List of articles (by subject) ICT
-
Open Access Article
1 - An Information Architecture Framework for Utilizing Social Networks in Iranian Higher Education System
mehrab ali golshani rosta مهرابعلی گلشنیروستا -
Open Access Article
2 - The Impact of IQ Imbalance on the BER of Adaptive Modulation in the MIMO System
Hooman Tahayori abbas mohammadi abdolali abdipour -
Open Access Article
3 - Design and implementation of a fuzzy expert system for suspicious behavior detection in e-banking system
leila saroukhani gholamali montazer -
Open Access Article
4 - A new reinforcement learning based multi-agent method for traffic shaping and buffer allocation in routers
Hooman Tahayori -
Open Access Article
5 - Evaluation of SIP signaling implementation using QoS parameters
mojtaba jahanbakhsh azharivs azharivs maryam homayooni Ahmad akbari -
Open Access Article
6 - COBIT A Suitable Framework for Measuring IT Governance in Organizations
mojtaba safari mehdi ghazanfari Mohammad Fathian -
Open Access Article
7 - Cross-layer Design for Congestion Control, Routing and Scheduling in Ad-hoc Wireless Networks with considering the Electrical Power of nodes
Hooman Tahayori -
Open Access Article
8 - Window-Shopping as an Effective Element to Improve Viral Marketing
shahriyar mohammadi keyvan karimi -
Open Access Article
9 - Comprehensive Interactive Maturity Model for Mobile government
fateme saghafi Mahdi Fasanghari -
Open Access Article
10 - Design of Secure Communication System by Use of Synchronization of Chaotic Systems
Mohammad nikkhoo masoud shafiee koorosh kiani -
Open Access Article
11 - Personalized E-learning Environment Using Fuzzy Recommender System base on Combination of Learning Style and Cognitive Trait
nafise saberi -
Open Access Article
12 - Performance Improvement of Automatic Language Identification Using GMM-SVM Method
fahime ghasemian homayoun homayoun -
Open Access Article
13 - Designing a Fuzzy Expert System for Selecting an Appropriate Contractor in Information Technology Outsourcing
shaban elahi nadia kalantari alireza hassanzade sara shamsollahi -
Open Access Article
14 - Adaptive Probabilistic Flooding for Ad Hoc Networks
fateme nourazar sabaei sabaei -
Open Access Article
15 - Blind Correction of Lens Aberration Using Modified Zernike Moments
kambiz rahbar karim faez -
Open Access Article
16 - Training MLP Neural Network in Images Compression by GSA Method
maryam dehbashian hamid zahiri -
Open Access Article
17 - DWT-SVD based Semi-Blind Digital Image Watermarking
danyali danyali fardin akhlaghi morteza makhlooghi -
Open Access Article
18 - Sliding Mode Controller for TCP Congestion Control
roohollah barzamini masoud shafiee -
Open Access Article
19 - A Managerial Examination of the Successful Parameters in the B2C Business
shila mosammami mahmood moradi Asadollah Shahbahrami -
Open Access Article
20 - Analysis of the current situation ICT in rural areas of the country (using the Delphi Method)
mohsen heidary -
Open Access Article
21 - A Novel Model for detecting intrusion with Mobile Agent and Game theory
Amin Nezarat mehdi raja Gholamhossein Dastghaibyfard -
Open Access Article
22 - A proper method for the advertising email classification based on user’s profiles
rahim hazratgholizadeh Mohammad Fathian -
Open Access Article
23 - Optimized Modeling for satisfaction in the relationship between a physician and patient based on machine learnin methods
Fatemeh Saghafi mojtaba shadmehr Zainabolhoda Heshmati Hadi Veisi -
Open Access Article
24 - Improvement of mean shift tracker for tracking of target with variable photometric pattern
Payman Moallem javad abbaspour alireza memarmoghada masoud kavoshtehrani -
Open Access Article
25 - Multimedia teaching and its effects on learning and retention of English grammar
Somayeh Ahari -
Open Access Article
26 - Extracting the Information Technology architecture of hospitals with approach of Implementing in Iran
Atefehsadat Haghighathoseini atefe haghighathosseini hossein bobarshad hadi zare -
Open Access Article
27 - using clustering in AODV routing protocol for vehicular ad-hoc networks on highway scenario
amin feyzi -
Open Access Article
28 - Design a Model Of System Dynamics (SD) On The Policy Of Upgrading Indices Of Iran ICT Network
hamid honarparvaran -
Open Access Article
29 - The Ranking Lack of Success Factors of Electronic Commerce in Technical Infrastructure in Tile and Ceramic Factories in Meybod County
edehghani edehghani -
Open Access Article
30 - Multicast computer network routing using genetic algorithm and ant colony
Mohammad Pourmahmood Aghababa -
Open Access Article
31 - Investigating the Effects of Hardware Parameters on Power Consumptions in SPMV Algorithms on Graphics Processing Units (GPUs)
Farshad Khunjush -
Open Access Article
32 - Improving the directivity of the plasmonic sectoral horn nanoantenna using lens in its aperture
Masumeh Sharifi Najmeh Nozhat Ehsan Zareian-Jahromi -
Open Access Article
33 - Improvement of the bulk sensitivity and FoM of the plasmonic nanodipole antenna array
Samira Amiri Najmeh Nozhat -
Open Access Article
34 - A design of Rectangular Waveguide TM11 to TE10 Mode Converter for S-band Applications
Hamed noroozy Hossein Chabok Samane Pakniyat -
Open Access Article
35 - Presenting a novel solution to choose a proper database for storing big data in national network services
Mohammad Reza Ahmadi davood maleki ehsan arianyan -
Open Access Article
36 - Dynamic Load Balancing Improvement in Software-Defined Networks Using Fuzzy Multi-Objective Programming Algorithms
Mohammadreza Forghani Mohammadreza Soltanaghaei koupaei Farsad Zamani Boroujeni -
Open Access Article
37 - computer security models and proposing a new perspective: A review paper
Hadi sadjadi Reza Kalantari -
Open Access Article
38 - Improving resource allocation in mobile edge computing using gray wolf and particle swarm optimization algorithms
seyed ebrahim dashti saeid shabooei -
Open Access Article
39 - Identifying and ranking factors affecting the digital transformation strategy in Iran's road freight transportation industry focusing on the Internet of Things and data analytics
Mehran Ehteshami Mohammad Hasan Cheraghali Bita Tabrizian Maryam Teimourian sefidehkhan -
Open Access Article
40 - Priority based Deployment of IoT Applications in Fog
Masomeh Azimzadeh Ali Rezaee Somayyeh Jafarali Jassbi MohammadMahdi Esnaashari -
Open Access Article
41 - Persian Stance Detection Based On Multi-Classifier Fusion
Mojgan Farhoodi Abbas Toloie Eshlaghy -
Open Access Article
42 - Anomaly and Intrusion Detection through Datamining and Feature Selection using PSO Algorithm
Fereidoon Rezaei Mohamad Ali Afshar Kazemi Mohammad Ali Keramati -
Open Access Article
43 - Generalizing The Concept of Business Processes Structural Soundness from Classic Petri-nets to BPMN2.0 Process Models
Yahya Poursoltani Mohammad Hassan Shirali-Shahreza S. Alireza Hashemi Golpayegani -
Open Access Article
44 - A Novel Multi-Step Ahead Demand Forecasting Model Based on Deep Learning Techniques and Time Series Augmentation
Hossein Abbasimehr Reza Paki -
Open Access Article
45 - Improving polarity identification in sentiment analysis using sarcasm detection and machine learning algorithms in Persian tweets
Shaghayegh hajiabdollah Mitra Mirzarezaee Mir Mohsen Pedram -
Open Access Article
46 - Modeling and evaluation of RPL routing protocol by colored Petri nets
Mohammad Pishdar Younes Seifi -
Open Access Article
47 - The Effect of ICT Development on Economic and Political Risk: A Cross Country Study
َAmir Hossein Mozayani Sajjad Faraji Dizaji Hossein Karimi -
Open Access Article
48 - Increasing Total Throughput, Reducing Outage to Zero, and Reducing Power Consumption in a Cellular Network
Mohsen Seyyedi Saravi Mohammadreza Binesh Marvasti Seyedeh Leili Mirtaheri Seyyed Amir Asghari -
Open Access Article
49 - Synthesizing an image dataset for text detection and recognition in images
Fatemeh Alimoradi Farzaneh Rahmani Leila Rabiei Mohammad Khansari Mojtaba Mazoochi -
Open Access Article
50 - An Intelligent Pricing System for Cloud Services aims at Increasing Implementation Simplicity and Flexibility
Mahboubeh Zandieh Sepideh Adabi Samaneh Yazdani -
Open Access Article
51 - E-Government Service Supply Chain: Identifying Performance Evaluation Indicators (Case Study of e-Customs System in Iran)
jalal zare Rosa Hendijani -
Open Access Article
52 - Three Dimensional Beamforming in Multi User Multi Antenna Cellular Networks with Randomly Distributed Users
S. Mohammad Razavizadeh Nasim Mohammadi -
Open Access Article
53 - Stock market prediction using optimized grasshopper optimization algorithm and time series algorithms
Vahid Safari dehnavi masoud shafiee -
Open Access Article
54 - Power Efficient allocation in C-RAN with Multi access technology selection approach
ALI ASGHAR ANSARI Mohsen Eslami Mohammad Javad Dehghani Saeideh Parsaei Fard -
Open Access Article
55 - Design and fabrication of the E-field probe for the measurement of the electromagnetic fields in 5G frequency band
Reza Bahri Mahdi Fasanghari Ahmadreza Eskandari Vahid Yazdanian -
Open Access Article
56 - A review of the application of meta-heuristic algorithms in load balancing in cloud computing
Mehdi Morsali Abolfazl Toroghi Haghighat Sasan Hosseinali-Zade -
Open Access Article
57 - An approach to prioritize quality dimensions of based on cloud computing using Multiple Criteria Decision Making method
Zahra Abbasi Somayeh Fatahi Mohammad Javad Ershadi -
Open Access Article
58 - Data-driven Marketing in Digital Businesses from Dynamic Capabilities View
Maede Amini vlashani ayoub mohamadian Seyed Mohammadbagher Jafari -
Open Access Article
59 - A comprehensive survey on the influence maximization problem in social networks
mohsen taherinia mahdi Esmaeili Behrooz Minaei -
Open Access Article
60 - Presenting the ICT Policies Implementation Model of the 6th Development Using the Neural Network Method
Nazila Mohammadi Gholamreza Memarzadeh Tehran Sedigheh Tootian Isfahani -
Open Access Article
61 - Community Detection in Bipartite Networks Using HellRank Centrality Measure
Ali Khosrozadeh Ali Movaghar Mohammad Mehdi Gilanian Sadeghi Hamidreza Mahyar -
Open Access Article
62 - Test case Selection based on Test-Driven Development
Zohreh Mafi mirian mirian -
Open Access Article
63 - Presenting a Method for Agile Enterprise Architecture Modeling
Ali Razi Reza Rezaei Ahmad Ali Yazdanpanah -
Open Access Article
64 - An Overview on Replica Consistency Methods in Distributed Systems and Future Works
Mahsa Beigrezaei -
Open Access Article
65 - Application identification through intelligent traffic classification
Shaghayegh Naderi -
Open Access Article
66 - The Relevance, Importance and Dependence of Critical Infrastructures of The Islamic Republic of Iran from a Cyber-Perspective
Abouzar Solat Rafiee Hossein Gharaee Garakani Fatemeh Saghafi Mohammad Malekinia -
Open Access Article
67 - Providing a Blockchain-Based Method to Protect Users’ Privacy in Social Networks
Ibrahim Zamani Babgohari Monireh Hosseini -
Open Access Article
68 - Improving Opinion Aspect Extraction Using Domain Knowledge and Term Graph
Mohammadreza Shams Ahmad Baraani Mahdi Hashemi -
Open Access Article
69 - Emerging technologies in future generations of high performance computing: introduction, taxonomy and future research directions
mahmood nematollahzadeh ehsan arianyan Masoud Hayeri Khyavi niloofar gholipoor abdollah sepahvand -
Open Access Article
70 - Valuation of digital services in Iran: Empirical proof for Google and Instagram
FARHAD ASGHARI ESTIAR AMIR MOHAMMADZADEH Ebrahim Abbasi -
Open Access Article
71 - A novel metaheuristic algorithm and its discrete form for influence maximizing in complex networks
Vahideh Sahargahi Vahid Majidnezhad Saeed Taghavi Afshord Bagher Jafari -
Open Access Article
72 - Fuzzy Multicore Clustering of Big Data in the Hadoop Map Reduce Framework
Seyed Omid Azarkasb Seyed Hossein Khasteh Mostafa Amiri -
Open Access Article
73 - Information Technology, Strategy Implementation, Information Systems, Strategic Planning, Input-Process-Outcome Framework
Mona Jami Pour Shahnaz Akbari Emami Safora Firozeh -
Open Access Article
74 - Automatic Lung Diseases Identification using Discrete Cosine Transform-based Features in Radiography Images
Shamim Yousefi Samad Najjar-Ghabel -
Open Access Article
75 - The main components of evaluating the credibility of users according to organizational goals in the life cycle of big data
Sogand Dehghan shahriyar mohammadi rojiar pirmohamadiani -
Open Access Article
76 - Predicting the workload of virtual machines in order to reduce energy consumption in cloud data centers using the combination of deep learning models
Zeinab Khodaverdian Hossein Sadr Mojdeh Nazari Soleimandarabi Seyed Ahmad Edalatpanah -
Open Access Article
77 - The effect of Internet of Things (IOT) implementation on the Rail Freight Industry; A futures study approach
Noureddin Taraz Monfared علی شایان ali rajabzadeh ghotri -
Open Access Article
78 - Design of Distributed Consensus Controller for Leader-Follower Singular Multi-Agent Systems in the Presence of Sensor Fault
Saeid Poormirzaee Hamidreza Ahmadzadeh masoud Shafiee -
Open Access Article
79 - Indigenous model of commercialization of complex technologies based on partnership in the ICT sector
Mahdi Fardinia Fatemeh saghafi Jalal Haghighat Monfared -
Open Access Article
80 - Improving energy consumption in the Internet of Things using the Krill Herd optimization algorithm and mobile sink
Shayesteh Tabatabaei -
Open Access Article
81 - Liquidity Risk Prediction Using News Sentiment Analysis
hamed mirashk albadvi albadvi mehrdad kargari Mohammad Ali Rastegar Mohammad Talebi -
Open Access Article
82 - Identify and analyze decision points and key players in procurement process in the EPC companies
Seyedeh Motahareh Hosseini Mohammad aghdasim -
Open Access Article
83 - Fake Websites Detection Improvement Using Multi-Layer Artificial Neural Network Classifier with Ant Lion Optimizer Algorithm
Farhang Padidaran Moghaddam Mahshid Sadeghi B. -
Open Access Article
84 - Extracting Innovation Strategies and Requirements for Telecommunication Companies: Case Study of Telecommunications Infrastructure Company
Alireza Esmaeeli Alireza Asgharian Takavash Bahreini Nasrin Dastranj Mahshid Ghaffarzadegan Kolsoum Abbasi-Shahkooh Mandana Farzaneh Homeyra Moghadami -
Open Access Article
85 - Using limited memory to store the most recent action in XCS learning classifier systems in maze problems
Ali Yousefi kambiz badie mohamad mehdi ebadzade Arash Sharifi -
Open Access Article
86 - Design and implementation of a survival model for patients with melanoma based on data mining algorithms
farinaz sanaei Seyed Abdollah Amin Mousavi Abbas Toloie Eshlaghy ali rajabzadeh ghotri -
Open Access Article
87 - An Intrusion Detection System based on Deep Learning for CAN Bus
Fatemeh Asghariyan Mohsen Raji -
Open Access Article
88 - The framework of the national macro plan for transparency and information release based on the grounded theory method
Mahdi Azizi MehmanDoost Mohammad Reza Hosseini reza taghipour Mojtaba Mazoochi -
Open Access Article
89 - Drivers, Obstacles and consequences of digital entrepreneurship in Iran's road freight transportation industry
Azam sadtat Mortazavi kahangi Parviz Saketi Javad Mehrabi -
Open Access Article
90 - WSTMOS: A Method For Optimizing Throughput, Energy, And Latency In Cloud Workflow Scheduling
Arash Ghorbannia Delavar Reza Akraminejad sahar mozafari -
Open Access Article
91 - Presenting a web recommender system for user nose pages using DBSCAN clustering algorithm and machine learning SVM method.
reza molaee fard Mohammad mosleh -
Open Access Article
92 - Face recognition and Liveness Detection Based on Speech Recognition for Electronical Authentication
Ahmad dolatkhah Behnam Dorostkar Yaghouti raheb hashempour -
Open Access Article
93 - Estimating the Value of Digital Economy Core Spillover in Iran
Niloufar Moradhassel Bita Mohebikhah -
Open Access Article
94 - Applying deep learning for improving the results of sentiment analysis of Persian comments of Online retail stores
faezeh forootan Mohammad Rabiei -
Open Access Article
95 - Artefacts and Producers Mapping of Iran's Artificial Intelligence Ecosystem based on Transformational Levels
hamed ojaghi Iman Zohoorian Nadali Fatemeh Soleymani Roozbahani -
Open Access Article
96 - Noor Analysis: A Benchmark Dataset for Evaluating Morphological Analysis Engines
Huda Al-Shohayyeb Behrooz Minaei Mohammad Ebrahim Shenassa Sayyed Ali Hossayni -
Open Access Article
97 - Improvement of intrusion detection system on Industrial Internet of Things based on deep learning using metaheuristic algorithms
mohammadreza zeraatkarmoghaddam majid ghayori -
Open Access Article
98 - Improving the load balancing in Cloud computing using a rapid SFL algorithm (R-SFLA)
Kiomars Salimi Mahdi Mollamotalebi -
Open Access Article
99 - Evaluation of Interpolation Methods for Estimating the Fading Channels in Digital TV Broadcasting
Ali Pouladsadeh Mohammadali Sebghati -
Open Access Article
100 - A framework for architecture the electronic trust in e-commerce:online shopping segment
amir Mohtarami Akbar amini -
Open Access Article
101 - Improving IoT resource management using fog calculations and ant lion optimization algorithm
payam shams Seyedeh Leili Mirtaheri reza shahbazian ehsan arianyan -
Open Access Article
102 - The effect of emotional intelligence of project managers on the effectiveness of team communication in Iranian research institutes (Case study: Research Institute of Communication and Information Technology)
Mansoureh Mohammadnezhad Fadard Ehram Safari -
Open Access Article
103 - Energy procurement of a cellular base station in independent microgrids with electric vehicles and renewable energy sources: Mixed-integer nonlinear programming model
Reza Bahri saeed zeynali -
Open Access Article
104 - Trust Management Based on User Feedback in Cloud Computing Environment by Using Cuckoo Optimization Algorithm
Muqtada Soleimani Mobarake Golnaz Aghaee Babak Nikmard -
Open Access Article
105 - Improving Code Coverage Metrics for Discovering Vulnerabilities in Stateful Network Protocols using Hybrid Fuzzing
Hamid Rezaei Rahvard Mehdi Salkhordeh Haghighi -
Open Access Article
106 - Energy Efficient Target (Rhynchophorus Ferrugineus) Tracking in Wireless Sensor Network Using the Cat Swarm Optimization Algorithm and Fuzzy Logic
Shayesteh Tabatabaei -
Open Access Article
107 - BIG DATA
Behshid Behkamal -
Open Access Article
108 - Investigating an Approach to Identify and Classify Mutants Based on the Characteristics of Mutants with Machine Learning Algorithms
Zeinab Asghari Bahman Arasteh Abbas Koochari -
Open Access Article
109 - The Local Strategic Model of Smart Police of The Islamic Republic of Iran
Ahmad Dolatkhah Mohammad Reza Movahedi Sefat Mehrab Ramak -
Open Access Article
110 - Providing an Intrusion Detection System in the Industrial Internet of Things Using the Gray Wolf Algorithm
Sajad Alimohamadi Mohammad Fathi -
Open Access Article
111 - Provide A Lightweight Encryption Solution To secure Data In The Internet Of Things
wahab aminiazar rasoul farahi fattameh dashti -
Open Access Article
112 - Providing a New Solution in Selecting Suitable Databases for Storing Big Data in the National Information Network
Mohammad Reza Ahmadi davood maleki ehsan arianyan -
Open Access Article
113 - Community-Based Multi-Criteria Placement of Applications in the Fog Environment
Masomeh Azimzadeh Ali Rezaee Somayyeh Jafarali Jassbi MohammadMahdi Esnaashari -
Open Access Article
114 - Identifying and Ranking Factors Affecting the Digital Transformation Strategy in Iran's Road Freight Transportation Industry Focusing on the Internet of Things and Data Analytics
Mehran Ehteshami Mohammad Hasan Cheraghali Bita Tabrizian Maryam Teimourian sefidehkhan -
Open Access Article
115 - A Framework for Sentiment Analysis in Social Networks based on Interpreting Contents
Maryam Tayfeh-Mahmoudi َAmirmansour Yadegari Parvin Ahmadi kambiz badie -
Open Access Article
116 - Anomaly and Intrusion Detection Through Data Mining and Feature Selection using PSO Algorithm
Fereidoon Rezaei Mohamad Ali Afshar Kazemi Mohammad Ali Keramati -
Open Access Article
117 - Intrusion Detection Based on Cooperation on the Permissioned Blockchain Platform in the Internet of Things Using Machine Learning
Mohammad Mahdi Abdian majid ghayori Seyed Ahmad Eftekhari -
Open Access Article
118 - Improving Resource Allocation in Mobile Edge Computing Using Particle Swarm and Gray Wolf Optimization Algorithms
seyed ebrahim dashti saeid shabooei -
Open Access Article
119 - A Survey on Computer Security Patterns and Proposing a New Perspective
Hadi sadjadi Reza Kalantari -
Open Access Article
120 - Identifying the Key Drivers of Digital Signature Implementation in Iran (Using Fuzzy Delphi Method)
Ghorbanali Mehrabani Fatemeh Zargaran khouzani -
Open Access Article
121 - Community Detection in Bipartite Networks Using HellRank Centrality Measure
Ali Khosrozadeh movaghar movaghar Mohammad Mehdi Gilanian Sadeghi Hamidreza Mahyar -
Open Access Article
122 - Generalizing The Concept of Business Processes Structural Soundness from Classic Petri-nets to BPMN2.0 Process Models
Yahya Poursoltani Mohammad Hassan Shirali-Shahreza S. Alireza hashemi G. -
Open Access Article
123 - Presenting the ICT Policies Implementation Model of the 6th Development Using the Neural Network Method
Nazila Mohammadi Gholamreza Memarzadeh sedigheh tootian -
Open Access Article
124 - Regression Test Time Reduction in Test Driven Development
Zohreh Mafi mirian mirian -
Open Access Article
125 - Survey on the Applications of the Graph Theory in the Information Retrieval
Maryam Piroozmand Amir Hosein Keyhanipour Ali Moeini -
Open Access Article
126 - Application Identification Through Intelligent Traffic Classification
Shaghayegh Naderi