| | | | |
| mahmoud abdollahi | English Title: A Survey on Fault Tolerant Routing Algorithms in Wireless Sensor Networks | M.S | | 1400/04/22 |
| setareh ahsaei | Fault Resiliency Analysis of Compressed Deep Neural Networks | M.S | | 1400/06/31 |
| Hamidreza Amini | A Survey on Software Bug Localization Methods using Textual Analysis | M.S | | 1399/11/30 |
| Mehdi Amiri | An Overview on Vulnerabilities And Security Issues in SCADA Systems | M.S | | 1398/06/25 |
| fatemeh asghariyan dastenai | An In-vehicle Network Intrusion Detection System | M.S | | 1401/11/15 |
| ALIREZA BAZYAR GHOMBAVANI | Task offloading in Multi-access Edge Computing Servers | M.S | | 1401/06/07 |
| mohammad ali delavar ardakani | Design & Implementation of a Toolbox for Generating Register Transfer Level HDL Code for Linear Algebraic Computations | M.S | | 1400/06/31 |
| Reza Delzendeh rooy | Analyzing the Integration of Inquiry-based Learning and Knowledge Management into a Flipped Classroom for Improvement of Students’ Programming Performance | M.S | | 1400/11/15 |
| majid emadi azam | a survey on proactive fault tolerance frameworks for cloud computing environments | M.S | | 1400/06/24 |
| Hamid reza Esmaieli | An Survey on Objects Tracking in Moving Images | M.S | | 1399/06/31 |
| mehran farvardin | A novel clustering method in wireless sensor networks with mobile targets | M.S | | 1400/06/31 |
| Majid Ghafourpour Yazdi | A Novel Method for Defending against SQL Injection attacks | M.S | | |
| Babak Gholampour | A Servey on Software Fault Injection Techniques | M.S | | 1397/11/29 |
| hasan goodarzi | A Survey on Fault Tolerance Techniques in Wireless Sensor Networks | M.S | | |
| Faramarz Hasheminasr | Investigating Denial of Service Attacks in IPv6 Protocol | M.S | | 1397/11/29 |
| Elyas Izadi | A novel intrusion detection method using metaheuristic algorithms | M.S | | 1397/11/30 |
| Atousa Jafari | Fault Tolerance Improvement of Clocked Storage Elements Considering Runtime and Process Variations | M.S | | 1398/04/25 |
| ali jockar | Soft Error Reliability Analysis of Digital Circuits Considering Process Variations and Aging Effects | M.S | | 1400/11/25 |
| Sajjad Kakoo | A Survey on the Security Vulnerability and Attack Detection Method in IoT Devices against Botnet | M.S | | 1400/06/31 |
| Mohammad Reza Kasaei Anaraki | A Survey on Challenges and Security Solutions in Industrial Control Systems | M.S | | 1397/06/20 |
| Fahime Khast | Reliability on the Internet of Things | M.S | | 1398/04/11 |
| Soheil Kia | A Survey on Deep Neural Networks Pruning Approaches | M.S | | |
| Reza Mahmoudi | Reliability Improvement of Nanoscale Sequential Digital Circuits | M.S | | 1398/06/31 |
| Morteza Matloubian | A Survey on Verification and Validation Methods in Cyber-Physical Systems | M.S | | |
| Babak Mirzakhani | An Overview of Digital Identity Management Models in Digital Banking | M.S | | 1400/03/12 |
| Mohamad Reza MoghadasNezhad | A Survey on Phishing attack detection methods | M.S | | 1397/06/18 |
| omid mokhtari | A Survey on Foutt Tolerance Techniques in Cloud Computing | M.S | | 1400/06/31 |
| Keyvan Moradi Aliarabi | A Survey on Security Challenges of Internet of Objects in Smart Cities | M.S | | 1397/06/27 |
| Sheida Motamedirad | A Multi-Objective Task Scheduling Approach for Embedded System Design | M.S | | 1398/10/24 |
| Zahra Nabizadeh khirabad | A survey on signature-based intrusion detection methods in the Internet of Things | M.S | | 1399/06/31 |
| Mohammad Negahdari | A Survey on security challenges and improvement strategies in cloud computing | M.S | | 1399/11/26 |
| Mohaddaseh Nikseresht | Uncertainty-aware Multi Objective Task Scheduling for Embedded Systems | M.S | | 1398/06/27 |
| Arash Qodratnama | Modelling MSM photodetector and analysis of fabrication Uncertainties in the performance of Nanophotonic Interconnects | Ph.D | | 1401/11/15 |
| Abdolmajid Raeisi | A Survey on Fuzzy Decision in Cloud Computing Resource Mapping | M.S | | 1399/06/31 |
| Samane Razmjoee | The Role of Block chain Technology in Bit Coin-based Economics: Advantages and Challenges | M.S | | 1398/11/30 |
| Ebadollah Rezaie Suran | A survey on Reliability Improvement Techniques in Wireless Body Area Networks (WBAN) | M.S | | 1399/11/30 |
| Masoud Salemi | An Energy-aware Task Scheduling Method in Mobile Cloud Computing | M.S | | 1398/06/31 |
| Aliasghar Samani | A Survey on Fault Tolerant Clustering Algorithms in Wireless Sensor Networks | M.S | | 1400/04/22 |
| Hossein Shaabani motlagh | Data mining-based intrusion detection systems | M.S | | 1399/11/19 |
| Omid Sharafi | | M.S | | |
| Elham Soleimani | A survey on fault tolerance in Internet-of-Things | M.S | | 1398/10/24 |
| Mohsen Tahmasbiboldaji | A Survey on Reliability & Security Analysis Techniques in Safety-Critical Systems | M.S | | 1398/06/27 |
| Fatemeh Talebi | An overview of fault tolerance methods in wireless sensor networks | M.S | | 1400/02/29 |
| elahe yazdani | A Survey on Fault Tolerance Techniques in Internet of Things | M.S | | 1400/06/31 |
| Mohammad Zaree | A Fault tolerant Deep Convolutional Neural Network Accelerator Unit for FPGA-based Embedded Systems | M.S | | 1399/06/31 |
| Mohammad Moein Zonoubi | A survey on methods and models of mobile learning system | M.S | | 1398/11/28 |
| Maryam مریم | A Survey on security improvement methods in cyber physical systems | M.S | | 1397/06/18 |
| سعیده نوذری | A survey on security challenges of RFID technology in E-Health | M.S | | 1398/11/27 |
| Mehdi Abolhassani larki | Targeted Bit-Flip Attack on Vision-Language Models | M.S | | |
| setareh ahsaei | Towards Efficient Vision Transformers for Resource Constrained Devices in Safety Critical Applications | Ph.D | | |
| Mohammadreza Alizadeh | A trust- and load balancing-aware objective function for RPL-based Routing Protocol in Internet of Things | M.S | | 1404/04/29 |
| Fereshteh Baradaran | Deep Quantization of Vision Transformer | M.S | | |
| kosar behjooj | | M.S | | |
| Seyed Sajad farahi | Soft Errors Resiliency in Quantized Language Models | M.S | | |
| Mohammad Fazeli | An Efficient Intrusion Detection System for Internet of Things Networks | M.S | | |
| mohammadreza firuzabadi | An FPGA-based Deep Learning Accelerator for Object Detection | M.S | | 1403/06/26 |
| shima ghasempour | Using LLM in Education | M.S | | 1404/07/27 |
| Amir Ghazizadeh Ahsaei | Towards Efficient Capsule Networks Deployment on Resource-Limited Devices | M.S | | 1401/05/29 |
| Bahare Gholami | A Defense Mechanism against Bit-Flip Attack on Deep Neural Networks | M.S | | 1404/07/28 |
| S.Mahdi Hoseini | Machine Learning-Based Driver Behavior Analysis on in VANETs | M.S | | 1403/11/15 |
| armin hosseinzadeh | A Study of Python programming language challenges and vulnerabilities on Stack Overflow | M.S | | 1402/11/15 |
| rafal humairi | An Intrusion Detection System for Fog Computing Environments | M.S | | 1402/06/22 |
| Mohammad Jabbari | An overview of the methods of increasing the efficiency of the recommender system according to customers behavior | M.S | | 1403/06/27 |
| mohammadmahdi jarchi | Survey on Federated Learning for Intrusion Detection System | M.S | | 1404/07/27 |
| Mohammad Amin Kouhian Afzali Dehkordi | Metaverse and privacy challenges | M.S | | 1401/06/23 |
| Hossein Maarefvand | A survey on secure routing methods in IoT | M.S | | 1401/11/15 |
| Ehsan Mohammadzadeh | A Survey on evaluation models of the recommender systems in e-commerce | M.S | | 1402/06/29 |
| mahsa molayem | Hardware Trojan Detection using Graph Neural Networks | M.S | | |
| Zahra Mousaviean | Review of artificial intelligence chatbots with applications in the field of health | M.S | | |
| Alireza Nasri | A Survey on DDOS attacks and provide countermeasures to reduce their effects on cloud computing | M.S | | 1400/11/18 |
| mohammadreza pirayesh dehkordi | Evaluation and mitigation of soft error effects on software using predictive modeling | Ph.D | | |
| Yasaman Rahmani | A secure RPL routing protocol for mobility-enabled Internet of Things | M.S | | 1403/11/01 |
| Nima Rasoulpour kojansall | A review on load balancing techniques for RPL-based Internet of Things | M.S | | 1402/11/15 |
| raziyeh rouhani | COPYCAT Attack Detection in RPL-based Internet of Things | M.S | | 1404/07/29 |
| MohamadAli Sadeghi | A review of load balancing methods based on multiple routing | M.S | | 1403/06/25 |
| Nastaran Shirazi | An Explainability-driven Approach for Bit Flip Attack on Deep Neural Networks | M.S | | |
| kimia soroush | Explainability-Driven Compression for Efficient Deep Learning Accelerators on Edge Devices | M.S | | 1402/05/21 |
| fereshteh taghizadeh | A Trust– and Load Balancing-aware RPL Routing Protocol for Internet of Things Networks | Ph.D | | |
| Farimah Vakili | | M.S | | |
| Mohammad Zaree | Robust Zero Shot Learning under Noise | Ph.D | | |
| Mohammad Mehdi Zare | A survey on fault tolerance approaches in distributed systems | M.S | | 1401/11/15 |
| Ali Zolfagharnasab | software-based side channel attacks | M.S | | 1401/10/20 |
| Azita Zoughi | Analyzing security comments related to security issues on Stack Overflow | M.S | | |
| dariush aryabarzan | Improving Energy Consumption In Wireless Sensor Networks Using Data Fusion And Hierarchical Routing | M.S | | 1401/06/30 |
| Hadis Ghanei | Proposing a Novel Method for Malware Detecton Using Hardware Events | M.S | | 1398/11/30 |
| Forough Hagh-Pnah Jahromi | Proposing an efficient approach for feature selection based on Meta-heuristic Algorithms for medical data | M.S | | 1398/06/31 |
| seyed mohammad mahdi hashemi | Robust Control of PLC Against Memory Attack and Sensors Failures | M.S | | 1399/11/27 |
| Saeid Keshavarzi | Designing a Hardware Architecture for the Implementation of Online Subspace Tracking Algorithms | M.S | | 1397/06/17 |
| amir hossein kiamarzi | A New Approach for High Level Synthesis of Iterative Computational Algorithm on FPGA | M.S | | 1398/11/29 |
| Ehsan MohammadHoseinNejad | Improving Write Energy and Write Endurance in Phase Change Memories | M.S | | 1398/10/29 |
| fatemeh pirooz | The Analysis Of Self-similarity Degree In Network Infrastructure | M.S | | 1400/06/24 |
| Jaber Sadeghi | Process Mining in Supply Management Information Systems: A Case Study of Hormozgan Steel Company | M.S | | 1402/04/31 |
| Morteza Saki | Analyzing security vulnerabilitis of PHP code snippets on Stackoverflow | M.S | | |
| Iman Salehi | Proposing a new Method with low Complexity for Detecting Malicious Software in Android OS based on Permissions and Program Privileges | M.S | | 1398/08/18 |
| sedigheh shadvar | Proposing a Genetic Algorithm based Clustering method in Wireless Sensor Networks to apply Compressive Sensing Optimally | M.S | | 1400/09/30 |
| ali taghados | security analysis of smart metering device | M.S | | 1398/06/31 |
| Pezhman Torabi | Implementation of artificial neural networks on FPGA with scalable and parametric design | M.S | | 1396/11/15 |
| farzane zahedipoor | A trustable CT-imaging system | M.S | | 1401/06/31 |
| Fateme Zakipour | Automated Dataflow-Based Application Generation for Prototyping Many-Core System-On-Chip Based on ProNoC | M.S | | 1398/11/26 |
| Sara Abbasi | Providing an Energy Efficient Federated Finetuning Technique for Large Language Models | M.S | | 1404/07/28 |
| karrar abed | Network Anomaly Detection Using CNN-BiLSTM Hybrid Deep Neural Network | M.S | | 1402/06/20 |
| ali atri | Design and simulation of all-optical mode division multiplexing based neural network components in photonic integrated circuit platform | Ph.D | | |
| Abbas Dehghan Hesampour | Optimization of selection and allocation of redundant components to increase the reliability of systems | Ph.D | | |
| Shima Esfandiari | Node Ranking Based on Spreading Capability in Complex Networks | Ph.D | | 1404/07/29 |
| Arash Estakhrian | Improving detection of darknet traffic using machine learning strategies and analysis against adversarial attacks | M.S | | 1404/06/31 |
| sina heydarian miri | An Efficient and Lightweight Adversarial Training Framework Using Saliency-Guided Directed Noise Fast Gradient Sign Method and Knowledge Distillation to Defend Against Transfer Attacks from Public Models | M.S | | |
| mohammad khazaie | A solution base on machine learning techniques to optimize resource consumption and QoS in serverless environments | M.S | | |
| Alireza Mehrzad | Optimization of Resources Management in Serverless Environment using scaling Techniques | M.S | | 1404/06/31 |
| Akram Mihanpour | Protein Function Prediction using Self-Supervised Contrastive Learning | Ph.D | | |
| ahmad negahdari | Enhancing Security of UAV Networks: Signal Processing Approach | M.S | | 1403/06/24 |
| Alireza Rostami | Expediting Large Language Models (LLMs) Inference on GPU Tensor Cores via an Energy-aware Joint Sparsification/Quantization Method | M.S | | |
| Reza Sadeghi | Smart contract vulnerability detection using graph neural network | M.S | | |
| saraaarabi saraaarabi | Providing a safe and efficient scheme for authentication and key agreement of patients and emergency medical center | M.S | | 1403/06/28 |
| majid reza serpoush | Overcoming Packet-loss and Information Leakage by use of Efficient Secret Sharing in IoT networks | M.S | | 1403/06/24 |
| Ali Yazdanpanah | A workload aware framework to maximize GPU utilization in multi-task environments | M.S | | 1402/06/29 |
| arash zare | An Energy-aware Method for Multi-objective Optimization in Service Placement of IoT Applications on a Distributed Platform | M.S | | 1403/06/28 |
| khadije zarepoor | Exploring the relation of security issues and developer emails in 77 GitHub project | M.S | | |
| Meisam Abasi | A Study of Graphics Processing Unit Architectures | M.S | | 1396/05/22 |
| mohammad ali abbasi | Design and Implementation of a Parametric RTL Toolbox for Vector and Matrix Addition and Multiplication | M.S | | 1396/12/20 |
| Mohammad Mehdi Abolhasani Foroughi | Implementing a fault simulator using heterogeneous computing | M.S | | 1395/06/31 |
| Davoud Afshar Vangini | Credit scoring of bank customers using data mining models | M.S | | 1400/06/31 |
| Ahmad Ahmadi | Analysis of Traffic Accident Data Using Data Mining Techniques, case study: Medical Emergencies Center of Shiraz university of Medical Sciences. | M.S | | 1399/06/31 |
| SOLMAZ AHMADI | Survey of Digital Transformation Methods and it’s Relation to Enterprise Architecture | M.S | | 1400/03/10 |
| Kazem Akbari ghoseirai | Study of business models based on media technologies | M.S | | 1395/03/08 |
| Laleh Akbari | Random Circuit Generation for Evaluation of Different Levels of Synthesis and Implementation of Reconfigurable Circuits | M.S | | 1396/06/28 |
| Mohammad Amini Abchouiye | Application of public blockchain to control the immutability of data in online scientific periodicals | M.S | | 1399/11/19 |
| Mohammadreza Amini | Investigation and comparison of secret sharing methods | M.S | | 1397/06/27 |
| Soroosh Ansarimehr | Improving Energy Ef?ciency of GPUs through file register | M.S | | 1397/11/30 |
| Armin Arman | The Impact Of E-Commerce On The Insurance Companies | M.S | | 1395/12/16 |
| Hootan Asadi Dezfooli | Application of data mining techniques in the detection of cardiovascular disease | M.S | | 1399/11/30 |
| Aliakbar Asadollahpoor | Solving Security and Privacy Challenges in IoT with Using fog Computing and Blockchain Technology | M.S | | 1398/11/28 |
| Mohammad Ashkanian Ganjgah | Desktop virtualization methods and challenges | M.S | | 1397/06/19 |
| Naghmeh Ashoori | A survey on the software migration to the cloud using service oriented approaches | M.S | | 1396/06/29 |
| Mina Ashouri | Designing an energy efficient adaptive auto tuning system for sparse matrix vector multiplications on GPUs | M.S | | 1396/12/16 |
| Mahmoud Ayoubi | Analysis and Implementation of Recursive Digital Oscillators on Reconfigurable Architectures | M.S | | 1396/11/26 |
| Amir hossein Azadi | Providing Hardware Transactional Memory Techniques for GPUs Architectures | M.S | | 1397/06/27 |
| morteza azari nasrabad | A Survey on integration of Internet of Thing and Cloud Computing in Smart HealthCare Monitoring Systems | M.S | | 1397/10/19 |
| Kourosh Azizi | Internet of things (IOT) and its application in the smart city | M.S | | 1395/06/31 |
| Mohamad Azizi | Reviewing Security implementation Methods in the Banking Cards Industry | M.S | | 1398/06/30 |
| Roya AziziMahmoodabad | Internet of Things, New Season in Education | M.S | | 1397/06/31 |
| MOEIN BABELIAN | A Survey on Fault Tolerance in Wireless Sensor Networks (WSN) | M.S | | 1399/04/24 |
| Meysam Bahadori frodi | A review of the transportation network design problems and the proposed solutions | M.S | | 1397/06/31 |
| Parvin Bakhtiari Sabet | Impact of social networks on marketing and business | M.S | | 1397/06/31 |
| Haniye Banan | Proposing a solution for improving the business process modelling methods | M.S | | 1397/06/25 |
| Samira Bizhani | Opportunistic Mobile Networks, Data Routing Strategies and Challenges | M.S | | 1395/06/31 |
| Mehdi Dehghani | Survey of Multi Factor Authentication Methods and Challenges for Users to Enter the Virtual Identity | M.S | | 1398/11/28 |
| Hajar Doryani | Predicting and Analyzing the Performance and effectiveness of employees using Data Mining Techniques | M.S | | 1400/06/03 |
| pegah eghtedar | effect of human resourses on software project managment | M.S | | 1399/06/31 |
| Ameneh Eidi Behjani | The accuracy and complexity evaluation of hybrid recommender systems of PCAHTRS, EBM and PCA-ANFIS models in tourist software | M.S | | 1398/06/31 |
| Mohammad javad Fadakar | scrutiny appropriate architecture for processing Big data on IoT | M.S | | 1399/06/30 |
| Khalil Farazifard | Study some techniques of identifying phishing websites | M.S | | 1399/11/30 |
| Poria Fathi Porshokoh | Colon and Lung Cancer Recognition in Histopathological Image Based on Convolutional Neural Networks | M.S | | 1400/06/31 |
| Hamed Fazel | English Title: Predicting Customer Demand for Remanufactured Products: A Data-Mining Approach | M.S | | 1399/06/16 |
| Mojtaba Fekri lari | Modification of methane tri-reformer reactor to produce suitable syngas to use in dimethyl ether and methanol synthesis processes | M.S | | 1397/11/30 |
| ehsan firouzi | Assessment of .NET vulnerabilities in Stack Overflow and their GitHub migration status | M.S | | 1399/06/31 |
| Raheleh Fozouni abbaszadeh | A Survey Of RFID and Its Applications in The Field Of Health | M.S | | 1396/06/29 |
| Morteza Gharibi | Evaluation of challenges, opportunities and applications in Topic Modeling | M.S | | 1396/02/16 |
| samira gholami ali kordi | Policies and security measures in e-commerce | M.S | | 1395/12/16 |
| Fatemeh Glorian | Survey on role of blockchain in the security and privacy of the Internet of Things | M.S | | 1398/06/26 |
| sorush haddad bakhodaie | Reliability-based optimal stochastic designing of residential energy hub | M.S | | 1400/06/31 |
| Hesam Hajihassan | Review and explain the vulnerability of e-commerce websites based on the OWASP Top 10 and vulnerabilities description in Iranian banks' websites | M.S | | 1396/06/31 |
| Hashem Hajizadeh | A Study on Application of Data Mining Techniques in Stock and Financial Markets | M.S | | 1398/11/30 |
| Parvin Hamzavi | fraud detection using business intelligence | M.S | | 1395/05/16 |
| Majid Heydari | A Study of protocols for the distribution of secure data on the Internet of things | M.S | | 1397/06/18 |
| Sayyed Amin Heydari | Investigation on Security of Virtual Machine Teachnology and Upcoming Challenges | M.S | | 1398/06/25 |
| Neda Hooshmandsarvestani | A Survey on Electronic Toll Collection in Highways | M.S | | 1395/02/26 |
| Seyed Hamidreza Hosseini | The Criminological Analysis of Muharaba | M.S | | 1396/08/21 |
| amin jafari | A survey and evaluation of security mechanisms in mobile payments | M.S | | 1400/06/22 |
| Gholamreza Jafary | A review of community detection methods in online social networks | M.S | | 1396/06/29 |
| Sina jalali motlagh | Study of Artificial Intelligence Frameworks in Marketing | M.S | | 1400/06/31 |
| Seyed Hessam Aldin Javadioun Isfahani | Categorizing documents with multi-agent systems | M.S | | 1394/12/15 |
| Farshad Jazghani | The impact of knowledge management on innovative performance: The mediation role of unlearning | M.S | | 1400/06/31 |
| Laleh Joftkar | Application of Information Technology in Medicine(Case Study EHR) | M.S | | 1396/02/16 |
| Reza Karimian | Prioritize Vulnerabilities in Industrial Control Systems | M.S | | 1398/06/26 |
| Yahya Kazemi | A Study on State-of-the-Art Methods of Word Sense Disambiguation in Machine Translation | M.S | | 1398/11/16 |
| Mahdi Kazemzadeh | Big Data Opportunity or Challenge In Banking Industry | M.S | | 1397/06/27 |
| Sara Keshvari | Architecture and protocols of the Internet of Things | M.S | | 1395/02/26 |
| Leila Khajeyousefi | Applications and Challenges of Brain–Computer Interface in the Internet of Things | M.S | | 1398/06/30 |
| MEHDI KHOSRAVIYAN | Data Mining Applications in Healthcare System | M.S | | 1400/06/31 |
| Mohammad sadegh Kiani | A Study of High Level Synthesis and Evaluation of FPGA High Level Synthesis Tools | M.S | | 1396/06/27 |
| maryam koohsoltani | Identify opportunities and challenges in the field of m-Health | M.S | | 1395/06/31 |
| FATEMHE KORD | A study on block-chain technology for tackling security challenges in IoT | M.S | | 1398/11/27 |
| Mohammad Loni | Design and Implementation of a Performance Evaluation Simulator for Heterogeneous Architectures | M.S | | 1395/10/06 |
| Mahdi Mahdavi Asl | securing fog computing for internet of things | M.S | | 1398/11/27 |
| Morteza Mahmoodianfard | Surveying technical infrastructure of digital signatures and its impact on e-commerce | M.S | | 1395/12/22 |
| pedram mahmoodi | Proactive intrusion detection system using a combination of discrete and important feature selection | M.S | | 1398/06/31 |
| Mohammadali Mahzoon | Comparing and assessing different architectures of internet of things for healthcare data management | M.S | | 1398/03/01 |
| Ali Akbar Mataji | Review of data storage methods in distributed nosql databases | M.S | | 1400/06/31 |
| Ebrahim Meskin | : A study on Firefly , Flower pollination , Bat and Krill evolutionary algorithms | M.S | | 1394/12/18 |
| Zeinab Mirdadian | Investigation of techniques, conditions and indicators for classifying of Internet Bank customers using of data mining algorithms | M.S | | 1400/06/31 |
| Hojjat Mohammadrezapour amlashi | Semantic Web methods and techniques in social networks | M.S | | 1394/12/12 |
| Mohamadhadi Mohsenpoor | Model predictive control of micro gas turbine regenerative cycle using thermodynamic state space model | M.S | | 1397/06/31 |
| Raheleh Moradi | A Survey on Software testing techniques based on deep neural network | M.S | | 1398/11/27 |
| Mohammad mahdi Motevali | Study on Parameter Selection Methods for Evolutionary Algorithms | M.S | | 1395/03/26 |
| Razieh Motie amrolah | Improving the identification rate of Electrocardiogram signals using fusion of discrete Fourier transform and discrete wavelet transform | M.S | | 1399/04/16 |
| Mehdi Mousavi | Examine the role of management in organizations and the introduction of matrix -based decision for optimal risk management | M.S | | 1394/12/19 |
| Seyed mohammad sadegh Mousavi shirazi | Cloud information dashboards, a tool for business intelligence | M.S | | 1397/06/31 |
| Mohsen Najafi | A Study on IoT security challenges for smart home environments | M.S | | 1399/06/31 |
| Ali Namdar Biloei | Stator Inter-Turn fault detection of induction motor | M.S | | 1400/04/07 |
| Elham Narimani ghahnavieh | information technology quality assessment methods | M.S | | 1398/11/28 |
| mohammad taghi narimani | Research on an agile enterprise architecture design method | M.S | | 1400/06/31 |
| vafa naseri | Organizational Readiness Assessment for ERP | M.S | | 1400/06/31 |
| bahareh niknia | Investigating business intelligence from the perspective of tools and big data | M.S | | 1400/06/16 |
| MohammadReza Olfat | An Overview of the Migration Methods of Organizations' Software Systems to the Cloud | M.S | | 1399/03/21 |
| Pezhman Omidi | Investigation of models and text analysis metods and use of them to social network texts analysis | M.S | | 1395/12/16 |
| Alireza Oroumand | Investigation on Micro-service Architecture and its Software Security Challenges | M.S | | 1399/05/20 |
| Parham Pahlevannejad | A review of methods to improve the performance of recommender systems in heterogeneous information networks | M.S | | 1400/05/04 |
| Aida Piroozan | Epileptic seizure prediction using extended Kalman filter | M.S | | 1397/03/19 |
| zahra raddani pour | Human Activity Prediction in Smart Homes | M.S | | 1399/11/30 |
| Neda Rafeie | Matched field processing for underwater acoustic source localization | M.S | | 1397/04/20 |
| Marziyeh Rafizadeh | The role of IoT in city management | M.S | | 1399/04/04 |
| farnoosh rahmanian | Insulin pump (Artificial pancreas) device and controller design and manufacturing | M.S | | 1398/06/30 |
| Elham Rasekh | Application of Secret Sharing in Cloud Computing Security | M.S | | 1397/11/28 |
| Sayed mohammmadhosein Rastgouian | The Study of Various of Generation Wireless Mobile Technology | M.S | | 1394/12/12 |
| Zohreh sadat Rezaei | Investigation of Intrusion Detection Methods in Cloud Networks | M.S | | 1398/06/25 |
| Tina Rezaei | Malware Clustering by Header Embedding | M.S | | 1399/11/30 |
| Afsaneh Rezaei | Using Plasmonic Cloaking Method in Finite and Infinite Cylindrical Structures and Its Applications | M.S | | 1396/06/29 |
| aidin rezvan ashrafi | Investigation of Organic Material Adsorption on to Oil Reservoir Rocks by Using Smart Water in Batch Equilibrium Test | M.S | | 1396/06/31 |
| Sara Rostami | Theory of Steganography methods in digital data transfer | M.S | | 1395/02/25 |
| saeedeh Sadeghidehcheshme | An Error Detection and Correction Method for Data Blocks | M.S | | 1399/06/31 |
| Mahtab Saeidifar | Enhancing MR Brain Images Segmentation Based on Combination of Active Contour and Evolutionary Algorithms | M.S | | 1399/06/31 |
| Zahra SAFFAR | The feasibility of using modern technology and Smart water management in Iran's water scarcity cities | M.S | | 1397/06/27 |
| maryam salehi | Review a successful model for develop Knowledge Management System - Case Study Mobarakeh Steel Company. | M.S | | 1395/06/31 |
| Salman Salimi | Evaluation and comparison of methods, tools and techniques of cloud computing and grid computing | M.S | | 1394/12/12 |
| amir sayadi | Constructing Low-cost High Interaction Industrial Honeypot | M.S | | 1399/11/30 |
| MEHRDAD SAYADZADEH | Investigating Security Challenges in the Open Systems Interconnection (OSI) Model | M.S | | 1398/11/16 |
| hamed sayyari | : Investigating the Challenges of IEEE, IEEE/EIA12207 and Sets of ISO/IEC Software Engineering Standards | M.S | | 1398/06/30 |
| Atefe Sedaghat | Design , Simulation and Implementation of Conical Horn Antenna in Presence of Metamaterials for Improving the Antenna Parameters | M.S | | 1396/06/29 |
| Sara Seddighi | Studying Fuzzy logic and its applications in medicine and Bioinformatics | M.S | | 1398/11/30 |
| Mohammad Reza Seifi Motahaver | Review on fault tolerance methods in various applications | M.S | | 1396/05/23 |
| Masoumeh Seyedyazdi | Proposing interactive algorithms between EV drivers and charging station owners considering electrical network limitations and road traffic | Ph.D | | 1399/11/29 |
| Parvin Shabanian boroojeni | A survey on simulation and development of distributed systems, case study: Erlang applications and features | M.S | | 1396/02/16 |
| Alireza Shadman | Reality of Smart Contracts in The BlockChain Ethereum Platform | M.S | | 1398/06/31 |
| Mahdi Shahkaram | Knowledge Representation Based Engineering and Comparison of Knowledge Representation Structures in the Semantic Web | M.S | | 1398/11/30 |
| Mehdi Shaker | Selection and deployment of PACS, necessary requirements and guidelines based on the experiences of the Jahrom University of Medical Sciences and Health Services | M.S | | 1394/12/18 |
| Fereshte Shamsaei | studying the task scheduling and resource allocation methods in the cloud | M.S | | 1399/06/31 |
| Mohammad Reza Soltani | Evaluation of energy-aware programming techniques for GPUs with performance considerations | M.S | | 1397/06/24 |
| Shahrouz Sotoudeh | A Security Framework for IOT-Based Smart Homes | M.S | | 1397/06/20 |
| Adel Tadayoni | The study of the effect of semantic web integration with social networks and its applications | M.S | | 1398/06/25 |
| Mohammad Reza Tafaroj Nowruz | Security In Cloud Computing | M.S | | 1395/06/31 |
| mohammad taghavi | Data Management platforms in IoT | M.S | | 1400/04/20 |
| Reza Taghavi | Probabilistic optimal power flow in AC/DC hybrid power systems | Ph.D | | 1397/06/31 |
| Sadegh Tajick | Internet of things: Concept, Architectural Elements & Middleware, Applications and Challenges | M.S | | 1395/10/27 |
| Omid Tavakkol | Usage of Encryption algorithms in the design of electronic payment systems | M.S | | 1395/10/27 |
| Sara Tizro | Investigation on Biometric Authentication Methods in Cloud Computing | M.S | | 1399/06/31 |
| Reza Vela | Data Leakage detection and prevention | M.S | | 1398/11/27 |
| Ali Yazdanfar | IoT application in smart city development with emphasis on Intelligent Transportation System (ITS) | M.S | | 1399/06/31 |
| Sara Yazdani chaleshtari | Refactoring during software development to improve its performance and extensibility | M.S | | 1396/06/29 |
| Rezvan Yekpaei najafabadi | Blockchain Technology Solutions for IoT Security Challenges | M.S | | 1400/03/10 |
| Ahmadreza Yoosefian | A survey on composite service development environments and standards | M.S | | 1395/03/26 |
| Mehran Yousefi | Presenting a Method for Automatic Bug Assignment to Software Developers | M.S | | 1398/11/30 |
| Pooya Zangiabadi | a study on design patterns in development of web-based systems | M.S | | 1395/06/31 |
| MEHDI ZAREI | A survey on Different Performance Evaluation Methods for Virtualized Servers | M.S | | 1395/12/16 |
| REZA ZIAEI | Packet Processing method in OpenFlow Architecture | M.S | | 1394/12/18 |
| mohammad ali zonnoriyan | Blockchain and Digital Currency Extraction , Opportunities and Challenges | M.S | | 1398/10/24 |
| نسيم حميديان | A Study on Information Technology Auditing | M.S | | 1399/05/20 |
| شهناز رابطيان | studying the Collaborative Filtering methods In Recommender Systems using Hadoop | M.S | | 1398/11/16 |
| نيلوفر فيروزي | A Hardware Architecture for Efficient Implementation of Elementary Function | M.S | | 1397/06/12 |
| خديجه کهنسال | Investigation on Security of MQTT Protocol and its Security Solutions | M.S | | 1399/06/31 |
| ف ميرزايي | A Survey of Point-of-interest Recommendation in Comment-based Social Networks | M.S | | 1398/09/27 |
| محمدحسين نشاط آور | impact of internet of things to create and update knowledge management system | M.S | | 1397/08/30 |
| ميلاد هوتي | Detection and range estimation of obstacles in vehicle path using stereo vision | M.S | | 1397/04/26 |