About the journal
The Journal of Information Systems and Telecommunication (JIST) accepts and publishes papers containing original researches and/or development results, representing an effective and novel contribution for knowledge in the area of information systems and Telecommunication. Contributions are accepted in the form of Regular papers or Correspondence. Regular papers are the ones with a well-rounded treatment of a problem area, whereas Correspondence focus on a point of a defined problem area. Under the permission of the editorial board, other kinds of papers may be published if they are found to be relevant or of interest to the readers. Responsibility for the content of the papers rests upon the Authors only. The Journal is aimed at not only a national target community, but also international audiences is taken into consideration. For this reason, authors are supposed to write in English.
This Journal is Published under scientific support of Advanced Information Systems (AIS) Research Group and Digital & Signal Processing Group, ICTRC
For further information on Article Processing Charges (APCs) policies, please visit our APC page or contact us infojist@gmail.com.
-
Open Access Article
1 - Linearity Enhanced Noise Cancelling Low Noise Amplifier for Ultra-Wideband Application
Nileshkumar K Patel HASMUKH P KORINGAIssue 50 , Vol. 13 , Spring 2025 -
Open Access Article
2 - Optimizing Hyperparameters for Customer Churn Prediction with PSO-Enhanced Composite Deep Learning Techniques
Mohammad Sedighimanesh Ali Sedighimanesh Hessam ZandhessamiIssue 50 , Vol. 13 , Spring 2025 -
Open Access Article
3 - A Holistic Approach to Stress Identification: Integrating Questionnaires and Physiological Signals through Machine Learning
Mrunal Fatangare Hemlata OhalIssue 50 , Vol. 13 , Spring 2025 -
Open Access Article
4 - Transmission Parameter-based Demodulation in Visible Light Communications using Deep Learning
Sarah Ayashm Seyed Sadra Kashef Morteza Valizadeh Hasti AkhavanIssue 50 , Vol. 13 , Spring 2025 -
Open Access Article
5 - Designing a Hybrid Algorithm that Combines Deep Learning and PSO for Proactive Detection of Attacks in IoT Networks
Zahra Bakhshali Alireza Pourebrahimi Ahmad Ebrahimi Nazanin PilevariIssue 50 , Vol. 13 , Spring 2025 -
Open Access Article
6 - NeuroIS: a State-of- the- Art Analysis
Nahid Entezarian Mohammad MehraeenIssue 50 , Vol. 13 , Spring 2025 -
Open Access Article
7 - Credit Risk Prediction: An Application of Federated Learning
Sara Houshmand Amir albadviIssue 50 , Vol. 13 , Spring 2025
-
Open Access Article
1 - Privacy Preserving Big Data Mining: Association Rule Hiding
Golnar Assadat Afzali shahriyar mohammadiIssue 14 , Vol. 4 , Spring 2016 -
Open Access Article
2 - Node Classification in Social Network by Distributed Learning Automata
Ahmad Rahnama Zadeh meybodi meybodi Masoud Taheri KadkhodaIssue 18 , Vol. 5 , Spring 2017 -
Open Access Article
3 - Instance Based Sparse Classifier Fusion for Speaker Verification
Mohammad Hasheminejad Hassan FarsiIssue 15 , Vol. 4 , Summer 2016 -
Open Access Article
4 - A Bio-Inspired Self-configuring Observer/ Controller for Organic Computing Systems
Ali Tarihi Hassan Haghighi Fereidoon Shams AlieeIssue 15 , Vol. 4 , Summer 2016 -
Open Access Article
5 - COGNISON: A Novel Dynamic Community Detection Algorithm in Social Network
Hamideh Sadat Cheraghchi Ali ZakerolhossieniIssue 14 , Vol. 4 , Spring 2016 -
Open Access Article
6 - A Hybrid Cuckoo Search for Direct Blockmodeling
Saeed NasehiMoghaddam mehdi ghazanfari babak teimourpourIssue 18 , Vol. 5 , Spring 2017 -
Open Access Article
7 - Publication Venue Recommendation Based on Paper’s Title and Co-authors Network
Ramin Safa Seyed Abolghassem Mirroshandel Soroush Javadi Mohammad AziziIssue 21 , Vol. 6 , Winter 2018 -
Open Access Article
8 - Representing a Model to Measure Absorbency Of Information Technology in Small And Medium Sized Enterprises
Mohammad Taghi Sadeghi Farzad Movahedi Sobhani Ali Rajabzade GhatariIssue 20 , Vol. 5 , Autumn 2017 -
Open Access Article
9 - Energy Efficient Routing-Based Clustering Protocol Using Computational Intelligence Algorithms in Sensor-Based IoT
Mohammad sedighimanesh Hessam Zandhessami Mahmood Alborzi Mohammadsadegh KhayyatianIssue 33 , Vol. 9 , Winter 2021 -
Open Access Article
10 - Using Residual Design for Key Management in Hierarchical Wireless Sensor Networks
Vahid Modiri Hamid Haj Seyyed Javadi Amir Masoud Rahmani Mohaddese AnzaniIssue 29 , Vol. 8 , Winter 2020