A
-
Ab azar, Nematollah
Uncertainty-aware Path Planning using Reinforcement Learning and Deep Learning Methods [Volume 3, Issue 1, 2020, Pages 25-37]
-
Abbaszadeh Bavil Soflaei, Mohammad Reza
Machine Learning Classifiers and Data Synthesis Techniques to Tackle with Highly Imbalanced COVID-19 Data [Volume 7, Issue 2, 2024, Pages 51-64]
-
Abdolmaleki, Mohammad Javad
A Lightweighted Secure Scheme for Data Aggregation in Large-Scale IoT-Based Smart Grids [Volume 6, Issue 2, 2023, Pages 57-66]
-
Abed Hodtani, Ghoshe
Analysis of the Impact of Wireless Three-User Multiple Access Channel Coefficients Correlation on Outage Probability: A Copula-Based Approach [Volume 6, Issue 2, 2023, Pages 25-30]
-
Abed Hodtani, Ghosheh
Enhancing Average Secrecy Rates in Downlink NOMA with Dependent Channel Coefficients and Optimal Power Coefficients [Volume 7, Issue 1, 2024, Pages 9-16]
-
Abrishami, Saeid
Scheduling Data-Driven Workflows in Multi-Cloud Environment [Volume 1, Issue 1, 2018, Pages 33-42]
-
Adabi Firuzjaee, Zohreh
Meta-Learning for Medium-shot Sparse Learning via Deep Kernels [Volume 5, Issue 2, 2022, Pages 45-56]
-
Adineh, Maryam
Proximity-Aware Degree-Based Heuristics for the Influence Maximization Problem [Volume 5, Issue 1, 2022, Pages 37-46]
-
Afarideh, Farhad
DAMP: Decision-Making with the Combination of Analytical Hierarchy Process and Deep Learning (Case study: Car Sales Forecasting) [Volume 4, Issue 2, 2021, Pages 17-22]
-
Ahmadi, Aghil
Structure Optimization in Deep Neural Networks with Synaptic Pruning Based on Connection Appraisal [(Articles in Press)]
-
Ahmadi, Ramin
A Transmission Method to Guarantee QoS Parameters in Wireless Sensor Networks [Volume 1, Issue 2, 2018, Pages 21-26]
-
Ajami Khales, Faramarz
Enhancing Average Secrecy Rates in Downlink NOMA with Dependent Channel Coefficients and Optimal Power Coefficients [Volume 7, Issue 1, 2024, Pages 9-16]
-
Akbari, Mohammad
Towards Leveraging Structure for Neural Predictor in NAS [Volume 5, Issue 1, 2022, Pages 47-58]
-
Akbarian, Ghasem
A Multi-Objective Dynamic Scheduling Approach for IoT Task Offloading on Amazon EC2 Spot Instances [Volume 3, Issue 1, 2020, Pages 1-10]
-
Alilou, Mahmoud
A Novel Routing Algorithm for Mobile ad-hoc Networks Based on Q-learning and its Generalization to FSR Routing Protocol [Volume 1, Issue 2, 2018, Pages 27-32]
-
Alishahi, Mohammad
Designing Optimized Scheduling QoS-Aware RPL for Sensor-Based Smart Grid Communication Network [Volume 1, Issue 1, 2018, Pages 21-32]
-
Alizadeh, Havva
Profile Matching in Heterogeneous Academic Social Networks using Knowledge Graphs [Volume 7, Issue 1, 2024, Pages 27-36]
-
Alizadeh Noughabi, Havva
Description-based Post-hoc Explanation for Twitter List Recommendations [Volume 7, Issue 2, 2024, Pages 43-50]
-
Amintoosi, Haleh
Collusion-resistant Worker Selection in Social Crowdsensing Systems [Volume 1, Issue 1, 2018, Pages 9-20]
-
Amintoosi, Haleh
A Taxonomy for RNA Motif Discovery [Volume 6, Issue 1, 2023, Pages 15-26]
-
Ansari Shiri, Mohammad
A Novel Correlation-based Feature Selection Approach using Manta Ray Foraging Optimization [Volume 6, Issue 1, 2023, Pages 81-100]
-
Ansari Shiri, Mohammad
Hybrid Filter-Wrapper Feature Selection using Modified Flower Pollination Algorithm [(Articles in Press)]
-
Araban, Saeed
A Semantic Web Enabled Approach to Automate Test Script Generation for Web Applications [Volume 4, Issue 1, 2021, Pages 11-24]
-
Asgari Varzaneh, Zahra
An Enhanced Sine Cosine Algorithm for Feature Selection in Network Intrusion Detection [Volume 7, Issue 2, 2024, Pages 17-26]
-
Asghari Varzaneh, Zahra
The impact of preprocessing techniques for Covid-19 mortality prediction [Volume 5, Issue 2, 2022, Pages 57-66]
-
Askarizade, Mojgan
Modeling and Analysis of Rumor Control Strategies in Social Networks [Volume 5, Issue 1, 2022, Pages 59-68]
-
Azizi, Sadoon
Enhancing Channel Selection in 5G with Decentralized Federated Multi-Agent Deep Reinforcement Learning [Volume 7, Issue 2, 2024, Pages 1-16]
-
Azizi, Sadoon
An Efficient Resource Allocation Algorithm for Task Offloading in the Internet of Vehicles [Volume 8, Issue 1, 2025, Pages 1-10]
B
-
Babaiyan, Vahide
Assessment of the Metabolic Syndrome in Children and Adolescents in Birjand, Iran: A Data Mining Approach [Volume 3, Issue 2, 2020, Pages 21-30]
-
Babamir, Seyed Morteza
A Novel Two-Step Classification Approach for Runtime Performance Improvement of Duplicate Bug Report Detection [Volume 6, Issue 1, 2023, Pages 1-14]
-
Babazadeh Sangar, amin
An Intelligent Control Method for Urban Traffic using Fog Processing in the IoT Environment based on Cloud Data Processing of Big Data [Volume 6, Issue 1, 2023, Pages 47-58]
-
Banifakhr, Mojtaba
Anomaly Detection in Traffic Trajectories Using a Combination of Fuzzy, Deep Convolutional and Autoencoder Networks [Volume 4, Issue 2, 2021, Pages 1-10]
-
Bayati, Danial
Efficient Implementation of DVI Protocol on FPGA [(Articles in Press)]
-
Behkamal, Behshid
Trace2Vec-CDD: A Framework for Concept Drift Detection in Business Process Logs using Trace Embedding [Volume 6, Issue 1, 2023, Pages 71-79]
-
Behkamal, Behshid
Profile Matching in Heterogeneous Academic Social Networks using Knowledge Graphs [Volume 7, Issue 1, 2024, Pages 27-36]
-
Behkamal, Behshid
Description-based Post-hoc Explanation for Twitter List Recommendations [Volume 7, Issue 2, 2024, Pages 43-50]
-
B. Shokouhi, Shahriar
Discriminative Cross-Modal Attention Approach for RGB-D Semantic Segmentation [Volume 8, Issue 1, 2025, Pages 43-52]
C
-
Chamansara, Alireza
Anomaly Detection in IoMT Environment Based on Machine Learning: An Overview [Volume 7, Issue 2, 2024, Pages 65-74]
D
-
Dadashi, Morteza
Two Efficient Ternary Adder Designs Based On CNFET Technology [Volume 4, Issue 1, 2021, Pages 25-34]
-
Dadkhah, Mahbobe
A Semantic Web Enabled Approach to Automate Test Script Generation for Web Applications [Volume 4, Issue 1, 2021, Pages 11-24]
-
Davoudi, Mohsen
Uncertainty-aware Path Planning using Reinforcement Learning and Deep Learning Methods [Volume 3, Issue 1, 2020, Pages 25-37]
-
Dehesh, Rahil
A Heuristic Method for Node Management in Large-Scale Wireless Sensor Network Considering Connectivity and Energy Consumption [Volume 2, Issue 1, 2019, Pages 53-62]
-
Dehghan, Motahareh
A Model to Measure Effectiveness in Cyber Security Situational Awareness [Volume 7, Issue 1, 2024, Pages 17-26]
-
Dehghan, Motahareh
Smart Grid Security: Proactive Prediction of Advanced Persistent Threats [(Articles in Press)]
-
Dehghani, Toktam
β-sheet Topology Prediction Using Probability-based Integer Programming [Volume 1, Issue 1, 2018, Pages 53-64]
-
Deldari, Arash
A Multi-Objective Dynamic Scheduling Approach for IoT Task Offloading on Amazon EC2 Spot Instances [Volume 3, Issue 1, 2020, Pages 1-10]
-
Deldari, Arash
DAMP: Decision-Making with the Combination of Analytical Hierarchy Process and Deep Learning (Case study: Car Sales Forecasting) [Volume 4, Issue 2, 2021, Pages 17-22]
-
Delfan, Mohammad
Generalized Model of Hybrid ALOHA [Volume 8, Issue 1, 2025, Pages 11-18]
E
-
Ebrahimpour-komleh, hossein
Improving Persian Dependency-Based Parser Using Deep Learning [Volume 5, Issue 1, 2022, Pages 13-20]
-
Ekbatanifard, Gholamhossein
An Energy Efficient Data Dissemination Scheme for Distributed Storage in the Internet of Things [Volume 1, Issue 1, 2018, Pages 1-8]
-
Ekbatanifard, Gholamhossein
A Transmission Method to Guarantee QoS Parameters in Wireless Sensor Networks [Volume 1, Issue 2, 2018, Pages 21-26]
-
Eliwe, Noor Hussein
A diagnostic system for detecting COVID-19 patients depending on lexicon semantic and Biterm Topic Model-Based Feature Selection on WhatsApp Messages Classification [Volume 8, Issue 1, 2025, Pages 53-64]
-
Ershadi-Nasab, Sara
Efficient Implementation of DVI Protocol on FPGA [(Articles in Press)]
-
Eslami, Saeedeh
Towards Leveraging Structure for Neural Predictor in NAS [Volume 5, Issue 1, 2022, Pages 47-58]
-
Eslami, Ziba
An Efficient Ramp Secret Sharing Scheme Based on Zigzag-Decodable Codes [Volume 6, Issue 2, 2023, Pages 15-24]
-
Etaati, Atekeh
PLI-X: Temporal Association Rules Mining in Customer Relationship Management Systems [Volume 2, Issue 2, 2019, Pages 29-48]
F
-
Falahati Qadimi Fumani, Mohammad Reza
Classification of Persian News Articles using Machine Learning Techniques [Volume 4, Issue 1, 2021, Pages 1-10]
-
Farazestanian, Farahnaz
Migration Management in Sensor-Cloud Networks [Volume 1, Issue 2, 2018, Pages 1-12]
-
Farhadi Moghadam, mostafa
A Key Management Schema Based on ECC to Secure the Substation and Control Center Communications in Smart Grids [Volume 2, Issue 1, 2019, Pages 25-32]
-
Farzi, saeed
Assessment of Customer Credit Risk using an Adaptive Neuro-Fuzzy System [Volume 2, Issue 2, 2019, Pages 19-28]
-
Fathi, Abdolhossein
Diagnosing of Skin Lesions Using Deep Convolutional Neural Network and Support Vector Machines [Volume 7, Issue 1, 2024, Pages 37-48]
-
Fathi, Mohammad
A Lightweighted Secure Scheme for Data Aggregation in Large-Scale IoT-Based Smart Grids [Volume 6, Issue 2, 2023, Pages 57-66]
G
-
Ghaemi Bafghi, Abbas
Dynamic Security Risk Management Considering Systems Structural and Probabilistic Attributes [Volume 6, Issue 2, 2023, Pages 41-56]
-
Ghaffariannia, Seyed Mohammadreza
P-centrality: An Improvement for Information Diffusion Maximization in Weighted Social Networks [Volume 6, Issue 1, 2023, Pages 59-70]
-
Ghavidel, Abolfazl
Safety Verification of Rate-Monotonic Least-Splitting Real-Time Scheduler on Multiprocessor System [Volume 1, Issue 1, 2018, Pages 43-52]
-
Ghiasi-Shirazi, Kamaledin
Modeling Intra-label Dynamics and Analyzing the Role of Blank in Connectionist Temporal Classification [Volume 1, Issue 2, 2018, Pages 47-54]
-
Ghiasi-Shirazi, Sayed Kamaledin
Meta-Learning for Medium-shot Sparse Learning via Deep Kernels [Volume 5, Issue 2, 2022, Pages 45-56]
H
-
Hafizi, Najva
P-centrality: An Improvement for Information Diffusion Maximization in Weighted Social Networks [Volume 6, Issue 1, 2023, Pages 59-70]
-
Haghani, Sogol
Embedding Knowledge Graph through Triple Base Neural Network and Positive Samples [Volume 5, Issue 2, 2022, Pages 11-20]
-
Hajipour, Ahmad
Anomaly Detection in IoMT Environment Based on Machine Learning: An Overview [Volume 7, Issue 2, 2024, Pages 65-74]
-
Hakami, Vesal
Performance Evaluation of Software-Defined Networking Controllers: A Comparative Study [Volume 2, Issue 2, 2019, Pages 63-73]
-
Harati, Ahad
Modeling Intra-label Dynamics and Analyzing the Role of Blank in Connectionist Temporal Classification [Volume 1, Issue 2, 2018, Pages 47-54]
-
Hashemi, Mohsen
Multi-agent memetic algorithm and its application to community structure detection in complex networks [Volume 5, Issue 1, 2022, Pages 21-37]
-
Hatamlou, Abdolreza
A Novel Routing Algorithm for Mobile ad-hoc Networks Based on Q-learning and its Generalization to FSR Routing Protocol [Volume 1, Issue 2, 2018, Pages 27-32]
-
Hatamlou, Abdolreza
Application of Black Hole Algorithm for Solving Knapsack Problems [Volume 4, Issue 2, 2021, Pages 11-16]
-
Hatem, Raghad Majeed
A diagnostic system for detecting COVID-19 patients depending on lexicon semantic and Biterm Topic Model-Based Feature Selection on WhatsApp Messages Classification [Volume 8, Issue 1, 2025, Pages 53-64]
-
Hodtani, Ghosheh Abed
Advancing Over-the-Air Federated Learning through Deep Reinforcement Learning in UAV-Assisted Networks with Movable Antennas [(Articles in Press)]
-
Hosseini, Matin
Fuzzy Q-Learning Traffic Light Control based on Traffic Flow and Pedestrian Number Estimated from Visual Information [Volume 2, Issue 1, 2019, Pages 1-10]
-
Hosseini, Soodeh
The impact of preprocessing techniques for Covid-19 mortality prediction [Volume 5, Issue 2, 2022, Pages 57-66]
-
Hosseini, Soodeh
An Enhanced Sine Cosine Algorithm for Feature Selection in Network Intrusion Detection [Volume 7, Issue 2, 2024, Pages 17-26]
-
Hosseini Seno, Seyed Amin
Migration Management in Sensor-Cloud Networks [Volume 1, Issue 2, 2018, Pages 1-12]
-
Hosseini Seno, Seyed Amin
A Deep Neural Network Architecture for Intrusion Detection in Software-Defined Networks [Volume 5, Issue 2, 2022, Pages 31-44]
J
-
Jaderyan, Morteza
Knowledge-Based Semantic Information Indexing and Management Framework: Integration of Structured Knowledge and Information Management Systems* [Volume 3, Issue 2, 2020, Pages 1-20]
-
Jafari Horestani, Somayeh
A Deep Neural Network Architecture for Intrusion Detection in Software-Defined Networks [Volume 5, Issue 2, 2022, Pages 31-44]
-
Jafarinejad, Fatemeh
PerGOLD: Identification of offensive language in Persian tweets: leveraging crowdsourcing [Volume 8, Issue 1, 2025, Pages 35-42]
-
Jahangiry, Ahad
A Transmission Method to Guarantee QoS Parameters in Wireless Sensor Networks [Volume 1, Issue 2, 2018, Pages 21-26]
-
Jalali moghaddam, Marjan
Fuzzy Q-Learning Traffic Light Control based on Traffic Flow and Pedestrian Number Estimated from Visual Information [Volume 2, Issue 1, 2019, Pages 1-10]
K
-
Kabirirad, saeideh
An Efficient Ramp Secret Sharing Scheme Based on Zigzag-Decodable Codes [Volume 6, Issue 2, 2023, Pages 15-24]
-
Kahani, Mohsen
Proposing an Integrated Multi Source Ontology Construction Methodology [Volume 3, Issue 1, 2020, Pages 11-24]
-
Kahani, Mohsen
Trace2Vec-CDD: A Framework for Concept Drift Detection in Business Process Logs using Trace Embedding [Volume 6, Issue 1, 2023, Pages 71-79]
-
Kahani, Mohsen
A hybrid content and context-based method for sarcasm detection [Volume 7, Issue 1, 2024, Pages 49-58]
-
Kahani, Mohsen
Description-based Post-hoc Explanation for Twitter List Recommendations [Volume 7, Issue 2, 2024, Pages 43-50]
-
Karimi, Seyedehfatemeh
PerGOLD: Identification of offensive language in Persian tweets: leveraging crowdsourcing [Volume 8, Issue 1, 2025, Pages 35-42]
-
Karimi Zandian, Zahra
SSLBM: A New Fraud Detection Method Based on Semi- Supervised Learning [Volume 2, Issue 2, 2019, Pages 10-18]
-
Katebi, Mouhebeh Sadat
STAR: Improved Algorithm based on Sliding Window for Trust-Aware Routing in WSNs [Volume 1, Issue 2, 2018, Pages 33-46]
-
Kavei, Sara
Increasing the Performance of Reactive Routing Protocol using the Load Balancing and Congestion Control Mechanism in MANET [Volume 2, Issue 1, 2019, Pages 33-42]
-
Kazemi, Seyed Mahmood
Assessment of the Metabolic Syndrome in Children and Adolescents in Birjand, Iran: A Data Mining Approach [Volume 3, Issue 2, 2020, Pages 21-30]
-
Kazemi, Toba
Assessment of the Metabolic Syndrome in Children and Adolescents in Birjand, Iran: A Data Mining Approach [Volume 3, Issue 2, 2020, Pages 21-30]
-
Keivanlou-Shahrestanaki, Zahra
A hybrid content and context-based method for sarcasm detection [Volume 7, Issue 1, 2024, Pages 49-58]
-
Keyvanpour, Mohammad reza
PLI-X: Temporal Association Rules Mining in Customer Relationship Management Systems [Volume 2, Issue 2, 2019, Pages 29-48]
-
Keyvanpour, Mohammad Reza
SSLBM: A New Fraud Detection Method Based on Semi- Supervised Learning [Volume 2, Issue 2, 2019, Pages 10-18]
-
Keyvanpour, Mohammad Reza
Embedding Knowledge Graph through Triple Base Neural Network and Positive Samples [Volume 5, Issue 2, 2022, Pages 11-20]
-
Khamforoosh, Keyhan
Enhancing Channel Selection in 5G with Decentralized Federated Multi-Agent Deep Reinforcement Learning [Volume 7, Issue 2, 2024, Pages 1-16]
-
Khodabakhsh, Maryam
PerGOLD: Identification of offensive language in Persian tweets: leveraging crowdsourcing [Volume 8, Issue 1, 2025, Pages 35-42]
-
Khojasteh, Fatemeh
Trace2Vec-CDD: A Framework for Concept Drift Detection in Business Process Logs using Trace Embedding [Volume 6, Issue 1, 2023, Pages 71-79]
-
Khorasani, Mahsa
Trace2Vec-CDD: A Framework for Concept Drift Detection in Business Process Logs using Trace Embedding [Volume 6, Issue 1, 2023, Pages 71-79]
-
Khorramian, Amanj
A Lightweighted Secure Scheme for Data Aggregation in Large-Scale IoT-Based Smart Grids [Volume 6, Issue 2, 2023, Pages 57-66]
-
Khoshhal Roudposhti, Kamrad
Exploring Effective Features in ADHD Diagnosis among Children through EEG/Evoked Potentials using Machine Learning Techniques [Volume 5, Issue 2, 2022, Pages 1-10]
-
Khosravain, Erfan
Smart Grid Security: Proactive Prediction of Advanced Persistent Threats [(Articles in Press)]
-
Khosravi-Farmad, Masoud
Dynamic Security Risk Management Considering Systems Structural and Probabilistic Attributes [Volume 6, Issue 2, 2023, Pages 41-56]
-
Khotanlou, Hassan
Knowledge-Based Semantic Information Indexing and Management Framework: Integration of Structured Knowledge and Information Management Systems* [Volume 3, Issue 2, 2020, Pages 1-20]
-
Kianian, sahar
Assessment of Customer Credit Risk using an Adaptive Neuro-Fuzzy System [Volume 2, Issue 2, 2019, Pages 19-28]
-
Kordlar, Maryam
A Transmission Method to Guarantee QoS Parameters in Wireless Sensor Networks [Volume 1, Issue 2, 2018, Pages 21-26]
L
-
Lotfian, Majid
Scheduling Data-Driven Workflows in Multi-Cloud Environment [Volume 1, Issue 1, 2018, Pages 33-42]
M
-
Maghsoudi, Ali
A Taxonomy for RNA Motif Discovery [Volume 6, Issue 1, 2023, Pages 15-26]
-
Mahboobi Esfanjani, Reza
Structure Optimization in Deep Neural Networks with Synaptic Pruning Based on Connection Appraisal [(Articles in Press)]
-
Mahdi Zadeh, AmirAbbas
A Model to Measure Effectiveness in Cyber Security Situational Awareness [Volume 7, Issue 1, 2024, Pages 17-26]
-
Mahjoubi, Masoud
Two Efficient Ternary Adder Designs Based On CNFET Technology [Volume 4, Issue 1, 2021, Pages 25-34]
-
Manochehri, Kooroush
Two Efficient Ternary Adder Designs Based On CNFET Technology [Volume 4, Issue 1, 2021, Pages 25-34]
-
Mansouri, Ehsan
A Data Replication Algorithm for Improving Server Efficiency in Cloud Computing Using PSO and Fuzzy Systems [Volume 6, Issue 2, 2023, Pages 1-14]
-
Mashhadi, Ali
Exploring Effective Features in ADHD Diagnosis among Children through EEG/Evoked Potentials using Machine Learning Techniques [Volume 5, Issue 2, 2022, Pages 1-10]
-
Masoumi, Behrooz
Multi-agent memetic algorithm and its application to community structure detection in complex networks [Volume 5, Issue 1, 2022, Pages 21-37]
-
Mazoochi, Mojtaba
P-centrality: An Improvement for Information Diffusion Maximization in Weighted Social Networks [Volume 6, Issue 1, 2023, Pages 59-70]
-
Mehrabi, Mahdi
A Heuristic Method for Node Management in Large-Scale Wireless Sensor Network Considering Connectivity and Energy Consumption [Volume 2, Issue 1, 2019, Pages 53-62]
-
Mehrabiun, Hourie
Personalized Privacy Preserving Method for Social Networks Graph k-Anonymization [Volume 6, Issue 1, 2023, Pages 37-46]
-
Mehrmolaei, Soheila
PLI-X: Temporal Association Rules Mining in Customer Relationship Management Systems [Volume 2, Issue 2, 2019, Pages 29-48]
-
Mir, Zahra
A Taxonomy for RNA Motif Discovery [Volume 6, Issue 1, 2023, Pages 15-26]
-
Mirhosseini, Hanif
Generalized Model of Hybrid ALOHA [Volume 8, Issue 1, 2025, Pages 11-18]
-
Mirvaziri, Hamid
Optimization of FlexiTP Energy-Aware Algorithm in Wireless Sensor Networks [Volume 6, Issue 2, 2023, Pages 31-40]
-
Mohagheghi, Mohammadsadegh
Accelerating Iterative Methods for Bounded Reachability Probabilities in Markov Decision Processes [Volume 3, Issue 2, 2020, Pages 31-36]
-
Mohajerzadeh, Amirhossein
A Key Management Schema Based on ECC to Secure the Substation and Control Center Communications in Smart Grids [Volume 2, Issue 1, 2019, Pages 25-32]
-
Mohsenzadeh, Mona Sadat
Analysis of the Impact of Wireless Three-User Multiple Access Channel Coefficients Correlation on Outage Probability: A Copula-Based Approach [Volume 6, Issue 2, 2023, Pages 25-30]
-
Mokhtarzade, mehdi
Spatial-Spectral Classification of Hyperspectral Images Based on Extended Morphological Profiles and Guided Filter [Volume 2, Issue 2, 2019, Pages 2-8]
-
Molavi, Behzad
A Key Management Schema Based on ECC to Secure the Substation and Control Center Communications in Smart Grids [Volume 2, Issue 1, 2019, Pages 25-32]
-
Monsefi, Reza
Towards Leveraging Structure for Neural Predictor in NAS [Volume 5, Issue 1, 2022, Pages 47-58]
-
Mostafavi, Sareh
Classification of Persian News Articles using Machine Learning Techniques [Volume 4, Issue 1, 2021, Pages 1-10]
-
Mostafavi, Seyedakbar
Performance Evaluation of Software-Defined Networking Controllers: A Comparative Study [Volume 2, Issue 2, 2019, Pages 63-73]
-
Mousavi, Seyyed Keyvan
A New Feature Selection in Email Spam Detection by Particle Swarm Optimization and Fruit Fly Optimization Algorithms [Volume 2, Issue 2, 2019, Pages 49-62]
-
Mueller, Andreas
Exploring Effective Features in ADHD Diagnosis among Children through EEG/Evoked Potentials using Machine Learning Techniques [Volume 5, Issue 2, 2022, Pages 1-10]
N
-
Naghibzadeh, Mahmoud
β-sheet Topology Prediction Using Probability-based Integer Programming [Volume 1, Issue 1, 2018, Pages 53-64]
-
Naghipour, Avaz
Machine Learning Classifiers and Data Synthesis Techniques to Tackle with Highly Imbalanced COVID-19 Data [Volume 7, Issue 2, 2024, Pages 51-64]
-
Naghshbandi, Tara
Diagnosing of Skin Lesions Using Deep Convolutional Neural Network and Support Vector Machines [Volume 7, Issue 1, 2024, Pages 37-48]
-
Najafi, Samad
Modeling and Analysis of Rumor Control Strategies in Social Networks [Volume 5, Issue 1, 2022, Pages 59-68]
-
Namakin, Kokab
Assessment of the Metabolic Syndrome in Children and Adolescents in Birjand, Iran: A Data Mining Approach [Volume 3, Issue 2, 2020, Pages 21-30]
-
Namazi Nik, Ahmad
Particle Filter based Target Tracking in Wireless Sensor Networks using Support Vector Machine [Volume 1, Issue 2, 2018, Pages 13-20]
-
Niazi Torshiz, Masood
Collusion-resistant Worker Selection in Social Crowdsensing Systems [Volume 1, Issue 1, 2018, Pages 9-20]
-
Noroozi, nasser
Improving Persian Dependency-Based Parser Using Deep Learning [Volume 5, Issue 1, 2022, Pages 13-20]
-
Nouri Baygi, Mostafa
Proximity-Aware Degree-Based Heuristics for the Influence Maximization Problem [Volume 5, Issue 1, 2022, Pages 37-46]
-
Nouri Baygi, Mostafa
Improving Greedy Spanner Construction Algorithm [Volume 6, Issue 1, 2023, Pages 27-35]
O
-
Omoomi, Behnaz
Personalized Privacy Preserving Method for Social Networks Graph k-Anonymization [Volume 6, Issue 1, 2023, Pages 37-46]
P
-
Pahlevanzadeh, Bahareh
Classification of Persian News Articles using Machine Learning Techniques [Volume 4, Issue 1, 2021, Pages 1-10]
-
Paydar, Fahimeh
Performance Evaluation of Software-Defined Networking Controllers: A Comparative Study [Volume 2, Issue 2, 2019, Pages 63-73]
-
Paydar, Samad
A State-aware Approach for Robustness Testing of Embedded Real-Time Operating Systems [Volume 2, Issue 1, 2019, Pages 43-52]
-
Paydar, Samad
A Semantic Web Enabled Approach to Automate Test Script Generation for Web Applications [Volume 4, Issue 1, 2021, Pages 11-24]
-
Pourmozafari, Saadat
Two Efficient Ternary Adder Designs Based On CNFET Technology [Volume 4, Issue 1, 2021, Pages 25-34]
-
Pourreza, Hamidreza
Designing Optimized Scheduling QoS-Aware RPL for Sensor-Based Smart Grid Communication Network [Volume 1, Issue 1, 2018, Pages 21-32]
Q
-
Qashqai, Danial
Discriminative Cross-Modal Attention Approach for RGB-D Semantic Segmentation [Volume 8, Issue 1, 2025, Pages 43-52]
R
-
Rabiei, Leila
P-centrality: An Improvement for Information Diffusion Maximization in Weighted Social Networks [Volume 6, Issue 1, 2023, Pages 59-70]
-
Radnejad, Milad
Efficient and Deception Resilient Rumor Detection in Twitter [Volume 5, Issue 2, 2022, Pages 21-30]
-
Rafiei, Davood
Profile Matching in Heterogeneous Academic Social Networks using Knowledge Graphs [Volume 7, Issue 1, 2024, Pages 27-36]
-
Rahimi, Marziea
PerGOLD: Identification of offensive language in Persian tweets: leveraging crowdsourcing [Volume 8, Issue 1, 2025, Pages 35-42]
-
Rahmani, Farzaneh
P-centrality: An Improvement for Information Diffusion Maximization in Weighted Social Networks [Volume 6, Issue 1, 2023, Pages 59-70]
-
Rahmani, Hossein
ENIXMA: ENsemble of EXplainable Methods for detecting network Attack [Volume 7, Issue 1, 2024, Pages 1-8]
-
Ramezani, Reza
A State-aware Approach for Robustness Testing of Embedded Real-Time Operating Systems [Volume 2, Issue 1, 2019, Pages 43-52]
-
Ramezankhani, Azra
Assessment of the Metabolic Syndrome in Children and Adolescents in Birjand, Iran: A Data Mining Approach [Volume 3, Issue 2, 2020, Pages 21-30]
-
Ranjkesh, Somayeh
Multi-agent memetic algorithm and its application to community structure detection in complex networks [Volume 5, Issue 1, 2022, Pages 21-37]
-
Rasoolzadegan, Abbas
Evaluating Developers’ Expertise in Serverless Functions by Mining Activities from Multiple Platforms [Volume 7, Issue 2, 2024, Pages 27-42]
-
Razaghi Karizno, Somayeh
Increasing the Performance of Reactive Routing Protocol using the Load Balancing and Congestion Control Mechanism in MANET [Volume 2, Issue 1, 2019, Pages 33-42]
-
Rezaee, Abbas Ali
Particle Filter based Target Tracking in Wireless Sensor Networks using Support Vector Machine [Volume 1, Issue 2, 2018, Pages 13-20]
-
Rezaei, Atieh
DAMP: Decision-Making with the Combination of Analytical Hierarchy Process and Deep Learning (Case study: Car Sales Forecasting) [Volume 4, Issue 2, 2021, Pages 17-22]
-
Rezaeian, Amin
Safety Verification of Rate-Monotonic Least-Splitting Real-Time Scheduler on Multiprocessor System [Volume 1, Issue 1, 2018, Pages 43-52]
-
Rezazadeh, Sahar
Profile Matching in Heterogeneous Academic Social Networks using Knowledge Graphs [Volume 7, Issue 1, 2024, Pages 27-36]
-
Rohani, Faezeh
Exploring Effective Features in ADHD Diagnosis among Children through EEG/Evoked Potentials using Machine Learning Techniques [Volume 5, Issue 2, 2022, Pages 1-10]
-
Rokhsati, Hamidreza
Anomaly Detection in IoMT Environment Based on Machine Learning: An Overview [Volume 7, Issue 2, 2024, Pages 65-74]
S
-
Sabzekar, Mostafa
A Multi-Objective Dynamic Scheduling Approach for IoT Task Offloading on Amazon EC2 Spot Instances [Volume 3, Issue 1, 2020, Pages 1-10]
-
Sabzekar, Mostafa
DAMP: Decision-Making with the Combination of Analytical Hierarchy Process and Deep Learning (Case study: Car Sales Forecasting) [Volume 4, Issue 2, 2021, Pages 17-22]
-
Sabzekar, Mostafa
A Data Replication Algorithm for Improving Server Efficiency in Cloud Computing Using PSO and Fuzzy Systems [Volume 6, Issue 2, 2023, Pages 1-14]
-
Sadeghi, Mohammad Taghi
Anomaly Detection in Traffic Trajectories Using a Combination of Fuzzy, Deep Convolutional and Autoencoder Networks [Volume 4, Issue 2, 2021, Pages 1-10]
-
Sadeghian, Babak
A Model to Measure Effectiveness in Cyber Security Situational Awareness [Volume 7, Issue 1, 2024, Pages 17-26]
-
Sadeghi Lotfabadi, Ashkan
Modeling Intra-label Dynamics and Analyzing the Role of Blank in Connectionist Temporal Classification [Volume 1, Issue 2, 2018, Pages 47-54]
-
Safabakhsh, Reza
Fuzzy Q-Learning Traffic Light Control based on Traffic Flow and Pedestrian Number Estimated from Visual Information [Volume 2, Issue 1, 2019, Pages 1-10]
-
Saffarian, Mohsen
Assessment of the Metabolic Syndrome in Children and Adolescents in Birjand, Iran: A Data Mining Approach [Volume 3, Issue 2, 2020, Pages 21-30]
-
Salehi, Ahmad
An Efficient Resource Allocation Algorithm for Task Offloading in the Internet of Vehicles [Volume 8, Issue 1, 2025, Pages 1-10]
-
Samimi-Dehkordi, Leila
Model-Driven Development of Android Audio-based Applications [Volume 8, Issue 1, 2025, Pages 19-34]
-
Sedaghat, Yasser
Safety Verification of Rate-Monotonic Least-Splitting Real-Time Scheduler on Multiprocessor System [Volume 1, Issue 1, 2018, Pages 43-52]
-
Sedaghat, Yasser
A State-aware Approach for Robustness Testing of Embedded Real-Time Operating Systems [Volume 2, Issue 1, 2019, Pages 43-52]
-
Shahgholi, Taghi
Enhancing Channel Selection in 5G with Decentralized Federated Multi-Agent Deep Reinforcement Learning [Volume 7, Issue 2, 2024, Pages 1-16]
-
Shahmansoorian, Aref
Uncertainty-aware Path Planning using Reinforcement Learning and Deep Learning Methods [Volume 3, Issue 1, 2020, Pages 25-37]
-
Shahpasand, Raheleh
A State-aware Approach for Robustness Testing of Embedded Real-Time Operating Systems [Volume 2, Issue 1, 2019, Pages 43-52]
-
Shakeri, Hassan
STAR: Improved Algorithm based on Sliding Window for Trust-Aware Routing in WSNs [Volume 1, Issue 2, 2018, Pages 33-46]
-
Sheidani, Sorour
An Efficient Ramp Secret Sharing Scheme Based on Zigzag-Decodable Codes [Volume 6, Issue 2, 2023, Pages 15-24]
-
Sheikhahmadi, Amir
Enhancing Channel Selection in 5G with Decentralized Federated Multi-Agent Deep Reinforcement Learning [Volume 7, Issue 2, 2024, Pages 1-16]
-
Soleimanian Gharehchopogh, Farhad
A New Feature Selection in Email Spam Detection by Particle Swarm Optimization and Fruit Fly Optimization Algorithms [Volume 2, Issue 2, 2019, Pages 49-62]
-
Soleimani Neysiani, Behzad
A Novel Two-Step Classification Approach for Runtime Performance Improvement of Duplicate Bug Report Detection [Volume 6, Issue 1, 2023, Pages 1-14]
-
Soltani, Somayeh
A Deep Neural Network Architecture for Intrusion Detection in Software-Defined Networks [Volume 5, Issue 2, 2022, Pages 31-44]
-
Sooezi, Nafise
Scheduling Data-Driven Workflows in Multi-Cloud Environment [Volume 1, Issue 1, 2018, Pages 33-42]
T
-
Taheri, Fatemeh
Assessment of the Metabolic Syndrome in Children and Adolescents in Birjand, Iran: A Data Mining Approach [Volume 3, Issue 2, 2020, Pages 21-30]
-
Taheri, Hamidreza
Exploring Effective Features in ADHD Diagnosis among Children through EEG/Evoked Potentials using Machine Learning Techniques [Volume 5, Issue 2, 2022, Pages 1-10]
-
Talebzadeh Bardsiri, Aref
Evaluating Developers’ Expertise in Serverless Functions by Mining Activities from Multiple Platforms [Volume 7, Issue 2, 2024, Pages 27-42]
-
Tashtarian, Farzad
STAR: Improved Algorithm based on Sliding Window for Trust-Aware Routing in WSNs [Volume 1, Issue 2, 2018, Pages 33-46]
-
Tork Ladani, Behrouz
Modeling and Analysis of Rumor Control Strategies in Social Networks [Volume 5, Issue 1, 2022, Pages 59-68]
-
Tork Ladani, Behrouz
Efficient and Deception Resilient Rumor Detection in Twitter [Volume 5, Issue 2, 2022, Pages 21-30]
V
-
Vafadoost Sabzevar, Peyman
Anomaly Detection in IoMT Environment Based on Machine Learning: An Overview [Volume 7, Issue 2, 2024, Pages 65-74]
-
Vakili, Reza
Model-Driven Development of Android Audio-based Applications [Volume 8, Issue 1, 2025, Pages 19-34]
-
Varposhti, Marzieh
Model-Driven Development of Android Audio-based Applications [Volume 8, Issue 1, 2025, Pages 19-34]
Y
-
Yaghmaee Moghadam, Mohammad Hossein
Designing Optimized Scheduling QoS-Aware RPL for Sensor-Based Smart Grid Communication Network [Volume 1, Issue 1, 2018, Pages 21-32]
-
Yarmohamadi, Hasan
Generalized Model of Hybrid ALOHA [Volume 8, Issue 1, 2025, Pages 11-18]
-
Yazdani, Saeed
Efficient Implementation of DVI Protocol on FPGA [(Articles in Press)]
Z
-
Zarrinkalam, Fattane
A hybrid content and context-based method for sarcasm detection [Volume 7, Issue 1, 2024, Pages 49-58]
-
Zojaji, Zahra
Efficient and Deception Resilient Rumor Detection in Twitter [Volume 5, Issue 2, 2022, Pages 21-30]
Your query does not match with any item