M

  • Minaei.Behrooz On the Behavior of Pre-trained Word Embedding Variants in Deep Headline Generation from Persian Texts [ Vol.22, Issue 1 , 2 - Spring Year 1403]
  • Mirabedini.Seyed Javad A Novel Approach based on Chaotic Mapping for Implementing Security Phases on Cloud Computing [ Vol.22, Issue 2 , 2 - Summer Year 1403]
  • Mirzabeigi.Abdollah Analysis of the Effects of Different Cyber Attacks on the Secondary Controller in Island Microgrids [ Vol.22, Issue 1 , 1 - Spring Year 1403]
  • Mirzaei.Hasanreza Detection and Analysis of Acoustic Signals of Power Transformers On-Load Tap Changers for Assessment of Their Faults [ Vol.22, Issue 2 , 1 - Summer Year 1403]
  • Mohammadi.Abdolreza Detection of Quantized Sparse Signals Using Locally Most Power Full Detector in Wireless Sensor NetworkS [ Vol.22, Issue 1 , 1 - Spring Year 1403]
  • Mohammadpour Behbid.Alimohammad Comparison of FCS-MPC Predictive Control and Predictive Control Based on Lyapunov Theory in Seven-Level PUC Rectifier [ Vol.22, Issue 1 , 1 - Spring Year 1403]