Search

Showing total 61 results

Search Constraints

Start Over You searched for: Search Limiters Available in Library Collection Remove constraint Search Limiters: Available in Library Collection Topic computer science Remove constraint Topic: computer science Language arabic Remove constraint Language: arabic Journal al-rafidain journal of computer sciences and mathematics Remove constraint Journal: al-rafidain journal of computer sciences and mathematics
61 results

Search Results

1. Studying the Coefficient Curvelet for Aerial Image Segmentation

2. Apply Particle Swarm Optimization Algorithm to Measure the Software Quality

3. Application of Some Traditional Denoiseing Algorithms to Zoom-Out the Color Images

4. Representation of the Wavelet Transform 2D using A 5/3 Filter on the Field Programmable Gate Array

5. A New Method for Iris Segmentation and Feature Extraction in Spatial Domain

6. Design Educational Bag in Basics of Image Processing

7. Encrypted Data Hiding & Retrieval of an Image using LSB Based on RBF Network

8. Application of Traditional Denoising Algorithms to Zoom-In the Color Images

9. New Hybrid Quasi-Newton Algorithms for Large Scale Optimization

10. Dynamic Programming Algorithms for Solving Single Machine Scheduling Problems with a Fixed Complexity Time

11. Using the Update of Conditional BFGS in Constrained Optimization

12. Electronic System for Managing Theses of Computer Science College

13. The Impact of Mobility Models on the Consumption of Network Resources in the Internet of Things (IoT)

14. HPPD: A Hybrid Parallel Framework of Partition-based and Density-based Clustering Algorithms in Data Streams

15. Self-Scaling Variable Metric in Constrained Optimization

16. Applying Standard JPEG 2000 Part One on Image Compression

17. Predicting Bank Loan Risks Using Machine Learning Algorithms

18. OMU: An Ontology For Mosul University

19. Applying the Method of Enhancing Feedback Control On a 4D Hyperchaotic System

20. New Parameter of CG-Method for Unconstrained Optimization

21. Comparative Studying for Opinion Mining and Sentiment Analysis Algorithms and Applications

22. Arabic Digits Recognition by Using Unified Binary Templates in The Digital Images

23. Application of Chaotic Neural Network for Authentication using the Database

24. New Reverse Engineering Tool to Transform Oracle10g Code to Entity Relationship Model

25. Using the Genetic Algorithm in Developing a Method for Steganography

26. Analysis of Requirements Phase as a Step for Software Engineering Automation

27. Botne and Botnet Detection Survey

28. Design and Implementation of a Voice Broadcasting System from a PC to Mobile Devices

29. Building a Multi-Period Probability Dynamic Inventory Model with Application

30. Hiding Sensitive Frequent Itemsets over Privacy Preserving Distributed Data

31. GLM for Image Steganography Technique

32. Existing Object Oriented Design Metrics a Study and Comparison

33. State of Art: Semantic Web

34. Sound Signal De-noising Using Wavelet Transform

35. Generating a New Hyperchaotic Pan System Via State Feedback Control

36. A New Preconditioned Inexact Line-Search Technique for Unconstrained Optimization

37. Image Coding Using EZT Based on Contourlet Transformation

38. Hybrid hiding in multimedia files

39. Steganalysis Using KL Transform and Radial Basis Neural Network

40. Development a Special Conjugate Gradient Algorithm for Solving Unconstrained Minimization Problems

41. De-speckling 2D-Discrete Wavelet Transform with Hard Threshold Stage

42. Efficiency of Four Virtual LANs Switches with Equal Processing Times

43. Practical Comparison Between Genetic Algorithm and Clonal Selection Theory on KDD Dataset

44. A Suggested Point Search Algorithm for Circle Detection in Binary Images

45. An Investigation for Steganography using Different Color System

46. Hiding Techniques using Mp3

47. Best Band Selection using Principle Component Analysis Algorithm from Remote Sensing Data

48. Integration of Multispectral Images Using Two-Dimensional Wavelet Transformation

49. Chaotic Encryption Based on Biometric Key

50. Using Genetic Algorithm to Estimate (RNA) Estimator