Volume 12, Issue 3

 

ارسال های اخیر

  • Reverse Image-Based Search Engine for IP Trademarks 

    Al-Humaimeedy, Abeer Sulaiman؛ Al-Hammad, Abeer Salman؛ Al-Hudhud, Ghada (Iranian Society of Cryptology, 2020-11-01)
    In a world full of many ideas turning to various kinds of products that need to be protected and here comes the importance of intellectual property rights. Intellectual property has many types however, our interest is in ...

  • A Multilingual Infobot in Airports 

    Al-Hudhud, Ghada؛ Al-Humamidi, Abeer (Iranian Society of Cryptology, 2020-11-01)
    A Chatbot is a smart software that responds to natural language input and attempts to hold a conversation in a way that simulates humans. Chatbots have the potential to save any individual's time, hassle, and tedium by ...

  • Modeling a Cloud-Based Smart Parking WLAN Networks Using IEEE802.11AC Technology 

    Alkenazan, Wafa؛ A. Taha, Ashraf؛ J.F. Alenazi, Mohammed؛ Abdul, Wadood (Iranian Society of Cryptology, 2020-11-01)
    Due to the increasing number of cars and the difficulty to find vacant parking spots easily, the smart parking system is essential to save time and efforts of drivers and to protect the environment from emissions and air ...

  • Knowledge Discovery in Cloud-Computing Environment and the Challenges 

    K. Almazmomi, Najah (Iranian Society of Cryptology, 2020-11-01)
    Today, in the area of telecommunication, social media, the internet of things (IoT), and the virtual world, enormous amounts of data are being generated which are extracted to discover knowledge. Knowledge discovery from ...

  • The Establishment of a Distance Training Device within the Regional Center of the Taza Education and Training: Administrative Cycle Case 

    Bassiri, Mustapha؛ Mazouak, Abderrazak؛ Lamniai, Imad؛ Tridane, Malika؛ Belaaouad, Said؛ Belaaouad, Said (Iranian Society of Cryptology, 2020-11-01)
    The application of New Information and Communication Technologies (NICT) in the field of training led to the creation of this new reality called distance learning. Described as the marriage of multimedia (sound, image, ...

  • Indexed View Technique to Speed-up Data Warehouse Query Processing 

    M. J. Al Taleb, Talib؛ Hasan, Sami؛ Yousif Mahdi, Yaqoob (Iranian Society of Cryptology, 2020-11-01)
    The data warehouse size and query complexity may cause an unacceptable delay in decision support queries. A basic condition for the success of a data warehouse is the capability to supply decision-makers with both precise ...

  • Fuzzy Histogram Equalization and Computer Vision Automated Identification of Microcalcifications in Breast Cancer 

    S. Jumaa, Shereen (Iranian Society of Cryptology, 2020-11-01)
    Simple signs existent in mammograms for diagnosing breast cancer are considered to be microcalcifications or MCs. Therefore, true detection of MCs is needed to minimize schedule diagnosis, efficient care and death rate due ...

  • Identifying Entrepreneurial Influencers on Twitter 

    Almotairy, Bodor؛ Abdullah, Manal؛ Abbasi, Rabeeh (Iranian Society of Cryptology, 2020-11-01)
    Entrepreneurship involves an immense network of activities, linked via collaborations and information propagation. Information dissemination is extremely important for entrepreneurs. Finding influential users with high ...

  • A New Derivation of the Leftover Hash Lemma 

    S. Alencar, Marcelo؛ D. R. Assis, Karcius (Iranian Society of Cryptology, 2020-11-01)
    This paper reviews the characteristics of the main digest algorithms, and presents a new derivation of the leftover hash lemma, using the collision probability to derive an upper bound on the statistical distance between ...

  • The Impact of Mobile Payment Quality on User’s Continuance Intention Toward Mobile Payment in Saudi Arabia 

    Ahmed Albliwi, Saja؛ Abdullah Alkharmani, Hanan (Iranian Society of Cryptology, 2020-11-01)
    With the revolution in mobile technologies and the growing number of mobile internet users, Mobile Payment was born as a convenient channel of communication between customers and firms or organizations. Nowadays, Mobile ...

  • Anomaly-Based Network Intrusion Detection Using Bidirectional Long Short Term Memory and Convolutional Neural Network 

    Al-Turaiki, Isra؛ Altwaijry, Najwa؛ Agil, Abeer؛ Aljodhi, Haya؛ Alharbi, sara؛ Alqassem, Lina (Iranian Society of Cryptology, 2020-11-01)
    With present-day technological advancements, the number of devices connected to the Internet has increased dramatically. Cybersecurity attacks are increasingly becoming a threat to individuals and organizations. Contemporary ...

  • CEMD: A Cluster-based Ensemble Motif Discovery Tool 

    Al-Anazi, Sumayia؛ Al-Turaiki, Isra؛ Altwaijry, Najwa (Iranian Society of Cryptology, 2020-11-01)
    Motif discovery is a challenging problem in bioinformatics. It is an essential step towards understanding gene regulation. Although numerous algorithms and tools have been proposed in the literature, the accuracy of motif ...

  • A Hybrid Encryption Algorithm for Mitigating the Effects of Attacks in Ad Hoc Networks 

    Esaid, Abdllkader؛ Agoyi, Mary؛ Tahboush, Muhannad (Iranian Society of Cryptology, 2020-11-01)
    Ad hoc network is infrastructure-less support, so network nodes are vulnerable to many attacks. Security attacks in Ad-Hoc networks are increasing significantly with time. They communicated and exchanged data should be ...

  • Evaluation of a Wireless ZigBee with PID Controller for Networked Control System Using True Time Toolbox 

    Ali Awad, Osama؛ Monqith, Mais (Iranian Society of Cryptology, 2020-11-01)
    Wireless Networked Control System (WNCS) consists of a control system and communication network system. The insertion of the communication network in control systems has enormous advantages but on the other hand, it brings ...

  • Suspended Stripline Low-pass Filter Design for Wide Stopband Attenuation Applications 

    M. Al-Kadhimi, Aymen؛ A. Mohammed Ali, Salim؛ Hasan, Sami (Iranian Society of Cryptology, 2020-11-01)
    This paper involves the design of asymmetrical generalized Chebyshev low-pass filter realized with a suspended substrate stripline. The study presents the synthesis and design of an asymmetrical prototype with a degree of ...

  • The Use of Local Sensitive Hashing for E-learner Face Identification 

    H. Alaoui, Hachem؛ Hachem, Elkaber؛ Ziti, Cherif؛ Karim, Mohammed (Iranian Society of Cryptology, 2020-11-01)
    Because face can reveal so much hidden information, we need to interpret these data and benefit from them. Hence, our paper shows a new and productive facial image representation based on local sensitive hashing (LSH). ...