Background
organization image

Faculty of Computer Engineering


The Faculty of Computer Engineering at University of Isfahan, established in 1992, has grown into one of Iran premier institutions for computer science education and research, offering comprehensive programs in artificial intelligence, data science, computer networks, and software engineering with a strong emphasis on industry-academia collaboration.

https://ce.ui.ac.ir

Research Output

923

All

917

Article

6

Book

filter by:

A Method for Answer Selection Using DistilBERT and Important Words

( Article . )

Mozafari, J., Fatemi, A., Moradi, P.
pp. 72-76

A Model-Driven Approach for IoT-Based Monitoring Systems in Industry 4.0

( Article . )

Ziaei, M., Zamani, B., Bohlooli, A.
pp. 99-105

A modeling language to model mitigation in emergency response environments

( Article . )

Adamzadeh, T., Zamani, B., Fatemi, A.
pp. 302-307

A Novel Approach for Developing Emergency Evacuation Plans

( Article . )

Daher, H., Hoseindoost, S., Zamani, B., Fatemi, A.
pp. 35-41

A Weighted TF-IDF-based Approach for Authorship Attribution

( Article . )

Abedzadeh, A., Ramezani, R., Fatemi, A.
pp. 188-193

Adaptive Chunking for VideoRAG Pipelines with a Newly Gathered Bilingual Educational Dataset

( Article . )

Hemmat, A., Vadaei, K., Shirian, M., Heydari, M.H., Fatemi, A.

An influence maximization algorithm based on community detection using topological features

( Article . )

Aghaee, Z., Fatemi, A.
pp. 128-133

An investigation of agent oriented software engineering methodologies to provide an extended methodology

( Article . )

Fatemi, A., Nematbakhsh, N., Torkladani b.,
2pp. 2883-2888

Bargaining Chips: Coordinating One-to-Many Concurrent Composite Negotiations

( Article )

Baarslag, Tim, Elfrink, Tijmen, Nassiri mofakham, F., Koça, Thimjo, Kaisers, Michael

Combinatorial Auction Based on Social Choice in the Internet of Things

( Article )

Esmaeili, Maede, Nassiri mofakham, F., Hassanvand F.

Context Awareness Gate For Retrieval Augmented Generation

( Article . )

Heydari, M.H., Hemmat, A., Naman, E., Fatemi, A.
pp. 260-264

Cross-cultural time sensitivity in a bilateral e-negotiation system

( Article )

Shahmoradi, H., Nassiri mofakham, F., Nemati, F.

Cryptography by pseudo random number generator

( Article )

Etemadi borujeni, S.

Distributed Rule Anomaly Detection in SDN-based IoT

( Article . )

Kiani, R., Bohlooli, A.

Embedded Speech Encoder for Low-resource Languages

( Article . )

Tabatabaei, A.A., Sameti, P., Bohlooli, A.
pp. 287-292

EOpR: An opportunistic routing algorithm for ad-hoc networks

( Article . )

Shabani, S., Moghim, N., Bohlooli, A.
pp. 268-272

Experimental analysis of automated negotiation agents in modeling Gaussian bidders

( Article )

Hassanvand F., Nassiri mofakham, F.

Exploring the Potential of Machine Translation for Generating Named Entity Datasets: A Case Study between Persian and English

( Article . Green )

Sartipi, A., Fatemi, A.
pp. 368-372

Fast Fourier transform speech scrambler

( Article )

Ehsani, M.S., Etemadi borujeni, S.

Hybrid Naming Scheme Based PURSUIT Architecture for Smart City

( Article . )

Javaheri, A., Hashemi, S.N.S., Bohlooli, A.
pp. 33-38

Implementing Double-Blind Peer Assessment in Virtual Classroom

( Article )

Nassiri mofakham, F., Hassanvand F., Mojoodi N.

Improvement delay and capacity (throughput) in Mobile Ad Hoc Networks using a new routing algorithm

( Article )

Bojd E.A., Moghim, N., Nassiri mofakham, F., Movahedinia, N.

Leveraging Retrieval-Augmented Generation for Persian University Knowledge Retrieval

( Article . Green )

Hemmat, A., Vadaei, K., Heydari, M.H., Fatemi, A.
pp. 279-286

LuckyAgent2022: A Stop-Learning Multi-Armed Bandit Automated Negotiating Agent

( Article )

Ebrahimnezhad A., Nassiri mofakham, F.

Opportunistic vehicular communication: Challenges and solutions

( Article . )

Bohlooli, A.
pp. 83-121

QUETRA: A queuing theory approach to DASH rate adaptation

( Article )

Yadav, Praveen Kumar, Shafiei, A., Ooi, Wei Tsang

RDF: Reconfigurable Dataflow

( Article )

Fradet, Pascal, Girault, Alain, Krishnaswamy, Ruby, Nicollin, Xavier, Shafiei, A.

Secure scan-based design using Blum Blum Shub algorithm

( Article )

Koopahi E., Etemadi borujeni, S.
...