Minaei.Behrooz
On the Behavior of Pre-trained Word Embedding Variants in Deep Headline Generation from Persian Texts
[
Vol.22,
Issue
1
,
2
- SpringYear
1403]
Mirabedini.Seyed Javad
A Novel Approach based on Chaotic Mapping for Implementing Security Phases on Cloud Computing
[
Vol.22,
Issue
2
,
2
- SummerYear
1403]
Mirzabeigi.Abdollah
Analysis of the Effects of Different Cyber Attacks on the Secondary Controller in Island Microgrids
[
Vol.22,
Issue
1
,
1
- SpringYear
1403]
Mirzaei.Hasanreza
Detection and Analysis of Acoustic Signals of Power Transformers On-Load Tap Changers for Assessment of Their Faults
[
Vol.22,
Issue
2
,
1
- SummerYear
1403]
Mohammadi.Abdolreza
Detection of Quantized Sparse Signals Using Locally Most Power Full Detector in Wireless Sensor NetworkS
[
Vol.22,
Issue
1
,
1
- SpringYear
1403]
Mohammadpour Behbid.Alimohammad
Comparison of FCS-MPC Predictive Control and Predictive Control Based on Lyapunov Theory in Seven-Level PUC Rectifier
[
Vol.22,
Issue
1
,
1
- SpringYear
1403]