A

  • ABPNN-MLPQS An Optimal Utilization of Cloud Resources using Adaptive Back Propagation Neural Network and Multi-Level Priority Queue Scheduling [Volume 11, Issue 3, 2019, Pages 145-151]

  • AI Cloud and IoT based Smart Car Parking System by using Mamdani Fuzzy Inference System (MFIS) [Volume 11, Issue 3, 2019, Pages 153-160]

  • Algebraic Matching Algebraic Matching of Vulnerabilities in a Low-Level Code [Volume 11, Issue 3, 2019, Pages 1-7]

  • Algebraic Resolution Relaxed Differential Fault Analysis of SHA-3 [Volume 11, Issue 2, 2019, Pages 129-143]

  • ANP DEMATEL A Comparison Study between Intelligent Decision Support Systems and Decision Support Systems [Volume 11, Issue 3, 2019, Pages 187-194]

  • Architecture Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns [Volume 11, Issue 3, 2019, Pages 9-17]

  • ARIMA Using Machine Learning ARIMA to Predict the Price of Cryptocurrencies [Volume 11, Issue 3, 2019, Pages 139-144]

  • Authentication Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns [Volume 11, Issue 3, 2019, Pages 9-17]

  • Authentication A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications [Volume 11, Issue 2, 2019, Pages 113-128]

  • AVISPA A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications [Volume 11, Issue 2, 2019, Pages 113-128]

B

  • Backpropagation An Optimal Utilization of Cloud Resources using Adaptive Back Propagation Neural Network and Multi-Level Priority Queue Scheduling [Volume 11, Issue 3, 2019, Pages 145-151]

  • BAN logic A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications [Volume 11, Issue 2, 2019, Pages 113-128]

  • Behavior Algebra Algebraic Matching of Vulnerabilities in a Low-Level Code [Volume 11, Issue 3, 2019, Pages 1-7]

  • Belief Considering Uncertainty in Modeling Historical Knowledge [Volume 11, Issue 3, 2019, Pages 59-65]

  • Biometric Recognition Face Recognition Based Rank Reduction SVD Approach [Volume 11, Issue 3, 2019, Pages 39-50]

  • Biometric system The Impact of The Biometric System on Election Fraud Elimination: Case of The North of IRAQ [Volume 11, Issue 3, 2019, Pages 195-207]

  • Branch number Lightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives [Volume 11, Issue 1, 2019, Pages 35-46]

  • Business Intelligence Critical Success Factors for Data Virtualization: A Literature Review [Volume 11, Issue 3, 2019, Pages 131-137]

C

  • Companion matrix Lightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives [Volume 11, Issue 1, 2019, Pages 35-46]

  • Contention-based Proposed ST-Slotted-CS-ALOHA Protocol for Time Saving and Collision Avoidance [Volume 11, Issue 3, 2019, Pages 67-72]

  • Controllable point Secure FPGA Design by Filling Unused Spaces [Volume 11, Issue 1, 2019, Pages 47-56]

  • Correctness Verification A Trust Based Probabilistic Method for Efficient Correctness Verification in Database Outsourcing [Volume 11, Issue 1, 2019, Pages 3-14]

  • Critical success factors Critical Success Factors for Data Virtualization: A Literature Review [Volume 11, Issue 3, 2019, Pages 131-137]

  • Critical Success Factors (CSF) Towards Measuring the Project Management Process During Large Scale Software System Implementation Phase [Volume 11, Issue 3, 2019, Pages 161-172]

  • Cryptanalysis New Fixed Point Attacks on GOST2 Block Cipher [Volume 11, Issue 2, 2019, Pages 145-158]

  • Cryptocurrency Using Machine Learning ARIMA to Predict the Price of Cryptocurrencies [Volume 11, Issue 3, 2019, Pages 139-144]

D

  • Database Outsourcing A Trust Based Probabilistic Method for Efficient Correctness Verification in Database Outsourcing [Volume 11, Issue 1, 2019, Pages 3-14]

  • Database Security A Trust Based Probabilistic Method for Efficient Correctness Verification in Database Outsourcing [Volume 11, Issue 1, 2019, Pages 3-14]

  • Data Integration Critical Success Factors for Data Virtualization: A Literature Review [Volume 11, Issue 3, 2019, Pages 131-137]

  • Data mining Cognitive Strategic Model applied to a Port System [Volume 11, Issue 3, 2019, Pages 73-78]

  • Data mining Enhancing Learning from Imbalanced Classes via Data Preprocessing: A Data-Driven Application in Metabolomics Data Mining [Volume 11, Issue 3, 2019, Pages 79-89]

  • Data Outsourcing SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing [Volume 11, Issue 1, 2019, Pages 15-34]

  • Data Reduction Cognitive Strategic Model applied to a Port System [Volume 11, Issue 3, 2019, Pages 73-78]

  • Data Reduction Enhancing Learning from Imbalanced Classes via Data Preprocessing: A Data-Driven Application in Metabolomics Data Mining [Volume 11, Issue 3, 2019, Pages 79-89]

  • Data Virtualization Critical Success Factors for Data Virtualization: A Literature Review [Volume 11, Issue 3, 2019, Pages 131-137]

  • Decision support system A Comparison Study between Intelligent Decision Support Systems and Decision Support Systems [Volume 11, Issue 3, 2019, Pages 187-194]

  • Differential Fault Analysis Relaxed Differential Fault Analysis of SHA-3 [Volume 11, Issue 2, 2019, Pages 129-143]

  • Diffusion layer Lightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives [Volume 11, Issue 1, 2019, Pages 35-46]

  • DSS A Comparison Study between Intelligent Decision Support Systems and Decision Support Systems [Volume 11, Issue 3, 2019, Pages 187-194]

  • DTW Hand Gestures Classification with Multi-Core DTW [Volume 11, Issue 3, 2019, Pages 91-96]

E

  • Edge Computing IoT Protocols Based Fog/Cloud over High Traffic [Volume 11, Issue 3, 2019, Pages 173-180]

  • EMF ECORE Aspect Oriented UML to ECORE Model Transformation [Volume 11, Issue 3, 2019, Pages 97-103]

  • Enterprise Resource Planning Systems (ERPs) Towards Measuring the Project Management Process During Large Scale Software System Implementation Phase [Volume 11, Issue 3, 2019, Pages 161-172]

  • ETL Critical Success Factors for Data Virtualization: A Literature Review [Volume 11, Issue 3, 2019, Pages 131-137]

  • Event Considering Uncertainty in Modeling Historical Knowledge [Volume 11, Issue 3, 2019, Pages 59-65]

F

  • Fairness A Fair Power Allocation for Non-Orthogonal Multiple Access in the Power Domain [Volume 11, Issue 3, 2019, Pages 123-130]

  • Fake Accounts Detection of Fake Accounts in Social Networks Based on One Class Classification [Volume 11, Issue 2, 2019, Pages 173-183]

  • Feature selection Anomaly Detection Using SVM as Classifier and Decision Tree for Optimizing Feature Vectors [Volume 11, Issue 2, 2019, Pages 159-171]

  • Field Programmable Gate Array Secure FPGA Design by Filling Unused Spaces [Volume 11, Issue 1, 2019, Pages 47-56]

  • Fixed Point Attack New Fixed Point Attacks on GOST2 Block Cipher [Volume 11, Issue 2, 2019, Pages 145-158]

  • Fog Computing IoT Protocols Based Fog/Cloud over High Traffic [Volume 11, Issue 3, 2019, Pages 173-180]

  • Fuzzy Inference System(FIS) Cloud and IoT based Smart Car Parking System by using Mamdani Fuzzy Inference System (MFIS) [Volume 11, Issue 3, 2019, Pages 153-160]

G

  • Game Design Interdependent Security Game Design over Constrained Linear Influence Networks [Volume 11, Issue 2, 2019, Pages 95-111]

  • Gesture recognition Hand Gestures Classification with Multi-Core DTW [Volume 11, Issue 3, 2019, Pages 91-96]

  • GNS3 Virtualized Network Management Laboratory for Educational Purposes [Volume 11, Issue 3, 2019, Pages 181-186]

  • Goal/Question/Metric paradigm (GQM) Towards Measuring the Project Management Process During Large Scale Software System Implementation Phase [Volume 11, Issue 3, 2019, Pages 161-172]

  • Gost2 Block Cipher New Fixed Point Attacks on GOST2 Block Cipher [Volume 11, Issue 2, 2019, Pages 145-158]

H

  • Hand gesture classification Hand Gestures Classification with Multi-Core DTW [Volume 11, Issue 3, 2019, Pages 91-96]

  • Handover Evaluating Multipath TCP Resilience against Link Failures [Volume 11, Issue 3, 2019, Pages 113-122]

  • History Considering Uncertainty in Modeling Historical Knowledge [Volume 11, Issue 3, 2019, Pages 59-65]

  • HTTP IoT Protocols Based Fog/Cloud over High Traffic [Volume 11, Issue 3, 2019, Pages 173-180]

I

  • IDSS A Comparison Study between Intelligent Decision Support Systems and Decision Support Systems [Volume 11, Issue 3, 2019, Pages 187-194]

  • Imbalanced Classes Cognitive Strategic Model applied to a Port System [Volume 11, Issue 3, 2019, Pages 73-78]

  • Imbalanced Classes Enhancing Learning from Imbalanced Classes via Data Preprocessing: A Data-Driven Application in Metabolomics Data Mining [Volume 11, Issue 3, 2019, Pages 79-89]

  • Information Imperfection Considering Uncertainty in Modeling Historical Knowledge [Volume 11, Issue 3, 2019, Pages 59-65]

  • Intelligent decision support system A Comparison Study between Intelligent Decision Support Systems and Decision Support Systems [Volume 11, Issue 3, 2019, Pages 187-194]

  • Interdependent Security Interdependent Security Game Design over Constrained Linear Influence Networks [Volume 11, Issue 2, 2019, Pages 95-111]

  • Internet of Things IoT Protocols Based Fog/Cloud over High Traffic [Volume 11, Issue 3, 2019, Pages 173-180]

  • Internet of Things(IoT) Cloud and IoT based Smart Car Parking System by using Mamdani Fuzzy Inference System (MFIS) [Volume 11, Issue 3, 2019, Pages 153-160]

  • Intrusion Detection Anomaly Detection Using SVM as Classifier and Decision Tree for Optimizing Feature Vectors [Volume 11, Issue 2, 2019, Pages 159-171]

  • IoT Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns [Volume 11, Issue 3, 2019, Pages 9-17]

  • IoT Evaluation of Planet Factors of Smart City through Multi-layer Fuzzy Logic (MFL) [Volume 11, Issue 3, 2019, Pages 51-58]

  • IoT devices Medical Image Compression Based on Region of Interest [Volume 11, Issue 3, 2019, Pages 29-34]

  • IoT devices The Role of Packet Tracer in Learning Wireless Networks and Managing IoT Devices [Volume 11, Issue 3, 2019, Pages 35-38]

K

  • Kermeta Aspect Oriented UML to ECORE Model Transformation [Volume 11, Issue 3, 2019, Pages 97-103]

  • Knowledge Representation Considering Uncertainty in Modeling Historical Knowledge [Volume 11, Issue 3, 2019, Pages 59-65]

L

  • Lattice Based cryptography A New Ring-Based SPHF and PAKE Protocol On Ideal Lattices [Volume 11, Issue 1, 2019, Pages 75-86]

  • Lightweight cryptographic primitives Lightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives [Volume 11, Issue 1, 2019, Pages 35-46]

  • Linear Algebra Face Recognition Based Rank Reduction SVD Approach [Volume 11, Issue 3, 2019, Pages 39-50]

  • Literature Review Critical Success Factors for Data Virtualization: A Literature Review [Volume 11, Issue 3, 2019, Pages 131-137]

  • Low Rank Face Recognition Based Rank Reduction SVD Approach [Volume 11, Issue 3, 2019, Pages 39-50]

M

  • Machine Learning Using Machine Learning ARIMA to Predict the Price of Cryptocurrencies [Volume 11, Issue 3, 2019, Pages 139-144]

  • MAC protocols Proposed ST-Slotted-CS-ALOHA Protocol for Time Saving and Collision Avoidance [Volume 11, Issue 3, 2019, Pages 67-72]

  • Management information systems The Impact of The Biometric System on Election Fraud Elimination: Case of The North of IRAQ [Volume 11, Issue 3, 2019, Pages 195-207]

  • MDS matrix Lightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives [Volume 11, Issue 1, 2019, Pages 35-46]

  • Measurement Towards Measuring the Project Management Process During Large Scale Software System Implementation Phase [Volume 11, Issue 3, 2019, Pages 161-172]

  • Meet in the Middle New Fixed Point Attacks on GOST2 Block Cipher [Volume 11, Issue 2, 2019, Pages 145-158]

  • Mobile Communication A Fair Power Allocation for Non-Orthogonal Multiple Access in the Power Domain [Volume 11, Issue 3, 2019, Pages 123-130]

  • Model-driven engineering Aspect Oriented UML to ECORE Model Transformation [Volume 11, Issue 3, 2019, Pages 97-103]

  • Model transformation Aspect Oriented UML to ECORE Model Transformation [Volume 11, Issue 3, 2019, Pages 97-103]

  • MQTT IoT Protocols Based Fog/Cloud over High Traffic [Volume 11, Issue 3, 2019, Pages 173-180]

  • Multi-access Edge Computing Access and Mobility Policy Control at the Network Edge [Volume 11, Issue 3, 2019, Pages 105-111]

  • Multi-core processing Hand Gestures Classification with Multi-Core DTW [Volume 11, Issue 3, 2019, Pages 91-96]

  • Multi-homing Evaluating Multipath TCP Resilience against Link Failures [Volume 11, Issue 3, 2019, Pages 113-122]

  • Multilayer Fuzzy logic Evaluation of Planet Factors of Smart City through Multi-layer Fuzzy Logic (MFL) [Volume 11, Issue 3, 2019, Pages 51-58]

  • Multilevel An Optimal Utilization of Cloud Resources using Adaptive Back Propagation Neural Network and Multi-Level Priority Queue Scheduling [Volume 11, Issue 3, 2019, Pages 145-151]

  • Multi-level Priority Queue Scheduling An Optimal Utilization of Cloud Resources using Adaptive Back Propagation Neural Network and Multi-Level Priority Queue Scheduling [Volume 11, Issue 3, 2019, Pages 145-151]

  • Multi-path TCP Evaluating Multipath TCP Resilience against Link Failures [Volume 11, Issue 3, 2019, Pages 113-122]

  • Multiple Byte Fault Relaxed Differential Fault Analysis of SHA-3 [Volume 11, Issue 2, 2019, Pages 129-143]

N

  • Nash equilibrium Interdependent Security Game Design over Constrained Linear Influence Networks [Volume 11, Issue 2, 2019, Pages 95-111]

  • Network management Virtualized Network Management Laboratory for Educational Purposes [Volume 11, Issue 3, 2019, Pages 181-186]

  • Neural Networks An Optimal Utilization of Cloud Resources using Adaptive Back Propagation Neural Network and Multi-Level Priority Queue Scheduling [Volume 11, Issue 3, 2019, Pages 145-151]

  • NO Editorial [Volume 11, Issue 1, 2019, Pages 1-2]

  • NO Editorial [Volume 11, Issue 2, 2019, Pages 93-94]

  • NO Editorial [Volume 11, Issue 3, 2019]

  • No Keyword Persian Abstract [Volume 11, Issue 1, 2019, Pages 87-92]

  • No Keyword Persian Abstract [Volume 11, Issue 2, 2019, Pages 185-190]

  • NOMA A Fair Power Allocation for Non-Orthogonal Multiple Access in the Power Domain [Volume 11, Issue 3, 2019, Pages 123-130]

O

  • Observable points Secure FPGA Design by Filling Unused Spaces [Volume 11, Issue 1, 2019, Pages 47-56]

  • One Class Classification Detection of Fake Accounts in Social Networks Based on One Class Classification [Volume 11, Issue 2, 2019, Pages 173-183]

  • Order-Preserving Encryption SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing [Volume 11, Issue 1, 2019, Pages 15-34]

P

  • Packet Tracer Medical Image Compression Based on Region of Interest [Volume 11, Issue 3, 2019, Pages 29-34]

  • Packet Tracer The Role of Packet Tracer in Learning Wireless Networks and Managing IoT Devices [Volume 11, Issue 3, 2019, Pages 35-38]

  • PAKE A New Ring-Based SPHF and PAKE Protocol On Ideal Lattices [Volume 11, Issue 1, 2019, Pages 75-86]

  • Path diversity Evaluating Multipath TCP Resilience against Link Failures [Volume 11, Issue 3, 2019, Pages 113-122]

  • Performance Evaluation Evaluating Multipath TCP Resilience against Link Failures [Volume 11, Issue 3, 2019, Pages 113-122]

  • Personal Privacy A Sudy on Information Privacy Issue on Social Networks [Volume 11, Issue 3, 2019, Pages 19-27]

  • PFSC Evaluation of Planet Factors of Smart City through Multi-layer Fuzzy Logic (MFL) [Volume 11, Issue 3, 2019, Pages 51-58]

  • PIPEDA Privacy Laws A Sudy on Information Privacy Issue on Social Networks [Volume 11, Issue 3, 2019, Pages 19-27]

  • Policy control Access and Mobility Policy Control at the Network Edge [Volume 11, Issue 3, 2019, Pages 105-111]

  • Power allocation A Fair Power Allocation for Non-Orthogonal Multiple Access in the Power Domain [Volume 11, Issue 3, 2019, Pages 123-130]

  • Priority Scheduling An Optimal Utilization of Cloud Resources using Adaptive Back Propagation Neural Network and Multi-Level Priority Queue Scheduling [Volume 11, Issue 3, 2019, Pages 145-151]

  • Privacy Detection of Fake Accounts in Social Networks Based on One Class Classification [Volume 11, Issue 2, 2019, Pages 173-183]

  • Privacy Preserving A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications [Volume 11, Issue 2, 2019, Pages 113-128]

R

  • Registration and Mobility Management Access and Mobility Policy Control at the Network Edge [Volume 11, Issue 3, 2019, Pages 105-111]

  • Reliable data transfer Evaluating Multipath TCP Resilience against Link Failures [Volume 11, Issue 3, 2019, Pages 113-122]

  • Re-sampling Cognitive Strategic Model applied to a Port System [Volume 11, Issue 3, 2019, Pages 73-78]

  • Re-sampling Enhancing Learning from Imbalanced Classes via Data Preprocessing: A Data-Driven Application in Metabolomics Data Mining [Volume 11, Issue 3, 2019, Pages 79-89]

  • Resilient networks Evaluating Multipath TCP Resilience against Link Failures [Volume 11, Issue 3, 2019, Pages 113-122]

  • Rewriting Rules Algebraic Matching of Vulnerabilities in a Low-Level Code [Volume 11, Issue 3, 2019, Pages 1-7]

  • RFID Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns [Volume 11, Issue 3, 2019, Pages 9-17]

  • Ring-LWE A New Ring-Based SPHF and PAKE Protocol On Ideal Lattices [Volume 11, Issue 1, 2019, Pages 75-86]

S

  • Searchable Encryption SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing [Volume 11, Issue 1, 2019, Pages 15-34]

  • Security Secure FPGA Design by Filling Unused Spaces [Volume 11, Issue 1, 2019, Pages 47-56]

  • Security Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns [Volume 11, Issue 3, 2019, Pages 9-17]

  • Sensors Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns [Volume 11, Issue 3, 2019, Pages 9-17]

  • SHA-3 Relaxed Differential Fault Analysis of SHA-3 [Volume 11, Issue 2, 2019, Pages 129-143]

  • SIC A Fair Power Allocation for Non-Orthogonal Multiple Access in the Power Domain [Volume 11, Issue 3, 2019, Pages 123-130]

  • Singular Value Decomposition Face Recognition Based Rank Reduction SVD Approach [Volume 11, Issue 3, 2019, Pages 39-50]

  • Smart city Evaluation of Planet Factors of Smart City through Multi-layer Fuzzy Logic (MFL) [Volume 11, Issue 3, 2019, Pages 51-58]

  • Smart Home Medical Image Compression Based on Region of Interest [Volume 11, Issue 3, 2019, Pages 29-34]

  • Smart Home The Role of Packet Tracer in Learning Wireless Networks and Managing IoT Devices [Volume 11, Issue 3, 2019, Pages 35-38]

  • Social Media A Sudy on Information Privacy Issue on Social Networks [Volume 11, Issue 3, 2019, Pages 19-27]

  • Social Networks A Sudy on Information Privacy Issue on Social Networks [Volume 11, Issue 3, 2019, Pages 19-27]

  • Social Networks Detection of Fake Accounts in Social Networks Based on One Class Classification [Volume 11, Issue 2, 2019, Pages 173-183]

  • Social Optimum Interdependent Security Game Design over Constrained Linear Influence Networks [Volume 11, Issue 2, 2019, Pages 95-111]

  • Software Project Management Towards Measuring the Project Management Process During Large Scale Software System Implementation Phase [Volume 11, Issue 3, 2019, Pages 161-172]

  • SPHF A New Ring-Based SPHF and PAKE Protocol On Ideal Lattices [Volume 11, Issue 1, 2019, Pages 75-86]

  • State Recovery Relaxed Differential Fault Analysis of SHA-3 [Volume 11, Issue 2, 2019, Pages 129-143]

  • ST-Slotted-CS-ALOHA protocol Proposed ST-Slotted-CS-ALOHA Protocol for Time Saving and Collision Avoidance [Volume 11, Issue 3, 2019, Pages 67-72]

  • Support Vector Machines Anomaly Detection Using SVM as Classifier and Decision Tree for Optimizing Feature Vectors [Volume 11, Issue 2, 2019, Pages 159-171]

  • Symbolic Modeling Algebraic Matching of Vulnerabilities in a Low-Level Code [Volume 11, Issue 3, 2019, Pages 1-7]

T

  • Time-series analysis Using Machine Learning ARIMA to Predict the Price of Cryptocurrencies [Volume 11, Issue 3, 2019, Pages 139-144]

  • Tsung IoT Protocols Based Fog/Cloud over High Traffic [Volume 11, Issue 3, 2019, Pages 173-180]

U

  • Unified Modeling Language Aspect Oriented UML to ECORE Model Transformation [Volume 11, Issue 3, 2019, Pages 97-103]

  • UWSNs Proposed ST-Slotted-CS-ALOHA Protocol for Time Saving and Collision Avoidance [Volume 11, Issue 3, 2019, Pages 67-72]

V

  • Virtualbox Virtualized Network Management Laboratory for Educational Purposes [Volume 11, Issue 3, 2019, Pages 181-186]

  • Virtulization Virtualized Network Management Laboratory for Educational Purposes [Volume 11, Issue 3, 2019, Pages 181-186]

  • VNML Virtualized Network Management Laboratory for Educational Purposes [Volume 11, Issue 3, 2019, Pages 181-186]

  • Vulnerability Detection Algebraic Matching of Vulnerabilities in a Low-Level Code [Volume 11, Issue 3, 2019, Pages 1-7]

W

  • Web of Things IoT Protocols Based Fog/Cloud over High Traffic [Volume 11, Issue 3, 2019, Pages 173-180]

  • Wireless Networks Medical Image Compression Based on Region of Interest [Volume 11, Issue 3, 2019, Pages 29-34]

  • Wireless Networks The Role of Packet Tracer in Learning Wireless Networks and Managing IoT Devices [Volume 11, Issue 3, 2019, Pages 35-38]