A

  • Abdollahzadeh Aghbolagh, Mohsen Fuzzy Clustering Based Routing in Wireless Body Area Networks to Increase the Life of Sensor Nodes [Volume 4, Issue 3, 2018, Pages 155-166]

  • Adabi, Sahar Formal Method in Service Composition in Heath Care Systems [Volume 4, Issue 1, 2018, Pages 1-6]

  • Adabi, Sahar Metadata Enrichment for Automatic Data Entry Based on Relational Data Models [Volume 4, Issue 3, 2018, Pages 193-208]

  • Adaramola, Ojo Jayeola Network Investigation and Performance Analysis of ZigBee Technology using OPNET [Volume 4, Issue 4, 2018, Pages 209-218]

  • ADARAMOLA, OJO JAYEOLA Network Parameters Evaluation in Vehicular Ad-hoc Network (VANET) Routing Protocols for Efficient Message Delivery in City Environment [Volume 4, Issue 3, 2018, Pages 185-192]

  • Adigun, Olatunji Hezekiah Decentralized Fuzzy-PID Based Control Model for a Multivariable Liquid Level System [Volume 4, Issue 4, 2018, Pages 247-254]

  • Aghazarian, Vaheh Statistical Analysis on IoT Research Trends: A Survey [Volume 4, Issue 2, 2018, Pages 101-134]

  • Akbarizadeh, Gholamreza Implementation of Random Forest Algorithm in Order to Use Big Data to Improve Real-Time Traffic Monitoring and Safety [Volume 4, Issue 2, 2018, Pages 51-60]

  • Ali Shah, Syed Atif Reengineering the Industrial CMMI [Volume 4, Issue 3, 2018, Pages 135-142]

B

  • Baatmaanghelich, Zahra Formal Method in Service Composition in Heath Care Systems [Volume 4, Issue 1, 2018, Pages 1-6]

  • Bagheri Renani, Negin A Review of Optical Routers in Photonic Networks-on-Chip: A Literature Survey [Volume 4, Issue 3, 2018, Pages 143-154]

  • Bahramzadeh, Sahar Statistical Analysis on IoT Research Trends: A Survey [Volume 4, Issue 2, 2018, Pages 101-134]

  • B H, Swathi IMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks [Volume 4, Issue 2, 2018, Pages 87-100]

  • Boruah, Minakshi Evaluation of the Parameters Involved in the Iris Recognition System [Volume 4, Issue 4, 2018, Pages 219-228]

C

  • Chahardoli, Mostafa Statistical Analysis on IoT Research Trends: A Survey [Volume 4, Issue 2, 2018, Pages 101-134]

D

  • Dolatkia, Meysam Metadata Enrichment for Automatic Data Entry Based on Relational Data Models [Volume 4, Issue 3, 2018, Pages 193-208]

E

  • Elameer, Amer Saleem The Idea Of Using The Steganography As Encryption Tool [Volume 4, Issue 1, 2018, Pages 42-50]

F

  • Faridi Masouleh, Marzieh The Impact of the Adoption Business Intelligence among Iranian Banks [Volume 4, Issue 1, 2018, Pages 13-20]

  • Fatholahzade, Negin Implementation of Random Forest Algorithm in Order to Use Big Data to Improve Real-Time Traffic Monitoring and Safety [Volume 4, Issue 2, 2018, Pages 51-60]

H

  • Habibi, Rahimeh Utilizes the Community Detection for Increase Trust using Multiplex Networks [Volume 4, Issue 1, 2018, Pages 21-26]

  • Haroun Abadi, Ali Utilizes the Community Detection for Increase Trust using Multiplex Networks [Volume 4, Issue 1, 2018, Pages 21-26]

  • Hedayati, Alireza Statistical Analysis on IoT Research Trends: A Survey [Volume 4, Issue 2, 2018, Pages 101-134]

  • H L, Gururaj IMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks [Volume 4, Issue 2, 2018, Pages 87-100]

I

  • Ibrahim, Hamidah An Effective Modality Conflict Model for Identifying Applicable Policies During Policy Evaluation [Volume 4, Issue 4, 2018, Pages 255-266]

K

  • Khalandi, Saman A New Approach for Text Documents Classification with Invasive Weed Optimization and Naive Bayes Classifier [Volume 4, Issue 3, 2018, Pages 167-184]

  • Khan, Azim Survey on Perception of People Regarding Utilization of Computer Science & Information Technology in Manipulation of Big Data, Disease Detection & Drug Discovery [Volume 4, Issue 4, 2018, Pages 237-246]

  • Khatibi, Amid A New Approach to Solve N-Queen Problem with Parallel Genetic Algorithm [Volume 4, Issue 2, 2018, Pages 69-78]

  • Khatibi, Vahid A New Optimized Hybrid Model Based On COCOMO to Increase the Accuracy of Software Cost Estimation [Volume 4, Issue 1, 2018, Pages 27-40]

  • Khatibi Bardsiri, Amid A New Architecture Based on Artificial Neural Network and PSO Algorithm for Estimating Software Development Effort [Volume 4, Issue 1, 2018, Pages 7-12]

M

  • M, Hamsaveni IMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks [Volume 4, Issue 2, 2018, Pages 87-100]

  • Mohammadzadeh, Javad A Reliable Routing Algorithm for Delay Sensitive Data in Body Area Networks [Volume 4, Issue 4, 2018, Pages 229-236]

  • Moradbeiky, Amin A New Architecture Based on Artificial Neural Network and PSO Algorithm for Estimating Software Development Effort [Volume 4, Issue 1, 2018, Pages 7-12]

  • Motalebi, Mahdi A Reliable Routing Algorithm for Delay Sensitive Data in Body Area Networks [Volume 4, Issue 4, 2018, Pages 229-236]

O

  • Olasina, Jamiu Rotimi Network Investigation and Performance Analysis of ZigBee Technology using OPNET [Volume 4, Issue 4, 2018, Pages 209-218]

P

  • Pourmina, Mohammad Ali Fuzzy Clustering Based Routing in Wireless Body Area Networks to Increase the Life of Sensor Nodes [Volume 4, Issue 3, 2018, Pages 155-166]

R

  • Ramezanzad, Ali Cost-aware Topology Customization of Mesh-based Networks-on-Chip [Volume 4, Issue 2, 2018, Pages 61-68]

  • Ramezanzad, Ali Congestion estimation of router input ports in Network-on-Chip for efficient virtual allocation [Volume 4, Issue 2, 2018, Pages 79-86]

  • Reshadi, Midia Cost-aware Topology Customization of Mesh-based Networks-on-Chip [Volume 4, Issue 2, 2018, Pages 61-68]

  • Reshadi, Midia Congestion estimation of router input ports in Network-on-Chip for efficient virtual allocation [Volume 4, Issue 2, 2018, Pages 79-86]

  • Reza, Akram Congestion estimation of router input ports in Network-on-Chip for efficient virtual allocation [Volume 4, Issue 2, 2018, Pages 79-86]

  • Rezaee, Ali Formal Method in Service Composition in Heath Care Systems [Volume 4, Issue 1, 2018, Pages 1-6]

  • Rezaee, Ali Metadata Enrichment for Automatic Data Entry Based on Relational Data Models [Volume 4, Issue 3, 2018, Pages 193-208]

  • Romoozi, Morteza Implementation of Random Forest Algorithm in Order to Use Big Data to Improve Real-Time Traffic Monitoring and Safety [Volume 4, Issue 2, 2018, Pages 51-60]

  • Rouhifar, Mehrin Statistical Analysis on IoT Research Trends: A Survey [Volume 4, Issue 2, 2018, Pages 101-134]

S

  • Saljoughinejad, Ramin A New Optimized Hybrid Model Based On COCOMO to Increase the Accuracy of Software Cost Estimation [Volume 4, Issue 1, 2018, Pages 27-40]

  • Sarowar, Md Golam Survey on Perception of People Regarding Utilization of Computer Science & Information Technology in Manipulation of Big Data, Disease Detection & Drug Discovery [Volume 4, Issue 4, 2018, Pages 237-246]

  • Shakil, Maruf Hasan Survey on Perception of People Regarding Utilization of Computer Science & Information Technology in Manipulation of Big Data, Disease Detection & Drug Discovery [Volume 4, Issue 4, 2018, Pages 237-246]

  • ShariatmadariSerkani, Mojgan A Reliable Routing Algorithm for Delay Sensitive Data in Body Area Networks [Volume 4, Issue 4, 2018, Pages 229-236]

  • Shlig, Ali The Idea Of Using The Steganography As Encryption Tool [Volume 4, Issue 1, 2018, Pages 42-50]

  • Sidi, Fatimah An Effective Modality Conflict Model for Identifying Applicable Policies During Policy Evaluation [Volume 4, Issue 4, 2018, Pages 255-266]

  • Soleimanian Gharehchopogh, Farhad A New Approach for Text Documents Classification with Invasive Weed Optimization and Naive Bayes Classifier [Volume 4, Issue 3, 2018, Pages 167-184]

T

  • Taheri Sarvetamin, Monire A New Approach to Solve N-Queen Problem with Parallel Genetic Algorithm [Volume 4, Issue 2, 2018, Pages 69-78]

  • Teo, Poh Kuang An Effective Modality Conflict Model for Identifying Applicable Policies During Policy Evaluation [Volume 4, Issue 4, 2018, Pages 255-266]

U

  • Udzir, Nur Izura An Effective Modality Conflict Model for Identifying Applicable Policies During Policy Evaluation [Volume 4, Issue 4, 2018, Pages 255-266]

  • Ullah, Mohammad Arafat Survey on Perception of People Regarding Utilization of Computer Science & Information Technology in Manipulation of Big Data, Disease Detection & Drug Discovery [Volume 4, Issue 4, 2018, Pages 237-246]

V

  • V, Janhavi IMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks [Volume 4, Issue 2, 2018, Pages 87-100]

  • V, Megha IMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks [Volume 4, Issue 2, 2018, Pages 87-100]

Y

  • Yaghoubi, Elham A Review of Optical Routers in Photonic Networks-on-Chip: A Literature Survey [Volume 4, Issue 3, 2018, Pages 143-154]

Z

  • Zahedi, Mohammad Hadi A New Approach to Solve N-Queen Problem with Parallel Genetic Algorithm [Volume 4, Issue 2, 2018, Pages 69-78]