Author Index

A

  • AHMADI NEJHAD, HOSSEIN The Effect of ICT on the Production Per Capita of Each Worker in Iran's Provinces: Generalized method of moments [Volume 2, Issue 2, 2021, Pages 61-70]
  • Amiri, Noshin Fake Webpages Detection Using Parallel Autoencoder Neural Networks [Volume 1, Issue 2, 2021, Pages 41-50]
  • Amirshahi, Bita Providing a Method for Reducing Energy consumption in the Body Area Network Using Biogeography based optimization Algorithm [Volume 2, Issue 1, 2022, Pages 13-30]
  • Asadi, bahareh An overview of the fundamental concepts of network-on-chip and optical network-on-chip [(Articles in Press)]
  • Asgharzadeh, Davood An Introduction to BI implementation tools [(Articles in Press)]

B

  • Bagheri, Vahid Designing of a Leader-Follower Formation Controller Based on Leader-Follower Flocking with a Virtual Leader for the Clusters of UAVs [Volume 2, Issue 1, 2022, Pages 45-54]
  • Bateni, Hajar The effect of information quality integrity on information security risk management [Volume 1, Issue 1, 2019, Pages 23-35]
  • Borna, Keivan The Improvement of the Iris-Based Authentication by Presenting the Wireless Sensor Network Architecture to Maintain Industrial Internet of Things Privacy [Volume 1, Issue 4, 2021, Pages 35-50]

D

  • Dallaki, Hedayatollah Daily rainfall forecasting with Deep ESN neural network based on experimental data from meteorological station in Hormozgan province [Volume 2, Issue 1, 2022, Pages 31-37]

E

  • Ebadati, Omid Mahdi The Improvement of the Iris-Based Authentication by Presenting the Wireless Sensor Network Architecture to Maintain Industrial Internet of Things Privacy [Volume 1, Issue 4, 2021, Pages 35-50]

G

  • Gavidel, sajjad An Introduction to BI implementation tools [(Articles in Press)]
  • Ghafori, A. Review and Evaluation of Big Data Technologies as a Service [Volume 1, Issue 2, 2021, Pages 1-10]
  • Ghamari Moghaddam, Amin Providing a solution for predicting tax fraud companies based on optimized decision tree, support vector machine and Bayesian network [Volume 2, Issue 2, 2021, Pages 15-32]
  • Ghasemzadeh, Mohammad Use of Software Defined Networks to Enhance the Security of the Internet of Things [Volume 1, Issue 2, 2021, Pages 11-16]
  • Gholamnezhad, Pezhman The IoT Data Collection by UAV, Based on Multi-Objective Evolutionary Algorithm Using Gaussian Process Based on Reverse Modeling [Volume 1, Issue 4, 2021, Pages 59-71]
  • Gholamnezhad, Pezhman A Model-Based Evolutionary Algorithm using FCM-clustering and PCA [Volume 2, Issue 1, 2022, Pages 1-12]

H

  • Hadipour, Ali Some Applications of the BB84 Quantum Encryption Protocol and Related Simulations and Security AnalysisS [Volume 1, Issue 3, 2021, Pages 57-65]
  • Hoseini, Seyed Hasan Designing of a Leader-Follower Formation Controller Based on Leader-Follower Flocking with a Virtual Leader for the Clusters of UAVs [Volume 2, Issue 1, 2022, Pages 45-54]
  • Hosseini Andargoli, Seyed Mehdi Beamforming Robust in Interferer Direction of Arrival Uncertainties with Side lobes Level Control [Volume 2, Issue 2, 2021, Pages 45-59]
  • Hosseinzade, M. R. Review and Evaluation of Big Data Technologies as a Service [Volume 1, Issue 2, 2021, Pages 1-10]

J

K

  • Khaleghi-, -Hossein The fifth generation of mobile telecommunications is the gateway to the fourth generation of industry [(Articles in Press)]
  • Kheirandish, , Sajedeh Image compression based on the desired error by using singular value decomposition to the blocked image [(Articles in Press)]

L

  • Lotfali, Zahra The fifth generation of mobile telecommunications is the gateway to the fourth generation of industry [(Articles in Press)]

M

  • Mahdloo, Abdollah Design and Implementation of Radar Tester Using SDR [Volume 1, Issue 2, 2021, Pages 51-56]
  • Mazloum, Jalil The IoT Data Collection by UAV, Based on Multi-Objective Evolutionary Algorithm Using Gaussian Process Based on Reverse Modeling [Volume 1, Issue 4, 2021, Pages 59-71]
  • Mizanian, Kiarash Challenges and Needs of Cyber Crime Prevention in Schools [Volume 1, Issue 2, 2021, Pages 27-39]
  • Mostafavi, Seyed Akbar Challenges and Needs of Cyber Crime Prevention in Schools [Volume 1, Issue 2, 2021, Pages 27-39]

N

  • Naderi, H. Review and Evaluation of Big Data Technologies as a Service [Volume 1, Issue 2, 2021, Pages 1-10]
  • Naderi, Iman Fake Webpages Detection Using Parallel Autoencoder Neural Networks [Volume 1, Issue 2, 2021, Pages 41-50]
  • Nakhaei, Habibollah Providing a solution for predicting tax fraud companies based on optimized decision tree, support vector machine and Bayesian network [Volume 2, Issue 2, 2021, Pages 15-32]
  • Norousta, Hossein Passive defense strategies in the field of national media infrastructure protection [Volume 2, Issue 2, 2021, Pages 1-14]

P

  • Parsa, Saeed Software Obfuscation with Analytical Hierarchy Process and Petri Nets [Volume 2, Issue 1, 2022, Pages 55-66]
  • Pazhouhi, Manouchehr Design and Implementation of Radar Tester Using SDR [Volume 1, Issue 2, 2021, Pages 51-56]

R

  • Rafie, Mahnaz Continuous allocation and hybrid migration of processors to improve the performance of online mapping on a 2-D network on chip [Volume 2, Issue 2, 2021, Pages 71-86]
  • Rahmanpour, Mahdi Determination of dead time in single photon avalanche detector [(Articles in Press)]
  • Reza, Akram Continuous allocation and hybrid migration of processors to improve the performance of online mapping on a 2-D network on chip [Volume 2, Issue 2, 2021, Pages 71-86]
  • Roozbehi, Reza Use of Software Defined Networks to Enhance the Security of the Internet of Things [Volume 1, Issue 2, 2021, Pages 11-16]

S

  • Sadeghian, Azam Image compression based on the desired error by using singular value decomposition to the blocked image [(Articles in Press)]
  • Saeidi, Parviz The effect of information quality integrity on information security risk management [Volume 1, Issue 1, 2019, Pages 23-35]
  • Sarram, Mehdi Agha Challenges and Needs of Cyber Crime Prevention in Schools [Volume 1, Issue 2, 2021, Pages 27-39]
  • Seyed Naghavi, Mir Ali Identification of the Effective Components of IoT on Human Resource Management Processes [Volume 1, Issue 3, 2021, Pages 75-85]
  • Shahzadeh Fazeli, Seyed Abolfazl Image compression based on the desired error by using singular value decomposition to the blocked image [(Articles in Press)]
  • Shojaee Yas, Hamed Some Applications of the BB84 Quantum Encryption Protocol and Related Simulations and Security AnalysisS [Volume 1, Issue 3, 2021, Pages 57-65]
  • Soheyli, Ehsan Quantum-Scale Information Processing Via Molecular Logic Gates: A Review on the History, Properties, and Derived Technologies [Volume 1, Issue 3, 2021, Pages 35-55]

Z

  • Zeynali, Shayan The Improvement of the Iris-Based Authentication by Presenting the Wireless Sensor Network Architecture to Maintain Industrial Internet of Things Privacy [Volume 1, Issue 4, 2021, Pages 35-50]