Statistics

Number of Journals34
Number of Issues1,306
Number of Articles9,427
Article View9,188,328
PDF Download5,620,752

1.

The Semantic Segmentation of Autonomous Vehicles Images with the Teacher-Student Technique

Pages 1-19
Amir Khosravian; Masoud Masih-Tehrani; Abdollah Amirkhani

2.

The Presentation of a Hybrid Anomaly Detection Model Using Inverse Weight Clustering and Machine Learning in Cloud Environments

Pages 21-29
Adeleh jafar gholi beik; M. E. Shiri Ahmad Abadi; Reza Rezakhani

3.

An Improvement on the Identification via Gait Using the Genetic Algorithm

Pages 31-42
ammar karizi; seyed mohammad razavi; mehran taghipour-gorjikolaie

4.

Automatic Persian Text Generation Using Rule-Based Models and Word Embedding

Pages 43-54
omid Hajipoor; Saeedeh Sadat Sadidpour

5.

Interference Mitigation in Cognitive Radio Communication Systems Based on the Wavelet Transform

Pages 55-66
Ali Ebrahimi Sookht Abanani; meysam Bayat; Reza Hooshmand

6.

The Analysis and Design of Secure Wireless Networks in the Presence of Users with Different Security Needs Based on Covert Communication and Secure Transmission of Information Theory in the Presence of a Friendly Jammer

Pages 67-76
Farid Samsami Khodadad; Pooya Baei; Moslem forouzesh; S. M. Asgari Tabatabaei

7.

Improving the Quality of Millimeter Wave Images by Fusion with Visible Images

Pages 77-86
Roya Amini Rad; Ahmad afifi; mohammad hossein fahimifar

8.

The Automated Security Evaluation of Threat Paths Based on Petri Nets

Pages 87-98
mohammad ali ramazanzadeh; behnam barzegar; Homayun motameni

9.

The Improvement of the GMCR Model Based on Statistical Analysis of the Game’ Graph (Case Study: Malwares and Countermeasures Actions Based on Detection-Independent and Deductive Evidence)

Pages 99-123
mostafa abbasi; Majid Ghayoori

10.

The Presentation of an Active Cyber Defense Model for Application in Cyber Deception Technology

Pages 125-140
Kourosh Dadashtabar Ahmadi; mohammad mahmoudbabouei

11.

Fixing Security Defects of Video Authentication Systems with Face Recognition, Based on 3D Structure and Shape Evaluation

Pages 141-145
alireza shojaeifard; Mohsen Shahrezaee; hamidreza yazdani

12.

The IoT Resource Allocation Improvement in Fog Computing Using Non-Cooperative Game Theory

Pages 147-158
houshyar mohammady talvar; sayed hamid haj seyyed javadi; Hamidreza Navidi; afshin rezakhani