On behalf of the editorial board and all of the colleagues, we are pleased to announce the launching of the first International Journal of Computer Engineering and Technology and to make it available to those who are interested in the fields of technology.

The Journal of Advances in Computer Engineering and Technology (JACET), Abbreviated as J ADV COMP ENG TECHNOL, is an international, quarterly, peer-reviewed, libre open access (), scientific research journal published in Science and Research Branch, Islamic Azad University that aims to disseminate achievements in original research and developments, while featuring new break-troughs in the field of Computer Engineering and Technology.

We are honored for the opportunity to do our best to provide a platform for distinguished researchers, scholars, and experts to participate in scientific exchanges with their national and international peers, and share the latest accomplishments with fellow researchers, whereby disseminating the knowledge gained from their technical endeavors.

This journal is open access and all available content and materials on it are available for free under a Creative Commons Attribution 4.0 International License. (CC BY 4.0).

At the end, we would like to use this opportunity to thank once again the respectable editorial board members, the Computer Engineering Department of Science and Research Branch, and the esteemed reviewers. We hope that our collective efforts stimulate further progress in this domain of activity with strong determination at both national and international levels.

*Publication process of manuscripts submitted to JACET is free of charge. 

1. Routing Hole Handling Techniques for Wireless Sensor Networks: A Review

Swathi B H; Gururaj H L

Volume 6, Issue 2 , Spring 2020, Pages 47-60

Abstract
  A Wireless Sensor Network consists of several tiny devices which have the capability to sense and compute the environmental phenomenon. These sensor nodes are deployed in remote areas without any physical protections. A Wireless Sensor Network can have various types of anomalies due to some random deployment ...  Read More

Computer Networks and Distributed Systems
2. Detecting Bot Networks Based On HTTP And TLS Traffic Analysis

Zahra Nafarieh

Volume 6, Issue 2 , Spring 2020, Pages 61-70

Abstract
  Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer ...  Read More

Pattern Analysis and Intelligent Systems
3. Using a Neural Network instead of IKM in 2R Planar Robot to follow rectangular path

Ali Ahmad Ali

Volume 6, Issue 2 , Spring 2020, Pages 71-78

Abstract
  Abstract— An educational platform is presented here for the beginner students in the Simulation and Artificial Intelligence sciences. It provides with a start point of building and simulation of the manipulators, especially of 2R planar Robot. It also displays a method to replace the inverse kinematic ...  Read More

Pattern Analysis and Intelligent Systems
4. An Optimization K-Modes Clustering Algorithm with Elephant Herding Optimization Algorithm for Crime Clustering

Farhad Soleimanian Gharehchopogh; Sevda Haggi

Volume 6, Issue 2 , Spring 2020, Pages 79-90

Abstract
  The detection and prevention of crime, in the past few decades, required several years of research and analysis. However, today, thanks to smart systems based on data mining techniques, it is possible to detect and prevent crime in a considerably less time. Classification and clustering-based smart techniques ...  Read More

Computer Networks and Distributed Systems
5. A procedure for Web Service Selection Using WS-Policy Semantic Matching

Maryam Amiri Kamalabad; farhad mardukhi; naser Nematbakhsh

Volume 6, Issue 2 , Spring 2020, Pages 91-106

Abstract
  In general, Policy-based approaches play an important role in the management of web services, for instance, in the choice of semantic web service and quality of services (QoS) in particular. The present research work illustrates a procedure for the web service selection among functionality similar web ...  Read More

Pattern Analysis and Intelligent Systems
6. Prediction of Student Learning Styles using Data Mining Techniques

Esther N Khakata; Vincent Oteke Omwenga; Simon S. Msanjila

Volume 6, Issue 2 , Spring 2020, Pages 107-118

Abstract
  This paper focuses on the prediction of student learning styles using data mining techniques within their institutions. This prediction was aimed at finding out how different learning styles are achieved within learning environments which are specifically influenced by already existing factors. These ...  Read More

Computer Networks and Distributed Systems
1. P2P Network Trust Management Survey

Seyed Hossein Ahmadpanah; Rozita Jamili Oskouei; Abdullah Jafari Chashmi

Volume 3, Issue 2 , Spring 2017, , Pages 89-106

Abstract
  Peer-to-peer applications (P2P) are no longer limited to home users, and start being accepted in academic and corporate environments. While file sharing and instant messaging applications are the most traditional examples, they are no longer the only ones benefiting from the potential advantages of P2P ...  Read More

Computer Networks and Distributed Systems
2. TASA: A New Task Scheduling Algorithm in Cloud Computing

Somayeh Taherian Dehkordi; Vahid Khatibi Bardsiri

Volume 1, Issue 4 , Autumn 2015, , Pages 25-32

Abstract
  Cloud computing refers to services that run in a distributed network and are accessible through common internet protocols. It merges a lot of physical resources and offers them to users as services according to service level agreement. Therefore, resource management alongside with task scheduling has ...  Read More

Computer Networks and Distributed Systems
3. Optimization Task Scheduling Algorithm in Cloud Computing

Somayeh Taherian Dehkordi; Vahid Khatibi Bardsiri

Volume 1, Issue 3 , Summer 2015, , Pages 17-22

Abstract
  Since software systems play an important role in applications more than ever, the security has become one of the most important indicators of softwares.Cloud computing refers to services that run in a distributed network and are accessible through common internet protocols. Presenting a proper scheduling ...  Read More

4. A fault tolerance routing protocol considering defined reliability and energy consumption in wireless sensor networks

Hamid Hassan Kashi; Amir Masoud Rahamni; Mehdi Hoseinzadeh; Vahid Sadatpour

Volume 1, Issue 1 , Winter 2015, , Pages 1-8

Abstract
  In wireless sensor networks, optimal consumptionof energy and having maximum life time are important factors. In this article attempt has been made to send the data packets with particular reliability from the beginning based on AODV protocol. In this way two new fields add to the routing packets and ...  Read More

Pattern Analysis and Intelligent Systems
5. An Improved Imperialist Competitive Algorithm based on a new assimilation strategy

Seyed Mojtaba Saif

Volume 2, Issue 2 , Spring 2016, , Pages 23-32

Abstract
  Meta-heuristic algorithms inspired by the natural processes are part of the optimization algorithms that they have been considered in recent years, such as genetic algorithm, particle swarm optimization, ant colony optimization, Firefly algorithm. Recently, a new kind of evolutionary algorithm has been ...  Read More

Pattern Analysis and Intelligent Systems
1. An Improved Bat Algorithm with Grey Wolf Optimizer for Solving Continuous Optimization Problems

narges jafari; Farhad Soleimanian Gharehchopogh

Articles in Press, Accepted Manuscript, Available Online from 03 June 2020

Abstract
  Metaheuristic algorithms are used to solve NP-hard optimization problems. These algorithms have two main components, i.e. exploration and exploitation, and try to strike a balance between exploration and exploitation to achieve the best possible near-optimal solution. The bat algorithm is one of the ...  Read More

Computer Networks and Distributed Systems
2. An Improved Junction-Based Directional Routing Protocol (IJDRP) for VANETs

Bharat Mahaur; Aishwarya Gupta

Articles in Press, Accepted Manuscript, Available Online from 15 July 2020

Abstract
  Vehicular Ad-Hoc Networks (VANETs) is a novel technology that has recently emerged and due to its swift changing topology and high mobility nature, it has become problematic to design an efficient routing protocol in VANETs’ amongst both moving and stationary units. Also, the existing routing algorithms ...  Read More

Computer Networks and Distributed Systems
3. A Method for Measuring Energy Consumption in IaaS Cloud

Derdus Kenga; Vincent Oteke Omwenga; Patrick Job Ogao

Articles in Press, Accepted Manuscript, Available Online from 25 July 2020

Abstract
  The ability to measure the energy consumed by cloud infrastructure is a crucial step towards the development of energy efficiency policies in the cloud infrastructure. There are hardware-based and software-based methods of measuring energy usage in cloud infrastructure. However, most hardware-based energy ...  Read More

Computer Networks and Distributed Systems
4. An Effective Task Scheduling Framework for Cloud Computing using NSGA-II

Hanieh Ghorashi; Meghdad Mirabi

Articles in Press, Accepted Manuscript, Available Online from 05 August 2020

Abstract
  Cloud computing is a model for convenient on-demand user’s access to changeable and configurable computing resources such as networks, servers, storage, applications, and services with minimal management of resources and service provider interaction. Task scheduling is regarded as a fundamental issue ...  Read More

Software Engineering and Information Systems
5. An Effective Path-aware Approach for Keyword Search over Data Graphs

Asieh Ghanbarpour; Hassan Naderi; Soheil ZareMotlagh

Articles in Press, Accepted Manuscript, Available Online from 14 August 2020

Abstract
  Abstract—Keyword Search is known as a user-friendly alternative for structured languages to retrieve information from graph-structured data. Efficient retrieving of relevant answers to a keyword query and effective ranking of these answers according to their relevance are two main challenges in the ...  Read More

Software Engineering and Information Systems
6. Design Software Failure Mode and Effect Analysis using Fuzzy TOPSIS Based on Fuzzy Entropy

shahrzad Oveisi; Mohammad Nadjafi; Mohammad Ali Farsi; Ali moeini; Mahmood Shabankhah

Articles in Press, Accepted Manuscript, Available Online from 18 August 2020

Abstract
  One of the key pillars of any operating system is its proper software performance. Software failure can have dangerous effects and consequences and can lead to adverse and undesirable events in the design or use phases. The goal of this study is to identify and evaluate the most significant software ...  Read More

Publisher:
Science and Research Branch,Islamic Azad University

Director-in-Charge:
  Prof. Amir Masoud Rahmani

Editor-in-Chief:
  Prof. Ahmad Khademzadeh

Executive Manager:
  Mehdi Rasouli, M.A


Print ISSN: 2423-4192

Online ISSN: 2423-4206

Indexing and Abstracting

Google scholar

ISSN Road

DOAJ

ISC

Civilica

...

Committee on Publication Ethics (COPE)

This journal is following of Committee on Publication Ethics (COPE) and complies with the
highest ethical standards in accordance with ethical laws.