Site Tops

:: Most Visited Articles
Pruning Concept Map to Geneate Ontology (849 Views)
Joint Power Adaptation and Interference Avoidance for Unlicensed Wireless Systems: A Game Theoretic Approach (759 Views)
Persian to English Personal Name Transliteration Based On the Persian Web Contents (688 Views)
Hybrid of Evolutionary and Swarm Intelligence Algorithms for Prosody Modeling in Natural Speech Synthesis (673 Views)
Spectral-Spatial Feature Transformations With Controlling Contextual Information Through Smoothing Filtering and Morphological Analysis (669 Views)
An Incentive Mechanism to Mitigate the Free-riding in VoD Streaming over Hybrid CDN-P2P Networks (666 Views)
Keyphrase Ranking Based on Second Order Co-Occurrence Analysis (640 Views)
HWS: A Hierarchical Word Spotting Method for Farsi Printed Words Through Word Shape Coding (635 Views)
Decreasing the Average Delay, Connectivity, and Routing Load in Clustered Mobile Ad- Hoc Networks (623 Views)
A Survey of Advanced Search Techniques in Unstructured P2P Networks (584 Views)
Intrusion Detection System Using SVM as Classifier and GA for Optimizing Feature Vectors (579 Views)
Speaker-Dependent Speech Enhancement Using Codebook-based Synthesis for Low SNR Applications (564 Views)
ON THE CORRECTNESS OF A TRANSLATION MAP BETWEEN SPECIFICATIONS IN Z AND SETL2 PROTOTYPE (533 Views)
A Framework for Optimal Fault Tolerance Protocol Selection Using Fuzzy Logic on IoT Sensor Layer (525 Views)
Enhanced Iterative Detection of Hierarchically Modulated Signals using VB-EM Algorithm (507 Views)
Recommending Friends in Social Networks By Users' Profiles And Using Classification Algorithms (506 Views)
How Open Source Software Succeeds? A Review of Research on Success of Open Source Software (487 Views)
A Clustering Based Feature Selection Approach to Detect Spam in Social Networks (475 Views)
A Secure Attribute-Based Keyword Search Scheme Against Keyword Guessing And Chosen Keyword Attack (472 Views)
Customer Clustering Based on Customer Lifetime Value: A Case Study of an Iranian Bank (469 Views)
All Optical Logic Gates: A Tutorial (467 Views)
Low Cost Millimeter Wave Duplexer Design Using Mixed Mode Matching and Integral Contour Methods (463 Views)
Using Hybrid of Eigenface and Imperialist Competition Algorithm for Feature Selection in Face Recognition (448 Views)
Analysis the Effects of Internet of Things Technology in Managing Supply Chain (446 Views)
An Attack-Defense Model for the Binder on the Android Kernel Level (443 Views)
    ... More
:: Most Downloaded Articles
All Optical Logic Gates: A Tutorial (269 Downloads)
ON THE CORRECTNESS OF A TRANSLATION MAP BETWEEN SPECIFICATIONS IN Z AND SETL2 PROTOTYPE (264 Downloads)
A Security Mechanism for Detecting Intrusions in Internet of Things Using Selected Features Based on MI-BGSA (264 Downloads)
Analysis the Effects of Internet of Things Technology in Managing Supply Chain (253 Downloads)
Spectral-Spatial Feature Transformations With Controlling Contextual Information Through Smoothing Filtering and Morphological Analysis (251 Downloads)
A Conceptual Framework and Architectural Considerations for Capability Enhancement in Software Defined Networks (246 Downloads)
A Scalable Algorithm to Solve Distributed Constraint Optimization (245 Downloads)
Persian to English Personal Name Transliteration Based On the Persian Web Contents (241 Downloads)
Intrusion Detection System Using SVM as Classifier and GA for Optimizing Feature Vectors (235 Downloads)
An Incentive Mechanism to Mitigate the Free-riding in VoD Streaming over Hybrid CDN-P2P Networks (235 Downloads)
Customer Clustering Based on Customer Lifetime Value: A Case Study of an Iranian Bank (235 Downloads)
A Clustering Based Feature Selection Approach to Detect Spam in Social Networks (221 Downloads)
A Secure Attribute-Based Keyword Search Scheme Against Keyword Guessing And Chosen Keyword Attack (219 Downloads)
Critical Success factors for implementing PACS Technology in Iran's Hospitals (215 Downloads)
IECA: Intelligent Effective Crawling Algorithm for Web Pages (213 Downloads)
Predicting Network Attacks Using Ontology-Driven Inference (209 Downloads)
Decreasing the Average Delay, Connectivity, and Routing Load in Clustered Mobile Ad- Hoc Networks (207 Downloads)
Fast GLCM and Gabor Filters for Texture Classification of Very High Resolution Remote Sensing Images (203 Downloads)
A Novel Density based Clustering Method using Nearest and Farthest Neighbor with PCA (202 Downloads)
A Framework to Create a Certificate for e-Commerce Secure Transaction Protocol (201 Downloads)
A Priority-based Fast Optimal Computation Offloading Planner for Mobile Cloud Computing (200 Downloads)
Using Dependency Tree Grammar to Enhance the Reordering Model of Statistical Machine Translation Systems (199 Downloads)
QoS-aware web service composition using Gray Wolf Optimizer (198 Downloads)
A Novel Trust Evaluation Model Using Graph Clustering Approach (197 Downloads)
The Effect of Information Sharing on the Assessment of Supply Chain Performance in Uncertain Conditions (195 Downloads)
    ... More
:: Most studied contents
Editorial Board ( 4402 view)
Submission Preparation Checklist ( 1392 view)
About the Journal ( 1034 view)
Contact ( 822 view)
Information For Authors ( 815 view)
New Journal website launched ( 804 view)
Aims & Scopes ( 665 view)
welcome ( 111 view)
    ... More
:: Most sent contents
welcome ( 1 send)
    ... More
:: Most printed contents
Submission Preparation Checklist ( 607 print)
Information For Authors ( 156 print)
New Journal website launched ( 109 print)
Editorial Board ( 94 print)
About the Journal ( 86 print)
Contact ( 75 print)
Aims & Scopes ( 72 print)
welcome ( 50 print)
    ... More