A
-
Administrative and Services Management
The effect of implementing the organization's resource planning system on resource optimization and saving time in managing administrative services and support [Volume 2, Issue 1, 2023, Pages 39-43]
-
AEAD
The Scrutiny of the NIST Lightweight Encryption Competition Finalists [Volume 1, Issue 4, 2022, Pages 73-82]
-
Allocation
Continuous allocation and hybrid migration of processors to improve the performance of online mapping on a 2-D network on chip [Volume 2, Issue 2, 2023, Pages 71-86]
-
Artificial Immune System
Delay forecast in the control system based on internet using the meta-heuristic methods and Comparing methods with each others [Volume 1, Issue 1, 2022, Pages 45-52]
-
Asset
Passive defense strategies in the field of national media infrastructure protection [Volume 2, Issue 2, 2023, Pages 1-14]
-
Authentication
Challenges and Needs of Cyber Crime Prevention in Schools [Volume 1, Issue 2, 2022, Pages 27-39]
-
Authentication
The Improvement of the Iris-Based Authentication by Presenting the Wireless Sensor Network Architecture to Maintain Industrial Internet of Things Privacy [Volume 1, Issue 4, 2022, Pages 35-50]
B
-
Bayesian Network
Providing a solution for predicting tax fraud companies based on optimized decision tree, support vector machine and Bayesian network [Volume 2, Issue 2, 2023, Pages 15-32]
-
BB84
Some Applications of the BB84 Quantum Encryption Protocol and Related Simulations and Security AnalysisS [Volume 1, Issue 3, 2022, Pages 57-65]
-
BDaaS
Review and Evaluation of Big Data Technologies as a Service [Volume 1, Issue 2, 2022, Pages 1-10]
-
Beamforming
Beamforming Robust in Interferer Direction of Arrival Uncertainties with Side lobes Level Control [Volume 2, Issue 2, 2023, Pages 45-59]
-
Big Data
Review and Evaluation of Big Data Technologies as a Service [Volume 1, Issue 2, 2022, Pages 1-10]
-
Big Data as a Service
Review and Evaluation of Big Data Technologies as a Service [Volume 1, Issue 2, 2022, Pages 1-10]
-
Blockchain
Challenges and Needs of Cyber Crime Prevention in Schools [Volume 1, Issue 2, 2022, Pages 27-39]
-
Blockchain
Investigating the Functional Integration of Blockchain and its Role in the IoT [Volume 1, Issue 3, 2022, Pages 1-25]
-
Blocking
Image compression based on the desired error by using singular value decomposition to the blocked image [(Articles in Press)]
-
Business intelligence tools
An Introduction to BI implementation tools [(Articles in Press)]
C
-
Channel estimation
Chanel Estimation in SC-FDE Using FZC and Performance Comparison with OFDM in PAPR Reduction for High Order Modulation [Volume 1, Issue 3, 2022, Pages 27-34]
-
Chaos mapping
Encryption of images using chaos theory and cellular automata [Volume 1, Issue 1, 2022, Pages 9-22]
-
Chaos Theory
Encryption of images using chaos theory and cellular automata [Volume 1, Issue 1, 2022, Pages 9-22]
-
Cloud
Review and Evaluation of Big Data Technologies as a Service [Volume 1, Issue 2, 2022, Pages 1-10]
-
Combined Structure
Investigating the Functional Integration of Blockchain and its Role in the IoT [Volume 1, Issue 3, 2022, Pages 1-25]
-
Community Oriented
Challenges and Needs of Cyber Crime Prevention in Schools [Volume 1, Issue 2, 2022, Pages 27-39]
-
Consensus Protocol
Investigating the Functional Integration of Blockchain and its Role in the IoT [Volume 1, Issue 3, 2022, Pages 1-25]
-
Control Flow Graph
Software Obfuscation with Analytical Hierarchy Process and Petri Nets [Volume 2, Issue 1, 2023, Pages 55-66]
-
Control via the Internet
Delay forecast in the control system based on internet using the meta-heuristic methods and Comparing methods with each others [Volume 1, Issue 1, 2022, Pages 45-52]
-
Crowded Tournament Selection Operator
A Model-Based Evolutionary Algorithm using FCM-clustering and PCA [Volume 2, Issue 1, 2023, Pages 1-12]
-
Cryptography
The Analysis and Simulation of Crypto-Trojan Attacks on RSA Key Generating Algorithms [Volume 1, Issue 4, 2022, Pages 1-18]
-
Crypto-Malware
The Analysis and Simulation of Crypto-Trojan Attacks on RSA Key Generating Algorithms [Volume 1, Issue 4, 2022, Pages 1-18]
-
Crypto-Trojan
The Analysis and Simulation of Crypto-Trojan Attacks on RSA Key Generating Algorithms [Volume 1, Issue 4, 2022, Pages 1-18]
-
Cryptovirology
The Analysis and Simulation of Crypto-Trojan Attacks on RSA Key Generating Algorithms [Volume 1, Issue 4, 2022, Pages 1-18]
-
Crypto-Virus
The Analysis and Simulation of Crypto-Trojan Attacks on RSA Key Generating Algorithms [Volume 1, Issue 4, 2022, Pages 1-18]
-
Cybercrime
Challenges and Needs of Cyber Crime Prevention in Schools [Volume 1, Issue 2, 2022, Pages 27-39]
-
Cyber Space
Pathology of the Basic Process in the Cyberspace of the Islamic Republic of Iran [Volume 1, Issue 1, 2022, Pages 53-64]
D
-
Damage
Pathology of the Basic Process in the Cyberspace of the Islamic Republic of Iran [Volume 1, Issue 1, 2022, Pages 53-64]
-
Data Mining
Provides a Hybrid Method of Analyzing News Databases Using RapidMine Case Study: Persian News Texts [Volume 1, Issue 2, 2022, Pages 17-26]
-
Data Structure
Investigating the Functional Integration of Blockchain and its Role in the IoT [Volume 1, Issue 3, 2022, Pages 1-25]
-
Dead time
Determination of dead time in single photon avalanche detector [(Articles in Press)]
-
Decision Tree
Providing a solution for predicting tax fraud companies based on optimized decision tree, support vector machine and Bayesian network [Volume 2, Issue 2, 2023, Pages 15-32]
-
DeepESN neural network
Daily rainfall forecasting with Deep ESN neural network based on experimental data from meteorological station in Hormozgan province [Volume 2, Issue 1, 2023, Pages 31-37]
-
Delay forecast
Delay forecast in the control system based on internet using the meta-heuristic methods and Comparing methods with each others [Volume 1, Issue 1, 2022, Pages 45-52]
-
Depending regression
Daily rainfall forecasting with Deep ESN neural network based on experimental data from meteorological station in Hormozgan province [Volume 2, Issue 1, 2023, Pages 31-37]
-
Detector
Determination of dead time in single photon avalanche detector [(Articles in Press)]
-
DOA estimation error
Beamforming Robust in Interferer Direction of Arrival Uncertainties with Side lobes Level Control [Volume 2, Issue 2, 2023, Pages 45-59]
-
DRFM
Design and Implementation of Radar Tester Using SDR [Volume 1, Issue 2, 2022, Pages 51-56]
E
-
Erbium Doped Fiber Amplifier
Optimal Design of WDM Networks by EDFA Optical Amplifiers with the Approach of Improving Distance Communication and Data Transfer Rates [Volume 1, Issue 3, 2022, Pages 67-73]
-
ESM
Beamforming Robust in Interferer Direction of Arrival Uncertainties with Side lobes Level Control [Volume 2, Issue 2, 2023, Pages 45-59]
-
Estimation functions
Daily rainfall forecasting with Deep ESN neural network based on experimental data from meteorological station in Hormozgan province [Volume 2, Issue 1, 2023, Pages 31-37]
F
-
Fake Webpage
Fake Webpages Detection Using Parallel Autoencoder Neural Networks [Volume 1, Issue 2, 2022, Pages 41-50]
-
Flocking
Designing of a Leader-Follower Formation Controller Based on Leader-Follower Flocking with a Virtual Leader for the Clusters of UAVs [Volume 2, Issue 1, 2023, Pages 45-54]
-
Follower
Designing of a Leader-Follower Formation Controller Based on Leader-Follower Flocking with a Virtual Leader for the Clusters of UAVs [Volume 2, Issue 1, 2023, Pages 45-54]
-
Formation
Designing of a Leader-Follower Formation Controller Based on Leader-Follower Flocking with a Virtual Leader for the Clusters of UAVs [Volume 2, Issue 1, 2023, Pages 45-54]
-
Fragmentation
Continuous allocation and hybrid migration of processors to improve the performance of online mapping on a 2-D network on chip [Volume 2, Issue 2, 2023, Pages 71-86]
-
Frank-Zodoff sequence
Chanel Estimation in SC-FDE Using FZC and Performance Comparison with OFDM in PAPR Reduction for High Order Modulation [Volume 1, Issue 3, 2022, Pages 27-34]
-
Fuzzy clustering
A Model-Based Evolutionary Algorithm using FCM-clustering and PCA [Volume 2, Issue 1, 2023, Pages 1-12]
G
-
GMM
The Effect of ICT on the Production Per Capita of Each Worker in Iran's Provinces: Generalized method of moments [Volume 2, Issue 2, 2023, Pages 61-70]
-
Growth Oriented
Challenges and Needs of Cyber Crime Prevention in Schools [Volume 1, Issue 2, 2022, Pages 27-39]
H
-
Hash Function
Rotational Cryptanalysis on BMW and SIMD [Volume 1, Issue 1, 2022, Pages 37-43]
-
Hierarchical Analysis
Providing a solution for predicting tax fraud companies based on optimized decision tree, support vector machine and Bayesian network [Volume 2, Issue 2, 2023, Pages 15-32]
-
Hierarchical Selector
Software Obfuscation with Analytical Hierarchy Process and Petri Nets [Volume 2, Issue 1, 2023, Pages 55-66]
-
Human Resource Information System
Identification of the Effective Components of IoT on Human Resource Management Processes [Volume 1, Issue 3, 2022, Pages 75-85]
-
Human resources
Identification of the Effective Components of IoT on Human Resource Management Processes [Volume 1, Issue 3, 2022, Pages 75-85]
-
Hybrid Software Components
The Presentation of a Solution to Optimize the Time and Cost of Software Component Placement Using a Multi-Objective Meta-Exploratory Algorithm in the Cloud Environment [Volume 1, Issue 4, 2022, Pages 19-33]
I
-
ICT
The Effect of ICT on the Production Per Capita of Each Worker in Iran's Provinces: Generalized method of moments [Volume 2, Issue 2, 2023, Pages 61-70]
-
Image Encryption
Encryption of images using chaos theory and cellular automata [Volume 1, Issue 1, 2022, Pages 9-22]
-
Image Processing
The Improvement of the Iris-Based Authentication by Presenting the Wireless Sensor Network Architecture to Maintain Industrial Internet of Things Privacy [Volume 1, Issue 4, 2022, Pages 35-50]
-
Industrial Internet of Things
The Improvement of the Iris-Based Authentication by Presenting the Wireless Sensor Network Architecture to Maintain Industrial Internet of Things Privacy [Volume 1, Issue 4, 2022, Pages 35-50]
-
Information Quality
The effect of information quality integrity on information security risk management [Volume 1, Issue 1, 2022, Pages 23-35]
-
Information Security
The effect of information quality integrity on information security risk management [Volume 1, Issue 1, 2022, Pages 23-35]
-
Information Security Risk Management
The effect of information quality integrity on information security risk management [Volume 1, Issue 1, 2022, Pages 23-35]
-
Internet of Things
Use of Software Defined Networks to Enhance the Security of the Internet of Things [Volume 1, Issue 2, 2022, Pages 11-16]
-
IoT
Use of Software Defined Networks to Enhance the Security of the Internet of Things [Volume 1, Issue 2, 2022, Pages 11-16]
-
IoT
Investigating the Functional Integration of Blockchain and its Role in the IoT [Volume 1, Issue 3, 2022, Pages 1-25]
-
IoT
Identification of the Effective Components of IoT on Human Resource Management Processes [Volume 1, Issue 3, 2022, Pages 75-85]
-
IoT
Providing a Method for Reducing Energy consumption in the Body Area Network Using Biogeography based optimization Algorithm [Volume 2, Issue 1, 2023, Pages 13-30]
-
IoT data collection
The IoT Data Collection by UAV, Based on Multi-Objective Evolutionary Algorithm Using Gaussian Process Based on Reverse Modeling [Volume 1, Issue 4, 2022, Pages 59-71]
-
IoT Security Limitations
Investigating the Functional Integration of Blockchain and its Role in the IoT [Volume 1, Issue 3, 2022, Pages 1-25]
K
-
Key Distribution
Determination of dead time in single photon avalanche detector [(Articles in Press)]
-
Keywords :Daily rainfall forecasting
Daily rainfall forecasting with Deep ESN neural network based on experimental data from meteorological station in Hormozgan province [Volume 2, Issue 1, 2023, Pages 31-37]
-
Kleptography Attacks
The Analysis and Simulation of Crypto-Trojan Attacks on RSA Key Generating Algorithms [Volume 1, Issue 4, 2022, Pages 1-18]
L
-
Linear multivariate regression
Daily rainfall forecasting with Deep ESN neural network based on experimental data from meteorological station in Hormozgan province [Volume 2, Issue 1, 2023, Pages 31-37]
-
Lossy Image Compression
Image compression based on the desired error by using singular value decomposition to the blocked image [(Articles in Press)]
-
LWC
The Scrutiny of the NIST Lightweight Encryption Competition Finalists [Volume 1, Issue 4, 2022, Pages 73-82]
M
-
Machine Learning
Fake Webpages Detection Using Parallel Autoencoder Neural Networks [Volume 1, Issue 2, 2022, Pages 41-50]
-
Mapping
Continuous allocation and hybrid migration of processors to improve the performance of online mapping on a 2-D network on chip [Volume 2, Issue 2, 2023, Pages 71-86]
-
Markov Chaining
Rotational Cryptanalysis on BMW and SIMD [Volume 1, Issue 1, 2022, Pages 37-43]
-
Meta-synthesis
Identification of the Effective Components of IoT on Human Resource Management Processes [Volume 1, Issue 3, 2022, Pages 75-85]
-
Migration
Continuous allocation and hybrid migration of processors to improve the performance of online mapping on a 2-D network on chip [Volume 2, Issue 2, 2023, Pages 71-86]
-
Model-based evolutionary Algorithms
A Model-Based Evolutionary Algorithm using FCM-clustering and PCA [Volume 2, Issue 1, 2023, Pages 1-12]
-
Model-based multi-objective evolutionary optimization algorithm
The IoT Data Collection by UAV, Based on Multi-Objective Evolutionary Algorithm Using Gaussian Process Based on Reverse Modeling [Volume 1, Issue 4, 2022, Pages 59-71]
-
Modular Addition
Rotational Cryptanalysis on BMW and SIMD [Volume 1, Issue 1, 2022, Pages 37-43]
-
Molecular Electronics
Quantum-Scale Information Processing Via Molecular Logic Gates: A Review on the History, Properties, and Derived Technologies [Volume 1, Issue 3, 2022, Pages 35-55]
-
Molecular Logic Gate
Quantum-Scale Information Processing Via Molecular Logic Gates: A Review on the History, Properties, and Derived Technologies [Volume 1, Issue 3, 2022, Pages 35-55]
-
Molecular Logic Sensors
Quantum-Scale Information Processing Via Molecular Logic Gates: A Review on the History, Properties, and Derived Technologies [Volume 1, Issue 3, 2022, Pages 35-55]
-
Multi-Objective Evolutionary Algorithm Using Gaussian Process Based on Reverse Modeling
The IoT Data Collection by UAV, Based on Multi-Objective Evolutionary Algorithm Using Gaussian Process Based on Reverse Modeling [Volume 1, Issue 4, 2022, Pages 59-71]
-
Multi Objective Genetic Algorithm
The Presentation of a Solution to Optimize the Time and Cost of Software Component Placement Using a Multi-Objective Meta-Exploratory Algorithm in the Cloud Environment [Volume 1, Issue 4, 2022, Pages 19-33]
-
Multi-Objective Optimization
A Model-Based Evolutionary Algorithm using FCM-clustering and PCA [Volume 2, Issue 1, 2023, Pages 1-12]
-
Multiprocessors
Continuous allocation and hybrid migration of processors to improve the performance of online mapping on a 2-D network on chip [Volume 2, Issue 2, 2023, Pages 71-86]
-
Multi-Tenancy
A Survey of Multi-Tenancy in Cloud Computing Environments [Volume 1, Issue 1, 2022, Pages 1-8]
-
Multi-Threaded Petri Nets
Software Obfuscation with Analytical Hierarchy Process and Petri Nets [Volume 2, Issue 1, 2023, Pages 55-66]
N
-
National Media
Passive defense strategies in the field of national media infrastructure protection [Volume 2, Issue 2, 2023, Pages 1-14]
-
National Security
Passive defense strategies in the field of national media infrastructure protection [Volume 2, Issue 2, 2023, Pages 1-14]
-
Network &ndash
An overview of the fundamental concepts of network-on-chip and optical network-on-chip [(Articles in Press)]
-
Network on Chip (NoC)
Continuous allocation and hybrid migration of processors to improve the performance of online mapping on a 2-D network on chip [Volume 2, Issue 2, 2023, Pages 71-86]
-
News Databases
Provides a Hybrid Method of Analyzing News Databases Using RapidMine Case Study: Persian News Texts [Volume 1, Issue 2, 2022, Pages 17-26]
-
NIST
The Scrutiny of the NIST Lightweight Encryption Competition Finalists [Volume 1, Issue 4, 2022, Pages 73-82]
O
-
OFDM
Chanel Estimation in SC-FDE Using FZC and Performance Comparison with OFDM in PAPR Reduction for High Order Modulation [Volume 1, Issue 3, 2022, Pages 27-34]
-
Optimization
The effect of implementing the organization's resource planning system on resource optimization and saving time in managing administrative services and support [Volume 2, Issue 1, 2023, Pages 39-43]
-
Organizational Resource Planning System
The effect of implementing the organization's resource planning system on resource optimization and saving time in managing administrative services and support [Volume 2, Issue 1, 2023, Pages 39-43]
P
-
PAPR
Chanel Estimation in SC-FDE Using FZC and Performance Comparison with OFDM in PAPR Reduction for High Order Modulation [Volume 1, Issue 3, 2022, Pages 27-34]
-
Parallel Autoencoder Neural Networks
Fake Webpages Detection Using Parallel Autoencoder Neural Networks [Volume 1, Issue 2, 2022, Pages 41-50]
-
Passive Defense
Passive defense strategies in the field of national media infrastructure protection [Volume 2, Issue 2, 2023, Pages 1-14]
-
PCA
A Model-Based Evolutionary Algorithm using FCM-clustering and PCA [Volume 2, Issue 1, 2023, Pages 1-12]
-
Phishing Attack
Fake Webpages Detection Using Parallel Autoencoder Neural Networks [Volume 1, Issue 2, 2022, Pages 41-50]
-
Photonic network -on-chip
An overview of the fundamental concepts of network-on-chip and optical network-on-chip [(Articles in Press)]
-
Potential Function
Designing of a Leader-Follower Formation Controller Based on Leader-Follower Flocking with a Virtual Leader for the Clusters of UAVs [Volume 2, Issue 1, 2023, Pages 45-54]
-
Privacy
The Improvement of the Iris-Based Authentication by Presenting the Wireless Sensor Network Architecture to Maintain Industrial Internet of Things Privacy [Volume 1, Issue 4, 2022, Pages 35-50]
-
Production per worker
The Effect of ICT on the Production Per Capita of Each Worker in Iran's Provinces: Generalized method of moments [Volume 2, Issue 2, 2023, Pages 61-70]
Q
-
QKD
Some Applications of the BB84 Quantum Encryption Protocol and Related Simulations and Security AnalysisS [Volume 1, Issue 3, 2022, Pages 57-65]
-
Quantum
Determination of dead time in single photon avalanche detector [(Articles in Press)]
-
Quantum Computation
Quantum-Scale Information Processing Via Molecular Logic Gates: A Review on the History, Properties, and Derived Technologies [Volume 1, Issue 3, 2022, Pages 35-55]
-
Quantum Cryptography
Some Applications of the BB84 Quantum Encryption Protocol and Related Simulations and Security AnalysisS [Volume 1, Issue 3, 2022, Pages 57-65]
-
Quantum Key Distribution Protocol
Some Applications of the BB84 Quantum Encryption Protocol and Related Simulations and Security AnalysisS [Volume 1, Issue 3, 2022, Pages 57-65]
R
-
RADAR Tester
Design and Implementation of Radar Tester Using SDR [Volume 1, Issue 2, 2022, Pages 51-56]
-
Resource Management
The Presentation of a Solution to Optimize the Time and Cost of Software Component Placement Using a Multi-Objective Meta-Exploratory Algorithm in the Cloud Environment [Volume 1, Issue 4, 2022, Pages 19-33]
-
Resource Sharing
A Survey of Multi-Tenancy in Cloud Computing Environments [Volume 1, Issue 1, 2022, Pages 1-8]
-
Reverse Engineering
Software Obfuscation with Analytical Hierarchy Process and Petri Nets [Volume 2, Issue 1, 2023, Pages 55-66]
-
Reversible cellular automaton
Encryption of images using chaos theory and cellular automata [Volume 1, Issue 1, 2022, Pages 9-22]
-
Reynolds rules
Designing of a Leader-Follower Formation Controller Based on Leader-Follower Flocking with a Virtual Leader for the Clusters of UAVs [Volume 2, Issue 1, 2023, Pages 45-54]
-
Risk Management
The effect of information quality integrity on information security risk management [Volume 1, Issue 1, 2022, Pages 23-35]
-
Rotational Cryptanalysis
Rotational Cryptanalysis on BMW and SIMD [Volume 1, Issue 1, 2022, Pages 37-43]
-
RSA cryptographic system
The Analysis and Simulation of Crypto-Trojan Attacks on RSA Key Generating Algorithms [Volume 1, Issue 4, 2022, Pages 1-18]
-
RTT method
Provide a Way to Detect and Combat Wormhole and Black Hole Attacks in Ad-Hoc Networks [Volume 1, Issue 4, 2022, Pages 51-58]
-
Rules
Pathology of the Basic Process in the Cyberspace of the Islamic Republic of Iran [Volume 1, Issue 1, 2022, Pages 53-64]
S
-
SaaS
A Survey of Multi-Tenancy in Cloud Computing Environments [Volume 1, Issue 1, 2022, Pages 1-8]
-
SaaS Placement
The Presentation of a Solution to Optimize the Time and Cost of Software Component Placement Using a Multi-Objective Meta-Exploratory Algorithm in the Cloud Environment [Volume 1, Issue 4, 2022, Pages 19-33]
-
SC-FDE
Chanel Estimation in SC-FDE Using FZC and Performance Comparison with OFDM in PAPR Reduction for High Order Modulation [Volume 1, Issue 3, 2022, Pages 27-34]
-
School
Challenges and Needs of Cyber Crime Prevention in Schools [Volume 1, Issue 2, 2022, Pages 27-39]
-
SDN
Use of Software Defined Networks to Enhance the Security of the Internet of Things [Volume 1, Issue 2, 2022, Pages 11-16]
-
SDR
Design and Implementation of Radar Tester Using SDR [Volume 1, Issue 2, 2022, Pages 51-56]
-
Sensor network
Provide a Way to Detect and Combat Wormhole and Black Hole Attacks in Ad-Hoc Networks [Volume 1, Issue 4, 2022, Pages 51-58]
-
Signal to Interference plus Noise Ratio
Beamforming Robust in Interferer Direction of Arrival Uncertainties with Side lobes Level Control [Volume 2, Issue 2, 2023, Pages 45-59]
-
Single Mode Fiber
Optimal Design of WDM Networks by EDFA Optical Amplifiers with the Approach of Improving Distance Communication and Data Transfer Rates [Volume 1, Issue 3, 2022, Pages 67-73]
-
Single photon
Determination of dead time in single photon avalanche detector [(Articles in Press)]
-
Software Defined Network
Use of Software Defined Networks to Enhance the Security of the Internet of Things [Volume 1, Issue 2, 2022, Pages 11-16]
-
Status Oriented
Challenges and Needs of Cyber Crime Prevention in Schools [Volume 1, Issue 2, 2022, Pages 27-39]
-
Sub-mesh
Continuous allocation and hybrid migration of processors to improve the performance of online mapping on a 2-D network on chip [Volume 2, Issue 2, 2023, Pages 71-86]
-
Support vector machine
Providing a solution for predicting tax fraud companies based on optimized decision tree, support vector machine and Bayesian network [Volume 2, Issue 2, 2023, Pages 15-32]
-
SWOT
Passive defense strategies in the field of national media infrastructure protection [Volume 2, Issue 2, 2023, Pages 1-14]
-
Symmetric cryptography
The Scrutiny of the NIST Lightweight Encryption Competition Finalists [Volume 1, Issue 4, 2022, Pages 73-82]
T
-
Text Mining
Provides a Hybrid Method of Analyzing News Databases Using RapidMine Case Study: Persian News Texts [Volume 1, Issue 2, 2022, Pages 17-26]
-
The fourth generation of industry
The fifth generation of mobile telecommunications is the gateway to the fourth generation of industry [(Articles in Press)]
-
Time delay
Delay forecast in the control system based on internet using the meta-heuristic methods and Comparing methods with each others [Volume 1, Issue 1, 2022, Pages 45-52]
-
Time Saving
The effect of implementing the organization's resource planning system on resource optimization and saving time in managing administrative services and support [Volume 2, Issue 1, 2023, Pages 39-43]
U
-
UAV
The IoT Data Collection by UAV, Based on Multi-Objective Evolutionary Algorithm Using Gaussian Process Based on Reverse Modeling [Volume 1, Issue 4, 2022, Pages 59-71]
V
-
Virtual leader
Designing of a Leader-Follower Formation Controller Based on Leader-Follower Flocking with a Virtual Leader for the Clusters of UAVs [Volume 2, Issue 1, 2023, Pages 45-54]
W
-
Wavelength Division Multiplexing
Optimal Design of WDM Networks by EDFA Optical Amplifiers with the Approach of Improving Distance Communication and Data Transfer Rates [Volume 1, Issue 3, 2022, Pages 67-73]
-
Wireless Sensor Networks
The Improvement of the Iris-Based Authentication by Presenting the Wireless Sensor Network Architecture to Maintain Industrial Internet of Things Privacy [Volume 1, Issue 4, 2022, Pages 35-50]
Z
-
Zoning
Providing a Method for Reducing Energy consumption in the Body Area Network Using Biogeography based optimization Algorithm [Volume 2, Issue 1, 2023, Pages 13-30]
Your query does not match with any item