Current Issue Issue 59 , 60 Vol 16 Spring - Summer 2024 Submit Your Paper Published Issues Vol. 16 ✓ Issue 59 , 60 - Spring - Summer 2024 Vol. 15 ✓ Issue 57 , 58 - Autumn - Winter 2023 ✓ Issue 55 , 56 - Spring - Summer 2023 Vol. 14 ✓ Issue 53 , 54 - Autumn - Winter 2023 ✓ Issue 51 , 52 - Spring - Summer 2022 Vol. 13 ✓ Issue 49 , 50 - Autumn - Winter 2021 ✓ Issue 47 , 48 - Spring - Summer 2021 Vol. 12 ✓ Issue 45 , 46 - Autumn - Winter 2021 ✓ Issue 43 , 44 - Spring - Summer 2020 Vol. 11 ✓ Issue 41 , 42 - Autumn - Winter 2020 ✓ Issue 39 , 40 - Spring - Summer 2019 Vol. 10 ✓ Issue 37 , 38 - Autumn - Winter 2019 ✓ Issue 35 , 36 - Spring - Summer 2018 Vol. 9 ✓ Issue 33 , 34 - Autumn - Winter 2017 ✓ Issue 31 , 32 - Spring - Summer 2017 Vol. 8 ✓ Issue 30 , 31 - Autumn - Winter 2016 ✓ Issue 27 , 28 - Spring - Summer 2016 Vol. 7 ✓ Issue 26 , 27 - Autumn - Winter 2015 ✓ Issue 24 , 25 - Spring - Summer 2015 Vol. 6 ✓ Issue 22 , 23 - Autumn - Winter 2014 ✓ Issue 20 , 21 - Spring - Summer 1393 Vol. 5 ✓ Issue 18 , 19 - Autumn - Winter 2013 ✓ Issue 16 , 17 - Spring - Summer 2013 Vol. 4 ✓ Issue 14 , 15 - Autumn - Winter 2012 ✓ Issue 12 , 13 - Spring - Summer 2012 Vol. 2 ✓ Issue 6 , 7 - Autumn - Winter 2010 ✓ Issue 4 , 5 - Spring - Summer 2010 Vol. 1 ✓ Issue 2 , 3 - Autumn - Winter 2008 Menu • Peer Review • Open Access Journal • Publication Ethics • Instructions for authors Contact Journal Browse • Current Issue • By Issue • Author Index • By Subject • By Author
List of Articles شبکه Open Access Article Abstract Page Full-Text 1 - Window-Shopping as an Effective Element to Improve Viral Marketing shahriyar mohammadi keyvan karimi Open Access Article Abstract Page Full-Text 2 - Training MLP Neural Network in Images Compression by GSA Method maryam dehbashian hamid zahiri Open Access Article Abstract Page Full-Text 3 - A Novel Model for detecting intrusion with Mobile Agent and Game theory Amin Nezarat mehdi raja Gholamhossein Dastghaibyfard Open Access Article Abstract Page Full-Text 4 - A New Method to computational intelligence to improve network lifetime in wireless sensor networks faezeh talebian hassan khotanloo mansour esmaeilpour Open Access Article Abstract Page Full-Text 5 - Optimized Modeling for satisfaction in the relationship between a physician and patient based on machine learnin methods Fatemeh Saghafi mojtaba shadmehr Zainabolhoda Heshmati Hadi Veisi Open Access Article Abstract Page Full-Text 6 - An optimised hybrid method for ambulance dispatch based on complex networks and Artificial Intelligence Zainabolhoda Heshmati Mehdi Teimouri mehdi zarkeshzade Hadi Zare Open Access Article Abstract Page Full-Text 7 - A New Approach to Extract and Utilize Learners Social Relationships through Analyzing Forums Structure and Contents Somayeh Ahari Open Access Article Abstract Page Full-Text 8 - Automatic Sepration of Learnrs in Learning Groups Based on Identifying Learning Style from Their Behavior in Learning Environment mohammad sadegh rezaei gholamali montazer Open Access Article Abstract Page Full-Text 9 - Multicast computer network routing using genetic algorithm and ant colony Mohammad Pourmahmood Aghababa Open Access Article Abstract Page Full-Text 10 - Modified orthogonal chaotic colonial competition algorithm and its application in improving pattern recognition in multilayer perceptron neural network Payman Moallem mehrdad sadeghi hariri MAHDI hashemi 20.1001.1.27170411.1397.10.35.1.7 Open Access Article Abstract Page Full-Text 11 - A greedy new method based on the cascade model to calculate maximizing penetration in social networks Asgarali Bouyer Hamid Ahmadi 20.1001.1.27170414.1397.10.37.3.8 Open Access Article Abstract Page Full-Text 12 - Content and structural analysis of online forums in order to extract users' social relationships and use them in grouping mechanisms. Fatemeh Orojie fataneh taghiyareh Open Access Article Abstract Page Full-Text 13 - Routing of Multipartite Computer Networks Using Ant Genetic Algorithm Mohammad Pourmahmood Aghababa amin bahadorani baghbaderani 20.1001.1.27170411.1396.9.31.1.2 Open Access Article Abstract Page Full-Text 14 - Presenting a model for using mobile agents in distributed intrusion detection systems based on game theory امین نظارات مهدی رجا Gholamhossein Dastghaibyfard 20.1001.1.27170411.1395.8.27.6.2 Open Access Article Abstract Page Full-Text 15 - Optimum modeling of patient satisfaction with the doctor based on machine learning methods - شادمهر Zainabolhoda Heshmati Fatemeh saghafi Hadi Veisi 20.1001.1.27170411.1394.7.24.5.8 Open Access Article Abstract Page Full-Text 16 - Presenting a method based on computational intelligence to improve energy consumption in smart wireless sensor networks faezeh talebian حسن ختن¬لو منصور اسماعیل¬پور 20.1001.1.27170411.1394.7.24.1.4 Open Access Article Abstract Page Full-Text 17 - Providing an optimal method for dispatching an ambulance based on complex networks and artificial intelligence مهدی زرکش زاده Zainabolhoda Heshmati Hadi Zare Mehdi Teimouri 20.1001.1.27170411.1394.7.24.4.7 Open Access Article Abstract Page Full-Text 18 - Training of MLP neural network in image compression using GSA method maryam dehbashian hamid zahiri Open Access Article Abstract Page Full-Text 19 - Investigating the effect of using various marketing strategies on social networks on gaining the trust of council customers Investigating ترجمههای investigate فعلفراوانی بررسی کردن investigate, check, peruse, survey, study رسیدگی کردن consider, attend, check, investigate, inspect, investigate استفسار کردن investigate وارسی کردن sift, investigate پژوهیدن investigate, inquire, research, search تحقیق کردن investigate, inquire, verify, assay, interrogate, question اطلاعات مقدماتی بدست اوردن investigate جستار کردن investigate تفتیش کردن inquire, inspect, investigate, revise باز جویی کردن examine, assay, inquire, interrogate, investigate, cross-examine تعریفهای investigate فعل ۱ carry out a systematic or formal inquiry to discover and examine the facts of (an incident, allegation, etc.) so as to establish the truth. police are investigating the alleged beating مترادفها: check outsuss outgive something the once-overscope outinquire intolook intogo intolook overprobeexplorescrutinizeconduct an investigation intoconduct an inquiry intomake inquiries abouttry to get to the bottom ofinspectanalyzestudyexamineconsiderresearchsearch/sift the evidence concerningpore overdelve intoauditevaluatefollow up مترادف investigate فعل check outsuss outgive something the once-overscope out inquire intolook intogo intolook overprobeexplorescrutinizeconduct an investigation intoconduct an inquiry intomake inquiries abouttry to get to the bottom ofinspectanalyzestudyexamineconsiderresearchsearch/sift the evidence concerningpore overdelve intoauditevaluatefollow up همچنین ببینید investigate farzaneh milani jafari zenouzi 20.1001.1.27170414.1398.11.39.5.1 Open Access Article Abstract Page Full-Text 20 - Comparing A Hybridization of Fuzzy Inference System and Particle Swarm Optimization Algorithm with Deep Learning to Predict Stock Prices Majid Abdolrazzagh-Nezhad mahdi kherad 20.1001.1.27170411.1398.11.41.5.0 Open Access Article Abstract Page Full-Text 21 - An Improved Method Based on Label Propagation and Greedy Approaches for Community Detection in Dynamic Social Networks Mohammad ستاری kamran zamanifar 20.1001.1.27170414.1399.12.43.1.2 Open Access Article Abstract Page Full-Text 22 - Increasing the value of collected data and reducing energy consumption by using network coding and mobile sinks in wireless sensor networks ehsan kharati 20.1001.1.27170414.1399.12.43.3.4 Open Access Article Abstract Page Full-Text 23 - Improving performance of probe-based rate control mechanisms using classification: evaluation on an experimental testbed for High Throughput WLANs ghalibaf ali Mohammad Nassiri mohammadhassan daei mahdi sakhaei 20.1001.1.27170414.1399.12.43.9.0 Open Access Article Abstract Page Full-Text 24 - Converting protein sequence to image for classification with convolutional neural network reza ahsan mansour ebrahimi dianat dianat 20.1001.1.27170414.1399.12.43.11.2 Open Access Article Abstract Page Full-Text 25 - An access control model for online social networks using user-to-user relationships Mohamad Javad Piran mahmud deypir 20.1001.1.27170411.1399.12.45.1.1 Open Access Article Abstract Page Full-Text 26 - A Novel Method based on the Cocomo model to increase the accuracy of software projects effort estimates mahdieh salari vahid khatibi amid khatibi 20.1001.1.27170411.1399.12.45.3.3 Open Access Article Abstract Page Full-Text 27 - Improving imperialist competitive algorithm for solving the nodes placement problem in three-dimensional grid wireless sensor networks Sayed Wafa Barkhoda Hemmat Sheikhi sudabeh mohammadi 20.1001.1.27170411.1399.12.45.5.5 Open Access Article Abstract Page Full-Text 28 - A Combination Method of DEA, DEMATEL and ANP for Evaluation of ERP Systems amir amini alireza alinezhad 20.1001.1.27170411.1399.12.45.6.6 Open Access Article Abstract Page Full-Text 29 - Increasing the lifetime of underwater acoustic sensor networks by optimal relay node placement zahra mihamadi mohadeseh soleimanpour daryush avasimoghaddam Siamak Talebi 20.1001.1.27170411.1399.12.45.7.7 Open Access Article Abstract Page Full-Text 30 - An Intelligent Model for Multidimensional Personality Recognition of Users using Deep Learning Methods Hossein Sadr fatemeh mohades deilami morteza tarkhan 20.1001.1.27170414.1400.13.47.6.2 Open Access Article Abstract Page Full-Text 31 - Sentiment analysis for stock market predection with deep neural network: A case study for international corporate stock database hakimeh mansour Saeedeh Momtazi Kamran Layeghi 20.1001.1.27170414.1400.13.47.7.3 Open Access Article Abstract Page Full-Text 32 - Agile Enterprise Architecture Modeling: Evaluating the Applicability of Six Modeling Standards based on Iran’s National EA Framework Ali Razi reza rezaei ahmadali یزدان پناه 20.1001.1.27170414.1400.13.47.8.4 Open Access Article Abstract Page Full-Text 33 - Use of conditional generative adversarial network to produce synthetic data with the aim of improving the classification of users who publish fake news arefeh esmaili Saeed Farzi 20.1001.1.27170414.1400.13.47.9.5 Open Access Article Abstract Page Full-Text 34 - A RPL-based Routing Algorithm for Multimedia Traffic for the Internet of Things Mohammad Khansari Farzaneh Mortazavi 20.1001.1.27170414.1400.13.47.10.6 Open Access Article Abstract Page Full-Text 35 - A Neighbor-based Link Prediction Method for Bipartite Networks Golshan Sondossi alireza saebi S. Alireza hashemi G. 20.1001.1.27170414.1400.13.47.11.7 Open Access Article Abstract Page Full-Text 36 - Stability Analysis of Networked Control Systems under Denial of Service Attacks using Switching System Theory Mohammad SayadHaghighi Faezeh Farivar 20.1001.1.27170411.1400.13.49.5.0 Open Access Article Abstract Page Full-Text 37 - An efficient Two Pathways Deep Architecture for Soccer Goal Recognition towards Soccer Highlight Summarization Amirhosein Zangane Mehdi Jampour Kamran Layeghi 20.1001.1.27170414.1400.13.49.5.5 Open Access Article Abstract Page Full-Text 38 - Using Sentiment Analysis and Combining Classifiers for Spam Detection in Twitter mehdi salkhordeh haghighi Aminolah Kermani 20.1001.1.27170411.1401.14.51.10.6 Open Access Article Abstract Page Full-Text 39 - Explaining the adoption process of software-oriented networks (SDN) using the foundational data method and systems approach Elham Ziaeipour ali rajabzadeh ghotri Alireza Taghizadeh 20.1001.1.27170411.1401.14.51.12.8 Open Access Article Abstract Page Full-Text 40 - Reduction of network load by mapping the application in the network on a chip using the discrete Harris hawk algorithm Elham Hajebi Vahid Sattari-Naeini 20.1001.1.27170411.1401.14.51.14.0 Open Access Article Abstract Page Full-Text 41 - Generalizing The Concept of Business Processes Structural Soundness from Classic Petri-nets to BPMN2.0 Process Models Yahya Poursoltani Mohammad Hassan Shirali-Shahreza S. Alireza Hashemi Golpayegani Open Access Article Abstract Page Full-Text 42 - A Novel Multi-Step Ahead Demand Forecasting Model Based on Deep Learning Techniques and Time Series Augmentation Hossein Abbasimehr Reza Paki 20.1001.1.27170411.1401.14.53.1.1 Open Access Article Abstract Page Full-Text 43 - Three Dimensional Beamforming in Multi User Multi Antenna Cellular Networks with Randomly Distributed Users S. Mohammad Razavizadeh Nasim Mohammadi 20.1001.1.27170411.1401.14.53.7.7 Open Access Article Abstract Page Full-Text 44 - Stock market prediction using optimized grasshopper optimization algorithm and time series algorithms Vahid Safari dehnavi masoud shafiee 20.1001.1.27170411.1401.14.53.8.8 Open Access Article Abstract Page Full-Text 45 - Design and fabrication of the E-field probe for the measurement of the electromagnetic fields in 5G frequency band Reza Bahri Mahdi Fasanghari Ahmadreza Eskandari Vahid Yazdanian 20.1001.1.27170411.1401.14.53.13.3 Open Access Article Abstract Page Full-Text 46 - A comprehensive survey on the influence maximization problem in social networks mohsen taherinia mahdi Esmaeili Behrooz Minaei 20.1001.1.27170411.1401.14.53.16.6 Open Access Article Abstract Page Full-Text 47 - Presenting the ICT Policies Implementation Model of the 6th Development Using the Neural Network Method Nazila Mohammadi Gholamreza Memarzadeh Tehran Sedigheh Tootian Isfahani Open Access Article Abstract Page Full-Text 48 - A Recommender System Based on the Analysis of Personality Traits in Telegram Social Network Mohammad Javad shayegan mohadeseh valizadeh Open Access Article Abstract Page Full-Text 49 - The main components of evaluating the credibility of users according to organizational goals in the life cycle of big data Sogand Dehghan shahriyar mohammadi rojiar pirmohamadiani 20.1001.1.27170411.1402.15.55.8.9 Open Access Article Abstract Page Full-Text 50 - Predicting the workload of virtual machines in order to reduce energy consumption in cloud data centers using the combination of deep learning models Zeinab Khodaverdian Hossein Sadr Mojdeh Nazari Soleimandarabi Seyed Ahmad Edalatpanah 20.1001.1.27170411.1402.15.55.9.0 Open Access Article Abstract Page Full-Text 51 - Design and implementation of a survival model for patients with melanoma based on data mining algorithms farinaz sanaei Seyed Abdollah Amin Mousavi Abbas Toloie Eshlaghy ali rajabzadeh ghotri 10.61186/jict.44093.15.57.1 20.1001.1.27170411.1402.15.57.1.6 Open Access Article Abstract Page Full-Text 52 - An Intrusion Detection System based on Deep Learning for CAN Bus Fatemeh Asghariyan Mohsen Raji 20.1001.1.27170411.1402.15.57.2.7 Open Access Article Abstract Page Full-Text 53 - Improvement of intrusion detection system on Industrial Internet of Things based on deep learning using metaheuristic algorithms mohammadreza zeraatkarmoghaddam majid ghayori 20.1001.1.27170411.1402.15.57.12.7 Open Access Article Abstract Page Full-Text 54 - Multi-Level Ternary Quantization for Improving Sparsity and Computation in Embedded Deep Neural Networks Hosna Manavi Mofrad ali ansarmohammadi Mostafa Salehi Open Access Article Abstract Page Full-Text 55 - Generalizing The Concept of Business Processes Structural Soundness from Classic Petri-nets to BPMN2.0 Process Models Yahya Poursoltani Mohammad Hassan Shirali-Shahreza S. Alireza hashemi G. Open Access Article Abstract Page Full-Text 56 - Presenting the ICT Policies Implementation Model of the 6th Development Using the Neural Network Method Nazila Mohammadi Gholamreza Memarzadeh sedigheh tootian