لطفا کمی صبر نمایید ...
ورود
Advanced Search
Thesis
مقالات فارسی
ISI
کنفرانسها
ژورنالها
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Login / Register
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Thesis
Dark Mode
استعلام پایان نامه
جستجوی مقالات داخلی
Catehory
Conference Papers
Journal Papers
Books
Plans
Research documents
Rports
Result Type:
Full Text
Has Word File
Search regardless of the position of the words
Limit article publication year to:
All years
Specific years:
Search
Show
All Information
Only Paper Title
Item Per Page
10
20
Sort By
Paper title
Year
Indexing
ABS
DESC
فیلتر نتایج
Amirmasoud rahmani
نتایج 1 تا 10 از مجموع 19
1
2
Journal Paper
FLHB-AC: Federated Learning History-Based Access Control Using Deep Neural Networks in Healthcare System
Authors:
Nasibeh Mohammadi
،
Afshin Rezakhani
،
Hamid Haj Seyyed Javadi
،
Parvaneh asghari
Year 1402
Publish place:
The Journal of Information Systems and Telecommunication (JIST) Issue 46، Vol 12
Pages:
15
| Language: English
View And Download
Journal Paper
A note on mj-clean rings
Authors:
Mehrdad Esfandiar
،
Hamid Haj Seyyed Javadi
،
Ahmad Moussavi
Year 1403
Publish place:
International Journal of Nonlinear Analysis and Applications Issue 10، Vol 15
Pages:
5
| Language: English
View And Download
Journal Paper
Recommender systems using cloud-based computer networks to predict service quality
Authors:
Mehran Aghaei
،
Sepideh Adabi
،
Parvaneh Asghari
،
Hamid Haj Seyyed Javadi
Year 1403
Publish place:
International Journal of Nonlinear Analysis and Applications Issue 10، Vol 15
Pages:
18
| Language: English
View And Download
Journal Paper
Application of S-Boxes based on the chaotic Hindmarsh-Rose system for image encryption
Authors:
Meisam Bavand Savadkouhi
،
Hamid Haj Seyyed Javadi
،
Mohammad Akbari Tootkaboni
Year 1402
Publish place:
Journal of Mathematical Modeling Issue 2، Vol 11
Pages:
24
| Language: English
View And Download
Journal Paper
Reducing The Computational Complexity of Fuzzy Identity-Based Encryption from Lattice
Authors:
Sedigheh Khajouei-Nejad
،
Hamid Haj Seyyed Javadi
،
Sam Jabbehdari
،
Seyed Mohammad Hossein Moattar
Year 1402
Publish place:
International Journal of Information and Communication Technology Research (IJICT Issue 1، Vol 16
Pages:
8
| Language: English
View And Download
Journal Paper
Regression Analysis Using Core Vector Machine Technique Based on Kernel Function Optimization
Authors:
Babak Afshin
،
Mohammad Ebrahim Shiri
،
Kamran Layeghi
،
Hamid HajSeyyedJavadi
Year 1402
Publish place:
Journal of Applied Dynamic Systems and Control Issue 3، Vol 6
Pages:
8
| Language: English
View And Download
Journal Paper
Efficient recommendations in collaborative filtering recommender system: A multi-objective evolutionary approach based on NSGA-II algorithm
Authors:
Touraj Mohammadpour
،
Amir Massoud Bidgoli
،
Rasul Enayatifar
،
Hamid Haj Seyyed Javadi
Year 1402
Publish place:
International Journal of Nonlinear Analysis and Applications Issue 1، Vol 14
Pages:
20
| Language: English
View And Download
Journal Paper
Survey of Effective of Combinatorial Design Schemes in Wireless Sensor Networks Security
Authors:
Nafiseh Masaeli
،
Hamid Haj Seyyed Javadi
،
Seyed Hossein Erfani
Year 1399
Publish place:
Journal of Communication Engineering Issue 2، Vol 9
Pages:
12
| Language: English
View And Download
Journal Paper
Determining the Number of Accusations for Decision Making in Key Revocation Protocol for MANET
Authors:
Maryam Zarezadeh
،
Mohammad Ali Doostari
،
Seyyed Hamid Haj Seyyed Javadi
Year 1395
Publish place:
Journal of Computing and Security Issue 1، Vol 3
Pages:
10
| Language: English
View And Download
Journal Paper
Using Residual Design for Key Management in Hierarchical Wireless Sensor Networks
Authors:
Vahid Modiri
،
Hamid Haj Seyyed Javadi
،
Amir Masoud Rahmani
،
Mohaddese Anzani
Year 1399
Publish place:
The Journal of Information Systems and Telecommunication (JIST) Issue 1، Vol 8
Pages:
9
| Language: English
View And Download
نتایج 1 تا 10 از مجموع 19
1
2