Computer Networks and Distributed Systems
1. A Method for Measuring Energy Consumption in IaaS Cloud

Derdus Kenga; Vincent Oteke Omwenga; Patrick Job Ogao

Articles in Press, Accepted Manuscript, Available Online from 25 July 2020

Abstract
  The ability to measure the energy consumed by cloud infrastructure is a crucial step towards the development of energy efficiency policies in the cloud infrastructure. There are hardware-based and software-based methods of measuring energy usage in cloud infrastructure. However, most hardware-based energy ...  Read More

Computer Networks and Distributed Systems
2. An Effective Task Scheduling Framework for Cloud Computing using NSGA-II

Hanieh Ghorashi; Meghdad Mirabi

Articles in Press, Accepted Manuscript, Available Online from 05 August 2020

Abstract
  Cloud computing is a model for convenient on-demand user’s access to changeable and configurable computing resources such as networks, servers, storage, applications, and services with minimal management of resources and service provider interaction. Task scheduling is regarded as a fundamental issue ...  Read More

Computer Networks and Distributed Systems
3. An Improved Junction-Based Directional Routing Protocol (IJDRP) for VANETs

Bharat Mahaur; Aishwarya Gupta

Articles in Press, Accepted Manuscript, Available Online from 15 July 2020

Abstract
  Vehicular Ad-Hoc Networks (VANETs) is a novel technology that has recently emerged and due to its swift changing topology and high mobility nature, it has become problematic to design an efficient routing protocol in VANETs’ amongst both moving and stationary units. Also, the existing routing algorithms ...  Read More

Computer Networks and Distributed Systems
4. A procedure for Web Service Selection Using WS-Policy Semantic Matching

Maryam Amiri Kamalabad; farhad mardukhi; naser Nematbakhsh

Volume 6, Issue 2 , Spring 2020, , Pages 91-106

Abstract
  In general, Policy-based approaches play an important role in the management of web services, for instance, in the choice of semantic web service and quality of services (QoS) in particular. The present research work illustrates a procedure for the web service selection among functionality similar web ...  Read More

Computer Networks and Distributed Systems
5. Detecting Bot Networks Based On HTTP And TLS Traffic Analysis

Zahra Nafarieh

Volume 6, Issue 2 , Spring 2020, , Pages 61-70

Abstract
  Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer ...  Read More

Computer Networks and Distributed Systems
6. SMART ROOM CARBON MONOXIDE MONITORING AND CONTROL SYSTEM

Bello Kontagora Nuhu; Olayemi Olaniyi; Dauda Aji Idris; Chinedu Onyema

Volume 6, Issue 1 , Winter 2020, , Pages 25-32

Abstract
  Carbon Monoxide (CO) is the most abundant air pollutant gas and accumulates rapidly to dangerous concentrations even in areas that seem to be well ventilated. Carbon monoxide detectors/alarm systems exist but people who are old, hearing impaired, partially sighted or heavy sleepers may not get the warning ...  Read More

Computer Networks and Distributed Systems
7. A Detailed Exploration of Usability Statistics and Application Rating Based on Wireless Protocols

Abbas Ali Khan; Dr. Mohammad Hanif Ali; Dr. A. K. M. Fazlul Haque; Chandan Debnath; DR. Md. Ismail Jabiullah

Volume 6, Issue 1 , Winter 2020, , Pages 9-18

Abstract
  A Detailed Exploration of usability statistics and Application Rating on short-range Wireless protocols Bluetooth (IEEE 802.15.1), ZigBee (IEEE 802.15.4), Wi-Fi (IEEE 802.11) and NFC (ISO/IEC 14443) has been performed that being representing of those prominent wireless protocols evaluating their main ...  Read More

Computer Networks and Distributed Systems
8. Detecting Active Bot Networks Based on DNS Traffic Analysis

Zahra Nafarieh; Ebrahim Mahdipur; Haj Hamid Haj Seyed Javadi

Volume 5, Issue 3 , Summer 2019, , Pages 129-142

Abstract
  Abstract—One of the serious threats to cyberspace is the Bot networks or Botnets. Bots are malicious software that acts as a network and allows hackers to remotely manage and control infected computer victims. Given the fact that DNS is one of the most common protocols in the network and is essential ...  Read More

Computer Networks and Distributed Systems
9. The Optimal MMSE Transceiver Design for IoT-oriented Cognitive Radio Systems

Nguyen-Duy-Nhat Vien; Tri Ngo Minh; Thanh Vu Van

Volume 5, Issue 3 , Summer 2019, , Pages 161-168

Abstract
  This paper studies interference alignment scheme and minimum mean square error (MMSE) improvement in Internet of Things (IoT)-oriented cognitive systems, where IoT devices share the licensed spectrum by cognitive radio in spectrum underlay. Target to manage the inter-tier interference caused by cognitive ...  Read More

Computer Networks and Distributed Systems
10. IMPACTS AND CHALLENGES OF CLOUD COMPUTING FOR SMALL AND MEDIUM SCALE BUSINESSES IN NIGERIA

Scholastica Nwanneka Mallo; Francisca Nonyelum Ogwueleka

Volume 5, Issue 3 , Summer 2019, , Pages 169-180

Abstract
  Cloud computing technology is providing businesses, be it micro, small, medium, and large scale enterprises with the same level playing grounds. Small and Medium enterprises (SMEs) that have adopted the cloud are taking their businesses to greater heights with the competitive edge that cloud computing ...  Read More

Computer Networks and Distributed Systems
11. 2016 Olympic Games on Twitter: Sentiment Analysis of Sports Fans Tweets using Big Data Framework

Azam Seilsepour; Reza Ravanmehr; Hamid Reza Sima

Volume 5, Issue 3 , Summer 2019, , Pages 143-160

Abstract
  Big data analytics is one of the most important subjects in computer science. Today, due to the increasing expansion of Web technology, a large amount of data is available to researchers. Extracting information from these data is one of the requirements for many organizations and business centers. In ...  Read More

Computer Networks and Distributed Systems
12. Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines

Olayemi Mikail Olaniyi; Ameh Innocent Ameh; Lukman Adewale Ajao; Omolara Ramota Lawal

Volume 5, Issue 2 , Spring 2019, , Pages 107-116

Abstract
  Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s ...  Read More

Computer Networks and Distributed Systems
13. A Novel Trust Management Model in the Social Internet of Things

Gholamhossein Ekbatanifard; Omid Yousefi

Volume 5, Issue 2 , Spring 2019, , Pages 57-70

Abstract
  The Internet of Things (IoT) and social networking integration, create a new concept named Social Internet of Things (SIoT) according to which the things are able to autonomously establish social relationships with regard to the owners. Things in SIoT operate according to a service-oriented architecture. ...  Read More

Computer Networks and Distributed Systems
14. A Reliable Routing Algorithm for Delay Sensitive Data in Body Area Networks

Mojgan ShariatmadariSerkani; Javad Mohammadzadeh; Mahdi Motalebi

Volume 4, Issue 4 , Autumn 2018, , Pages 229-236

Abstract
  Wireless body Area networks (WBANs) include a number of sensor nodes placed inside or on the human body to improve patient health and quality of life. Ensuring the transfer and receipt of data in sensitive data is a very important issue. Routing algorithms should support a variety of service quality ...  Read More

Computer Networks and Distributed Systems
15. Network Investigation and Performance Analysis of ZigBee Technology using OPNET

Ojo Jayeola Adaramola; Jamiu Rotimi Olasina

Volume 4, Issue 4 , Autumn 2018, , Pages 209-218

Abstract
  Abstract- Communication has become inevitably part of our day to day activities, in academic, business, banking, and other sectors. It has therefore become so important to implement good and efficient communication system. A reference point according to this research is the wireless sensor networking ...  Read More

Computer Networks and Distributed Systems
16. Fuzzy Clustering Based Routing in Wireless Body Area Networks to Increase the Life of Sensor Nodes

Mohsen Abdollahzadeh Aghbolagh; Mohammad Ali Pourmina

Volume 4, Issue 3 , Summer 2018, , Pages 155-166

Abstract
  Body area networks is one of the types of wireless area networks which has been created to optimize utilizing hospital resources and for earlier diagnosis of medical symptoms, and ultimately to reduce the cost of medical care. This network like most of the wireless networks is without infrastructure ...  Read More

Computer Networks and Distributed Systems
17. Network Parameters Evaluation in Vehicular Ad-hoc Network (VANET) Routing Protocols for Efficient Message Delivery in City Environment

OJO JAYEOLA ADARAMOLA

Volume 4, Issue 3 , Summer 2018, , Pages 185-192

Abstract
  Abstract- Efficient message delivery in city environment is required to ensure driver’s safety and passenger’s comfortability. In cities of developed nations, routing of data in vehicular Ad hoc Network (VANET) faces many challenges such as radio obstacles, mobility constraints and uneven ...  Read More

Computer Networks and Distributed Systems
18. Congestion estimation of router input ports in Network-on-Chip for efficient virtual allocation

Midia Reshadi; Ali Ramezanzad; Akram Reza

Volume 4, Issue 2 , Spring 2018, , Pages 79-86

Abstract
  Effective and congestion-aware routing is vital to the performance of network-on-chip. The efficient routing algorithm undoubtedly relies on the considered selection strategy. If the routing function returns a number of more than one permissible output ports, a selection function is exploited to choose ...  Read More

Computer Networks and Distributed Systems
19. A New Approach to Solve N-Queen Problem with Parallel Genetic Algorithm

Monire Taheri Sarvetamin; Amid Khatibi; Mohammad Hadi Zahedi

Volume 4, Issue 2 , Spring 2018, , Pages 69-78

Abstract
  Over the past few decades great efforts were made to solve uncertain hybrid optimization problems. The n-Queen problem is one of such problems that many solutions have been proposed for. The traditional methods to solve this problem are exponential in terms of runtime and are not acceptable in terms ...  Read More

Computer Networks and Distributed Systems
20. IMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks

Swathi B H; Megha V; Gururaj H L; Hamsaveni M; Janhavi V

Volume 4, Issue 2 , Spring 2018, , Pages 87-100

Abstract
  Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common attacks which disrupt the communication ...  Read More

Computer Networks and Distributed Systems
21. Statistical Analysis on IoT Research Trends: A Survey

Alireza Hedayati; Mehrin Rouhifar; Sahar Bahramzadeh; Vaheh Aghazarian; Mostafa Chahardoli

Volume 4, Issue 2 , Spring 2018, , Pages 101-134

Abstract
  Internet of Things (IoT) is a novel and emerging paradigm to connect real/physical and virtual/logical world together. So, it will be necessary to apply other related scientific concepts in order to achieve this goal. The main focus of this paper is to identify the research topics in IoT. For this purpose, ...  Read More

Computer Networks and Distributed Systems
22. Utilizes the Community Detection for Increase Trust using Multiplex Networks

Rahimeh Habibi; Ali Haroun Abadi

Volume 4, Issue 1 , Winter 2018, , Pages 21-26

Abstract
  Today, e-commerce has occupied a large volume of economic exchanges. It is known as one of the most effective business practices. Predicted trust which means trusting an anonymous user is important in online communities. In this paper, the trust was predicted by combining two methods of multiplex network ...  Read More

Computer Networks and Distributed Systems
23. The Idea Of Using The Steganography As Encryption Tool

Ali Shlig; Amer Saleem Elameer

Volume 4, Issue 1 , Winter 2018, , Pages 42-50

Abstract
  the increasing use of computers and the widespread use of networks, Social networking and use applications through the use of the Internet to make the spread images, which make it easy to be penetrated from the attacker and from everyone who try to change the information. So, the need arises to transmit ...  Read More

Computer Networks and Distributed Systems
24. Coverage Improvement In Wireless Sensor Networks Based On Fuzzy-Logic And Genetic Algorithm

Elaheh Radmehr; HASSAN SHAKERI

Volume 3, Issue 4 , Autumn 2017, , Pages 189-194

Abstract
  Wireless sensor networks have been widely considered as one of the most important 21th century technologies and are used in so many applications such as environmental monitoring, security and surveillance. Wireless sensor networks are used when it is not possible or convenient to supply signaling or ...  Read More

Computer Networks and Distributed Systems
25. A Genetic Based Resource Management Algorithm Considering Energy Efficiency in Cloud Computing Systems

Marzieh Bozorgi Elize; Ahmad KhademZadeh

Volume 3, Issue 4 , Autumn 2017, , Pages 203-212

Abstract
  Cloud computing is a result of the continuing progress made in the areas of hardware, technologies related to the Internet, distributed computing and automated management. The Increasing demand has led to an increase in services resulting in the establishment of large-scale computing and data centers, ...  Read More