


default search action
Iran Journal of Computer Science, Volume 1
Volume 1, Number 1, April 2018
- Ayaz Isazadeh:

Message from the Editor-in-Chief: Prof. Ayaz Isazadeh. 1-2 - Timothy Arndt

:
Big Data and software engineering: prospects for mutual enrichment. 3-10 - Shahin Mohammadi

, Abbas Nowzari-Dalini
:
A parallel algorithm for generation of RNA secondary structures with length n and k base-pairs. 11-17 - Islam Elgedawy:

Machine consciousness as a service (MCaaS): a roadmap. 19-30 - Muhammad Shahid Iqbal, Bin Luo, Tamoor Khan, Rashid Mehmood, Muhammad Sadiq:

Heterogeneous transfer learning techniques for machine learning. 31-46 - Farhad Dadgostar, Abdolhossein Sarrafzadeh

:
Gesture-based human-machine interfaces: a novel approach for robust hand and face tracking. 47-64
Volume 1, Number 2, June 2018
- Islam Elgedawy, Sara Khurshid, Rahat Masood, Muhammad Awais Shibli:

CRESCENT+: a self-protecting framework for reliable composite web service delivery. 65-87 - Mojtaba Mostafavi, Peyman Kabiri

:
Detection of repetitive and irregular hypercall attacks from guest virtual machines to Xen hypervisor. 89-97 - Ari M. Saeed

, Tarik A. Rashid, Arazo M. Mustafa, Rawan A. Al-Rashid Agha
, Ahmed S. Shamsaldin
, Nawzad K. Al-Salihi
:
An evaluation of Reber stemmer with longest match stemmer technique in Kurdish Sorani text classification. 99-107 - Bahareh Nikpour, Hossein Nezamabadi-pour:

HTSS: a hyper-heuristic training set selection method for imbalanced data sets. 109-128 - Ahmed Salah:

QuTiP-package applications to five-level atom with one mode. 129-132
Volume 1, Number 3, September 2018
- Williams Sureshkumar, Kalpana Mahalingam

, Raghavan Rama:
Labelled graph rules in P systems. 133-145 - Ashish Kumar

, Monika Saini:
Profit analysis of a computer system with preventive maintenance and priority subject to maximum operation and repair times. 147-153 - Mohammad Amini, Kourosh Eshghi

:
Constraint programming models and population-based simulated annealing algorithm for finding graceful and $$\alpha $$ α -labeling of quadratic graphs. 155-164 - Abbas Akkasi:

Sentence-based undersampling for named entity recognition using genetic algorithm. 165-174 - A. H. M. Kamal

, Mohammad Mahfuzul Islam:
An image distortion-based enhanced embedding scheme. 175-186 - Mehdi Harounabadi

, Andreas Mitschele-Thiel, Abbas Akkasi:
LTE-D2D for connected cars: a survey on radio resource management schemes. 187-197
Volume 1, Number 4, December 2018
- Johannes Zenkert

, André Klahold
, Madjid Fathi
:
Knowledge discovery in multidimensional knowledge representation framework: An integrative approach for the visualization of text analytics results. 199-216 - V. I. Osubor, A. O. Egwali:

A neuro fuzzy approach for the diagnosis of postpartum depression disorder. 217-225 - Sanjay Kumar Biswash, Mahasweta Sarkar, Dhirendra Kumar Sharma:

Artificial immune system (AIS)-based location management scheme in mobile cellular networks. 227-236 - Ajeet Ram Pathak

, Manjusha Pandey, Siddharth S. Rautaray:
Construing the big data based on taxonomy, analytics and approaches. 237-259

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














