Volume 16 (2024)
Volume 15 (2023)
Volume 14 (2022)
Volume 13 (2021)
Volume 12 (2020)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
Research Article
Algebraic Matching of Vulnerabilities in a Low-Level Code

Oleksandr Letychevskyi; Yaroslav Hryniuk; Viktor Yakovlev; Volodymyr Peschanenko; Viktor Radchenko

Volume 11, Issue 3 , August 2019, Pages 1-7

https://doi.org/10.22042/isecure.2019.11.0.1

Abstract
  This paper explores the algebraic matching approach for detection of vulnerabilities in binary codes. The algebraic programming system is used for implementing this method. It is anticipated that models of vulnerabilities and programs to be verified are presented as behavior algebra and ...  Read More

Research Article
Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns

Saadi Hadjer; Yagoub Mustapha C.E.; Rachida TOUHAMI

Volume 11, Issue 3 , August 2019, Pages 9-17

https://doi.org/10.22042/isecure.2019.11.0.2

Abstract
  The Internet of Things (IoT) is a very encouraging and fast-growing area that brings together the benefits of wireless systems, sensor networks, actuators, etc.A wide range of IoT applications have been targeted and several aspects of this field have been identified to address specific issues, ...  Read More

Research Article
A Sudy on Information Privacy Issue on Social Networks

Soran Ibrahim; Qing Tan

Volume 11, Issue 3 , August 2019, Pages 19-27

https://doi.org/10.22042/isecure.2019.11.0.3

Abstract
  In the recent years, social networks (SN) are now employed for communication and networking, socializing, marketing, as well as one’s daily life. Billions of people in the world are connected though various SN platforms and applications, which results in generating massive amount ...  Read More

Research Article
Medical Image Compression Based on Region of Interest

Dalia Shaaban; Mohamed Saad; Ahmed Madian; Hesham Elmahdy

Volume 11, Issue 3 , August 2019, Pages 29-34

https://doi.org/10.22042/isecure.2019.11.0.4

Abstract
  Medical images show a great interest since it is needed in various medical applications. In order to decrease the size of medical images which are needed to be transmitted in a faster way; Region of Interest (ROI) and hybrid lossless compression techniques are applied on medical images ...  Read More

Research Article
The Role of Packet Tracer in Learning Wireless Networks and Managing IoT Devices

Rawan Flifel

Volume 11, Issue 3 , August 2019, Pages 35-38

https://doi.org/10.22042/isecure.2019.11.0.5

Abstract
  Wireless networks, Internet of Things (IoT), Internet of Everything (IoE), and smart homes have become extremely important terms in our present-day life. Most of the buildings, companies, institutions, and even homes depend onthese technologies for interaction, communication, automation, and ...  Read More

Research Article
Face Recognition Based Rank Reduction SVD Approach

Omed Hassan Ahmed; Joan Lu; Qiang Xu; Muzhir Shaban Al-Ani

Volume 11, Issue 3 , August 2019, Pages 39-50

https://doi.org/10.22042/isecure.2019.11.0.6

Abstract
  Standard face recognition algorithms that use standard feature extraction techniques always suffer from image performance degradation. Recently, singular value decomposition and low-rank matrix are applied in many applications,including pattern recognition and feature extraction. The main objective ...  Read More

Research Article
Evaluation of Planet Factors of Smart City through Multi-layer Fuzzy Logic (MFL)

Areej Fatima; Muhammad Adnan Khan; Sagheer Abbas; Muhammad Waqas; Leena Anum; Muhammad Asif

Volume 11, Issue 3 , August 2019, Pages 51-58

https://doi.org/10.22042/isecure.2019.11.0.7

Abstract
  Internet of Things (IoT) approach is empowering smart city creativities all over the world. There is no specific tool or criteria for the evaluation of the services offered by the smart city. In this paper, a new Multilayer Fuzzy Inference System (MFIS) is proposed for the assessment of ...  Read More

Research Article
Considering Uncertainty in Modeling Historical Knowledge

Fairouz Zendaoui; Walid Khaled Hidouci

Volume 11, Issue 3 , August 2019, Pages 59-65

https://doi.org/10.22042/isecure.2019.11.0.8

Abstract
  Simplifying and structuring qualitatively complex knowledge, quantifying it in a certain way to make it reusable and easily accessible are all aspects that are not new to historians. Computer science is currently approaching a solution to some of these problems, or at least making it easier ...  Read More

Research Article
Proposed ST-Slotted-CS-ALOHA Protocol for Time Saving and Collision Avoidance

Ehab Khatter; Dina Ibrahim

Volume 11, Issue 3 , August 2019, Pages 67-72

https://doi.org/10.22042/isecure.2019.11.0.9

Abstract
  Time Saving and energy consumption has become a vital issue that attracts the attention of researchers in Underwater Wireless Sensor Networks (UWSNs) fields. According to that, there is a strong need to improve MAC protocols performance in UWSNs, particularly enhancing the effectiveness ...  Read More

Research Article
Cognitive Strategic Model applied to a Port System

Felisa Córdova; Claudia Durán; Fredi Palominos

Volume 11, Issue 3 , August 2019, Pages 73-78

https://doi.org/10.22042/isecure.2019.11.0.10

Abstract
  Port organizations have focused their efforts on physical or tangible assets, generating profitability and value. However, it is recognized that the greatest sustainable competitive advantage is the creation of knowledge using the intangible assets of the organization. The Balanced ScoreCard, ...  Read More

Research Article
Enhancing Learning from Imbalanced Classes via Data Preprocessing: A Data-Driven Application in Metabolomics Data Mining

Ahmed BaniMustafa

Volume 11, Issue 3 , August 2019, Pages 79-89

https://doi.org/10.22042/isecure.2019.11.0.11

Abstract
  This paper presents a data mining application in metabolomics. It aims at building an enhanced machine learning classifier that can be used for diagnosing cachexia syndrome and identifying its involved biomarkers. To achieve this goal, a data-driven analysis is carried out using a public ...  Read More

Research Article
Hand Gestures Classification with Multi-Core DTW

Ayman Atia; Nada Shorim

Volume 11, Issue 3 , August 2019, Pages 91-96

https://doi.org/10.22042/isecure.2019.11.0.12

Abstract
  Classifications of several gesture types are very helpful in several applications. This paper tries to address fast classifications of hand gestures using DTW over multi-core simple processors. We presented a methodology to distribute templates over multi-cores and then allow parallel ...  Read More

Research Article
Aspect Oriented UML to ECORE Model Transformation

Muhammad Ali Memon; Zaira Hassan; Kamran Dahri; Asadullah Shaikh; Muhammad Ali Nizamani

Volume 11, Issue 3 , August 2019, Pages 97-103

https://doi.org/10.22042/isecure.2019.11.0.13

Abstract
  With the emerging concept of model transformation, information can be extracted from one or more source models to produce the target models. The conversion of these models can be done automatically with specific transformation languages. This conversion requires mapping between both models ...  Read More

Research Article
Access and Mobility Policy Control at the Network Edge

Evelina Pencheva; Ivaylo Atanasov; Ivaylo Asenov

Volume 11, Issue 3 , August 2019, Pages 105-111

https://doi.org/10.22042/isecure.2019.11.0.14

Abstract
  The fifth generation (5G) system architecture is defined as service-based and the core network functions are described as sets of services accessible through application programming interfaces (API). One of the components of 5G is Multi-access Edge Computing (MEC) which provides the open ...  Read More

Research Article
Evaluating Multipath TCP Resilience against Link Failures

Mohammed J.F. Alenazi

Volume 11, Issue 3 , August 2019, Pages 113-122

https://doi.org/10.22042/isecure.2019.11.0.15

Abstract
  Standard TCP is the de facto reliable transfer protocol for the Internet. It is designed to establish a reliable connection using only a single network interface. However, standard TCP with single interfacing performs poorly due to intermittent node connectivity. This requires the re-establishment of ...  Read More

Research Article
A Fair Power Allocation for Non-Orthogonal Multiple Access in the Power Domain

Joel E. Cordeiro Junior; Marcelo S. Alencar; José V. dos Santos Filho; Karcius D. R. Assis

Volume 11, Issue 3 , August 2019, Pages 123-130

https://doi.org/10.22042/isecure.2019.11.0.16

Abstract
  This paper presents an investigation on the performance of the Non-Orthogonal Multiple Access (NOMA) in the power domain scheme. A Power Allocation (PA) method is proposed from NOMA throughput expression analysis. This method aims to provide fair opportunities for users to improve their ...  Read More

Research Article
Critical Success Factors for Data Virtualization: A Literature Review

Matthias Gottlieb; Marwin Shraideh; Isabel Fuhrmann; Markus Böhm; Helmut Krcmar

Volume 11, Issue 3 , August 2019, Pages 131-137

https://doi.org/10.22042/isecure.2019.11.0.17

Abstract
  Data Virtualization (DV) has become an important method to store and handle data cost-efficiently. However, it is unclear what kind of data and when data should be virtualized or not. We applied a design science approach in the first stage to get a state of the art of DV regarding data ...  Read More

Research Article
Using Machine Learning ARIMA to Predict the Price of Cryptocurrencies

Saad Ali Alahmari

Volume 11, Issue 3 , August 2019, Pages 139-144

https://doi.org/10.22042/isecure.2019.11.0.18

Abstract
  The increasing volatility in pricing and growing potential for profit in digital currency have made predicting the price of cryptocurrency a very attractive research topic. Several studies have already been conducted using various machine-learning models to predict crypto currency prices. ...  Read More

Research Article
An Optimal Utilization of Cloud Resources using Adaptive Back Propagation Neural Network and Multi-Level Priority Queue Scheduling

Anwar Saeed; Muhammad Yousif; Areej Fatima; Sagheer Abbas; Muhammad Adnan Khan; Leena Anum; Ali Akram

Volume 11, Issue 3 , August 2019, Pages 145-151

https://doi.org/10.22042/isecure.2019.11.0.19

Abstract
  With the innovation of cloud computing industry lots of services were provided based on different deployment criteria. Nowadays everyone tries to remain connected and demand maximum utilization of resources with minimum timeand effort. Thus, making it an important challenge in cloud computing ...  Read More

Research Article
Cloud and IoT based Smart Car Parking System by using Mamdani Fuzzy Inference System (MFIS)

Tahir Alyas; Gulzar Ahmad; Yousaf Saeed; Muhammad Asif; Umer Farooq; Asma Kanwal

Volume 11, Issue 3 , August 2019, Pages 153-160

https://doi.org/10.22042/isecure.2019.11.0.20

Abstract
  Internet of Things (IoT) and cloud computing technologies have connected the infrastructure of the city to make the context-aware and more intelligent city for utility its major resources. These technologies have much potential to solve thechallenges of urban areas around the globe to facilitate ...  Read More

Research Article
Towards Measuring the Project Management Process During Large Scale Software System Implementation Phase

Wajdi Aljedaibi; Sufian Khamis

Volume 11, Issue 3 , August 2019, Pages 161-172

https://doi.org/10.22042/isecure.2019.11.0.21

Abstract
  Project management is an important factor to accomplish the decision to implement large-scale software systems (LSS) in a successful manner. The effective project management comes into play to plan, coordinate and control such a complex project. Project management factor has been argued ...  Read More

Research Article
IoT Protocols Based Fog/Cloud over High Traffic

Istabraq M. Al-Joboury; Emad H. Al-Hemiary

Volume 11, Issue 3 , August 2019, Pages 173-180

https://doi.org/10.22042/isecure.2019.11.3.23

Abstract
  The Internet of Things (IoT) becomes the future of a global data field in which the embedded devices communicate with each other, exchange data and making decisions through the Internet. IoT could improve the quality of life in smart cities, but a massive amount of data from different smart devices could ...  Read More

Research Article
Virtualized Network Management Laboratory for Educational Purposes

Oula L. Abdulsattar; Emad H. Al-Hemiary

Volume 11, Issue 3 , August 2019, Pages 181-186

https://doi.org/10.22042/isecure.2019.11.3.24

Abstract
  In this paper, we implement a Virtualized Network Management Laboratory named (VNML) linked to college campus network for educational purposes. This laboratory is created using Virtualbox virtualizer and GNS3 on Linux UBUNTU single HP DL380 G7 server platform. A total of 35 virtual devices (Routers, ...  Read More

A Comparison Study between Intelligent Decision Support Systems and Decision Support Systems

Mosleh Zeebaree; Musbah Aqel

Volume 11, Issue 3 , August 2019, Pages 187-194

https://doi.org/10.22042/isecure.2019.11.3.25

Abstract
  This paper is one that explored intelligent decision support systems and Decision support systems. Due to the inception and development of systems and technological advances such as data warehouse, enterprise resource planning, advance plan system & also top trends like Internet of things, big data, ...  Read More

Research Article
The Impact of The Biometric System on Election Fraud Elimination: Case of The North of IRAQ

Musbah Aqel; Twana Saeed Ali; Tugberk Kaya

Volume 11, Issue 3 , August 2019, Pages 195-207

https://doi.org/10.22042/isecure.2019.11.3.0

Abstract
  In recent years technology and management information system has been an excellent response too many global challenges, technology innovation has expanded over almost all the sectors of, and it made many processes more accurate and very faster than before. Technology systems playeda big role part in ...  Read More