267
28 أغسطس
بحوث قسم الحاسبات
اسم الباحث | اسم البحث | اسم المجلة |
ا.م.د. نصير علي حسين | Predicting Breast Cancer Risk Using Subset of Genes | 6th international conference on control, decision and information technologies (CoDIT). IEEE |
ا.م.د. نصير علي حسين | A predictive model for liver disease progression based on logistic regression algorithm | Periodicals of Engineering and Natural Sciences (PEN) 7.3 (2019): 1255-1264 |
ا.م.د. نصير علي حسين | Detection Algorithm for Internet Worms Scanning that Used Internet Control Message Protocol | International Journal of Information and Computer Security 11.1 (2019): 17-32 |
ا.م.د. نصير علي حسين | Smart Shopping System with RFID Technology Based on Internet of Things | International Journal of Interactive Mobile Technologies (iJIM) eISSN: 1865-7923 |
ا.م.د. نصير علي حسين | Detection Algorithm for Internet Worms Scanning that Used Internet Control Message Protocol | International Journal of Information and Computer Security 11.1 (2019): 17-32 |
ا.م.د. سيف علي عبد الرضا | Efficient RTS and CTS Mechanism Which Save Time and System Resources | International Journal of Interactive Mobile Technologies (iJIM) |
ا.م.د. سيف علي عبد الرضا | English poems categorization using text mining and rough set theory | Bulletin of Electrical Engineering and Informatics 2089-3191 |
ا.م.د. سيف علي عبد الرضا | Improved scatter search algorithm based on meerkat clan algorithm to solve NP-hard problems | Periodicals of Engineering and Natural Sciences (PEN)(ISSN: 2303-4521) |
ا.م.د. سيف علي عبد الرضا | Wisdom Extraction from the English Poetry using SVMs | Solid State Technology |
ا.م.د. سيف علي عبد الرضا | Wisdom Extraction from English Poems Using Two-level Feature Selection with Rough Set Theory | International Journal of Advanced Science and Technology |
ا.م.د. سيف علي عبد الرضا | Choice of a Specific Path to Ensure Transmitting Data with no wasting in the Power of Nodes | Journal of Education College Wasit University |
ا.م.د. سيف علي عبد الرضا | Plate Detection and Recognition of Iraqi License Plate Using KNN Algorithm | Journal of Education College Wasit University |
أ.م.د.اسراء صالح حسون | A Survey of Botnet-Based DDoS Flooding Attacks of Application Layer: Detection and Mitigation Approaches | Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security |
أ.م.د.اسراء صالح حسون | An intelligent icmpv6 ddos flooding-attack detection framework (v6iids) using back-propagation neural network | IETE Technical Review |
أ.م.د.اسراء صالح حسون | Review of security vulnerabilities in the ipv6 neighbor discovery protocol | Information Science and Applications (ICISA) 2016 |
أ.م.د.اسراء صالح حسون | Energy Aware Dynamic Clustering Algorithm Using NIA-LEACH in Wireless Sensor Networks | Journal of Advanced Research in Dynamical and Control Systems |
أ.م.د.اسراء صالح حسون | Secured Environment for Cloud Integrated Fog and Mist Architecture | IEEE International Conference on Electrical Engineering and Photonics (EExPolytech) |
أ.م.د.اسراء صالح حسون | Review of Analytics Tools on Traffic for IoT and Cloud Based Network Environment | 3rd International Conference on Engineering Technology and its Applications (IICETA) |
أ.م.د.اسراء صالح حسون | A Survey of Botnet-Based DDoS Flooding Attacks of Application Layer | Handbook of research on modern cryptographic solutions for computer and cyber security. IGI Global |
م.رياض رهيف نويع | GFRecog: A Generic Framework with Significant Feature Selection Approach for Face Recognition | International Journa l of Engineering &Technology (IJET) (ISSN 2227-524X) |
م.رياض رهيف نويع | Automatic routing and fault detection in mobile adhoc networks | International Journal of Pure and Applied Mathematics, ISSN: 1311-8080 |
م.رياض رهيف نويع | E-HEALTH STATE IN MIDDLE EAST COUNTRIES: AN OVERVIEW | The Turkish Online Journal of Design, Art and Communication – TOJDAC ISSN: 2146-5193 |
م.رياض رهيف نويع | A Novel Multi-Attribute Authority Based Encryption for Controlling Access to Cloud Data | Journal of College of Education / Wasit, ISSN: 2417-1994 |
م.رياض رهيف نويع | Energy Efficient Mobile Data Collection in Three Layered Wireless Sensor Networks | Journal of College of Education / Wasit, ISSN: 2417-1994 |
م. عمار عواد كاظم | Facial Expression Recognition via MapReduce Assisted k-Nearest Neighbor Algorithm | International Journal of Computer Science and Information Security (IJCSIS), 1947-5500 |
م. عمار عواد كاظم | A survey of spatial domain techniques in image steganography | Journal of Education College Wasit University |
م. عمار عواد كاظم | Edge Detection in Natural Scene Image Using Canny Edge Detector and Stroke Width Transforms (SWT) | Iraqi Journal of Information Technology. V.9 N.3. 2019 |
م.علاء عبد الحسين دليح | Comparison study between LSB and DCT Based Steganography | IOSR Journal of Computer Engineering (IOSR-JCE) , e-ISSN: 2278-0661,p-ISSN: 2278-8727, |
م.علاء عبد الحسين دليح | 3D anaglyph image watermarking approach | Conference: 9th Annual International Conference on Computer Science Education: Innovation and Technology (CSEIT 2018)At: Singapore |
م.علاء عبد الحسين دليح | Schema Matching Using Word-level Clustering for Integrating Universities’ Courses | IEEE , Electronic ISBN:978-1-6654-0432-7 |
م.جعفر صادق قطيف | Facial expression recognition via mapreduce assisted k-nearest neighbor algorithm | International Journal of Computer Science and Information Security |
م.جعفر صادق قطيف | An Efficient Classifying On Several Datasets in Big Data Assistive K-Nearest Neighbor Algorithm | International Journal of Scientific Engineering and Research (IJSER) 2347-3878 |
م.م. زمن عبود رمضان | Text Detection in Natural Image by Connected Component Labeling | Al-Mustansiriyah Journal of Science ISSN: 1814-635X (print), ISSN:2521-3520 (online) |
م.م. زمن عبود رمضان | Edge Detection in Natural Scene Image Using Canny Edge Detector and Stroke Width Transforms (SWT) | Iraqi Journal of Information Technology. V.9 N.3. 2019 |
م.م. منار بشار مرتضى | البحث العلمي وتحدياته المستقبلة في العالم العربي | مؤتمر:مجلة الجامعة العراقية ISSN 1813-4521 |