Volume 16 (2024)
Volume 15 (2023)
Volume 14 (2022)
Volume 13 (2021)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
Research Article
The Use of Local Sensitive Hashing for E-learner Face Identification

Hachem H. Alaoui; Elkaber Hachem; Cherif Ziti; Mohammed Karim

Volume 12, Issue 3 , November 2020, Pages 1-5


  Because face can reveal so much hidden information, we need to interpret these data and benefit from them. Hence, our paper shows a new and productive facial image representation based on local sensitive hashing (LSH). This strategy makes it conceivable to recognize the students who pursue their preparation ...  Read More

Research Article
Suspended Stripline Low-pass Filter Design for Wide Stopband Attenuation Applications

Aymen M. Al-Kadhimi; Salim A. Mohammed Ali; Sami Hasan

Volume 12, Issue 3 , November 2020, Pages 7-12


  This paper involves the design of asymmetrical generalized Chebyshev low-pass filter realized with a suspended substrate stripline. The study presents the synthesis and design of an asymmetrical prototype with a degree of 11, the cut-off frequency of 2.5 GHz, better than 26 dB as passband return loss ...  Read More

Research Article
Evaluation of a Wireless ZigBee with PID Controller for Networked Control System Using True Time Toolbox

Osama Ali Awad; Mais Monqith

Volume 12, Issue 3 , November 2020, Pages 13-17


  Wireless Networked Control System (WNCS) consists of a control system and communication network system. The insertion of the communication network in control systems has enormous advantages but on the other hand, it brings several issues like network induced delays or packet dropouts that bring negative ...  Read More

Research Article
A Hybrid Encryption Algorithm for Mitigating the Effects of Attacks in Ad Hoc Networks

Abdllkader Esaid; Mary Agoyi; Muhannad Tahboush

Volume 12, Issue 3 , November 2020, Pages 19-27


  Ad hoc network is infrastructure-less support, so network nodes are vulnerable to many attacks. Security attacks in Ad-Hoc networks are increasing significantly with time. They communicated and exchanged data should be also secured and kept confidential. Therefore, hybrid cryptography is proposed to ...  Read More

Research Article
CEMD: A Cluster-based Ensemble Motif Discovery Tool

Sumayia Al-Anazi; Isra Al-Turaiki; Najwa Altwaijry

Volume 12, Issue 3 , November 2020, Pages 29-36


  Motif discovery is a challenging problem in bioinformatics. It is an essential step towards understanding gene regulation. Although numerous algorithms and tools have been proposed in the literature, the accuracy of motif finding is still low. In this paper, we tackle the motif discovery problem using ...  Read More

Research Article
Anomaly-Based Network Intrusion Detection Using Bidirectional Long Short Term Memory and Convolutional Neural Network

Isra Al-Turaiki; Najwa Altwaijry; Abeer Agil; Haya Aljodhi; sara Alharbi; Lina Alqassem

Volume 12, Issue 3 , November 2020, Pages 37-44


  With present-day technological advancements, the number of devices connected to the Internet has increased dramatically. Cybersecurity attacks are increasingly becoming a threat to individuals and organizations. Contemporary security frameworks incorporate Network Intrusion Detection Systems (NIDS). ...  Read More

Research Article
The Impact of Mobile Payment Quality on User’s Continuance Intention Toward Mobile Payment in Saudi Arabia

Saja Ahmed Albliwi; Hanan Abdullah Alkharmani

Volume 12, Issue 3 , November 2020, Pages 45-53


  With the revolution in mobile technologies and the growing number of mobile internet users, Mobile Payment was born as a convenient channel of communication between customers and firms or organizations. Nowadays, Mobile Payments are on the way to disrupting the traditional Payment methods and contributing ...  Read More

Research Article
A New Derivation of the Leftover Hash Lemma

Marcelo S. Alencar; Karcius D. R. Assis

Volume 12, Issue 3 , November 2020, Pages 55-58


  This paper reviews the characteristics of the main digest algorithms, and presents a new derivation of the leftover hash lemma, using the collision probability to derive an upper bound on the statistical distance between the key and seed joint probability, and the hash bit sequence distribution. The ...  Read More

Research Article
Identifying Entrepreneurial Influencers on Twitter

Bodor Almotairy; Manal Abdullah; Rabeeh Abbasi

Volume 12, Issue 3 , November 2020, Pages 59-72


  Entrepreneurship involves an immense network of activities, linked via collaborations and information propagation. Information dissemination is extremely important for entrepreneurs. Finding influential users with high levels of interaction and connectivity in social media and involving them in information ...  Read More

Research Article
Fuzzy Histogram Equalization and Computer Vision Automated Identification of Microcalcifications in Breast Cancer

Shereen S. Jumaa

Volume 12, Issue 3 , November 2020, Pages 73-79


  Simple signs existent in mammograms for diagnosing breast cancer are considered to be microcalcifications or MCs. Therefore, true detection of MCs is needed to minimize schedule diagnosis, efficient care and death rate due to breast cancer. A challenging task is to evaluate and interpret mammograms and, ...  Read More

Research Article
Indexed View Technique to Speed-up Data Warehouse Query Processing

Talib M. J. Al Taleb; Sami Hasan; Yaqoob Yousif Mahdi

Volume 12, Issue 3 , November 2020, Pages 81-85


  The data warehouse size and query complexity may cause an unacceptable delay in decision support queries. A basic condition for the success of a data warehouse is the capability to supply decision-makers with both precise information and best response time. For this purpose, the concept of indexed views ...  Read More

Research Article
The Establishment of a Distance Training Device within the Regional Center of the Taza Education and Training: Administrative Cycle Case

Mustapha Bassiri; Abderrazak Mazouak; Imad Lamniai; Malika Tridane; Said Belaaouad; Said Belaaouad

Volume 12, Issue 3 , November 2020, Pages 87-93


  The application of New Information and Communication Technologies (NICT) in the field of training led to the creation of this new reality called distance learning. Described as the marriage of multimedia (sound, image, text) and the Internet (online distribution, interactivity) DT has no doubt allowed ...  Read More

Research Article
Knowledge Discovery in Cloud-Computing Environment and the Challenges

Najah K. Almazmomi

Volume 12, Issue 3 , November 2020, Pages 95-99


  Today, in the area of telecommunication, social media, the internet of things (IoT), and the virtual world, enormous amounts of data are being generated which are extracted to discover knowledge. Knowledge discovery from data in the cloud-computing environment entails the extraction of the new and necessary ...  Read More

Research Article
Modeling a Cloud-Based Smart Parking WLAN Networks Using IEEE802.11AC Technology

Wafa Abdulaziz Alkenazan; Ashraf A. Taha; Mohammed J.F. Alenazi; Wadood Abdul

Volume 12, Issue 3 , November 2020, Pages 101-109


  Due to the increasing number of cars and the difficulty to find vacant parking spots easily, the smart parking system is essential to save time and efforts of drivers and to protect the environment from emissions and air pollution. Wireless Sensor Networks used in smart parking systems consists of a ...  Read More

Research Article
A Multilingual Infobot in Airports

Ghada Al-Hudhud; Abeer Al-Humamidi

Volume 12, Issue 3 , November 2020, Pages 111-115


  A Chatbot is a smart software that responds to natural language input and attempts to hold a conversation in a way that simulates humans. Chatbots have the potential to save any individual’s time, hassle, and tedium by automating mundane tasks. The idea of this research is that to investigate how ...  Read More

Research Article
Reverse Image-Based Search Engine for IP Trademarks

Abeer Sulaiman Al-Humaimeedy; Abeer Salman Al-Hammad; Ghada Al-Hudhud

Volume 12, Issue 3 , November 2020, Pages 117-127


  In a world full of many ideas turning to various kinds of products that need to be protected and here comes the importance of intellectual property rights. Intellectual property has many types however, our interest is in trademarks. The Madrid system is a system used by a group of countries that were ...  Read More