1. Routing Hole Handling Techniques for Wireless Sensor Networks: A Review

Swathi B H; Gururaj H L

Volume 6, Issue 2 , Spring 2020, Pages 47-60

Abstract
  A Wireless Sensor Network consists of several tiny devices which have the capability to sense and compute the environmental phenomenon. These sensor nodes are deployed in remote areas without any physical protections. A Wireless Sensor Network can have various types of anomalies due to some random deployment ...  Read More

Computer Networks and Distributed Systems
2. Detecting Bot Networks Based On HTTP And TLS Traffic Analysis

Zahra Nafarieh

Volume 6, Issue 2 , Spring 2020, Pages 61-70

Abstract
  Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer ...  Read More

Pattern Analysis and Intelligent Systems
3. Using a Neural Network instead of IKM in 2R Planar Robot to follow rectangular path

Ali Ahmad Ali

Volume 6, Issue 2 , Spring 2020, Pages 71-78

Abstract
  Abstract— An educational platform is presented here for the beginner students in the Simulation and Artificial Intelligence sciences. It provides with a start point of building and simulation of the manipulators, especially of 2R planar Robot. It also displays a method to replace the inverse kinematic ...  Read More

Pattern Analysis and Intelligent Systems
4. An Optimization K-Modes Clustering Algorithm with Elephant Herding Optimization Algorithm for Crime Clustering

Farhad Soleimanian Gharehchopogh; Sevda Haggi

Volume 6, Issue 2 , Spring 2020, Pages 79-90

Abstract
  The detection and prevention of crime, in the past few decades, required several years of research and analysis. However, today, thanks to smart systems based on data mining techniques, it is possible to detect and prevent crime in a considerably less time. Classification and clustering-based smart techniques ...  Read More

Computer Networks and Distributed Systems
5. A procedure for Web Service Selection Using WS-Policy Semantic Matching

Maryam Amiri Kamalabad; farhad mardukhi; naser Nematbakhsh

Volume 6, Issue 2 , Spring 2020, Pages 91-106

Abstract
  In general, Policy-based approaches play an important role in the management of web services, for instance, in the choice of semantic web service and quality of services (QoS) in particular. The present research work illustrates a procedure for the web service selection among functionality similar web ...  Read More

Pattern Analysis and Intelligent Systems
6. Prediction of Student Learning Styles using Data Mining Techniques

Esther N Khakata; Vincent Oteke Omwenga; Simon S. Msanjila

Volume 6, Issue 2 , Spring 2020, Pages 107-118

Abstract
  This paper focuses on the prediction of student learning styles using data mining techniques within their institutions. This prediction was aimed at finding out how different learning styles are achieved within learning environments which are specifically influenced by already existing factors. These ...  Read More