A new Sort Algorithm for Multi Core parallel
Computers
|
Prof. Dr. Abdul Monem S. Rahma, Assist. Prof. Dr.Maisa'a Abid Ali K |
A Proposed Lossy Image Compression based on Multiplication Table
|
د. نداء فليح، محمد صالح |
Age Estimation Using Support Vector Machine
|
Ayad R. Abbas, Asaad R. Kareem |
Analysis of AES Algorithm Effects on the Diffusion
Property
|
د. حسنين سمير، د. مها عبد الكريم، دلال حمود |
Anti-phishing Based on Visual Cryptography and 4D hyperchaotic
System
|
د. هالة بهجت، ذكرى محمد |
Arabic (Indian) Handwritten Digits Recognition
Using Multi feature and KNN Classifier |
Alia Karim Abdul Hassan |
Application to Identify the True Sender in Instant Messaging |
Hanaa Mohsin Ahmed, Shahad Fadhil |
Classification Techniques of High Resolution Aerial Images: A Survey
of Commonly A.I Techniques
|
علي صبار، د. نداء فليح |
Cuneiform symbols recognition by support vector machine SVM
|
علي عادل، د. عبد المنعم صالح، د. عبد المحسن جابر |
Design and Implementation of authentication model for the Iraqi AMS
Web-based Management System |
Ahmed Qassim Hadi, Shaimaa Hameed Shaker |
Design of keystream Generator utilizing Firefly Algorithm |
محمد صالح، د. نداء فليح |
Distributed AMELSB Replacement Method For Text Hiding |
Dr. Yossra H. Ali, Ahmed Y. Yousif, Tayseer S. Atia |
Disruption Recovery within Agent Organisations in Distributed
Systems |
Asia Al-karkhi, Maria Fasli |
E-commerce Application Based on Visual Cryptography and Chen’s
Hyperchaotic
|
د. هالة بهجت، ذكرى محمد |
Effect of Successive Convolution Layers to Detect Gender
|
د. هناء محسن، هالة حسن |
Enhancement of Principal Component Analysis using Gaussian Blur
Filter
|
Yossra Hussein Ali, Reem Akil Medhat |
Foreground Object Detection Based on Chrominance and Texture Features
with Enhancement by Canny Filter
|
منى غازي عبد الصاحب |
Forgery Detection Based Image Processing Techniques
|
Shaimaa H. Shaker, Nour Zwyer |
Heartbeat Amplification and ECG Drawing from Video
(Black and White or Colored Videos)
|
Ahmed A. Shkara, Yossra Hussain |
Human Skin Colour Detection Using Bayesian Rough
Decision Tree
|
Ayad R. Abbas, Ayat O. Farooq |
Hybrid techniques to improve face recognition based on features
extraction methods and Haar discrete wavelet transformation
|
د. إسراء عبد الأمير، زينب علي |
Identification based Dental Image |
Shaimaa Hameed Shaker, Hajer Najah |
Image Retrieval from Video Streams Databases using Similarity of
Clustering Histogram |
د. عبد الأمير عبد الله، إخلاص فالح |
Implementation of Mouse Cursor Movement and Clicks Control By Pupil
|
علي راشد، د. شيماء حميد
|
Intelligent Age Estimation From Facial Images Using Machine Learning
Techniques
|
Ayad R. Abbas, Asaad R. Kareem
|
Meerkat Clan Algorithm: A New Swarm Intelligence Algorithm
|
د. أحمد طارق، د. حسنين سمير، زيد أحمد |
Methods of Secure Routing Protocol in Wireless Sensor Networks
|
Waleed Kh. Alzubaidi, Shaimaa H. Shaker |
Optimized Performance of Consensus algorithm in Multi Agent System
Using PSO
|
سفانة مظهر، أحمد مظهر، طيبة ولاء الدين، كرار غالب |
Optimizing the Management of Knowledge Assets using Swarm
Intelligence
|
Yuhanis Yusof, Fauziah Baharom, Athraa Jasim Mohamed |
Paper Currency Detection based Image Processing Techniques: A review
paper
|
Shaimaa H. Shaker, Mohammed Gheni Alawan |
Performance Enhancement of Image Encryption By Using BK-Cube Network
Design
|
Ashwaq T. Hashim, Yossra H. Ali |
Pose Invariant Palm Vein Identification System using Convolutional
Neural Network
|
د. نداء فليح، حسام عماد |
Propose retina identification system based on the combination of SURF
detector and BRISK descriptor
|
د. مثيل عماد الدين، زينب فتوحي |
Proposed an efficient blind digital 3D model
watermarking algorithm using geometrical properties
|
زينب القدسي، د. شيماء حميد، د. نزهت سعيد |
Proposed Approach to Detect Phishing Webpage Based on Multi-Browsers
|
د. هالة بهجت، ذكرى محمد |
Proposed KDBSCAN Algorithm for Clustering
|
Yossra Hussein, Safa Abdel Jalil |
Proposed Method of Air Traffic Routing in Dynamic Environment Usiing
Modifed rrt With Collision Avoid Nace
|
Alia Karim Abdul Hassan , Sheelan Waad Adwaan |
Proposed Secret Encoding Method Based Genetic Algorithm for Elliptic
Curve Cryptography Method
|
Dr.Ekhlas Khalaf Gbashi |
Proposing an Analysis System to Monitoring Weightlifting Based on
Training (Snatch and Clean and Jerk)
|
د. عبد المنعم صالح، ميساء عبد علي |
Pupil Detection Algorithm Based on Feature Extraction for Eye Gaze
|
د. هناء محسن، سلامة حميدي |
Quality of Experience Metric of Streaming Video: A survey
|
Rana Fareed Ghani, Amal Sufiuh Ajrash |
Real Time Face Recognition System based Hybrid Method
|
فاطمة إبراهيم، د. مثيل عماد الدين |
Recovering Old Document Image by Using Hybrid Binrazation Tecgnique
|
رنا محمد، طيبة ولاء الدين |
Reflections Removal Using K-Means Clustering
|
Yossra H. Ali, Maisa' S. Mohsen |
Remove Reflection Using Wavelet transformation Estimation
|
Yossra H. Ali, Maisa' S. Mohsen |
Review on Image Steganalysis Using INRIA Dataset
|
د. هناء محسن، هالة محمود |
Robust Audio Watermarking based on Hybrid Transformation for Copyright
Protection
|
د. مثيل عماد الدين، أمير بدر |
Search Result Enhancement For Arabic Datasets Using Modified Chicken
Swarm
|
د. علياء كريم، زينب عبد الأمير |
Secure Routing Scheme for Clustered Wireless Sensor Network (WSN)
|
وليد الزبيدي، د. شيماء حميد |
Security Systems Based On Eye Movement Tracking Methods
|
د. شيماء حميد، د. إقباس عز الدين، إسراء أحمد |
Semantic Based Video Retrieval System: Survey
|
د. مثيل عماد الدين، إيمان حاتو |
Solving Flexible Job Shop Scheduling Problem Using Meerkat Clan
Algorithm
|
د. أحمد طارق، د. حسنين سمير، زيد أحمد |
Spam Classification Using Genetic Algorithm
|
Rand Ahmad Atta, Dr. Soukaena H. hashem, Dr. Ekhlas Khalaf Gbashi |
Spam Classification Using MOEA/D
|
Rand Ahmad Atta, Dr. Soukaena H. hashem, Dr. Ekhlas Khalaf Gbashi |
Steganography Arabic Text Based on Natural Language Process
Documents
|
د. هناء محسن، ميساء عبد علي |
Three-dimensional Face Reconstruction using 3D Morphable Model Fitting
Method
|
Shaimaa H. Shaker, Najlaa Abd Hamza |
Using Chaotic Maps to Enhance RSA Public Key Cryptography
|
Ahmed T. Sadiq, E.M.E.Mostafa ,Yasser F. Mahmoud Ahmed B. Majeed |