Journal: Iran J. Comput. Sci.

Volume 4, Issue 4

221 -- 240Zeinab Javidi, Reza Akbari, Omid Bushehrian. A new method based on formal concept analysis and metaheuristics to solve class responsibility assignment problem
241 -- 252Mansi Subhedar. Cover selection technique for secure transform domain image steganography
253 -- 264Shamsollah Ghanbari, Mohamed Othman. A multi-criteria approach to time cheating in the divisible load scheduling
265 -- 280Varun Gupta, Monika Mittal, Vikas Mittal, Anshu Gupta. ECG signal analysis using CWT, spectrogram and autoregressive technique
281 -- 292Iwasokun Gabriel Babatunde, Monday Olutayo Olaoye. Discrete transformation technique for video compression
293 -- 303Sanjeev Karmakar, Shreerup Goswami. A new procedure for optimization of hidden layer neurons during learning through gradient descent process of neural network and improvement of performance in the chaos forecasting
305 -- 317Yashar salami, Yaser Ebazadeh, Vahid Khajehvand. CE-SKE: cost-effective secure key exchange scheme in Fog Federation

Volume 4, Issue 3

1 -- 24Arash Deldari, Alireza Salehan. A survey on preemptible IaaS cloud instances: challenges, issues, opportunities, and advantages
133 -- 145Chandan Saha, Md. Foisal Hossain, Md. Asadur Rahman. NSCT-based robust image watermarking in DC components of APDCBT using singular value decomposition
171 -- 183Shahzad Ashraf, Tauqeer Ahmed, Sehrish Saleem. NRSM: node redeployment shrewd mechanism for wireless sensor network
185 -- 194Jafar Tavoosi. Designing a new recurrent convolutional neural network for face detection and recognition in a color image
195 -- 200Krishna Kumar Mohbey, Sunil Kumar. A parallel approach for high utility-based frequent pattern mining in a big data environment
201 -- 210Rehman Mubashar, Muhammad Abubakar Siddique, Ateeq Ur Rehman, Adeel Asad, Asad Rasool. Comparative performance analysis of short-range wireless protocols for wireless personal area network
211 -- 219Syed Waleed, Inam Ullah, Wali Ullah Khan, Ateeq Ur Rehman 0002, Taj Rahman, Shanbin Li. Resource allocation of 5G network by exploiting particle swarm optimization

Volume 4, Issue 2

67 -- 84Ibrahim Gad, Doreswamy Hosahalli, B. R. Manjunatha, Osama A. Ghoneim. A robust deep learning model for missing value imputation in big NCDC dataset
85 -- 93M. Sathish Kumar, B. Indrani. Frequent rule reduction for phishing URL classification using fuzzy deep neural network model
95 -- 114Franklin Tchakounté, Roger Corneille Ndjeumou Ngassi, Vivient Corneille Kamla, Kalum Priyanath Udagepola. LimonDroid: a system coupling three signature-based schemes for profiling Android malware
115 -- 124Rahul. Automatic identification and classification of power quality events using a hybrid intelligent approach
125 -- 132Md. Motiul Islam, Md. Abul Kashem. Parametric active contour model-based tumor area segmentation from brain MRI images using minimum initial points

Volume 4, Issue 1

1 -- 16Boumediene Selma, Samira Chouraqui, Belkacem Selma, Hassane Abouaïssa. ANFIS controller design based on pigeon-inspired optimization to control an UAV trajectory tracking task
17 -- 34Mozhdeh Zandifar, Jafar Tahmoresnezhad. Locality Fisher discriminant analysis for conditional domain adaption
35 -- 43Sara Besharati, Hadi Veisi, Ali Darzi, Seyed Habib Hosseini Saravani. A hybrid statistical and deep learning based technique for Persian part of speech tagging
45 -- 58S. M. Saklain Galib, Sheikh Md. Rabiul Islam, Md. Asadur Rahman. A multiple linear regression model approach for two-class fNIR data classification
59 -- 66Mohammad Reza Mohammadi, Fatemeh Rustaee. Hierarchical classification of fine-art paintings using deep neural networks