Acceptance Strategy
DOPPONENT: A Socially Efficient Preference Model of Opponent in Bilateral Multi Issue Negotiations [Volume 1, Issue 4, 2014, Pages 283-292]
Active Learning
Improving Semi-supervised Constrained k-Means Clustering Method Using User Feedback [Volume 1, Issue 4, 2014, Pages 273-261]
Aerial Images
Semantic Segmentation of Aerial Images Using Fusion of Color and Texture Features [Volume 1, Issue 3, 2014, Pages 225-238]
Algebraic Operations
A Sample-Based Approach to Data Quality Assessment in Spatial Databases with Application to Mobile Trajectory Nearest-Neighbor Search [Volume 1, Issue 3, 2014, Pages 239-249]
Anonymous
A Novel Solution for Author Attribution Problem in Anonymous E-mail [Volume 1, Issue 4, 2014, Pages 319-327]
Artificial Neural Networks
Effective Intrusion Detection with a Neural Network Ensemble Using Fuzzy Clustering and Stacking Combination Method [Volume 1, Issue 4, 2014, Pages 293-305]
Association Rules
MRAR: Mining Multi-Relation Association Rules [Volume 1, Issue 2, 2014, Pages 133-158]
Author Name Disambiguation
A more Accurate Clustering Method by using Co-author Social Networks for Author Name Disambiguation [Volume 1, Issue 4, 2014, Pages 307-317]
Authorship Identification
A Novel Solution for Author Attribution Problem in Anonymous E-mail [Volume 1, Issue 4, 2014, Pages 319-327]
B
Bidding Strategy
DOPPONENT: A Socially Efficient Preference Model of Opponent in Bilateral Multi Issue Negotiations [Volume 1, Issue 4, 2014, Pages 283-292]
Bilateral Multi Issue Negotiations
DOPPONENT: A Socially Efficient Preference Model of Opponent in Bilateral Multi Issue Negotiations [Volume 1, Issue 4, 2014, Pages 283-292]
Blind Steganalysis
The Effect of Correlogram Properties on Blind Steganalysis in JPEG Images [Volume 1, Issue 1, 2014, Pages 39-46]
Block Cipher 3D
Unified Byte Permutations for the Block Cipher 3D [Volume 1, Issue 1, 2014, Pages 15-22]
Bloom Filter
A Trust-Based Approach for Correctness verification of Query Results in Data Outsourcing [Volume 1, Issue 1, 2014, Pages 3-14]
Boundary data
Improving Semi-supervised Constrained k-Means Clustering Method Using User Feedback [Volume 1, Issue 4, 2014, Pages 273-261]
C
Classification
Semantic Segmentation of Aerial Images Using Fusion of Color and Texture Features [Volume 1, Issue 3, 2014, Pages 225-238]
Clustering
Improving Semi-supervised Constrained k-Means Clustering Method Using User Feedback [Volume 1, Issue 4, 2014, Pages 273-261]
Combi natorial Design
An Efficient End to End Key Establishment Protocol for Wireless Sensor Networks [Volume 1, Issue 1, 2014, Pages 23-38]
Consumer Behavior
Evaluating Behavioral Intentions of Tourists in e-Tourism [Volume 1, Issue 2, 2014, Pages 95-109]
Convex Optimization
An Optimal Traffic Distribution Method Supporting End-to-End Delay Bound [Volume 1, Issue 1, 2014, Pages 61-71]
Correctness Verification
A Trust-Based Approach for Correctness verification of Query Results in Data Outsourcing [Volume 1, Issue 1, 2014, Pages 3-14]
Correlogram Properties
The Effect of Correlogram Properties on Blind Steganalysis in JPEG Images [Volume 1, Issue 1, 2014, Pages 39-46]
Cover Selection
The Effect of Correlogram Properties on Blind Steganalysis in JPEG Images [Volume 1, Issue 1, 2014, Pages 39-46]
Curiosity
Evaluating Behavioral Intentions of Tourists in e-Tourism [Volume 1, Issue 2, 2014, Pages 95-109]
Cybercriminals
A Novel Solution for Author Attribution Problem in Anonymous E-mail [Volume 1, Issue 4, 2014, Pages 319-327]
D
Data Integration
A Sample-Based Approach to Data Quality Assessment in Spatial Databases with Application to Mobile Trajectory Nearest-Neighbor Search [Volume 1, Issue 3, 2014, Pages 239-249]
Data Mining
MRAR: Mining Multi-Relation Association Rules [Volume 1, Issue 2, 2014, Pages 133-158]
Data Outsourcing
A Trust-Based Approach for Correctness verification of Query Results in Data Outsourcing [Volume 1, Issue 1, 2014, Pages 3-14]
Decomposed TPB Model
Evaluating Behavioral Intentions of Tourists in e-Tourism [Volume 1, Issue 2, 2014, Pages 95-109]
Deployment Knowledge
An Efficient End to End Key Establishment Protocol for Wireless Sensor Networks [Volume 1, Issue 1, 2014, Pages 23-38]
Diffusion
Unified Byte Permutations for the Block Cipher 3D [Volume 1, Issue 1, 2014, Pages 15-22]
Digital Library
A more Accurate Clustering Method by using Co-author Social Networks for Author Name Disambiguation [Volume 1, Issue 4, 2014, Pages 307-317]
Distance Based Learning
DOPPONENT: A Socially Efficient Preference Model of Opponent in Bilateral Multi Issue Negotiations [Volume 1, Issue 4, 2014, Pages 283-292]
Ensemble classifiers
Effective Intrusion Detection with a Neural Network Ensemble Using Fuzzy Clustering and Stacking Combination Method [Volume 1, Issue 4, 2014, Pages 293-305]
E-Tourism
Evaluating Behavioral Intentions of Tourists in e-Tourism [Volume 1, Issue 2, 2014, Pages 95-109]
F
Fairness
Demand based Resource Allocation to Balance the Utilization and User Level Fairness in Femtocell Networks [Volume 1, Issue 3, 2014, Pages 187-204]
Feature Fusion
Semantic Segmentation of Aerial Images Using Fusion of Color and Texture Features [Volume 1, Issue 3, 2014, Pages 225-238]
Feature Selection
PSA: A Hybrid Feature Selection Approach for Persian Text Classification [Volume 1, Issue 4, 2014, Pages 261-272]
Feature Selection
Comparison of Hybrid and Filter Feature Selection Methods to Identify Candidate Single Nucleotide Polymorphisms [Volume 1, Issue 3, 2014, Pages 205-2013]
Femtocell
Demand based Resource Allocation to Balance the Utilization and User Level Fairness in Femtocell Networks [Volume 1, Issue 3, 2014, Pages 187-204]
FRBCSs
A New Hybrid Approach for Modeling Accurate Fuzzy Rule Based Classification Systems [Volume 1, Issue 2, 2014, Pages 111-122]
Frequent Pattern
A Novel Solution for Author Attribution Problem in Anonymous E-mail [Volume 1, Issue 4, 2014, Pages 319-327]
Fuzzy Clustering
Effective Intrusion Detection with a Neural Network Ensemble Using Fuzzy Clustering and Stacking Combination Method [Volume 1, Issue 4, 2014, Pages 293-305]
Fuzzy Rule Based Classification Systems
A New Hybrid Approach for Modeling Accurate Fuzzy Rule Based Classification Systems [Volume 1, Issue 2, 2014, Pages 111-122]
G
Genetic Network Programming
A New Hybrid Approach for Modeling Accurate Fuzzy Rule Based Classification Systems [Volume 1, Issue 2, 2014, Pages 111-122]
GNP
A New Hybrid Approach for Modeling Accurate Fuzzy Rule Based Classification Systems [Volume 1, Issue 2, 2014, Pages 111-122]
Graph Theory
Unified Byte Permutations for the Block Cipher 3D [Volume 1, Issue 1, 2014, Pages 15-22]
Growing
A Growing Hierarchical Approach to Batch Linear Manifold Topographic Map Formation [Volume 1, Issue 1, 2014, Pages 47-59]
H
Heuristic Hierarchical Clustering
A more Accurate Clustering Method by using Co-author Social Networks for Author Name Disambiguation [Volume 1, Issue 4, 2014, Pages 307-317]
H ierarchical
A Growing Hierarchical Approach to Batch Linear Manifold Topographic Map Formation [Volume 1, Issue 1, 2014, Pages 47-59]
Interval Field
Solution of the Generalized Interval Linear Programming Problems: Pessimistic and Optimistic Approaches [Volume 1, Issue 2, 2014, Pages 159-167]
Interval Linear Programming
Solution of the Generalized Interval Linear Programming Problems: Pessimistic and Optimistic Approaches [Volume 1, Issue 2, 2014, Pages 159-167]
Intrusion Detection
Effective Intrusion Detection with a Neural Network Ensemble Using Fuzzy Clustering and Stacking Combination Method [Volume 1, Issue 4, 2014, Pages 293-305]
Linear Manifold Top ographic Map
A Growing Hierarchical Approach to Batch Linear Manifold Topographic Map Formation [Volume 1, Issue 1, 2014, Pages 47-59]
Linear Temporal Logic
A Trust-Based Approach for Correctness verification of Query Results in Data Outsourcing [Volume 1, Issue 1, 2014, Pages 3-14]
Linear Utility
DOPPONENT: A Socially Efficient Preference Model of Opponent in Bilateral Multi Issue Negotiations [Volume 1, Issue 4, 2014, Pages 283-292]
Local Binary Patterns
Semantic Segmentation of Aerial Images Using Fusion of Color and Texture Features [Volume 1, Issue 3, 2014, Pages 225-238]
Location Data
A Sample-Based Approach to Data Quality Assessment in Spatial Databases with Application to Mobile Trajectory Nearest-Neighbor Search [Volume 1, Issue 3, 2014, Pages 239-249]
Natural Language Processing
Word Sense Disambiguation Based on Lexical and Semantic Features Using Naive Bayes Classifier [Volume 1, Issue 2, 2014, Pages 123-132]
Nearest Neighb or Method
DOPPONENT: A Socially Efficient Preference Model of Opponent in Bilateral Multi Issue Negotiations [Volume 1, Issue 4, 2014, Pages 283-292]
Network Security
An Efficient End to End Key Establishment Protocol for Wireless Sensor Networks [Volume 1, Issue 1, 2014, Pages 23-38]
Neural Network
Comparison of Hybrid and Filter Feature Selection Methods to Identify Candidate Single Nucleotide Polymorphisms [Volume 1, Issue 3, 2014, Pages 205-2013]
O
Opponent Modeling
DOPPONENT: A Socially Efficient Preference Model of Opponent in Bilateral Multi Issue Negotiations [Volume 1, Issue 4, 2014, Pages 283-292]
Order/Degree Problem
Unified Byte Permutations for the Block Cipher 3D [Volume 1, Issue 1, 2014, Pages 15-22]
P
Performance
Ranking of Common Architectural Styles Based on Availability, Security and Performance Quality Attributes [Volume 1, Issue 2, 2014, Pages 83-93]
Permutation
Unified Byte Permutations for the Block Cipher 3D [Volume 1, Issue 1, 2014, Pages 15-22]
Persian Language
PSA: A Hybrid Feature Selection Approach for Persian Text Classification [Volume 1, Issue 4, 2014, Pages 261-272]
Q
Quality Attributes
Ranking of Common Architectural Styles Based on Availability, Security and Performance Quality Attributes [Volume 1, Issue 2, 2014, Pages 83-93]
Quality Metrics
A Sample-Based Approach to Data Quality Assessment in Spatial Databases with Application to Mobile Trajectory Nearest-Neighbor Search [Volume 1, Issue 3, 2014, Pages 239-249]
Quantum Cryptography
A Weak Blind Signature Based on Quantum Key Distribution [Volume 1, Issue 3, 2014, Pages 179-186]
Quantum Key Distribution
A Weak Blind Signature Based on Quantum Key Distribution [Volume 1, Issue 3, 2014, Pages 179-186]
Quantum Payment
A Weak Blind Signature Based on Quantum Key Distribution [Volume 1, Issue 3, 2014, Pages 179-186]
Quantum Weak Blind Signature
A Weak Blind Signature Based on Quantum Key Distribution [Volume 1, Issue 3, 2014, Pages 179-186]
R
Random Forest
Semantic Segmentation of Aerial Images Using Fusion of Color and Texture Features [Volume 1, Issue 3, 2014, Pages 225-238]
Random Key Pre-distribution
An Efficient End to End Key Establishment Protocol for Wireless Sensor Networks [Volume 1, Issue 1, 2014, Pages 23-38]
Ranking Functions
Solution of the Generalized Interval Linear Programming Problems: Pessimistic and Optimistic Approaches [Volume 1, Issue 2, 2014, Pages 159-167]
Resource Allocation
Demand based Resource Allocation to Balance the Utilization and User Level Fairness in Femtocell Networks [Volume 1, Issue 3, 2014, Pages 187-204]
Ridge Regression
Comparison of Hybrid and Filter Feature Selection Methods to Identify Candidate Single Nucleotide Polymorphisms [Volume 1, Issue 3, 2014, Pages 205-2013]
Routing
An Optimal Traffic Distribution Method Supporting End-to-End Delay Bound [Volume 1, Issue 1, 2014, Pages 61-71]
Rule Weighting
A New Hybrid Approach for Modeling Accurate Fuzzy Rule Based Classification Systems [Volume 1, Issue 2, 2014, Pages 111-122]
S
Security
Ranking of Common Architectural Styles Based on Availability, Security and Performance Quality Attributes [Volume 1, Issue 2, 2014, Pages 83-93]
Semantic Segmentation
Semantic Segmentation of Aerial Images Using Fusion of Color and Texture Features [Volume 1, Issue 3, 2014, Pages 225-238]
Semi-supervised using user feedback
Improving Semi-supervised Constrained k-Means Clustering Method Using User Feedback [Volume 1, Issue 4, 2014, Pages 273-261]
Similarity Measure
A Novel Solution for Author Attribution Problem in Anonymous E-mail [Volume 1, Issue 4, 2014, Pages 319-327]
Simulated Annealing Algorithm
PSA: A Hybrid Feature Selection Approach for Persian Text Classification [Volume 1, Issue 4, 2014, Pages 261-272]
Single Nucleotide Polymorphisms
Comparison of Hybrid and Filter Feature Selection Methods to Identify Candidate Single Nucleotide Polymorphisms [Volume 1, Issue 3, 2014, Pages 205-2013]
Software Architecture
Ranking of Common Architectural Styles Based on Availability, Security and Performance Quality Attributes [Volume 1, Issue 2, 2014, Pages 83-93]
Spatial Big Data
A Sample-Based Approach to Data Quality Assessment in Spatial Databases with Application to Mobile Trajectory Nearest-Neighbor Search [Volume 1, Issue 3, 2014, Pages 239-249]
Stacking
Effective Intrusion Detection with a Neural Network Ensemble Using Fuzzy Clustering and Stacking Combination Method [Volume 1, Issue 4, 2014, Pages 293-305]
Subgradient Method
An Optimal Traffic Distribution Method Supporting End-to-End Delay Bound [Volume 1, Issue 1, 2014, Pages 61-71]
Support Vector Machine
Semantic Segmentation of Aerial Images Using Fusion of Color and Texture Features [Volume 1, Issue 3, 2014, Pages 225-238]
Symmetric Polynomial
An Efficient End to End Key Establishment Protocol for Wireless Sensor Networks [Volume 1, Issue 1, 2014, Pages 23-38]
T
Text Classification
PSA: A Hybrid Feature Selection Approach for Persian Text Classification [Volume 1, Issue 4, 2014, Pages 261-272]
Text Mining
Word Sense Disambiguation Based on Lexical and Semantic Features Using Naive Bayes Classifier [Volume 1, Issue 2, 2014, Pages 123-132]
Text Mining
PSA: A Hybrid Feature Selection Approach for Persian Text Classification [Volume 1, Issue 4, 2014, Pages 261-272]
Total Ordering
Solution of the Generalized Interval Linear Programming Problems: Pessimistic and Optimistic Approaches [Volume 1, Issue 2, 2014, Pages 159-167]
Traffic Distribution
An Optimal Traffic Distribution Method Supporting End-to-End Delay Bound [Volume 1, Issue 1, 2014, Pages 61-71]
U
Unsup ervised Learning
A Growing Hierarchical Approach to Batch Linear Manifold Topographic Map Formation [Volume 1, Issue 1, 2014, Pages 47-59]
User Demand
Demand based Resource Allocation to Balance the Utilization and User Level Fairness in Femtocell Networks [Volume 1, Issue 3, 2014, Pages 187-204]
Utilization
Demand based Resource Allocation to Balance the Utilization and User Level Fairness in Femtocell Networks [Volume 1, Issue 3, 2014, Pages 187-204]
W
Wireless Sensor Networks
An Efficient End to End Key Establishment Protocol for Wireless Sensor Networks [Volume 1, Issue 1, 2014, Pages 23-38]
Word Sense Disambiguation
Word Sense Disambiguation Based on Lexical and Semantic Features Using Naive Bayes Classifier [Volume 1, Issue 2, 2014, Pages 123-132]
Writeprint
A Novel Solution for Author Attribution Problem in Anonymous E-mail [Volume 1, Issue 4, 2014, Pages 319-327]