Latest News
    Journal of Optimization in Soft Computing ( Scientific )
  • OpenAccess
  • About the journal

    Journal of Optimization in Soft Computing (JOSC) is dedicated to system solutions based on soft computing technology. It provides rapid dissemination of important achievements in soft computing technology, integrating research on evolutionary algorithms and genetic programming, neuroscience and neural network systems, fuzzy set theory and fuzzy systems, and chaos theory and chaotic systems.
    Soft computing encourages the integration of soft computing techniques and tools into everyday and advanced applications. By linking ideas and techniques in soft computing with other disciplines, the journal acts as a unifying platform that facilitates comparisons, extensions, and new applications. As such, the journal is an international forum for all scientists and engineers engaged in research and development in this rapidly developing field.

    Journal of Optimization in Soft Computing  (JOSC) published by Shahrekord Islamic Azad University (located in Iran) is a scholarly open access, peer-reviewed, Quarterly-annualljournal. OSC publishes original theoretical and technical research papers as well as experimental ones for development in Computing Domain. The Journal targets many special issues on innovative topics and specific subjects, and strives to Soft  bridge the gap between theoretical research and practical applications.

    The policy of peer review is of Double-blinded. The journal welcomes all research papers from all over the world. The editorial board members are from diverse countries of the world. The journal tries to expedite the review process of received papers. OSC is promised  to publish papers which are of enough conformity with the stated aims & scope. JOSC is continuously tries to improve it's processes with the respect to the international standards of journals. 

    OSC does not charge authors for publishing their articles in this journal.

     Publication authorization is certified by the Ministry of Culture and Islamic Guidance of Islamic Republic of Iran; No.--   JOSC has been approved to be indexed in Scientific Information Database as Scientific-Research Publication.

    OSC is also licensed under the terms of the Creative Commons Attribution License 4.0 International (CC- By 4.0). Licensees may copy, distribute, display and make derivative works only if they cite the original published OSC article.

    Contact Address:

     Journal of Optimization of Soft Computing

    Islamic Azad University, Shahrekord Branch, Shahrekord, Iran.

    Website:https://sanad.iau.ir/journal/josc

    Editor in Chief: Prof. Esfandiyar Islami

    E-mail: e_eslami2000@yahoo.com

    Editor of the Mathematics Section: Dr. Farhad Khaksar Haghani

    E-mail: haghani1351@yahoo.com

    Director-in-Charge: Dr. Farshad Kiyoumarsi

    E-mail: farshad.kiyoumarsi@iau.ac.ir

    Manager: Dr. Behzad Zamani Dehkordi

    E-mail: behzad.zamani@iau.ac.ir

    P. O. Box: 166.

    Tel:  (+98) 38-33361078

     E-mail: shahrekord.josc@iau.ac.ir


    Recent Articles

    • Open Access Article

      1 - BICYCLIC GRAPHS WITH MINIMUM AND MAXIMUM FORGOTTEN AND INVERSE DEGREE INDICES
      mohammad ali manian Shahram Heidarian ّFarhad Khaksar Haghani
      Issue 1 , Vol. 2 , Spring 2024
      In chemical graph theory, the forgotten index and inverse degree index of a connected simple graph G are defined as F(G) = ∑ 〖d_u^2+d_v^2 〗and ID(G) = ∑1/d_u respectively, where d_u represents the degree of vertex u in G. In this paper, we use some graph transformati More
      In chemical graph theory, the forgotten index and inverse degree index of a connected simple graph G are defined as F(G) = ∑ 〖d_u^2+d_v^2 〗and ID(G) = ∑1/d_u respectively, where d_u represents the degree of vertex u in G. In this paper, we use some graph transformations and determine the minimum and the maximum values of the forgotten index and the inverse degree index on the class of bicyclic graphs. In addition, we characterize their corresponding extremal graphs. Manuscript profile

    • Open Access Article

      2 - INTRODUCING TWO CLASSES OF OPTIMAL CODES DERIVED FROM ONE WEIGHT F qFq[u]-ADDITIVE CODES
      sadegh sadeghi narjes mohsenifar
      Issue 1 , Vol. 2 , Spring 2024
      Let $\mathbb{F}_{q}$ be a finite field with $q$ elements where $q = p^{m}$, and $R=\mathbb{F}_{q}+u \mathbb{F}_{q}$ denotes the ring $\frac{\mathbb{F}_{q}[u] }{\langle u^{2}\rangle}$. For positive integers $\alpha$ and $\beta$, a nonempty subset $C$ of $\mathbb{F}_{q}^ More
      Let $\mathbb{F}_{q}$ be a finite field with $q$ elements where $q = p^{m}$, and $R=\mathbb{F}_{q}+u \mathbb{F}_{q}$ denotes the ring $\frac{\mathbb{F}_{q}[u] }{\langle u^{2}\rangle}$. For positive integers $\alpha$ and $\beta$, a nonempty subset $C$ of $\mathbb{F}_{q}^{\alpha}\times R^{\beta}$ is called an $\mathbb{F}_{q}\mathbb{F}_{q}[u]$-additive code if $C$ is an $R$-submodule of $\mathbb{F}_{q}^{\alpha}\times R^{\beta}$. In this paper, we study these codes with respect to homogenous and Lee weights. Among main results, by the Gray image of these codes, we obtain $[q^{2}+q, 2, q^{2}]$ and $[2(q+1), 2, 2q]$ one weight optimal codes over $\mathbb{F}_{q}$. Manuscript profile

    • Open Access Article

      3 - Using the fuzzy methods to examine changes in brain lesions and atrophy from MRI images for rapid diagnosis of MS
      Alireza Banitalebidehkordi
      Issue 1 , Vol. 2 , Spring 2024
      Multiple sclerosis(MS) is a disease that affects the central nervous system, during which the myelin present on the nerve fibers that have a protective role is destroyed, and therefore the conduction of electric current is disturbed and the symptoms of MS disease appear More
      Multiple sclerosis(MS) is a disease that affects the central nervous system, during which the myelin present on the nerve fibers that have a protective role is destroyed, and therefore the conduction of electric current is disturbed and the symptoms of MS disease appear. TIn this disease, the white blood cells that play a defensive role in the body attack the myelin, which is a protection for nerve fibers, as a foreign agent, and each time these blood cells attack the nerve fibers of one of the organs of the patient's body. which is unclear, that organ will have problems. The best way to diagnose MS is to examine brain MRI images. Therefore, the existence of a fast and accurate method to evaluate changes in brain atrophy or the creation and increase of lesions (plaques) caused by this disease is a key component in diagnosing and evaluating the progress of the disease and the effectiveness of its treatment courses. Manual detection of changes in lesions (plaques) and brain atrophy caused by this disease usually requires a trained specialist and is very slow and difficult, and the results are somewhat subjective. Therefore, the existence of an automatic system for extracting and checking these changes is essential. Although many automatic methods have been proposed, the segmentation results are not accurate enough. As a result, there is a great need to develop a strong, fast and accurate method to diagnose MS and brain lesions caused by it. In this article, by combining two fuzzy methods and the controlled watershed algorithm, we propose a fast method with high accuracy to diagnose MS from brain MR images. Manuscript profile

    • Open Access Article

      4 - Calculation of conductivity limit for fixed temperature limited plates using panel numerical method
      ّFarhad Raeiszadeh Ahmad reza Abedian
      Issue 1 , Vol. 2 , Spring 2024
      The dimensionless Nusselt number is one of the important parameters in convection heat transfer, which can be considered as a measure of the heat transferred from the body through convection. In heat transfer, the Nusselt number indicates the rate of displacement heat t More
      The dimensionless Nusselt number is one of the important parameters in convection heat transfer, which can be considered as a measure of the heat transferred from the body through convection. In heat transfer, the Nusselt number indicates the rate of displacement heat transfer to conductive heat transfer. When heat transfer occurs only through conduction, it is called conduction limit, and its calculation is particularly important in the industry. This research uses a panel numerical method to calculate the conductivity limit for two-sided and one-side active plates for square, circular and triangular cases. Finally, by comparing all the results, the performance of panel numerical method for calculating the conductivity limit was confirmed. Manuscript profile

    • Open Access Article

      5 - A Comprehensive Review on Service Function Chaining in Networking Environments
      Pouya Khosraviandehkordi
      Issue 1 , Vol. 2 , Spring 2024
      Service Function Chaining (SFC) has emerged as a critical technology in networking environments to provide efficient and flexible service delivery. This paper provides a comprehensive review of the current state of research and development in the field of SFC, coverin More
      Service Function Chaining (SFC) has emerged as a critical technology in networking environments to provide efficient and flexible service delivery. This paper provides a comprehensive review of the current state of research and development in the field of SFC, covering key concepts, architectures, challenges, and trends. We first introduce the concept of SFC and its importance in modern networking environments. We then discuss different SFC architectures and their advantages and drawbacks. Furthermore, we analyze the challenges and opportunities in the deployment of SFC in real-world scenarios. Finally, we discuss the emerging trends and future directions in the field of SFC. This review aims to provide researchers and practitioners with a deeper understanding of the current landscape of SFC and guide future research efforts in this area. Manuscript profile

    • Open Access Article

      6 - Comparison of Pre-Trained models in Extractive Text Summarization of Mobile User Reviews
      Mehrdad Razavi Dehkordi hamid rastegari Akbar Nabiollahi Najafabadi Taghi Javdani Gandomani
      Issue 1 , Vol. 2 , Spring 2024
      Since the inception of mobile apps, user feedback has been extremely valuable to app developers as it contains users' feelings, bugs, and new requirements. Due to the large volume of reviews, summarizing them is very difficult and error-prone. So far, many works have be More
      Since the inception of mobile apps, user feedback has been extremely valuable to app developers as it contains users' feelings, bugs, and new requirements. Due to the large volume of reviews, summarizing them is very difficult and error-prone. So far, many works have been done in the field of extractive summarization of users' reviews; However, in most researches, old methods of machine learning or natural language processing have been used, or if a model has been trained for summarizing using transformers, it has not been determined whether this model is useful for summarizing the reviews of mobile users. No? In other words, the model for summarizing texts has been presented in a general purpose form, and no investigation has been carried out for its use in special purpose summarization. In this article, first, 1000 reviews were randomly selected from the Kaggle database of user reviews, and then given to 4 pre-trained models bart_large_cnn, bart_large_xsum, mT5_multilingual_XLSum, and Falcon'sai Text_Summrization for summarization, and the criteria Rouge1, Rouge2 and RoungL were calculated separately for each of the models and finally it was found that the pre-trained Falcon's AI model with a score of 0.6464 in the rouge1 criterion, a score of 0.6140 in the rouge2 criterion and a score of 0.6346 in rougeL The best model for summarizing users' reviews is the Play Store. Manuscript profile
    Most Viewed Articles

    • Open Access Article

      1 - A New Identity-Based Encryption Scheme Using Blockchain for Electronic Health System
      ّFatemeh Alidadi Shamsabadi Shaghayegh Bakhtiari chehelcheshmeh Majid Alipour
      Issue 1 , Vol. 1 , Autumn 2023
      With the development of information technology, electronic health (e-health) systems are used as a common approach to recording patients' medical data. Given that medical information is an essential asset of individuals and the health system, there are severe concerns a More
      With the development of information technology, electronic health (e-health) systems are used as a common approach to recording patients' medical data. Given that medical information is an essential asset of individuals and the health system, there are severe concerns about secure sharing and preserving this information's privacy. In this paper, we propose a new identity-based encryption (IBE) method by bilinear pairings to ensure the confidentiality of patients' data and their privacy in cloud health systems; in this way, this plan also provides authentication for users using challenge-response mechanisms. In addition, the proposed scheme, using blockchain techniques, ensures integrity and precise access control for shared data. The correctness of the proposed protocol is verified, and its security is formally proven in the standard model. The implementation of our scheme is performed in Java, and the results show that the proposed scheme reduces the computational overhead compared to previous similar methods. Manuscript profile

    • Open Access Article

      2 - Extending the Lifetime of Wireless Sensor Networks Using Fuzzy Clustering Algorithm Based on Trust Model
      Farshad Kiyoumarsi Behzad Zamani Dehkordi
      Issue 1 , Vol. 1 , Autumn 2023
      Wireless sensor networks (WSNs) are the safest and most widely used existing networks, which are used for monitoring and controlling the environment and obtaining environmental information in order to make appropriate decisions in different environments. One of the very More
      Wireless sensor networks (WSNs) are the safest and most widely used existing networks, which are used for monitoring and controlling the environment and obtaining environmental information in order to make appropriate decisions in different environments. One of the very important features of wireless sensor networks is their lifetime. Two important factors come to mind to increase the lifetime of networks: These factors are maintaining the coverage of the network and reducing the energy consumption of sensor nodes simultaneously with the uniform consumption of energy by all of them. Clustering, as the optimal method of data collection, is used to reduce energy consumption and maintain the coverage of the network in wireless sensor networks. In clustered networks, each node transmits acquired data to the cluster head to which it belongs. After a cluster head collects all the data from all member nodes, it transmits the data to the base station (sink). Given that fuzzy logic is a good alternative for complex mathematical systems, in this study, a fuzzy logic-based trust model uses the clustering method in wireless sensor networks. In this way, cluster-head sensors are elected from among sensors with high reliability with the help of fuzzy rules. As a result, the best and most trusted sensors will be selected as the cluster heads. The simulation results in MATLAB software show that in this way, in comparison with K-Means, FCM, subtractive clustering, and multi-objective fuzzy clustering protocols, the energy consumption in clustered nodes will decrease and the network’s lifetime will increase. Manuscript profile

    • Open Access Article

      3 - An Enhanced Rotor Side Converter Control of DFIG-Based Wind Turbines For Improving LVRT Capability During Balanced Grid Faults
      Hamid Rahimi Esfahani
      Issue 1 , Vol. 1 , Autumn 2023
      Abstract- Among variable speed wind turbines the use of doubly-fed induction generator based wind turbines are very common. However, due to their stator direct connection to the grid, they are very sensitive to grid faults. This paper analyzes the low voltage ride-thr More
      Abstract- Among variable speed wind turbines the use of doubly-fed induction generator based wind turbines are very common. However, due to their stator direct connection to the grid, they are very sensitive to grid faults. This paper analyzes the low voltage ride-through (LVRT) capability enhancement under the three-phase balanced grid fault. Therefore the variations of 5 parameters during balanced grid fault are Analyzed. These parameters are stator voltage, rotor current, stator current, rotor speed, and the DC link voltage. To improve the LVRT capability an enhanced demagnetization control method is proposed. This method shortens the natural stator current time constant and approximately immunes the system against parameter variations as shown in simulation results. To show the effectiveness of the proposed method, the results are compared with one of the best previous demagnetization control methods. Manuscript profile

    • Open Access Article

      4 - A survey of meta-heuristic methods for optimization problems
      Mehdi Fazli
      Issue 1 , Vol. 1 , Autumn 2023
      In this article, we will examine the problems related to routing and positioning with real variables and examine the related questions. These engineering, inventory and optimization decisions are made in a multi-layered supply chain system, including suppliers, warehous More
      In this article, we will examine the problems related to routing and positioning with real variables and examine the related questions. These engineering, inventory and optimization decisions are made in a multi-layered supply chain system, including suppliers, warehouses and different buyers. We are looking for new ways to manage location and routing efficiently and effectively. In order to increase efficiency and achieve optimal results, exploratory and meta-heuristic methods have been used. In meta-heuristic techniques, a combination technique is usually used to increase performance. Therefore, this review article examines meta-heuristic methods and analysis of location problems using different quantities. It also examines the advantages and disadvantages of each method to optimally solve these problems in order to introduce practical and efficient methods Manuscript profile

    • Open Access Article

      5 - Social Spider Optimization Algorithm in Multimodal Medical Image Registration
      Zahra Hossein-Nejad Mehdi Nasri
      Issue 1 , Vol. 1 , Autumn 2023
      Medical image registration plays an important role in many clinical applications, including the detection and diagnosis of diseases, planning of therapy, guidance of interventions. Multimodal medical image registration is the process of overlapping two or more images ta More
      Medical image registration plays an important role in many clinical applications, including the detection and diagnosis of diseases, planning of therapy, guidance of interventions. Multimodal medical image registration is the process of overlapping two or more images taken from the same scene by different modalities and different sensors. Intensity-based methods are widely used in multimodal medical image registration, these techniques register different modality images that have the same content by optimal transformation. The estimation of the optimal transformation requires the optimization of a similarity metric between the images. Recently, various optimization algorithms have been presented that the selection of appropriate optimization algorithms is very important in determining the optimal transformation parameter. The Social Spider Optimization (SSO) algorithm is one of the meta-heuristic methods that prevents premature convergence. In this paper, medical image registration technique is suggested based on the SSO algorithm. The Mutual Information (MI), Normalization of Mutual Information (NMI), and Sum of Squared Differences (SSD) are used separately as cost function (objective function) and the performance of each of these functions is checked in multimodal medical image registration. The simulation results on Brain Web data set affirm Manuscript profile

    • Open Access Article

      6 - FTRTA : Fault Tolerance and Reliable Transmissions Algorithm based on the Internet of Things
      Mohsen Mozafari Vanani Pouya Khosraviandehkordi
      Issue 2 , Vol. 1 , Winter 2024
      The limitations of IoT have led to increased failures and the need for guaranteed fault tolerance to ensure adequate network performance. Although previous studies have effectively improved fault tolerance by focusing on various aspects of this area, previous methods ar More
      The limitations of IoT have led to increased failures and the need for guaranteed fault tolerance to ensure adequate network performance. Although previous studies have effectively improved fault tolerance by focusing on various aspects of this area, previous methods are ineffective in ensuring the stability and accuracy of data exchange in the event of failure. The existence of this problem shows the need to propose a new method that can guarantee the stability and accuracy of data exchange to guarantee the stability of network performance in case of failure. To achieve this, this research introduced a method called FTRTA, which is based on the development of the RPL protocol and data distribution techniques. Distribution techniques are effective in improving load balancing and fault tolerance of network traffic. The FTRTA was developed based on this technique and in three operational steps. Firstly, the situation of the network nodes is evaluated and analyzed in the same way as when sending DIO messages. In the second step, the network communication graph is created. Finally, in the third step, data transmission is based on a distribution technique to ensure fault tolerance. The simulation results using Cooja software show the high performance of FTRTA in ensuring the stability and accuracy of data exchange, improving factors such as successful receptions and network throughput compared to similar studies. Manuscript profile

    • Open Access Article

      7 - EATE-RPL: Energy Aware Trust-based Efficient RPL for Internet of Things
      farzaneh kaviani baghbadorani Mohammadreza Soltan Aghaei Farsad zamani Boroujeni
      Issue 2 , Vol. 1 , Winter 2024
      Abstract The Internet of Things (IoT) is considered as one of the newest communication technologies for various applications. On the other hand, it has faced many challenges that one of the most important of which is related to the security. Due to many limitations, Io More
      Abstract The Internet of Things (IoT) is considered as one of the newest communication technologies for various applications. On the other hand, it has faced many challenges that one of the most important of which is related to the security. Due to many limitations, IoT is very vulnerable to attacks, and it is highly exposed to attacks due to its sensitive applications. Various studies have been introduced to improve IoT security. Most of methods have focused on improving the security of the RPL protocol (as the IoT routing standard) based on the development of trust models. However, most of these researches have considered behaviors to calculate the value of trust. This way of assessing trust is not enough due to the widespread attacks of malicious nodes. In this paper, an improved protocol called EATE-RPL is proposed based on RPL development utilizing trust models with intrusion detection system. EATE-RPL focuses on three important principles, including establishing secure and reliable routing topology, evaluating trust, and detecting malicious nodes. In the first step, the network routing topology is formed based on the trust and conditions of the nodes. In the second step, in accordance with the data exchanges, the trust of the nodes is evaluated and malicious factors are identified. The simulation results using cooja indicated the superiority of EATE-RPL in improving routing reliability and data exchange over previous operations. Manuscript profile

    • Open Access Article

      8 - Comparison optimization Computational model between Cellular Automata and Genetic programming in dynamic response of guyed tower under vibration force
      kaveh kumarci
      Issue 2 , Vol. 1 , Winter 2024
      In the telecommunication industry, guyed towers are one of the important structural subsystems. They support a variety of antenna systems at great heights to transmit radio, television and telephone signals over long distance, thus preserving them in events of natural d More
      In the telecommunication industry, guyed towers are one of the important structural subsystems. They support a variety of antenna systems at great heights to transmit radio, television and telephone signals over long distance, thus preserving them in events of natural disasters such as earthquake is of high priority. Also, domes and transmission stations functions depend on transmitted information by guyed towers. In this paper, seismic behavior of guyed towers are studied. For that, one guyed tower in 9 clusters of guys is studied under earthquake force. This research was accomplished on the base of wind and earthquake forces and tower interaction to these forces. Here, the effect of earthquake force and tower response to seismic events are studied. At first, time history analysis is used in determination of towers vibration natural modes, then, under time- acceleration components of El-Centro earthquake, spectral analysis are accomplished. Analysis outputs are two parameters including frequency and maximum lateral displacement which are provided using ANSYS software. The results are used in comparing two different calculation models: genetic programming and cellular automata. Manuscript profile

    • Open Access Article

      9 - An optimal approach to detect anomalies in intrusion detection systems
      افسانه بنی طالبی
      Issue 2 , Vol. 1 , Winter 2024
      Software Defined Networking (SDN) is considered as an innovate architecture of computer networks by using the central controller. Any modification in network data and its arrangement can be effortlessly executed in software via the controller in these networks. Conseque More
      Software Defined Networking (SDN) is considered as an innovate architecture of computer networks by using the central controller. Any modification in network data and its arrangement can be effortlessly executed in software via the controller in these networks. Consequently, the identification and timely response to Distributed Denial of Service (DDoS) attacks can be achieved, which is not the case in conventional networks.This paper uses the α-Entropy statistical method considering a threshold and machine learning techniques, K-Nearest Neighbor (KNN), Random Forest (RF) and Support Vector Machine (SVM) to increase the accuracy of detecting DDoS attacks. In this method, the results are evaluated by 10-fold cross validation. The used dataset is ISOT, CTU-13 and UNB ISCX. The results of evaluation with a precision of 99.84% and FPR value of 0.10% indicate the high efficiency of the proposed model in SDN networks. Manuscript profile

    • Open Access Article

      10 - An Intrusion Detection System for Network Cyber Security Using Hybrid Feature Selection Algorithms
      Golnaz Aghaee Ghazvini zahra Oday Kamil
      Issue 2 , Vol. 1 , Winter 2024
      One of the most important challenges of the expansion of the Internet and virtual space is cyber-attacks. These attacks are becoming new every day and it is becoming more difficult to deal with them. As a result, methods should be used to detect them, which can detect a More
      One of the most important challenges of the expansion of the Internet and virtual space is cyber-attacks. These attacks are becoming new every day and it is becoming more difficult to deal with them. As a result, methods should be used to detect them, which can detect all types of cyber-attacks in the shortest possible time and with proper accuracy. Nowadays, machine learning methods are usually used to detect cyber-attacks. But since the data related to cyber-attacks have many characteristics and are kind of bulky data, as a result, the accuracy of conventional machine learning methods to detect them is usually low. In this research, we have used a hybrid feature selection method to select optimal features from the database related to cyber-attacks, which increases the accuracy of attack detection by classification models. In the proposed feature selection method, first the features that have the least redundancy with each other and at the same time are most related to the category variables (labels) are selected by the MRMR algorithm. Then, using a wrapper feature selection method based on the gray wolf optimization (GWO) algorithm to select a subset of the features selected from the previous step, which maximizes the accuracy of the SVM classifier model, is used this subset has optimal features by which the SVM model is trained. As a result, the accuracy of detecting cyber-attacks by the SVM model increases. According to the simulation results, the average accuracy of the proposed method for detecting cyber-attacks is 99.84%, which has improved compared to the intrusion detection methods of the reference article. Manuscript profile
    Upcoming Articles

    Word Cloud

  • Affiliated to
    Islamic Azad University, Shahrekord Branch
    Director-in-Charge
    Farshad Kiyoumarsi (Faculty Member of Shahrekord Azad University)
    Editor-in-Chief
    Esfanidyar Eslami ( Member of the faculty of Shahid Bahonar University of Kerman)
    Executive Manager
    Behzad Zamani Dehkordi (Member of the faculty of Shahrekord Azad University)
    Print ISSN: 3041-8534
    Online ISSN:3041-8534

    Publication period: Quarterly
    Email
    shahrekord.josc@iau.ac.ir
    Address
    Journal of Optimization of Soft Computing, Islamic Azad University, Shaharekord Branch, Shaharekord, Iran
    Phone
    03833361078
    Postal Code
    8813733395

    Search

    Indexed in

    Statistics

    Article Views 1180
    Article Downloads 547
    Time to Accept(day) 39
    Last Update 6/23/2024