A
-
Academic Social Networks
Profile Matching in Heterogeneous Academic Social Networks using Knowledge Graphs [Volume 7, Issue 1, 2024, Pages 27-36]
-
Accuracy
Novel Correlation-based Feature Selection Approach using Manta Ray Foraging Optimization [Volume 6, Issue 1, 2023, Pages 81-100]
-
Algorithm
A Taxonomy for RNA Motif Discovery [Volume 6, Issue 1, 2023, Pages 15-26]
-
Analytical Hierarchy Process
DAMP: Decision-Making with the Combination of Analytical Hierarchy Process and Deep Learning (Case study: Car Sales Forecasting) [Volume 4, Issue 2, 2021, Pages 17-22]
-
Anonymous Social Network Graph
Personalized Privacy Preserving Method for Social Networks Graph k-Anonymization [Volume 6, Issue 1, 2023, Pages 37-46]
-
AOMDV
Increasing the Performance of Reactive Routing Protocol using the Load Balancing and Congestion Control Mechanism in MANET [Volume 2, Issue 1, 2019, Pages 33-42]
-
Artificial Intelligence
The impact of preprocessing techniques for Covid-19 mortality prediction [Volume 5, Issue 2, 2022, Pages 57-66]
-
Attack Graph
Dynamic Security Risk Management Considering Systems Structural and Probabilistic Attributes [Volume 6, Issue 2, 2023, Pages 41-56]
-
Attention deficit hyperactivity disorder (ADHD)
Exploring Effective Features in ADHD Diagnosis among Children through EEG/Evoked Potentials using Machine Learning Techniques [Volume 5, Issue 2, 2022, Pages 1-10]
-
Authentication
A Key Management Schema Based on ECC to Secure the Substation and Control Center Communications in Smart Grids [Volume 2, Issue 1, 2019, Pages 25-32]
-
Autoencoder Neural Network
Anomaly Detection in Traffic Trajectories Using a Combination of Fuzzy, Deep Convolutional and Autoencoder Networks [Volume 4, Issue 2, 2021, Pages 1-10]
-
Automated testing
A Semantic Web Enabled Approach to Automate Test Script Generation for Web Applications [Volume 4, Issue 1, 2021, Pages 11-24]
-
Automatic Persian text classification
Classification of Persian News Articles using Machine Learning Techniques [Volume 4, Issue 1, 2021, Pages 1-10]
-
Average secrecy rate
Enhancing Average Secrecy Rates in Downlink NOMA with Dependent Channel Coefficients and Optimal Power Coefficients [Volume 7, Issue 1, 2024, Pages 9-16]
B
-
Banking
Assessment of Customer Credit Risk using an Adaptive Neuro-Fuzzy System [Volume 2, Issue 2, 2019, Pages 19-28]
-
Bayesian Meta-Learning
Meta-Learning for Medium-shot Sparse Learning via Deep Kernels [Volume 5, Issue 2, 2022, Pages 45-56]
-
Bayesian Network
Dynamic Security Risk Management Considering Systems Structural and Probabilistic Attributes [Volume 6, Issue 2, 2023, Pages 41-56]
-
Bioinformatics
A Taxonomy for RNA Motif Discovery [Volume 6, Issue 1, 2023, Pages 15-26]
-
Black hole algorithm
Application of Black Hole Algorithm for Solving Knapsack Problems [Volume 4, Issue 2, 2021, Pages 11-16]
-
Blank
Modeling Intra-label Dynamics and Analyzing the Role of Blank in Connectionist Temporal Classification [Volume 1, Issue 2, 2018, Pages 47-54]
-
Boolean operation
An Efficient Ramp Secret Sharing Scheme Based on Zigzag-Decodable Codes [Volume 6, Issue 2, 2023, Pages 15-24]
-
Bounded Reachability probabilities
Accelerating Iterative Methods for Bounded Reachability Probabilities in Markov Decision Processes [Volume 3, Issue 2, 2020, Pages 31-36]
-
Bug Report
A Novel Two-Step Classification Approach for Runtime Performance Improvement of Duplicate Bug Report Detection [Volume 6, Issue 1, 2023, Pages 1-14]
C
-
Centrality measures
P-centrality: An Improvement for Information Diffusion Maximization in Weighted Social Networks [Volume 6, Issue 1, 2023, Pages 59-70]
-
Cepstral coefficients
Presenting a Method for Improving Echo Hiding [Volume 2, Issue 1, 2019, Pages 11-24]
-
Classification
Spatial-Spectral Classification of Hyperspectral Images Based on Extended Morphological Profiles and Guided Filter [Volume 2, Issue 2, 2019, Pages 2-8]
-
Class Imbalance
Machine Learning Classifiers and Data Synthesis Techniques to Tackle with Highly Imbalanced COVID-19 Data [Volume 7, Issue 2, 2024, Pages 51-64]
-
Cloud
Cost-Efficient Task Scheduling Algorithm for Reducing Energy Consumption and Makespan of Cloud Computing [Volume 5, Issue 1, 2022, Pages 1-12]
-
Cloud Computing
Scheduling Data-Driven Workflows in Multi-Cloud Environment [Volume 1, Issue 1, 2018, Pages 33-42]
-
Cloud Computing
A Multi-Objective Dynamic Scheduling Approach for IoT Task Offloading on Amazon EC2 Spot Instances [Volume 3, Issue 1, 2020, Pages 1-10]
-
Cloud Computing
A Data Replication Algorithm for Improving Server Efficiency in Cloud Computing Using PSO and Fuzzy Systems [Volume 6, Issue 2, 2023, Pages 1-14]
-
CNFET
Two Efficient Ternary Adder Designs Based On CNFET Technology [Volume 4, Issue 1, 2021, Pages 25-34]
-
Communication
Scheduling Data-Driven Workflows in Multi-Cloud Environment [Volume 1, Issue 1, 2018, Pages 33-42]
-
Community detection
Multi-agent memetic algorithm and its application to community structure detection in complex networks [Volume 5, Issue 1, 2022, Pages 21-37]
-
Complex systems
Multi-agent memetic algorithm and its application to community structure detection in complex networks [Volume 5, Issue 1, 2022, Pages 21-37]
-
Concept drift
Trace2Vec-CDD: A Framework for Concept Drift Detection in Business Process Logs using Trace Embedding [Volume 6, Issue 1, 2023, Pages 71-79]
-
Confidence
STAR: Improved Algorithm based on Sliding Window for Trust-Aware Routing in WSNs [Volume 1, Issue 2, 2018, Pages 33-46]
-
Congestion control
Increasing the Performance of Reactive Routing Protocol using the Load Balancing and Congestion Control Mechanism in MANET [Volume 2, Issue 1, 2019, Pages 33-42]
-
Connectionist Temporal Classification
Modeling Intra-label Dynamics and Analyzing the Role of Blank in Connectionist Temporal Classification [Volume 1, Issue 2, 2018, Pages 47-54]
-
Convolutional Neural Network
Diagnosing of Skin Lesions Using Deep Convolutional Neural Network and Support Vector Machines [Volume 7, Issue 1, 2024, Pages 37-48]
-
Copula functions
Enhancing Average Secrecy Rates in Downlink NOMA with Dependent Channel Coefficients and Optimal Power Coefficients [Volume 7, Issue 1, 2024, Pages 9-16]
-
Copula theory
Analysis of the Impact of Wireless Three-User Multiple Access Channel Coefficients Correlation on Outage Probability: A Copula-Based Approach [Volume 6, Issue 2, 2023, Pages 25-30]
-
Correlation
Novel Correlation-based Feature Selection Approach using Manta Ray Foraging Optimization [Volume 6, Issue 1, 2023, Pages 81-100]
-
Cost
Cost-Efficient Task Scheduling Algorithm for Reducing Energy Consumption and Makespan of Cloud Computing [Volume 5, Issue 1, 2022, Pages 1-12]
-
Cost-Benefit Analysis
Dynamic Security Risk Management Considering Systems Structural and Probabilistic Attributes [Volume 6, Issue 2, 2023, Pages 41-56]
-
Countermeasure Analysis
Dynamic Security Risk Management Considering Systems Structural and Probabilistic Attributes [Volume 6, Issue 2, 2023, Pages 41-56]
-
Covid-19
The impact of preprocessing techniques for Covid-19 mortality prediction [Volume 5, Issue 2, 2022, Pages 57-66]
-
COVID-19 Detection
Machine Learning Classifiers and Data Synthesis Techniques to Tackle with Highly Imbalanced COVID-19 Data [Volume 7, Issue 2, 2024, Pages 51-64]
-
CRM
PLI-X: Temporal Association Rules Mining in Customer Relationship Management Systems [Volume 2, Issue 2, 2019, Pages 29-48]
-
CTGAN
Machine Learning Classifiers and Data Synthesis Techniques to Tackle with Highly Imbalanced COVID-19 Data [Volume 7, Issue 2, 2024, Pages 51-64]
-
Customer credit risk
Assessment of Customer Credit Risk using an Adaptive Neuro-Fuzzy System [Volume 2, Issue 2, 2019, Pages 19-28]
-
C-V2X Optimization
Enhancing Channel Selection in 5G with Decentralized Federated Multi-Agent Deep Reinforcement Learning [Volume 7, Issue 2, 2024, Pages 1-16]
D
-
Data analysis
Evaluating Developers’ Expertise in Serverless Functions by Mining Activities from Multiple Platforms [Volume 7, Issue 2, 2024, Pages 27-42]
-
Data Dependency
Scheduling Data-Driven Workflows in Multi-Cloud Environment [Volume 1, Issue 1, 2018, Pages 33-42]
-
Data mining
Assessment of the Metabolic Syndrome in Children and Adolescents in Birjand, Iran: A Data Mining Approach [Volume 3, Issue 2, 2020, Pages 21-30]
-
Data mining
The impact of preprocessing techniques for Covid-19 mortality prediction [Volume 5, Issue 2, 2022, Pages 57-66]
-
Data Replication
A Data Replication Algorithm for Improving Server Efficiency in Cloud Computing Using PSO and Fuzzy Systems [Volume 6, Issue 2, 2023, Pages 1-14]
-
Deception
Efficient and Deception Resilient Rumor Detection in Twitter [Volume 5, Issue 2, 2022, Pages 21-30]
-
Decision making
DAMP: Decision-Making with the Combination of Analytical Hierarchy Process and Deep Learning (Case study: Car Sales Forecasting) [Volume 4, Issue 2, 2021, Pages 17-22]
-
Decision Tree
Assessment of the Metabolic Syndrome in Children and Adolescents in Birjand, Iran: A Data Mining Approach [Volume 3, Issue 2, 2020, Pages 21-30]
-
Deep Neural Network
Anomaly Detection in Traffic Trajectories Using a Combination of Fuzzy, Deep Convolutional and Autoencoder Networks [Volume 4, Issue 2, 2021, Pages 1-10]
-
Deep Q-Network (DQN)
Uncertainty-aware Path Planning using Reinforcement Learning and Deep Learning Methods [Volume 3, Issue 1, 2020, Pages 25-37]
-
Degree centrality
Proximity-Aware Degree-Based Heuristics for the Influence Maximization Problem [Volume 5, Issue 1, 2022, Pages 37-46]
-
Dependency Parser
Improving Persian Dependency-Based Parser Using Deep Learning [Volume 5, Issue 1, 2022, Pages 13-20]
-
Description generation
Description-based Post-hoc Explanation for Twitter List Recommendations [Volume 7, Issue 2, 2024, Pages 43-50]
-
Detection Anomaly
Anomaly Detection in IoMT Environment Based on Machine Learning: An Overview [Volume 7, Issue 2, 2024, Pages 65-74]
-
Distributed Particle Filter
Particle Filter based Target Tracking in Wireless Sensor Networks using Support Vector Machine [Volume 1, Issue 2, 2018, Pages 13-20]
-
Distributed Storage
An Energy Efficient Data Dissemination Scheme for Distributed Storage in the Internet of Things [Volume 1, Issue 1, 2018, Pages 1-8]
-
DODAG
Designing Optimized Scheduling QoS-Aware RPL for Sensor-Based Smart Grid Communication Network [Volume 1, Issue 1, 2018, Pages 21-32]
-
DRL-based Channel Access
Enhancing Channel Selection in 5G with Decentralized Federated Multi-Agent Deep Reinforcement Learning [Volume 7, Issue 2, 2024, Pages 1-16]
-
Duplicate Detection
A Novel Two-Step Classification Approach for Runtime Performance Improvement of Duplicate Bug Report Detection [Volume 6, Issue 1, 2023, Pages 1-14]
-
Dynamic Programming
β-sheet Topology Prediction Using Probability-based Integer Programming [Volume 1, Issue 1, 2018, Pages 53-64]
E
-
Echo hiding
Presenting a Method for Improving Echo Hiding [Volume 2, Issue 1, 2019, Pages 11-24]
-
EEG/Evoked Potentials
Exploring Effective Features in ADHD Diagnosis among Children through EEG/Evoked Potentials using Machine Learning Techniques [Volume 5, Issue 2, 2022, Pages 1-10]
-
Efficiency
An Efficient Ramp Secret Sharing Scheme Based on Zigzag-Decodable Codes [Volume 6, Issue 2, 2023, Pages 15-24]
-
Email spam detection
A New Feature Selection in Email Spam Detection by Particle Swarm Optimization and Fruit Fly Optimization Algorithms [Volume 2, Issue 2, 2019, Pages 49-62]
-
Embedded operating system
A State-aware Approach for Robustness Testing of Embedded Real-Time Operating Systems [Volume 2, Issue 1, 2019, Pages 43-52]
-
Embedding Neural Network
Embedding Knowledge Graph through Triple Base Neural Network and Positive Samples [Volume 5, Issue 2, 2022, Pages 11-20]
-
Energy Consumption
A Heuristic Method for Node Management in Large-Scale Wireless Sensor Network Considering Connectivity and Energy Consumption [Volume 2, Issue 1, 2019, Pages 53-62]
-
Energy Consumption
Migration Management in Sensor-Cloud Networks [Volume 1, Issue 2, 2018, Pages 1-12]
-
Energy Consumption
Cost-Efficient Task Scheduling Algorithm for Reducing Energy Consumption and Makespan of Cloud Computing [Volume 5, Issue 1, 2022, Pages 1-12]
-
Energy Efficient
An Energy Efficient Data Dissemination Scheme for Distributed Storage in the Internet of Things [Volume 1, Issue 1, 2018, Pages 1-8]
-
Energy Optimization
Optimization of FlexiTP Energy-Aware Algorithm in Wireless Sensor Networks [Volume 6, Issue 2, 2023, Pages 31-40]
-
Ensemble learning
ENIXMA: ENsemble of EXplainable Methods for detecting network Attack [Volume 7, Issue 1, 2024, Pages 1-8]
-
Entity Matching
Profile Matching in Heterogeneous Academic Social Networks using Knowledge Graphs [Volume 7, Issue 1, 2024, Pages 27-36]
-
Evolutionary algorithm
SSLBM: A New Fraud Detection Method Based on Semi- Supervised Learning [Volume 2, Issue 2, 2019, Pages 10-18]
-
Evolutionary Game Theory, Rumor spreading
Modeling and Analysis of Rumor Control Strategies in Social Networks [Volume 5, Issue 1, 2022, Pages 59-68]
-
Explainable recommender systems
Description-based Post-hoc Explanation for Twitter List Recommendations [Volume 7, Issue 2, 2024, Pages 43-50]
-
Extended Morphological Profiles
Spatial-Spectral Classification of Hyperspectral Images Based on Extended Morphological Profiles and Guided Filter [Volume 2, Issue 2, 2019, Pages 2-8]
F
-
Farlie-Gumbel-Morgenstern
Analysis of the Impact of Wireless Three-User Multiple Access Channel Coefficients Correlation on Outage Probability: A Copula-Based Approach [Volume 6, Issue 2, 2023, Pages 25-30]
-
Fault injection
A State-aware Approach for Robustness Testing of Embedded Real-Time Operating Systems [Volume 2, Issue 1, 2019, Pages 43-52]
-
Feature extraction
SSLBM: A New Fraud Detection Method Based on Semi- Supervised Learning [Volume 2, Issue 2, 2019, Pages 10-18]
-
Feature extraction
Exploring Effective Features in ADHD Diagnosis among Children through EEG/Evoked Potentials using Machine Learning Techniques [Volume 5, Issue 2, 2022, Pages 1-10]
-
Feature selection
A New Feature Selection in Email Spam Detection by Particle Swarm Optimization and Fruit Fly Optimization Algorithms [Volume 2, Issue 2, 2019, Pages 49-62]
-
Feature selection
The impact of preprocessing techniques for Covid-19 mortality prediction [Volume 5, Issue 2, 2022, Pages 57-66]
-
Feature selection
Exploring Effective Features in ADHD Diagnosis among Children through EEG/Evoked Potentials using Machine Learning Techniques [Volume 5, Issue 2, 2022, Pages 1-10]
-
Feature selection
Novel Correlation-based Feature Selection Approach using Manta Ray Foraging Optimization [Volume 6, Issue 1, 2023, Pages 81-100]
-
Feature selection
An Enhanced Sine Cosine Algorithm for Feature Selection in Network Intrusion Detection [Volume 7, Issue 2, 2024, Pages 17-26]
-
Federated Learning Integration
Enhancing Channel Selection in 5G with Decentralized Federated Multi-Agent Deep Reinforcement Learning [Volume 7, Issue 2, 2024, Pages 1-16]
-
FlexiTP
Optimization of FlexiTP Energy-Aware Algorithm in Wireless Sensor Networks [Volume 6, Issue 2, 2023, Pages 31-40]
-
Fraud
SSLBM: A New Fraud Detection Method Based on Semi- Supervised Learning [Volume 2, Issue 2, 2019, Pages 10-18]
-
Fraud detection
SSLBM: A New Fraud Detection Method Based on Semi- Supervised Learning [Volume 2, Issue 2, 2019, Pages 10-18]
-
Fruit fly optimization
A New Feature Selection in Email Spam Detection by Particle Swarm Optimization and Fruit Fly Optimization Algorithms [Volume 2, Issue 2, 2019, Pages 49-62]
-
FSR Protocol
A Transmission Method to Guarantee QoS Parameters in Wireless Sensor Networks [Volume 1, Issue 2, 2018, Pages 21-26]
-
FSR Protocol
A Novel Routing Algorithm for Mobile ad-hoc Networks Based on Q-learning and its Generalization to FSR Routing Protocol [Volume 1, Issue 2, 2018, Pages 27-32]
-
Fuzzy logic
Fuzzy Q-Learning Traffic Light Control based on Traffic Flow and Pedestrian Number Estimated from Visual Information [Volume 2, Issue 1, 2019, Pages 1-10]
-
Fuzzy system
Assessment of Customer Credit Risk using an Adaptive Neuro-Fuzzy System [Volume 2, Issue 2, 2019, Pages 19-28]
-
Fuzzy Systems
A Data Replication Algorithm for Improving Server Efficiency in Cloud Computing Using PSO and Fuzzy Systems [Volume 6, Issue 2, 2023, Pages 1-14]
G
-
Graph mining
Embedding Knowledge Graph through Triple Base Neural Network and Positive Samples [Volume 5, Issue 2, 2022, Pages 11-20]
-
Guided Filter
Spatial-Spectral Classification of Hyperspectral Images Based on Extended Morphological Profiles and Guided Filter [Volume 2, Issue 2, 2019, Pages 2-8]
H
-
Handwriting Recognition
Modeling Intra-label Dynamics and Analyzing the Role of Blank in Connectionist Temporal Classification [Volume 1, Issue 2, 2018, Pages 47-54]
-
Hard real-time
Safety Verification of Rate-Monotonic Least-Splitting Real-Time Scheduler on Multiprocessor System [Volume 1, Issue 1, 2018, Pages 43-52]
-
Heterogeneity
Profile Matching in Heterogeneous Academic Social Networks using Knowledge Graphs [Volume 7, Issue 1, 2024, Pages 27-36]
-
Heuristic algorithm
Proximity-Aware Degree-Based Heuristics for the Influence Maximization Problem [Volume 5, Issue 1, 2022, Pages 37-46]
-
Higher Education Ontology
Proposing an Integrated Multi Source Ontology Construction Methodology [Volume 3, Issue 1, 2020, Pages 11-24]
-
Hybrid ALOHA
Generalized Model of Hybrid ALOHA [(Articles in Press)]
-
Hyperspectral
Spatial-Spectral Classification of Hyperspectral Images Based on Extended Morphological Profiles and Guided Filter [Volume 2, Issue 2, 2019, Pages 2-8]
I
-
Impact assessment
A Model to Measure Effectiveness in Cyber Security Situational Awareness [Volume 7, Issue 1, 2024, Pages 17-26]
-
Incremental Mining
PLI-X: Temporal Association Rules Mining in Customer Relationship Management Systems [Volume 2, Issue 2, 2019, Pages 29-48]
-
Independent cascade model
Proximity-Aware Degree-Based Heuristics for the Influence Maximization Problem [Volume 5, Issue 1, 2022, Pages 37-46]
-
Index terms
A Multi-Objective Dynamic Scheduling Approach for IoT Task Offloading on Amazon EC2 Spot Instances [Volume 3, Issue 1, 2020, Pages 1-10]
-
Index terms
Assessment of the Metabolic Syndrome in Children and Adolescents in Birjand, Iran: A Data Mining Approach [Volume 3, Issue 2, 2020, Pages 21-30]
-
Influence maximization
Proximity-Aware Degree-Based Heuristics for the Influence Maximization Problem [Volume 5, Issue 1, 2022, Pages 37-46]
-
Influential users
P-centrality: An Improvement for Information Diffusion Maximization in Weighted Social Networks [Volume 6, Issue 1, 2023, Pages 59-70]
-
Intelligent traffic control system
Fuzzy Q-Learning Traffic Light Control based on Traffic Flow and Pedestrian Number Estimated from Visual Information [Volume 2, Issue 1, 2019, Pages 1-10]
-
Internet of Medical Things
Anomaly Detection in IoMT Environment Based on Machine Learning: An Overview [Volume 7, Issue 2, 2024, Pages 65-74]
-
Internet of Things
A Lightweighted Secure Scheme for Data Aggregation in Large-Scale IoT-Based Smart Grids [Volume 6, Issue 2, 2023, Pages 57-66]
-
Internet of vehicle
An Efficient Resource Allocation Algorithm for Task Offloading in the Internet of Vehicles [(Articles in Press)]
-
Interpretability
ENIXMA: ENsemble of EXplainable Methods for detecting network Attack [Volume 7, Issue 1, 2024, Pages 1-8]
-
Intrusion detection
A Deep Neural Network Architecture for Intrusion Detection in Software-Defined Networks [Volume 5, Issue 2, 2022, Pages 31-44]
-
Intrusion detection system
ENIXMA: ENsemble of EXplainable Methods for detecting network Attack [Volume 7, Issue 1, 2024, Pages 1-8]
-
Isolation Forest
Anomaly Detection in IoMT Environment Based on Machine Learning: An Overview [Volume 7, Issue 2, 2024, Pages 65-74]
-
Iterative numerical methods
Accelerating Iterative Methods for Bounded Reachability Probabilities in Markov Decision Processes [Volume 3, Issue 2, 2020, Pages 31-36]
K
-
Key agreement
A Key Management Schema Based on ECC to Secure the Substation and Control Center Communications in Smart Grids [Volume 2, Issue 1, 2019, Pages 25-32]
-
Keywords-- Developer Expertise Evaluation
Evaluating Developers’ Expertise in Serverless Functions by Mining Activities from Multiple Platforms [Volume 7, Issue 2, 2024, Pages 27-42]
-
Knapsack problems
Application of Black Hole Algorithm for Solving Knapsack Problems [Volume 4, Issue 2, 2021, Pages 11-16]
-
KNIME Tool
The impact of preprocessing techniques for Covid-19 mortality prediction [Volume 5, Issue 2, 2022, Pages 57-66]
-
Knowledge base
Knowledge-Based Semantic Information Indexing and Management Framework: Integration of Structured Knowledge and Information Management Systems* [Volume 3, Issue 2, 2020, Pages 1-20]
-
Knowledge-based Information System
Knowledge-Based Semantic Information Indexing and Management Framework: Integration of Structured Knowledge and Information Management Systems* [Volume 3, Issue 2, 2020, Pages 1-20]
-
Knowledge Graphs
Embedding Knowledge Graph through Triple Base Neural Network and Positive Samples [Volume 5, Issue 2, 2022, Pages 11-20]
L
-
Link Prediction
Embedding Knowledge Graph through Triple Base Neural Network and Positive Samples [Volume 5, Issue 2, 2022, Pages 11-20]
-
Load balancing
Increasing the Performance of Reactive Routing Protocol using the Load Balancing and Congestion Control Mechanism in MANET [Volume 2, Issue 1, 2019, Pages 33-42]
M
-
Machine learning
A Novel Two-Step Classification Approach for Runtime Performance Improvement of Duplicate Bug Report Detection [Volume 6, Issue 1, 2023, Pages 1-14]
-
Machine learning
ENIXMA: ENsemble of EXplainable Methods for detecting network Attack [Volume 7, Issue 1, 2024, Pages 1-8]
-
Machine learning
Machine Learning Classifiers and Data Synthesis Techniques to Tackle with Highly Imbalanced COVID-19 Data [Volume 7, Issue 2, 2024, Pages 51-64]
-
Machine Learning Algorithms
Evaluating Developers’ Expertise in Serverless Functions by Mining Activities from Multiple Platforms [Volume 7, Issue 2, 2024, Pages 27-42]
-
Makespan
Cost-Efficient Task Scheduling Algorithm for Reducing Energy Consumption and Makespan of Cloud Computing [Volume 5, Issue 1, 2022, Pages 1-12]
-
MANET
Increasing the Performance of Reactive Routing Protocol using the Load Balancing and Congestion Control Mechanism in MANET [Volume 2, Issue 1, 2019, Pages 33-42]
-
Markov decision processes
Accelerating Iterative Methods for Bounded Reachability Probabilities in Markov Decision Processes [Volume 3, Issue 2, 2020, Pages 31-36]
-
Measure of Effectiveness
A Model to Measure Effectiveness in Cyber Security Situational Awareness [Volume 7, Issue 1, 2024, Pages 17-26]
-
Medium-shot Learning
Meta-Learning for Medium-shot Sparse Learning via Deep Kernels [Volume 5, Issue 2, 2022, Pages 45-56]
-
Metabolic Syndrome
Assessment of the Metabolic Syndrome in Children and Adolescents in Birjand, Iran: A Data Mining Approach [Volume 3, Issue 2, 2020, Pages 21-30]
-
Meta-heuristic algorithms
A Data Replication Algorithm for Improving Server Efficiency in Cloud Computing Using PSO and Fuzzy Systems [Volume 6, Issue 2, 2023, Pages 1-14]
-
Meta-heuristic algorithms
An Enhanced Sine Cosine Algorithm for Feature Selection in Network Intrusion Detection [Volume 7, Issue 2, 2024, Pages 17-26]
-
Migration
Migration Management in Sensor-Cloud Networks [Volume 1, Issue 2, 2018, Pages 1-12]
-
Mobile ad-hoc Networks
A Transmission Method to Guarantee QoS Parameters in Wireless Sensor Networks [Volume 1, Issue 2, 2018, Pages 21-26]
-
Mobile ad-hoc Networks
A Novel Routing Algorithm for Mobile ad-hoc Networks Based on Q-learning and its Generalization to FSR Routing Protocol [Volume 1, Issue 2, 2018, Pages 27-32]
-
Motif Discovery
A Taxonomy for RNA Motif Discovery [Volume 6, Issue 1, 2023, Pages 15-26]
-
MPR model
Generalized Model of Hybrid ALOHA [(Articles in Press)]
-
MSTParser
Improving Persian Dependency-Based Parser Using Deep Learning [Volume 5, Issue 1, 2022, Pages 13-20]
-
Multi-Agent Learning
Enhancing Channel Selection in 5G with Decentralized Federated Multi-Agent Deep Reinforcement Learning [Volume 7, Issue 2, 2024, Pages 1-16]
-
Multi-agent systems
Multi-agent memetic algorithm and its application to community structure detection in complex networks [Volume 5, Issue 1, 2022, Pages 21-37]
-
Multi-cloud
Scheduling Data-Driven Workflows in Multi-Cloud Environment [Volume 1, Issue 1, 2018, Pages 33-42]
-
Multidimensional Long Short Term Memory
Modeling Intra-label Dynamics and Analyzing the Role of Blank in Connectionist Temporal Classification [Volume 1, Issue 2, 2018, Pages 47-54]
-
Multiprocessor Scheduling
Safety Verification of Rate-Monotonic Least-Splitting Real-Time Scheduler on Multiprocessor System [Volume 1, Issue 1, 2018, Pages 43-52]
-
Multi-Value Logic
Two Efficient Ternary Adder Designs Based On CNFET Technology [Volume 4, Issue 1, 2021, Pages 25-34]
N
-
Naïve Bayes
Classification of Persian News Articles using Machine Learning Techniques [Volume 4, Issue 1, 2021, Pages 1-10]
-
Network anomaly detection
ENIXMA: ENsemble of EXplainable Methods for detecting network Attack [Volume 7, Issue 1, 2024, Pages 1-8]
-
Network Architecture
Towards Leveraging Structure for Neural Predictor in NAS [Volume 5, Issue 1, 2022, Pages 47-58]
-
Network Longevity
Optimization of FlexiTP Energy-Aware Algorithm in Wireless Sensor Networks [Volume 6, Issue 2, 2023, Pages 31-40]
-
Network security
A Deep Neural Network Architecture for Intrusion Detection in Software-Defined Networks [Volume 5, Issue 2, 2022, Pages 31-44]
-
Neural Architecture Search
Towards Leveraging Structure for Neural Predictor in NAS [Volume 5, Issue 1, 2022, Pages 47-58]
-
Neural-Fuzzy Inference System
Anomaly Detection in Traffic Trajectories Using a Combination of Fuzzy, Deep Convolutional and Autoencoder Networks [Volume 4, Issue 2, 2021, Pages 1-10]
-
News text classification
Classification of Persian News Articles using Machine Learning Techniques [Volume 4, Issue 1, 2021, Pages 1-10]
-
Non-orthogonal multiple access (NOMA)
Enhancing Average Secrecy Rates in Downlink NOMA with Dependent Channel Coefficients and Optimal Power Coefficients [Volume 7, Issue 1, 2024, Pages 9-16]
O
-
Ontology
Knowledge-Based Semantic Information Indexing and Management Framework: Integration of Structured Knowledge and Information Management Systems* [Volume 3, Issue 2, 2020, Pages 1-20]
-
Ontology Development
Proposing an Integrated Multi Source Ontology Construction Methodology [Volume 3, Issue 1, 2020, Pages 11-24]
-
Ontology Learning
Proposing an Integrated Multi Source Ontology Construction Methodology [Volume 3, Issue 1, 2020, Pages 11-24]
-
OpenFlow Controllers
Performance Evaluation of Software-Defined Networking Controllers: A Comparative Study [Volume 2, Issue 2, 2019, Pages 63-73]
-
Optimal power coefficients
Enhancing Average Secrecy Rates in Downlink NOMA with Dependent Channel Coefficients and Optimal Power Coefficients [Volume 7, Issue 1, 2024, Pages 9-16]
-
Optimization
Application of Black Hole Algorithm for Solving Knapsack Problems [Volume 4, Issue 2, 2021, Pages 11-16]
-
Optimization
Novel Correlation-based Feature Selection Approach using Manta Ray Foraging Optimization [Volume 6, Issue 1, 2023, Pages 81-100]
P
-
Particle swarm optimization
A New Feature Selection in Email Spam Detection by Particle Swarm Optimization and Fruit Fly Optimization Algorithms [Volume 2, Issue 2, 2019, Pages 49-62]
-
Path planning
Uncertainty-aware Path Planning using Reinforcement Learning and Deep Learning Methods [Volume 3, Issue 1, 2020, Pages 25-37]
-
Performance Evaluation
Performance Evaluation of Software-Defined Networking Controllers: A Comparative Study [Volume 2, Issue 2, 2019, Pages 63-73]
-
Persian
Improving Persian Dependency-Based Parser Using Deep Learning [Volume 5, Issue 1, 2022, Pages 13-20]
-
Personalized Privacy
Personalized Privacy Preserving Method for Social Networks Graph k-Anonymization [Volume 6, Issue 1, 2023, Pages 37-46]
-
Phrase-structure Tree
Improving Persian Dependency-Based Parser Using Deep Learning [Volume 5, Issue 1, 2022, Pages 13-20]
-
Positive Samples
Embedding Knowledge Graph through Triple Base Neural Network and Positive Samples [Volume 5, Issue 2, 2022, Pages 11-20]
-
Post-hoc explanation
Description-based Post-hoc Explanation for Twitter List Recommendations [Volume 7, Issue 2, 2024, Pages 43-50]
-
Power consumption
A Data Replication Algorithm for Improving Server Efficiency in Cloud Computing Using PSO and Fuzzy Systems [Volume 6, Issue 2, 2023, Pages 1-14]
-
Pre-large Itemsets
PLI-X: Temporal Association Rules Mining in Customer Relationship Management Systems [Volume 2, Issue 2, 2019, Pages 29-48]
-
Principal Components Analysis
Spatial-Spectral Classification of Hyperspectral Images Based on Extended Morphological Profiles and Guided Filter [Volume 2, Issue 2, 2019, Pages 2-8]
-
Privacy Preserving
Personalized Privacy Preserving Method for Social Networks Graph k-Anonymization [Volume 6, Issue 1, 2023, Pages 37-46]
-
Probabilistic model checking
Accelerating Iterative Methods for Bounded Reachability Probabilities in Markov Decision Processes [Volume 3, Issue 2, 2020, Pages 31-36]
-
Process changes
Trace2Vec-CDD: A Framework for Concept Drift Detection in Business Process Logs using Trace Embedding [Volume 6, Issue 1, 2023, Pages 71-79]
-
Process mining
Trace2Vec-CDD: A Framework for Concept Drift Detection in Business Process Logs using Trace Embedding [Volume 6, Issue 1, 2023, Pages 71-79]
Q
-
Q-learning
Uncertainty-aware Path Planning using Reinforcement Learning and Deep Learning Methods [Volume 3, Issue 1, 2020, Pages 25-37]
-
QoS
Designing Optimized Scheduling QoS-Aware RPL for Sensor-Based Smart Grid Communication Network [Volume 1, Issue 1, 2018, Pages 21-32]
-
Quality of Service
Performance Evaluation of Software-Defined Networking Controllers: A Comparative Study [Volume 2, Issue 2, 2019, Pages 63-73]
R
-
Ramp secret sharing scheme
An Efficient Ramp Secret Sharing Scheme Based on Zigzag-Decodable Codes [Volume 6, Issue 2, 2023, Pages 15-24]
-
Rate-Monotonic Least Splitting
Safety Verification of Rate-Monotonic Least-Splitting Real-Time Scheduler on Multiprocessor System [Volume 1, Issue 1, 2018, Pages 43-52]
-
Reactive Routing
Increasing the Performance of Reactive Routing Protocol using the Load Balancing and Congestion Control Mechanism in MANET [Volume 2, Issue 1, 2019, Pages 33-42]
-
Recurrent Neural Networks
Modeling Intra-label Dynamics and Analyzing the Role of Blank in Connectionist Temporal Classification [Volume 1, Issue 2, 2018, Pages 47-54]
-
Regression
DAMP: Decision-Making with the Combination of Analytical Hierarchy Process and Deep Learning (Case study: Car Sales Forecasting) [Volume 4, Issue 2, 2021, Pages 17-22]
-
Reinforcement learning
A Transmission Method to Guarantee QoS Parameters in Wireless Sensor Networks [Volume 1, Issue 2, 2018, Pages 21-26]
-
Reinforcement learning
A Novel Routing Algorithm for Mobile ad-hoc Networks Based on Q-learning and its Generalization to FSR Routing Protocol [Volume 1, Issue 2, 2018, Pages 27-32]
-
Reinforcement learning
Uncertainty-aware Path Planning using Reinforcement Learning and Deep Learning Methods [Volume 3, Issue 1, 2020, Pages 25-37]
-
Representation Learning
Towards Leveraging Structure for Neural Predictor in NAS [Volume 5, Issue 1, 2022, Pages 47-58]
-
Resource Allocation
An Efficient Resource Allocation Algorithm for Task Offloading in the Internet of Vehicles [(Articles in Press)]
-
Risk Assessment
Assessment of Customer Credit Risk using an Adaptive Neuro-Fuzzy System [Volume 2, Issue 2, 2019, Pages 19-28]
-
RNA Motif
A Taxonomy for RNA Motif Discovery [Volume 6, Issue 1, 2023, Pages 15-26]
-
Robustness level assessment
A State-aware Approach for Robustness Testing of Embedded Real-Time Operating Systems [Volume 2, Issue 1, 2019, Pages 43-52]
-
Robustness testing
A State-aware Approach for Robustness Testing of Embedded Real-Time Operating Systems [Volume 2, Issue 1, 2019, Pages 43-52]
-
Routing
STAR: Improved Algorithm based on Sliding Window for Trust-Aware Routing in WSNs [Volume 1, Issue 2, 2018, Pages 33-46]
-
Routing Algorithm
A Transmission Method to Guarantee QoS Parameters in Wireless Sensor Networks [Volume 1, Issue 2, 2018, Pages 21-26]
-
Routing Algorithm
A Novel Routing Algorithm for Mobile ad-hoc Networks Based on Q-learning and its Generalization to FSR Routing Protocol [Volume 1, Issue 2, 2018, Pages 27-32]
-
Routing in MANETs
A Transmission Method to Guarantee QoS Parameters in Wireless Sensor Networks [Volume 1, Issue 2, 2018, Pages 21-26]
-
Routing in MANETs
A Novel Routing Algorithm for Mobile ad-hoc Networks Based on Q-learning and its Generalization to FSR Routing Protocol [Volume 1, Issue 2, 2018, Pages 27-32]
-
RPL
Designing Optimized Scheduling QoS-Aware RPL for Sensor-Based Smart Grid Communication Network [Volume 1, Issue 1, 2018, Pages 21-32]
-
Rumor control
Modeling and Analysis of Rumor Control Strategies in Social Networks [Volume 5, Issue 1, 2022, Pages 59-68]
-
Rumor detection
Efficient and Deception Resilient Rumor Detection in Twitter [Volume 5, Issue 2, 2022, Pages 21-30]
-
Runtime Performance
A Novel Two-Step Classification Approach for Runtime Performance Improvement of Duplicate Bug Report Detection [Volume 6, Issue 1, 2023, Pages 1-14]
S
-
Safety-critical systems
A State-aware Approach for Robustness Testing of Embedded Real-Time Operating Systems [Volume 2, Issue 1, 2019, Pages 43-52]
-
Sample-based Interpretability
Meta-Learning for Medium-shot Sparse Learning via Deep Kernels [Volume 5, Issue 2, 2022, Pages 45-56]
-
School-Age Population
Assessment of the Metabolic Syndrome in Children and Adolescents in Birjand, Iran: A Data Mining Approach [Volume 3, Issue 2, 2020, Pages 21-30]
-
Search Space Pruning
Towards Leveraging Structure for Neural Predictor in NAS [Volume 5, Issue 1, 2022, Pages 47-58]
-
Search Space Reduction
A Novel Two-Step Classification Approach for Runtime Performance Improvement of Duplicate Bug Report Detection [Volume 6, Issue 1, 2023, Pages 1-14]
-
Security
A Key Management Schema Based on ECC to Secure the Substation and Control Center Communications in Smart Grids [Volume 2, Issue 1, 2019, Pages 25-32]
-
Security Risk Management
Dynamic Security Risk Management Considering Systems Structural and Probabilistic Attributes [Volume 6, Issue 2, 2023, Pages 41-56]
-
Semantic Indexing
Knowledge-Based Semantic Information Indexing and Management Framework: Integration of Structured Knowledge and Information Management Systems* [Volume 3, Issue 2, 2020, Pages 1-20]
-
Semantic Network Representation
Knowledge-Based Semantic Information Indexing and Management Framework: Integration of Structured Knowledge and Information Management Systems* [Volume 3, Issue 2, 2020, Pages 1-20]
-
Semi-Partitioning
Safety Verification of Rate-Monotonic Least-Splitting Real-Time Scheduler on Multiprocessor System [Volume 1, Issue 1, 2018, Pages 43-52]
-
Semi-supervised learning
SSLBM: A New Fraud Detection Method Based on Semi- Supervised Learning [Volume 2, Issue 2, 2019, Pages 10-18]
-
Sensor-cloud networks
Migration Management in Sensor-Cloud Networks [Volume 1, Issue 2, 2018, Pages 1-12]
-
Serverless Functions
Evaluating Developers’ Expertise in Serverless Functions by Mining Activities from Multiple Platforms [Volume 7, Issue 2, 2024, Pages 27-42]
-
Session key
A Key Management Schema Based on ECC to Secure the Substation and Control Center Communications in Smart Grids [Volume 2, Issue 1, 2019, Pages 25-32]
-
Sine Cosine Algorithm
An Enhanced Sine Cosine Algorithm for Feature Selection in Network Intrusion Detection [Volume 7, Issue 2, 2024, Pages 17-26]
-
Skin Cancer Detection
Diagnosing of Skin Lesions Using Deep Convolutional Neural Network and Support Vector Machines [Volume 7, Issue 1, 2024, Pages 37-48]
-
Skin Lesions Classification
Diagnosing of Skin Lesions Using Deep Convolutional Neural Network and Support Vector Machines [Volume 7, Issue 1, 2024, Pages 37-48]
-
Sliding Window
STAR: Improved Algorithm based on Sliding Window for Trust-Aware Routing in WSNs [Volume 1, Issue 2, 2018, Pages 33-46]
-
Smart grids
A Key Management Schema Based on ECC to Secure the Substation and Control Center Communications in Smart Grids [Volume 2, Issue 1, 2019, Pages 25-32]
-
Smart grids
A Lightweighted Secure Scheme for Data Aggregation in Large-Scale IoT-Based Smart Grids [Volume 6, Issue 2, 2023, Pages 57-66]
-
Social network
Modeling and Analysis of Rumor Control Strategies in Social Networks [Volume 5, Issue 1, 2022, Pages 59-68]
-
Social network
Efficient and Deception Resilient Rumor Detection in Twitter [Volume 5, Issue 2, 2022, Pages 21-30]
-
Social network
Personalized Privacy Preserving Method for Social Networks Graph k-Anonymization [Volume 6, Issue 1, 2023, Pages 37-46]
-
Software-defined network
A Deep Neural Network Architecture for Intrusion Detection in Software-Defined Networks [Volume 5, Issue 2, 2022, Pages 31-44]
-
Software-Defined Networking (SDN)
Performance Evaluation of Software-Defined Networking Controllers: A Comparative Study [Volume 2, Issue 2, 2019, Pages 63-73]
-
Software Development
Evaluating Developers’ Expertise in Serverless Functions by Mining Activities from Multiple Platforms [Volume 7, Issue 2, 2024, Pages 27-42]
-
Sparse Kernel
Meta-Learning for Medium-shot Sparse Learning via Deep Kernels [Volume 5, Issue 2, 2022, Pages 45-56]
-
Spot instances
A Multi-Objective Dynamic Scheduling Approach for IoT Task Offloading on Amazon EC2 Spot Instances [Volume 3, Issue 1, 2020, Pages 1-10]
-
Subjective Logic Model
STAR: Improved Algorithm based on Sliding Window for Trust-Aware Routing in WSNs [Volume 1, Issue 2, 2018, Pages 33-46]
-
Substation
A Key Management Schema Based on ECC to Secure the Substation and Control Center Communications in Smart Grids [Volume 2, Issue 1, 2019, Pages 25-32]
-
Support vector machine
Spatial-Spectral Classification of Hyperspectral Images Based on Extended Morphological Profiles and Guided Filter [Volume 2, Issue 2, 2019, Pages 2-8]
-
Support vector machine
Diagnosing of Skin Lesions Using Deep Convolutional Neural Network and Support Vector Machines [Volume 7, Issue 1, 2024, Pages 37-48]
-
Support Vector Machines
Particle Filter based Target Tracking in Wireless Sensor Networks using Support Vector Machine [Volume 1, Issue 2, 2018, Pages 13-20]
-
Susceptible-Infected-Recovered model
P-centrality: An Improvement for Information Diffusion Maximization in Weighted Social Networks [Volume 6, Issue 1, 2023, Pages 59-70]
T
-
Target Tracking
Particle Filter based Target Tracking in Wireless Sensor Networks using Support Vector Machine [Volume 1, Issue 2, 2018, Pages 13-20]
-
Task offloading
A Multi-Objective Dynamic Scheduling Approach for IoT Task Offloading on Amazon EC2 Spot Instances [Volume 3, Issue 1, 2020, Pages 1-10]
-
Task offloading
An Efficient Resource Allocation Algorithm for Task Offloading in the Internet of Vehicles [(Articles in Press)]
-
Task scheduling
Cost-Efficient Task Scheduling Algorithm for Reducing Energy Consumption and Makespan of Cloud Computing [Volume 5, Issue 1, 2022, Pages 1-12]
-
Temporal Database
PLI-X: Temporal Association Rules Mining in Customer Relationship Management Systems [Volume 2, Issue 2, 2019, Pages 29-48]
-
Ternary Adder
Two Efficient Ternary Adder Designs Based On CNFET Technology [Volume 4, Issue 1, 2021, Pages 25-34]
-
Ternary Logic
Two Efficient Ternary Adder Designs Based On CNFET Technology [Volume 4, Issue 1, 2021, Pages 25-34]
-
Test adaptation
A Semantic Web Enabled Approach to Automate Test Script Generation for Web Applications [Volume 4, Issue 1, 2021, Pages 11-24]
-
Test generation
A Semantic Web Enabled Approach to Automate Test Script Generation for Web Applications [Volume 4, Issue 1, 2021, Pages 11-24]
-
Test ontology
A Semantic Web Enabled Approach to Automate Test Script Generation for Web Applications [Volume 4, Issue 1, 2021, Pages 11-24]
-
Text mining
Classification of Persian News Articles using Machine Learning Techniques [Volume 4, Issue 1, 2021, Pages 1-10]
-
The Internet of Things
An Energy Efficient Data Dissemination Scheme for Distributed Storage in the Internet of Things [Volume 1, Issue 1, 2018, Pages 1-8]
-
The Internet of Things
A Multi-Objective Dynamic Scheduling Approach for IoT Task Offloading on Amazon EC2 Spot Instances [Volume 3, Issue 1, 2020, Pages 1-10]
-
Traffic density
Fuzzy Q-Learning Traffic Light Control based on Traffic Flow and Pedestrian Number Estimated from Visual Information [Volume 2, Issue 1, 2019, Pages 1-10]
-
Trajectory Anomaly Detection
Anomaly Detection in Traffic Trajectories Using a Combination of Fuzzy, Deep Convolutional and Autoencoder Networks [Volume 4, Issue 2, 2021, Pages 1-10]
-
Trust
STAR: Improved Algorithm based on Sliding Window for Trust-Aware Routing in WSNs [Volume 1, Issue 2, 2018, Pages 33-46]
-
TVAE
Machine Learning Classifiers and Data Synthesis Techniques to Tackle with Highly Imbalanced COVID-19 Data [Volume 7, Issue 2, 2024, Pages 51-64]
-
Twitter Lists
Description-based Post-hoc Explanation for Twitter List Recommendations [Volume 7, Issue 2, 2024, Pages 43-50]
U
-
Unsupervised Learning
Anomaly Detection in IoMT Environment Based on Machine Learning: An Overview [Volume 7, Issue 2, 2024, Pages 65-74]
W
-
Wireless communication systems
Enhancing Average Secrecy Rates in Downlink NOMA with Dependent Channel Coefficients and Optimal Power Coefficients [Volume 7, Issue 1, 2024, Pages 9-16]
-
Wireless sensor networks
Particle Filter based Target Tracking in Wireless Sensor Networks using Support Vector Machine [Volume 1, Issue 2, 2018, Pages 13-20]
-
Word embedding
Trace2Vec-CDD: A Framework for Concept Drift Detection in Business Process Logs using Trace Embedding [Volume 6, Issue 1, 2023, Pages 71-79]
-
Workflow Scheduling
Scheduling Data-Driven Workflows in Multi-Cloud Environment [Volume 1, Issue 1, 2018, Pages 33-42]
-
WSNs
Optimization of FlexiTP Energy-Aware Algorithm in Wireless Sensor Networks [Volume 6, Issue 2, 2023, Pages 31-40]
Z
-
Zigzag decodable codes
An Efficient Ramp Secret Sharing Scheme Based on Zigzag-Decodable Codes [Volume 6, Issue 2, 2023, Pages 15-24]
Your query does not match with any item