On behalf of the editorial board and all of the colleagues, we are pleased to announce the launching of the first International Journal of Computer Engineering and Technology and to make it available to those who are interested in the fields of technology.

The Journal of Advances in Computer Engineering and Technology (JACET), Abbreviated as J ADV COMP ENG TECHNOL, is an international, quarterly, peer-reviewed, libre open access (), scientific research journal published in Science and Research Branch, Islamic Azad University that aims to disseminate achievements in original research and developments, while featuring new break-troughs in the field of Computer Engineering and Technology.

We are honored for the opportunity to do our best to provide a platform for distinguished researchers, scholars, and experts to participate in scientific exchanges with their national and international peers, and share the latest accomplishments with fellow researchers, whereby disseminating the knowledge gained from their technical endeavors.

This journal is open access and all available content and materials on it are available for free under a Creative Commons Attribution 4.0 International License. (CC BY 4.0).

At the end, we would like to use this opportunity to thank once again the respectable editorial board members, the Computer Engineering Department of Science and Research Branch, and the esteemed reviewers. We hope that our collective efforts stimulate further progress in this domain of activity with strong determination at both national and international levels.

*Publication process of manuscripts submitted to JACET is free of charge. 

Pattern Analysis and Intelligent Systems
1. Hybridization of Facial Features and Use of Multi Modal Information for 3D Face Recognition

Nita M Thakare

Volume 6, Issue 1 , Winter 2020, Pages 1-8

Abstract
  Despite of achieving good performance in controlled environment, the conventional 3D face recognition systems still encounter problems in handling the large variations in lighting conditions, facial expression and head pose The humans use the hybrid approach to recognize faces and therefore in this proposed ...  Read More

Computer Networks and Distributed Systems
2. A Detailed Exploration of Usability Statistics and Application Rating Based on Wireless Protocols

Abbas Ali Khan; Dr. Mohammad Hanif Ali; Dr. A. K. M. Fazlul Haque; Chandan Debnath; DR. Md. Ismail Jabiullah

Volume 6, Issue 1 , Winter 2020, Pages 9-18

Abstract
  A Detailed Exploration of usability statistics and Application Rating on short-range Wireless protocols Bluetooth (IEEE 802.15.1), ZigBee (IEEE 802.15.4), Wi-Fi (IEEE 802.11) and NFC (ISO/IEC 14443) has been performed that being representing of those prominent wireless protocols evaluating their main ...  Read More

Pattern Analysis and Intelligent Systems
3. A Novel Fuzzy-C Means Image Segmentation Model for MRI Brain Tumor Diagnosis

Aref Safari; Danial Barazandeh; Seyed Ali Khalegh Pour

Volume 6, Issue 1 , Winter 2020, Pages 19-24

Abstract
  Accurate segmentation of brain tumor plays a key role in the diagnosis of brain tumor. Preset and precise diagnosis of Magnetic Resonance Imaging (MRI) brain tumor is enormously significant for medical analysis. During the last years many methods have been proposed. In this research, a novel fuzzy approach ...  Read More

Computer Networks and Distributed Systems
4. SMART ROOM CARBON MONOXIDE MONITORING AND CONTROL SYSTEM

Bello Kontagora Nuhu; Olayemi Olaniyi; Dauda Aji Idris; Chinedu Onyema

Volume 6, Issue 1 , Winter 2020, Pages 25-32

Abstract
  Carbon Monoxide (CO) is the most abundant air pollutant gas and accumulates rapidly to dangerous concentrations even in areas that seem to be well ventilated. Carbon monoxide detectors/alarm systems exist but people who are old, hearing impaired, partially sighted or heavy sleepers may not get the warning ...  Read More

5. The Kinematic Analysis Of Four Degrees Of Freedom For A Medical Robot And Control It By Labview And Arduino Mega2560 (Simulation And Implementation)

fatima ali habqa

Volume 6, Issue 1 , Winter 2020, Pages 33-38

Abstract
  ABSRACTThis study presents the kinematic analysis of a four-degree freedom medical robotic arm using the Matlab and the robotic-tool, the arm was designed using a solid work program, As well as details of the control of the real design of this arm using Arduino Mega 2560, The specialist enters the position ...  Read More

6. Document Analysis And Classification Based On Passing Window

ZAHER AHMED BAMASOOD

Volume 6, Issue 1 , Winter 2020, Pages 39-46

Abstract
  In this paper we present Document analysis and classification system to segment and classify contents of Arabic document images. This system includes preprocessing, document segmentation, feature extraction and document classification. A document image is enhanced in the preprocessing by removing noise, ...  Read More

Computer Networks and Distributed Systems
1. P2P Network Trust Management Survey

Seyed Hossein Ahmadpanah; Rozita Jamili Oskouei; Abdullah Jafari Chashmi

Volume 3, Issue 2 , Spring 2017, , Pages 89-106

Abstract
  Peer-to-peer applications (P2P) are no longer limited to home users, and start being accepted in academic and corporate environments. While file sharing and instant messaging applications are the most traditional examples, they are no longer the only ones benefiting from the potential advantages of P2P ...  Read More

Computer Networks and Distributed Systems
2. TASA: A New Task Scheduling Algorithm in Cloud Computing

Somayeh Taherian Dehkordi; Vahid Khatibi Bardsiri

Volume 1, Issue 4 , Autumn 2015, , Pages 25-32

Abstract
  Cloud computing refers to services that run in a distributed network and are accessible through common internet protocols. It merges a lot of physical resources and offers them to users as services according to service level agreement. Therefore, resource management alongside with task scheduling has ...  Read More

Computer Networks and Distributed Systems
3. Optimization Task Scheduling Algorithm in Cloud Computing

Somayeh Taherian Dehkordi; Vahid Khatibi Bardsiri

Volume 1, Issue 3 , Summer 2015, , Pages 17-22

Abstract
  Since software systems play an important role in applications more than ever, the security has become one of the most important indicators of softwares.Cloud computing refers to services that run in a distributed network and are accessible through common internet protocols. Presenting a proper scheduling ...  Read More

4. A fault tolerance routing protocol considering defined reliability and energy consumption in wireless sensor networks

Hamid Hassan Kashi; Amir Masoud Rahamni; Mehdi Hoseinzadeh; Vahid Sadatpour

Volume 1, Issue 1 , Winter 2015, , Pages 1-8

Abstract
  In wireless sensor networks, optimal consumptionof energy and having maximum life time are important factors. In this article attempt has been made to send the data packets with particular reliability from the beginning based on AODV protocol. In this way two new fields add to the routing packets and ...  Read More

Pattern Analysis and Intelligent Systems
5. An Improved Imperialist Competitive Algorithm based on a new assimilation strategy

Seyed Mojtaba Saif

Volume 2, Issue 2 , Spring 2016, , Pages 23-32

Abstract
  Meta-heuristic algorithms inspired by the natural processes are part of the optimization algorithms that they have been considered in recent years, such as genetic algorithm, particle swarm optimization, ant colony optimization, Firefly algorithm. Recently, a new kind of evolutionary algorithm has been ...  Read More

1. Routing Hole Handling Techniques for Wireless Sensor Networks: A Review

Swathi B H; Gururaj H L

Articles in Press, Accepted Manuscript, Available Online from 12 January 2020

Abstract
  A Wireless Sensor Network consists of several tiny devices which have the capability to sense and compute the environmental phenomenon. These sensor nodes are deployed in remote areas without any physical protections. A Wireless Sensor Network can have various types of anomalies due to some random deployment ...  Read More

Computer Networks and Distributed Systems
2. Detecting Bot Networks Based On HTTP And TLS Traffic Analysis

Zahra Nafarieh

Articles in Press, Accepted Manuscript, Available Online from 28 February 2020

Abstract
  Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer to ...  Read More

Publisher:
Science and Research Branch,Islamic Azad University

Director-in-Charge:
  Prof. Amir Masoud Rahmani

Editor-in-Chief:
  Prof. Ahmad Khademzadeh

Executive Manager:
  Mehdi Rasouli, M.A


Print ISSN: 2423-4192

Online ISSN: 2423-4206

Indexing and Abstracting

Google scholar

ISSN Road

DOAJ

ISC

Civilica

...

Committee on Publication Ethics (COPE)

This journal is following of Committee on Publication Ethics (COPE) and complies with the
highest ethical standards in accordance with ethical laws.