


default search action
Iran Journal of Computer Science, Volume 2
Volume 2, Number 1, March 2019
- Anahit Chubaryan, Artur Khamisyan:
Two types of universal proof systems for all variants of many-valued logics and some properties of them. 1-8 - Taymaz Rahkar-Farshi
:
A multilevel image thresholding using the animal migration optimization algorithm. 9-22 - Mohammad Bodaghi
, Koosha Samieefar
:
Meta-heuristic bus transportation algorithm. 23-32 - Raja Muthalagu, Subeen Jain:
Reducing the time required by KASUMI to generate output by modifying the FL and FI functions. 33-40 - Iqbal H. Sarker
:
Research issues in mining user behavioral rules for context-aware intelligent mobile applications. 41-51 - Neeraj Kumar
, Alka Agrawal, Raees Ahmad Khan:
Cost estimation of cellularly deployed IoT-enabled network for flood detection. 53-64
Volume 2, Number 2, June 2019
- Jamshid Bagherzadeh, Hasan Asil
:
A review of various semi-supervised learning models with a deep learning and memory approach. 65-80 - Pushpendra Kumar
, Vinod Kumar, Ramjeevan Singh Thakur:
A new approach for rating prediction system using collaborative filtering. 81-87 - Azra Parveen, Zishan Husain Khan
, Syed Naseem Ahmad:
Block-based copy-move image forgery detection using DCT. 89-99 - Ritika Wason
, Vishal Jain, Gagandeep Singh Narula, Anupam Balyan:
Deep understanding of 3-D multimedia information retrieval on social media: implications and challenges. 101-111 - Mohamed A. El-Zawawy
:
A new technique for intent elicitation in Android applications. 113-124 - Forough Shirin Abkenar
, Akbar Ghaffarpour Rahbar
, Mousa Shamsi:
Performance analysis of elastic optical networks (EONs) switches under unicast traffic. 125-129
Volume 2, Number 3, September 2019
- M. P. Pavan Kumar
, B. Poornima, H. S. Nagendraswamy, C. Manjunath:
A comprehensive survey on non-photorealistic rendering and benchmark developments for image abstraction and stylization. 131-165 - Md. Asadur Rahman
, Md. Mahmudul Haque, Anika Anjum, Abu Bakar Siddik
, Md. Mohidul Hasan Sifat, Mohibur Rahman Chowdhury, Farzana Khanam, Mohiuddin Ahmad:
A statistical designing approach to MATLAB based functions for the ECG signal preprocessing. 167-178 - B. R. Sreenivasa
, C. R. Nirmala:
Hybrid location-centric e-Commerce recommendation model using dynamic behavioral traits of customer. 179-188 - Sk. Tanzir Mehedi
, Abdullah Al Mamun Shamim, Mohammad Badrul Alam Miah:
Blockchain-based security management of IoT infrastructure with Ethereum transactions. 189-195
Volume 2, Number 4, December 2019
- Archana Yashodip Chaudhari, Preeti Mulay:
A bibliometric survey on incremental clustering algorithm for electricity smart meter data analysis. 197-206 - Dayanand G. Savakar, Anil Kannur
:
An extremely randomized trees method for weapons classification based on wound patterns of sharp metals using ultrasound images. 207-217 - Samaneh Rezaei
, Jafar Tahmoresnezhad
:
Discriminative and domain invariant subspace alignment for visual tasks. 219-230 - Rajat Saxena
, Somnath Dey:
DDoS prevention using third party auditor in cloud computing. 231-244 - Ram Sewak Singh
, Barjinder Singh Saini, Ramesh Kumar Sunkaria:
Arrhythmia detection based on time-frequency features of heart rate variability and back-propagation neural network. 245-257

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.