[Home ] [Archive]   [ فارسی ]  
:: Main :: Archive :: About :: Search :: Submit :: Contact ::
Main Menu
Home::
Journal Information::
Articles archive::
For Authors::
For Reviewers::
Registration::
Contact us::
Site Facilities::
::
Search in website

Advanced Search
..
Receive site information
Enter your Email in the following box to receive the site news and information.
..

Authors Index

All issues
:: Hassan Nataj Solhdar, Mohammad Improving search for deep reinforcement learning with ant colony optimization [Volume 7, Number 2]
:: sarkhosh, Afshin Designing the command and control architecture )cyber in combat) of the Islamic Republic of Iran Army [Volume 7, Number 1]
:: Faezi, Hadi Introducing A Modified Iterative Approach in Signal Source Localization Based on TDOA Measurements [Volume 7, Number 1]
:: Bahramgiri, Hossein Introducing A Modified Iterative Approach in Signal Source Localization Based on TDOA Measurements [Volume 7, Number 1]
:: Madani, Mohammad Hossein Introducing A Modified Iterative Approach in Signal Source Localization Based on TDOA Measurements [Volume 7, Number 1]
:: Bahrampour, Reza Introducing A Modified Iterative Approach in Signal Source Localization Based on TDOA Measurements [Volume 7, Number 1]
:: ghayoori, majid governance maturity model for a military organization [Volume 7, Number 1]
:: mardani, mohammad governance maturity model for a military organization [Volume 7, Number 1]
:: Aghayi, mohsen governance maturity model for a military organization [Volume 7, Number 1]
:: chamani, sasan governance maturity model for a military organization [Volume 7, Number 1]
:: movahedi sefat, mohamad reza Identifying and prioritizing smart police strategies [Volume 7, Number 1]
:: dolatkhah, ahmad Identifying and prioritizing smart police strategies [Volume 7, Number 1]
:: Mohajer, Mohammad Identify the components that affect the improvement of Operations Staff in The Air Defense Command and Control Network [Volume 7, Number 1]
:: Fereydooni, Farzad Identify the components that affect the improvement of Operations Staff in The Air Defense Command and Control Network [Volume 7, Number 1]
:: Esmaili Saloomahale, Farzad Identify the components that affect the improvement of Operations Staff in The Air Defense Command and Control Network [Volume 7, Number 1]
:: Jahanbaz, Ahmad Identify the components that affect the improvement of Operations Staff in The Air Defense Command and Control Network [Volume 7, Number 1]
:: Mohtarami, Amir A Conceptual architecture for integrated simulation engine in command and control [Volume 7, Number 1]
:: haji ali akbari, mohammad Identifying the key factors of the command and control system in the conditions of uncertainty in complex environments in the face of upcoming scenarios [Volume 6, Number 4]
:: fathabadi, hossien Provide a model for identifying attacks based on social engineering in military organizations [Volume 6, Number 4]
:: basiri, mahdi Provide a model for identifying attacks based on social engineering in military organizations [Volume 6, Number 4]
:: Farzam nia, Nima Designing a Foresight Framework for the Poractive Confrontation of the Islamic Republic of Iran Army with Cyber Threats [Volume 6, Number 4]
:: Ejabi, Ebrahim Designing a Foresight Framework for the Poractive Confrontation of the Islamic Republic of Iran Army with Cyber Threats [Volume 6, Number 4]
:: koulivand, Khalil Designing a Foresight Framework for the Poractive Confrontation of the Islamic Republic of Iran Army with Cyber Threats [Volume 6, Number 4]
:: shahmohamadi, gholamreza Identifying vulnerabilities and simulating the security of information systems based on blockchain technology using system dynamics [Volume 6, Number 4]
:: mirabi, behnam Identifying vulnerabilities and simulating the security of information systems based on blockchain technology using system dynamics [Volume 6, Number 4]
:: kharraty, saeed Mid-Term and Short-Term Load Forecasting Using Rough Neural Networks and Grasshopper Mutation [Volume 4, Number 2]
:: karimi, shahram Mid-Term and Short-Term Load Forecasting Using Rough Neural Networks and Grasshopper Mutation [Volume 4, Number 2]
:: abdi, hamdi Mid-Term and Short-Term Load Forecasting Using Rough Neural Networks and Grasshopper Mutation [Volume 4, Number 2]
:: ferdosian, mohammad Mid-Term and Short-Term Load Forecasting Using Rough Neural Networks and Grasshopper Mutation [Volume 4, Number 2]
:: Varamini, Gohar Design and Fabrication of Modified Stomatal Antenna to Upgrade Radar Systems in Electronic Warfare Environment [Volume 6, Number 4]
:: norouzi, yaser Modeling and Analysis of Command and Control Warfare Scenario Between Two Hostile Countries Based on Non Cooperative Game Theory [Volume 4, Number 4]
:: sheikhmohammady, majid Modeling and Analysis of Command and Control Warfare Scenario Between Two Hostile Countries Based on Non Cooperative Game Theory [Volume 4, Number 4]
:: torbati fard, hamid Modeling and Analysis of Command and Control Warfare Scenario Between Two Hostile Countries Based on Non Cooperative Game Theory [Volume 4, Number 4]
:: dadashtabar ahmadi, koroush Incremental Focal ENsemble for multi-class Imbalalanced Learning (FENIL) [Volume 6, Number 2]
:: fakhredanesh, mohammad Incremental Focal ENsemble for multi-class Imbalalanced Learning (FENIL) [Volume 6, Number 2]
:: shirazi, hosein Incremental Focal ENsemble for multi-class Imbalalanced Learning (FENIL) [Volume 6, Number 2]
:: Mahmoodi, Nasibeh Incremental Focal ENsemble for multi-class Imbalalanced Learning (FENIL) [Volume 6, Number 2]
:: elhami, alireza Principles of air defense warfare in an uneven environment [Volume 6, Number 2]
:: Smaeili Saloomahalleh, Farzad Principles of air defense warfare in an uneven environment [Volume 6, Number 2]
:: Taslimikar, Behrooz Principles of air defense warfare in an uneven environment [Volume 6, Number 2]
:: mohhammad nejad, mahdi Mixed approach of crisis management based on Quinn and Cameron organizational culture model [Volume 6, Number 3]
:: niknam, omid Mixed approach of crisis management based on Quinn and Cameron organizational culture model [Volume 6, Number 3]
:: tayebi, ali Mixed approach of crisis management based on Quinn and Cameron organizational culture model [Volume 6, Number 3]
:: Sahlani, Hossein Examine the citation requirements of digital mobile forensics [Volume 6, Number 3]
:: feyzi, hadi The strategic model of modern air defense with the ability to defend in an unequaled war environment [Volume 6, Number 3]
:: Jahanfar, Reza The strategic model of modern air defense with the ability to defend in an unequaled war environment [Volume 6, Number 3]
:: shahbazi, yaser The strategic model of modern air defense with the ability to defend in an unequaled war environment [Volume 6, Number 3]
:: Taslimikar, Behrooz The strategic model of modern air defense with the ability to defend in an unequaled war environment [Volume 6, Number 3]
:: arefnezhad, mohsen Explaining the human capital training model of command and control with a research-oriented approach case study; A military education and training center [Volume 6, Number 3]
:: Hakak, Mohammad Explaining the human capital training model of command and control with a research-oriented approach case study; A military education and training center [Volume 6, Number 3]
:: vahdati, hojat Explaining the human capital training model of command and control with a research-oriented approach case study; A military education and training center [Volume 6, Number 3]
:: koolivand, hasan Explaining the human capital training model of command and control with a research-oriented approach case study; A military education and training center [Volume 6, Number 3]
:: Mosaddegh, Masoud The effect of synoptic analysis of atmospheric hazards in command and control of Military units (Case study: Heavy rains in the southern half of Iran) [Volume 6, Number 2]
:: Mohammadi, Mohammad The effect of synoptic analysis of atmospheric hazards in command and control of Military units (Case study: Heavy rains in the southern half of Iran) [Volume 6, Number 2]
:: bagheri, masood strategy map for information technology in military organizations [Volume 6, Number 2]
:: chamani, sasan strategy map for information technology in military organizations [Volume 6, Number 2]
:: Abbaszadeh, Mohammad Amin Autonomous Navigation of Wheeled Robot using a Deep Reinforcement Learning Based Approach [Volume 6, Number 2]
:: Kiaei, Ali Akbar Autonomous Navigation of Wheeled Robot using a Deep Reinforcement Learning Based Approach [Volume 6, Number 2]
:: Dadashtabar Ahmadi, Kourosh Autonomous Navigation of Wheeled Robot using a Deep Reinforcement Learning Based Approach [Volume 6, Number 2]
:: Asadpour, masoud Designing an early warning model in social media surveillance [Volume 6, Number 1]
:: jafarnejad, ahmad Designing an early warning model in social media surveillance [Volume 6, Number 1]
:: ehrami, houman Designing an early warning model in social media surveillance [Volume 6, Number 1]
:: Sepehrzadeh, Hamed A Method for Reliability Evaluation of Cyber-Physical Systems [Volume 6, Number 1]
:: Yazdanian, Vahid Presenting a proposed framework for continuous monitoring of the cumulative rate of electrical radiation intensity of transmission infrastructure and radio access in the development of the national information network. [Volume 6, Number 1]
:: Fasanghari, Mahdi Presenting a proposed framework for continuous monitoring of the cumulative rate of electrical radiation intensity of transmission infrastructure and radio access in the development of the national information network. [Volume 6, Number 1]
:: bahri, reza Presenting a proposed framework for continuous monitoring of the cumulative rate of electrical radiation intensity of transmission infrastructure and radio access in the development of the national information network. [Volume 6, Number 1]
:: taslimikar, Behrooz Specifications of military command and control systems tailored to the characteristics of the future war environment [Volume 4, Number 4]
:: Mohtarami, Amir Providing a Framework for Human Capital Empowerment in Cyber Defense [Volume 5, Number 4]
:: amindost, atefe [Volume 5, Number 4]
:: mehrabian, saeid [Volume 5, Number 4]
:: mokhatabrafiei, farimah [Volume 5, Number 4]
:: heydari, poyan [Volume 5, Number 4]
:: Mohseni, Hamid Provide a modern architecture of extensive defense networks strong against attacks [Volume 5, Number 4]
:: Najafzadeh, Mehdi Provide a modern architecture of extensive defense networks strong against attacks [Volume 5, Number 4]
:: Saedi, Bijan Provide a modern architecture of extensive defense networks strong against attacks [Volume 5, Number 4]
:: emadi kouchak, mohammad mahdi Provide a modern architecture of extensive defense networks strong against attacks [Volume 5, Number 4]
:: zoghi, Sajad Identifying Barriers and Drivers of Virtual Reality Technology Adoption in order to create a Virtual Command and Control System: A Case Study of A Military Organization [Volume 5, Number 4]
:: Khanahmadloo, Reza Identifying Barriers and Drivers of Virtual Reality Technology Adoption in order to create a Virtual Command and Control System: A Case Study of A Military Organization [Volume 5, Number 4]
:: yazdanian, vahid Requirements and proposed framework for the use of new technologies in crisis control and management based on communication and information technology [Volume 5, Number 3]
:: fasanghari, mahdi Requirements and proposed framework for the use of new technologies in crisis control and management based on communication and information technology [Volume 5, Number 3]
:: bahri, reza Requirements and proposed framework for the use of new technologies in crisis control and management based on communication and information technology [Volume 5, Number 3]
:: Zakeri, Ramin Development of an E-learning Maturity Model for Command and Control in a Military Organization [Volume 5, Number 3]
:: Khanahmadloo, Reza Development of an E-learning Maturity Model for Command and Control in a Military Organization [Volume 5, Number 3]
:: Soltanian, Javad Development of an E-learning Maturity Model for Command and Control in a Military Organization [Volume 5, Number 3]
:: Rahmani, Parisa Access control in smart contracts using machine learning for IoT [Volume 5, Number 3]
:: Morshed Aski, Akbar Access control in smart contracts using machine learning for IoT [Volume 5, Number 3]
:: Rezakhani, Afshin Access control in smart contracts using machine learning for IoT [Volume 5, Number 3]
:: Rezakhani, Afshin Access control in smart contracts using machine learning for IoT [Volume 5, Number 3]
:: Goli bidgoli, Salman Investigating the impact of software-defined networking on quality of services in the network [Volume 5, Number 3]
:: Ebrahimpor komleh, Hosein Investigating the impact of software-defined networking on quality of services in the network [Volume 5, Number 3]
:: Moslehi, Mohammadreza Investigating the impact of software-defined networking on quality of services in the network [Volume 5, Number 3]
:: karimi, shahram Forecasting the electricity market using neural network and gray wolf algorithm [Volume 3, Number 4]
:: kharati, saied Forecasting the electricity market using neural network and gray wolf algorithm [Volume 3, Number 4]
:: abdi, hamid Forecasting the electricity market using neural network and gray wolf algorithm [Volume 3, Number 4]
:: ferdosian, mohamad Forecasting the electricity market using neural network and gray wolf algorithm [Volume 3, Number 4]
:: Hassan Nataj Solhdar, Mohammad Using Of Neuro-Fuzzy Classifier for Intrusion Detection Systems [Volume 5, Number 2]
:: Farhangi, Aliakbar Requirements for brand promotion of Iran in relations with Arab countries according to the media capacity of cyberspace [Volume 5, Number 2]
:: Mahaki, Aliasghar Requirements for brand promotion of Iran in relations with Arab countries according to the media capacity of cyberspace [Volume 5, Number 2]
:: Valavi, Abolfazl Requirements for brand promotion of Iran in relations with Arab countries according to the media capacity of cyberspace [Volume 5, Number 2]
:: Ghayoori Sales, Majid A Model for Intrusion Detection in Internet of Things Using Partnership Game [Volume 5, Number 2]
:: Salimi, Ali A Model for Intrusion Detection in Internet of Things Using Partnership Game [Volume 5, Number 2]
:: rahimi, mohsen Improving command and control system against with future threats by applying quantum radars [Volume 5, Number 2]
:: alborznea, hamid reza Improving command and control system against with future threats by applying quantum radars [Volume 5, Number 2]
:: Fathabadi, Hossein Providing different scenarios for applying knowledge management in the risk management process of network-based organizations based on the system dynamics approach [Volume 5, Number 2]
:: khanahmadloo, reza Providing different scenarios for applying knowledge management in the risk management process of network-based organizations based on the system dynamics approach [Volume 5, Number 2]
:: Basiri, Mehdi Providing different scenarios for applying knowledge management in the risk management process of network-based organizations based on the system dynamics approach [Volume 5, Number 2]
:: Sahihi, Hadi How to decide on logistics and support forces on the battlefield in one of the defense organizations [Volume 5, Number 2]
:: aghamohammadi, samad How to decide on logistics and support forces on the battlefield in one of the defense organizations [Volume 5, Number 2]
:: Fath Abadi, hossein How to decide on logistics and support forces on the battlefield in one of the defense organizations [Volume 5, Number 2]
:: ghayoori, majid Optimizing the detection of SQL injection attacks using a combination of random forest and genetic algorithms [Volume 5, Number 1]
:: moradi, javad Optimizing the detection of SQL injection attacks using a combination of random forest and genetic algorithms [Volume 5, Number 1]
:: alipourdarvish, zahra Identify and rank cognitive errors related to the dimensions of strategic thinking [Volume 5, Number 1]
:: Yazdani, Hamid Reza Identify and rank cognitive errors related to the dimensions of strategic thinking [Volume 5, Number 1]
:: dehban, behnam Identify and rank cognitive errors related to the dimensions of strategic thinking [Volume 5, Number 1]
:: Sobhani, Sadollah Hard and soft information fusion in cyber command and control [Volume 5, Number 1]
:: Jabar Rashidi, Ali Hard and soft information fusion in cyber command and control [Volume 5, Number 1]
:: ghadimi, ghader A Deep Learning-Based Approach for Low Probability of Intercept Radar Signal Detection and Classification [Volume 5, Number 1]
:: hl[nd, Mehdi A Decentralised Cognitive Razmayeshgah-e Araye-i Platform for Air Defense [Volume 5, Number 1]
:: Fesharaki, Mahdi A Decentralised Cognitive Razmayeshgah-e Araye-i Platform for Air Defense [Volume 5, Number 1]
:: Khaleghi, Armin Designing a Decision Making Skills Development Model for Military Environments (Case of Khatam-al-anbia Air Defence Academy) [Volume 4, Number 3]
:: Fathabadi, Hossein Designing a Decision Making Skills Development Model for Military Environments (Case of Khatam-al-anbia Air Defence Academy) [Volume 4, Number 3]
:: Basiri, hossein Explain the role of IoT technology in enhancing the readiness and support capabilities of a defense organization [Volume 4, Number 4]
:: Rezaei, Hamidreza Explain the role of IoT technology in enhancing the readiness and support capabilities of a defense organization [Volume 4, Number 4]
:: Habibi Reyhan Abadi, Hassanali Explain the role of IoT technology in enhancing the readiness and support capabilities of a defense organization [Volume 4, Number 4]
:: Baqerimanesh, Mohamad Explain the role of IoT technology in enhancing the readiness and support capabilities of a defense organization [Volume 4, Number 4]
:: Minaei, Behrouz Cost-Sensitive Command and Control for Web Content Surveillance Using Autonomous Agents [Volume 4, Number 2]
:: Forghani, Ali Cost-Sensitive Command and Control for Web Content Surveillance Using Autonomous Agents [Volume 4, Number 2]
:: Anvari, Reza Cost-Sensitive Command and Control for Web Content Surveillance Using Autonomous Agents [Volume 4, Number 2]
:: Naghibi, Mahdi Cost-Sensitive Command and Control for Web Content Surveillance Using Autonomous Agents [Volume 4, Number 2]
:: Bagheri, Mohammad Prioritization of Cyberspace's Societal Security Threatening Factors: An Interpretive Structural Model [Volume 4, Number 2]
:: Fotouh abadi, Vahid Prioritization of Cyberspace's Societal Security Threatening Factors: An Interpretive Structural Model [Volume 4, Number 2]
:: Saghafi, Fatemeh Prioritization of Cyberspace's Societal Security Threatening Factors: An Interpretive Structural Model [Volume 4, Number 2]
:: Ramezani, Sajjad Prioritization of Cyberspace's Societal Security Threatening Factors: An Interpretive Structural Model [Volume 4, Number 2]
:: Ghadiri, Saeed Anchor Nodes Optimized Positioning for Nodes Self-Localization in Wireless Sensor Networks [Volume 4, Number 3]
:: Ramezanzadeh, Mojtaba Anchor Nodes Optimized Positioning for Nodes Self-Localization in Wireless Sensor Networks [Volume 4, Number 3]
:: Movahhed Ghodsinya, Seyyed Reza Review of Data Fusion Models and Architectures for Air Targets Threat Assessment in C4I System [Volume 4, Number 3]
:: Azimirad, Ehsan Review of Data Fusion Models and Architectures for Air Targets Threat Assessment in C4I System [Volume 4, Number 3]
:: karami, fahimeh Lessons learned in the performance of command and control of air defense in sacred defense [Volume 4, Number 2]
:: kharazian, peyman Lessons learned in the performance of command and control of air defense in sacred defense [Volume 4, Number 2]
:: Moghadas, Masoud Lessons learned in the performance of command and control of air defense in sacred defense [Volume 4, Number 2]
:: Jahanfar, Reza Lessons learned in the performance of command and control of air defense in sacred defense [Volume 4, Number 2]
:: bakhtiari, iraj The command and control environmental analyizies in the area of aerospace defence, from opportunities and challenges perspective [Volume 4, Number 2]
:: Morovati Sharifabadi, Ali Application of a Comprehensive Model of Organizational Capabilities in the OODA Cycle [Volume 3, Number 2]
:: Mirghafoori, Seyed Habibollah Application of a Comprehensive Model of Organizational Capabilities in the OODA Cycle [Volume 3, Number 2]
:: Zanjirchi, Seyed Mahmud Application of a Comprehensive Model of Organizational Capabilities in the OODA Cycle [Volume 3, Number 2]
:: mohammadi, hamidreza Application of a Comprehensive Model of Organizational Capabilities in the OODA Cycle [Volume 3, Number 2]
:: Taghva, Moahmmadreza Proposing a four-dimensional portfolio model for service supply management in telecom industry in order to utilize ICT in command control systems [Volume 4, Number 1]
:: Amiri, Maghsoud Proposing a four-dimensional portfolio model for service supply management in telecom industry in order to utilize ICT in command control systems [Volume 4, Number 1]
:: Sadighi, Fahimeh Proposing a four-dimensional portfolio model for service supply management in telecom industry in order to utilize ICT in command control systems [Volume 4, Number 1]
:: Bamdadsoofi, Jahanyar Proposing a four-dimensional portfolio model for service supply management in telecom industry in order to utilize ICT in command control systems [Volume 4, Number 1]
:: heydari, Mahsa Design and Simulation of a Closed-Loop controller for Switching Transmitter of Local Positioning System [Volume 4, Number 1]
:: khorrami, abazar Design and Simulation of a Closed-Loop controller for Switching Transmitter of Local Positioning System [Volume 4, Number 1]
:: afifi, ahmad Design and Simulation of a Closed-Loop controller for Switching Transmitter of Local Positioning System [Volume 4, Number 1]
:: Fathabadi, Hosein The Impact of Systemic Thinking on Improving Organizational Performance in Military Units [Volume 4, Number 1]
:: farhadi, ali The Impact of Systemic Thinking on Improving Organizational Performance in Military Units [Volume 4, Number 1]
:: feiz, daood Consideration the Relation Between the Various Approaches to Utilization of Human Resources and Innovation Parameters in Defense Organization [Volume 4, Number 1]
:: rastgar, abasali Consideration the Relation Between the Various Approaches to Utilization of Human Resources and Innovation Parameters in Defense Organization [Volume 4, Number 1]
:: hedayatifar, saba Consideration the Relation Between the Various Approaches to Utilization of Human Resources and Innovation Parameters in Defense Organization [Volume 4, Number 1]
:: amiri, hassan Consideration the Relation Between the Various Approaches to Utilization of Human Resources and Innovation Parameters in Defense Organization [Volume 4, Number 1]
:: Hashemi Golpaygani, S.Alireza A New Preprocessing Method for Rumor Detection in Social Networks based on LSTM-CNN [Volume 4, Number 1]
:: Dadahstabar, Kourosh A New Preprocessing Method for Rumor Detection in Social Networks based on LSTM-CNN [Volume 4, Number 1]
:: Shirazi, Hossein A New Preprocessing Method for Rumor Detection in Social Networks based on LSTM-CNN [Volume 4, Number 1]
:: Khosravi, maryam A New Preprocessing Method for Rumor Detection in Social Networks based on LSTM-CNN [Volume 4, Number 1]
:: ghaffari, behzad Explain the role of command and control in overcoming and superiority the combat power of air defense [Volume 3, Number 4]
:: aliannejadi, mohammadreza explanation of the concept of strategic learning in Khatam-all-Anbiya air defense Headquarters [Volume 3, Number 4]
:: Sabahno, Mahdieh Improving the accuracy of Website Phishing Detection through Spotted Hyena Optimization Algorithm and Artificial Neural Network [Volume 3, Number 4]
:: Safara, Fatemeh Improving the accuracy of Website Phishing Detection through Spotted Hyena Optimization Algorithm and Artificial Neural Network [Volume 3, Number 4]
:: mohseny, hamid Introducing the new architecture of crisis command and control network architecture inspired by the complex real brain network [Volume 3, Number 4]
:: emadi, mohammad mahdi Introducing the new architecture of crisis command and control network architecture inspired by the complex real brain network [Volume 3, Number 4]
:: yavari, alireza Stage-centered Pattern of War Game in Command and Control [Volume 3, Number 4]
:: eshraghi, mehrdad Stage-centered Pattern of War Game in Command and Control [Volume 3, Number 4]
:: Khosravi, Mohammadreza A New Damage Accumulation Model for Gun and Target Engagements [Volume 3, Number 3]
:: Ahmadi, Kambiz A New Damage Accumulation Model for Gun and Target Engagements [Volume 3, Number 3]
:: Saghafi, Fatemeh Explanation the formation of Sectoral Innovation System, Case: General Aviation industry of I.R. of Iran [Volume 3, Number 3]
:: balochian, saeed [Volume 3, Number 3]
:: pariz, naser [Volume 3, Number 3]
:: fazel, sadegh [Volume 3, Number 3]
:: Alinaghizadeh Ardestani, Mahdi [Volume 3, Number 3]
:: Rajabi, Zeinab [Volume 3, Number 3]
:: rasouli kenari, abdolreza Traffic violation detection using Map/Reduce [Volume 3, Number 2]
:: shamsi, mahboubeh Traffic violation detection using Map/Reduce [Volume 3, Number 2]
:: Asadianfam, Shiva Traffic violation detection using Map/Reduce [Volume 3, Number 2]
:: ebrahimi, abas Strategic foresight For Alignment Gradation of Human Resource Processes With Defense Organization Objects [Volume 3, Number 2]
:: damghanian, hosain Strategic foresight For Alignment Gradation of Human Resource Processes With Defense Organization Objects [Volume 3, Number 2]
:: amiri, hassan Strategic foresight For Alignment Gradation of Human Resource Processes With Defense Organization Objects [Volume 3, Number 2]
:: Mozayani, Nasser The Scalable Architecture of Military Internet of Things for Real-Time Battlefield Management Using Edge Computing. [Volume 3, Number 2]
:: Fathy, Mahmood The Scalable Architecture of Military Internet of Things for Real-Time Battlefield Management Using Edge Computing. [Volume 3, Number 2]
:: Malekian Borujeni, Ahmad The Scalable Architecture of Military Internet of Things for Real-Time Battlefield Management Using Edge Computing. [Volume 3, Number 2]
:: Mousavi shoushtari, Seyed Mohammad tghi Threat assessment of air targets, using probabilistic Rule based model [Volume 3, Number 2]
:: Seyedin, seyed Alireza Threat assessment of air targets, using probabilistic Rule based model [Volume 3, Number 2]
:: Moarefianpour, Ali Simultaneous Fusion, Classification, and Traction of Moving Obstacles by Multiple Sensors Using Bayesian Algorithm Based on Fuzzy Dempster-Shafer Theory [Volume 3, Number 1]
:: Afshar, Ahmad Simultaneous Fusion, Classification, and Traction of Moving Obstacles by Multiple Sensors Using Bayesian Algorithm Based on Fuzzy Dempster-Shafer Theory [Volume 3, Number 1]
:: Dowlatabadi, Masrour Simultaneous Fusion, Classification, and Traction of Moving Obstacles by Multiple Sensors Using Bayesian Algorithm Based on Fuzzy Dempster-Shafer Theory [Volume 3, Number 1]
:: GHAFARI, BEHZAD An analysis of CNS-ATM and its implications for the spatial and geographic location of the Islamic Republic of Iran [Volume 3, Number 1]
:: rahimi, mohsen An analysis of CNS-ATM and its implications for the spatial and geographic location of the Islamic Republic of Iran [Volume 3, Number 1]
:: Heydarnejad, Alireza Strategy of Knowledge Management in Establishment of Disciplinary Command and Control System [Volume 3, Number 1]
:: Yavari, Alireza Strategy of Knowledge Management in Establishment of Disciplinary Command and Control System [Volume 3, Number 1]
:: Abbasi Arand, Bijan Providing an Autonomous Management Framework for Command and Control Networks Using MAPE-K Adaptive Control Loop [Volume 3, Number 1]
:: Javidan, Reza Providing an Autonomous Management Framework for Command and Control Networks Using MAPE-K Adaptive Control Loop [Volume 3, Number 1]
:: Sepahvand, Reza Providing an Autonomous Management Framework for Command and Control Networks Using MAPE-K Adaptive Control Loop [Volume 3, Number 1]
:: Parsaei, Mohammad Reza Providing an Autonomous Management Framework for Command and Control Networks Using MAPE-K Adaptive Control Loop [Volume 3, Number 1]
:: Karimpor, Ali Threat concept development based on tolerability and a decision support system for threat evaluation using logical statements and discrete-Value evidences [Volume 3, Number 1]
:: Pariz, naser Threat concept development based on tolerability and a decision support system for threat evaluation using logical statements and discrete-Value evidences [Volume 3, Number 1]
:: kamelian, Saeed Threat concept development based on tolerability and a decision support system for threat evaluation using logical statements and discrete-Value evidences [Volume 3, Number 1]
:: Mardani Shahrbabak, Mohammad Introducing a New Framework for the Pathology of the Command and Control System [Volume 2, Number 4]
:: bamdad Sufi, jahanyar Presenting a Model for Enhancing the Position of IRAN Maritime Supply Chain with Focus on Sustainable Development Basics by Using Structural Equation Modeling. [Volume 2, Number 4]
:: feizi, kamran Presenting a Model for Enhancing the Position of IRAN Maritime Supply Chain with Focus on Sustainable Development Basics by Using Structural Equation Modeling. [Volume 2, Number 4]
:: khatami firoozabadi, seyed mohammad ali Presenting a Model for Enhancing the Position of IRAN Maritime Supply Chain with Focus on Sustainable Development Basics by Using Structural Equation Modeling. [Volume 2, Number 4]
:: tangestani, alireza Presenting a Model for Enhancing the Position of IRAN Maritime Supply Chain with Focus on Sustainable Development Basics by Using Structural Equation Modeling. [Volume 2, Number 4]
:: Moradian, Mohsen A Relief Location and Allocation bi-objective Problem after Floods [Volume 2, Number 4]
:: Amiri, Maghsoud A Relief Location and Allocation bi-objective Problem after Floods [Volume 2, Number 4]
:: Khatami Firouzabadi, Seyes Mohammad ali A Relief Location and Allocation bi-objective Problem after Floods [Volume 2, Number 4]
:: Soleimani, Gholamhossein A Relief Location and Allocation bi-objective Problem after Floods [Volume 2, Number 4]
:: koosha, hassan Command and Control Indexing with Knowledge Based Defense Approach [Volume 2, Number 4]
:: jafarizadeh, omid Command and Control Indexing with Knowledge Based Defense Approach [Volume 2, Number 4]
:: bagheri, masoud A game theory-based model for strategic decision-making in cyber warfare [Volume 2, Number 4]
:: akramizadeh, ali A game theory-based model for strategic decision-making in cyber warfare [Volume 2, Number 4]
:: forooghy, mahmood A game theory-based model for strategic decision-making in cyber warfare [Volume 2, Number 4]
:: Alizadeh, Hava [Volume 1, Number 1]
:: vahdati, hamid Introducing a new model of information fusion for optimized allocation of electronic warfare resources at sensor level [Volume 2, Number 1]
:: dehghani, hamid Introducing a new model of information fusion for optimized allocation of electronic warfare resources at sensor level [Volume 2, Number 1]
:: sabetian, mohammad Introducing a new model of information fusion for optimized allocation of electronic warfare resources at sensor level [Volume 2, Number 1]
:: Izadipour, Ahmad Importance of Game Theory in Modelling and Solution of Network Centric Weapon Target Assignment with consideration to Target Intelligence [Volume 2, Number 1]
:: Balochian, Saeed Importance of Game Theory in Modelling and Solution of Network Centric Weapon Target Assignment with consideration to Target Intelligence [Volume 2, Number 1]
:: Farajian Shooshtari, Davood Theory of Defense Arayeh and Socialized Innovation vs. Network Centric Innovation, An Air Defense Case Study [Volume 2, Number 1]
:: Fetanat, AbdolHamid Theory of Defense Arayeh and Socialized Innovation vs. Network Centric Innovation, An Air Defense Case Study [Volume 2, Number 1]
:: N. Fesharaki, Mehdi Theory of Defense Arayeh and Socialized Innovation vs. Network Centric Innovation, An Air Defense Case Study [Volume 2, Number 1]
:: Norouzi, Alireza Scrutinizing and evaluating intrusion detection approaches based on the artificial immune system [Volume 2, Number 1]
:: Farzadnia, Ehsan Scrutinizing and evaluating intrusion detection approaches based on the artificial immune system [Volume 2, Number 1]
:: Shirazi, Hossein Scrutinizing and evaluating intrusion detection approaches based on the artificial immune system [Volume 2, Number 1]
:: Khalili, Abdollah Automatic Fuzzy Clustering Using Multiobjective Grey Wolf Optimization Algorithm [Volume 2, Number 1]
:: Imamdoost, Ali Asghar Automatic Fuzzy Clustering Using Multiobjective Grey Wolf Optimization Algorithm [Volume 2, Number 1]
:: chamani, Moslem Survivability analysis of the air defense command and control network and the appropriate solution for promoting survivability [Volume 2, Number 2]
:: bakhtiari, Ierag Survivability analysis of the air defense command and control network and the appropriate solution for promoting survivability [Volume 2, Number 2]
:: mohammadi, Ardeshir Survivability analysis of the air defense command and control network and the appropriate solution for promoting survivability [Volume 2, Number 2]
:: valavi, Mohamadreza Assessment of Upper Ontologies and provide adequate upper ontology reqirements for military, sequrity and crisis management applications [Volume 2, Number 2]
:: Servati, Leila Assessment of Upper Ontologies and provide adequate upper ontology reqirements for military, sequrity and crisis management applications [Volume 2, Number 2]
:: fathabadi, hosein Identification and Analysis of Factors Affecting the Functional Integrated Command and Control Network (C4ISR) [Volume 2, Number 2]
:: askari, ahmad Identification and Analysis of Factors Affecting the Functional Integrated Command and Control Network (C4ISR) [Volume 2, Number 2]
:: Shirazi, Hossein Development of Farsi WordNet by Semi-automatic Methods and Linked Data Format [Volume 2, Number 3]
:: Abbdollahzade, Ahmad Development of Farsi WordNet by Semi-automatic Methods and Linked Data Format [Volume 2, Number 3]
:: Moteshakker Arani, Zohre Development of Farsi WordNet by Semi-automatic Methods and Linked Data Format [Volume 2, Number 3]
:: SEPANLOO, HADI Description and Explication of the Electronic Banking Policy-Making in Iran Using Grounded Theory [Volume 2, Number 3]
:: Yaghoubi, Saeed Description and Explication of the Electronic Banking Policy-Making in Iran Using Grounded Theory [Volume 2, Number 3]
:: Divandari, Ali Description and Explication of the Electronic Banking Policy-Making in Iran Using Grounded Theory [Volume 2, Number 3]
:: Monavarian, Abbas Description and Explication of the Electronic Banking Policy-Making in Iran Using Grounded Theory [Volume 2, Number 3]
:: hamzeh, farhad Passive Defense Indexation from Infrastructure Perspective in Urban Space [Volume 2, Number 3]
:: jafarizadeh, omid Passive Defense Indexation from Infrastructure Perspective in Urban Space [Volume 2, Number 3]
فصلنامه علمی-پژوهشی فرماندهی و کنترل C4I Journal

 
Persian site map - English site map - Created in 0.04 seconds with 25 queries by YEKTAWEB 4710