A
new Sort Algorithm for Multi Core parallel Computers |
Prof. Dr. Abdul Monem S. Rahma, Assist. Prof. Dr.Maisa'a Abid Ali K |
A
Proposed Lossy Image Compression based on Multiplication Table |
د. نداء فليح، محمد صالح |
Age
Estimation Using Support Vector Machine |
Ayad R. Abbas, Asaad R. Kareem |
Analysis of AES Algorithm Effects on the Diffusion Property |
د. حسنين سمير، د. مها عبد الكريم، دلال حمود |
Anti-phishing Based on Visual Cryptography and 4D hyperchaotic System |
د. هالة بهجت، ذكرى محمد |
Arabic (Indian) Handwritten Digits Recognition Using Multi feature and KNN
Classifier
|
Alia Karim Abdul Hassan |
Application to Identify the True Sender in Instant Messaging |
Hanaa Mohsin Ahmed, Shahad Fadhil |
Classification Techniques of High Resolution Aerial Images: A Survey of Commonly
A.I
Techniques |
علي صبار، د. نداء فليح |
Cuneiform symbols recognition by support vector machine SVM |
علي عادل، د. عبد المنعم صالح، د. عبد المحسن جابر |
Design and Implementation of authentication model for the Iraqi AMS Web-based
Management
System |
Ahmed Qassim Hadi, Shaimaa Hameed Shaker |
Design of keystream Generator utilizing Firefly Algorithm |
محمد صالح، د. نداء فليح |
Distributed AMELSB Replacement Method For Text Hiding |
Dr. Yossra H. Ali, Ahmed Y. Yousif, Tayseer S. Atia |
Disruption Recovery within Agent Organisations in Distributed Systems |
Asia Al-karkhi, Maria Fasli |
E-commerce Application Based on Visual Cryptography and Chen’s Hyperchaotic
|
د. هالة بهجت، ذكرى محمد |
Effect of Successive Convolution Layers to Detect Gender |
د. هناء محسن، هالة حسن |
Enhancement of Principal Component Analysis using Gaussian Blur Filter |
Yossra Hussein Ali, Reem Akil Medhat |
Foreground Object Detection Based on Chrominance and Texture Features with
Enhancement by
Canny Filter |
منى غازي عبد الصاحب |
Forgery Detection Based Image Processing Techniques |
Shaimaa H. Shaker, Nour Zwyer |
Heartbeat Amplification and ECG Drawing from Video (Black and White or Colored
Videos)
|
Ahmed A. Shkara, Yossra Hussain |
Human Skin Colour Detection Using Bayesian Rough Decision Tree |
Ayad R. Abbas, Ayat O. Farooq |
Hybrid techniques to improve face recognition based on features extraction
methods and Haar
discrete wavelet transformation |
د. إسراء عبد الأمير، زينب علي |
Identification based Dental Image |
Shaimaa Hameed Shaker, Hajer Najah |
Image Retrieval from Video Streams Databases using Similarity of Clustering
Histogram
|
د. عبد الأمير عبد الله، إخلاص فالح |
Implementation of Mouse Cursor Movement and Clicks Control By Pupil |
علي راشد، د. شيماء حميد |
Intelligent Age Estimation From Facial Images Using Machine Learning Techniques
|
Ayad R. Abbas, Asaad R. Kareem |
Meerkat Clan Algorithm: A New Swarm Intelligence Algorithm |
د. أحمد طارق، د. حسنين سمير، زيد أحمد |
Methods of Secure Routing Protocol in Wireless Sensor Networks |
Waleed Kh. Alzubaidi, Shaimaa H. Shaker |
Optimized Performance of Consensus algorithm in Multi Agent System Using PSO
|
سفانة مظهر، أحمد مظهر، طيبة ولاء الدين، كرار غالب |
Optimizing the Management of Knowledge Assets using Swarm Intelligence |
Yuhanis Yusof, Fauziah Baharom, Athraa Jasim Mohamed |
Paper Currency Detection based Image Processing Techniques: A review paper
|
Shaimaa H. Shaker, Mohammed Gheni Alawan |
Performance Enhancement of Image Encryption By Using BK-Cube Network Design
|
Ashwaq T. Hashim, Yossra H. Ali |
Pose Invariant Palm Vein Identification System using Convolutional Neural
Network
|
د. نداء فليح، حسام عماد |
Propose retina identification system based on the combination of SURF detector
and BRISK descriptor
|
د. مثيل عماد الدين، زينب فتوحي |
Proposed an efficient blind digital 3D model watermarking algorithm using
geometrical properties
|
زينب القدسي، د. شيماء حميد، د. نزهت سعيد |
Proposed Approach to Detect Phishing Webpage Based on Multi-Browsers |
د. هالة بهجت، ذكرى محمد |
Proposed KDBSCAN Algorithm for Clustering |
Yossra Hussein, Safa Abdel Jalil |
Proposed Method of Air Traffic Routing in Dynamic Environment Usiing Modifed rrt
With
Collision Avoid Nace |
Alia Karim Abdul Hassan , Sheelan Waad Adwaan |
Proposed Secret Encoding Method Based Genetic Algorithm for Elliptic Curve
Cryptography Method
|
Dr.Ekhlas Khalaf Gbashi |
Proposing an Analysis System to Monitoring Weightlifting Based on Training
(Snatch and Clean
and Jerk) |
د. عبد المنعم صالح، ميساء عبد علي |
Pupil Detection Algorithm Based on Feature Extraction for Eye Gaze |
د. هناء محسن، سلامة حميدي |
Quality of Experience Metric of Streaming Video: A survey |
Rana Fareed Ghani, Amal Sufiuh Ajrash |
Real Time Face Recognition System based Hybrid Method |
فاطمة إبراهيم، د. مثيل عماد الدين |
Recovering Old Document Image by Using Hybrid Binrazation Tecgnique |
رنا محمد، طيبة ولاء الدين |
Reflections Removal Using K-Means Clustering |
Yossra H. Ali, Maisa' S. Mohsen |
Remove Reflection Using Wavelet transformation Estimation |
Yossra H. Ali, Maisa' S. Mohsen |
Review on Image Steganalysis Using INRIA Dataset |
د. هناء محسن، هالة محمود |
Robust Audio Watermarking based on Hybrid Transformation for Copyright
Protection |
د. مثيل عماد الدين، أمير بدر |
Search Result Enhancement For Arabic Datasets Using Modified Chicken Swarm
|
د. علياء كريم، زينب عبد الأمير |
Secure Routing Scheme for Clustered Wireless Sensor Network (WSN) |
وليد الزبيدي، د. شيماء حميد |
Security Systems Based On Eye Movement Tracking Methods |
د. شيماء حميد، د. إقباس عز الدين، إسراء أحمد |
Semantic Based Video Retrieval System: Survey |
د. مثيل عماد الدين، إيمان حاتو |
Solving Flexible Job Shop Scheduling Problem Using Meerkat Clan Algorithm
|
د. أحمد طارق، د. حسنين سمير، زيد أحمد |
Spam Classification Using Genetic Algorithm |
Rand Ahmad Atta, Dr. Soukaena H. hashem, Dr. Ekhlas Khalaf Gbashi |
Spam Classification Using MOEA/D |
Rand Ahmad Atta, Dr. Soukaena H. hashem, Dr. Ekhlas Khalaf Gbashi |
Steganography Arabic Text Based on Natural Language Process Documents |
د. هناء محسن، ميساء عبد علي |
Three-dimensional Face Reconstruction using 3D Morphable Model Fitting Method
|
Shaimaa H. Shaker, Najlaa Abd Hamza |
Using Chaotic Maps to Enhance RSA Public Key Cryptography |
Ahmed T. Sadiq, E.M.E.Mostafa ,Yasser F. Mahmoud Ahmed B. Majeed |