Site Tops

:: Most Visited Articles
A Framework for Optimal Fault Tolerance Protocol Selection Using Fuzzy Logic on IoT Sensor Layer (1890 Views)
Pruning Concept Map to Geneate Ontology (1151 Views)
Persian to English Personal Name Transliteration Based On the Persian Web Contents (1111 Views)
Joint Power Adaptation and Interference Avoidance for Unlicensed Wireless Systems: A Game Theoretic Approach (1068 Views)
An Incentive Mechanism to Mitigate the Free-riding in VoD Streaming over Hybrid CDN-P2P Networks (1041 Views)
Spectral-Spatial Feature Transformations With Controlling Contextual Information Through Smoothing Filtering and Morphological Analysis (1028 Views)
Keyphrase Ranking Based on Second Order Co-Occurrence Analysis (1008 Views)
Hybrid of Evolutionary and Swarm Intelligence Algorithms for Prosody Modeling in Natural Speech Synthesis (994 Views)
Decreasing the Average Delay, Connectivity, and Routing Load in Clustered Mobile Ad- Hoc Networks (990 Views)
HWS: A Hierarchical Word Spotting Method for Farsi Printed Words Through Word Shape Coding (938 Views)
Intrusion Detection System Using SVM as Classifier and GA for Optimizing Feature Vectors (921 Views)
Speaker-Dependent Speech Enhancement Using Codebook-based Synthesis for Low SNR Applications (890 Views)
A Survey of Advanced Search Techniques in Unstructured P2P Networks (878 Views)
All Optical Logic Gates: A Tutorial (877 Views)
ON THE CORRECTNESS OF A TRANSLATION MAP BETWEEN SPECIFICATIONS IN Z AND SETL2 PROTOTYPE (864 Views)
Recommending Friends in Social Networks By Users' Profiles And Using Classification Algorithms (849 Views)
Low Cost Millimeter Wave Duplexer Design Using Mixed Mode Matching and Integral Contour Methods (840 Views)
The Effect of Information Sharing on the Assessment of Supply Chain Performance in Uncertain Conditions (829 Views)
A Clustering Based Feature Selection Approach to Detect Spam in Social Networks (827 Views)
Enhanced Iterative Detection of Hierarchically Modulated Signals using VB-EM Algorithm (825 Views)
A Conceptual Framework and Architectural Considerations for Capability Enhancement in Software Defined Networks (819 Views)
Customer Clustering Based on Customer Lifetime Value: A Case Study of an Iranian Bank (818 Views)
A Timelier Credit Card Fraud Detection by Mining Transaction Time Series (813 Views)
EDBPM: An Event-Driven Business Process Monitoring Mechanism (801 Views)
A Secure Attribute-Based Keyword Search Scheme Against Keyword Guessing And Chosen Keyword Attack (793 Views)
    ... More
:: Most Downloaded Articles
All Optical Logic Gates: A Tutorial (548 Downloads)
Analysis the Effects of Internet of Things Technology in Managing Supply Chain (522 Downloads)
Persian to English Personal Name Transliteration Based On the Persian Web Contents (521 Downloads)
A Conceptual Framework and Architectural Considerations for Capability Enhancement in Software Defined Networks (484 Downloads)
A Framework for Optimal Fault Tolerance Protocol Selection Using Fuzzy Logic on IoT Sensor Layer (451 Downloads)
Customer Clustering Based on Customer Lifetime Value: A Case Study of an Iranian Bank (441 Downloads)
Fast GLCM and Gabor Filters for Texture Classification of Very High Resolution Remote Sensing Images (418 Downloads)
ON THE CORRECTNESS OF A TRANSLATION MAP BETWEEN SPECIFICATIONS IN Z AND SETL2 PROTOTYPE (403 Downloads)
A Security Mechanism for Detecting Intrusions in Internet of Things Using Selected Features Based on MI-BGSA (389 Downloads)
Spectral-Spatial Feature Transformations With Controlling Contextual Information Through Smoothing Filtering and Morphological Analysis (382 Downloads)
HWS: A Hierarchical Word Spotting Method for Farsi Printed Words Through Word Shape Coding (377 Downloads)
Intrusion Detection System Using SVM as Classifier and GA for Optimizing Feature Vectors (373 Downloads)
A Priority-based Fast Optimal Computation Offloading Planner for Mobile Cloud Computing (369 Downloads)
An Incentive Mechanism to Mitigate the Free-riding in VoD Streaming over Hybrid CDN-P2P Networks (368 Downloads)
Critical Success factors for implementing PACS Technology in Iran's Hospitals (365 Downloads)
Non-stationary Sparse System Identification over Adaptive Sensor Networks with Diffusion and Incremental Strategies (362 Downloads)
QoS-aware web service composition using Gray Wolf Optimizer (362 Downloads)
The Effect of Information Sharing on the Assessment of Supply Chain Performance in Uncertain Conditions (355 Downloads)
A Secure Attribute-Based Keyword Search Scheme Against Keyword Guessing And Chosen Keyword Attack (353 Downloads)
A Scalable Algorithm to Solve Distributed Constraint Optimization (351 Downloads)
A Clustering Based Feature Selection Approach to Detect Spam in Social Networks (351 Downloads)
SDTE: Software Defined Traffic Engineering for Improving Data Center Network Utilization (337 Downloads)
IECA: Intelligent Effective Crawling Algorithm for Web Pages (336 Downloads)
Recommending Friends in Social Networks By Users' Profiles And Using Classification Algorithms (328 Downloads)
EMOSS: An Efficient Algorithm to Hide Sequential Patterns (328 Downloads)
    ... More
:: Most studied contents
Editorial Board ( 7998 view)
Submission Preparation Checklist ( 1898 view)
About the Journal ( 1685 view)
Contact ( 1307 view)
Information For Authors ( 1295 view)
New Journal website launched ( 1288 view)
Aims & Scopes ( 1072 view)
welcome ( 178 view)
    ... More
:: Most sent contents
welcome ( 1 send)
    ... More
:: Most printed contents
Submission Preparation Checklist ( 667 print)
Information For Authors ( 223 print)
New Journal website launched ( 177 print)
Editorial Board ( 157 print)
About the Journal ( 144 print)
Contact ( 136 print)
Aims & Scopes ( 120 print)
welcome ( 73 print)
    ... More