Site Tops

:: Most Visited Articles
Keyphrase Ranking Based on Second Order Co-Occurrence Analysis (386 Views)
A Survey of Advanced Search Techniques in Unstructured P2P Networks (370 Views)
Spectral-Spatial Feature Transformations With Controlling Contextual Information Through Smoothing Filtering and Morphological Analysis (278 Views)
How Open Source Software Succeeds? A Review of Research on Success of Open Source Software (262 Views)
An Incentive Mechanism to Mitigate the Free-riding in VoD Streaming over Hybrid CDN-P2P Networks (241 Views)
Decreasing the Average Delay, Connectivity, and Routing Load in Clustered Mobile Ad- Hoc Networks (233 Views)
Intrusion Detection System Using SVM as Classifier and GA for Optimizing Feature Vectors (218 Views)
Using Hybrid of Eigenface and Imperialist Competition Algorithm for Feature Selection in Face Recognition (216 Views)
QoS-aware web service composition using Gray Wolf Optimizer (213 Views)
Enhanced Iterative Detection of Hierarchically Modulated Signals using VB-EM Algorithm (207 Views)
Recommending Friends in Social Networks By Users' Profiles And Using Classification Algorithms (200 Views)
A Fairness-Guaranteed Game-Theoretic Perspective in Multi-User Interference Channel (197 Views)
A Secure Attribute-Based Keyword Search Scheme Against Keyword Guessing And Chosen Keyword Attack (191 Views)
Customer Clustering Based on Customer Lifetime Value: A Case Study of an Iranian Bank (185 Views)
Persian to English Personal Name Transliteration Based On the Persian Web Contents (180 Views)
A Clustering Based Feature Selection Approach to Detect Spam in Social Networks (174 Views)
Analysis the Effects of Internet of Things Technology in Managing Supply Chain (169 Views)
Subspace-Based Approaches for Hybrid Millimeter-Wave Channel Estimation (165 Views)
Low Cost Millimeter Wave Duplexer Design Using Mixed Mode Matching and Integral Contour Methods (160 Views)
Joint Antenna Selection and Adaptive Modulation in MIMO Systems in the Presence of CSI Imperfection (157 Views)
Predicting Network Attacks Using Ontology-Driven Inference (155 Views)
Density-Based K-Nearest Neighbor Active Learning for Improving Farsi-English Statistical Machine Translation System (154 Views)
All Optical Logic Gates: A Tutorial (153 Views)
Speaker-Dependent Speech Enhancement Using Codebook-based Synthesis for Low SNR Applications (153 Views)
GSSC: Graph Summarization based on both Structure and Concepts (153 Views)
    ... More
:: Most Downloaded Articles
Persian to English Personal Name Transliteration Based On the Persian Web Contents (105 Downloads)
A Security Mechanism for Detecting Intrusions in Internet of Things Using Selected Features Based on MI-BGSA (102 Downloads)
Intrusion Detection System Using SVM as Classifier and GA for Optimizing Feature Vectors (95 Downloads)
Spectral-Spatial Feature Transformations With Controlling Contextual Information Through Smoothing Filtering and Morphological Analysis (90 Downloads)
Customer Clustering Based on Customer Lifetime Value: A Case Study of an Iranian Bank (90 Downloads)
A Clustering Based Feature Selection Approach to Detect Spam in Social Networks (88 Downloads)
ON THE CORRECTNESS OF A TRANSLATION MAP BETWEEN SPECIFICATIONS IN Z AND SETL2 PROTOTYPE (84 Downloads)
An Incentive Mechanism to Mitigate the Free-riding in VoD Streaming over Hybrid CDN-P2P Networks (83 Downloads)
All Optical Logic Gates: A Tutorial (81 Downloads)
A Novel Trust Evaluation Model Using Graph Clustering Approach (81 Downloads)
Analysis the Effects of Internet of Things Technology in Managing Supply Chain (80 Downloads)
Predicting Network Attacks Using Ontology-Driven Inference (79 Downloads)
A Novel Density based Clustering Method using Nearest and Farthest Neighbor with PCA (79 Downloads)
Decreasing the Average Delay, Connectivity, and Routing Load in Clustered Mobile Ad- Hoc Networks (78 Downloads)
Joint Antenna Selection and Adaptive Modulation in MIMO Systems in the Presence of CSI Imperfection (78 Downloads)
A Framework to Create a Certificate for e-Commerce Secure Transaction Protocol (78 Downloads)
A Secure Attribute-Based Keyword Search Scheme Against Keyword Guessing And Chosen Keyword Attack (75 Downloads)
Recommending Friends in Social Networks By Users' Profiles And Using Classification Algorithms (73 Downloads)
An Improved Parallel Genetic Algorithm for Optimal Sensor Placement of Wireless Sensor Networks (71 Downloads)
A Virtual Research Management Enterprise Architecture Using Axiomatic Design (70 Downloads)
Critical Success factors for implementing PACS Technology in Iran's Hospitals (69 Downloads)
Enhanced Iterative Detection of Hierarchically Modulated Signals using VB-EM Algorithm (68 Downloads)
Learners Grouping in E-Learning Environment Using Evolutionary Fuzzy Clustering Approach (68 Downloads)
An Improved Blind Spectrum Sensing Technique for Cognitive Radio Systems (68 Downloads)
Fast GLCM and Gabor Filters for Texture Classification of Very High Resolution Remote Sensing Images (67 Downloads)
    ... More
:: Most studied contents
Editorial Board ( 785 view)
About the Journal ( 295 view)
New Journal website launched ( 256 view)
Submission Preparation Checklist ( 229 view)
Contact ( 219 view)
Information For Authors ( 218 view)
Aims & Scopes ( 197 view)
welcome ( 63 view)
    ... More
:: Most sent contents
welcome ( 1 send)
    ... More
:: Most printed contents
New Journal website launched ( 42 print)
About the Journal ( 34 print)
Editorial Board ( 32 print)
Information For Authors ( 29 print)
welcome ( 28 print)
Aims & Scopes ( 26 print)
Submission Preparation Checklist ( 24 print)
Contact ( 22 print)
    ... More