مرور Volume 6, Issue 2 بر اساس عنوان

  • Detecting Bot Networks Based On HTTP And TLS Traffic Analysis 

    Nafarieh, Zahra (Science and Research Branch,Islamic Azad University, 2020-05-01)
    Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections ...

  • An Optimization K-Modes Clustering Algorithm with Elephant Herding Optimization Algorithm for Crime Clustering 

    Soleimanian Gharehchopogh, Farhad؛ Haggi, Sevda (Science and Research Branch,Islamic Azad University, 2020-05-01)
    The detection and prevention of crime, in the past few decades, required several years of research and analysis. However, today, thanks to smart systems based on data mining techniques, it is possible to detect and prevent ...

  • Prediction of Student Learning Styles using Data Mining Techniques 

    Khakata, Esther؛ Omwenga, Vincent؛ Msanjila, Simon (Science and Research Branch,Islamic Azad University, 2020-05-01)
    This paper focuses on the prediction of student learning styles using data mining techniques within their institutions. This prediction was aimed at finding out how different learning styles are achieved within learning ...

  • A procedure for Web Service Selection Using WS-Policy Semantic Matching 

    Amiri Kamalabad, Maryam؛ mardukhi, farhad؛ Nematbakhsh, naser (Science and Research Branch,Islamic Azad University, 2020-05-01)
    In general, Policy-based approaches play an important role in the management of web services, for instance, in the choice of semantic web service and quality of services (QoS) in particular. The present research work ...

  • Routing Hole Handling Techniques for Wireless Sensor Networks: A Review 

    B H, Swathi؛ H L, Gururaj (Science and Research Branch,Islamic Azad University, 2020-05-01)
    A Wireless Sensor Network consists of several tiny devices which have the capability to sense and compute the environmental phenomenon. These sensor nodes are deployed in remote areas without any physical protections. A ...

  • Using a Neural Network instead of IKM in 2R Planar Robot to follow rectangular path 

    Ali, Ali (Science and Research Branch,Islamic Azad University, 2020-05-01)
    Abstract— An educational platform is presented here for the beginner students in the Simulation and Artificial Intelligence sciences. It provides with a start point of building and simulation of the manipulators, especially ...