 |
Air Defense Command and Control Network
Identify the components that affect the improvement of Operations Staff in The Air Defense Command and Control Network [Volume 7, Number 1] |
 |
Ambiguity
explanation of the concept of strategic learning in Khatam-all-Anbiya air defense Headquarters [Volume 3, Number 4] |
 |
Arab Countries
Requirements for brand promotion of Iran in relations with Arab countries according to the media capacity of cyberspace [Volume 5, Number 2] |
 |
Araye
A Decentralised Cognitive Razmayeshgah-e Araye-i Platform for Air Defense [Volume 5, Number 1] |
 |
C4I System
Review of Data Fusion Models and Architectures for Air Targets Threat Assessment in C4I System [Volume 4, Number 3] |
 |
Canonical Correlation Analysis
Consideration the Relation Between the Various Approaches to Utilization of Human Resources and Innovation Parameters in Defense Organization [Volume 4, Number 1] |
 |
Chaotic Environments.
Designing a Decision Making Skills Development Model for Military Environments (Case of Khatam-al-anbia Air Defence Academy) [Volume 4, Number 3] |
 |
Classification.
Improving the accuracy of Website Phishing Detection through Spotted Hyena Optimization Algorithm and Artificial Neural Network [Volume 3, Number 4] |
 |
Cloud computing
A New Framework for Privacy-Preserving and Security of Patient in Electronic Health [Volume 2, Number 2] |
 |
Cognitive misconduct
Identify and rank cognitive errors related to the dimensions of strategic thinking [Volume 5, Number 1] |
 |
Command and Control"
Explain the role of command and control in overcoming and superiority the combat power of air defense [Volume 3, Number 4] |
 |
Command and control
Cost-Sensitive Command and Control for Web Content Surveillance Using Autonomous Agents [Volume 4, Number 2] |
 |
Control
A Model for Industrial Production Control System [Volume 2, Number 3] |
 |
Corona
Requirements and proposed framework for the use of new technologies in crisis control and management based on communication and information technology [Volume 5, Number 3] |
 |
Cryptography.
Security Concepts and Challenges of Military Internet of Things (IoT) with Focused on the mechanism of MIoT- USA [Volume 2, Number 3] |
 |
Cyber Threats.
Designing a Foresight Framework for the Poractive Confrontation of the Islamic Republic of Iran Army with Cyber Threats [Volume 6, Number 4] |
 |
Cyber human capital.
Providing a Framework for Human Capital Empowerment in Cyber Defense [Volume 5, Number 4] |
 |
DDPG
Autonomous Navigation of Wheeled Robot using a Deep Reinforcement Learning Based Approach [Volume 6, Number 2] |
 |
Database intrusion detection system
Optimizing the detection of SQL injection attacks using a combination of random forest and genetic algorithms [Volume 5, Number 1] |
 |
Decentralized command and control
Survivability analysis of the air defense command and control network and the appropriate solution for promoting survivability [Volume 2, Number 2] |
 |
Defense Arayeh Platform Architecture
Theory of Defense Arayeh and Socialized Innovation vs. Network Centric Innovation, An Air Defense Case Study [Volume 2, Number 1] |
 |
Defense networks.
Provide a modern architecture of extensive defense networks strong against attacks [Volume 5, Number 4] |
 |
Delphi.
Identifying Barriers and Drivers of Virtual Reality Technology Adoption in order to create a Virtual Command and Control System: A Case Study of A Military Organization [Volume 5, Number 4] |
 |
Desired Status
Introducing a New Framework for the Pathology of the Command and Control System [Volume 2, Number 4] |
 |
Distributed Architecture
A Conceptual architecture for integrated simulation engine in command and control [Volume 7, Number 1] |
 |
Electronic Interception
The most appropriate passive defense strategies for command and control network communication systems against the threat of electronic interception by enemy's communication intelligence sensors. [Volume 3, Number 2] |
 |
Electronic Warfare
Design and Fabrication of Modified Stomatal Antenna to Upgrade Radar Systems in Electronic Warfare Environment [Volume 6, Number 4] |
 |
Estimate
Stage-centered Pattern of War Game in Command and Control [Volume 3, Number 4] |
 |
Fuzzy Dempster-Shafer Bayesian Algorithm Unmanned Ground Vehicles Lidar and camera Sensor fusion
Simultaneous Fusion, Classification, and Traction of Moving Obstacles by Multiple Sensors Using Bayesian Algorithm Based on Fuzzy Dempster-Shafer Theory [Volume 3, Number 1] |
 |
Genetic algorithm
Optimization of classification of SAR radar ground targets by combining convolutional network and genetic algorithm used in command and control system [Volume 6, Number 3] |
 |
Grounded Theory
Description and Explication of the Electronic Banking Policy-Making in Iran Using Grounded Theory [Volume 2, Number 3] |
 |
Hierarchy of Attorneys
The Impact of Systemic Thinking on Improving Organizational Performance in Military Units [Volume 4, Number 1] |
 |
Holy Defense
Lessons learned in the performance of command and control of air defense in sacred defense [Volume 4, Number 2] |
 |
Inactive urban passive defense indicators
Passive Defense Indexation from Infrastructure Perspective in Urban Space [Volume 2, Number 3] |
 |
Indexing
Command and Control Indexing with Knowledge Based Defense Approach [Volume 2, Number 4] |
 |
Information technology.
Strategy of Knowledge Management in Establishment of Disciplinary Command and Control System [Volume 3, Number 1] |
 |
Integrated Command and Control Maturity Model
A Maturity Model for Command and Control [Volume 6, Number 4] |
 |
Internet of Things
Investigating the impact of software-defined networking on quality of services in the network [Volume 5, Number 3] |
 |
Interpreter structural modeling
Strategic foresight For Alignment Gradation of Human Resource Processes With Defense Organization Objects [Volume 3, Number 2] |
 |
K-Means
Access control in smart contracts using machine learning for IoT [Volume 5, Number 3] |
 |
Learning algorithm.
Coverage Control in Heterogeneous Mobile Sensor Networks Based on Game Theory [Volume 5, Number 1] |
 |
Linear Programming.
Providing a Pattern of Expanding the Command and Control Facility Network Using Mathematical Modeling [Volume 2, Number 4] |
 |
Logical statements
Threat concept development based on tolerability and a decision support system for threat evaluation using logical statements and discrete-Value evidences [Volume 3, Number 1] |
 |
Low Probability of Intercept Radar .
A Deep Learning-Based Approach for Low Probability of Intercept Radar Signal Detection and Classification [Volume 5, Number 1] |
 |
Mathematical modeling
A Relief Location and Allocation bi-objective Problem after Floods [Volume 2, Number 4] |
 |
Maturity model
governance maturity model for a military organization [Volume 7, Number 1] |
 |
Meta-Heuristic
How to decide on logistics and support forces on the battlefield in one of the defense organizations [Volume 5, Number 2] |
 |
Military Organization
An analysis of CNS-ATM and its implications for the spatial and geographic location of the Islamic Republic of Iran [Volume 3, Number 1] |
 |
Military organization
Development of an E-learning Maturity Model for Command and Control in a Military Organization [Volume 5, Number 3] |
 |
Multi-Objective Optimization
Anchor Nodes Optimized Positioning for Nodes Self-Localization in Wireless Sensor Networks [Volume 4, Number 3] |
 |
NSLKDD
Using Of Neuro-Fuzzy Classifier for Intrusion Detection Systems [Volume 5, Number 2] |
 |
Noise Reduction.
Introducing A Modified Iterative Approach in Signal Source Localization Based on TDOA Measurements [Volume 7, Number 1] |
 |
OODA cycle
Application of a Comprehensive Model of Organizational Capabilities in the OODA Cycle [Volume 3, Number 2] |
 |
Ontology
Hard and soft information fusion in cyber command and control [Volume 5, Number 1] |
 |
Partnership Game
A Model for Intrusion Detection in Internet of Things Using Partnership Game [Volume 5, Number 2] |
 |
Positioning
Satellite Passive Positioning Using Azimuth-Elevation Angle-Only Data [Volume 4, Number 3] |
 |
Real network robustness and resilience
Introducing the new architecture of crisis command and control network architecture inspired by the complex real brain network [Volume 3, Number 4] |
 |
Rough neural network
Mid-Term and Short-Term Load Forecasting Using Rough Neural Networks and Grasshopper Mutation [Volume 4, Number 2] |
 |
SNR
Providing an algorithm for authentication of radio transmitters Based on power amplifier nonlinear behavior [Volume 4, Number 2] |
 |
Schwartz Model.
Investigating the future scenarios of the national command and control system in the face of new cyber technologies [Volume 3, Number 3] |
 |
Smart Battlefield.
The Scalable Architecture of Military Internet of Things for Real-Time Battlefield Management Using Edge Computing. [Volume 3, Number 2] |
 |
Social network
A New Preprocessing Method for Rumor Detection in Social Networks based on LSTM-CNN [Volume 4, Number 1] |
 |
Social security
Prioritization of Cyberspace's Societal Security Threatening Factors: An Interpretive Structural Model [Volume 4, Number 2] |
 |
Step function model
A New Damage Accumulation Model for Gun and Target Engagements [Volume 3, Number 3] |
 |
Strategic
Planning to Measure the Performance of the Strategic Partner of Human Resources in the Islamic Azad University, North Tehran Branch (Passive Defense Center) [Volume 4, Number 4] |
 |
Strategic Plan
Designing the Model of Successful Strategy Implementation and Execution in network organizations of the arm at the individual and organizational levels [Volume 4, Number 1] |
 |
Structural Equation Modeling.
Presenting a Model for Enhancing the Position of IRAN Maritime Supply Chain with Focus on Sustainable Development Basics by Using Structural Equation Modeling. [Volume 2, Number 4] |
 |
Structural Modeling
Explanation the formation of Sectoral Innovation System, Case: General Aviation industry of I.R. of Iran [Volume 3, Number 3] |
 |
System Dynamics.
Providing different scenarios for applying knowledge management in the risk management process of network-based organizations based on the system dynamics approach [Volume 5, Number 2] |
 |
Technology.
Specifications of military command and control systems tailored to the characteristics of the future war environment [Volume 4, Number 4] |
 |
Transfer learning
Incremental Focal ENsemble for multi-class Imbalalanced Learning (FENIL) [Volume 6, Number 2] |
 |
Uncertainty
Handling Data Uncertainty Using Multi Entity Bayesian Networks in Data Fusion [Volume 2, Number 2] |
 |
Variable Inductor.
Design and Simulation of a Closed-Loop controller for Switching Transmitter of Local Positioning System [Volume 4, Number 1] |
 |
Warfare Scenario
Modeling and Analysis of Command and Control Warfare Scenario Between Two Hostile Countries Based on Non Cooperative Game Theory [Volume 4, Number 4] |
 |
XML Hardness
Providing an Autonomous Management Framework for Command and Control Networks Using MAPE-K Adaptive Control Loop [Volume 3, Number 1] |
 |
Zero-day attacks
A comprehensive Model for Situational Awareness in Active Cyber Defense [Volume 6, Number 1] |
 |
air defense
Principles of air defense warfare in an uneven environment [Volume 6, Number 2] |
 |
bag-of-concepts
A context-based model for disambiguating the sentiment concepts using the common-sense knowledge [Volume 2, Number 2] |
 |
capabilities.
Explain the role of IoT technology in enhancing the readiness and support capabilities of a defense organization [Volume 4, Number 4] |
 |
causal independence model.
Threat assessment of air targets, using probabilistic Rule based model [Volume 3, Number 2] |
 |
challenges
The command and control environmental analyizies in the area of aerospace defence, from opportunities and challenges perspective [Volume 4, Number 2] |
 |
changes and reconstruction topic
IT Governance process changes topics for using in Cloud Governance [Volume 4, Number 4] |
 |
cluster validity index.
Automatic Fuzzy Clustering Using Multiobjective Grey Wolf Optimization Algorithm [Volume 2, Number 1] |
 |
command and control architecture
Designing the command and control architecture )cyber in combat) of the Islamic Republic of Iran Army [Volume 7, Number 1] |
 |
complex environments
Identifying the key factors of the command and control system in the conditions of uncertainty in complex environments in the face of upcoming scenarios [Volume 6, Number 4] |
 |
crisis management
Assessment of Upper Ontologies and provide adequate upper ontology reqirements for military, sequrity and crisis management applications [Volume 2, Number 2] |
 |
crisis management
Mixed approach of crisis management based on Quinn and Cameron organizational culture model [Volume 6, Number 3] |
 |
cyber-crimes
Identifying vulnerabilities and simulating the security of information systems based on blockchain technology using system dynamics [Volume 6, Number 4] |
 |
digital forensics.
The Future of IoT Digital Cyber Crime Forensics [Volume 5, Number 3] |
 |
education model
Explaining the human capital training model of command and control with a research-oriented approach case study; A military education and training center [Volume 6, Number 3] |
 |
electric field meter
Presenting a proposed framework for continuous monitoring of the cumulative rate of electrical radiation intensity of transmission infrastructure and radio access in the development of the national information network. [Volume 6, Number 1] |
 |
entanglement
Improving command and control system against with future threats by applying quantum radars [Volume 5, Number 2] |
 |
equilibrium state
Decision modeling for the detection and identification of micro-drone in the electronic warfare battlefield With the effect of cost and operating range components based on game theory [Volume 6, Number 3] |
 |
hierarchical analysis process (AHP)
A Evaluation Model of Vulnerabilities US Network Centric Warfare Based on Hierarchical Analysis Process [Volume 2, Number 1] |
 |
information fusion - JDL model -Control objectives pattern -Optimal allocation of resources- electronic warfare
Introducing a new model of information fusion for optimized allocation of electronic warfare resources at sensor level [Volume 2, Number 1] |
 |
information gain
Scrutinizing and evaluating intrusion detection approaches based on the artificial immune system [Volume 2, Number 1] |
 |
linked data
Development of Farsi WordNet by Semi-automatic Methods and Linked Data Format [Volume 2, Number 3] |
 |
map/reduce
Traffic violation detection using Map/Reduce [Volume 3, Number 2] |
 |
military organizations
Explain the comprehensive model of strategic organizational change in military organizations [Volume 5, Number 4] |
 |
military organizations.
Provide a model for identifying attacks based on social engineering in military organizations [Volume 6, Number 4] |
 |
neural network
Forecasting the electricity market using neural network and gray wolf algorithm [Volume 3, Number 4] |
 |
performance
Identification and Analysis of Factors Affecting the Functional Integrated Command and Control Network (C4ISR) [Volume 2, Number 2] |
 |
requirements of mobile forensics
Examine the citation requirements of digital mobile forensics [Volume 6, Number 3] |
 |
smart policeو strategies
Identifying and prioritizing smart police strategies [Volume 7, Number 1] |
 |
southern half of Iran
The effect of synoptic analysis of atmospheric hazards in command and control of Military units (Case study: Heavy rains in the southern half of Iran) [Volume 6, Number 2] |
 |
strategic goals
strategy map for information technology in military organizations [Volume 6, Number 2] |
 |
strategy.
Strategic planning of post quantum cryptography to encounter quantum computing effects on cryptography [Volume 4, Number 4] |
 |
supply management
Proposing a four-dimensional portfolio model for service supply management in telecom industry in order to utilize ICT in command control systems [Volume 4, Number 1] |
 |
surveillance of social media
Designing an early warning model in social media surveillance [Volume 6, Number 1] |
 |
unequal war.
The strategic model of modern air defense with the ability to defend in an unequaled war environment [Volume 6, Number 3] |
 |
vulnerability
A game theory-based model for strategic decision-making in cyber warfare [Volume 2, Number 4] |
 |
wasp software
Modeling the capacity of Iran's power plant generation system using WASP software for evaluation and optimal development of Iran's nuclear power plants [Volume 5, Number 4] |