1. A fault tolerance routing protocol considering defined reliability and energy consumption in wireless sensor networks

Hamid Hassan Kashi; Amir Masoud Rahamni; Mehdi Hoseinzadeh; Vahid Sadatpour

Volume 1, Issue 1 , Winter 2015, , Pages 1-8

Abstract
  In wireless sensor networks, optimal consumptionof energy and having maximum life time are important factors. In this article attempt has been made to send the data packets with particular reliability from the beginning based on AODV protocol. In this way two new fields add to the routing packets and ...  Read More

Pattern Analysis and Intelligent Systems
2. Improving the Operation of Text Categorization Systems with Selecting Proper Features Based on PSO-LA

Mozhgan Rahimirad; Mohammad Mosleh; Amir Masoud Rahmani

Volume 1, Issue 2 , Spring 2015, , Pages 1-8

Abstract
  With the explosive growth in amount of information, it is highly required to utilize tools and methods in order to search, filter and manage resources. One of the major problems in text classification relates to the high dimensional feature spaces. Therefore, the main goal of text classification is to ...  Read More

3. Nonlinear System Identification Using Hammerstein-Wiener Neural Network and subspace algorithms

Maryam Ashtari Mahini; Mohammad Teshnehlab; Mojtaba Ahmadieh khanehsar

Volume 1, Issue 3 , Summer 2015, , Pages 1-8

Abstract
  Neural networks are applicable in identification systems from input-output data. In this report, we analyze theHammerstein-Wiener models and identify them. TheHammerstein-Wiener systems are the simplest type of block orientednonlinear systems where the linear dynamic block issandwiched in between two ...  Read More

Computer Networks and Distributed Systems
4. Reliability and Availability Improvement in Economic Data Grid Environment Based On Clustering Approach

Ali Abbasi; Amir Masoud Rahmani; Esmaeil Zeinali Khasraghi

Volume 1, Issue 4 , Autumn 2015, , Pages 1-14

Abstract
  Abstract - One of the important problems in grid environments is data replication in grid sites. Reliability and availability of data replication in some cases is considered low. To separate sites with high reliability and high availability of sites with low availability and low reliability, clustering ...  Read More

Computer Networks and Distributed Systems
5. EIDA: An Energy-Intrusion aware Data Aggregation Technique for Wireless Sensor Networks

Nafiseh Daneshgar; M. Habibi Najafi; Mohsen Jahanshahi; Ehsan Ahvar

Volume 2, Issue 1 , Winter 2016, , Pages 1-8

Abstract
  Energy consumption is considered as a critical issue in wireless sensor networks (WSNs). Batteries of sensor nodes have limited power supply which in turn limits services and applications that can be supported by them. An efcient solution to improve energy consumption and even trafc in WSNs is Data Aggregation ...  Read More

Pattern Analysis and Intelligent Systems
6. Classifier Ensemble Framework: a Diversity Based Approach

Hamid Parvin; Hosein Alizadeh; Mohsen Moshki

Volume 2, Issue 2 , Spring 2016, , Pages 1-10

Abstract
  Pattern recognition systems are widely used in a host of different fields. Due to some reasons such as lack of knowledge about a method based on which the best classifier is detected for any arbitrary problem, and thanks to significant improvement in accuracy, researchers turn to ensemble methods in ...  Read More

Computer Architecture and Digital Systems
7. Application Mapping onto Network-on-Chip using Bypass Channel

Elnaz Alikhah-Asl; Midia Reshadi

Volume 2, Issue 3 , Summer 2016, , Pages 1-8

Abstract
  Increasing the number of cores integrated on a chip and the problems of system on chips caused to emerge networks on chips. NoCs have features such as scalability and high performance. NoCs architecture provides communication infrastructure and in this way, the blocks were produced that their communication ...  Read More

Software Engineering and Information Systems
8. Analysis of Users’ Opinions about Reasons for Divorce

Fatemeh Eghrari Solout; Mehdi Hosseinzadeh

Volume 2, Issue 4 , Autumn 2016, , Pages 1-8

Abstract
  One of the most important issues related to knowledge discovery is the field of comment mining. Opinion mining is a tool through which the opinions of people who comment about a specific issue can be evaluated in order to achieve some interesting results. This is a subset of data mining. Opinion mining ...  Read More

Software Engineering and Information Systems
9. Availability evaluation of Software architecture of object oriented Style using coloured Petri nets

Abdolghader pourali

Volume 3, Issue 1 , Winter 2017, , Pages 1-10

Abstract
  Software architecture is one of the most fundamental products in the process of software development in the areas of behavioral or non- behavioral features like availability or transformability change. There are different ways to evaluate software architecture one of which is the creation of application ...  Read More

Software Engineering and Information Systems
10. A Multi-layer Architecture Based on MCDM Methods to Select the Best E-Readiness Assessment Model According to SWOT Analysis

Mina Sadat Mousavi Kasravi; Mohammad Ahmadinia; Abbas Rezaiee

Volume 3, Issue 2 , Spring 2017, , Pages 65-74

Abstract
  E-readiness is one of the major prerequisites for effective implementation of e-government. For the correct implementation of e-government, it is needed to accurately assess the state of e-readiness in desired community. In this regard, there are models to assess, but the correct choice of model is one ...  Read More

Pattern Analysis and Intelligent Systems
11. Developing A Fault Diagnosis Approach Based On Artificial Neural Network And Self Organization Map For Occurred ADSL Faults

Vahid Golmah; Mina Tashakori

Volume 3, Issue 3 , Summer 2017, , Pages 125-134

Abstract
  Telecommunication companies have received a great deal of research attention, which have many advantages such as low cost, higher qualification, simple installation and maintenance, and high reliability. However, the using of technical maintenance approaches in Telecommunication companies could improve ...  Read More

Computer Networks and Distributed Systems
12. DTMP: Energy Consumption Reduction in Body Area Networks Using a Dynamic Traffic Management Protocol

Mona Alimardani; Amir Masoud Rahmani; Houman Zarrabi

Volume 3, Issue 4 , Autumn 2017, , Pages 181-188

Abstract
  Advances in medical sciences with other fields of science and technology is closely casual profound mutations in different branches of science and methods for providing medical services affect the lives of its descriptor. Wireless Body Area Network (WBAN) represents such a leap. Those networks excite ...  Read More

Software Engineering and Information Systems
13. Formal Method in Service Composition in Heath Care Systems

Zahra Baatmaanghelich; Ali Rezaee; Sahar Adabi

Volume 4, Issue 1 , Winter 2018, , Pages 1-6

Abstract
  One of the areas with greatest needs having available information at the right moment and with high accuracy is healthcare. Right information at right time saves lives. Healthcare is a vital domain which needs high processing power for high amounts of data. Due to the critical and the special characteristics ...  Read More

Pattern Analysis and Intelligent Systems
14. Implementation of Random Forest Algorithm in Order to Use Big Data to Improve Real-Time Traffic Monitoring and Safety

Negin Fatholahzade; Gholamreza Akbarizadeh; Morteza Romoozi

Volume 4, Issue 2 , Spring 2018, , Pages 51-60

Abstract
  Nowadays the active traffic management is enabled for better performance due to the nature of the real-time large data in transportation system. With the advancement of large data, monitoring and improving the traffic safety transformed into necessity in the form of actively and appropriately. Per-formance ...  Read More

Software Engineering and Information Systems
15. Reengineering the Industrial CMMI

Syed Atif Ali Shah

Volume 4, Issue 3 , Summer 2018, , Pages 135-142

Abstract
  Abstract of Re-engineering of Industrial CMMI Through this research, I have established a general strategy to appraise an organization against a scale of five process maturity levels whilst maintaining a strong mechanics of CMMI. Reengineering of industrial CMMI proposes a novel method for Industrial ...  Read More

Computer Networks and Distributed Systems
16. Network Investigation and Performance Analysis of ZigBee Technology using OPNET

Ojo Jayeola Adaramola; Jamiu Rotimi Olasina

Volume 4, Issue 4 , Autumn 2018, , Pages 209-218

Abstract
  Abstract- Communication has become inevitably part of our day to day activities, in academic, business, banking, and other sectors. It has therefore become so important to implement good and efficient communication system. A reference point according to this research is the wireless sensor networking ...  Read More

Pattern Analysis and Intelligent Systems
17. Quadrotor Control Using Fractional-Order PI^λ D^μ Control

Reham Mohammed

Volume 5, Issue 1 , Winter 2019, , Pages 1-10

Abstract
  Quadrotor control has been noted for its trouble as the consequence of the high maneuverability, system nonlinearity and strongly coupled multivariable. This paper deals with the simulation depend on proposed controller of a quadrotor that can overcome this trouble. The mathematical model of quadrotor ...  Read More

Computer Networks and Distributed Systems
18. A Novel Trust Management Model in the Social Internet of Things

Gholamhossein Ekbatanifard; Omid Yousefi

Volume 5, Issue 2 , Spring 2019, , Pages 57-70

Abstract
  The Internet of Things (IoT) and social networking integration, create a new concept named Social Internet of Things (SIoT) according to which the things are able to autonomously establish social relationships with regard to the owners. Things in SIoT operate according to a service-oriented architecture. ...  Read More

Computer Networks and Distributed Systems
19. Detecting Active Bot Networks Based on DNS Traffic Analysis

Zahra Nafarieh; Ebrahim Mahdipur; Haj Hamid Haj Seyed Javadi

Volume 5, Issue 3 , Summer 2019, , Pages 129-142

Abstract
  Abstract—One of the serious threats to cyberspace is the Bot networks or Botnets. Bots are malicious software that acts as a network and allows hackers to remotely manage and control infected computer victims. Given the fact that DNS is one of the most common protocols in the network and is essential ...  Read More

Computer Architecture and Digital Systems
20. CAFT: Cost-aware and Fault-tolerant routing algorithm in 2D mesh Network-on-Chip

Akram Reza; Parisa Jolani; Midia Reshadi

Volume 5, Issue 4 , Autumn 2019, , Pages 205-212

Abstract
  By increasing, the complexity of chips and the need to integrating more components into a chip has made network –on- chip known as an important infrastructure for network communications on the system, and is a good alternative to traditional ways and using the bus. By increasing the density of ...  Read More

21. A Fuzzy Realistic Mobility Model for Ad hoc Networks

Alireza Amirshahi; Mahmoud Fathy; Morteza Romoozi; Mohammad Assarian

Volume 1, Issue 1 , Winter 2015, , Pages 9-18

Abstract
  Realistic mobility models can demonstrate more precise evaluation results because their parameters are closer to the reality. In this paper a realistic Fuzzy Mobility Model has been proposed. This model has rules which are changeable depending on nodes and environmental conditions. It seems that this ...  Read More

Computer Networks and Distributed Systems
22. Combining Harmony search algorithm and Ant Colony Optimization algorithm to increase the lifetime of Wireless Sensor Networks

Zahra Kamaei; Hamidreza Bakhshi; Behrooz Masoumi

Volume 1, Issue 3 , Summer 2015, , Pages 9-16

Abstract
  Wireless Sensor Networks are the new generation of networks that typically are formed great numbers of nodes and the communications of these nodes are done as Wireless. The main goal of these networks is collecting data from neighboring environment of network sensors. Since the sensor nodes are battery ...  Read More

Computer Networks and Distributed Systems
23. A Genetic Programming-based trust model for P2P Networks

Mahdi Sattarivand

Volume 1, Issue 2 , Spring 2015, , Pages 9-14

Abstract
  Abstract— Peer-to-Peer ( P2P ) systems have been the center of attention in recent years due to their advantage . Since each node in such networks can act both as a service provider and as a client , they are subject to different attacks . Therefore it is vital to manage confidence for these vulnerable ...  Read More

Software Engineering and Information Systems
24. A Novel ICA-based Estimator for Software Cost Estimation

Behrouz Sadeghi; Vahid Khatibi Bardsiri; Monireh Esfandiari; Farzad Hosseinzadeh

Volume 1, Issue 4 , Autumn 2015, , Pages 15-24

Abstract
  One of the most important and valuable goal of software development life cycle is software cost estimation or SCE. During the recent years, SCE has attracted the attention of researchers due to huge amount of software project requests. There have been proposed so many models using heuristic and meta-heuristic ...  Read More

Computer Architecture and Digital Systems
25. Overflow Detection in Residue Number System, Moduli Set {2n-1,2n,2n+1}

Babak Tavakoli; Mehdi Hosseinzadeh; Somayeh Jassbi

Volume 2, Issue 1 , Winter 2016, , Pages 9-16

Abstract
  Residue Number System (RNS) is a non-weighted number system for integer number arithmetic, which is based on the residues of a number to a certain set of numbers called module set. The main characteristics and advantage of residue number system is reducing carry propagation in calculations. The elimination ...  Read More