Site Tops

:: Most Visited Articles
A Framework for Optimal Fault Tolerance Protocol Selection Using Fuzzy Logic on IoT Sensor Layer (2126 Views)
Speaker-Dependent Speech Enhancement Using Codebook-based Synthesis for Low SNR Applications (1741 Views)
Spatial Interference Alignment in Relay-Assisted Multi-Cell Multi-User Networks (1497 Views)
Multi-Objective Response to Co-Resident Attacks in Cloud Environment (1489 Views)
An Opportunistic Cooperative Approach for Dynamic Spectrum Leasing in Cognitive Radio Networks (1484 Views)
Analysis Method for Spherical Dipole Antenna Array (1461 Views)
Persian Wordnet Construction using Supervised Learning (1457 Views)
Fast GLCM and Gabor Filters for Texture Classification of Very High Resolution Remote Sensing Images (1446 Views)
Persian to English Personal Name Transliteration Based On the Persian Web Contents (1413 Views)
Designing and Developing a Wordnet for Persian Nouns Pages (1411 Views)
Pruning Concept Map to Geneate Ontology (1361 Views)
A Reliable Transport Protocol for Wireless Sensor Networks (1351 Views)
An Incentive Mechanism to Mitigate the Free-riding in VoD Streaming over Hybrid CDN-P2P Networks (1315 Views)
Joint Power Adaptation and Interference Avoidance for Unlicensed Wireless Systems: A Game Theoretic Approach (1314 Views)
Spectral-Spatial Feature Transformations With Controlling Contextual Information Through Smoothing Filtering and Morphological Analysis (1274 Views)
Keyphrase Ranking Based on Second Order Co-Occurrence Analysis (1268 Views)
Decreasing the Average Delay, Connectivity, and Routing Load in Clustered Mobile Ad- Hoc Networks (1244 Views)
Hybrid of Evolutionary and Swarm Intelligence Algorithms for Prosody Modeling in Natural Speech Synthesis (1236 Views)
All Optical Logic Gates: A Tutorial (1228 Views)
Learners Grouping in E-Learning Environment Using Evolutionary Fuzzy Clustering Approach (1209 Views)
HWS: A Hierarchical Word Spotting Method for Farsi Printed Words Through Word Shape Coding (1172 Views)
Intrusion Detection System Using SVM as Classifier and GA for Optimizing Feature Vectors (1163 Views)
Low Cost Millimeter Wave Duplexer Design Using Mixed Mode Matching and Integral Contour Methods (1146 Views)
ON THE CORRECTNESS OF A TRANSLATION MAP BETWEEN SPECIFICATIONS IN Z AND SETL2 PROTOTYPE (1097 Views)
Recommending Friends in Social Networks By Users' Profiles And Using Classification Algorithms (1092 Views)
Customer Clustering Based on Customer Lifetime Value: A Case Study of an Iranian Bank (1089 Views)
A Clustering Based Feature Selection Approach to Detect Spam in Social Networks (1080 Views)
A Survey of Advanced Search Techniques in Unstructured P2P Networks (1077 Views)
The Effect of Information Sharing on the Assessment of Supply Chain Performance in Uncertain Conditions (1070 Views)
Enhanced Iterative Detection of Hierarchically Modulated Signals using VB-EM Algorithm (1058 Views)
A Conceptual Framework and Architectural Considerations for Capability Enhancement in Software Defined Networks (1057 Views)
EDBPM: An Event-Driven Business Process Monitoring Mechanism (1047 Views)
A Timelier Credit Card Fraud Detection by Mining Transaction Time Series (1045 Views)
Analysis the Effects of Internet of Things Technology in Managing Supply Chain (1024 Views)
A Secure Attribute-Based Keyword Search Scheme Against Keyword Guessing And Chosen Keyword Attack (1015 Views)
QoS-aware web service composition using Gray Wolf Optimizer (1003 Views)
An Attack-Defense Model for the Binder on the Android Kernel Level (996 Views)
Practical Detection of Click Spams Using Efficient Classification-Based Algorithms (993 Views)
Skin Classification for Adult Image Recognition Based on Combination of Gaussian and Weight-KNN (989 Views)
Impact of Empowering Communication Technology Practices on Service Performance in Information Technology Sector (987 Views)
Using Hybrid of Eigenface and Imperialist Competition Algorithm for Feature Selection in Face Recognition (984 Views)
How Open Source Software Succeeds? A Review of Research on Success of Open Source Software (984 Views)
A Fairness-Guaranteed Game-Theoretic Perspective in Multi-User Interference Channel (959 Views)
Ensemble Link Predictor for Heterogeneous Complex Networks (958 Views)
Energy Based Clustering Self Organizing Map Protocol For Wireless Sensor Networks (952 Views)
Cloud-Based Large-Scale Sensor Networks: Motivation, Taxonomies, and Open Challenges (947 Views)
Using Dependency Tree Grammar to Enhance the Reordering Model of Statistical Machine Translation Systems (943 Views)
A New Fractional Adaptive Filtering Method and its Application in Speech Enhancement (941 Views)
Analysis of an RFID Authentication Protocol in Accordance with EPC Standards (937 Views)
DMTC-EBSC: A Novel Decision Making Technique in Cloud Environment Based on Extended BSC (935 Views)
Total Sum: 245573