Keyword Index

A

  • Academic Social Networks Profile Matching in Heterogeneous Academic Social Networks using Knowledge Graphs [Volume 7, Issue 1, 2024, Pages 27-36]
  • Accuracy Novel Correlation-based Feature Selection Approach using Manta Ray Foraging Optimization [Volume 6, Issue 1, 2023, Pages 81-100]
  • Algorithm A Taxonomy for RNA Motif Discovery [Volume 6, Issue 1, 2023, Pages 15-26]
  • Analytical Hierarchy Process DAMP: Decision-Making with the Combination of Analytical Hierarchy Process and Deep Learning (Case study: Car Sales Forecasting) [Volume 4, Issue 2, 2021, Pages 17-22]
  • Anonymous Social Network Graph Personalized Privacy Preserving Method for Social Networks Graph k-Anonymization [Volume 6, Issue 1, 2023, Pages 37-46]
  • AOMDV Increasing the Performance of Reactive Routing Protocol using the Load Balancing and Congestion Control Mechanism in MANET [Volume 2, Issue 1, 2019, Pages 33-42]
  • Artificial Intelligence The impact of preprocessing techniques for Covid-19 mortality prediction [Volume 5, Issue 2, 2022, Pages 57-66]
  • Attack Graph Dynamic Security Risk Management Considering Systems Structural and Probabilistic Attributes [Volume 6, Issue 2, 2023, Pages 41-56]
  • Attention deficit hyperactivity disorder (ADHD) Exploring Effective Features in ADHD Diagnosis among Children through EEG/Evoked Potentials using Machine Learning Techniques [Volume 5, Issue 2, 2022, Pages 1-10]
  • Authentication A Key Management Schema Based on ECC to Secure the Substation and Control Center Communications in Smart Grids [Volume 2, Issue 1, 2019, Pages 25-32]
  • Autoencoder Neural Network Anomaly Detection in Traffic Trajectories Using a Combination of Fuzzy, Deep Convolutional and Autoencoder Networks [Volume 4, Issue 2, 2021, Pages 1-10]
  • Automated testing A Semantic Web Enabled Approach to Automate Test Script Generation for Web Applications [Volume 4, Issue 1, 2021, Pages 11-24]
  • Automatic Persian text classification Classification of Persian News Articles using Machine Learning Techniques [Volume 4, Issue 1, 2021, Pages 1-10]
  • Average secrecy rate Enhancing Average Secrecy Rates in Downlink NOMA with Dependent Channel Coefficients and Optimal Power Coefficients [Volume 7, Issue 1, 2024, Pages 9-16]

B

  • Banking Assessment of Customer Credit Risk using an Adaptive Neuro-Fuzzy System [Volume 2, Issue 2, 2019, Pages 19-28]
  • Bayesian Meta-Learning Meta-Learning for Medium-shot Sparse Learning via Deep Kernels [Volume 5, Issue 2, 2022, Pages 45-56]
  • Bayesian Network Dynamic Security Risk Management Considering Systems Structural and Probabilistic Attributes [Volume 6, Issue 2, 2023, Pages 41-56]
  • Bioinformatics A Taxonomy for RNA Motif Discovery [Volume 6, Issue 1, 2023, Pages 15-26]
  • Black hole algorithm Application of Black Hole Algorithm for Solving Knapsack Problems [Volume 4, Issue 2, 2021, Pages 11-16]
  • Blank Modeling Intra-label Dynamics and Analyzing the Role of Blank in Connectionist Temporal Classification [Volume 1, Issue 2, 2018, Pages 47-54]
  • Boolean operation An Efficient Ramp Secret Sharing Scheme Based on Zigzag-Decodable Codes [Volume 6, Issue 2, 2023, Pages 15-24]
  • Bounded Reachability probabilities Accelerating Iterative Methods for Bounded Reachability Probabilities in Markov Decision Processes [Volume 3, Issue 2, 2020, Pages 31-36]
  • Bug Report A Novel Two-Step Classification Approach for Runtime Performance Improvement of Duplicate Bug Report Detection [Volume 6, Issue 1, 2023, Pages 1-14]

C

  • Centrality measures P-centrality: An Improvement for Information Diffusion Maximization in Weighted Social Networks [Volume 6, Issue 1, 2023, Pages 59-70]
  • Cepstral coefficients Presenting a Method for Improving Echo Hiding [Volume 2, Issue 1, 2019, Pages 11-24]
  • Classification Spatial-Spectral Classification of Hyperspectral Images Based on Extended Morphological Profiles and Guided Filter [Volume 2, Issue 2, 2019, Pages 2-8]
  • Cloud Cost-Efficient Task Scheduling Algorithm for Reducing Energy Consumption and Makespan of Cloud Computing [Volume 5, Issue 1, 2022, Pages 1-12]
  • Cloud Computing Scheduling Data-Driven Workflows in Multi-Cloud Environment [Volume 1, Issue 1, 2018, Pages 33-42]
  • Cloud Computing A Multi-Objective Dynamic Scheduling Approach for IoT Task Offloading on Amazon EC2 Spot Instances [Volume 3, Issue 1, 2020, Pages 1-10]
  • Cloud Computing A Data Replication Algorithm for Improving Server Efficiency in Cloud Computing Using PSO and Fuzzy Systems [Volume 6, Issue 2, 2023, Pages 1-14]
  • CNFET Two Efficient Ternary Adder Designs Based On CNFET Technology [Volume 4, Issue 1, 2021, Pages 25-34]
  • Communication Scheduling Data-Driven Workflows in Multi-Cloud Environment [Volume 1, Issue 1, 2018, Pages 33-42]
  • Community detection Multi-agent memetic algorithm and its application to community structure detection in complex networks [Volume 5, Issue 1, 2022, Pages 21-37]
  • Complex systems Multi-agent memetic algorithm and its application to community structure detection in complex networks [Volume 5, Issue 1, 2022, Pages 21-37]
  • Concept drift Trace2Vec-CDD: A Framework for Concept Drift Detection in Business Process Logs using Trace Embedding [Volume 6, Issue 1, 2023, Pages 71-79]
  • Confidence STAR: Improved Algorithm based on Sliding Window for Trust-Aware Routing in WSNs [Volume 1, Issue 2, 2018, Pages 33-46]
  • Congestion control Increasing the Performance of Reactive Routing Protocol using the Load Balancing and Congestion Control Mechanism in MANET [Volume 2, Issue 1, 2019, Pages 33-42]
  • Connectionist Temporal Classification Modeling Intra-label Dynamics and Analyzing the Role of Blank in Connectionist Temporal Classification [Volume 1, Issue 2, 2018, Pages 47-54]
  • Convolutional Neural Network Diagnosing of Skin Lesions Using Deep Convolutional Neural Network and Support Vector Machines [Volume 7, Issue 1, 2024, Pages 37-48]
  • Copula functions Enhancing Average Secrecy Rates in Downlink NOMA with Dependent Channel Coefficients and Optimal Power Coefficients [Volume 7, Issue 1, 2024, Pages 9-16]
  • Copula theory Analysis of the Impact of Wireless Three-User Multiple Access Channel Coefficients Correlation on Outage Probability: A Copula-Based Approach [Volume 6, Issue 2, 2023, Pages 25-30]
  • Correlation Novel Correlation-based Feature Selection Approach using Manta Ray Foraging Optimization [Volume 6, Issue 1, 2023, Pages 81-100]
  • Cost Cost-Efficient Task Scheduling Algorithm for Reducing Energy Consumption and Makespan of Cloud Computing [Volume 5, Issue 1, 2022, Pages 1-12]
  • Cost-Benefit Analysis Dynamic Security Risk Management Considering Systems Structural and Probabilistic Attributes [Volume 6, Issue 2, 2023, Pages 41-56]
  • Countermeasure Analysis Dynamic Security Risk Management Considering Systems Structural and Probabilistic Attributes [Volume 6, Issue 2, 2023, Pages 41-56]
  • Covid-19 The impact of preprocessing techniques for Covid-19 mortality prediction [Volume 5, Issue 2, 2022, Pages 57-66]
  • CRM PLI-X: Temporal Association Rules Mining in Customer Relationship Management Systems [Volume 2, Issue 2, 2019, Pages 29-48]
  • Customer credit risk Assessment of Customer Credit Risk using an Adaptive Neuro-Fuzzy System [Volume 2, Issue 2, 2019, Pages 19-28]

D

  • Data analysis Evaluating Developers’ Expertise in Serverless Functions by Mining Activities from Multiple Platforms [(Articles in Press)]
  • Data Dependency Scheduling Data-Driven Workflows in Multi-Cloud Environment [Volume 1, Issue 1, 2018, Pages 33-42]
  • Data mining Assessment of the Metabolic Syndrome in Children and Adolescents in Birjand, Iran: A Data Mining Approach [Volume 3, Issue 2, 2020, Pages 21-30]
  • Data mining The impact of preprocessing techniques for Covid-19 mortality prediction [Volume 5, Issue 2, 2022, Pages 57-66]
  • Data Replication A Data Replication Algorithm for Improving Server Efficiency in Cloud Computing Using PSO and Fuzzy Systems [Volume 6, Issue 2, 2023, Pages 1-14]
  • Deception Efficient and Deception Resilient Rumor Detection in Twitter [Volume 5, Issue 2, 2022, Pages 21-30]
  • Decision making DAMP: Decision-Making with the Combination of Analytical Hierarchy Process and Deep Learning (Case study: Car Sales Forecasting) [Volume 4, Issue 2, 2021, Pages 17-22]
  • Decision Tree Assessment of the Metabolic Syndrome in Children and Adolescents in Birjand, Iran: A Data Mining Approach [Volume 3, Issue 2, 2020, Pages 21-30]
  • Deep Neural Network Anomaly Detection in Traffic Trajectories Using a Combination of Fuzzy, Deep Convolutional and Autoencoder Networks [Volume 4, Issue 2, 2021, Pages 1-10]
  • Deep Q-Network (DQN) Uncertainty-aware Path Planning using Reinforcement Learning and Deep Learning Methods [Volume 3, Issue 1, 2020, Pages 25-37]
  • Degree centrality Proximity-Aware Degree-Based Heuristics for the Influence Maximization Problem [Volume 5, Issue 1, 2022, Pages 37-46]
  • Dependency Parser Improving Persian Dependency-Based Parser Using Deep Learning [Volume 5, Issue 1, 2022, Pages 13-20]
  • Description generation Description-based Post-hoc Explanation for Twitter List Recommendations [(Articles in Press)]
  • Distributed Particle Filter Particle Filter based Target Tracking in Wireless Sensor Networks using Support Vector Machine [Volume 1, Issue 2, 2018, Pages 13-20]
  • Distributed Storage An Energy Efficient Data Dissemination Scheme for Distributed Storage in the Internet of Things [Volume 1, Issue 1, 2018, Pages 1-8]
  • DODAG Designing Optimized Scheduling QoS-Aware RPL for Sensor-Based Smart Grid Communication Network [Volume 1, Issue 1, 2018, Pages 21-32]
  • Duplicate Detection A Novel Two-Step Classification Approach for Runtime Performance Improvement of Duplicate Bug Report Detection [Volume 6, Issue 1, 2023, Pages 1-14]
  • Dynamic Programming β-sheet Topology Prediction Using Probability-based Integer Programming [Volume 1, Issue 1, 2018, Pages 53-64]

E

  • Echo hiding Presenting a Method for Improving Echo Hiding [Volume 2, Issue 1, 2019, Pages 11-24]
  • EEG/Evoked Potentials Exploring Effective Features in ADHD Diagnosis among Children through EEG/Evoked Potentials using Machine Learning Techniques [Volume 5, Issue 2, 2022, Pages 1-10]
  • Efficiency An Efficient Ramp Secret Sharing Scheme Based on Zigzag-Decodable Codes [Volume 6, Issue 2, 2023, Pages 15-24]
  • Email spam detection A New Feature Selection in Email Spam Detection by Particle Swarm Optimization and Fruit Fly Optimization Algorithms [Volume 2, Issue 2, 2019, Pages 49-62]
  • Embedded operating system A State-aware Approach for Robustness Testing of Embedded Real-Time Operating Systems [Volume 2, Issue 1, 2019, Pages 43-52]
  • Embedding Neural Network Embedding Knowledge Graph through Triple Base Neural Network and Positive Samples [Volume 5, Issue 2, 2022, Pages 11-20]
  • Energy Consumption A Heuristic Method for Node Management in Large-Scale Wireless Sensor Network Considering Connectivity and Energy Consumption [Volume 2, Issue 1, 2019, Pages 53-62]
  • Energy Consumption Migration Management in Sensor-Cloud Networks [Volume 1, Issue 2, 2018, Pages 1-12]
  • Energy Consumption Cost-Efficient Task Scheduling Algorithm for Reducing Energy Consumption and Makespan of Cloud Computing [Volume 5, Issue 1, 2022, Pages 1-12]
  • Energy Efficient An Energy Efficient Data Dissemination Scheme for Distributed Storage in the Internet of Things [Volume 1, Issue 1, 2018, Pages 1-8]
  • Energy Optimization Optimization of FlexiTP Energy-Aware Algorithm in Wireless Sensor Networks [Volume 6, Issue 2, 2023, Pages 31-40]
  • Ensemble learning ENIXMA: ENsemble of EXplainable Methods for detecting network Attack [Volume 7, Issue 1, 2024, Pages 1-8]
  • Entity Matching Profile Matching in Heterogeneous Academic Social Networks using Knowledge Graphs [Volume 7, Issue 1, 2024, Pages 27-36]
  • Evolutionary algorithm SSLBM: A New Fraud Detection Method Based on Semi- Supervised Learning [Volume 2, Issue 2, 2019, Pages 10-18]
  • Evolutionary Game Theory, Rumor spreading Modeling and Analysis of Rumor Control Strategies in Social Networks [Volume 5, Issue 1, 2022, Pages 59-68]
  • Explainable recommender systems Description-based Post-hoc Explanation for Twitter List Recommendations [(Articles in Press)]
  • Extended Morphological Profiles Spatial-Spectral Classification of Hyperspectral Images Based on Extended Morphological Profiles and Guided Filter [Volume 2, Issue 2, 2019, Pages 2-8]

F

  • Farlie-Gumbel-Morgenstern Analysis of the Impact of Wireless Three-User Multiple Access Channel Coefficients Correlation on Outage Probability: A Copula-Based Approach [Volume 6, Issue 2, 2023, Pages 25-30]
  • Fault injection A State-aware Approach for Robustness Testing of Embedded Real-Time Operating Systems [Volume 2, Issue 1, 2019, Pages 43-52]
  • Feature extraction SSLBM: A New Fraud Detection Method Based on Semi- Supervised Learning [Volume 2, Issue 2, 2019, Pages 10-18]
  • Feature extraction Exploring Effective Features in ADHD Diagnosis among Children through EEG/Evoked Potentials using Machine Learning Techniques [Volume 5, Issue 2, 2022, Pages 1-10]
  • Feature selection A New Feature Selection in Email Spam Detection by Particle Swarm Optimization and Fruit Fly Optimization Algorithms [Volume 2, Issue 2, 2019, Pages 49-62]
  • Feature selection The impact of preprocessing techniques for Covid-19 mortality prediction [Volume 5, Issue 2, 2022, Pages 57-66]
  • Feature selection Exploring Effective Features in ADHD Diagnosis among Children through EEG/Evoked Potentials using Machine Learning Techniques [Volume 5, Issue 2, 2022, Pages 1-10]
  • Feature selection Novel Correlation-based Feature Selection Approach using Manta Ray Foraging Optimization [Volume 6, Issue 1, 2023, Pages 81-100]
  • FlexiTP Optimization of FlexiTP Energy-Aware Algorithm in Wireless Sensor Networks [Volume 6, Issue 2, 2023, Pages 31-40]
  • Fraud SSLBM: A New Fraud Detection Method Based on Semi- Supervised Learning [Volume 2, Issue 2, 2019, Pages 10-18]
  • Fraud detection SSLBM: A New Fraud Detection Method Based on Semi- Supervised Learning [Volume 2, Issue 2, 2019, Pages 10-18]
  • Fruit fly optimization A New Feature Selection in Email Spam Detection by Particle Swarm Optimization and Fruit Fly Optimization Algorithms [Volume 2, Issue 2, 2019, Pages 49-62]
  • FSR Protocol A Transmission Method to Guarantee QoS Parameters in Wireless Sensor Networks [Volume 1, Issue 2, 2018, Pages 21-26]
  • FSR Protocol A Novel Routing Algorithm for Mobile ad-hoc Networks Based on Q-learning and its Generalization to FSR Routing Protocol [Volume 1, Issue 2, 2018, Pages 27-32]
  • Fuzzy logic Fuzzy Q-Learning Traffic Light Control based on Traffic Flow and Pedestrian Number Estimated from Visual Information [Volume 2, Issue 1, 2019, Pages 1-10]
  • Fuzzy system Assessment of Customer Credit Risk using an Adaptive Neuro-Fuzzy System [Volume 2, Issue 2, 2019, Pages 19-28]
  • Fuzzy Systems A Data Replication Algorithm for Improving Server Efficiency in Cloud Computing Using PSO and Fuzzy Systems [Volume 6, Issue 2, 2023, Pages 1-14]

G

  • Graph mining Embedding Knowledge Graph through Triple Base Neural Network and Positive Samples [Volume 5, Issue 2, 2022, Pages 11-20]
  • Guided Filter Spatial-Spectral Classification of Hyperspectral Images Based on Extended Morphological Profiles and Guided Filter [Volume 2, Issue 2, 2019, Pages 2-8]

H

  • Handwriting Recognition Modeling Intra-label Dynamics and Analyzing the Role of Blank in Connectionist Temporal Classification [Volume 1, Issue 2, 2018, Pages 47-54]
  • Hard real-time Safety Verification of Rate-Monotonic Least-Splitting Real-Time Scheduler on Multiprocessor System [Volume 1, Issue 1, 2018, Pages 43-52]
  • Heterogeneity Profile Matching in Heterogeneous Academic Social Networks using Knowledge Graphs [Volume 7, Issue 1, 2024, Pages 27-36]
  • Heuristic algorithm Proximity-Aware Degree-Based Heuristics for the Influence Maximization Problem [Volume 5, Issue 1, 2022, Pages 37-46]
  • Higher Education Ontology Proposing an Integrated Multi Source Ontology Construction Methodology [Volume 3, Issue 1, 2020, Pages 11-24]
  • Hyperspectral Spatial-Spectral Classification of Hyperspectral Images Based on Extended Morphological Profiles and Guided Filter [Volume 2, Issue 2, 2019, Pages 2-8]

I

  • Impact assessment A Model to Measure Effectiveness in Cyber Security Situational Awareness [Volume 7, Issue 1, 2024, Pages 17-26]
  • Incremental Mining PLI-X: Temporal Association Rules Mining in Customer Relationship Management Systems [Volume 2, Issue 2, 2019, Pages 29-48]
  • Independent cascade model Proximity-Aware Degree-Based Heuristics for the Influence Maximization Problem [Volume 5, Issue 1, 2022, Pages 37-46]
  • Index terms A Multi-Objective Dynamic Scheduling Approach for IoT Task Offloading on Amazon EC2 Spot Instances [Volume 3, Issue 1, 2020, Pages 1-10]
  • Index terms Assessment of the Metabolic Syndrome in Children and Adolescents in Birjand, Iran: A Data Mining Approach [Volume 3, Issue 2, 2020, Pages 21-30]
  • Influence maximization Proximity-Aware Degree-Based Heuristics for the Influence Maximization Problem [Volume 5, Issue 1, 2022, Pages 37-46]
  • Influential users P-centrality: An Improvement for Information Diffusion Maximization in Weighted Social Networks [Volume 6, Issue 1, 2023, Pages 59-70]
  • Intelligent traffic control system Fuzzy Q-Learning Traffic Light Control based on Traffic Flow and Pedestrian Number Estimated from Visual Information [Volume 2, Issue 1, 2019, Pages 1-10]
  • Internet of Things A Lightweighted Secure Scheme for Data ‎Aggregation in Large-Scale IoT-Based ‎Smart Grids ‎ [Volume 6, Issue 2, 2023, Pages 57-66]
  • Interpretability ENIXMA: ENsemble of EXplainable Methods for detecting network Attack [Volume 7, Issue 1, 2024, Pages 1-8]
  • Intrusion detection A Deep Neural Network Architecture for Intrusion Detection in Software-Defined Networks [Volume 5, Issue 2, 2022, Pages 31-44]
  • Intrusion detection system ENIXMA: ENsemble of EXplainable Methods for detecting network Attack [Volume 7, Issue 1, 2024, Pages 1-8]
  • Iterative numerical methods Accelerating Iterative Methods for Bounded Reachability Probabilities in Markov Decision Processes [Volume 3, Issue 2, 2020, Pages 31-36]

K

  • Key agreement A Key Management Schema Based on ECC to Secure the Substation and Control Center Communications in Smart Grids [Volume 2, Issue 1, 2019, Pages 25-32]
  • Keywords-- Developer Expertise Evaluation Evaluating Developers’ Expertise in Serverless Functions by Mining Activities from Multiple Platforms [(Articles in Press)]
  • Knapsack problems Application of Black Hole Algorithm for Solving Knapsack Problems [Volume 4, Issue 2, 2021, Pages 11-16]
  • KNIME Tool The impact of preprocessing techniques for Covid-19 mortality prediction [Volume 5, Issue 2, 2022, Pages 57-66]
  • Knowledge base Knowledge-Based Semantic Information Indexing and Management Framework: Integration of Structured Knowledge and Information Management Systems* [Volume 3, Issue 2, 2020, Pages 1-20]
  • Knowledge-based Information System Knowledge-Based Semantic Information Indexing and Management Framework: Integration of Structured Knowledge and Information Management Systems* [Volume 3, Issue 2, 2020, Pages 1-20]
  • Knowledge Graphs Embedding Knowledge Graph through Triple Base Neural Network and Positive Samples [Volume 5, Issue 2, 2022, Pages 11-20]

L

  • Link Prediction Embedding Knowledge Graph through Triple Base Neural Network and Positive Samples [Volume 5, Issue 2, 2022, Pages 11-20]
  • Load balancing Increasing the Performance of Reactive Routing Protocol using the Load Balancing and Congestion Control Mechanism in MANET [Volume 2, Issue 1, 2019, Pages 33-42]

M

  • Machine learning A Novel Two-Step Classification Approach for Runtime Performance Improvement of Duplicate Bug Report Detection [Volume 6, Issue 1, 2023, Pages 1-14]
  • Machine learning ENIXMA: ENsemble of EXplainable Methods for detecting network Attack [Volume 7, Issue 1, 2024, Pages 1-8]
  • Machine Learning Algorithms Evaluating Developers’ Expertise in Serverless Functions by Mining Activities from Multiple Platforms [(Articles in Press)]
  • Makespan Cost-Efficient Task Scheduling Algorithm for Reducing Energy Consumption and Makespan of Cloud Computing [Volume 5, Issue 1, 2022, Pages 1-12]
  • MANET Increasing the Performance of Reactive Routing Protocol using the Load Balancing and Congestion Control Mechanism in MANET [Volume 2, Issue 1, 2019, Pages 33-42]
  • Markov decision processes Accelerating Iterative Methods for Bounded Reachability Probabilities in Markov Decision Processes [Volume 3, Issue 2, 2020, Pages 31-36]
  • Measure of Effectiveness A Model to Measure Effectiveness in Cyber Security Situational Awareness [Volume 7, Issue 1, 2024, Pages 17-26]
  • Medium-shot Learning Meta-Learning for Medium-shot Sparse Learning via Deep Kernels [Volume 5, Issue 2, 2022, Pages 45-56]
  • Metabolic Syndrome Assessment of the Metabolic Syndrome in Children and Adolescents in Birjand, Iran: A Data Mining Approach [Volume 3, Issue 2, 2020, Pages 21-30]
  • Meta-heuristic algorithms A Data Replication Algorithm for Improving Server Efficiency in Cloud Computing Using PSO and Fuzzy Systems [Volume 6, Issue 2, 2023, Pages 1-14]
  • Migration Migration Management in Sensor-Cloud Networks [Volume 1, Issue 2, 2018, Pages 1-12]
  • Mobile ad-hoc Networks A Transmission Method to Guarantee QoS Parameters in Wireless Sensor Networks [Volume 1, Issue 2, 2018, Pages 21-26]
  • Mobile ad-hoc Networks A Novel Routing Algorithm for Mobile ad-hoc Networks Based on Q-learning and its Generalization to FSR Routing Protocol [Volume 1, Issue 2, 2018, Pages 27-32]
  • Motif Discovery A Taxonomy for RNA Motif Discovery [Volume 6, Issue 1, 2023, Pages 15-26]
  • MSTParser Improving Persian Dependency-Based Parser Using Deep Learning [Volume 5, Issue 1, 2022, Pages 13-20]
  • Multi-agent systems Multi-agent memetic algorithm and its application to community structure detection in complex networks [Volume 5, Issue 1, 2022, Pages 21-37]
  • Multi-cloud Scheduling Data-Driven Workflows in Multi-Cloud Environment [Volume 1, Issue 1, 2018, Pages 33-42]
  • Multidimensional Long Short Term Memory Modeling Intra-label Dynamics and Analyzing the Role of Blank in Connectionist Temporal Classification [Volume 1, Issue 2, 2018, Pages 47-54]
  • Multiprocessor Scheduling Safety Verification of Rate-Monotonic Least-Splitting Real-Time Scheduler on Multiprocessor System [Volume 1, Issue 1, 2018, Pages 43-52]
  • Multi-Value Logic Two Efficient Ternary Adder Designs Based On CNFET Technology [Volume 4, Issue 1, 2021, Pages 25-34]

N

  • Naïve Bayes Classification of Persian News Articles using Machine Learning Techniques [Volume 4, Issue 1, 2021, Pages 1-10]
  • Network anomaly detection ENIXMA: ENsemble of EXplainable Methods for detecting network Attack [Volume 7, Issue 1, 2024, Pages 1-8]
  • Network Architecture Towards Leveraging Structure for Neural Predictor in NAS [Volume 5, Issue 1, 2022, Pages 47-58]
  • Network Longevity Optimization of FlexiTP Energy-Aware Algorithm in Wireless Sensor Networks [Volume 6, Issue 2, 2023, Pages 31-40]
  • Network security A Deep Neural Network Architecture for Intrusion Detection in Software-Defined Networks [Volume 5, Issue 2, 2022, Pages 31-44]
  • Neural Architecture Search Towards Leveraging Structure for Neural Predictor in NAS [Volume 5, Issue 1, 2022, Pages 47-58]
  • Neural-Fuzzy Inference System Anomaly Detection in Traffic Trajectories Using a Combination of Fuzzy, Deep Convolutional and Autoencoder Networks [Volume 4, Issue 2, 2021, Pages 1-10]
  • News text classification Classification of Persian News Articles using Machine Learning Techniques [Volume 4, Issue 1, 2021, Pages 1-10]
  • Non-orthogonal multiple access (NOMA) Enhancing Average Secrecy Rates in Downlink NOMA with Dependent Channel Coefficients and Optimal Power Coefficients [Volume 7, Issue 1, 2024, Pages 9-16]

O

  • Ontology Knowledge-Based Semantic Information Indexing and Management Framework: Integration of Structured Knowledge and Information Management Systems* [Volume 3, Issue 2, 2020, Pages 1-20]
  • Ontology Development Proposing an Integrated Multi Source Ontology Construction Methodology [Volume 3, Issue 1, 2020, Pages 11-24]
  • Ontology Learning Proposing an Integrated Multi Source Ontology Construction Methodology [Volume 3, Issue 1, 2020, Pages 11-24]
  • OpenFlow Controllers Performance Evaluation of Software-Defined Networking Controllers: A Comparative Study [Volume 2, Issue 2, 2019, Pages 63-73]
  • Optimal power coefficients Enhancing Average Secrecy Rates in Downlink NOMA with Dependent Channel Coefficients and Optimal Power Coefficients [Volume 7, Issue 1, 2024, Pages 9-16]
  • Optimization Application of Black Hole Algorithm for Solving Knapsack Problems [Volume 4, Issue 2, 2021, Pages 11-16]
  • Optimization Novel Correlation-based Feature Selection Approach using Manta Ray Foraging Optimization [Volume 6, Issue 1, 2023, Pages 81-100]

P

  • Particle swarm optimization A New Feature Selection in Email Spam Detection by Particle Swarm Optimization and Fruit Fly Optimization Algorithms [Volume 2, Issue 2, 2019, Pages 49-62]
  • Path planning Uncertainty-aware Path Planning using Reinforcement Learning and Deep Learning Methods [Volume 3, Issue 1, 2020, Pages 25-37]
  • Performance Evaluation Performance Evaluation of Software-Defined Networking Controllers: A Comparative Study [Volume 2, Issue 2, 2019, Pages 63-73]
  • Persian Improving Persian Dependency-Based Parser Using Deep Learning [Volume 5, Issue 1, 2022, Pages 13-20]
  • Personalized Privacy Personalized Privacy Preserving Method for Social Networks Graph k-Anonymization [Volume 6, Issue 1, 2023, Pages 37-46]
  • Phrase-structure Tree Improving Persian Dependency-Based Parser Using Deep Learning [Volume 5, Issue 1, 2022, Pages 13-20]
  • Positive Samples Embedding Knowledge Graph through Triple Base Neural Network and Positive Samples [Volume 5, Issue 2, 2022, Pages 11-20]
  • Post-hoc explanation Description-based Post-hoc Explanation for Twitter List Recommendations [(Articles in Press)]
  • Power consumption A Data Replication Algorithm for Improving Server Efficiency in Cloud Computing Using PSO and Fuzzy Systems [Volume 6, Issue 2, 2023, Pages 1-14]
  • Pre-large Itemsets PLI-X: Temporal Association Rules Mining in Customer Relationship Management Systems [Volume 2, Issue 2, 2019, Pages 29-48]
  • Principal Components Analysis Spatial-Spectral Classification of Hyperspectral Images Based on Extended Morphological Profiles and Guided Filter [Volume 2, Issue 2, 2019, Pages 2-8]
  • Privacy Preserving Personalized Privacy Preserving Method for Social Networks Graph k-Anonymization [Volume 6, Issue 1, 2023, Pages 37-46]
  • Probabilistic model checking Accelerating Iterative Methods for Bounded Reachability Probabilities in Markov Decision Processes [Volume 3, Issue 2, 2020, Pages 31-36]
  • Process changes Trace2Vec-CDD: A Framework for Concept Drift Detection in Business Process Logs using Trace Embedding [Volume 6, Issue 1, 2023, Pages 71-79]
  • Process mining Trace2Vec-CDD: A Framework for Concept Drift Detection in Business Process Logs using Trace Embedding [Volume 6, Issue 1, 2023, Pages 71-79]

Q

  • Q-learning Uncertainty-aware Path Planning using Reinforcement Learning and Deep Learning Methods [Volume 3, Issue 1, 2020, Pages 25-37]
  • QoS Designing Optimized Scheduling QoS-Aware RPL for Sensor-Based Smart Grid Communication Network [Volume 1, Issue 1, 2018, Pages 21-32]
  • Quality of Service Performance Evaluation of Software-Defined Networking Controllers: A Comparative Study [Volume 2, Issue 2, 2019, Pages 63-73]

R

  • Ramp secret sharing scheme An Efficient Ramp Secret Sharing Scheme Based on Zigzag-Decodable Codes [Volume 6, Issue 2, 2023, Pages 15-24]
  • Rate-Monotonic Least Splitting Safety Verification of Rate-Monotonic Least-Splitting Real-Time Scheduler on Multiprocessor System [Volume 1, Issue 1, 2018, Pages 43-52]
  • Reactive Routing Increasing the Performance of Reactive Routing Protocol using the Load Balancing and Congestion Control Mechanism in MANET [Volume 2, Issue 1, 2019, Pages 33-42]
  • Recurrent Neural Networks Modeling Intra-label Dynamics and Analyzing the Role of Blank in Connectionist Temporal Classification [Volume 1, Issue 2, 2018, Pages 47-54]
  • Regression DAMP: Decision-Making with the Combination of Analytical Hierarchy Process and Deep Learning (Case study: Car Sales Forecasting) [Volume 4, Issue 2, 2021, Pages 17-22]
  • Reinforcement learning A Transmission Method to Guarantee QoS Parameters in Wireless Sensor Networks [Volume 1, Issue 2, 2018, Pages 21-26]
  • Reinforcement learning A Novel Routing Algorithm for Mobile ad-hoc Networks Based on Q-learning and its Generalization to FSR Routing Protocol [Volume 1, Issue 2, 2018, Pages 27-32]
  • Reinforcement learning Uncertainty-aware Path Planning using Reinforcement Learning and Deep Learning Methods [Volume 3, Issue 1, 2020, Pages 25-37]
  • Representation Learning Towards Leveraging Structure for Neural Predictor in NAS [Volume 5, Issue 1, 2022, Pages 47-58]
  • Risk Assessment Assessment of Customer Credit Risk using an Adaptive Neuro-Fuzzy System [Volume 2, Issue 2, 2019, Pages 19-28]
  • RNA Motif A Taxonomy for RNA Motif Discovery [Volume 6, Issue 1, 2023, Pages 15-26]
  • Robustness level assessment A State-aware Approach for Robustness Testing of Embedded Real-Time Operating Systems [Volume 2, Issue 1, 2019, Pages 43-52]
  • Robustness testing A State-aware Approach for Robustness Testing of Embedded Real-Time Operating Systems [Volume 2, Issue 1, 2019, Pages 43-52]
  • Routing STAR: Improved Algorithm based on Sliding Window for Trust-Aware Routing in WSNs [Volume 1, Issue 2, 2018, Pages 33-46]
  • Routing Algorithm A Transmission Method to Guarantee QoS Parameters in Wireless Sensor Networks [Volume 1, Issue 2, 2018, Pages 21-26]
  • Routing Algorithm A Novel Routing Algorithm for Mobile ad-hoc Networks Based on Q-learning and its Generalization to FSR Routing Protocol [Volume 1, Issue 2, 2018, Pages 27-32]
  • Routing in MANETs A Transmission Method to Guarantee QoS Parameters in Wireless Sensor Networks [Volume 1, Issue 2, 2018, Pages 21-26]
  • Routing in MANETs A Novel Routing Algorithm for Mobile ad-hoc Networks Based on Q-learning and its Generalization to FSR Routing Protocol [Volume 1, Issue 2, 2018, Pages 27-32]
  • RPL Designing Optimized Scheduling QoS-Aware RPL for Sensor-Based Smart Grid Communication Network [Volume 1, Issue 1, 2018, Pages 21-32]
  • Rumor control Modeling and Analysis of Rumor Control Strategies in Social Networks [Volume 5, Issue 1, 2022, Pages 59-68]
  • Rumor detection Efficient and Deception Resilient Rumor Detection in Twitter [Volume 5, Issue 2, 2022, Pages 21-30]
  • Runtime Performance A Novel Two-Step Classification Approach for Runtime Performance Improvement of Duplicate Bug Report Detection [Volume 6, Issue 1, 2023, Pages 1-14]

S

  • Safety-critical systems A State-aware Approach for Robustness Testing of Embedded Real-Time Operating Systems [Volume 2, Issue 1, 2019, Pages 43-52]
  • Sample-based Interpretability Meta-Learning for Medium-shot Sparse Learning via Deep Kernels [Volume 5, Issue 2, 2022, Pages 45-56]
  • School-Age Population Assessment of the Metabolic Syndrome in Children and Adolescents in Birjand, Iran: A Data Mining Approach [Volume 3, Issue 2, 2020, Pages 21-30]
  • Search Space Pruning Towards Leveraging Structure for Neural Predictor in NAS [Volume 5, Issue 1, 2022, Pages 47-58]
  • Search Space Reduction A Novel Two-Step Classification Approach for Runtime Performance Improvement of Duplicate Bug Report Detection [Volume 6, Issue 1, 2023, Pages 1-14]
  • Security A Key Management Schema Based on ECC to Secure the Substation and Control Center Communications in Smart Grids [Volume 2, Issue 1, 2019, Pages 25-32]
  • Security Risk Management Dynamic Security Risk Management Considering Systems Structural and Probabilistic Attributes [Volume 6, Issue 2, 2023, Pages 41-56]
  • Semantic Indexing Knowledge-Based Semantic Information Indexing and Management Framework: Integration of Structured Knowledge and Information Management Systems* [Volume 3, Issue 2, 2020, Pages 1-20]
  • Semantic Network Representation Knowledge-Based Semantic Information Indexing and Management Framework: Integration of Structured Knowledge and Information Management Systems* [Volume 3, Issue 2, 2020, Pages 1-20]
  • Semi-Partitioning Safety Verification of Rate-Monotonic Least-Splitting Real-Time Scheduler on Multiprocessor System [Volume 1, Issue 1, 2018, Pages 43-52]
  • Semi-supervised learning SSLBM: A New Fraud Detection Method Based on Semi- Supervised Learning [Volume 2, Issue 2, 2019, Pages 10-18]
  • Sensor-cloud networks Migration Management in Sensor-Cloud Networks [Volume 1, Issue 2, 2018, Pages 1-12]
  • Serverless Functions Evaluating Developers’ Expertise in Serverless Functions by Mining Activities from Multiple Platforms [(Articles in Press)]
  • Session key A Key Management Schema Based on ECC to Secure the Substation and Control Center Communications in Smart Grids [Volume 2, Issue 1, 2019, Pages 25-32]
  • Skin Cancer Detection Diagnosing of Skin Lesions Using Deep Convolutional Neural Network and Support Vector Machines [Volume 7, Issue 1, 2024, Pages 37-48]
  • Skin Lesions Classification Diagnosing of Skin Lesions Using Deep Convolutional Neural Network and Support Vector Machines [Volume 7, Issue 1, 2024, Pages 37-48]
  • Sliding Window STAR: Improved Algorithm based on Sliding Window for Trust-Aware Routing in WSNs [Volume 1, Issue 2, 2018, Pages 33-46]
  • Smart grids A Key Management Schema Based on ECC to Secure the Substation and Control Center Communications in Smart Grids [Volume 2, Issue 1, 2019, Pages 25-32]
  • Smart grids A Lightweighted Secure Scheme for Data ‎Aggregation in Large-Scale IoT-Based ‎Smart Grids ‎ [Volume 6, Issue 2, 2023, Pages 57-66]
  • Social network Modeling and Analysis of Rumor Control Strategies in Social Networks [Volume 5, Issue 1, 2022, Pages 59-68]
  • Social network Efficient and Deception Resilient Rumor Detection in Twitter [Volume 5, Issue 2, 2022, Pages 21-30]
  • Social network Personalized Privacy Preserving Method for Social Networks Graph k-Anonymization [Volume 6, Issue 1, 2023, Pages 37-46]
  • Software-defined network A Deep Neural Network Architecture for Intrusion Detection in Software-Defined Networks [Volume 5, Issue 2, 2022, Pages 31-44]
  • Software-Defined Networking (SDN) Performance Evaluation of Software-Defined Networking Controllers: A Comparative Study [Volume 2, Issue 2, 2019, Pages 63-73]
  • Software Development Evaluating Developers’ Expertise in Serverless Functions by Mining Activities from Multiple Platforms [(Articles in Press)]
  • Sparse Kernel Meta-Learning for Medium-shot Sparse Learning via Deep Kernels [Volume 5, Issue 2, 2022, Pages 45-56]
  • Spot instances A Multi-Objective Dynamic Scheduling Approach for IoT Task Offloading on Amazon EC2 Spot Instances [Volume 3, Issue 1, 2020, Pages 1-10]
  • Subjective Logic Model STAR: Improved Algorithm based on Sliding Window for Trust-Aware Routing in WSNs [Volume 1, Issue 2, 2018, Pages 33-46]
  • Substation A Key Management Schema Based on ECC to Secure the Substation and Control Center Communications in Smart Grids [Volume 2, Issue 1, 2019, Pages 25-32]
  • Support vector machine Spatial-Spectral Classification of Hyperspectral Images Based on Extended Morphological Profiles and Guided Filter [Volume 2, Issue 2, 2019, Pages 2-8]
  • Support vector machine Diagnosing of Skin Lesions Using Deep Convolutional Neural Network and Support Vector Machines [Volume 7, Issue 1, 2024, Pages 37-48]
  • Support Vector Machines Particle Filter based Target Tracking in Wireless Sensor Networks using Support Vector Machine [Volume 1, Issue 2, 2018, Pages 13-20]
  • Susceptible-Infected-Recovered model P-centrality: An Improvement for Information Diffusion Maximization in Weighted Social Networks [Volume 6, Issue 1, 2023, Pages 59-70]

T

  • Target Tracking Particle Filter based Target Tracking in Wireless Sensor Networks using Support Vector Machine [Volume 1, Issue 2, 2018, Pages 13-20]
  • Task offloading A Multi-Objective Dynamic Scheduling Approach for IoT Task Offloading on Amazon EC2 Spot Instances [Volume 3, Issue 1, 2020, Pages 1-10]
  • Task scheduling Cost-Efficient Task Scheduling Algorithm for Reducing Energy Consumption and Makespan of Cloud Computing [Volume 5, Issue 1, 2022, Pages 1-12]
  • Temporal Database PLI-X: Temporal Association Rules Mining in Customer Relationship Management Systems [Volume 2, Issue 2, 2019, Pages 29-48]
  • Ternary Adder Two Efficient Ternary Adder Designs Based On CNFET Technology [Volume 4, Issue 1, 2021, Pages 25-34]
  • Ternary Logic Two Efficient Ternary Adder Designs Based On CNFET Technology [Volume 4, Issue 1, 2021, Pages 25-34]
  • Test adaptation A Semantic Web Enabled Approach to Automate Test Script Generation for Web Applications [Volume 4, Issue 1, 2021, Pages 11-24]
  • Test generation A Semantic Web Enabled Approach to Automate Test Script Generation for Web Applications [Volume 4, Issue 1, 2021, Pages 11-24]
  • Test ontology A Semantic Web Enabled Approach to Automate Test Script Generation for Web Applications [Volume 4, Issue 1, 2021, Pages 11-24]
  • Text mining Classification of Persian News Articles using Machine Learning Techniques [Volume 4, Issue 1, 2021, Pages 1-10]
  • The Internet of Things An Energy Efficient Data Dissemination Scheme for Distributed Storage in the Internet of Things [Volume 1, Issue 1, 2018, Pages 1-8]
  • The Internet of Things A Multi-Objective Dynamic Scheduling Approach for IoT Task Offloading on Amazon EC2 Spot Instances [Volume 3, Issue 1, 2020, Pages 1-10]
  • Traffic density Fuzzy Q-Learning Traffic Light Control based on Traffic Flow and Pedestrian Number Estimated from Visual Information [Volume 2, Issue 1, 2019, Pages 1-10]
  • Trajectory Anomaly Detection Anomaly Detection in Traffic Trajectories Using a Combination of Fuzzy, Deep Convolutional and Autoencoder Networks [Volume 4, Issue 2, 2021, Pages 1-10]
  • Trust STAR: Improved Algorithm based on Sliding Window for Trust-Aware Routing in WSNs [Volume 1, Issue 2, 2018, Pages 33-46]
  • Twitter Lists Description-based Post-hoc Explanation for Twitter List Recommendations [(Articles in Press)]

W

  • Wireless communication systems Enhancing Average Secrecy Rates in Downlink NOMA with Dependent Channel Coefficients and Optimal Power Coefficients [Volume 7, Issue 1, 2024, Pages 9-16]
  • Wireless sensor networks Particle Filter based Target Tracking in Wireless Sensor Networks using Support Vector Machine [Volume 1, Issue 2, 2018, Pages 13-20]
  • Word embedding Trace2Vec-CDD: A Framework for Concept Drift Detection in Business Process Logs using Trace Embedding [Volume 6, Issue 1, 2023, Pages 71-79]
  • Workflow Scheduling Scheduling Data-Driven Workflows in Multi-Cloud Environment [Volume 1, Issue 1, 2018, Pages 33-42]
  • WSNs Optimization of FlexiTP Energy-Aware Algorithm in Wireless Sensor Networks [Volume 6, Issue 2, 2023, Pages 31-40]

Z

  • Zigzag decodable codes An Efficient Ramp Secret Sharing Scheme Based on Zigzag-Decodable Codes [Volume 6, Issue 2, 2023, Pages 15-24]