Site Tops

:: Most Visited Articles
A Proactive Context-Aware Self-Healing Scheme for 5G Using Machine Learning (17832 Views)
Multi-Objective P- Epidemic Forwarding Method in Heterogeneous DTNs Using NSGA-II (4589 Views)
A Framework for Optimal Fault Tolerance Protocol Selection Using Fuzzy Logic on IoT Sensor Layer (4209 Views)
Low Cost Millimeter Wave Duplexer Design Using Mixed Mode Matching and Integral Contour Methods (3661 Views)
Enhancement of educational games based on personality type indicators (3636 Views)
Speaker-Dependent Speech Enhancement Using Codebook-based Synthesis for Low SNR Applications (3555 Views)
Multi-Objective Response to Co-Resident Attacks in Cloud Environment (3454 Views)
Customer Clustering Based on Customer Lifetime Value: A Case Study of an Iranian Bank (3442 Views)
Spatial Interference Alignment in Relay-Assisted Multi-Cell Multi-User Networks (3420 Views)
Persian to English Personal Name Transliteration Based On the Persian Web Contents (3400 Views)
Persian Wordnet Construction using Supervised Learning (3383 Views)
Fast GLCM and Gabor Filters for Texture Classification of Very High Resolution Remote Sensing Images (3373 Views)
An Opportunistic Cooperative Approach for Dynamic Spectrum Leasing in Cognitive Radio Networks (3361 Views)
Pruning Concept Map to Geneate Ontology (3333 Views)
Keyphrase Ranking Based on Second Order Co-Occurrence Analysis (3285 Views)
An Incentive Mechanism to Mitigate the Free-riding in VoD Streaming over Hybrid CDN-P2P Networks (3255 Views)
Decreasing the Average Delay, Connectivity, and Routing Load in Clustered Mobile Ad- Hoc Networks (3230 Views)
Spectral-Spatial Feature Transformations With Controlling Contextual Information Through Smoothing Filtering and Morphological Analysis (3214 Views)
Analysis Method for Spherical Dipole Antenna Array (3210 Views)
Intrusion Detection System Using SVM as Classifier and GA for Optimizing Feature Vectors (3192 Views)
All Optical Logic Gates: A Tutorial (3180 Views)
Designing and Developing a Wordnet for Persian Nouns Pages (3170 Views)
A Reliable Transport Protocol for Wireless Sensor Networks (3162 Views)
Learners Grouping in E-Learning Environment Using Evolutionary Fuzzy Clustering Approach (3159 Views)
Joint Power Adaptation and Interference Avoidance for Unlicensed Wireless Systems: A Game Theoretic Approach (3126 Views)
Impact of Topic Modeling on Rule-Based Persian Metaphor Classification and its Frequency Estimation (3044 Views)
HWS: A Hierarchical Word Spotting Method for Farsi Printed Words Through Word Shape Coding (3031 Views)
ON THE CORRECTNESS OF A TRANSLATION MAP BETWEEN SPECIFICATIONS IN Z AND SETL2 PROTOTYPE (3024 Views)
Analysis the Effects of Internet of Things Technology in Managing Supply Chain (2978 Views)
Improving the Performance of E-Learning Systems Using Extracted Web Server Log File Suggestions (2978 Views)
Hybrid of Evolutionary and Swarm Intelligence Algorithms for Prosody Modeling in Natural Speech Synthesis (2968 Views)
Recommending Friends in Social Networks By Users' Profiles And Using Classification Algorithms (2965 Views)
A Clustering Based Feature Selection Approach to Detect Spam in Social Networks (2949 Views)
A Conceptual Framework and Architectural Considerations for Capability Enhancement in Software Defined Networks (2911 Views)
EDBPM: An Event-Driven Business Process Monitoring Mechanism (2890 Views)
Enhanced Iterative Detection of Hierarchically Modulated Signals using VB-EM Algorithm (2875 Views)
Decision Feedback Channel Estimation for Alamouti Coded OFDM Systems (2873 Views)
A Survey on Task Scheduling Algorithms in Cloud Computing for Fast Big Data Processing (2873 Views)
A Semi-Supervised Method for Multimodal Classification of Consumer Videos (2867 Views)
Phrase Alignments in Parallel Corpus Using Bootstrapping Approach (2835 Views)
From Reliable Distributed System Toward Reliable Cloud by Cat Swarm Optimization (2818 Views)
QoS-aware web service composition using Gray Wolf Optimizer (2815 Views)
A Secure Attribute-Based Keyword Search Scheme Against Keyword Guessing And Chosen Keyword Attack (2805 Views)
Analysis of an RFID Authentication Protocol in Accordance with EPC Standards (2798 Views)
IECA: Intelligent Effective Crawling Algorithm for Web Pages (2794 Views)
A Framework to Create a Certificate for e-Commerce Secure Transaction Protocol (2792 Views)
Using Hybrid of Eigenface and Imperialist Competition Algorithm for Feature Selection in Face Recognition (2767 Views)
Non-stationary Sparse System Identification over Adaptive Sensor Networks with Diffusion and Incremental Strategies (2765 Views)
A Framework for Evaluation of SQL Injection Detection and Prevention Tools (2755 Views)
A Virtual Research Management Enterprise Architecture Using Axiomatic Design (2752 Views)
Total Sum: 927718