Winter 2022, Volume 8 - Number 1 Ranking A (Azad University)
-
Writer : Nasar Amini Jeloudarlou، Somayyeh ؛ Faryabi، Mohamad ؛ Bafandeh Zendeh، Alireza ؛ Corresponding Author : Aali، Samad ؛
(18 page(s) - From 1 to 18 )
Keywords:hotel industrycustomer experienceRelationship life cycleServicescape
-
Writer : Abbasi، Pourya ؛ Corresponding Author : Radfar، Reza ؛
(18 page(s) - From 19 to 36 )
Keywords:System DynamicsTechnological Innovation PerformanceR&D EcosystemR&D EcosystemOpen R&DOpen R&D
-
Writer : Keshavarz، Sirous ؛ Abdolbaghi Ataabadi، Abdolmajid ؛ Arman، Mohammad Hossein ؛ Corresponding Author : Vaziri Sereshk، Majid ؛
(14 page(s) - From 37 to 50 )
Keywords:riskPerformancereturnTechnical IndicatorsTrading Strategies
-
Writer : Mohammadi، Hamid Reza ؛ Corresponding Author : Ehtesham Rasi، Reza ؛
(21 page(s) - From 51 to 71 )
Keywords:MetaheuristicSupply chainLocation-routingDeteriorating Products
-
Writer : Saharkhiz Roshandel، Faeqheh ؛ Adab، Hossein ؛ Corresponding Author : Haghighat Monfared، Jalal ؛
(15 page(s) - From 73 to 87 )
Keywords:HospitalAgile EvaluationStability Balanced ScorecardHealth Care Institute
-
Writer : Mohtadi، Reza ؛ Rousta، Alireza ؛ Albo Naeimi، Ebrahim ؛ Corresponding Author : Naami، Abdulah ؛
(21 page(s) - From 89 to 109 )
Keywords:MarketingWind TurbineRenewable EnergyFuzzy inferenceInternational Marketing Management
-
Writer : Mahdavi، Maryam ؛ Hassan Moradi، Narges ؛ Shukri، Narges ؛ Corresponding Author : Sheikh al‐Islami، Nader ؛
(16 page(s) - From 111 to 126 )
Keywords:Islamic Azad UniversityIndigenous modelPeople Capability Maturity Model (PCMM)management of faculty members
-
Writer : Malek shirabadi، Farzad ؛ Kabaran Zad Ghadim، Mohammad Reza ؛ Corresponding Author : Karimi zand، Mehdi ؛
(18 page(s) - From 127 to 144 )
Keywords:grounded theoryMarketing intelligenceDigital marketingISACO CompanyPromotional activities
-
Corresponding Author : Tamjidyamcholo، Alireza ؛ Writer : Toloie Eshlaghy، Abbas ؛
(21 page(s) - From 145 to 165 )
Keywords:qualitativeRisk analysisRisk assessmentInformation Securitysubjectivity