Volume 7 (2020)
Volume 6 (2019)
Volume 5 (2018)
Volume 4 (2017)
Volume 3 (2016)
Volume 2 (2015)
Volume 1 (2014)
1. Some Primitives Based on Jumping LFSRs with Determined Period
Volume 2, Issue 3 , Summer and Autumn 2015, Pages 175-184
Abstract
Linear feedback shift registers (LFSRs) are used in manystream ciphers because of their maximal period and good statistical prop-erties. Due to the linearity of the LFSR, its output ... Read More2. Improved Secure and Privacy Preserving Keyword Searching Cryptography
Volume 2, Issue 3 , Summer and Autumn 2015, Pages 185-194
Abstract
Using storage systems outside a company may endanger data security. This leads users to mostly encrypt their information for risk mitigation. Although encryption improves confidentiality, ... Read More3. Adaptive Interval Type-2 Fuzzy Inference System for Facial Expression Recognition
Volume 2, Issue 3 , Summer and Autumn 2015, Pages 125-207
Abstract
Fuzzy Inference systems have been successfully applied for different pattern recognition problems. However, in some real-world applications such as facial expression recognition, the ... Read More4. Toward automatic Transformation of Service Choreography into UML State Machine
Volume 2, Issue 3 , Summer and Autumn 2015, Pages 209-222
Abstract
An adaptive process consists of dynamic elements, and management rules which govern their run-time behaviors. The WS-CDL describes collaborative business processes between service consumers ... Read More5. A New Scheme for Storage and Retrieval of Shared Text Files
Volume 2, Issue 3 , Summer and Autumn 2015, Pages 223-231
Abstract
Recently, there has been an increasing need for storage spaces in the cloud centers. Efficient techniques for storing files can slow down this trend. In this paper, we investigate the ... Read More6. New Functions for Mass Calculation in Gravitational Search Algorithm
Volume 2, Issue 3 , Summer and Autumn 2015, Pages 233-246