List of Articles کاربران Open Access Article Abstract Page Full-Text 1 - Identifying Cloned Profiles on Online Social Networks by Identifying Nodes in Overlapping Communities and User Interactions Zahra Hamzehzadeh Open Access Article Abstract Page Full-Text 2 - Discover product defect reports from the text of users' online comments narges nematifard Muharram Mansoorizadeh mahdi sakhaei nia Open Access Article Abstract Page Full-Text 3 - Criteria for evaluating the effectiveness of social media users - a framework based on social media exploration rojyar pirmohammadiani shahriyar mohammadi Open Access Article Abstract Page Full-Text 4 - Government's Civil And International Responsibility For The Damages Caused By The Internet Rasoul Malakooti Mona Khalilzadeh Open Access Article Abstract Page Full-Text 5 - Use of conditional generative adversarial network to produce synthetic data with the aim of improving the classification of users who publish fake news arefeh esmaili Saeed Farzi Open Access Article Abstract Page Full-Text 6 - User recommendation in Telegram messenger by graph analysis and mathematical modeling of users' behavior Davod Karimpour Mohammad Ali Zare Chahooki Ali Hashemi Open Access Article Abstract Page Full-Text 7 - Nastaliq CAPTCHA M. H. Shirali-Shahreza Mohammad Shirali-Shahreza Open Access Article Abstract Page Full-Text 8 - Bug Detection and Assignment for Mobile Apps via Mining Users' Reviews Maryam Younesi Abbas Heydarnoori F. Ghanadi Open Access Article Abstract Page Full-Text 9 - Server Based QoE Improvement for Streamed Video Content in Cloud Architecture seyed hassan nabavi Mohammad behdadfar Mohammad Reza noorifard Open Access Article Abstract Page Full-Text 10 - Evaluating Web Resources: Introducing a Checklist zohreh Majdabadi Open Access Article Abstract Page Full-Text 11 - A Recommender System Based on the Analysis of Personality Traits in Telegram Social Network Mohammad Javad shayegan mohadeseh valizadeh Open Access Article Abstract Page Full-Text 12 - The main components of evaluating the credibility of users according to organizational goals in the life cycle of big data Sogand Dehghan shahriyar mohammadi rojiar pirmohamadiani Open Access Article Abstract Page Full-Text 13 - Trust Management Based on User Feedback in Cloud Computing Environment by Using Cuckoo Optimization Algorithm Muqtada Soleimani Mobarake Golnaz Aghaee Babak Nikmard Open Access Article Abstract Page Full-Text 14 - The Analysis of User Reviews on Digikala with the Aim of Detecting Deceptive Opinions hosein sarlak Alireza Sheikh