اسم التدريسي الرباعي مع اللقب العلمي |
اسم التدريسي باللغة الإنجليزية كما في البحوث |
link |
Document title |
Journal name |
Year |
ا.د.براء علي عطية |
Bara’a A. Attea |
Community detection model for dynamic networks based on hidden Markov model and evolutionary algorithm |
Community detection model for dynamic networks based on hidden Markov model and evolutionary algorithm |
Artificial Intelligence Review |
2023 |
A Tri-Gene Ontology Migration Operator for Improving the Performance of Meta-heuristics in Complex Detection Problems |
A Tri-Gene Ontology Migration Operator for Improving the Performance of Meta-heuristics in Complex Detection Problems |
Iraqi Journal of Science |
2023 |
The effects of conductance on metastable switches in memristive devices based on anti-hebbian and hebbian (ahah) learning rules |
The effects of conductance on metastable switches in memristive devices based on anti-hebbian and hebbian (ahah) learning rules |
Iraqi Journal of Science |
2021 |
A decision tree-aware genetic algorithm for botnet detection |
A decision tree-aware genetic algorithm for botnet detection |
Iraqi Journal of Science |
2021 |
An Evolutionary Algorithm for Task scheduling Problem in the Cloud-Fog environment |
An Evolutionary Algorithm for Task scheduling Problem in the Cloud-Fog environment |
Journal of Physics: Conference Series |
2021 |
The influence of NMI against modularity in community detection problem: A case study for unsigned and signed networks |
The influence of NMI against modularity in community detection problem: A case study for unsigned and signed networks |
Iraqi Journal of Science |
2021 |
A review of heuristics and metaheuristics for community detection in complex networks: Current usage, emerging development and future directions |
A review of heuristics and metaheuristics for community detection in complex networks: Current usage, emerging development and future directions |
Swarm and Evolutionary Computation |
2021 |
A genetic algorithm for task allocation problem in the internet of things |
A genetic algorithm for task allocation problem in the internet of things |
Iraqi Journal of Science |
2021 |
Evolutionary multi-objective set cover problem for task allocation in the Internet of Things |
Evolutionary multi-objective set cover problem for task allocation in the Internet of Things |
Applied Soft Computing |
2021 |
Pearson coefficient matrix for studying the correlation of community detection scores in multi-objective evolutionary algorithm |
Pearson coefficient matrix for studying the correlation of community detection scores in multi-objective evolutionary algorithm |
Periodicals of Engineering and Natural Sciences |
2021 |
Quantum Inspired Multiobjective Optimization in Clustered Homogeneous Wireless Sensor Networks for Improving Network Lifetime and Coverage |
Quantum Inspired Multiobjective Optimization in Clustered Homogeneous Wireless Sensor Networks for Improving Network Lifetime and Coverage |
Lecture Notes in Electrical Engineering |
2021 |
An Enhanced Multi-Objective Evolutionary Algorithm with Decomposition for Signed Community Detection Problem |
An Enhanced Multi-Objective Evolutionary Algorithm with Decomposition for Signed Community Detection Problem |
Proceedings – 2020 2nd Annual International Conference on Information and Sciences, AiCIS 2020 |
2020 |
Luminance pyramid for image generation and colorization |
Luminance pyramid for image generation and colorization |
Periodicals of Engineering and Natural Sciences |
2020 |
A new evolutionary multi-objective community mining algorithm for signed networks |
A new evolutionary multi-objective community mining algorithm for signed networks |
Applied Soft Computing Journal |
2019 |
Bio-inspired multi-objective algorithms for connected set K-covers problem in wireless sensor networks |
Bio-inspired multi-objective algorithms for connected set K-covers problem in wireless sensor networks |
Soft Computing |
2019 |
A New Task Allocation Protocol for Extending Stability and Operational Periods in Internet of Things |
A New Task Allocation Protocol for Extending Stability and Operational Periods in Internet of Things |
IEEE Internet of Things Journal |
2019 |
Heuristic modularity for complex identification in protein-protein interaction networks |
Heuristic modularity for complex identification in protein-protein interaction networks |
Iraqi Journal of Science |
2019 |
A new evolutionary algorithm with locally assisted heuristic for complex detection in protein interaction networks |
A new evolutionary algorithm with locally assisted heuristic for complex detection in protein interaction networks |
Applied Soft Computing Journal |
2018 |
Improving extractive multi-document text summarization through multi-objective optimization |
Improving extractive multi-document text summarization through multi-objective optimization |
Iraqi Journal of Science |
2018 |
Evolutionary based set covers algorithm with local refinement for power aware wireless sensor networks design |
Evolutionary based set covers algorithm with local refinement for power aware wireless sensor networks design |
Iraqi Journal of Science |
2018 |
Improving the performance of evolutionary-based complex detection models in protein–protein interaction networks |
Improving the performance of evolutionary-based complex detection models in protein–protein interaction networks |
Soft Computing |
2018 |
A new multi-objective evolutionary framework for community mining in dynamic social networks |
A new multi-objective evolutionary framework for community mining in dynamic social networks |
Swarm and Evolutionary Computation |
2016 |
Improving the performance of evolutionary multi-objective co-clustering models for community detection in complex social networks |
Improving the performance of evolutionary multi-objective co-clustering models for community detection in complex social networks |
Swarm and Evolutionary Computation |
2016 |
Multi-objective evolutionary routing protocol for efficient coverage in mobile sensor networks |
Multi-objective evolutionary routing protocol for efficient coverage in mobile sensor networks |
Soft Computing |
2015 |
A Multi-objective Disjoint Set Covers for Reliable Lifetime Maximization of Wireless Sensor Networks |
A Multi-objective Disjoint Set Covers for Reliable Lifetime Maximization of Wireless Sensor Networks |
Wireless Personal Communications |
2015 |
Multi-layer Genetic Algorithm for Maximum Disjoint Reliable Set Covers Problem in Wireless Sensor Networks |
Multi-layer Genetic Algorithm for Maximum Disjoint Reliable Set Covers Problem in Wireless Sensor Networks |
Wireless Personal Communications |
2015 |
Biologically inspired probabilistic coverage for mobile sensor networks |
Biologically inspired probabilistic coverage for mobile sensor networks |
Soft Computing |
2014 |
Multi-objective clustered-based routing with coverage control in wireless sensor networks |
Multi-objective clustered-based routing with coverage control in wireless sensor networks |
Soft Computing |
2013 |
Multi-objective evolutionary algorithm based on decomposition for energy efficient coverage in wireless sensor networks |
Multi-objective evolutionary algorithm based on decomposition for energy efficient coverage in wireless sensor networks |
Wireless Personal Communications |
2013 |
Stable-aware evolutionary routing protocol for wireless sensor networks |
Stable-aware evolutionary routing protocol for wireless sensor networks |
Wireless Personal Communications |
2013 |
Multi-objective evolutionary algorithm based on decomposition for efficient coverage control in mobile sensor networks |
Multi-objective evolutionary algorithm based on decomposition for efficient coverage control in mobile sensor networks |
2012 6th International Conference on Application of Information and Communication Technologies, AICT 2012 – Proceedings |
2012 |
A new evolutionary based routing protocol for clustered heterogeneous wireless sensor networks |
A new evolutionary based routing protocol for clustered heterogeneous wireless sensor networks |
Applied Soft Computing Journal |
2012 |
Energy-aware evolutionary routing protocol for dynamic clustering of wireless sensor networks |
Energy-aware evolutionary routing protocol for dynamic clustering of wireless sensor networks |
Swarm and Evolutionary Computation |
2011 |
A fuzzy multi-objective particle swarm optimization for effective data clustering |
A fuzzy multi-objective particle swarm optimization for effective data clustering |
Memetic Computing |
2010 |
Evolutionary algorithm for example-based painterly rendering |
Evolutionary algorithm for example-based painterly rendering |
International Journal of Bio-Inspired Computation |
2010 |
A binary particle swarm optimization for attacking knapsacks cipher algorithm |
A binary particle swarm optimization for attacking knapsacks cipher algorithm |
Proceedings of the International Conference on Computer and Communication Engineering 2008, ICCCE08: Global Links for Human Development |
2008 |
Evolutionary colourisation of greyscale images |
Evolutionary colourisation of greyscale images |
International Journal of Advanced Media and Communication |
2007 |
Evolutionary colorization of grayscale images |
Evolutionary colorization of grayscale images |
IEEE International Conference on Computer Systems and Applications, 2006 |
2006 |
ا.م.د محمد صبيح حمود |
Mohammed Sabbih Hamoud Al Tamimi |
AGE ESTIMATION UTILIZING DEEP LEARNING CONVOLUTIONAL NEURAL NETWORK |
AGE ESTIMATION UTILIZING DEEP LEARNING CONVOLUTIONAL NEURAL NETWORK |
International Journal on Technical and Physical Problems of Engineering |
2022 |
PLAGIARISM DETECTION SYSTEM IN SCIENTIFIC PUBLICATION USING LSTM NETWORKS |
PLAGIARISM DETECTION SYSTEM IN SCIENTIFIC PUBLICATION USING LSTM NETWORKS |
International Journal on Technical and Physical Problems of Engineering |
2022 |
Preparing of ECG Dataset for Biometric ID Identification with Creative Techniques |
Preparing of ECG Dataset for Biometric ID Identification with Creative Techniques |
TEM Journal |
2022 |
Image Compression Using Deep Learning: Methods and Techniques |
Image Compression Using Deep Learning: Methods and Techniques |
Iraqi Journal of Science |
2022 |
Vein Biometric Recognition Methods and Systems: A Review |
Vein Biometric Recognition Methods and Systems: A Review |
Advances in Science and Technology Research Journal |
2022 |
Vulnerability Assessment on Ethereum Based Smart Contract Applications |
Vulnerability Assessment on Ethereum Based Smart Contract Applications |
2021 IEEE International Conference on Automatic Control and Intelligent Systems, I2CACIS 2021 – Proceedings |
2021 |
Survey based study: Classification of patients with Alzheimer’s disease |
Survey based study: Classification of patients with Alzheimer’s disease |
Iraqi Journal of Science |
2020 |
Secure image steganography through multilevel security |
Secure image steganography through multilevel security |
International Journal of Innovation, Creativity and Change |
2020 |
Combining convolutional neural networks and slantlet transform for an effective image retrieval scheme |
Combining convolutional neural networks and slantlet transform for an effective image retrieval scheme |
International Journal of Electrical and Computer Engineering |
2019 |
A survey on the vein biometric recognition systems: Trends and challenges |
A survey on the vein biometric recognition systems: Trends and challenges |
Journal of Theoretical and Applied Information Technology |
2019 |
Brain Tumour Detection using Fine-Tuning Mechanism for Magnetic Resonance Imaging |
Brain Tumour Detection using Fine-Tuning Mechanism for Magnetic Resonance Imaging |
MATEC Web of Conferences |
2018 |
An improve image encryption algorithm based on multi-level of Chaotic maps and Lagrange interpolation |
An improve image encryption algorithm based on multi-level of Chaotic maps and Lagrange interpolation |
Iraqi Journal of Science |
2018 |
Classification of arabic writer based on clustering techniques |
Classification of arabic writer based on clustering techniques |
Lecture Notes on Data Engineering and Communications Technologies |
2018 |
Alpha shape theory for 3D visualization and volumetric measurement of brain tumor progression using magnetic resonance images |
Alpha shape theory for 3D visualization and volumetric measurement of brain tumor progression using magnetic resonance images |
Magnetic Resonance Imaging |
2015 |
A review of snake models in medical MR image segmentation |
A review of snake models in medical MR image segmentation |
Jurnal Teknologi (Sciences and Engineering) |
2014 |
Tumor brain detection through MR images: A review of literature |
Tumor brain detection through MR images: A review of literature |
Journal of Theoretical and Applied Information Technology |
2014 |
ا.م.د حسام علي عبد المحسن |
Abdulmohsin, Husam Ali |
A study on predicting crime rates through machine learning and data mining using text |
A study on predicting crime rates through machine learning and data mining using text |
Journal of Intelligent Systems |
2023 |
Automatic illness prediction system through speech |
Automatic illness prediction system through speech |
Computers and Electrical Engineering |
2022 |
Automatic Health Speech Prediction System Using Support Vector Machine |
Automatic Health Speech Prediction System Using Support Vector Machine |
Lecture Notes in Networks and Systems |
2022 |
Speech Gender Recognition Using a Multilayer Feature Extraction Method |
Speech Gender Recognition Using a Multilayer Feature Extraction Method |
Lecture Notes in Networks and Systems |
2022 |
Speech Age Estimation Using a Ranking Convolutional Neural Network |
Speech Age Estimation Using a Ranking Convolutional Neural Network |
Lecture Notes in Networks and Systems |
2022 |
A novel classification method with cubic spline interpolation |
A novel classification method with cubic spline interpolation |
Intelligent Automation and Soft Computing |
2022 |
A new proposed statistical feature extraction method in speech emotion recognition |
A new proposed statistical feature extraction method in speech emotion recognition |
Computers and Electrical Engineering |
2021 |
A new hybrid feature selection method using t-test and fitness function |
A new hybrid feature selection method using t-test and fitness function |
Computers, Materials and Continua |
2021 |
Hybrid soft computing approach for determining water quality indicator: Euphrates River |
Hybrid soft computing approach for determining water quality indicator: Euphrates River |
Neural Computing and Applications |
2019 |
م.د. فاتن عبدعلي داود |
Faten Abed Ali Dawood |
An Empirical Study on the Affecting Factors of Cloud-based ERP System Adoption in Iraqi SMEs |
An Empirical Study on the Affecting Factors of Cloud-based ERP System Adoption in Iraqi SMEs |
International Journal of Advanced Computer Science and Applications |
2023 |
Diagnosis and classification of type ii diabetes based on multilayer neural network |
Diagnosis and classification of type ii diabetes based on multilayer neural network |
Iraqi Journal of Science |
2021 |
Automatic pectoral muscles detection and removal in mammogram images |
Automatic pectoral muscles detection and removal in mammogram images |
Iraqi Journal of Science |
2021 |
Data Analysis and Classification of Autism Spectrum Disorder Using Principal Component Analysis |
Data Analysis and Classification of Autism Spectrum Disorder Using Principal Component Analysis |
Advances in Bioinformatics |
2020 |
Measurements of mitral annular displacement in 2D echocardiography images |
Measurements of mitral annular displacement in 2D echocardiography images |
American Journal of Applied Sciences |
2015 |
A hybrid method for endocardial contour extraction of right ventricle in 4-slices from 3D echocardiography dataset |
A hybrid method for endocardial contour extraction of right ventricle in 4-slices from 3D echocardiography dataset |
Advances in Bioinformatics |
2014 |
Border detection of ventricle wall motion in echocardiographic images: A survey |
Border detection of ventricle wall motion in echocardiographic images: A survey |
Proceedings – 2012 International Conference on Advanced Computer Science Applications and Technologies, ACSAT 2012 |
2012 |
Automatic boundary detection of wall motion in two-dimensional echocardiography images |
Automatic boundary detection of wall motion in two-dimensional echocardiography images |
Journal of Computer Science |
2011 |
ا.م.د غادة كاظم طعمه |
Ghadah K. Al-Khafaji |
Polynomial image compression: A review |
Polynomial image compression: A review |
AIP Conference Proceedings |
2023 |
Adaptive Polynomial Coding of Multi-base Hybrid Compression |
Adaptive Polynomial Coding of Multi-base Hybrid Compression |
International Journal of Engineering, Transactions A: Basics |
2023 |
Automatic Number Extraction from Fixed Imaging Distance |
Automatic Number Extraction from Fixed Imaging Distance |
Iraqi Journal of Science |
2022 |
Grey-level image compression using 1-d polynomial and hybrid encoding techniques |
Grey-level image compression using 1-d polynomial and hybrid encoding techniques |
Journal of Engineering Science and Technology |
2021 |
Chaos-based Color Image Steganography Method Using 3 D Cat Map |
Chaos-based Color Image Steganography Method Using 3 D Cat Map |
Iraqi Journal of Science |
2021 |
Quadtree partitioning scheme of color image based |
Quadtree partitioning scheme of color image based |
Periodicals of Engineering and Natural Sciences |
2021 |
Developed JPEG Algorithm Applied in Image Compression |
Developed JPEG Algorithm Applied in Image Compression |
IOP Conference Series: Materials Science and Engineering |
2020 |
Fourier transform coding-based techniques for Lossless Iris image compression |
Fourier transform coding-based techniques for Lossless Iris image compression |
Iraqi Journal of Science |
2019 |
Linear polynomial coding with midtread adaptive quantizer |
Linear polynomial coding with midtread adaptive quantizer |
Iraqi Journal of Science |
2018 |
Hybrid image compression based on polynomial and block truncation coding |
Hybrid image compression based on polynomial and block truncation coding |
2013 International Conference on Electrical, Communication, Computer, Power, and Control Engineering, ICECCPCE 2013 |
2014 |
م.د. مهدي كزار دعيمي |
Mehdi Gzar Duaimi |
An efficient artificial fish swarm algorithm with harmony search for scheduling in flexible job-shop problem |
An efficient artificial fish swarm algorithm with harmony search for scheduling in flexible job-shop problem |
Journal of Theoretical and Applied Information Technology |
2018 |
Association rules mining using cuckoo search Algorithm |
Association rules mining using cuckoo search Algorithm |
International Journal of Data Mining, Modelling and Management |
2018 |
Data missing solution using rough set theory and swarm intelligence |
Data missing solution using rough set theory and swarm intelligence |
Proceedings – 2012 International Conference on Advanced Computer Science Applications and Technologies, ACSAT 2012 |
2012 |
م.د. هدى مصطفى رضا |
Huda M.Radha |
Enhanced Prosthesis Control Through Improved Shoulder Girdle Motion Recognition Using Time-Dependent Power Spectrum Descriptors and Long Short-Term Memory |
Enhanced Prosthesis Control Through Improved Shoulder Girdle Motion Recognition Using Time-Dependent Power Spectrum Descriptors and Long Short-Term Memory |
Mathematical Modelling of Engineering Problems |
2023 |
A survey on bio-signal analysis for human-robot interaction |
A survey on bio-signal analysis for human-robot interaction |
International Journal of Electrical and Computer Engineering |
2022 |
English numbers recognition based on sign language using line-slope features and PSO-DBN optimization method |
English numbers recognition based on sign language using line-slope features and PSO-DBN optimization method |
Journal of Engineering Science and Technology |
2020 |
COVID-19 Diagnostics from the Chest X-Ray Image Using Corner-Based Weber Local Descriptor |
COVID-19 Diagnostics from the Chest X-Ray Image Using Corner-Based Weber Local Descriptor |
Studies in Big Data |
2020 |
A new evolutionary multi-objective community mining algorithm for signed networks |
A new evolutionary multi-objective community mining algorithm for signed networks |
Applied Soft Computing Journal |
2019 |
ا.م.د طريف كامل مصطفى |
Tareef Kamil |
Inspecting Hybrid Data Mining Approaches in Decision Support Systems for Humanities Texts Criticism [التحقق من المناهج الهجينة لتنقيب البيانات في انظمة دعم قرار ات نقد النصهص في العلهم اإلندانية] |
Inspecting Hybrid Data Mining Approaches in Decision Support Systems for Humanities Texts Criticism [التحقق من المناهج الهجينة لتنقيب البيانات في انظمة دعم قرار ات نقد النصهص في العلهم اإلندانية] |
Iraqi Journal of Science |
2021 |
An application of data mining algorithms for analyzing psychological researches |
An application of data mining algorithms for analyzing psychological researches |
Iraqi Journal of Science |
2021 |
Anomaly Detection in Flight Data Using the Naïve Bayes Classifier |
Anomaly Detection in Flight Data Using the Naïve Bayes Classifier |
7th International Conference on Contemporary Information Technology and Mathematics, ICCITM 2021 |
2021 |
Non-word attributes’ efficiency in text mining authorship prediction |
Non-word attributes’ efficiency in text mining authorship prediction |
Journal of Intelligent Systems |
2020 |
Ranking attribution: A novel method for stylometric authorship identification |
Ranking attribution: A novel method for stylometric authorship identification |
International Journal of Advanced Computer Science and Applications |
2018 |
Dropping down the maximum item set: Improving the stylometric authorship attribution algorithm in the text mining for authorship investigation |
Dropping down the maximum item set: Improving the stylometric authorship attribution algorithm in the text mining for authorship investigation |
Journal of Computer Science |
2010 |
Measuring the stylometric authorship attributes in text mining |
Measuring the stylometric authorship attributes in text mining |
Intech’08 – Proceedings of the 9th International Conference on Intelligent Technologies |
2008 |
م.د.رفل علي سمير |
Rafal Ali Sameer |
Static and dynamic video summarization |
Static and dynamic video summarization |
Iraqi Journal of Science |
2019 |
Image feature extraction and selection |
Image feature extraction and selection |
Iraqi Journal of Science |
2018 |
م.ميلا غازي عبد الحليم |
Mela G Abdul-Haleem |
An Efficient Cryptosystem for Image Using 1D and 2D Logistic Chaotic Maps |
An Efficient Cryptosystem for Image Using 1D and 2D Logistic Chaotic Maps |
International Journal of Intelligent Engineering and Systems |
2023 |
Offline Handwritten Signature Verification Based on Local Ridges Features and Haar Wavelet Transform [التحقق من صحة التهقيع اليدوي استنادًا إلى خصائص الخطهط المحلية والتحهيل المهيجي هار] |
Offline Handwritten Signature Verification Based on Local Ridges Features and Haar Wavelet Transform [التحقق من صحة التهقيع اليدوي استنادًا إلى خصائص الخطهط المحلية والتحهيل المهيجي هار] |
Iraqi Journal of Science |
2022 |
White blood cells nuclei localization using modified K-means clustering algorithm and seed filling technique |
White blood cells nuclei localization using modified K-means clustering algorithm and seed filling technique |
Iraqi Journal of Science |
2019 |
A system for rapid localization and intensity evaluation of saponins accumulation in plant tissues |
A system for rapid localization and intensity evaluation of saponins accumulation in plant tissues |
Journal of Theoretical and Applied Information Technology |
2019 |
م.فاتن صادق خزعل |
Fatin Sadiq Alkinani |
Automatic computer aided diagnostic for COVID-19 based on chest X-Ray image and particle swarm intelligence |
Automatic computer aided diagnostic for COVID-19 based on chest X-Ray image and particle swarm intelligence |
International Journal of Intelligent Engineering and Systems |
2020 |
Enhanced cartooning system based on dynamic augmented KMCG and LIP |
Enhanced cartooning system based on dynamic augmented KMCG and LIP |
Iraqi Journal of Science |
2019 |
م.د. زينب رائد احمد |
ZainabAl-Rubaye |
Sensor Data Classification for the Indication of Lameness in Sheep |
Sensor Data Classification for the Indication of Lameness in Sheep |
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST |
2018 |
ا.م.د سراب مجيد حميد |
Sarab M. Hameed |
A Modified Advanced Encryption Standard for Color Images |
A Modified Advanced Encryption Standard for Color Images |
Iraqi Journal of Science |
2022 |
Automatic Number Extraction from Fixed Imaging Distance |
Automatic Number Extraction from Fixed Imaging Distance |
Iraqi Journal of Science |
2022 |
An Internet of Things Botnet Detection Model Using Regression Analysis and Linear Discrimination Analysis |
An Internet of Things Botnet Detection Model Using Regression Analysis and Linear Discrimination Analysis |
Iraqi Journal of Science |
2022 |
Chaos-based Color Image Steganography Method Using 3 D Cat Map |
Chaos-based Color Image Steganography Method Using 3 D Cat Map |
Iraqi Journal of Science |
2021 |
A decision tree-aware genetic algorithm for botnet detection |
A decision tree-aware genetic algorithm for botnet detection |
Iraqi Journal of Science |
2021 |
Differential evolution detection models for SMS spam |
Differential evolution detection models for SMS spam |
International Journal of Electrical and Computer Engineering |
2021 |
SMS Spam Detection Based on Fuzzy Rules and Binary Particle Swarm Optimization |
SMS Spam Detection Based on Fuzzy Rules and Binary Particle Swarm Optimization |
International Journal of Intelligent Engineering and Systems |
2021 |
A new beta chaotic map with DNA encoding for color image encryption |
A new beta chaotic map with DNA encoding for color image encryption |
Iraqi Journal of Science |
2020 |
Pseudo Random Number Generator Based On Neuro-Fuzzy Models |
Pseudo Random Number Generator Based On Neuro-Fuzzy Models |
ARPN Journal of Engineering and Applied Sciences |
2019 |
Utilizing Hopfield Neural Network for Pseudo-Random Number Generator |
Utilizing Hopfield Neural Network for Pseudo-Random Number Generator |
Proceedings of IEEE/ACS International Conference on Computer Systems and Applications, AICCSA |
2019 |
Using mouse dynamics for continuous user authentication |
Using mouse dynamics for continuous user authentication |
Advances in Intelligent Systems and Computing |
2019 |
A new Color image encryption based on multi chaotic maps |
A new Color image encryption based on multi chaotic maps |
Iraqi Journal of Science |
2018 |
User authentication via mouse dynamics |
User authentication via mouse dynamics |
Iraqi Journal of Science |
2018 |
Image encryption using DNA encoding and RC4 algorithm |
Image encryption using DNA encoding and RC4 algorithm |
Iraqi Journal of Science |
2018 |
A new RGB image encryption based on DNA encoding and multi-chaotic maps |
A new RGB image encryption based on DNA encoding and multi-chaotic maps |
Communications in Computer and Information Science |
2018 |
Students’ perspectives in adopting mobile learning at university of Bahrain |
Students’ perspectives in adopting mobile learning at university of Bahrain |
Proceedings – 2013 4th International Conference on e-Learning Best Practices in Management, Design and Development of e-Courses: Standards of Excellence and Creativity, ECONF 2013 |
2013 |
A binary particle swarm optimization for attacking knapsacks cipher algorithm |
A binary particle swarm optimization for attacking knapsacks cipher algorithm |
Proceedings of the International Conference on Computer and Communication Engineering 2008, ICCCE08: Global Links for Human Development |
2008 |
A secure framework for distributed agents system |
A secure framework for distributed agents system |
IEEE International Conference on Computer Systems and Applications, 2006 |
2006 |
م.د. سهيلة نجم محمد |
Suhaila N. Mohammed |
Diagnosis of COVID-19 Infection via Association Rules of Cough Encoding |
Diagnosis of COVID-19 Infection via Association Rules of Cough Encoding |
ECTI Transactions on Computer and Information Technology |
2023 |
Color Image Steganography Using Gradient Selective Bezier Curves |
Color Image Steganography Using Gradient Selective Bezier Curves |
Iraqi Journal of Science |
2023 |
Image Segmentation Using PSO-Enhanced K-Means Clustering and Region Growing Algorithms |
Image Segmentation Using PSO-Enhanced K-Means Clustering and Region Growing Algorithms |
Iraqi Journal of Science |
2021 |
Intelligent System for Parasitized Malaria Infection Detection Using Local Descriptors |
Intelligent System for Parasitized Malaria Infection Detection Using Local Descriptors |
International Journal of Intelligent Engineering and Systems |
2021 |
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques |
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques |
Proceedings – International Conference on Developments in eSystems Engineering, DeSE |
2020 |
Automatic voice activity detection using fuzzy-neuro classifier |
Automatic voice activity detection using fuzzy-neuro classifier |
Journal of Engineering Science and Technology |
2020 |
Speech emotion recognition using MELBP variants of spectrogram image |
Speech emotion recognition using MELBP variants of spectrogram image |
International Journal of Intelligent Engineering and Systems |
2020 |
Automatic computer aided diagnostic for COVID-19 based on chest X-Ray image and particle swarm intelligence |
Automatic computer aided diagnostic for COVID-19 based on chest X-Ray image and particle swarm intelligence |
International Journal of Intelligent Engineering and Systems |
2020 |
A novel facial emotion recognition scheme based on graph mining |
A novel facial emotion recognition scheme based on graph mining |
Defence Technology |
2020 |
English numbers recognition based on sign language using line-slope features and PSO-DBN optimization method |
English numbers recognition based on sign language using line-slope features and PSO-DBN optimization method |
Journal of Engineering Science and Technology |
2020 |
COVID-19 Diagnostics from the Chest X-Ray Image Using Corner-Based Weber Local Descriptor |
COVID-19 Diagnostics from the Chest X-Ray Image Using Corner-Based Weber Local Descriptor |
Studies in Big Data |
2020 |
A Survey on Emotion Recognition for Human Robot Interaction |
A Survey on Emotion Recognition for Human Robot Interaction |
Journal of Computing and Information Technology |
2020 |
Spin-image descriptors for text-independent speaker recognition |
Spin-image descriptors for text-independent speaker recognition |
Advances in Intelligent Systems and Computing |
2020 |
ا.م.د ندى حسين محمد علي |
Nada Hussein M. Ali |
DeepFake Detection Improvement for Images Based on a Proposed Method for Local Binary Pattern of the Multiple-Channel Color Space |
DeepFake Detection Improvement for Images Based on a Proposed Method for Local Binary Pattern of the Multiple-Channel Color Space |
International Journal of Intelligent Engineering and Systems |
2023 |
Generating Streams of Random Key Based on Image Chaos and Genetic Algorithm |
Generating Streams of Random Key Based on Image Chaos and Genetic Algorithm |
Iraqi Journal of Science |
2022 |
Security Scheme Enhancement for Voice over Wireless Networks |
Security Scheme Enhancement for Voice over Wireless Networks |
Journal of Information Security and Applications |
2021 |
Detecting similarity in color images based on perceptual image hash algorithm |
Detecting similarity in color images based on perceptual image hash algorithm |
IOP Conference Series: Materials Science and Engineering |
2020 |
The Effect of Nodes Density on Real Time Traffic in Mobile Ad Hoc Network |
The Effect of Nodes Density on Real Time Traffic in Mobile Ad Hoc Network |
Proceedings of 12th International Conference on Global Security, Safety and Sustainability, ICGS3 2019 |
2019 |
Enhanced RC5 key schedule using one-dimensional cellular automata for audio file encryption |
Enhanced RC5 key schedule using one-dimensional cellular automata for audio file encryption |
Iraqi Journal of Science |
2019 |
An efficient audio encryption based on chaotic logistic map with 3D matrix |
An efficient audio encryption based on chaotic logistic map with 3D matrix |
Journal of Theoretical and Applied Information Technology |
2018 |
A secure enhancement for encoding/ decoding data using Elliptic Curve Cryptography |
A secure enhancement for encoding/ decoding data using Elliptic Curve Cryptography |
Iraqi Journal of Science |
2018 |
Lookup table algorithm for error correction in color images |
Lookup table algorithm for error correction in color images |
International Journal on Informatics Visualization |
2018 |
Security improvement in elliptic curve cryptography |
Security improvement in elliptic curve cryptography |
International Journal of Advanced Computer Science and Applications |
2018 |
A novel multi modification in AES block cipher algorithm for complexity |
A novel multi modification in AES block cipher algorithm for complexity |
International Review on Computers and Software |
2014 |
ا.م.د بسعاد علي حسين السراي |
Basad Al-Sarray |
Review of clustering for gene expression data |
Review of clustering for gene expression data |
AIP Conference Proceedings |
2023 |
Gene Expression Analysis via Spatial Clustering and Evaluation Indexing |
Gene Expression Analysis via Spatial Clustering and Evaluation Indexing |
Iraqi Journal for Computer Science and Mathematics |
2023 |
Root Cause Analysis and Improvement in Windows System Based on Windows Performance Toolkit WPT |
Root Cause Analysis and Improvement in Windows System Based on Windows Performance Toolkit WPT |
Iraqi Journal of Science |
2022 |
Deep Learning and Machine Learning via a Genetic Algorithm to Classify Breast Cancer DNA Data |
Deep Learning and Machine Learning via a Genetic Algorithm to Classify Breast Cancer DNA Data |
Iraqi Journal of Science |
2022 |
Evaluation Algorithms Based on Fuzzy C-means for the Data Clustering of Cancer Gene Expression |
Evaluation Algorithms Based on Fuzzy C-means for the Data Clustering of Cancer Gene Expression |
Iraqi Journal for Computer Science and Mathematics |
2022 |
Community detection under stochastic block model likelihood optimization via tabu search –Fuzzy C-mean method for social network data |
Community detection under stochastic block model likelihood optimization via tabu search –Fuzzy C-mean method for social network data |
Iraqi Journal of Science |
2020 |
Finding best clustering for big networks with minimum objective function by using probabilistic Tabu search |
Finding best clustering for big networks with minimum objective function by using probabilistic Tabu search |
Iraqi Journal of Science |
2019 |
Decomposition of dynamical signals into jumps, oscillatory patterns, and possible outliers |
Decomposition of dynamical signals into jumps, oscillatory patterns, and possible outliers |
Mathematics |
2018 |
Enhancing Prony’s method by nuclear norm penalization and extension to missing data |
Enhancing Prony’s method by nuclear norm penalization and extension to missing data |
Signal, Image and Video Processing |
2017 |
Hybrid canonical genetic algorithm and steepest descent algorithm for optimizing likelihood estimators of ARMA (1, 1) model |
Hybrid canonical genetic algorithm and steepest descent algorithm for optimizing likelihood estimators of ARMA (1, 1) model |
1st International Conference on the Applications of Digital Information and Web Technologies, ICADIWT 2008 |
2008 |
م.د. طارق زيد حمود |
Tareq Zaid Hammood |
A Novel Kite Cross Hexagonal Search Algorithm for Fast Block Motion Estimation |
A Novel Kite Cross Hexagonal Search Algorithm for Fast Block Motion Estimation |
Journal of Physics: Conference Series |
2021 |
Video colorization methods: A survey |
Video colorization methods: A survey |
Iraqi Journal of Science |
2020 |
م.د. نسرين جواد كاظم |
Nasreen J. |
An Improved Outlier Detection Model for Detecting Intrinsic Plagiarism |
An Improved Outlier Detection Model for Detecting Intrinsic Plagiarism |
Iraqi Journal of Science |
2022 |
Extractive multi-document summarization model based on different integrations of double similarity measures |
Extractive multi-document summarization model based on different integrations of double similarity measures |
Iraqi Journal of Science |
2020 |
Improved VSM based candidate retrieval model for detecting external textual plagiarism |
Improved VSM based candidate retrieval model for detecting external textual plagiarism |
Iraqi Journal of Science |
2019 |
Improving extractive multi-document text summarization through multi-objective optimization |
Improving extractive multi-document text summarization through multi-objective optimization |
Iraqi Journal of Science |
2018 |
Evolutionary based set covers algorithm with local refinement for power aware wireless sensor networks design |
Evolutionary based set covers algorithm with local refinement for power aware wireless sensor networks design |
Iraqi Journal of Science |
2018 |
ا.م.د بشرى عبدالله سلطان |
Bushra A. |
Color image compression based on spatial and magnitude signal decomposition |
Color image compression based on spatial and magnitude signal decomposition |
International Journal of Electrical and Computer Engineering |
2021 |
The use of biorthogonal wavelet, 2D polynomial and quadtree to compress color images |
The use of biorthogonal wavelet, 2D polynomial and quadtree to compress color images |
Communications in Computer and Information Science |
2011 |
ا.م. ميس محمد هوبي |
Mays M. |
Enhanced Multistage RSA Encryption Model |
Enhanced Multistage RSA Encryption Model |
IOP Conference Series: Materials Science and Engineering |
2020 |
م.م. سرمد مكي |
Sarmad |
Advances in document clustering with evolutionary-based algorithms |
Advances in document clustering with evolutionary-based algorithms |
American Journal of Applied Sciences |
2015 |
م. سمية سعد |
Sumaya S. Sulaiman |
Enhanced Multistage RSA Encryption Model |
Enhanced Multistage RSA Encryption Model |
IOP Conference Series: Materials Science and Engineering |
2020 |
م.م. ياسمين علاء حسن |
Yasmin A. Hassan |
Automatic computer aided diagnostic for COVID-19 based on chest X-Ray image and particle swarm intelligence |
Automatic computer aided diagnostic for COVID-19 based on chest X-Ray image and particle swarm intelligence |
International Journal of Intelligent Engineering and Systems |
2020 |
م.د قصواء خالد عبود |
|
Predicting Age and Gender Using AlexNet |
Predicting Age and Gender Using AlexNet |
TEM Journal |
2023 |
أ.م.د. رواء داود حسن الدباغ |
Al-Dabbagh, Rawaa Dawoud |
Self-adaptive Differential Evolution based Optimized MIMO Beamforming 5G Networks | خوارزمية التطور التفاضلي ذاتية التكيف لأمثلية بث الشعاع الموجه في شبكات الجيل الخامس |
Self-adaptive Differential Evolution based Optimized MIMO Beamforming 5G Networks | خوارزمية التطور التفاضلي ذاتية التكيف لأمثلية بث الشعاع الموجه في شبكات الجيل الخامس |
Iraqi Journal of Science |
2022 |
Biometric Identification System Based on Contactless Palm-Vein Using Residual Attention Network |
Biometric Identification System Based on Contactless Palm-Vein Using Residual Attention Network |
Iraqi Journal of Science |
2022 |
A review of heuristics and metaheuristics for community detection in complex networks: Current usage, emerging development and future directions |
A review of heuristics and metaheuristics for community detection in complex networks: Current usage, emerging development and future directions |
Swarm and Evolutionary Computation |
2021 |
A comparative study on meta-heuristic algorithms for solving the RNP problem |
A comparative study on meta-heuristic algorithms for solving the RNP problem |
Iraqi Journal of Science |
2019 |
A Theoretical Framework for Big Data Analytics Based on Computational Intelligent Algorithms with the Potential to Reduce Energy Consumption |
A Theoretical Framework for Big Data Analytics Based on Computational Intelligent Algorithms with the Potential to Reduce Energy Consumption |
Green Energy and Technology |
2019 |
Algorithmic design issues in adaptive differential evolution schemes: Review and taxonomy |
Algorithmic design issues in adaptive differential evolution schemes: Review and taxonomy |
Swarm and Evolutionary Computation |
2018 |
Steganography technique using genetic algorithm |
Steganography technique using genetic algorithm |
Iraqi Journal of Science |
2018 |
Constrained differential evolution for cost and energy efficiency optimization in 5G wireless networks |
Constrained differential evolution for cost and energy efficiency optimization in 5G wireless networks |
11th International Conference on Simulated Evolution and Learning, SEAL 2017 |
2017 |
Differential evolution with adaptive repository of strategies and parameter control schemes |
Differential evolution with adaptive repository of strategies and parameter control schemes |
IEEE Congress on Evolutionary Computation, CEC 2015 |
2015 |
A new modified differential evolution algorithm scheme-based linear frequency modulation radar signal de-noising |
A new modified differential evolution algorithm scheme-based linear frequency modulation radar signal de-noising |
Engineering Optimization |
2015 |
Parameters’ fine tuning of differential evolution algorithm |
Parameters’ fine tuning of differential evolution algorithm |
Computer Systems Science and Engineering |
2015 |
Comparative analysis of a modified differential evolution algorithm based on bacterial mutation scheme |
Comparative analysis of a modified differential evolution algorithm based on bacterial mutation scheme |
IEEE Symposium on Differential Evolution |
2014 |
System identification and control of robot manipulator based on fuzzy adaptive differential evolution algorithm |
System identification and control of robot manipulator based on fuzzy adaptive differential evolution algorithm |
Advances in Engineering Software |
2014 |
A combined compact genetic algorithm and local search method for optimizing the ARMA(1,1) model of a likelihood estimator |
A combined compact genetic algorithm and local search method for optimizing the ARMA(1,1) model of a likelihood estimator |
ScienceAsia |
2014 |
Differential Evolution algorithm for linear frequency modulation radar signal denoising |
Differential Evolution algorithm for linear frequency modulation radar signal denoising |
5th IEEE International RF and Microwave Conference, RFM 2013 |
2013 |
The compact genetic algorithm for likelihood estimator of first order moving average model |
The compact genetic algorithm for likelihood estimator of first order moving average model |
2nd International Conference on Digital Information and Communication Technology and its Applications |
2012 |
Hybrid canonical genetic algorithm and steepest descent algorithm for optimizing likelihood estimators of ARMA (1, 1) model |
Hybrid canonical genetic algorithm and steepest descent algorithm for optimizing likelihood estimators of ARMA (1, 1) model |
1st International Conference on the Applications of Digital Information and Web Technologies |
2008 |
A canonical generic algorithm for likelihood estimator of first order moving average model parameter |
A canonical generic algorithm for likelihood estimator of first order moving average model parameter |
Neural Network World |
2007 |
م.د. حنين احمد خضر خلف |
Qarabash, Haneen |
Twitter Location-Based Data: Evaluating the Methods of Data Collection Provided by Twitter Api |
Twitter Location-Based Data: Evaluating the Methods of Data Collection Provided by Twitter Api |
International Journal of Computing |
2020 |
Smart grid in the context of industry 4.0: An overview of communications technologies and challenges |
Smart grid in the context of industry 4.0: An overview of communications technologies and challenges |
Indonesian Journal of Electrical Engineering and Computer Science |
2020 |
Group tagging: Using video tagging to facilitate reflection on small group activities |
Group tagging: Using video tagging to facilitate reflection on small group activities |
British Journal of Educational Technology |
2019 |
Collaborative content creation: Impact of media type on author behavior |
Collaborative content creation: Impact of media type on author behavior |
Proceedings of the ACM Conference on Computer Supported Cooperative Work, CSCW |
2018 |
Media literacy as a by-product of collaborative video production by CS students |
Media literacy as a by-product of collaborative video production by CS students |
Annual Conference on Innovation and Technology in Computer Science Education |
2017 |
أ.م.د. ندا عبدالزهرة عبدالله |
Abdullah, Nada A.Z. |
Mathematical simulation of memristive for classification in machine learning |
Mathematical simulation of memristive for classification in machine learning |
Periodicals of Engineering and Natural Sciences |
2022 |
A Survey on Arabic Text Classification Using Deep and Machine Learning Algorithms |
A Survey on Arabic Text Classification Using Deep and Machine Learning Algorithms |
Iraqi Journal of Science |
2022 |
Arabic Keywords Extraction using Conventional Neural Network |
Arabic Keywords Extraction using Conventional Neural Network |
Iraqi Journal of Science |
2022 |
Survey For Arabic Part of Speech Tagging based on Machine Learning |
Survey For Arabic Part of Speech Tagging based on Machine Learning |
Iraqi Journal of Science |
2022 |
Steganography technique using genetic algorithm |
Steganography technique using genetic algorithm |
Iraqi Journal of Science |
2018 |
Effects of gas flow on spectral properties of plasma jet induced by microwave |
Effects of gas flow on spectral properties of plasma jet induced by microwave |
Baghdad Science Journal |
2018 |
The effect of gas flow on plasma parameters induced by microwave |
The effect of gas flow on plasma parameters induced by microwave |
Baghdad Science Journal |
2018 |
Effect of microwaves-induced plasma on some parameters of sperms, histopathological and sperm DNA fragmentation in mice |
Effect of microwaves-induced plasma on some parameters of sperms, histopathological and sperm DNA fragmentation in mice |
Bioscience Research |
2018 |
The effect of gas flow on plasma parameters induced by microwave |
The effect of gas flow on plasma parameters induced by microwave |
Baghdad Science Journal |
2018 |
Effects of gas flow on spectral properties of plasma jet induced by microwave |
Effects of gas flow on spectral properties of plasma jet induced by microwave |
Baghdad Science Journal |
2018 |
An efficient color quantization using color histogram |
An efficient color quantization using color histogram |
2017 Annual Conference on New Trends in Information and Communications Technology Applications |
2017 |
أ.م.د.امنة داحم عبود |
Abbood, Amenah D. |
Community detection model for dynamic networks based on hidden Markov model and evolutionary algorithm |
Community detection model for dynamic networks based on hidden Markov model and evolutionary algorithm |
Artificial Intelligence Review |
2023 |
Heuristic initialization of PSO task scheduling algorithm in cloud computing |
Heuristic initialization of PSO task scheduling algorithm in cloud computing |
Journal of King Saud University – Computer and Information Sciences |
2022 |
Mathematical simulation of memristive for classification in machine learning |
Mathematical simulation of memristive for classification in machine learning |
Periodicals of Engineering and Natural Sciences |
2022 |
The effects of conductance on metastable switches in memristive devices based on anti-hebbian and hebbian (ahah) learning rules |
The effects of conductance on metastable switches in memristive devices based on anti-hebbian and hebbian (ahah) learning rules |
Iraqi Journal of Science |
2021 |
The influence of NMI against modularity in community detection problem: A case study for unsigned and signed networks |
The influence of NMI against modularity in community detection problem: A case study for unsigned and signed networks |
Iraqi Journal of Science |
2021 |
A review of heuristics and metaheuristics for community detection in complex networks: Current usage, emerging development and future directions |
A review of heuristics and metaheuristics for community detection in complex networks: Current usage, emerging development and future directions |
Swarm and Evolutionary Computation |
2021 |
Evolutionary multi-objective set cover problem for task allocation in the Internet of Things |
Evolutionary multi-objective set cover problem for task allocation in the Internet of Things |
Applied Soft Computing |
2021 |
Pearson coefficient matrix for studying the correlation of community detection scores in multi-objective evolutionary algorithm |
Pearson coefficient matrix for studying the correlation of community detection scores in multi-objective evolutionary algorithm |
Periodicals of Engineering and Natural Sciences |
2021 |
An Enhanced Multi-Objective Evolutionary Algorithm with Decomposition for Signed Community Detection Problem |
An Enhanced Multi-Objective Evolutionary Algorithm with Decomposition for Signed Community Detection Problem |
Proceedings – 2020 2nd Annual International Conference on Information and Sciences, AiCIS 2020 |
2020 |
م.د.ضحى عبد الهادي عبد الجبار |
Abduljabbar, Dhuha Abdulhadi |
Nature-inspired optimization algorithms for community detection in complex networks: a review and future trends |
Nature-inspired optimization algorithms for community detection in complex networks: a review and future trends |
Telecommunication Systems |
2020 |
An improved multi-objective evolutionary algorithm for detecting communities in complex networks with graphlet measure |
An improved multi-objective evolutionary algorithm for detecting communities in complex networks with graphlet measure |
Computer Networks |
2020 |
An Enhanced Evolutionary Algorithm for Detecting Complexes in Protein Interaction Networks with Heuristic Biological Operator |
An Enhanced Evolutionary Algorithm for Detecting Complexes in Protein Interaction Networks with Heuristic Biological Operator |
Advances in Intelligent Systems and Computing |
2020 |
An Evolutionary Algorithm for Community Detection Using an Improved Mutation Operator |
An Evolutionary Algorithm for Community Detection Using an Improved Mutation Operator |
ICECOS 2019 – 3rd International Conference on Electrical Engineering and Computer Science, Proceeding |
2019 |
An enhanced evolutionary algorithm with local heuristic approach for detecting community in complex networks |
An enhanced evolutionary algorithm with local heuristic approach for detecting community in complex networks |
Journal of Theoretical and Applied Information Technology |
2019 |
Exam questions classification based on Bloom’s taxonomy cognitive level using classifiers combination |
Exam questions classification based on Bloom’s taxonomy cognitive level using classifiers combination |
Journal of Theoretical and Applied Information Technology |
2015 |
م.د.ميساء ابراهيم عبد الحسين |
Abdulhussain, Maysa I. |
Deep classifier structures with autoencoder for higher-level feature extraction |
Deep classifier structures with autoencoder for higher-level feature extraction |
IJCCI 2018 – Proceedings of the 10th International Joint Conference on Computational Intelligence |
2018 |
Class-specific pre-trained sparse autoencoders for learning effective features for document classification |
Class-specific pre-trained sparse autoencoders for learning effective features for document classification |
2016 8th Computer Science and Electronic Engineering Conference, CEEC |
2017 |
An experimental investigation on PCA based on cosine similarity and correlation for text feature dimensionality reduction |
An experimental investigation on PCA based on cosine similarity and correlation for text feature dimensionality reduction |
2015 7th Computer Science and Electronic Engineering Conference, CEEC |
2015 |
م.د. هيثم كريم عباس |
Abass, Haithem Kareem |
Extractive multi document summarization using harmony search algorithm |
Extractive multi document summarization using harmony search algorithm |
Telkomnika (Telecommunication Computing Electronics and Control) |
2021 |
Logo matching in Arabic documents using region based features and SURF descriptor |
Logo matching in Arabic documents using region based features and SURF descriptor |
2017 Annual Conference on New Trends in Information and Communications Technology Applications, NTICT |
2017 |
أ.م.د.عامر عبد المجيد عبد الرحمن |
Abdulrahman, Amer Abdulmajeed |
Construct an efficient distributed denial of service attack detection system based on data mining techniques |
Construct an efficient distributed denial of service attack detection system based on data mining techniques |
Indonesian Journal of Electrical Engineering and Computer Science |
2023 |
Construct an Efficient DDoS Attack Detection System Based on RF-C4.5-GridSearchCV |
Construct an Efficient DDoS Attack Detection System Based on RF-C4.5-GridSearchCV |
2022 Iraqi International Conference on Communication and Information Technologies, IICCIT |
2022 |
Intrusion detection system using data stream classification |
Intrusion detection system using data stream classification |
Iraqi Journal of Science |
2021 |
م.سرى عبد سراب حسين |
Hussien, Sura Abed Sarab |
Solid waste recycling and management cost optimization algorithm |
Solid waste recycling and management cost optimization algorithm |
Bulletin of Electrical Engineering and Informatics |
2022 |
A Proposed Algorithm for Encrypted Data Hiding in Video Stream Based on Frame Random Distribution |
A Proposed Algorithm for Encrypted Data Hiding in Video Stream Based on Frame Random Distribution |
Iraqi Journal of Science |
2021 |
Blood donors appointment booking and managing system using PC and mobile web browsers in current pandemic (COVID-19) |
Blood donors appointment booking and managing system using PC and mobile web browsers in current pandemic (COVID-19) |
Indonesian Journal of Electrical Engineering and Computer Science |
2021 |
م.نهلة عبد الرحمن حسين |
Alkhalidi, Nahlah Abdulrahman |
SHE Networks: Security, Health, and Emergency Networks Traffic Priority Management Based on ML and SDN |
SHE Networks: Security, Health, and Emergency Networks Traffic Priority Management Based on ML and SDN |
IEEE Access |
2022 |
FDPHI: Fast Deep Packet Header Inspection for Data Traffic Classification and Management |
FDPHI: Fast Deep Packet Header Inspection for Data Traffic Classification and Management |
Alkhalidi, N.A., Yaseen, F.A. |
2021 |
م.د.مريم عبد الرحيم ياسر |
Yasir, Maryam A. |
Dynamic Background Subtraction in Video Surveillance Using Color-Histogram and Fuzzy C-Means Algorithm with Cosine Similarity |
Dynamic Background Subtraction in Video Surveillance Using Color-Histogram and Fuzzy C-Means Algorithm with Cosine Similarity |
International journal of online and biomedical engineering |
2022 |
Review on Real Time Background Extraction: Models, Applications, Environments, Challenges and Evaluation Approaches |
Review on Real Time Background Extraction: Models, Applications, Environments, Challenges and Evaluation Approaches |
International journal of online and biomedical engineering |
2021 |
أ.م.عهود سعدي الحسني |
Al-Hassani, Uhood S. |
Some Results on Strongly Fully Stable Banach Γ -Algebra Modules Related to ΓA -deal | بعض نتائج مقاساث بناخ الاجبرا تامت الاستقرار يت بقوة من النمط ΓA بالنسبت إلى مثالي من النمط |
Some Results on Strongly Fully Stable Banach Γ -Algebra Modules Related to ΓA -deal | بعض نتائج مقاساث بناخ الاجبرا تامت الاستقرار يت بقوة من النمط ΓA بالنسبت إلى مثالي من النمط |
Iraqi Journal of Science |
2022 |
SOME RESULTS on T_PURE SUBMODULES RELATED to SUBMODULE |
SOME RESULTS on T_PURE SUBMODULES RELATED to SUBMODULE |
Journal of Physics: Conference Series |
2021 |
ا.م.د عدنان جمعة جابر |
Adnan J. Jabir |
A Multi-Objective Task Offloading Optimization for Vehicular Fog Computing [تحدين متعدد الاهداف لعملية تفريغ المهام في حوسبة ضباب المركبات] |
A Multi-Objective Task Offloading Optimization for Vehicular Fog Computing [تحدين متعدد الاهداف لعملية تفريغ المهام في حوسبة ضباب المركبات] |
Iraqi Journal of Science |
2022 |
An Evolutionary Algorithm for Task scheduling Problem in the Cloud-Fog environment |
An Evolutionary Algorithm for Task scheduling Problem in the Cloud-Fog environment |
Journal of Physics: Conference Series |
2021 |
A Light Weight Multi-Objective Task Offloading Optimization for Vehicular Fog Computing |
A Light Weight Multi-Objective Task Offloading Optimization for Vehicular Fog Computing |
Iraqi Journal for Electrical and Electronic Engineering |
2021 |
INTER-DOMAIN HANDOVER SCHEME with OPTIMAL ROUTE RECOVERY for PROXY MOBILE IPV6 PROTOCOL |
INTER-DOMAIN HANDOVER SCHEME with OPTIMAL ROUTE RECOVERY for PROXY MOBILE IPV6 PROTOCOL |
Journal of Engineering Science and Technology |
2020 |
A low cost paging scheme for clustered PMIPv6 protocol by head-MAG entity utilisation |
A low cost paging scheme for clustered PMIPv6 protocol by head-MAG entity utilisation |
International Journal of Internet Protocol Technology |
2020 |
Spin-image descriptors for text-independent speaker recognition |
Spin-image descriptors for text-independent speaker recognition |
Advances in Intelligent Systems and Computing |
2020 |
Bulk binding approach for PMIPv6 protocol to reduce handoff latency in IoT |
Bulk binding approach for PMIPv6 protocol to reduce handoff latency in IoT |
International Journal of Electrical and Computer Engineering |
2019 |
A Comprehensive Survey of the Current Trends and Extensions for the Proxy Mobile IPv6 Protocol |
A Comprehensive Survey of the Current Trends and Extensions for the Proxy Mobile IPv6 Protocol |
IEEE Systems Journal |
2018 |
Fast handoff scheme for cluster-based proxy mobile IPv6 protocol |
Fast handoff scheme for cluster-based proxy mobile IPv6 protocol |
IEICE Transactions on Communications |
2014 |
A low cost route optimization scheme for cluster-based Proxy MIPv6 protocol |
A low cost route optimization scheme for cluster-based Proxy MIPv6 protocol |
Wireless Personal Communications |
2014 |
A cluster-based proxy mobile IPv6 for IP-WSNs |
A cluster-based proxy mobile IPv6 for IP-WSNs |
Eurasip Journal on Wireless Communications and Networking |
2012 |
A new strategy for signaling overhead reduction in the proxy mobile IPv6 protocol |
A new strategy for signaling overhead reduction in the proxy mobile IPv6 protocol |
American Journal of Applied Sciences |
2012 |
م.د. عماد جاسم محمد |
Imad J. Mohamad |
WOAIP: Wireless Optimization Algorithm for Indoor Placement Based on Binary Particle Swarm Optimization (BPSO) [خوارزمية التحسين اللاسلكي للوضع الداخلي استنادًا إلى تحسين حشد الجسيمات الثنائي] |
WOAIP: Wireless Optimization Algorithm for Indoor Placement Based on Binary Particle Swarm Optimization (BPSO) [خوارزمية التحسين اللاسلكي للوضع الداخلي استنادًا إلى تحسين حشد الجسيمات الثنائي] |
Baghdad Science Journal |
2022 |
Wireless Optimization Algorithm for Multi-floor AP deployment using binary particle swarm optimization (BPSO) |
Wireless Optimization Algorithm for Multi-floor AP deployment using binary particle swarm optimization (BPSO) |
Journal of Physics: Conference Series |
2021 |
BotDetectorFW: an optimized botnet detection framework based on five features-distance measures supported by comparisons of four machine learning classifiers using CICIDS2017 dataset |
BotDetectorFW: an optimized botnet detection framework based on five features-distance measures supported by comparisons of four machine learning classifiers using CICIDS2017 dataset |
Indonesian Journal of Electrical Engineering and Computer Science |
2021 |
SDN-RA: An Optimized Reschedule Algorithm of SDN Load Balancer for Data Center Networks Based on QoS |
SDN-RA: An Optimized Reschedule Algorithm of SDN Load Balancer for Data Center Networks Based on QoS |
IOP Conference Series: Materials Science and Engineering |
2020 |
Development of an Optimized Botnet Detection Framework based on Filters of Features and Machine Learning Classifiers using CICIDS2017 Dataset |
Development of an Optimized Botnet Detection Framework based on Filters of Features and Machine Learning Classifiers using CICIDS2017 Dataset |
IOP Conference Series: Materials Science and Engineering |
2020 |
Performance Evaluation for Four Supervised Classifiers in Internet Traffic Classification |
Performance Evaluation for Four Supervised Classifiers in Internet Traffic Classification |
Communications in Computer and Information Science |
2020 |
LTE peak data rate estimation using modified alpha-Shannon capacity formula |
LTE peak data rate estimation using modified alpha-Shannon capacity formula |
Asian Internet Engineering Conference, AINTEC 2014 |
2014 |
Peer-to-peer video conferencing using hybrid content distribution model |
Peer-to-peer video conferencing using hybrid content distribution model |
Journal of Computer Science |
2012 |
ITTP: A new transport protocol for VoIP applications |
ITTP: A new transport protocol for VoIP applications |
International Journal of Innovative Computing, Information and Control |
2012 |
Header compression scheme over hybrid satellite-WiMAX network |
Header compression scheme over hybrid satellite-WiMAX network |
Communications in Computer and Information Science |
2011 |
Per-priority flow control (PPFC) for enhancing Metro Ethernet QoS |
Per-priority flow control (PPFC) for enhancing Metro Ethernet QoS |
2nd International Conference on Computer Research and Development, ICCRD 2010 |
2010 |
Optimizing the MPLS support for real time IPv6-flows using MPLS-PHS approach |
Optimizing the MPLS support for real time IPv6-flows using MPLS-PHS approach |
IEEE Region 10 Annual International Conference, Proceedings/TENCON |
2009 |
The effect of using XCAST based routing protocol in wireless ad hoc networks |
The effect of using XCAST based routing protocol in wireless ad hoc networks |
IEEE Region 10 Annual International Conference, Proceedings/TENCON |
2009 |
The effect of traffic load on using XCAST based routing protocol in wireless ad hoc networks |
The effect of traffic load on using XCAST based routing protocol in wireless ad hoc networks |
ICICS 2009 – Conference Proceedings of the 7th International Conference on Information, Communications and Signal Processing |
2009 |
ا.م.د زينة معين محمد حسين |
Zeina |
Estimating server utilization rate in single server queuing models using an approximate solution of stiff fluid flow model |
Estimating server utilization rate in single server queuing models using an approximate solution of stiff fluid flow model |
Ain Shams Engineering Journal |
2020 |
Single-Phase Grid-Tied Transformerless Inverter of Zero Leakage Current for PV System |
Single-Phase Grid-Tied Transformerless Inverter of Zero Leakage Current for PV System |
IEEE Access |
2020 |
Parametric nonlinear programming approach with fuzzy queues using hexagonal membership functions |
Parametric nonlinear programming approach with fuzzy queues using hexagonal membership functions |
Journal of Computational and Theoretical Nanoscience |
2017 |
A single server fuzzy queues with priority and unequal service rates |
A single server fuzzy queues with priority and unequal service rates |
International Journal of Mathematics in Operational Research |
2017 |
Analysis of performance measures with single channel fuzzy queues under two class by ranking method |
Analysis of performance measures with single channel fuzzy queues under two class by ranking method |
Journal of Telecommunication, Electronic and Computer Engineering |
2017 |
Analysis of performance measures with single channel fuzzy queues under two class by using ranking method |
Analysis of performance measures with single channel fuzzy queues under two class by using ranking method |
AIP Conference Proceedings |
2016 |
Minimizing waiting times using multiple fuzzy queueing model with supply priorities |
Minimizing waiting times using multiple fuzzy queueing model with supply priorities |
Far East Journal of Mathematical Sciences |
2016 |
Designing basic variables as linguistic states with multiple channel queueing models and supply priorities in uncertainty environment |
Designing basic variables as linguistic states with multiple channel queueing models and supply priorities in uncertainty environment |
Global Journal of Pure and Applied Mathematics |
2016 |
Performance measurements of single server fuzzy queues with unreliable server using left and right method |
Performance measurements of single server fuzzy queues with unreliable server using left and right method |
AIP Conference Proceedings |
2015 |
ا.م.د عمار ابراهيم شهاب |
Ammar Ibrahim Shihab |
A cryptosystem for database security based on TSFS algorithm |
A cryptosystem for database security based on TSFS algorithm |
Baghdad Science Journal |
2020 |
Epileptic seizures detection using DCT-II and KNN classifier in long-term EEG signals |
Epileptic seizures detection using DCT-II and KNN classifier in long-term EEG signals |
Iraqi Journal of Science |
2020 |
Data Analysis and Classification of Autism Spectrum Disorder Using Principal Component Analysis |
Data Analysis and Classification of Autism Spectrum Disorder Using Principal Component Analysis |
Advances in Bioinformatics |
2020 |
Classification and monitoring of autism using svm and vmcm |
Classification and monitoring of autism using svm and vmcm |
Journal of Theoretical and Applied Information Technology |
2018 |
Data classification and applied bioinformatics for monitoring of autism using neural network |
Data classification and applied bioinformatics for monitoring of autism using neural network |
Journal of Engineering and Applied Sciences |
2018 |
Face recognition using LDA and PCA by multiadge bloack image |
Face recognition using LDA and PCA by multiadge bloack image |
Proceedings of the 2009 International Conference on Image Processing, Computer Vision, and Pattern Recognition, IPCV 2009 |
2009 |
An automatic system of human face detection and recognition |
An automatic system of human face detection and recognition |
MCCSIS’08 – IADIS Multi Conference on Computer Science and Information Systems; Proceedings of Computer Graphics and Visualization 2008 and Gaming 2008: Design for Engaging Experience Soc. Interaction |
2008 |
م.د. علياء محمد نوري |
Alyaa |
Text image secret sharing with hiding based on color feature |
Text image secret sharing with hiding based on color feature |
Periodicals of Engineering and Natural Sciences |
2022 |
Impact of Alamouti Space-Time Block Coding on the Performance of Vehicle-to-Vehicle Communication |
Impact of Alamouti Space-Time Block Coding on the Performance of Vehicle-to-Vehicle Communication |
ICOASE 2018 – International Conference on Advanced Science and Engineering |
2018 |
Performance of BCH and RS Codes in MIMO System Using MPFEC Diversity Technique |
Performance of BCH and RS Codes in MIMO System Using MPFEC Diversity Technique |
ICOASE 2018 – International Conference on Advanced Science and Engineering |
2018 |
Enhancing BER performance limit of BCH and RS codes using multipath diversity |
Enhancing BER performance limit of BCH and RS codes using multipath diversity |
Computers |
2017 |
Utilisation of multipath phenomenon to improve the performance of BCH and RS codes |
Utilisation of multipath phenomenon to improve the performance of BCH and RS codes |
2016 8th Computer Science and Electronic Engineering Conference, CEEC 2016 – Conference Proceedings |
2017 |
م.م. ابتسام عبدالله تقي |
Ibtisam A. |
An Efficient Cryptosystem for Image Using 1D and 2D Logistic Chaotic Maps |
An Efficient Cryptosystem for Image Using 1D and 2D Logistic Chaotic Maps |
International Journal of Intelligent Engineering and Systems |
2023 |
A new beta chaotic map with DNA encoding for color image encryption |
A new beta chaotic map with DNA encoding for color image encryption |
Iraqi Journal of Science |
2020 |
A new Color image encryption based on multi chaotic maps |
A new Color image encryption based on multi chaotic maps |
Iraqi Journal of Science |
2018 |
A new RGB image encryption based on DNA encoding and multi-chaotic maps |
A new RGB image encryption based on DNA encoding and multi-chaotic maps |
Communications in Computer and Information Science |
2018 |
ا.م.د سهاد فيصل شيحان |
Suhad Faisal Behadili |
ANALYZE WATER SCARCITY IN BASRAH CITY VIA GEOINFORMATICS |
ANALYZE WATER SCARCITY IN BASRAH CITY VIA GEOINFORMATICS |
AIP Conference Proceedings |
2022 |
CART_based Approach for Discovering Emerging Patterns in Iraqi Biochemical Dataset |
CART_based Approach for Discovering Emerging Patterns in Iraqi Biochemical Dataset |
Iraqi Journal of Science |
2022 |
Breast Cancer Detection using Decision Tree and K-Nearest Neighbour Classifiers |
Breast Cancer Detection using Decision Tree and K-Nearest Neighbour Classifiers |
Iraqi Journal of Science |
2022 |
Gravity Model for Flow Migration within Wireless Communication Networks |
Gravity Model for Flow Migration within Wireless Communication Networks |
Iraqi Journal of Science |
2022 |
A Comparative Study for Supervised Learning Algorithms to Analyze Sentiment Tweets |
A Comparative Study for Supervised Learning Algorithms to Analyze Sentiment Tweets |
Iraqi Journal of Science |
2022 |
A Review of Flow Migration Through Mobile Networks |
A Review of Flow Migration Through Mobile Networks |
Iraqi Journal of Science |
2022 |
Modeling Social Networks using Data Mining Approaches-Review |
Modeling Social Networks using Data Mining Approaches-Review |
Iraqi Journal of Science |
2022 |
Data mining techniques for Iraqi biochemical dataset analysis |
Data mining techniques for Iraqi biochemical dataset analysis |
Baghdad Science Journal |
2022 |
Human Dynamic Behavior: Reconstruction Trajectories Using CDRs |
Human Dynamic Behavior: Reconstruction Trajectories Using CDRs |
Journal of Physics: Conference Series |
2021 |
No Mobile Phobia Phenomenon _ A Review |
No Mobile Phobia Phenomenon _ A Review |
Iraqi Journal for Electrical and Electronic Engineering |
2021 |
Oli and gas explorations via satellite remote sensing techniques for Al_Nasiriya |
Oli and gas explorations via satellite remote sensing techniques for Al_Nasiriya |
Iraqi Journal of Science |
2019 |
Robot Human Interface For Housekeeper robot with wireless capabilities |
Robot Human Interface For Housekeeper robot with wireless capabilities |
International Journal of Computer Networks and Communications |
2018 |
م. ايناس علي عبدالمنعم |
Inas Ali Abdulmunem |
Improve the fully convolutional network accuracy by levelset and the deep prior method |
Improve the fully convolutional network accuracy by levelset and the deep prior method |
Iraqi Journal of Science |
2023 |
Brain MR Images Classification for Alzheimer’s Disease |
Brain MR Images Classification for Alzheimer’s Disease |
Iraqi Journal of Science |
2022 |
Improving security of the crypto-stego approach using time sequence dictionary and spacing modification techniques |
Improving security of the crypto-stego approach using time sequence dictionary and spacing modification techniques |
Iraqi Journal of Science |
2021 |
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks |
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks |
Baghdad Science Journal |
2021 |
Enhanced Multistage RSA Encryption Model |
Enhanced Multistage RSA Encryption Model |
IOP Conference Series: Materials Science and Engineering |
2020 |
م. غصون غازي محمد |
Ghusoon Gh Mohammed |
Impacts of porous medium on unsteady helical flows of generalized oldroyd-B fluid with two infinite coaxial circular cylinders |
Impacts of porous medium on unsteady helical flows of generalized oldroyd-B fluid with two infinite coaxial circular cylinders |
Iraqi Journal of Science |
2021 |
م.م. علي سامي سوسه |
Ali Sami Sosa |
Reactive protocols for unified user profiling for anomaly detection in mobile Ad Hoc networks |
Reactive protocols for unified user profiling for anomaly detection in mobile Ad Hoc networks |
Periodicals of Engineering and Natural Sciences |
2019 |
م.م. هلا عبد السلام جاسم |
Hala Abdul Salam Jasim |
New techniques to enhance data deduplication using content based-TTTD chunking algorithm |
New techniques to enhance data deduplication using content based-TTTD chunking algorithm |
International Journal of Advanced Computer Science and Applications |
2018 |
م. مصطفى سلمان عبد |
Mustafa S Abd |
CART_based Approach for Discovering Emerging Patterns in Iraqi Biochemical Dataset |
CART_based Approach for Discovering Emerging Patterns in Iraqi Biochemical Dataset |
Iraqi Journal of Science |
2022 |