Volume 23 (2023)
Volume 22 (2022)
Volume 21 (2021)
Volume 20 (2020)
Volume 19 (2019)
Volume 18 (2018)
Volume 17 (2017)
Volume 16 (2016)
Volume 15 (2015)
Volume 14 (2014)
Volume 13 (2013)
Volume 12 (2012)
Volume 11 (2011)
Volume 10 (2010)
Volume 9 (2009)
Volume 8 (2008)
Volume 7 (2007)
Volume 6 (2006)
Volume 5 (2005)
Volume 4 (2004)
Number of Articles: 14
Volume 22, Issue 3 , September 2022, Page 1-14
Abstractsince the global pandemic of COVID-19 has spread out, the use of Artificial Intelligence to analyze Chest X-Ray (CXR) image for COVID-19 diagnosis and patient treatment is becoming more important. This research hypothesized that using COVID19 radiographic changes in the X-Ray images. Artificial Intelligence ... Read More ...
Volume 22, Issue 3 , September 2022, Page 15-24
AbstractHackerscanconductmoredestructivecyber-attacksthankstotherapidspread of Internet of Things (IoT) devices, posing significant security risks for users. Through a malicious process, the attacker intended to exhaust the capital of the target IoT network. Researchers and company owners are concerned about ... Read More ...
Volume 22, Issue 3 , September 2022, Page 25-33
AbstractTraditional identification techniques for electronic payments, such as the Personal Identification Number (PIN), are becoming outdated and unsafe, while mobile payments are becoming more popular and widely used. It presents a risk to issuers since there is no reliable consumer verification method available, ... Read More ...
Volume 22, Issue 3 , September 2022, Page 34-47
AbstractThe paper presents an observer-based estimation of sensor fault for control systems affected by friction force. In such systems, the non-linearity of friction force leads to deteriorating sensor fault estimation capability of the observer. Hence, the challenge is to design an observer capable of attaining ... Read More ...
Volume 22, Issue 3 , September 2022, Page 48-61
AbstractContent-Based Image Retrieval (CBIR) is an actual application in computer vision, which retrieves similar images from a database. Deep Learning (DL) is essential in many applications, including image retrieval applications. However, encryption techniques are used to protect data privacy because these ... Read More ...
Volume 22, Issue 3 , September 2022, Page 62-71
AbstractNetwork traffic has risen in recent years to the point that it is obviously and astonishingly in 2020, with the increase predicted to double in the following days. Up to 23 Teraa bit every month is an incredible amount. The Active Queue Management (AQM) algorithm is one of the most significant study ... Read More ...
Volume 22, Issue 3 , September 2022, Page 72-80
AbstractRoad traffic accidents are one of the leading causes of mortality globally. Reducing the number of traffic-related incidents has become a serious socio-economic and public health problem, given the ever-increasing number of cars on the road. As a result, this paper proposes an intelligent vehicle prediction ... Read More ...
Volume 22, Issue 3 , September 2022, Page 81-96
AbstractMany academics have concentrated on applying machine learning to retrieve information from databases to enable researchers to perform better. A difficult issue in prediction models is the selection of practical strategies that yield satisfactory forecast accuracy. Traditional software testing techniques ... Read More ...
Volume 22, Issue 3 , September 2022, Page 97-110
AbstractFeature space high dimensionality is a well-known problem in text classification and web mining domains, it is caused mainly by the large number of vocabularies contained within web documents. Several methods were applied to select the most useful and important features over the years; however, the performance ... Read More ...
Volume 22, Issue 3 , September 2022, Page 111-117
AbstractThe main reason for the emergence of a deepfake (deep learning and fake) term is the evolution in artificial intelligence techniques, especially deep learning. Deep learning algorithms, which auto-solve problems when giving large sets of data, are used to swap faces in digital media to create fake media ... Read More ...
Volume 22, Issue 3 , September 2022, Page 118-127
AbstractIn recent years, especially with COVID-19, video conference applications have become very important. Millions of peoples around the world have become to communicate with each other through using video conference applications. The most critical factor in the performance success of video conference applications ... Read More ...
Optimizing Artificial Neural Networks Using Levy- Chaotic Mapping on Wolf Pack Optimization Algorithm for Detect Driving Sleepiness
Volume 22, Issue 3 , September 2022, Page 128-136
AbstractArtificial Neural Networks (ANNs) are utilized to solve a variety of problems in many domains. In this type of network, training and selecting parameters that define networks architecture play an important role in enhancing the accuracy of the network's output; Therefore, Prior to training, those parameters ... Read More ...
Volume 22, Issue 3 , September 2022, Page 137-146
AbstractThomas and Patrik are working on a stream cipher called SNOW 3G. In 2006, it was chosen as the centerpiece of a new set of confidentiality and integrity algorithms for the Universal Mobile Telecommunications System (UMTS). In 2008, Böhm published an article named "Statistical Evaluation of Stream Cipher ... Read More ...
Volume 22, Issue 3 , September 2022, Page 147-154