مرور Volume 11, Issue 3 بر اساس عنوان

در حال نمایش موارد 1 - 18 از 18

  • Access and Mobility Policy Control at the Network Edge 

    Pencheva, Evelina؛ Atanasov, Ivaylo؛ Asenov, Ivaylo (Iranian Society of Cryptology, 2019-08-01)
    The fifth generation (5G) system architecture is defined as service-based and the core network functions are described as sets of services accessible through application programming interfaces (API). One of the components ...

  • Aspect Oriented UML to ECORE Model Transformation 

    Memon, Muhammad Ali؛ Hassan, Zaira؛ Dahri, Kamran؛ Shaikh, Asadullah؛ Nizamani, Muhammad Ali (Iranian Society of Cryptology, 2019-08-01)
    With the emerging concept of model transformation, information can be extracted from one or more source models to produce the target models. The conversion of these models can be done automatically with specific transformation ...

  • Cloud and IoT based Smart Car Parking System by using Mamdani Fuzzy Inference System (MFIS) 

    Alyas, Tahir؛ Ahmad, Gulzar؛ Saeed, Yousaf؛ Asif, Muhammad؛ Farooq, Umer؛ Kanwal, Asma (Iranian Society of Cryptology, 2019-08-01)
    Internet of Things (IoT) and cloud computing technologies have connected the infrastructure of the city to make the context-aware and more intelligent city for utility its major resources. These technologies have much ...

  • A Comparison Study between Intelligent Decision Support Systems and Decision Support Systems 

    Zeebaree, Mosleh؛ Aqel, Musbah (Iranian Society of Cryptology, 2019-08-01)
    This paper is one that explored intelligent decision support systems and Decision support systems. Due to the inception and development of systems and technological advances such as data warehouse, enterprise resource ...

  • Considering Uncertainty in Modeling Historical Knowledge 

    Zendaoui, Fairouz؛ Hidouci, Walid Khaled (Iranian Society of Cryptology, 2019-08-01)
    Simplifying and structuring qualitatively complex knowledge, quantifying it in a certain way to make it reusable and easily accessible are all aspects that are not new to historians. Computer science is currently approaching ...

  • Critical Success Factors for Data Virtualization: A Literature Review 

    Gottlieb, Matthias؛ Shraideh, Marwin؛ Fuhrmann, Isabel؛ Böhm, Markus؛ Krcmar, Helmut (Iranian Society of Cryptology, 2019-08-01)
    Data Virtualization (DV) has become an important method to store and handle data cost-efficiently. However, it is unclear what kind of data and when data should be virtualized or not. We applied a design science approach ...

  • Enhancing Learning from Imbalanced Classes via Data Preprocessing: A Data-Driven Application in Metabolomics Data Mining 

    BaniMustafa, Ahmed (Iranian Society of Cryptology, 2019-08-01)
    This paper presents a data mining application in metabolomics. It aims at building an enhanced machine learning classifier that can be used for diagnosing cachexia syndrome and identifying its involved biomarkers. To achieve ...

  • Evaluation of Planet Factors of Smart City through Multi-layer Fuzzy Logic (MFL) 

    Fatima, Areej؛ Adnan Khan, Muhammad؛ Abbas, Sagheer؛ Waqas, Muhammad؛ Anum, Leena؛ Asif, Muhammad (Iranian Society of Cryptology, 2019-08-01)
    Internet of Things (IoT) approach is empowering smart city creativities all over the world. There is no specific tool or criteria for the evaluation of the services offered by the smart city. In this paper, a new Multilayer ...

  • Face Recognition Based Rank Reduction SVD Approach 

    Hassan Ahmed, Omed؛ Lu, Joan؛ Xu, Qiang؛ Shaban Al-Ani, Muzhir (Iranian Society of Cryptology, 2019-08-01)
    Standard face recognition algorithms that use standard feature extraction techniques always suffer from image performance degradation. Recently, singular value decomposition and low-rank matrix are applied in many ...

  • Hand Gestures Classification with Multi-Core DTW 

    Atia, Ayman؛ Shorim, Nada (Iranian Society of Cryptology, 2019-08-01)
    Classifications of several gesture types are very helpful in several applications. This paper tries to address fast classifications of hand gestures using DTW over multi-core simple processors. We presented a methodology ...

  • Medical Image Compression Based on Region of Interest 

    Shaaban, Dalia؛ Saad, Mohamed؛ Madian, Ahmed؛ Elmahdy, Hesham (Iranian Society of Cryptology, 2019-08-01)
    Medical images show a great interest since it is needed in various medical applications. In order to decrease the size of medical images which are needed to be transmitted in a faster way; Region of Interest (ROI) and ...

  • An Optimal Utilization of Cloud Resources using Adaptive Back Propagation Neural Network and Multi-Level Priority Queue Scheduling 

    Saeed, Anwar؛ Yousif, Muhammad؛ Fatima, Areej؛ Abbas, Sagheer؛ Adnan Khan, Muhammad؛ Anum, Leena؛ Akram, Ali (Iranian Society of Cryptology, 2019-08-01)
    With the innovation of cloud computing industry lots of services were provided based on different deployment criteria. Nowadays everyone tries to remain connected and demand maximum utilization of resources with minimum ...

  • Proposed ST-Slotted-CS-ALOHA Protocol for Time Saving and Collision Avoidance 

    Khatter, Ehab؛ Ibrahim, Dina (Iranian Society of Cryptology, 2019-08-01)
    Time Saving and energy consumption has become a vital issue that attracts the attention of researchers in Underwater Wireless Sensor Networks (UWSNs) fields. According to that, there is a strong need to improve MAC ...

  • Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns 

    Hadjer, Saadi؛ Mustapha C.E., Yagoub؛ TOUHAMI, Rachida (Iranian Society of Cryptology, 2019-08-01)
    The Internet of Things (IoT) is a very encouraging and fast-growing area that brings together the benefits of wireless systems, sensor networks, actuators, etc.A wide range of IoT applications have been targeted and ...

  • The Role of Packet Tracer in Learning Wireless Networks and Managing IoT Devices 

    Flifel, Rawan (Iranian Society of Cryptology, 2019-08-01)
    Wireless networks, Internet of Things (IoT), Internet of Everything (IoE), and smart homes have become extremely important terms in our present-day life. Most of the buildings, companies, institutions, and even homes depend ...

  • Towards Measuring the Project Management Process During Large Scale Software System Implementation Phase 

    Aljedaibi, Wajdi؛ Khamis, Sufian (Iranian Society of Cryptology, 2019-08-01)
    Project management is an important factor to accomplish the decision to implement large-scale software systems (LSS) in a successful manner. The effective project management comes into play to plan, coordinate and control such ...

  • Using Machine Learning ARIMA to Predict the Price of Cryptocurrencies 

    Alahmari, Saad Ali (Iranian Society of Cryptology, 2019-08-01)
    The increasing volatility in pricing and growing potential for profit in digital currency have made predicting the price of cryptocurrency a very attractive research topic. Several studies have already been conducted using ...

  • Virtualized Network Management Laboratory for Educational Purposes 

    L. Abdulsattar, Oula؛ H. Al-Hemiary, Emad (Iranian Society of Cryptology, 2019-08-01)
    In this paper, we implement a Virtualized Network Management Laboratory named (VNML) linked to college campus network for educational purposes. This laboratory is created using Virtualbox virtualizer and GNS3 on Linux ...