Author Index

A

  • Abdali-Mohammadi, Fardin Improving Face Recognition Systems Security Using Local Binary Patterns [Volume 2, Issue 1, 2015, Pages 55-62]
  • Abdali-Mohammadi, Fardin A Novel Grammar-Based Approach to Atrial Fibrillation Arrhythmia Detection for Pervasive Healthcare Environments [Volume 2, Issue 2, 2015, Pages 155-163]
  • Abdali-Mohammadi, Fardin Effect of Purposeful Feature Extraction in High-dimensional Kinship Verification Problem [Volume 3, Issue 3, 2016, Pages 183-191]
  • Abdollahi Azgomi, Mohammad Expected Coverage of Perfect Chains in the Hellman Time Memory Trade-Off [Volume 3, Issue 3, 2016, Pages 155-162]
  • Adibi, Peyman A Growing Hierarchical Approach to Batch Linear Manifold Topographic Map Formation [Volume 1, Issue 1, 2014, Pages 47-59]
  • Ahmadi, Ali Persian Texts Part of Speech Tagging Using Artificial Neural Networks [Volume 3, Issue 4, 2016, Pages 233-241]
  • Ahmadi, Maedeh Adaptive Interval Type-2 Fuzzy Inference System for Facial Expression Recognition [Volume 2, Issue 3, 2015, Pages 125-207]
  • Ajoudanian, Shohreh A Novel Solution for Author Attribution Problem in Anonymous E-mail [Volume 1, Issue 4, 2014, Pages 319-327]
  • Akhaee, Mohammad Ali Improved Secure and Privacy Preserving Keyword Searching Cryptography [Volume 2, Issue 3, 2015, Pages 185-194]
  • Akhoondi, Rana A GA Approach for Tuning Membership Functions of a Fuzzy Expert System for Heart Disease Prognosis Development Risk [Volume 4, Issue 1, 2017, Pages 13-23]
  • Alfraihi, Hessa eXtreme Modeling: an approach to agile model-based development [(Articles in Press)]
  • Ali, Rosmah An Empirical Study of Students' Perceptions on the Technological Aspects of the E-Learning System [Volume 4, Issue 1, 2017, Pages 25-38]
  • Alimoradi, Dariush The Effect of Correlogram Properties on Blind Steganalysis in JPEG Images [Volume 1, Issue 1, 2014, Pages 39-46]
  • Alirezazadeh, Pendar Effect of Purposeful Feature Extraction in High-dimensional Kinship Verification Problem [Volume 3, Issue 3, 2016, Pages 183-191]
  • Alizadeh, Javad JHAE: A Novel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH [Volume 2, Issue 1, 2015, Pages 3-20]
  • Almasi, Ramin A High-Payload Audio Watermarking Scheme for Real-Time Applications [Volume 2, Issue 2, 2015, Pages 119-127]
  • Amini, Mohammad Effective Intrusion Detection with a Neural Network Ensemble Using Fuzzy Clustering and Stacking Combination Method [Volume 1, Issue 4, 2014, Pages 293-305]
  • Amirfattahi, Rasoul Semantic Segmentation of Aerial Images Using Fusion of Color and Texture Features [Volume 1, Issue 3, 2014, Pages 225-238]
  • Amirjamshidi, Zhale A High Speed Residue-to-Binary Converter for Balanced 4-Moduli Set [Volume 2, Issue 1, 2015, Pages 43-54]
  • Amouzadi, Azam HH-FRBC: Halving Hierarchical Fuzzy Rule-Based Classifier [Volume 1, Issue 3, 2014, Pages 215-224]
  • Analoui, Morteza Simulating the Resource Freeing Attack: Using Cloudsim Simulator [Volume 2, Issue 4, 2015, Pages 293-302]
  • Arabjafari, Monireh Evaluating Behavioral Intentions of Tourists in e-Tourism [Volume 1, Issue 2, 2014, Pages 95-109]
  • Aref, Mohammad Reza JHAE: A Novel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH [Volume 2, Issue 1, 2015, Pages 3-20]
  • Asadi Amiri, Sekineh Robust Face Recognition Under Illumination Changes and Pose Variations [Volume 5, Issue 2, 2018, Pages 15-23]
  • Asadollahi, Hamid Multicollision Attack on a recently proposed hash function vMDC-2 [Volume 3, Issue 4, 2016, Pages 211-215]
  • Asgarian, Ehsan Improving Semi-supervised Constrained k-Means Clustering Method Using User Feedback [Volume 1, Issue 4, 2014, Pages 273-261]
  • Ashooriyan, Peyman Multiple-Fault Tolerant Hardware Structure for Cellular Genetic Algorithm [Volume 3, Issue 1, 2016, Pages 27-42]
  • Askarian, Ahmad An Optimal Traffic Distribution Method Supporting End-to-End Delay Bound [Volume 1, Issue 1, 2014, Pages 61-71]

B

  • Babamir, Seyed Morteza Ranking of Common Architectural Styles Based on Availability, Security and Performance Quality Attributes [Volume 1, Issue 2, 2014, Pages 83-93]
  • Babamir, Seyed Morteza A Method for Assessing Maintainability of Software Architectural Styles in Self-healing Systems by Measuring Coupling and Cohesion [Volume 2, Issue 1, 2015, Pages 31-42]
  • Bagheri, Ayoub PSA: A Hybrid Feature Selection Approach for Persian Text Classification [Volume 1, Issue 4, 2014, Pages 261-272]
  • Bagheri, Nasour JHAE: A Novel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH [Volume 2, Issue 1, 2015, Pages 3-20]
  • Bagheri, Nasour On the Security of Permutation Based Authentication Protocols for Internet of Things Applications: The Case of Huang et al.'s Protocol [Volume 3, Issue 4, 2016, Pages 201-209]
  • Bagheri, Nasour Multicollision Attack on a recently proposed hash function vMDC-2 [Volume 3, Issue 4, 2016, Pages 211-215]
  • Bahrak, Behnam Improved Secure and Privacy Preserving Keyword Searching Cryptography [Volume 2, Issue 3, 2015, Pages 185-194]
  • Baleghi Damavandi, Yasser Multiple-Fault Tolerant Hardware Structure for Cellular Genetic Algorithm [Volume 3, Issue 1, 2016, Pages 27-42]
  • Basereh, Zeinab The Diagnosis of Epilepsy by Gravitational Search Algorithm and Support Vector Machines [Volume 3, Issue 2, 2016, Pages 111-125]
  • Berenjkoub, Mehdi An Efficient End to End Key Establishment Protocol for Wireless Sensor Networks [Volume 1, Issue 1, 2014, Pages 23-38]
  • Bozorgi, Arastoo Improving Semi-supervised Constrained k-Means Clustering Method Using User Feedback [Volume 1, Issue 4, 2014, Pages 273-261]
  • Bushehrian, Omid Web Service Matchmaking based on Functional Similarity in Service Cloud [Volume 2, Issue 4, 2015, Pages 257-270]
  • Bushehrian, Omid A Workload-Adaptable Method for Migrated Software to the Cloud [Volume 2, Issue 4, 2015, Pages 271-279]
  • Bushehrian, Omid Change Impact Analysis by Concept Propagation [Volume 5, Issue 1, 2018, Pages 51-56]

D

  • Dakhilalian, Mohammad Some Primitives Based on Jumping LFSRs with Determined Period [Volume 2, Issue 3, 2015, Pages 175-184]
  • Deypir, Mahmood A Novel Block Cipher Algorithm with Feistel-Like Structure [Volume 3, Issue 1, 2016, Pages 13-26]
  • Doostari, Mohammad Ali Determining the Number of Accusations for Decision Making in Key Revocation Protocol for MANET [Volume 3, Issue 1, 2016, Pages 63-72]

E

  • Ebrahimi, Seyyed Ashkan A New Implementation for a 2^n-1 Modular Adder Through Carbon Nanotube Field Effect Transistors [Volume 2, Issue 2, 2015, Pages 129-139]
  • Ebrahimi Atani, Reza A Provably Secure Variant of ETRU Based on Extended Ideal Lattices Over Direct Product of Dedekind Domains [Volume 5, Issue 1, 2018, Pages 13-34]
  • Ebrahimi Atani, Shahabaddin A Provably Secure Variant of ETRU Based on Extended Ideal Lattices Over Direct Product of Dedekind Domains [Volume 5, Issue 1, 2018, Pages 13-34]
  • Ebrahimi Mood, Sepehr New Functions for Mass Calculation in Gravitational Search Algorithm [Volume 2, Issue 3, 2015, Pages 233-246]
  • Eftekhari, Mahdi A New Hybrid Approach for Modeling Accurate Fuzzy Rule Based Classification Systems [Volume 1, Issue 2, 2014, Pages 111-122]
  • Eftekhari, Mahdi Comparison of Hybrid and Filter Feature Selection Methods to Identify Candidate Single Nucleotide Polymorphisms [Volume 1, Issue 3, 2014, Pages 205-2013]
  • Eslami, Ziba A CCA2-Secure Incomparable Public Key Encryption Scheme [Volume 3, Issue 1, 2016, Pages 3-12]
  • Eslami, Ziba Verifiable Social Multi-Secret Sharing Secure in Active Adversarial Model [Volume 4, Issue 1, 2017, Pages 3-12]
  • Esmaeildoust, Mohammad A High Speed Residue-to-Binary Converter for Balanced 4-Moduli Set [Volume 2, Issue 1, 2015, Pages 43-54]
  • Esmailizadeh, Ali Comparison of Hybrid and Filter Feature Selection Methods to Identify Candidate Single Nucleotide Polymorphisms [Volume 1, Issue 3, 2014, Pages 205-2013]

F

  • Fakhrahmad, Seyed Mostafa Word Sense Disambiguation Based on Lexical and Semantic Features Using Naive Bayes Classifier [Volume 1, Issue 2, 2014, Pages 123-132]
  • Fallah-Mehrjardi, Omid Demand based Resource Allocation to Balance the Utilization and User Level Fairness in Femtocell Networks [Volume 1, Issue 3, 2014, Pages 187-204]
  • Fanian, Ali An Efficient End to End Key Establishment Protocol for Wireless Sensor Networks [Volume 1, Issue 1, 2014, Pages 23-38]
  • Fanian, Ali A Hybrid Method based on Statistical Features and Packet Content Analysis to Identify Major Network Tunneling Protocols [Volume 3, Issue 2, 2016, Pages 95-110]
  • Farahbod, Fahimeh A New Hybrid Approach for Modeling Accurate Fuzzy Rule Based Classification Systems [Volume 1, Issue 2, 2014, Pages 111-122]
  • Farahmandpour, Zeinab A Study on Intelligent Authorship Methods in Persian Language [Volume 2, Issue 1, 2015, Pages 63-76]
  • Farmani, Vahid Adaptive Interval Type-2 Fuzzy Inference System for Facial Expression Recognition [Volume 2, Issue 3, 2015, Pages 125-207]
  • Farokh, Azam A Method for Assessing Maintainability of Software Architectural Styles in Self-healing Systems by Measuring Coupling and Cohesion [Volume 2, Issue 1, 2015, Pages 31-42]
  • Farsi, Hassan Training-Free Object Matching and Retrieval Using Speeded Up Robust Features [Volume 2, Issue 2, 2015, Pages 141-153]
  • Fatehi, Kavan Improving Semi-supervised Constrained k-Means Clustering Method Using User Feedback [Volume 1, Issue 4, 2014, Pages 273-261]
  • Fatemi, Afsaneh Capability-Based Team Formation in Researchers Social Networks [Volume 4, Issue 2, 2017, Pages 63-79]
  • Fatemi, Afsaneh Towards a Model-Driven Framework for Simulating Interactive Emergency Response Environments [Volume 5, Issue 1, 2018, Pages 35-49]
  • Fathi, Abdolhossein Improving Face Recognition Systems Security Using Local Binary Patterns [Volume 2, Issue 1, 2015, Pages 55-62]
  • Fathi, Abdolhossein A Novel Grammar-Based Approach to Atrial Fibrillation Arrhythmia Detection for Pervasive Healthcare Environments [Volume 2, Issue 2, 2015, Pages 155-163]
  • Fathi, Abdolhossein Effect of Purposeful Feature Extraction in High-dimensional Kinship Verification Problem [Volume 3, Issue 3, 2016, Pages 183-191]

G

  • Ghadiri, Nasser A Sample-Based Approach to Data Quality Assessment in Spatial Databases with Application to Mobile Trajectory Nearest-Neighbor Search [Volume 1, Issue 3, 2014, Pages 239-249]
  • Gharavi, Naser Hossein Expected Coverage of Perfect Chains in the Hellman Time Memory Trade-Off [Volume 3, Issue 3, 2016, Pages 155-162]
  • Ghareh Chamani, Javad Privacy-Preserving Fine-grained Correctness Verification of Query Results in Outsourced Databases [Volume 2, Issue 2, 2015, Pages 87-107]
  • Ghasemi, Simin A Trust-Based Approach for Correctness verification of Query Results in Data Outsourcing [Volume 1, Issue 1, 2014, Pages 3-14]
  • Ghatee, Mehdi Solution of the Generalized Interval Linear Programming Problems: Pessimistic and Optimistic Approaches [Volume 1, Issue 2, 2014, Pages 159-167]
  • Golzari, Shahram The Diagnosis of Epilepsy by Gravitational Search Algorithm and Support Vector Machines [Volume 3, Issue 2, 2016, Pages 111-125]

H

  • Hadavandi, Esmaeil Effective Intrusion Detection with a Neural Network Ensemble Using Fuzzy Clustering and Stacking Combination Method [Volume 1, Issue 4, 2014, Pages 293-305]
  • Hadavi, Mohammad Ali An Inference Resistant Indexing Technique to Enforce Access Control in Data Outsourcing [Volume 3, Issue 2, 2016, Pages 83-93]
  • Hadavi, Mohammad Ali A Trust-Based Approach for Correctness verification of Query Results in Data Outsourcing [Volume 1, Issue 1, 2014, Pages 3-14]
  • Hadavi, Mohammad Ali Privacy-Preserving Fine-grained Correctness Verification of Query Results in Outsourced Databases [Volume 2, Issue 2, 2015, Pages 87-107]
  • Haj Seyyed Javadi, Seyyed Hamid Determining the Number of Accusations for Decision Making in Key Revocation Protocol for MANET [Volume 3, Issue 1, 2016, Pages 63-72]
  • Halakou, Farideh Comparison of Hybrid and Filter Feature Selection Methods to Identify Candidate Single Nucleotide Polymorphisms [Volume 1, Issue 3, 2014, Pages 205-2013]
  • Halvachi, Hadi An Inference Resistant Indexing Technique to Enforce Access Control in Data Outsourcing [Volume 3, Issue 2, 2016, Pages 83-93]
  • Harifi, Abbas The Diagnosis of Epilepsy by Gravitational Search Algorithm and Support Vector Machines [Volume 3, Issue 2, 2016, Pages 111-125]
  • Hasanzadeh, Maryam The Effect of Correlogram Properties on Blind Steganalysis in JPEG Images [Volume 1, Issue 1, 2014, Pages 39-46]
  • Hashemi, Massoud Reza An Optimal Traffic Distribution Method Supporting End-to-End Delay Bound [Volume 1, Issue 1, 2014, Pages 61-71]
  • Hassani Karbasi, Amir A Provably Secure Variant of ETRU Based on Extended Ideal Lattices Over Direct Product of Dedekind Domains [Volume 5, Issue 1, 2018, Pages 13-34]
  • Hassanpour, Hamid Robust Face Recognition Under Illumination Changes and Pose Variations [Volume 5, Issue 2, 2018, Pages 15-23]
  • HoseinDoost, Samaneh Towards a Model-Driven Framework for Simulating Interactive Emergency Response Environments [Volume 5, Issue 1, 2018, Pages 35-49]
  • Hosseini, Rahil A GA Approach for Tuning Membership Functions of a Fuzzy Expert System for Heart Disease Prognosis Development Risk [Volume 4, Issue 1, 2017, Pages 13-23]
  • Hosseini Pozveh, Zahra Persian Texts Part of Speech Tagging Using Artificial Neural Networks [Volume 3, Issue 4, 2016, Pages 233-241]
  • Hosseinzadeh, Mehdi On the Security of Permutation Based Authentication Protocols for Internet of Things Applications: The Case of Huang et al.'s Protocol [Volume 3, Issue 4, 2016, Pages 201-209]

J

  • Jalili, Rasool A Trust-Based Approach for Correctness verification of Query Results in Data Outsourcing [Volume 1, Issue 1, 2014, Pages 3-14]
  • Jalili, Rasool Privacy-Preserving Fine-grained Correctness Verification of Query Results in Outsourced Databases [Volume 2, Issue 2, 2015, Pages 87-107]
  • Jalili, Rasool An Inference Resistant Indexing Technique to Enforce Access Control in Data Outsourcing [Volume 3, Issue 2, 2016, Pages 83-93]
  • Jalili, Rasool An Extension of CryptoPAi to the Formal Analysis of E-voting Protocols [Volume 6, Issue 1, 2019, Pages 25-42]
  • Javidi, Mohammad Masoud New Functions for Mass Calculation in Gravitational Search Algorithm [Volume 2, Issue 3, 2015, Pages 233-246]

K

  • Kazemi, Keihan A Hybrid Method based on Statistical Features and Packet Content Analysis to Identify Major Network Tunneling Protocols [Volume 3, Issue 2, 2016, Pages 95-110]
  • Kazemifard, Mohammad AUBUE: An Adaptive User-Interface Based on Users' Emotions [Volume 3, Issue 2, 2016, Pages 127-145]
  • Khademzadeh, Ahmad On the Security of Permutation Based Authentication Protocols for Internet of Things Applications: The Case of Huang et al.'s Protocol [Volume 3, Issue 4, 2016, Pages 201-209]
  • Khodambashi, Siavash A Weak Blind Signature Based on Quantum Key Distribution [Volume 1, Issue 3, 2014, Pages 179-186]
  • Khosravi, Hadi Structural and Non-Structural Similarity Combination of Users in Social Networks [Volume 3, Issue 1, 2016, Pages 43-52]
  • Kohansal, Omid Robust Face Recognition Under Illumination Changes and Pose Variations [Volume 5, Issue 2, 2018, Pages 15-23]
  • Kolahdouz Rahimi, Shekoufeh eXtreme Modeling: an approach to agile model-based development [(Articles in Press)]

L

  • Lano, Kevin eXtreme Modeling: an approach to agile model-based development [(Articles in Press)]
  • Lobabi-Mirghavami, Hanieh A Novel Grammar-Based Approach to Atrial Fibrillation Arrhythmia Detection for Pervasive Healthcare Environments [Volume 2, Issue 2, 2015, Pages 155-163]

M

  • Mahdavi, Mojtaba Steganography of Halftone Images by Group Alteration of Grayscale Pixels [Volume 2, Issue 1, 2015, Pages 21-30]
  • Mahrooghi, Hamid Reza An Extension of CryptoPAi to the Formal Analysis of E-voting Protocols [Volume 6, Issue 1, 2019, Pages 25-42]
  • Mala, Hamid Unified Byte Permutations for the Block Cipher 3D [Volume 1, Issue 1, 2014, Pages 15-22]
  • Mala, Hamid Demand based Resource Allocation to Balance the Utilization and User Level Fairness in Femtocell Networks [Volume 1, Issue 3, 2014, Pages 187-204]
  • Mala, Hamid Security Analysis of an EPC Class-1 Generation-2 Compliant RFID Authentication Protocol [Volume 3, Issue 3, 2016, Pages 163-174]
  • Malekmohammad, Azam Structural and Non-Structural Similarity Combination of Users in Social Networks [Volume 3, Issue 1, 2016, Pages 43-52]
  • Mazinani, Mahdi A GA Approach for Tuning Membership Functions of a Fuzzy Expert System for Heart Disease Prognosis Development Risk [Volume 4, Issue 1, 2017, Pages 13-23]
  • Mehran, Narges Randomized SVD Based Probabilistic Caching Strategy in Named Data Networks [Volume 3, Issue 4, 2016, Pages 217-231]
  • Mirghadri, Abdorasool Expected Coverage of Perfect Chains in the Hellman Time Memory Trade-Off [Volume 3, Issue 3, 2016, Pages 155-162]
  • Mirzaei, Abdolreza HH-FRBC: Halving Hierarchical Fuzzy Rule-Based Classifier [Volume 1, Issue 3, 2014, Pages 215-224]
  • Mirzaei, Abdolreza Adaptive Interval Type-2 Fuzzy Inference System for Facial Expression Recognition [Volume 2, Issue 3, 2015, Pages 125-207]
  • Mirzaei, Arash Some Primitives Based on Jumping LFSRs with Determined Period [Volume 2, Issue 3, 2015, Pages 175-184]
  • Mohamadzadeh, Sajad Training-Free Object Matching and Retrieval Using Speeded Up Robust Features [Volume 2, Issue 2, 2015, Pages 141-153]
  • Mohammadi, Atefeh Identifying Explicit Features of Persian Comments [Volume 6, Issue 1, 2019, Pages 1-11]
  • Mohd Zainuddin, Norziha Megat An Empirical Study of Students' Perceptions on the Technological Aspects of the E-Learning System [Volume 4, Issue 1, 2017, Pages 25-38]
  • Monadjemi, Amirhassan Persian Texts Part of Speech Tagging Using Artificial Neural Networks [Volume 3, Issue 4, 2016, Pages 233-241]
  • Montazeri, Morteza Identifying Explicit Features of Persian Comments [Volume 6, Issue 1, 2019, Pages 1-11]
  • Moodi, Hossein A New Hybrid Method for VoIP Stream Steganography [Volume 3, Issue 3, 2016, Pages 175-182]
  • Moradi, Fariba Security Analysis of an EPC Class-1 Generation-2 Compliant RFID Authentication Protocol [Volume 3, Issue 3, 2016, Pages 163-174]
  • Moradi, Fereidoun Security Analysis of an EPC Class-1 Generation-2 Compliant RFID Authentication Protocol [Volume 3, Issue 3, 2016, Pages 163-174]
  • Moradyan, Kourosh Web Service Matchmaking based on Functional Similarity in Service Cloud [Volume 2, Issue 4, 2015, Pages 257-270]
  • Mosakhani, Mostafa A more Accurate Clustering Method by using Co-author Social Networks for Author Name Disambiguation [Volume 1, Issue 4, 2014, Pages 307-317]
  • Mousavi, Sayyed Ahmad Expected Coverage of Perfect Chains in the Hellman Time Memory Trade-Off [Volume 3, Issue 3, 2016, Pages 155-162]
  • Movahhedinia, Naser Demand based Resource Allocation to Balance the Utilization and User Level Fairness in Femtocell Networks [Volume 1, Issue 3, 2014, Pages 187-204]
  • Movahhedinia, Naser Randomized SVD Based Probabilistic Caching Strategy in Named Data Networks [Volume 3, Issue 4, 2016, Pages 217-231]
  • Musevi Niya, Mir Javad Robust Cooperative Spectrum Sensing under Primary User Emulation Attack in Cognitive Radio Networks [Volume 2, Issue 2, 2015, Pages 109-117]

N

  • Nadi, Shiva PSA: A Hybrid Feature Selection Approach for Persian Text Classification [Volume 1, Issue 4, 2014, Pages 261-272]
  • Nadimi, Mohammad Hossein A more Accurate Clustering Method by using Co-author Social Networks for Author Name Disambiguation [Volume 1, Issue 4, 2014, Pages 307-317]
  • Naghsh-Nilchi, Ahmad Reza Editorial Note [Volume 1, Issue 1, 2014, Pages 1-2]
  • Naghsh-Nilchi, Ahmad Reza Editorial Note [Volume 1, Issue 2, 2014, Pages 81-82]
  • Naghsh-Nilchi, Ahmad Reza A New Hybrid Method for VoIP Stream Steganography [Volume 3, Issue 3, 2016, Pages 175-182]
  • Nasiripour, Reza Training-Free Object Matching and Retrieval Using Speeded Up Robust Features [Volume 2, Issue 2, 2015, Pages 141-153]
  • Nassiri-Mofakham, Faria DOPPONENT: A Socially Efficient Preference Model of Opponent in Bilateral Multi Issue Negotiations [Volume 1, Issue 4, 2014, Pages 283-292]
  • Navi, Keivan A High Speed Residue-to-Binary Converter for Balanced 4-Moduli Set [Volume 2, Issue 1, 2015, Pages 43-54]
  • Nayebalsadr, Shakiba Simulating the Resource Freeing Attack: Using Cloudsim Simulator [Volume 2, Issue 4, 2015, Pages 293-302]
  • Nematbakhsh, MohammadAli Identifying Explicit Features of Persian Comments [Volume 6, Issue 1, 2019, Pages 1-11]
  • Nematbakhsh, Mohammad Ali MRAR: Mining Multi-Relation Association Rules [Volume 1, Issue 2, 2014, Pages 133-158]
  • Nikmehr, Hooman A Study on Intelligent Authorship Methods in Persian Language [Volume 2, Issue 1, 2015, Pages 63-76]
  • Nikmehr, Hooman A High-Payload Audio Watermarking Scheme for Real-Time Applications [Volume 2, Issue 2, 2015, Pages 119-127]
  • Noferesti, Morteza A Trust-Based Approach for Correctness verification of Query Results in Data Outsourcing [Volume 1, Issue 1, 2014, Pages 3-14]
  • Noori, Fariba AUBUE: An Adaptive User-Interface Based on Users' Emotions [Volume 3, Issue 2, 2016, Pages 127-145]

O

  • Omoomi, Behnaz An Optimal Traffic Distribution Method Supporting End-to-End Delay Bound [Volume 1, Issue 1, 2014, Pages 61-71]
  • Oraei, Hossein An Improvement Over Lee et al.'s Key Agreement Protocol [Volume 5, Issue 1, 2018, Pages 3-12]
  • Osareh, Alireza A Survey on Transformation Methods of XML Documents to Ontologies [Volume 4, Issue 2, 2017, Pages 81-100]

P

  • Pajoohan, Mohammad-Reza Identifying Explicit Features of Persian Comments [Volume 6, Issue 1, 2019, Pages 1-11]
  • Pakniat, Nasrollah Verifiable Social Multi-Secret Sharing Secure in Active Adversarial Model [Volume 4, Issue 1, 2017, Pages 3-12]
  • Pakniat, Nasrollah Security Analysis of Two Lightweight Certificateless Signature Schemes [Volume 5, Issue 2, 2018, Pages 1-7]
  • Parsaei, Fahimeh Evaluating Behavioral Intentions of Tourists in e-Tourism [Volume 1, Issue 2, 2014, Pages 95-109]
  • Parsazadeh, Nadia An Empirical Study of Students' Perceptions on the Technological Aspects of the E-Learning System [Volume 4, Issue 1, 2017, Pages 25-38]
  • P.Haughton, Howard eXtreme Modeling: an approach to agile model-based development [(Articles in Press)]
  • Pourkhani, Mohammadereza A Survey on Transformation Methods of XML Documents to Ontologies [Volume 4, Issue 2, 2017, Pages 81-100]
  • Pourpouneh, Mohsen An Improvement Over Lee et al.'s Key Agreement Protocol [Volume 5, Issue 1, 2018, Pages 3-12]
  • Purebrahim, Yousef A Novel Block Cipher Algorithm with Feistel-Like Structure [Volume 3, Issue 1, 2016, Pages 13-26]

R

  • Rahimi, Alireza JHAE: A Novel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH [Volume 2, Issue 1, 2015, Pages 3-20]
  • Rajabi, Bahman A CCA2-Secure Incomparable Public Key Encryption Scheme [Volume 3, Issue 1, 2016, Pages 3-12]
  • Ramezani, Reza MRAR: Mining Multi-Relation Association Rules [Volume 1, Issue 2, 2014, Pages 133-158]
  • Ramezanian, Rasoul An Improvement Over Lee et al.'s Key Agreement Protocol [Volume 5, Issue 1, 2018, Pages 3-12]
  • Rasekh, Amir Hossein Word Sense Disambiguation Based on Lexical and Semantic Features Using Naive Bayes Classifier [Volume 1, Issue 2, 2014, Pages 123-132]
  • Rashedi, Esmat New Functions for Mass Calculation in Gravitational Search Algorithm [Volume 2, Issue 3, 2015, Pages 233-246]
  • Rastegari, Yousef Toward automatic Transformation of Service Choreography into UML State Machine [Volume 2, Issue 3, 2015, Pages 209-222]
  • Rastegari, Yousef A Context-Aware Reflective-State Framework to Reconfigure Service-Based Applications [Volume 2, Issue 4, 2015, Pages 281-292]
  • Rastegari, Yousef An HMM-based Method for Adapting Service-based Applications to Users’ Quality Preferences [Volume 5, Issue 2, 2018, Pages 9-13]
  • Rastgoo, Razieh Multi-Constraint Optimal Path Finding for QoS-Enabled Smart Grids: A Combination Approach of Neural Network and Fuzzy System [Volume 4, Issue 2, 2017, Pages 47-61]
  • Reisi, Zahra A Workload-Adaptable Method for Migrated Software to the Cloud [Volume 2, Issue 4, 2015, Pages 271-279]
  • Reshadinezhad, Mohammad Reza A New Implementation for a 2^n-1 Modular Adder Through Carbon Nanotube Field Effect Transistors [Volume 2, Issue 2, 2015, Pages 129-139]
  • Rezaeenour, Jalal Effective Intrusion Detection with a Neural Network Ensemble Using Fuzzy Clustering and Stacking Combination Method [Volume 1, Issue 4, 2014, Pages 293-305]
  • Rezaei, Mehran Evaluating Behavioral Intentions of Tourists in e-Tourism [Volume 1, Issue 2, 2014, Pages 95-109]
  • Rezaei, Mehran An Empirical Study of Students' Perceptions on the Technological Aspects of the E-Learning System [Volume 4, Issue 1, 2017, Pages 25-38]
  • Rezaeian, Mahdie Semantic Segmentation of Aerial Images Using Fusion of Color and Texture Features [Volume 1, Issue 3, 2014, Pages 225-238]
  • Rezaeian Zadeh, Farahnaz A Novel Solution for Author Attribution Problem in Anonymous E-mail [Volume 1, Issue 4, 2014, Pages 319-327]
  • Rezaeian Zadeh, Farahnaz A Workload-Adaptable Method for Migrated Software to the Cloud [Volume 2, Issue 4, 2015, Pages 271-279]
  • Rostampour, Samad On the Security of Permutation Based Authentication Protocols for Internet of Things Applications: The Case of Huang et al.'s Protocol [Volume 3, Issue 4, 2016, Pages 201-209]

S

  • Sabbaghi-nadooshan, Reza A High Speed Residue-to-Binary Converter for Balanced 4-Moduli Set [Volume 2, Issue 1, 2015, Pages 43-54]
  • Saberi, Bagher A Sample-Based Approach to Data Quality Assessment in Spatial Databases with Application to Mobile Trajectory Nearest-Neighbor Search [Volume 1, Issue 3, 2014, Pages 239-249]
  • Sadjadieh, Mahdi Some Primitives Based on Jumping LFSRs with Determined Period [Volume 2, Issue 3, 2015, Pages 175-184]
  • Sadreddini, Mohammad Hadi Word Sense Disambiguation Based on Lexical and Semantic Features Using Naive Bayes Classifier [Volume 1, Issue 2, 2014, Pages 123-132]
  • Sadri, Saeid Semantic Segmentation of Aerial Images Using Fusion of Color and Texture Features [Volume 1, Issue 3, 2014, Pages 225-238]
  • Safayani, Mehran Adaptive Interval Type-2 Fuzzy Inference System for Facial Expression Recognition [Volume 2, Issue 3, 2015, Pages 125-207]
  • Safkhani, Masoumeh Full Secret Disclosure Attack against an EPC- C1 G2 Compliant Authentication Protocol [Volume 6, Issue 1, 2019, Pages 13-23]
  • Samavi, Shadrokh Steganography of Halftone Images by Group Alteration of Grayscale Pixels [Volume 2, Issue 1, 2015, Pages 21-30]
  • Saraee, Mohamad MRAR: Mining Multi-Relation Association Rules [Volume 1, Issue 2, 2014, Pages 133-158]
  • Saraee, Mohamad PSA: A Hybrid Feature Selection Approach for Persian Text Classification [Volume 1, Issue 4, 2014, Pages 261-272]
  • Sattari-Naeini, Vahid Multi-Constraint Optimal Path Finding for QoS-Enabled Smart Grids: A Combination Approach of Neural Network and Fuzzy System [Volume 4, Issue 2, 2017, Pages 47-61]
  • Sekhavat, Yoones A Enhancing the Sense of Immersion and Quality of Experience in Mobile Games Using Augmented Reality [Volume 3, Issue 1, 2016, Pages 53-62]
  • Shabanian, Touraj An Optimal Traffic Distribution Method Supporting End-to-End Delay Bound [Volume 1, Issue 1, 2014, Pages 61-71]
  • Shadgar, Bita A Survey on Transformation Methods of XML Documents to Ontologies [Volume 4, Issue 2, 2017, Pages 81-100]
  • Shafiee, Nasim A High Speed Residue-to-Binary Converter for Balanced 4-Moduli Set [Volume 2, Issue 1, 2015, Pages 43-54]
  • Shahgholi Ghahfarokhi, Behrouz Demand based Resource Allocation to Balance the Utilization and User Level Fairness in Femtocell Networks [Volume 1, Issue 3, 2014, Pages 187-204]
  • Shams, Fereidoon Toward automatic Transformation of Service Choreography into UML State Machine [Volume 2, Issue 3, 2015, Pages 209-222]
  • Shams, Fereidoon A Context-Aware Reflective-State Framework to Reconfigure Service-Based Applications [Volume 2, Issue 4, 2015, Pages 281-292]
  • Sharifi, Abbas Ali Robust Cooperative Spectrum Sensing under Primary User Emulation Attack in Cognitive Radio Networks [Volume 2, Issue 2, 2015, Pages 109-117]
  • Shirvani, Hussein A New Scheme for Storage and Retrieval of Shared Text Files [Volume 2, Issue 3, 2015, Pages 223-231]

T

  • Taheri, MohammadReza A High Speed Residue-to-Binary Converter for Balanced 4-Moduli Set [Volume 2, Issue 1, 2015, Pages 43-54]
  • Tahmasebipour, Safieh Ranking of Common Architectural Styles Based on Availability, Security and Performance Quality Attributes [Volume 1, Issue 2, 2014, Pages 83-93]
  • Tajiki, Mohammad Mahdi Improved Secure and Privacy Preserving Keyword Searching Cryptography [Volume 2, Issue 3, 2015, Pages 185-194]
  • Tavakoli, Somayeh Capability-Based Team Formation in Researchers Social Networks [Volume 4, Issue 2, 2017, Pages 63-79]
  • Tork Ladani, Behrouz Security Analysis of an EPC Class-1 Generation-2 Compliant RFID Authentication Protocol [Volume 3, Issue 3, 2016, Pages 163-174]

V

  • Vahdat-Nejad, Hamed A New Scheme for Storage and Retrieval of Shared Text Files [Volume 2, Issue 3, 2015, Pages 223-231]

Z

  • Zafari, Farhad DOPPONENT: A Socially Efficient Preference Model of Opponent in Bilateral Multi Issue Negotiations [Volume 1, Issue 4, 2014, Pages 283-292]
  • Zahedi, Mohammad Sadegh Improving Semi-supervised Constrained k-Means Clustering Method Using User Feedback [Volume 1, Issue 4, 2014, Pages 273-261]
  • Zakerolhosseini, Ali A Weak Blind Signature Based on Quantum Key Distribution [Volume 1, Issue 3, 2014, Pages 179-186]
  • Zamani, Bahman Towards a Model-Driven Framework for Simulating Interactive Emergency Response Environments [Volume 5, Issue 1, 2018, Pages 35-49]
  • Zarei, Hosein Enhancing the Sense of Immersion and Quality of Experience in Mobile Games Using Augmented Reality [Volume 3, Issue 1, 2016, Pages 53-62]
  • Zarezadeh, Maryam Determining the Number of Accusations for Decision Making in Key Revocation Protocol for MANET [Volume 3, Issue 1, 2016, Pages 63-72]
  • Zeinal Hamadani, Ali DOPPONENT: A Socially Efficient Preference Model of Opponent in Bilateral Multi Issue Negotiations [Volume 1, Issue 4, 2014, Pages 283-292]
  • Zolfaghari, Zahra Multicollision Attack on a recently proposed hash function vMDC-2 [Volume 3, Issue 4, 2016, Pages 211-215]