The growing adoption of Artificial Intelligence (AI) in the decentralized finance space has opened new opportunities to improve fraud detection, smart contracts, liquidity pooling, efficiency, and scalability of decentralized finance... more
Crop yield prediction from UAV images has significant potential in accelerating and revolutionizing crop breeding pipelines. Although convolutional neural networks (CNN) provide easy, accurate and efficient solutions over traditional... more
Open Web Application Security Project (OWASP) Top 10 algorithm for Web Applications (WA) security audits using Vulnerability Assessment and Penetration Testing (VAPT) processes. The study places particular emphasis on enhancing the VAPT... more
The physical limitations of CMOS technology triggered several research for finding an alternative technology. QCA is one of the emerging nanotechnologies which is gaining attention as a substitute of CMOS. The main potential of QCA is its... more
Loan default prediction is one of the most important and critical problem faced by many banks and other financial institutions as it has a huge effect on their survival and profit. Many traditional methods exist for mining information... more
Syllables preserve within unit co-articulation effects, which results syllables to be a good choice as speech unit for speech database of many languages. Punjabi is a syllabic language, so syllables have been selected as the basic speech... more
In the ever-evolving landscape of web development, client-side storage mechanisms have become pivotal in enhancing user experience and application performance. This paper delves into the various client-side storage options available in... more
As the increasing number of telemedical applications over the Internet using mobile devices (PDAs, Tablet PC, various medical devices, and so on), for access of medical data in terms of telemedicine and remote patient telemonitoring, the... more
We present an efficient document representation learning framework, Document Vector through Corruption (Doc2VecC). Doc2VecC represents each document as a simple average of word embeddings. It ensures a representation generated as such... more
In this paper we discuss the "Cloud Computing" architecture, cloud services, layers and types of cloud and propose a cloud infrastructure prototype for distributed university campus. Cloud Computing can be defined as providing resources... more
This tudy investigates the impact of blockchain technology on sustainable real estate supply chain management, specifically focusing on material traceability and transparency. The findings highlight the importance of considering... more
Machine learning and deep learning algorithms have the potential to revolutionize network data analytics in 5G cellular networks. With the increase in the number of connected devices and the explosion of data generated by these devices,... more
Computer vision, medical image analysis, and autonomous vehicles are just a few of the many areas that have found success using Convolutional Neural Networks (CNNs), a potent tool for picture recognition. Choosing the correct CNN... more
RFID tags (radio frequency identification devices) are in essence transceivers consisting of three components that make up a sophisticated transponder. Once activated, the tag transmits data back to a receiving antenna: the technology... more
In this paper we perform event analysis on a challenging surveillance dataset without any artificial events. We analyze low-level and high-level features such as motion vectors, change detection and pedestrian detections for recognition... more
The potential use of Automatic Speech Recognition to assist receptive communication is explored. The opportunities and challenges that this technology presents students and staff to provide captioning of speech online or in classrooms for... more
In today's era, the growing ratio of Gastrointestinal (GI) diseases in human beings has become a crucial point of notice and must be diagnosed as early as possible. There are various methods to diagnose abdomen-related problems using... more
Virtualization brings compelling features to individual computer systems and organizations allowing for the concurrent execution of multiple operating systems and applications on the same physical server. However, for all the performance... more
Analyzing binary programs without source code is critical for cybersecurity professionals. This paper presents an undergraduate binary reverse engineering course design that culminates with a comprehensive binary exploitation competition.... more
In today's era, the growing ratio of Gastrointestinal (GI) diseases in human beings has become a crucial point of notice and must be diagnosed as early as possible. There are various methods to diagnose abdomen-related problems using... more
The travelling salesman problem (TSP) is probably one of the most famous problems in combinatorial optimization. There are many techniques to solve the TSP problem such as Ant Colony Optimization (ACO), Genetic Algorithm (GA) and... more
Electricity is the nervous system in our live on earth and it is involved in many electronic devices and systems. In this paper, the end use of electricity was forecasted in the medium-term scale. The medium-term forecasting is conducted... more
The combination of forecasting and planning has increased prominence within few decades and now receives considerable attention from both academics and practitioners. Palestine municipalities are facing complex circumstances because of... more
Natural resources are limited and very important in our industrial life and development. Oil is considered the black gold and it is included in hundreds of industrial fields. In this paper, the oil production amounts produced from the... more
The travelling salesman problem (TSP) is probably one of the most famous problems in combinatorial optimization. There are many techniques to solve the TSP problem such as Ant Colony Optimization (ACO), Genetic Algorithm (GA) and... more
Prototype pollution is a critical vulnerability that affects JavaScript environments, including Node.js. This vulnerability arises from the dynamic nature of JavaScript, allowing attackers to manipulate the prototype of objects and inject... more
Modern European societies face growing terrorism threats alongside with other criminal activities and security incidents. Furthermore, the European zone experiences a migration crisis that reinforces the need for development of innovative... more
Schema matching is a basic problem in many database application domains, such as data integration. The problem of schema matching can be formulated as follows, "given two schemas, S i and S j , find the most plausible correspondences... more
Resource efficiency and quality of service (QoS) are both long-pursuit goals for cloud providers over the last decade. However, hardly any cloud platform can exactly achieve them perfectly even until today. Improving resource efficiency... more
Network intrusions may illicitly retrieve data/information, or prevent legitimate access. Reliable detection of network intrusions is an important problem, misclassification of an intrusion is an issue by the resultant overall reduction... more
In today’s technical world, the intellectual computing of a efficient human-computer interaction (HCI) or human alternative and augmentative communication (HAAC) is essential in our lives. Hand gesture recognition is one of the most... more
Network intrusions may illicitly retrieve data/information, or prevent legitimate access. Reliable detection of network intrusions is an important problem, misclassification of an intrusion is an issue by the resultant overall reduction... more
Developers of Software Defined Network (SDN) faces a lack of or difficulty in getting a physical environment to test their inventions and developments. That drives them to use a virtual environment for their experiments. This work... more
Articulation via target-oriented approaches have been commonly used in robotics. Movement of a robotic arm can involve targeting via a forward or inverse kinematics approach to reach the target. We attempted to transform the task of... more
This paper describes the architecture of a computer system conceived as an intelligent assistant for public transport management. The goal of the system is to help operators of a control center in making strategic decisions about how to... more
Mobile Access to the Web of Data is currently a real challenge in developing countries, mainly characterized by limited Internet connectivity and high penetration of mobile devices with the limited resources (such as cache and memory). In... more
The emergence of heterogeneous systems has been very notable recently. Still their programming is a complex task. The co-execution of a single OpenCL kernel on several devices is a challenging endeavour, requiring considering the... more
The extensive use of cloud computing is changing the way of dealing with information and communication technology. Cloud computing has created a new concept to deal with software services and hardware infrastructure. Some benefits are... more
In this paper, we propose to learn word embeddings based on the recent fixedsize ordinally forgetting encoding (FOFE) method, which can almost uniquely encode any variable-length sequence into a fixed-size representation. We use FOFE to... more
A secure and efficient pseudo-random number generator is crucial for the security of a stream cipher or block cipher in a cryptosystem. This paper is devoted to the design and analysis of a new robust Pseudo-Chaotic Number Generator... more
Wi-Fi and Zigbee networks are widely deployed in wireless industrial control and monitoring applications. The security protocols used in these wireless networks rely on stream cipher to encrypt data before being transmitted. These... more
This paper describes the development and the implementation of an omnidirectional multiple stereo cameras vision system. The vision system is compact and light enough to operate on board a commercially available off the shelf miniature... more
In this article, a multi-agent approach modeled by the UML (Unified Modeling Language) is used to solve the piloting problem of Quality Management System QMS. Indeed, this multi-agent modeling of QMS proposes the use a micro framework via... more
In the Software-as-a-Service model one single application instance is usually shared between different tenants to decrease operational costs. However, sharing at this level may lead to undesired influence from one tenant onto the... more
In this paper, an AR (Augmented reality) system based on a multimodal user interface is proposed and its core techniques are described. The objective of this work is to realize certain task that operators can use the virtual robot to... more
Face recognition is the broad area of researchers for exploring new techniques. The main part of the face recognition is feature extraction. Feature extraction is the form of dimensionality reduction. When the input data to an algorithm... more
Communication networks can be transformed through the implementation of computing, which can improve their overall performance, security, and energy efficiency. Nevertheless, several obstacles must be overcome before computing can be... more
One of the most important aspects of financial risk is credit risk management. Effective credit rating models are crucial for the credit institution in assessing credit applications, they have been widely studied in the field of... more
This paper presents a solution to design and implement a hardware error detection and correction circuit using associative memories. This type of memory allows search of a binary value stored, having input data a partial (or modified)... more
This is an editorial introductory to a special issue of the J. Petrol. Sci. & Eng'g.