• Home
  • About Rimag
  • Contact Us
  • Register
  • Log in
  • Order
Advanced
  • Home
  • ای
  • Current Issue

    65
    Vol 17 Special Issue
    Submit Your Paper

    Published Issues

    • Vol. 17
      • ✓ Special Issue
      • ✓ Issue 63 , 64 - Spring - Summer 2025
    • Vol. 16
      • ✓ Issue 61 , 62 - Autumn - Winter 2024
      • ✓ Issue 59 , 60 - Spring - Summer 2024
    • Vol. 15
      • ✓ Issue 57 , 58 - Autumn - Winter 2023
      • ✓ Issue 55 , 56 - Spring - Summer 2023
    • Vol. 14
      • ✓ Issue 53 , 54 - Autumn - Winter 2023
      • ✓ Issue 51 , 52 - Spring - Summer 2022
    • Vol. 13
      • ✓ Issue 49 , 50 - Autumn - Winter 2021
      • ✓ Issue 47 , 48 - Spring - Summer 2021
    • Vol. 12
      • ✓ Issue 45 , 46 - Autumn - Winter 2021
      • ✓ Issue 43 , 44 - Spring - Summer 2020
    • Vol. 11
      • ✓ Issue 41 , 42 - Autumn - Winter 2020
      • ✓ Issue 39 , 40 - Spring - Summer 2019
    • Vol. 10
      • ✓ Issue 37 , 38 - Autumn - Winter 2019
      • ✓ Issue 35 , 36 - Spring - Summer 2018
    • Vol. 9
      • ✓ Issue 33 , 34 - Autumn - Winter 2017
      • ✓ Issue 31 , 32 - Spring - Summer 2017
    • Vol. 8
      • ✓ Issue 30 , 31 - Autumn - Winter 2016
      • ✓ Issue 27 , 28 - Spring - Summer 2016
    • Vol. 7
      • ✓ Issue 26 , 27 - Autumn - Winter 2015
      • ✓ Issue 24 , 25 - Spring - Summer 2015
    • Vol. 6
      • ✓ Issue 22 , 23 - Autumn - Winter 2014
      • ✓ Issue 20 , 21 - Spring - Summer 1393
    • Vol. 5
      • ✓ Issue 18 , 19 - Autumn - Winter 2013
      • ✓ Issue 16 , 17 - Spring - Summer 2013
    • Vol. 4
      • ✓ Issue 14 , 15 - Autumn - Winter 2012
      • ✓ Issue 12 , 13 - Spring - Summer 2012
    • Vol. 2
      • ✓ Issue 6 , 7 - Autumn - Winter 2010
      • ✓ Issue 4 , 5 - Spring - Summer 2010
    • Vol. 1
      • ✓ Issue 2 , 3 - Autumn - Winter 2008

    Menu

    • •  Peer Review
    • •  Open Access Journal
    • •  Publication Ethics
    • •  Instructions for authors
    • Contact Journal

    Browse

    • •  Current Issue
    • •  By Issue
    • • Author Index
    • •  By Subject
    • •  By Author
    OpenAccess
    • List of Articles ای

      • Open Access Article
        • Abstract Page
        • Full-Text

        1 - An Information Architecture Framework for Utilizing Social Networks in Iranian Higher Education System
        mehrab ali golshani rosta مهرابعلی  گلشنی‌روستا
      • Open Access Article
        • Abstract Page
        • Full-Text

        2 - The Impact of IQ Imbalance on the BER of Adaptive Modulation in the MIMO System
        Hooman Tahayori abbas mohammadi abdolali abdipour
      • Open Access Article
        • Abstract Page
        • Full-Text

        3 - Design and implementation of a fuzzy expert system for suspicious behavior detection in e-banking system
        leila saroukhani gholamali montazer
      • Open Access Article
        • Abstract Page
        • Full-Text

        4 - Evaluation of SIP signaling implementation using QoS parameters
        mojtaba jahanbakhsh azharivs azharivs maryam homayooni Ahmad akbari
      • Open Access Article
        • Abstract Page
        • Full-Text

        5 - COBIT A Suitable Framework for Measuring IT Governance in Organizations
        mojtaba safari mehdi ghazanfari Mohammad Fathian
      • Open Access Article
        • Abstract Page
        • Full-Text

        6 - Cross-layer Design for Congestion Control, Routing and Scheduling in Ad-hoc Wireless Networks with considering the Electrical Power of nodes
        Hooman Tahayori
      • Open Access Article
        • Abstract Page
        • Full-Text

        7 - Blind correction of camera lens aberration and de-centering error using modified Zernike model
        kambiz rahbar karim faez ebrahim attaran
      • Open Access Article
        • Abstract Page
        • Full-Text

        8 - Window-Shopping as an Effective Element to Improve Viral Marketing
        shahriyar mohammadi keyvan karimi
      • Open Access Article
        • Abstract Page
        • Full-Text

        9 - Design of Secure Communication System by Use of Synchronization of Chaotic Systems
        Mohammad nikkhoo masoud shafiee koorosh kiani
      • Open Access Article
        • Abstract Page
        • Full-Text

        10 - Adaptive Probabilistic Flooding for Ad Hoc Networks
        fateme nourazar sabaei sabaei
      • Open Access Article
        • Abstract Page
        • Full-Text

        11 - Blind Correction of Lens Aberration Using Modified Zernike Moments
        kambiz rahbar karim faez
      • Open Access Article
        • Abstract Page
        • Full-Text

        12 - Training MLP Neural Network in Images Compression by GSA Method
        maryam dehbashian hamid zahiri
      • Open Access Article
        • Abstract Page
        • Full-Text

        13 - Sliding Mode Controller for TCP Congestion Control
        roohollah barzamini masoud shafiee
      • Open Access Article
        • Abstract Page
        • Full-Text

        14 - A Managerial Examination of the Successful Parameters in the B2C Business
        shila mosammami mahmood moradi Asadollah Shahbahrami
      • Open Access Article
        • Abstract Page
        • Full-Text

        15 - Applying genetic algorithm for automatic service identification based on quality metrics
        Jan Mohammad Rajabi saeed parsa masoud bagheri ali akbar
      • Open Access Article
        • Abstract Page
        • Full-Text

        16 - Analysis of the current situation ICT in rural areas of the country (using the Delphi Method)
        mohsen heidary
      • Open Access Article
        • Abstract Page
        • Full-Text

        17 - An Investigation into the Provider Factors of Knowledge Management in the Kermanshah province Communication Company
        hussein moomivand
      • Open Access Article
        • Abstract Page
        • Full-Text

        18 - طراحی اولین پایگاه داده کلمات دستنویس کردی برای سیستم های تشخیص تصویری کلمات
        fatemeh daneshfar basir alagheband vahid sharafi
      • Open Access Article
        • Abstract Page
        • Full-Text

        19 - A Novel Model for detecting intrusion with Mobile Agent and Game theory
        Amin Nezarat mehdi raja Gholamhossein Dastghaibyfard
      • Open Access Article
        • Abstract Page
        • Full-Text

        20 - A proper method for the advertising email classification based on user’s profiles
        rahim hazratgholizadeh Mohammad Fathian
      • Open Access Article
        • Abstract Page
        • Full-Text

        21 - A New Method to computational intelligence to improve network lifetime in wireless sensor networks
        faezeh talebian hassan khotanloo mansour esmaeilpour
      • Open Access Article
        • Abstract Page
        • Full-Text

        22 - Present an Initial Estimation Method for Logical Transaction-based Software Projects
        mehrdad shahsavari
      • Open Access Article
        • Abstract Page
        • Full-Text

        23 - Optimized Modeling for satisfaction in the relationship between a physician and patient based on machine learnin methods
        Fatemeh Saghafi mojtaba shadmehr Zainabolhoda Heshmati Hadi Veisi
      • Open Access Article
        • Abstract Page
        • Full-Text

        24 - An optimised hybrid method for ambulance dispatch based on complex networks and Artificial Intelligence
        Zainabolhoda Heshmati Mehdi Teimouri mehdi zarkeshzade Hadi Zare
      • Open Access Article
        • Abstract Page
        • Full-Text

        25 - Beautiful and Meaningful Iranian Names Production by Genetic Algorithm using Artificial Neural Network-Based Fitness Function
        Amir Shahab Shahmiri bahare zamani saeed shiry
      • Open Access Article
        • Abstract Page
        • Full-Text

        26 - Improvement of mean shift tracker for tracking of target with variable photometric pattern
        Payman Moallem javad abbaspour alireza memarmoghada masoud kavoshtehrani
      • Open Access Article
        • Abstract Page
        • Full-Text

        27 - Determination of Optimum SVMs Based on Genetic Algorithm in Classification of Hyper spectral Imagery
        farhad samadzadegan hadise hassani
      • Open Access Article
        • Abstract Page
        • Full-Text

        28 - Medial-axis Enhancement of Tubular Structures and its Application in the Extraction of Portal Veins
        amirhossein forouza reza aghaeizade youshi sato masa houri
      • Open Access Article
        • Abstract Page
        • Full-Text

        29 - A New Approach to Extract and Utilize Learners Social Relationships through Analyzing Forums Structure and Contents
        Somayeh Ahari
      • Open Access Article
        • Abstract Page
        • Full-Text

        30 - Multimedia teaching and its effects on learning and retention of English grammar
        Somayeh Ahari
      • Open Access Article
        • Abstract Page
        • Full-Text

        31 - The Evaluation of E-learning by Benchmarking Approach Iran Higher Education as a Case Study
        Somayeh Ahari
      • Open Access Article
        • Abstract Page
        • Full-Text

        32 - Assessing the e-service quality of Payame Noor University
        Somayeh Ahari
      • Open Access Article
        • Abstract Page
        • Full-Text

        33 - Ontology-Based Up gradation of Entrepreneurship Skills Using Educational Portals
        Somayeh Ahari
      • Open Access Article
        • Abstract Page
        • Full-Text

        34 - Extracting the Information Technology architecture of hospitals with approach of Implementing in Iran
        Atefehsadat Haghighathoseini atefe haghighathosseini hossein bobarshad hadi zare
      • Open Access Article
        • Abstract Page
        • Full-Text

        35 - using clustering in AODV routing protocol for vehicular ad-hoc networks on highway scenario
        amin feyzi
      • Open Access Article
        • Abstract Page
        • Full-Text

        36 - A conceptual model for identification of eservices quality in Iranian estores
        Mohammad Fathian
      • Open Access Article
        • Abstract Page
        • Full-Text

        37 - Design, simulation and performance comparison of radating elements of reflect array antenna
        iman aryanian gholamreza moradi abdolali abdipour
      • Open Access Article
        • Abstract Page
        • Full-Text

        38 - A Model for impacts of Investment in IT on customer satisfaction, using Structural Equation Modeling and Path Analysis
        jafar bagherinejad behtaj rasouli
      • Open Access Article
        • Abstract Page
        • Full-Text

        39 - Increasing data throughput in HF channel by decision feedback equalizer employing MC-FQRD-RLS algorithm and weight extraction in data mode
        yahya ravaie Mohammad mahdinejadnouri mohammadhosein madani
      • Open Access Article
        • Abstract Page
        • Full-Text

        40 - Design a Model Of System Dynamics (SD) On The Policy Of Upgrading Indices Of Iran ICT Network
        hamid honarparvaran
      • Open Access Article
        • Abstract Page
        • Full-Text

        41 - Investigation on Faculty Members’ Competency Model in Virtual Environment Comment by the Faculty Members and Students (Based on Ormaner’s Model)
        maghsod farasatkhah مریم  فرهنگی
      • Open Access Article
        • Abstract Page
        • Full-Text

        42 - Investigating the Degree of Application of Professional Ethics and Vocational Qualifications by the Faculty Members of Virtual Universities of Isfahan and Medical Sciences University of Isfahan
        mahboobeh Narimani bibieshrat zamani atefe asemi
      • Open Access Article
        • Abstract Page
        • Full-Text

        43 - The Ranking Lack of Success Factors of Electronic Commerce in Technical Infrastructure in Tile and Ceramic Factories in Meybod County
        edehghani edehghani
      • Open Access Article
        • Abstract Page
        • Full-Text

        44 - Multicast computer network routing using genetic algorithm and ant colony
        Mohammad Pourmahmood Aghababa
      • Open Access Article
        • Abstract Page
        • Full-Text

        45 - Investigating the Effects of Hardware Parameters on Power Consumptions in SPMV Algorithms on Graphics Processing Units (GPUs)
        Farshad Khunjush
      • Open Access Article
        • Abstract Page
        • Full-Text

        46 - Cyber Threats Foresight Against Iran Based on Attack Vector
        mahdi omrani masoud shafiee siavash khorsandi
        20.1001.1.27170411.1396.9.33.7.2
      • Open Access Article
        • Abstract Page
        • Full-Text

        47 - The Participation of Three Brain Tissues in Alzheimer’s disease Diagnosis from Structural MRI
        Shima Tajeddini Habibollah  Danyali Mohammad Sadegh  Helfroush Yaghoub  Fatemi
        20.1001.1.27170411.1396.9.33.1.6
      • Open Access Article
        • Abstract Page
        • Full-Text

        48 - Parametric analysis of a broadband Archimedean spiral antenna with cavity
        Hamed  noroozy Shahrokh  jam
        20.1001.1.27170411.1396.9.33.2.7
      • Open Access Article
        • Abstract Page
        • Full-Text

        49 - Improvement of the bulk sensitivity and FoM of the plasmonic nanodipole antenna array
        Samira  Amiri Najmeh  Nozhat
        20.1001.1.27170411.1396.9.33.4.9
      • Open Access Article
        • Abstract Page
        • Full-Text

        50 - A design of Rectangular Waveguide TM11 to TE10 Mode Converter for S-band Applications
        Hamed  noroozy Hossein  Chabok Samane  Pakniyat
        20.1001.1.27170411.1396.9.33.6.1
      • Open Access Article
        • Abstract Page
        • Full-Text

        51 - Modified orthogonal chaotic colonial competition algorithm and its application in improving pattern recognition in multilayer perceptron neural network
        Payman Moallem mehrdad sadeghi hariri MAHDI hashemi
        20.1001.1.27170411.1397.10.35.1.7
      • Open Access Article
        • Abstract Page
        • Full-Text

        52 - Adaptive rotation models and traffic patterns to reduce light loss in networks on optical chip
        bahareh asadi midia reshadi Ahmad khademzade mostafa karbasi
        20.1001.1.27170411.1397.10.35.3.9
      • Open Access Article
        • Abstract Page
        • Full-Text

        53 - Provide a framework for enhancing the security of IoT-based smart homes using the IoT-A reference architecture
        Sattar Hashemi shahrouz sotoudeh
        20.1001.1.27170411.1397.10.35.4.0
      • Open Access Article
        • Abstract Page
        • Full-Text

        54 - Using a Hybrid PSO-GA Method for Capacitor Placement in Distribution Systems
        mohammadmahdi Varahram amir mohammadi
        20.1001.1.27170411.1393.6.20.1.9
      • Open Access Article
        • Abstract Page
        • Full-Text

        55 - Semiautomatic Creation of Enterprise Mashups Using Semantic Descriptions
        shahriyar mohammadi ali khalili
      • Open Access Article
        • Abstract Page
        • Full-Text

        56 - Determining the factors affecting the collective financing of knowledge-based IT companies
        Ali Haji Gholam Saryazdi ali rajabzadeh ghotri alinaghi mashayekhi alireza hassanzade
        20.1001.1.27170411.1397.10.37.4.4
      • Open Access Article
        • Abstract Page
        • Full-Text

        57 - Design of FPGA-based processor for SHA-2 series cryptographic algorithms Design ترجمه‌های design اسمفراوانی طرح plan, design, layout, project, scheme, plot نقشه map, plan, plot, scheme, plat, chart زمینه background, context, ground, setting, base, terrain تدبیر measure, plan, contraption, gimmick, contrivance, scheme قصد intention, intent, purpose, attempt, will, determination طراح ریزی design خیال imagination, phantom, illusion, thought, fiction, mind فعل طرح کردن design, plan, draft, draw, lay, bring forth قصد کردن attempt, decide, design, meditate تخصیص دادن allot, allocate, apportion, consecrate, give, design تدبیر کردن devise, contrive, meditate, compass, machinate, design تعریف‌های design اسم ۱ a plan or drawing produced to show the look and function or workings of a building, garment, or other object before it is built or made. he has just unveiled his design for the new museum مترادف‌ها: planblueprintdrawingscale drawingsketchoutlinemapplotdiagramdelineationdraftdepictionrepresentationartist's impressionschememodelprototypeproposal ۲ an arrangement of lines or shapes created to form a pattern or decoration. pottery with a lovely blue and white design مترادف‌ها: patternmotifdevicestylearrangementcompositionmakeuplayoutconstitutionconfigurationorganizationconstructionshapeformformationfigure purpose, planning, or intention that exists or is thought to exist behind an action, fact, or material object. the appearance of design in the universe مترادف‌ها: intentionaimpurposeplanintentobjectiveobjectgoalendtargetpointhopedesirewishdreamaspirationambitionidea فعل ۱ decide upon the look and functioning of (a building, garment, or other object), by making a detailed drawing of it. a number of architectural students were designing a factory مترادف‌ها: plandraw plans ofdrawsketchoutlinemap outplotblock outdelineatedraftdepictinventoriginatecreatethink upcome up withdeviseformformulateconceivemakeproducedevelopfashionfabricateforgehatchcoindream up مترادف design اسم planpatternintention فعل planinventdream upintend ۹۱ مترادف دیگر
        neda sedghahrabi Mohammad Ali Jabraeil Jamali
        20.1001.1.27170414.1397.10.37.1.6
      • Open Access Article
        • Abstract Page
        • Full-Text

        58 - Learning to Rank for the Persian Web Using the Layered Genetic Programming
        Amir Hosein Keyhanipour
      • Open Access Article
        • Abstract Page
        • Full-Text

        59 - Scheduling tasks in cloud environments using mapping framework - reduction and genetic algorithm
        nima khezr nima jafari novimipour
        20.1001.1.27170414.1397.10.37.2.7
      • Open Access Article
        • Abstract Page
        • Full-Text

        60 - Content and structural analysis of online forums in order to extract users' social relationships and use them in grouping mechanisms.
        Fatemeh  Orojie fataneh taghiyareh
      • Open Access Article
        • Abstract Page
        • Full-Text

        61 - Evaluation of e-learning with optimal mining approach 1 case study: Iran's higher education
        abbas anarinejad aliakbar safavi farshad moradi
      • Open Access Article
        • Abstract Page
        • Full-Text

        62 - Assessing the state of e-service excellence gap in Payam-Noor University
        Mahdi Moeinie Kia Adel Zahd bablan
      • Open Access Article
        • Abstract Page
        • Full-Text

        63 - Improving the entrepreneurial skills of Hastan-nagar capital by using the entrepreneurship training portal
        Maryam Tayfeh-Mahmoudi Mahtab Payvast Mahdi Mohsenie Mahmod Kharate sima babadi
      • Open Access Article
        • Abstract Page
        • Full-Text

        64 - Modification of medium transfer detector for target tracking with variable radiation pattern
        Payman Moallem عليرضا  معمارمقدم جواد  عباس پور masoud kavoshtehrani
        20.1001.1.27170414.1391.4.14.1.8
      • Open Access Article
        • Abstract Page
        • Full-Text

        65 - Determining optimal support vector machines in classification of hyperspectral images based on genetic algorithm
        farhad samadzadegan Hadis Hasani
        20.1001.1.27170414.1391.4.14.2.9
      • Open Access Article
        • Abstract Page
        • Full-Text

        66 - Reinforcement of the central axis of tubular structures and its application in extracting the central axis of the portal vein
        amirhossein forouza reza aghaeizade یوشی¬نبو  ساتو ماساتوشی  هوری
        20.1001.1.27170414.1391.4.14.4.1
      • Open Access Article
        • Abstract Page
        • Full-Text

        67 - Routing of Multipartite Computer Networks Using Ant Genetic Algorithm
        Mohammad Pourmahmood Aghababa amin bahadorani baghbaderani
        20.1001.1.27170411.1396.9.31.1.2
      • Open Access Article
        • Abstract Page
        • Full-Text

        68 - Improving recommender systems with the help of Semantic Web
        rahele beheshti mohammad ebrahim samie ali hamze
        20.1001.1.27170411.1396.9.31.4.5
      • Open Access Article
        • Abstract Page
        • Full-Text

        69 - Provide a new architecture for the decision support system to manage stock trading based on a combination of financial indicators
        Masoud Mansoury bijan mansouri S. Alireza hashemi G.
        20.1001.1.27170411.1396.9.31.6.7
      • Open Access Article
        • Abstract Page
        • Full-Text

        70 - Investigating the Effect of Hardware Parameters Adjustments on Energy Consumption in Thin Matrix Multiplication Algorithm on GPUs
        mina ashouri Farshad Khunjush
        20.1001.1.27170411.1396.9.31.7.8
      • Open Access Article
        • Abstract Page
        • Full-Text

        71 - Provide a conceptual model to identify the quality of electronic services in the country's online stores
        marziye rahmani Mohammad Fathian saied yaghoubi
        20.1001.1.27170411.1395.8.30.1.3
      • Open Access Article
        • Abstract Page
        • Full-Text

        72 - Application of clustering in AODV routing protocol for intercity networks on the highway scenario
        amin feyzi Vahid Sattari-Naeini majid mohammadi
        20.1001.1.27170411.1395.8.30.3.5
      • Open Access Article
        • Abstract Page
        • Full-Text

        73 - Designing a system dynamics model for upgrading policy Iran Information and Communication Technology Network Indicators
        alinaghi moslehshirazi ali mohammadi habibollah ranaei hamid honarparvaran
        20.1001.1.27170411.1395.8.30.5.7
      • Open Access Article
        • Abstract Page
        • Full-Text

        74 - Door detection based on car vision in outdoor scenes
        abbas vafaei Mehdi Talebi monadjemi monadjemi
        20.1001.1.27170411.1395.8.30.6.8
      • Open Access Article
        • Abstract Page
        • Full-Text

        75 - Providing a suitable method for categorizing promotional e-mails based on user profiles
        Mohammad fathiyan rahim hazratgholizadeh
        20.1001.1.27170411.1395.8.27.1.7
      • Open Access Article
        • Abstract Page
        • Full-Text

        76 - Extracting hospital information technology architecture with the approach of implementation capability in Iran
        hossein bobarshad Atefehsadat Haghighathoseini Hadi Zare
        20.1001.1.27170411.1395.8.27.4.0
      • Open Access Article
        • Abstract Page
        • Full-Text

        77 - Presenting a model for using mobile agents in distributed intrusion detection systems based on game theory
        امین نظارات مهدی رجا Gholamhossein Dastghaibyfard
        20.1001.1.27170411.1395.8.27.6.2
      • Open Access Article
        • Abstract Page
        • Full-Text

        78 - Optimum modeling of patient satisfaction with the doctor based on machine learning methods
        - شادمهر Zainabolhoda Heshmati Fatemeh saghafi Hadi Veisi
        20.1001.1.27170411.1394.7.24.5.8
      • Open Access Article
        • Abstract Page
        • Full-Text

        79 - Presenting a method based on computational intelligence to improve energy consumption in smart wireless sensor networks
        faezeh talebian حسن  ختن¬لو منصور  اسماعیل¬پور
        20.1001.1.27170411.1394.7.24.1.4
      • Open Access Article
        • Abstract Page
        • Full-Text

        80 - Providing an optimal method for dispatching an ambulance based on complex networks and artificial intelligence
        مهدی زرکش زاده Zainabolhoda Heshmati Hadi Zare Mehdi Teimouri
        20.1001.1.27170411.1394.7.24.4.7
      • Open Access Article
        • Abstract Page
        • Full-Text

        81 - A matching probability-based flood algorithm for mobile ad hoc networks
        fateme nourazar sabaei sabaei
      • Open Access Article
        • Abstract Page
        • Full-Text

        82 - Correcting camera lens misalignment using Zernik moments
        kambiz rahbar karim faez
      • Open Access Article
        • Abstract Page
        • Full-Text

        83 - Training of MLP neural network in image compression using GSA method
        maryam dehbashian hamid zahiri
      • Open Access Article
        • Abstract Page
        • Full-Text

        84 - Correcting both camera lens misalignment and image de-centering error using modified Zernik model
        20.1001.1.27170411.1394.7.26.2.9
      • Open Access Article
        • Abstract Page
        • Full-Text

        85 - Matched grouping of learners in e-learning environment using council clustering method
        malihe kamareiy gholamali montazer
        20.1001.1.27170414.1398.11.39.1.7
      • Open Access Article
        • Abstract Page
        • Full-Text

        86 - Using web analytics in forecasting the stock price of chemical products group in the stock exchange
        amir daee Omid Mahdi Ebadati E. keyvan borna
        20.1001.1.27170414.1398.11.39.2.8
      • Open Access Article
        • Abstract Page
        • Full-Text

        87 - Routing improvement to control congestion in software defined networks by using distributed controllers
        saied bakhtiyari Ardeshir Azarnejad
        20.1001.1.27170414.1398.11.39.3.9
      • Open Access Article
        • Abstract Page
        • Full-Text

        88 - Provide a model of human resource knowledge architecture in knowledge-based organizations using a mixed approach
        abdollah saedi reza sepahvand najmoddin mosavi Mohammad hakkak
        20.1001.1.27170414.1398.11.39.4.0
      • Open Access Article
        • Abstract Page
        • Full-Text

        89 - Investigating the effect of using various marketing strategies on social networks on gaining the trust of council customers Investigating ترجمه‌های investigate فعلفراوانی بررسی کردن investigate, check, peruse, survey, study رسیدگی کردن consider, attend, check, investigate, inspect, investigate استفسار کردن investigate وارسی کردن sift, investigate پژوهیدن investigate, inquire, research, search تحقیق کردن investigate, inquire, verify, assay, interrogate, question اطلاعات مقدماتی بدست اوردن investigate جستار کردن investigate تفتیش کردن inquire, inspect, investigate, revise باز جویی کردن examine, assay, inquire, interrogate, investigate, cross-examine تعریف‌های investigate فعل ۱ carry out a systematic or formal inquiry to discover and examine the facts of (an incident, allegation, etc.) so as to establish the truth. police are investigating the alleged beating مترادف‌ها: check outsuss outgive something the once-overscope outinquire intolook intogo intolook overprobeexplorescrutinizeconduct an investigation intoconduct an inquiry intomake inquiries abouttry to get to the bottom ofinspectanalyzestudyexamineconsiderresearchsearch/sift the evidence concerningpore overdelve intoauditevaluatefollow up مترادف investigate فعل check outsuss outgive something the once-overscope out inquire intolook intogo intolook overprobeexplorescrutinizeconduct an investigation intoconduct an inquiry intomake inquiries abouttry to get to the bottom ofinspectanalyzestudyexamineconsiderresearchsearch/sift the evidence concerningpore overdelve intoauditevaluatefollow up همچنین ببینید investigate
        farzaneh milani jafari zenouzi
        20.1001.1.27170414.1398.11.39.5.1
      • Open Access Article
        • Abstract Page
        • Full-Text

        90 - Criteria for evaluating the effectiveness of social media users - a framework based on social media exploration
        rojyar pirmohammadiani shahriyar mohammadi
      • Open Access Article
        • Abstract Page
        • Full-Text

        91 - A model information technology adoption in academic research projects in the filed ICT based on Information Technology Adoption Integrated Modeling (ITAIM)
        Shahram Aliyari masoud movahedi sirous kazemian
        20.1001.1.27170411.1398.11.41.4.9
      • Open Access Article
        • Abstract Page
        • Full-Text

        92 - Introducing a genetic algorithm based Method for Community person's stance Detection in social media and news
        mehdi salkhordeh haghighi Seyyed Mohammad  ebrahimi
        20.1001.1.27170411.1398.11.41.6.1
      • Open Access Article
        • Abstract Page
        • Full-Text

        93 - Increasing the value of collected data and reducing energy consumption by using network coding and mobile sinks in wireless sensor networks
        ehsan kharati
        20.1001.1.27170414.1399.12.43.3.4
      • Open Access Article
        • Abstract Page
        • Full-Text

        94 - Using a multi-objective optimization algorithm for tasks allocate in the cloud-based systems to reduce energy consumption
        sara tabaghchimilan nima jafari novimipour
        20.1001.1.27170414.1399.12.43.5.6
      • Open Access Article
        • Abstract Page
        • Full-Text

        95 - Fast and accurate concept drift detection from event logs
        mahdi yaghoobi ali sebti Soheila Karbasi
        20.1001.1.27170414.1399.12.43.7.8
      • Open Access Article
        • Abstract Page
        • Full-Text

        96 - Improving performance of probe-based rate control mechanisms using classification: evaluation on an experimental testbed for High Throughput WLANs
        ghalibaf ali Mohammad Nassiri mohammadhassan daei mahdi sakhaei
        20.1001.1.27170414.1399.12.43.9.0
      • Open Access Article
        • Abstract Page
        • Full-Text

        97 - An access control model for online social networks using user-to-user relationships
        Mohamad Javad Piran mahmud deypir
        20.1001.1.27170411.1399.12.45.1.1
      • Open Access Article
        • Abstract Page
        • Full-Text

        98 - The role of organizational factors on consumer buying behavior in social networks
        zohreh dehdashti shahrokh Mitra Daneshparvar vahid nasehifar vahid Khashei
        20.1001.1.27170411.1399.12.45.2.2
      • Open Access Article
        • Abstract Page
        • Full-Text

        99 - Improving Efficiency of Finding Frequent Subgraphs in Graph Stream Using gMatrix Summarization
        masoud kazemi Seyed Hossein Khasteh hamidreza rokhsati
        20.1001.1.27170411.1399.12.45.4.4
      • Open Access Article
        • Abstract Page
        • Full-Text

        100 - Improving imperialist competitive algorithm for solving the nodes placement problem in three-dimensional grid wireless sensor networks
        Sayed Wafa Barkhoda Hemmat Sheikhi sudabeh mohammadi
        20.1001.1.27170411.1399.12.45.5.5
      • Open Access Article
        • Abstract Page
        • Full-Text

        101 - A Combination Method of DEA, DEMATEL and ANP for Evaluation of ERP Systems
        amir amini alireza alinezhad
        20.1001.1.27170411.1399.12.45.6.6
      • Open Access Article
        • Abstract Page
        • Full-Text

        102 - Increasing the lifetime of underwater acoustic sensor networks by optimal relay node placement
        zahra mihamadi mohadeseh soleimanpour daryush avasimoghaddam Siamak Talebi
        20.1001.1.27170411.1399.12.45.7.7
      • Open Access Article
        • Abstract Page
        • Full-Text

        103 - Proposing an Information Retrieval Model Using Interval Numbers
        Hooman Tahayori farzad ghahremani
        20.1001.1.27170411.1399.12.45.9.9
      • Open Access Article
        • Abstract Page
        • Full-Text

        104 - Identification of the Factors and Indicators of the Model of Quality Assessment of the Game Industry Services on the Cloud Platform
        Mohammad Taghi Taghavifard mohamadali abaspour
        20.1001.1.27170411.1399.12.45.10.0
      • Open Access Article
        • Abstract Page
        • Full-Text

        105 - High Performance Computing Nessecities Requirements of future generations and research directions
        ehsan arianyan MohammadMahdi Esnaashari Fatemeh Ehsani Boshla Shaghayeghsadat Hossieni bayan Masoud Dehyadegari Behnam Samadi
      • Open Access Article
        • Abstract Page
        • Full-Text

        106 - A Decision Support System based on Rough sets for Enterprise Planning under uncertainty
        سید امیرهادی مینوفام Hassan Rashidi
        20.1001.1.27170414.1400.13.47.1.7
      • Open Access Article
        • Abstract Page
        • Full-Text

        107 - Proposing a New Framework to Decreasing Delay in the Internet of Things by Using Computing Power of Fog
        Mohammad Taghi Shaykhan kianoosh azadi
        20.1001.1.27170414.1400.13.47.2.8
      • Open Access Article
        • Abstract Page
        • Full-Text

        108 - Presenting a new conceptual model for the field of big data and analyzing the data-driven business in Iran based on the proposed model
        Mojgan Farhoodi rezvan kalantari hormozi Hesam Zand Hesami
        20.1001.1.27170414.1400.13.47.3.9
      • Open Access Article
        • Abstract Page
        • Full-Text

        109 - An Intelligent Model for Multidimensional Personality Recognition of Users using Deep Learning Methods
        Hossein Sadr fatemeh mohades deilami morteza tarkhan
        20.1001.1.27170414.1400.13.47.6.2
      • Open Access Article
        • Abstract Page
        • Full-Text

        110 - Sentiment analysis for stock market predection with deep neural network: A case study for international corporate stock database
        hakimeh mansour Saeedeh Momtazi Kamran Layeghi
        20.1001.1.27170414.1400.13.47.7.3
      • Open Access Article
        • Abstract Page
        • Full-Text

        111 - Agile Enterprise Architecture Modeling: Evaluating the Applicability of Six Modeling Standards based on Iran’s National EA Framework
        Ali Razi reza rezaei ahmadali یزدان پناه
        20.1001.1.27170414.1400.13.47.8.4
      • Open Access Article
        • Abstract Page
        • Full-Text

        112 - Use of conditional generative adversarial network to produce synthetic data with the aim of improving the classification of users who publish fake news
        arefeh esmaili Saeed Farzi
        20.1001.1.27170414.1400.13.47.9.5
      • Open Access Article
        • Abstract Page
        • Full-Text

        113 - A RPL-based Routing Algorithm for Multimedia Traffic for the Internet of Things
        Mohammad Khansari Farzaneh Mortazavi
        20.1001.1.27170414.1400.13.47.10.6
      • Open Access Article
        • Abstract Page
        • Full-Text

        114 - A Task Mapping and Scheduling Algorithm based on Genetic Algorithm for Embedded System Design
        mohadese nikseresht Mohsen Raji
        20.1001.1.27170414.1400.13.47.12.8
      • Open Access Article
        • Abstract Page
        • Full-Text

        115 - A value Co-creation model for Information and Communication Technology Entrepreneurial Ecosystem
        Mohsen Pazari Manijeh Haghighinasab Jamshid Edalatian Shariairi
        20.1001.1.27170411.1400.13.49.1.6
      • Open Access Article
        • Abstract Page
        • Full-Text

        116 - Investigating the Information and Communication Technology Deployment Impact on Energy Expenditures of Iranian households (A Provincial Approach)
        Elham Hosseinzadeh َAmir Hossein Mozayani
        20.1001.1.27170411.1400.13.49.3.8
      • Open Access Article
        • Abstract Page
        • Full-Text

        117 - Providing a model for evaluating native electronic content in Iran based on value chain
        Tahereh Mirsaeedghazi masoumeh sadeghi Mandana Farzaneh Sogol   Babazadeh Mahmood Kharrat nasrin dastranj homeyra moghadami behrooz eliasi
        20.1001.1.27170411.1400.13.49.4.9
      • Open Access Article
        • Abstract Page
        • Full-Text

        118 - Stability Analysis of Networked Control Systems under Denial of Service Attacks using Switching System Theory
        Mohammad SayadHaghighi Faezeh Farivar
        20.1001.1.27170411.1400.13.49.5.0
      • Open Access Article
        • Abstract Page
        • Full-Text

        119 - An efficient Two Pathways Deep Architecture for Soccer Goal Recognition towards Soccer Highlight Summarization
        Amirhosein Zangane Mehdi Jampour Kamran Layeghi
        20.1001.1.27170414.1400.13.49.5.5
      • Open Access Article
        • Abstract Page
        • Full-Text

        120 - A Collaborative Filtering Movie Recommendation System Based on Users Correlation and Weighted K-Means with High Accuracy
        Nozar Ebrahimi Lame Fatemeh saghafi Majid Gholipour
        20.1001.1.27170411.1401.14.51.1.7
      • Open Access Article
        • Abstract Page
        • Full-Text

        121 - Architectural tactics identification in source code based on a semantic approach
        Ehsan Sharifi Ahmad عبداله زاده بارفروش
        20.1001.1.27170411.1401.14.51.2.8
      • Open Access Article
        • Abstract Page
        • Full-Text

        122 - Employing a meta-synthesis to present a framework for commercial banks’ preparedness indicators in use of blockchain technology
        Zahra Khalili Masoud Keimasi Javad Abbasi Mohammadali Shahhosseini
        20.1001.1.27170411.1400.13.49.8.3
      • Open Access Article
        • Abstract Page
        • Full-Text

        123 - Investigation the role of personality and individual differences on password security breaches: An Empirical Study
        زهرا کریمی manije kaveh rezvan salehi milad moltaji
        20.1001.1.27170411.1400.13.49.9.4
      • Open Access Article
        • Abstract Page
        • Full-Text

        124 - User recommendation in Telegram messenger by graph analysis and mathematical modeling of users' behavior
        Davod Karimpour Mohammad Ali Zare Chahooki Ali Hashemi
        20.1001.1.27170411.1400.13.49.10.5
      • Open Access Article
        • Abstract Page
        • Full-Text

        125 - Two Fuzzy Virtual Force Algorithms to Improve Sensor Deployment in Wireless Sensor Networks
        Vahid Kiani
        20.1001.1.27170411.1401.14.51.4.0
      • Open Access Article
        • Abstract Page
        • Full-Text

        126 - Open Data Accessing Policymaking in Iran, in the Aspect of Preserving Privacy and Personal Data Ownership
        Behrooz Eliasi معصومه صادقی نسرین دسترنج Mehdi Hosseinpour Tahereh Mirsaeedghazi
        20.1001.1.27170411.1401.14.51.5.1
      • Open Access Article
        • Abstract Page
        • Full-Text

        127 - An Individual-Oriented Shuffled Frog Leaping Algorithm for Solving Vehicle Routing Problem
        Soheila Shafiezadeh Zahra Beheshti
        20.1001.1.27170411.1401.14.51.6.2
      • Open Access Article
        • Abstract Page
        • Full-Text

        128 - A Novel Model based on Encoder-Decoder Architecture and Attention Mechanism for Automatic Abstractive Text Summarization
        hasan aliakbarpor mohammadtaghi manzouri amirmasoud rahmani
        20.1001.1.27170411.1401.14.51.7.3
      • Open Access Article
        • Abstract Page
        • Full-Text

        129 - Exploring the antecedents and consequences of smart good governance using the fuzzy Delphi method (FDM)
        Seyed Abdolrasoul Hosseini Mohammad Ghasemi Nour Mohammad  Yaghubi Habibollah Salarzehi
        20.1001.1.27170411.1401.14.51.8.4
      • Open Access Article
        • Abstract Page
        • Full-Text

        130 - A Multi-Objective Differential Evolutionary Algorithm-based Approach for Resource Allocation in Cloud Computing Environment
        Saeed Bakhtiari Mahan Khosroshahi
        20.1001.1.27170411.1401.14.51.9.5
      • Open Access Article
        • Abstract Page
        • Full-Text

        131 - Using Sentiment Analysis and Combining Classifiers for Spam Detection in Twitter
        mehdi salkhordeh haghighi Aminolah Kermani
        20.1001.1.27170411.1401.14.51.10.6
      • Open Access Article
        • Abstract Page
        • Full-Text

        132 - High Performance Computing: Next Generation Requirements and Research Axes
        ehsan arianyan MohammadMahdi Esnaashari Fatemeh Ehsani Boshla Shaghayeghsadat Hossieni bayan Masoud Dehyadegari Behnam Samadi
        20.1001.1.27170411.1401.14.51.13.9
      • Open Access Article
        • Abstract Page
        • Full-Text

        133 - Improved routing for load balancing in wireless sensor networks on the Internet of things, based on multiple ant colony algorithm
        Farhang Padidaran Moghaddam Hamid Maghsoudi
        20.1001.1.27170411.1401.14.51.16.2
      • Open Access Article
        • Abstract Page
        • Full-Text

        134 - Improving resource allocation in mobile edge computing using gray wolf and particle swarm optimization algorithms
        seyed ebrahim dashti saeid shabooei
      • Open Access Article
        • Abstract Page
        • Full-Text

        135 - Identifying and ranking factors affecting the digital transformation strategy in Iran's road freight transportation industry focusing on the Internet of Things and data analytics
        Mehran Ehteshami Mohammad Hasan Cheraghali Bita Tabrizian Maryam Teimourian sefidehkhan
      • Open Access Article
        • Abstract Page
        • Full-Text

        136 - Priority based Deployment of IoT Applications in Fog
        Masomeh Azimzadeh Ali Rezaee Somayyeh  Jafarali Jassbi MohammadMahdi Esnaashari
      • Open Access Article
        • Abstract Page
        • Full-Text

        137 - Intrusion Detection Based on Cooperation on the Permissioned Blockchain Platform in the Internet of Things Using Machine Learning
        Mohammad Mahdi  Abdian majid ghayori Seyed Ahmad  Eftekhari
      • Open Access Article
        • Abstract Page
        • Full-Text

        138 - Multi-level ternary quantization for improving sparsity and computation in embedded deep neural networks
        Hosna Manavi Mofrad Seyed Ali ansarmohammadi Mostafa Salehi
      • Open Access Article
        • Abstract Page
        • Full-Text

        139 - Anomaly and Intrusion Detection through Datamining and Feature Selection using PSO Algorithm
        Fereidoon Rezaei Mohamad Ali Afshar Kazemi Mohammad Ali Keramati
      • Open Access Article
        • Abstract Page
        • Full-Text

        140 - Identifying the Key Drivers of Digital Signature Implementation in Iran (using fuzzy Delphi method)
        Ghorbanali Mehrabani Fatemeh Zargaran khouzani
      • Open Access Article
        • Abstract Page
        • Full-Text

        141 - Modeling and evaluation of RPL routing protocol by colored Petri nets
        Mohammad Pishdar Younes Seifi
        20.1001.1.27170411.1401.14.53.2.2
      • Open Access Article
        • Abstract Page
        • Full-Text

        142 - Three Dimensional Beamforming in Multi User Multi Antenna Cellular Networks with Randomly Distributed Users
        S. Mohammad Razavizadeh Nasim Mohammadi
        20.1001.1.27170411.1401.14.53.7.7
      • Open Access Article
        • Abstract Page
        • Full-Text

        143 - Design and fabrication of the E-field probe for the measurement of the electromagnetic fields in 5G frequency band
        Reza Bahri Mahdi Fasanghari Ahmadreza Eskandari Vahid Yazdanian
        20.1001.1.27170411.1401.14.53.13.3
      • Open Access Article
        • Abstract Page
        • Full-Text

        144 - A review of the application of meta-heuristic algorithms in load balancing in cloud computing
        Mehdi Morsali Abolfazl Toroghi Haghighat Sasan Hosseinali-Zade
        20.1001.1.27170411.1401.14.53.14.4
      • Open Access Article
        • Abstract Page
        • Full-Text

        145 - An approach to prioritize quality dimensions of based on cloud computing using Multiple Criteria Decision Making method
        Zahra Abbasi Somayeh Fatahi Mohammad Javad  Ershadi
        20.1001.1.27170411.1401.14.53.10.0
      • Open Access Article
        • Abstract Page
        • Full-Text

        146 - Data-driven Marketing in Digital Businesses from Dynamic Capabilities View
        Maede  Amini vlashani ayoub mohamadian Seyed Mohammadbagher Jafari
        20.1001.1.27170411.1401.14.53.15.5
      • Open Access Article
        • Abstract Page
        • Full-Text

        147 - A comprehensive survey on the influence maximization problem in social networks
        mohsen taherinia mahdi Esmaeili Behrooz Minaei
        20.1001.1.27170411.1401.14.53.16.6
      • Open Access Article
        • Abstract Page
        • Full-Text

        148 - Fault Diagnosis and Detection in Photovoltaic Systems Using Neural Network VGG16
        ُSamaneh Azimi Mohammad Manthouri Mehdi Akhbari
      • Open Access Article
        • Abstract Page
        • Full-Text

        149 - Presenting the ICT Policies Implementation Model of the 6th Development Using the Neural Network Method
        Nazila Mohammadi Gholamreza   Memarzadeh Tehran Sedigheh Tootian Isfahani
      • Open Access Article
        • Abstract Page
        • Full-Text

        150 - Community Detection in Bipartite Networks Using HellRank Centrality Measure
        Ali Khosrozadeh Ali Movaghar Mohammad Mehdi Gilanian Sadeghi Hamidreza Mahyar
      • Open Access Article
        • Abstract Page
        • Full-Text

        151 - Presenting a Method for Agile Enterprise Architecture Modeling
        Ali Razi Reza Rezaei Ahmad Ali Yazdanpanah
      • Open Access Article
        • Abstract Page
        • Full-Text

        152 - An Overview on Replica Consistency Methods in Distributed Systems and Future Works
        Mahsa Beigrezaei
      • Open Access Article
        • Abstract Page
        • Full-Text

        153 - Application identification through intelligent traffic classification
        Shaghayegh Naderi
      • Open Access Article
        • Abstract Page
        • Full-Text

        154 - Designing A New Genetic-Fuzzy Type 2 Approach to Evaluate Self-Adaptive Systems by Software Quality Indicators
        Majid Abdolrazzagh-Nezhad Eshrat   Zargari Mehdi Kherad
      • Open Access Article
        • Abstract Page
        • Full-Text

        155 - Survey on the Applications of the Graph Theory in the Information Retrieval
        Maryam Piroozmand Amir Hosein Keyhanipour Ali Moeini
      • Open Access Article
        • Abstract Page
        • Full-Text

        156 - The Relevance, Importance and Dependence of Critical Infrastructures of The Islamic Republic of Iran from a Cyber-Perspective
        Abouzar Solat Rafiee Hossein Gharaee Garakani Fatemeh Saghafi Mohammad Malekinia
      • Open Access Article
        • Abstract Page
        • Full-Text

        157 - Trust Based Link Prediction Using Fuzzy Computational Model in Social Networks
        Fateme Hoseinkhani Ali Harounabadi ُُُُSaeed Setayeshi
      • Open Access Article
        • Abstract Page
        • Full-Text

        158 - Energy-Efficient Fixed-Point Hardware Accelerator for Embedded DNNs
        Marzie Mastalizade Ali Ansarmohammadi Najme Nazari Mostafa Salehi
      • Open Access Article
        • Abstract Page
        • Full-Text

        159 - Explanation the role of standardization in the proposed solutions for privacy protection in health data
        batool mehrshad Mohammad mehraeen Mohammad Khansari saeed mortazavi
      • Open Access Article
        • Abstract Page
        • Full-Text

        160 - A Recommender System Based on the Analysis of Personality Traits in Telegram Social Network
        Mohammad Javad shayegan mohadeseh valizadeh
      • Open Access Article
        • Abstract Page
        • Full-Text

        161 - Emerging technologies in future generations of high performance computing: introduction, taxonomy and future research directions
        mahmood nematollahzadeh ehsan arianyan Masoud Hayeri Khyavi niloofar gholipoor abdollah sepahvand
        20.1001.1.27170411.1402.15.55.2.3
      • Open Access Article
        • Abstract Page
        • Full-Text

        162 - Valuation of digital services in Iran: Empirical proof for Google and Instagram
        FARHAD ASGHARI ESTIAR AMIR MOHAMMADZADEH Ebrahim  Abbasi
        10.61186/jict.43901.15.55.14
        20.1001.1.27170411.1402.15.55.3.4
      • Open Access Article
        • Abstract Page
        • Full-Text

        163 - Information Technology, Strategy Implementation, Information Systems, Strategic Planning, Input-Process-Outcome Framework
        Mona Jami Pour Shahnaz Akbari Emami Safora Firozeh
        20.1001.1.27170411.1402.15.55.6.7
      • Open Access Article
        • Abstract Page
        • Full-Text

        164 - The effect of Internet of Things (IOT) implementation on the Rail Freight Industry; A futures study approach
        Noureddin Taraz Monfared علی شایان ali rajabzadeh ghotri
        20.1001.1.27170411.1402.15.55.10.1
      • Open Access Article
        • Abstract Page
        • Full-Text

        165 - Liquidity Risk Prediction Using News Sentiment Analysis
        hamed mirashk albadvi albadvi mehrdad kargari Mohammad Ali Rastegar Mohammad Talebi
        20.1001.1.27170411.1402.15.55.14.5
      • Open Access Article
        • Abstract Page
        • Full-Text

        166 - Identify and analyze decision points and key players in procurement process in the EPC companies
        Seyedeh Motahareh  Hosseini Mohammad aghdasim
        20.1001.1.27170411.1402.15.55.15.6
      • Open Access Article
        • Abstract Page
        • Full-Text

        167 - The framework of the national macro plan for transparency and information release based on the grounded theory method
        Mahdi Azizi MehmanDoost Mohammad Reza Hosseini reza taghipour Mojtaba Mazoochi
        10.61186/jict.44095.15.57.31
        20.1001.1.27170411.1402.15.57.3.8
      • Open Access Article
        • Abstract Page
        • Full-Text

        168 - Drivers, Obstacles and consequences of digital entrepreneurship in Iran's road freight transportation industry
        Azam sadtat Mortazavi kahangi Parviz Saketi Javad Mehrabi
        10.61186/jict.44097.15.57.48
      • Open Access Article
        • Abstract Page
        • Full-Text

        169 - WSTMOS: A Method For Optimizing Throughput, Energy, And Latency In Cloud Workflow Scheduling
        Arash Ghorbannia Delavar Reza Akraminejad sahar mozafari
        20.1001.1.27170411.1402.15.57.5.0
      • Open Access Article
        • Abstract Page
        • Full-Text

        170 - Improvement of intrusion detection system on Industrial Internet of Things based on deep learning using metaheuristic algorithms
        mohammadreza zeraatkarmoghaddam majid ghayori
        20.1001.1.27170411.1402.15.57.12.7
      • Open Access Article
        • Abstract Page
        • Full-Text

        171 - Improving the load balancing in Cloud computing using a rapid SFL algorithm (R-SFLA)
        Kiomars Salimi Mahdi Mollamotalebi
        20.1001.1.27170411.1402.15.57.13.8
      • Open Access Article
        • Abstract Page
        • Full-Text

        172 - Evaluation of Interpolation Methods for Estimating the Fading Channels in Digital TV Broadcasting
        Ali Pouladsadeh Mohammadali Sebghati
        20.1001.1.27170411.1402.15.57.14.9
      • Open Access Article
        • Abstract Page
        • Full-Text

        173 - A framework for architecture the electronic trust in e-commerce:online shopping segment
        amir Mohtarami Akbar amini
        20.1001.1.27170411.1402.15.57.15.0
      • Open Access Article
        • Abstract Page
        • Full-Text

        174 - Improving IoT resource management using fog calculations and ant lion optimization algorithm
        payam shams Seyedeh Leili Mirtaheri reza shahbazian ehsan arianyan
        20.1001.1.27170411.1402.15.57.16.1
      • Open Access Article
        • Abstract Page
        • Full-Text

        175 - Energy procurement of a cellular base station in independent microgrids with electric vehicles and renewable energy sources: Mixed-integer nonlinear programming model
        Reza Bahri saeed zeynali
        20.1001.1.27170411.1402.15.57.18.3
      • Open Access Article
        • Abstract Page
        • Full-Text

        176 - Trust Management Based on User Feedback in Cloud Computing Environment by Using Cuckoo Optimization Algorithm
        Muqtada Soleimani Mobarake Golnaz Aghaee Babak Nikmard
      • Open Access Article
        • Abstract Page
        • Full-Text

        177 - Improving Code Coverage Metrics for Discovering Vulnerabilities in Stateful Network Protocols using Hybrid Fuzzing
        Hamid Rezaei Rahvard Mehdi Salkhordeh Haghighi
      • Open Access Article
        • Abstract Page
        • Full-Text

        178 - Adaptive Real-Time Decision-Making in the IoT-Based Supply Chain Considering Gradual Orders
        ّFatemeh Mohammadi Chinisaz S. Alireza Hashemi G. Saeed  Sharifian Khortoomi
      • Open Access Article
        • Abstract Page
        • Full-Text

        179 - Generating Personalized Explanations for Twitter List Recommendations Using Semantic Similarity of Hashtags
        Havva Alizadeh Noughabi Behshid Behkamal Saleheh Naseri Mohsen Kahani
      • Open Access Article
        • Abstract Page
        • Full-Text

        180 - Automatic identification of personality traits using X contents based on Myers Briggs index
        Melika Kalhor Mitra Mirzarezaee Touraj  BaniRostam
      • Open Access Article
        • Abstract Page
        • Full-Text

        181 - Detecting Distributed Denial of Service Attacks in Software-Defined Networks with a Deep Learning Approach
        Younes Mehdizadeh Mehdi Sadeghzadeh
      • Open Access Article
        • Abstract Page
        • Full-Text

        182 - BIG DATA
        Behshid Behkamal
      • Open Access Article
        • Abstract Page
        • Full-Text

        183 - Investigating an Approach to Identify and Classify Mutants Based on the Characteristics of Mutants with Machine Learning Algorithms
        Zeinab Asghari Bahman Arasteh Abbas Koochari
      • Open Access Article
        • Abstract Page
        • Full-Text

        184 - Providing an Intrusion Detection System in the Industrial Internet of Things Using the Gray Wolf Algorithm
        Sajad Alimohamadi Mohammad Fathi
      • Open Access Article
        • Abstract Page
        • Full-Text

        185 - Prioritizing Virtual Reality Functions in the B2B Customer Journey Using the Fuzzy SWARA Method
        Zahra Nikoosefat Rad Pejman Jafari Farid Ahmadi
      • Open Access Article
        • Abstract Page
        • Full-Text

        186 - Creation of Persian dataset for sentiment analysis in texts published in social networks
        Mojgan Farhoodi
      • Open Access Article
        • Abstract Page
        • Full-Text

        187 - An Architecture, Implementation, and Evaluation of Internet of Healthcare Things Ecosystem Platform
        Sayed Gholam Hassan Tabatabaei sarvenaz aghadavoudi
      • Open Access Article
        • Abstract Page
        • Full-Text

        188 - Provide A Lightweight Encryption Solution To secure Data In The Internet Of Things
        wahab aminiazar rasoul farahi fattameh dashti
      • Open Access Article
        • Abstract Page
        • Full-Text

        189 - Providing a New Solution in Selecting Suitable Databases for Storing Big Data in the National Information Network
        Mohammad Reza Ahmadi davood maleki ehsan arianyan
      • Open Access Article
        • Abstract Page
        • Full-Text

        190 - Community-Based Multi-Criteria Placement of Applications in the Fog Environment
        Masomeh Azimzadeh Ali Rezaee Somayyeh  Jafarali Jassbi MohammadMahdi Esnaashari
      • Open Access Article
        • Abstract Page
        • Full-Text

        191 - Identifying and Ranking Factors Affecting the Digital Transformation Strategy in Iran's Road Freight Transportation Industry Focusing on the Internet of Things and Data Analytics
        Mehran Ehteshami Mohammad Hasan Cheraghali Bita Tabrizian Maryam Teimourian sefidehkhan
      • Open Access Article
        • Abstract Page
        • Full-Text

        192 - Anomaly and Intrusion Detection Through Data Mining and Feature Selection using PSO Algorithm
        Fereidoon Rezaei Mohamad Ali Afshar Kazemi Mohammad Ali Keramati
      • Open Access Article
        • Abstract Page
        • Full-Text

        193 - Intrusion Detection Based on Cooperation on the Permissioned Blockchain Platform in the Internet of Things Using Machine Learning
        Mohammad Mahdi  Abdian majid ghayori Seyed Ahmad  Eftekhari
      • Open Access Article
        • Abstract Page
        • Full-Text

        194 - Improving Resource Allocation in Mobile Edge Computing Using Particle Swarm and Gray Wolf Optimization Algorithms
        seyed ebrahim dashti saeid shabooei
      • Open Access Article
        • Abstract Page
        • Full-Text

        195 - Multi-Level Ternary Quantization for Improving Sparsity and Computation in Embedded Deep Neural Networks
        Hosna Manavi Mofrad ali ansarmohammadi Mostafa Salehi
      • Open Access Article
        • Abstract Page
        • Full-Text

        196 - Identifying the Key Drivers of Digital Signature Implementation in Iran (Using Fuzzy Delphi Method)
        Ghorbanali Mehrabani Fatemeh Zargaran khouzani
      • Open Access Article
        • Abstract Page
        • Full-Text

        197 - Community Detection in Bipartite Networks Using HellRank Centrality Measure
        Ali Khosrozadeh movaghar movaghar Mohammad Mehdi Gilanian Sadeghi Hamidreza Mahyar
      • Open Access Article
        • Abstract Page
        • Full-Text

        198 - Presenting the ICT Policies Implementation Model of the 6th Development Using the Neural Network Method
        Nazila Mohammadi Gholamreza  Memarzadeh sedigheh tootian
      • Open Access Article
        • Abstract Page
        • Full-Text

        199 - Survey on the Applications of the Graph Theory in the Information Retrieval
        Maryam Piroozmand Amir Hosein Keyhanipour Ali Moeini
      • Open Access Article
        • Abstract Page
        • Full-Text

        200 - Application Identification Through Intelligent Traffic Classification
        Shaghayegh Naderi
      • Open Access Article
        • Abstract Page
        • Full-Text

        201 - Explanation of Standardization Role in the Proposed Solutions for Privacy Protection in Health Data
        batool mehrshad mohammad mehraeen Mohammad Khansari saeed mortazavi
      • Open Access Article
        • Abstract Page
        • Full-Text

        202 - Analysis of Traffic Data for Congestion Detection Using Machine Learning Algorithms
        Nahid Amani Mohammad-Hossein Amerimehr Sara Efazati Ali Javidani
      • Open Access Article
        • Abstract Page
        • Full-Text

        203 - Challenges of Blockchain Implementation in Supply Chain: A Multi-Criteria Decision-Making Approach
        Parnian Hendiazad Nasser Safaie Majid Mirzaee Ghazani
      • Open Access Article
        • Abstract Page
        • Full-Text

        204 - The Analysis of User Reviews on Digikala with the Aim of Detecting Deceptive Opinions
        hosein sarlak Alireza Sheikh
      • Open Access Article
        • Abstract Page
        • Full-Text

        205 - Digital Twin: Embracing the Fourth Industrial Revolution in Food Supply Chain Management (A Dynamic Analysis)
        Hajar  Soleymanizadeh Seyed mahmoud Zanjirchi Habib Zare Ahmadabadi Seyyed Habibollah Mirghfoori
      • Open Access Article
        • Abstract Page
        • Full-Text

        206 - UsERQA: An LLM-Driven User-Aware Community Question Answering System
        Seyyede Zahra Aftabi Saeed Farzi
      • Open Access Article
        • Abstract Page
        • Full-Text

        207 - Improving the accuracy of detection botnet attacks in Internet of Things network by using MLP neural network
        Safieh  Siadat Amir Tajfar
      • Open Access Article
        • Abstract Page
        • Full-Text

        208 - Improving Sentiment Analysis in Persian text based on combination of Stacked Auto-Encoder and Transformer-BiLSTM-CNN
        Sina Dami MohammadAli Sanagoo ye Moharrer
      • Open Access Article
        • Abstract Page
        • Full-Text

        209 - Online Estimation and Improvement of Cache Soft Error Vulnerability
        Mohammad Moeini Jahromi Mohammad Hasan Ahmadilivani Mostafa Salehi
      • Open Access Article
        • Abstract Page
        • Full-Text

        210 - A Novel Method Based on Tranco for Monitoring Cloud Service Providers
        Davood Maleki Pejman Goudarzi Alireza Mansouri Neda Ghorbani Ehsan Arianyan
      • Open Access Article
        • Abstract Page
        • Full-Text

        211 - Computational Models of Opinion Formation in Social Networks and Their Dimensions
        Alireza Mansouri
  • Home Page
  • Site Map
  • Contact Us
  • Home
  • Site Map
  • Regional Science and Technology Information Center
  • Contact Us

The rights to this website are owned by the Raimag Press Management System.
Copyright © 2017-2025

Home| Login| About Rimag| Contact Us|
[فارسی] [العربية] [fa] [ar]
  • Ricest
  • Login
  • email