Main Subjects = Computer
Number of Articles: 11
New S-Box Design for Image Encryption Based on Multi-Chaotic System
Volume 41, Issue 10 , October 2023, , Page 1-9
Abstract
Image encryption is a crucial area for researchers in information security, which protects digital images from unauthorized access. This paper proposes a novel image encryption scheme ... Read More ...E-voting System Based on Ethereum Blockchain Technology Using Ganache and Remix Environments
Volume 41, Issue 4 , April 2023, , Page 562-577
Abstract
Abstract—In the second decade of the twenty-first century, blockchain is considered one of the most popular computer technologies. Blockchain is a zero-trust network, making it ... Read More ...Design and Implement the Innovative Drugstore for Health Care Services Based on Health Mobile Applications and Advanced IoT
Volume 41, Issue 2 , February 2023, , Page 407-417
Abstract
The health care problems are errors in taking medication, improper storage of the medication, irregularly taking the medication on time, and not knowing the side effects of taking medication ... Read More ...Proposal Framework to Light Weight Cryptography Primitives
Volume 40, Issue 4 , April 2022, , Page 516-526
Abstract
Due to manufacturing cost and portability limitations, the computing power, storage capacity, and energy of the Internet of Things (IoT) hardware are still slowly developing. From above, ... Read More ...Textual Dataset Classification Using Supervised Machine Learning Techniques
Volume 40, Issue 4 , April 2022, , Page 527-538
Abstract
Text classification has been a significant domain of study and research because of the increased volume of text datasets and documents available in digital format. Text classification ... Read More ...Improving Machine Learning Performance by Eliminating the Influence of Unclean Data
Volume 40, Issue 4 , April 2022, , Page 546-539
Abstract
Regardless of the data source and type (text, digital, photo group, etc.), they are usually unclean data. The term (unclean) means that data contains some bugs and paradoxes that can ... Read More ...Tuning the Hyperparameters of the 1D CNN Model to Improve the Performance of Human Activity Recognition
Volume 40, Issue 4 , April 2022, , Page 547-554
Abstract
The human activity recognition (HAR) field has recently become one of the trendiest research topics due to ready-made sensors such as accelerometers and gyroscopes equipped with smartphones ... Read More ...A Proposed WoT System for Diagnosing the Infection of Coronavirus (Covid-19)
Volume 40, Issue 4 , April 2022, , Page 563-572
Abstract
Coronavirus is one of the viruses that have broadly affected humans and the health system in general. The problem is that there is no treatment for the virus yet, and the virus spreads ... Read More ...Building an Efficient System to Detect Computer Worms in Websites Based on Ensemble Ada Boosting and SVM Classifiers Algorithms
Volume 40, Issue 4 , April 2022, , Page 595-604
Abstract
Computer worms perform harmful tasks in network systems due to their rapid spread, which leads to harmful consequences on system security. However, existing worm detection algorithms ... Read More ...Algebraic Decomposition Method for Zero Watermarking Technique in YCbCr Space
Volume 40, Issue 4 , April 2022, , Page 605-616
Abstract
The close connection between mathematics, especially linear algebra, and computer science has greatly impacted the development of several fields, and the most important is image processing. ... Read More ...Comparative Analysis of GMM, KNN, and ViBe Background Subtraction Algorithms Applied in Dynamic Background Scenes of Video Surveillance System
Volume 40, Issue 4 , April 2022, , Page 617-626