article
11 - Determining the factors affecting the collective financing of knowledge-based IT companies
Ali Haji Gholam Saryazdi ali rajabzadeh ghotri alinaghi mashayekhi alireza hassanzade -
Open Access Article
12 - Provide methodology for selecting IT project management strategy
mona jamipour Seyed Mohammadbagher Jafari marziye nasrollahi -
Open Access Article
13 - طراحی پردازنده مبتنی بر FPGA برای الگوریتمهای رمزنگاری سری SHA-2
neda sedghahrabi Mohammad Ali Jabraeil Jamali -
Open Access Article
14 - Learning to Rank for the Persian Web Using the Layered Genetic Programming
Amir Hosein Keyhanipour -
Open Access Article
15 - Scheduling tasks in cloud environments using mapping framework - reduction and genetic algorithm
nima khezr nima jafari novimipour -
Open Access Article
16 - A greedy new method based on the cascade model to calculate maximizing penetration in social networks
Asgarali Bouyer Hamid Ahmadi -
Open Access Article
17 - Content and structural analysis of online forums in order to extract users' social relationships and use them in grouping mechanisms.
Fatemeh Orojie fataneh taghiyareh -
Open Access Article
18 - Teaching in a multimedia style and its effect on learning and memorizing the grammatical structure of the English language
saied asadi elham GHobadi -
Open Access Article
19 - Evaluation of e-learning with optimal mining approach 1 case study: Iran's higher education
abbas anarinejad aliakbar safavi farshad moradi -
Open Access Article
20 - Improving the entrepreneurial skills of Hastan-nagar capital by using the entrepreneurship training portal
Maryam Tayfeh-Mahmoudi Mahtab Payvast Mahdi Mohsenie Mahmod Kharate sima babadi -
Open Access Article
21 - Presenting a model for extracting information from text documents, based on text-mining in the field of e-learning
AhmadAgha kardan Mina Kaihani nejad -
Open Access Article
22 - Modification of medium transfer detector for target tracking with variable radiation pattern
Payman Moallem عليرضا معمارمقدم جواد عباس پور masoud kavoshtehrani -
Open Access Article
23 - Determining optimal support vector machines in classification of hyperspectral images based on genetic algorithm
farhad samadzadegan Hadis Hasani -
Open Access Article
24 - Segmentation of exterior color images for the purpose of object recognition using histogram with double accuracy
javad rasti amirhasan Monjimie abbas vafaei -
Open Access Article
25 - Reinforcement of the central axis of tubular structures and its application in extracting the central axis of the portal vein
amirhossein forouza reza aghaeizade یوشی¬نبو ساتو ماساتوشی هوری -
Open Access Article
26 - پردازش تصاویر ورق های فولادی به منظور آشکارسازی عیوب به کمک موجک گابور
Mostafa Sadeghie masoud shafiee -
Open Access Article
27 - Routing of Multipartite Computer Networks Using Ant Genetic Algorithm
Mohammad Pourmahmood Aghababa amin bahadorani baghbaderani -
Open Access Article
28 - Classify and implement hardware trojans and provide a new way to detect them
sadegh hajmohseni mohammadali doustari mohammadbagher ghaznavi -
Open Access Article
29 - A model for improving banking services using customer knowledge management and mobile banking and examining its impact on customer loyalty in Bank Mellat
narges rezaei Mohammad rezaei -
Open Access Article
30 - Improving recommender systems with the help of Semantic Web
rahele beheshti mohammad ebrahim samie ali hamze -
Open Access Article
31 - Provide a basic method for estimating software projects based on logical transactions
mehrdad shahsavari ali mahjour -
Open Access Article
32 - Provide a new architecture for the decision support system to manage stock trading based on a combination of financial indicators
Masoud Mansoury bijan mansouri S. Alireza hashemi G. -
Open Access Article
33 - Investigating the Effect of Hardware Parameters Adjustments on Energy Consumption in Thin Matrix Multiplication Algorithm on GPUs
mina ashouri Farshad Khunjush -
Open Access Article
34 - Provide a conceptual model to identify the quality of electronic services in the country's online stores
marziye rahmani Mohammad Fathian saied yaghoubi -
Open Access Article
35 - Door detection based on car vision in outdoor scenes
abbas vafaei Mehdi Talebi monadjemi monadjemi -
Open Access Article
36 - New changes of local binary pattern and classification and segmentation of texture images of the seabed
Babak Goodarzi Javidan Javidan Mohammad Javad Dehghani -
Open Access Article
37 - Providing a suitable method for categorizing promotional e-mails based on user profiles
Mohammad fathiyan rahim hazratgholizadeh -
Open Access Article
38 - Extracting hospital information technology architecture with the approach of implementation capability in Iran
hossein bobarshad Atefehsadat Haghighathoseini Hadi Zare -
Open Access Article
39 - Presenting a model for using mobile agents in distributed intrusion detection systems based on game theory
امین نظارات مهدی رجا Gholamhossein Dastghaibyfard -
Open Access Article
40 - ۹۳ / ۵٬۰۰۰ Integration of data envelopment analysis model and decision tree in order to evaluate units based on information technology
Amir Amini علی رضا علی نژاد سمیه شفقی¬زاده -
Open Access Article
41 - Understanding the initial trust of users in social networks
Mohsen Akbari zahedfar zahedfar zahra eiagh -
Open Access Article
42 - Optimum modeling of patient satisfaction with the doctor based on machine learning methods
- شادمهر Zainabolhoda Heshmati Fatemeh saghafi Hadi Veisi -
Open Access Article
43 - Providing a model for evaluating information technology services based on an approach based on information technology governance models
seyyed ahmad tabatabaei سید کمال چهارسوق -
Open Access Article
44 - Providing an optimal method for dispatching an ambulance based on complex networks and artificial intelligence
مهدی زرکش زاده Zainabolhoda Heshmati Hadi Zare Mehdi Teimouri -
Open Access Article
45 - Key management in digital rights management systems in offline mode
nafiseh shafiee مهدی شجری -
Open Access Article
46 - Improving the accuracy of the GMM model in the form of the GMM-VSM system in the application of speech language recognition
Fahimeh GHasemian Mohamad mahdi Homaion por -
Open Access Article
47 - A matching probability-based flood algorithm for mobile ad hoc networks
fateme nourazar sabaei sabaei -
Open Access Article
48 - Training of MLP neural network in image compression using GSA method
maryam dehbashian hamid zahiri -
Open Access Article
49 - Semi-blind labeling of images using SVD in the field of discrete wavelet transform
morteza makhlooghi danyali danyali fardin akhlaghi -
Open Access Article
50 - Sliding mode control for congestion in TCP/IP networks
roohollah barzamini masoud shafiee -
Open Access Article
51 - Classification of two-level data with hyperrectangles parallel to the coordinate axes
zahra moslehi palhang palhang -
Open Access Article
52 - Correcting both camera lens misalignment and image de-centering error using modified Zernik model
-
Open Access Article
53 - Using web analytics in forecasting the stock price of chemical products group in the stock exchange
amir daee Omid Mahdi Ebadati E. keyvan borna -
Open Access Article
54 - Routing improvement to control congestion in software defined networks by using distributed controllers
saied bakhtiyari Ardeshir Azarnejad -
Open Access Article
55 - Provide a model of human resource knowledge architecture in knowledge-based organizations using a mixed approach
abdollah saedi reza sepahvand najmoddin mosavi Mohammad hakkak -
Open Access Article
56 - بررسی تاثیر استفاده از انواع استراتژی¬های بازاریابی در شبکههای اجتماعی بر جلب اعتماد مشتریان شورایی
farzaneh milani jafari zenouzi -
Open Access Article
57 - Criteria for evaluating the effectiveness of social media users - a framework based on social media exploration
rojyar pirmohammadiani shahriyar mohammadi -
Open Access Article
58 - New Method to Improve Illumination Variations in Adult Images Based on Fuzzy Deep Neural Network
Sasan Karamizadeh abouzar arabsorkhi -
Open Access Article
59 - A model information technology adoption in academic research projects in the filed ICT based on Information Technology Adoption Integrated Modeling (ITAIM)
Shahram Aliyari masoud movahedi sirous kazemian -
Open Access Article
60 - Comparing A Hybridization of Fuzzy Inference System and Particle Swarm Optimization Algorithm with Deep Learning to Predict Stock Prices
Majid Abdolrazzagh-Nezhad mahdi kherad -
Open Access Article
61 - Introducing a genetic algorithm based Method for Community person's stance Detection in social media and news
mehdi salkhordeh haghighi Seyyed Mohammad ebrahimi -
Open Access Article
62 - context-aware travel recommender system exploiting from Geo-tagged photos
rezvan mohamadrezaei larki Reza Ravanmehr milad amrolahi -
Open Access Article
63 - Polar Diagram of Points with Moving Pole
Bahram Sadeghi Bigham fateme rabani -
Open Access Article
64 - An Improved Method Based on Label Propagation and Greedy Approaches for Community Detection in Dynamic Social Networks
Mohammad ستاری kamran zamanifar -
Open Access Article
65 - Assessing E-Government Readiness in Iranian Universities, Case Study: Tarbiat Modares University
Saeed Haydari gholamali montazer -
Open Access Article
66 - Increasing the value of collected data and reducing energy consumption by using network coding and mobile sinks in wireless sensor networks
ehsan kharati -
Open Access Article
67 - An Improved Method for Detecting Phishing Websites Using Data Mining on Web Pages
mahdiye baharloo Alireza Yari -
Open Access Article
68 - Using a multi-objective optimization algorithm for tasks allocate in the cloud-based systems to reduce energy consumption
sara tabaghchimilan nima jafari novimipour -
Open Access Article
69 - Incentive reward mechanism for Participants to the human computing system of Intrusion Detection Based on Game Theory
yahya lormohammad hasani esfandghe majid ghayori -
Open Access Article
70 - Fast and accurate concept drift detection from event logs
mahdi yaghoobi ali sebti Soheila Karbasi -
Open Access Article
71 - Textual analysis of central bank news in forecasting long-term trend of Tehran stock exchange index
meisam hashemi Mehran Rezaei marjan kaedi -
Open Access Article
72 - Improving performance of probe-based rate control mechanisms using classification: evaluation on an experimental testbed for High Throughput WLANs
ghalibaf ali Mohammad Nassiri mohammadhassan daei mahdi sakhaei -
Open Access Article
73 - The aware genetic algorithm of the best member, applied to graph coloring and metric-dimension of the graph problems
mahmood amintoosi Hashem Ezzati -
Open Access Article
74 - Converting protein sequence to image for classification with convolutional neural network
reza ahsan mansour ebrahimi dianat dianat -
Open Access Article
75 - Modeling and simulation of the central generator of the pattern to produce curved-linear motions in the snake robot
morteza vasegh yaghoub pourasad -
Open Access Article
76 - An access control model for online social networks using user-to-user relationships
Mohamad Javad Piran mahmud deypir -
Open Access Article
77 - The role of organizational factors on consumer buying behavior in social networks
zohreh dehdashti shahrokh Mitra Daneshparvar vahid nasehifar vahid Khashei -
Open Access Article
78 - A Novel Method based on the Cocomo model to increase the accuracy of software projects effort estimates
mahdieh salari vahid khatibi amid khatibi -
Open Access Article
79 - A Combination Method of DEA, DEMATEL and ANP for Evaluation of ERP Systems
amir amini alireza alinezhad -
Open Access Article
80 - Increasing the lifetime of underwater acoustic sensor networks by optimal relay node placement
zahra mihamadi mohadeseh soleimanpour daryush avasimoghaddam Siamak Talebi