Stop the war!
Остановите войну!
for scientists:
default search action
Iran Journal of Computer Science, Volume 1
Volume 1, Number 1, April 2018
- Ayaz Isazadeh:
Message from the Editor-in-Chief: Prof. Ayaz Isazadeh. 1-2 - Timothy Arndt:
Big Data and software engineering: prospects for mutual enrichment. 3-10 - Shahin Mohammadi, Abbas Nowzari-Dalini:
A parallel algorithm for generation of RNA secondary structures with length n and k base-pairs. 11-17 - Islam Elgedawy:
Machine consciousness as a service (MCaaS): a roadmap. 19-30 - Muhammad Shahid Iqbal, Bin Luo, Tamoor Khan, Rashid Mehmood, Muhammad Sadiq:
Heterogeneous transfer learning techniques for machine learning. 31-46 - Farhad Dadgostar, Abdolhossein Sarrafzadeh:
Gesture-based human-machine interfaces: a novel approach for robust hand and face tracking. 47-64
Volume 1, Number 2, June 2018
- Islam Elgedawy, Sara Khurshid, Rahat Masood, Muhammad Awais Shibli:
CRESCENT+: a self-protecting framework for reliable composite web service delivery. 65-87 - Mojtaba Mostafavi, Peyman Kabiri:
Detection of repetitive and irregular hypercall attacks from guest virtual machines to Xen hypervisor. 89-97 - Ari M. Saeed, Tarik A. Rashid, Arazo M. Mustafa, Rawan A. Al-Rashid Agha, Ahmed S. Shamsaldin, Nawzad K. Al-Salihi:
An evaluation of Reber stemmer with longest match stemmer technique in Kurdish Sorani text classification. 99-107 - Bahareh Nikpour, Hossein Nezamabadi-pour:
HTSS: a hyper-heuristic training set selection method for imbalanced data sets. 109-128 - Ahmed Salah:
QuTiP-package applications to five-level atom with one mode. 129-132
Volume 1, Number 3, September 2018
- Williams Sureshkumar, Kalpana Mahalingam, Raghavan Rama:
Labelled graph rules in P systems. 133-145 - Ashish Kumar, Monika Saini:
Profit analysis of a computer system with preventive maintenance and priority subject to maximum operation and repair times. 147-153 - Mohammad Amini, Kourosh Eshghi:
Constraint programming models and population-based simulated annealing algorithm for finding graceful and $$\alpha $$ α -labeling of quadratic graphs. 155-164 - Abbas Akkasi:
Sentence-based undersampling for named entity recognition using genetic algorithm. 165-174 - A. H. M. Kamal, Mohammad Mahfuzul Islam:
An image distortion-based enhanced embedding scheme. 175-186 - Mehdi Harounabadi, Andreas Mitschele-Thiel, Abbas Akkasi:
LTE-D2D for connected cars: a survey on radio resource management schemes. 187-197
Volume 1, Number 4, December 2018
- Johannes Zenkert, André Klahold, Madjid Fathi:
Knowledge discovery in multidimensional knowledge representation framework: An integrative approach for the visualization of text analytics results. 199-216 - V. I. Osubor, A. O. Egwali:
A neuro fuzzy approach for the diagnosis of postpartum depression disorder. 217-225 - Sanjay Kumar Biswash, Mahasweta Sarkar, Dhirendra Kumar Sharma:
Artificial immune system (AIS)-based location management scheme in mobile cellular networks. 227-236 - Ajeet Ram Pathak, Manjusha Pandey, Siddharth S. Rautaray:
Construing the big data based on taxonomy, analytics and approaches. 237-259
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.