لیست مقالاتی که تاکنون به صورت سخنرانی مورد پذیرش قرار گرفته اند
مقالات پذیرش شده به صورت سخنرانی
قابل توجه شرکت کنندگان در کنفرانس
لیست مقالاتی که تاکنون به صورت سخنرانی مورد پذیرش قرار گرفته اند به شرح زیر است.
لیست مقالاتی که تاکنون به صورت سخنرانی مورد پذیرش قرار گرفته اند به شرح زیر است.
ردیف | نام و نام خانوادگی | عنوان مقاله | موضوع | نامه پذیرش |
1 | Seyedehroghayeh Adhami | درباره سرشتهای دقیق | Computational Group Theory | Download |
2 | Rasoul Hatamian | On the ABSOLUTE CENTER and AUTOCOMMUTATOR SUBGROUP of a GROUP | Computational Group Theory | Download |
3 | Behnam Razzaghmaneshi | Conjugacy Class Representatives for Group | Computational Group Theory | Download |
4 | Zeinab Mehranian | A Note on the Power Graph of some Finite Groups and their Automorphism Groups | Computational Group Theory | Download |
5 | Somayeh Didari | A Sharp Bound for a Specific Family of Elliptic Curves | Computational Number Theory | Download |
6 | Elham Ghasemian | Some lower bounds for summation of absolute value of skew-eigenvalues of some graphs | Computational Group Theory | Download |
7 | Mohammad Gholami | Security of Dual Generalized Rebalanced-RSA | Applications (Algebraic Cryptography, Coding Theory, Algebraic Combinatorics, Signal Processing and Polynomial Factorization) | Download |
8 | Mardjan Hakimi-nezhaad | On Normalized Laplacian Sp ectral Distances of Graphs | Applications (Algebraic Cryptography, Coding Theory, Algebraic Combinatorics, Signal Processing and Polynomial Factorization) | Download |
9 | Nader Habibi | A note on difference between revised Szeged and Szeged index | Applications (Algebraic Cryptography, Coding Theory, Algebraic Combinatorics, Signal Processing and Polynomial Factorization) | Download |
10 | Sara Shokrolahi Yancheshmeh | COMPUTATION of the TOPOLOGICAL INDICES of the MOBIUS LADDER GRAPH | Computational Group Theory | Download |
11 | Maryam Sheikhi-garjan | Secret Sharing Based on Elliptic Curves | Applications (Algebraic Cryptography, Coding Theory, Algebraic Combinatorics, Signal Processing and Polynomial Factorization) | Download |
12 | Asiyeh Rafieipour | On a Class of Linear Codes | Applications (Algebraic Cryptography, Coding Theory, Algebraic Combinatorics, Signal Processing and Polynomial Factorization) | Download |
13 | Seyed Hassan Alavi | FINITE SEMI-RATIONAL GROUPS: SOLVABLE and NON-SOVABLE | Computational Group Theory | Download |
14 | Zahra Yarahmadi | Some results on a new comaximal graph of commutative rings | Applications (Algebraic Cryptography, Coding Theory, Algebraic Combinatorics, Signal Processing and Polynomial Factorization) | Download |
15 | Hamid Dorbidi | The GROUPS WITH FEW END VERTICES IN THEIR COPRIME GRAPHS | Computational Group Theory | Download |
16 | Soleyman Asgary | ON THE GROUPS WITH THE SAME NSE | Computational Group Theory | Download |
17 | Bahareh Asadian | Recognition of some Symmetric groups by nse | Computational Group Theory | Download |
18 | Mohammad Hamidi | On computing of fundamental groups | Computer Algebra | Download |
19 | Mehdi Shams | آزمون های فرضیه بهینه از دیدگاه آنتروپی نسبی | Information Theory | Download |
20 | Hamid Damadi | On Lattice Basis Ideals of Digraphs | Applications (Algebraic Cryptography, Coding Theory, Algebraic Combinatorics, Signal Processing and Polynomial Factorization) | Download |
21 | Massomeh Yazdany Moghaddam | A note on the Capacity of Some Gaussian Channels | Information Theory | Download |
22 | Rezvan Rezaei | Simple Mean-field approximations for the restricted solid-on-solid growth models | Computational Number Theory | Download |
23 | Danial Khoshnevis | Some Properties of Graph Related to Conjugacy Classes of Special Linear Group SLn(F) | Computational Group Theory | Download |
24 | Saeed Mirvakili | On enumeration of $M$-polysymmetrical hypergroups of order less than 6 | Computational Group Theory | Download |
25 | Maryam Jalali-rad | Products of Conjugacy Classes in Finite Groups | Computational Group Theory | Download |
26 | Amir Loghman | Replacement product of two cayley graphs | Download | |
27 | Reza Kaboli | بیتکوین: همه چیز از هیچ | Applications (Algebraic Cryptography, Coding Theory, Algebraic Combinatorics, Signal Processing and Polynomial Factorization) | Download |
28 | Alimohammad Nazari | مقادیر ویژه گراف خط و انرژی خط شبه کاترپیلارها | Applications (Algebraic Cryptography, Coding Theory, Algebraic Combinatorics, Signal Processing and Polynomial Factorization) | Download |
29 | Mehdi Hassani | Zeros of the Riemann zeta function and explicit approximations of the prime numbers |
Download |
Your Comment :