| | | | |
| Multi Factor Analysis of Pair Programming Based On PSP Methodology | M.S | | 1390/06/28 |
masoud abdolahzadeh | Proposing an operational approach to weighting software quality-in-use attributes based on ISO SQuaRE model utilizing fuzzy logic | M.S | | 1400/06/31 |
seyedeh vida afzali | proposing a new secure architecture in Internet of Medical Things (IoMT) | M.S | | 1398/06/31 |
zahra aghakhani | Study of human challenges in the implementation ISMS in the organization and the proposed approach (case study) | M.S | | 1396/12/16 |
Laleh Agharezaei Googhari | Designing a clinical decision support system for determining the risk of pulmonary embolism and deep vein thrombosis by applying the artificial neural network | M.S | | 1394/06/28 |
yasmin Alborzi | Reconciliation of CMMI and Agile Methodologies | M.S | | 1393/06/24 |
aref altaf | The Design of a Model for Securing the Industrial Control Systems in Oil & Gas Production Companies(Aghajari Oil&Gas Production Co.) | M.S | | 1392/12/18 |
mohammad amin | 5G communications capabilities in support of the internet of things | M.S | | 1395/06/29 |
hamidreza amirpour kalame | Security, privacy and trust of Internet of Things (IoT) in urban management with Intelligent Transportation Approach | M.S | | 1397/11/30 |
Babak Ardekani | a method to implement electronic toll collection in country using data mining | M.S | | 1390/04/27 |
dariush aryabarzan | Improving Energy Consumption In Wireless Sensor Networks Using Data Fusion And Hierarchical Routing | M.S | | |
Mahdi Azimi | SCADA Security Testing Framework | M.S | | 1392/12/19 |
Neda Azouji | Learning based on Large Margin Cellular Structure | Ph.D | | 1400/11/15 |
maryam bahrami derasele | Classification of influenza virus’s subtype and host based on mining its sequences | M.S | | 1391/07/09 |
Mohamad Sadegh Bashkari | An Improvement in Outlier Detection Using Positive Labels | M.S | | 1392/07/09 |
Armin Daneshpazhouh | Fraud Detection based on Semi-Supervised Learning from Positive and Unlabeled data | M.S | | 1392/07/09 |
Ali Daraee | A Firewall for Industrial Networks | M.S | | 1395/12/17 |
Morteza Dastouri | Capturing the Behavior of Android Applications on Real Devices | M.S | | 1396/06/29 |
mohammad reza davarani mirzaei | Software Defect Prediction in Cross-Projects | M.S | | 1400/05/20 |
Habibeh Dehbozorgi | Software Processes Improvement in Small and Mid-Sized Organizations | M.S | | 1392/12/05 |
FATEMEH DEHBOZORGI | Implementing and Customizing Capability Maturity solution for a Large Iranian Software Development Company | M.S | | 1391/12/14 |
Sakineh Dehghani | Assessment and Improving the Results of Automatic Design Pattern Detection Tools | M.S | | 1394/12/19 |
minoo deljavan anvary | Finding important factors effecting the gold price and building the predictor model using data mining techniques | M.S | | 1393/06/15 |
Arman Ebrahimpour | Using frequency coverage information in test case prioritization techniques for increasing rate of fault detection | M.S | | 1393/06/30 |
Shima Esfandiari | | Ph.D | | |
zeynab esmailpoor | Extending Automatic Design Pattern Detection Tools by Filtering and Label Correcting Operations | M.S | | 1392/12/19 |
alireza fani saravi | Study Impacts of Electronic Customer Relationship Management on Customer Satisfaction and In Depth Review of e-CRM Implementations in Selected Iranian Private and Public Banks | M.S | | 1390/06/30 |
Ehsan Firouzi | Assessment of .NET vulnerabilities in Stack Overflow and their GitHub migration status | M.S | | 1399/06/31 |
milad ghazizadeh | Gene expression data analysis using machine Learning method | M.S | | 1396/05/21 |
Mahboobe Ghiasi | Malware detection using value set analysis | M.S | | 1391/07/10 |
Mehdi Gholami | Evaluation of part of information security management system (ISMS) implementation with respect to advanced persistent threats (APT's) | M.S | | 1396/12/16 |
Amir Haghshenas | Automatic identification of bug-fixing commits in Python open-source software projects | M.S | | 1399/11/30 |
Ali Hajikhani | A Survey on promotion of Web Applications Security from injection and vulnerability logic | M.S | | 1396/06/25 |
Shima Hakimi rad | E-learning - Dimensions and Challenges of Virtual Learning in the Corona Crisis | M.S | | 1400/06/23 |
seyed mohammad mahdi hashemi | Robust Control of PLC Against Memory Attack and Sensors Failures | M.S | | 1399/11/27 |
AliReza Honarvar | Improve Air Pollution Prediction in Smart City using Multi-source Big Urban Data Integration | Ph.D | | 1398/11/28 |
armin hosseinzadeh | A Study of Python programming language challenges and vulnerabilities on Stack Overflow | M.S | | |
isa jafari | A Survey on Bankruptcy Prediction Methods | M.S | | |
Mahbube Jahanbazi | Improving Test Cases Prioritization by Test Coverage | M.S | | 1394/12/12 |
Ali Jamali | Trustworthy Decision Support System to triage of abdominal trauma: Deployment of Deep Learning System from the Perspective of Software Engineering | M.S | | 1401/06/23 |
Hamideh Jamal of sangi | Mining in the Software Heritage Graph Dataset at Cross-Origin analysis | M.S | | 1400/06/31 |
Alireza Joonbakhsh Najafabadi | Extraction of Personal Software Process (PSP) Measures Through Mining Activity Logs | M.S | | 1398/03/12 |
Javad Kamiaby | Using data mining in software defect prediction based on code metrics and dependency | M.S | | 1390/10/26 |
Maryam Karari | Presenting a model to link a repository software architecture and distributed file system storage model | M.S | | 1391/12/16 |
fatemeh karbalaie | Malware Detection Using Data Mining Tools | M.S | | 1390/11/16 |
Fatemeh kargarfard | Knowledge extraction from influenza virus’s sequence with data mining techniques | M.S | | 1392/12/20 |
Reza Karimian Kakolaki | Prioritize Vulnerabilities in Industrial Control Systems | M.S | | 1398/06/26 |
Mohammad Karimpour Nezhad Shirazi | Survey of features in e-commerce marketing methods | M.S | | 1394/12/16 |
Sara Sadat Kashani Bozorg | An IT Framework for Preventing and Detecting Money Laundering in an Iranian Bank | M.S | | 1396/06/01 |
mostafa kashani | Roads’ role in reducing traffic road accidents by using data mining | M.S | | 1391/06/25 |
Alireza Kazemi | Malware Detection Using Graph mining algorithms | M.S | | 1391/07/01 |
marziyeh khalili | Data Mining Approach to Knowledge Extraction of Seismicity Patterns in Iran | Ph.D | | 1391/07/08 |
Abdullah Khalili | A Multi-Tier Industrial Intrusion Detection System | Ph.D | | 1395/06/31 |
Atefeh Khazaei Ghoozhdi | Exploit Prediction and Vulnerability Clustering Using Text Mining | M.S | | 1390/06/26 |
alireza kheshtzarrin | Customization Configuration Management In CMMI In A Iranian Organization | M.S | | 1393/06/31 |
Mohamadreza Khodadoust | Security in Internet of Things | M.S | | 1395/06/21 |
Babak Khorrami | Factors Affecting Customer Loyalty in E-Banking and the amount of the effect of each one | M.S | | |
fateme khoshnoud | Mining Mobile Programming Screencasts | M.S | | 1402/06/27 |
Amin Khozaei | Intrusion Detection in Cyber Physical Systems with Visualization Analytics | M.S | | 1395/06/31 |
Alireza Lashkari | Phishing detection using deep learning algorithms | M.S | | |
Mohammad Mahboob Deylami | Defining Security Controls in Detection or Prevention of Advanced Persistent Threats | M.S | | 1396/06/29 |
Mahdi Mahdavi Asl | securing fog computing for internet of things | M.S | | 1398/11/27 |
farzaneh maleki | Software Fault Prediction Based code Dependency by Data Mining | M.S | | 1390/10/26 |
Abdulsamad Maqsoudi | Re-ranking Web Documents Using Personal Preferences | M.S | | 1395/06/20 |
maryam marzban | Dynamic Fault Localization in PHP Web Applications | M.S | | 1391/07/05 |
mohammad mahdi mashayekhi mashhadalkobeh | Quality Control in CMMI | M.S | | 1392/12/20 |
Mohsen Mashhour | Making web pages more accessible for visually impaired users | M.S | | 1400/06/31 |
Mohammad Mehreganfar | Iimplement SCADA Network Honeypots | M.S | | 1395/06/31 |
Ghasem Moafian | Data Mining for Policy Setting and Analysis of Road Accident Data | M.S | | 1392/02/17 |
Mohammad Mohammadi Khah | A Vulnerability Detection Tool for C | M.S | | 1393/11/28 |
Fahim Mohammadi | Evaluation and Comparison of Data Mining Models and Methods for Credit Scoring in Banks | M.S | | 1394/12/18 |
sarah mohammadkhani | Designing a Structured Reporting System for Medical Imaging | M.S | | |
Mostafa Mohammadpourfard | A Systematic Approach to Improve Cyber Security of Power Systems | Ph.D | | 1397/06/14 |
seyyed ali mohammadzadeh darzi | A New Approach to Malware Detection Using Data Mining Techniques | M.S | | 1391/07/01 |
masoud mokhtari | Drug-Target Interaction Prediction For Drug Repurposing | M.S | | 1395/06/31 |
shadi moradi | Implementing and Customizing Performance Measurement System: Case Study of an Oil and Gas Design and Engineering Company | M.S | | 1392/07/07 |
Sara Moshtari zohreh nama | Security Improvement in SCADA Systems | M.S | | 1391/11/30 |
Farnaz Mostowfi | Assessing Quality of MIS Systems in Fars Regional Power Company And Proposing Solutions In Plan and Development , Planning , Performance and Reporting Systems | M.S | | 1390/11/19 |
maryam naderi | " Dimensions and success factors of E-Learning in the COVID-19 Crisis in Iran " | M.S | | 1401/11/15 |
marziyeh naderi | Artificial intelligence in software engineering | M.S | | 1400/12/25 |
Jafar Nadi | Nontechnical Loss Detection with Data Mining | M.S | | 1396/06/31 |
Tahereh Naghizadeh | | M.S | | |
Arman Najafi Makhsoos | Defining Success metrics of FLOSS Projects in order to develop a recommender system | M.S | | 1391/12/16 |
behzad nazarpoor | Software Fault Prediction Using Data Mining | M.S | | 1390/12/21 |
fatemeh nikoomaram | Matrix Decomposition for Data Mining | M.S | | 1390/06/30 |
mohammad nouri motlagh | A Learning Algorithm and Programming Protocol For Elementary Students | M.S | | 1391/07/05 |
Fatemeh ParvizMonfared | Time reduction techniques for regression testing | M.S | | 1394/06/09 |
Mahdi Pezeshki | Human resource Assessment of software development | M.S | | 1395/10/29 |
Mojdeh Rahmanian | Knowledge Graphs and Graph Neural Networks for Medical Text Processing: a case study of clinical trials | Ph.D | | |
Hossein Rahmani | A Unified Model based on CMMI Level 2 and 3 for Quality Improvement in Software SME's | M.S | | 1393/06/31 |
Marzieh Rastegar | Semi-Supervised Outlier Detection with Positive Instances based on Data Distribution | M.S | | 1392/10/21 |
Ali Rezaei Nasab | A deep learning approach to determine priority of bug issues in open-source software projects | M.S | | 1402/06/28 |
Razeiyeh rostami | Information Technology Strategic Plan in customs identify challenges and solutions model suitable for settlement (case study | M.S | | 1390/03/04 |
mahmood sabetkish | Review of Security Issues in Industrial Networks | M.S | | 1392/12/04 |
M.Mateeullah Sadiqee | Data mining shipwrecks: A Case Study of Titanic Survivability | M.S | | 1395/11/20 |
fatemeh saeidi | Root Cause Analysis of Burdens in implementing ISO 27000 series and ISMS and proposing Unification of Frameworks (a case study) | M.S | | 1396/12/19 |
seyede nahid sajadian | Fraud rings detection in Stack Overflow | M.S | | 1399/06/31 |
Morteza Saki | Analyzing security vulnerabilitis of PHP code snippets on Stackoverflow | M.S | | |
Saeed Salahi | Online analysis and data quality improvement of contagious disease department | M.S | | 1392/12/18 |
atousa Salari | Statistical Semi-Supervised Outlier Detection under Covariate Shift | M.S | | 1392/12/10 |
Zahra Salehi | Malware Detection Based on Behavioral Patterns | M.S | | 1391/07/08 |
amir sayadi | Constructing Low-cost High Interaction Industrial Honeypot | M.S | | 1399/11/30 |
Jamileh ShafieiSarvestani | The effect of repository extracted metrics on improving software vulnerability detection | M.S | | 1392/12/19 |
Fereshteh Shahbazi | Validating Prediction System for Transfusion of Trauma Patients | M.S | | 1396/06/30 |
behrooz shahi sheykhahmadloo | Providing a model to predict software faults based on fuzzy systems | Ph.D | | |
Maryam Shokrollahi | Auditing and Proposing Solution for MIS of Fars Regional Power Company: Focusing on Financial, Business Management, Human Resource Management and Public Relations Information Systems | M.S | | 1391/06/28 |
Yasser Tabandeh | Weighting Methods for Feature Selection | M.S | | 1390/06/30 |
Ali Taghados | security analysis of smart metering device | M.S | | 1398/06/31 |
Azam Taghizadeh | Management in Global Software Development | M.S | | 1395/06/21 |
Reza Taherkhani | Big Data Challenges and Solutions | M.S | | 1394/11/21 |
ALi tahmoorespur | Data Integration Issues among Insurance Companies in Iran: Justifications, Challenges and Proper Road Maps | M.S | | 1390/11/15 |
Hassan Tanabi | A New Approach for Automated Software Debugging | M.S | | 1391/07/09 |
mohamad mahdi tavakoli pour | New Statistical Based Outlier Detection Technique | M.S | | 1392/12/18 |
zahra toodeji | Toxic behaviors in software project management | M.S | | |
Morteza Torabi | An Overview on Continuous Integration and Delivery Systems and the Improvements of Software Development Process | M.S | | 1396/05/21 |
morteza verdi | An Empirical Study of C++ Vulnerabilities in Crowd-Sourced Code Examples | M.S | | 1398/09/24 |
Navid Yamini | Effects of Developer Metrics on Software Fault prediction | M.S | | 1393/06/31 |
farzane zahedipoor | A trustable CT-imaging system | M.S | | 1401/06/31 |
masoome zare | Design and offer : a model for developing knowledge management by information technology in organization(case study: knowledge management in students' proejcts and thesis) | M.S | | 1390/03/18 |
Hamideh Zare | Evaluating and improving design pattern detection tools | M.S | | 1394/12/19 |
khadije zarepoor | Exploring the relation of security issues and developer emails in 77 GitHub project | M.S | | |
Azita Zoughi | Analyzing security comments related to security issues on Stack Overflow | M.S | | |
علیرضا حسینی | Spyware Behavioral Analysis Machine | M.S | | 1393/06/31 |
فاطمه خدابنده | Extracting Governing Rules on Enhanced Oil Recovery Methods Using Data Dining | M.S | | 1391/11/17 |
کریم فاطمی فر | Promoting the business of the hotel industry in Iran by using e-commerce (Case study of hotels in Kish Island) | M.S | | 1398/10/11 |
| Prediction of wind turbine energy production using modern data mining with practical implementation in a real sample | M.S | | 1391/12/06 |
| A Computational Model of Syntactic Category Learning in Children | M.S | | 1389/04/07 |
Mahdie Abazar | A New Efficient Ensemble Framework for Steganalysis | M.S | | 1399/06/31 |
saeedeh abbasi | A Framework for Hidden Pattern Mining in Occupational Health Data of a Main Auto Maker Company | M.S | | 1391/04/31 |
hoda adaminejad jahromi | Power Quality Events Classification Using Ball-Vector Machine | M.S | | 1391/12/14 |
Ahmad Ahmadi | Analysis of Traffic Accident Data Using Data Mining Techniques, case study: Medical Emergencies Center of Shiraz university of Medical Sciences. | M.S | | 1399/06/31 |
Arash Ahrar | Prediction of Road Traffic Accidents Based on Data Mining Techniques | M.S | | 1398/11/30 |
Jafar Akhondali | Stable Target Tracking in Wireless Sensor Networks Under Malicious Cyber Attacks | M.S | | 1401/06/30 |
narges alizadeh noohi | Medical data mining and predictive model for colon cancer survivability | M.S | | 1391/12/14 |
Jalal Almasi far | Proposing an approach to identify implicit features in customer reviews | M.S | | 1394/12/16 |
Ramtin Aryan | BotNet Detection Based on Anomaly and Behavior Pattern Detection | M.S | | 1391/11/30 |
Hamidreza Arzaghi | Designing Service-oriented electronic government service model based on organizational portal-A Case study of Fars provincial organizations | M.S | | 1391/03/10 |
Reyhane Attarian | Toward a Passive Network Traffic Analysis Attack for Detecting Visited Websites Through Tor Anonymous Network | M.S | | 1398/06/31 |
Loghman Avand | Design and Implementation of optimization technics in a collaborative CPU and GPU framework in hadoop | M.S | | 1392/07/10 |
Mandana Baharlou Houreh | Effect of some of herbal medicines on alternative splicing in transcriptomic level using meta-analysis approach | M.S | | 1396/06/29 |
Mohammad Ali Bahrami | Design and implementation of column generation algorithm for solving Large scale combinatorial problems | M.S | | 1393/06/03 |
Reza Bakhshandeh | search in social networks | M.S | | 1391/06/25 |
arman barooni | Malware Detection Model: a defense strategy against adversarial attacks using deep learning | M.S | | 1402/06/27 |
Seyed Mohammad Bidoki | Image Semantic Discovery from the Text in Web Pages | M.S | | 1389/06/31 |
faeze bonakdari | Design & Implementation of an IDSS conflict resolver using different view points | M.S | | 1390/06/29 |
Ehsan Bozorgpouri | Energy Efficient and SLA-Aware Management of IAAS in Clouds | M.S | | 1392/06/31 |
Homaun chaab | Solving trip planning problem using an evolutionary based algorithm | M.S | | 1401/06/31 |
Mohammad Darvishi Padook | Text retrieval using semi-supervised clustering methods | M.S | | 1389/08/17 |
Elham Dehghani Firoozabadi | Software Effort Estimation Using Perceptual Computing Paradigm | Ph.D | | |
Marziyeh Dehghani | A Web Mining Framework for Access to Favorite Websites | M.S | | 1391/07/08 |
Seyed Rouhollah Dehqan Baghi | Proposing a model for validation of Islamic Tradition documents based on data mining techniques | M.S | | |
fattaneh delavari | providing a new approach to increase the accuracy of intrusion detection systems using behavior resemblance criteria and fuzzy clustering | M.S | | 1392/12/18 |
Mohammad Hassan Diyanati | Discovery of structural and conceptual interrelations of words and its application in machine translation | M.S | | 1391/11/24 |
mohammad edalati fard | Application of Data mining techniques for improvement of customer relationship management in business units | M.S | | |
azadeh eghbal | Optimization of small and medium economic enterprises using information technology.Case study (Meybod city pottery workshops) | M.S | | 1390/12/23 |
Malihe Erfanmanesh | Anomaly Detection and Prediction in Smart Home | M.S | | 1398/06/27 |
Maral EsfahanPoor | Exploring and evaluating parallel techniques in Android operating system | M.S | | 1393/12/09 |
Kaveh Eshraghian | A hybrid algorithm for the simultaneous delivery and pickup vehicle routing problems with time window | M.S | | 1392/10/16 |
Seyed Mostafa Fakhrahmad | ترجمه ماشینی مبتنی بر روش های داده کاوی و ساختارهای استنتاجی | Ph.D | | 1391/02/02 |
Abdolali Faraji | Implementation and Analysis of Software Transactional Memory on GPUs | M.S | | |
samira farhady | Comparing antioxidant and anticancer effects in different parts of pomegranate | M.S | | 1395/06/31 |
zahra sadat farshneshani | An automated method to rank appropriate developers for software bugs | M.S | | 1401/10/03 |
Saadat Farzaneh | Adaptive Clustering for Dynamic IoT Data Streams | M.S | | 1397/06/31 |
Babak Fouladinia | Fraud Detection In Automobile Insurance Using Data Mining Methods | M.S | | 1392/06/26 |
zahra gholampour | Capacity Assessment Of Collective Outsourcing Resolution Of Expertise-Based Disputes Using Blockchain Technology and its Legal Effects | M.S | | 1401/06/15 |
mahshid gohari | Android malware detection using network traffic based on deep learning | M.S | | 1400/06/31 |
Fahimeh Goodarzi | Using Matrix Decomposition in Dimensionality Reduction of Graph Data:Case Study is Microarray Dataset | M.S | | 1391/06/28 |
Maryam Haddadian Nejad Yoosefi | Automatic Generation of Test Cases based on Multi-objective Optimization algorithms | Ph.D | | |
hadi hodjati talemy | Presenting a Novel Method to Secure Sending Electronic Cash Based on Blind Signature and Asymmetric Cryptography Algorithms | M.S | | 1390/04/27 |
Mahdi Jafarian | Data mining application in personnel performance evaluation process for better decision making in the field of human resource management, Case Study: Iran Khodro Company | M.S | | 1391/06/25 |
Zahra Jahandideh | Modification of the Water Productivity Parameter in AquaCrop Model for Simulation of Wheat and Maize Dry Matter Production under Water Stress | M.S | | 1399/06/30 |
Reza Jahankohan | Malware Detection Using Semi-Supervised Learning | M.S | | 1397/11/30 |
Masoud Jamshidiyan Tehrani | Complexity Analysis for Detecting Vulnerable Smart Contracts | M.S | | 1402/06/22 |
faramarz karamizadeh | Proposing a model to detect impact factor and their effect in Automobile Third Party Insurance profit and loss of insurance company using data mining | M.S | | 1392/12/08 |
Mohammad reza Kardoost | Efficient Use of Deep Learning for Bug Assignment Problem | M.S | | 1401/06/23 |
mohsen karimi | Behavioral Malware Detection using Expert Systems | M.S | | 1391/07/10 |
mohsen keshani | Early Lung Nodule Detection and Recognition in CT Images | M.S | | 1390/06/31 |
Shahram Khatabi Bavil Olya | Evaluation and prediction of direct health care costs, using data mining techniques Case study: Health Management of Social Security Organization of Fars Province | M.S | | 1393/12/13 |
zahra mansoori | Why and how to integrate humanities courses into undergraduate engineering curriculum of universities from the prospective of world experiences and specialists | M.S | | |
najme mansouri | Proposing an efficient Method for Replication in Data Grid | M.S | | 1390/06/19 |
Shirin Mardanpour shahrekordi | Vessel Routing Problem Using Metaheuristics | M.S | | 1398/06/27 |
sara masoudi | study of stemming algorithms in persian languages | M.S | | 1391/12/12 |
samira mehrnoosh | Proposing a model for extractive text summarization | M.S | | 1394/06/28 |
mahsa mehrpour | Designing a CRM architecture for banking Industry and offer a method for managing and analyzing customer data | M.S | | 1391/04/31 |
Puya Memarzia | GPU Memory Optimization in Digital Image Processing | M.S | | 1393/06/16 |
Mahmoud Mikaeili | Proposing a voice quality management model in mobile networks based on PESQ | M.S | | 1393/12/13 |
mahbod milanizadeh | A Hierarchical Fused Fuzzy Deep Neural Network for Malware Classification | M.S | | |
Maryam MirzadehRahni | A framework for developing intelligent fuzzy-based recommendation system for | M.S | | 1391/06/29 |
Masoomeh Mobini | designing and representinng a model for accept automobile e-tax from goverment public service office | M.S | | 1391/12/15 |
vahid mohammadi dehcheshmeh | investigating and proposing solutions for stackoverflow unanswered questions | M.S | | 1399/11/30 |
Fereshteh mohammadi | Developing a hybrid system to handle uncertainty in expert system | M.S | | 1391/12/07 |
Mohammad Mohammadi | Proposing a method to improve software fault prediction | M.S | | 1394/06/30 |
zahra momken | An application of data warehouse in the electrical distribution industry ( case study: Fars Province Electrical Distribution Company | M.S | | 1390/06/28 |
Mahnaz Mousakhani | Design and implementation of virtual studio software | M.S | | 1397/11/13 |
Sadaf Nabavi | Design and development of an expert system for predicting customer loyalty patterns Case Study: Solico Food Industrial Group (Kalleh Co.) | M.S | | 1392/02/31 |
Mohammad Mahdi Nematollahi | To Adapt Recommender Systems for Temporal User Preference | M.S | | 1391/07/10 |
Parvaneh Neshatynasab | Improving graph-based Word sense disambiguation with WordNet | M.S | | 1395/06/31 |
reihaneh nikouei mahani | A large-margin Defensive Approach against Gray-Box Adversarial Attacks | M.S | | 1402/06/28 |
Kazem Nikpoor | Cellular Genetic Algorithm for Capacitated Vehcle Routing Problem | M.S | | 1392/10/16 |
saber pouresmaeeli | Modeling, Design and Implementation of SCADA Test Bed based on Siemens's PLCs | M.S | | 1391/12/01 |
Mohammadreza Rahnama | Design and Implementation of Multi Agent Simulator to Evaluate Competitive Sales Strategies in Revenue Management Systems | M.S | | 1400/06/29 |
Amir Hossein Rasekh | Word Sense Disambiguation Based on Conceptual and Morphological Analysis of Words | M.S | | 1391/07/01 |
Tina Rezaei | Malware Clustering by Header Embedding | M.S | | 1399/11/30 |
Ebrahim Sayahi | An approach to identify malware based on raw PE bytes | M.S | | 1396/06/29 |
Mina Serajian | A holistic model for Scientific Social Networks | M.S | | 1391/06/27 |
tahereh shafaee | Incorporating Information and Communication Technology on Productivity of Mazandaran Regional Electrical Company | M.S | | 1390/06/30 |
mehrvash shantiaie | Proposing an efficient method for predicting customer casualties in the telecommunications industry using data mining algorithms | M.S | | |
Hamed Sherafat Moulla | Proposing a Recommender System based on User Analysis | M.S | | 1395/12/02 |
امیر Sheybani | An intelligent spam recognition system for product reviews in e-commerce web sites | M.S | | 1391/11/28 |
Foroogh Soleymani | A model for implementing ITIL (case study: refah bank) | M.S | | 1391/11/29 |
ali soltani nezhad | Proposing a Method for Human Emotion Analysis based on Social Networks | M.S | | 1398/06/31 |
Mohammad Ali Talaghat | proposing a software engineering model for iran web startups | M.S | | 1397/04/17 |
hossein tayebi | Top Down Reservoir Modeling | M.S | | 1400/06/31 |
Mahmoud Vahedi Moghaddam | provide and implement an intelligent system for automatic selection of suitable jobs for teleworking | M.S | | 1390/11/15 |
Bahram Yarahmadi | Developing a framework for running Java 8 codes on GPUs | M.S | | 1396/05/07 |
Zahra Yeganehfard | An Investigation of Distance Metric Adaption Methods for Classification of Imbalanced Datasets | M.S | | 1391/05/11 |
pantea zardoshti | Autotuning Data Parallel Algorithms for Fermi GPUs | M.S | | 1391/12/14 |
hossein zolfi | High utiltiy frequent pattern mining in large databases | M.S | | 1391/07/05 |
امیرحسین عرشیا | Unit Test to Code Traceability Based on Textual Analysis | M.S | | 1396/06/29 |
سید محمدرضا فرزان مهر | Assessment in educational systems based on perceptual computing | M.S | | 1396/12/20 |