S

  • Sabeti.Vajiheh Improving Security of LSBM Steganography Using of Genetic Algorithm, Mmulti-Key and Blocking [ Vol.18, Issue 1 , 2 - Spring Year 1399]
  • Sabri.M. A Dynamic Sequential Approach Using Deep Learning to Improve the Performance of Biometrics Match on Card Systems [ Vol.18, Issue 1 , 2 - Spring Year 1399]
  • Sadeg Mohamadi.Hamidreza Design, Development and Fabrication of Two-Parameter Synthetic Short-Circuit Test for VCB Using Nnetwork-Connected Current Circuit [ Vol.18, Issue 2 , 1 - Summer Year 1399]
  • Sadoghi Yazdi.Hadi Variational Bayesian inference in Noise Removal from Hyperspectral Images Using Cluster-Based Latent Variables [ Vol.18, Issue 2 , 2 - Summer Year 1399]
  • Sadoghi Yazdi.Hadi A New and Robust AMP Algorithm for Non IID Matrices Based on Bayesian Theory in Compressed Sensing [ Vol.18, Issue 1 , 2 - Spring Year 1399]
  • Salehi.F. An Intelligent Approach for OFDM Channel Estimation Using Gravitational Search Algorithm [ Vol.18, Issue 1 , 1 - Spring Year 1399]
  • Salehi.Mostafa Convolutional Neural Networks for Sentiment Analysis in Persian Social Media [ Vol.18, Issue 1 , 2 - Spring Year 1399]
  • seyyedbarzegar.seyyed meysam Flashover Voltage Assessment of Polymeric Insulators with Different Profiles under Fan-Shaped and Longitudinal Non-Uniform Pollutions and Environment Humidity Effects [ Vol.18, Issue 3 , 1 - Autumn Year 1399]
  • Shahabi.Majid Distributed Control Scheme Based on Model Predictive Control for Supplying Power in an Isolated DC Microgrid [ Vol.18, Issue 4 , 1 - Winter Year 1399]
  • Shahbahrami.Asadollah Traffic Patterns Detection in Video Surveillance Using Optical Flow and Topic Model [ Vol.18, Issue 3 , 2 - Autumn Year 1399]
  • Shahgholian.G. Modeling of K-250 Compressor Using NARX and Hierarchical Fuzzy Model [ Vol.18, Issue 3 , 1 - Autumn Year 1399]
  • Sharifi.Arash Semi-Supervised Ensemble Using Confidence Based Selection Metric in Nnon-Stationary Data Streams [ Vol.18, Issue 3 , 2 - Autumn Year 1399]
  • Sharifi.Arash An Adaptive Multi-Objective Clustering Algorithm based on Auction_Prediction for Mobile Target Tracking in Wireless Sensor Network [ Vol.18, Issue 4 , 2 - Winter Year 1399]
  • Shayesteh.Ebrahim Outage Power Cost Calculation and Optimal Interruption Allocation to the Customers [ Vol.18, Issue 3 , 1 - Autumn Year 1399]
  • shetabi.mehran SAHAR: An Architecture to Strengthen the Control Plane of the Software-Defined Network Against Denial of Service Attacks [ Vol.18, Issue 4 , 2 - Winter Year 1399]
  • shirinkhah.hadise Improving Security of LSBM Steganography Using of Genetic Algorithm, Mmulti-Key and Blocking [ Vol.18, Issue 1 , 2 - Spring Year 1399]
  • Soleimani Neysiani.Behzad An Intelligent Novel Hybrid Live Video Streaming Method in Mesh-Based Peer-to-Peer Networks [ Vol.18, Issue 4 , 2 - Winter Year 1399]
  • Soleymani Baghshah.Mahdieh Text Generation by a GAN-based Ensemble Approach [ Vol.18, Issue 2 , 2 - Summer Year 1399]
  • Soltanpour.M. R. Sliding Mode Control Applied in Two-wheeled Self-Balancing Robot System in Presence of Structured and Un- Structured Uncertainties in Dynamical Equations and Without the Need for Kinematic Equations [ Vol.18, Issue 1 , 1 - Spring Year 1399]