 |
3D skeleton
Multi-view based 3D Human Pose Estimation by Fitting the Projection of 3D Articular Skeleton Model in Silhouette Images [Volume 9, Number 1] |
 |
3GPP standard
Using WPT as a New Method Instead of FFT for Improving the Performance of OFDM Modulation [Volume 16, Number 2] |
 |
3d model
Using of Model Based Hand Poses Estimation for Imitation of User's Arm Movements by Robot Arm [Volume 14, Number 4] |
 |
AD
Weighted Ensemble Clustering for Increasing the Accuracy of the Final Clustering [Volume 17, Number 2] |
 |
AGV
A New Authentication System Based on Wavelet and Contourlet Transforms for Low Quality Palmprint Images [Volume 7, Number 2] |
 |
ANFIS
Development of a Mechatronics System to Real-Time Stress Detection Based on Physiological Signals [Volume 15, Number 3] |
 |
AVISPA
A Mutual Authentication Method for Internet of Things [Volume 19, Number 2] |
 |
Access Delegation
Privacy Preserving Dynamic Access Control Model with Access Delegation for eHealth [Volume 17, Number 3] |
 |
Adaptive Dictionary
A Semi-supervised Framework Based on Self-constructed Adaptive Lexicon for Persian Sentiment Analysis [Volume 15, Number 2] |
 |
Adaptive Median Filter
Reducing the Periodic Noise Effects in Digital Image by an Adaptive Median Filter in the Frequency Domain [Volume 7, Number 2] |
 |
Adaptive windows convolutional neural network
Adaptive Windows Convolutional Neural Network for Speech Recognition [Volume 15, Number 3] |
 |
Adult Epileptic Model.
Prediction of Epileptic Seizures in Patients with Temporal Lobe Epilepsy (TLE) based on Cepstrum analysis and AR model of EEG signal [Volume 19, Number 4] |
 |
Adversarial learning
A review of Content Adaptive Image Steganography methods [Volume 20, Number 3] |
 |
Agents negotiations.
Regularized Knowledge Transfer for Multi-Agent Reinforcement Learning [Volume 20, Number 4] |
 |
Aggregate cell
Providing a Dynamic Technique for Answering Ad-hoc Continuous Aggregate [Volume 14, Number 3] |
 |
Analytical Model
An Analytical Model for Predicting the Convergence Behavior of the Least Mean Mixed-Norm (LMMN) Algorithm [Volume 18, Number 3] |
 |
Android
Lip Reading: a New Authentication Method in Android Mobile Phone’s Applications [Volume 14, Number 1] |
 |
Anonymity
Some observations on a lightweight authentication scheme with capabilities of anonymity and trust in Internet of Things (IoT) [Volume 19, Number 4] |
 |
Arabic language
Extracting person names using name candidate injection in a conditional random field model for Arabic language [Volume 11, Number 1] |
 |
Artificial Bee Colony
Sampling from social networks’s graph based on topological properties and bee colony algorithm [Volume 17, Number 3] |
 |
Artificial Intelligence
Designing an optimal diagnosis algorithm based on IoT for Covid-19 [Volume 20, Number 3] |
 |
Attention Mechanism
Using RST-based deep neural networks to improve text representation [Volume 20, Number 1] |
 |
Attention mechanism
Efficient Method Based on Combination of Deep Learning Models for Sentiment Analysis of Text [Volume 19, Number 1] |
 |
Automatic Speech Recognizer.
Prediction of consonants Intelligibility for Listeners with Normal Hearing Using Microscopic Models of Speech Perception Considering Different Distance Measures in Automatic Speech Recognizer [Volume 12, Number 1] |
 |
BCI Speller 2005 and Committee Machines
Quadratic B-Spline Wavelet and Committee Machine for the P300 Detection in Brain Computer Interface [Volume 5, Number 2] |
 |
Band-Limited Filter.
Estimation of protein-coding regions in numerical DNA sequences using Variable Length Window method based on 3-D Z-curve [Volume 13, Number 4] |
 |
Bayes classifier.
Novel Features for Modulation Recognition Using an 8PSK Demodulator [Volume 13, Number 2] |
 |
Bayesian Rule
A Dynamic Skin Detection Method Using the Fusion of 2-D Histogram-Based Features [Volume 13, Number 3] |
 |
Behavior
Providing an algorithm for solving general optimization problems based on Domino theory [Volume 19, Number 2] |
 |
Binary mask
An Introduction of New DESICA Algorithm for Blind Speech Separation in Dynamic Case [Volume 6, Number 2] |
 |
Bisection algorithm
Three Dimensional Localization of an Unknown Target Using Two Heterogeneous Sensors [Volume 17, Number 1] |
 |
BoW
Tag recommendation in social networks with the help of text summarization and KNN [Volume 21, Number 4] |
 |
Boolean query
Fuzzy retrieval of encrypted data by multi-purpose data-structures [Volume 17, Number 4] |
 |
Brain Signals
Different Application Fields of Brain Signal Processing in Iran [Volume 13, Number 3] |
 |
Brain-Computer interface
Classification of EEG Signals for Discrimination of Two Imagined Words [Volume 17, Number 2] |
 |
Breast Tumours
Soft Computing Methods based on Fuzzy, Evolutionary and Swarm Intelligence for Analysis of Digital Mammography Images for Diagnosis of Breast Tumors [Volume 16, Number 2] |
 |
Breast cancer
Predicting the Survival of Breast Cancer Patients via Deep Neural Networks [Volume 20, Number 3] |
 |
CUDA
Real-Time DOA Estimation of Underwater Sound Sources Using GPU [Volume 18, Number 2] |
 |
Camera Collaboration
Application of Sparse Representation and Camera Collaboration in Visual Surveillance Systems [Volume 15, Number 3] |
 |
Channel coding
Robustness of Motion Vector against Channel Error for Improvement of Synthesized Video Quality [Volume 12, Number 1] |
 |
Chaos Masking
Blind Detection and Equalization in Chaotic Communication Systems Using Importance Sampling [Volume 12, Number 3] |
 |
Chaotic self-adaptive particle swarm optimization algorithm.
Improving Collaborative Recommender Systems by Integrating Fuzzy C-Ordered Means Clustering and Chaotic Self-Adaptive Particle Swarm Optimization Algorithm [Volume 21, Number 1] |
 |
Chebyshev inequality
Stock Market Fraud Detection, A Probabilistic Approach [Volume 17, Number 1] |
 |
Chest radiography images
CoviX-Net: A Deep Learning-based System for Diagnosis and Differentiation of Covid-19 Infection and Pneumonia in Chest Radiography Images [Volume 20, Number 3] |
 |
Chunk label
Phrase-Boundary Translation Model Using Shallow Syntactic Labels [Volume 15, Number 1] |
 |
Classical Arabic Language
A New Approach for Extracting Named Entity in Classical Arabic [Volume 14, Number 2] |
 |
Classification
Author gender identification from text using Bayesian Random Forest [Volume 16, Number 1] |
 |
Classification
Automatic Affective State Recognition Using Physiological Changes [Volume 8, Number 2] |
 |
Classification-Neural network ensemble-Negative Correlation Learning-Mixture of Experts
Improving classification performance using combination features of different neural network ensemble methods [Volume 8, Number 2] |
 |
Classification.
Two Featuer Transformation Methods Based on Genetic Algorithm for Reducing Support Vector Machine Classification Error [Volume 12, Number 2] |
 |
Cloud Computing
Detecting Android malware with offloading approach in cloud computing [Volume 21, Number 3] |
 |
Cluster Center.
Presenting a new method for mixed data clustering based on the number of similar features [Volume 21, Number 1] |
 |
Clustering
An Improved View Selection Algorithm in Data Warehouses by Finding Frequent Queries [Volume 14, Number 1] |
 |
Clustering
Sentiment Analysis of Social Media Posts in the Corona Crisis using two-stage Clustering [Volume 20, Number 1] |
 |
Clustering Ensemble
Improving the accuracy of the author name disambiguation by using clustering ensemble [Volume 14, Number 4] |
 |
Co-association Matrix
Clustering Ensemble based on combination of subset of primary clusters [Volume 7, Number 1] |
 |
Coding
Image Compression Based on Intelligent Information Removing and Inpainting Reconstruction Algorithms [Volume 14, Number 2] |
 |
Combined classifiers
Premature Ventricular Contraction Arrhythmia Detection in ECG Signals via Combined Classifiers [Volume 15, Number 1] |
 |
Compressive data gathering.
Energy Consumption Analysis based on Compressive Sensing Model in Wireless Sensor Networks [Volume 20, Number 2] |
 |
Computational Complexity
Improving Heuristic Guess and Determine Attack on TIPSY and SNOW 1.0 Stream Ciphers [Volume 12, Number 4] |
 |
Computational Qur'an mining
A Graph-based Algorithm for Clustering Qur’anic Surahs [Volume 21, Number 1] |
 |
Conditional Random Field
A’laam Corpus: A Standard Corpus of Named Entity for Persian Language [Volume 14, Number 3] |
 |
Congestion
Design of a novel congestion-aware communication mechanism for wireless NoC in multicore systems [Volume 19, Number 1] |
 |
Constrained Gravitational Search Algorithm
Proposing a Constrained-GSA for the Vehicle Routing Problem [Volume 18, Number 4] |
 |
Continuous speech recognition
Deep Modular Neural Networks with Double Spatio-temporal َAssociation Structure for Persian Continuous Speech Recognition [Volume 13, Number 1] |
 |
Continuous speech recognition, Feature extraction, Reconstructed phase space, Phoneme manifolds, Likelihood Score, Neural network
Performance Improvement of Continuous Speech Recognition System Using Extracted Features of Speech Manifolds in the Reconstructed Phase Space [Volume 10, Number 1] |
 |
Cost Function
Robust method of changes of light to detect and track vehicles in traffic scenes [Volume 13, Number 3] |
 |
Covid-19
Using Data Augmentation Techniques for Sentiment Analysis of Users’ Opinions on Reopening of Schools During the Covid-19 Epidemic [Volume 21, Number 2] |
 |
Cross Correlation Analysis(CCA)
Classification of Parkinson Disease Based on Inter - and Intra -Regional Biomarkers of the Brain Motor Network Using Resting State fMRI Data [Volume 11, Number 2] |
 |
DCT
FARSIARABIC TEXT DETECTION AND LOCALIZATION IN VIDEO FRAMES [Volume 10, Number 2] |
 |
DRIVE database
A New Approach to Retinal Vessel Segmentation by Using Computational Model of Simple Cells in Primary Visual Cortex [Volume 13, Number 1] |
 |
Data Mining
Representing a method to identify and contrast with the fraud which is created by robots for developing websites’ traffic ranking [Volume 18, Number 4] |
 |
Data Mining
Combination of Ensemble Data Mining Methods for Detecting Credit Card Fraud Transactions [Volume 19, Number 4] |
 |
Data Validity
A new ensemble clustering method based on fuzzy cmeans clustering while maintaining diversity in ensemble [Volume 17, Number 4] |
 |
Data extraction
Choosing the most appropriate query language to use Outer Joins for data extraction in Datalog mode in the Deductive Database System DES [Volume 15, Number 1] |
 |
Data mining
Outlier Detection on Data Streams Using a QLattice-based Model and Online Learning [Volume 20, Number 2] |
 |
Davis- Boldin index
Choosing the Distinguishing Frequency Feature of People Addicted to Heroin from Healthy while Resting [Volume 19, Number 3] |
 |
Decision Making
Improving Near Real Time Data Warehouse Refreshment [Volume 15, Number 2] |
 |
Deep Architecture, Learning Convergence,Neural Network, Pre-training, Components
New fast pre training method for deep neural network learning [Volume 10, Number 1] |
 |
Deep Learning
Diagnosing Children's Developmental Disorders By A Transfer Learning Based Architecture Using Knowledge Distillation [Volume 21, Number 4] |
 |
Deep Learning
Identify the Named Entities Using Deep Learning and Reinforcement Approach [Volume 21, Number 3] |
 |
Defuzzification
Presenting a Fuzzy Approach to Optimize Predicting High Order Time Series [Volume 15, Number 2] |
 |
Dependency grammar, verb valency, Persian language, unsupervised induction, EM algorithm
Unsupervised Persian Verb Valency Induction [Volume 9, Number 2] |
 |
Detection Time
Fire detection using video sequences in urban out-door environment [Volume 16, Number 3] |
 |
Digital Filter
Designing a Currency Recognition System Based on Neural Networks Using Texture and Color of Images [Volume 7, Number 2] |
 |
Dimensionality reduction
Sample-oriented Domain Adaptation for Image Classification [Volume 16, Number 3] |
 |
Discrete Fourier Transform
3D Models Recognition in Fourier Domain Using Compression of the Spherical Mesh up to the Models Surface [Volume 16, Number 2] |
 |
Distance Measure
An Effective Approach for Robust Metric Learning in the Presence of Label Noise [Volume 19, Number 1] |
 |
Distribution
A New Framework for Distributed Multivariate Feature Selection [Volume 19, Number 4] |
 |
Distribution mismatch
Image alignment via kernelized feature learning [Volume 19, Number 3] |
 |
Diversity
Using Negative Correlated Networks to Improve Neural Ensemble Performance [Volume 8, Number 2] |
 |
EA-PTS
Increasing the Performance of OFDM Systems by PAPR Reduction in PTS Technique using Election Optimization Algorithm [Volume 19, Number 2] |
 |
ELECTRE III.
Design of cybernetic metamodel of cryptographic algorithms and ranking of its supporting components using ELECTRE III method [Volume 19, Number 4] |
 |
End-to-End Delay
Using a Fuzzy Rule-based Algorithm to Improve Routing in MPLS Networks [Volume 19, Number 3] |
 |
Ensemble classifier
Symmetry of Frequency information in Right and Left Lung sound and Infection Detection in Cystic Fibrosis Patients [Volume 17, Number 2] |
 |
Entorhinal Cortex.
A Neural Network Model of Mapping from [Volume 6, Number 2] |
 |
Estimation
Improvement of missing vital signs data estimation algorithm in wireless body sensor networks based on deep neural networks [Volume 21, Number 3] |
 |
Evaluation measure.
Proposing an intelligent and semantic-based system for Evaluating Text Summarizers [Volume 12, Number 2] |
 |
Evidence theory
Classification of Cardiac Arrhythmias based on combination of the results of Neural Networks using Dempster-Shefer Evidence Theory [Volume 14, Number 2] |
 |
Expected coverage rate
Expected coverage rate for the Hellman matrices [Volume 15, Number 3] |
 |
Expression cloning
Synthesis of human facial expressions based on the distribution of elastic force applied by control points [Volume 16, Number 2] |
 |
FANTOM5 dataset
Combining an Ensemble Clustering Method and a New Similarity Criterion for Modeling the Hereditary Behavior of Diseases [Volume 18, Number 2] |
 |
Fact Extraction
A New Method for Improving Computational Cost of Open Information Extraction Systems Using Log-Linear Model [Volume 16, Number 1] |
 |
FarsNet
Supervised approach for keyword extraction from Persian documents using lexical chains [Volume 15, Number 4] |
 |
Feature Extraction
A New Statistical Model for Evaluation Interactive Question Answering Systems Using Regression [Volume 16, Number 3] |
 |
Feature Extraction, Compressive Sampling, Genre Classification, Sound Source Localization.
Speech Signals Processing Using New Compressive Sampling Based Feature Extraction Method [Volume 10, Number 1] |
 |
Feature Extractionandom Forest Algorithm
A New Approach for Digital Image Segmentation with Genetic Algorithm and Random Forest [Volume 20, Number 4] |
 |
Feature Reduction
A New Hybrid Method to Increase the Prediction in Data Reduced Using Rough Set and Swarm Intelligence Model [Volume 14, Number 3] |
 |
Feature Selection
A New Method for Duplicate Detection Using Hierarchical Clustering of Records [Volume 18, Number 4] |
 |
Feature extraction - Convolutional neural networks - Wavelet transform - Fourier transform
Introducing a method for extracting features from facial images based on applying transformations to features obtained from convolutional neural networks [Volume 17, Number 3] |
 |
Feature selection.
Classification of Memory Correlated Event Related Potentials in Old/New Items Recall using Time-Frequency Features [Volume 5, Number 2] |
 |
Flexible Filter Length-Adaptive Pulse Compression Repair (FFL-APCR) algorithm
Extending the Radar Dynamic Range using Adaptive Pulse Compression [Volume 18, Number 3] |
 |
Fractal dimension
Designing an Experiment to Improve Automatic Emotion Detection Using EEG [Volume 10, Number 2] |
 |
Fractal dimension
Feature Extraction of Computer Files Structure by Statistical Analysis [Volume 13, Number 4] |
 |
Frequent patterns
Finding Frequent Patterns in Holy Quran UsingText Mining [Volume 15, Number 3] |
 |
Full Body Recognition.
Detection of handgun using 3D convolutional neural network model (3DCNNs) [Volume 20, Number 2] |
 |
Fuzzy System
Discovering Influential Nodes in Social Networks based on modified independent cascade model and Fuzzy Multi-Objective Genetic Algorithm [Volume 21, Number 4] |
 |
Fuzzy c-means clustering
A Fuzzy C-means Clustering Approach for Continuous Stress Detection during Driving [Volume 14, Number 4] |
 |
Fuzzy logic
A New Method for Classification of Nano-Structures based on Time Series Analysis and Fuzzy Logic [Volume 14, Number 2] |
 |
GPU
Signal Detection Based on GPU-Assisted Parallel Processing for Infrastructure-based Acoustical Sensor Networks [Volume 14, Number 4] |
 |
GSC beamformer
Adaptive and Smart Beamforming in Ad-hoc Microphone Arrays by Clustering and Ranking of the Microphones [Volume 12, Number 3] |
 |
Gabor filter
On the use of Textural Features and Neural Networks for Leaf Recognition [Volume 16, Number 1] |
 |
Genetic Algorithm
Presenting a Method based on Genetic Algorithm for finding the most Stable Clusters in Ensemble Clustering [Volume 21, Number 3] |
 |
Genetic Algorithm
Single Trial P300 Recognition in Auditory Event Related Potential Using Genetic Algorithm and Neural Network Classifier [Volume 6, Number 1] |
 |
Genetic Algorithm
Predicting cardiac arrhythmia on ECG signal using an ensemble of optimal multicore support vector machines [Volume 19, Number 3] |
 |
Genetic Programming
A new fuzzy rules weighting approach based on Genetic Programming for imbalanced classification [Volume 11, Number 2] |
 |
Genetic algorithm.
Application of an ANN-GA Method for Predicting the Biting Force Using Electromyogram Signals [Volume 14, Number 1] |
 |
Geometric Series
Online Streaming Feature Selection Using Geometric Series of the Adjacency Matrix of Features [Volume 17, Number 4] |
 |
Gini index
Feature extraction based on the more resolution of the classes using auxiliary classifiers [Volume 18, Number 2] |
 |
Goal programming satisfaction function
Hybrid multi-criteria group decision-making for supplier selection problem with interval-valued Intuitionistic fuzzy data [Volume 17, Number 3] |
 |
Gray Wolf Optimization Algorithm
Improved Ensemble Learning Model by Swarm Intelligence for Mobile Subscribers’ Churn Prediction [Volume 20, Number 4] |
 |
Gray wolf algorithm
Building energy optimization using gray wolf algorithm and an artificial neural network [Volume 20, Number 2] |
 |
Greedy adaptive
Speech Enhancement using Adaptive Data-Based Dictionary Learning [Volume 17, Number 1] |
 |
HFCS
Hierarchical Fuzzy Clustering Semantics (HFCS) in Web Document for Discovering Latent Semantics [Volume 17, Number 1] |
 |
Hand-Crafted Feature
Rumor Detection on Twitter using tweet and user features [Volume 21, Number 2] |
 |
Harmony search optimization algorithm.
Identifying Community Structures in Social Networks using Discrete Harmony Search Algorithm [Volume 20, Number 3] |
 |
Harmony search.
Pothole Detection by Soft Computing [Volume 19, Number 2] |
 |
Hashing
Key Resynchronizing in Low Power Wide Area Networks [Volume 18, Number 1] |
 |
Hidden Markov Model (HMM)
Online Single-Channel Seizure Prediction, Based on Seizure Genesis Model of Depth-EEG Signals Using Extended Kalman Filter [Volume 15, Number 1] |
 |
Hierarchical Clustering.
New Clustering Technique using Artificial Immune System and Hierarchical technique [Volume 13, Number 4] |
 |
Histogram classifie
Pedestrian Detection in Infrared Image Sequences Using SVM and Histogram Classifiers [Volume 6, Number 1] |
 |
Hybrid Recommender System
An Ontological Hybrid Recommender System for Dealing with Cold Start Problem [Volume 19, Number 1] |
 |
Hybrid recommender systems
A hybrid recommender system using trust and bi-clustering in order to increase the efficiency of collaborative filtering [Volume 15, Number 2] |
 |
Hyperspectral
Supervised Feature Extraction of Face Images for Improvement of Recognition Accuracy [Volume 16, Number 1] |
 |
IMS architecture and network Vulnerability assessment.
IMS SIP Server security model using the TVRA methodology [Volume 12, Number 1] |
 |
Identity Vector.
A survey on spectral methods in spoken language identification [Volume 14, Number 1] |
 |
Image Fusion, Panchromatic Image, Multispectral Images, Spatial Information, Spectral Information, Standard PCA, Spatial PCA, Wavelet, Contourlet.
Multispectral and Panchromatic image fusion using Spatial PCA [Volume 10, Number 1] |
 |
Image Processing
Providing an effective way to enhance low-light images: Enhanced Illumination Map Optimally [Volume 21, Number 2] |
 |
Image processing
A Novel Image Denoising Method Based on Incoherent Dictionary Learning and Domain Adaptation Technique [Volume 16, Number 4] |
 |
Image quality improvement.
Region-based Quality Improvement of Facial Images with Strong Shadows to Enhance Recognition [Volume 8, Number 1] |
 |
Imperialist Competitive Algorithm
Predicting stock prices on the Tehran Stock Exchange by a new hybridization of Fuzzy Inference System and Fuzzy Imperialist Competitive Algorithm [Volume 18, Number 4] |
 |
Imperialist Competitive Algorithm (ICA)
Automatic Clustering Using Improved Imperialist Competitive Algorithm [Volume 14, Number 2] |
 |
Improved Mel Frequency Cepstral Coefficient
Farsi Accent Recognition based on speech signal using efficient features extraction and Combining of Classifiers [Volume 13, Number 2] |
 |
Inclined planes system optimization algorithm(IPO)
Epileptic seizure detection using Inclined Planes system Optimization algorithm(IPO) [Volume 13, Number 4] |
 |
Information Retrieval
Improved Clustering Persian Text Based on Keyword Using Linguistic and Thesaurus Knowledge [Volume 13, Number 1] |
 |
Information Retrieval
Noor-Vajeh: A Benchmark Dataset for Keyword Extraction from Persian Papers [Volume 21, Number 4] |
 |
Information Retrieval
Noor-stem v.1 A Benchmark Dataset for Evaluating the Arabic Stemmers [Volume 21, Number 1] |
 |
Information extraction
Corefrence resolution with deep learning in the Persian Labnguage [Volume 17, Number 2] |
 |
Information retrieval
Using Persian Stemmer in Information Retrieval System [Volume 8, Number 1] |
 |
Information theory.
A Novel Approach for Exceptional Phenomena Knowledge Detection and Analysis by Data mining [Volume 14, Number 1] |
 |
Intelligence transportation system.
A Feature-based Vehicle Tracking Algorithm Using Merge and Split-based Hierarchical Grouping [Volume 12, Number 1] |
 |
Internet of Things
A systematic review of the foundations, applications, and challenges of federated learning. [Volume 21, Number 3] |
 |
Intuitionistic fuzzy logic system
Intuitionistic fuzzy logic for adaptive energy efficient routing in mobile ad-hoc networks [Volume 18, Number 1] |
 |
Iranian Music Dastgahs
Classification of Iranian Traditional Music Dastgahs Using Features Based on Pitch Frequency [Volume 19, Number 3] |
 |
Izafe
Improving Named Entity Recognition Using Izafe in Farsi [Volume 14, Number 4] |
 |
JPEG method.
Providing a method for image preprocessing to improve the performance of JPEG [Volume 13, Number 2] |
 |
Joint extraction
Animating of Carton Characters by Skeleton based Articular Motion Transferring of Other Objects [Volume 13, Number 2] |
 |
Just Noticeable Difference (JND)
Just Noticeable Difference Estimation Using Visual Saliency in Images [Volume 17, Number 2] |
 |
K- nearest neighbors
Prediction and determining the effective factors on the survival transplanted kidney for five-year in imbalanced data by the meta-heuristic approach and machine learning [Volume 15, Number 4] |
 |
K-means algorithm
A partition-based algorithm for clustering large-scale software systems [Volume 18, Number 4] |
 |
KNN
A New WordNet Enriched Content-Collaborative Recommender System [Volume 18, Number 4] |
 |
Kaldi
Spoken Term Detection for Persian News of Islamic Republic of Iran Broadcasting [Volume 17, Number 4] |
 |
Kaldi Toolkit
[Volume 13, Number 3] |
 |
Kaldi Toolkit
Off-line Arabic Handwritten Recognition Using a Novel Hybrid HMM-DNN Model [Volume 17, Number 4] |
 |
Kernel Function
Feature transformation using kernel minimum classification error (KMCE) for pattern and speech recognition [Volume 7, Number 1] |
 |
Kinect sensor
Indoor Planar Modeling Using RGB-D Images [Volume 14, Number 3] |
 |
Kronecker
Direction of Arrival (DOA) Estimation Using Kronecker Subspace [Volume 15, Number 1] |
 |
LDA classifier
Performance Analysis of a Persian text input brain–computer interface (BCI) P300 Speller system with row/column paradigm (RCP) [Volume 14, Number 2] |
 |
LGDF Model
Anthropometric Analysis of Face using Local Gaussian Distribution Fitting Applicable for Facial Surgery [Volume 17, Number 1] |
 |
Large Scale
Data Clustering Based On Key Identification [Volume 14, Number 4] |
 |
Levenshtein Distance
Introducing a new information retrieval method applicable for speech recognized texts [Volume 13, Number 4] |
 |
License Plate Recognition
Multi-frame Super Resolution for Improving Vehicle Licence Plate Recognition [Volume 16, Number 2] |
 |
Lie Detection, PhotoPlethysmoGraph, Galvanic Skin Response, Neural Network
Lie detector system based on PhotoPlethysmoGraph (PPG) and Galvanic Skin Response (GSR) signals by means of neural network [Volume 9, Number 2] |
 |
Lightweight
The Lightweight Authentication Scheme with Capabilities of Anonymity and Trust in Internet of Things (IoT) [Volume 15, Number 4] |
 |
Limited training samples
Modified Nonparametric Discriminant Analysis for Classification of Hyperspectral Images with Limited Training Samples [Volume 14, Number 2] |
 |
Local Binary Fitting.
Segmentation of Endocardium Boundary of the Left Ventricle in Inhomogeneous Cardiac Magnetic Resonance Images [Volume 11, Number 1] |
 |
MFO Algorithm
An efficient CAD tool for High-Level Synthesis of VLSI digital transformers [Volume 18, Number 3] |
 |
MMSE estimator.
Speech Enhancement Using MMSE Estimator Based on Mixture of laplacian [Volume 12, Number 2] |
 |
MOPSO
A Fall Detection System based on the Type II Fuzzy Logic and Multi-Objective PSO Algorithm [Volume 17, Number 1] |
 |
MP3stego
Steganalysis of Compressed Audio Files Based on Machine Learning [Volume 21, Number 2] |
 |
Machine Learning
A General Investigation on the Combination of Local and Global Feature Selection Methods for Request Identification on Telegram [Volume 19, Number 2] |
 |
Machine Learning
Propose a meta-heuristic model of intrusion detection using feature selection based on improved gray wolf optimization and random forest [Volume 20, Number 1] |
 |
Machine Translation
Extracting parallel corpora from web comparable documents to improve the quality of an English-Farsi translation system [Volume 12, Number 2] |
 |
Machine translation
Phrase chunking in Persian texts [Volume 10, Number 2] |
 |
Macroblock
A Fast and Hybrid Boundary Matching Algorithm for Temporal Error Concealment of Video Data [Volume 12, Number 4] |
 |
Macroscopic Models.
Binaural Microscopic Model Based on Modulation Filterbank for the Prediction of Speech Intelligibility in Normal-Hearing Listeners [Volume 14, Number 1] |
 |
Magnetic Resonance Imaging
A Bayesian approach for image denoising in MRI [Volume 17, Number 3] |
 |
Magnetic resonance images
Speed improvement in graph-cuts-based registration for non-rigid image registration of brain magnetic resonance images [Volume 13, Number 4] |
 |
Malignant
Classification of skin cancer images using two-level ensemble deep learning [Volume 21, Number 2] |
 |
Maximum margin
Improving Chernoff criterion for classification by using the filled function [Volume 19, Number 3] |
 |
Memory Based Tagger.
A POS Tagging System in the Persian Language [Volume 6, Number 2] |
 |
Memory- Based Learning.
Semantic Role Labeling of Persian Sentences with Memory-Based Learning Approach [Volume 6, Number 1] |
 |
Mercator projection
A novel local feature descriptor using the Mercator projection for 3D object recognition [Volume 19, Number 1] |
 |
Meta-heuristic optimization algorithms
Low latency IIR digital filter design by using metaheuristic optimization algorithms [Volume 17, Number 1] |
 |
Modularity Q
A Multiagent Reinforcement Learning algorithm to solve the Community Detection Problem [Volume 19, Number 1] |
 |
Morphological Features
Effect of morphologies on Persian dependency parsing [Volume 11, Number 2] |
 |
Morphology operations
The Architecture of the Blind Assistant System for Passing Intersection by Mobile Cloud Computing [Volume 20, Number 3] |
 |
Moving Peaks Benchmark
Clustering and Memory-based Parent-Child Swarm Meta-heuristic Algorithm for Dynamic Optimization [Volume 18, Number 3] |
 |
Multi-Head Attention (MHA)
Aspect-Based Sentiment Analysis using the Attentional Encoder Network [Volume 20, Number 4] |
 |
Multimodal Analysis.
Using Reaction Time, P300 and Multimodal Information to Assess "Guilty Knowledge" [Volume 6, Number 1] |
 |
Multiple Objective Binary Particle Swarm Optimization
Features selection for cardiac arrhythmia diagnosis using multiple objective binary particle swarm optimization [Volume 18, Number 2] |
 |
Multivariate Time Series
Missing Data Imputation in Multivariate Time Series Data [Volume 19, Number 2] |
 |
Mutual Information
An Ensemble Multiview learning method for visual object decoding from fMRI brain data [Volume 18, Number 3] |
 |
NMF
Detecting Suspicious Card Transactions in unlabeled data of bank Using Outlier Detection Techniqes [Volume 19, Number 3] |
 |
NS2
Modified AODV Routing Protocol in Order to Defend Wormhole Attacks [Volume 13, Number 4] |
 |
Narrative text
Extractive summarization based on cognitive aspects of human mind for narrative text [Volume 12, Number 2] |
 |
Natural Language Processing
Farsi Question and Answer Dataset (FarsiQuAD) [Volume 20, Number 4] |
 |
Natural Language Processing
Improvement of generative adversarial networks for automatic text-to-image generation [Volume 19, Number 4] |
 |
Natural language processing
Persian Text Recognition using n-gram Language Models and Grammatical Refinement [Volume 11, Number 1] |
 |
Natural language processing
Topic Modeling Based on Variational Bayes Method [Volume 20, Number 2] |
 |
Neural Network
Persian name entity recognition and classification [Volume 7, Number 1] |
 |
Neural Network
Design and Implementation of Real-Time License Plate Recognition System in Video Sequences [Volume 15, Number 4] |
 |
Neural Network
Cuff-less Blood Pressure Estimation Based on Temporal Feature of PPG Signal [Volume 15, Number 1] |
 |
Neural Network.
Smart Feature Selection for Automatic Modulation recognition using Genetic Programming and Multi-Layer Perceptron Neural Network [Volume 11, Number 1] |
 |
Neural Networks.
Improvement of Networked Control Systems Performance Using Rotation in Fuzzy Logic Controller Rules [Volume 11, Number 2] |
 |
Neural network
Part Of Speech Tagging of Persian Language using Fuzzy Network Model [Volume 15, Number 4] |
 |
Neural network • Manifold learning • Within-manifold discrimination • Virtual patterns • Deep structure • Manifold separation
Improving the nonlinear manifold separator model to the face recognition by a single image of per person [Volume 12, Number 1] |
 |
News Text
Ijaz: An Operational system for single-document summarization of Persian news texts [Volume 11, Number 1] |
 |
Nonlinear Consequent Part
A New Nonlinear Recurrent Type-2 Fuzzy Model to Identify the Behavior of Nonlinear Dynamic Systems [Volume 20, Number 1] |
 |
Nonlinear Filtering
Persian Phone Recognition Using Acoustic Landmarks and Neural Network-based variability compensation methods [Volume 19, Number 4] |
 |
Nonnegative Matrix Factorization
Feature Extraction and Efficiency Comparison Using Dimension Reduction Methods in Sentiment Analysis Context [Volume 16, Number 3] |
 |
Online Classification
Online Learning for Imbalanced Data Streams with Concept Drift by Belief Theory and Chaotic Function [Volume 20, Number 4] |
 |
Ontology, ART Neural Network, TF-IDF, C-value
An Intelligent Ontology Construction System Using Hybrid ART Neural Network and C-value Method [Volume 9, Number 2] |
 |
Optical character recognition (OCR)
Document Image Dewarping using geometrical information extracted from document lines [Volume 14, Number 2] |
 |
Optimality- Perception Grammar- Recognition Grammar- Acoustic constrai
asww [Volume 5, Number 2] |
 |
Optimization
An Improvement in Support Vector Machines Algorithm with Imperialism Competitive Algorithm for Text Documents Classification [Volume 17, Number 1] |
 |
Optimization
Ensemble Kernel Learning Model for Prediction of Time Series Based on the Support Vector Regression and Meta Heuristic Search [Volume 19, Number 1] |
 |
Overlapping community detection
Identifying overlapping communities using multi-agent collective intelligence [Volume 18, Number 1] |
 |
PCA
Face Recognition by Combination of PCA and Gabor Filter [Volume 7, Number 1] |
 |
Packet Loss
Feature Extraction to Identify Network Traffic with Considering Packet Loss Effects [Volume 16, Number 4] |
 |
Pairwise Constraints
Ensembling semi-supervised p-spectral clustering for high dimensional data [Volume 20, Number 1] |
 |
Parallel Multiplier
Set the Domain for Using 3-moduli set {2^n-1, 2^n, 2^n +1} [Volume 20, Number 1] |
 |
Parallel Populations
Construction and Training of Artificial Neural Networks using Evolution Strategy with Parallel Populations [Volume 13, Number 1] |
 |
Particle swarm optimization
Optimization in Uncertain and Complex Dynamic Environments with Evolutionary Methods [Volume 16, Number 4] |
 |
Pearson correlation coefficients
Selecting effective features from Phonocardiography by Genetic Algorithm based on Pearson`s Coefficients Correlation [Volume 17, Number 3] |
 |
Peripheral Signals
Combination of event related potentials and Peripheral signals in order to improve the accuracy of the Lie detection Systems [Volume 12, Number 2] |
 |
Persian Language
Sentiment analysis methods in Persian text: A survey [Volume 19, Number 2] |
 |
Persian Language Model
Design and implementation of Persian spelling detection and correction system based on Semantic [Volume 16, Number 3] |
 |
Persian Lexicon
Automatically generate sentiment lexicon for the Persian stock market [Volume 20, Number 2] |
 |
Persian Text Processing Tools
HesNegar: Persian Sentiment WordNet [Volume 15, Number 1] |
 |
Persian Web
Automatic Evaluation of Video Search engines in Persian Web domain based on Majority Voting [Volume 15, Number 3] |
 |
Persian language
Phrasal Verb Translation from English to Persian Using Statistical Parsing [Volume 7, Number 1] |
 |
Persian.
A Rule-Based Approach in Converting a Dependency Parse Tree into Phrase Structure Parse Tree for Persian [Volume 12, Number 4] |
 |
Phase-Space Thresholding
Improving accuracy of Acoustic Tomographic data using Phase-Space Thresholding method [Volume 20, Number 2] |
 |
Phonology
Sonority Sequencing Principle in Persian Language [Volume 11, Number 1] |
 |
Photoplethysmography.
Automatic credibility assessment screening using discriminate analysis of skin conductance response and photoplethysmograph signals [Volume 13, Number 3] |
 |
Phrase Frequency
A novel model for phrase searching based-on Minimum Weighted Relocation Model [Volume 15, Number 4] |
 |
Phrase Structure Parser
Generating the Persian Constituency Treebank in an Automatic Converting Method [Volume 13, Number 2] |
 |
Phrase structure
Converting Dependency Treebank to Constituency Treebank for Persian [Volume 14, Number 4] |
 |
Pilot
Proposed Pilot Pattern Methods for Improvement DVB-T System Performance [Volume 17, Number 2] |
 |
Polarity
Improving Persian Opinion Mining based on Polarity and Balancing Positive and Negative Keywords (case study: Digikala reviews for mobile) [Volume 20, Number 4] |
 |
Position of the Points and Symbols
Search Space Reduction for Farsi Printed Subwords Recognition by Position of the Points and Signs [Volume 16, Number 3] |
 |
Pre-Trained
Improving Scene Recognition in Remote Sensing Using Deep Learning and Feature Selector [Volume 21, Number 3] |
 |
Prefix Search.
Development and Enhancement of an interactive Computer-Assisted Translation System for English to Persian [Volume 10, Number 2] |
 |
Principal Component Analysis.
Spectral and Spatial Unmixing of Hyperspectral Images Using Semi-nonnegative Matrix Factorization and Principal Component Analysis [Volume 11, Number 2] |
 |
Principal component analysis (PCA).
Two-level intrusion detection system for Internet of Things network based on deep learning [Volume 21, Number 3] |
 |
Projection Penalty
Supervised Probabilistic Principal Component Analysis Mixture Model in a Lossless Dimensionality Reduction Framework for Face Recognition [Volume 12, Number 4] |
 |
Projection pursuit methods
A Divisive Hierarchical Clustering-based Method for Indexing Image Information [Volume 11, Number 2] |
 |
Protection parameters
Exploring on rotating machines abnormal state with data mining in protective parameters [Volume 21, Number 1] |
 |
QC-MDPC Codes
Implementation of a countermeasure method against DPA on McEliece Post Quantum Cryptosystem [Volume 21, Number 2] |
 |
QoS Improvement
Vehicular Networks QoS Improvement by Simultaneous Use of RSUs and Parked Vehicles in Urban Scenarios [Volume 20, Number 2] |
 |
Quality of Service (QoS)
A new multi-hop clustering algorithm based on iterative delay to enhance QoS for Internet of Things [Volume 21, Number 1] |
 |
Question answering.
Question Classification using Ensemble Classifiers [Volume 13, Number 3] |
 |
Range-Doppler algorithm
Fast Reconstruction of SAR Images with Phase Error Using Sparse Representation [Volume 19, Number 2] |
 |
Rasayel&massayel corpus
Providing a Religious Corpus of Question Answering System in Persian [Volume 15, Number 1] |
 |
Reachability property
Checking reachability property of systems specified through graph transformation with the approach of discovery conditional dependency between the rules [Volume 20, Number 2] |
 |
Recommender System
Hybrid Recommender System Based on Variance Item Rating [Volume 19, Number 3] |
 |
Recovery algorithm
Distributed and Cooperative Compressive Sensing Recovery Algorithm for Wireless Sensor Networks with Bi-directional Incremental Topology [Volume 18, Number 3] |
 |
Recurrence Plots Nonlinear Method, Guilty Knowledge Test, Single Trial ERPs
Detection of Guilty Knowledge, Using Single Trial ERPs, and Based on Recurrence plots Nonlinear Method [Volume 9, Number 2] |
 |
Recurrence Quantification Analysis
Applying Recurrence Plots to Analyze Heart Rate Signals in Experienced Meditators [Volume 11, Number 2] |
 |
Recurrent Quantification Analysis
Precisely chaotic models survey with Qualitative Bifurcation Diagram [Volume 13, Number 3] |
 |
Recursive Cellular Automata
Image Encryption Algorithm based on Recursive Cellular Automata [Volume 13, Number 1] |
 |
ReliefF
IFSB-ReliefF: A New Instance and Feature Selection Algorithm Based on ReliefF [Volume 17, Number 4] |
 |
Reordering
Design and evaluation of hybrid encoding schema for Covert Timing Channel on the Internet [Volume 12, Number 3] |
 |
Retinal Vessel Segmentation
Enhancement of Learning Based Image Matting Method with Different Background/Foreground Weights [Volume 16, Number 1] |
 |
Rician bias
An Improved Rician Noise Correction Technique from the Magnitude of Diffusion MR Images
[Volume 15, Number 2] |
 |
RiskMeter
RiskMeter: A Tool for Measuring Precise Security Risk Values of Mobile Device Applications [Volume 14, Number 3] |
 |
Robust Pattern Recognition
An Improvement on Robust Pattern Recognition Using Chaotic Dynamics in Attractor Recurrent Neural Network [Volume 10, Number 2] |
 |
SCADA
A Petri-net Model for Operational Cycle in SCADA Systems [Volume 17, Number 2] |
 |
SCADA
An Access Management System to Mitigate Operational Threats in SCADA System [Volume 14, Number 4] |
 |
SIFT
Natural Image Mosaicing based on Redundant Keypoint Elimination Method in SIFT algorithm and Adaptive RANSAC method [Volume 18, Number 2] |
 |
SRM algorithm
Hyperspectral Images Sub-Pixel Classification Based on Pixel-Swapping Algorithm Extension and Its Evaluation [Volume 13, Number 1] |
 |
SVM-OSS.
Shape based object retrieval using descriptors extracted from growing contour process [Volume 13, Number 3] |
 |
SVM-RFE+CBR
Audio Steganalysis based on Inter-frame correlation and recursive feature elimination [Volume 15, Number 3] |
 |
Savitsky-Golay Filter
Hyperspectral Data Compression by Using Subintervals Curve Fitting, and Smoothing Filter [Volume 20, Number 1] |
 |
Scalability
Scalable Image Annotation by Summarizing Training Samples into Labeled Prototypes [Volume 18, Number 4] |
 |
Score normalization.
Improvement of Telephone Keyword Spotting Performance Using Linear Programming-Based Score Normalization [Volume 7, Number 2] |
 |
Security
A High Capacity Email Steganography Scheme using Dictionary [Volume 19, Number 1] |
 |
Semantic Similarity
Design a Sentence Based Plagiarism Detection System by Evidences Fusion in Persian Text [Volume 13, Number 1] |
 |
Semantic information
Reverse Engineering of Network Software Binary Codes for Identification of Syntax and Semantics of Protocol Messages [Volume 16, Number 2] |
 |
Semi supervised
Semi Supervised Multiple Kernel Learning using Distance Metric Learning Techniques [Volume 14, Number 1] |
 |
Sequential association rule mining
Application of web usage mining to investigate online shopping behavior via PC versus mobile devices: evidence from click-stream data [Volume 21, Number 4] |
 |
Service-Oriented environment
Entropy-Based Trust Management System for Mitigating Malicious Behaviors in Trust Management Systems, Considering Information Ethics Theory [Volume 20, Number 4] |
 |
Simulated annealing
A New Hybrid Routing Algorithm based on Genetic Algorithm and Simulated Annealing for Vehicular Ad hoc Networks [Volume 19, Number 2] |
 |
Smoothed L0-norm
Improving the performance of sparse representation-based classifier for EEG classification [Volume 12, Number 3] |
 |
Sobel
Fast CU Size and Intra Mode Decision Algorithm in HEVC Standard [Volume 20, Number 3] |
 |
Social network analysis
Identifying Influential Nodes to Diffuse the Trusting Behavior in Social Networks [Volume 18, Number 2] |
 |
Social networks
Providing a Link Prediction Model based on Structural and Homophily Similarity in Social Networks [Volume 16, Number 4] |
 |
Software Implementation
Modelling and Software Implementation of SAR Imaging System Performance in Spotlight Mode [Volume 13, Number 4] |
 |
Sparse Unmixing.
Sparse unmixing of hyper-spectral images using a pruned spectral library [Volume 13, Number 3] |
 |
Sparsity
Block-Based Compressive Sensing Using Soft Thresholding of Adaptive Transform Coefficients [Volume 17, Number 1] |
 |
Spike frequency adaptation
A neural mass model of CA1-CA3 neural network and studying sharp wave ripples [Volume 18, Number 4] |
 |
Stochastic Time Delay
Neural-Smith Predictor Method for Improvement of Networked Control Systems [Volume 18, Number 1] |
 |
Stock Modelling
Stock Market Modeling Using Artificial Neural Network and Comparison with Classical Linear Models [Volume 17, Number 4] |
 |
Stockwell transform (S transform)
Atrial Fibrillation Classification Using PiCA-ESN Algorithm and Stockwell Transform [Volume 21, Number 2] |
 |
Subspace alignment
Image Classification via Sparse Representation and Subspace Alignment [Volume 17, Number 2] |
 |
Subtractive clustering
Improving Imbalanced Data Classification Accuracy by using Fuzzy Similarity Measure and Subtractive Clustering [Volume 19, Number 2] |
 |
Supervised Learning
Contrast Relation Recognition in Persian discourse using supervised learning methods [Volume 12, Number 2] |
 |
Support Vector Machine
A Novel Efficient Energy-Aware Coverage Hole Detection Algorithm in Wireless Sensor Networks [Volume 18, Number 2] |
 |
Support Vector Machine (SVM)
The Recognition of Online Handwritten Persian Characters Based on their Main Bodies Using SVM [Volume 9, Number 1] |
 |
Support Vector Machines
A Vision Machine for Detecting Fertile Eggs and Performance Evaluation of Neural Networks and Support Vector Machines in This Machine [Volume 14, Number 3] |
 |
Support vector machine
Malware Detection using Classification of Variable-Length Sequences [Volume 16, Number 2] |
 |
Suppression
A New Privacy Preserving Data Publishing Technique Conserving Accuracy of Classification on Anonymized Data [Volume 15, Number 3] |
 |
TOPSIS model.
Design of Multi Criteria decision making model for improve Ranking of Information Security risks [Volume 11, Number 2] |
 |
TTS speech databases
TTS speech databases [Volume 6, Number 2] |
 |
Target detection.
A New Method for Jointly Estimation of Delay and Doppler from Ambiguity Function : Combination of Stochastic Processes and Spatial processing for Noise and Clutter Suppression [Volume 8, Number 2] |
 |
Text classification
A Novel One Sided Feature Selection Method for Imbalanced Text Classification [Volume 16, Number 1] |
 |
Text processing
A Model for Detecting of Persian Rumors based on the Analysis of Contextual Features in the Content of Social Networks [Volume 18, Number 1] |
 |
Thresholding.
A novel algorithm in thresholding, clustering and precise centroiding of night sky stars images [Volume 11, Number 1] |
 |
Trust Evaluation
Trust Management in Internet of Things: Review, Analysis and Establishment of Evaluation Criteria [Volume 18, Number 2] |
 |
Two-phase training/testing
Iranian Vehicle License Plate Detection based on Cascade Classifier [Volume 18, Number 3] |
 |
User Limitation
Online Persian Hand Writing Recognition Using Language Model and Reduction of User Writing Rules [Volume 14, Number 2] |
 |
User graph
Analysis of Structural Features in Rumor Conversations Detection in Twitter [Volume 18, Number 3] |
 |
Vector Taylor Series
New Approach in Robust Speech Recognition Based on Missing Feature using Bidirectional Neural Network [Volume 9, Number 1] |
 |
Vector of locally aggregated descriptors
Recognition of Visual Events using Spatio-Temporal Information of the Video Signal [Volume 18, Number 1] |
 |
Velocity estimation
Fixed-point FPGA Implementation of a Kalman Filter for Range and Velocity Estimation of Moving Targets [Volume 16, Number 3] |
 |
Verb Event
The role of Time Conjunctions in the Identification of Temporal Relations between Tensed-Verb Events in the Contemporary Persian Corpus [Volume 8, Number 1] |
 |
ViSAR-IBM3D
Extending SAR Image Despckling methods for ViSAR Denoising [Volume 19, Number 1] |
 |
Video coding
A GOP-Level Variable Bit Rate Control Algorithm for H.265 Video Coding Standard [Volume 14, Number 1] |
 |
WBAN.
An Intrusion Detection System for Wireless Body Area Networks [Volume 20, Number 1] |
 |
Wavelet Transform.
Design and Hardware Implementation of a Driver Drowsiness Detection System Based on TMAS320C5505A DSP Processor [Volume 14, Number 1] |
 |
Wavelet coefficients.
Detection of cerebral micro emboli in Doppler Signal using nonlinear features [Volume 5, Number 2] |
 |
Wavelet transform
A New Method for Speech Enhancement Based on Incoherent Model Learning in Wavelet Transform Domain [Volume 17, Number 3] |
 |
Word Sense Disambiguation
farsi word sense disambiguation with LDA Topic model [Volume 12, Number 4] |
 |
Wrapper Induction (WI)
WI&CRF: A new approach to extract the required information from military documents [Volume 9, Number 1] |
 |
Yarn Location.
Structural parameter extraction of warp and weft woven fabric using wavelet-fuzzy method and genetic algorithm [Volume 12, Number 4] |
 |
Z-spectra modeling
Analytical determination of the chemical exchange saturation transfer (CEST) contrast in molecular magnetic resonance imaging [Volume 17, Number 3] |
 |
Zorro block cipher algorithm
Novel Impossible Differential Cryptanalysis of Zorro Block Cipher [Volume 16, Number 4] |
 |
accelerated particle swarm optimization (APSO)
Optimizing question answering systems by Accelerated Particle Swarm Optimization (APSO) [Volume 19, Number 2] |
 |
access control
Web Anomaly Detection by Using Access Log Usage Profile [Volume 14, Number 3] |
 |
adaptive neuro-fuzzy inference system
Proposed Feature Selection for Dynamic Thermal Management in Multicore Systems [Volume 16, Number 1] |
 |
artifact
Mapping of McGraw Cycle to RUP Methodology for Secure Software Developing [Volume 17, Number 2] |
 |
as
as [Volume 7, Number 2] |
 |
asd
sad [Volume 8, Number 2] |
 |
asd
asdasd [Volume 9, Number 1] |
 |
asda
asda [Volume 5, Number 2] |
 |
asdad
Asdad [Volume 5, Number 2] |
 |
asdadad
asas [Volume 5, Number 2] |
 |
augmented reality
Believable Visual Feedback in Motor Learning Using Occlusion-based Clipping in Video Mapping [Volume 17, Number 3] |
 |
automatic optimization
Designing L-BFGS inspired automatic optimizer network [Volume 21, Number 1] |
 |
chaotic mutation
Genetic Algorithm with Intelligence Chaotic Algorithm and Heuristic Multi-Point Crossover for Graph Coloring Problem [Volume 14, Number 2] |
 |
classification
Relation extraction based on word embedding with Crowdsourcing Process [Volume 19, Number 1] |
 |
classification
Signal detection Using Rational Function Curve Fitting [Volume 19, Number 4] |
 |
classification
Feature fusion by neural network classification in remotely sensed hyperspectral images [Volume 20, Number 2] |
 |
classifier combination.
Verification of unemployment benefits’ claims using Classifier Combination method [Volume 19, Number 4] |
 |
clustering
An Optimal Algorithm for Dividing Microscopic Images of Blood for the Diagnosis of Acute Pulmonary Lymphoblastic Cell Using the FCM Algorithm and Genetic Optimization [Volume 15, Number 2] |
 |
clustering based discriminant analysis
Facial expression recognition through the face clustering based discriminant analysis [Volume 11, Number 1] |
 |
clustering with different density
Improvement of density-based clustering algorithm using modifying the density definitions and input parameter [Volume 16, Number 2] |
 |
coarticulation
Allophone-based acoustic modeling for Persian phoneme recognition [Volume 17, Number 3] |
 |
colonial competitive algorithm
Persian XML Documents Metaheuristic Clustering Based on Structure and Content Similarity [Volume 13, Number 2] |
 |
compounding
Pars Morph: A Persian Morphological Analyzer [Volume 8, Number 1] |
 |
compressive sampling
Compressed-Sampling-Based Image Saliency Detection in the Wavelet Domain [Volume 16, Number 4] |
 |
computational linguistics
Automatic Labeling of Semantic Roles in Persian Sentences using Dependency Trees [Volume 13, Number 1] |
 |
concatenation-prosodically sensitive units- synthesis
Design and Evaluation of a Persian TTS system using prosodically-sensitive concatenative units [Volume 7, Number 2] |
 |
conditional random field’s method
PAYMA: A Tagged Corpus of Persian Named Entities [Volume 16, Number 1] |
 |
context-aware ranking
A real-world spell checker using context-sensitive features [Volume 12, Number 3] |
 |
conventional neural network
Intelligent Identifications and Filtering of Unconventional Images Based on Deep Neural Networks [Volume 15, Number 2] |
 |
core
Semantic Segmentation of 3D Model Objects based on Salient Points and Core Extraction [Volume 11, Number 1] |
 |
cuckoo search algorithms
A hybrid method to improve Steganography in JPEG images using metaheuristic algorithms [Volume 17, Number 4] |
 |
cyber linguistic
Producing a Persian Text Tokenizer Corpus Focusing on Its Computational Linguistics Considerations [Volume 19, Number 3] |
 |
data rate limitation
Design and Evaluation of a Method for Partitioning and Offloading Web-based Applications in Mobile Systems with Bandwidth Constraints [Volume 16, Number 3] |
 |
deep learning
Named Entity Recognition in Persian Text using Deep Learning [Volume 16, Number 4] |
 |
dimension reduction
Smile and Laugh Expressions Detection Based on Local Minimum Key Points [Volume 15, Number 2] |
 |
distributed learning.
A two-stage clustering-based distributed framework for large-scale face identification [Volume 21, Number 1] |
 |
diversity.
The ensemble clustering with maximize diversity using evolutionary optimization algorithms [Volume 19, Number 4] |
 |
edge computing
IoT privacy for the transmission of data in the field of health using blockchain [Volume 21, Number 3] |
 |
effective network
EEG investigation of the effective brain networks for recognizing musical emotions [Volume 12, Number 2] |
 |
employee turnover
Predicting employee turnover using tree-based ensemble learning algorithms [Volume 20, Number 3] |
 |
expression variant faces
Improving face recognition from a single image per person via virtual images produced by imagination using neural networks [Volume 8, Number 1] |
 |
fatigue
Detection of Fatigue from Electroencephalogram Signal During Neurofeedback Training [Volume 19, Number 3] |
 |
feature categorization
JPEG Image Steganalysis Based on Classification of Statistical Features and Two Stage Decision Making [Volume 6, Number 1] |
 |
feature reduction.
Feature reduction of hyperspectral data for increasing of class separability and preserving of data structure [Volume 14, Number 1] |
 |
fuzzy inference system
Marine Target Detection in Noisy Infrared Images using a Hybrid Recognition Algorithm [Volume 18, Number 3] |
 |
fuzzy membership function
A New Method to Determine Data Membership and Find Noise and Outlier Data Using Fuzzy Support
Vector Machine [Volume 15, Number 3] |
 |
generalization
Domain adaptation-based method for improving generalization of hate speech detection models [Volume 21, Number 1] |
 |
generalized regression neural network (GRNN)
Evaluation of blood perfusion of the trapezius muscle with wavelet analysis of photoplethysmogram signal using neural network [Volume 13, Number 2] |
 |
genre
Using movie genres and Demographic Information to improve movie recommendation systems [Volume 20, Number 4] |
 |
giving weight features
Improving Precision of Keywords Extracted From Persian Text Using Word2Vec Algorithm [Volume 18, Number 1] |
 |
global permutation.
Localization of Multiple Speakers in Echoic Environments Using BSS and Speech Features for Solution of Global Permutation Ambiguity [Volume 7, Number 1] |
 |
gradient histogram feature
A two step method for offline handwritten Farsi word recognition using adaptive division of gradient image [Volume 12, Number 3] |
 |
graphical models
A Probabilistic Topic Model based on Local Word Relationships in Overlapped Windows [Volume 15, Number 4] |
 |
graphics processing unit
Improvement and parallelization of Snort network intrusion detection mechanism using graphics processing unit [Volume 18, Number 1] |
 |
handwritten digit
Design of a filter bank-based convolutional neural network for handwritten digit images classification [Volume 20, Number 3] |
 |
hidden semi-Markov model
Design an Efficient Community-based Message Forwarding Method in Mobile Social Networks [Volume 19, Number 3] |
 |
hierarchical classification
Automatic Recognition of Music Genre [Volume 7, Number 1] |
 |
history-based grammars
A Bayesian Model for Supervised Grammar Induction [Volume 9, Number 1] |
 |
image information retrieval
Automatic Colorization of Grayscale Images Using Generative Adversarial Networks [Volume 16, Number 1] |
 |
image search engine
Effective browsing of image search results via diversified visual summarization by Clustering [Volume 8, Number 2] |
 |
image watermarking, discrete cosine transform, imperialist competitive algorithm
A novel method for suitable selection of watermark strength in digital image watermarking based on imperialist competitive algorithm [Volume 10, Number 1] |
 |
imperialist competitive algorithm
ICTF: Imperialist Competitive Algorithm-based Task Scheduling in Fog Computing [Volume 20, Number 1] |
 |
incremental view maintenance
Increasing the Speed of Incremental View Maintenance Using the Cuckoo Algorithm [Volume 14, Number 3] |
 |
inferred trust.
An evolutionary approach for automating the selection of optimum Algorithm in Collaborative Filtering Recommender Systems [Volume 20, Number 1] |
 |
insider threat
An Authorization Framework for Database Systems [Volume 19, Number 4] |
 |
intelligent search
Reachability checking in complex and concurrent software systems using intelligent search methods [Volume 19, Number 1] |
 |
intelligent surveillance systems.
Fall Detection Using Novel Tracking Method Based on Modified Contour Algorithm [Volume 12, Number 4] |
 |
intonation.
Stress in Persian [Volume 6, Number 1] |
 |
k-NN.
A Content-Collaborative Recommender System based on clustering and ontology [Volume 20, Number 3] |
 |
kpn Entropy Estimation.
Channel Selection in EEG Signals Using Mutual Information for Motor Imagery Classification [Volume 20, Number 3] |
 |
large state space
Maximize Score in stochastic match-3 games using reinforcement learning [Volume 20, Number 4] |
 |
lexical choice
A Hybrid Machine Translation System Based on a Monotone Decoder [Volume 16, Number 2] |
 |
linear fractional functions
Planelet Transform: A New Geometrical Wavelet for Compression of Kinect-like Depth Images [Volume 16, Number 2] |
 |
machine learning
Automatic building a corpus and exploiting it for polarity classification of indirect opinions about drugs [Volume 13, Number 2] |
 |
machine learning
A comparison of machine learning techniques for Persian Extractive Speech to Speech Summarization without Transcript [Volume 14, Number 4] |
 |
manifold
Video based Face Recognition Using Orthogonal Locality Preserving Projection [Volume 13, Number 2] |
 |
mention
Corpus based coreference resolution for Farsi text [Volume 17, Number 1] |
 |
mobile phone application
Fatigue and drowsiness detection of the car driver based on image processing and artificial intelligence on the mobile phone [Volume 21, Number 4] |
 |
multi-source domain adaptation.
Multi-Source Transfer Learning Based on Fuzzy Rules for Improving Image Classification Accuracy [Volume 21, Number 4] |
 |
multiplier
Modulo 2n+1 Multiply and MAC Units Specified for DSPs [Volume 15, Number 1] |
 |
mutual information.
Application of Blind Source Separation for Speech-Music Separation [Volume 8, Number 1] |
 |
neural network
Image Enhancement Using Gamma Correction [Volume 8, Number 1] |
 |
neural network
A survey on vulnerability of deep neural networks to adversarial examples and defense approaches to deal with them [Volume 20, Number 2] |
 |
nonlinear features.
Emotion Classification Using Brain and Peripheral Signals [Volume 6, Number 1] |
 |
objective function.
Using Simulated Annealing algorithm to improve ensemble clustering [Volume 20, Number 1] |
 |
optimal perturbation experiment
Modeling gene regulatory networks: Classical models, optimal perturbation for identification of network [Volume 17, Number 2] |
 |
optimized Markov clustering
An intelligent behavior-based intrusion detection method for virtual machines [Volume 18, Number 2] |
 |
parsing
A Comparative Study on the Impact of Part-of-Speech Tagging on Parsing for the Persian Language Processing [Volume 13, Number 4] |
 |
part of speech tags
Studying impressive parameters on the performance of Persian probabilistic context free grammar parser [Volume 16, Number 3] |
 |
part-based approach
Using Discriminative Parts for Vehicle Make and Model Recognition [Volume 15, Number 1] |
 |
placement of urban CCTV camera - Virtual traffic - Jaccard similarity coefficient - Dijkstra's algorithm - smart city
Choosing the Best Installation Paths In the Development of Urban CCTV Cameras [Volume 21, Number 2] |
 |
polarimetric radar
Classification of polarimetric radar images based on SVM and BGSA [Volume 18, Number 1] |
 |
position of H peaks
Word segmentation in Persian continuous speech using F0 contour [Volume 16, Number 4] |
 |
q-Gaussian distribution
Non-distortion-specific no-reference Image Quality Assessment using Statistical Features [Volume 18, Number 2] |
 |
query refinement.
a relevance feedback approach based on similarity refinement in content based image retrieval [Volume 11, Number 2] |
 |
ransomware family detection
Detecting Ransomware and Identifying their Families Using Sequence Mining in Dynamic Analysis [Volume 18, Number 3] |
 |
real time dashboard
Design and Test of the Real-time Text mining dashboard for Twitter [Volume 16, Number 4] |
 |
reference phonological pattern
A Phoneme Recognition Algorithm Design Using the Acoustic Correlates of the Phonological Features [Volume 8, Number 2] |
 |
relevancy factor
Extracting and combination efficient feature from protein sequence for classify protein based on rotation forest [Volume 21, Number 1] |
 |
response time
Optimizing Web programs Response in Cloud Using Pre-processing, Case study Nginx, Varnish [Volume 15, Number 3] |
 |
search engine results ranking
A Novel Text Mining Method for User Context Extraction to Improve Search Engine Results Ranking [Volume 14, Number 3] |
 |
security
Improve the security of the platoon in vehicular networking [Volume 20, Number 1] |
 |
security.
Review of JPEG Steganography Methods and Their Security Analysis [Volume 6, Number 2] |
 |
semantic.
Confidence Estimation for Machine Translation using Novel Syntactic and Lexico-semantic Features [Volume 12, Number 3] |
 |
semi honest model
An Efficient and Secure Frequent Multiparty Summation protocol [Volume 15, Number 4] |
 |
semi-supervised classification
Detecting Concept Drift in Data Stream Using Semi-Supervised Classification [Volume 18, Number 4] |
 |
short term load forecasting.
Short term load forecast by using Locally Linear Embedding manifold learning and a hybrid RBF-Fuzzy network [Volume 16, Number 1] |
 |
single trial analysis.
Automatic Classification of Lung Tissue Patterns in HRCT Images of Patients Affected with ILD [Volume 6, Number 2] |
 |
single trial analysis.
Applying Recurrence Plots for Identifying Memory Components in Single-Trial EEGs [Volume 6, Number 2] |
 |
software defect detection
Proposing an evolutionary-fuzzy method for software defects detection [Volume 15, Number 4] |
 |
spatial data mining
A location recommender in social networks based on location based on deep learning [Volume 21, Number 4] |
 |
spectral unmixing
Spectral Unmixing Using Improved HYCA Algorithm [Volume 14, Number 3] |
 |
stemmer
Sharif Text Editor: A Persian Editor and Spell Checker System [Volume 12, Number 4] |
 |
structured-semantic information
Presenting a method for extracting structured domain-dependent information from Farsi Web pages [Volume 19, Number 2] |
 |
subpixel decomposition
A novel method for increasing the spatial resolution of remote sensing images using lookup table [Volume 13, Number 4] |
 |
support vector machine (FSVM)
Iranian License Plate identification with fuzzy support vector machine [Volume 12, Number 1] |
 |
support vector regression
Short Term Load Forecasting Using Empirical Mode Decomposition, Wavelet Transform and Support Vector Regression [Volume 19, Number 3] |
 |
syndrome
An Approach to protecting of data processing system in computing systems using convolutional code [Volume 13, Number 2] |
 |
temporal error concealment, RBF neural network, motion vector estimation, motion compensation
A New Error Concealment Technique for Video Frames Using a RBF Neural Network [Volume 10, Number 1] |
 |
text mining
automatic gender identification in persian text [Volume 12, Number 4] |
 |
time complexity
A Dynamic Programing Algorithm for Tuning Concurrency of Business Processes [Volume 15, Number 2] |
 |
transformer
A survey on short text similarity measurement methods [Volume 20, Number 3] |
 |
trust
A social recommender system based on matrix factorization considering dynamics of user preferences [Volume 18, Number 1] |
 |
two-objective genetic algorithm.
Determining the coefficients of branch performance evaluation indicators using proposed two-objective genetic algorithm [Volume 20, Number 2] |
 |
valency
An annotation scheme for Persian based on Autonomous Phrases Theory and Universal Dependencies [Volume 16, Number 3] |
 |
validity index
Cluster ensemble selection using voting [Volume 15, Number 4] |
 |
variable Length Inclined Planes System Optimization algorithm
Role of Heuristic Methods with variable Lengths In ANFIS Networks Optimum Design and Training [Volume 16, Number 4] |
 |
variable time probability density function , neural network , compression information , memorize able information stream, Huffman code
Compression time variable information using Huffman code [Volume 9, Number 2] |
 |
variant
Concept drift detection in event logs using statistical information of variants [Volume 19, Number 1] |
 |
video denoising
Video Denoising Using block Shearlet Transform [Volume 15, Number 2] |
 |
warping factor
Fast estimation of warping factor in the vocal tract length normalization using obtained scores of gender detection modeling [Volume 13, Number 1] |
 |
weight
An Approach for Extraction of Keywords and Weighting Words for Improvement Farsi Documents Classification [Volume 14, Number 4] |
 |
weighted pooling
A Convolutional Neural Network based on Adaptive Pooling for Classification of Noisy Images [Volume 17, Number 4] |
 |
white gaussian noise
A Novel Noise-Robust Texture Classification Method Using Joint Multiscale LBP [Volume 18, Number 4] |
 |
word co-occurrences
A New Document Embedding Method for News Classification [Volume 19, Number 4] |
 |
word embedding
Concept drift detection in business process logs using deep learning [Volume 17, Number 4] |