Computer Networks and Distributed Systems
A Review of Fraud Detection Algorithms for Electronic Payment Card Transactions

Touraj BaniRostam; Hamid BaniRostam; Mir Mohsen Pedram; Amir Masoud Rahamni

Volume 7, Issue 3 , August 2021, Pages 157-166

Abstract
  Abstract—Several studies have been presented to solve challenges of electronic card (e-card) fraud that the two main purposes of these studies are to identify types of e-card fraud and to investigate the methods used in bank fraud detection. To achieve this purpose, one of the most common methods ...  Read More

Computer Networks and Distributed Systems
A Survey on Routing Protocols in Vehicular Ad hoc Network

Elham Bozorgzadeh; hamid barati; Ali Barati

Volume 7, Issue 3 , August 2021, Pages 167-176

Abstract
  Vehicular ad hoc networks (VANETs) are a subclass of mobile ad hoc networks (MANETs) that have inherited some of this type of network's features. Due to road accidents, these networks are a promising technology to increase passengers' comfort and safety and increase road safety and provide traffic information. ...  Read More

Pattern Analysis and Intelligent Systems
A New Model-based Bald Eagle Search Algorithm with Sine Cosine Algorithm for Data Clustering

Farhad Soleimanian Gharehchopogh; Berivan Rostampnah

Volume 7, Issue 3 , August 2021, Pages 177-186

Abstract
  Abstract— Clustering is one of the most popular techniques in unsupervised learning in which data is divided into different groups without any prior knowledge, and for this reason, clustering is used in various applications today. One of the most popular algorithms in the field of clustering is ...  Read More

Computer Networks and Distributed Systems
A Review of Anonymity Algorithms in Big Data

Elham shamsinejad; Mir Mohsen Pedram; Amir Masoud Rahamni; Touraj BaniRostam

Volume 7, Issue 3 , August 2021, Pages 187-196

Abstract
  By increasing access to high amounts of data through internet-based technologies such as social networks and mobile phones and electronic devices, many companies have considered the issues of accessing large, random and fast data along with maintaining data confidentiality. Therefore, confidentiality ...  Read More