Keyword Index

A

  • Administrative and Services Management The effect of implementing the organization's resource planning system on resource optimization and saving time in managing administrative services and support [Volume 2, Issue 1, 2023, Pages 39-43]
  • AEAD The Scrutiny of the NIST Lightweight Encryption Competition Finalists [Volume 1, Issue 4, 2022, Pages 73-82]
  • Allocation Continuous allocation and hybrid migration of processors to improve the performance of online mapping on a 2-D network on chip [Volume 2, Issue 2, 2023, Pages 71-86]
  • Artificial Immune System Delay forecast in the control system based on internet using the meta-heuristic methods and Comparing methods with each others [Volume 1, Issue 1, 2022, Pages 45-52]
  • Asset Passive defense strategies in the field of national media infrastructure protection [Volume 2, Issue 2, 2023, Pages 1-14]
  • Authentication Challenges and Needs of Cyber Crime Prevention in Schools [Volume 1, Issue 2, 2022, Pages 27-39]
  • Authentication The Improvement of the Iris-Based Authentication by Presenting the Wireless Sensor Network Architecture to Maintain Industrial Internet of Things Privacy [Volume 1, Issue 4, 2022, Pages 35-50]

B

  • Bayesian Network Providing a solution for predicting tax fraud companies based on optimized decision tree, support vector machine and Bayesian network [Volume 2, Issue 2, 2023, Pages 15-32]
  • BB84 Some Applications of the BB84 Quantum Encryption Protocol and Related Simulations and Security AnalysisS [Volume 1, Issue 3, 2022, Pages 57-65]
  • BDaaS Review and Evaluation of Big Data Technologies as a Service [Volume 1, Issue 2, 2022, Pages 1-10]
  • Beamforming Beamforming Robust in Interferer Direction of Arrival Uncertainties with Side lobes Level Control [Volume 2, Issue 2, 2023, Pages 45-59]
  • Big Data Review and Evaluation of Big Data Technologies as a Service [Volume 1, Issue 2, 2022, Pages 1-10]
  • Big Data as a Service Review and Evaluation of Big Data Technologies as a Service [Volume 1, Issue 2, 2022, Pages 1-10]
  • Blockchain Challenges and Needs of Cyber Crime Prevention in Schools [Volume 1, Issue 2, 2022, Pages 27-39]
  • Blockchain Investigating the Functional Integration of Blockchain and its Role in the IoT [Volume 1, Issue 3, 2022, Pages 1-25]
  • Blocking Image compression based on the desired error by using singular value decomposition to the blocked image [(Articles in Press)]
  • Business intelligence tools An Introduction to BI implementation tools [(Articles in Press)]

C

  • Channel estimation Chanel Estimation in SC-FDE Using FZC and Performance Comparison with OFDM in PAPR Reduction for High Order Modulation [Volume 1, Issue 3, 2022, Pages 27-34]
  • Chaos mapping Encryption of images using chaos theory and cellular automata [Volume 1, Issue 1, 2022, Pages 9-22]
  • Chaos Theory Encryption of images using chaos theory and cellular automata [Volume 1, Issue 1, 2022, Pages 9-22]
  • Cloud Review and Evaluation of Big Data Technologies as a Service [Volume 1, Issue 2, 2022, Pages 1-10]
  • Combined Structure Investigating the Functional Integration of Blockchain and its Role in the IoT [Volume 1, Issue 3, 2022, Pages 1-25]
  • Community Oriented Challenges and Needs of Cyber Crime Prevention in Schools [Volume 1, Issue 2, 2022, Pages 27-39]
  • Consensus Protocol Investigating the Functional Integration of Blockchain and its Role in the IoT [Volume 1, Issue 3, 2022, Pages 1-25]
  • Control Flow Graph Software Obfuscation with Analytical Hierarchy Process and Petri Nets [Volume 2, Issue 1, 2023, Pages 55-66]
  • Control via the Internet Delay forecast in the control system based on internet using the meta-heuristic methods and Comparing methods with each others [Volume 1, Issue 1, 2022, Pages 45-52]
  • Crowded Tournament Selection Operator A Model-Based Evolutionary Algorithm using FCM-clustering and PCA [Volume 2, Issue 1, 2023, Pages 1-12]
  • Cryptography The Analysis and Simulation of Crypto-Trojan Attacks on RSA Key Generating Algorithms [Volume 1, Issue 4, 2022, Pages 1-18]
  • Crypto-Malware The Analysis and Simulation of Crypto-Trojan Attacks on RSA Key Generating Algorithms [Volume 1, Issue 4, 2022, Pages 1-18]
  • Crypto-Trojan The Analysis and Simulation of Crypto-Trojan Attacks on RSA Key Generating Algorithms [Volume 1, Issue 4, 2022, Pages 1-18]
  • Cryptovirology The Analysis and Simulation of Crypto-Trojan Attacks on RSA Key Generating Algorithms [Volume 1, Issue 4, 2022, Pages 1-18]
  • Crypto-Virus The Analysis and Simulation of Crypto-Trojan Attacks on RSA Key Generating Algorithms [Volume 1, Issue 4, 2022, Pages 1-18]
  • Cybercrime Challenges and Needs of Cyber Crime Prevention in Schools [Volume 1, Issue 2, 2022, Pages 27-39]
  • Cyber Space Pathology of the Basic Process in the Cyberspace of the Islamic Republic of Iran [Volume 1, Issue 1, 2022, Pages 53-64]

D

  • Damage Pathology of the Basic Process in the Cyberspace of the Islamic Republic of Iran [Volume 1, Issue 1, 2022, Pages 53-64]
  • Data Mining Provides a Hybrid Method of Analyzing News Databases Using RapidMine Case Study: Persian News Texts [Volume 1, Issue 2, 2022, Pages 17-26]
  • Data Structure Investigating the Functional Integration of Blockchain and its Role in the IoT [Volume 1, Issue 3, 2022, Pages 1-25]
  • Dead time Determination of dead time in single photon avalanche detector [(Articles in Press)]
  • Decision Tree Providing a solution for predicting tax fraud companies based on optimized decision tree, support vector machine and Bayesian network [Volume 2, Issue 2, 2023, Pages 15-32]
  • DeepESN neural network Daily rainfall forecasting with Deep ESN neural network based on experimental data from meteorological station in Hormozgan province [Volume 2, Issue 1, 2023, Pages 31-37]
  • Delay forecast Delay forecast in the control system based on internet using the meta-heuristic methods and Comparing methods with each others [Volume 1, Issue 1, 2022, Pages 45-52]
  • Depending regression Daily rainfall forecasting with Deep ESN neural network based on experimental data from meteorological station in Hormozgan province [Volume 2, Issue 1, 2023, Pages 31-37]
  • Detector Determination of dead time in single photon avalanche detector [(Articles in Press)]
  • DOA estimation error Beamforming Robust in Interferer Direction of Arrival Uncertainties with Side lobes Level Control [Volume 2, Issue 2, 2023, Pages 45-59]
  • DRFM Design and Implementation of Radar Tester Using SDR [Volume 1, Issue 2, 2022, Pages 51-56]

E

  • Erbium Doped Fiber Amplifier Optimal Design of WDM Networks by EDFA Optical Amplifiers with the Approach of Improving Distance Communication and Data Transfer Rates [Volume 1, Issue 3, 2022, Pages 67-73]
  • ESM Beamforming Robust in Interferer Direction of Arrival Uncertainties with Side lobes Level Control [Volume 2, Issue 2, 2023, Pages 45-59]
  • Estimation functions Daily rainfall forecasting with Deep ESN neural network based on experimental data from meteorological station in Hormozgan province [Volume 2, Issue 1, 2023, Pages 31-37]

F

  • Fake Webpage Fake Webpages Detection Using Parallel Autoencoder Neural Networks [Volume 1, Issue 2, 2022, Pages 41-50]
  • Flocking Designing of a Leader-Follower Formation Controller Based on Leader-Follower Flocking with a Virtual Leader for the Clusters of UAVs [Volume 2, Issue 1, 2023, Pages 45-54]
  • Follower Designing of a Leader-Follower Formation Controller Based on Leader-Follower Flocking with a Virtual Leader for the Clusters of UAVs [Volume 2, Issue 1, 2023, Pages 45-54]
  • Formation Designing of a Leader-Follower Formation Controller Based on Leader-Follower Flocking with a Virtual Leader for the Clusters of UAVs [Volume 2, Issue 1, 2023, Pages 45-54]
  • Fragmentation Continuous allocation and hybrid migration of processors to improve the performance of online mapping on a 2-D network on chip [Volume 2, Issue 2, 2023, Pages 71-86]
  • Frank-Zodoff sequence Chanel Estimation in SC-FDE Using FZC and Performance Comparison with OFDM in PAPR Reduction for High Order Modulation [Volume 1, Issue 3, 2022, Pages 27-34]
  • Fuzzy clustering A Model-Based Evolutionary Algorithm using FCM-clustering and PCA [Volume 2, Issue 1, 2023, Pages 1-12]

G

  • GMM The Effect of ICT on the Production Per Capita of Each Worker in Iran's Provinces: Generalized method of moments [Volume 2, Issue 2, 2023, Pages 61-70]
  • Growth Oriented Challenges and Needs of Cyber Crime Prevention in Schools [Volume 1, Issue 2, 2022, Pages 27-39]

H

  • Hash Function Rotational Cryptanalysis on BMW and SIMD [Volume 1, Issue 1, 2022, Pages 37-43]
  • Hierarchical Analysis Providing a solution for predicting tax fraud companies based on optimized decision tree, support vector machine and Bayesian network [Volume 2, Issue 2, 2023, Pages 15-32]
  • Hierarchical Selector Software Obfuscation with Analytical Hierarchy Process and Petri Nets [Volume 2, Issue 1, 2023, Pages 55-66]
  • Human Resource Information System Identification of the Effective Components of IoT on Human Resource Management Processes [Volume 1, Issue 3, 2022, Pages 75-85]
  • Human resources Identification of the Effective Components of IoT on Human Resource Management Processes [Volume 1, Issue 3, 2022, Pages 75-85]
  • Hybrid Software Components The Presentation of a Solution to Optimize the Time and Cost of Software Component Placement Using a Multi-Objective Meta-Exploratory Algorithm in the Cloud Environment [Volume 1, Issue 4, 2022, Pages 19-33]

I

  • ICT The Effect of ICT on the Production Per Capita of Each Worker in Iran's Provinces: Generalized method of moments [Volume 2, Issue 2, 2023, Pages 61-70]
  • Image Encryption Encryption of images using chaos theory and cellular automata [Volume 1, Issue 1, 2022, Pages 9-22]
  • Image Processing The Improvement of the Iris-Based Authentication by Presenting the Wireless Sensor Network Architecture to Maintain Industrial Internet of Things Privacy [Volume 1, Issue 4, 2022, Pages 35-50]
  • Industrial Internet of Things The Improvement of the Iris-Based Authentication by Presenting the Wireless Sensor Network Architecture to Maintain Industrial Internet of Things Privacy [Volume 1, Issue 4, 2022, Pages 35-50]
  • Information Quality The effect of information quality integrity on information security risk management [Volume 1, Issue 1, 2022, Pages 23-35]
  • Information Security The effect of information quality integrity on information security risk management [Volume 1, Issue 1, 2022, Pages 23-35]
  • Information Security Risk Management The effect of information quality integrity on information security risk management [Volume 1, Issue 1, 2022, Pages 23-35]
  • Internet of Things Use of Software Defined Networks to Enhance the Security of the Internet of Things [Volume 1, Issue 2, 2022, Pages 11-16]
  • IoT Use of Software Defined Networks to Enhance the Security of the Internet of Things [Volume 1, Issue 2, 2022, Pages 11-16]
  • IoT Investigating the Functional Integration of Blockchain and its Role in the IoT [Volume 1, Issue 3, 2022, Pages 1-25]
  • IoT Identification of the Effective Components of IoT on Human Resource Management Processes [Volume 1, Issue 3, 2022, Pages 75-85]
  • IoT Providing a Method for Reducing Energy consumption in the Body Area Network Using Biogeography based optimization Algorithm [Volume 2, Issue 1, 2023, Pages 13-30]
  • IoT data collection The IoT Data Collection by UAV, Based on Multi-Objective Evolutionary Algorithm Using Gaussian Process Based on Reverse Modeling [Volume 1, Issue 4, 2022, Pages 59-71]
  • IoT Security Limitations Investigating the Functional Integration of Blockchain and its Role in the IoT [Volume 1, Issue 3, 2022, Pages 1-25]

K

  • Key Distribution Determination of dead time in single photon avalanche detector [(Articles in Press)]
  • Keywords :Daily rainfall forecasting Daily rainfall forecasting with Deep ESN neural network based on experimental data from meteorological station in Hormozgan province [Volume 2, Issue 1, 2023, Pages 31-37]
  • Kleptography Attacks The Analysis and Simulation of Crypto-Trojan Attacks on RSA Key Generating Algorithms [Volume 1, Issue 4, 2022, Pages 1-18]

L

  • Linear multivariate regression Daily rainfall forecasting with Deep ESN neural network based on experimental data from meteorological station in Hormozgan province [Volume 2, Issue 1, 2023, Pages 31-37]
  • Lossy Image Compression Image compression based on the desired error by using singular value decomposition to the blocked image [(Articles in Press)]
  • LWC The Scrutiny of the NIST Lightweight Encryption Competition Finalists [Volume 1, Issue 4, 2022, Pages 73-82]

M

  • Machine Learning Fake Webpages Detection Using Parallel Autoencoder Neural Networks [Volume 1, Issue 2, 2022, Pages 41-50]
  • Mapping Continuous allocation and hybrid migration of processors to improve the performance of online mapping on a 2-D network on chip [Volume 2, Issue 2, 2023, Pages 71-86]
  • Markov Chaining Rotational Cryptanalysis on BMW and SIMD [Volume 1, Issue 1, 2022, Pages 37-43]
  • Meta-synthesis Identification of the Effective Components of IoT on Human Resource Management Processes [Volume 1, Issue 3, 2022, Pages 75-85]
  • Migration Continuous allocation and hybrid migration of processors to improve the performance of online mapping on a 2-D network on chip [Volume 2, Issue 2, 2023, Pages 71-86]
  • Model-based evolutionary Algorithms A Model-Based Evolutionary Algorithm using FCM-clustering and PCA [Volume 2, Issue 1, 2023, Pages 1-12]
  • Model-based multi-objective evolutionary optimization algorithm The IoT Data Collection by UAV, Based on Multi-Objective Evolutionary Algorithm Using Gaussian Process Based on Reverse Modeling [Volume 1, Issue 4, 2022, Pages 59-71]
  • Modular Addition Rotational Cryptanalysis on BMW and SIMD [Volume 1, Issue 1, 2022, Pages 37-43]
  • Molecular Electronics Quantum-Scale Information Processing Via Molecular Logic Gates: A Review on the History, Properties, and Derived Technologies [Volume 1, Issue 3, 2022, Pages 35-55]
  • Molecular Logic Gate Quantum-Scale Information Processing Via Molecular Logic Gates: A Review on the History, Properties, and Derived Technologies [Volume 1, Issue 3, 2022, Pages 35-55]
  • Molecular Logic Sensors Quantum-Scale Information Processing Via Molecular Logic Gates: A Review on the History, Properties, and Derived Technologies [Volume 1, Issue 3, 2022, Pages 35-55]
  • Multi-Objective Evolutionary Algorithm Using Gaussian Process Based on Reverse Modeling The IoT Data Collection by UAV, Based on Multi-Objective Evolutionary Algorithm Using Gaussian Process Based on Reverse Modeling [Volume 1, Issue 4, 2022, Pages 59-71]
  • Multi Objective Genetic Algorithm The Presentation of a Solution to Optimize the Time and Cost of Software Component Placement Using a Multi-Objective Meta-Exploratory Algorithm in the Cloud Environment [Volume 1, Issue 4, 2022, Pages 19-33]
  • Multi-Objective Optimization A Model-Based Evolutionary Algorithm using FCM-clustering and PCA [Volume 2, Issue 1, 2023, Pages 1-12]
  • Multiprocessors Continuous allocation and hybrid migration of processors to improve the performance of online mapping on a 2-D network on chip [Volume 2, Issue 2, 2023, Pages 71-86]
  • Multi-Tenancy A Survey of Multi-Tenancy in Cloud Computing Environments [Volume 1, Issue 1, 2022, Pages 1-8]
  • Multi-Threaded Petri Nets Software Obfuscation with Analytical Hierarchy Process and Petri Nets [Volume 2, Issue 1, 2023, Pages 55-66]

N

  • National Media Passive defense strategies in the field of national media infrastructure protection [Volume 2, Issue 2, 2023, Pages 1-14]
  • National Security Passive defense strategies in the field of national media infrastructure protection [Volume 2, Issue 2, 2023, Pages 1-14]
  • Network &ndash An overview of the fundamental concepts of network-on-chip and optical network-on-chip [(Articles in Press)]
  • Network on Chip (NoC) Continuous allocation and hybrid migration of processors to improve the performance of online mapping on a 2-D network on chip [Volume 2, Issue 2, 2023, Pages 71-86]
  • News Databases Provides a Hybrid Method of Analyzing News Databases Using RapidMine Case Study: Persian News Texts [Volume 1, Issue 2, 2022, Pages 17-26]
  • NIST The Scrutiny of the NIST Lightweight Encryption Competition Finalists [Volume 1, Issue 4, 2022, Pages 73-82]

O

  • OFDM Chanel Estimation in SC-FDE Using FZC and Performance Comparison with OFDM in PAPR Reduction for High Order Modulation [Volume 1, Issue 3, 2022, Pages 27-34]
  • Optimization The effect of implementing the organization's resource planning system on resource optimization and saving time in managing administrative services and support [Volume 2, Issue 1, 2023, Pages 39-43]
  • Organizational Resource Planning System The effect of implementing the organization's resource planning system on resource optimization and saving time in managing administrative services and support [Volume 2, Issue 1, 2023, Pages 39-43]

P

  • PAPR Chanel Estimation in SC-FDE Using FZC and Performance Comparison with OFDM in PAPR Reduction for High Order Modulation [Volume 1, Issue 3, 2022, Pages 27-34]
  • Parallel Autoencoder Neural Networks Fake Webpages Detection Using Parallel Autoencoder Neural Networks [Volume 1, Issue 2, 2022, Pages 41-50]
  • Passive Defense Passive defense strategies in the field of national media infrastructure protection [Volume 2, Issue 2, 2023, Pages 1-14]
  • PCA A Model-Based Evolutionary Algorithm using FCM-clustering and PCA [Volume 2, Issue 1, 2023, Pages 1-12]
  • Phishing Attack Fake Webpages Detection Using Parallel Autoencoder Neural Networks [Volume 1, Issue 2, 2022, Pages 41-50]
  • Photonic network -on-chip An overview of the fundamental concepts of network-on-chip and optical network-on-chip [(Articles in Press)]
  • Potential Function Designing of a Leader-Follower Formation Controller Based on Leader-Follower Flocking with a Virtual Leader for the Clusters of UAVs [Volume 2, Issue 1, 2023, Pages 45-54]
  • Privacy The Improvement of the Iris-Based Authentication by Presenting the Wireless Sensor Network Architecture to Maintain Industrial Internet of Things Privacy [Volume 1, Issue 4, 2022, Pages 35-50]
  • Production per worker The Effect of ICT on the Production Per Capita of Each Worker in Iran's Provinces: Generalized method of moments [Volume 2, Issue 2, 2023, Pages 61-70]

Q

  • QKD Some Applications of the BB84 Quantum Encryption Protocol and Related Simulations and Security AnalysisS [Volume 1, Issue 3, 2022, Pages 57-65]
  • Quantum Determination of dead time in single photon avalanche detector [(Articles in Press)]
  • Quantum Computation Quantum-Scale Information Processing Via Molecular Logic Gates: A Review on the History, Properties, and Derived Technologies [Volume 1, Issue 3, 2022, Pages 35-55]
  • Quantum Cryptography Some Applications of the BB84 Quantum Encryption Protocol and Related Simulations and Security AnalysisS [Volume 1, Issue 3, 2022, Pages 57-65]
  • Quantum Key Distribution Protocol Some Applications of the BB84 Quantum Encryption Protocol and Related Simulations and Security AnalysisS [Volume 1, Issue 3, 2022, Pages 57-65]

R

  • RADAR Tester Design and Implementation of Radar Tester Using SDR [Volume 1, Issue 2, 2022, Pages 51-56]
  • Resource Management The Presentation of a Solution to Optimize the Time and Cost of Software Component Placement Using a Multi-Objective Meta-Exploratory Algorithm in the Cloud Environment [Volume 1, Issue 4, 2022, Pages 19-33]
  • Resource Sharing A Survey of Multi-Tenancy in Cloud Computing Environments [Volume 1, Issue 1, 2022, Pages 1-8]
  • Reverse Engineering Software Obfuscation with Analytical Hierarchy Process and Petri Nets [Volume 2, Issue 1, 2023, Pages 55-66]
  • Reversible cellular automaton Encryption of images using chaos theory and cellular automata [Volume 1, Issue 1, 2022, Pages 9-22]
  • Reynolds rules Designing of a Leader-Follower Formation Controller Based on Leader-Follower Flocking with a Virtual Leader for the Clusters of UAVs [Volume 2, Issue 1, 2023, Pages 45-54]
  • Risk Management The effect of information quality integrity on information security risk management [Volume 1, Issue 1, 2022, Pages 23-35]
  • Rotational Cryptanalysis Rotational Cryptanalysis on BMW and SIMD [Volume 1, Issue 1, 2022, Pages 37-43]
  • RSA cryptographic system The Analysis and Simulation of Crypto-Trojan Attacks on RSA Key Generating Algorithms [Volume 1, Issue 4, 2022, Pages 1-18]
  • RTT method Provide a Way to Detect and Combat Wormhole and Black Hole Attacks in Ad-Hoc Networks [Volume 1, Issue 4, 2022, Pages 51-58]
  • Rules Pathology of the Basic Process in the Cyberspace of the Islamic Republic of Iran [Volume 1, Issue 1, 2022, Pages 53-64]

S

  • SaaS A Survey of Multi-Tenancy in Cloud Computing Environments [Volume 1, Issue 1, 2022, Pages 1-8]
  • SaaS Placement The Presentation of a Solution to Optimize the Time and Cost of Software Component Placement Using a Multi-Objective Meta-Exploratory Algorithm in the Cloud Environment [Volume 1, Issue 4, 2022, Pages 19-33]
  • SC-FDE Chanel Estimation in SC-FDE Using FZC and Performance Comparison with OFDM in PAPR Reduction for High Order Modulation [Volume 1, Issue 3, 2022, Pages 27-34]
  • School Challenges and Needs of Cyber Crime Prevention in Schools [Volume 1, Issue 2, 2022, Pages 27-39]
  • SDN Use of Software Defined Networks to Enhance the Security of the Internet of Things [Volume 1, Issue 2, 2022, Pages 11-16]
  • SDR Design and Implementation of Radar Tester Using SDR [Volume 1, Issue 2, 2022, Pages 51-56]
  • Sensor network Provide a Way to Detect and Combat Wormhole and Black Hole Attacks in Ad-Hoc Networks [Volume 1, Issue 4, 2022, Pages 51-58]
  • Signal to Interference plus Noise Ratio Beamforming Robust in Interferer Direction of Arrival Uncertainties with Side lobes Level Control [Volume 2, Issue 2, 2023, Pages 45-59]
  • Single Mode Fiber Optimal Design of WDM Networks by EDFA Optical Amplifiers with the Approach of Improving Distance Communication and Data Transfer Rates [Volume 1, Issue 3, 2022, Pages 67-73]
  • Single photon Determination of dead time in single photon avalanche detector [(Articles in Press)]
  • Software Defined Network Use of Software Defined Networks to Enhance the Security of the Internet of Things [Volume 1, Issue 2, 2022, Pages 11-16]
  • Status Oriented Challenges and Needs of Cyber Crime Prevention in Schools [Volume 1, Issue 2, 2022, Pages 27-39]
  • Sub-mesh Continuous allocation and hybrid migration of processors to improve the performance of online mapping on a 2-D network on chip [Volume 2, Issue 2, 2023, Pages 71-86]
  • Support vector machine Providing a solution for predicting tax fraud companies based on optimized decision tree, support vector machine and Bayesian network [Volume 2, Issue 2, 2023, Pages 15-32]
  • SWOT Passive defense strategies in the field of national media infrastructure protection [Volume 2, Issue 2, 2023, Pages 1-14]
  • Symmetric cryptography The Scrutiny of the NIST Lightweight Encryption Competition Finalists [Volume 1, Issue 4, 2022, Pages 73-82]

T

  • Text Mining Provides a Hybrid Method of Analyzing News Databases Using RapidMine Case Study: Persian News Texts [Volume 1, Issue 2, 2022, Pages 17-26]
  • The fourth generation of industry The fifth generation of mobile telecommunications is the gateway to the fourth generation of industry [(Articles in Press)]
  • Time delay Delay forecast in the control system based on internet using the meta-heuristic methods and Comparing methods with each others [Volume 1, Issue 1, 2022, Pages 45-52]
  • Time Saving The effect of implementing the organization's resource planning system on resource optimization and saving time in managing administrative services and support [Volume 2, Issue 1, 2023, Pages 39-43]

U

  • UAV The IoT Data Collection by UAV, Based on Multi-Objective Evolutionary Algorithm Using Gaussian Process Based on Reverse Modeling [Volume 1, Issue 4, 2022, Pages 59-71]

V

  • Virtual leader Designing of a Leader-Follower Formation Controller Based on Leader-Follower Flocking with a Virtual Leader for the Clusters of UAVs [Volume 2, Issue 1, 2023, Pages 45-54]

W

  • Wavelength Division Multiplexing Optimal Design of WDM Networks by EDFA Optical Amplifiers with the Approach of Improving Distance Communication and Data Transfer Rates [Volume 1, Issue 3, 2022, Pages 67-73]
  • Wireless Sensor Networks The Improvement of the Iris-Based Authentication by Presenting the Wireless Sensor Network Architecture to Maintain Industrial Internet of Things Privacy [Volume 1, Issue 4, 2022, Pages 35-50]

Z

  • Zoning Providing a Method for Reducing Energy consumption in the Body Area Network Using Biogeography based optimization Algorithm [Volume 2, Issue 1, 2023, Pages 13-30]