Peer Reviewed Papers

 | تاریخ ارسال: 1394/9/25 | 

"Algorithms Using Fuzzy-Copeland Ranking Method Evaluation MCDM Multi-disjoint Paths Selection," International Journal of Communication Networks and Information Security (IJCNIS), Vol.5, pp. 59-67, March 2013.

"A New Watermarking Scheme for an in-Vivo Computer Based on Infection of E. coli," International Journal of Computer and Electrical Engineering, Vol.4, pp. 154-164, August 2012.

 " A Novel Multi-Client Authentication Method Using Infection of Bacteria," International Journal of Information and Electronics Engineering, Vol.5, pp. 790-794, Sep 2012.

"Cryptanalysis of a Substitution-Permutation Network Using Gene Assembly in Ciliates," Int. J. Communications, Network and System Sciences (IJCNS), Vol. 5, pp. 154-164, March 2012.

"Breaking A Feistel-Type Block Cipher by Bacteria Engineering, " Advanced Computing: An International Journal (ACIJ), Vol.3, No.1, pp.1-23, January 2012.

  "Achieving Secrecy for Images Using in-vivo DNA Cloning Techniques," International Journal of Advanced Computer Science, Vol. 1, No. 6, pp. 240-249, Dec. 2011.

"A Repair-less Genetic Algorithm for Scheduling Tasks onto Dynamically Reconfigurable Hardware," Journal International Review on Computers and Software (IRECOS) March 2011.

"A New Metric for On-Line Scheduling and Placement in Reconfigurable Computing Systems,” Lecture Notes in Computer Science - Algorithms and Architectures for Parallel Processing, pp.422-433, May 2010.

“Performance Evaluation of Decision Tree for Intrusion Detection Using Reduced Feature Spaces,” Lecture Notes in Electrical Engineering, Trends in Intelligent Systems and Computer Engineering, pp.273-, April 2008.

"Reaching to the Best Performance on the Superscalar Processors," ACM Computer Architecture News, Vol. 27, No.4, pp 6-11, Sep 1999.


دفعات مشاهده: 1265 بار   |   دفعات چاپ: 135 بار   |   دفعات ارسال به دیگران: 0 بار   |   0 نظر