 |
Hassan Nataj Solhdar, Mohammad
Improving search for deep reinforcement learning with ant colony optimization [Volume 7, Number 2] |
 |
sarkhosh, Afshin
Designing the command and control architecture )cyber in combat) of the Islamic Republic of Iran Army [Volume 7, Number 1] |
 |
Faezi, Hadi
Introducing A Modified Iterative Approach in Signal Source Localization Based on TDOA Measurements [Volume 7, Number 1] |
 |
Bahramgiri, Hossein
Introducing A Modified Iterative Approach in Signal Source Localization Based on TDOA Measurements [Volume 7, Number 1] |
 |
Madani, Mohammad Hossein
Introducing A Modified Iterative Approach in Signal Source Localization Based on TDOA Measurements [Volume 7, Number 1] |
 |
Bahrampour, Reza
Introducing A Modified Iterative Approach in Signal Source Localization Based on TDOA Measurements [Volume 7, Number 1] |
 |
ghayoori, majid
governance maturity model for a military organization [Volume 7, Number 1] |
 |
mardani, mohammad
governance maturity model for a military organization [Volume 7, Number 1] |
 |
Aghayi, mohsen
governance maturity model for a military organization [Volume 7, Number 1] |
 |
chamani, sasan
governance maturity model for a military organization [Volume 7, Number 1] |
 |
movahedi sefat, mohamad reza
Identifying and prioritizing smart police strategies [Volume 7, Number 1] |
 |
dolatkhah, ahmad
Identifying and prioritizing smart police strategies [Volume 7, Number 1] |
 |
Mohajer, Mohammad
Identify the components that affect the improvement of Operations Staff in The Air Defense Command and Control Network [Volume 7, Number 1] |
 |
Fereydooni, Farzad
Identify the components that affect the improvement of Operations Staff in The Air Defense Command and Control Network [Volume 7, Number 1] |
 |
Esmaili Saloomahale, Farzad
Identify the components that affect the improvement of Operations Staff in The Air Defense Command and Control Network [Volume 7, Number 1] |
 |
Jahanbaz, Ahmad
Identify the components that affect the improvement of Operations Staff in The Air Defense Command and Control Network [Volume 7, Number 1] |
 |
Mohtarami, Amir
A Conceptual architecture for integrated simulation engine in command and control [Volume 7, Number 1] |
 |
haji ali akbari, mohammad
Identifying the key factors of the command and control system in the conditions of uncertainty in complex environments in the face of upcoming scenarios [Volume 6, Number 4] |
 |
fathabadi, hossien
Provide a model for identifying attacks based on social engineering in military organizations [Volume 6, Number 4] |
 |
basiri, mahdi
Provide a model for identifying attacks based on social engineering in military organizations [Volume 6, Number 4] |
 |
Farzam nia, Nima
Designing a Foresight Framework for the Poractive Confrontation of the Islamic Republic of Iran Army with Cyber Threats [Volume 6, Number 4] |
 |
Ejabi, Ebrahim
Designing a Foresight Framework for the Poractive Confrontation of the Islamic Republic of Iran Army with Cyber Threats [Volume 6, Number 4] |
 |
koulivand, Khalil
Designing a Foresight Framework for the Poractive Confrontation of the Islamic Republic of Iran Army with Cyber Threats [Volume 6, Number 4] |
 |
shahmohamadi, gholamreza
Identifying vulnerabilities and simulating the security of information systems based on blockchain technology using system dynamics [Volume 6, Number 4] |
 |
mirabi, behnam
Identifying vulnerabilities and simulating the security of information systems based on blockchain technology using system dynamics [Volume 6, Number 4] |
 |
kharraty, saeed
Mid-Term and Short-Term Load Forecasting Using Rough Neural Networks and Grasshopper Mutation [Volume 4, Number 2] |
 |
karimi, shahram
Mid-Term and Short-Term Load Forecasting Using Rough Neural Networks and Grasshopper Mutation [Volume 4, Number 2] |
 |
abdi, hamdi
Mid-Term and Short-Term Load Forecasting Using Rough Neural Networks and Grasshopper Mutation [Volume 4, Number 2] |
 |
ferdosian, mohammad
Mid-Term and Short-Term Load Forecasting Using Rough Neural Networks and Grasshopper Mutation [Volume 4, Number 2] |
 |
Varamini, Gohar
Design and Fabrication of Modified Stomatal Antenna to Upgrade Radar Systems in Electronic Warfare Environment [Volume 6, Number 4] |
 |
norouzi, yaser
Modeling and Analysis of Command and Control Warfare Scenario Between Two Hostile Countries Based on Non Cooperative Game Theory [Volume 4, Number 4] |
 |
sheikhmohammady, majid
Modeling and Analysis of Command and Control Warfare Scenario Between Two Hostile Countries Based on Non Cooperative Game Theory [Volume 4, Number 4] |
 |
torbati fard, hamid
Modeling and Analysis of Command and Control Warfare Scenario Between Two Hostile Countries Based on Non Cooperative Game Theory [Volume 4, Number 4] |
 |
dadashtabar ahmadi, koroush
Incremental Focal ENsemble for multi-class Imbalalanced Learning (FENIL) [Volume 6, Number 2] |
 |
fakhredanesh, mohammad
Incremental Focal ENsemble for multi-class Imbalalanced Learning (FENIL) [Volume 6, Number 2] |
 |
shirazi, hosein
Incremental Focal ENsemble for multi-class Imbalalanced Learning (FENIL) [Volume 6, Number 2] |
 |
Mahmoodi, Nasibeh
Incremental Focal ENsemble for multi-class Imbalalanced Learning (FENIL) [Volume 6, Number 2] |
 |
elhami, alireza
Principles of air defense warfare in an uneven environment [Volume 6, Number 2] |
 |
Smaeili Saloomahalleh, Farzad
Principles of air defense warfare in an uneven environment [Volume 6, Number 2] |
 |
Taslimikar, Behrooz
Principles of air defense warfare in an uneven environment [Volume 6, Number 2] |
 |
mohhammad nejad, mahdi
Mixed approach of crisis management based on Quinn and Cameron organizational culture model [Volume 6, Number 3] |
 |
niknam, omid
Mixed approach of crisis management based on Quinn and Cameron organizational culture model [Volume 6, Number 3] |
 |
tayebi, ali
Mixed approach of crisis management based on Quinn and Cameron organizational culture model [Volume 6, Number 3] |
 |
Sahlani, Hossein
Examine the citation requirements of digital mobile forensics [Volume 6, Number 3] |
 |
feyzi, hadi
The strategic model of modern air defense with the ability to defend in an unequaled war environment [Volume 6, Number 3] |
 |
Jahanfar, Reza
The strategic model of modern air defense with the ability to defend in an unequaled war environment [Volume 6, Number 3] |
 |
shahbazi, yaser
The strategic model of modern air defense with the ability to defend in an unequaled war environment [Volume 6, Number 3] |
 |
Taslimikar, Behrooz
The strategic model of modern air defense with the ability to defend in an unequaled war environment [Volume 6, Number 3] |
 |
arefnezhad, mohsen
Explaining the human capital training model of command and control with a research-oriented approach case study; A military education and training center [Volume 6, Number 3] |
 |
Hakak, Mohammad
Explaining the human capital training model of command and control with a research-oriented approach case study; A military education and training center [Volume 6, Number 3] |
 |
vahdati, hojat
Explaining the human capital training model of command and control with a research-oriented approach case study; A military education and training center [Volume 6, Number 3] |
 |
koolivand, hasan
Explaining the human capital training model of command and control with a research-oriented approach case study; A military education and training center [Volume 6, Number 3] |
 |
Mosaddegh, Masoud
The effect of synoptic analysis of atmospheric hazards in command and control of Military units (Case study: Heavy rains in the southern half of Iran) [Volume 6, Number 2] |
 |
Mohammadi, Mohammad
The effect of synoptic analysis of atmospheric hazards in command and control of Military units (Case study: Heavy rains in the southern half of Iran) [Volume 6, Number 2] |
 |
bagheri, masood
strategy map for information technology in military organizations [Volume 6, Number 2] |
 |
chamani, sasan
strategy map for information technology in military organizations [Volume 6, Number 2] |
 |
Abbaszadeh, Mohammad Amin
Autonomous Navigation of Wheeled Robot using a Deep Reinforcement Learning Based Approach [Volume 6, Number 2] |
 |
Kiaei, Ali Akbar
Autonomous Navigation of Wheeled Robot using a Deep Reinforcement Learning Based Approach [Volume 6, Number 2] |
 |
Dadashtabar Ahmadi, Kourosh
Autonomous Navigation of Wheeled Robot using a Deep Reinforcement Learning Based Approach [Volume 6, Number 2] |
 |
Asadpour, masoud
Designing an early warning model in social media surveillance [Volume 6, Number 1] |
 |
jafarnejad, ahmad
Designing an early warning model in social media surveillance [Volume 6, Number 1] |
 |
ehrami, houman
Designing an early warning model in social media surveillance [Volume 6, Number 1] |
 |
Sepehrzadeh, Hamed
A Method for Reliability Evaluation of Cyber-Physical Systems [Volume 6, Number 1] |
 |
Yazdanian, Vahid
Presenting a proposed framework for continuous monitoring of the cumulative rate of electrical radiation intensity of transmission infrastructure and radio access in the development of the national information network. [Volume 6, Number 1] |
 |
Fasanghari, Mahdi
Presenting a proposed framework for continuous monitoring of the cumulative rate of electrical radiation intensity of transmission infrastructure and radio access in the development of the national information network. [Volume 6, Number 1] |
 |
bahri, reza
Presenting a proposed framework for continuous monitoring of the cumulative rate of electrical radiation intensity of transmission infrastructure and radio access in the development of the national information network. [Volume 6, Number 1] |
 |
taslimikar, Behrooz
Specifications of military command and control systems tailored to the characteristics of the future war environment [Volume 4, Number 4] |
 |
Mohtarami, Amir
Providing a Framework for Human Capital Empowerment in Cyber Defense [Volume 5, Number 4] |
 |
amindost, atefe
[Volume 5, Number 4] |
 |
mehrabian, saeid
[Volume 5, Number 4] |
 |
mokhatabrafiei, farimah
[Volume 5, Number 4] |
 |
heydari, poyan
[Volume 5, Number 4] |
 |
Mohseni, Hamid
Provide a modern architecture of extensive defense networks strong against attacks [Volume 5, Number 4] |
 |
Najafzadeh, Mehdi
Provide a modern architecture of extensive defense networks strong against attacks [Volume 5, Number 4] |
 |
Saedi, Bijan
Provide a modern architecture of extensive defense networks strong against attacks [Volume 5, Number 4] |
 |
emadi kouchak, mohammad mahdi
Provide a modern architecture of extensive defense networks strong against attacks [Volume 5, Number 4] |
 |
zoghi, Sajad
Identifying Barriers and Drivers of Virtual Reality Technology Adoption in order to create a Virtual Command and Control System: A Case Study of A Military Organization [Volume 5, Number 4] |
 |
Khanahmadloo, Reza
Identifying Barriers and Drivers of Virtual Reality Technology Adoption in order to create a Virtual Command and Control System: A Case Study of A Military Organization [Volume 5, Number 4] |
 |
yazdanian, vahid
Requirements and proposed framework for the use of new technologies in crisis control and management based on communication and information technology [Volume 5, Number 3] |
 |
fasanghari, mahdi
Requirements and proposed framework for the use of new technologies in crisis control and management based on communication and information technology [Volume 5, Number 3] |
 |
bahri, reza
Requirements and proposed framework for the use of new technologies in crisis control and management based on communication and information technology [Volume 5, Number 3] |
 |
Zakeri, Ramin
Development of an E-learning Maturity Model for Command and Control in a Military Organization [Volume 5, Number 3] |
 |
Khanahmadloo, Reza
Development of an E-learning Maturity Model for Command and Control in a Military Organization [Volume 5, Number 3] |
 |
Soltanian, Javad
Development of an E-learning Maturity Model for Command and Control in a Military Organization [Volume 5, Number 3] |
 |
Rahmani, Parisa
Access control in smart contracts using machine learning for IoT [Volume 5, Number 3] |
 |
Morshed Aski, Akbar
Access control in smart contracts using machine learning for IoT [Volume 5, Number 3] |
 |
Rezakhani, Afshin
Access control in smart contracts using machine learning for IoT [Volume 5, Number 3] |
 |
Rezakhani, Afshin
Access control in smart contracts using machine learning for IoT [Volume 5, Number 3] |
 |
Goli bidgoli, Salman
Investigating the impact of software-defined networking on quality of services in the network [Volume 5, Number 3] |
 |
Ebrahimpor komleh, Hosein
Investigating the impact of software-defined networking on quality of services in the network [Volume 5, Number 3] |
 |
Moslehi, Mohammadreza
Investigating the impact of software-defined networking on quality of services in the network [Volume 5, Number 3] |
 |
karimi, shahram
Forecasting the electricity market using neural network and gray wolf algorithm [Volume 3, Number 4] |
 |
kharati, saied
Forecasting the electricity market using neural network and gray wolf algorithm [Volume 3, Number 4] |
 |
abdi, hamid
Forecasting the electricity market using neural network and gray wolf algorithm [Volume 3, Number 4] |
 |
ferdosian, mohamad
Forecasting the electricity market using neural network and gray wolf algorithm [Volume 3, Number 4] |
 |
Hassan Nataj Solhdar, Mohammad
Using Of Neuro-Fuzzy Classifier for Intrusion Detection Systems [Volume 5, Number 2] |
 |
Farhangi, Aliakbar
Requirements for brand promotion of Iran in relations with Arab countries according to the media capacity of cyberspace [Volume 5, Number 2] |
 |
Mahaki, Aliasghar
Requirements for brand promotion of Iran in relations with Arab countries according to the media capacity of cyberspace [Volume 5, Number 2] |
 |
Valavi, Abolfazl
Requirements for brand promotion of Iran in relations with Arab countries according to the media capacity of cyberspace [Volume 5, Number 2] |
 |
Ghayoori Sales, Majid
A Model for Intrusion Detection in Internet of Things Using Partnership Game [Volume 5, Number 2] |
 |
Salimi, Ali
A Model for Intrusion Detection in Internet of Things Using Partnership Game [Volume 5, Number 2] |
 |
rahimi, mohsen
Improving command and control system against with future threats by applying quantum radars [Volume 5, Number 2] |
 |
alborznea, hamid reza
Improving command and control system against with future threats by applying quantum radars [Volume 5, Number 2] |
 |
Fathabadi, Hossein
Providing different scenarios for applying knowledge management in the risk management process of network-based organizations based on the system dynamics approach [Volume 5, Number 2] |
 |
khanahmadloo, reza
Providing different scenarios for applying knowledge management in the risk management process of network-based organizations based on the system dynamics approach [Volume 5, Number 2] |
 |
Basiri, Mehdi
Providing different scenarios for applying knowledge management in the risk management process of network-based organizations based on the system dynamics approach [Volume 5, Number 2] |
 |
Sahihi, Hadi
How to decide on logistics and support forces on the battlefield in one of the defense organizations [Volume 5, Number 2] |
 |
aghamohammadi, samad
How to decide on logistics and support forces on the battlefield in one of the defense organizations [Volume 5, Number 2] |
 |
Fath Abadi, hossein
How to decide on logistics and support forces on the battlefield in one of the defense organizations [Volume 5, Number 2] |
 |
ghayoori, majid
Optimizing the detection of SQL injection attacks using a combination of random forest and genetic algorithms [Volume 5, Number 1] |
 |
moradi, javad
Optimizing the detection of SQL injection attacks using a combination of random forest and genetic algorithms [Volume 5, Number 1] |
 |
alipourdarvish, zahra
Identify and rank cognitive errors related to the dimensions of strategic thinking [Volume 5, Number 1] |
 |
Yazdani, Hamid Reza
Identify and rank cognitive errors related to the dimensions of strategic thinking [Volume 5, Number 1] |
 |
dehban, behnam
Identify and rank cognitive errors related to the dimensions of strategic thinking [Volume 5, Number 1] |
 |
Sobhani, Sadollah
Hard and soft information fusion in cyber command and control [Volume 5, Number 1] |
 |
Jabar Rashidi, Ali
Hard and soft information fusion in cyber command and control [Volume 5, Number 1] |
 |
ghadimi, ghader
A Deep Learning-Based Approach for Low Probability of Intercept Radar Signal Detection and Classification [Volume 5, Number 1] |
 |
hl[nd, Mehdi
A Decentralised Cognitive Razmayeshgah-e Araye-i Platform for Air Defense [Volume 5, Number 1] |
 |
Fesharaki, Mahdi
A Decentralised Cognitive Razmayeshgah-e Araye-i Platform for Air Defense [Volume 5, Number 1] |
 |
Khaleghi, Armin
Designing a Decision Making Skills Development Model for Military Environments (Case of Khatam-al-anbia Air Defence Academy) [Volume 4, Number 3] |
 |
Fathabadi, Hossein
Designing a Decision Making Skills Development Model for Military Environments (Case of Khatam-al-anbia Air Defence Academy) [Volume 4, Number 3] |
 |
Basiri, hossein
Explain the role of IoT technology in enhancing the readiness and support capabilities of a defense organization [Volume 4, Number 4] |
 |
Rezaei, Hamidreza
Explain the role of IoT technology in enhancing the readiness and support capabilities of a defense organization [Volume 4, Number 4] |
 |
Habibi Reyhan Abadi, Hassanali
Explain the role of IoT technology in enhancing the readiness and support capabilities of a defense organization [Volume 4, Number 4] |
 |
Baqerimanesh, Mohamad
Explain the role of IoT technology in enhancing the readiness and support capabilities of a defense organization [Volume 4, Number 4] |
 |
Minaei, Behrouz
Cost-Sensitive Command and Control for Web Content Surveillance Using Autonomous Agents [Volume 4, Number 2] |
 |
Forghani, Ali
Cost-Sensitive Command and Control for Web Content Surveillance Using Autonomous Agents [Volume 4, Number 2] |
 |
Anvari, Reza
Cost-Sensitive Command and Control for Web Content Surveillance Using Autonomous Agents [Volume 4, Number 2] |
 |
Naghibi, Mahdi
Cost-Sensitive Command and Control for Web Content Surveillance Using Autonomous Agents [Volume 4, Number 2] |
 |
Bagheri, Mohammad
Prioritization of Cyberspace's Societal Security Threatening Factors: An Interpretive Structural Model [Volume 4, Number 2] |
 |
Fotouh abadi, Vahid
Prioritization of Cyberspace's Societal Security Threatening Factors: An Interpretive Structural Model [Volume 4, Number 2] |
 |
Saghafi, Fatemeh
Prioritization of Cyberspace's Societal Security Threatening Factors: An Interpretive Structural Model [Volume 4, Number 2] |
 |
Ramezani, Sajjad
Prioritization of Cyberspace's Societal Security Threatening Factors: An Interpretive Structural Model [Volume 4, Number 2] |
 |
Ghadiri, Saeed
Anchor Nodes Optimized Positioning for Nodes Self-Localization in Wireless Sensor Networks [Volume 4, Number 3] |
 |
Ramezanzadeh, Mojtaba
Anchor Nodes Optimized Positioning for Nodes Self-Localization in Wireless Sensor Networks [Volume 4, Number 3] |
 |
Movahhed Ghodsinya, Seyyed Reza
Review of Data Fusion Models and Architectures for Air Targets Threat Assessment in C4I System [Volume 4, Number 3] |
 |
Azimirad, Ehsan
Review of Data Fusion Models and Architectures for Air Targets Threat Assessment in C4I System [Volume 4, Number 3] |
 |
karami, fahimeh
Lessons learned in the performance of command and control of air defense in sacred defense [Volume 4, Number 2] |
 |
kharazian, peyman
Lessons learned in the performance of command and control of air defense in sacred defense [Volume 4, Number 2] |
 |
Moghadas, Masoud
Lessons learned in the performance of command and control of air defense in sacred defense [Volume 4, Number 2] |
 |
Jahanfar, Reza
Lessons learned in the performance of command and control of air defense in sacred defense [Volume 4, Number 2] |
 |
bakhtiari, iraj
The command and control environmental analyizies in the area of aerospace defence, from opportunities and challenges perspective [Volume 4, Number 2] |
 |
Morovati Sharifabadi, Ali
Application of a Comprehensive Model of Organizational Capabilities in the OODA Cycle [Volume 3, Number 2] |
 |
Mirghafoori, Seyed Habibollah
Application of a Comprehensive Model of Organizational Capabilities in the OODA Cycle [Volume 3, Number 2] |
 |
Zanjirchi, Seyed Mahmud
Application of a Comprehensive Model of Organizational Capabilities in the OODA Cycle [Volume 3, Number 2] |
 |
mohammadi, hamidreza
Application of a Comprehensive Model of Organizational Capabilities in the OODA Cycle [Volume 3, Number 2] |
 |
Taghva, Moahmmadreza
Proposing a four-dimensional portfolio model for service supply management in telecom industry in order to utilize ICT in command control systems [Volume 4, Number 1] |
 |
Amiri, Maghsoud
Proposing a four-dimensional portfolio model for service supply management in telecom industry in order to utilize ICT in command control systems [Volume 4, Number 1] |
 |
Sadighi, Fahimeh
Proposing a four-dimensional portfolio model for service supply management in telecom industry in order to utilize ICT in command control systems [Volume 4, Number 1] |
 |
Bamdadsoofi, Jahanyar
Proposing a four-dimensional portfolio model for service supply management in telecom industry in order to utilize ICT in command control systems [Volume 4, Number 1] |
 |
heydari, Mahsa
Design and Simulation of a Closed-Loop controller for Switching Transmitter of Local Positioning System [Volume 4, Number 1] |
 |
khorrami, abazar
Design and Simulation of a Closed-Loop controller for Switching Transmitter of Local Positioning System [Volume 4, Number 1] |
 |
afifi, ahmad
Design and Simulation of a Closed-Loop controller for Switching Transmitter of Local Positioning System [Volume 4, Number 1] |
 |
Fathabadi, Hosein
The Impact of Systemic Thinking on Improving Organizational Performance in Military Units [Volume 4, Number 1] |
 |
farhadi, ali
The Impact of Systemic Thinking on Improving Organizational Performance in Military Units [Volume 4, Number 1] |
 |
feiz, daood
Consideration the Relation Between the Various Approaches to Utilization of Human Resources and Innovation Parameters in Defense Organization [Volume 4, Number 1] |
 |
rastgar, abasali
Consideration the Relation Between the Various Approaches to Utilization of Human Resources and Innovation Parameters in Defense Organization [Volume 4, Number 1] |
 |
hedayatifar, saba
Consideration the Relation Between the Various Approaches to Utilization of Human Resources and Innovation Parameters in Defense Organization [Volume 4, Number 1] |
 |
amiri, hassan
Consideration the Relation Between the Various Approaches to Utilization of Human Resources and Innovation Parameters in Defense Organization [Volume 4, Number 1] |
 |
Hashemi Golpaygani, S.Alireza
A New Preprocessing Method for Rumor Detection in Social Networks based on LSTM-CNN [Volume 4, Number 1] |
 |
Dadahstabar, Kourosh
A New Preprocessing Method for Rumor Detection in Social Networks based on LSTM-CNN [Volume 4, Number 1] |
 |
Shirazi, Hossein
A New Preprocessing Method for Rumor Detection in Social Networks based on LSTM-CNN [Volume 4, Number 1] |
 |
Khosravi, maryam
A New Preprocessing Method for Rumor Detection in Social Networks based on LSTM-CNN [Volume 4, Number 1] |
 |
ghaffari, behzad
Explain the role of command and control in overcoming and superiority the combat power of air defense [Volume 3, Number 4] |
 |
aliannejadi, mohammadreza
explanation of the concept of strategic learning in Khatam-all-Anbiya air defense Headquarters [Volume 3, Number 4] |
 |
Sabahno, Mahdieh
Improving the accuracy of Website Phishing Detection through Spotted Hyena Optimization Algorithm and Artificial Neural Network [Volume 3, Number 4] |
 |
Safara, Fatemeh
Improving the accuracy of Website Phishing Detection through Spotted Hyena Optimization Algorithm and Artificial Neural Network [Volume 3, Number 4] |
 |
mohseny, hamid
Introducing the new architecture of crisis command and control network architecture inspired by the complex real brain network [Volume 3, Number 4] |
 |
emadi, mohammad mahdi
Introducing the new architecture of crisis command and control network architecture inspired by the complex real brain network [Volume 3, Number 4] |
 |
yavari, alireza
Stage-centered Pattern of War Game in Command and Control [Volume 3, Number 4] |
 |
eshraghi, mehrdad
Stage-centered Pattern of War Game in Command and Control [Volume 3, Number 4] |
 |
Khosravi, Mohammadreza
A New Damage Accumulation Model for Gun and Target Engagements [Volume 3, Number 3] |
 |
Ahmadi, Kambiz
A New Damage Accumulation Model for Gun and Target Engagements [Volume 3, Number 3] |
 |
Saghafi, Fatemeh
Explanation the formation of Sectoral Innovation System, Case: General Aviation industry of I.R. of Iran [Volume 3, Number 3] |
 |
balochian, saeed
[Volume 3, Number 3] |
 |
pariz, naser
[Volume 3, Number 3] |
 |
fazel, sadegh
[Volume 3, Number 3] |
 |
Alinaghizadeh Ardestani, Mahdi
[Volume 3, Number 3] |
 |
Rajabi, Zeinab
[Volume 3, Number 3] |
 |
rasouli kenari, abdolreza
Traffic violation detection using Map/Reduce [Volume 3, Number 2] |
 |
shamsi, mahboubeh
Traffic violation detection using Map/Reduce [Volume 3, Number 2] |
 |
Asadianfam, Shiva
Traffic violation detection using Map/Reduce [Volume 3, Number 2] |
 |
ebrahimi, abas
Strategic foresight For Alignment Gradation of Human Resource Processes With Defense Organization Objects [Volume 3, Number 2] |
 |
damghanian, hosain
Strategic foresight For Alignment Gradation of Human Resource Processes With Defense Organization Objects [Volume 3, Number 2] |
 |
amiri, hassan
Strategic foresight For Alignment Gradation of Human Resource Processes With Defense Organization Objects [Volume 3, Number 2] |
 |
Mozayani, Nasser
The Scalable Architecture of Military Internet of Things for Real-Time Battlefield Management Using Edge Computing. [Volume 3, Number 2] |
 |
Fathy, Mahmood
The Scalable Architecture of Military Internet of Things for Real-Time Battlefield Management Using Edge Computing. [Volume 3, Number 2] |
 |
Malekian Borujeni, Ahmad
The Scalable Architecture of Military Internet of Things for Real-Time Battlefield Management Using Edge Computing. [Volume 3, Number 2] |
 |
Mousavi shoushtari, Seyed Mohammad tghi
Threat assessment of air targets, using probabilistic Rule based model [Volume 3, Number 2] |
 |
Seyedin, seyed Alireza
Threat assessment of air targets, using probabilistic Rule based model [Volume 3, Number 2] |
 |
Moarefianpour, Ali
Simultaneous Fusion, Classification, and Traction of Moving Obstacles by Multiple Sensors Using Bayesian Algorithm Based on Fuzzy Dempster-Shafer Theory [Volume 3, Number 1] |
 |
Afshar, Ahmad
Simultaneous Fusion, Classification, and Traction of Moving Obstacles by Multiple Sensors Using Bayesian Algorithm Based on Fuzzy Dempster-Shafer Theory [Volume 3, Number 1] |
 |
Dowlatabadi, Masrour
Simultaneous Fusion, Classification, and Traction of Moving Obstacles by Multiple Sensors Using Bayesian Algorithm Based on Fuzzy Dempster-Shafer Theory [Volume 3, Number 1] |
 |
GHAFARI, BEHZAD
An analysis of CNS-ATM and its implications for the spatial and geographic location of the Islamic Republic of Iran [Volume 3, Number 1] |
 |
rahimi, mohsen
An analysis of CNS-ATM and its implications for the spatial and geographic location of the Islamic Republic of Iran [Volume 3, Number 1] |
 |
Heydarnejad, Alireza
Strategy of Knowledge Management in Establishment of Disciplinary Command and Control System [Volume 3, Number 1] |
 |
Yavari, Alireza
Strategy of Knowledge Management in Establishment of Disciplinary Command and Control System [Volume 3, Number 1] |
 |
Abbasi Arand, Bijan
Providing an Autonomous Management Framework for Command and Control Networks Using MAPE-K Adaptive Control Loop [Volume 3, Number 1] |
 |
Javidan, Reza
Providing an Autonomous Management Framework for Command and Control Networks Using MAPE-K Adaptive Control Loop [Volume 3, Number 1] |
 |
Sepahvand, Reza
Providing an Autonomous Management Framework for Command and Control Networks Using MAPE-K Adaptive Control Loop [Volume 3, Number 1] |
 |
Parsaei, Mohammad Reza
Providing an Autonomous Management Framework for Command and Control Networks Using MAPE-K Adaptive Control Loop [Volume 3, Number 1] |
 |
Karimpor, Ali
Threat concept development based on tolerability and a decision support system for threat evaluation using logical statements and discrete-Value evidences [Volume 3, Number 1] |
 |
Pariz, naser
Threat concept development based on tolerability and a decision support system for threat evaluation using logical statements and discrete-Value evidences [Volume 3, Number 1] |
 |
kamelian, Saeed
Threat concept development based on tolerability and a decision support system for threat evaluation using logical statements and discrete-Value evidences [Volume 3, Number 1] |
 |
Mardani Shahrbabak, Mohammad
Introducing a New Framework for the Pathology of the Command and Control System [Volume 2, Number 4] |
 |
bamdad Sufi, jahanyar
Presenting a Model for Enhancing the Position of IRAN Maritime Supply Chain with Focus on Sustainable Development Basics by Using Structural Equation Modeling. [Volume 2, Number 4] |
 |
feizi, kamran
Presenting a Model for Enhancing the Position of IRAN Maritime Supply Chain with Focus on Sustainable Development Basics by Using Structural Equation Modeling. [Volume 2, Number 4] |
 |
khatami firoozabadi, seyed mohammad ali
Presenting a Model for Enhancing the Position of IRAN Maritime Supply Chain with Focus on Sustainable Development Basics by Using Structural Equation Modeling. [Volume 2, Number 4] |
 |
tangestani, alireza
Presenting a Model for Enhancing the Position of IRAN Maritime Supply Chain with Focus on Sustainable Development Basics by Using Structural Equation Modeling. [Volume 2, Number 4] |
 |
Moradian, Mohsen
A Relief Location and Allocation bi-objective Problem after Floods [Volume 2, Number 4] |
 |
Amiri, Maghsoud
A Relief Location and Allocation bi-objective Problem after Floods [Volume 2, Number 4] |
 |
Khatami Firouzabadi, Seyes Mohammad ali
A Relief Location and Allocation bi-objective Problem after Floods [Volume 2, Number 4] |
 |
Soleimani, Gholamhossein
A Relief Location and Allocation bi-objective Problem after Floods [Volume 2, Number 4] |
 |
koosha, hassan
Command and Control Indexing with Knowledge Based Defense Approach [Volume 2, Number 4] |
 |
jafarizadeh, omid
Command and Control Indexing with Knowledge Based Defense Approach [Volume 2, Number 4] |
 |
bagheri, masoud
A game theory-based model for strategic decision-making in cyber warfare [Volume 2, Number 4] |
 |
akramizadeh, ali
A game theory-based model for strategic decision-making in cyber warfare [Volume 2, Number 4] |
 |
forooghy, mahmood
A game theory-based model for strategic decision-making in cyber warfare [Volume 2, Number 4] |
 |
Alizadeh, Hava
[Volume 1, Number 1] |
 |
vahdati, hamid
Introducing a new model of information fusion for optimized allocation of electronic warfare resources at sensor level [Volume 2, Number 1] |
 |
dehghani, hamid
Introducing a new model of information fusion for optimized allocation of electronic warfare resources at sensor level [Volume 2, Number 1] |
 |
sabetian, mohammad
Introducing a new model of information fusion for optimized allocation of electronic warfare resources at sensor level [Volume 2, Number 1] |
 |
Izadipour, Ahmad
Importance of Game Theory in Modelling and Solution of Network Centric Weapon Target Assignment with consideration to Target Intelligence [Volume 2, Number 1] |
 |
Balochian, Saeed
Importance of Game Theory in Modelling and Solution of Network Centric Weapon Target Assignment with consideration to Target Intelligence [Volume 2, Number 1] |
 |
Farajian Shooshtari, Davood
Theory of Defense Arayeh and Socialized Innovation vs. Network Centric Innovation, An Air Defense Case Study [Volume 2, Number 1] |
 |
Fetanat, AbdolHamid
Theory of Defense Arayeh and Socialized Innovation vs. Network Centric Innovation, An Air Defense Case Study [Volume 2, Number 1] |
 |
N. Fesharaki, Mehdi
Theory of Defense Arayeh and Socialized Innovation vs. Network Centric Innovation, An Air Defense Case Study [Volume 2, Number 1] |
 |
Norouzi, Alireza
Scrutinizing and evaluating intrusion detection approaches based on the artificial immune system [Volume 2, Number 1] |
 |
Farzadnia, Ehsan
Scrutinizing and evaluating intrusion detection approaches based on the artificial immune system [Volume 2, Number 1] |
 |
Shirazi, Hossein
Scrutinizing and evaluating intrusion detection approaches based on the artificial immune system [Volume 2, Number 1] |
 |
Khalili, Abdollah
Automatic Fuzzy Clustering Using Multiobjective Grey Wolf Optimization Algorithm [Volume 2, Number 1] |
 |
Imamdoost, Ali Asghar
Automatic Fuzzy Clustering Using Multiobjective Grey Wolf Optimization Algorithm [Volume 2, Number 1] |
 |
chamani, Moslem
Survivability analysis of the air defense command and control network and the appropriate solution for promoting survivability [Volume 2, Number 2] |
 |
bakhtiari, Ierag
Survivability analysis of the air defense command and control network and the appropriate solution for promoting survivability [Volume 2, Number 2] |
 |
mohammadi, Ardeshir
Survivability analysis of the air defense command and control network and the appropriate solution for promoting survivability [Volume 2, Number 2] |
 |
valavi, Mohamadreza
Assessment of Upper Ontologies and provide adequate upper ontology reqirements for military, sequrity and crisis management applications [Volume 2, Number 2] |
 |
Servati, Leila
Assessment of Upper Ontologies and provide adequate upper ontology reqirements for military, sequrity and crisis management applications [Volume 2, Number 2] |
 |
fathabadi, hosein
Identification and Analysis of Factors Affecting the Functional Integrated Command and Control Network (C4ISR) [Volume 2, Number 2] |
 |
askari, ahmad
Identification and Analysis of Factors Affecting the Functional Integrated Command and Control Network (C4ISR) [Volume 2, Number 2] |
 |
Shirazi, Hossein
Development of Farsi WordNet by Semi-automatic Methods and Linked Data Format [Volume 2, Number 3] |
 |
Abbdollahzade, Ahmad
Development of Farsi WordNet by Semi-automatic Methods and Linked Data Format [Volume 2, Number 3] |
 |
Moteshakker Arani, Zohre
Development of Farsi WordNet by Semi-automatic Methods and Linked Data Format [Volume 2, Number 3] |
 |
SEPANLOO, HADI
Description and Explication of the Electronic Banking Policy-Making in Iran Using Grounded Theory [Volume 2, Number 3] |
 |
Yaghoubi, Saeed
Description and Explication of the Electronic Banking Policy-Making in Iran Using Grounded Theory [Volume 2, Number 3] |
 |
Divandari, Ali
Description and Explication of the Electronic Banking Policy-Making in Iran Using Grounded Theory [Volume 2, Number 3] |
 |
Monavarian, Abbas
Description and Explication of the Electronic Banking Policy-Making in Iran Using Grounded Theory [Volume 2, Number 3] |
 |
hamzeh, farhad
Passive Defense Indexation from Infrastructure Perspective in Urban Space [Volume 2, Number 3] |
 |
jafarizadeh, omid
Passive Defense Indexation from Infrastructure Perspective in Urban Space [Volume 2, Number 3] |