Volume 12 (2024)
Volume 11 (2023)
Volume 10 (2022)
Volume 9 (2021)
Volume 8 (2020)
Volume 7 (2019)
Volume 6 (2018)
Volume 5 (2017)
Volume 4 (2016)
Volume 3 (2015)
Volume 2 (2014)
Volume 1 (2013)
B.3. Communication/Networking and Information Technology
Intrusion Detection for IoT Network Security with Deep learning

Roya Morshedi; S. Mojtaba Matinkhah; Mohammad Taghi Sadeghi

Volume 12, Issue 1 , January 2024, , Pages 37-55

https://doi.org/10.22044/jadm.2023.13539.2471

Abstract
  IoT devices has witnessed a substantial increase due to the growing demand for smart devices. Intrusion Detection Systems (IDS) are critical components for safeguarding IoT networks against cyber threats. This study presents an advanced approach to IoT network intrusion detection, leveraging deep learning ...  Read More

B.3. Communication/Networking and Information Technology
Exploring Impact of Data Noise on IoT Security: a Study using Decision Tree Classification in Intrusion Detection Systems

S. Mojtaba Matinkhah; Roya Morshedi; Akbar Mostafavi

Volume 11, Issue 4 , November 2023, , Pages 609-626

https://doi.org/10.22044/jadm.2023.12964.2442

Abstract
  The Internet of Things (IoT) has emerged as a rapidly growing technology that enables seamless connectivity between a wide variety of devices. However, with this increased connectivity comes an increased risk of cyber-attacks. In recent years, the development of intrusion detection systems (IDS) has ...  Read More

B.3. Communication/Networking and Information Technology
On Optimizing Mobile Charger Scheduling in Wireless Sensor Networks

Newsha Nowrozian; Farzad Tashtarian; Yahya Forghani

Volume 11, Issue 3 , July 2023, , Pages 331-341

https://doi.org/10.22044/jadm.2023.12712.2424

Abstract
  Wireless rechargeable sensor networks (WRSNs) are widely used in many fields. However, the limited battery capacity of sensor nodes (SNs) prevents its development. To extend the battery life of SNs, they can be charged by a mobile charger (MC) equipped with radio frequency-based wireless power transfer ...  Read More

B.3. Communication/Networking and Information Technology
Improving Performance of Opportunistic Routing Protocol using Fuzzy Logic for Vehicular Ad-hoc Networks in Highways

A. Azimi Kashani; M. Ghanbari; A. M. Rahmani

Volume 8, Issue 2 , April 2020, , Pages 213-226

https://doi.org/10.22044/jadm.2020.8605.1997

Abstract
  Vehicular ad hoc networks are an emerging technology with an extensive capability in various applications including vehicles safety, traffic management and intelligent transportation systems. Considering the high mobility of vehicles and their inhomogeneous distributions, designing an efficient routing ...  Read More

B.3. Communication/Networking and Information Technology
Behavior-Based Online Anomaly Detection for a Nationwide Short Message Service

Z. Shaeiri; J. Kazemitabar; Sh. Bijani; M. Talebi

Volume 7, Issue 2 , April 2019, , Pages 239-247

https://doi.org/10.22044/jadm.2019.6924.1812

Abstract
  As fraudsters understand the time window and act fast, real-time fraud management systems becomes necessary in Telecommunication Industry. In this work, by analyzing traces collected from a nationwide cellular network over a period of a month, an online behavior-based anomaly detection system is provided. ...  Read More

B.3. Communication/Networking and Information Technology
Analyzing Customers of South Khorasan Telecommunication Company with Expansion of RFM to LRFM Model

V. Babaiyan; Seyyede A. Sarfarazi

Volume 7, Issue 2 , April 2019, , Pages 331-340

https://doi.org/10.22044/jadm.2018.6035.1715

Abstract
  Telecommunication Companies use data mining techniques to maintain good relationships with their existing customers and attract new customers and identifying profitable/unprofitable customers. Clustering leads to better understanding of customer and its results can be used to definition and decision-making ...  Read More

B.3. Communication/Networking and Information Technology
Multi-layer Clustering Topology Design in Densely Deployed Wireless Sensor Network using Evolutionary Algorithms

Seyed M. Hosseinirad

Volume 6, Issue 2 , July 2018, , Pages 297-311

https://doi.org/10.22044/jadm.2017.5372.1651

Abstract
  Due to the resource constraint and dynamic parameters, reducing energy consumption became the most important issues of wireless sensor networks topology design. All proposed hierarchy methods cluster a WSN in different cluster layers in one step of evolutionary algorithm usage with complicated parameters ...  Read More

B.3. Communication/Networking and Information Technology
A new model for persian multi-part words edition based on statistical machine translation

M. Zahedi; A. Arjomandzadeh

Volume 4, Issue 1 , March 2016, , Pages 27-34

https://doi.org/10.5829/idosi.JAIDM.2016.04.01.04

Abstract
  Multi-part words in English language are hyphenated and hyphen is used to separate different parts. Persian language consists of multi-part words as well. Based on Persian morphology, half-space character is needed to separate parts of multi-part words where in many cases people incorrectly use space ...  Read More

B.3. Communication/Networking and Information Technology
FDMG: Fault detection method by using genetic algorithm in clustered wireless sensor networks

A. Ghaffari; S. Nobahary

Volume 3, Issue 1 , March 2015, , Pages 47-57

https://doi.org/10.5829/idosi.JAIDM.2015.03.01.06

Abstract
  Wireless sensor networks (WSNs) consist of a large number of sensor nodes which are capable of sensing different environmental phenomena and sending the collected data to the base station or Sink. Since sensor nodes are made of cheap components and are deployed in remote and uncontrolled environments, ...  Read More