Number of Articles: 97
51. The Diagnosis of Epilepsy by Gravitational Search Algorithm and Support Vector Machines

Volume 3, Issue 2, Winter and Spring 2016, Pages 111-125

Zeinab Basereh; Shahram Golzari; Abbas Harifi


52. A High-Payload Audio Watermarking Scheme for Real-Time Applications

Volume 2, Issue 2, Winter and Spring 2015, Pages 119-127

Ramin Almasi; Hooman Nikmehr


53. Adaptive Interval Type-2 Fuzzy Inference System for Facial Expression Recognition

Volume 2, Issue 3, Summer and Autumn 2015, Pages 125-207

Mehran Safayani; Vahid Farmani; Maedeh Ahmadi; Abdolreza Mirzaei


54. A New Hybrid Method for VoIP Stream Steganography

Volume 3, Issue 3, Summer and Autumn 2016, Pages 175-182

Hossein Moodi; Ahmad Reza Naghsh-Nilchi


55. Comparison of Hybrid and Filter Feature Selection Methods to Identify Candidate Single Nucleotide Polymorphisms

Volume 1, Issue 3, Summer and Autumn 2014, Pages 205-2013

Farideh Halakou; Mahdi Eftekhari; Ali Esmailizadeh


56. Randomized SVD Based Probabilistic Caching Strategy in Named Data Networks

Volume 3, Issue 4, Summer and Autumn 2016, Pages 217-231

Narges Mehran; Naser Movahhedinia


57. A Context-Aware Reflective-State Framework to Reconfigure Service-Based Applications

Volume 2, Issue 4, Summer and Autumn 2015, Pages 281-292

Yousef Rastegari; Fereidoon Shams


58. DOPPONENT: A Socially Efficient Preference Model of Opponent in Bilateral Multi Issue Negotiations

Volume 1, Issue 4, Summer and Autumn 2014, Pages 283-292

Farhad Zafari; Faria Nassiri-Mofakham; Ali Zeinal Hamadani


59. An Extension of CryptoPAi to the Formal Analysis of E-voting Protocols

Volume 6, Issue 1, Winter and Spring 2019, Pages 25-42

10.22108/jcs.2019.113429.1011

Hamid Reza Mahrooghi; Rasool Jalili


60. Towards a Model-Driven Framework for Simulating Interactive Emergency Response Environments

Volume 5, Issue 1, Winter and Spring 2018, Pages 35-49

10.22108/jcs.2018.112297.1008

Samaneh HoseinDoost; Afsaneh Fatemi; Bahman Zamani


62. The Effect of Correlogram Properties on Blind Steganalysis in JPEG Images

Volume 1, Issue 1, Winter and Spring 2014, Pages 39-46

Dariush Alimoradi; Maryam Hasanzadeh


63. A High Speed Residue-to-Binary Converter for Balanced 4-Moduli Set

Volume 2, Issue 1, Winter and Spring 2015, Pages 43-54

MohammadReza Taheri; Nasim Shafiee; Mohammad Esmaeildoust; Zhale Amirjamshidi; Reza Sabbaghi-nadooshan; Keivan Navi


64. Structural and Non-Structural Similarity Combination of Users in Social Networks

Volume 3, Issue 1, Winter and Spring 2016, Pages 43-52

Azam Malekmohammad; Hadi Khosravi


65. BLProM: A black-box approach for detecting business-layer processes in the web applications

Volume 6, Issue 2, Summer and Autumn 2019, Pages 65-80

10.22108/jcs.2020.117223.1028

Mitra Alidoosti; Alireza Nowroozi; Ahmad Nickabadi


66. Robust Face Recognition Under Illumination Changes and Pose Variations

Volume 5, Issue 2, Summer and Autumn 2018, Pages 81-89

10.22108/jcs.2018.110882.

Hamid Hassanpour; Omid Kohansal; Sekineh Asadi Amiri


67. A New Hybrid Approach for Modeling Accurate Fuzzy Rule Based Classification Systems

Volume 1, Issue 2, Winter and Spring 2014, Pages 111-122

Fahimeh Farahbod; Mahdi Eftekhari


68. AUBUE: An Adaptive User-Interface Based on Users' Emotions

Volume 3, Issue 2, Winter and Spring 2016, Pages 127-145

Fariba Noori; Mohammad Kazemifard


69. A New Implementation for a 2^n-1 Modular Adder Through Carbon Nanotube Field Effect Transistors

Volume 2, Issue 2, Winter and Spring 2015, Pages 129-139

Seyyed Ashkan Ebrahimi; Mohammad Reza Reshadinezhad


70. Effect of Purposeful Feature Extraction in High-dimensional Kinship Verification Problem

Volume 3, Issue 3, Summer and Autumn 2016, Pages 183-191

Pendar Alirezazadeh; Abdolhossein Fathi; Fardin Abdali-Mohammadi


71. Toward automatic Transformation of Service Choreography into UML State Machine

Volume 2, Issue 3, Summer and Autumn 2015, Pages 209-222

Yousef Rastegari; Fereidoon Shams


72. HH-FRBC: Halving Hierarchical Fuzzy Rule-Based Classifier

Volume 1, Issue 3, Summer and Autumn 2014, Pages 215-224

Azam Amouzadi; Abdolreza Mirzaei


73. Persian Texts Part of Speech Tagging Using Artificial Neural Networks

Volume 3, Issue 4, Summer and Autumn 2016, Pages 233-241

Zahra Hosseini Pozveh; Amirhassan Monadjemi; Ali Ahmadi


74. Effective Intrusion Detection with a Neural Network Ensemble Using Fuzzy Clustering and Stacking Combination Method

Volume 1, Issue 4, Summer and Autumn 2014, Pages 293-305

Mohammad Amini; Jalal Rezaeenour; Esmaeil Hadavandi


75. Simulating the Resource Freeing Attack: Using Cloudsim Simulator

Volume 2, Issue 4, Summer and Autumn 2015, Pages 293-302

Shakiba Nayebalsadr; Morteza Analoui