-
Open Access Article
1 - Design and implementation of a fuzzy expert system for suspicious behavior detection in e-banking system
leila saroukhani gholamali montazer -
Open Access Article
2 - Performance Improvement of Automatic Language Identification Using GMM-SVM Method
fahime ghasemian homayoun homayoun -
Open Access Article
3 - طراحی اولین پایگاه داده کلمات دستنویس کردی برای سیستم های تشخیص تصویری کلمات
fatemeh daneshfar basir alagheband vahid sharafi -
Open Access Article
4 - Design of An intrusion detection system with new architecture for malware attacks on flash disks
Soheil Afraz -
Open Access Article
5 - Vision-based Entrance Detection in Outdoor Scenes
Mehdi Talebi -
Open Access Article
6 - Door detection based on car vision in outdoor scenes
abbas vafaei Mehdi Talebi monadjemi monadjemi -
Open Access Article
7 - Improving the accuracy of the GMM model in the form of the GMM-VSM system in the application of speech language recognition
Fahimeh GHasemian Mohamad mahdi Homaion por -
Open Access Article
8 - Introducing a genetic algorithm based Method for Community person's stance Detection in social media and news
mehdi salkhordeh haghighi Seyyed Mohammad ebrahimi -
Open Access Article
9 - An Improved Method Based on Label Propagation and Greedy Approaches for Community Detection in Dynamic Social Networks
Mohammad ستاری kamran zamanifar -
Open Access Article
10 - Laboratory diagnosis of liver disease in small animal practice
Saba Ahmadi Morteza Hasanabadi Mehrdad Mohri -
Open Access Article
11 - Thyroid glands: diseases and laboratory diagnosis in small animals
Maedeh Ghari Niloufar Abedi Mohammad Heidarpour -
Open Access Article
12 - An Intelligent Model for Multidimensional Personality Recognition of Users using Deep Learning Methods
Hossein Sadr fatemeh mohades deilami morteza tarkhan -
Open Access Article
13 - Foreword
Seyyed Mohammad Khamenei -
Open Access Article
14 - مدل نقش دانش بازار و ابعاد آن در تشخیص و بهره برداری از فرصتهای کارآفرینانه
Hossein Abolhassani لطف الله فروزنده دهکردی جهانگیر یدالهی فارسی علی داوری -
Open Access Article
15 - نقش دانش بازار و دانش فن آوری در تشخیص و بهره برداری از فرصتهای کارآفرینانه در صنایع غذایی ایران
Hossein Abolhassani -
Open Access Article
16 - Nastaliq CAPTCHA
M. H. Shirali-Shahreza Mohammad Shirali-Shahreza -
Open Access Article
17 - A Lightweight Intrusion Detection System Based on Two-Level Trust for Wireless Sensor Networks
M. sadeghizade O. R. Marouzi -
Open Access Article
18 - Anomaly Detection in the Car Trajectories Using Sparse Reconstruction
Reyhane Taghizade Abbas Ebrahimi moghadam M. Khademi -
Open Access Article
19 - Numeric Polarity Detection based on Employing Recursive Deep Neural Networks and Supervised Learning on Persian Reviews of E-Commerce Users in Opinion Mining Domain
Sepideh Jamshidinejad Fatemeh Ahmadi-Abkenari Peiman Bayat -
Open Access Article
20 - Detection and Recovery of Corrupted Images After High Rate of Tampering Attacks
Faranak Tohidi Mohammad Reza Hooshmandasl -
Open Access Article
21 - Fault Tolerant Control of DFIG Wind Turbine Back-to-Back Converter Based on Developed Sliding Mode Method
mehrnoosh Kamarzarrin Mohammad Hossein Refan پرویز امیری -
Open Access Article
22 - Improving IoT Botnet Anomaly Detection Based on Dynamic Feature Selection and Hybrid Processing
Boshra Pishgoo Ahmad akbari azirani -
Open Access Article
23 - Optimal model of governance in the light of an independent judiciary
Hossein Abdi Vali Rostami -
Open Access Article
24 - Community Detection in Complex Dynamic Networks Based on Graph Embedding and Clustering Ensemble
Majid Mohammadpour Seyedakbar Mostafavi وحید رنجبر -
Open Access Article
25 - Comparison of Faster RCNN and RetinaNet for Car Recognition in Adverse Weather
Yaser Jamshidi Raziyeh Sadat Okhovat -
Open Access Article
26 - Intrusion Detection Based on Cooperation on the Permissioned Blockchain Platform in the Internet of Things Using Machine Learning
Mohammad Mahdi Abdian majid ghayori Seyed Ahmad Eftekhari -
Open Access Article
27 - A New Hybrid Method Based on Intelligent Algorithms for Intrusion Detection in SDN-IoT
Zakaria Raeisi Fazlloah Adibnia Mahdi Yazdian -
Open Access Article
28 - The Constitution Of The Islamic Republic Of Iran: The Field Of Conflicts And Conflicts )Principles Related To The Leadership And Expediency Council(
Ghasem Ghasemi Bayorzni Fariborz Letafati Roghayeh Bahonar -
Open Access Article
29 - Automatic Lung Diseases Identification using Discrete Cosine Transform-based Features in Radiography Images
Shamim Yousefi Samad Najjar-Ghabel -
Open Access Article
30 - An Intrusion Detection System based on Deep Learning for CAN Bus
Fatemeh Asghariyan Mohsen Raji -
Open Access Article
31 - Face recognition and Liveness Detection Based on Speech Recognition for Electronical Authentication
Ahmad dolatkhah Behnam Dorostkar Yaghouti raheb hashempour -
Open Access Article
32 - Improvement of intrusion detection system on Industrial Internet of Things based on deep learning using metaheuristic algorithms
mohammadreza zeraatkarmoghaddam majid ghayori -
Open Access Article
33 - Detection and Analysis of Acoustic Signals of Power Transformers On-Load Tap Changers for Assessment of Their Faults
adel younesi Abbas Ghayebloo Hasanreza Mirzaei -
Open Access Article
34 - Providing an Intrusion Detection System in the Industrial Internet of Things Using the Gray Wolf Algorithm
Sajad Alimohamadi Mohammad Fathi -
Open Access Article
35 - Bidirectional Bus Transfer Method for Induction Motors Between Inverter and Grid By Correcting Control References Using Discrete Fourier Transformation
Alireza Lahooti Eshkevari Ali Keshavarzian Iman Abdoli Mohammad Farzi Seyed Mohammadreza Zeinalhosseini -
Open Access Article
36 - Prevalence of Bovine Respiratory Disease in Dairy Calves: A Comparative Study of Clinical Signs and Thoracic Ultrasound Screening
SeyedAli Saadatnia Gholamreza Mohamadi Ali Mirshahi -
Open Access Article
37 - Proposing an Islanding Detection Index for Distribution Networks with Conventional and Inverter-Based Distributed Generators
Amir Hosein Alizadeh Seyed Fariborz Zarei -
Open Access Article
38 - Intrusion Detection Based on Cooperation on the Permissioned Blockchain Platform in the Internet of Things Using Machine Learning
Mohammad Mahdi Abdian majid ghayori Seyed Ahmad Eftekhari