فهرست مطالب

Journal of Advances in Computer Engineering and Technology
Volume:6 Issue: 2, Spring 2020

  • تاریخ انتشار: 1399/02/12
  • تعداد عناوین: 6
|
  • Swathi B H *, Gururaj H L Pages 47-60
    A Wireless Sensor Network consists of several tiny devices which have the capability to sense and compute the environmental phenomenon. These sensor nodes are deployed in remote areas without any physical protections. A Wireless Sensor Network can have various types of anomalies due to some random deployment of nodes, obstruction and physical destructions. These anomalies can diminish the sensing and communication functionalities of the network. Many kinds of holes can be formed in a sensor network that creates geographically correlated areas. These holes are also responsible for creating communication voids. These voids do not let the packets to reach the destination and minimises the expected network performance. Hence it ought to be resolved. In this paper we presented different kinds of holes that infect the sensor network, their characteristics and the effects on successful communication within the sensor network .Later we presented a detailed review on different routing hole handing techniques available in literature ,their possible strengths and short comes. At last we also presented a qualitative comparison of these routing hole handing techniques.
    Keywords: Wireless Sensor Networks (WSNs), Geographic routing, greedy forwarding, sensor nodes, routing holes
  • Zahra Nafarieh * Pages 61-70

     Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer to use the web as a communication environment to launch application layer attacks and secretly engage in forbidden activities, while TLS (Transport Layer Security) protocols allow encrypted communication between client and server in the context of Internet provides. Methods of analyzing traffic behavior do not depend on payloads. This means that they can work with encrypted network communication protocols. Traffic behavior analysis methods do not depend on package shipments, which means they can work with encrypted network communication protocols. Hence, the analysis of TLS and HTTP traffic behavior has been considered for detecting malicious activities. Because of the exchange of information in the network context is very high and the volume of information is very large, storing and indexing of this massive data require a Big data platform.

    Keywords: Bot Networks, HTTP Traffic Analysis, TLS Traffic Analysis, Intrusion Detection, Network Security, Security Threats
  • Ali Ali * Pages 71-78

     An educational platform is presented here for the beginner students in the Simulation and Artificial Intelligence sciences. It provides with a start point of building and simulation of the manipulators, especially of 2R planar Robot. It also displays a method to replace the inverse kinematic model (IKM) of the Robot with a simpler one, by using a Multi-Layer Perceptron Neural Network (MLP-NN), to make the end-effector able to track a specific path, which has a rectangular shape (in this article), and allocated in the robot's workspace. The method is based on Back-Propagation Levenberg Marquardt algorithm. This paper also suggests a good strategy for the simulation of the robot's motion in Matlab to tell the beginners how the operation could be done quite closely to the built-in Matlab functions. The control part was ignored here for the simplicity. So we can classify this paper as a manual in the robotic world.

    Keywords: Back-Propagation(BP), Denavit Hartenberg (DH), Direct Kinematic Model (DKM), Inverse Kinematic Model (IKM), Neural Network (NN)
  • Farhad Soleimanian Gharehchopogh *, Sevda Haggi Pages 79-90

    The detection and prevention of crime, in the past few decades, required several years of research and analysis. However, today, thanks to smart systems based on data mining techniques, it is possible to detect and prevent crime in a considerably less time. Classification and clustering-based smart techniques can classify and cluster the crime-related samples. The most important factor in the clustering technique is to find the centrality of the clusters and the distance between the samples of each cluster and the center of the cluster. The problem with clustering techniques, such as k-modes, is the failure to precisely detect the centrality of clusters. Therefore, in this paper, Elephant Herding Optimization (EHO) Algorithm and k-modes are used for clustering and detecting the crime by means of detecting the similarity of crime with each other. The proposed model consists of two basic steps: First, the cluster centrality should be detected for optimized clustering; in this regard, the EHO Algorithm is used. Second, k-modes are used to find the clusters of crimes with close similarity criteria based on distance. The proposed model was evaluated on the Community and Crime dataset consisting of 1994 samples with 128 characteristics. The results showed that purity accuracy of the proposed model is equal to 91.45% for 400 replicates.

    Keywords: Crime Clustering, Clustering, Elephant Herding Optimization Algorithm, K-modes
  • Maryam Amiri Kamalabad *, Farhad Mardukhi, Naser Nematbakhsh Pages 91-106
    In general, Policy-based approaches play an important role in the management of web services, for instance, in the choice of semantic web service and quality of services (QoS) in particular. The present research work illustrates a procedure for the web service selection among functionality similar web services based on WS-Policy semantic matching. In this study, the procedure of WS-Policy publishing in the UDDI registry was also described. The approach, which is used to represent the policies, is thus represented as semantic trees, and in this representation, measurable quality attributes are considered; and the certain matching operations are used to identify the similarity match via match function or similarity distance function. The illustration of semantic concepts and rules during policy matching, which is not possible by using a mere semantic concept, leads to better web service matches. The proposed approach has been validated through various tests that can evaluate the similarity of large and arbitrary sets of measurable quality attributes. We also compared the proposed procedure with the other ones. The proposed procedure for web service choose, which uses WS-Policy semantic matching, can be more effective to solve different problems like selection, composition, and substitution of services.
    Keywords: Ontologies, Rule, Semantic Matching, Service Selection, UDDI, WS-Policy
  • Esther Khakata *, Vincent Omwenga, Simon Msanjila Pages 107-118
    This paper focuses on the prediction of student learning styles using data mining techniques within their institutions. This prediction was aimed at finding out how different learning styles are achieved within learning environments which are specifically influenced by already existing factors. These learning styles, have been affected by different factors that are mainly engraved and found within the students learning environment. To obtain the learning styles, a data mining technique was used and this explicitly involved the use of pattern analysis in order to identify the underlying learning styles in the data collected from the learners. This paper highlights the five major learning styles that describe the patterns extracted from the collected data. Therefore, considering the changed learning ecosystem, it is clear that prediction of student learning styles can be done when the various factor inputs within the student environment are brought together and analyzed to focus on learning within internet-mediated environments.
    Keywords: student, data mining, student performance, classification algorithms, learning style