Software Engineering and Information Systems
An Effective Modality Conflict Model for Identifying Applicable Policies During Policy Evaluation

Hamidah Ibrahim; Fatimah Sidi; Nur Izura Udzir; Poh Kuang Teo

Volume 4, Issue 4 , November 2018, , Pages 255-266

Abstract
  Policy evaluation is a process to determine whether a request submitted by a user satisfies the access control policies defined by an organization. Modality conflict is one of the main issues in policy evaluation. Existing modality conflict detection approaches do not consider complex condition attributes ...  Read More

Pattern Analysis and Intelligent Systems
Tags Re-ranking Using Multi-level Features in Automatic Image Annotation

Forogh Ahmadi; Vafa Maihami

Volume 5, Issue 4 , November 2019, , Pages 255-265

Abstract
  Automatic image annotation is a process in which computer systems automatically assign the textual tags related with visual content to a query image. In most cases, inappropriate tags generated by the users as well as the images without any tags among the challenges available in this field have a negative ...  Read More

Improving Quality of Service Routing in Mobile Ad Hoc Networks Using OLSR

Forouz Ghaffarizadeh; Ahmad Khademzadeh

Volume 1, Issue 1 , February 2015, , Pages 51-58

Abstract
  Mobile ad hoc networks (MANET) are constructed by mobile nodes without access point. Since MANET has certain constraints, including power shortages, an unstable wireless environment and node mobility, more power-efficient and reliable routing protocols are needed. The OLSR protocol is an optimization ...  Read More

A Differentiated Pricing Framework for Improving the Performance of the Elastic Traffics in Data Networks

Pejman Goudarzi

Volume 1, Issue 1 , February 2015, , Pages 59-64

Abstract
  Rate allocation has become a demanding task in data networks as diversity in users and traffics proliferate. Most commonly used algorithm in end hosts is TCP. This is a loss based scheme therefore it exhibits oscillatory behavior which reduces network performance. Moreover, since the price for all sessions ...  Read More

Pattern Analysis and Intelligent Systems
Hybridization of Facial Features and Use of Multi Modal Information for 3D Face Recognition

Nita M Thakare

Volume 6, Issue 1 , February 2020, , Pages 1-8

Abstract
  Despite of achieving good performance in controlled environment, the conventional 3D face recognition systems still encounter problems in handling the large variations in lighting conditions, facial expression and head pose The humans use the hybrid approach to recognize faces and therefore in this proposed ...  Read More

Computer Networks and Distributed Systems
A Detailed Exploration of Usability Statistics and Application Rating Based on Wireless Protocols

Abbas Ali Khan; Dr. Mohammad Hanif Ali; Dr. A. K. M. Fazlul Haque; Chandan Debnath; DR. Md. Ismail Jabiullah

Volume 6, Issue 1 , February 2020, , Pages 9-18

Abstract
  A Detailed Exploration of usability statistics and Application Rating on short-range Wireless protocols Bluetooth (IEEE 802.15.1), ZigBee (IEEE 802.15.4), Wi-Fi (IEEE 802.11) and NFC (ISO/IEC 14443) has been performed that being representing of those prominent wireless protocols evaluating their main ...  Read More

Pattern Analysis and Intelligent Systems
A Novel Fuzzy-C Means Image Segmentation Model for MRI Brain Tumor Diagnosis

Aref Safari; Danial Barazandeh; Seyed Ali Khalegh Pour

Volume 6, Issue 1 , February 2020, , Pages 19-24

Abstract
  Accurate segmentation of brain tumor plays a key role in the diagnosis of brain tumor. Preset and precise diagnosis of Magnetic Resonance Imaging (MRI) brain tumor is enormously significant for medical analysis. During the last years many methods have been proposed. In this research, a novel fuzzy approach ...  Read More

Computer Networks and Distributed Systems
SMART ROOM CARBON MONOXIDE MONITORING AND CONTROL SYSTEM

Bello Kontagora Nuhu; Olayemi Olaniyi; Dauda Aji Idris; Chinedu Onyema

Volume 6, Issue 1 , February 2020, , Pages 25-32

Abstract
  Carbon Monoxide (CO) is the most abundant air pollutant gas and accumulates rapidly to dangerous concentrations even in areas that seem to be well ventilated. Carbon monoxide detectors/alarm systems exist but people who are old, hearing impaired, partially sighted or heavy sleepers may not get the warning ...  Read More

The Kinematic Analysis Of Four Degrees Of Freedom For A Medical Robot And Control It By Labview And Arduino Mega2560 (Simulation And Implementation)

fatima ali habqa

Volume 6, Issue 1 , February 2020, , Pages 33-38

Abstract
  ABSRACTThis study presents the kinematic analysis of a four-degree freedom medical robotic arm using the Matlab and the robotic-tool, the arm was designed using a solid work program, As well as details of the control of the real design of this arm using Arduino Mega 2560, The specialist enters the position ...  Read More

Document Analysis And Classification Based On Passing Window

ZAHER AHMED BAMASOOD

Volume 6, Issue 1 , February 2020, , Pages 39-46

Abstract
  In this paper we present Document analysis and classification system to segment and classify contents of Arabic document images. This system includes preprocessing, document segmentation, feature extraction and document classification. A document image is enhanced in the preprocessing by removing noise, ...  Read More

Routing Hole Handling Techniques for Wireless Sensor Networks: A Review

Swathi B H; Gururaj H L

Volume 6, Issue 2 , May 2020, , Pages 47-60

Abstract
  A Wireless Sensor Network consists of several tiny devices which have the capability to sense and compute the environmental phenomenon. These sensor nodes are deployed in remote areas without any physical protections. A Wireless Sensor Network can have various types of anomalies due to some random deployment ...  Read More

Computer Networks and Distributed Systems
Detecting Bot Networks Based On HTTP And TLS Traffic Analysis

Zahra Nafarieh

Volume 6, Issue 2 , May 2020, , Pages 61-70

Abstract
  Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer ...  Read More

Pattern Analysis and Intelligent Systems
Using a Neural Network instead of IKM in 2R Planar Robot to follow rectangular path

Ali Ahmad Ali

Volume 6, Issue 2 , May 2020, , Pages 71-78

Abstract
  Abstract— An educational platform is presented here for the beginner students in the Simulation and Artificial Intelligence sciences. It provides with a start point of building and simulation of the manipulators, especially of 2R planar Robot. It also displays a method to replace the inverse kinematic ...  Read More

Pattern Analysis and Intelligent Systems
An Optimization K-Modes Clustering Algorithm with Elephant Herding Optimization Algorithm for Crime Clustering

Farhad Soleimanian Gharehchopogh; Sevda Haggi

Volume 6, Issue 2 , May 2020, , Pages 79-90

Abstract
  The detection and prevention of crime, in the past few decades, required several years of research and analysis. However, today, thanks to smart systems based on data mining techniques, it is possible to detect and prevent crime in a considerably less time. Classification and clustering-based smart techniques ...  Read More

Computer Networks and Distributed Systems
A procedure for Web Service Selection Using WS-Policy Semantic Matching

Maryam Amiri Kamalabad; farhad mardukhi; naser Nematbakhsh

Volume 6, Issue 2 , May 2020, , Pages 91-106

Abstract
  In general, Policy-based approaches play an important role in the management of web services, for instance, in the choice of semantic web service and quality of services (QoS) in particular. The present research work illustrates a procedure for the web service selection among functionality similar web ...  Read More

Pattern Analysis and Intelligent Systems
Prediction of Student Learning Styles using Data Mining Techniques

Esther N Khakata; Vincent Oteke Omwenga; Simon S. Msanjila

Volume 6, Issue 2 , May 2020, , Pages 107-118

Abstract
  This paper focuses on the prediction of student learning styles using data mining techniques within their institutions. This prediction was aimed at finding out how different learning styles are achieved within learning environments which are specifically influenced by already existing factors. These ...  Read More

Computer Networks and Distributed Systems
Improving the security of wireless sensor networks using Game Theory

Behzad Seif; mohammad goodarzi

Volume 7, Issue 2 , May 2021, , Pages 93-102

Abstract
  Today, the use of wireless sensor networks has become very popular in many applications. Due to the connection in wireless sensor networks, it is done wirelessly, so they are naturally insecure and prone to various types of attacks. In the past, various solutions were offered in this regard, each of ...  Read More

Software Engineering and Information Systems
Investigating the Factors Affecting the Readiness Level of IoT Technology Acceptance (Case Study: Financial Activists, Stock Exchange, and Financial Institutions)

Amir Abbas Farahmand; Reza Radfar; Alireza Poorebrahimi; Mani Sharifi

Volume 7, Issue 2 , May 2021, , Pages 103-126

Abstract
  IoT, a state-of-the-art technology, faces many challenges in its growth and development. One of the main concerns is the potential threats posed by the spread of such technology in the world. The widespread adoption and spread of such a technology can threaten us much more seriously than the Internet ...  Read More

Pattern Analysis and Intelligent Systems
Improve Spam Detection in the Internet Using Feature Selection based on the Metahuristic Algorithms

Abdulbaghi Ghaderzadeh; sahar Hosseinpanahi; Sarkhel Taher kareem

Volume 7, Issue 2 , May 2021, , Pages 115-125

Abstract
  Nowadays, spam is a major challenge regarding emails. Spam is a specific type of email that is sent to the network for malicious purposes. Spam plays an important role in stealing information and can include fake links to trick users. Machine learning and data mining techniques such as artificial neural ...  Read More

Computer Networks and Distributed Systems
Workflow Scheduling on Hybrid Fog-Cloud Environment Based on a Novel Critical Path Extraction Algorithm

Fatemeh Davami; Sahar Adabi; Ali Rezaee; Amir Masoud Rahamni

Volume 7, Issue 2 , May 2021, , Pages 126-136

Abstract
  In the last ten years, the Cloud data centers have been manifested as the crucial computing architectures to enable extreme data workflows. Due to the complicatedness and diverse kinds of computational resources like Fog nodes and Cloud servers, workflow scheduling has been proposed to be the main challenge ...  Read More

Computer Networks and Distributed Systems
An Improved Junction-Based Directional Routing Protocol (IJDRP) for VANETs

Bharat Mahaur; Aishwarya Gupta

Volume 6, Issue 3 , August 2020, , Pages 133-144

Abstract
  Vehicular Ad-Hoc Networks (VANETs) is a novel technology that has recently emerged and due to its swift changing topology and high mobility nature, it has become problematic to design an efficient routing protocol in VANETs’ amongst both moving and stationary units. Also, the existing routing algorithms ...  Read More

Pattern Analysis and Intelligent Systems
Optimization of weighting-based approach to predict and deal with cold start of web recommender systems using cuckoo algorithm

reza molaee fard

Volume 7, Issue 2 , May 2021, , Pages 137-146

Abstract
  Recommending systems are systems that, by taking limited information from the user and features such as what the user has searched for in the past and what product they have rated, can correctly identify the user and the desired items Offer the user. The user's desired items are suggested to him through ...  Read More

Computer Networks and Distributed Systems
A Method for Measuring Energy Consumption in IaaS Cloud

Derdus Kenga; Vincent Oteke Omwenga; Patrick Job Ogao

Volume 6, Issue 3 , August 2020, , Pages 145-154

Abstract
  The ability to measure the energy consumed by cloud infrastructure is a crucial step towards the development of energy efficiency policies in the cloud infrastructure. There are hardware-based and software-based methods of measuring energy usage in cloud infrastructure. However, most hardware-based energy ...  Read More

Pattern Analysis and Intelligent Systems
PEML-E: EEG eye state classification using ensembles and machine learning methods

Razieh Asgarnezhad; Karrar Ali Mohsin Alhameedawi

Volume 7, Issue 2 , May 2021, , Pages 147-156

Abstract
  Due to the importance of automatic identification of brain conditions, many researchers concentrate on Epilepsy disorder to aim to the detecting of eye states and classification systems. Eye state recognition has a vital role in biomedical informatics such as controlling smart home devices, driving detection, ...  Read More

Computer Networks and Distributed Systems
An Effective Task Scheduling Framework for Cloud Computing using NSGA-II

Hanieh Ghorashi; Meghdad Mirabi

Volume 6, Issue 3 , August 2020, , Pages 155-168

Abstract
  Cloud computing is a model for convenient on-demand user’s access to changeable and configurable computing resources such as networks, servers, storage, applications, and services with minimal management of resources and service provider interaction. Task scheduling is regarded as a fundamental ...  Read More