Author Index

A

  • Abaei, Golnoush A Lightweight Anomaly Detection Model using SVM for WSNs in IoT through a Hybrid Feature Selection Algorithm based on GA and GWO [Volume 7, Issue 1, 2020, Pages 63-79]
  • Abbasi, Fereshteh Intrusion Detection in IoT With Logistic Regression and Artificial Neural Network: Further Investigations on N-BaIoT Dataset Devices [Volume 8, Issue 2, 2021, Pages 27-42]
  • Abdali-Mohammadi, Fardin Improving Face Recognition Systems Security Using Local Binary Patterns [Volume 2, Issue 1, 2015, Pages 55-62]
  • Abdali-Mohammadi, Fardin A Novel Grammar-Based Approach to Atrial Fibrillation Arrhythmia Detection for Pervasive Healthcare Environments [Volume 2, Issue 2, 2015, Pages 155-163]
  • Abdali-Mohammadi, Fardin Effect of Purposeful Feature Extraction in High-dimensional Kinship Verification Problem [Volume 3, Issue 3, 2016, Pages 183-191]
  • Abdellahi Khorasgani, Alireza A Lightweight Authentication Scheme for RFID with Permutation Operation on Passive Tags [Volume 8, Issue 2, 2021, Pages 71-86]
  • Abdollahi Azgomi, Mohammad Expected Coverage of Perfect Chains in the Hellman Time Memory Trade-Off [Volume 3, Issue 3, 2016, Pages 155-162]
  • Abdolrazzagh-Nezhad, Majid CSE: A Novel Dynamic Obfuscation Based on Control Flow, Signals and Encryption [Volume 6, Issue 2, 2019, Pages 53-63]
  • Abdolrazzagh-Nezhad, Majid A Generalized Spread Spectrum-Based Audio Watermarking Method with Adaptive Synchronization [Volume 10, Issue 2, 2023, Pages 31-44]
  • Abhari, Bardia Gamifault: A Gamified Motivational Framework for Software Debugging Process [Volume 10, Issue 1, 2023, Pages 17-34]
  • Adibi, Peyman A Growing Hierarchical Approach to Batch Linear Manifold Topographic Map Formation [Volume 1, Issue 1, 2014, Pages 47-59]
  • Ahmadi, Ali Persian Texts Part of Speech Tagging Using Artificial Neural Networks [Volume 3, Issue 4, 2016, Pages 233-241]
  • Ahmadi, Maedeh Adaptive Interval Type-2 Fuzzy Inference System for Facial Expression Recognition [Volume 2, Issue 3, 2015, Pages 125-207]
  • Ahmadi, Mahmood Performance Evaluation of Apache Spark MLlib Algorithms on an Intrusion Detection Dataset [Volume 9, Issue 1, 2022, Pages 57-69]
  • Ahmadi, Mahmood DiCuPIT: Distributed Cuckoo Filter-based Pending Interest Table [Volume 9, Issue 1, 2022, Pages 85-96]
  • Ahmadi, Mahmood Grey Wolf-Based Task Scheduling in Vehicular Fog Computing Systems [(Articles in Press)]
  • Aji, Ali Domain-based Abbreviation Expansion using Topic Modelling for Data Cleaning [Volume 11, Issue 2, 2024, Pages 1-12]
  • Ajoudanian, Shohreh A Novel Solution for Author Attribution Problem in Anonymous E-mail [Volume 1, Issue 4, 2014, Pages 319-327]
  • Akhaee, Mohammad Ali Improved Secure and Privacy Preserving Keyword Searching Cryptography [Volume 2, Issue 3, 2015, Pages 185-194]
  • Akhoondi, Rana A GA Approach for Tuning Membership Functions of a Fuzzy Expert System for Heart Disease Prognosis Development Risk [Volume 4, Issue 1, 2017, Pages 13-23]
  • Alavi, Seyyed Enayatallah Intrusion Detection in IoT With Logistic Regression and Artificial Neural Network: Further Investigations on N-BaIoT Dataset Devices [Volume 8, Issue 2, 2021, Pages 27-42]
  • Alfraihi, Hessa eXtreme Modeling: an approach to agile model-based development [Volume 6, Issue 2, 2019, Pages 43-52]
  • Ali, Rosmah An Empirical Study of Students' Perceptions on the Technological Aspects of the E-Learning System [Volume 4, Issue 1, 2017, Pages 25-38]
  • Ali Asgari Renani, Fatemeh Indoor Path Tracking Using Combination of Viterbi and WKNN [Volume 8, Issue 2, 2021, Pages 19-26]
  • Alidoosti, Mitra BLProM: A black-box approach for detecting business-layer processes in the web applications [Volume 6, Issue 2, 2019, Pages 65-80]
  • Aligholizadeh, Hossein Sentiment Analysis of Persian Sentences using Efficient Deep Learning in Fiction [Volume 11, Issue 1, 2024, Pages 67-86]
  • Alikhani, Parastoo Gamifault: A Gamified Motivational Framework for Software Debugging Process [Volume 10, Issue 1, 2023, Pages 17-34]
  • Alimoradi, Dariush The Effect of Correlogram Properties on Blind Steganalysis in JPEG Images [Volume 1, Issue 1, 2014, Pages 39-46]
  • Alirezazadeh, Pendar Effect of Purposeful Feature Extraction in High-dimensional Kinship Verification Problem [Volume 3, Issue 3, 2016, Pages 183-191]
  • Alizadeh, Javad JHAE: A Novel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH [Volume 2, Issue 1, 2015, Pages 3-20]
  • Almasi, Ramin A High-Payload Audio Watermarking Scheme for Real-Time Applications [Volume 2, Issue 2, 2015, Pages 119-127]
  • Amini, Mohammad Effective Intrusion Detection with a Neural Network Ensemble Using Fuzzy Clustering and Stacking Combination Method [Volume 1, Issue 4, 2014, Pages 293-305]
  • Amirfattahi, Rasoul Semantic Segmentation of Aerial Images Using Fusion of Color and Texture Features [Volume 1, Issue 3, 2014, Pages 225-238]
  • Amiri, Maryam Illegal Miner Detection based on Pattern Mining: A Practical Approach [Volume 9, Issue 2, 2022, Pages 1-10]
  • Amirjamshidi, Zhale A High Speed Residue-to-Binary Converter for Balanced 4-Moduli Set [Volume 2, Issue 1, 2015, Pages 43-54]
  • Amouzadi, Azam HH-FRBC: Halving Hierarchical Fuzzy Rule-Based Classifier [Volume 1, Issue 3, 2014, Pages 215-224]
  • Analoui, Morteza Simulating the Resource Freeing Attack: Using Cloudsim Simulator [Volume 2, Issue 4, 2015, Pages 293-302]
  • Arabjafari, Monireh Evaluating Behavioral Intentions of Tourists in e-Tourism [Volume 1, Issue 2, 2014, Pages 95-109]
  • Arabnezhad, Hossein Toward A More Efficient Gröbner-based Algebraic Cryptanalysis [Volume 7, Issue 2, 2020, Pages 103-117]
  • Aref, Mohammad Reza JHAE: A Novel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH [Volume 2, Issue 1, 2015, Pages 3-20]
  • Asadi Amiri, Sekineh Robust Face Recognition Under Illumination Changes and Pose Variations [Volume 5, Issue 2, 2018, Pages 81-89]
  • Asadollahi, Hamid Multicollision Attack on a recently proposed hash function vMDC-2 [Volume 3, Issue 4, 2016, Pages 211-215]
  • Asgarian, Ehsan Improving Semi-supervised Constrained k-Means Clustering Method Using User Feedback [Volume 1, Issue 4, 2014, Pages 273-261]
  • Ashooriyan, Peyman Multiple-Fault Tolerant Hardware Structure for Cellular Genetic Algorithm [Volume 3, Issue 1, 2016, Pages 27-42]
  • Askari, Hesam Illegal Miner Detection based on Pattern Mining: A Practical Approach [Volume 9, Issue 2, 2022, Pages 1-10]
  • Askarian, Ahmad An Optimal Traffic Distribution Method Supporting End-to-End Delay Bound [Volume 1, Issue 1, 2014, Pages 61-71]
  • Atefinia, Ramin Performance Evaluation of Apache Spark MLlib Algorithms on an Intrusion Detection Dataset [Volume 9, Issue 1, 2022, Pages 57-69]

B

  • Babamir, Seyed Morteza Ranking of Common Architectural Styles Based on Availability, Security and Performance Quality Attributes [Volume 1, Issue 2, 2014, Pages 83-93]
  • Babamir, Seyed Morteza A Method for Assessing Maintainability of Software Architectural Styles in Self-healing Systems by Measuring Coupling and Cohesion [Volume 2, Issue 1, 2015, Pages 31-42]
  • Bagheri, Ayoub PSA: A Hybrid Feature Selection Approach for Persian Text Classification [Volume 1, Issue 4, 2014, Pages 261-272]
  • Bagheri, Nasour JHAE: A Novel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH [Volume 2, Issue 1, 2015, Pages 3-20]
  • Bagheri, Nasour On the Security of Permutation Based Authentication Protocols for Internet of Things Applications: The Case of Huang et al.'s Protocol [Volume 3, Issue 4, 2016, Pages 201-209]
  • Bagheri, Nasour Multicollision Attack on a recently proposed hash function vMDC-2 [Volume 3, Issue 4, 2016, Pages 211-215]
  • Bahak, Hossein Evaluating ChatGPT as a Question Answering System: a Comprehensive Analysis and Comparison with Existing Models [(Articles in Press)]
  • Bahrak, Behnam Improved Secure and Privacy Preserving Keyword Searching Cryptography [Volume 2, Issue 3, 2015, Pages 185-194]
  • Bahraman, Kaveh Momentum Contrast Self-Supervised Based Training for Adversarial Robustness [Volume 8, Issue 1, 2021, Pages 33-43]
  • Baleghi Damavandi, Yasser Multiple-Fault Tolerant Hardware Structure for Cellular Genetic Algorithm [Volume 3, Issue 1, 2016, Pages 27-42]
  • Barangi, Hamed Model-Driven Software Engineering: A Bibliometric Analysis [Volume 8, Issue 1, 2021, Pages 93-108]
  • Basereh, Zeinab The Diagnosis of Epilepsy by Gravitational Search Algorithm and Support Vector Machines [Volume 3, Issue 2, 2016, Pages 111-125]
  • Bastanfard, Azam Sentiment Analysis of Persian Sentences using Efficient Deep Learning in Fiction [Volume 11, Issue 1, 2024, Pages 67-86]
  • Bateni, Mehdi Uplift Modeling Using Artificial Immune System [Volume 10, Issue 2, 2023, Pages 45-60]
  • Berenjkoub, Mehdi An Efficient End to End Key Establishment Protocol for Wireless Sensor Networks [Volume 1, Issue 1, 2014, Pages 23-38]
  • Bohlooli, Ali Distributed Rule Anomaly Detection in SDN-based IoT: Towards a Comprehensive Approach [Volume 10, Issue 1, 2023, Pages 75-84]
  • Bozorgi, Arastoo Improving Semi-supervised Constrained k-Means Clustering Method Using User Feedback [Volume 1, Issue 4, 2014, Pages 273-261]
  • Bushehrian, Omid Web Service Matchmaking based on Functional Similarity in Service Cloud [Volume 2, Issue 4, 2015, Pages 257-270]
  • Bushehrian, Omid A Workload-Adaptable Method for Migrated Software to the Cloud [Volume 2, Issue 4, 2015, Pages 271-279]
  • Bushehrian, Omid Change Impact Analysis by Concept Propagation [Volume 5, Issue 1, 2018, Pages 51-56]

C

  • Chegeni, Mastaneh Indoor Path Tracking Using Combination of Viterbi and WKNN [Volume 8, Issue 2, 2021, Pages 19-26]

D

  • Dakhilalian, Mohammad Some Primitives Based on Jumping LFSRs with Determined Period [Volume 2, Issue 3, 2015, Pages 175-184]
  • Davahli, Azam A Lightweight Anomaly Detection Model using SVM for WSNs in IoT through a Hybrid Feature Selection Algorithm based on GA and GWO [Volume 7, Issue 1, 2020, Pages 63-79]
  • Dehyadegari, Masoud Signature Codes for Energy-Efficient Data Movement in On-chip Networks [Volume 7, Issue 2, 2020, Pages 95-101]
  • Deypir, Mahmood A Novel Block Cipher Algorithm with Feistel-Like Structure [Volume 3, Issue 1, 2016, Pages 13-26]
  • Doostari, Mohammad Ali Determining the Number of Accusations for Decision Making in Key Revocation Protocol for MANET [Volume 3, Issue 1, 2016, Pages 63-72]
  • Dorri Nogoorani, Sadegh Decentralized App Store and License Management Using Smart Contracts and Self-Sovereign Identities [Volume 9, Issue 2, 2022, Pages 39-54]

E

  • Ebrahim Ghajari, Negin Detection and Classification of Lung Cancer in Histopathology Images Using Deep Learning [Volume 11, Issue 1, 2024, Pages 19-28]
  • Ebrahimi, Seyyed Ashkan A New Implementation for a 2^n-1 Modular Adder Through Carbon Nanotube Field Effect Transistors [Volume 2, Issue 2, 2015, Pages 129-139]
  • Ebrahimi Atani, Reza A Provably Secure Variant of ETRU Based on Extended Ideal Lattices Over Direct Product of Dedekind Domains [Volume 5, Issue 1, 2018, Pages 13-34]
  • Ebrahimi Atani, Shahabaddin A Provably Secure Variant of ETRU Based on Extended Ideal Lattices Over Direct Product of Dedekind Domains [Volume 5, Issue 1, 2018, Pages 13-34]
  • Ebrahimi Mood, Sepehr New Functions for Mass Calculation in Gravitational Search Algorithm [Volume 2, Issue 3, 2015, Pages 233-246]
  • Eftekhari, Mahdi A New Hybrid Approach for Modeling Accurate Fuzzy Rule Based Classification Systems [Volume 1, Issue 2, 2014, Pages 111-122]
  • Eftekhari, Mahdi Comparison of Hybrid and Filter Feature Selection Methods to Identify Candidate Single Nucleotide Polymorphisms [Volume 1, Issue 3, 2014, Pages 205-2013]
  • Eftekhari, Mahdi Momentum Contrast Self-Supervised Based Training for Adversarial Robustness [Volume 8, Issue 1, 2021, Pages 33-43]
  • Eslami, Ziba A CCA2-Secure Incomparable Public Key Encryption Scheme [Volume 3, Issue 1, 2016, Pages 3-12]
  • Eslami, Ziba Verifiable Social Multi-Secret Sharing Secure in Active Adversarial Model [Volume 4, Issue 1, 2017, Pages 3-12]
  • Esmaeildoust, Mohammad A High Speed Residue-to-Binary Converter for Balanced 4-Moduli Set [Volume 2, Issue 1, 2015, Pages 43-54]
  • Esmailizadeh, Ali Comparison of Hybrid and Filter Feature Selection Methods to Identify Candidate Single Nucleotide Polymorphisms [Volume 1, Issue 3, 2014, Pages 205-2013]

F

  • Fakhrahmad, Seyed Mostafa Word Sense Disambiguation Based on Lexical and Semantic Features Using Naive Bayes Classifier [Volume 1, Issue 2, 2014, Pages 123-132]
  • Fallah-Mehrjardi, Omid Demand based Resource Allocation to Balance the Utilization and User Level Fairness in Femtocell Networks [Volume 1, Issue 3, 2014, Pages 187-204]
  • Fanian, Ali An Efficient End to End Key Establishment Protocol for Wireless Sensor Networks [Volume 1, Issue 1, 2014, Pages 23-38]
  • Fanian, Ali A Hybrid Method based on Statistical Features and Packet Content Analysis to Identify Major Network Tunneling Protocols [Volume 3, Issue 2, 2016, Pages 95-110]
  • Farahani, Gholamreza Scalability Analysis of a LoRa Network Under Inter-SF and Co-SF Interference with Poisson Point Process Model [Volume 8, Issue 2, 2021, Pages 43-57]
  • Farahbod, Fahimeh A New Hybrid Approach for Modeling Accurate Fuzzy Rule Based Classification Systems [Volume 1, Issue 2, 2014, Pages 111-122]
  • Farahmandpour, Zeinab A Study on Intelligent Authorship Methods in Persian Language [Volume 2, Issue 1, 2015, Pages 63-76]
  • Faridmoayer, Sogol Applying Meta-Heuristics Algorithms in Model-Driven Approaches for Solving the CRA Problem [Volume 7, Issue 2, 2020, Pages 141-161]
  • Farmani, Vahid Adaptive Interval Type-2 Fuzzy Inference System for Facial Expression Recognition [Volume 2, Issue 3, 2015, Pages 125-207]
  • Farokh, Azam A Method for Assessing Maintainability of Software Architectural Styles in Self-healing Systems by Measuring Coupling and Cohesion [Volume 2, Issue 1, 2015, Pages 31-42]
  • Farsi, Hassan Training-Free Object Matching and Retrieval Using Speeded Up Robust Features [Volume 2, Issue 2, 2015, Pages 141-153]
  • Fatehi, Kavan Improving Semi-supervised Constrained k-Means Clustering Method Using User Feedback [Volume 1, Issue 4, 2014, Pages 273-261]
  • Fatemi, Afsaneh Capability-Based Team Formation in Researchers Social Networks [Volume 4, Issue 2, 2017, Pages 63-79]
  • Fatemi, Afsaneh Towards a Model-Driven Framework for Simulating Interactive Emergency Response Environments [Volume 5, Issue 1, 2018, Pages 35-49]
  • Fatemi, Afsaneh BAS: An Answer Selection Method Using BERT Language Model [Volume 8, Issue 2, 2021, Pages 1-18]
  • Fatemi, Afsaneh Applying Heuristic-Based Greedy Approaches for Influence Maximization-Cost Minimization in Social Networks [Volume 11, Issue 1, 2024, Pages 29-37]
  • Fatemi, Afsaneh Domain-based Abbreviation Expansion using Topic Modelling for Data Cleaning [Volume 11, Issue 2, 2024, Pages 1-12]
  • Fathi, Abdolhossein Improving Face Recognition Systems Security Using Local Binary Patterns [Volume 2, Issue 1, 2015, Pages 55-62]
  • Fathi, Abdolhossein A Novel Grammar-Based Approach to Atrial Fibrillation Arrhythmia Detection for Pervasive Healthcare Environments [Volume 2, Issue 2, 2015, Pages 155-163]
  • Fathi, Abdolhossein Effect of Purposeful Feature Extraction in High-dimensional Kinship Verification Problem [Volume 3, Issue 3, 2016, Pages 183-191]
  • Fathi, Abdolhossein Combination of Genetic Programming and Support Vector Machine-Based Prediction of Protein-Peptide Binding Sites With Sequence and Structure-Based Features [Volume 8, Issue 1, 2021, Pages 45-63]
  • Fathi, Abdolhossein Detection and Classification of Lung Cancer in Histopathology Images Using Deep Learning [Volume 11, Issue 1, 2024, Pages 19-28]

G

  • Ghaderi, Mahnaz A Generalized Spread Spectrum-Based Audio Watermarking Method with Adaptive Synchronization [Volume 10, Issue 2, 2023, Pages 31-44]
  • Ghadiri, Nasser A Sample-Based Approach to Data Quality Assessment in Spatial Databases with Application to Mobile Trajectory Nearest-Neighbor Search [Volume 1, Issue 3, 2014, Pages 239-249]
  • Ghaemi Bafghi, Abbas A Risk Estimation Framework for Security Threats in Computer Networks [Volume 7, Issue 1, 2020, Pages 19-33]
  • Ghaffarian, Hossein Indoor Path Tracking Using Combination of Viterbi and WKNN [Volume 8, Issue 2, 2021, Pages 19-26]
  • Ghaffarian, Hossein Indoor Localization Performance Optimization Using Modified kd-Tree Algorithm [Volume 9, Issue 2, 2022, Pages 55-64]
  • Gharavi, Naser Hossein Expected Coverage of Perfect Chains in the Hellman Time Memory Trade-Off [Volume 3, Issue 3, 2016, Pages 155-162]
  • Ghareh Chamani, Javad Privacy-Preserving Fine-grained Correctness Verification of Query Results in Outsourced Databases [Volume 2, Issue 2, 2015, Pages 87-107]
  • Ghasemi, Simin A Trust-Based Approach for Correctness verification of Query Results in Data Outsourcing [Volume 1, Issue 1, 2014, Pages 3-14]
  • Ghatee, Mehdi Solution of the Generalized Interval Linear Programming Problems: Pessimistic and Optimistic Approaches [Volume 1, Issue 2, 2014, Pages 159-167]
  • Ghiasian, Ali Analyzing the Impact of Wireless Channels on the Efficiency of Edge Computing in IoT Applications [Volume 8, Issue 2, 2021, Pages 59-70]
  • Gholamnezhad, Pezhman Gaussian Linear Regression Crossover for Genetic Algorithms [Volume 9, Issue 1, 2022, Pages 45-56]
  • Golzari, Shahram The Diagnosis of Epilepsy by Gravitational Search Algorithm and Support Vector Machines [Volume 3, Issue 2, 2016, Pages 111-125]

H

  • Hadavandi, Esmaeil Effective Intrusion Detection with a Neural Network Ensemble Using Fuzzy Clustering and Stacking Combination Method [Volume 1, Issue 4, 2014, Pages 293-305]
  • Hadavi, Mohammad Ali An Inference Resistant Indexing Technique to Enforce Access Control in Data Outsourcing [Volume 3, Issue 2, 2016, Pages 83-93]
  • Hadavi, Mohammad Ali A Trust-Based Approach for Correctness verification of Query Results in Data Outsourcing [Volume 1, Issue 1, 2014, Pages 3-14]
  • Hadavi, Mohammad Ali Privacy-Preserving Fine-grained Correctness Verification of Query Results in Outsourced Databases [Volume 2, Issue 2, 2015, Pages 87-107]
  • Hadavi, Mohammad Ali Automatic Black-Box Detection of Resistance Against CSRF Vulnerabilities in Web Applications [Volume 8, Issue 1, 2021, Pages 19-32]
  • Haj Seyyed Javadi, Seyyed Hamid Determining the Number of Accusations for Decision Making in Key Revocation Protocol for MANET [Volume 3, Issue 1, 2016, Pages 63-72]
  • Halakou, Farideh Comparison of Hybrid and Filter Feature Selection Methods to Identify Candidate Single Nucleotide Polymorphisms [Volume 1, Issue 3, 2014, Pages 205-2013]
  • Halvachi, Hadi An Inference Resistant Indexing Technique to Enforce Access Control in Data Outsourcing [Volume 3, Issue 2, 2016, Pages 83-93]
  • Harifi, Abbas The Diagnosis of Epilepsy by Gravitational Search Algorithm and Support Vector Machines [Volume 3, Issue 2, 2016, Pages 111-125]
  • Hasanzadeh, Maryam The Effect of Correlogram Properties on Blind Steganalysis in JPEG Images [Volume 1, Issue 1, 2014, Pages 39-46]
  • Haseme, Maxam TFDF, not TF-IDF in Financial Analysis [Volume 10, Issue 2, 2023, Pages 13-30]
  • Hashemi, Massoud Reza An Optimal Traffic Distribution Method Supporting End-to-End Delay Bound [Volume 1, Issue 1, 2014, Pages 61-71]
  • Hashemi, Massoud Reza Deploying IoT, Based on NDN Protocol in a Fog Computing Infrastructure [Volume 9, Issue 1, 2022, Pages 31-44]
  • Hashemzade, Bahare CSE: A Novel Dynamic Obfuscation Based on Control Flow, Signals and Encryption [Volume 6, Issue 2, 2019, Pages 53-63]
  • Hassani Karbasi, Amir A Provably Secure Variant of ETRU Based on Extended Ideal Lattices Over Direct Product of Dedekind Domains [Volume 5, Issue 1, 2018, Pages 13-34]
  • Hassanpour, Hamid Robust Face Recognition Under Illumination Changes and Pose Variations [Volume 5, Issue 2, 2018, Pages 81-89]
  • Horri, abbas A Multi-Dimensional Framework for Virtual Machine Consolidation [Volume 10, Issue 2, 2023, Pages 82-92]
  • HoseinDoost, Samaneh Towards a Model-Driven Framework for Simulating Interactive Emergency Response Environments [Volume 5, Issue 1, 2018, Pages 35-49]
  • HoseinDoost, Samaneh Applying Meta-Heuristics Algorithms in Model-Driven Approaches for Solving the CRA Problem [Volume 7, Issue 2, 2020, Pages 141-161]
  • Hosseini, Rahil A GA Approach for Tuning Membership Functions of a Fuzzy Expert System for Heart Disease Prognosis Development Risk [Volume 4, Issue 1, 2017, Pages 13-23]
  • Hosseini Pozveh, Zahra Persian Texts Part of Speech Tagging Using Artificial Neural Networks [Volume 3, Issue 4, 2016, Pages 233-241]
  • Hosseini-Pozveh, Maryam New Influence-Aware Centrality Measures for Influence Maximization in Social Networks [Volume 9, Issue 2, 2022, Pages 23-38]
  • Hosseini-Pozveh, Maryam A New PageRank-Based Method for Influence Maximization in Signed Social Networks [Volume 10, Issue 1, 2023, Pages 61-74]
  • Hosseini-Pozveh, Maryam Applying Heuristic-Based Greedy Approaches for Influence Maximization-Cost Minimization in Social Networks [Volume 11, Issue 1, 2024, Pages 29-37]
  • Hosseinzadeh, Mehdi On the Security of Permutation Based Authentication Protocols for Internet of Things Applications: The Case of Huang et al.'s Protocol [Volume 3, Issue 4, 2016, Pages 201-209]

J

  • Jabbari, Ghazal Analyzing the Impact of Wireless Channels on the Efficiency of Edge Computing in IoT Applications [Volume 8, Issue 2, 2021, Pages 59-70]
  • Jalali, Mozhdeh Applying Heuristic-Based Greedy Approaches for Influence Maximization-Cost Minimization in Social Networks [Volume 11, Issue 1, 2024, Pages 29-37]
  • Jalili, Rasool A Trust-Based Approach for Correctness verification of Query Results in Data Outsourcing [Volume 1, Issue 1, 2014, Pages 3-14]
  • Jalili, Rasool Privacy-Preserving Fine-grained Correctness Verification of Query Results in Outsourced Databases [Volume 2, Issue 2, 2015, Pages 87-107]
  • Jalili, Rasool An Inference Resistant Indexing Technique to Enforce Access Control in Data Outsourcing [Volume 3, Issue 2, 2016, Pages 83-93]
  • Jalili, Rasool An Extension of CryptoPAi to the Formal Analysis of E-voting Protocols [Volume 6, Issue 1, 2019, Pages 25-42]
  • Javidi, Mohammad Masoud New Functions for Mass Calculation in Gravitational Search Algorithm [Volume 2, Issue 3, 2015, Pages 233-246]

K

  • Kabirirad, Saeideh A Generalized Spread Spectrum-Based Audio Watermarking Method with Adaptive Synchronization [Volume 10, Issue 2, 2023, Pages 31-44]
  • Kaedi, Marjan TFDF, not TF-IDF in Financial Analysis [Volume 10, Issue 2, 2023, Pages 13-30]
  • Karimi, Zahra Using Data Mining to Investigate the Effect of Cognitive Style on Programming Habits [Volume 9, Issue 2, 2022, Pages 11-22]
  • Kazemi, Arefeh Adaptive Reinforcement-Based Genetic Algorithm for Combinatorial Optimization [Volume 9, Issue 1, 2022, Pages 71-84]
  • Kazemi, Arefeh Evaluating ChatGPT as a Question Answering System: a Comprehensive Analysis and Comparison with Existing Models [(Articles in Press)]
  • Kazemi, Keihan A Hybrid Method based on Statistical Features and Packet Content Analysis to Identify Major Network Tunneling Protocols [Volume 3, Issue 2, 2016, Pages 95-110]
  • Kazemifard, Mohammad AUBUE: An Adaptive User-Interface Based on Users' Emotions [Volume 3, Issue 2, 2016, Pages 127-145]
  • Khademzadeh, Ahmad On the Security of Permutation Based Authentication Protocols for Internet of Things Applications: The Case of Huang et al.'s Protocol [Volume 3, Issue 4, 2016, Pages 201-209]
  • Khalilian, Alireza Gamifault: A Gamified Motivational Framework for Software Debugging Process [Volume 10, Issue 1, 2023, Pages 17-34]
  • Khasseh, Ali Akbar Model-Driven Software Engineering: A Bibliometric Analysis [Volume 8, Issue 1, 2021, Pages 93-108]
  • Khodaei, Azadeh Sentiment Analysis of Persian Sentences using Efficient Deep Learning in Fiction [Volume 11, Issue 1, 2024, Pages 67-86]
  • Khodambashi, Siavash A Weak Blind Signature Based on Quantum Key Distribution [Volume 1, Issue 3, 2014, Pages 179-186]
  • Khodayari Tehraninejad, Dina Proxima: Process Mining for Extracting Configurable Process Models Using Software Product Line Concepts [Volume 9, Issue 1, 2022, Pages 1-29]
  • Khoshnevis, Sedigheh Proxima: Process Mining for Extracting Configurable Process Models Using Software Product Line Concepts [Volume 9, Issue 1, 2022, Pages 1-29]
  • Khoshnevis, Sedigheh CIAOERP: A Method for Change Impact Analysis and Search-Based Decision Optimization in Cloud ERP Systems Using Feature Forests [(Articles in Press)]
  • Khosravi, Hadi Structural and Non-Structural Similarity Combination of Users in Social Networks [Volume 3, Issue 1, 2016, Pages 43-52]
  • Kiani, Rasool Distributed Rule Anomaly Detection in SDN-based IoT: Towards a Comprehensive Approach [Volume 10, Issue 1, 2023, Pages 75-84]
  • Kohansal, Omid Robust Face Recognition Under Illumination Changes and Pose Variations [Volume 5, Issue 2, 2018, Pages 81-89]
  • Kolahdouz Rahimi, Shekoufeh eXtreme Modeling: an approach to agile model-based development [Volume 6, Issue 2, 2019, Pages 43-52]
  • Kolahdouz Rahimi, Shekoufeh Applying Meta-Heuristics Algorithms in Model-Driven Approaches for Solving the CRA Problem [Volume 7, Issue 2, 2020, Pages 141-161]
  • Kolahdouz Rahimi, Shekoufeh Model-Driven Software Engineering: A Bibliometric Analysis [Volume 8, Issue 1, 2021, Pages 93-108]
  • Koohestani, Farnaz CIAOERP: A Method for Change Impact Analysis and Search-Based Decision Optimization in Cloud ERP Systems Using Feature Forests [(Articles in Press)]
  • Kord Toudeshki, Leila A Context Model for Business Process Adaptation based on Ontology Reasoning [Volume 7, Issue 2, 2020, Pages 119-140]

L

  • Lano, Kevin eXtreme Modeling: an approach to agile model-based development [Volume 6, Issue 2, 2019, Pages 43-52]
  • Lano, Kevin Formalizing the main characteristics of QVT-based model transformation languages [Volume 7, Issue 1, 2020, Pages 35-62]
  • Lobabi-Mirghavami, Hanieh A Novel Grammar-Based Approach to Atrial Fibrillation Arrhythmia Detection for Pervasive Healthcare Environments [Volume 2, Issue 2, 2015, Pages 155-163]
  • Lotfi Shahreza, Maryam Development of a CGAN-Based Method for Aspect Level Text Generation: Encouragement and Punishment Factors in the Aspect Knowledge [Volume 10, Issue 1, 2023, Pages 47-60]
  • Lotfi Shahreza, Maryam A New PageRank-Based Method for Influence Maximization in Signed Social Networks [Volume 10, Issue 1, 2023, Pages 61-74]

M

  • Mahdavi, Mojtaba Steganography of Halftone Images by Group Alteration of Grayscale Pixels [Volume 2, Issue 1, 2015, Pages 21-30]
  • Mahmoudi, Arman DiCuPIT: Distributed Cuckoo Filter-based Pending Interest Table [Volume 9, Issue 1, 2022, Pages 85-96]
  • Mahrooghi, Hamid Reza An Extension of CryptoPAi to the Formal Analysis of E-voting Protocols [Volume 6, Issue 1, 2019, Pages 25-42]
  • Mala, Hamid Unified Byte Permutations for the Block Cipher 3D [Volume 1, Issue 1, 2014, Pages 15-22]
  • Mala, Hamid Demand based Resource Allocation to Balance the Utilization and User Level Fairness in Femtocell Networks [Volume 1, Issue 3, 2014, Pages 187-204]
  • Mala, Hamid Security Analysis of an EPC Class-1 Generation-2 Compliant RFID Authentication Protocol [Volume 3, Issue 3, 2016, Pages 163-174]
  • Malekmohammad, Azam Structural and Non-Structural Similarity Combination of Users in Social Networks [Volume 3, Issue 1, 2016, Pages 43-52]
  • Mazinani, Mahdi A GA Approach for Tuning Membership Functions of a Fuzzy Expert System for Heart Disease Prognosis Development Risk [Volume 4, Issue 1, 2017, Pages 13-23]
  • Mehran, Narges Randomized SVD Based Probabilistic Caching Strategy in Named Data Networks [Volume 3, Issue 4, 2016, Pages 217-231]
  • Mirghadri, Abdorasool Expected Coverage of Perfect Chains in the Hellman Time Memory Trade-Off [Volume 3, Issue 3, 2016, Pages 155-162]
  • Mirzaei, Abdolreza HH-FRBC: Halving Hierarchical Fuzzy Rule-Based Classifier [Volume 1, Issue 3, 2014, Pages 215-224]
  • Mirzaei, Abdolreza Adaptive Interval Type-2 Fuzzy Inference System for Facial Expression Recognition [Volume 2, Issue 3, 2015, Pages 125-207]
  • Mirzaei, Arash Some Primitives Based on Jumping LFSRs with Determined Period [Volume 2, Issue 3, 2015, Pages 175-184]
  • Moghissi, Gholam Reza Rejecting Claimed Speedup of 2^𝛽/2 in Extreme Pruning and Revising BKZ 2.0 for Better Speedup [Volume 8, Issue 1, 2021, Pages 65-91]
  • Moghissi, Gholam Reza Design of Optimal Progressive BKZ with Increasing Success-Probabilities and Increasing Block-Sizes [Volume 9, Issue 2, 2022, Pages 65-93]
  • Mohamadzadeh, Sajad Training-Free Object Matching and Retrieval Using Speeded Up Robust Features [Volume 2, Issue 2, 2015, Pages 141-153]
  • Mohammadi, Atefeh Identifying Explicit Features of Persian Comments [Volume 6, Issue 1, 2019, Pages 1-11]
  • Mohammadi, Solmaz Scalability Analysis of a LoRa Network Under Inter-SF and Co-SF Interference with Poisson Point Process Model [Volume 8, Issue 2, 2021, Pages 43-57]
  • Mohd Zainuddin, Norziha Megat An Empirical Study of Students' Perceptions on the Technological Aspects of the E-Learning System [Volume 4, Issue 1, 2017, Pages 25-38]
  • Mollashahi, Hadid Summarization Algorithm for Data Stream to Speed up Outlier Data Detection [Volume 10, Issue 1, 2023, Pages 35-46]
  • Monadjemi, Amirhassan Persian Texts Part of Speech Tagging Using Artificial Neural Networks [Volume 3, Issue 4, 2016, Pages 233-241]
  • Montazeri, Morteza Identifying Explicit Features of Persian Comments [Volume 6, Issue 1, 2019, Pages 1-11]
  • Moodi, Hossein A New Hybrid Method for VoIP Stream Steganography [Volume 3, Issue 3, 2016, Pages 175-182]
  • Moradi, Fariba Security Analysis of an EPC Class-1 Generation-2 Compliant RFID Authentication Protocol [Volume 3, Issue 3, 2016, Pages 163-174]
  • Moradi, Fereidoun Security Analysis of an EPC Class-1 Generation-2 Compliant RFID Authentication Protocol [Volume 3, Issue 3, 2016, Pages 163-174]
  • Moradyan, Kourosh Web Service Matchmaking based on Functional Similarity in Service Cloud [Volume 2, Issue 4, 2015, Pages 257-270]
  • Mosakhani, Mostafa A more Accurate Clustering Method by using Co-author Social Networks for Author Name Disambiguation [Volume 1, Issue 4, 2014, Pages 307-317]
  • Moshavash, Monireh Momentum Contrast Self-Supervised Based Training for Adversarial Robustness [Volume 8, Issue 1, 2021, Pages 33-43]
  • Motamed, Sara Speech Emotion Recognition based on Improved SOAR Model [Volume 11, Issue 1, 2024, Pages 39-48]
  • Motameni, Homayun New Attribute Relation-Based Access Control System via Hybrid Logic [Volume 10, Issue 2, 2023, Pages 1-12]
  • Mousavi, Sayyed Ahmad Expected Coverage of Perfect Chains in the Hellman Time Memory Trade-Off [Volume 3, Issue 3, 2016, Pages 155-162]
  • Mousavi Esfahani, Shahrzad Sadat Gamifault: A Gamified Motivational Framework for Software Debugging Process [Volume 10, Issue 1, 2023, Pages 17-34]
  • Movahhedinia, Naser Demand based Resource Allocation to Balance the Utilization and User Level Fairness in Femtocell Networks [Volume 1, Issue 3, 2014, Pages 187-204]
  • Movahhedinia, Naser Randomized SVD Based Probabilistic Caching Strategy in Named Data Networks [Volume 3, Issue 4, 2016, Pages 217-231]
  • Mozafari, Jamshid BAS: An Answer Selection Method Using BERT Language Model [Volume 8, Issue 2, 2021, Pages 1-18]
  • Musevi Niya, Mir Javad Robust Cooperative Spectrum Sensing under Primary User Emulation Attack in Cognitive Radio Networks [Volume 2, Issue 2, 2015, Pages 109-117]

N

  • Naderan, Marjan Intrusion Detection in IoT With Logistic Regression and Artificial Neural Network: Further Investigations on N-BaIoT Dataset Devices [Volume 8, Issue 2, 2021, Pages 27-42]
  • Nadi, Shiva PSA: A Hybrid Feature Selection Approach for Persian Text Classification [Volume 1, Issue 4, 2014, Pages 261-272]
  • Nadimi, Mohammad Hossein A more Accurate Clustering Method by using Co-author Social Networks for Author Name Disambiguation [Volume 1, Issue 4, 2014, Pages 307-317]
  • Naghsh-Nilchi, Ahmad Reza Editorial Note [Volume 1, Issue 1, 2014, Pages 1-2]
  • Naghsh-Nilchi, Ahmad Reza Editorial Note [Volume 1, Issue 2, 2014, Pages 81-82]
  • Naghsh-Nilchi, Ahmad Reza A New Hybrid Method for VoIP Stream Steganography [Volume 3, Issue 3, 2016, Pages 175-182]
  • Nasiripour, Reza Training-Free Object Matching and Retrieval Using Speeded Up Robust Features [Volume 2, Issue 2, 2015, Pages 141-153]
  • Nassiri-Mofakham, Faria DOPPONENT: A Socially Efficient Preference Model of Opponent in Bilateral Multi Issue Negotiations [Volume 1, Issue 4, 2014, Pages 283-292]
  • Navi, Keivan A High Speed Residue-to-Binary Converter for Balanced 4-Moduli Set [Volume 2, Issue 1, 2015, Pages 43-54]
  • Nayebalsadr, Shakiba Simulating the Resource Freeing Attack: Using Cloudsim Simulator [Volume 2, Issue 4, 2015, Pages 293-302]
  • Nazerian, Fatemeh New Attribute Relation-Based Access Control System via Hybrid Logic [Volume 10, Issue 2, 2023, Pages 1-12]
  • Nematbakhsh, MohammadAli Identifying Explicit Features of Persian Comments [Volume 6, Issue 1, 2019, Pages 1-11]
  • Nematbakhsh, Mohammad Ali MRAR: Mining Multi-Relation Association Rules [Volume 1, Issue 2, 2014, Pages 133-158]
  • Nematbakhsh, Mohammad Ali Mining Association Rules from Semantic Web Data without User Intervention [Volume 7, Issue 1, 2020, Pages 81-94]
  • Nematbakhsh, Mohammad Ali BAS: An Answer Selection Method Using BERT Language Model [Volume 8, Issue 2, 2021, Pages 1-18]
  • Nematbakhsh, Mohammad Ali Domain-based Abbreviation Expansion using Topic Modelling for Data Cleaning [Volume 11, Issue 2, 2024, Pages 1-12]
  • Nickabadi, Ahmad BLProM: A black-box approach for detecting business-layer processes in the web applications [Volume 6, Issue 2, 2019, Pages 65-80]
  • Nikmehr, Hooman A Study on Intelligent Authorship Methods in Persian Language [Volume 2, Issue 1, 2015, Pages 63-76]
  • Nikmehr, Hooman A High-Payload Audio Watermarking Scheme for Real-Time Applications [Volume 2, Issue 2, 2015, Pages 119-127]
  • Nilforoush, Mohammad Reza Deploying IoT, Based on NDN Protocol in a Fog Computing Infrastructure [Volume 9, Issue 1, 2022, Pages 31-44]
  • Noferesti, Morteza A Trust-Based Approach for Correctness verification of Query Results in Data Outsourcing [Volume 1, Issue 1, 2014, Pages 3-14]
  • Noorani, S.Fatemeh Using Data Mining to Investigate the Effect of Cognitive Style on Programming Habits [Volume 9, Issue 2, 2022, Pages 11-22]
  • Noorbehbahani, Fakhroddin RSAM: A Questionnaire for Ransomware Security Awareness Measurement [Volume 10, Issue 1, 2023, Pages 1-16]
  • Noori, Fariba AUBUE: An Adaptive User-Interface Based on Users' Emotions [Volume 3, Issue 2, 2016, Pages 127-145]
  • Nowroozi, Alireza BLProM: A black-box approach for detecting business-layer processes in the web applications [Volume 6, Issue 2, 2019, Pages 65-80]

O

  • Omoomi, Behnaz An Optimal Traffic Distribution Method Supporting End-to-End Delay Bound [Volume 1, Issue 1, 2014, Pages 61-71]
  • Oraei, Hossein An Improvement Over Lee et al.'s Key Agreement Protocol [Volume 5, Issue 1, 2018, Pages 3-12]
  • Osareh, Alireza A Survey on Transformation Methods of XML Documents to Ontologies [Volume 4, Issue 2, 2017, Pages 81-100]

P

  • Pajoohan, Mohammad-Reza Identifying Explicit Features of Persian Comments [Volume 6, Issue 1, 2019, Pages 1-11]
  • Pakniat, Nasrollah Verifiable Social Multi-Secret Sharing Secure in Active Adversarial Model [Volume 4, Issue 1, 2017, Pages 3-12]
  • Pakniat, Nasrollah Security Analysis of Two Lightweight Certificateless Signature Schemes [Volume 5, Issue 2, 2018, Pages 59-65]
  • Parsaei, Fahimeh Evaluating Behavioral Intentions of Tourists in e-Tourism [Volume 1, Issue 2, 2014, Pages 95-109]
  • Parsazadeh, Nadia An Empirical Study of Students' Perceptions on the Technological Aspects of the E-Learning System [Volume 4, Issue 1, 2017, Pages 25-38]
  • Payandeh, Ali Rejecting Claimed Speedup of 2^𝛽/2 in Extreme Pruning and Revising BKZ 2.0 for Better Speedup [Volume 8, Issue 1, 2021, Pages 65-91]
  • Payandeh, Ali Design of Optimal Progressive BKZ with Increasing Success-Probabilities and Increasing Block-Sizes [Volume 9, Issue 2, 2022, Pages 65-93]
  • P.Haughton, Howard eXtreme Modeling: an approach to agile model-based development [Volume 6, Issue 2, 2019, Pages 43-52]
  • Pira, Einollah A Surrogate Model-based Aquila Optimizer for Solving High-dimensional Computationally Expensive Problems [Volume 11, Issue 1, 2024, Pages 1-18]
  • Pourkhani, Mohammadereza A Survey on Transformation Methods of XML Documents to Ontologies [Volume 4, Issue 2, 2017, Pages 81-100]
  • Pourpouneh, Mohsen An Improvement Over Lee et al.'s Key Agreement Protocol [Volume 5, Issue 1, 2018, Pages 3-12]
  • Purebrahim, Yousef A Novel Block Cipher Algorithm with Feistel-Like Structure [Volume 3, Issue 1, 2016, Pages 13-26]

R

  • Rahimi, Alireza JHAE: A Novel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH [Volume 2, Issue 1, 2015, Pages 3-20]
  • Rahmanpour, Ehsan CIAOERP: A Method for Change Impact Analysis and Search-Based Decision Optimization in Cloud ERP Systems Using Feature Forests [(Articles in Press)]
  • Rajabi, Bahman A CCA2-Secure Incomparable Public Key Encryption Scheme [Volume 3, Issue 1, 2016, Pages 3-12]
  • Ramezani, Reza MRAR: Mining Multi-Relation Association Rules [Volume 1, Issue 2, 2014, Pages 133-158]
  • Ramezani, Reza Mining Association Rules from Semantic Web Data without User Intervention [Volume 7, Issue 1, 2020, Pages 81-94]
  • Ramezanian, Rasoul An Improvement Over Lee et al.'s Key Agreement Protocol [Volume 5, Issue 1, 2018, Pages 3-12]
  • Ramzani Shahrestani, Matin Speech Emotion Recognition based on Improved SOAR Model [Volume 11, Issue 1, 2024, Pages 39-48]
  • Rasekh, Amir Hossein Word Sense Disambiguation Based on Lexical and Semantic Features Using Naive Bayes Classifier [Volume 1, Issue 2, 2014, Pages 123-132]
  • Rashedi, Esmat New Functions for Mass Calculation in Gravitational Search Algorithm [Volume 2, Issue 3, 2015, Pages 233-246]
  • Rashidi, Hassan Software Architecture Tools- A Classification and Survey with Recommendation for an Organization [Volume 10, Issue 2, 2023, Pages 61-81]
  • Rashidi, Zahra Software Architecture Tools- A Classification and Survey with Recommendation for an Organization [Volume 10, Issue 2, 2023, Pages 61-81]
  • Rashidi, Zeynab Software Architecture Tools- A Classification and Survey with Recommendation for an Organization [Volume 10, Issue 2, 2023, Pages 61-81]
  • Rastegari, Yousef Toward automatic Transformation of Service Choreography into UML State Machine [Volume 2, Issue 3, 2015, Pages 209-222]
  • Rastegari, Yousef A Context-Aware Reflective-State Framework to Reconfigure Service-Based Applications [Volume 2, Issue 4, 2015, Pages 281-292]
  • Rastegari, Yousef An HMM-based Method for Adapting Service-based Applications to Users’ Quality Preferences [Volume 5, Issue 2, 2018, Pages 67-79]
  • Rastgoo, Razieh Multi-Constraint Optimal Path Finding for QoS-Enabled Smart Grids: A Combination Approach of Neural Network and Fuzzy System [Volume 4, Issue 2, 2017, Pages 47-61]
  • Reisi, Zahra A Workload-Adaptable Method for Migrated Software to the Cloud [Volume 2, Issue 4, 2015, Pages 271-279]
  • Reshadinezhad, Mohammad Reza A New Implementation for a 2^n-1 Modular Adder Through Carbon Nanotube Field Effect Transistors [Volume 2, Issue 2, 2015, Pages 129-139]
  • Rezaee, Razieh A Risk Estimation Framework for Security Threats in Computer Networks [Volume 7, Issue 1, 2020, Pages 19-33]
  • Rezaeenour, Jalal Effective Intrusion Detection with a Neural Network Ensemble Using Fuzzy Clustering and Stacking Combination Method [Volume 1, Issue 4, 2014, Pages 293-305]
  • Rezaei, Hashem Bit-Parallel ECC Coprocessor resistant to Differential Power Analysis Attacks in GF(2m) [Volume 8, Issue 1, 2021, Pages 1-18]
  • Rezaei, Mehran Evaluating Behavioral Intentions of Tourists in e-Tourism [Volume 1, Issue 2, 2014, Pages 95-109]
  • Rezaei, Mehran An Empirical Study of Students' Perceptions on the Technological Aspects of the E-Learning System [Volume 4, Issue 1, 2017, Pages 25-38]
  • Rezaeian, Mahdie Semantic Segmentation of Aerial Images Using Fusion of Color and Texture Features [Volume 1, Issue 3, 2014, Pages 225-238]
  • Rezaeian Zadeh, Farahnaz A Novel Solution for Author Attribution Problem in Anonymous E-mail [Volume 1, Issue 4, 2014, Pages 319-327]
  • Rezaeian Zadeh, Farahnaz A Workload-Adaptable Method for Migrated Software to the Cloud [Volume 2, Issue 4, 2015, Pages 271-279]
  • Rezvani, Azadeh RSAM: A Questionnaire for Ransomware Security Awareness Measurement [Volume 10, Issue 1, 2023, Pages 1-16]
  • Rostampour, Samad On the Security of Permutation Based Authentication Protocols for Internet of Things Applications: The Case of Huang et al.'s Protocol [Volume 3, Issue 4, 2016, Pages 201-209]
  • Rouhi, Alireza Formalizing the main characteristics of QVT-based model transformation languages [Volume 7, Issue 1, 2020, Pages 35-62]
  • Rouhi, Alireza A Surrogate Model-based Aquila Optimizer for Solving High-dimensional Computationally Expensive Problems [Volume 11, Issue 1, 2024, Pages 1-18]

S

  • Saadatfar, Hamid Summarization Algorithm for Data Stream to Speed up Outlier Data Detection [Volume 10, Issue 1, 2023, Pages 35-46]
  • Sabbaghi-nadooshan, Reza A High Speed Residue-to-Binary Converter for Balanced 4-Moduli Set [Volume 2, Issue 1, 2015, Pages 43-54]
  • Saberi, Bagher A Sample-Based Approach to Data Quality Assessment in Spatial Databases with Application to Mobile Trajectory Nearest-Neighbor Search [Volume 1, Issue 3, 2014, Pages 239-249]
  • Saboohi, Hadi Sentiment Analysis of Persian Sentences using Efficient Deep Learning in Fiction [Volume 11, Issue 1, 2024, Pages 67-86]
  • Sadeghi, Samira Automatic Black-Box Detection of Resistance Against CSRF Vulnerabilities in Web Applications [Volume 8, Issue 1, 2021, Pages 19-32]
  • Sadeghian, Babak Toward A More Efficient Gröbner-based Algebraic Cryptanalysis [Volume 7, Issue 2, 2020, Pages 103-117]
  • Sadjadieh, Mahdi Some Primitives Based on Jumping LFSRs with Determined Period [Volume 2, Issue 3, 2015, Pages 175-184]
  • Sadjadieh, Mahdi A Lightweight Authentication Scheme for RFID with Permutation Operation on Passive Tags [Volume 8, Issue 2, 2021, Pages 71-86]
  • Sadreddini, Mohammad Hadi Word Sense Disambiguation Based on Lexical and Semantic Features Using Naive Bayes Classifier [Volume 1, Issue 2, 2014, Pages 123-132]
  • Sadri, Saeid Semantic Segmentation of Aerial Images Using Fusion of Color and Texture Features [Volume 1, Issue 3, 2014, Pages 225-238]
  • Safayani, Mehran Adaptive Interval Type-2 Fuzzy Inference System for Facial Expression Recognition [Volume 2, Issue 3, 2015, Pages 125-207]
  • Safkhani, Masoumeh Full Secret Disclosure Attack against an EPC- C1 G2 Compliant Authentication Protocol [Volume 6, Issue 1, 2019, Pages 13-23]
  • Salajegheh, Afshin A Context Model for Business Process Adaptation based on Ontology Reasoning [Volume 7, Issue 2, 2020, Pages 119-140]
  • Samavi, Shadrokh Steganography of Halftone Images by Group Alteration of Grayscale Pixels [Volume 2, Issue 1, 2015, Pages 21-30]
  • Saraee, Mohamad MRAR: Mining Multi-Relation Association Rules [Volume 1, Issue 2, 2014, Pages 133-158]
  • Saraee, Mohamad PSA: A Hybrid Feature Selection Approach for Persian Text Classification [Volume 1, Issue 4, 2014, Pages 261-272]
  • Saraee, Mohamad Mining Association Rules from Semantic Web Data without User Intervention [Volume 7, Issue 1, 2020, Pages 81-94]
  • Sattari-Naeini, Vahid Multi-Constraint Optimal Path Finding for QoS-Enabled Smart Grids: A Combination Approach of Neural Network and Fuzzy System [Volume 4, Issue 2, 2017, Pages 47-61]
  • Sekhavat, Yoones A Enhancing the Sense of Immersion and Quality of Experience in Mobile Games Using Augmented Reality [Volume 3, Issue 1, 2016, Pages 53-62]
  • Seyyedi, Mir Ali A Context Model for Business Process Adaptation based on Ontology Reasoning [Volume 7, Issue 2, 2020, Pages 119-140]
  • Shabanian, Touraj An Optimal Traffic Distribution Method Supporting End-to-End Delay Bound [Volume 1, Issue 1, 2014, Pages 61-71]
  • Shadgar, Bita A Survey on Transformation Methods of XML Documents to Ontologies [Volume 4, Issue 2, 2017, Pages 81-100]
  • Shafiee, Nasim A High Speed Residue-to-Binary Converter for Balanced 4-Moduli Set [Volume 2, Issue 1, 2015, Pages 43-54]
  • Shafieinejad, Alireza Bit-Parallel ECC Coprocessor resistant to Differential Power Analysis Attacks in GF(2m) [Volume 8, Issue 1, 2021, Pages 1-18]
  • Shahgholi Ghahfarokhi, Behrouz Demand based Resource Allocation to Balance the Utilization and User Level Fairness in Femtocell Networks [Volume 1, Issue 3, 2014, Pages 187-204]
  • Shakiba, Ali Generating dynamical S-boxes using 1D Chebyshev chaotic maps [Volume 7, Issue 1, 2020, Pages 1-17]
  • Shams, Fereidoon Toward automatic Transformation of Service Choreography into UML State Machine [Volume 2, Issue 3, 2015, Pages 209-222]
  • Shams, Fereidoon A Context-Aware Reflective-State Framework to Reconfigure Service-Based Applications [Volume 2, Issue 4, 2015, Pages 281-292]
  • Shams, Mohammadreza Development of a CGAN-Based Method for Aspect Level Text Generation: Encouragement and Punishment Factors in the Aspect Knowledge [Volume 10, Issue 1, 2023, Pages 47-60]
  • Sharifi, Abbas Ali Robust Cooperative Spectrum Sensing under Primary User Emulation Attack in Cognitive Radio Networks [Volume 2, Issue 2, 2015, Pages 109-117]
  • Shirvani, Hussein A New Scheme for Storage and Retrieval of Shared Text Files [Volume 2, Issue 3, 2015, Pages 223-231]
  • Soleimani, Seyfollah Indoor Localization Performance Optimization Using Modified kd-Tree Algorithm [Volume 9, Issue 2, 2022, Pages 55-64]
  • Soltani, Amir Masoud Development of a CGAN-Based Method for Aspect Level Text Generation: Encouragement and Punishment Factors in the Aspect Knowledge [Volume 10, Issue 1, 2023, Pages 47-60]

T

  • Taghiyar, Anahita RSAM: A Questionnaire for Ransomware Security Awareness Measurement [Volume 10, Issue 1, 2023, Pages 1-16]
  • Taghizadeh, Maryam Grey Wolf-Based Task Scheduling in Vehicular Fog Computing Systems [(Articles in Press)]
  • Taheri, Farzaneh Evaluating ChatGPT as a Question Answering System: a Comprehensive Analysis and Comparison with Existing Models [(Articles in Press)]
  • Taheri, MohammadReza A High Speed Residue-to-Binary Converter for Balanced 4-Moduli Set [Volume 2, Issue 1, 2015, Pages 43-54]
  • Tahmasebipour, Safieh Ranking of Common Architectural Styles Based on Availability, Security and Performance Quality Attributes [Volume 1, Issue 2, 2014, Pages 83-93]
  • Tajiki, Mohammad Mahdi Improved Secure and Privacy Preserving Keyword Searching Cryptography [Volume 2, Issue 3, 2015, Pages 185-194]
  • Tariq, Hafsa Comprehensive Security and Privacy Framework against Malicious Insider in Cloud-based Machine Learning [Volume 11, Issue 1, 2024, Pages 49-66]
  • Tavakoli, Somayeh Capability-Based Team Formation in Researchers Social Networks [Volume 4, Issue 2, 2017, Pages 63-79]
  • Tork Ladani, Behrouz Security Analysis of an EPC Class-1 Generation-2 Compliant RFID Authentication Protocol [Volume 3, Issue 3, 2016, Pages 163-174]

V

  • Vahdatnejad, Hamed Summarization Algorithm for Data Stream to Speed up Outlier Data Detection [Volume 10, Issue 1, 2023, Pages 35-46]
  • Vahdat-Nejad, Hamed A New Scheme for Storage and Retrieval of Shared Text Files [Volume 2, Issue 3, 2015, Pages 223-231]
  • Vahidi-Asl, Mojtaba Gamifault: A Gamified Motivational Framework for Software Debugging Process [Volume 10, Issue 1, 2023, Pages 17-34]

Y

  • Yamaghani, Mohammadreza Speech Emotion Recognition based on Improved SOAR Model [Volume 11, Issue 1, 2024, Pages 39-48]
  • Yazdani, Mohammad Rohollah A Lightweight Authentication Scheme for RFID with Permutation Operation on Passive Tags [Volume 8, Issue 2, 2021, Pages 71-86]

Z

  • Zaamari, Masih Uplift Modeling Using Artificial Immune System [Volume 10, Issue 2, 2023, Pages 45-60]
  • Zadsar, Seyedeh Habibe Indoor Localization Performance Optimization Using Modified kd-Tree Algorithm [Volume 9, Issue 2, 2022, Pages 55-64]
  • Zafari, Farhad DOPPONENT: A Socially Efficient Preference Model of Opponent in Bilateral Multi Issue Negotiations [Volume 1, Issue 4, 2014, Pages 283-292]
  • Zahedi, Mohammad Sadegh Improving Semi-supervised Constrained k-Means Clustering Method Using User Feedback [Volume 1, Issue 4, 2014, Pages 273-261]
  • Zakerolhosseini, Ali A Weak Blind Signature Based on Quantum Key Distribution [Volume 1, Issue 3, 2014, Pages 179-186]
  • Zali, Zeinab Deploying IoT, Based on NDN Protocol in a Fog Computing Infrastructure [Volume 9, Issue 1, 2022, Pages 31-44]
  • Zamani, Bahman Towards a Model-Driven Framework for Simulating Interactive Emergency Response Environments [Volume 5, Issue 1, 2018, Pages 35-49]
  • Zamani, Bahman Applying Meta-Heuristics Algorithms in Model-Driven Approaches for Solving the CRA Problem [Volume 7, Issue 2, 2020, Pages 141-161]
  • Zamani, Bahman Model-Driven Software Engineering: A Bibliometric Analysis [Volume 8, Issue 1, 2021, Pages 93-108]
  • Zarei, Hosein Enhancing the Sense of Immersion and Quality of Experience in Mobile Games Using Augmented Reality [Volume 3, Issue 1, 2016, Pages 53-62]
  • Zarezadeh, Maryam Determining the Number of Accusations for Decision Making in Key Revocation Protocol for MANET [Volume 3, Issue 1, 2016, Pages 63-72]
  • Zeinal Hamadani, Ali DOPPONENT: A Socially Efficient Preference Model of Opponent in Bilateral Multi Issue Negotiations [Volume 1, Issue 4, 2014, Pages 283-292]
  • Zojaji, Zahra Adaptive Reinforcement-Based Genetic Algorithm for Combinatorial Optimization [Volume 9, Issue 1, 2022, Pages 71-84]
  • Zojaji, Zahra Evaluating ChatGPT as a Question Answering System: a Comprehensive Analysis and Comparison with Existing Models [(Articles in Press)]
  • Zolfaghari, Zahra Multicollision Attack on a recently proposed hash function vMDC-2 [Volume 3, Issue 4, 2016, Pages 211-215]