Papers by International Computer Science and Engineering Society (ICSES)
The outbreak of Novel Coronavirus has brought a heavy blow to the world. Therefore, it is very im... more The outbreak of Novel Coronavirus has brought a heavy blow to the world. Therefore, it is very important to study the development process of epidemics, which can provide useful materials for subsequent research. But up till now, few studies have summarized the whole development process, including some typical studies. Our work reviews some important events since the emergence of the first unknown pneumonia in December. In the first part, we studied the spread and development of COVID-19 from a macro perspective. In the second part, we focus on the specific processes and control measures of different countries, and select the four most representative countries, namely China, the United States, the United Kingdom and Italy. By these explanations of the spread process and national countermeasures of COVID-19, we can clearly understand the development of this epidemic.

ICSES Transactions on Evolutionary and Metaheuristic Algorithms (ITEMA) , 2018
This Editorial article is devoted to better introduce the Mission and Vision of ICSES Transaction... more This Editorial article is devoted to better introduce the Mission and Vision of ICSES Transactions on Evolutionary and Metaheuristic Algorithms (ITEMA) to the community of evolutionary and swarm intelligence scientists, engineers and practitioners. Actually, the ICSES Transactions on Evolutionary and Metaheuristic Algorithms (ITEMA) is a peer-reviewed open-access publication of its kind that aims at reporting the most recent research and developments in the area of bio-inspired intelligent computation based on the principles of evolutionary as well as metaheuristic algorithms. It publishes advanced, innovative and interdisciplinary research involving the theoretical, experimental and practical aspects of the two paradigms and their hybridizations. ICSES Transactions on Evolutionary and Metaheuristic Algorithms (ITEMA) is committed to timely publication of very high-quality, peer-reviewed, original articles that advance the state-of-the art of all aspects of evolutionary computation and metaheuristics. Survey papers reviewing the state-of-the-art of timely topics will also be welcomed as well as novel and interesting applications.
The ICSES Journal on Evolutionary and Metaheuristic Algorithms (IJEMA) is a peerreviewed open-acc... more The ICSES Journal on Evolutionary and Metaheuristic Algorithms (IJEMA) is a peerreviewed open-access publication of its kind that aims at reporting the most recent research and developments in the area of bio-inspired intelligent computation based on the principles of evolutionary and meta-heuristic algorithms. It publishes advanced, innovative and interdisciplinary research involving the theoretical, experimental and practical aspects of the two paradigms and their hybridizations. IJEMA is committed to timely publication of very highquality, peer-reviewed, original articles that advance the state-of-the art of all aspects of evolutionary computation and meta-heuristics. Survey papers reviewing the state-of-the-art of timely topics will also be welcomed as well as novel and interesting applications.

Most of the combinatorial optimization problems in Engineering and Industry are of such problems... more Most of the combinatorial optimization problems in Engineering and Industry are of such problems cannot be solved using heuristics or exact methods in an efficient way. Meanwhile, another interesting paradigm inspired by biology and artificial life was introduced named Metaheuristics with significant power and potential to cope with such difficult problems. Particle Swarm Optimization (PSO), Ant colony Optimization (ACO), Artificial Bee Colony (ABC), Shuffled Frog Leaping (SFL), Biogeography-Based Optimization (BBO), Teaching-Learning-Based Optimization (TLBO) are considered as some of these metaheuristics. Cuckoo Optimization Algorithm (COA) is also a newly proposed swarm-intelligence-based metaheuristic algorithm first introduced by Rajabioun in 2011, inspired from the exotic lifestyle of a bird family called cuckoo. Indeed, specific egg-laying and breeding characteristics of cuckoos called parasite-brooding is the basis of constituting this novel optimization algorithm. To the best of our knowledge, this metaheuristic algorithm has not been attended and studied a lot since its first introduction in 2011, and a few applications of it on well-known industrial and engineering problems have been reported in the literature so far; hence, we believe that this Special Issue will be going to be an outstanding Resource and Reference on this algorithm and its application.

Special Issue Title: Cuckoo Optimization Algorithm (COA) and Its Applications Main Subject: Optim... more Special Issue Title: Cuckoo Optimization Algorithm (COA) and Its Applications Main Subject: Optimization via Metaheuristics. Three up to five brief Highlights about this Special Issue: 1. First of all, to better introduce Cuckoo Optimization Algorithm (COA) and its pros and cons. 2. Secondly, to investigate proper industrial and engineering applications better matched with characteristics of this metaheuristic. 3. Thirdly, as an outstanding resource and reference on this algorithm and its application. Abstract: Most of the combinatorial optimization problems in Engineering and Industry are of such problems cannot be solved using heuristics or exact methods in an efficient way. Meanwhile, another interesting paradigm inspired by biology and artificial life was introduced named Metaheuristics with significant power and potential to cope with such difficult problems. Particle Swarm Optimization (PSO), Ant colony Optimization (ACO), Artificial Bee Colony (ABC), Shuffled Frog Leaping (SFL), Biogeography-Based Optimization (BBO), Teaching-Learning-Based Optimization (TLBO) are considered as some of these metaheuristics. Cuckoo Optimization Algorithm (COA) is also a newly proposed swarm-intelligence-based metaheuristic algorithm first introduced by Rajabioun in 2011, inspired from the exotic lifestyle of a bird family called cuckoo. Indeed, specific egg-laying and breeding characteristics of cuckoos called parasite-brooding is the basis of constituting this novel optimization algorithm. To the best of our knowledge, this metaheuristic algorithm has not been attended and studied a lot since its first introduction in 2011, and a few applications of it on well-known industrial and engineering problems have been reported in the literature so far; hence, we believe that this Special Issue will be going to be an outstanding Resource and Reference on this algorithm and its application.

One serious request in scheming and conduct a wireless sensor network is how to save the energy i... more One serious request in scheming and conduct a wireless sensor network is how to save the energy ingesting of the sensors in order to exploit network lifetime below the restraint of full reporting of the checked targets. However, utmost of the current schemes are either geared in the direction of extending network period or improving amount. Even excellence of service trials can be reduced to lifetime thoughts. A great amount of systems and methods were proposed to increase the lifetime of a sensor network while their assessments were always based on a particular meaning of network lifetime. Since targets are unnecessarily covered by more sensors, in order to conserve energy capitals, sensors can be organized in sets, activated successively. In this paper, a new way has been presented to development of network superiority, which in that network, in count that improve life time of wireless sensor network. Extensive inexperienced tests show that the use of the area of maximizing the total block energy of the covers creates covers with substantially longer network lifetime than the lifetime of the covers created with the goal of exploiting solely the number of covers.

The basic standard of detect of intrusion is based on the assumption that intrusive activities ar... more The basic standard of detect of intrusion is based on the assumption that intrusive activities are noticeably different from normal ones and thus are detectable. In past surveys, the capability of fuzzy systems to solve different kinds of problems confirmed. New attacks are emerging every day, detect of intrusion systems play a basic role in identifying possible attacks to the system, and give proper responses. Evolutionary Fuzzy System with the learning capability of Evolutionary Algorithms hybridizes the approximate reasoning method of fuzzy systems. Propose of this paper is to demonstrate the ability of Evolutionary Fuzzy to deal with detect of intrusion classification problem as a new real-world application area. The Evolutionary Fuzzy System would be capable of extracting accurate fuzzy classification in computer network rules to detect normal and intrusive behaviors from network traffic data and applies them. The experimental results were performed with detect of intrusion benchmark dataset which has information on computer networks, and intrusive behaviors during normal. Results of our model have been compared with several famous detect of intrusion systems.

Detect Intrusion is an indispensable part of a security system. Activity of network becomes an es... more Detect Intrusion is an indispensable part of a security system. Activity of network becomes an essential part in modern life; on the other hand, number of threats and attacks in private and corporate networks are increasing. Therefore, there is a need for a performance method for detecting of intrusion networks. Detect of intrusion is defined by the problem of identifying misuse and abuse in computer systems. In this paper, a novel fuzzy-evolutionary system is presented to effectively detect the intrusion in networks at computer. So this scheme employs a hybridization of fake annealing empirical and tabu search procedure to recover the accuracy of fuzzy if-then guidelines as intrusion gauges. Both of these systems have its beneficial and detrimental. So, using the cross models of both routes, the anticipated classification occupations the good structures of them to progress the exactness of gained rules. Valuation of the future system is done on the dataset which has info about standard and intrusive activities in linkages. Rests of our archetypal have been matched with quite a few well-known intrusion recognition systems.

— LTE (Long Term Evolution) specified by 3GPP (3 rd Generation Partnership Project) as very high ... more — LTE (Long Term Evolution) specified by 3GPP (3 rd Generation Partnership Project) as very high flexible for radio interfacing. LTE deployment started in the last of 2009 and the first LTE release is providing greatest rate reaches to 300 Mbps, delay of radio network not as much of as 5 msec, a spectrum significant increasing in efficiency of spectrum if comparing with any other cellular systems, and a different regular architecture in radio network that is designed to shorten the operations and to decreasing the cost. Long Term Evolution Advanced (LTE-Advanced) network is the continuation of 3GPP-LTE and it targets to advanced develop of the requirements of LTE in terms of throughput and coverage. Recently, LTE-Advanced network is the promised candidate for 4G cellular systems to run into top rates of data reaches to 100 Mbps with high mobility and 1Gbps with low mobility, where that are wanted in 4G system. Furthermore, LTE-Advanced must be capable to upkeep broader bandwidth than it provided by LTE. This article offered the architecture and the model of LTE-Advanced with the configurations of the relay-Enhanced technology used in this system that are improved to enhance the radio signal between the mobile station and the base station in LTE-Advanced system.

— Today's computing world is facing tsunami and driving without riding on this tsunami towards ne... more — Today's computing world is facing tsunami and driving without riding on this tsunami towards next generation computing is no choice. So many IT companies decided to grow up with this tsunami like technology. One of these is cloud computing and another is Big data. Currently more than 5 billion mobile users, nearly same facebook, and other social media user generate this tsunami of data. On another side to deliver this services of big data a model called as cloud computing is spreading everywhere as next generations IT Service model. Both technologies continue to evolve. Ultimately, as a cloud, computing development matures, every top mind of organizations will think for development of efficient and agile cloud environment. At the other side, every cloud provider offers the services to the huge number data processing companies that generate data process data and make decision on cloud infrastructure. Ultimately its today's need to think on futures efficient cloud based Big data analytics In this review paper we are focusing on, how we can club Big data and cloud Computing in one frame of development.
Uploads
Papers by International Computer Science and Engineering Society (ICSES)