Volume 11, Issue 3
مرور بر اساس
ارسال های اخیر
-
The Impact of The Biometric System on Election Fraud Elimination: Case of The North of IRAQ
(Iranian Society of Cryptology, 2019-08-01)In recent years technology and management information system has been an excellent response too many global challenges, technology innovation has expanded over almost all the sectors of, and it made many processes more ...
-
Cloud and IoT based Smart Car Parking System by using Mamdani Fuzzy Inference System (MFIS)
(Iranian Society of Cryptology, 2019-08-01)Internet of Things (IoT) and cloud computing technologies have connected the infrastructure of the city to make the context-aware and more intelligent city for utility its major resources. These technologies have much ...
-
A Comparison Study between Intelligent Decision Support Systems and Decision Support Systems
(Iranian Society of Cryptology, 2019-08-01)This paper is one that explored intelligent decision support systems and Decision support systems. Due to the inception and development of systems and technological advances such as data warehouse, enterprise resource ...
-
IoT Protocols Based Fog/Cloud over High Traffic
(Iranian Society of Cryptology, 2019-08-01)The Internet of Things (IoT) becomes the future of a global data field in which the embedded devices communicate with each other, exchange data and making decisions through the Internet. IoT could improve the quality of ...
-
Towards Measuring the Project Management Process During Large Scale Software System Implementation Phase
(Iranian Society of Cryptology, 2019-08-01)Project management is an important factor to accomplish the decision to implement large-scale software systems (LSS) in a successful manner. The effective project management comes into play to plan, coordinate and control such ...
-
Virtualized Network Management Laboratory for Educational Purposes
(Iranian Society of Cryptology, 2019-08-01)In this paper, we implement a Virtualized Network Management Laboratory named (VNML) linked to college campus network for educational purposes. This laboratory is created using Virtualbox virtualizer and GNS3 on Linux ...
-
An Optimal Utilization of Cloud Resources using Adaptive Back Propagation Neural Network and Multi-Level Priority Queue Scheduling
(Iranian Society of Cryptology, 2019-08-01)With the innovation of cloud computing industry lots of services were provided based on different deployment criteria. Nowadays everyone tries to remain connected and demand maximum utilization of resources with minimum ...
-
A Fair Power Allocation for Non-Orthogonal Multiple Access in the Power Domain
(Iranian Society of Cryptology, 2019-08-01)This paper presents an investigation on the performance of the Non-Orthogonal Multiple Access (NOMA) in the power domain scheme. A Power Allocation (PA) method is proposed from NOMA throughput expression analysis. This ...
-
Critical Success Factors for Data Virtualization: A Literature Review
(Iranian Society of Cryptology, 2019-08-01)Data Virtualization (DV) has become an important method to store and handle data cost-efficiently. However, it is unclear what kind of data and when data should be virtualized or not. We applied a design science approach ...
-
Evaluating Multipath TCP Resilience against Link Failures
(Iranian Society of Cryptology, 2019-08-01)Standard TCP is the de facto reliable transfer protocol for the Internet. It is designed to establish a reliable connection using only a single network interface. However, standard TCP with single interfacing performs ...
-
Using Machine Learning ARIMA to Predict the Price of Cryptocurrencies
(Iranian Society of Cryptology, 2019-08-01)The increasing volatility in pricing and growing potential for profit in digital currency have made predicting the price of cryptocurrency a very attractive research topic. Several studies have already been conducted using ...
-
Access and Mobility Policy Control at the Network Edge
(Iranian Society of Cryptology, 2019-08-01)The fifth generation (5G) system architecture is defined as service-based and the core network functions are described as sets of services accessible through application programming interfaces (API). One of the components ...
-
Cognitive Strategic Model applied to a Port System
(Iranian Society of Cryptology, 2019-08-01)Port organizations have focused their efforts on physical or tangible assets, generating profitability and value. However, it is recognized that the greatest sustainable competitive advantage is the creation of knowledge ...
-
Enhancing Learning from Imbalanced Classes via Data Preprocessing: A Data-Driven Application in Metabolomics Data Mining
(Iranian Society of Cryptology, 2019-08-01)This paper presents a data mining application in metabolomics. It aims at building an enhanced machine learning classifier that can be used for diagnosing cachexia syndrome and identifying its involved biomarkers. To achieve ...
-
Aspect Oriented UML to ECORE Model Transformation
(Iranian Society of Cryptology, 2019-08-01)With the emerging concept of model transformation, information can be extracted from one or more source models to produce the target models. The conversion of these models can be done automatically with specific transformation ...
-
Proposed ST-Slotted-CS-ALOHA Protocol for Time Saving and Collision Avoidance
(Iranian Society of Cryptology, 2019-08-01)Time Saving and energy consumption has become a vital issue that attracts the attention of researchers in Underwater Wireless Sensor Networks (UWSNs) fields. According to that, there is a strong need to improve MAC ...
-
Hand Gestures Classification with Multi-Core DTW
(Iranian Society of Cryptology, 2019-08-01)Classifications of several gesture types are very helpful in several applications. This paper tries to address fast classifications of hand gestures using DTW over multi-core simple processors. We presented a methodology ...
-
Medical Image Compression Based on Region of Interest
(Iranian Society of Cryptology, 2019-08-01)Medical images show a great interest since it is needed in various medical applications. In order to decrease the size of medical images which are needed to be transmitted in a faster way; Region of Interest (ROI) and ...
-
Evaluation of Planet Factors of Smart City through Multi-layer Fuzzy Logic (MFL)
(Iranian Society of Cryptology, 2019-08-01)Internet of Things (IoT) approach is empowering smart city creativities all over the world. There is no specific tool or criteria for the evaluation of the services offered by the smart city. In this paper, a new Multilayer ...
-
The Role of Packet Tracer in Learning Wireless Networks and Managing IoT Devices
(Iranian Society of Cryptology, 2019-08-01)Wireless networks, Internet of Things (IoT), Internet of Everything (IoE), and smart homes have become extremely important terms in our present-day life. Most of the buildings, companies, institutions, and even homes depend ...



