Site Tops

:: Most Visited Articles
Hybrid of Evolutionary and Swarm Intelligence Algorithms for Prosody Modeling in Natural Speech Synthesis (556 Views)
Keyphrase Ranking Based on Second Order Co-Occurrence Analysis (488 Views)
Pruning Concept Map to Geneate Ontology (487 Views)
Spectral-Spatial Feature Transformations With Controlling Contextual Information Through Smoothing Filtering and Morphological Analysis (483 Views)
An Incentive Mechanism to Mitigate the Free-riding in VoD Streaming over Hybrid CDN-P2P Networks (457 Views)
A Survey of Advanced Search Techniques in Unstructured P2P Networks (455 Views)
Persian to English Personal Name Transliteration Based On the Persian Web Contents (439 Views)
Intrusion Detection System Using SVM as Classifier and GA for Optimizing Feature Vectors (407 Views)
Decreasing the Average Delay, Connectivity, and Routing Load in Clustered Mobile Ad- Hoc Networks (398 Views)
How Open Source Software Succeeds? A Review of Research on Success of Open Source Software (362 Views)
Enhanced Iterative Detection of Hierarchically Modulated Signals using VB-EM Algorithm (356 Views)
Recommending Friends in Social Networks By Users' Profiles And Using Classification Algorithms (347 Views)
Customer Clustering Based on Customer Lifetime Value: A Case Study of an Iranian Bank (337 Views)
A Secure Attribute-Based Keyword Search Scheme Against Keyword Guessing And Chosen Keyword Attack (330 Views)
A Clustering Based Feature Selection Approach to Detect Spam in Social Networks (329 Views)
ON THE CORRECTNESS OF A TRANSLATION MAP BETWEEN SPECIFICATIONS IN Z AND SETL2 PROTOTYPE (326 Views)
Speaker-Dependent Speech Enhancement Using Codebook-based Synthesis for Low SNR Applications (322 Views)
All Optical Logic Gates: A Tutorial (308 Views)
Using Hybrid of Eigenface and Imperialist Competition Algorithm for Feature Selection in Face Recognition (303 Views)
Joint Power Adaptation and Interference Avoidance for Unlicensed Wireless Systems: A Game Theoretic Approach (301 Views)
QoS-aware web service composition using Gray Wolf Optimizer (298 Views)
Predicting Network Attacks Using Ontology-Driven Inference (294 Views)
Cloud-Based Large-Scale Sensor Networks: Motivation, Taxonomies, and Open Challenges (293 Views)
Analysis the Effects of Internet of Things Technology in Managing Supply Chain (292 Views)
A Fairness-Guaranteed Game-Theoretic Perspective in Multi-User Interference Channel (286 Views)
    ... More
:: Most Downloaded Articles
ON THE CORRECTNESS OF A TRANSLATION MAP BETWEEN SPECIFICATIONS IN Z AND SETL2 PROTOTYPE (191 Downloads)
A Security Mechanism for Detecting Intrusions in Internet of Things Using Selected Features Based on MI-BGSA (169 Downloads)
Spectral-Spatial Feature Transformations With Controlling Contextual Information Through Smoothing Filtering and Morphological Analysis (165 Downloads)
Persian to English Personal Name Transliteration Based On the Persian Web Contents (162 Downloads)
Intrusion Detection System Using SVM as Classifier and GA for Optimizing Feature Vectors (161 Downloads)
Customer Clustering Based on Customer Lifetime Value: A Case Study of an Iranian Bank (155 Downloads)
A Clustering Based Feature Selection Approach to Detect Spam in Social Networks (151 Downloads)
Analysis the Effects of Internet of Things Technology in Managing Supply Chain (150 Downloads)
An Incentive Mechanism to Mitigate the Free-riding in VoD Streaming over Hybrid CDN-P2P Networks (149 Downloads)
All Optical Logic Gates: A Tutorial (148 Downloads)
A Secure Attribute-Based Keyword Search Scheme Against Keyword Guessing And Chosen Keyword Attack (140 Downloads)
Predicting Network Attacks Using Ontology-Driven Inference (140 Downloads)
Decreasing the Average Delay, Connectivity, and Routing Load in Clustered Mobile Ad- Hoc Networks (136 Downloads)
Using Dependency Tree Grammar to Enhance the Reordering Model of Statistical Machine Translation Systems (136 Downloads)
Joint Antenna Selection and Adaptive Modulation in MIMO Systems in the Presence of CSI Imperfection (131 Downloads)
A Novel Trust Evaluation Model Using Graph Clustering Approach (131 Downloads)
A Framework to Create a Certificate for e-Commerce Secure Transaction Protocol (130 Downloads)
A Priority-based Fast Optimal Computation Offloading Planner for Mobile Cloud Computing (128 Downloads)
A Novel Density based Clustering Method using Nearest and Farthest Neighbor with PCA (127 Downloads)
A Weighted Soft-Max PNLMS Algorithm for Sparse System Identification (126 Downloads)
Recommending Friends in Social Networks By Users' Profiles And Using Classification Algorithms (125 Downloads)
An Attack-Defense Model for the Binder on the Android Kernel Level (125 Downloads)
Critical Success factors for implementing PACS Technology in Iran's Hospitals (124 Downloads)
SDTE: Software Defined Traffic Engineering for Improving Data Center Network Utilization (123 Downloads)
Enhanced Iterative Detection of Hierarchically Modulated Signals using VB-EM Algorithm (122 Downloads)
    ... More
:: Most studied contents
Editorial Board ( 2642 view)
Submission Preparation Checklist ( 891 view)
About the Journal ( 618 view)
New Journal website launched ( 529 view)
Contact ( 525 view)
Information For Authors ( 519 view)
Aims & Scopes ( 424 view)
welcome ( 81 view)
    ... More
:: Most sent contents
welcome ( 1 send)
    ... More
:: Most printed contents
Submission Preparation Checklist ( 426 print)
Information For Authors ( 123 print)
New Journal website launched ( 68 print)
Editorial Board ( 60 print)
About the Journal ( 55 print)
Aims & Scopes ( 49 print)
Contact ( 43 print)
welcome ( 34 print)
    ... More