لطفا کمی صبر نمایید ...
ورود
Advanced Search
Thesis
مقالات فارسی
ISI
کنفرانسها
ژورنالها
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Login / Register
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Thesis
Dark Mode
استعلام پایان نامه
جستجوی مقالات داخلی
Catehory
Conference Papers
Journal Papers
Books
Plans
Research documents
Rports
Result Type:
Full Text
Has Word File
Search regardless of the position of the words
Limit article publication year to:
All years
Specific years:
Search
Show
All Information
Only Paper Title
Item Per Page
10
20
Sort By
Paper title
Year
Indexing
ABS
DESC
فیلتر نتایج
نتایج 1 تا 10 از مجموع 21
1
2
3
Journal Paper
Application of optimization algorithm to nonlinear fractional optimal control problems
Authors:
Asma Moradikashkooli
،
Hamid Haj Seyyed Javadi
،
Sam Jabbehdari
Year 1402
Publish place:
Journal of Computer and Robotics Issue 2، Vol 17
Pages:
10
| Language: English
View And Download
Journal Paper
Secure data communication in IoT-based medical health systems using Frobenius rings
Authors:
Vahid Azizi Nasrabadi
،
Hamid Haj Seyyed Javadi
،
Ahmad Moussavi
Year 1404
Publish place:
International Journal of Nonlinear Analysis and Applications Issue 1، Vol 16
Pages:
12
| Language: English
View And Download
Journal Paper
FLHB-AC: Federated Learning History-Based Access Control Using Deep Neural Networks in Healthcare System
Authors:
Nasibeh Mohammadi
،
Afshin Rezakhani
،
Hamid Haj Seyyed Javadi
،
Parvaneh asghari
Year 1402
Publish place:
The Journal of Information Systems and Telecommunication (JIST) Issue 46، Vol 12
Pages:
15
| Language: English
View And Download
Journal Paper
A note on mj-clean rings
Authors:
Mehrdad Esfandiar
،
Hamid Haj Seyyed Javadi
،
Ahmad Moussavi
Year 1403
Publish place:
International Journal of Nonlinear Analysis and Applications Issue 10، Vol 15
Pages:
5
| Language: English
View And Download
Journal Paper
Recommender systems using cloud-based computer networks to predict service quality
Authors:
Mehran Aghaei
،
Sepideh Adabi
،
Parvaneh Asghari
،
Hamid Haj Seyyed Javadi
Year 1403
Publish place:
International Journal of Nonlinear Analysis and Applications Issue 10، Vol 15
Pages:
18
| Language: English
View And Download
Journal Paper
Application of S-Boxes based on the chaotic Hindmarsh-Rose system for image encryption
Authors:
Meisam Bavand Savadkouhi
،
Hamid Haj Seyyed Javadi
،
Mohammad Akbari Tootkaboni
Year 1402
Publish place:
Journal of Mathematical Modeling Issue 2، Vol 11
Pages:
24
| Language: English
View And Download
Journal Paper
Reducing The Computational Complexity of Fuzzy Identity-Based Encryption from Lattice
Authors:
Sedigheh Khajouei-Nejad
،
Hamid Haj Seyyed Javadi
،
Sam Jabbehdari
،
Seyed Mohammad Hossein Moattar
Year 1402
Publish place:
International Journal of Information and Communication Technology Research (IJICT Issue 1، Vol 16
Pages:
8
| Language: English
View And Download
Journal Paper
Regression Analysis Using Core Vector Machine Technique Based on Kernel Function Optimization
Authors:
Babak Afshin
،
Mohammad Ebrahim Shiri
،
Kamran Layeghi
،
Hamid HajSeyyedJavadi
Year 1402
Publish place:
Journal of Applied Dynamic Systems and Control Issue 3، Vol 6
Pages:
8
| Language: English
View And Download
Journal Paper
Efficient recommendations in collaborative filtering recommender system: A multi-objective evolutionary approach based on NSGA-II algorithm
Authors:
Touraj Mohammadpour
،
Amir Massoud Bidgoli
،
Rasul Enayatifar
،
Hamid Haj Seyyed Javadi
Year 1402
Publish place:
International Journal of Nonlinear Analysis and Applications Issue 1، Vol 14
Pages:
20
| Language: English
View And Download
Journal Paper
Survey of Effective of Combinatorial Design Schemes in Wireless Sensor Networks Security
Authors:
Nafiseh Masaeli
،
Hamid Haj Seyyed Javadi
،
Seyed Hossein Erfani
Year 1399
Publish place:
Journal of Communication Engineering Issue 2، Vol 9
Pages:
12
| Language: English
View And Download
نتایج 1 تا 10 از مجموع 21
1
2
3