Search

Showing total 88 results
88 results

Search Results

1. INTELLIGENT AUTHENTICATION FOR IDENTITY AND ACCESS MANAGEMENT: A REVIEW PAPER

2. Modeling Web Security Analysis Attacks with CySeMoL Tool

3. A Friendly Environment Approach for determination of paracetamol

4. A REVIEW ON INTERNET OF THINGS ARCHITECTURE FOR BIG DATA PROCESSING

5. Studying the Coefficient Curvelet for Aerial Image Segmentation

6. Image Encryption Algorithm Based on a Novel Six-Dimensional Hyper- Chaotic System

7. Text Detection in Natural Image By Connected Component Labeling

8. Study Fire Detection Based On Color Spaces

9. A STUDY ON DATA STREAMING IN FOG COMPUTING ENVIRONMENT

10. Elliptic Curve Video Encryption in Mobile Phone Based on Multi-Keys and Chaotic Map

11. Proposed Statistical model for Scoring and Ranking Sport Tournaments

12. Automatic Iraqi Cars Number Plates Extraction

13. Application of Some Traditional Denoiseing Algorithms to Zoom-Out the Color Images

14. Translator: Expert of ‘What’? Translator Training and the Changing/Changeful Identity of the Translator

15. A New Method for Iris Segmentation and Feature Extraction in Spatial Domain

16. Design Educational Bag in Basics of Image Processing

17. Encrypted Data Hiding & Retrieval of an Image using LSB Based on RBF Network

18. Application of Traditional Denoising Algorithms to Zoom-In the Color Images

19. Evaluation of Naïve Bayes Classification in Arabic Short Text Classification

20. Real-Time Monitoring System Based on Li-Fi Network Technology in Healthcare

21. ENHANCING HYBRID SECURITY APPROACH USING AES AND RSA ALGORITHMS

22. virus Detection Using Cryptography Algorithm

23. Electronic System for Managing Theses of Computer Science College

24. Adopting Text Similarity Methods and Cloud Computing to Build a College Chatbot Model

25. HUMAN IDENTIFICATION BASED ON FACE RECOGNITION SYSTEM

26. The Impact of Mobility Models on the Consumption of Network Resources in the Internet of Things (IoT)

27. Zoom Cloud Meeting: Media Alternatif dalam Pembelajaran Maharah Kalam di Tengah Wabah Virus Corona (Covid-19)

28. HPPD: A Hybrid Parallel Framework of Partition-based and Density-based Clustering Algorithms in Data Streams

29. Applying Standard JPEG 2000 Part One on Image Compression

30. Predicting Bank Loan Risks Using Machine Learning Algorithms

31. RELIABILITY IMPROVEMENT IN DISTRIBUTION SYSTEM BY INJECTED DISTRIBUTED GENERATION BASED ON ZONE BRANCHES METHODOLOGY

32. PENGEMBANGAN MEDIA PEMBELAJARAN BAHASA ARAB MELALUI APLIKASI VIDEOSCRIBE DALAM MENINGKATKAN MOTIVASI BELAJAR SISWA

33. COLOR FEATURE WITH SPATIAL INFORMATION EXTRACTION METHODS FOR CBIR: A REVIEW

34. Classifier Constructions in English and Kurdish

35. Deep Learning Machine using Hierarchical Cluster Features

36. Fingerprints Authentication Using Grayscale Fractal Dimension

37. Challenges and Security Vulnerabilities to Impact on Database Systems

38. Landmark based shortest path detection in alarm system

39. INSPECTION AND PROCESSING TECHNIQUES OF ASSESSMENT RESULTS IN LEARNING

40. Hifdz al-Qur’ân Bi ad-Dimâghi al-Yumnâ Bi Ma’had La Raib Hanifida, Jombang

41. Brain Image Segmentation Based on Fuzzy Clustering

42. Encrypted Image Retrieval System based on Features Analysis

43. Arabic Digits Recognition by Using Unified Binary Templates in The Digital Images

44. IMAGE HIDING ON HIGH FREQUENCY SPEECH COMPONENTS USING WAVELET PACKET TRANSFORM

45. Analyze video image fabric using Gabor filter to identify the target and track its motion

46. Classification of Anemia Images Based on Principal Component Analysis (PCA)

47. Developing Energy Aware Distributed Aggregation Tree Technique for Wireless Sensor Networks

48. The Usage of Cloud Computing in Education

49. Optimal Operating Point of a Hydrogen Fueled SOFC Models Using Al-Nour Software

50. A Comparative Study of Various Intelligent Algorithms based Path Planning for Mobile Robots