• Home
  • About Rimag
  • Contact Us
  • Register
  • Log in
  • Order
Advanced
  • Home
  • شبکه
  • Current Issue

    61
    Issue 61 , 62   Vol 16 Autumn - Winter 2024
    Submit Your Paper

    Published Issues

    • Vol. 16
      • ✓ Issue 61 , 62 - Autumn - Winter 2024
      • ✓ Issue 59 , 60 - Spring - Summer 2024
    • Vol. 15
      • ✓ Issue 57 , 58 - Autumn - Winter 2023
      • ✓ Issue 55 , 56 - Spring - Summer 2023
    • Vol. 14
      • ✓ Issue 53 , 54 - Autumn - Winter 2023
      • ✓ Issue 51 , 52 - Spring - Summer 2022
    • Vol. 13
      • ✓ Issue 49 , 50 - Autumn - Winter 2021
      • ✓ Issue 47 , 48 - Spring - Summer 2021
    • Vol. 12
      • ✓ Issue 45 , 46 - Autumn - Winter 2021
      • ✓ Issue 43 , 44 - Spring - Summer 2020
    • Vol. 11
      • ✓ Issue 41 , 42 - Autumn - Winter 2020
      • ✓ Issue 39 , 40 - Spring - Summer 2019
    • Vol. 10
      • ✓ Issue 37 , 38 - Autumn - Winter 2019
      • ✓ Issue 35 , 36 - Spring - Summer 2018
    • Vol. 9
      • ✓ Issue 33 , 34 - Autumn - Winter 2017
      • ✓ Issue 31 , 32 - Spring - Summer 2017
    • Vol. 8
      • ✓ Issue 30 , 31 - Autumn - Winter 2016
      • ✓ Issue 27 , 28 - Spring - Summer 2016
    • Vol. 7
      • ✓ Issue 26 , 27 - Autumn - Winter 2015
      • ✓ Issue 24 , 25 - Spring - Summer 2015
    • Vol. 6
      • ✓ Issue 22 , 23 - Autumn - Winter 2014
      • ✓ Issue 20 , 21 - Spring - Summer 1393
    • Vol. 5
      • ✓ Issue 18 , 19 - Autumn - Winter 2013
      • ✓ Issue 16 , 17 - Spring - Summer 2013
    • Vol. 4
      • ✓ Issue 14 , 15 - Autumn - Winter 2012
      • ✓ Issue 12 , 13 - Spring - Summer 2012
    • Vol. 2
      • ✓ Issue 6 , 7 - Autumn - Winter 2010
      • ✓ Issue 4 , 5 - Spring - Summer 2010
    • Vol. 1
      • ✓ Issue 2 , 3 - Autumn - Winter 2008

    Menu

    • •  Peer Review
    • •  Open Access Journal
    • •  Publication Ethics
    • •  Instructions for authors
    • Contact Journal

    Browse

    • •  Current Issue
    • •  By Issue
    • • Author Index
    • •  By Subject
    • •  By Author
    OpenAccess
    • List of Articles شبکه

      • Open Access Article
        • Abstract Page
        • Full-Text

        1 - Window-Shopping as an Effective Element to Improve Viral Marketing
        shahriyar mohammadi keyvan karimi
      • Open Access Article
        • Abstract Page
        • Full-Text

        2 - Training MLP Neural Network in Images Compression by GSA Method
        maryam dehbashian hamid zahiri
      • Open Access Article
        • Abstract Page
        • Full-Text

        3 - A Novel Model for detecting intrusion with Mobile Agent and Game theory
        Amin Nezarat mehdi raja Gholamhossein Dastghaibyfard
      • Open Access Article
        • Abstract Page
        • Full-Text

        4 - A New Method to computational intelligence to improve network lifetime in wireless sensor networks
        faezeh talebian hassan khotanloo mansour esmaeilpour
      • Open Access Article
        • Abstract Page
        • Full-Text

        5 - Optimized Modeling for satisfaction in the relationship between a physician and patient based on machine learnin methods
        Fatemeh Saghafi mojtaba shadmehr Zainabolhoda Heshmati Hadi Veisi
      • Open Access Article
        • Abstract Page
        • Full-Text

        6 - An optimised hybrid method for ambulance dispatch based on complex networks and Artificial Intelligence
        Zainabolhoda Heshmati Mehdi Teimouri mehdi zarkeshzade Hadi Zare
      • Open Access Article
        • Abstract Page
        • Full-Text

        7 - A New Approach to Extract and Utilize Learners Social Relationships through Analyzing Forums Structure and Contents
        Somayeh Ahari
      • Open Access Article
        • Abstract Page
        • Full-Text

        8 - Automatic Sepration of Learnrs in Learning Groups Based on Identifying Learning Style from Their Behavior in Learning Environment
        mohammad sadegh rezaei gholamali montazer
      • Open Access Article
        • Abstract Page
        • Full-Text

        9 - Multicast computer network routing using genetic algorithm and ant colony
        Mohammad Pourmahmood Aghababa
      • Open Access Article
        • Abstract Page
        • Full-Text

        10 - Modified orthogonal chaotic colonial competition algorithm and its application in improving pattern recognition in multilayer perceptron neural network
        Payman Moallem mehrdad sadeghi hariri MAHDI hashemi
        20.1001.1.27170411.1397.10.35.1.7
      • Open Access Article
        • Abstract Page
        • Full-Text

        11 - A greedy new method based on the cascade model to calculate maximizing penetration in social networks
        Asgarali Bouyer Hamid Ahmadi
        20.1001.1.27170414.1397.10.37.3.8
      • Open Access Article
        • Abstract Page
        • Full-Text

        12 - Content and structural analysis of online forums in order to extract users' social relationships and use them in grouping mechanisms.
        Fatemeh  Orojie fataneh taghiyareh
      • Open Access Article
        • Abstract Page
        • Full-Text

        13 - Routing of Multipartite Computer Networks Using Ant Genetic Algorithm
        Mohammad Pourmahmood Aghababa amin bahadorani baghbaderani
        20.1001.1.27170411.1396.9.31.1.2
      • Open Access Article
        • Abstract Page
        • Full-Text

        14 - Presenting a model for using mobile agents in distributed intrusion detection systems based on game theory
        امین نظارات مهدی رجا Gholamhossein Dastghaibyfard
        20.1001.1.27170411.1395.8.27.6.2
      • Open Access Article
        • Abstract Page
        • Full-Text

        15 - Optimum modeling of patient satisfaction with the doctor based on machine learning methods
        - شادمهر Zainabolhoda Heshmati Fatemeh saghafi Hadi Veisi
        20.1001.1.27170411.1394.7.24.5.8
      • Open Access Article
        • Abstract Page
        • Full-Text

        16 - Presenting a method based on computational intelligence to improve energy consumption in smart wireless sensor networks
        faezeh talebian حسن  ختن¬لو منصور  اسماعیل¬پور
        20.1001.1.27170411.1394.7.24.1.4
      • Open Access Article
        • Abstract Page
        • Full-Text

        17 - Providing an optimal method for dispatching an ambulance based on complex networks and artificial intelligence
        مهدی زرکش زاده Zainabolhoda Heshmati Hadi Zare Mehdi Teimouri
        20.1001.1.27170411.1394.7.24.4.7
      • Open Access Article
        • Abstract Page
        • Full-Text

        18 - Training of MLP neural network in image compression using GSA method
        maryam dehbashian hamid zahiri
      • Open Access Article
        • Abstract Page
        • Full-Text

        19 - Investigating the effect of using various marketing strategies on social networks on gaining the trust of council customers Investigating ترجمه‌های investigate فعلفراوانی بررسی کردن investigate, check, peruse, survey, study رسیدگی کردن consider, attend, check, investigate, inspect, investigate استفسار کردن investigate وارسی کردن sift, investigate پژوهیدن investigate, inquire, research, search تحقیق کردن investigate, inquire, verify, assay, interrogate, question اطلاعات مقدماتی بدست اوردن investigate جستار کردن investigate تفتیش کردن inquire, inspect, investigate, revise باز جویی کردن examine, assay, inquire, interrogate, investigate, cross-examine تعریف‌های investigate فعل ۱ carry out a systematic or formal inquiry to discover and examine the facts of (an incident, allegation, etc.) so as to establish the truth. police are investigating the alleged beating مترادف‌ها: check outsuss outgive something the once-overscope outinquire intolook intogo intolook overprobeexplorescrutinizeconduct an investigation intoconduct an inquiry intomake inquiries abouttry to get to the bottom ofinspectanalyzestudyexamineconsiderresearchsearch/sift the evidence concerningpore overdelve intoauditevaluatefollow up مترادف investigate فعل check outsuss outgive something the once-overscope out inquire intolook intogo intolook overprobeexplorescrutinizeconduct an investigation intoconduct an inquiry intomake inquiries abouttry to get to the bottom ofinspectanalyzestudyexamineconsiderresearchsearch/sift the evidence concerningpore overdelve intoauditevaluatefollow up همچنین ببینید investigate
        farzaneh milani jafari zenouzi
        20.1001.1.27170414.1398.11.39.5.1
      • Open Access Article
        • Abstract Page
        • Full-Text

        20 - Comparing A Hybridization of Fuzzy Inference System and Particle Swarm Optimization Algorithm with Deep Learning to Predict Stock Prices
        Majid Abdolrazzagh-Nezhad mahdi kherad
        20.1001.1.27170411.1398.11.41.5.0
      • Open Access Article
        • Abstract Page
        • Full-Text

        21 - An Improved Method Based on Label Propagation and Greedy Approaches for Community Detection in Dynamic Social Networks
        Mohammad ستاری kamran zamanifar
        20.1001.1.27170414.1399.12.43.1.2
      • Open Access Article
        • Abstract Page
        • Full-Text

        22 - Increasing the value of collected data and reducing energy consumption by using network coding and mobile sinks in wireless sensor networks
        ehsan kharati
        20.1001.1.27170414.1399.12.43.3.4
      • Open Access Article
        • Abstract Page
        • Full-Text

        23 - Improving performance of probe-based rate control mechanisms using classification: evaluation on an experimental testbed for High Throughput WLANs
        ghalibaf ali Mohammad Nassiri mohammadhassan daei mahdi sakhaei
        20.1001.1.27170414.1399.12.43.9.0
      • Open Access Article
        • Abstract Page
        • Full-Text

        24 - Converting protein sequence to image for classification with convolutional neural network
        reza ahsan mansour ebrahimi dianat dianat
        20.1001.1.27170414.1399.12.43.11.2
      • Open Access Article
        • Abstract Page
        • Full-Text

        25 - An access control model for online social networks using user-to-user relationships
        Mohamad Javad Piran mahmud deypir
        20.1001.1.27170411.1399.12.45.1.1
      • Open Access Article
        • Abstract Page
        • Full-Text

        26 - A Novel Method based on the Cocomo model to increase the accuracy of software projects effort estimates
        mahdieh salari vahid khatibi amid khatibi
        20.1001.1.27170411.1399.12.45.3.3
      • Open Access Article
        • Abstract Page
        • Full-Text

        27 - Improving imperialist competitive algorithm for solving the nodes placement problem in three-dimensional grid wireless sensor networks
        Sayed Wafa Barkhoda Hemmat Sheikhi sudabeh mohammadi
        20.1001.1.27170411.1399.12.45.5.5
      • Open Access Article
        • Abstract Page
        • Full-Text

        28 - A Combination Method of DEA, DEMATEL and ANP for Evaluation of ERP Systems
        amir amini alireza alinezhad
        20.1001.1.27170411.1399.12.45.6.6
      • Open Access Article
        • Abstract Page
        • Full-Text

        29 - Increasing the lifetime of underwater acoustic sensor networks by optimal relay node placement
        zahra mihamadi mohadeseh soleimanpour daryush avasimoghaddam Siamak Talebi
        20.1001.1.27170411.1399.12.45.7.7
      • Open Access Article
        • Abstract Page
        • Full-Text

        30 - An Intelligent Model for Multidimensional Personality Recognition of Users using Deep Learning Methods
        Hossein Sadr fatemeh mohades deilami morteza tarkhan
        20.1001.1.27170414.1400.13.47.6.2
      • Open Access Article
        • Abstract Page
        • Full-Text

        31 - Sentiment analysis for stock market predection with deep neural network: A case study for international corporate stock database
        hakimeh mansour Saeedeh Momtazi Kamran Layeghi
        20.1001.1.27170414.1400.13.47.7.3
      • Open Access Article
        • Abstract Page
        • Full-Text

        32 - Agile Enterprise Architecture Modeling: Evaluating the Applicability of Six Modeling Standards based on Iran’s National EA Framework
        Ali Razi reza rezaei ahmadali یزدان پناه
        20.1001.1.27170414.1400.13.47.8.4
      • Open Access Article
        • Abstract Page
        • Full-Text

        33 - Use of conditional generative adversarial network to produce synthetic data with the aim of improving the classification of users who publish fake news
        arefeh esmaili Saeed Farzi
        20.1001.1.27170414.1400.13.47.9.5
      • Open Access Article
        • Abstract Page
        • Full-Text

        34 - A RPL-based Routing Algorithm for Multimedia Traffic for the Internet of Things
        Mohammad Khansari Farzaneh Mortazavi
        20.1001.1.27170414.1400.13.47.10.6
      • Open Access Article
        • Abstract Page
        • Full-Text

        35 - A Neighbor-based Link Prediction Method for Bipartite Networks
        Golshan Sondossi alireza saebi S. Alireza hashemi G.
        20.1001.1.27170414.1400.13.47.11.7
      • Open Access Article
        • Abstract Page
        • Full-Text

        36 - Stability Analysis of Networked Control Systems under Denial of Service Attacks using Switching System Theory
        Mohammad SayadHaghighi Faezeh Farivar
        20.1001.1.27170411.1400.13.49.5.0
      • Open Access Article
        • Abstract Page
        • Full-Text

        37 - An efficient Two Pathways Deep Architecture for Soccer Goal Recognition towards Soccer Highlight Summarization
        Amirhosein Zangane Mehdi Jampour Kamran Layeghi
        20.1001.1.27170414.1400.13.49.5.5
      • Open Access Article
        • Abstract Page
        • Full-Text

        38 - Using Sentiment Analysis and Combining Classifiers for Spam Detection in Twitter
        mehdi salkhordeh haghighi Aminolah Kermani
        20.1001.1.27170411.1401.14.51.10.6
      • Open Access Article
        • Abstract Page
        • Full-Text

        39 - Explaining the adoption process of software-oriented networks (SDN) using the foundational data method and systems approach
        Elham Ziaeipour ali rajabzadeh ghotri Alireza Taghizadeh
        20.1001.1.27170411.1401.14.51.12.8
      • Open Access Article
        • Abstract Page
        • Full-Text

        40 - Reduction of network load by mapping the application in the network on a chip using the discrete Harris hawk algorithm
        Elham Hajebi Vahid Sattari-Naeini
        20.1001.1.27170411.1401.14.51.14.0
      • Open Access Article
        • Abstract Page
        • Full-Text

        41 - Generalizing The Concept of Business Processes Structural Soundness from Classic Petri-nets to BPMN2.0 Process Models
        Yahya Poursoltani Mohammad Hassan Shirali-Shahreza S. Alireza Hashemi Golpayegani
      • Open Access Article
        • Abstract Page
        • Full-Text

        42 - A Novel Multi-Step Ahead Demand Forecasting Model Based on Deep Learning Techniques and Time Series Augmentation
        Hossein Abbasimehr Reza Paki
        20.1001.1.27170411.1401.14.53.1.1
      • Open Access Article
        • Abstract Page
        • Full-Text

        43 - Three Dimensional Beamforming in Multi User Multi Antenna Cellular Networks with Randomly Distributed Users
        S. Mohammad Razavizadeh Nasim Mohammadi
        20.1001.1.27170411.1401.14.53.7.7
      • Open Access Article
        • Abstract Page
        • Full-Text

        44 - Stock market prediction using optimized grasshopper optimization algorithm and time series algorithms
        Vahid Safari dehnavi masoud shafiee
        20.1001.1.27170411.1401.14.53.8.8
      • Open Access Article
        • Abstract Page
        • Full-Text

        45 - Design and fabrication of the E-field probe for the measurement of the electromagnetic fields in 5G frequency band
        Reza Bahri Mahdi Fasanghari Ahmadreza Eskandari Vahid Yazdanian
        20.1001.1.27170411.1401.14.53.13.3
      • Open Access Article
        • Abstract Page
        • Full-Text

        46 - A comprehensive survey on the influence maximization problem in social networks
        mohsen taherinia mahdi Esmaeili Behrooz Minaei
        20.1001.1.27170411.1401.14.53.16.6
      • Open Access Article
        • Abstract Page
        • Full-Text

        47 - Fault Diagnosis and Detection in Photovoltaic Systems Using Neural Network VGG16
        ُSamaneh Azimi Mohammad Manthouri Mehdi Akhbari
      • Open Access Article
        • Abstract Page
        • Full-Text

        48 - Presenting the ICT Policies Implementation Model of the 6th Development Using the Neural Network Method
        Nazila Mohammadi Gholamreza   Memarzadeh Tehran Sedigheh Tootian Isfahani
      • Open Access Article
        • Abstract Page
        • Full-Text

        49 - Trust Based Link Prediction Using Fuzzy Computational Model in Social Networks
        Fateme Hoseinkhani Ali Harounabadi ُُُُSaeed Setayeshi
      • Open Access Article
        • Abstract Page
        • Full-Text

        50 - A Recommender System Based on the Analysis of Personality Traits in Telegram Social Network
        Mohammad Javad shayegan mohadeseh valizadeh
      • Open Access Article
        • Abstract Page
        • Full-Text

        51 - The main components of evaluating the credibility of users according to organizational goals in the life cycle of big data
        Sogand Dehghan shahriyar mohammadi rojiar pirmohamadiani
        20.1001.1.27170411.1402.15.55.8.9
      • Open Access Article
        • Abstract Page
        • Full-Text

        52 - Predicting the workload of virtual machines in order to reduce energy consumption in cloud data centers using the combination of deep learning models
        Zeinab Khodaverdian Hossein Sadr Mojdeh Nazari Soleimandarabi Seyed Ahmad Edalatpanah
        20.1001.1.27170411.1402.15.55.9.0
      • Open Access Article
        • Abstract Page
        • Full-Text

        53 - Design and implementation of a survival model for patients with melanoma based on data mining algorithms
        farinaz sanaei Seyed Abdollah  Amin Mousavi Abbas Toloie Eshlaghy ali rajabzadeh ghotri
        10.61186/jict.44093.15.57.1
        20.1001.1.27170411.1402.15.57.1.6
      • Open Access Article
        • Abstract Page
        • Full-Text

        54 - An Intrusion Detection System based on Deep Learning for CAN Bus
        Fatemeh Asghariyan Mohsen Raji
        20.1001.1.27170411.1402.15.57.2.7
      • Open Access Article
        • Abstract Page
        • Full-Text

        55 - Improvement of intrusion detection system on Industrial Internet of Things based on deep learning using metaheuristic algorithms
        mohammadreza zeraatkarmoghaddam majid ghayori
        20.1001.1.27170411.1402.15.57.12.7
      • Open Access Article
        • Abstract Page
        • Full-Text

        56 - Improving Code Coverage Metrics for Discovering Vulnerabilities in Stateful Network Protocols using Hybrid Fuzzing
        Hamid Rezaei Rahvard Mehdi Salkhordeh Haghighi
      • Open Access Article
        • Abstract Page
        • Full-Text

        57 - Energy Efficient Target (Rhynchophorus Ferrugineus) Tracking in Wireless Sensor Network Using the Cat Swarm Optimization Algorithm and Fuzzy Logic
        Shayesteh Tabatabaei
      • Open Access Article
        • Abstract Page
        • Full-Text

        58 - Multi-Level Ternary Quantization for Improving Sparsity and Computation in Embedded Deep Neural Networks
        Hosna Manavi Mofrad ali ansarmohammadi Mostafa Salehi
      • Open Access Article
        • Abstract Page
        • Full-Text

        59 - Generalizing The Concept of Business Processes Structural Soundness from Classic Petri-nets to BPMN2.0 Process Models
        Yahya Poursoltani Mohammad Hassan Shirali-Shahreza S. Alireza hashemi G.
      • Open Access Article
        • Abstract Page
        • Full-Text

        60 - Presenting the ICT Policies Implementation Model of the 6th Development Using the Neural Network Method
        Nazila Mohammadi Gholamreza  Memarzadeh sedigheh tootian
  • Home Page
  • Site Map
  • Contact Us
  • Home
  • Site Map
  • Regional Science and Technology Information Center
  • Contact Us

The rights to this website are owned by the Raimag Press Management System.
Copyright © 2017-2025

Home| Login| About Rimag| Contact Us|
[فارسی] [العربية] [fa] [ar]
  • Ricest
  • Login
  • email