default search action
Iran Journal of Computer Science, Volume 4
Volume 4, Number 1, March 2021
- Boumediene Selma, Samira Chouraqui, Belkacem Selma, Hassane Abouaïssa:
ANFIS controller design based on pigeon-inspired optimization to control an UAV trajectory tracking task. 1-16 - Mozhdeh Zandifar, Jafar Tahmoresnezhad:
Locality Fisher discriminant analysis for conditional domain adaption. 17-34 - Sara Besharati, Hadi Veisi, Ali Darzi, Seyed Habib Hosseini Saravani:
A hybrid statistical and deep learning based technique for Persian part of speech tagging. 35-43 - S. M. Saklain Galib, Sheikh Md. Rabiul Islam, Md. Asadur Rahman:
A multiple linear regression model approach for two-class fNIR data classification. 45-58 - Mohammad Reza Mohammadi, Fatemeh Rustaee:
Hierarchical classification of fine-art paintings using deep neural networks. 59-66
Volume 4, Number 2, June 2021
- Ibrahim Gad, Doreswamy Hosahalli, B. R. Manjunatha, Osama A. Ghoneim:
A robust deep learning model for missing value imputation in big NCDC dataset. 67-84 - M. Sathish Kumar, B. Indrani:
Frequent rule reduction for phishing URL classification using fuzzy deep neural network model. 85-93 - Franklin Tchakounté, Roger Corneille Ndjeumou Ngassi, Vivient Corneille Kamla, Kalum Priyanath Udagepola:
LimonDroid: a system coupling three signature-based schemes for profiling Android malware. 95-114 - Rahul:
Automatic identification and classification of power quality events using a hybrid intelligent approach. 115-124 - Md. Motiul Islam, Mohammod Abul Kashem:
Parametric active contour model-based tumor area segmentation from brain MRI images using minimum initial points. 125-132
Volume 4, Number 3, September 2021
- Arash Deldari, Alireza Salehan:
A survey on preemptible IaaS cloud instances: challenges, issues, opportunities, and advantages. 1-24 - Chandan Saha, Md. Foisal Hossain, Md. Asadur Rahman:
NSCT-based robust image watermarking in DC components of APDCBT using singular value decomposition. 133-145 - Shahzad Ashraf, Tauqeer Ahmed, Sehrish Saleem:
NRSM: node redeployment shrewd mechanism for wireless sensor network. 171-183 - Jafar Tavoosi:
Designing a new recurrent convolutional neural network for face detection and recognition in a color image. 185-194 - Krishna Kumar Mohbey, Sunil Kumar:
A parallel approach for high utility-based frequent pattern mining in a big data environment. 195-200 - Rehman Mubashar, Muhammad Abubakar Siddique, Ateeq Ur Rehman, Adeel Asad, Asad Rasool:
Comparative performance analysis of short-range wireless protocols for wireless personal area network. 201-210 - Syed Waleed, Inam Ullah, Wali Ullah Khan, Ateeq Ur Rehman, Taj Rahman, Shanbin Li:
Resource allocation of 5G network by exploiting particle swarm optimization. 211-219
Volume 4, Number 4, December 2021
- Zeinab Javidi, Reza Akbari, Omid Bushehrian:
A new method based on formal concept analysis and metaheuristics to solve class responsibility assignment problem. 221-240 - Mansi Subhedar:
Cover selection technique for secure transform domain image steganography. 241-252 - Shamsollah Ghanbari, Mohamed Othman:
A multi-criteria approach to time cheating in the divisible load scheduling. 253-264 - Varun Gupta, Monika Mittal, Vikas Mittal, Anshu Gupta:
ECG signal analysis using CWT, spectrogram and autoregressive technique. 265-280 - Iwasokun Gabriel Babatunde, Monday Olutayo Olaoye:
Discrete transformation technique for video compression. 281-292 - Sanjeev Karmakar, Shreerup Goswami:
A new procedure for optimization of hidden layer neurons during learning through gradient descent process of neural network and improvement of performance in the chaos forecasting. 293-303 - Yashar Salami, Yaser Ebazadeh, Vahid Khajehvand:
CE-SKE: cost-effective secure key exchange scheme in Fog Federation. 305-317
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.