|
Issue |
Title |
|
Volume 2, Issue 2, May 2013 |
A Multi Hop Clustering Algorithm For Reduce Energy Consumption in Wireless Sensor Networks |
Abstract
PDF
|
Mohammad Ahmadi, Mahdi Darvishi |
|
Volume 4, Issue 1, January 2015 |
A National Model to Supervise on Virtual Banking Systems through the Bank 2.0 Approach |
Abstract
PDF
|
Mehrpooya Ahmadalinejad, Seyyed Mohsen Hashemi |
|
Volume 4, Issue 6, November 2015 |
A new algorithm to create a profile for users of web site benefiting from web usage mining |
Abstract
PDF
|
masomeh khabazfazli, ali harounabadi, shahram jamali |
|
Volume 2, Issue 3, July 2013 |
A New Approach for Labeling Images Using CAPTCHA in Image Semantic Search Engines |
Abstract
PDF
|
Amir Golchini, Abolfazl Toroghi Haghighat, Hasan Rashidi |
|
Volume 2, Issue 3, July 2013 |
A New Approach To Focused Crawling: Combination of Text summarizing With Neural Networks and Vector Space Model |
Abstract
PDF
|
Fahim Mohammadi |
|
Volume 3, Issue 5, September 2014 |
A new centrality measure for probabilistic diffusion in network |
Abstract
PDF
|
Kiyotaka Ide, Akira Namatame, Loganathan Ponnambalam, Fu Xiuju, Rick Siow Mong Goh |
|
Volume 2, Issue 3, July 2013 |
A New Heuristic Constructing Minimal Steiner Trees inside Simple Polygons |
Abstract
PDF
|
Alireza Khosravinejad, Alireza Bagheri, Vahid Khosravinejad |
|
Volume 2, Issue 5, November 2013 |
A New Image Steganography Method Based on Pixel Neighbors and 6 Most Significant Bit(MSB) Compare |
Abstract
PDF
|
Mashallah Abbasi Dezfouli, Sajad Nikseresht, Seyed.Enayatallah Alavi |
|
Volume 3, Issue 2, March 2014 |
A New Robust Audio Signal Steganography Based On Multiple Chaotic Algorithms With Edge Detection Technique |
Abstract
PDF
|
Amir Houshang Arab Avval, Shahram Mohanna |
|
Volume 2, Issue 3, July 2013 |
A novel and robust method for automatic license plate recognition system based on pattern recognition |
Abstract
PDF
|
Reza Azad, Fatemeh Davami, Babak Azad |
|
Volume 2, Issue 5, November 2013 |
A Novel Approach for Regenerating a Secure and Reliable Password using Iris and Fingerprint |
Abstract
PDF
|
SOROUSH SHIEKHALHOKAMAII, MOHAMMAD AMIN PIRBONYEH |
|
Volume 2, Issue 4, September 2013 |
A Novel Feature Cloud Visualization for Depiction of Product Features Extracted from Customer Reviews |
Abstract
PDF
|
Tanvir Ahmad |
|
Volume 5, Issue 2, March 2016 |
A Novel Method for Iris Recognition Using BP Neural Network and Parallel Computing |
Abstract
PDF
|
Hamid Reza Sahebi, S. Askari |
|
Volume 5, Issue 1, January 2016 |
A Novel Performance Evaluation Approach for the College Teachers Based on Individual Contribution |
Abstract
PDF
|
XING Lining |
|
Volume 3, Issue 6, November 2014 |
A Novel Vernier-based Time to Digital Converter for Low-power RFID Sensor Tags |
Abstract
PDF
|
Seyed Hossein Shahrokhi, Mehdi Hosseinzadeh |
|
Volume 3, Issue 2, March 2014 |
A Quantum Optimization Model for Dynamic Resource Allocation in Networks |
Abstract
PDF
|
Yu QingPing, You XiaoMing, Liu Sheng |
|
Volume 3, Issue 3, May 2014 |
A Reliable and Hybrid Scheduling Algorithm based on Cost and Time Balancing for Computational Grid |
Abstract
PDF
|
Vahid GhaedRahmati, Seyed.Enayatallah Alavi, Iman Attarzadeh |
|
Volume 2, Issue 5, November 2013 |
A Review of Data Mining Techniques for Result Prediction in Sports |
Abstract
PDF
|
Maral Haghighat, Hamid Rastegari, Nasim Nourafza |
|
Volume 3, Issue 5, September 2014 |
A Review of Distributed Multi-Agent Systems Approach to Solve University Course Timetabling Problem |
Abstract
PDF
|
Hamed Babaei, Amin Hadidi |
|
Volume 3, Issue 1, January 2014 |
A Robust and Energy-Efficient DVFS Control Algorithm for GALS-ANoC MPSoC in Advanced Technology under Process Variability Constraints |
Abstract
PDF
|
Sylvain Durand, Hatem Zakaria, Laurent Fesquet, Nicolas Marchand |
|
Volume 4, Issue 6, November 2015 |
A Secure and Efficient Routing Protocol with Genetic Algorithm in Mobile Ad-hoc Networks |
Abstract
PDF
|
Atieh Moghaddam, Ali Payandeh |
|
Volume 3, Issue 5, September 2014 |
A Secure Maturity Model for Protecting e-Government Services: A Case of Tanzania |
Abstract
PDF
|
Mohamed D. Waziri, Zaipuna O. Yonah |
|
Volume 3, Issue 4, July 2014 |
A Secure Model for Remote Electronic Voting: A Case of Tanzania |
Abstract
PDF
|
Sylvester Kimbi, Irina Zlotnikova |
|
Volume 5, Issue 1, January 2016 |
A Simple Study on Search Engine Text Classification for Retails Store |
Abstract
PDF
|
Renien John Joseph, Samith Sandanayake, Thanuja Perera |
|
Volume 4, Issue 3, May 2015 |
A Strengthened Version of a Hash-based RFID Server-less Security Scheme |
Abstract
PDF
|
Shahab Abdolmaleky, Shahla Atapoor, Mohammad Hajighasemlou, Hamid Sharini |
|
26 - 50 of 346 Items |
<< < 1 2 3 4 5 6 7 8 9 10 > >> |