Sensibly highlighting the hidden structures of many real-world networks has attracted growing interest and triggered a vast array of techniques on what is called nowadays community detection (CD) problem. Non-deterministic metaheuristics are proved to competitively transcending the limits of the counterpart deterministic heuristics in solving community detection problem. Despite the increasing interest, most of the existing metaheuristic based community detection (MCD) algorithms reflect one traditional language. Generally, they tend to explicitly project some features of real communities into different definitions of single or multi-objective optimization functions. The design of other operators, however, remains canonical lacking any intense interest to reflect the domain knowledge. Moreover, all the published reviews did not make any direct effort to link heuristic and metaheuristic based community detection approaches, rather, they simply state them separately. The review introduced in this paper attempts to address this issue. Mainly, we review the main heuristic and metaheuristic based community detection algorithms. Then, we introduce two new taxonomies for community detection algorithms: hybrid metaheuristic and hyper heuristic that can serve as common grounds for designing a collection of new and more effective MCD algorithms. To this end, we introduce four new systematic frameworks integrating both heuristic and metaheuristic algorithms, illustrating the possible issues that would fuel the desire for researchers to direct their future interest towards developing more effective community detection instances from the context of these frameworks.
Botnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper
Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various at
... Show MoreRenewable energy sources - realities of the present and future options
Many of the directories indicate that the global energy system begin with a period of transition from total dependence on fossil energy sources, particularly oil, Into a new era in which renewable energy sources play an important role in meeting the growing needs of energy demand. There are many factors that will contribute to the strengthening of this trend towards transformation, which also will decide how quickly this transformation of renewable energy systems effectively in the global system of energy demand.
These factors, In brief: the size of environmental pollution and cl
... Show MoreIn the age of information and communication revolution, education as one of life
aspects has influenced with that revolution by integrating technology in education, which
have become as an important learning tools of the whole educational process . Technology,
when used appropriately, can help make science classroom a site of active learning and
critical thinking, furthering student inquiry and connections with different materials. It is
necessary to develop human rights education programs and materials for discretionary and
extracurricular activities as it provide them with the skills and tools so that they are
empowered to take action to realize their rights. Human rights education is a critical means of
instill
Recently, the increasing demand to transfer data through the Internet has pushed the Internet infrastructure to the nal edge of the ability of these networks. This high demand causes a deciency of rapid response to emergencies and disasters to control or reduce the devastating effects of these disasters. As one of the main cornerstones to address the data trafc forwarding issue, the Internet networks need to impose the highest priority on the special networks: Security, Health, and Emergency (SHE) data trafc. These networks work in closed and private domains to serve a group of users for specic tasks. Our novel proposed network ow priority management based on ML and SDN fullls high control to give the required ow priority to SHE dat
... Show MoreThe aim of this work was to develop and validate a rapid and low cost method for estimation of ibuprofen in pharmaceutical suspensions using Reverse-Phase High Performance Liquid Chromatography. The proposed method was conducted and validated according to International Conference on Harmonization (ICH) requirements. The chromatographic parameters were as follows: column of octyldecylsilyl C18 with dimensions (150 × 4.6) mm, mobile phase composed of acetonitrile with phosphoric acid with a ratio of 50 to 50 each using isocratic mode, flow rate of 1.5 mL/min and injection volume of 5 μL. The detection was carried out using UV detector at 220 nm. The method was validated and showed short retention time for ibuprofen peak at 7.651 min, wit
... Show More