Site Tops

:: Most Visited Articles
A Framework for Optimal Fault Tolerance Protocol Selection Using Fuzzy Logic on IoT Sensor Layer (2398 Views)
Speaker-Dependent Speech Enhancement Using Codebook-based Synthesis for Low SNR Applications (1996 Views)
Multi-Objective Response to Co-Resident Attacks in Cloud Environment (1761 Views)
Spatial Interference Alignment in Relay-Assisted Multi-Cell Multi-User Networks (1758 Views)
An Opportunistic Cooperative Approach for Dynamic Spectrum Leasing in Cognitive Radio Networks (1746 Views)
Persian Wordnet Construction using Supervised Learning (1726 Views)
Analysis Method for Spherical Dipole Antenna Array (1711 Views)
Persian to English Personal Name Transliteration Based On the Persian Web Contents (1699 Views)
Fast GLCM and Gabor Filters for Texture Classification of Very High Resolution Remote Sensing Images (1693 Views)
Designing and Developing a Wordnet for Persian Nouns Pages (1661 Views)
Pruning Concept Map to Geneate Ontology (1629 Views)
An Incentive Mechanism to Mitigate the Free-riding in VoD Streaming over Hybrid CDN-P2P Networks (1611 Views)
A Reliable Transport Protocol for Wireless Sensor Networks (1585 Views)
Joint Power Adaptation and Interference Avoidance for Unlicensed Wireless Systems: A Game Theoretic Approach (1578 Views)
Spectral-Spatial Feature Transformations With Controlling Contextual Information Through Smoothing Filtering and Morphological Analysis (1567 Views)
All Optical Logic Gates: A Tutorial (1553 Views)
Keyphrase Ranking Based on Second Order Co-Occurrence Analysis (1539 Views)
Decreasing the Average Delay, Connectivity, and Routing Load in Clustered Mobile Ad- Hoc Networks (1533 Views)
Low Cost Millimeter Wave Duplexer Design Using Mixed Mode Matching and Integral Contour Methods (1510 Views)
Hybrid of Evolutionary and Swarm Intelligence Algorithms for Prosody Modeling in Natural Speech Synthesis (1501 Views)
Learners Grouping in E-Learning Environment Using Evolutionary Fuzzy Clustering Approach (1478 Views)
Intrusion Detection System Using SVM as Classifier and GA for Optimizing Feature Vectors (1437 Views)
HWS: A Hierarchical Word Spotting Method for Farsi Printed Words Through Word Shape Coding (1429 Views)
Customer Clustering Based on Customer Lifetime Value: A Case Study of an Iranian Bank (1389 Views)
ON THE CORRECTNESS OF A TRANSLATION MAP BETWEEN SPECIFICATIONS IN Z AND SETL2 PROTOTYPE (1369 Views)
    ... More
:: Most Downloaded Articles
Analysis the Effects of Internet of Things Technology in Managing Supply Chain (1256 Downloads)
Persian to English Personal Name Transliteration Based On the Persian Web Contents (1175 Downloads)
A Framework for Optimal Fault Tolerance Protocol Selection Using Fuzzy Logic on IoT Sensor Layer (1041 Downloads)
All Optical Logic Gates: A Tutorial (1017 Downloads)
A Conceptual Framework and Architectural Considerations for Capability Enhancement in Software Defined Networks (928 Downloads)
Fast GLCM and Gabor Filters for Texture Classification of Very High Resolution Remote Sensing Images (927 Downloads)
Customer Clustering Based on Customer Lifetime Value: A Case Study of an Iranian Bank (886 Downloads)
Critical Success factors for implementing PACS Technology in Iran's Hospitals (809 Downloads)
A Priority-based Fast Optimal Computation Offloading Planner for Mobile Cloud Computing (806 Downloads)
The Effect of Information Sharing on the Assessment of Supply Chain Performance in Uncertain Conditions (801 Downloads)
Intrusion Detection System Using SVM as Classifier and GA for Optimizing Feature Vectors (797 Downloads)
Overhead Reduction In Delay Tolerant Networks (785 Downloads)
Spectral-Spatial Feature Transformations With Controlling Contextual Information Through Smoothing Filtering and Morphological Analysis (780 Downloads)
An Incentive Mechanism to Mitigate the Free-riding in VoD Streaming over Hybrid CDN-P2P Networks (777 Downloads)
Non-stationary Sparse System Identification over Adaptive Sensor Networks with Diffusion and Incremental Strategies (777 Downloads)
QoS-aware web service composition using Gray Wolf Optimizer (762 Downloads)
Hub location Allocation Problem in Computer Networks Using Intelligent Optimization Algorithms (759 Downloads)
Impact of Topic Modeling on Rule-Based Persian Metaphor Classification and its Frequency Estimation (740 Downloads)
Persian Wordnet Construction using Supervised Learning (733 Downloads)
An Attack Graph Based Method for Predictive Risk Evaluation of Zero-Day Attacks (733 Downloads)
A Model Based on Cellular Learning Automata for Improving the Intelligent Assistant Agents & Its Application in Earthquake Crisis Management (732 Downloads)
A Framework to Create a Certificate for e-Commerce Secure Transaction Protocol (729 Downloads)
A Clustering Based Feature Selection Approach to Detect Spam in Social Networks (728 Downloads)
A Secure Attribute-Based Keyword Search Scheme Against Keyword Guessing And Chosen Keyword Attack (721 Downloads)
Decreasing the Average Delay, Connectivity, and Routing Load in Clustered Mobile Ad- Hoc Networks (708 Downloads)
    ... More
:: Most studied contents
Editorial Board ( 13479 view)
About the Journal ( 3151 view)
Submission Preparation Checklist ( 3079 view)
Contact ( 2446 view)
Information For Authors ( 2392 view)
New Journal website launched ( 2384 view)
Aims & Scopes ( 2112 view)
welcome ( 293 view)
    ... More
:: Most sent contents
welcome ( 1 send)
    ... More
:: Most printed contents
Submission Preparation Checklist ( 766 print)
Information For Authors ( 326 print)
New Journal website launched ( 281 print)
Editorial Board ( 258 print)
About the Journal ( 240 print)
Contact ( 233 print)
Aims & Scopes ( 225 print)
welcome ( 134 print)
    ... More