• XML

    isc pubmed crossref medra doaj doaj
  • List of Articles


      • Open Access Article

        1 - Routing Hole Handling Techniques for Wireless Sensor Networks: A Review
        Swathi B H Gururaj H L
        A Wireless Sensor Network consists of several tiny devices which have the capability to sense and compute the environmental phenomenon. These sensor nodes are deployed in remote areas without any physical protections. A Wireless Sensor Network can have various types of More
        A Wireless Sensor Network consists of several tiny devices which have the capability to sense and compute the environmental phenomenon. These sensor nodes are deployed in remote areas without any physical protections. A Wireless Sensor Network can have various types of anomalies due to some random deployment of nodes, obstruction and physical destructions. These anomalies can diminish the sensing and communication functionalities of the network. Many kinds of holes can be formed in a sensor network that creates geographically correlated areas. These holes are also responsible for creating communication voids. These voids do not let the packets to reach the destination and minimises the expected network performance. Hence it ought to be resolved. In this paper we presented different kinds of holes that infect the sensor network, their characteristics and the effects on successful communication within the sensor network .Later we presented a detailed review on different routing hole handing techniques available in literature ,their possible strengths and short comes. At last we also presented a qualitative comparison of these routing hole handing techniques. Manuscript profile
      • Open Access Article

        2 - Detecting Bot Networks Based On HTTP And TLS Traffic Analysis
        Zahra Nafarieh
        Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HT More
        Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer to use the web as a communication environment to launch application layer attacks and secretly engage in forbidden activities, while TLS (Transport Layer Security) protocols allow encrypted communication between client and server in the context of Internet provides. Methods of analyzing traffic behavior do not depend on payloads. This means that they can work with encrypted network communication protocols. Traffic behavior analysis methods do not depend on package shipments, which means they can work with encrypted network communication protocols. Hence, the analysis of TLS and HTTP traffic behavior has been considered for detecting malicious activities. Because of the exchange of information in the network context is very high and the volume of information is very large, storing and indexing of this massive data require a Big data platform. Manuscript profile
      • Open Access Article

        3 - Using a Neural Network instead of IKM in 2R Planar Robot to follow rectangular path
        Ali Ali
        Abstract— An educational platform is presented here for the beginner students in the Simulation and Artificial Intelligence sciences. It provides with a start point of building and simulation of the manipulators, especially of 2R planar Robot. It also displays a m More
        Abstract— An educational platform is presented here for the beginner students in the Simulation and Artificial Intelligence sciences. It provides with a start point of building and simulation of the manipulators, especially of 2R planar Robot. It also displays a method to replace the inverse kinematic model (IKM) of the Robot with a simpler one, by using a Multi-Layer Perceptron Neural Network (MLP-NN), to make the end-effector able to track a specific path, which has a rectangular shape (in this article), and allocated in the robot's workspace. The method is based on Back-Propagation Levenberg Marquardt algorithm. This paper also suggests a good strategy for the simulation of the robot's motion in Matlab to tell the beginners how the operation could be done quite closely to the built-in Matlab functions. The control part was ignored here for the simplicity. So we can classify this paper as a manual in the robotic world. Manuscript profile
      • Open Access Article

        4 - An Optimization K-Modes Clustering Algorithm with Elephant Herding Optimization Algorithm for Crime Clustering
        Farhad Soleimanian Gharehchopogh Sevda Haggi
        The detection and prevention of crime, in the past few decades, required several years of research and analysis. However, today, thanks to smart systems based on data mining techniques, it is possible to detect and prevent crime in a considerably less time. Classificati More
        The detection and prevention of crime, in the past few decades, required several years of research and analysis. However, today, thanks to smart systems based on data mining techniques, it is possible to detect and prevent crime in a considerably less time. Classification and clustering-based smart techniques can classify and cluster the crime-related samples. The most important factor in the clustering technique is to find the centrality of the clusters and the distance between the samples of each cluster and the center of the cluster. The problem with clustering techniques, such as k-modes, is the failure to precisely detect the centrality of clusters. Therefore, in this paper, Elephant Herding Optimization (EHO) Algorithm and k-modes are used for clustering and detecting the crime by means of detecting the similarity of crime with each other. The proposed model consists of two basic steps: First, the cluster centrality should be detected for optimized clustering; in this regard, the EHO Algorithm is used. Second, k-modes are used to find the clusters of crimes with close similarity criteria based on distance. The proposed model was evaluated on the Community and Crime dataset consisting of 1994 samples with 128 characteristics. The results showed that purity accuracy of the proposed model is equal to 91.45% for 400 replicates. Manuscript profile
      • Open Access Article

        5 - A procedure for Web Service Selection Using WS-Policy Semantic Matching
        Maryam Amiri Kamalabad farhad mardukhi naser Nematbakhsh
        In general, Policy-based approaches play an important role in the management of web services, for instance, in the choice of semantic web service and quality of services (QoS) in particular. The present research work illustrates a procedure for the web service selection More
        In general, Policy-based approaches play an important role in the management of web services, for instance, in the choice of semantic web service and quality of services (QoS) in particular. The present research work illustrates a procedure for the web service selection among functionality similar web services based on WS-Policy semantic matching. In this study, the procedure of WS-Policy publishing in the UDDI registry was also described. The approach, which is used to represent the policies, is thus represented as semantic trees, and in this representation, measurable quality attributes are considered; and the certain matching operations are used to identify the similarity match via match function or similarity distance function. The illustration of semantic concepts and rules during policy matching, which is not possible by using a mere semantic concept, leads to better web service matches. The proposed approach has been validated through various tests that can evaluate the similarity of large and arbitrary sets of measurable quality attributes. We also compared the proposed procedure with the other ones. The proposed procedure for web service choose, which uses WS-Policy semantic matching, can be more effective to solve different problems like selection, composition, and substitution of services. Manuscript profile
      • Open Access Article

        6 - Prediction of Student Learning Styles using Data Mining Techniques
        Esther Khakata Vincent Omwenga Simon Msanjila
        This paper focuses on the prediction of student learning styles using data mining techniques within their institutions. This prediction was aimed at finding out how different learning styles are achieved within learning environments which are specifically influenced by More
        This paper focuses on the prediction of student learning styles using data mining techniques within their institutions. This prediction was aimed at finding out how different learning styles are achieved within learning environments which are specifically influenced by already existing factors. These learning styles, have been affected by different factors that are mainly engraved and found within the students learning environment. To obtain the learning styles, a data mining technique was used and this explicitly involved the use of pattern analysis in order to identify the underlying learning styles in the data collected from the learners. This paper highlights the five major learning styles that describe the patterns extracted from the collected data. Therefore, considering the changed learning ecosystem, it is clear that prediction of student learning styles can be done when the various factor inputs within the student environment are brought together and analyzed to focus on learning within internet-mediated environments. Manuscript profile