Search

Showing total 183 results

Search Constraints

Start Over You searched for: Search Limiters Full Text Remove constraint Search Limiters: Full Text Topic computer science Remove constraint Topic: computer science Language arabic Remove constraint Language: arabic
183 results

Search Results

1. INTELLIGENT AUTHENTICATION FOR IDENTITY AND ACCESS MANAGEMENT: A REVIEW PAPER

2. TEACHING WRITING SKILL BY USING BRAINWRITING STRATEGY

3. A Study of Synchronous and Asynchronous Approaches: Online Arabic Learning During The Covid-19 Pandemic

4. IMPLEMENTATION OF ARTIFICIAL INTELLIGENCE IN CONTROLLING THE TEMPERATURE OF INDUSTRIAL PANEL

5. Modeling Web Security Analysis Attacks with CySeMoL Tool

6. DIGITAL CYBER FORENSICS CONTRIBUTION FOR EMAIL ANALYSIS

7. A Friendly Environment Approach for determination of paracetamol

8. A REVIEW ON INTERNET OF THINGS ARCHITECTURE FOR BIG DATA PROCESSING

9. Studying the Coefficient Curvelet for Aerial Image Segmentation

10. A Survey Study on Relation Extraction for Web Pages

11. A High Speed Networks Applications and Requirements

12. Image Encryption Algorithm Based on a Novel Six-Dimensional Hyper- Chaotic System

13. Text Detection in Natural Image By Connected Component Labeling

14. Study Fire Detection Based On Color Spaces

15. A STUDY ON DATA STREAMING IN FOG COMPUTING ENVIRONMENT

16. Elliptic Curve Video Encryption in Mobile Phone Based on Multi-Keys and Chaotic Map

17. Apply Particle Swarm Optimization Algorithm to Measure the Software Quality

18. Preprocessing signal for Speech Emotion Recognition

19. Energy Saving Potential of Dynamic Lighting Control in Street Lighting Systems in Libya

20. CLINICAL DATA WAREHOUSE: A REVIEW

21. Scientific research in computer science

22. Automatic Vehicle Accident Detection Based on GSM System

23. Speed Controller of Three Phase Induction Motor Using Sliding Mode Controller

24. Proposed Statistical model for Scoring and Ranking Sport Tournaments

25. Automatic Iraqi Cars Number Plates Extraction

26. Hybrid Approach To Steganography System Based On Quantum Encryption And Chaos Algorithms

27. Application of Some Traditional Denoiseing Algorithms to Zoom-Out the Color Images

28. Translator: Expert of ‘What’? Translator Training and the Changing/Changeful Identity of the Translator

29. improvement Pole Method for numerical integration by partitioning and parallel processing

30. Representation of the Wavelet Transform 2D using A 5/3 Filter on the Field Programmable Gate Array

31. A New Method for Iris Segmentation and Feature Extraction in Spatial Domain

32. Design Educational Bag in Basics of Image Processing

33. Encrypted Data Hiding & Retrieval of an Image using LSB Based on RBF Network

34. Application of Traditional Denoising Algorithms to Zoom-In the Color Images

35. New Hybrid Quasi-Newton Algorithms for Large Scale Optimization

36. Dynamic Programming Algorithms for Solving Single Machine Scheduling Problems with a Fixed Complexity Time

37. Using the Update of Conditional BFGS in Constrained Optimization

38. PI-D CONTROLLER BASED ON AN IMPROVED CROW SEARCH ALGORITHM FOR CANCER GROWTH TREATMENT

39. Evaluation of Naïve Bayes Classification in Arabic Short Text Classification

40. Real-Time Monitoring System Based on Li-Fi Network Technology in Healthcare

41. virus Detection Using Cryptography Algorithm

42. XML Dataset and Benchmarks for Performance Testing of the CLS Labelling Scheme

43. PALM CLIPPING AND NONLINEAR COMPANDING TECHNIQUES BASED PAPR REDUCTION IN OFDM-DCSK SYSTEM

44. ENHANCING HYBRID SECURITY APPROACH USING AES AND RSA ALGORITHMS

45. Electronic System for Managing Theses of Computer Science College

46. USING PARTICLE SWARM OPTIMAZATION TO FIND OPTIMAL SIZING OF PV-BS AND DIESEL GENERATOR

47. Adopting Text Similarity Methods and Cloud Computing to Build a College Chatbot Model

48. HUMAN IDENTIFICATION BASED ON FACE RECOGNITION SYSTEM

49. Branch and Bound Algorithm and an Improvement for Calculating the Nearest Link of Building a Railway Network

50. The Impact of Mobility Models on the Consumption of Network Resources in the Internet of Things (IoT)