A

  • ABC algorithm A hybrid meta-heuristic algorithm based on ABC and Firefly algorithms [Volume 1, Issue 4, 2015, Pages 53-58]

  • Accuracy A Novel ICA-based Estimator for Software Cost Estimation [Volume 1, Issue 4, 2015, Pages 15-24]

  • Accuracy A Hybrid Intelligent Model to Increase the Accuracy of COCOMO [Volume 3, Issue 2, 2017, Pages 107-112]

  • Accuracy A New Optimized Hybrid Model Based On COCOMO to Increase the Accuracy of Software Cost Estimation [Volume 4, Issue 1, 2018, Pages 27-40]

  • Accuracy A Review of Fraud Detection Algorithms for Electronic Payment Card Transactions [Volume 7, Issue 3, 2021, Pages 157-166]

  • Adaptive filtering A New Shuffled Sub-swarm Particle Swarm Optimization Algorithm for Speech Enhancement [Volume 1, Issue 1, 2015, Pages 43-50]

  • Adaptive routing Congestion estimation of router input ports in Network-on-Chip for efficient virtual allocation [Volume 4, Issue 2, 2018, Pages 79-86]

  • Adaptive routing CAFT: Cost-aware and Fault-tolerant routing algorithm in 2D mesh Network-on-Chip [Volume 5, Issue 4, 2019, Pages 205-212]

  • Ad Hoc Network Improving Quality of Service Routing in Mobile Ad Hoc Networks Using OLSR [Volume 1, Issue 1, 2015, Pages 51-58]

  • Ad hoc Networks A fault tolerance routing protocol considering defined reliability and energy consumption in wireless sensor networks [Volume 1, Issue 1, 2015, Pages 1-8]

  • Ad hoc Networks A Fuzzy Realistic Mobility Model for Ad hoc Networks [Volume 1, Issue 1, 2015, Pages 9-18]

  • AD-hoc Networks Vehicular Networks: A Survey on Architecture, Communication Technologies and Applications [Volume 2, Issue 3, 2016, Pages 43-53]

  • Air Quality SMART ROOM CARBON MONOXIDE MONITORING AND CONTROL SYSTEM [Volume 6, Issue 1, 2020, Pages 25-32]

  • ANFIS A Smart Hybrid System for Parking Space Reservation in VANET [Volume 3, Issue 1, 2017, Pages 11-18]

  • Anonymity A Review of Anonymity Algorithms in Big Data [Volume 7, Issue 3, 2021, Pages 187-196]

  • Ant Colony Optimization Algorithm Combining Harmony search algorithm and Ant Colony Optimization algorithm to increase the lifetime of Wireless Sensor Networks [Volume 1, Issue 3, 2015, Pages 9-16]

  • Application Mapping Application Mapping onto Network-on-Chip using Bypass Channel [Volume 2, Issue 3, 2016, Pages 1-8]

  • AQM A Differentiated Pricing Framework for Improving the Performance of the Elastic Traffics in Data Networks [Volume 1, Issue 1, 2015, Pages 59-64]

  • Aquaculture Water Quality Index Estimation Model for Aquaculture System Using Artificial Neural Network [Volume 5, Issue 3, 2019, Pages 195-204]

  • Arabic text classification Arabic News Articles Classification Using Vectorized-Cosine Based on Seed Documents [Volume 5, Issue 2, 2019, Pages 117-128]

  • Arduino Mega 2560 The Kinematic Analysis Of Four Degrees Of Freedom For A Medical Robot And Control It By Labview And Arduino Mega2560 (Simulation And Implementation) [Volume 6, Issue 1, 2020, Pages 33-38]

  • Artificial Bee Colony (ABC) A new approach for data visualization problem [Volume 1, Issue 4, 2015, Pages 33-42]

  • Artificial Bee Colony Algorithm Dynamic Clustering for Wireless Sensor Networks: A Hybrid Artificial Bee Colony and Fuzzy TOPSIS Approach [(Articles in Press)]

  • Artificial Intelligence Offline Auto-Tuning of a PID Controller Using Extended Classifier System (XCS) Algorithm [Volume 3, Issue 1, 2017, Pages 41-44]

  • Artificial Neural Network (ANN) Water Quality Index Estimation Model for Aquaculture System Using Artificial Neural Network [Volume 5, Issue 3, 2019, Pages 195-204]

  • ATAM Abstract Integration of IoT, Fog and Cloud Layers with Support for Availability, Performance and Interoperability Quality Attributes [(Articles in Press)]

  • Attack Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines [Volume 5, Issue 2, 2019, Pages 107-116]

  • Authentication Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines [Volume 5, Issue 2, 2019, Pages 107-116]

  • Authentication Improving the security of wireless sensor networks using Game Theory [Volume 7, Issue 2, 2021, Pages 93-102]

  • Automatic image annotation Tags Re-ranking Using Multi-level Features in Automatic Image Annotation [Volume 5, Issue 4, 2019, Pages 255-265]

B

  • Back-Propagation(BP) Using a Neural Network instead of IKM in 2R Planar Robot to follow rectangular path [Volume 6, Issue 2, 2020, Pages 71-78]

  • Balanced Differential Evolution A modified differential evolution algorithm with a balanced performance for Exploration and Exploitation phases [Volume 7, Issue 1, 2021, Pages 1-18]

  • Bald Eagle Search Algorithm A New Model-based Bald Eagle Search Algorithm with Sine Cosine Algorithm for Data Clustering [Volume 7, Issue 3, 2021, Pages 177-186]

  • Bat algorithm An Improved Bat Algorithm with Grey Wolf Optimizer for Solving Continuous Optimization Problems [Volume 6, Issue 3, 2020, Pages 119-132]

  • Bat algorithm An Improved Bat Algorithm based on Whale Optimization Algorithm for Data Clustering [Volume 6, Issue 4, 2020, Pages 227-238]

  • Beacon signal Typical Ka band Satellite Beacon Receiver Design for Propagation Experimentation [Volume 1, Issue 2, 2015, Pages 23-28]

  • Big Data Implementation of Random Forest Algorithm in Order to Use Big Data to Improve Real-Time Traffic Monitoring and Safety [Volume 4, Issue 2, 2018, Pages 51-60]

  • Big Data Survey on Perception of People Regarding Utilization of Computer Science & Information Technology in Manipulation of Big Data, Disease Detection & Drug Discovery [Volume 4, Issue 4, 2018, Pages 237-246]

  • Big Data 2016 Olympic Games on Twitter: Sentiment Analysis of Sports Fans Tweets using Big Data Framework [Volume 5, Issue 3, 2019, Pages 143-160]

  • Big Data A Review of Anonymity Algorithms in Big Data [Volume 7, Issue 3, 2021, Pages 187-196]

  • Big data analytics A Fuzzy TOPSIS Approach for Big Data Analytics Platform Selection [Volume 5, Issue 1, 2019, Pages 49-56]

  • Biometric Recognition Evaluation of the Parameters Involved in the Iris Recognition System [Volume 4, Issue 4, 2018, Pages 219-228]

  • Bit Torrent P2P Network Trust Management Survey [Volume 3, Issue 2, 2017, Pages 89-106]

  • Blockchain Development of Blockchain Technology [Volume 6, Issue 4, 2020, Pages 265-272]

  • Blockchain An Unlinkable Reputation Transfer Framework for Blockchain-based Retail Markets Using Non-fungible Tokens [(Articles in Press)]

  • Bluetooth A Detailed Exploration of Usability Statistics and Application Rating Based on Wireless Protocols [Volume 6, Issue 1, 2020, Pages 9-18]

  • Board of directors’ Characteristics The impact of corporate governance on the financial performance of listed companies in the Tehran Stock Exchange Chemical industry [Volume 3, Issue 3, 2017, Pages 167-172]

  • Body area network DTMP: Energy Consumption Reduction in Body Area Networks Using a Dynamic Traffic Management Protocol [Volume 3, Issue 4, 2017, Pages 181-188]

  • Bot Networks Detecting Active Bot Networks Based on DNS Traffic Analysis [Volume 5, Issue 3, 2019, Pages 129-142]

  • Bot Networks Detecting Bot Networks Based On HTTP And TLS Traffic Analysis [Volume 6, Issue 2, 2020, Pages 61-70]

  • BPMN Formal Method in Service Composition in Heath Care Systems [Volume 4, Issue 1, 2018, Pages 1-6]

  • Brain Tumor Diagnosis A Novel Fuzzy-C Means Image Segmentation Model for MRI Brain Tumor Diagnosis [Volume 6, Issue 1, 2020, Pages 19-24]

  • Business intelligent The Impact of the Adoption Business Intelligence among Iranian Banks [Volume 4, Issue 1, 2018, Pages 13-20]

  • Business Process Framework eTOM Leveraging Engaged Parties in SIP Domains of eTOM Framework by using ITSM Reference Model [Volume 2, Issue 4, 2016, Pages 49-55]

  • Bypass Router Application Mapping onto Network-on-Chip using Bypass Channel [Volume 2, Issue 3, 2016, Pages 1-8]

C

  • Canny Edge Detector Evaluation of the Parameters Involved in the Iris Recognition System [Volume 4, Issue 4, 2018, Pages 219-228]

  • Capability and Maturity Ranking Reengineering the Industrial CMMI [Volume 4, Issue 3, 2018, Pages 135-142]

  • Carbon Monoxide (CO) SMART ROOM CARBON MONOXIDE MONITORING AND CONTROL SYSTEM [Volume 6, Issue 1, 2020, Pages 25-32]

  • CART Experimental Evaluation of Algorithmic Effort Estimation Models using Projects Clustering [Volume 2, Issue 3, 2016, Pages 15-26]

  • Cellular Automata Robot Path Planning Using Cellular Automata and Genetic Algorithm [Volume 5, Issue 1, 2019, Pages 19-26]

  • Cellular Genetic Algorithm A New Approach to Solve N-Queen Problem with Parallel Genetic Algorithm [Volume 4, Issue 2, 2018, Pages 69-78]

  • Challenges IMPACTS AND CHALLENGES OF CLOUD COMPUTING FOR SMALL AND MEDIUM SCALE BUSINESSES IN NIGERIA [Volume 5, Issue 3, 2019, Pages 169-180]

  • Chaos Chaotic dynamic analysis and nonlinear control of blood glucose regulation system in type 1 diabetic patients [Volume 5, Issue 2, 2019, Pages 81-92]

  • Circle Hough Transform Evaluation of the Parameters Involved in the Iris Recognition System [Volume 4, Issue 4, 2018, Pages 219-228]

  • City environment An Improved Junction-Based Directional Routing Protocol (IJDRP) for VANETs [Volume 6, Issue 3, 2020, Pages 133-144]

  • Classification Improving the Operation of Text Categorization Systems with Selecting Proper Features Based on PSO-LA [Volume 1, Issue 2, 2015, Pages 1-8]

  • Classification Statistical Analysis on IoT Research Trends: A Survey [Volume 4, Issue 2, 2018, Pages 101-134]

  • Classification An Overview of the Concepts, Classifications, and Methods of Population Initialization in Metaheuristic Algorithms [Volume 7, Issue 1, 2021, Pages 35-54]

  • Click through Rate A New Hybrid Method for Web Pages Ranking in Search Engines [Volume 5, Issue 4, 2019, Pages 233-244]

  • Cloud-Fog computing Workflow Scheduling on Hybrid Fog-Cloud Environment Based on a Novel Critical Path Extraction Algorithm [Volume 7, Issue 2, 2021, Pages 126-136]

  • Clustering Energy optimization based on routing protocols in wireless sensor network [Volume 3, Issue 4, 2017, Pages 195-202]

  • Clustering An Optimization K-Modes Clustering Algorithm with Elephant Herding Optimization Algorithm for Crime Clustering [Volume 6, Issue 2, 2020, Pages 79-90]

  • Clustering An Overview of the Concepts, Classifications, and Methods of Population Initialization in Metaheuristic Algorithms [Volume 7, Issue 1, 2021, Pages 35-54]

  • Clustering A New Model-based Bald Eagle Search Algorithm with Sine Cosine Algorithm for Data Clustering [Volume 7, Issue 3, 2021, Pages 177-186]

  • Clustering Adaptive Genetic Algorithm for Community Detection Based on The Characteristics and Structure of Social Networks [(Articles in Press)]

  • Clustering Dynamic Clustering for Wireless Sensor Networks: A Hybrid Artificial Bee Colony and Fuzzy TOPSIS Approach [(Articles in Press)]

  • Clustring and firewall A New Method for Intrusion Detection Using Genetic Algorithm and Neural network [Volume 3, Issue 4, 2017, Pages 213-222]

  • CMAC Two Novel Learning Algorithms for CMAC Neural Network Based on Changeable Learning Rate [Volume 1, Issue 1, 2015, Pages 37-42]

  • CMMI Reengineering the Industrial CMMI [Volume 4, Issue 3, 2018, Pages 135-142]

  • Coastal Area Coastal Water Level Prediction Model Using Adaptive Neuro-fuzzy Inference System [Volume 5, Issue 1, 2019, Pages 11-18]

  • COCOMO81 A Novel ICA-based Estimator for Software Cost Estimation [Volume 1, Issue 4, 2015, Pages 15-24]

  • COCOMO 81 An Improved COCOMO based Model to Estimate the Effort of Software Projects [Volume 2, Issue 2, 2016, Pages 11-22]

  • COCOMO 81 A New Optimized Hybrid Model Based On COCOMO to Increase the Accuracy of Software Cost Estimation [Volume 4, Issue 1, 2018, Pages 27-40]

  • Cognitive Radio The Optimal MMSE Transceiver Design for IoT-oriented Cognitive Radio Systems [Volume 5, Issue 3, 2019, Pages 161-168]

  • Cold Start Alleviation of Cold Start in Movie Recommendation Systems using Sentiment Analysis of Multi-Modal Social Networks [Volume 6, Issue 4, 2020, Pages 251-264]

  • Cold Start Optimization of weighting-based approach to predict and deal with cold start of web recommender systems using cuckoo algorithm [Volume 7, Issue 2, 2021, Pages 137-146]

  • Colored petri net Implementation of Random Forest Algorithm in Order to Use Big Data to Improve Real-Time Traffic Monitoring and Safety [Volume 4, Issue 2, 2018, Pages 51-60]

  • Common Lecturer TimeTabling Problem (CLTTP) Using fuzzy c-means clustering algorithm for common lecturer timetabling among departments [Volume 3, Issue 1, 2017, Pages 45-64]

  • Community Detection Utilizes the Community Detection for Increase Trust using Multiplex Networks [Volume 4, Issue 1, 2018, Pages 21-26]

  • Community Detection Community Detection on Social Networks Using the Improved Harris Hawk Optimization Algorithm [(Articles in Press)]

  • Community Detection Adaptive Genetic Algorithm for Community Detection Based on The Characteristics and Structure of Social Networks [(Articles in Press)]

  • Competitive Play Intrinsic vs. Extrinsic Motivation in an Interactive Engineering Game [Volume 5, Issue 1, 2019, Pages 37-48]

  • Complex Networks Community Detection on Social Networks Using the Improved Harris Hawk Optimization Algorithm [(Articles in Press)]

  • Computer Arithmetic Overflow Detection in Residue Number System, Moduli Set {2n-1,2n,2n+1} [Volume 2, Issue 1, 2016, Pages 9-16]

  • Confidentiality Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines [Volume 5, Issue 2, 2019, Pages 107-116]

  • Confidentiality Disclosure A Review of Anonymity Algorithms in Big Data [Volume 7, Issue 3, 2021, Pages 187-196]

  • Congestion control A Differentiated Pricing Framework for Improving the Performance of the Elastic Traffics in Data Networks [Volume 1, Issue 1, 2015, Pages 59-64]

  • Congestion control Improvement of the mechanism of congestion avoidance in mobile networks [Volume 2, Issue 2, 2016, Pages 43-48]

  • Consensus Development of Blockchain Technology [Volume 6, Issue 4, 2020, Pages 265-272]

  • Constrained Search Method A modified differential evolution algorithm with a balanced performance for Exploration and Exploitation phases [Volume 7, Issue 1, 2021, Pages 1-18]

  • Content analysis Analysis of Users’ Opinions about Reasons for Divorce [Volume 2, Issue 4, 2016, Pages 1-8]

  • Continuous Problems An Improved Bat Algorithm with Grey Wolf Optimizer for Solving Continuous Optimization Problems [Volume 6, Issue 3, 2020, Pages 119-132]

  • Contour lines Reconstruction of contour lines during the digitization of contour maps to build a digital elevation model [Volume 6, Issue 4, 2020, Pages 239-250]

  • Control System SMART ROOM CARBON MONOXIDE MONITORING AND CONTROL SYSTEM [Volume 6, Issue 1, 2020, Pages 25-32]

  • Convariance Matrix Adaptation Evolution Strategy(CMA-ES) Task Scheduling Algorithm Using Covariance Matrix Adaptation Evolution Strategy (CMA-ES) in Cloud Computing [Volume 3, Issue 3, 2017, Pages 135-144]

  • Convergence rate A Hybrid Data Clustering Algorithm Using Modified Krill Herd Algorithm and K-MEANS [Volume 5, Issue 2, 2019, Pages 93-106]

  • Corpora creation Arabic News Articles Classification Using Vectorized-Cosine Based on Seed Documents [Volume 5, Issue 2, 2019, Pages 117-128]

  • Corporate Governance The impact of corporate governance on the financial performance of listed companies in the Tehran Stock Exchange Chemical industry [Volume 3, Issue 3, 2017, Pages 167-172]

  • Correlation A New Multi-Criteria Decision Making Based on Fuzzy- Topsis Theory [Volume 2, Issue 4, 2016, Pages 39-48]

  • Crime Clustering An Optimization K-Modes Clustering Algorithm with Elephant Herding Optimization Algorithm for Crime Clustering [Volume 6, Issue 2, 2020, Pages 79-90]

  • Critical Path Workflow Scheduling on Hybrid Fog-Cloud Environment Based on a Novel Critical Path Extraction Algorithm [Volume 7, Issue 2, 2021, Pages 126-136]

  • CSP Formal Method in Service Composition in Heath Care Systems [Volume 4, Issue 1, 2018, Pages 1-6]

  • Cubic Hermite spline Reconstruction of contour lines during the digitization of contour maps to build a digital elevation model [Volume 6, Issue 4, 2020, Pages 239-250]

  • Cuckoo algorithm Optimization of weighting-based approach to predict and deal with cold start of web recommender systems using cuckoo algorithm [Volume 7, Issue 2, 2021, Pages 137-146]

  • CUDA Parallelization of Rich Models for Steganalysis of Digital Images using a CUDA-based Approach [Volume 3, Issue 2, 2017, Pages 81-88]

  • Cultural Algorithm (CA) Adaptive Rule-Base Influence Function Mechanism for Cultural Algorithm [Volume 1, Issue 2, 2015, Pages 29-38]

D

  • Data Access Time Data Replication-Based Scheduling in Cloud Computing Environment [Volume 3, Issue 2, 2017, Pages 75-80]

  • Database An Effective Path-aware Approach for Keyword Search over Data Graphs [Volume 6, Issue 3, 2020, Pages 169-186]

  • Data clustering A Hybrid Data Clustering Algorithm Using Modified Krill Herd Algorithm and K-MEANS [Volume 5, Issue 2, 2019, Pages 93-106]

  • Data clustering An Improved Bat Algorithm based on Whale Optimization Algorithm for Data Clustering [Volume 6, Issue 4, 2020, Pages 227-238]

  • Data-Entry automation Metadata Enrichment for Automatic Data Entry Based on Relational Data Models [Volume 4, Issue 3, 2018, Pages 193-208]

  • Data-Entry requirements Metadata Enrichment for Automatic Data Entry Based on Relational Data Models [Volume 4, Issue 3, 2018, Pages 193-208]

  • Data placement Adaptive Dynamic Data Placement Algorithm for Hadoop in Heterogeneous Environments [Volume 2, Issue 4, 2016, Pages 17-30]

  • Data Rate A Detailed Exploration of Usability Statistics and Application Rating Based on Wireless Protocols [Volume 6, Issue 1, 2020, Pages 9-18]

  • Data Replication E2DR: Energy Efficient Data Replication in Data Grid [Volume 2, Issue 3, 2016, Pages 27-34]

  • Data Replication Dynamic Replication based on Firefly Algorithm in Data Grid [Volume 3, Issue 1, 2017, Pages 31-38]

  • Data Replication Data Replication-Based Scheduling in Cloud Computing Environment [Volume 3, Issue 2, 2017, Pages 75-80]

  • Data visualization A new approach for data visualization problem [Volume 1, Issue 4, 2015, Pages 33-42]

  • DDoS attacks HF-Blocker: Detection of Distributed Denial of Service Attacks Based On Botnets [Volume 1, Issue 3, 2015, Pages 39-45]

  • Deadlock-free CAFT: Cost-aware and Fault-tolerant routing algorithm in 2D mesh Network-on-Chip [Volume 5, Issue 4, 2019, Pages 205-212]

  • Decentralized PID Combination Decentralized Fuzzy-PID Based Control Model for a Multivariable Liquid Level System [Volume 4, Issue 4, 2018, Pages 247-254]

  • Decision tree Financial Fraud Detection in IoT Using Sequence Classification Based Method [(Articles in Press)]

  • Defect terminology Novel Defect Terminolgy Beside Evaluation And Design Fault Tolerant Logic Gates In Quantum-Dot Cellular Automata [Volume 2, Issue 1, 2016, Pages 17-26]

  • Delay Improving QoS in VANETs: A Survey [Volume 3, Issue 3, 2017, Pages 153-166]

  • Demand Management Leveraging Engaged Parties in SIP Domains of eTOM Framework by using ITSM Reference Model [Volume 2, Issue 4, 2016, Pages 49-55]

  • Denavit Hartenberg (DH) Using a Neural Network instead of IKM in 2R Planar Robot to follow rectangular path [Volume 6, Issue 2, 2020, Pages 71-78]

  • Depth Map Hybridization of Facial Features and Use of Multi Modal Information for 3D Face Recognition [Volume 6, Issue 1, 2020, Pages 1-8]

  • Development effort estimation A New Architecture Based on Artificial Neural Network and PSO Algorithm for Estimating Software Development Effort [Volume 4, Issue 1, 2018, Pages 7-12]

  • Digital Elevation Model Reconstruction of contour lines during the digitization of contour maps to build a digital elevation model [Volume 6, Issue 4, 2020, Pages 239-250]

  • Direct Kinematic Model (DKM) Using a Neural Network instead of IKM in 2R Planar Robot to follow rectangular path [Volume 6, Issue 2, 2020, Pages 71-78]

  • Dissolved Oxygen (DO) Water Quality Index Estimation Model for Aquaculture System Using Artificial Neural Network [Volume 5, Issue 3, 2019, Pages 195-204]

  • Distance Rank A New Hybrid Method for Web Pages Ranking in Search Engines [Volume 5, Issue 4, 2019, Pages 233-244]

  • Distributed Algorithms Workflow Scheduling on Hybrid Fog-Cloud Environment Based on a Novel Critical Path Extraction Algorithm [Volume 7, Issue 2, 2021, Pages 126-136]

  • Divorce Analysis of Users’ Opinions about Reasons for Divorce [Volume 2, Issue 4, 2016, Pages 1-8]

  • DMS Implementation of Random Forest Algorithm in Order to Use Big Data to Improve Real-Time Traffic Monitoring and Safety [Volume 4, Issue 2, 2018, Pages 51-60]

  • DNS Traffic Analysis Detecting Active Bot Networks Based on DNS Traffic Analysis [Volume 5, Issue 3, 2019, Pages 129-142]

  • Document Image Analysis Document Analysis And Classification Based On Passing Window [Volume 6, Issue 1, 2020, Pages 39-46]

  • Dynamic Data Replication Reliability and Availability Improvement in Economic Data Grid Environment Based On Clustering Approach [Volume 1, Issue 4, 2015, Pages 1-14]

  • Dynamic Grasp Optimal Trajectory Planning of a Box Transporter Mobile Robot [Volume 2, Issue 3, 2016, Pages 35-42]

E

  • E-Card A Review of Fraud Detection Algorithms for Electronic Payment Card Transactions [Volume 7, Issue 3, 2021, Pages 157-166]

  • Ecommerce Investigating the Factors Affecting the Readiness Level of IoT Technology Acceptance (Case Study: Financial Activists, Stock Exchange, and Financial Institutions) [Volume 7, Issue 2, 2021, Pages 103-126]

  • Economic Dispatch Problem A modified differential evolution algorithm with a balanced performance for Exploration and Exploitation phases [Volume 7, Issue 1, 2021, Pages 1-18]

  • EEG eye state dataset PEML-E: EEG eye state classification using ensembles and machine learning methods [Volume 7, Issue 2, 2021, Pages 147-156]

  • Effectiveness An Effective Modality Conflict Model for Identifying Applicable Policies During Policy Evaluation [Volume 4, Issue 4, 2018, Pages 255-266]

  • E-government A Multi-layer Architecture Based on MCDM Methods to Select the Best E-Readiness Assessment Model According to SWOT Analysis [Volume 3, Issue 2, 2017, Pages 65-74]

  • Electrical Engineering Game Intrinsic vs. Extrinsic Motivation in an Interactive Engineering Game [Volume 5, Issue 1, 2019, Pages 37-48]

  • Elephant Herding Optimization Algorithm An Optimization K-Modes Clustering Algorithm with Elephant Herding Optimization Algorithm for Crime Clustering [Volume 6, Issue 2, 2020, Pages 79-90]

  • Email Spam Detection A Novel Hybrid Approach for Email Spam Detection based on Scatter Search Algorithm and K-Nearest Neighbors [Volume 5, Issue 3, 2019, Pages 181-194]

  • Emperor Penguin Optimizer(EPO) Improve Spam Detection in the Internet Using Feature Selection based on the Metahuristic Algorithms [Volume 7, Issue 2, 2021, Pages 115-125]

  • Employed bee A hybrid meta-heuristic algorithm based on ABC and Firefly algorithms [Volume 1, Issue 4, 2015, Pages 53-58]

  • Energy EIDA: An Energy-Intrusion aware Data Aggregation Technique for Wireless Sensor Networks [Volume 2, Issue 1, 2016, Pages 1-8]

  • Energy consumption DTMP: Energy Consumption Reduction in Body Area Networks Using a Dynamic Traffic Management Protocol [Volume 3, Issue 4, 2017, Pages 181-188]

  • Energy efficiency Energy optimization based on routing protocols in wireless sensor network [Volume 3, Issue 4, 2017, Pages 195-202]

  • Energy efficiency A Genetic Based Resource Management Algorithm Considering Energy Efficiency in Cloud Computing Systems [Volume 3, Issue 4, 2017, Pages 203-212]

  • Energy efficiency A Method for Measuring Energy Consumption in IaaS Cloud [Volume 6, Issue 3, 2020, Pages 145-154]

  • Energy measurement A Method for Measuring Energy Consumption in IaaS Cloud [Volume 6, Issue 3, 2020, Pages 145-154]

  • Ensemble method PEML-E: EEG eye state classification using ensembles and machine learning methods [Volume 7, Issue 2, 2021, Pages 147-156]

  • Equal Error Rate Evaluation of the Parameters Involved in the Iris Recognition System [Volume 4, Issue 4, 2018, Pages 219-228]

  • E-Readiness Assessment Models A Multi-layer Architecture Based on MCDM Methods to Select the Best E-Readiness Assessment Model According to SWOT Analysis [Volume 3, Issue 2, 2017, Pages 65-74]

  • Euclidean distance Reconstruction of contour lines during the digitization of contour maps to build a digital elevation model [Volume 6, Issue 4, 2020, Pages 239-250]

  • Expert Opinion Design Software Failure Mode and Effect Analysis using Fuzzy TOPSIS Based on Fuzzy Entropy [Volume 6, Issue 3, 2020, Pages 187-200]

  • Exploration A hybrid meta-heuristic algorithm based on ABC and Firefly algorithms [Volume 1, Issue 4, 2015, Pages 53-58]

  • Exploration and Exploitation A modified differential evolution algorithm with a balanced performance for Exploration and Exploitation phases [Volume 7, Issue 1, 2021, Pages 1-18]

  • Extended classifier system Offline Auto-Tuning of a PID Controller Using Extended Classifier System (XCS) Algorithm [Volume 3, Issue 1, 2017, Pages 41-44]

  • Extended Restricted Greedy An Improved Junction-Based Directional Routing Protocol (IJDRP) for VANETs [Volume 6, Issue 3, 2020, Pages 133-144]

  • Extrinsic Motivation Intrinsic vs. Extrinsic Motivation in an Interactive Engineering Game [Volume 5, Issue 1, 2019, Pages 37-48]

F

  • Fast Flux Detecting Active Bot Networks Based on DNS Traffic Analysis [Volume 5, Issue 3, 2019, Pages 129-142]

  • Fault Detection and Diagnosis (FDD) Developing A Fault Diagnosis Approach Based On Artificial Neural Network And Self Organization Map For Occurred ADSL Faults [Volume 3, Issue 3, 2017, Pages 125-134]

  • Fault Injection Reliability and Availability Improvement in Economic Data Grid Environment Based On Clustering Approach [Volume 1, Issue 4, 2015, Pages 1-14]

  • Fault tolerance Improving the palbimm scheduling algorithm for fault tolerance in cloud computing [Volume 2, Issue 3, 2016, Pages 9-14]

  • Fault tolerance CAFT: Cost-aware and Fault-tolerant routing algorithm in 2D mesh Network-on-Chip [Volume 5, Issue 4, 2019, Pages 205-212]

  • Feature Extraction Hybridization of Facial Features and Use of Multi Modal Information for 3D Face Recognition [Volume 6, Issue 1, 2020, Pages 1-8]

  • Feature Extraction Document Analysis And Classification Based On Passing Window [Volume 6, Issue 1, 2020, Pages 39-46]

  • Feature Selection Improving the Operation of Text Categorization Systems with Selecting Proper Features Based on PSO-LA [Volume 1, Issue 2, 2015, Pages 1-8]

  • Feature Selection Improvement of effort estimation accuracy in software projects using a feature selection approach [Volume 2, Issue 4, 2016, Pages 31-38]

  • Feature Selection A New Approach for Text Documents Classification with Invasive Weed Optimization and Naive Bayes Classifier [Volume 4, Issue 3, 2018, Pages 167-184]

  • Feature Selection A Novel Hybrid Approach for Email Spam Detection based on Scatter Search Algorithm and K-Nearest Neighbors [Volume 5, Issue 3, 2019, Pages 181-194]

  • Feature Selection An Optimization-based Learning Black Widow Optimization Algorithm for Text Psychology [Volume 7, Issue 1, 2021, Pages 81-92]

  • Feature Selection Improve Spam Detection in the Internet Using Feature Selection based on the Metahuristic Algorithms [Volume 7, Issue 2, 2021, Pages 115-125]

  • File Sharing P2P Network Trust Management Survey [Volume 3, Issue 2, 2017, Pages 89-106]

  • Financial Behavior The impact of behavioral factors on Propensity toward indebtedness Case Study: Indebted‏‏‏ customers of Maskan Bank, Tehran province (Geographic regions: East) [Volume 3, Issue 3, 2017, Pages 145-152]

  • Financial Literacy The impact of behavioral factors on Propensity toward indebtedness Case Study: Indebted‏‏‏ customers of Maskan Bank, Tehran province (Geographic regions: East) [Volume 3, Issue 3, 2017, Pages 145-152]

  • Financial Performance The impact of corporate governance on the financial performance of listed companies in the Tehran Stock Exchange Chemical industry [Volume 3, Issue 3, 2017, Pages 167-172]

  • Fingerprint Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines [Volume 5, Issue 2, 2019, Pages 107-116]

  • Firefly algorithm A hybrid meta-heuristic algorithm based on ABC and Firefly algorithms [Volume 1, Issue 4, 2015, Pages 53-58]

  • Firefly algorithm Dynamic Replication based on Firefly Algorithm in Data Grid [Volume 3, Issue 1, 2017, Pages 31-38]

  • Fog Computing Intelligent Resource Allocation in Fog Computing: A Learning Automata Approach [Volume 7, Issue 1, 2021, Pages 19-34]

  • Fog Computing Energy-aware and Reliable Service Placement of IoT applications on Fog Computing Platforms by Utilizing Whale Optimization Algorithm [Volume 7, Issue 1, 2021, Pages 67-80]

  • Fog Computing Abstract Integration of IoT, Fog and Cloud Layers with Support for Availability, Performance and Interoperability Quality Attributes [(Articles in Press)]

  • Fog Computing Trust management in fog computing using the multi-objective imperialist competitive optimization algorithm. [(Articles in Press)]

  • Formal methods Formal Method in Service Composition in Heath Care Systems [Volume 4, Issue 1, 2018, Pages 1-6]

  • Fractional Order Proportional Integral Derivative (FOPID) Quadrotor Control Using Fractional-Order PI^λ D^μ Control [Volume 5, Issue 1, 2019, Pages 1-10]

  • Fraud detection Financial Fraud Detection in IoT Using Sequence Classification Based Method [(Articles in Press)]

  • Fraud Transaction A Review of Fraud Detection Algorithms for Electronic Payment Card Transactions [Volume 7, Issue 3, 2021, Pages 157-166]

  • Fuzzy clustering Fuzzy Clustering Based Routing in Wireless Body Area Networks to Increase the Life of Sensor Nodes [Volume 4, Issue 3, 2018, Pages 155-166]

  • Fuzzy c-means Clustering Algorithms Using fuzzy c-means clustering algorithm for common lecturer timetabling among departments [Volume 3, Issue 1, 2017, Pages 45-64]

  • Fuzzy Decision trees Scalable Fuzzy Decision Tree Induction Using Fast Data Partitioning and Incremental Approach for Large Dataset [Volume 7, Issue 1, 2021, Pages 55-66]

  • Fuzzy Entropy Design Software Failure Mode and Effect Analysis using Fuzzy TOPSIS Based on Fuzzy Entropy [Volume 6, Issue 3, 2020, Pages 187-200]

  • Fuzzy Entropy Scalable Fuzzy Decision Tree Induction Using Fast Data Partitioning and Incremental Approach for Large Dataset [Volume 7, Issue 1, 2021, Pages 55-66]

  • Fuzzy expert system A Fuzzy-GA Approach for Parameter Optimization of A Fuzzy Expert System for Diagnosis of Acute Lymphocytic Leukemia in Children [Volume 2, Issue 2, 2016, Pages 33-42]

  • Fuzzy Image Processing A Novel Fuzzy-C Means Image Segmentation Model for MRI Brain Tumor Diagnosis [Volume 6, Issue 1, 2020, Pages 19-24]

  • Fuzzy Logic Topology Control in Wireless Sensor Network using Fuzzy Logic [Volume 1, Issue 2, 2015, Pages 39-44]

  • Fuzzy Logic Type-2 Fuzzy Logic Approach To Increase The Accuracy Of Software Development Effort Estimation [Volume 2, Issue 4, 2016, Pages 9-16]

  • Fuzzy Logic Decentralized Fuzzy-PID Based Control Model for a Multivariable Liquid Level System [Volume 4, Issue 4, 2018, Pages 247-254]

  • Fuzzy Logic Coastal Water Level Prediction Model Using Adaptive Neuro-fuzzy Inference System [Volume 5, Issue 1, 2019, Pages 11-18]

  • Fuzzy Logic Chaotic dynamic analysis and nonlinear control of blood glucose regulation system in type 1 diabetic patients [Volume 5, Issue 2, 2019, Pages 81-92]

  • Fuzzy Logic Performance Evaluation of the Effect of Optimally Tuned IMC and PID Controllers on a Poultry Feed Dispensing System [Volume 6, Issue 4, 2020, Pages 213-226]

  • Fuzzy Methods Dynamic Clustering for Wireless Sensor Networks: A Hybrid Artificial Bee Colony and Fuzzy TOPSIS Approach [(Articles in Press)]

  • Fuzzy partitioning Scalable Fuzzy Decision Tree Induction Using Fast Data Partitioning and Incremental Approach for Large Dataset [Volume 7, Issue 1, 2021, Pages 55-66]

  • Fuzzy systems A Fuzzy Realistic Mobility Model for Ad hoc Networks [Volume 1, Issue 1, 2015, Pages 9-18]

  • Fuzzy TOPSIS A Fuzzy TOPSIS Approach for Big Data Analytics Platform Selection [Volume 5, Issue 1, 2019, Pages 49-56]

  • Fuzzy TOPSIS Design Software Failure Mode and Effect Analysis using Fuzzy TOPSIS Based on Fuzzy Entropy [Volume 6, Issue 3, 2020, Pages 187-200]

G

  • Game theory Improving the security of wireless sensor networks using Game Theory [Volume 7, Issue 2, 2021, Pages 93-102]

  • Gamma Correction Evaluation of the Parameters Involved in the Iris Recognition System [Volume 4, Issue 4, 2018, Pages 219-228]

  • Gaussian mixture model Recognizing the Emotional State Changes in Human Utterance by a Learning Statistical Method based on Gaussian Mixture Model [Volume 3, Issue 2, 2017, Pages 113-124]

  • Genetic algorithm A Fuzzy-GA Approach for Parameter Optimization of A Fuzzy Expert System for Diagnosis of Acute Lymphocytic Leukemia in Children [Volume 2, Issue 2, 2016, Pages 33-42]

  • Genetic algorithm Optimal Trajectory Planning of a Box Transporter Mobile Robot [Volume 2, Issue 3, 2016, Pages 35-42]

  • Genetic algorithm Improvement of effort estimation accuracy in software projects using a feature selection approach [Volume 2, Issue 4, 2016, Pages 31-38]

  • Genetic algorithm Coverage Improvement In Wireless Sensor Networks Based On Fuzzy-Logic And Genetic Algorithm [Volume 3, Issue 4, 2017, Pages 189-194]

  • Genetic algorithm A Genetic Based Resource Management Algorithm Considering Energy Efficiency in Cloud Computing Systems [Volume 3, Issue 4, 2017, Pages 203-212]

  • Genetic algorithm A New Method for Intrusion Detection Using Genetic Algorithm and Neural network [Volume 3, Issue 4, 2017, Pages 213-222]

  • Genetic algorithm Robot Path Planning Using Cellular Automata and Genetic Algorithm [Volume 5, Issue 1, 2019, Pages 19-26]

  • Genetic algorithm Performance Evaluation of the Effect of Optimally Tuned IMC and PID Controllers on a Poultry Feed Dispensing System [Volume 6, Issue 4, 2020, Pages 213-226]

  • Genetic algorithm Adaptive Genetic Algorithm for Community Detection Based on The Characteristics and Structure of Social Networks [(Articles in Press)]

  • Geographic routing Routing Hole Handling Techniques for Wireless Sensor Networks: A Review [Volume 6, Issue 2, 2020, Pages 47-60]

  • Glucose-Insulin Blood System Chaotic dynamic analysis and nonlinear control of blood glucose regulation system in type 1 diabetic patients [Volume 5, Issue 2, 2019, Pages 81-92]

  • GPU Parallelization of Rich Models for Steganalysis of Digital Images using a CUDA-based Approach [Volume 3, Issue 2, 2017, Pages 81-88]

  • Gradient descent Type-2 Fuzzy Logic Approach To Increase The Accuracy Of Software Development Effort Estimation [Volume 2, Issue 4, 2016, Pages 9-16]

  • Gradient direction Reconstruction of contour lines during the digitization of contour maps to build a digital elevation model [Volume 6, Issue 4, 2020, Pages 239-250]

  • Gray wolf optimizer An Improved Bat Algorithm with Grey Wolf Optimizer for Solving Continuous Optimization Problems [Volume 6, Issue 3, 2020, Pages 119-132]

H

  • Hadoop Adaptive Dynamic Data Placement Algorithm for Hadoop in Heterogeneous Environments [Volume 2, Issue 4, 2016, Pages 17-30]

  • Hadoop 2016 Olympic Games on Twitter: Sentiment Analysis of Sports Fans Tweets using Big Data Framework [Volume 5, Issue 3, 2019, Pages 143-160]

  • Hammerstein-Wiener model Nonlinear System Identification Using Hammerstein-Wiener Neural Network and subspace algorithms [Volume 1, Issue 3, 2015, Pages 1-8]

  • Harmony Search Algorithm Combining Harmony search algorithm and Ant Colony Optimization algorithm to increase the lifetime of Wireless Sensor Networks [Volume 1, Issue 3, 2015, Pages 9-16]

  • Harris Hawk Optimization Algorithm Community Detection on Social Networks Using the Improved Harris Hawk Optimization Algorithm [(Articles in Press)]

  • Heterogeneous Adaptive Dynamic Data Placement Algorithm for Hadoop in Heterogeneous Environments [Volume 2, Issue 4, 2016, Pages 17-30]

  • Heuristic Algorithms Intelligent Resource Allocation in Fog Computing: A Learning Automata Approach [Volume 7, Issue 1, 2021, Pages 19-34]

  • Hidden node problem Hierarchal Grouping Strategy with Adaptive Power Tuning in ZigBee Wireless Sensor Networks [Volume 2, Issue 1, 2016, Pages 27-36]

  • Hierarchal fuzzy logic structure A Near Optimal Approach in Choosing The Appropriate Physical Machines for Live Virtual Machines Migration in Cloud Computing [Volume 1, Issue 3, 2015, Pages 23-32]

  • HTTP HF-Blocker: Detection of Distributed Denial of Service Attacks Based On Botnets [Volume 1, Issue 3, 2015, Pages 39-45]

  • HTTP Flood HF-Blocker: Detection of Distributed Denial of Service Attacks Based On Botnets [Volume 1, Issue 3, 2015, Pages 39-45]

  • HTTP Traffic Analysis Detecting Bot Networks Based On HTTP And TLS Traffic Analysis [Volume 6, Issue 2, 2020, Pages 61-70]

  • Hybridization Hybridization of Facial Features and Use of Multi Modal Information for 3D Face Recognition [Volume 6, Issue 1, 2020, Pages 1-8]

  • Hyperlipidemia Diagnosis of hyperlipidemia in patients based on an artificial neural network with pso algorithm [Volume 3, Issue 1, 2017, Pages 19-30]

I

  • IaaS cloud A Method for Measuring Energy Consumption in IaaS Cloud [Volume 6, Issue 3, 2020, Pages 145-154]

  • IMDB Alleviation of Cold Start in Movie Recommendation Systems using Sentiment Analysis of Multi-Modal Social Networks [Volume 6, Issue 4, 2020, Pages 251-264]

  • Impacts IMPACTS AND CHALLENGES OF CLOUD COMPUTING FOR SMALL AND MEDIUM SCALE BUSINESSES IN NIGERIA [Volume 5, Issue 3, 2019, Pages 169-180]

  • Imperialist Competitive Algorithm An Improved Imperialist Competitive Algorithm based on a new assimilation strategy [Volume 2, Issue 2, 2016, Pages 23-32]

  • Imperialist Competitive Algorithm Trust management in fog computing using the multi-objective imperialist competitive optimization algorithm. [(Articles in Press)]

  • Imperialist Competitive Algorithm (ICA) A New RSTB Invariant Image Template Matching Based on Log-Spectrum and Modified ICA [Volume 1, Issue 1, 2015, Pages 19-28]

  • Index Terms— Cloud Computing Data Replication-Based Scheduling in Cloud Computing Environment [Volume 3, Issue 2, 2017, Pages 75-80]

  • Industrial Process Optimization Reengineering the Industrial CMMI [Volume 4, Issue 3, 2018, Pages 135-142]

  • Informational Object A Version Numbering Scheme for Informational Objects Used in VM Live Migration [Volume 5, Issue 4, 2019, Pages 245-254]

  • Information Retrieval Document Analysis And Classification Based On Passing Window [Volume 6, Issue 1, 2020, Pages 39-46]

  • Information Retrieval An Effective Path-aware Approach for Keyword Search over Data Graphs [Volume 6, Issue 3, 2020, Pages 169-186]

  • Information spreading An Effective Path-aware Approach for Keyword Search over Data Graphs [Volume 6, Issue 3, 2020, Pages 169-186]

  • Information Technology The Impact of the Adoption Business Intelligence among Iranian Banks [Volume 4, Issue 1, 2018, Pages 13-20]

  • Intelligent control Quadrotor UAV Guidence For Ground Moving Target Tracking [Volume 2, Issue 1, 2016, Pages 37-44]

  • Interference Alignment The Optimal MMSE Transceiver Design for IoT-oriented Cognitive Radio Systems [Volume 5, Issue 3, 2019, Pages 161-168]

  • Internal Model Controller Performance Evaluation of the Effect of Optimally Tuned IMC and PID Controllers on a Poultry Feed Dispensing System [Volume 6, Issue 4, 2020, Pages 213-226]

  • Internet of Things Statistical Analysis on IoT Research Trends: A Survey [Volume 4, Issue 2, 2018, Pages 101-134]

  • Internet of Things The Optimal MMSE Transceiver Design for IoT-oriented Cognitive Radio Systems [Volume 5, Issue 3, 2019, Pages 161-168]

  • Internet of Things (IoT) Energy-aware and Reliable Service Placement of IoT applications on Fog Computing Platforms by Utilizing Whale Optimization Algorithm [Volume 7, Issue 1, 2021, Pages 67-80]

  • Intrinsic Motivation Intrinsic vs. Extrinsic Motivation in an Interactive Engineering Game [Volume 5, Issue 1, 2019, Pages 37-48]

  • Intrusion Detection Detecting Active Bot Networks Based on DNS Traffic Analysis [Volume 5, Issue 3, 2019, Pages 129-142]

  • Intrusion Detection Detecting Bot Networks Based On HTTP And TLS Traffic Analysis [Volume 6, Issue 2, 2020, Pages 61-70]

  • Intrusion Detection System A New Method for Intrusion Detection Using Genetic Algorithm and Neural network [Volume 3, Issue 4, 2017, Pages 213-222]

  • Invasive Weed Optimization A New Approach for Text Documents Classification with Invasive Weed Optimization and Naive Bayes Classifier [Volume 4, Issue 3, 2018, Pages 167-184]

  • Invasive Weed Optimization (IWO) A Hybrid Intelligent Model to Increase the Accuracy of COCOMO [Volume 3, Issue 2, 2017, Pages 107-112]

  • Inverse Kinematic Model (IKM) Using a Neural Network instead of IKM in 2R Planar Robot to follow rectangular path [Volume 6, Issue 2, 2020, Pages 71-78]

  • IoT Traffic congestion control using Smartphone sensors based on IoT Technology [Volume 3, Issue 4, 2017, Pages 223-228]

  • IoT Investigating the Factors Affecting the Readiness Level of IoT Technology Acceptance (Case Study: Financial Activists, Stock Exchange, and Financial Institutions) [Volume 7, Issue 2, 2021, Pages 103-126]

  • IoT Abstract Integration of IoT, Fog and Cloud Layers with Support for Availability, Performance and Interoperability Quality Attributes [(Articles in Press)]

  • Island Genetic Algorithm A New Approach to Solve N-Queen Problem with Parallel Genetic Algorithm [Volume 4, Issue 2, 2018, Pages 69-78]

  • ISM Band A Detailed Exploration of Usability Statistics and Application Rating Based on Wireless Protocols [Volume 6, Issue 1, 2020, Pages 9-18]

  • ITS Vehicular Networks: A Survey on Architecture, Communication Technologies and Applications [Volume 2, Issue 3, 2016, Pages 43-53]

  • ITS Traffic congestion control using Smartphone sensors based on IoT Technology [Volume 3, Issue 4, 2017, Pages 223-228]

  • ITS Implementation of Random Forest Algorithm in Order to Use Big Data to Improve Real-Time Traffic Monitoring and Safety [Volume 4, Issue 2, 2018, Pages 51-60]

  • ITSM Leveraging Engaged Parties in SIP Domains of eTOM Framework by using ITSM Reference Model [Volume 2, Issue 4, 2016, Pages 49-55]

J

  • Job Scheduling Data Replication-Based Scheduling in Cloud Computing Environment [Volume 3, Issue 2, 2017, Pages 75-80]

K

  • Key pre-distribution Hybrid Key pre-distribution scheme for wireless sensor network based on combinatorial design [Volume 1, Issue 3, 2015, Pages 33-38]

  • Keyword search An Effective Path-aware Approach for Keyword Search over Data Graphs [Volume 6, Issue 3, 2020, Pages 169-186]

  • Key words: Kinetic study The Kinematic Analysis Of Four Degrees Of Freedom For A Medical Robot And Control It By Labview And Arduino Mega2560 (Simulation And Implementation) [Volume 6, Issue 1, 2020, Pages 33-38]

  • Keywords: social networks Analysis of Users’ Opinions about Reasons for Divorce [Volume 2, Issue 4, 2016, Pages 1-8]

  • K-means A Hybrid Data Clustering Algorithm Using Modified Krill Herd Algorithm and K-MEANS [Volume 5, Issue 2, 2019, Pages 93-106]

  • K-means A New Model-based Bald Eagle Search Algorithm with Sine Cosine Algorithm for Data Clustering [Volume 7, Issue 3, 2021, Pages 177-186]

  • Kmeans clustering Experimental Evaluation of Algorithmic Effort Estimation Models using Projects Clustering [Volume 2, Issue 3, 2016, Pages 15-26]

  • K-modes An Optimization K-Modes Clustering Algorithm with Elephant Herding Optimization Algorithm for Crime Clustering [Volume 6, Issue 2, 2020, Pages 79-90]

  • K-Nearest Neighbors A Novel Hybrid Approach for Email Spam Detection based on Scatter Search Algorithm and K-Nearest Neighbors [Volume 5, Issue 3, 2019, Pages 181-194]

  • Knowledge Mining Techniques Sports Result Prediction Based on Machine Learning and Computational Intelligence Approaches: A Survey [Volume 5, Issue 1, 2019, Pages 27-36]

  • Krill Herd A Hybrid Data Clustering Algorithm Using Modified Krill Herd Algorithm and K-MEANS [Volume 5, Issue 2, 2019, Pages 93-106]

L

  • Labview The Kinematic Analysis Of Four Degrees Of Freedom For A Medical Robot And Control It By Labview And Arduino Mega2560 (Simulation And Implementation) [Volume 6, Issue 1, 2020, Pages 33-38]

  • Large dataset Scalable Fuzzy Decision Tree Induction Using Fast Data Partitioning and Incremental Approach for Large Dataset [Volume 7, Issue 1, 2021, Pages 55-66]

  • Latency Application Mapping onto Network-on-Chip using Bypass Channel [Volume 2, Issue 3, 2016, Pages 1-8]

  • Layered Architecture A Multi-layer Architecture Based on MCDM Methods to Select the Best E-Readiness Assessment Model According to SWOT Analysis [Volume 3, Issue 2, 2017, Pages 65-74]

  • Learning performance Two Novel Learning Algorithms for CMAC Neural Network Based on Changeable Learning Rate [Volume 1, Issue 1, 2015, Pages 37-42]

  • Learning rate Two Novel Learning Algorithms for CMAC Neural Network Based on Changeable Learning Rate [Volume 1, Issue 1, 2015, Pages 37-42]

  • Levy-flight distribution A Hybrid Data Clustering Algorithm Using Modified Krill Herd Algorithm and K-MEANS [Volume 5, Issue 2, 2019, Pages 93-106]

  • Linear Discriminant Analysis Classifier Ensemble Framework: a Diversity Based Approach [Volume 2, Issue 2, 2016, Pages 1-10]

  • Load Balancing An Effective Task Scheduling Framework for Cloud Computing using NSGA-II [Volume 6, Issue 3, 2020, Pages 155-168]

  • Logarithmic Spectrum A New RSTB Invariant Image Template Matching Based on Log-Spectrum and Modified ICA [Volume 1, Issue 1, 2015, Pages 19-28]

  • Low level feature Tags Re-ranking Using Multi-level Features in Automatic Image Annotation [Volume 5, Issue 4, 2019, Pages 255-265]

  • Lyapunov exponent Chaotic dynamic analysis and nonlinear control of blood glucose regulation system in type 1 diabetic patients [Volume 5, Issue 2, 2019, Pages 81-92]

M

  • Machine Learning technique PEML-E: EEG eye state classification using ensembles and machine learning methods [Volume 7, Issue 2, 2021, Pages 147-156]

  • Mach-Zehnder Interferometer A Review of Optical Routers in Photonic Networks-on-Chip: A Literature Survey [Volume 4, Issue 3, 2018, Pages 143-154]

  • Magnetic levitation Offline Auto-Tuning of a PID Controller Using Extended Classifier System (XCS) Algorithm [Volume 3, Issue 1, 2017, Pages 41-44]

  • MANET Improving Quality of Service Routing in Mobile Ad Hoc Networks Using OLSR [Volume 1, Issue 1, 2015, Pages 51-58]

  • MapReduce Adaptive Dynamic Data Placement Algorithm for Hadoop in Heterogeneous Environments [Volume 2, Issue 4, 2016, Pages 17-30]

  • Materialism The impact of behavioral factors on Propensity toward indebtedness Case Study: Indebted‏‏‏ customers of Maskan Bank, Tehran province (Geographic regions: East) [Volume 3, Issue 3, 2017, Pages 145-152]

  • MCDM A New Multi-Criteria Decision Making Based on Fuzzy- Topsis Theory [Volume 2, Issue 4, 2016, Pages 39-48]

  • Medical Image Processing A Novel Fuzzy-C Means Image Segmentation Model for MRI Brain Tumor Diagnosis [Volume 6, Issue 1, 2020, Pages 19-24]

  • Meta-Heuristic Algorithm An Optimization-based Learning Black Widow Optimization Algorithm for Text Psychology [Volume 7, Issue 1, 2021, Pages 81-92]

  • Micro Ring Resonator A Review of Optical Routers in Photonic Networks-on-Chip: A Literature Survey [Volume 4, Issue 3, 2018, Pages 143-154]

  • MIMO Decentralized Fuzzy-PID Based Control Model for a Multivariable Liquid Level System [Volume 4, Issue 4, 2018, Pages 247-254]

  • Min-Min TASA: A New Task Scheduling Algorithm in Cloud Computing [Volume 1, Issue 4, 2015, Pages 25-32]

  • MLR Experimental Evaluation of Algorithmic Effort Estimation Models using Projects Clustering [Volume 2, Issue 3, 2016, Pages 15-26]

  • MMSE The Optimal MMSE Transceiver Design for IoT-oriented Cognitive Radio Systems [Volume 5, Issue 3, 2019, Pages 161-168]

  • Mobile Ad hoc Networks Improvement of the mechanism of congestion avoidance in mobile networks [Volume 2, Issue 2, 2016, Pages 43-48]

  • Mobile Ad hoc Networks A Survey on Routing Protocols in Vehicular Ad hoc Network [Volume 7, Issue 3, 2021, Pages 167-176]

  • Mobile Communications Vehicular Networks: A Survey on Architecture, Communication Technologies and Applications [Volume 2, Issue 3, 2016, Pages 43-53]

  • Mobile Robots Optimal Trajectory Planning of a Box Transporter Mobile Robot [Volume 2, Issue 3, 2016, Pages 35-42]

  • Mobility Model A Fuzzy Realistic Mobility Model for Ad hoc Networks [Volume 1, Issue 1, 2015, Pages 9-18]

  • Model checking Formal Method in Service Composition in Heath Care Systems [Volume 4, Issue 1, 2018, Pages 1-6]

  • Modeling Quadrotor UAV Guidence For Ground Moving Target Tracking [Volume 2, Issue 1, 2016, Pages 37-44]

  • Modified-Neighbor-on-Path (MNoP) Congestion estimation of router input ports in Network-on-Chip for efficient virtual allocation [Volume 4, Issue 2, 2018, Pages 79-86]

  • Mojo Box office Alleviation of Cold Start in Movie Recommendation Systems using Sentiment Analysis of Multi-Modal Social Networks [Volume 6, Issue 4, 2020, Pages 251-264]

  • Movie Recommendation Systems Alleviation of Cold Start in Movie Recommendation Systems using Sentiment Analysis of Multi-Modal Social Networks [Volume 6, Issue 4, 2020, Pages 251-264]

  • Moving Targets Dynamic Clustering for Wireless Sensor Networks: A Hybrid Artificial Bee Colony and Fuzzy TOPSIS Approach [(Articles in Press)]

  • MPC Traffic congestion control using Smartphone sensors based on IoT Technology [Volume 3, Issue 4, 2017, Pages 223-228]

  • Multi-Agent Systems Using fuzzy c-means clustering algorithm for common lecturer timetabling among departments [Volume 3, Issue 1, 2017, Pages 45-64]

  • Multi-criteria decision making methods A Multi-layer Architecture Based on MCDM Methods to Select the Best E-Readiness Assessment Model According to SWOT Analysis [Volume 3, Issue 2, 2017, Pages 65-74]

  • Multi-objective optimization An Effective Task Scheduling Framework for Cloud Computing using NSGA-II [Volume 6, Issue 3, 2020, Pages 155-168]

  • Multiple Criteria Decision Making A Fuzzy TOPSIS Approach for Big Data Analytics Platform Selection [Volume 5, Issue 1, 2019, Pages 49-56]

  • Multiple Workflow Scheduling Workflow Scheduling on Hybrid Fog-Cloud Environment Based on a Novel Critical Path Extraction Algorithm [Volume 7, Issue 2, 2021, Pages 126-136]

  • Multiplex Network Utilizes the Community Detection for Increase Trust using Multiplex Networks [Volume 4, Issue 1, 2018, Pages 21-26]

  • Multivariable Decentralized Fuzzy-PID Based Control Model for a Multivariable Liquid Level System [Volume 4, Issue 4, 2018, Pages 247-254]

N

  • Naive Bayes A New Approach for Text Documents Classification with Invasive Weed Optimization and Naive Bayes Classifier [Volume 4, Issue 3, 2018, Pages 167-184]

  • Napster P2P Network Trust Management Survey [Volume 3, Issue 2, 2017, Pages 89-106]

  • Neighbor-on-Path (NoP) Congestion estimation of router input ports in Network-on-Chip for efficient virtual allocation [Volume 4, Issue 2, 2018, Pages 79-86]

  • Neighbor voting Tags Re-ranking Using Multi-level Features in Automatic Image Annotation [Volume 5, Issue 4, 2019, Pages 255-265]

  • Nerual Networks A New Architecture Based on Artificial Neural Network and PSO Algorithm for Estimating Software Development Effort [Volume 4, Issue 1, 2018, Pages 7-12]

  • Network-on-Chip Application Mapping onto Network-on-Chip using Bypass Channel [Volume 2, Issue 3, 2016, Pages 1-8]

  • Network-on-Chip CAFT: Cost-aware and Fault-tolerant routing algorithm in 2D mesh Network-on-Chip [Volume 5, Issue 4, 2019, Pages 205-212]

  • Network-on-chip (NoC) Congestion estimation of router input ports in Network-on-Chip for efficient virtual allocation [Volume 4, Issue 2, 2018, Pages 79-86]

  • Network Parameters Network Investigation and Performance Analysis of ZigBee Technology using OPNET [Volume 4, Issue 4, 2018, Pages 209-218]

  • Network Security Detecting Active Bot Networks Based on DNS Traffic Analysis [Volume 5, Issue 3, 2019, Pages 129-142]

  • Network Security Detecting Bot Networks Based On HTTP And TLS Traffic Analysis [Volume 6, Issue 2, 2020, Pages 61-70]

  • Networks-on-chip Cost-aware Topology Customization of Mesh-based Networks-on-Chip [Volume 4, Issue 2, 2018, Pages 61-68]

  • Neural Network Nonlinear System Identification Using Hammerstein-Wiener Neural Network and subspace algorithms [Volume 1, Issue 3, 2015, Pages 1-8]

  • Neural Network A New Method for Intrusion Detection Using Genetic Algorithm and Neural network [Volume 3, Issue 4, 2017, Pages 213-222]

  • Neural Network Coastal Water Level Prediction Model Using Adaptive Neuro-fuzzy Inference System [Volume 5, Issue 1, 2019, Pages 11-18]

  • Neural Network (NN) Using a Neural Network instead of IKM in 2R Planar Robot to follow rectangular path [Volume 6, Issue 2, 2020, Pages 71-78]

  • Neuro-Fuzzy Type-2 Fuzzy Logic Approach To Increase The Accuracy Of Software Development Effort Estimation [Volume 2, Issue 4, 2016, Pages 9-16]

  • NFC A Detailed Exploration of Usability Statistics and Application Rating Based on Wireless Protocols [Volume 6, Issue 1, 2020, Pages 9-18]

  • Node Density Network Parameters Evaluation in Vehicular Ad-hoc Network (VANET) Routing Protocols for Efficient Message Delivery in City Environment [Volume 4, Issue 3, 2018, Pages 185-192]

  • Nodes Signal A Fuzzy Realistic Mobility Model for Ad hoc Networks [Volume 1, Issue 1, 2015, Pages 9-18]

  • Non-prehensile Manipulation Optimal Trajectory Planning of a Box Transporter Mobile Robot [Volume 2, Issue 3, 2016, Pages 35-42]

  • N-Queen Problem A New Approach to Solve N-Queen Problem with Parallel Genetic Algorithm [Volume 4, Issue 2, 2018, Pages 69-78]

  • NSGA-II An Effective Task Scheduling Framework for Cloud Computing using NSGA-II [Volume 6, Issue 3, 2020, Pages 155-168]

O

  • OLSR Improving Quality of Service Routing in Mobile Ad Hoc Networks Using OLSR [Volume 1, Issue 1, 2015, Pages 51-58]

  • OMNet++ Network Parameters Evaluation in Vehicular Ad-hoc Network (VANET) Routing Protocols for Efficient Message Delivery in City Environment [Volume 4, Issue 3, 2018, Pages 185-192]

  • Onlooker bee A hybrid meta-heuristic algorithm based on ABC and Firefly algorithms [Volume 1, Issue 4, 2015, Pages 53-58]

  • Ontologies A procedure for Web Service Selection Using WS-Policy Semantic Matching [Volume 6, Issue 2, 2020, Pages 91-106]

  • Ontology An Improved Semantic Schema Matching Approach [Volume 1, Issue 1, 2015, Pages 29-36]

  • OPNET Network Investigation and Performance Analysis of ZigBee Technology using OPNET [Volume 4, Issue 4, 2018, Pages 209-218]

  • Opposition-based Learning Community Detection on Social Networks Using the Improved Harris Hawk Optimization Algorithm [(Articles in Press)]

  • Optical Network on Chip A Review of Optical Routers in Photonic Networks-on-Chip: A Literature Survey [Volume 4, Issue 3, 2018, Pages 143-154]

  • Optical Router A Review of Optical Routers in Photonic Networks-on-Chip: A Literature Survey [Volume 4, Issue 3, 2018, Pages 143-154]

  • Optimal Routing Robot Path Planning Using Cellular Automata and Genetic Algorithm [Volume 5, Issue 1, 2019, Pages 19-26]

  • Optimization A New Optimized Hybrid Model Based On COCOMO to Increase the Accuracy of Software Cost Estimation [Volume 4, Issue 1, 2018, Pages 27-40]

  • Optimization An Improved Bat Algorithm with Grey Wolf Optimizer for Solving Continuous Optimization Problems [Volume 6, Issue 3, 2020, Pages 119-132]

  • Optimization An Improved Bat Algorithm based on Whale Optimization Algorithm for Data Clustering [Volume 6, Issue 4, 2020, Pages 227-238]

  • Optimization Algorithm An Improved Imperialist Competitive Algorithm based on a new assimilation strategy [Volume 2, Issue 2, 2016, Pages 23-32]

  • Optimization Algorithm A modified differential evolution algorithm with a balanced performance for Exploration and Exploitation phases [Volume 7, Issue 1, 2021, Pages 1-18]

  • Optimization Algorithms Robot Path Planning Using Cellular Automata and Genetic Algorithm [Volume 5, Issue 1, 2019, Pages 19-26]

  • Optimization Algorithms An Overview of the Concepts, Classifications, and Methods of Population Initialization in Metaheuristic Algorithms [Volume 7, Issue 1, 2021, Pages 35-54]

  • Overflow Detection Overflow Detection in Residue Number System, Moduli Set {2n-1,2n,2n+1} [Volume 2, Issue 1, 2016, Pages 9-16]

  • Overshoot Decentralized Fuzzy-PID Based Control Model for a Multivariable Liquid Level System [Volume 4, Issue 4, 2018, Pages 247-254]

P

  • Packet Dropping IMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks [Volume 4, Issue 2, 2018, Pages 87-100]

  • Packet fake routing IMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks [Volume 4, Issue 2, 2018, Pages 87-100]

  • Packet loss Improving QoS in VANETs: A Survey [Volume 3, Issue 3, 2017, Pages 153-166]

  • Packet modification IMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks [Volume 4, Issue 2, 2018, Pages 87-100]

  • Panel data The impact of corporate governance on the financial performance of listed companies in the Tehran Stock Exchange Chemical industry [Volume 3, Issue 3, 2017, Pages 167-172]

  • Parallel Genetic Algorithms A New Approach to Solve N-Queen Problem with Parallel Genetic Algorithm [Volume 4, Issue 2, 2018, Pages 69-78]

  • Parallelization Parallelization of Rich Models for Steganalysis of Digital Images using a CUDA-based Approach [Volume 3, Issue 2, 2017, Pages 81-88]

  • Particle swarm optimization A New Shuffled Sub-swarm Particle Swarm Optimization Algorithm for Speech Enhancement [Volume 1, Issue 1, 2015, Pages 43-50]

  • Particle swarm optimization A New Architecture Based on Artificial Neural Network and PSO Algorithm for Estimating Software Development Effort [Volume 4, Issue 1, 2018, Pages 7-12]

  • Parties Leveraging Engaged Parties in SIP Domains of eTOM Framework by using ITSM Reference Model [Volume 2, Issue 4, 2016, Pages 49-55]

  • Pattern Recognition Recognizing the Emotional State Changes in Human Utterance by a Learning Statistical Method based on Gaussian Mixture Model [Volume 3, Issue 2, 2017, Pages 113-124]

  • Pattern Recognition Sports Result Prediction Based on Machine Learning and Computational Intelligence Approaches: A Survey [Volume 5, Issue 1, 2019, Pages 27-36]

  • Pattern Recognition A Novel Fuzzy-C Means Image Segmentation Model for MRI Brain Tumor Diagnosis [Volume 6, Issue 1, 2020, Pages 19-24]

  • Peer to Peer Network P2P Network Trust Management Survey [Volume 3, Issue 2, 2017, Pages 89-106]

  • Persian language Designing and implementing a system for Automatic recognition of Persian letters by Lip-reading using image processing methods [Volume 5, Issue 2, 2019, Pages 71-80]

  • Pervasive healthcare Formal Method in Service Composition in Heath Care Systems [Volume 4, Issue 1, 2018, Pages 1-6]

  • Phoronix Test Suite A Method for Measuring Energy Consumption in IaaS Cloud [Volume 6, Issue 3, 2020, Pages 145-154]

  • PID & PI controller A MATLAB / SIMULINK BASED FAULT ANALYSIS OF SMALL HYDROPOWER PLANT [Volume 5, Issue 4, 2019, Pages 221-232]

  • PID Controller Performance Evaluation of the Effect of Optimally Tuned IMC and PID Controllers on a Poultry Feed Dispensing System [Volume 6, Issue 4, 2020, Pages 213-226]

  • PID controller tuning Offline Auto-Tuning of a PID Controller Using Extended Classifier System (XCS) Algorithm [Volume 3, Issue 1, 2017, Pages 41-44]

  • Position-based routing An Improved Junction-Based Directional Routing Protocol (IJDRP) for VANETs [Volume 6, Issue 3, 2020, Pages 133-144]

  • Poultry Feed Performance Evaluation of the Effect of Optimally Tuned IMC and PID Controllers on a Poultry Feed Dispensing System [Volume 6, Issue 4, 2020, Pages 213-226]

  • Precoding The Optimal MMSE Transceiver Design for IoT-oriented Cognitive Radio Systems [Volume 5, Issue 3, 2019, Pages 161-168]

  • Pre-processing PEML-E: EEG eye state classification using ensembles and machine learning methods [Volume 7, Issue 2, 2021, Pages 147-156]

  • Privacy Development of Blockchain Technology [Volume 6, Issue 4, 2020, Pages 265-272]

  • Process Engineering Reengineering the Industrial CMMI [Volume 4, Issue 3, 2018, Pages 135-142]

  • Product Quality Assurance Reengineering the Industrial CMMI [Volume 4, Issue 3, 2018, Pages 135-142]

  • Propensity to Indebtedness The impact of behavioral factors on Propensity toward indebtedness Case Study: Indebted‏‏‏ customers of Maskan Bank, Tehran province (Geographic regions: East) [Volume 3, Issue 3, 2017, Pages 145-152]

  • Proportional Integral Derivative (PID) controller Quadrotor Control Using Fractional-Order PI^λ D^μ Control [Volume 5, Issue 1, 2019, Pages 1-10]

  • PSO algorithm Improving the Operation of Text Categorization Systems with Selecting Proper Features Based on PSO-LA [Volume 1, Issue 2, 2015, Pages 1-8]

Q

  • QoS Improving Quality of Service Routing in Mobile Ad Hoc Networks Using OLSR [Volume 1, Issue 1, 2015, Pages 51-58]

  • Quadric Assignment Problem (QAP) A new approach for data visualization problem [Volume 1, Issue 4, 2015, Pages 33-42]

  • Quadrotor Quadrotor Control Using Fractional-Order PI^λ D^μ Control [Volume 5, Issue 1, 2019, Pages 1-10]

  • Quadruple Adaptive Version Numbering Scheme A Version Numbering Scheme for Informational Objects Used in VM Live Migration [Volume 5, Issue 4, 2019, Pages 245-254]

  • Quality of Service (QoS) Hierarchal Grouping Strategy with Adaptive Power Tuning in ZigBee Wireless Sensor Networks [Volume 2, Issue 1, 2016, Pages 27-36]

  • Quality of Service (QoS) Improving QoS in VANETs: A Survey [Volume 3, Issue 3, 2017, Pages 153-166]

  • Quantum dot Cellular Automata (QCA) Novel Defect Terminolgy Beside Evaluation And Design Fault Tolerant Logic Gates In Quantum-Dot Cellular Automata [Volume 2, Issue 1, 2016, Pages 17-26]

R

  • Random forest Implementation of Random Forest Algorithm in Order to Use Big Data to Improve Real-Time Traffic Monitoring and Safety [Volume 4, Issue 2, 2018, Pages 51-60]

  • Random Forest classifier Financial Fraud Detection in IoT Using Sequence Classification Based Method [(Articles in Press)]

  • Ranking A New Hybrid Method for Web Pages Ranking in Search Engines [Volume 5, Issue 4, 2019, Pages 233-244]

  • RAPL A Method for Measuring Energy Consumption in IaaS Cloud [Volume 6, Issue 3, 2020, Pages 145-154]

  • Rate allocation A Differentiated Pricing Framework for Improving the Performance of the Elastic Traffics in Data Networks [Volume 1, Issue 1, 2015, Pages 59-64]

  • Rate Control Improvement of the mechanism of congestion avoidance in mobile networks [Volume 2, Issue 2, 2016, Pages 43-48]

  • RDF Schema An Improved Semantic Schema Matching Approach [Volume 1, Issue 1, 2015, Pages 29-36]

  • Realistic Mobility Model A Fuzzy Realistic Mobility Model for Ad hoc Networks [Volume 1, Issue 1, 2015, Pages 9-18]

  • Recommender system Optimization of weighting-based approach to predict and deal with cold start of web recommender systems using cuckoo algorithm [Volume 7, Issue 2, 2021, Pages 137-146]

  • Regression Experimental Evaluation of Algorithmic Effort Estimation Models using Projects Clustering [Volume 2, Issue 3, 2016, Pages 15-26]

  • Relational database metadata Metadata Enrichment for Automatic Data Entry Based on Relational Data Models [Volume 4, Issue 3, 2018, Pages 193-208]

  • Relevant answers An Effective Path-aware Approach for Keyword Search over Data Graphs [Volume 6, Issue 3, 2020, Pages 169-186]

  • Reliability Reliability and Availability Improvement in Economic Data Grid Environment Based On Clustering Approach [Volume 1, Issue 4, 2015, Pages 1-14]

  • Renewable energy A MATLAB / SIMULINK BASED FAULT ANALYSIS OF SMALL HYDROPOWER PLANT [Volume 5, Issue 4, 2019, Pages 221-232]

  • Reputation An Unlinkable Reputation Transfer Framework for Blockchain-based Retail Markets Using Non-fungible Tokens [(Articles in Press)]

  • Requirement Management Telcos Leveraging Engaged Parties in SIP Domains of eTOM Framework by using ITSM Reference Model [Volume 2, Issue 4, 2016, Pages 49-55]

  • Research domains and sub-domains Statistical Analysis on IoT Research Trends: A Survey [Volume 4, Issue 2, 2018, Pages 101-134]

  • Residue Number System Overflow Detection in Residue Number System, Moduli Set {2n-1,2n,2n+1} [Volume 2, Issue 1, 2016, Pages 9-16]

  • Resource Allocation Optimization Task Scheduling Algorithm in Cloud Computing [Volume 1, Issue 3, 2015, Pages 17-22]

  • Resource Allocation A review of methods for resource allocation and operational framework in cloud computing [Volume 3, Issue 3, 2017, Pages 173-180]

  • Resource Allocation Intelligent Resource Allocation in Fog Computing: A Learning Automata Approach [Volume 7, Issue 1, 2021, Pages 19-34]

  • Resource-aware Adaptive Dynamic Data Placement Algorithm for Hadoop in Heterogeneous Environments [Volume 2, Issue 4, 2016, Pages 17-30]

  • Response Time Data Replication-Based Scheduling in Cloud Computing Environment [Volume 3, Issue 2, 2017, Pages 75-80]

  • Result Prediction Sports Result Prediction Based on Machine Learning and Computational Intelligence Approaches: A Survey [Volume 5, Issue 1, 2019, Pages 27-36]

  • Rich models Parallelization of Rich Models for Steganalysis of Digital Images using a CUDA-based Approach [Volume 3, Issue 2, 2017, Pages 81-88]

  • Ring Projection Transform (RPT) A New RSTB Invariant Image Template Matching Based on Log-Spectrum and Modified ICA [Volume 1, Issue 1, 2015, Pages 19-28]

  • Risk Assessment Design Software Failure Mode and Effect Analysis using Fuzzy TOPSIS Based on Fuzzy Entropy [Volume 6, Issue 3, 2020, Pages 187-200]

  • Risk Behavior The impact of behavioral factors on Propensity toward indebtedness Case Study: Indebted‏‏‏ customers of Maskan Bank, Tehran province (Geographic regions: East) [Volume 3, Issue 3, 2017, Pages 145-152]

  • RMSE Coastal Water Level Prediction Model Using Adaptive Neuro-fuzzy Inference System [Volume 5, Issue 1, 2019, Pages 11-18]

  • Robot Path Planning Robot Path Planning Using Cellular Automata and Genetic Algorithm [Volume 5, Issue 1, 2019, Pages 19-26]

  • Routing Overhead Network Parameters Evaluation in Vehicular Ad-hoc Network (VANET) Routing Protocols for Efficient Message Delivery in City Environment [Volume 4, Issue 3, 2018, Pages 185-192]

  • Routing Protocol Improving Quality of Service Routing in Mobile Ad Hoc Networks Using OLSR [Volume 1, Issue 1, 2015, Pages 51-58]

  • Routing protocols Network Parameters Evaluation in Vehicular Ad-hoc Network (VANET) Routing Protocols for Efficient Message Delivery in City Environment [Volume 4, Issue 3, 2018, Pages 185-192]

  • RSTB invariant template matching A New RSTB Invariant Image Template Matching Based on Log-Spectrum and Modified ICA [Volume 1, Issue 1, 2015, Pages 19-28]

  • Rule A procedure for Web Service Selection Using WS-Policy Semantic Matching [Volume 6, Issue 2, 2020, Pages 91-106]

S

  • Safety A Survey on Routing Protocols in Vehicular Ad hoc Network [Volume 7, Issue 3, 2021, Pages 167-176]

  • Satellite beacon receiver Typical Ka band Satellite Beacon Receiver Design for Propagation Experimentation [Volume 1, Issue 2, 2015, Pages 23-28]

  • Satellite communications Typical Ka band Satellite Beacon Receiver Design for Propagation Experimentation [Volume 1, Issue 2, 2015, Pages 23-28]

  • Satellite wave propagation Typical Ka band Satellite Beacon Receiver Design for Propagation Experimentation [Volume 1, Issue 2, 2015, Pages 23-28]

  • Scatter Searching Algorithm A Novel Hybrid Approach for Email Spam Detection based on Scatter Search Algorithm and K-Nearest Neighbors [Volume 5, Issue 3, 2019, Pages 181-194]

  • Search Engine A New Hybrid Method for Web Pages Ranking in Search Engines [Volume 5, Issue 4, 2019, Pages 233-244]

  • Security A Novel Trust Management Model in the Social Internet of Things [Volume 5, Issue 2, 2019, Pages 57-70]

  • Security Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines [Volume 5, Issue 2, 2019, Pages 107-116]

  • Security Threats Detecting Active Bot Networks Based on DNS Traffic Analysis [Volume 5, Issue 3, 2019, Pages 129-142]

  • Security Threats Detecting Bot Networks Based On HTTP And TLS Traffic Analysis [Volume 6, Issue 2, 2020, Pages 61-70]

  • Self Organization Map (SOM) Developing A Fault Diagnosis Approach Based On Artificial Neural Network And Self Organization Map For Occurred ADSL Faults [Volume 3, Issue 3, 2017, Pages 125-134]

  • Self-Regulated Play Intrinsic vs. Extrinsic Motivation in an Interactive Engineering Game [Volume 5, Issue 1, 2019, Pages 37-48]

  • Semantic Matching A procedure for Web Service Selection Using WS-Policy Semantic Matching [Volume 6, Issue 2, 2020, Pages 91-106]

  • Sentiment Analysis 2016 Olympic Games on Twitter: Sentiment Analysis of Sports Fans Tweets using Big Data Framework [Volume 5, Issue 3, 2019, Pages 143-160]

  • Sentiment Analysis Alleviation of Cold Start in Movie Recommendation Systems using Sentiment Analysis of Multi-Modal Social Networks [Volume 6, Issue 4, 2020, Pages 251-264]

  • Service Placement Problem (SPP) Energy-aware and Reliable Service Placement of IoT applications on Fog Computing Platforms by Utilizing Whale Optimization Algorithm [Volume 7, Issue 1, 2021, Pages 67-80]

  • Service Selection A procedure for Web Service Selection Using WS-Policy Semantic Matching [Volume 6, Issue 2, 2020, Pages 91-106]

  • Shuffled Sub-Swarm A New Shuffled Sub-swarm Particle Swarm Optimization Algorithm for Speech Enhancement [Volume 1, Issue 1, 2015, Pages 43-50]

  • Sine-Cosine Algorithm A New Model-based Bald Eagle Search Algorithm with Sine Cosine Algorithm for Data Clustering [Volume 7, Issue 3, 2021, Pages 177-186]

  • Sleep Prevention Attack Improving the security of wireless sensor networks using Game Theory [Volume 7, Issue 2, 2021, Pages 93-102]

  • Sliding Mode Controller Chaotic dynamic analysis and nonlinear control of blood glucose regulation system in type 1 diabetic patients [Volume 5, Issue 2, 2019, Pages 81-92]

  • Smart city Traffic congestion control using Smartphone sensors based on IoT Technology [Volume 3, Issue 4, 2017, Pages 223-228]

  • Smart System SMART ROOM CARBON MONOXIDE MONITORING AND CONTROL SYSTEM [Volume 6, Issue 1, 2020, Pages 25-32]

  • SME IMPACTS AND CHALLENGES OF CLOUD COMPUTING FOR SMALL AND MEDIUM SCALE BUSINESSES IN NIGERIA [Volume 5, Issue 3, 2019, Pages 169-180]

  • Social Internet of Things A Novel Trust Management Model in the Social Internet of Things [Volume 5, Issue 2, 2019, Pages 57-70]

  • Social network Utilizes the Community Detection for Increase Trust using Multiplex Networks [Volume 4, Issue 1, 2018, Pages 21-26]

  • Social network 2016 Olympic Games on Twitter: Sentiment Analysis of Sports Fans Tweets using Big Data Framework [Volume 5, Issue 3, 2019, Pages 143-160]

  • Social Networks Adaptive Genetic Algorithm for Community Detection Based on The Characteristics and Structure of Social Networks [(Articles in Press)]

  • Software architecture Availability evaluation of Software architecture of object oriented Style using coloured Petri nets [Volume 3, Issue 1, 2017, Pages 1-10]

  • Software architecture Abstract Integration of IoT, Fog and Cloud Layers with Support for Availability, Performance and Interoperability Quality Attributes [(Articles in Press)]

  • Software costs estimation A Hybrid Intelligent Model to Increase the Accuracy of COCOMO [Volume 3, Issue 2, 2017, Pages 107-112]

  • Software FMEA, Requirement analysis Design Software Failure Mode and Effect Analysis using Fuzzy TOPSIS Based on Fuzzy Entropy [Volume 6, Issue 3, 2020, Pages 187-200]

  • Spam detection Improve Spam Detection in the Internet Using Feature Selection based on the Metahuristic Algorithms [Volume 7, Issue 2, 2021, Pages 115-125]

  • Speech Enhancement A New Shuffled Sub-swarm Particle Swarm Optimization Algorithm for Speech Enhancement [Volume 1, Issue 1, 2015, Pages 43-50]

  • Sport Matches Sports Result Prediction Based on Machine Learning and Computational Intelligence Approaches: A Survey [Volume 5, Issue 1, 2019, Pages 27-36]

  • Static PCR junction An Improved Junction-Based Directional Routing Protocol (IJDRP) for VANETs [Volume 6, Issue 3, 2020, Pages 133-144]

  • Statistical analysis Statistical Analysis on IoT Research Trends: A Survey [Volume 4, Issue 2, 2018, Pages 101-134]

  • Steganalysis Parallelization of Rich Models for Steganalysis of Digital Images using a CUDA-based Approach [Volume 3, Issue 2, 2017, Pages 81-88]

  • Steganography The Idea Of Using The Steganography As Encryption Tool [Volume 4, Issue 1, 2018, Pages 42-50]

  • Sufferage TASA: A New Task Scheduling Algorithm in Cloud Computing [Volume 1, Issue 4, 2015, Pages 25-32]

  • SUMO Network Parameters Evaluation in Vehicular Ad-hoc Network (VANET) Routing Protocols for Efficient Message Delivery in City Environment [Volume 4, Issue 3, 2018, Pages 185-192]

  • Supervised Algorithm A Review of Fraud Detection Algorithms for Electronic Payment Card Transactions [Volume 7, Issue 3, 2021, Pages 157-166]

  • SWR Experimental Evaluation of Algorithmic Effort Estimation Models using Projects Clustering [Volume 2, Issue 3, 2016, Pages 15-26]

  • Symmetric BIBD Hybrid Key pre-distribution scheme for wireless sensor network based on combinatorial design [Volume 1, Issue 3, 2015, Pages 33-38]

T

  • Tag ranking Tags Re-ranking Using Multi-level Features in Automatic Image Annotation [Volume 5, Issue 4, 2019, Pages 255-265]

  • Target tracking Quadrotor UAV Guidence For Ground Moving Target Tracking [Volume 2, Issue 1, 2016, Pages 37-44]

  • Task Scheduling Task Scheduling Algorithm Using Covariance Matrix Adaptation Evolution Strategy (CMA-ES) in Cloud Computing [Volume 3, Issue 3, 2017, Pages 135-144]

  • Task Scheduling An Effective Task Scheduling Framework for Cloud Computing using NSGA-II [Volume 6, Issue 3, 2020, Pages 155-168]

  • Task scheduling algorithm TASA: A New Task Scheduling Algorithm in Cloud Computing [Volume 1, Issue 4, 2015, Pages 25-32]

  • TCP A Differentiated Pricing Framework for Improving the Performance of the Elastic Traffics in Data Networks [Volume 1, Issue 1, 2015, Pages 59-64]

  • TCP Improvement of the mechanism of congestion avoidance in mobile networks [Volume 2, Issue 2, 2016, Pages 43-48]

  • Technology Acceptance Investigating the Factors Affecting the Readiness Level of IoT Technology Acceptance (Case Study: Financial Activists, Stock Exchange, and Financial Institutions) [Volume 7, Issue 2, 2021, Pages 103-126]

  • Terms—Classifier Ensemble Classifier Ensemble Framework: a Diversity Based Approach [Volume 2, Issue 2, 2016, Pages 1-10]

  • Text Document Classification A New Approach for Text Documents Classification with Invasive Weed Optimization and Naive Bayes Classifier [Volume 4, Issue 3, 2018, Pages 167-184]

  • Text mining Improving the Operation of Text Categorization Systems with Selecting Proper Features Based on PSO-LA [Volume 1, Issue 2, 2015, Pages 1-8]

  • TFIDF-Vector space model Arabic News Articles Classification Using Vectorized-Cosine Based on Seed Documents [Volume 5, Issue 2, 2019, Pages 117-128]

  • Throughput Application Mapping onto Network-on-Chip using Bypass Channel [Volume 2, Issue 3, 2016, Pages 1-8]

  • Throughput Improving QoS in VANETs: A Survey [Volume 3, Issue 3, 2017, Pages 153-166]

  • TLS Traffic Analysis Detecting Bot Networks Based On HTTP And TLS Traffic Analysis [Volume 6, Issue 2, 2020, Pages 61-70]

  • Topology Network Investigation and Performance Analysis of ZigBee Technology using OPNET [Volume 4, Issue 4, 2018, Pages 209-218]

  • Topology control Topology Control in Wireless Sensor Network using Fuzzy Logic [Volume 1, Issue 2, 2015, Pages 39-44]

  • Training iteration Two Novel Learning Algorithms for CMAC Neural Network Based on Changeable Learning Rate [Volume 1, Issue 1, 2015, Pages 37-42]

  • Trajectory Planning Optimal Trajectory Planning of a Box Transporter Mobile Robot [Volume 2, Issue 3, 2016, Pages 35-42]

  • Trends Statistical Analysis on IoT Research Trends: A Survey [Volume 4, Issue 2, 2018, Pages 101-134]

  • Trust P2P Network Trust Management Survey [Volume 3, Issue 2, 2017, Pages 89-106]

  • Trust Utilizes the Community Detection for Increase Trust using Multiplex Networks [Volume 4, Issue 1, 2018, Pages 21-26]

  • Trust A Novel Trust Management Model in the Social Internet of Things [Volume 5, Issue 2, 2019, Pages 57-70]

  • Trust management A Novel Trust Management Model in the Social Internet of Things [Volume 5, Issue 2, 2019, Pages 57-70]

  • Trust management Trust management in fog computing using the multi-objective imperialist competitive optimization algorithm. [(Articles in Press)]

  • Twitter 2016 Olympic Games on Twitter: Sentiment Analysis of Sports Fans Tweets using Big Data Framework [Volume 5, Issue 3, 2019, Pages 143-160]

  • Twitter Alleviation of Cold Start in Movie Recommendation Systems using Sentiment Analysis of Multi-Modal Social Networks [Volume 6, Issue 4, 2020, Pages 251-264]

  • Type-2 fuzzy logic Type-2 Fuzzy Logic Approach To Increase The Accuracy Of Software Development Effort Estimation [Volume 2, Issue 4, 2016, Pages 9-16]

U

  • UAV Quadrotor UAV Guidence For Ground Moving Target Tracking [Volume 2, Issue 1, 2016, Pages 37-44]

  • UDDI A procedure for Web Service Selection Using WS-Policy Semantic Matching [Volume 6, Issue 2, 2020, Pages 91-106]

  • University Course TimeTabling Problem (UCTTP) Using fuzzy c-means clustering algorithm for common lecturer timetabling among departments [Volume 3, Issue 1, 2017, Pages 45-64]

  • Unsupervised Algorithm A Review of Fraud Detection Algorithms for Electronic Payment Card Transactions [Volume 7, Issue 3, 2021, Pages 157-166]

  • User Attention Time A New Hybrid Method for Web Pages Ranking in Search Engines [Volume 5, Issue 4, 2019, Pages 233-244]

V

  • VANET Vehicular Networks: A Survey on Architecture, Communication Technologies and Applications [Volume 2, Issue 3, 2016, Pages 43-53]

  • VANET A Smart Hybrid System for Parking Space Reservation in VANET [Volume 3, Issue 1, 2017, Pages 11-18]

  • VANET Improving QoS in VANETs: A Survey [Volume 3, Issue 3, 2017, Pages 153-166]

  • VANETs An Improved Junction-Based Directional Routing Protocol (IJDRP) for VANETs [Volume 6, Issue 3, 2020, Pages 133-144]

  • Vehicular ad hoc networks A Survey on Routing Protocols in Vehicular Ad hoc Network [Volume 7, Issue 3, 2021, Pages 167-176]

  • Virtual Machine Memory A Version Numbering Scheme for Informational Objects Used in VM Live Migration [Volume 5, Issue 4, 2019, Pages 245-254]

  • Virtual Machines Live Migration A Version Numbering Scheme for Informational Objects Used in VM Live Migration [Volume 5, Issue 4, 2019, Pages 245-254]

  • Virtual Machines(Vms) Task Scheduling Algorithm Using Covariance Matrix Adaptation Evolution Strategy (CMA-ES) in Cloud Computing [Volume 3, Issue 3, 2017, Pages 135-144]

W

  • Water Quality Index (WQI) Water Quality Index Estimation Model for Aquaculture System Using Artificial Neural Network [Volume 5, Issue 3, 2019, Pages 195-204]

  • WBAN A Reliable Routing Algorithm for Delay Sensitive Data in Body Area Networks [Volume 4, Issue 4, 2018, Pages 229-236]

  • Weighting Optimization of weighting-based approach to predict and deal with cold start of web recommender systems using cuckoo algorithm [Volume 7, Issue 2, 2021, Pages 137-146]

  • Whale Optimization Algorithm An Improved Bat Algorithm based on Whale Optimization Algorithm for Data Clustering [Volume 6, Issue 4, 2020, Pages 227-238]

  • Whale Optimization Algorithm An optimal VM Placement in Cloud Data Centers Based on Discrete Chaotic Whale Optimization Algorithm [Volume 6, Issue 4, 2020, Pages 201-212]

  • Whale Optimization Algorithm (WOA) Energy-aware and Reliable Service Placement of IoT applications on Fog Computing Platforms by Utilizing Whale Optimization Algorithm [Volume 7, Issue 1, 2021, Pages 67-80]

  • Wi-Fi A Detailed Exploration of Usability Statistics and Application Rating Based on Wireless Protocols [Volume 6, Issue 1, 2020, Pages 9-18]

  • Wireless Sensor Network Topology Control in Wireless Sensor Network using Fuzzy Logic [Volume 1, Issue 2, 2015, Pages 39-44]

  • Wireless Sensor Network Combining Harmony search algorithm and Ant Colony Optimization algorithm to increase the lifetime of Wireless Sensor Networks [Volume 1, Issue 3, 2015, Pages 9-16]

  • Wireless Sensor Network Network Investigation and Performance Analysis of ZigBee Technology using OPNET [Volume 4, Issue 4, 2018, Pages 209-218]

  • Wireless Sensor Networks (WSNs) Routing Hole Handling Techniques for Wireless Sensor Networks: A Review [Volume 6, Issue 2, 2020, Pages 47-60]

  • WQI Estimation Water Quality Index Estimation Model for Aquaculture System Using Artificial Neural Network [Volume 5, Issue 3, 2019, Pages 195-204]

  • WSN IMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks [Volume 4, Issue 2, 2018, Pages 87-100]

  • WS-Policy A procedure for Web Service Selection Using WS-Policy Semantic Matching [Volume 6, Issue 2, 2020, Pages 91-106]

X

  • XACML An Effective Modality Conflict Model for Identifying Applicable Policies During Policy Evaluation [Volume 4, Issue 4, 2018, Pages 255-266]

  • XOR Novel Defect Terminolgy Beside Evaluation And Design Fault Tolerant Logic Gates In Quantum-Dot Cellular Automata [Volume 2, Issue 1, 2016, Pages 17-26]

Z

  • ZigBee Network Investigation and Performance Analysis of ZigBee Technology using OPNET [Volume 4, Issue 4, 2018, Pages 209-218]