


default search action
Iran Journal of Computer Science, Volume 4
Volume 4, Number 1, March 2021
- Boumediene Selma

, Samira Chouraqui
, Belkacem Selma
, Hassane Abouaïssa:
ANFIS controller design based on pigeon-inspired optimization to control an UAV trajectory tracking task. 1-16 - Mozhdeh Zandifar, Jafar Tahmoresnezhad

:
Locality Fisher discriminant analysis for conditional domain adaption. 17-34 - Sara Besharati, Hadi Veisi

, Ali Darzi, Seyed Habib Hosseini Saravani:
A hybrid statistical and deep learning based technique for Persian part of speech tagging. 35-43 - S. M. Saklain Galib

, Sheikh Md. Rabiul Islam
, Md. Asadur Rahman
:
A multiple linear regression model approach for two-class fNIR data classification. 45-58 - Mohammad Reza Mohammadi

, Fatemeh Rustaee:
Hierarchical classification of fine-art paintings using deep neural networks. 59-66
Volume 4, Number 2, June 2021
- Ibrahim Gad

, Doreswamy Hosahalli, B. R. Manjunatha, Osama A. Ghoneim
:
A robust deep learning model for missing value imputation in big NCDC dataset. 67-84 - M. Sathish Kumar, B. Indrani

:
Frequent rule reduction for phishing URL classification using fuzzy deep neural network model. 85-93 - Franklin Tchakounté

, Roger Corneille Ndjeumou Ngassi
, Vivient Corneille Kamla, Kalum Priyanath Udagepola:
LimonDroid: a system coupling three signature-based schemes for profiling Android malware. 95-114 - Rahul

:
Automatic identification and classification of power quality events using a hybrid intelligent approach. 115-124 - Md. Motiul Islam, Mohammod Abul Kashem:

Parametric active contour model-based tumor area segmentation from brain MRI images using minimum initial points. 125-132
Volume 4, Number 3, September 2021
- Arash Deldari

, Alireza Salehan:
A survey on preemptible IaaS cloud instances: challenges, issues, opportunities, and advantages. 1-24 - Chandan Saha

, Md. Foisal Hossain, Md. Asadur Rahman
:
NSCT-based robust image watermarking in DC components of APDCBT using singular value decomposition. 133-145 - Shahzad Ashraf

, Tauqeer Ahmed
, Sehrish Saleem
:
NRSM: node redeployment shrewd mechanism for wireless sensor network. 171-183 - Jafar Tavoosi

:
Designing a new recurrent convolutional neural network for face detection and recognition in a color image. 185-194 - Krishna Kumar Mohbey

, Sunil Kumar
:
A parallel approach for high utility-based frequent pattern mining in a big data environment. 195-200 - Rehman Mubashar, Muhammad Abubakar Siddique

, Ateeq Ur Rehman, Adeel Asad, Asad Rasool:
Comparative performance analysis of short-range wireless protocols for wireless personal area network. 201-210 - Syed Waleed, Inam Ullah

, Wali Ullah Khan
, Ateeq Ur Rehman, Taj Rahman, Shanbin Li:
Resource allocation of 5G network by exploiting particle swarm optimization. 211-219
Volume 4, Number 4, December 2021
- Zeinab Javidi, Reza Akbari

, Omid Bushehrian:
A new method based on formal concept analysis and metaheuristics to solve class responsibility assignment problem. 221-240 - Mansi Subhedar

:
Cover selection technique for secure transform domain image steganography. 241-252 - Shamsollah Ghanbari

, Mohamed Othman:
A multi-criteria approach to time cheating in the divisible load scheduling. 253-264 - Varun Gupta

, Monika Mittal, Vikas Mittal, Anshu Gupta:
ECG signal analysis using CWT, spectrogram and autoregressive technique. 265-280 - Iwasokun Gabriel Babatunde

, Monday Olutayo Olaoye:
Discrete transformation technique for video compression. 281-292 - Sanjeev Karmakar, Shreerup Goswami

:
A new procedure for optimization of hidden layer neurons during learning through gradient descent process of neural network and improvement of performance in the chaos forecasting. 293-303 - Yashar Salami

, Yaser Ebazadeh
, Vahid Khajehvand
:
CE-SKE: cost-effective secure key exchange scheme in Fog Federation. 305-317

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














