Abdollahi Azgomi .Mohammad
Modeling the Inter-arrival Time of Packets in Network Traffic and Anomaly Detection Using the Zipf’s Law
[
Vol.6,
Issue
22
- SpringYear
2018]
Abdolvand.Neda
An Improved Sentiment Analysis Algorithm based on Appraisal Theory and Fuzzy Logic
[
Vol.6,
Issue
22
- SpringYear
2018]
Aburub.Faisal
The Influence of ERP Usage on Organizational Learning: An Empirical Investigation
[
Vol.6,
Issue
23
- SummerYear
2018]
Agahi.Hamed
Handwritten Digits Recognition Using an Ensemble Technique Based on the Firefly Algorithm
[
Vol.6,
Issue
23
- SummerYear
2018]
Ashrafi Payaman.Nosratali
A Novel User-Centric Method for Graph Summarization Based on Syntactical and Semantical Attributes
[
Vol.6,
Issue
22
- SpringYear
2018]
Atarodi.Seyed Mojtaba
A Survey of Two Dominant Low Power and Long Range Communication Technologies
[
Vol.6,
Issue
22
- SpringYear
2018]
Azizi.Mohammad
Publication Venue Recommendation Based on Paper’s Title and Co-authors Network
[
Vol.6,
Issue
21
- WinterYear
2018]
B
Bahrepour.Davoud
A 2-bit Full Comparator Design with Minimum Quantum Cost Function in Quantum-Dot Cellular Automata
[
Vol.6,
Issue
24
- AutumnYear
2018]
Baradaran.Vahid
A Multi-objective Multi-agent Optimization Algorithm for the Community Detection Problem
[
Vol.6,
Issue
23
- SummerYear
2018]
C
Chinipardaz.Rahim
DBCACF: A Multidimensional Method for Tourist Recommendation Based on Users’ Demographic, Context and Feedback
[
Vol.6,
Issue
24
- AutumnYear
2018]
D
dmp.dmp
Concatenating Approach: Improving the Performance of Data Structure Implementation
[
Vol.6,
Issue
21
- WinterYear
2018]
erwin.erwin
Retinal Vessel Extraction Using Dynamic Threshold And Enhancement Image Filter From Retina Fundus
[
Vol.6,
Issue
24
- AutumnYear
2018]
Eshghi.Farshad
Security Enhancement of Wireless Sensor Networks: A Hybrid Efficient Encryption Algorithm Approach
[
Vol.6,
Issue
23
- SummerYear
2018]
F
Faili.Heshaam
Confidence measure estimation for Open Information Extraction
[
Vol.6,
Issue
21
- WinterYear
2018]
Farsi.Hassan
Eye Gaze Detection Based on Learning Automata by Using SURF Descriptor
[
Vol.6,
Issue
21
- WinterYear
2018]
Farsi.Hassan
Improvement in Accuracy and Speed of Image Semantic Segmentation via Convolution Neural Network Encoder-Decoder
[
Vol.6,
Issue
23
- SummerYear
2018]
Fazel.ZIba
A Survey of Two Dominant Low Power and Long Range Communication Technologies
[
Vol.6,
Issue
22
- SpringYear
2018]
feizi.Kamran
Clustering for Reduction of Energy Consumption in Wireless Sensor Networks by AHP Method
[
Vol.6,
Issue
21
- WinterYear
2018]
G
Ghasemzadeh.ardalan
A Novel Method for Image Encryption Using Modified Logistic Map
[
Vol.6,
Issue
24
- AutumnYear
2018]
Ghasvarian Jahromi.Khatereh
Using Discrete Hidden Markov Model for Modelling and Forecasting the Tourism Demand in Isfahan
[
Vol.6,
Issue
22
- SpringYear
2018]
Ghasvarian Jahromi.Vida
Using Discrete Hidden Markov Model for Modelling and Forecasting the Tourism Demand in Isfahan
[
Vol.6,
Issue
22
- SpringYear
2018]
H
Hamlbarani Haghi.Robab
Clustering for Reduction of Energy Consumption in Wireless Sensor Networks by AHP Method
[
Vol.6,
Issue
21
- WinterYear
2018]
Hanifi.Aziz
Clustering for Reduction of Energy Consumption in Wireless Sensor Networks by AHP Method
[
Vol.6,
Issue
21
- WinterYear
2018]
Harounabadi.Ali
DBCACF: A Multidimensional Method for Tourist Recommendation Based on Users’ Demographic, Context and Feedback
[
Vol.6,
Issue
24
- AutumnYear
2018]
Hosseini Sayadnavard.Monireh
Toward an Enhanced Dynamic VM Consolidation Approach for Cloud Datacenters Using Continuous Time Markov Chain
[
Vol.6,
Issue
24
- AutumnYear
2018]
Hosseini Tehrani.Yas
A Survey of Two Dominant Low Power and Long Range Communication Technologies
[
Vol.6,
Issue
22
- SpringYear
2018]
Hosseinian.Amirhossein
A Multi-objective Multi-agent Optimization Algorithm for the Community Detection Problem
[
Vol.6,
Issue
23
- SummerYear
2018]
hourali.maryam
Confidence measure estimation for Open Information Extraction
[
Vol.6,
Issue
21
- WinterYear
2018]
J
Javadi.Soroush
Publication Venue Recommendation Based on Paper’s Title and Co-authors Network
[
Vol.6,
Issue
21
- WinterYear
2018]
K
kabudian.Seyed jahanshah
Long-Term Spectral Pseudo-Entropy (LTSPE): A New Robust Feature for Speech Activity Detection
[
Vol.6,
Issue
24
- AutumnYear
2018]
kahrizi.Mohammad Rasoul
Long-Term Spectral Pseudo-Entropy (LTSPE): A New Robust Feature for Speech Activity Detection
[
Vol.6,
Issue
24
- AutumnYear
2018]
Kangavari.Mohammadreza
A Novel User-Centric Method for Graph Summarization Based on Syntactical and Semantical Attributes
[
Vol.6,
Issue
22
- SpringYear
2018]
Kasaei.Shohreh
Information Bottleneck and its Applications in Deep Learning
[
Vol.6,
Issue
23
- SummerYear
2018]
Kiyatmoko.Tomi
Retinal Vessel Extraction Using Dynamic Threshold And Enhancement Image Filter From Retina Fundus
[
Vol.6,
Issue
24
- AutumnYear
2018]
Kolahkaj.Maral
DBCACF: A Multidimensional Method for Tourist Recommendation Based on Users’ Demographic, Context and Feedback
[
Vol.6,
Issue
24
- AutumnYear
2018]
M
Mahjur.Ali
Concatenating Approach: Improving the Performance of Data Structure Implementation
[
Vol.6,
Issue
21
- WinterYear
2018]
Mahmoodzadeh.Azar
Handwritten Digits Recognition Using an Ensemble Technique Based on the Firefly Algorithm
[
Vol.6,
Issue
23
- SummerYear
2018]
Mansoorizadeh.Muharram
Toward Energy-Aware Traffic Engineering in Intra-Domain IP Networks Using Heuristic and Meta-Heuristics Approaches
[
Vol.6,
Issue
22
- SpringYear
2018]
Maroufi.Negin
A 2-bit Full Comparator Design with Minimum Quantum Cost Function in Quantum-Dot Cellular Automata
[
Vol.6,
Issue
24
- AutumnYear
2018]
Mirroshandel.Seyed Abolghassem
Publication Venue Recommendation Based on Paper’s Title and Co-authors Network
[
Vol.6,
Issue
21
- WinterYear
2018]
Mohamadzadeh.Sajad
Eye Gaze Detection Based on Learning Automata by Using SURF Descriptor
[
Vol.6,
Issue
21
- WinterYear
2018]
Mohamadzadeh.Sajad
Improvement in Accuracy and Speed of Image Semantic Segmentation via Convolution Neural Network Encoder-Decoder
[
Vol.6,
Issue
23
- SummerYear
2018]
N
najimi.maryam
Lifetime Improvement Using Cluster Head Selection and Base Station Localization in Wireless Sensor Networks
[
Vol.6,
Issue
22
- SpringYear
2018]
Nankhoshki.Sajjad
Lifetime Improvement Using Cluster Head Selection and Base Station Localization in Wireless Sensor Networks
[
Vol.6,
Issue
22
- SpringYear
2018]
Nasiripour.Reza
Eye Gaze Detection Based on Learning Automata by Using SURF Descriptor
[
Vol.6,
Issue
21
- WinterYear
2018]
Nikravan shalmani.Alireza
DBCACF: A Multidimensional Method for Tourist Recommendation Based on Users’ Demographic, Context and Feedback
[
Vol.6,
Issue
24
- AutumnYear
2018]
P
Paksima.Javad
Effective solving the One-Two Gap Problem in the PageRank algorithm
[
Vol.6,
Issue
21
- WinterYear
2018]
Pouyan.Ali A
An SRN Based Approach for Performance Evaluation of Network Layer in Mobile Ad hoc Networks
[
Vol.6,
Issue
24
- AutumnYear
2018]
R
Reshadat.Vahideh
Confidence measure estimation for Open Information Extraction
[
Vol.6,
Issue
21
- WinterYear
2018]
Roustakiani.Azadeh
An Improved Sentiment Analysis Algorithm based on Appraisal Theory and Fuzzy Logic
[
Vol.6,
Issue
22
- SpringYear
2018]
S
Safa.Ramin
Publication Venue Recommendation Based on Paper’s Title and Co-authors Network
[
Vol.6,
Issue
21
- WinterYear
2018]
Salehi.Marzieh
Handwritten Digits Recognition Using an Ensemble Technique Based on the Firefly Algorithm
[
Vol.6,
Issue
23
- SummerYear
2018]
Speily.Omid R.B.
A Novel Method for Image Encryption Using Modified Logistic Map
[
Vol.6,
Issue
24
- AutumnYear
2018]
T
Taghva. Mohammad Reza
Clustering for Reduction of Energy Consumption in Wireless Sensor Networks by AHP Method
[
Vol.6,
Issue
21
- WinterYear
2018]
Toroghi Haghighat.Abolfazl
Toward an Enhanced Dynamic VM Consolidation Approach for Cloud Datacenters Using Continuous Time Markov Chain
[
Vol.6,
Issue
24
- AutumnYear
2018]
Y
Yadollahzadeh tabari.meisam
An SRN Based Approach for Performance Evaluation of Network Layer in Mobile Ad hoc Networks
[
Vol.6,
Issue
24
- AutumnYear
2018]
Z
Zamani.Amin
Security Enhancement of Wireless Sensor Networks: A Hybrid Efficient Encryption Algorithm Approach
[
Vol.6,
Issue
23
- SummerYear
2018]