List of Articles Check Open Access Article Abstract Page Full-Text 1 - Environmental Security Evaluation Using Space Syntax Theory and Place-Check Technique; Case Study: Saraseyb Neighborhood Mehdi Mirmini Samaneh Jalili Sadrabad Open Access Article Abstract Page Full-Text 2 - A New Method for Transformation Techniques in Secure Information Systems Hojatallah Hamidi 10.7508/jist.2016.01.003 Open Access Article Abstract Page Full-Text 3 - Reliable resource allocation and fault tolerance in mobile cloud computing Zahra Najafabadi Samani Mohammad Reza Khayyam Bashi 10.7508/jist.2019.02.002 Open Access Article Abstract Page Full-Text 4 - A New Method for Short Block Length LDPC Code Design M. Taki M. B. Nezafati Open Access Article Abstract Page Full-Text 5 - Parity Check Matrix Estimation of k/n Convolutional Coding in Noisy Environment Based on Walsh-Hadamard Transform Mohammad khaksar H. Khaleghi Bizaki Open Access Article Abstract Page Full-Text 6 - A New Heuristic for Deadlock Detection in Safety Analysis of Software Systems عین الله پیرا Open Access Article Abstract Page Full-Text 7 - Evaluating Web Resources: Introducing a Checklist zohreh Majdabadi Open Access Article Abstract Page Full-Text 8 - The Rule for Resolving Conflicts Regarding Checks and Promissory Notes is Derived from the Domestic Legal Sources of the Country Zeynab Faraji