researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Iran J. Comput. Sci.
Home
Index
Info
Volume
Volume
1
, Issue
4
199
--
216
Johannes Zenkert
,
André Klahold
,
Madjid Fathi
.
Knowledge discovery in multidimensional knowledge representation framework: An integrative approach for the visualization of text analytics results
217
--
225
V. I. Osubor
,
A. O. Egwali
.
A neuro fuzzy approach for the diagnosis of postpartum depression disorder
227
--
236
Sanjay Kumar Biswash
,
Mahasweta Sarkar
,
Dhirendra Kumar Sharma
.
Artificial immune system (AIS)-based location management scheme in mobile cellular networks
237
--
259
Ajeet Ram Pathak
,
Manjusha Pandey
,
Siddharth S. Rautaray
.
Construing the big data based on taxonomy, analytics and approaches
Volume
1
, Issue
3
133
--
145
Williams Sureshkumar
,
Kalpana Mahalingam
,
Raghavan Rama 0001
.
Labelled graph rules in P systems
147
--
153
Ashish Kumar
,
Monika Saini
.
Profit analysis of a computer system with preventive maintenance and priority subject to maximum operation and repair times
155
--
164
Mohammad Amini
,
Kourosh Eshghi
.
Constraint programming models and population-based simulated annealing algorithm for finding graceful and $$\alpha $$ α -labeling of quadratic graphs
165
--
174
Abbas Akkasi
.
Sentence-based undersampling for named entity recognition using genetic algorithm
175
--
186
A. H. M. Kamal
,
Mohammad Mahfuzul Islam
.
An image distortion-based enhanced embedding scheme
187
--
197
Mehdi Harounabadi
,
Andreas Mitschele-Thiel
,
Abbas Akkasi
.
LTE-D2D for connected cars: a survey on radio resource management schemes
Volume
1
, Issue
2
65
--
87
Islam Elgedawy
,
Sara Khurshid
,
Rahat Masood
,
Muhammad Awais Shibli
.
CRESCENT+: a self-protecting framework for reliable composite web service delivery
89
--
97
Mojtaba Mostafavi
,
Peyman Kabiri
.
Detection of repetitive and irregular hypercall attacks from guest virtual machines to Xen hypervisor
99
--
107
Ari M. Saeed
,
Tarik A. Rashid
,
Arazo M. Mustafa
,
Rawan A. Al-Rashid Agha
,
Ahmed S. Shamsaldin
,
Nawzad K. Al-Salihi
.
An evaluation of Reber stemmer with longest match stemmer technique in Kurdish Sorani text classification
109
--
128
Bahareh Nikpour
,
Hossein Nezamabadi-pour
.
HTSS: a hyper-heuristic training set selection method for imbalanced data sets
129
--
132
Ahmed Salah
.
QuTiP-package applications to five-level atom with one mode
Volume
1
, Issue
1
1
--
2
Ayaz Isazadeh
.
Message from the Editor-in-Chief: Prof. Ayaz Isazadeh
3
--
10
Timothy Arndt
.
Big Data and software engineering: prospects for mutual enrichment
11
--
17
Shahin Mohammadi
,
Abbas Nowzari-Dalini
.
A parallel algorithm for generation of RNA secondary structures with length n and k base-pairs
19
--
30
Islam Elgedawy
.
Machine consciousness as a service (MCaaS): a roadmap
31
--
46
Muhammad Shahid Iqbal
,
Bin Luo 0001
,
Tamoor Khan
,
Rashid Mehmood
,
Muhammad Sadiq
.
Heterogeneous transfer learning techniques for machine learning
47
--
64
Farhad Dadgostar
,
Abdolhossein Sarrafzadeh
.
Gesture-based human-machine interfaces: a novel approach for robust hand and face tracking