[Home ] [Archive]   [ فارسی ]  
:: Main :: Archive :: About :: Search :: Submit :: Contact ::
Main Menu
Home::
Journal Information::
Articles archive::
For Authors::
For Reviewers::
Registration::
Contact us::
Site Facilities::
::
Search in website

Advanced Search
..
Receive site information
Enter your Email in the following box to receive the site news and information.
..

Keywords Index

All issues
:: Air Defense Command and Control Network Identify the components that affect the improvement of Operations Staff in The Air Defense Command and Control Network [Volume 7, Number 1]
:: Ambiguity explanation of the concept of strategic learning in Khatam-all-Anbiya air defense Headquarters [Volume 3, Number 4]
:: Arab Countries Requirements for brand promotion of Iran in relations with Arab countries according to the media capacity of cyberspace [Volume 5, Number 2]
:: Araye A Decentralised Cognitive Razmayeshgah-e Araye-i Platform for Air Defense [Volume 5, Number 1]
:: C4I System Review of Data Fusion Models and Architectures for Air Targets Threat Assessment in C4I System [Volume 4, Number 3]
:: Canonical Correlation Analysis Consideration the Relation Between the Various Approaches to Utilization of Human Resources and Innovation Parameters in Defense Organization [Volume 4, Number 1]
:: Chaotic Environments. Designing a Decision Making Skills Development Model for Military Environments (Case of Khatam-al-anbia Air Defence Academy) [Volume 4, Number 3]
:: Classification. Improving the accuracy of Website Phishing Detection through Spotted Hyena Optimization Algorithm and Artificial Neural Network [Volume 3, Number 4]
:: Cloud computing A New Framework for Privacy-Preserving and Security of Patient in Electronic Health [Volume 2, Number 2]
:: Cognitive misconduct Identify and rank cognitive errors related to the dimensions of strategic thinking [Volume 5, Number 1]
:: Command and Control" Explain the role of command and control in overcoming and superiority the combat power of air defense [Volume 3, Number 4]
:: Command and control Cost-Sensitive Command and Control for Web Content Surveillance Using Autonomous Agents [Volume 4, Number 2]
:: Control A Model for Industrial Production Control System [Volume 2, Number 3]
:: Corona Requirements and proposed framework for the use of new technologies in crisis control and management based on communication and information technology [Volume 5, Number 3]
:: Cryptography. Security Concepts and Challenges of Military Internet of Things (IoT) with Focused on the mechanism of MIoT- USA [Volume 2, Number 3]
:: Cyber Threats. Designing a Foresight Framework for the Poractive Confrontation of the Islamic Republic of Iran Army with Cyber Threats [Volume 6, Number 4]
:: Cyber human capital. Providing a Framework for Human Capital Empowerment in Cyber Defense [Volume 5, Number 4]
:: DDPG Autonomous Navigation of Wheeled Robot using a Deep Reinforcement Learning Based Approach [Volume 6, Number 2]
:: Database intrusion detection system Optimizing the detection of SQL injection attacks using a combination of random forest and genetic algorithms [Volume 5, Number 1]
:: Decentralized command and control Survivability analysis of the air defense command and control network and the appropriate solution for promoting survivability [Volume 2, Number 2]
:: Defense Arayeh Platform Architecture Theory of Defense Arayeh and Socialized Innovation vs. Network Centric Innovation, An Air Defense Case Study [Volume 2, Number 1]
:: Defense networks. Provide a modern architecture of extensive defense networks strong against attacks [Volume 5, Number 4]
:: Delphi. Identifying Barriers and Drivers of Virtual Reality Technology Adoption in order to create a Virtual Command and Control System: A Case Study of A Military Organization [Volume 5, Number 4]
:: Desired Status Introducing a New Framework for the Pathology of the Command and Control System [Volume 2, Number 4]
:: Distributed Architecture A Conceptual architecture for integrated simulation engine in command and control [Volume 7, Number 1]
:: Electronic Interception The most appropriate passive defense strategies for command and control network communication systems against the threat of electronic interception by enemy's communication intelligence sensors. [Volume 3, Number 2]
:: Electronic Warfare Design and Fabrication of Modified Stomatal Antenna to Upgrade Radar Systems in Electronic Warfare Environment [Volume 6, Number 4]
:: Estimate Stage-centered Pattern of War Game in Command and Control [Volume 3, Number 4]
:: Fuzzy Dempster-Shafer Bayesian Algorithm Unmanned Ground Vehicles Lidar and camera Sensor fusion Simultaneous Fusion, Classification, and Traction of Moving Obstacles by Multiple Sensors Using Bayesian Algorithm Based on Fuzzy Dempster-Shafer Theory [Volume 3, Number 1]
:: Genetic algorithm Optimization of classification of SAR radar ground targets by combining convolutional network and genetic algorithm used in command and control system [Volume 6, Number 3]
:: Grounded Theory Description and Explication of the Electronic Banking Policy-Making in Iran Using Grounded Theory [Volume 2, Number 3]
:: Hierarchy of Attorneys The Impact of Systemic Thinking on Improving Organizational Performance in Military Units [Volume 4, Number 1]
:: Holy Defense Lessons learned in the performance of command and control of air defense in sacred defense [Volume 4, Number 2]
:: Inactive urban passive defense indicators Passive Defense Indexation from Infrastructure Perspective in Urban Space [Volume 2, Number 3]
:: Indexing Command and Control Indexing with Knowledge Based Defense Approach [Volume 2, Number 4]
:: Information technology. Strategy of Knowledge Management in Establishment of Disciplinary Command and Control System [Volume 3, Number 1]
:: Integrated Command and Control Maturity Model A Maturity Model for Command and Control [Volume 6, Number 4]
:: Internet of Things Investigating the impact of software-defined networking on quality of services in the network [Volume 5, Number 3]
:: Interpreter structural modeling Strategic foresight For Alignment Gradation of Human Resource Processes With Defense Organization Objects [Volume 3, Number 2]
:: K-Means Access control in smart contracts using machine learning for IoT [Volume 5, Number 3]
:: Learning algorithm. Coverage Control in Heterogeneous Mobile Sensor Networks Based on Game Theory [Volume 5, Number 1]
:: Linear Programming. Providing a Pattern of Expanding the Command and Control Facility Network Using Mathematical Modeling [Volume 2, Number 4]
:: Logical statements Threat concept development based on tolerability and a decision support system for threat evaluation using logical statements and discrete-Value evidences [Volume 3, Number 1]
:: Low Probability of Intercept Radar . A Deep Learning-Based Approach for Low Probability of Intercept Radar Signal Detection and Classification [Volume 5, Number 1]
:: Mathematical modeling A Relief Location and Allocation bi-objective Problem after Floods [Volume 2, Number 4]
:: Maturity model governance maturity model for a military organization [Volume 7, Number 1]
:: Meta-Heuristic How to decide on logistics and support forces on the battlefield in one of the defense organizations [Volume 5, Number 2]
:: Military Organization An analysis of CNS-ATM and its implications for the spatial and geographic location of the Islamic Republic of Iran [Volume 3, Number 1]
:: Military organization Development of an E-learning Maturity Model for Command and Control in a Military Organization [Volume 5, Number 3]
:: Multi-Objective Optimization Anchor Nodes Optimized Positioning for Nodes Self-Localization in Wireless Sensor Networks [Volume 4, Number 3]
:: NSLKDD Using Of Neuro-Fuzzy Classifier for Intrusion Detection Systems [Volume 5, Number 2]
:: Noise Reduction. Introducing A Modified Iterative Approach in Signal Source Localization Based on TDOA Measurements [Volume 7, Number 1]
:: OODA cycle Application of a Comprehensive Model of Organizational Capabilities in the OODA Cycle [Volume 3, Number 2]
:: Ontology Hard and soft information fusion in cyber command and control [Volume 5, Number 1]
:: Partnership Game A Model for Intrusion Detection in Internet of Things Using Partnership Game [Volume 5, Number 2]
:: Positioning Satellite Passive Positioning Using Azimuth-Elevation Angle-Only Data [Volume 4, Number 3]
:: Real network robustness and resilience Introducing the new architecture of crisis command and control network architecture inspired by the complex real brain network [Volume 3, Number 4]
:: Rough neural network Mid-Term and Short-Term Load Forecasting Using Rough Neural Networks and Grasshopper Mutation [Volume 4, Number 2]
:: SNR Providing an algorithm for authentication of radio transmitters Based on power amplifier nonlinear behavior [Volume 4, Number 2]
:: Schwartz Model. Investigating the future scenarios of the national command and control system in the face of new cyber technologies [Volume 3, Number 3]
:: Smart Battlefield. The Scalable Architecture of Military Internet of Things for Real-Time Battlefield Management Using Edge Computing. [Volume 3, Number 2]
:: Social network A New Preprocessing Method for Rumor Detection in Social Networks based on LSTM-CNN [Volume 4, Number 1]
:: Social security Prioritization of Cyberspace's Societal Security Threatening Factors: An Interpretive Structural Model [Volume 4, Number 2]
:: Step function model A New Damage Accumulation Model for Gun and Target Engagements [Volume 3, Number 3]
:: Strategic Planning to Measure the Performance of the Strategic Partner of Human Resources in the Islamic Azad University, North Tehran Branch (Passive Defense Center) [Volume 4, Number 4]
:: Strategic Plan Designing the Model of Successful Strategy Implementation and Execution in network organizations of the arm at the individual and organizational levels [Volume 4, Number 1]
:: Structural Equation Modeling. Presenting a Model for Enhancing the Position of IRAN Maritime Supply Chain with Focus on Sustainable Development Basics by Using Structural Equation Modeling. [Volume 2, Number 4]
:: Structural Modeling Explanation the formation of Sectoral Innovation System, Case: General Aviation industry of I.R. of Iran [Volume 3, Number 3]
:: System Dynamics. Providing different scenarios for applying knowledge management in the risk management process of network-based organizations based on the system dynamics approach [Volume 5, Number 2]
:: Technology. Specifications of military command and control systems tailored to the characteristics of the future war environment [Volume 4, Number 4]
:: Transfer learning Incremental Focal ENsemble for multi-class Imbalalanced Learning (FENIL) [Volume 6, Number 2]
:: Uncertainty Handling Data Uncertainty Using Multi Entity Bayesian Networks in Data Fusion [Volume 2, Number 2]
:: Variable Inductor. Design and Simulation of a Closed-Loop controller for Switching Transmitter of Local Positioning System [Volume 4, Number 1]
:: Warfare Scenario Modeling and Analysis of Command and Control Warfare Scenario Between Two Hostile Countries Based on Non Cooperative Game Theory [Volume 4, Number 4]
:: XML Hardness Providing an Autonomous Management Framework for Command and Control Networks Using MAPE-K Adaptive Control Loop [Volume 3, Number 1]
:: Zero-day attacks A comprehensive Model for Situational Awareness in Active Cyber Defense [Volume 6, Number 1]
:: air defense Principles of air defense warfare in an uneven environment [Volume 6, Number 2]
:: bag-of-concepts A context-based model for disambiguating the sentiment concepts using the common-sense knowledge [Volume 2, Number 2]
:: capabilities. Explain the role of IoT technology in enhancing the readiness and support capabilities of a defense organization [Volume 4, Number 4]
:: causal independence model. Threat assessment of air targets, using probabilistic Rule based model [Volume 3, Number 2]
:: challenges The command and control environmental analyizies in the area of aerospace defence, from opportunities and challenges perspective [Volume 4, Number 2]
:: changes and reconstruction topic IT Governance process changes topics for using in Cloud Governance [Volume 4, Number 4]
:: cluster validity index. Automatic Fuzzy Clustering Using Multiobjective Grey Wolf Optimization Algorithm [Volume 2, Number 1]
:: command and control architecture Designing the command and control architecture )cyber in combat) of the Islamic Republic of Iran Army [Volume 7, Number 1]
:: complex environments Identifying the key factors of the command and control system in the conditions of uncertainty in complex environments in the face of upcoming scenarios [Volume 6, Number 4]
:: crisis management Assessment of Upper Ontologies and provide adequate upper ontology reqirements for military, sequrity and crisis management applications [Volume 2, Number 2]
:: crisis management Mixed approach of crisis management based on Quinn and Cameron organizational culture model [Volume 6, Number 3]
:: cyber-crimes Identifying vulnerabilities and simulating the security of information systems based on blockchain technology using system dynamics [Volume 6, Number 4]
:: digital forensics. The Future of IoT Digital Cyber Crime Forensics [Volume 5, Number 3]
:: education model Explaining the human capital training model of command and control with a research-oriented approach case study; A military education and training center [Volume 6, Number 3]
:: electric field meter Presenting a proposed framework for continuous monitoring of the cumulative rate of electrical radiation intensity of transmission infrastructure and radio access in the development of the national information network. [Volume 6, Number 1]
:: entanglement Improving command and control system against with future threats by applying quantum radars [Volume 5, Number 2]
:: equilibrium state Decision modeling for the detection and identification of micro-drone in the electronic warfare battlefield With the effect of cost and operating range components based on game theory [Volume 6, Number 3]
:: hierarchical analysis process (AHP) A Evaluation Model of Vulnerabilities US Network Centric Warfare Based on Hierarchical Analysis Process [Volume 2, Number 1]
:: information fusion - JDL model -Control objectives pattern -Optimal allocation of resources- electronic warfare Introducing a new model of information fusion for optimized allocation of electronic warfare resources at sensor level [Volume 2, Number 1]
:: information gain Scrutinizing and evaluating intrusion detection approaches based on the artificial immune system [Volume 2, Number 1]
:: linked data Development of Farsi WordNet by Semi-automatic Methods and Linked Data Format [Volume 2, Number 3]
:: map/reduce Traffic violation detection using Map/Reduce [Volume 3, Number 2]
:: military organizations Explain the comprehensive model of strategic organizational change in military organizations [Volume 5, Number 4]
:: military organizations. Provide a model for identifying attacks based on social engineering in military organizations [Volume 6, Number 4]
:: neural network Forecasting the electricity market using neural network and gray wolf algorithm [Volume 3, Number 4]
:: performance Identification and Analysis of Factors Affecting the Functional Integrated Command and Control Network (C4ISR) [Volume 2, Number 2]
:: requirements of mobile forensics Examine the citation requirements of digital mobile forensics [Volume 6, Number 3]
:: smart policeو strategies Identifying and prioritizing smart police strategies [Volume 7, Number 1]
:: southern half of Iran The effect of synoptic analysis of atmospheric hazards in command and control of Military units (Case study: Heavy rains in the southern half of Iran) [Volume 6, Number 2]
:: strategic goals strategy map for information technology in military organizations [Volume 6, Number 2]
:: strategy. Strategic planning of post quantum cryptography to encounter quantum computing effects on cryptography [Volume 4, Number 4]
:: supply management Proposing a four-dimensional portfolio model for service supply management in telecom industry in order to utilize ICT in command control systems [Volume 4, Number 1]
:: surveillance of social media Designing an early warning model in social media surveillance [Volume 6, Number 1]
:: unequal war. The strategic model of modern air defense with the ability to defend in an unequaled war environment [Volume 6, Number 3]
:: vulnerability A game theory-based model for strategic decision-making in cyber warfare [Volume 2, Number 4]
:: wasp software Modeling the capacity of Iran's power plant generation system using WASP software for evaluation and optimal development of Iran's nuclear power plants [Volume 5, Number 4]
فصلنامه علمی-پژوهشی فرماندهی و کنترل C4I Journal

 
Persian site map - English site map - Created in 0.05 seconds with 24 queries by YEKTAWEB 4710