| | | | |
mahmoud abdollahi | English Title: A Survey on Fault Tolerant Routing Algorithms in Wireless Sensor Networks | M.S | | 1400/04/22 |
setareh ahsaei | Fault Resiliency Analysis of Compressed Deep Neural Networks | M.S | | 1400/06/31 |
Hamidreza Amini | A Survey on Software Bug Localization Methods using Textual Analysis | M.S | | 1399/11/30 |
Mehdi Amiri | An Overview on Vulnerabilities And Security Issues in SCADA Systems | M.S | | 1398/06/25 |
fatemeh asghariyan dastenai | An In-vehicle Network Intrusion Detection System | M.S | | 1401/11/15 |
ALIREZA BAZYAR GHOMBAVANI | Task offloading in Multi-access Edge Computing Servers | M.S | | 1401/06/07 |
mohammad ali delavar ardakani | Design & Implementation of a Toolbox for Generating Register Transfer Level HDL Code for Linear Algebraic Computations | M.S | | 1400/06/31 |
Reza Delzendeh rooy | Analyzing the Integration of Inquiry-based Learning and Knowledge Management into a Flipped Classroom for Improvement of Students’ Programming Performance | M.S | | 1400/11/15 |
majid emadi azam | a survey on proactive fault tolerance frameworks for cloud computing environments | M.S | | 1400/06/24 |
Hamid reza Esmaieli | An Survey on Objects Tracking in Moving Images | M.S | | 1399/06/31 |
mehran farvardin | A novel clustering method in wireless sensor networks with mobile targets | M.S | | 1400/06/31 |
Majid Ghafourpour Yazdi | A Novel Method for Defending against SQL Injection attacks | M.S | | |
Babak Gholampour | A Servey on Software Fault Injection Techniques | M.S | | 1397/11/29 |
hasan goodarzi | A Survey on Fault Tolerance Techniques in Wireless Sensor Networks | M.S | | |
Faramarz Hasheminasr | Investigating Denial of Service Attacks in IPv6 Protocol | M.S | | 1397/11/29 |
Elyas Izadi | A novel intrusion detection method using metaheuristic algorithms | M.S | | 1397/11/30 |
Atousa Jafari | Fault Tolerance Improvement of Clocked Storage Elements Considering Runtime and Process Variations | M.S | | 1398/04/25 |
ali jockar | Soft Error Reliability Analysis of Digital Circuits Considering Process Variations and Aging Effects | M.S | | 1400/11/25 |
Sajjad Kakoo | A Survey on the Security Vulnerability and Attack Detection Method in IoT Devices against Botnet | M.S | | 1400/06/31 |
Mohammad Reza Kasaei Anaraki | A Survey on Challenges and Security Solutions in Industrial Control Systems | M.S | | 1397/06/20 |
Fahime Khast | Reliability on the Internet of Things | M.S | | 1398/04/11 |
Soheil Kia | A Survey on Deep Neural Networks Pruning Approaches | M.S | | |
Reza Mahmoudi | Reliability Improvement of Nanoscale Sequential Digital Circuits | M.S | | 1398/06/31 |
Morteza Matloubian | A Survey on Verification and Validation Methods in Cyber-Physical Systems | M.S | | |
Babak Mirzakhani | An Overview of Digital Identity Management Models in Digital Banking | M.S | | 1400/03/12 |
Mohamad Reza MoghadasNezhad | A Survey on Phishing attack detection methods | M.S | | 1397/06/18 |
omid mokhtari | A Survey on Foutt Tolerance Techniques in Cloud Computing | M.S | | 1400/06/31 |
Keyvan Moradi Aliarabi | A Survey on Security Challenges of Internet of Objects in Smart Cities | M.S | | 1397/06/27 |
Sheida Motamedirad | A Multi-Objective Task Scheduling Approach for Embedded System Design | M.S | | 1398/10/24 |
Zahra Nabizadeh khirabad | A survey on signature-based intrusion detection methods in the Internet of Things | M.S | | 1399/06/31 |
Mohammad Negahdari | A Survey on security challenges and improvement strategies in cloud computing | M.S | | 1399/11/26 |
Mohaddaseh Nikseresht | Uncertainty-aware Multi Objective Task Scheduling for Embedded Systems | M.S | | 1398/06/27 |
Arash Qodratnama | Modelling MSM photodetector and analysis of fabrication Uncertainties in the performance of Nanophotonic Interconnects | Ph.D | | 1401/11/15 |
Abdolmajid Raeisi | A Survey on Fuzzy Decision in Cloud Computing Resource Mapping | M.S | | 1399/06/31 |
Samane Razmjoee | The Role of Block chain Technology in Bit Coin-based Economics: Advantages and Challenges | M.S | | 1398/11/30 |
Ebadollah Rezaie Suran | A survey on Reliability Improvement Techniques in Wireless Body Area Networks (WBAN) | M.S | | 1399/11/30 |
Masoud Salemi | An Energy-aware Task Scheduling Method in Mobile Cloud Computing | M.S | | 1398/06/31 |
Aliasghar Samani | A Survey on Fault Tolerant Clustering Algorithms in Wireless Sensor Networks | M.S | | 1400/04/22 |
Hossein Shaabani motlagh | Data mining-based intrusion detection systems | M.S | | 1399/11/19 |
Omid Sharafi | | M.S | | |
Elham Soleimani | A survey on fault tolerance in Internet-of-Things | M.S | | 1398/10/24 |
Mohsen Tahmasbiboldaji | A Survey on Reliability & Security Analysis Techniques in Safety-Critical Systems | M.S | | 1398/06/27 |
Fatemeh Talebi | An overview of fault tolerance methods in wireless sensor networks | M.S | | 1400/02/29 |
elahe yazdani | A Survey on Fault Tolerance Techniques in Internet of Things | M.S | | 1400/06/31 |
Mohammad Zaree | A Fault tolerant Deep Convolutional Neural Network Accelerator Unit for FPGA-based Embedded Systems | M.S | | 1399/06/31 |
Mohammad Moein Zonoubi | A survey on methods and models of mobile learning system | M.S | | 1398/11/28 |
Maryam مریم | A Survey on security improvement methods in cyber physical systems | M.S | | 1397/06/18 |
سعیده نوذری | A survey on security challenges of RFID technology in E-Health | M.S | | 1398/11/27 |
Mohammadreza Alizadeh | A trust- and load balancing-aware objective function for RPL-based Routing Protocol in Internet of Things | M.S | | |
kosar behjooj | | M.S | | |
mohammadreza firuzabadi | An FPGA-based Deep Learning Accelerator for Object Detection | M.S | | 1403/06/26 |
Amir Ghazizadeh Ahsaei | Towards Efficient Capsule Networks Deployment on Resource-Limited Devices | M.S | | 1401/05/29 |
Bahare Gholami | A Defense Mechanism against Bit-Flip Attack on Deep Neural Networks | M.S | | |
S.Mahdi Hoseini | Investigating and analyzing the challenges of vehicular networks (VANET) and providing solutions for them | M.S | | |
armin hosseinzadeh | A Study of Python programming language challenges and vulnerabilities on Stack Overflow | M.S | | 1402/11/15 |
rafal humairi | An Intrusion Detection System for Fog Computing Environments | M.S | | 1402/06/22 |
Mohammad Jabbari | An overview of the methods of increasing the efficiency of the recommender system according to customers behavior | M.S | | 1403/06/27 |
mohammadmahdi jarchi | Intrusion detection using collective learning in computer networks | M.S | | |
Mohammad Amin Kouhian Afzali Dehkordi | Metaverse and privacy challenges | M.S | | 1401/06/23 |
Hossein Maarefvand | A survey on secure routing methods in IoT | M.S | | 1401/11/15 |
Ehsan Mohammadzadeh | A Survey on evaluation models of the recommender systems in e-commerce | M.S | | 1402/06/29 |
mahsa molayem | Hardware Trojan Detection using Graph Neural Networks | M.S | | |
Alireza Nasri | A Survey on DDOS attacks and provide countermeasures to reduce their effects on cloud computing | M.S | | 1400/11/18 |
mohammadreza pirayesh dehkordi | Evaluation and mitigation of soft error effects on software using predictive modeling | Ph.D | | |
Yasaman Rahmani | A secure RPL routing protocol for mobility-enabled Internet of Things | M.S | | |
Nima Rasoulpour kojansall | A review on load balancing techniques for RPL-based Internet of Things | M.S | | 1402/11/15 |
raziyeh rouhani | COPYCAT Attack Detection in RPL-based Internet of Things | M.S | | |
MohamadAli Sadeghi | A review of load balancing methods based on multiple routing | M.S | | |
Nastaran Shirazi | An Explainability-driven Approach for Bit Flip Attack on Deep Neural Networks | M.S | | |
kimia soroush | Explainability-Driven Compression for Efficient Deep Learning Accelerators on Edge Devices | M.S | | 1402/05/21 |
fereshteh taghizadeh | | Ph.D | | |
Farimah Vakili | | M.S | | |
Mohammad Mehdi Zare | A survey on fault tolerance approaches in distributed systems | M.S | | 1401/11/15 |
Ali Zolfagharnasab | software-based side channel attacks | M.S | | 1401/10/20 |
Azita Zoughi | Analyzing security comments related to security issues on Stack Overflow | M.S | | |
dariush aryabarzan | Improving Energy Consumption In Wireless Sensor Networks Using Data Fusion And Hierarchical Routing | M.S | | 1401/06/30 |
Hadis Ghanei | Proposing a Novel Method for Malware Detecton Using Hardware Events | M.S | | 1398/11/30 |
Forough Hagh-Pnah Jahromi | Proposing an efficient approach for feature selection based on Meta-heuristic Algorithms for medical data | M.S | | 1398/06/31 |
seyed mohammad mahdi hashemi | Robust Control of PLC Against Memory Attack and Sensors Failures | M.S | | 1399/11/27 |
Saeid Keshavarzi | Designing a Hardware Architecture for the Implementation of Online Subspace Tracking Algorithms | M.S | | 1397/06/17 |
amir hossein kiamarzi | A New Approach for High Level Synthesis of Iterative Computational Algorithm on FPGA | M.S | | 1398/11/29 |
Ehsan MohammadHoseinNejad | Improving Write Energy and Write Endurance in Phase Change Memories | M.S | | 1398/10/29 |
fatemeh pirooz | The Analysis Of Self-similarity Degree In Network Infrastructure | M.S | | 1400/06/24 |
Jaber Sadeghi | Process Mining in Supply Management Information Systems: A Case Study of Hormozgan Steel Company | M.S | | 1402/04/31 |
Morteza Saki | Analyzing security vulnerabilitis of PHP code snippets on Stackoverflow | M.S | | |
Iman Salehi | Proposing a new Method with low Complexity for Detecting Malicious Software in Android OS based on Permissions and Program Privileges | M.S | | 1398/08/18 |
sedigheh shadvar | Proposing a Genetic Algorithm based Clustering method in Wireless Sensor Networks to apply Compressive Sensing Optimally | M.S | | 1400/09/30 |
ali taghados | security analysis of smart metering device | M.S | | 1398/06/31 |
Pezhman Torabi | Implementation of artificial neural networks on FPGA with scalable and parametric design | M.S | | 1396/11/15 |
farzane zahedipoor | A trustable CT-imaging system | M.S | | 1401/06/31 |
Fateme Zakipour | Automated Dataflow-Based Application Generation for Prototyping Many-Core System-On-Chip Based on ProNoC | M.S | | 1398/11/26 |
karrar abed | Network Anomaly Detection Using CNN-BiLSTM Hybrid Deep Neural Network | M.S | | 1402/06/20 |
Abbas Dehghan Hesampour | Optimization of selection and allocation of redundant components to increase the reliability of systems | Ph.D | | |
Arash Estakhrian | Improving detection of darknet traffic using machine learning strategies and analysis against adversarial attacks | M.S | | |
Alireza Mehrzad | Optimization of Resources Management in Serverless Environment using scaling Techniques | M.S | | |
ahmad negahdari | Enhancing Security of UAV Networks: A Signal Processing Approach | M.S | | 1403/06/24 |
saraaarabi saraaarabi | Providing a safe and efficient scheme for authentication and key agreement of patients and emergency medical center | M.S | | 1403/06/28 |
majid reza serpoush | Overcoming Packet-loss and Information Leakage by use of Efficient Secret Sharing in IoT networks | M.S | | |
Ali Yazdanpanah | A workload aware framework to maximize GPU utilization in multi-task environments | M.S | | 1402/06/29 |
arash zare | An Energy-aware Method for Multi-objective Optimization in Service Placement of IoT Applications on a Distributed Platform | M.S | | |
khadije zarepoor | Exploring the relation of security issues and developer emails in 77 GitHub project | M.S | | |
Meisam Abasi | A Study of Graphics Processing Unit Architectures | M.S | | 1396/05/22 |
mohammad ali abbasi | Design and Implementation of a Parametric RTL Toolbox for Vector and Matrix Addition and Multiplication | M.S | | 1396/12/20 |
Mohammad Mehdi Abolhasani Foroughi | Implementing a fault simulator using heterogeneous computing | M.S | | 1395/06/31 |
Davoud Afshar Vangini | Credit scoring of bank customers using data mining models | M.S | | 1400/06/31 |
Ahmad Ahmadi | Analysis of Traffic Accident Data Using Data Mining Techniques, case study: Medical Emergencies Center of Shiraz university of Medical Sciences. | M.S | | 1399/06/31 |
SOLMAZ AHMADI | Survey of Digital Transformation Methods and it’s Relation to Enterprise Architecture | M.S | | 1400/03/10 |
Kazem Akbari ghoseirai | Study of business models based on media technologies | M.S | | 1395/03/08 |
Laleh Akbari | Random Circuit Generation for Evaluation of Different Levels of Synthesis and Implementation of Reconfigurable Circuits | M.S | | 1396/06/28 |
Mohammad Amini Abchouiye | Application of public blockchain to control the immutability of data in online scientific periodicals | M.S | | 1399/11/19 |
Mohammadreza Amini | Investigation and comparison of secret sharing methods | M.S | | 1397/06/27 |
Soroosh Ansarimehr | Improving Energy Ef?ciency of GPUs through file register | M.S | | 1397/11/30 |
Armin Arman | The Impact Of E-Commerce On The Insurance Companies | M.S | | 1395/12/16 |
Hootan Asadi Dezfooli | Application of data mining techniques in the detection of cardiovascular disease | M.S | | 1399/11/30 |
Aliakbar Asadollahpoor | Solving Security and Privacy Challenges in IoT with Using fog Computing and Blockchain Technology | M.S | | 1398/11/28 |
Mohammad Ashkanian Ganjgah | Desktop virtualization methods and challenges | M.S | | 1397/06/19 |
Naghmeh Ashoori | A survey on the software migration to the cloud using service oriented approaches | M.S | | 1396/06/29 |
Mina Ashouri | Designing an energy efficient adaptive auto tuning system for sparse matrix vector multiplications on GPUs | M.S | | 1396/12/16 |
Mahmoud Ayoubi | Analysis and Implementation of Recursive Digital Oscillators on Reconfigurable Architectures | M.S | | 1396/11/26 |
Amir hossein Azadi | Providing Hardware Transactional Memory Techniques for GPUs Architectures | M.S | | 1397/06/27 |
morteza azari nasrabad | A Survey on integration of Internet of Thing and Cloud Computing in Smart HealthCare Monitoring Systems | M.S | | 1397/10/19 |
Kourosh Azizi | Internet of things (IOT) and its application in the smart city | M.S | | 1395/06/31 |
Mohamad Azizi | Reviewing Security implementation Methods in the Banking Cards Industry | M.S | | 1398/06/30 |
Roya AziziMahmoodabad | Internet of Things, New Season in Education | M.S | | 1397/06/31 |
MOEIN BABELIAN | A Survey on Fault Tolerance in Wireless Sensor Networks (WSN) | M.S | | 1399/04/24 |
Meysam Bahadori frodi | A review of the transportation network design problems and the proposed solutions | M.S | | 1397/06/31 |
Parvin Bakhtiari Sabet | Impact of social networks on marketing and business | M.S | | 1397/06/31 |
Haniye Banan | Proposing a solution for improving the business process modelling methods | M.S | | 1397/06/25 |
Samira Bizhani | Opportunistic Mobile Networks, Data Routing Strategies and Challenges | M.S | | 1395/06/31 |
Mehdi Dehghani | Survey of Multi Factor Authentication Methods and Challenges for Users to Enter the Virtual Identity | M.S | | 1398/11/28 |
Hajar Doryani | Predicting and Analyzing the Performance and effectiveness of employees using Data Mining Techniques | M.S | | 1400/06/03 |
pegah eghtedar | effect of human resourses on software project managment | M.S | | 1399/06/31 |
Ameneh Eidi Behjani | The accuracy and complexity evaluation of hybrid recommender systems of PCAHTRS, EBM and PCA-ANFIS models in tourist software | M.S | | 1398/06/31 |
Mohammad javad Fadakar | scrutiny appropriate architecture for processing Big data on IoT | M.S | | 1399/06/30 |
Khalil Farazifard | Study some techniques of identifying phishing websites | M.S | | 1399/11/30 |
Poria Fathi Porshokoh | Colon and Lung Cancer Recognition in Histopathological Image Based on Convolutional Neural Networks | M.S | | 1400/06/31 |
Hamed Fazel | English Title: Predicting Customer Demand for Remanufactured Products: A Data-Mining Approach | M.S | | 1399/06/16 |
Mojtaba Fekri lari | Modification of methane tri-reformer reactor to produce suitable syngas to use in dimethyl ether and methanol synthesis processes | M.S | | 1397/11/30 |
ehsan firouzi | Assessment of .NET vulnerabilities in Stack Overflow and their GitHub migration status | M.S | | 1399/06/31 |
Raheleh Fozouni abbaszadeh | A Survey Of RFID and Its Applications in The Field Of Health | M.S | | 1396/06/29 |
Morteza Gharibi | Evaluation of challenges, opportunities and applications in Topic Modeling | M.S | | 1396/02/16 |
samira gholami ali kordi | Policies and security measures in e-commerce | M.S | | 1395/12/16 |
Fatemeh Glorian | Survey on role of blockchain in the security and privacy of the Internet of Things | M.S | | 1398/06/26 |
sorush haddad bakhodaie | Reliability-based optimal stochastic designing of residential energy hub | M.S | | 1400/06/31 |
Hesam Hajihassan | Review and explain the vulnerability of e-commerce websites based on the OWASP Top 10 and vulnerabilities description in Iranian banks' websites | M.S | | 1396/06/31 |
Hashem Hajizadeh | A Study on Application of Data Mining Techniques in Stock and Financial Markets | M.S | | 1398/11/30 |
Parvin Hamzavi | fraud detection using business intelligence | M.S | | 1395/05/16 |
Majid Heydari | A Study of protocols for the distribution of secure data on the Internet of things | M.S | | 1397/06/18 |
Sayyed Amin Heydari | Investigation on Security of Virtual Machine Teachnology and Upcoming Challenges | M.S | | 1398/06/25 |
Neda Hooshmandsarvestani | A Survey on Electronic Toll Collection in Highways | M.S | | 1395/02/26 |
Seyed Hamidreza Hosseini | The Criminological Analysis of Muharaba | M.S | | 1396/08/21 |
amin jafari | A survey and evaluation of security mechanisms in mobile payments | M.S | | 1400/06/22 |
Gholamreza Jafary | A review of community detection methods in online social networks | M.S | | 1396/06/29 |
Sina jalali motlagh | Study of Artificial Intelligence Frameworks in Marketing | M.S | | 1400/06/31 |
Seyed Hessam Aldin Javadioun Isfahani | Categorizing documents with multi-agent systems | M.S | | 1394/12/15 |
Farshad Jazghani | The impact of knowledge management on innovative performance: The mediation role of unlearning | M.S | | 1400/06/31 |
Laleh Joftkar | Application of Information Technology in Medicine(Case Study EHR) | M.S | | 1396/02/16 |
Reza Karimian | Prioritize Vulnerabilities in Industrial Control Systems | M.S | | 1398/06/26 |
Yahya Kazemi | A Study on State-of-the-Art Methods of Word Sense Disambiguation in Machine Translation | M.S | | 1398/11/16 |
Mahdi Kazemzadeh | Big Data Opportunity or Challenge In Banking Industry | M.S | | 1397/06/27 |
Sara Keshvari | Architecture and protocols of the Internet of Things | M.S | | 1395/02/26 |
Leila Khajeyousefi | Applications and Challenges of Brain–Computer Interface in the Internet of Things | M.S | | 1398/06/30 |
MEHDI KHOSRAVIYAN | Data Mining Applications in Healthcare System | M.S | | 1400/06/31 |
Mohammad sadegh Kiani | A Study of High Level Synthesis and Evaluation of FPGA High Level Synthesis Tools | M.S | | 1396/06/27 |
maryam koohsoltani | Identify opportunities and challenges in the field of m-Health | M.S | | 1395/06/31 |
FATEMHE KORD | A study on block-chain technology for tackling security challenges in IoT | M.S | | 1398/11/27 |
Mohammad Loni | Design and Implementation of a Performance Evaluation Simulator for Heterogeneous Architectures | M.S | | 1395/10/06 |
Mahdi Mahdavi Asl | securing fog computing for internet of things | M.S | | 1398/11/27 |
Morteza Mahmoodianfard | Surveying technical infrastructure of digital signatures and its impact on e-commerce | M.S | | 1395/12/22 |
pedram mahmoodi | Proactive intrusion detection system using a combination of discrete and important feature selection | M.S | | 1398/06/31 |
Mohammadali Mahzoon | Comparing and assessing different architectures of internet of things for healthcare data management | M.S | | 1398/03/01 |
Ali Akbar Mataji | Review of data storage methods in distributed nosql databases | M.S | | 1400/06/31 |
Ebrahim Meskin | : A study on Firefly , Flower pollination , Bat and Krill evolutionary algorithms | M.S | | 1394/12/18 |
Zeinab Mirdadian | Investigation of techniques, conditions and indicators for classifying of Internet Bank customers using of data mining algorithms | M.S | | 1400/06/31 |
Hojjat Mohammadrezapour amlashi | Semantic Web methods and techniques in social networks | M.S | | 1394/12/12 |
Mohamadhadi Mohsenpoor | Model predictive control of micro gas turbine regenerative cycle using thermodynamic state space model | M.S | | 1397/06/31 |
Raheleh Moradi | A Survey on Software testing techniques based on deep neural network | M.S | | 1398/11/27 |
Mohammad mahdi Motevali | Study on Parameter Selection Methods for Evolutionary Algorithms | M.S | | 1395/03/26 |
Razieh Motie amrolah | Improving the identification rate of Electrocardiogram signals using fusion of discrete Fourier transform and discrete wavelet transform | M.S | | 1399/04/16 |
Mehdi Mousavi | Examine the role of management in organizations and the introduction of matrix -based decision for optimal risk management | M.S | | 1394/12/19 |
Seyed mohammad sadegh Mousavi shirazi | Cloud information dashboards, a tool for business intelligence | M.S | | 1397/06/31 |
Mohsen Najafi | A Study on IoT security challenges for smart home environments | M.S | | 1399/06/31 |
Ali Namdar Biloei | Stator Inter-Turn fault detection of induction motor | M.S | | 1400/04/07 |
Elham Narimani ghahnavieh | information technology quality assessment methods | M.S | | 1398/11/28 |
mohammad taghi narimani | Research on an agile enterprise architecture design method | M.S | | 1400/06/31 |
vafa naseri | Organizational Readiness Assessment for ERP | M.S | | 1400/06/31 |
bahareh niknia | Investigating business intelligence from the perspective of tools and big data | M.S | | 1400/06/16 |
MohammadReza Olfat | An Overview of the Migration Methods of Organizations' Software Systems to the Cloud | M.S | | 1399/03/21 |
Pezhman Omidi | Investigation of models and text analysis metods and use of them to social network texts analysis | M.S | | 1395/12/16 |
Alireza Oroumand | Investigation on Micro-service Architecture and its Software Security Challenges | M.S | | 1399/05/20 |
Parham Pahlevannejad | A review of methods to improve the performance of recommender systems in heterogeneous information networks | M.S | | 1400/05/04 |
Aida Piroozan | Epileptic seizure prediction using extended Kalman filter | M.S | | 1397/03/19 |
zahra raddani pour | Human Activity Prediction in Smart Homes | M.S | | 1399/11/30 |
Neda Rafeie | Matched field processing for underwater acoustic source localization | M.S | | 1397/04/20 |
Marziyeh Rafizadeh | The role of IoT in city management | M.S | | 1399/04/04 |
farnoosh rahmanian | Insulin pump (Artificial pancreas) device and controller design and manufacturing | M.S | | 1398/06/30 |
Elham Rasekh | Application of Secret Sharing in Cloud Computing Security | M.S | | 1397/11/28 |
Sayed mohammmadhosein Rastgouian | The Study of Various of Generation Wireless Mobile Technology | M.S | | 1394/12/12 |
Zohreh sadat Rezaei | Investigation of Intrusion Detection Methods in Cloud Networks | M.S | | 1398/06/25 |
Tina Rezaei | Malware Clustering by Header Embedding | M.S | | 1399/11/30 |
Afsaneh Rezaei | Using Plasmonic Cloaking Method in Finite and Infinite Cylindrical Structures and Its Applications | M.S | | 1396/06/29 |
aidin rezvan ashrafi | Investigation of Organic Material Adsorption on to Oil Reservoir Rocks by Using Smart Water in Batch Equilibrium Test | M.S | | 1396/06/31 |
Sara Rostami | Theory of Steganography methods in digital data transfer | M.S | | 1395/02/25 |
saeedeh Sadeghidehcheshme | An Error Detection and Correction Method for Data Blocks | M.S | | 1399/06/31 |
Mahtab Saeidifar | Enhancing MR Brain Images Segmentation Based on Combination of Active Contour and Evolutionary Algorithms | M.S | | 1399/06/31 |
Zahra SAFFAR | The feasibility of using modern technology and Smart water management in Iran's water scarcity cities | M.S | | 1397/06/27 |
maryam salehi | Review a successful model for develop Knowledge Management System - Case Study Mobarakeh Steel Company. | M.S | | 1395/06/31 |
Salman Salimi | Evaluation and comparison of methods, tools and techniques of cloud computing and grid computing | M.S | | 1394/12/12 |
amir sayadi | Constructing Low-cost High Interaction Industrial Honeypot | M.S | | 1399/11/30 |
MEHRDAD SAYADZADEH | Investigating Security Challenges in the Open Systems Interconnection (OSI) Model | M.S | | 1398/11/16 |
hamed sayyari | : Investigating the Challenges of IEEE, IEEE/EIA12207 and Sets of ISO/IEC Software Engineering Standards | M.S | | 1398/06/30 |
Atefe Sedaghat | Design , Simulation and Implementation of Conical Horn Antenna in Presence of Metamaterials for Improving the Antenna Parameters | M.S | | 1396/06/29 |
Sara Seddighi | Studying Fuzzy logic and its applications in medicine and Bioinformatics | M.S | | 1398/11/30 |
Mohammad Reza Seifi Motahaver | Review on fault tolerance methods in various applications | M.S | | 1396/05/23 |
Masoumeh Seyedyazdi | Proposing interactive algorithms between EV drivers and charging station owners considering electrical network limitations and road traffic | Ph.D | | 1399/11/29 |
Parvin Shabanian boroojeni | A survey on simulation and development of distributed systems, case study: Erlang applications and features | M.S | | 1396/02/16 |
Alireza Shadman | Reality of Smart Contracts in The BlockChain Ethereum Platform | M.S | | 1398/06/31 |
Mahdi Shahkaram | Knowledge Representation Based Engineering and Comparison of Knowledge Representation Structures in the Semantic Web | M.S | | 1398/11/30 |
Mehdi Shaker | Selection and deployment of PACS, necessary requirements and guidelines based on the experiences of the Jahrom University of Medical Sciences and Health Services | M.S | | 1394/12/18 |
Fereshte Shamsaei | studying the task scheduling and resource allocation methods in the cloud | M.S | | 1399/06/31 |
Mohammad Reza Soltani | Evaluation of energy-aware programming techniques for GPUs with performance considerations | M.S | | 1397/06/24 |
Shahrouz Sotoudeh | A Security Framework for IOT-Based Smart Homes | M.S | | 1397/06/20 |
Adel Tadayoni | The study of the effect of semantic web integration with social networks and its applications | M.S | | 1398/06/25 |
Mohammad Reza Tafaroj Nowruz | Security In Cloud Computing | M.S | | 1395/06/31 |
mohammad taghavi | Data Management platforms in IoT | M.S | | 1400/04/20 |
Reza Taghavi | Probabilistic optimal power flow in AC/DC hybrid power systems | Ph.D | | 1397/06/31 |
Sadegh Tajick | Internet of things: Concept, Architectural Elements & Middleware, Applications and Challenges | M.S | | 1395/10/27 |
Omid Tavakkol | Usage of Encryption algorithms in the design of electronic payment systems | M.S | | 1395/10/27 |
Sara Tizro | Investigation on Biometric Authentication Methods in Cloud Computing | M.S | | 1399/06/31 |
Reza Vela | Data Leakage detection and prevention | M.S | | 1398/11/27 |
Ali Yazdanfar | IoT application in smart city development with emphasis on Intelligent Transportation System (ITS) | M.S | | 1399/06/31 |
Sara Yazdani chaleshtari | Refactoring during software development to improve its performance and extensibility | M.S | | 1396/06/29 |
Rezvan Yekpaei najafabadi | Blockchain Technology Solutions for IoT Security Challenges | M.S | | 1400/03/10 |
Ahmadreza Yoosefian | A survey on composite service development environments and standards | M.S | | 1395/03/26 |
Mehran Yousefi | Presenting a Method for Automatic Bug Assignment to Software Developers | M.S | | 1398/11/30 |
Pooya Zangiabadi | a study on design patterns in development of web-based systems | M.S | | 1395/06/31 |
MEHDI ZAREI | A survey on Different Performance Evaluation Methods for Virtualized Servers | M.S | | 1395/12/16 |
REZA ZIAEI | Packet Processing method in OpenFlow Architecture | M.S | | 1394/12/18 |
mohammad ali zonnoriyan | Blockchain and Digital Currency Extraction , Opportunities and Challenges | M.S | | 1398/10/24 |
نسيم حميديان | A Study on Information Technology Auditing | M.S | | 1399/05/20 |
شهناز رابطيان | studying the Collaborative Filtering methods In Recommender Systems using Hadoop | M.S | | 1398/11/16 |
نيلوفر فيروزي | A Hardware Architecture for Efficient Implementation of Elementary Function | M.S | | 1397/06/12 |
خديجه کهنسال | Investigation on Security of MQTT Protocol and its Security Solutions | M.S | | 1399/06/31 |
ف ميرزايي | A Survey of Point-of-interest Recommendation in Comment-based Social Networks | M.S | | 1398/09/27 |
محمدحسين نشاط آور | impact of internet of things to create and update knowledge management system | M.S | | 1397/08/30 |
ميلاد هوتي | Detection and range estimation of obstacles in vehicle path using stereo vision | M.S | | 1397/04/26 |