{"id":338,"date":"2019-08-28T20:15:37","date_gmt":"2019-08-28T17:15:37","guid":{"rendered":"https:\/\/edus.uowasit.edu.iq\/?page_id=338"},"modified":"2021-10-26T11:03:02","modified_gmt":"2021-10-26T08:03:02","slug":"%d8%a8%d8%ad%d9%88%d8%ab-%d9%82%d8%b3%d9%85-%d8%a7%d9%84%d8%ad%d8%a7%d8%b3%d8%a8%d8%a7%d8%aa","status":"publish","type":"page","link":"https:\/\/edus.uowasit.edu.iq\/?page_id=338","title":{"rendered":"\u0628\u062d\u0648\u062b \u0642\u0633\u0645 \u0627\u0644\u062d\u0627\u0633\u0628\u0627\u062a"},"content":{"rendered":"\n
\u0627\u0633\u0645 \u0627\u0644\u0628\u0627\u062d\u062b<\/strong><\/td>\u0627\u0633\u0645 \u0627\u0644\u0628\u062d\u062b<\/strong><\/td>\u0627\u0633\u0645 \u0627\u0644\u0645\u062c\u0644\u0629<\/strong><\/td><\/tr>
\u0627.\u0645.\u062f. \u0646\u0635\u064a\u0631 \u0639\u0644\u064a \u062d\u0633\u064a\u0646<\/td>Predicting Breast Cancer Risk Using Subset of Genes<\/td>6th international conference on control, decision and information technologies (CoDIT). IEEE<\/td><\/tr>
\u0627.\u0645.\u062f. \u0646\u0635\u064a\u0631 \u0639\u0644\u064a \u062d\u0633\u064a\u0646 <\/td>A predictive model for liver disease progression based on logistic regression algorithm<\/td>Periodicals of Engineering and Natural Sciences (PEN)\u00a07.3 (2019): 1255-1264<\/td><\/tr>
\u0627.\u0645.\u062f. \u0646\u0635\u064a\u0631 \u0639\u0644\u064a \u062d\u0633\u064a\u0646 <\/td>Detection Algorithm for Internet Worms Scanning that Used Internet Control Message Protocol<\/td>International Journal of Information and Computer Security\u00a011.1 (2019): 17-32<\/td><\/tr>
\u0627.\u0645.\u062f. \u0646\u0635\u064a\u0631 \u0639\u0644\u064a \u062d\u0633\u064a\u0646 <\/td>Smart Shopping System with RFID Technology Based on Internet of Things<\/td>International Journal of Interactive Mobile Technologies (iJIM) eISSN: 1865-7923<\/td><\/tr>
\u0627.\u0645.\u062f. \u0646\u0635\u064a\u0631 \u0639\u0644\u064a \u062d\u0633\u064a\u0646 <\/td>Detection Algorithm for Internet Worms Scanning that Used Internet Control Message Protocol<\/td>International Journal of Information and Computer Security\u00a011.1 (2019): 17-32<\/td><\/tr>
\u0627.\u0645.\u062f. \u0633\u064a\u0641 \u0639\u0644\u064a \u0639\u0628\u062f \u0627\u0644\u0631\u0636\u0627<\/td>Efficient RTS and CTS Mechanism Which Save Time and System Resources<\/td>International Journal of Interactive Mobile Technologies (iJIM)<\/td><\/tr>
\u0627.\u0645.\u062f. \u0633\u064a\u0641 \u0639\u0644\u064a \u0639\u0628\u062f \u0627\u0644\u0631\u0636\u0627 <\/td>English poems categorization using text mining and rough set theory<\/td>Bulletin of Electrical Engineering and Informatics 2089-3191<\/td><\/tr>
\u0627.\u0645.\u062f. \u0633\u064a\u0641 \u0639\u0644\u064a \u0639\u0628\u062f \u0627\u0644\u0631\u0636\u0627 <\/td>Improved scatter search algorithm based on meerkat clan algorithm to solve NP-hard problems<\/td>Periodicals of Engineering and Natural Sciences (PEN)(ISSN: 2303-4521)<\/td><\/tr>
\u0627.\u0645.\u062f. \u0633\u064a\u0641 \u0639\u0644\u064a \u0639\u0628\u062f \u0627\u0644\u0631\u0636\u0627 <\/td>Wisdom Extraction from the English Poetry using SVMs<\/td>Solid State Technology<\/td><\/tr>
\u0627.\u0645.\u062f. \u0633\u064a\u0641 \u0639\u0644\u064a \u0639\u0628\u062f \u0627\u0644\u0631\u0636\u0627 <\/td>Wisdom Extraction from English Poems Using Two-level Feature Selection with Rough Set Theory<\/td>International Journal of Advanced Science and Technology<\/td><\/tr>
\u0627.\u0645.\u062f. \u0633\u064a\u0641 \u0639\u0644\u064a \u0639\u0628\u062f \u0627\u0644\u0631\u0636\u0627 <\/td>Choice of a Specific Path to Ensure Transmitting Data with no wasting in the Power of Nodes<\/td>Journal of Education College Wasit University<\/td><\/tr>
\u0627.\u0645.\u062f. \u0633\u064a\u0641 \u0639\u0644\u064a \u0639\u0628\u062f \u0627\u0644\u0631\u0636\u0627 <\/td>Plate Detection and Recognition of Iraqi License Plate Using KNN Algorithm<\/td>Journal of Education College Wasit University<\/td><\/tr>
\u0623.\u0645.\u062f.\u0627\u0633\u0631\u0627\u0621 \u0635\u0627\u0644\u062d \u062d\u0633\u0648\u0646<\/td>A Survey of Botnet-Based DDoS Flooding Attacks of Application Layer: Detection and Mitigation Approaches<\/td>Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security<\/td><\/tr>
\u0623.\u0645.\u062f.\u0627\u0633\u0631\u0627\u0621 \u0635\u0627\u0644\u062d \u062d\u0633\u0648\u0646 <\/td>An intelligent icmpv6 ddos flooding-attack detection framework (v6iids) using back-propagation neural network<\/td>IETE Technical Review<\/td><\/tr>
\u0623.\u0645.\u062f.\u0627\u0633\u0631\u0627\u0621 \u0635\u0627\u0644\u062d \u062d\u0633\u0648\u0646 <\/td>Review of security vulnerabilities in the ipv6 neighbor discovery protocol<\/td>Information Science and Applications (ICISA) 2016<\/td><\/tr>
\u0623.\u0645.\u062f.\u0627\u0633\u0631\u0627\u0621 \u0635\u0627\u0644\u062d \u062d\u0633\u0648\u0646 <\/td>Energy Aware Dynamic Clustering Algorithm Using NIA-LEACH in Wireless Sensor Networks<\/td>Journal of Advanced Research in Dynamical and Control Systems<\/td><\/tr>
\u0623.\u0645.\u062f.\u0627\u0633\u0631\u0627\u0621 \u0635\u0627\u0644\u062d \u062d\u0633\u0648\u0646 <\/td>Secured Environment for Cloud Integrated Fog and Mist Architecture<\/td>IEEE International Conference on Electrical Engineering and Photonics (EExPolytech)<\/td><\/tr>
\u0623.\u0645.\u062f.\u0627\u0633\u0631\u0627\u0621 \u0635\u0627\u0644\u062d \u062d\u0633\u0648\u0646 <\/td>Review of Analytics Tools on Traffic for IoT and Cloud Based Network Environment<\/td>3rd International Conference on Engineering Technology and its Applications (IICETA)<\/td><\/tr>
\u0623.\u0645.\u062f.\u0627\u0633\u0631\u0627\u0621 \u0635\u0627\u0644\u062d \u062d\u0633\u0648\u0646 <\/td>A Survey of Botnet-Based DDoS Flooding Attacks of Application Layer<\/td>Handbook of research on modern cryptographic solutions for computer and cyber security. IGI Global<\/td><\/tr>
\u0645.\u0631\u064a\u0627\u0636 \u0631\u0647\u064a\u0641 \u0646\u0648\u064a\u0639<\/td>GFRecog: A Generic Framework with Significant Feature Selection Approach for Face Recognition<\/td>International Journa l of Engineering &Technology (IJET) (ISSN 2227-524X)<\/td><\/tr>
\u0645.\u0631\u064a\u0627\u0636 \u0631\u0647\u064a\u0641 \u0646\u0648\u064a\u0639 <\/td>Automatic routing and fault detection in mobile adhoc networks<\/td>International Journal of Pure and Applied Mathematics, ISSN: 1311-8080<\/td><\/tr>
\u0645.\u0631\u064a\u0627\u0636 \u0631\u0647\u064a\u0641 \u0646\u0648\u064a\u0639 <\/td>E-HEALTH STATE IN MIDDLE EAST COUNTRIES: AN OVERVIEW<\/td>The Turkish Online Journal of Design, Art and Communication \u2013 TOJDAC ISSN: 2146-5193<\/td><\/tr>
\u0645.\u0631\u064a\u0627\u0636 \u0631\u0647\u064a\u0641 \u0646\u0648\u064a\u0639 <\/td>A Novel Multi-Attribute Authority Based Encryption for Controlling Access to Cloud Data<\/td>Journal of College of Education \/ Wasit, ISSN: 2417-1994<\/td><\/tr>
\u0645.\u0631\u064a\u0627\u0636 \u0631\u0647\u064a\u0641 \u0646\u0648\u064a\u0639 <\/td>Energy Efficient Mobile Data Collection in Three Layered Wireless Sensor Networks<\/td>Journal of College of Education \/ Wasit, ISSN: 2417-1994<\/td><\/tr>
\u0645. \u0639\u0645\u0627\u0631 \u0639\u0648\u0627\u062f \u0643\u0627\u0638\u0645<\/td>Facial Expression Recognition via MapReduce Assisted k-Nearest Neighbor Algorithm<\/td>International Journal of Computer Science and Information Security (IJCSIS), 1947-5500<\/td><\/tr>
\u0645. \u0639\u0645\u0627\u0631 \u0639\u0648\u0627\u062f \u0643\u0627\u0638\u0645 <\/td>A survey of spatial domain techniques in image steganography<\/td>Journal of Education College Wasit University<\/td><\/tr>
\u0645. \u0639\u0645\u0627\u0631 \u0639\u0648\u0627\u062f \u0643\u0627\u0638\u0645 <\/td>Edge Detection in Natural Scene Image Using Canny Edge Detector and Stroke Width Transforms (SWT)<\/td>Iraqi Journal of Information Technology. V.9 N.3. 2019<\/td><\/tr>
\u0645.\u0639\u0644\u0627\u0621 \u0639\u0628\u062f \u0627\u0644\u062d\u0633\u064a\u0646 \u062f\u0644\u064a\u062d<\/td>Comparison study between LSB and DCT Based Steganography<\/td>IOSR Journal of Computer Engineering (IOSR-JCE) , e-ISSN: 2278-0661,p-ISSN: 2278-8727,<\/td><\/tr>
\u0645.\u0639\u0644\u0627\u0621 \u0639\u0628\u062f \u0627\u0644\u062d\u0633\u064a\u0646 \u062f\u0644\u064a\u062d <\/td>3D anaglyph image watermarking approach<\/td>Conference: 9th Annual International Conference on Computer Science Education: Innovation and Technology (CSEIT 2018)At: Singapore<\/td><\/tr>
\u0645.\u0639\u0644\u0627\u0621 \u0639\u0628\u062f \u0627\u0644\u062d\u0633\u064a\u0646 \u062f\u0644\u064a\u062d <\/td>Schema Matching Using Word-level Clustering for Integrating Universities\u2019 Courses<\/td>IEEE , Electronic ISBN:978-1-6654-0432-7<\/td><\/tr>
\u0645.\u062c\u0639\u0641\u0631 \u0635\u0627\u062f\u0642 \u0642\u0637\u064a\u0641<\/td>Facial expression recognition via mapreduce assisted k-nearest neighbor algorithm<\/td>International Journal of Computer Science and Information Security<\/td><\/tr>
\u0645.\u062c\u0639\u0641\u0631 \u0635\u0627\u062f\u0642 \u0642\u0637\u064a\u0641 <\/td>An Efficient Classifying On Several Datasets in Big Data Assistive K-Nearest Neighbor Algorithm<\/td>International Journal of Scientific Engineering and Research (IJSER) 2347-3878<\/td><\/tr>
\u0645.\u0645. \u0632\u0645\u0646 \u0639\u0628\u0648\u062f \u0631\u0645\u0636\u0627\u0646<\/td>Text Detection in Natural Image by Connected Component Labeling<\/td>Al-Mustansiriyah Journal of Science ISSN: 1814-635X (print), ISSN:2521-3520 (online)<\/td><\/tr>
\u0645.\u0645. \u0632\u0645\u0646 \u0639\u0628\u0648\u062f \u0631\u0645\u0636\u0627\u0646<\/td>Edge Detection in Natural Scene Image Using Canny Edge Detector and Stroke Width Transforms (SWT)<\/td>Iraqi Journal of Information Technology. V.9 N.3. 2019<\/td><\/tr>
\u0645.\u0645. \u0645\u0646\u0627\u0631 \u0628\u0634\u0627\u0631 \u0645\u0631\u062a\u0636\u0649<\/td>\u0627\u0644\u0628\u062d\u062b \u0627\u0644\u0639\u0644\u0645\u064a \u0648\u062a\u062d\u062f\u064a\u0627\u062a\u0647 \u0627\u0644\u0645\u0633\u062a\u0642\u0628\u0644\u0629 \u0641\u064a \u0627\u0644\u0639\u0627\u0644\u0645 \u0627\u0644\u0639\u0631\u0628\u064a<\/td>\u0645\u0624\u062a\u0645\u0631:\u0645\u062c\u0644\u0629 \u0627\u0644\u062c\u0627\u0645\u0639\u0629 \u0627\u0644\u0639\u0631\u0627\u0642\u064a\u0629 ISSN 1813-4521<\/td><\/tr>
<\/td><\/td><\/td><\/tr>
<\/td><\/td><\/td><\/tr>
<\/td><\/td><\/td><\/tr><\/tbody><\/table><\/figure>\n<\/body><\/html>\n","protected":false},"excerpt":{"rendered":"

\u0627\u0633\u0645 \u0627\u0644\u0628\u0627\u062d\u062b \u0627\u0633\u0645 \u0627\u0644\u0628\u062d\u062b \u0627\u0633\u0645 \u0627\u0644\u0645\u062c\u0644\u0629 \u0627.\u0645.\u062f. \u0646\u0635\u064a\u0631 \u0639\u0644\u064a \u062d\u0633\u064a\u0646 Predicting Breast Cancer Risk Using Subset of Genes 6th international conference on control, decision and information technologies (CoDIT). IEEE \u0627.\u0645.\u062f. \u0646\u0635\u064a\u0631 \u0639\u0644\u064a \u062d\u0633\u064a\u0646 A predictive model for liver disease progression based on logistic regression algorithm Periodicals of Engineering and Natural Sciences (PEN)\u00a07.3 (2019): 1255-1264 \u0627.\u0645.\u062f. […]<\/p>\n","protected":false},"author":7,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-338","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/edus.uowasit.edu.iq\/index.php?rest_route=\/wp\/v2\/pages\/338","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/edus.uowasit.edu.iq\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/edus.uowasit.edu.iq\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/edus.uowasit.edu.iq\/index.php?rest_route=\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/edus.uowasit.edu.iq\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=338"}],"version-history":[{"count":0,"href":"https:\/\/edus.uowasit.edu.iq\/index.php?rest_route=\/wp\/v2\/pages\/338\/revisions"}],"wp:attachment":[{"href":"https:\/\/edus.uowasit.edu.iq\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=338"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}