About the journal
According to the letter No. 3/4817 dated 2007/9/02 of the Research Affairs Office of the Iranian Ministry of Science, Research and Technology and the statement of the vote of the Commission for the Review of Scientific Journals of the country on 2007/7/14, this journal has been awarded a scientific-research degree.
Journal of Information and Communication Technology (JICT) belongs to the "Iranian Information and Communication Technology Association" and is published with the collaboration of ICT Research Institute. The journal language is Farsi and it is an open-access bi-quarterly journal publishing high-quality scientific papers covering all aspects of the information and communication technologies including computer science and engineering, information technology, communication technology and information technology management. It is an interdisciplinary journal devoted to the publication of original articles, review articles, etc., considering the research ethics and academic rules and regulations.
All papers are subject to a blind reviewing process. The submitted manuscripts will be published after a thorough review and the editorial board's approval
-
Open Access Article
1 - Presenting a novel solution to choose a proper database for storing big data in national network services
Mohammad Reza Ahmadi davood maleki ehsan arianyanIssue 59 , Vol. 16 , Spring_Summer 2024 -
Open Access Article
2 - Priority based Deployment of IoT Applications in Fog
Masomeh Azimzadeh Ali Rezaee Somayyeh Jafarali Jassbi MohammadMahdi EsnaashariIssue 59 , Vol. 16 , Spring_Summer 2024 -
Open Access Article
3 - Identifying and ranking factors affecting the digital transformation strategy in Iran's road freight transportation industry focusing on the Internet of Things and data analytics
Mehran Ehteshami Mohammad Hasan Cheraghali Bita Tabrizian Maryam Teimourian sefidehkhanIssue 59 , Vol. 16 , Spring_Summer 2024 -
Open Access Article
4 - A Review on Hadith Text Processing Tasks
Sepideh Baradaran Behrooz Minaei Mohammad Ebrahim Shenassa Sayyed Ali HossayniIssue 59 , Vol. 16 , Spring_Summer 2024 -
Open Access Article
5 - A Horizon for Sentiment Analysis in Social Networks based on Interpreting Contents
Maryam Tayefeh Mahmoudi َAmirmansour Yadegari Parvin Ahmadi Kambiz BadieIssue 59 , Vol. 16 , Spring_Summer 2024 -
Open Access Article
6 - Anomaly and Intrusion Detection through Datamining and Feature Selection using PSO Algorithm
Fereidoon Rezaei Mohamad Ali Afshar Kazemi Mohammad Ali KeramatiIssue 59 , Vol. 16 , Spring_Summer 2024 -
Open Access Article
7 - Intrusion Detection Based on Cooperation on the Permissioned Blockchain Platform in the Internet of Things Using Machine Learning
Mohammad Mahdi Abdian majid ghayori Seyed Ahmad EftekhariIssue 59 , Vol. 16 , Spring_Summer 2024 -
Open Access Article
8 - Improving resource allocation in mobile edge computing using gray wolf and particle swarm optimization algorithms
seyed ebrahim dashti saeid shabooeiIssue 59 , Vol. 16 , Spring_Summer 2024 -
Open Access Article
9 - Multi-level ternary quantization for improving sparsity and computation in embedded deep neural networks
Hosna Manavi Mofrad Seyed Ali ansarmohammadi Mostafa SalehiIssue 59 , Vol. 16 , Spring_Summer 2024 -
Open Access Article
10 - computer security models and proposing a new perspective: A review paper
Hadi sadjadi Reza KalantariIssue 59 , Vol. 16 , Spring_Summer 2024 -
Open Access Article
11 - Identifying the Key Drivers of Digital Signature Implementation in Iran (using fuzzy Delphi method)
Ghorbanali Mehrabani Fatemeh Zargaran khouzaniIssue 59 , Vol. 16 , Spring_Summer 2024 -
Open Access Article
12 - Community Detection in Bipartite Networks Using HellRank Centrality Measure
Ali Khosrozadeh Ali Movaghar Mohammad Mehdi Gilanian Sadeghi Hamidreza MahyarIssue 59 , Vol. 16 , Spring_Summer 2024 -
Open Access Article
13 - Generalizing The Concept of Business Processes Structural Soundness from Classic Petri-nets to BPMN2.0 Process Models
Yahya Poursoltani Mohammad Hassan Shirali-Shahreza S. Alireza Hashemi GolpayeganiIssue 59 , Vol. 16 , Spring_Summer 2024 -
Open Access Article
14 - Presenting the ICT Policies Implementation Model of the 6th Development Using the Neural Network Method
Nazila Mohammadi Gholamreza Memarzadeh Tehran Sedigheh Tootian IsfahaniIssue 59 , Vol. 16 , Spring_Summer 2024 -
Open Access Article
15 - Test case Selection based on Test-Driven Development
Zohreh Mafi mirian mirianIssue 59 , Vol. 16 , Spring_Summer 2024 -
Open Access Article
16 - Survey on the Applications of the Graph Theory in the Information Retrieval
Maryam Piroozmand Amir Hosein Keyhanipour Ali MoeiniIssue 59 , Vol. 16 , Spring_Summer 2024 -
Open Access Article
17 - Application identification through intelligent traffic classification
Shaghayegh NaderiIssue 59 , Vol. 16 , Spring_Summer 2024 -
Open Access Article
18 - Explanation the role of standardization in the proposed solutions for privacy protection in health data
batool mehrshad Mohammad mehraeen Mohammad Khansari saeed mortazaviIssue 59 , Vol. 16 , Spring_Summer 2024 -
Open Access Article
19 - Persian Stance Detection Based On Multi-Classifier Fusion
Mojgan Farhoodi Abbas Toloie EshlaghyIssue 59 , Vol. 16 , Spring_Summer 2024 -
Open Access Article
20 - A Recommender System Based on the Analysis of Personality Traits in Telegram Social Network
Mohammad Javad shayegan mohadeseh valizadehIssue 59 , Vol. 16 , Spring_Summer 2024
-
Open Access Article
1 - Determining the factors affecting the collective financing of knowledge-based IT companies
Ali Haji Gholam Saryazdi ali rajabzadeh ghotri alinaghi mashayekhi alireza hassanzadeIssue 37 , Vol. 10 , Autumn_Winter 2019 -
Open Access Article
2 - Image Processing of steel sheets for Defect Detection by using Gabor Wavelet
masoud shafiee mostafa sadeghiIssue 13 , Vol. 4 , Spring 1391 -
Open Access Article
3 - Provide a conceptual model to identify the quality of electronic services in the country's online stores
marziye rahmani Mohammad Fathian saied yaghoubiIssue 30 , Vol. 8 , Autumn_Winter 2016 -
Open Access Article
4 - A Satellite Control Method Using Laguerre Model Predictive Control Approach
shekoofeh jafari fesharaki farzad tihidkhah heydarali talebiIssue 15 , Vol. 5 , Summer 1392 -
Open Access Article
5 - پردازش تصاویر ورق های فولادی به منظور آشکارسازی عیوب به کمک موجک گابور
Mostafa Sadeghie masoud shafieeIssue 14 , Vol. 4 , Autumn_Winter 2012 -
Open Access Article
6 - A model information technology adoption in academic research projects in the filed ICT based on Information Technology Adoption Integrated Modeling (ITAIM)
Shahram Aliyari masoud movahedi sirous kazemianIssue 41 , Vol. 11 , Autumn_Winter 2020 -
Open Access Article
7 - An Investigation on the Effect of Multifactor Model of Improving Critical Thinking in E-learning Environments
mohammadreza nili jamshid heydari hossein moradiIssue 21 , Vol. 6 , Spring 1394 -
Open Access Article
8 - طراحی اولین پایگاه داده کلمات دستنویس کردی برای سیستم های تشخیص تصویری کلمات
fatemeh daneshfar basir alagheband vahid sharafiIssue 17 , Vol. 5 , Spring_Summer 1393 -
Open Access Article
9 - Evaluation of e-learning with optimal mining approach 1 case study: Iran's higher education
abbas anarinejad aliakbar safavi farshad moradiIssue 12 , Vol. 4 , Spring_Summer 2012 -
Open Access Article
10 - Designing a fuzzy expert system for choosing the right contractor in information technology outsourcing
nadia kalantari nadia kalantari alireza Hasanzadeh shaban elahiIssue 6 , Vol. 2 , Autumn_Winter 2010