Volume 11, Issue 3

 

ارسال های اخیر

  • The Impact of The Biometric System on Election Fraud Elimination: Case of The North of IRAQ 

    Aqel, Musbah؛ Saeed Ali, Twana؛ Kaya, Tugberk (Iranian Society of Cryptology, 2019-08-01)
    In recent years technology and management information system has been an excellent response too many global challenges, technology innovation has expanded over almost all the sectors of, and it made many processes more ...

  • Towards Measuring the Project Management Process During Large Scale Software System Implementation Phase 

    Aljedaibi, Wajdi؛ Khamis, Sufian (Iranian Society of Cryptology, 2019-08-01)
    Project management is an important factor to accomplish the decision to implement large-scale software systems (LSS) in a successful manner. The effective project management comes into play to plan, coordinate and control such ...

  • Virtualized Network Management Laboratory for Educational Purposes 

    L. Abdulsattar, Oula؛ H. Al-Hemiary, Emad (Iranian Society of Cryptology, 2019-08-01)
    In this paper, we implement a Virtualized Network Management Laboratory named (VNML) linked to college campus network for educational purposes. This laboratory is created using Virtualbox virtualizer and GNS3 on Linux ...

  • IoT Protocols Based Fog/Cloud over High Traffic 

    M. Al-Joboury, Istabraq؛ H. Al-Hemiary, Emad (Iranian Society of Cryptology, 2019-08-01)
    The Internet of Things (IoT) becomes the future of a global data field in which the embedded devices communicate with each other, exchange data and making decisions through the Internet. IoT could improve the quality of ...

  • Cloud and IoT based Smart Car Parking System by using Mamdani Fuzzy Inference System (MFIS) 

    Alyas, Tahir؛ Ahmad, Gulzar؛ Saeed, Yousaf؛ Asif, Muhammad؛ Farooq, Umer؛ Kanwal, Asma (Iranian Society of Cryptology, 2019-08-01)
    Internet of Things (IoT) and cloud computing technologies have connected the infrastructure of the city to make the context-aware and more intelligent city for utility its major resources. These technologies have much ...

  • A Comparison Study between Intelligent Decision Support Systems and Decision Support Systems 

    Zeebaree, Mosleh؛ Aqel, Musbah (Iranian Society of Cryptology, 2019-08-01)
    This paper is one that explored intelligent decision support systems and Decision support systems. Due to the inception and development of systems and technological advances such as data warehouse, enterprise resource ...

  • An Optimal Utilization of Cloud Resources using Adaptive Back Propagation Neural Network and Multi-Level Priority Queue Scheduling 

    Saeed, Anwar؛ Yousif, Muhammad؛ Fatima, Areej؛ Abbas, Sagheer؛ Adnan Khan, Muhammad؛ Anum, Leena؛ Akram, Ali (Iranian Society of Cryptology, 2019-08-01)
    With the innovation of cloud computing industry lots of services were provided based on different deployment criteria. Nowadays everyone tries to remain connected and demand maximum utilization of resources with minimum ...

  • Using Machine Learning ARIMA to Predict the Price of Cryptocurrencies 

    Alahmari, Saad Ali (Iranian Society of Cryptology, 2019-08-01)
    The increasing volatility in pricing and growing potential for profit in digital currency have made predicting the price of cryptocurrency a very attractive research topic. Several studies have already been conducted using ...

  • Evaluating Multipath TCP Resilience against Link Failures 

    J.F. Alenazi, Mohammed (Iranian Society of Cryptology, 2019-08-01)
    Standard TCP is the de facto reliable transfer protocol for the Internet. It is designed to establish a reliable connection using only a single network interface. However, standard TCP with single interfacing performs ...

  • A Fair Power Allocation for Non-Orthogonal Multiple Access in the Power Domain 

    E. Cordeiro Junior, Joel؛ S. Alencar, Marcelo؛ V. dos Santos Filho, José؛ D. R. Assis, Karcius (Iranian Society of Cryptology, 2019-08-01)
    This paper presents an investigation on the performance of the Non-Orthogonal Multiple Access (NOMA) in the power domain scheme. A Power Allocation (PA) method is proposed from NOMA throughput expression analysis. This ...

  • Critical Success Factors for Data Virtualization: A Literature Review 

    Gottlieb, Matthias؛ Shraideh, Marwin؛ Fuhrmann, Isabel؛ Böhm, Markus؛ Krcmar, Helmut (Iranian Society of Cryptology, 2019-08-01)
    Data Virtualization (DV) has become an important method to store and handle data cost-efficiently. However, it is unclear what kind of data and when data should be virtualized or not. We applied a design science approach ...

  • Enhancing Learning from Imbalanced Classes via Data Preprocessing: A Data-Driven Application in Metabolomics Data Mining 

    BaniMustafa, Ahmed (Iranian Society of Cryptology, 2019-08-01)
    This paper presents a data mining application in metabolomics. It aims at building an enhanced machine learning classifier that can be used for diagnosing cachexia syndrome and identifying its involved biomarkers. To achieve ...

  • Aspect Oriented UML to ECORE Model Transformation 

    Memon, Muhammad Ali؛ Hassan, Zaira؛ Dahri, Kamran؛ Shaikh, Asadullah؛ Nizamani, Muhammad Ali (Iranian Society of Cryptology, 2019-08-01)
    With the emerging concept of model transformation, information can be extracted from one or more source models to produce the target models. The conversion of these models can be done automatically with specific transformation ...

  • Cognitive Strategic Model applied to a Port System 

    Córdova, Felisa؛ Durán, Claudia؛ Palominos, Fredi (Iranian Society of Cryptology, 2019-08-01)
    Port organizations have focused their efforts on physical or tangible assets, generating profitability and value. However, it is recognized that the greatest sustainable competitive advantage is the creation of knowledge ...

  • Proposed ST-Slotted-CS-ALOHA Protocol for Time Saving and Collision Avoidance 

    Khatter, Ehab؛ Ibrahim, Dina (Iranian Society of Cryptology, 2019-08-01)
    Time Saving and energy consumption has become a vital issue that attracts the attention of researchers in Underwater Wireless Sensor Networks (UWSNs) fields. According to that, there is a strong need to improve MAC ...

  • Hand Gestures Classification with Multi-Core DTW 

    Atia, Ayman؛ Shorim, Nada (Iranian Society of Cryptology, 2019-08-01)
    Classifications of several gesture types are very helpful in several applications. This paper tries to address fast classifications of hand gestures using DTW over multi-core simple processors. We presented a methodology ...

  • Access and Mobility Policy Control at the Network Edge 

    Pencheva, Evelina؛ Atanasov, Ivaylo؛ Asenov, Ivaylo (Iranian Society of Cryptology, 2019-08-01)
    The fifth generation (5G) system architecture is defined as service-based and the core network functions are described as sets of services accessible through application programming interfaces (API). One of the components ...

  • A Sudy on Information Privacy Issue on Social Networks 

    Ibrahim, Soran؛ Tan, Qing (Iranian Society of Cryptology, 2019-08-01)
    In the recent years, social networks (SN) are now employed for communication and networking, socializing, marketing, as well as one's daily life. Billions of people in the world are connected though various SN platforms ...

  • Face Recognition Based Rank Reduction SVD Approach 

    Hassan Ahmed, Omed؛ Lu, Joan؛ Xu, Qiang؛ Shaban Al-Ani, Muzhir (Iranian Society of Cryptology, 2019-08-01)
    Standard face recognition algorithms that use standard feature extraction techniques always suffer from image performance degradation. Recently, singular value decomposition and low-rank matrix are applied in many ...

  • Considering Uncertainty in Modeling Historical Knowledge 

    Zendaoui, Fairouz؛ Hidouci, Walid Khaled (Iranian Society of Cryptology, 2019-08-01)
    Simplifying and structuring qualitatively complex knowledge, quantifying it in a certain way to make it reusable and easily accessible are all aspects that are not new to historians. Computer science is currently approaching ...

View more