Abstract is missing.
- Controlling the Pandemic of COVID-19 based on Telecommunication DataAli Soleymani, Seyed Hossein Ghoreishi. 1-7 [doi]
- Fault-Localization in Water Distribution Networks using Hierarchical Anomaly AnalysisSara Mirzaie, Omid Bushehrian. 1-5 [doi]
- Presenting method to schedule tasks in the cloud computing environment using the whale optimization algorithmArmin Tavakoli Dinani, Meqdad Mirabi, Maryam Khademi. 1-6 [doi]
- Forgery Attack on An Outsourced Attribute-Based Signature SchemeSaeideh Kabirirad, Ziba Eslami. 1-4 [doi]
- Attention-based Persian Language ModelingArman Yekkehkhani, Mohammadjalal Pouromid, Mohammad Bahrani. 1-5 [doi]
- GRACER: Improving the Accuracy of RACER Classifier Using A Greedy ApproachPeyman Hosseini, Alireza Basiri. 1-6 [doi]
- Brain Drain Optimization: a Novel Approach for Task Scheduling in the Cloud ComputingSayedAli Rad, Alireza Basiri. 1-6 [doi]
- Persian Stance Detection with Transfer Learning and Data AugmentationHoma Nasiri, Morteza Analoui. 1-5 [doi]
- Towards the Efficiency of the Fusion Step in Language-Based Fashion Image EditingMahta Darvish, Jamshid Shanbehzadeh, Azadeh Mansouri. 1-5 [doi]
- Time-aware MDP-based Service Migration in 5G Mobile Edge ComputingAli Shamsadini, Reza Entezari-Maleki. 1-5 [doi]
- Single- and Multi-UAV Trajectory Design Inspired by Head of Disk SchedulingShavbo Salehi, Behdis Eslamnour. 1-6 [doi]
- Determining COVID-19 Severity with Fuzzy Inference SystemNarges Mohebbi, Meysam Alavi, Mehrdad Kargari. 1-5 [doi]
- Group recommendation in Telegram by membership graph analyzingMotahareh Mohammad Rezai, Mohammad Ali Zare Chahooki. 1-7 [doi]
- A Practice of Human-Machine Collaboration for Persian Text SummarizationNasim Tohidi, Seyed Mohammad Hossein Hasheminejad. 1-5 [doi]
- Enriching Educational Content through Subgraph Semantic AnnotationMaedeh Mosharraf. 1-5 [doi]
- Automatic Generation of Business Intelligence Chatbot for OrganizationsMahdi Banisharif, Arman Mazloumzadeh, Mohammadreza Sharbaf, Bahman Zamani. 1-5 [doi]
- Efficiency of deep neural networks for reinforced concrete shear walls failure mode detectionMohammad Sadegh Barkhordari, Leonardo M. Massone. 1-4 [doi]
- A Flexible Cyclic Redundancy Codes' Selection to Increase Fault-Tolerance in Smart BuildingsMehrshad Khosraviani, Arash Ebrahim Pourzandi, Mohammad Reza Abbassian. 1-6 [doi]
- 2D HP protein folding using quantum genetic algorithmMoein Atari, Nayereh Majd. 1-8 [doi]
- A Convolutional Neuro-Fuzzy Network Using Fuzzy Image Segmentation for Acute Leukemia ClassificationZahra Boreiri, Alireza Norouzi Azad, Amin Ghodousian. 1-7 [doi]
- ROS-Based Co-Simulation for Formal Cyber-Physical Robotic System DesignMohammad Vazirpanah, Seyed Hosein Attarzadeh Niaki, Armin Salimi-Badr. 1-5 [doi]
- A decentralized and trustless e-voting system based on blockchain technologyDaria Golnarian, Kimia Saedi, Behnam Bahrak. 1-7 [doi]
- Distributed Constraint Programming based on Fuzzy Probability Applied to Aphasia DiagnosisFarnaz Sabahi. 1-7 [doi]
- Identification of Medicinal Plants in Ardabil Using Deep learning : Identification of Medicinal Plants using Deep learningJafar Abdollahi. 1-6 [doi]
- A Model-Based Approach for Representing Data Sharing Mechanism in Android ApplicationsAtefeh Nirumand, Bahman Zamani, Behrouz Tork Ladani. 1-7 [doi]
- A Deep Learning Embedded System for 3D Human Face Shape Reconstruction From a Single ImageShima Kamyab, Hamed Taghadosi, Zohreh Azimifar. 1-6 [doi]
- A Robust, Lightweight Deep Learning Approach for Detection and Mitigation of DDoS Attacks in SDNMohsen Meamarian, Naser Yazdani. 1-7 [doi]
- Imaging Time Series for Deep Embedded Clustering: a Cryptocurrency Regime Detection Use CaseAmin Najafgholizadeh, Arman Nasirkhani, Hamid Reza Mazandarani, Hamid Reza Soltanalizadeh, Mohammad Sabokrou. 1-6 [doi]
- Spreader node detection based on the Perron-Frobenius theorem in complex networksNegin Samadi, Jafar Tanha, Sahar Hassanzadeh Mostafaei, Nazila Razzaghi-Asl, Soodabeh Imanzadeh. 1-5 [doi]
- Using Decision Tree as Local Interpretable Model in Autoencoder-based LIMENiloofar Ranjbar, Reza Safabakhsh. 1-7 [doi]
- Content-Based Telegram Group Recommender SystemMotahareh Mohammad Rezai, Mohammad Ali Zare Chahooki. 1-6 [doi]
- A Restricted 4PCS Algorithm for Registering Low Overlap Point CloudFatemeh Abdoni, Amir Mousavinia, Fatemeh Pazoki. 1-5 [doi]
- Locality and priority in Auction-based resource allocation in blockchain networkSeyed Amir Hossein Ahmadi, Naser Yazdani. 1-6 [doi]
- Flexible and Automatable Microfluidic-based Architecture and CAD Algorithm for Implementation of Large DNA Digital StorageMostafa Pourasadollah, Maryam Taajobian, Ali Jahanian 0001. 1-7 [doi]
- Accelerated 4PCS Algorithm for Point Cloud RegistrationFatemeh Pazoki, Amir Mousavinia, Fatemeh Abdoni. 1-5 [doi]
- HTS-DL: Hybrid Text Summarization System using Deep LearningMajid Abolghasemi, Chitra Dadkhah, Nasim Tohidi. 1-5 [doi]
- Improving the method of detecting Influenza outbreak in a location by analyzing Twitter data and comparing it with official statisticsJavad Rahimi, Leila Taheran, Ali Dabbagh. 1-5 [doi]
- Improved Rabin-Karp Algorithm Using Bloom FilterMasoumeh Moeini, Hadi Shahriar Shahhoseini. 1-5 [doi]
- TEMPPO: Twin Entropy Maximized Proximal Policy OptimizationS. A. Shahrokhi, Ali Ahmadi. 1-6 [doi]
- RGB image Encryption and Decryption with Neural Chaotic FunctionsBita Noori, Pedram Salehpoor, Hadi S. Aghdasi. 1-8 [doi]
- DDoS Attack Detection in OpenFlow Based NetworksSoodeh Asgari, Behzad Akbari. 1-7 [doi]
- An Artificial Intelligence System for Detecting the Types of the Epidemic from X-rays : Artificial Intelligence System for Detecting the Types of the Epidemic from X-raysJafar Abdollahi, Laya Mahmoudi. 1-6 [doi]
- Computation Offloading Strategy for Autonomous VehiclesMina Khoshbazm Farimani, Soroush Karimian Aliabadi, Reza Entezari-Maleki. 1-6 [doi]
- Unsupervised Anomaly Detection with an Enhanced Teacher for Student-Teacher Feature Pyramid MatchingMohammad Zolfaghari, Hedieh Sajedi. 1-4 [doi]
- Towards a Formalism for Specifying N-way Model Merging RulesMohammad-Sajad Kasaei, Mohammadreza Sharbaf, Bahman Zamani. 1-7 [doi]
- Employees Turnover Rate with Pivoted Length NormalizationGhazaleh Zehtab, Alireza Basiri. 1-4 [doi]
- PASR: Process-Aware Middleware Framework for Dynamic Service Replacement in SOAAli Irfan, Arif Ur Rahman, Noor-Ul-Ain. 1-6 [doi]
- Exploring the Similarities of Iranian Influencers with Regards to Content, Relationships and Interactions with UsersNazanin Sabri, Mohammad Saleh Mahdizadeh, Reyhaneh Akhavan Khantazi, Behnam Bahrak. 1-5 [doi]
- A Pattern-aware Design and Implementation Guideline for Microservice-based SystemsNeda Mohammadi, Abbas Rasoolzadegan. 1-6 [doi]
- C-MIFS: Cellucci's Mutual Information For Feature SelectionMansoureh Yari Eili, Jalal Rezaeenour. 1-5 [doi]
- Evaluating Various Feature Extraction Methods and Classification Algorithms for Music Genres ClassificationMohammadreza Bakhtyari, Saeedeh Davoudi, Sayeh Mirzaei. 1-6 [doi]
- SGFS: A semi-supervised graph-based feature selection algorithm based on the PageRank algorithmArefeh Dalvand, Mohammad Bagher Dowlatshahi, Amin Hashemi. 1-6 [doi]