Background

گروه مهندسی معماری‌کامپیوتر


گروه آموزشی مهندسی معماری کامپیوتر یکی از مراکز پیشرو در آموزش و پژوهش در زمینه‌ی مهندسی معماری کامپیوتر است. با بهره‌گیری از اساتید مجرب، امکانات مدرن و تمرکز بر نوآوری، دانشجویان را برای موفقیت در مسیر علمی و حرفه‌ای آماده می‌کنیم. به ما بپیوندید و بخشی از جامعه‌ای پویا باشید که آینده را شکل می‌دهد.

برونداد‌های پژوهشی

168

همه موارد

165

مقالات

3

کتاب

مرتب سازی بر اساس:
مقالات لاتین

Cryptography by pseudo random number generator

( Article )

Etemadi borujeni, S.

Distributed Rule Anomaly Detection in SDN-based IoT

( Article . )

Kiani, R., Bohlooli, A.

Embedded Speech Encoder for Low-resource Languages

( Article . )

Tabatabaei, A.A., Sameti, P., Bohlooli, A.
pp. 287-292

EOpR: An opportunistic routing algorithm for ad-hoc networks

( Article . )

Shabani, S., Moghim, N., Bohlooli, A.
pp. 268-272

Fast Fourier transform speech scrambler

( Article )

Ehsani, M.S., Etemadi borujeni, S.

Hybrid Naming Scheme Based PURSUIT Architecture for Smart City

( Article . )

Javaheri, A., Hashemi, S.N.S., Bohlooli, A.
pp. 33-38

Opportunistic vehicular communication: Challenges and solutions

( Article . )

Bohlooli, A.
pp. 83-121

Secure scan-based design using Blum Blum Shub algorithm

( Article )

Koopahi E., Etemadi borujeni, S.
2000

New implementation technique for memory management

( Article )

Rezaei, M., Kavi, K.
Conference Proceedings - IEEE SOUTHEASTCON (07347502)pp. 332-339

Speech encryption based on fast Fourier transform permutation

( Article )

Etemadi borujeni, S.
2002

Ultrasonic underwater depth measurement

( Article )

Etemadi borujeni, S.
Underwater Technology (17560543)
2003

A new identification model for power system transfer functions

( Article . )

Khodabakhshian, A., Jamshidi, K.
Electric Power Components and Systems (15325016)31(5)pp. 513-524

Utilization of Separate Caches to Eliminate Cache Pollution Caused by Memory Management Functions

( Article )

Rezaei, M., Kavi, K.
pp. 297-302
2004

Improving data cache performance with integrated use of split caches, victim cache and stream buffers

( Article . )

Naz, A., Rezaei, M., Kavi, K., Sweany, P.
pp. 41-48
2005

Making a case for split data caches for embedded applications

( Article . )

Naz, A., Kavi, K., Rezaei, M., Li, W.
pp. 19-26
2006

A topological approach to present input data to perceptron neural network for passing in middle size robot soccer

( Article )

Rasti, J., Movahhedinia, N., Jamshidi, K.
Annals of DAAAM and Proceedings of the International DAAAM Symposium (17269679)pp. 345-346

Intelligent memory manager: Reducing cache pollution due to memory management functions

( Article . )

Rezaei, M., Kavi, K.
Journal of Systems Architecture (13837621)52(1)pp. 41-55
2007

Feasibility of decoupling memory management from the execution pipeline

( Article . )

Li, W., Rezaei, M., Kavi, K., Naz, A., Sweany, P.
Journal of Systems Architecture (13837621)53(12)pp. 927-936
2008

A routing metric for load balancing considering energy and delay constraints in wireless sensor networks

( Article . )

Dehghani, A., Jamshidi, K., Mirshams, S., Rahimizadeh, K.
pp. 745-750

Traffic signal timing using two-dimensional correlation, neuro-fuzzy and queuing based neural networks

( Article . )

Kaedi, M., Movahhedinia, N., Jamshidi, K.
Neural Computing And Applications (09410643)17(2)pp. 193-200
2009

Chaotic image encryption design using tompkins-paige algorithm

( Article )

Etemadi borujeni, S., Eshghi, M.
Mathematical Problems in Engineering (15635147)

Data reduction using clustering method in wireless sensor network

( Article . )

Mirshams, S., Jamshidi, K., Bohlooli, A., Dehghani, A.

Defect detection of tiles using 2D-wavelet transform and statistical features

( Article )

Ghazvini, M., Monadjemi, A., Movahhedinia, N., Jamshidi, K.
World Academy of Science, Engineering and Technology (20103778)37pp. 901-904

Proposing an optimal model for localization in query based wireless sensor networks

( Article . )

Bohlooli, H., Jamshidi, K., Bohlooli, A.
pp. 50-55
2010

Increasing WSN lifetime by using learning automata for optimal route selection

( Article . )

Hajian, E., Jamshidi, K., Bohlooli, A.
1

Scheduling algorithms in wireless mesh networks: A review

( Article . )

Ghazvini, M., Movahedinia, N., Jamshidi, K.
1pp. 86-90
2011

A distributed verification scheme for encrypted data aggregation in wireless sensor networks

( Article . )

Baratchi, M., Jamshidi, K.
pp. 210-215

Cell number optimization for quantum cellular automata based on genetic algorithm

( Article . )

Beiki, Z., Soryani, M., Mirzakuchaki, S.
3pp. 370-373

کتاب ها

فناوری دوقلوی دیجیتال پیشران صنایع ایران پنجره‌ای به آینده

(تالیف)
میثم اللهی رودپشتی و علی بهلولی
تهران - گسترش علوم پایه 1401

شبیه‌سازی کامپیوتری به روش مونت کارلو

(تالیف)
علی بهلولی و مرجان کائدی
اصفهان - جهاد دانشگاهی، واحد اصفهان 1394
...