كاميرات المراقبة بين دواعي الإستعمال وإنتهاك الخصوصية |
Amal Abdul Jabbar, Nadia Kaab |
A New Modified Fatha Method For Arabic Text Steganography |
Dr. Suhad Mal Allah, Farah R. Shareef |
A Proposed Registration Method Using Tracking Interest Features for
Augmented Reality |
Dr. Abdul Ameer Abdullah, Dr. Yousra Hussien, Ikhlas Watan |
A Survey: Medical Augmented Reality |
Ikhlas Watan, Dr. Abdul Ameer Abdullah, Dr. Yousra Hussine |
An Efficient Image Thresholding Method for Arabic Handwriting
Recognition System |
Dr. Aliaa Kareem, Mustafa Salam Khadum |
An Efficient Preprocessing Framework for Arab ic Handwriting
Recognition System |
Dr. Aliaa Kareem, Mustafa Salam Khadum |
An Enhancement Method Based on Modifying CFB Mode for Key Generation
in AES Algorithm |
Dr. Hasanen Samir, Dr. Maha Abdul Kareem, Dalal Hmoud |
An Image Coding and Embedding Strategy Based on Channel Variations and
DNA Sequences |
Dr. Matheel Imad Aldeen |
An Improved Method to Recognize the Iraqi License Plates Using Local
Projections |
Nada Najeel, Dr. Loay Idwar |
|
Active Voice Detection Using Ridgelet Transform |
Dr. Hanaa Mohsen |
Application of FPTRNG and Logistic Map in Cryptography |
Dr. Hanaa Mohsen |
Arabic Handwriting Text Recognition Based on Efficient Segmentation,
DCT and HOG Features |
Dr. Aliaa Kareem, Mustafa Salam |
|
Arabic Language Document Steganography Based On Huffman Code Using
DRLR As (RNG) |
Dr. Hanaa Mohsen, Maisaa Abid Ali |
|
Arabic Language Text Steganography Besed on Microsoft Word
documents |
Dr. Hanaa Mohsen, Maisaa Abid Ali |
|
Arabic Language Text Steganography Based on Singular Value
Decomposition (SVD) |
Dr. Hanaa Mohsen, Maisaa Abid Ali |
Authentication of Digital Video Encryption |
Asmaa Hasan, Dr. Shaimaa Hameed |
|
Centerline Extraction: A Review |
Zahraa Naji, Dr. Yousra Hussien |
Collision Avoidance Using Cat Swarm Algorithm for Multi Mobile Robot
Path Planning in Dynamic Environment |
Dr. Aliaa Kareem, Themar Ali |
Color Image Denoising Using 3D Wavelet Transform |
Dr. Matheel Imad Aldeen, Rabab Farhan |
Color Image Encryption Depend on DNA Computing |
Dr. Matheel Imad Aldeen, Zena Mohammed |
Comparison of Eight Proposed Security Methods using Linguistic
Steganography Text |
Dr. Hanaa Mohsen, Maisaa Abid Ali |
Copyright Protection Service for Mobile Images |
Dr. Israa Abdul Ameer, Dr. Suhad Mal Allah |
Classification of Gender Face Image Based on Slantlet Transform
|
Dr. Nidaa Flieh, Reem Majeed |
Design of an Efficient Face Recognition Algorithm based on Hybrid
Method of Eigen Faces and Gabor Filter |
Dr. Matheel Imad Aldeen, Fatima Bahjat |
Design Recommendation System in E-Commerce Site |
Dr. Ayad Rodhan, Shaimaa Ashor |
Design Secured Smart Door Lock Based on Jaro Winkler Algorithm |
Sura Mahmoud |
Embedding a Digitized Watermark Upon Colored Image Using Wavelet
Transform with Comparative Technique |
Dr. Matheel Imad Aldeen |
Encrypted Image Watermark in Audio Files Using Homogenous
Deffie-Hellman with Chebyshev Polynomial |
Dr. Hala Bahjat, Dr. Abdul Mohsen Jaber, Sana Ahmed |
Enhance Inverted Index Using in Information Retrieval |
Dr. Aliaa Kareem, Duaa Netaisha |
Face Image Enhancement using Wavelet Denoising and Gabor Filters
|
Dr. Israa Abdul Ameer |
Face Retrieval Using Image Moments and Genetic Algorithm |
Wathiq Najah, Dr. Yousra Hussien |
Fast and Accurate Registration Method for MRI images |
Ikhlas Watan, Dr. Yousra Hussien, Dr. Abdul Ameer Abdullah |
Genetic –Based Face Retrieval Using Statistical Features |
Dr. Yousra Hussien, Watheq Najah |
Hiding and Encryption of Secret Image Using Secret Sharing Scheme
|
Dr. Yousra Hussien, Hussien Juiez/td>
|
Hybrid Algorithm to Protect Computer Networks Based on Human
Biometrics and Computer Attributes |
Dr. Rahim Abdul Sahib |
Images Encryption Using Chaos and Random Generation |
Dr. Yousra Hussien, Zahraa Abdul Hameed |
Images Encryption Using Symmetric Encryption Alogorithm Based on
Random Keye Generator |
Asmaa Hasan Mohsen, Dr. Shaimaa Hameed |
Image Seam Carving Based on Content Aware Resizing by Gradient
Method |
Dr. Matheel Imad Aldeen, Rana Mohammed |
Implement Interactive E-Learning System Based on Cloud Computing
|
Dr. Rahim Abul Sahib |
Improvement Majority Function in A5/1 stream cipher Algorithm |
Dr. Hala Bahjat, Muhanned Ali |
Improving Compression Ratio For Encrypted Secret Message in AES
Encryption by Using GZIP Compression |
Dr. Suhad Mal Allah, Farah R. Shareef |
Improving Hiding Security of Arabic Text Steganography by Hybrid AES
Cryptography and Text Steganography |
Dr. Suhad Mal Allah, Farah R. Shareef |
Improving Security of ID Card and Passport Using Cubic Spline Curve
|
Dr. Abdul Mohsen Jaber, Dr. Ayad Rodhan, Dhiaa Abid |
Medical Texture Recognition Based on Intelligent Technique |
Dr. Hasanen Samir, Hajir Mazin |
Message Authentication Using New Hash Function |
Dr. Hasanen Samir, Dr. Maha Humoud, Dalal N. Humoud |
Object Tracking using Proposed Framework of KalmanGuided Harmony
Search Filter |
Dr. Hasanen Samir, Dr. Maha Abdul Kareem, Dala Hmoud |
Proposal New Cache Coherence Protocol to Optimize CPU Time through
Simulation Caches |
Dr. Luma Faik, Dr. Maha Abdul Kareem, Abeer Dhiaa |
Proposed Arabic Text Steganography Method Based on New Coding
Technique |
Dr. Suhad Mal Allah, Dhurgam Wameedh |
Propessed Business Intelligence System through Big Data |
Dr. Hasanen Samir, Saif Bashar |
Proposed Hyperchaotic System for Image Encryption |
Dr. Aliaa Kareem |
Proposed IF_THEN Grammar to Translate English Language Sentence to
American Sign Language Sentence |
Asmaa Hamandi, Dr. Aliaa Kareem, Dr. Hala Bahjat |
Proposed Image Similarity Metric with Multi Block Histogram used in
Video Tracking |
Dr. Aliaa Kareem, Dr. Hasanen Samir, Ikbas Iz Aldeen |
Proposed Method to Encrypt Images to Mobile Device Based on the
Principles of Shannon |
Dr. Hanaa Mohsen, Anwar Abbas |
Recognition a Hand Drawn
Chemical Structure Diagrams Using the Discrete B-Spline Wavelet Transform
|
د. مثيل عماد الدين |
SAR Images Watermarking Based on Multiwavelet and Curvelet
Transforms |
Dr. Matheel Imad Aldeen, Rabab Farhan |
Segmentation Brain Tumor and Diagnosing Using Watershed Algorithm
|
Dr. Matheel Imad Aldeen, Hind Hameed |
Sense-Based Information Retrieval Using Artificial Bee Colony
Approach |
Dr. Aliaa Kareem, Mustafa Jasim |
Simple Detection Model to Suspicious Viber Messages |
Dr. Hanaa Mohsen, Noor Basim |
Speech Encryption Based on Wavelet Transformation and Chaotic Map
|
Dr. Hala Bahjat, Sundus Mahdi |
|
Steganography Arabic Text Based on Natural Language Process
Documents |
Dr. Hanaa Mohsen, Maisaa Abid Ali |
|
Steganography Based on Arabic Language Texts by Kashida Using STRI As
RNG |
Dr. Hanaa Mohsen, Maisaa Abid Ali |
|
Steganography Techniques for Arabic Language Texts Utilizing
Single-Double Quotation Using RNG |
Dr. Hanaa Mohsen, Maisaa Abid Ali |
|
Stream Cipher with Space-Time Block Code |
Dr. Hanaa Mohsen, Anwar Abbas |
|
Text Steganography Method Based On Modified Run Length Encoding
|
Dr. Suhad Mal Allah |
The Design of Efficient Algorithm for Face Recognition Based on Hybrid
PCA-Wavelet Transform |
Dr. Matheel Imad Aldeen, Fatima Bahjat |
Utilization of Edge Information in Handwritten Numerals Recognition
|
Lect. Asst. Nada Najeel |
Variant length, Self-extracted audio watermark for verification using
LWT and random selections |
Dr. Hala Bahjat, Dr. Abdul Mohsen Jaber, Sana Ahmed |
Video Inpainting Using Seam Carving Method |
Dr. Matheel Imad Aldeen, Rana Mohammed |