A
-
AHMADI NEJHAD, HOSSEIN
The Effect of ICT on the Production Per Capita of Each Worker in Iran's Provinces: Generalized method of moments [Volume 2, Issue 2, 2021, Pages 61-70]
-
Amiri, Noshin
Fake Webpages Detection Using Parallel Autoencoder Neural Networks [Volume 1, Issue 2, 2021, Pages 41-50]
-
Amirshahi, Bita
Providing a Method for Reducing Energy consumption in the Body Area Network Using Biogeography based optimization Algorithm [Volume 2, Issue 1, 2022, Pages 13-30]
-
Asadi, bahareh
An overview of the fundamental concepts of network-on-chip and optical network-on-chip [(Articles in Press)]
-
Asgharzadeh, Davood
An Introduction to BI implementation tools [(Articles in Press)]
B
-
Bagheri, Vahid
Designing of a Leader-Follower Formation Controller Based on Leader-Follower Flocking with a Virtual Leader for the Clusters of UAVs [Volume 2, Issue 1, 2022, Pages 45-54]
-
Bateni, Hajar
The effect of information quality integrity on information security risk management [Volume 1, Issue 1, 2019, Pages 23-35]
-
Borna, Keivan
The Improvement of the Iris-Based Authentication by Presenting the Wireless Sensor Network Architecture to Maintain Industrial Internet of Things Privacy [Volume 1, Issue 4, 2021, Pages 35-50]
D
-
Dallaki, Hedayatollah
Daily rainfall forecasting with Deep ESN neural network based on experimental data from meteorological station in Hormozgan province [Volume 2, Issue 1, 2022, Pages 31-37]
E
-
Ebadati, Omid Mahdi
The Improvement of the Iris-Based Authentication by Presenting the Wireless Sensor Network Architecture to Maintain Industrial Internet of Things Privacy [Volume 1, Issue 4, 2021, Pages 35-50]
G
-
Gavidel, sajjad
An Introduction to BI implementation tools [(Articles in Press)]
-
Ghafori, A.
Review and Evaluation of Big Data Technologies as a Service [Volume 1, Issue 2, 2021, Pages 1-10]
-
Ghamari Moghaddam, Amin
Providing a solution for predicting tax fraud companies based on optimized decision tree, support vector machine and Bayesian network [Volume 2, Issue 2, 2021, Pages 15-32]
-
Ghasemzadeh, Mohammad
Use of Software Defined Networks to Enhance the Security of the Internet of Things [Volume 1, Issue 2, 2021, Pages 11-16]
-
Gholamnezhad, Pezhman
The IoT Data Collection by UAV, Based on Multi-Objective Evolutionary Algorithm Using Gaussian Process Based on Reverse Modeling [Volume 1, Issue 4, 2021, Pages 59-71]
-
Gholamnezhad, Pezhman
A Model-Based Evolutionary Algorithm using FCM-clustering and PCA [Volume 2, Issue 1, 2022, Pages 1-12]
H
-
Hadipour, Ali
Some Applications of the BB84 Quantum Encryption Protocol and Related Simulations and Security AnalysisS [Volume 1, Issue 3, 2021, Pages 57-65]
-
Hoseini, Seyed Hasan
Designing of a Leader-Follower Formation Controller Based on Leader-Follower Flocking with a Virtual Leader for the Clusters of UAVs [Volume 2, Issue 1, 2022, Pages 45-54]
-
Hosseini Andargoli, Seyed Mehdi
Beamforming Robust in Interferer Direction of Arrival Uncertainties with Side lobes Level Control [Volume 2, Issue 2, 2021, Pages 45-59]
-
Hosseinzade, M. R.
Review and Evaluation of Big Data Technologies as a Service [Volume 1, Issue 2, 2021, Pages 1-10]
K
-
Khaleghi-, -Hossein
The fifth generation of mobile telecommunications is the gateway to the fourth generation of industry [(Articles in Press)]
-
Kheirandish, , Sajedeh
Image compression based on the desired error by using singular value decomposition to the blocked image [(Articles in Press)]
L
-
Lotfali, Zahra
The fifth generation of mobile telecommunications is the gateway to the fourth generation of industry [(Articles in Press)]
M
-
Mahdloo, Abdollah
Design and Implementation of Radar Tester Using SDR [Volume 1, Issue 2, 2021, Pages 51-56]
-
Mazloum, Jalil
The IoT Data Collection by UAV, Based on Multi-Objective Evolutionary Algorithm Using Gaussian Process Based on Reverse Modeling [Volume 1, Issue 4, 2021, Pages 59-71]
-
Mizanian, Kiarash
Challenges and Needs of Cyber Crime Prevention in Schools [Volume 1, Issue 2, 2021, Pages 27-39]
-
Mostafavi, Seyed Akbar
Challenges and Needs of Cyber Crime Prevention in Schools [Volume 1, Issue 2, 2021, Pages 27-39]
N
-
Naderi, H.
Review and Evaluation of Big Data Technologies as a Service [Volume 1, Issue 2, 2021, Pages 1-10]
-
Naderi, Iman
Fake Webpages Detection Using Parallel Autoencoder Neural Networks [Volume 1, Issue 2, 2021, Pages 41-50]
-
Nakhaei, Habibollah
Providing a solution for predicting tax fraud companies based on optimized decision tree, support vector machine and Bayesian network [Volume 2, Issue 2, 2021, Pages 15-32]
-
Norousta, Hossein
Passive defense strategies in the field of national media infrastructure protection [Volume 2, Issue 2, 2021, Pages 1-14]
P
-
Parsa, Saeed
Software Obfuscation with Analytical Hierarchy Process and Petri Nets [Volume 2, Issue 1, 2022, Pages 55-66]
-
Pazhouhi, Manouchehr
Design and Implementation of Radar Tester Using SDR [Volume 1, Issue 2, 2021, Pages 51-56]
R
-
Rafie, Mahnaz
Continuous allocation and hybrid migration of processors to improve the performance of online mapping on a 2-D network on chip [Volume 2, Issue 2, 2021, Pages 71-86]
-
Rahmanpour, Mahdi
Determination of dead time in single photon avalanche detector [(Articles in Press)]
-
Reza, Akram
Continuous allocation and hybrid migration of processors to improve the performance of online mapping on a 2-D network on chip [Volume 2, Issue 2, 2021, Pages 71-86]
-
Roozbehi, Reza
Use of Software Defined Networks to Enhance the Security of the Internet of Things [Volume 1, Issue 2, 2021, Pages 11-16]
S
-
Sadeghian, Azam
Image compression based on the desired error by using singular value decomposition to the blocked image [(Articles in Press)]
-
Saeidi, Parviz
The effect of information quality integrity on information security risk management [Volume 1, Issue 1, 2019, Pages 23-35]
-
Sarram, Mehdi Agha
Challenges and Needs of Cyber Crime Prevention in Schools [Volume 1, Issue 2, 2021, Pages 27-39]
-
Seyed Naghavi, Mir Ali
Identification of the Effective Components of IoT on Human Resource Management Processes [Volume 1, Issue 3, 2021, Pages 75-85]
-
Shahzadeh Fazeli, Seyed Abolfazl
Image compression based on the desired error by using singular value decomposition to the blocked image [(Articles in Press)]
-
Shojaee Yas, Hamed
Some Applications of the BB84 Quantum Encryption Protocol and Related Simulations and Security AnalysisS [Volume 1, Issue 3, 2021, Pages 57-65]
-
Soheyli, Ehsan
Quantum-Scale Information Processing Via Molecular Logic Gates: A Review on the History, Properties, and Derived Technologies [Volume 1, Issue 3, 2021, Pages 35-55]
Z
-
Zeynali, Shayan
The Improvement of the Iris-Based Authentication by Presenting the Wireless Sensor Network Architecture to Maintain Industrial Internet of Things Privacy [Volume 1, Issue 4, 2021, Pages 35-50]
Your query does not match with any item