كاميرات المراقبة بين دواعي الإستعمال
وإنتهاك
الخصوصية |
Amal Abdul Jabbar, Nadia Kaab |
A New Modified Fatha Method For Arabic
Text
Steganography |
Dr. Suhad Mal Allah, Farah R. Shareef |
A Proposed Registration Method Using
Tracking
Interest Features for Augmented Reality |
Dr. Abdul Ameer Abdullah, Dr. Yousra Hussien, Ikhlas Watan |
A Survey: Medical Augmented Reality
|
Ikhlas Watan, Dr. Abdul Ameer Abdullah, Dr. Yousra Hussine |
An Efficient Image Thresholding Method
for Arabic
Handwriting Recognition System |
Dr. Aliaa Kareem, Mustafa Salam Khadum |
An Efficient Preprocessing Framework for
Arab ic
Handwriting Recognition System |
Dr. Aliaa Kareem, Mustafa Salam Khadum |
An Enhancement Method Based on Modifying
CFB Mode for
Key Generation in AES Algorithm |
Dr. Hasanen Samir, Dr. Maha Abdul Kareem, Dalal Hmoud |
An Image Coding and Embedding Strategy
Based on
Channel Variations and DNA Sequences |
Dr. Matheel Imad Aldeen |
An Improved Method to Recognize the Iraqi
License
Plates Using Local Projections |
Nada Najeel, Dr. Loay Idwar |
|
Active Voice Detection Using Ridgelet
Transform
|
Dr. Hanaa Mohsen |
Application of FPTRNG and Logistic Map in
Cryptography |
Dr. Hanaa Mohsen |
Arabic Handwriting Text Recognition Based
on
Efficient Segmentation, DCT and HOG Features |
Dr. Aliaa Kareem, Mustafa Salam |
|
Arabic Language Document Steganography
Based On
Huffman Code Using DRLR As (RNG) |
Dr. Hanaa Mohsen, Maisaa Abid Ali |
|
Arabic Language Text Steganography Besed
on Microsoft
Word documents |
Dr. Hanaa Mohsen, Maisaa Abid Ali |
|
Arabic Language Text Steganography Based
on Singular
Value Decomposition (SVD) |
Dr. Hanaa Mohsen, Maisaa Abid Ali |
Authentication of Digital Video
Encryption |
Asmaa Hasan, Dr. Shaimaa Hameed |
|
Centerline Extraction: A Review |
Zahraa Naji, Dr. Yousra Hussien |
Collision Avoidance Using Cat Swarm
Algorithm for
Multi Mobile Robot Path Planning in Dynamic Environment |
Dr. Aliaa Kareem, Themar Ali |
Color Image Denoising Using 3D Wavelet
Transform
|
Dr. Matheel Imad Aldeen, Rabab Farhan |
Color Image Encryption Depend on DNA
Computing
|
Dr. Matheel Imad Aldeen, Zena Mohammed |
Comparison of Eight Proposed Security
Methods using
Linguistic Steganography Text |
Dr. Hanaa Mohsen, Maisaa Abid Ali |
Copyright Protection Service for Mobile
Images
|
Dr. Israa Abdul Ameer, Dr. Suhad Mal Allah |
Classification of Gender Face Image Based
on Slantlet
Transform |
Dr. Nidaa Flieh, Reem Majeed |
Design of an Efficient Face Recognition
Algorithm
based on Hybrid Method of Eigen Faces and Gabor Filter |
Dr. Matheel Imad Aldeen, Fatima Bahjat |
Design Recommendation System in
E-Commerce Site
|
Dr. Ayad Rodhan, Shaimaa Ashor |
Design Secured Smart Door Lock Based on
Jaro Winkler
Algorithm |
Sura Mahmoud |
Embedding a Digitized Watermark Upon
Colored Image
Using Wavelet Transform with Comparative Technique |
Dr. Matheel Imad Aldeen |
Encrypted Image Watermark in Audio Files
Using
Homogenous Deffie-Hellman with Chebyshev Polynomial |
Dr. Hala Bahjat, Dr. Abdul Mohsen Jaber, Sana Ahmed |
Enhance Inverted Index Using in
Information
Retrieval |
Dr. Aliaa Kareem, Duaa Netaisha |
Face Image Enhancement using Wavelet
Denoising and
Gabor Filters |
Dr. Israa Abdul Ameer |
Face Retrieval Using Image Moments and
Genetic
Algorithm |
Wathiq Najah, Dr. Yousra Hussien |
Fast and Accurate Registration Method for
MRI
images |
Ikhlas Watan, Dr. Yousra Hussien, Dr. Abdul Ameer Abdullah |
Genetic –Based Face Retrieval Using
Statistical
Features |
Dr. Yousra Hussien, Watheq Najah |
Hiding and Encryption of Secret Image
Using Secret
Sharing Scheme |
Dr. Yousra Hussien, Hussien Juiez/td> |
Hybrid Algorithm to Protect Computer
Networks Based
on Human Biometrics and Computer Attributes |
Dr. Rahim Abdul Sahib |
Images Encryption Using Chaos and Random
Generation |
Dr. Yousra Hussien, Zahraa Abdul Hameed |
Images Encryption Using Symmetric
Encryption
Alogorithm Based on Random Keye Generator |
Asmaa Hasan Mohsen, Dr. Shaimaa Hameed |
Image Seam Carving Based on Content Aware
Resizing by
Gradient Method |
Dr. Matheel Imad Aldeen, Rana Mohammed |
Implement Interactive E-Learning System
Based on
Cloud Computing |
Dr. Rahim Abul Sahib |
Improvement Majority Function in A5/1
stream cipher
Algorithm |
Dr. Hala Bahjat, Muhanned Ali |
Improving Compression Ratio For Encrypted
Secret
Message in AES Encryption by Using GZIP Compression |
Dr. Suhad Mal Allah, Farah R. Shareef |
Improving Hiding Security of Arabic Text
Steganography by Hybrid AES Cryptography and Text Steganography |
Dr. Suhad Mal Allah, Farah R. Shareef |
Improving Security of ID Card and
Passport Using
Cubic Spline Curve |
Dr. Abdul Mohsen Jaber, Dr. Ayad Rodhan, Dhiaa Abid |
Medical Texture Recognition Based on
Intelligent
Technique |
Dr. Hasanen Samir, Hajir Mazin |
Message Authentication Using New Hash
Function
|
Dr. Hasanen Samir, Dr. Maha Humoud, Dalal N. Humoud |
Object Tracking using Proposed Framework
of
KalmanGuided Harmony Search Filter |
Dr. Hasanen Samir, Dr. Maha Abdul Kareem, Dala Hmoud |
Proposal New Cache Coherence Protocol to
Optimize CPU
Time through Simulation Caches |
Dr. Luma Faik, Dr. Maha Abdul Kareem, Abeer Dhiaa |
Proposed Arabic Text Steganography Method
Based on
New Coding Technique |
Dr. Suhad Mal Allah, Dhurgam Wameedh |
Propessed Business Intelligence System
through Big
Data |
Dr. Hasanen Samir, Saif Bashar |
Proposed Hyperchaotic System for Image
Encryption
|
Dr. Aliaa Kareem |
Proposed IF_THEN Grammar to Translate
English
Language Sentence to American Sign Language Sentence |
Asmaa Hamandi, Dr. Aliaa Kareem, Dr. Hala Bahjat |
Proposed Image Similarity Metric with
Multi Block
Histogram used in Video Tracking |
Dr. Aliaa Kareem, Dr. Hasanen Samir, Ikbas Iz Aldeen |
Proposed Method to Encrypt Images to
Mobile Device
Based on the Principles of Shannon |
Dr. Hanaa Mohsen, Anwar Abbas |
Recognition a Hand Drawn Chemical Structure Diagrams
Using the Discrete B-Spline Wavelet Transform |
د. مثيل عماد الدين |
SAR Images Watermarking Based on
Multiwavelet and
Curvelet Transforms |
Dr. Matheel Imad Aldeen, Rabab Farhan |
Segmentation Brain Tumor and Diagnosing
Using
Watershed Algorithm |
Dr. Matheel Imad Aldeen, Hind Hameed |
Sense-Based Information Retrieval Using
Artificial
Bee Colony Approach |
Dr. Aliaa Kareem, Mustafa Jasim |
Simple Detection Model to Suspicious
Viber
Messages |
Dr. Hanaa Mohsen, Noor Basim |
Speech Encryption Based on Wavelet
Transformation and
Chaotic Map |
Dr. Hala Bahjat, Sundus Mahdi |
|
Steganography Arabic Text Based on
Natural Language
Process Documents |
Dr. Hanaa Mohsen, Maisaa Abid Ali |
|
Steganography Based on Arabic Language
Texts by
Kashida Using STRI As RNG |
Dr. Hanaa Mohsen, Maisaa Abid Ali |
|
Steganography Techniques for Arabic
Language Texts
Utilizing Single-Double Quotation Using RNG |
Dr. Hanaa Mohsen, Maisaa Abid Ali |
|
Stream Cipher with Space-Time Block
Code |
Dr. Hanaa Mohsen, Anwar Abbas |
|
Text Steganography Method Based On
Modified Run
Length Encoding |
Dr. Suhad Mal Allah |
The Design of Efficient Algorithm for
Face
Recognition Based on Hybrid PCA-Wavelet Transform |
Dr. Matheel Imad Aldeen, Fatima Bahjat |
Utilization of Edge Information in
Handwritten
Numerals Recognition |
Lect. Asst. Nada Najeel |
Variant length, Self-extracted audio
watermark for
verification using LWT and random selections |
Dr. Hala Bahjat, Dr. Abdul Mohsen Jaber, Sana Ahmed |
Video Inpainting Using Seam Carving
Method |
Dr. Matheel Imad Aldeen, Rana Mohammed |