Volume 13 (2021)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
Research Article
1. The Use of Local Sensitive Hashing for E-learner Face Identification

Hachem H. Alaoui; Elkaber Hachem; Cherif Ziti; Mohammed Karim

Volume 12, Issue 3 , Summer and Autumn 2020, Pages 1-5

http://dx.doi.org/10.22042/isecure.2021.271051.612

Abstract
  Because face can reveal so much hidden information, we need to interpret these data and benefit from them. Hence, our paper shows a new and productive facial image representation based on local sensitive hashing (LSH). This strategy makes it conceivable to recognize the students who pursue their preparation ...  Read More

Research Article
2. Suspended Stripline Low-pass Filter Design for Wide Stopband Attenuation Applications

Aymen M. Al-Kadhimi; Salim A. Mohammed Ali; Sami Hasan

Volume 12, Issue 3 , Summer and Autumn 2020, Pages 7-12

http://dx.doi.org/10.22042/isecure.2021.271055.613

Abstract
  This paper involves the design of asymmetrical generalized Chebyshev low-pass filter realized with a suspended substrate stripline. The study presents the synthesis and design of an asymmetrical prototype with a degree of 11, the cut-off frequency of 2.5 GHz, better than 26 dB as passband return loss ...  Read More

Research Article
3. Evaluation of a Wireless ZigBee with PID Controller for Networked Control System Using True Time Toolbox

Osama Ali Awad; Mais Monqith

Volume 12, Issue 3 , Summer and Autumn 2020, Pages 13-17

http://dx.doi.org/10.22042/isecure.2021.271058.614

Abstract
  Wireless Networked Control System (WNCS) consists of a control system and communication network system. The insertion of the communication network in control systems has enormous advantages but on the other hand, it brings several issues like network induced delays or packet dropouts that bring negative ...  Read More

Research Article
4. A Hybrid Encryption Algorithm for Mitigating the Effects of Attacks in Ad Hoc Networks

Abdllkader Esaid; Mary Agoyi; Muhannad Tahboush

Volume 12, Issue 3 , Summer and Autumn 2020, Pages 19-27

http://dx.doi.org/10.22042/isecure.2021.271065.619

Abstract
  Ad hoc network is infrastructure-less support, so network nodes are vulnerable to many attacks. Security attacks in Ad-Hoc networks are increasing significantly with time. They communicated and exchanged data should be also secured and kept confidential. Therefore, hybrid cryptography is proposed to ...  Read More

Research Article
5. CEMD: A Cluster-based Ensemble Motif Discovery Tool

Sumayia Al-Anazi; Isra Al-Turaiki; Najwa Altwaijry

Volume 12, Issue 3 , Summer and Autumn 2020, Pages 29-36

http://dx.doi.org/10.22042/isecure.2021.271073.623

Abstract
  Motif discovery is a challenging problem in bioinformatics. It is an essential step towards understanding gene regulation. Although numerous algorithms and tools have been proposed in the literature, the accuracy of motif finding is still low. In this paper, we tackle the motif discovery problem using ...  Read More

Research Article
6. Anomaly-Based Network Intrusion Detection Using Bidirectional Long Short Term Memory and Convolutional Neural Network

Isra Al-Turaiki; Najwa Altwaijry; Abeer Agil; Haya Aljodhi; sara Alharbi; Lina Alqassem

Volume 12, Issue 3 , Summer and Autumn 2020, Pages 37-44

http://dx.doi.org/10.22042/isecure.2021.271076.624

Abstract
  With present-day technological advancements, the number of devices connected to the Internet has increased dramatically. Cybersecurity attacks are increasingly becoming a threat to individuals and organizations. Contemporary security frameworks incorporate Network Intrusion Detection Systems (NIDS). ...  Read More

Research Article
7. The Impact of Mobile Payment Quality on User’s Continuance Intention Toward Mobile Payment in Saudi Arabia

Saja Ahmed Albliwi; Hanan Abdullah Alkharmani

Volume 12, Issue 3 , Summer and Autumn 2020, Pages 45-53

http://dx.doi.org/10.22042/isecure.2021.271079.625

Abstract
  With the revolution in mobile technologies and the growing number of mobile internet users, Mobile Payment was born as a convenient channel of communication between customers and firms or organizations. Nowadays, Mobile Payments are on the way to disrupting the traditional Payment methods and contributing ...  Read More

Research Article
8. A New Derivation of the Leftover Hash Lemma

Marcelo S. Alencar; Karcius D. R. Assis

Volume 12, Issue 3 , Summer and Autumn 2020, Pages 55-58

http://dx.doi.org/10.22042/isecure.2021.271070.622

Abstract
  This paper reviews the characteristics of the main digest algorithms, and presents a new derivation of the leftover hash lemma, using the collision probability to derive an upper bound on the statistical distance between the key and seed joint probability, and the hash bit sequence distribution. The ...  Read More

Research Article
9. Identifying Entrepreneurial Influencers on Twitter

Bodor Almotairy; Manal Abdullah; Rabeeh Abbasi

Volume 12, Issue 3 , Summer and Autumn 2020, Pages 59-72

http://dx.doi.org/10.22042/isecure.2021.271108.629

Abstract
  Entrepreneurship involves an immense network of activities, linked via collaborations and information propagation. Information dissemination is extremely important for entrepreneurs. Finding influential users with high levels of interaction and connectivity in social media and involving them in information ...  Read More

Research Article
10. Fuzzy Histogram Equalization and Computer Vision Automated Identification of Microcalcifications in Breast Cancer

Shereen S. Jumaa

Volume 12, Issue 3 , Summer and Autumn 2020, Pages 73-79

http://dx.doi.org/10.22042/isecure.2021.271062.616

Abstract
  Simple signs existent in mammograms for diagnosing breast cancer are considered to be microcalcifications or MCs. Therefore, true detection of MCs is needed to minimize schedule diagnosis, efficient care and death rate due to breast cancer. A challenging task is to evaluate and interpret mammograms and, ...  Read More

Research Article
11. Indexed View Technique to Speed-up Data Warehouse Query Processing

Talib M. J. Al Taleb; Sami Hasan; Yaqoob Yousif Mahdi

Volume 12, Issue 3 , Summer and Autumn 2020, Pages 81-85

http://dx.doi.org/10.22042/isecure.2021.271059.615

Abstract
  The data warehouse size and query complexity may cause an unacceptable delay in decision support queries. A basic condition for the success of a data warehouse is the capability to supply decision-makers with both precise information and best response time. For this purpose, the concept of indexed views ...  Read More

Research Article
12. The Establishment of a Distance Training Device within the Regional Center of the Taza Education and Training: Administrative Cycle Case

Mustapha Bassiri; Abderrazak Mazouak; Imad Lamniai; Malika Tridane; Said Belaaouad; Said Belaaouad

Volume 12, Issue 3 , Summer and Autumn 2020, Pages 87-93

http://dx.doi.org/10.22042/isecure.2021.271064.618

Abstract
  The application of New Information and Communication Technologies (NICT) in the field of training led to the creation of this new reality called distance learning. Described as the marriage of multimedia (sound, image, text) and the Internet (online distribution, interactivity) DT has no doubt allowed ...  Read More