Volume 11, Issue 3
مرور بر اساس
ارسال های اخیر
-
Virtualized Network Management Laboratory for Educational Purposes
(Iranian Society of Cryptology, 2019-08-01)In this paper, we implement a Virtualized Network Management Laboratory named (VNML) linked to college campus network for educational purposes. This laboratory is created using Virtualbox virtualizer and GNS3 on Linux ...
-
A Comparison Study between Intelligent Decision Support Systems and Decision Support Systems
(Iranian Society of Cryptology, 2019-08-01)This paper is one that explored intelligent decision support systems and Decision support systems. Due to the inception and development of systems and technological advances such as data warehouse, enterprise resource ...
-
Cloud and IoT based Smart Car Parking System by using Mamdani Fuzzy Inference System (MFIS)
(Iranian Society of Cryptology, 2019-08-01)Internet of Things (IoT) and cloud computing technologies have connected the infrastructure of the city to make the context-aware and more intelligent city for utility its major resources. These technologies have much ...
-
Towards Measuring the Project Management Process During Large Scale Software System Implementation Phase
(Iranian Society of Cryptology, 2019-08-01)Project management is an important factor to accomplish the decision to implement large-scale software systems (LSS) in a successful manner. The effective project management comes into play to plan, coordinate and control such ...
-
Using Machine Learning ARIMA to Predict the Price of Cryptocurrencies
(Iranian Society of Cryptology, 2019-08-01)The increasing volatility in pricing and growing potential for profit in digital currency have made predicting the price of cryptocurrency a very attractive research topic. Several studies have already been conducted using ...
-
An Optimal Utilization of Cloud Resources using Adaptive Back Propagation Neural Network and Multi-Level Priority Queue Scheduling
(Iranian Society of Cryptology, 2019-08-01)With the innovation of cloud computing industry lots of services were provided based on different deployment criteria. Nowadays everyone tries to remain connected and demand maximum utilization of resources with minimum ...
-
Critical Success Factors for Data Virtualization: A Literature Review
(Iranian Society of Cryptology, 2019-08-01)Data Virtualization (DV) has become an important method to store and handle data cost-efficiently. However, it is unclear what kind of data and when data should be virtualized or not. We applied a design science approach ...
-
Enhancing Learning from Imbalanced Classes via Data Preprocessing: A Data-Driven Application in Metabolomics Data Mining
(Iranian Society of Cryptology, 2019-08-01)This paper presents a data mining application in metabolomics. It aims at building an enhanced machine learning classifier that can be used for diagnosing cachexia syndrome and identifying its involved biomarkers. To achieve ...
-
Access and Mobility Policy Control at the Network Edge
(Iranian Society of Cryptology, 2019-08-01)The fifth generation (5G) system architecture is defined as service-based and the core network functions are described as sets of services accessible through application programming interfaces (API). One of the components ...
-
Aspect Oriented UML to ECORE Model Transformation
(Iranian Society of Cryptology, 2019-08-01)With the emerging concept of model transformation, information can be extracted from one or more source models to produce the target models. The conversion of these models can be done automatically with specific transformation ...
-
Proposed ST-Slotted-CS-ALOHA Protocol for Time Saving and Collision Avoidance
(Iranian Society of Cryptology, 2019-08-01)Time Saving and energy consumption has become a vital issue that attracts the attention of researchers in Underwater Wireless Sensor Networks (UWSNs) fields. According to that, there is a strong need to improve MAC ...
-
Hand Gestures Classification with Multi-Core DTW
(Iranian Society of Cryptology, 2019-08-01)Classifications of several gesture types are very helpful in several applications. This paper tries to address fast classifications of hand gestures using DTW over multi-core simple processors. We presented a methodology ...
-
The Role of Packet Tracer in Learning Wireless Networks and Managing IoT Devices
(Iranian Society of Cryptology, 2019-08-01)Wireless networks, Internet of Things (IoT), Internet of Everything (IoE), and smart homes have become extremely important terms in our present-day life. Most of the buildings, companies, institutions, and even homes depend ...
-
Considering Uncertainty in Modeling Historical Knowledge
(Iranian Society of Cryptology, 2019-08-01)Simplifying and structuring qualitatively complex knowledge, quantifying it in a certain way to make it reusable and easily accessible are all aspects that are not new to historians. Computer science is currently approaching ...
-
Medical Image Compression Based on Region of Interest
(Iranian Society of Cryptology, 2019-08-01)Medical images show a great interest since it is needed in various medical applications. In order to decrease the size of medical images which are needed to be transmitted in a faster way; Region of Interest (ROI) and ...
-
Evaluation of Planet Factors of Smart City through Multi-layer Fuzzy Logic (MFL)
(Iranian Society of Cryptology, 2019-08-01)Internet of Things (IoT) approach is empowering smart city creativities all over the world. There is no specific tool or criteria for the evaluation of the services offered by the smart city. In this paper, a new Multilayer ...
-
Face Recognition Based Rank Reduction SVD Approach
(Iranian Society of Cryptology, 2019-08-01)Standard face recognition algorithms that use standard feature extraction techniques always suffer from image performance degradation. Recently, singular value decomposition and low-rank matrix are applied in many ...
-
Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns
(Iranian Society of Cryptology, 2019-08-01)The Internet of Things (IoT) is a very encouraging and fast-growing area that brings together the benefits of wireless systems, sensor networks, actuators, etc.A wide range of IoT applications have been targeted and ...



