Site Tops

:: Most Visited Articles
A Framework for Optimal Fault Tolerance Protocol Selection Using Fuzzy Logic on IoT Sensor Layer (2961 Views)
Speaker-Dependent Speech Enhancement Using Codebook-based Synthesis for Low SNR Applications (2523 Views)
Multi-Objective Response to Co-Resident Attacks in Cloud Environment (2381 Views)
An Opportunistic Cooperative Approach for Dynamic Spectrum Leasing in Cognitive Radio Networks (2319 Views)
Spatial Interference Alignment in Relay-Assisted Multi-Cell Multi-User Networks (2310 Views)
Analysis Method for Spherical Dipole Antenna Array (2253 Views)
Persian Wordnet Construction using Supervised Learning (2249 Views)
Fast GLCM and Gabor Filters for Texture Classification of Very High Resolution Remote Sensing Images (2240 Views)
Persian to English Personal Name Transliteration Based On the Persian Web Contents (2235 Views)
All Optical Logic Gates: A Tutorial (2217 Views)
Low Cost Millimeter Wave Duplexer Design Using Mixed Mode Matching and Integral Contour Methods (2204 Views)
An Incentive Mechanism to Mitigate the Free-riding in VoD Streaming over Hybrid CDN-P2P Networks (2188 Views)
Designing and Developing a Wordnet for Persian Nouns Pages (2161 Views)
Pruning Concept Map to Geneate Ontology (2131 Views)
Spectral-Spatial Feature Transformations With Controlling Contextual Information Through Smoothing Filtering and Morphological Analysis (2112 Views)
Decreasing the Average Delay, Connectivity, and Routing Load in Clustered Mobile Ad- Hoc Networks (2080 Views)
Joint Power Adaptation and Interference Avoidance for Unlicensed Wireless Systems: A Game Theoretic Approach (2079 Views)
A Reliable Transport Protocol for Wireless Sensor Networks (2054 Views)
Customer Clustering Based on Customer Lifetime Value: A Case Study of an Iranian Bank (2024 Views)
Keyphrase Ranking Based on Second Order Co-Occurrence Analysis (2019 Views)
Hybrid of Evolutionary and Swarm Intelligence Algorithms for Prosody Modeling in Natural Speech Synthesis (2014 Views)
Intrusion Detection System Using SVM as Classifier and GA for Optimizing Feature Vectors (2008 Views)
Learners Grouping in E-Learning Environment Using Evolutionary Fuzzy Clustering Approach (1982 Views)
HWS: A Hierarchical Word Spotting Method for Farsi Printed Words Through Word Shape Coding (1958 Views)
A Backup Routing Scheme for Mobile Ad-Hoc Networks (1912 Views)
A Clustering Based Feature Selection Approach to Detect Spam in Social Networks (1896 Views)
Recommending Friends in Social Networks By Users' Profiles And Using Classification Algorithms (1896 Views)
The Effect of Information Sharing on the Assessment of Supply Chain Performance in Uncertain Conditions (1863 Views)
Analysis the Effects of Internet of Things Technology in Managing Supply Chain (1843 Views)
QoS-aware web service composition using Gray Wolf Optimizer (1836 Views)
Non-stationary Sparse System Identification over Adaptive Sensor Networks with Diffusion and Incremental Strategies (1834 Views)
A Survey of Advanced Search Techniques in Unstructured P2P Networks (1824 Views)
Enhanced Iterative Detection of Hierarchically Modulated Signals using VB-EM Algorithm (1823 Views)
EDBPM: An Event-Driven Business Process Monitoring Mechanism (1820 Views)
A Conceptual Framework and Architectural Considerations for Capability Enhancement in Software Defined Networks (1811 Views)
A Priority-based Fast Optimal Computation Offloading Planner for Mobile Cloud Computing (1805 Views)
A Secure Attribute-Based Keyword Search Scheme Against Keyword Guessing And Chosen Keyword Attack (1783 Views)
How Open Source Software Succeeds? A Review of Research on Success of Open Source Software (1766 Views)
Skin Classification for Adult Image Recognition Based on Combination of Gaussian and Weight-KNN (1765 Views)
An Attack-Defense Model for the Binder on the Android Kernel Level (1763 Views)
A Framework to Create a Certificate for e-Commerce Secure Transaction Protocol (1757 Views)
A New Fractional Adaptive Filtering Method and its Application in Speech Enhancement (1757 Views)
A Fairness-Guaranteed Game-Theoretic Perspective in Multi-User Interference Channel (1746 Views)
Cloud-Based Large-Scale Sensor Networks: Motivation, Taxonomies, and Open Challenges (1743 Views)
Using Hybrid of Eigenface and Imperialist Competition Algorithm for Feature Selection in Face Recognition (1743 Views)
Impact of Empowering Communication Technology Practices on Service Performance in Information Technology Sector (1738 Views)
From Reliable Distributed System Toward Reliable Cloud by Cat Swarm Optimization (1736 Views)
A Timelier Credit Card Fraud Detection by Mining Transaction Time Series (1733 Views)
A New Adaptive Hybrid Recommender Framework for Learning Material Recommendation (1728 Views)
Total Sum: 464750