Abstract is missing.
- A practical resource management prototype for mobile networksM. A. Nourian, Amir Kusedghi, Ahmad Akbari. 1-6 [doi]
- Polarimetric SAR Classification Using Ridge Regression-Based Polarimetric-Spatial Feature ExtractionMaryam Imani. 1-5 [doi]
- A Novel Design of Quantum 3: 8 Decoder Circuit using Reversible Logic for Improvement in Key Quantum Circuit Design ParametersSeyyed Mohammad Amir Mirizadeh, Mohammad Mahdi Emadi Kouchak, Mohammad Mahdi Panahi. 1-5 [doi]
- Static Detection of Ransomware Using LSTM Network and PE HeaderFarnoush Manavi, Ali Hamzeh. 1-5 [doi]
- A Digital Maturity Model for digital banking revolution for Iranian banksFaezeh Goumeh, Ahmad Abdollahzadeh Barforoush. 1-6 [doi]
- PERMUTE: Response Time and Energy Aware Virtual Machine Placement for Cloud Data CentersBenyamin Eslami, Morteza Biabani, Mohsen Shekarisaz, Nasser Yazdani. 1-7 [doi]
- Multivariate Time-Series Prediction Using LSTM Neural NetworksReza Ghanbari, Keivan Borna. 1-5 [doi]
- A Hierarchical Method for Kannada-MNIST Classification Based on Convolutional Neural NetworksAli Beikmohammadi, Najmeh Zahabi. 1-6 [doi]
- User recommendation based on Hybrid filtering in Telegram messengerDavod Karimpour, Mohammad Ali Zare Chahooki, Ali Hashemi. 1-7 [doi]
- Stochastic Spintronic Neuron with Application to Image BinarizationAbdolah Amirany, Masoud Meghdadi, Mohammad Hossein Moaiyeri, Kian Jafari. 1-5 [doi]
- The effect of increasing the algebraic connectivity on cascading failures in power grid networksZahra Nekudari, Abdorasoul Ghasemi. 1-4 [doi]
- Fuzzy Optimal Control Approach in Low-Thrust Orbit Transfer ProblemAliakbar Razavi, Amirreza Kosari. 1-7 [doi]
- Fine-grain Computation Offloading Considering Application Components' SequencingRazie Roostaei, Marzieh Sheikhi, Zeinab Movahedi. 1-5 [doi]
- DE-GCN: Differential Evolution as an optimization algorithm for Graph Convolutional NetworksShakiba Tasharrofi, Hassan Taheri. 1-6 [doi]
- A New Disease Candidate Gene Prioritization Method Using Graph Convolutional NetworksSaeid Azadifar, Ali Ahmadi. 1-5 [doi]
- Design and Simulation of OR Logic Gate Using RF MEMS ResonatorsMahdi Attar, Reza Askari Moghadam, Alireza Rezaee. 1-6 [doi]
- Learning to Predict Software TestabilityMorteza Zakeri Nasrabadi, Saeed Parsa. 1-5 [doi]
- Semantic Segmentation of Autonomous Driving Images by the Combination of Deep Learning and Classical SegmentationMohammad Hosein Hamian, Ali Beikmohammadi, Ali Ahmadi, Babak Nasersharif. 1-6 [doi]
- Significantly improving human detection in low-resolution images by retraining YOLOv3Shima Pouyan, Mostafa Charmi, Ali Azarpeyvand, Hossein Hassanpoor. 1-6 [doi]
- A Geometric Algorithm for Fault-Tolerant Classification of COVID-19 Infected PeopleFarnaz Sheikhi, Sharareh Alipour. 1-5 [doi]
- Automatic Personality Perception Using Autoencoder And Hierarchical Fuzzy ClassificationEffat Jalaeian Zaferani, Mohammad Teshnehlab, Mansour Vali. 1-7 [doi]
- A Model-Based on Filtration Technique for Speckle Noise Removal from Ultrasound ImagesMaryam Mohammadi, Reza Mokhtari. 1-5 [doi]
- A 3D Deep Learning Approach for Classification of Gait Abnormalities Using Microsoft Kinect V2 SensorMilad Shoryabi, Ali Foroutannia, Alireza Rowhanimanesh. 1-4 [doi]
- Leveraging ParsBERT and Pretrained mT5 for Persian Abstractive Text SummarizationMehrdad Farahani, Mohammad Gharachorloo, Mohammad Manthouri. 1-6 [doi]
- A Semantic-based Feature Extraction Method Using Categorical Clustering for Persian Document ClassificationSaeedeh Davoudi, Sayeh Mirzaei. 1-5 [doi]
- A New Approach for Mapping of Soccer Robot Agents Position to Real Filed Based on Multi-Core Fuzzy ClusteringSeyed Omid Azarkasb, Seyed Hossein Khasteh. 1-5 [doi]
- Water Cycle Algorithm-Based Control for Optimal Consensus ProblemRamin Fotouhi, Mahdi Pourgholi. 1-5 [doi]
- The Effect of Using Masked Language Models in Random Textual Data AugmentationMohammad Amin Rashid, Hossein Amirkhani. 1-5 [doi]
- Spatio-Temporal 3D Action Recognition with Hierarchical Self-Attention MechanismSoheil Araei, Ali Nadian Ghomsheh. 1-5 [doi]
- Feature Selection in Multi-label Classification based on Binary Quantum Gravitational Search AlgorithmHojat Noormohammadi, Mohammad Bagher Dowlatshahi. 1-6 [doi]
- Implementing a Scalable Data Management System for Collected Data by Smart MetersFarzane Farahani, Fatemeh Rezaei. 1-5 [doi]
- SIN: A Programmable Platform for Swarm RoboticsAli Foroutannia, Milad Shoryabi, Amirali Alizadeh Anaraki, Alireza Rowhanimanesh. 1-5 [doi]
- Speed up Cassandra read path by using Coordinator CacheLatifa Azizi Vakili, Nasser Yazdani. 1-5 [doi]
- Secure Determining of the k-th Greatest Element Among Distributed Private ValuesMehrad Jaberi, Hamid Mala. 1-5 [doi]
- Ranking Synthetic Features for Generative Zero-Shot LearningShayan Ramazi, Ali Nadian Ghomsheh. 1-5 [doi]
- Aspects Extraction for Aspect Level Opinion Analysis Based on Deep CNNAli Alemi Matin Pour, Saeed Jalili. 1-6 [doi]
- Analysis of incentive mechanism in RepchainMojdeh Hemati, Mehdi Shajari. 1-5 [doi]
- Injection Shilling Attack Tool for Recommender SystemsFatemeh Rezaimehr, Chitra Dadkhah. 1-4 [doi]
- Zero-Shot Estimation of Base Models' Weights in Ensemble of Machine Reading Comprehension Systems for Robust GeneralizationRazieh Baradaran, Hossein Amirkhani. 1-5 [doi]
- Effective synthetic data generation for fake user detectionArefeh Esmaili, Saeed Farzi. 1-5 [doi]
- A Face-Mask Detection Approach based on YOLO Applied for a New Collected DatasetSahand Abbasi, Haniyeh Abdi, Ali Ahmadi. 1-6 [doi]
- An SDN-based Firewall for Networks with Varying Security RequirementsGhazal Rezaei, Massoud Reza Hashemi. 1-7 [doi]
- A Mobility-Aware Caching Scheme in Heterogeneous Cellular NetworksSeyyed Amir Ahmad Siahpoosh, Fatemeh Rezaei. 1-4 [doi]
- Heightmap Reconstruction of Macula on Color Fundus Images Using Conditional Generative Adversarial NetworksPeyman Tahghighi, Reza A. Zoroofi, Sare Safi, Alireza Ramezani, Hamid Ahmadieh. 1-6 [doi]
- Content-based Clothing Recommender System using Deep Neural NetworkNarges Yarahmadi Gharaei, Chitra Dadkhah, Lorence Daryoush. 1-6 [doi]
- A Recurrent Neural Network Approach to Model Failure Rate Considering Random and Deteriorating FailuresAli Alizadeh, Navid Malek Alayi, Alireza Fereidunian, Hamid Lesani. 1-7 [doi]
- Identity Recognition based on Convolutional Neural Networks Using Gait DataF. Faraji, Faraz Lotfi, M. Majdolhosseini, M. Jafarian, Hamid D. Taghirad. 1-6 [doi]
- ParsBERT Post-Training for Sentiment Analysis of Tweets Concerning Stock MarketMohammadjalal Pouromid, Arman Yekkehkhani, Mohammadreza Asghari Oskoei, Amin Aminimehr. 1-4 [doi]
- Optimal ATM Cash Replenishment Planning in a Smart City using Deep Q-NetworkMohammadhossein Kiyaei, Farkhondeh Kiaee. 1-5 [doi]
- Channel Estimation using Block Sparse Joint Orthogonal Matching Pursuit in Massive MIMO SystemsNasser Sadeghi, Masoumeh Azghani. 1-5 [doi]
- A Network Intrusion Detection Approach at the Edge of FogSeyed Omid Azarkasb, Saeed Sedighian Kashi, Seyed Hossein Khasteh. 1-6 [doi]
- Improving ranking function and diversification in interactive recommendation systems based on deep reinforcement learningVahid Baghi, Seyed Mohammad Seyed Motehayeri, Ali Moeini, Rooholah Abedian. 1-7 [doi]
- Telegram group recommendation based on users' migrationDavod Karimpour, Mohammad Ali Zare Chahooki, Ali Hashemi. 1-6 [doi]
- Identifying the relationship between human self-esteem and general health using data miningMilad Motallebi Shabestari, Ali Ahmadi. 1-5 [doi]
- DPSA: A Brief Review for Design Pattern Selection ApproachesAmene Naghdipour, Seyed Mohammad Hossien Hasheminejad, Mohammad Reza Keyvanpour. 1-6 [doi]
- Investigation of the Place of BIAN Standard in Digital Banking Enterprise ArchitectureNarjes Farzi. 1-5 [doi]
- A practical system based on CNN-BLSTM network for accurate classification of ECG heartbeats of MIT-BIH imbalanced datasetArmin Shoughi, Mohammad Bagher Dowlatshahi. 1-6 [doi]
- Prediction of protein-peptide-binding amino acid residues regions using machine learning algorithmsShima Shafiee, Abdolhossein Fathi. 1-6 [doi]
- Solving TSP Problem in Cloud Computing using Improved Cultural AlgorithmSeyed Omid Azarkasb, Seyed Hossein Khasteh, Saeed Sedighian Kashi. 1-7 [doi]
- An Improved Distributed Access Control Model in Cloud Computing by BlockchainAkram Sabzmakan, Seyedeh Leili Mirtaheri. 1-4 [doi]
- Transfer Learning for End-to-End ASR to Deal with Low-Resource Problem in Persian LanguageMaryam Asadolahzade Kermanshahi, Ahmad Akbari, Babak Nasersharif. 1-5 [doi]
- A Novel Method for Detecting Fake news: Deep Learning Based on Propagation Path ConceptFatemeh Torgheh, Mohammad Reza Keyvanpour, Behrooz Masoumi, Seyed Vahab Shojaedini. 1-5 [doi]
- Subspace Outlier Detection in High Dimensional Data using Ensemble of PCA-based SubspacesMahboobeh Riahi-Madvar, Babak Nasersharif, Ahmad Akbari Azirani. 1-5 [doi]
- Design of an IoT-based Flood Early Detection System using Machine LearningFatereh Sadat Mousavi, Saleh Yousefi, Hirad Abghari, Ardalan Ghasemzadeh. 1-7 [doi]
- Sentiment Analysis of Persian-English Code-mixed TextsNazanin Sabri, Ali Edalat, Behnam Bahrak. 1-4 [doi]
- Duplicated Replay Buffer for Asynchronous Deep Deterministic Policy GradientSeyed Mohammad Seyed Motehayeri, Vahid Baghi, Ehsan Maani Miandoab, Ali Moeini. 1-6 [doi]
- A Neuro-Fuzzy Classifier Based on Evolutionary AlgorithmsAmir Soltany Mahboob, Mohammad Reza Ostadi Moghaddam. 1-7 [doi]
- Attribute-Image Similarity Measure for Multimodal Attention MechanismAli Salehi Najafabadi, Ali Nadian Ghomsheh. 1-6 [doi]
- A Novel Wireless Network-on-Chip Architecture for Multicore SystemsEsmaeel Tahanian, Mohsen Rezvani, Mansoor Fateh. 1-8 [doi]
- GITCBot: A Novel Approach for the Next Generation of C&C MalwareSaeid Ghasemshirazi, Ghazaleh Shirvani. 1-6 [doi]
- A New Fragile Watermarking based on Distributed Hamming CodeFaeze Rasouli, Mohammad Taheri. 1-5 [doi]
- Ontology-Based Design Pattern SelectionAmene Naghdipour, Seyed Mohammad Hossin Hasheminejad. 1-7 [doi]
- FT-LFSR: A Fault Tolerant Architecture for Linear Feedback Shift RegistersMohammad Zaree, Mohsen Raji. 1-6 [doi]
- On the Possibility of Creating Smart Contracts on Bitcoin by MPC-based ApproachesAhmad Jahanbin, Mohammad Sayad Haghighi. 1-7 [doi]
- Click-Through Rate Prediction Using Feature Engineered Boosting AlgorithmsMohamadreza Bakhtyari, Saye Mirzaei. 1-5 [doi]
- An Algorithm for Optimizing Small-Large Outer Join in Cloud Computing EnvironmentFarshad Delavarpour, Ali Ahmadi. 1-5 [doi]
- Designing a New Method for Detecting Money Laundering based on Social Network AnalysisMaryam Mahootiha, Alireza Hashemi Golpayegani, Babak Sadeghian. 1-7 [doi]
- A Multi-Classifier System for Rock Mass Crack Segmentation Based on Convolutional Neural NetworksMohammadreza Asadi, Mohammad Taghi Sadeghi, Alireza Yarahmadi Bafghi. 1-6 [doi]
- Solving Navigation and Obstacle Avoidance in Soccer Robot using Case-Base Reasoning TechniqueSeyed Omid Azarkasb, Seyed Hossein Khasteh. 1-6 [doi]
- A Method for Rate-Distortion-Complexity Optimization in Versatile Video Coding StandardAmir Rezaeieh, Hoda Roodaki. 1-5 [doi]
- Graph Representation Learning In A Contrastive Framework For Community DetectionMehdi Balouchi, Ali Ahmadi. 1-5 [doi]
- Intelligent Control of Urban Intersection Traffic Light Based on Reinforcement Learning AlgorithmMoein Raeisi, Amir Soltany Mahboob. 1-5 [doi]
- Topology-Aware Graph Signal Sampling for Pooling in Graph Neural NetworksAmirhossein Nouranizadeh, Mohammadjavad Matinkia, Mohammad Rahmati. 1-7 [doi]
- Solving Minimum Dominating Set in Multiplex Networks Using Learning AutomataMohammad Mehdi Daliri Khomami, Alireza Rezvanian, Ali Mohammad Saghiri, Mohammad Reza Meybodi. 1-6 [doi]
- The improved greedy gang scheduling by minimizing context switch conditionMaryam Sadat Mastoori, Ghazal Rahmanian. 1-5 [doi]
- Reusability Metrics in Search-Based Testing of Software Product Lines: An ExperimentationMasoud Fathi, Sedigheh Khoshnevis. 1-6 [doi]