Pattern Analysis and Intelligent Systems
1. Implementation of Random Forest Algorithm in Order to Use Big Data to Improve Real-Time Traffic Monitoring and Safety

Negin Fatholahzade; Gholamreza Akbarizadeh; Morteza Romoozi

Volume 4, Issue 2 , Spring 2018, Pages 51-60

Abstract
  Nowadays the active traffic management is enabled for better performance due to the nature of the real-time large data in transportation system. With the advancement of large data, monitoring and improving the traffic safety transformed into necessity in the form of actively and appropriately. Per-formance ...  Read More

Computer Architecture and Digital Systems
2. Cost-aware Topology Customization of Mesh-based Networks-on-Chip

Ali Ramezanzad; Midia Reshadi

Volume 4, Issue 2 , Spring 2018, Pages 61-68

Abstract
  Nowadays, the growing demand for supporting multiple applications causes to use multiple IPs onto the chip. In fact, finding truly scalable communication architecture will be a critical concern. To this end, the Networks-on-Chip (NoC) paradigm has emerged as a promising solution to on-chip communication ...  Read More

Computer Networks and Distributed Systems
3. A New Approach to Solve N-Queen Problem with Parallel Genetic Algorithm

Monire Taheri Sarvetamin; Amid Khatibi; Mohammad Hadi Zahedi

Volume 4, Issue 2 , Spring 2018, Pages 69-78

Abstract
  Over the past few decades great efforts were made to solve uncertain hybrid optimization problems. The n-Queen problem is one of such problems that many solutions have been proposed for. The traditional methods to solve this problem are exponential in terms of runtime and are not acceptable in terms ...  Read More

Computer Networks and Distributed Systems
4. Congestion estimation of router input ports in Network-on-Chip for efficient virtual allocation

Midia Reshadi; Ali Ramezanzad; Akram Reza

Volume 4, Issue 2 , Spring 2018, Pages 79-86

Abstract
  Effective and congestion-aware routing is vital to the performance of network-on-chip. The efficient routing algorithm undoubtedly relies on the considered selection strategy. If the routing function returns a number of more than one permissible output ports, a selection function is exploited to choose ...  Read More

Computer Networks and Distributed Systems
5. IMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks

Swathi B H; Megha V; Gururaj H L; Hamsaveni M; Janhavi V

Volume 4, Issue 2 , Spring 2018, Pages 87-100

Abstract
  Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common attacks which disrupt the communication ...  Read More

Computer Networks and Distributed Systems
6. Statistical Analysis on IoT Research Trends: A Survey

Alireza Hedayati; Mehrin Rouhifar; Sahar Bahramzadeh; Vaheh Aghazarian; Mostafa Chahardoli

Volume 4, Issue 2 , Spring 2018, Pages 101-134

Abstract
  Internet of Things (IoT) is a novel and emerging paradigm to connect real/physical and virtual/logical world together. So, it will be necessary to apply other related scientific concepts in order to achieve this goal. The main focus of this paper is to identify the research topics in IoT. For this purpose, ...  Read More