Computer Networks and Distributed Systems
An Unlinkable Reputation Transfer Framework for Blockchain-based Retail Markets Using Non-fungible Tokens

Saeed Banaeian Far; Maryam Rajabzadeh Asaar; Afrooz Haghbin

Articles in Press, Accepted Manuscript, Available Online from 19 August 2022

Abstract
  Privacy is a matter of considerable public concern in internet-based communications. In other words, it is sensed more with the growth of internet-based communications and the increasing number of connected users. This paper focuses on the blockchain-based retail markets. It presents a framework that ...  Read More

Computer Networks and Distributed Systems
Dynamic Clustering for Wireless Sensor Networks: A Hybrid Artificial Bee Colony and Fuzzy TOPSIS Approach

Mohsen Raji; Saeed Keshavarzi; Mehran Farvardin

Articles in Press, Accepted Manuscript, Available Online from 07 November 2022

Abstract
  A Wireless Sensor Network (WSN) is consisted of thousands of sensor nodes to monitor environmental conditions. Energy plays a major role in these networks because nodes are worked with batteries and are sometimes placed in an inconsistent environment where their battery cannot be charged or replaced. ...  Read More

Computer Networks and Distributed Systems
Trust management in fog computing using the multi-objective imperialist competitive optimization algorithm.

Sara Mohammadi; Parvaneh Asghari; Amir Masoud Rahmani

Articles in Press, Accepted Manuscript, Available Online from 02 December 2022

Abstract
  As a new technology, cloud computing is a key part of making systems more efficient and better and improving the Internet of Things. One of the significant challenges in fog computing is trust management, taking into account the processing, storage, and network constraints of fog devices. This study ...  Read More

Computer Networks and Distributed Systems
A Review of Fraud Detection Algorithms for Electronic Payment Card Transactions

Touraj BaniRostam; Hamid BaniRostam; Mir Mohsen Pedram; Amir Masoud Rahamni

Volume 7, Issue 3 , August 2021, , Pages 157-166

Abstract
  Abstract—Several studies have been presented to solve challenges of electronic card (e-card) fraud that the two main purposes of these studies are to identify types of e-card fraud and to investigate the methods used in bank fraud detection. To achieve this purpose, one of the most common methods ...  Read More

Computer Networks and Distributed Systems
A Survey on Routing Protocols in Vehicular Ad hoc Network

Elham Bozorgzadeh; hamid barati; Ali Barati

Volume 7, Issue 3 , August 2021, , Pages 167-176

Abstract
  Vehicular ad hoc networks (VANETs) are a subclass of mobile ad hoc networks (MANETs) that have inherited some of this type of network's features. Due to road accidents, these networks are a promising technology to increase passengers' comfort and safety and increase road safety and provide traffic information. ...  Read More

Computer Networks and Distributed Systems
A Review of Anonymity Algorithms in Big Data

Elham shamsinejad; Mir Mohsen Pedram; Amir Masoud Rahamni; Touraj BaniRostam

Volume 7, Issue 3 , August 2021, , Pages 187-196

Abstract
  By increasing access to high amounts of data through internet-based technologies such as social networks and mobile phones and electronic devices, many companies have considered the issues of accessing large, random and fast data along with maintaining data confidentiality. Therefore, confidentiality ...  Read More

Computer Networks and Distributed Systems
Improving the security of wireless sensor networks using Game Theory

Behzad Seif; mohammad goodarzi

Volume 7, Issue 2 , May 2021, , Pages 93-102

Abstract
  Today, the use of wireless sensor networks has become very popular in many applications. Due to the connection in wireless sensor networks, it is done wirelessly, so they are naturally insecure and prone to various types of attacks. In the past, various solutions were offered in this regard, each of ...  Read More

Computer Networks and Distributed Systems
Workflow Scheduling on Hybrid Fog-Cloud Environment Based on a Novel Critical Path Extraction Algorithm

Fatemeh Davami; Sahar Adabi; Ali Rezaee; Amir Masoud Rahamni

Volume 7, Issue 2 , May 2021, , Pages 126-136

Abstract
  In the last ten years, the Cloud data centers have been manifested as the crucial computing architectures to enable extreme data workflows. Due to the complicatedness and diverse kinds of computational resources like Fog nodes and Cloud servers, workflow scheduling has been proposed to be the main challenge ...  Read More

Computer Networks and Distributed Systems
Intelligent Resource Allocation in Fog Computing: A Learning Automata Approach

Alireza Enami; Javad Akbari Torkestani

Volume 7, Issue 1 , February 2021, , Pages 19-34

Abstract
  Fog computing is being seen as a bridge between smart IoT devices and large scale cloud computing. It is possible to develop cloud computing services to network edge devices using Fog computing. As one of the most important services of the system, the resource allocation should always be available to ...  Read More

Computer Networks and Distributed Systems
Energy-aware and Reliable Service Placement of IoT applications on Fog Computing Platforms by Utilizing Whale Optimization Algorithm

Yaser Ramzanpoor; Mirsaeid Hosseini Shirvani; Mehdi GolSorkhTabar

Volume 7, Issue 1 , February 2021, , Pages 67-80

Abstract
  Fog computing is known as a new computing technology where it covers cloud computing shortcomings in term of delay. This is a potential for running IoT applications containing multiple services taking benefit of closeness to fog nodes near to devices where the data are sensed. This article formulates ...  Read More

Computer Networks and Distributed Systems
Development of Blockchain Technology

behnam Kiani Kalejahi; Jala Guluzade; shabnam maharramli

Volume 6, Issue 4 , November 2020, , Pages 265-272

Abstract
  AbstractBlockchain technology is the first successful Bitcoin Network. It enables the ledger to become more decentralized and secure. Since it is not limited to bitcoin and controlled by third parties by government, corporations, or banks, the technology is capturing several industries, including cryptocurrency, ...  Read More

Computer Networks and Distributed Systems
An Improved Junction-Based Directional Routing Protocol (IJDRP) for VANETs

Bharat Mahaur; Aishwarya Gupta

Volume 6, Issue 3 , August 2020, , Pages 133-144

Abstract
  Vehicular Ad-Hoc Networks (VANETs) is a novel technology that has recently emerged and due to its swift changing topology and high mobility nature, it has become problematic to design an efficient routing protocol in VANETs’ amongst both moving and stationary units. Also, the existing routing algorithms ...  Read More

Computer Networks and Distributed Systems
A Method for Measuring Energy Consumption in IaaS Cloud

Derdus Kenga; Vincent Oteke Omwenga; Patrick Job Ogao

Volume 6, Issue 3 , August 2020, , Pages 145-154

Abstract
  The ability to measure the energy consumed by cloud infrastructure is a crucial step towards the development of energy efficiency policies in the cloud infrastructure. There are hardware-based and software-based methods of measuring energy usage in cloud infrastructure. However, most hardware-based energy ...  Read More

Computer Networks and Distributed Systems
An Effective Task Scheduling Framework for Cloud Computing using NSGA-II

Hanieh Ghorashi; Meghdad Mirabi

Volume 6, Issue 3 , August 2020, , Pages 155-168

Abstract
  Cloud computing is a model for convenient on-demand user’s access to changeable and configurable computing resources such as networks, servers, storage, applications, and services with minimal management of resources and service provider interaction. Task scheduling is regarded as a fundamental ...  Read More

Computer Networks and Distributed Systems
Detecting Bot Networks Based On HTTP And TLS Traffic Analysis

Zahra Nafarieh

Volume 6, Issue 2 , May 2020, , Pages 61-70

Abstract
  Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer ...  Read More

Computer Networks and Distributed Systems
A procedure for Web Service Selection Using WS-Policy Semantic Matching

Maryam Amiri Kamalabad; farhad mardukhi; naser Nematbakhsh

Volume 6, Issue 2 , May 2020, , Pages 91-106

Abstract
  In general, Policy-based approaches play an important role in the management of web services, for instance, in the choice of semantic web service and quality of services (QoS) in particular. The present research work illustrates a procedure for the web service selection among functionality similar web ...  Read More

Computer Networks and Distributed Systems
A Detailed Exploration of Usability Statistics and Application Rating Based on Wireless Protocols

Abbas Ali Khan; Dr. Mohammad Hanif Ali; Dr. A. K. M. Fazlul Haque; Chandan Debnath; DR. Md. Ismail Jabiullah

Volume 6, Issue 1 , February 2020, , Pages 9-18

Abstract
  A Detailed Exploration of usability statistics and Application Rating on short-range Wireless protocols Bluetooth (IEEE 802.15.1), ZigBee (IEEE 802.15.4), Wi-Fi (IEEE 802.11) and NFC (ISO/IEC 14443) has been performed that being representing of those prominent wireless protocols evaluating their main ...  Read More

Computer Networks and Distributed Systems
SMART ROOM CARBON MONOXIDE MONITORING AND CONTROL SYSTEM

Bello Kontagora Nuhu; Olayemi Olaniyi; Dauda Aji Idris; Chinedu Onyema

Volume 6, Issue 1 , February 2020, , Pages 25-32

Abstract
  Carbon Monoxide (CO) is the most abundant air pollutant gas and accumulates rapidly to dangerous concentrations even in areas that seem to be well ventilated. Carbon monoxide detectors/alarm systems exist but people who are old, hearing impaired, partially sighted or heavy sleepers may not get the warning ...  Read More

Computer Networks and Distributed Systems
Detecting Active Bot Networks Based on DNS Traffic Analysis

Zahra Nafarieh; Ebrahim Mahdipur; Haj Hamid Haj Seyed Javadi

Volume 5, Issue 3 , August 2019, , Pages 129-142

Abstract
  Abstract—One of the serious threats to cyberspace is the Bot networks or Botnets. Bots are malicious software that acts as a network and allows hackers to remotely manage and control infected computer victims. Given the fact that DNS is one of the most common protocols in the network and is essential ...  Read More

Computer Networks and Distributed Systems
2016 Olympic Games on Twitter: Sentiment Analysis of Sports Fans Tweets using Big Data Framework

Azam Seilsepour; Reza Ravanmehr; Hamid Reza Sima

Volume 5, Issue 3 , August 2019, , Pages 143-160

Abstract
  Big data analytics is one of the most important subjects in computer science. Today, due to the increasing expansion of Web technology, a large amount of data is available to researchers. Extracting information from these data is one of the requirements for many organizations and business centers. In ...  Read More

Computer Networks and Distributed Systems
The Optimal MMSE Transceiver Design for IoT-oriented Cognitive Radio Systems

Nguyen-Duy-Nhat Vien; Tri Ngo Minh; Thanh Vu Van

Volume 5, Issue 3 , August 2019, , Pages 161-168

Abstract
  This paper studies interference alignment scheme and minimum mean square error (MMSE) improvement in Internet of Things (IoT)-oriented cognitive systems, where IoT devices share the licensed spectrum by cognitive radio in spectrum underlay. Target to manage the inter-tier interference caused by cognitive ...  Read More

Computer Networks and Distributed Systems
IMPACTS AND CHALLENGES OF CLOUD COMPUTING FOR SMALL AND MEDIUM SCALE BUSINESSES IN NIGERIA

Scholastica Nwanneka Mallo; Francisca Nonyelum Ogwueleka

Volume 5, Issue 3 , August 2019, , Pages 169-180

Abstract
  Cloud computing technology is providing businesses, be it micro, small, medium, and large scale enterprises with the same level playing grounds. Small and Medium enterprises (SMEs) that have adopted the cloud are taking their businesses to greater heights with the competitive edge that cloud computing ...  Read More

Computer Networks and Distributed Systems
A Novel Trust Management Model in the Social Internet of Things

Gholamhossein Ekbatanifard; Omid Yousefi

Volume 5, Issue 2 , May 2019, , Pages 57-70

Abstract
  The Internet of Things (IoT) and social networking integration, create a new concept named Social Internet of Things (SIoT) according to which the things are able to autonomously establish social relationships with regard to the owners. Things in SIoT operate according to a service-oriented architecture. ...  Read More

Computer Networks and Distributed Systems
Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines

Olayemi Mikail Olaniyi; Ameh Innocent Ameh; Lukman Adewale Ajao; Omolara Ramota Lawal

Volume 5, Issue 2 , May 2019, , Pages 107-116

Abstract
  Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s ...  Read More

Computer Networks and Distributed Systems
Network Investigation and Performance Analysis of ZigBee Technology using OPNET

Ojo Jayeola Adaramola; Jamiu Rotimi Olasina

Volume 4, Issue 4 , November 2018, , Pages 209-218

Abstract
  Abstract- Communication has become inevitably part of our day to day activities, in academic, business, banking, and other sectors. It has therefore become so important to implement good and efficient communication system. A reference point according to this research is the wireless sensor networking ...  Read More