اسم الباحثاسم البحثاسم المجلة
ا.م.د. نصير علي حسينPredicting Breast Cancer Risk Using Subset of Genes6th international conference on control, decision and information technologies (CoDIT). IEEE
ا.م.د. نصير علي حسينA predictive model for liver disease progression based on logistic regression algorithmPeriodicals of Engineering and Natural Sciences (PEN) 7.3 (2019): 1255-1264
ا.م.د. نصير علي حسينDetection Algorithm for Internet Worms Scanning that Used Internet Control Message ProtocolInternational Journal of Information and Computer Security 11.1 (2019): 17-32
ا.م.د. نصير علي حسينSmart Shopping System with RFID Technology Based on Internet of ThingsInternational Journal of Interactive Mobile Technologies (iJIM) eISSN: 1865-7923
ا.م.د. نصير علي حسينDetection Algorithm for Internet Worms Scanning that Used Internet Control Message ProtocolInternational Journal of Information and Computer Security 11.1 (2019): 17-32
ا.م.د. سيف علي عبد الرضاEfficient RTS and CTS Mechanism Which Save Time and System ResourcesInternational Journal of Interactive Mobile Technologies (iJIM)
ا.م.د. سيف علي عبد الرضاEnglish poems categorization using text mining and rough set theoryBulletin of Electrical Engineering and Informatics 2089-3191
ا.م.د. سيف علي عبد الرضاImproved scatter search algorithm based on meerkat clan algorithm to solve NP-hard problemsPeriodicals of Engineering and Natural Sciences (PEN)(ISSN: 2303-4521)
ا.م.د. سيف علي عبد الرضاWisdom Extraction from the English Poetry using SVMsSolid State Technology
ا.م.د. سيف علي عبد الرضاWisdom Extraction from English Poems Using Two-level Feature Selection with Rough Set TheoryInternational Journal of Advanced Science and Technology
ا.م.د. سيف علي عبد الرضاChoice of a Specific Path to Ensure Transmitting Data with no wasting in the Power of NodesJournal of Education College Wasit University
ا.م.د. سيف علي عبد الرضاPlate Detection and Recognition of Iraqi License Plate Using KNN AlgorithmJournal of Education College Wasit University
أ.م.د.اسراء صالح حسونA Survey of Botnet-Based DDoS Flooding Attacks of Application Layer: Detection and Mitigation ApproachesHandbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security
أ.م.د.اسراء صالح حسونAn intelligent icmpv6 ddos flooding-attack detection framework (v6iids) using back-propagation neural networkIETE Technical Review
أ.م.د.اسراء صالح حسونReview of security vulnerabilities in the ipv6 neighbor discovery protocolInformation Science and Applications (ICISA) 2016
أ.م.د.اسراء صالح حسونEnergy Aware Dynamic Clustering Algorithm Using NIA-LEACH in Wireless Sensor NetworksJournal of Advanced Research in Dynamical and Control Systems
أ.م.د.اسراء صالح حسونSecured Environment for Cloud Integrated Fog and Mist ArchitectureIEEE International Conference on Electrical Engineering and Photonics (EExPolytech)
أ.م.د.اسراء صالح حسونReview of Analytics Tools on Traffic for IoT and Cloud Based Network Environment3rd International Conference on Engineering Technology and its Applications (IICETA)
أ.م.د.اسراء صالح حسونA Survey of Botnet-Based DDoS Flooding Attacks of Application LayerHandbook of research on modern cryptographic solutions for computer and cyber security. IGI Global
م.رياض رهيف نويعGFRecog: A Generic Framework with Significant Feature Selection Approach for Face RecognitionInternational Journa l of Engineering &Technology (IJET) (ISSN 2227-524X)
م.رياض رهيف نويعAutomatic routing and fault detection in mobile adhoc networksInternational Journal of Pure and Applied Mathematics, ISSN: 1311-8080
م.رياض رهيف نويعE-HEALTH STATE IN MIDDLE EAST COUNTRIES: AN OVERVIEWThe Turkish Online Journal of Design, Art and Communication – TOJDAC ISSN: 2146-5193
م.رياض رهيف نويعA Novel Multi-Attribute Authority Based Encryption for Controlling Access to Cloud DataJournal of College of Education / Wasit, ISSN: 2417-1994
م.رياض رهيف نويعEnergy Efficient Mobile Data Collection in Three Layered Wireless Sensor NetworksJournal of College of Education / Wasit, ISSN: 2417-1994
م. عمار عواد كاظمFacial Expression Recognition via MapReduce Assisted k-Nearest Neighbor AlgorithmInternational Journal of Computer Science and Information Security (IJCSIS), 1947-5500
م. عمار عواد كاظمA survey of spatial domain techniques in image steganographyJournal of Education College Wasit University
م. عمار عواد كاظمEdge Detection in Natural Scene Image Using Canny Edge Detector and Stroke Width Transforms (SWT)Iraqi Journal of Information Technology. V.9 N.3. 2019
م.علاء عبد الحسين دليحComparison study between LSB and DCT Based SteganographyIOSR Journal of Computer Engineering (IOSR-JCE) , e-ISSN: 2278-0661,p-ISSN: 2278-8727,
م.علاء عبد الحسين دليح3D anaglyph image watermarking approachConference: 9th Annual International Conference on Computer Science Education: Innovation and Technology (CSEIT 2018)At: Singapore
م.علاء عبد الحسين دليحSchema Matching Using Word-level Clustering for Integrating Universities’ CoursesIEEE , Electronic ISBN:978-1-6654-0432-7
م.جعفر صادق قطيفFacial expression recognition via mapreduce assisted k-nearest neighbor algorithmInternational Journal of Computer Science and Information Security
م.جعفر صادق قطيفAn Efficient Classifying On Several Datasets in Big Data Assistive K-Nearest Neighbor AlgorithmInternational Journal of Scientific Engineering and Research (IJSER) 2347-3878
م.م. زمن عبود رمضانText Detection in Natural Image by Connected Component LabelingAl-Mustansiriyah Journal of Science ISSN: 1814-635X (print), ISSN:2521-3520 (online)
م.م. زمن عبود رمضانEdge Detection in Natural Scene Image Using Canny Edge Detector and Stroke Width Transforms (SWT)Iraqi Journal of Information Technology. V.9 N.3. 2019
م.م. منار بشار مرتضىالبحث العلمي وتحدياته المستقبلة في العالم العربيمؤتمر:مجلة الجامعة العراقية ISSN 1813-4521