Content Posted in 2024
0544A New Ridge-Type Estimator for the Gamma regression model, Zakariya Yahya Algamal, Ahmed Maher Salih, and Mundher Abdullah Khaleel
2-Visible Submodules and Fully 2-Visible Modules, Mahmood S. Fiadh and Wafaa H. Hanoon
3D MODEL VISUALIZATION FUNCTION FOR RESPONSIVE WEB DESIGN, Sora Nazhan KAMAL and Abdullahi Abdu IBRAHIM
A Brief Review of Big Data Analytics Based on Machine Learning, Ahmed Hussein Ali, Mahmood Zaki Abdullah, Shams N. Abdul-wahab, and Mohammad Al sajri
A Classification of Al-hur Arabic Poetry and Classical ArabicPoetry by Using Support Vector Machine, Naïve Bayes, and LinearSupport Vector Classification, Muneef Abdullah Ahmed
A Comprehensive Analysis of Partition Dimensions in Efavirenz Abacavir Lamivudine Doravirine of Anti-HIV Drug Structures, R. Nithya Raj, R. Sundara Rajan, and Hijaz Ahmad
A Comprehensive Review of Software Development Life Cycle methodologies: Pros, Cons, and Future Directions, Qahtan M. Yas, Abdulbasit ALazzawi, and Bahbibi Rahmatullah
A Comprehensive Review on Cybersecurity Issues and Their Mitigation Measures in FinTech, Guma Ali, Maad M. Mijwil, Bosco Apparatus Buruga, and Mostafa Abotaleb
Adaptive Heterogeneity Index Cloudlet Scheduler for Variable Workload and Virtual Machine Configuration, D Gritto and P Muthulakshmi
Addressing Challenges in Hate Speech Detection Using BERT-Based Models: A Review, Jinan Ali Aljawazeri and Mahdi Nsaif Jasim
A Generating Distorted CAPTCHA Images Using a Machine Learning Algorithm, Saba Abdulbaqi Salman, Yasmin Makki Mohialden, and Nadia Mahmood Hussien
A Hybrid Integrated Model for Big Data Applications Based on Association Rules and Fuzzy Logic: A Review, Hind R. Ibraheem and Murtadha M. Hamad
A Machine Learning Algorithms for Detecting Phishing Websites: A Comparative Study, Dr. Mohammed A. Taha, Haider D. A. Jabar, and Widad K. Mohammed
Analysis of H-index and Papers Citation in Computer Science Field usingK-Means ClusteringAlgorithm, Omar Ibrahim Obaid
Analysis of the False Prediction of the Logistic Regression Algorithm in SQL Payload Classification and its Impact on the Principles of Information Security (CIA), Omar Salah F Shareef, Rehab Flaih Hasan, and Ammar Hatem Farhan
Analyzing the User'sSentiments of ChatGPT Using Twitter Data, Tarık Talan, Adem Korkmaz, and Cemal Aktürk
An Articulate Heart Attack Detection System Using Mine Blast Optimization (MBO) Based Multilayer Perceptron Neural Network (MLPNN) Model, N Rajesh Pandian, D Shanth, and N Selvaganesh
An Automated Lion-Butterfly Optimization (LBO) based Stacking Ensemble Learning Classification (SELC) Model for Lung Cancer Detection, N Ashokkumar, S Swapna Rani, V Suganya, S Selvi, and S Prema
An Automated Prostate-cancer Prediction System (APPS) Based on Advanced DFO-ConGA2L Model using MRI Imaging Technique, E Sathesh Abraham Leo and K Nattar Kannan
A New Approach to Improve Transmitting and Receiving Timing in Orthogonal Frequency Division Multiplexing (OFDM) Systems, Ghassan A. Abed
A New Simple 6D Hyperchaotic System withHyperbolic Equilibrium and Its Electronic Circuit, Zaidoon Sh Al-Talib and Saad Fawzi Al-Azzawi
An Integrative Computational Intelligence for Robust Anomaly Detection in Social Networks, Helina Rajini Suresh, K R. Harsavarthini, R Mageswaran, Hirald Dwaraka Praveena, C Gnanaprakasam, and C.Sakthi Lakshmi Priya
An Intelligent Prairie Dog Optimization (IPDO) and Deep Auto-Neural Network (DANN) based IDS for WSN Security, D Hemanand, P Mohankumar, N Manoj Kumar, S Vaitheki, and P Saranya
An investigation of Internet Service Provider selection criteria: A systematic literature review, Mohammed Naji, Sivadass Thiruchelvam, and Mohammed Khudari
A Novel Biased Probability Neural Network (BPNN) and Regularized Extreme Learning Machine (RELM) based Hearing Loss Prediction System, N Selvaganesh and D Shanthi
A Novel Deep Learning Approach for Classification of Bird Sound Using Mel Frequency Cepstral Coefficients, Aymen Saad, Muhammad Mun’im Ahmad Zabidi, Israa S. Kamil, and Usman Ullah Sheikh
A Novel Method for Hill Cipher Encryption and Decryption Using Gaussian Integers Implemented inBanking Systems, Saba Abdulbaqi Salman, Yasmin Makki Mohialden, Abbas Abdulhameed, and Nadia Mahmood Hussien
An Overview of Content-BasedImage Retrieval Methods And Techniques, M H. Hadid, Qasim Mohammed Hussein, Z T. Al-Qaysi, M A. Ahmed, and Mahmood M. Salih
(A-n) – Potent Operators on Hilbert Space, Laith K. Shaakir, Elaf S. Abdulwahid, and Anas A. Hijab
Ant Colony Optimization Algorithm in the Hopfield NeuralNetwork for Agricultural Soil Fertility Reverse Analysis, Hamza Abubakar and Abdullahi Muhammad
Applications for the groups , where prime upper than 9, Lemya Abd Alameer Hadi, Mahmood S. Fiadh, Niran Sabah Jasim, and Jabbar Abed Eleiwy
Applicationsof information technology (IT) in Iraq's petroleum industry, Saad Albawi, Whalaa alkhaisi, Yasser Almadany, and Mohammad Ibrahim Almashhadni
Approach for Detecting Arabic Fake News using Deep Learning, Khalid Shaker and Arwa Alqudsi
Approximation of an Inertial Iteration Method for a Set-ValuedQuasi Variational Inequality, Mohammad Akram
Arabic Chatbots Challenges and Solutions: A Systematic Literature Review, Soufiyan Ouali and Said El Garouani
A Review of Machine Learning Techniques Utilised in Self-Driving Cars, Zahraa Salah Dhaif and Nidhal K. El Abbadi
A Review of Optimization Techniques: Applications and Comparative Analysis, Ahmed Hasan Alridha, Fouad H. Abd Alsharify, and Zahir Al-Khafaji
A Review Of TextMining Techniques: Trends, and Applications In Various Domains, Hiba J. Aleqabie, Mais Saad Sfoq, Rand Abdulwahid Albeer, and Enaam Hadi Abd
A Review of the Integration Between Geospatial Artificial Intelligence and Remote Sensing, Abeer A. Mohamad Alshiha
Artificial Intelligence in Education: Mathematics Teachers’ Perspectives, Practices and Challenges, Mohammad A. Tashtoush, Yousef Wardat, Rommel Al Ali, and Shoeb Saleh
A Study of Blockchain-Based Internet of Things, Roheen Qamar
A Systematic Survey on the Research of AI-predictiveModelsforWastewater Treatment Processes, Varun Geetha Mohan, Al-Fahim Mubarak Ali, and Mohamed Ariff Ameedeen
Automated Fake News Detection System, Saja A. Al-obaidi and Tuba Çağlıkantar
Automatic Temperature Control System Using African vultures optimization algorithm, Mostafa Abdulghafoor Mohammed, Muntadher Khamees, and Dina Hassan Abbas
Auto–Transition in RADG based on chaotic System, Laith M. Kadhum, Ahmad Firdaus, Mohamad Fadli Bin Zolkipli, Syifak Izhar Hisham, Luhur Bayuaji, and Mohd Faizal Ab Razak
Big Data Classification Efficiency Based on Linear Discriminant Analysis, Ahmed Hussein Ali, Zahraa Faiz Hussain, and Shamis N. Abd
Big Data Streaming Platforms: A Review, Harish Kumar and Mohd Arfian Ismail
Bitcoin Layer Two Scaling Solutions:Lightening Payment Channels Network Comprehensive Review, Mechanisms, Challenges, Open Issues and Future Research Directions, Mohd Najwadi Bin Yusoff, Hasan Falah Hasan, and Shams Mhmood Abd Ali
Blockchain-Technology-Based Solutions for IOT Security, Israa Al-Barazanchi, Aparna Murthy, Ahmad Abdul Qadir Al Rababah, Ghadeer Khader, Haider Rasheed Abdulshaheed, Elika Daghighi, and Yitong Niu
Blood Cell Microscopic Image Classification in ComputerAided Diagnosis Using Machine Learning: A Review, Teba Mazin Makki and Khamael Al Dulaimi
Breast cancer images Classification using a new transfer learning technique, Mazin Abed Mohammed, Abdulrahman Abbas Mukhlif, and Belal Al Khateeb
Chaotic Dynamics in the 2D System of Nonsmooth OrdinaryDifferential Equations, Zain-Aldeen S. A. Rahman, Basil H. Jasim, and Yasir I. A. Al-Yasir
Characterizations ofsf-simple extension of topologies, Mohammed Abbas Yaseen and Raad Aziz Hussain
ChatGpt: Open Possibilities, Mohammad Aljanabi, Mohanad Ghazi, Ahmed Hussein Ali, and Saad Abas Abed
Classification of COVID-19 Symptoms Using MultilayerPerceptron, Mohd Arfian Ismail, Nurulain Nusrah Mohd Azam, Mohd Saberi Mohamad, Ashraf Osman Ibrahim, and Shermina Jeba
CNN-PS: Electroencephalogram Classification of Brain States Using Hybrid Machine -Deep Learning Approach, Osama Mohsin Abdulaziz and O A. Saltykova
Comparison of non-linear time series models (Beta-t-EGARCH and NARMAX models) with Radial Basis Function Neural Network usingReal Data, Hiba H. Abdullah, Nihad S. Khalaf, and Nooruldeen A. Noori
Computation of the Stabilizing Solution to Nash-Riccati Equations
Constant-Stress Partially Accelerated Life Testing for Weibull Inverted Exponential Distribution with Censored Data, Samah M. Ahmed
Convex Optimization Techniques for High-Dimensional Data Clustering Analysis: A Review, Ahmed Yacoub Yousif and Basad Al Sarray
Convolutional Neural Networks for Dementia Severity Classification: Ordinal Versus Regular Methods, Ambresh Bhadrashetty and P. Sandhya
Convolutional Neural Networks using FPGA-based Pipelining, Ahmed Hussein Ali and Gheni A. Ali
Correlation with the fundamental PSO and PSO modifications tobe hybrid swarm optimization, Raed A. Hasan, Suhe Shahab Najim, and Munef Abdullah Ahmed
COVID-19 Patients’ Health Monitoring System using FuzzyOntology and Internet of Things, Abdelhalim Hadjadj and Khaled Halimi
Critical factors affecting the adoption of open source software inpublic organizations, Mohanad G. Yaseen, Saad A. Abd, and Ibarhim Adeb
Decision-making techniques based on similarity measures ofpossibility interval fuzzy soft environment, Faisa Al Sharqi, Ashraf Al Quran, and Mamika Ujianita Romdhini
Design and Development of IoT-Enabled Power Management System for Smart Home with Enhanced Security Feature, Indu Bala and Bhukya Arun Kumar
Designing and Implementing an ECG Reader and Heart Disease Classification Device Using Deep Learning (Comprehensive Review), Ghasaq Saad Jameel, M N. Al-Turfi, Dr. Hussain Falih Mahdi, and Saba Nasser Hussain
Design of Quality Improvement Technique Through Ridgelet Transform on Watermarked Video, Rasha I. Ahmed and Sura Mazin Ali
Detecting Abnormal Driving Behavior Using Modified DenseNet, Aisha Ayad and Matheel E. Abdulmunim
Detecting Arabic Misinformation Using an Attention Mechanism-Based Model, Bashar M. Nema and Mohammed Haqqi Al-Tai
Detecting Data Poisoning Attacks in Federated Learning for Healthcare Applications Using Deep Learning, Mohammed Aljanabi, Alaa Hamza Omran, and Sahar Yousif Mohammed
Detecting the Speaker Language Using CNN Deep LearningAlgorithm, Fawziya M. Rammo and Mohammed N. Al-Hamdani
Detection of anomalies and Data Drift in a time-series dismissal prediction system, Nataliya Boyko and Roman Kovalchuk
Detection of pedophilia content online: A case study usingTelegram, Shafran Packeer and D.T.V Kannangara
Development of an Intelligent Detection Method of DC Series ArcFault in Photovoltaic System Using Multilayer Perceptron andBi-Directional Long Short-Term Memory, Alaa Hamza Omran, Dalila Mat Said, Siti Maherah Hussin, Sadiq H. Abdulhussein, Nasarudin Ahmad, and Haidar Samet
Development of Robotto ImproveLearning of Programming Skills among Students, Aminu Aminu Muazu, Ahmad Sobri Hashim, Mohammad Ateff Md Yusof, and Noreen Izza Arshad
Development of synthetic data generator for ornament based on data mining techniques, Ahmed Hussein Ali, Saad Ahmed Dheyab, and Rasha Talal Hameed
Develop Secure Software specifications for Android App concealing the Information and Safeguarding Data, Huda Abdulaali Abdulbaqi, Ahmmad Mohamad Ghandour, and Thekrayat Abbas Jawad
Distinguishing between Student-Authored and ChatGPT-Generated Texts:A Preliminary Exploration of HumanEvaluation Techniques, Md Saiful Alam, Adelina Asmawi, Mohammad Hamidul Haque, Md Nurullah Patwary, Md Mohib Ullah, and Sayeda Fatema
Double-Stage Shrinkage Estimation of Reliability Function forBurr XII Distribution, Iman Jalil Atewi, Alaa Khlaif Jiheel, and Ashok Ramdas Rao Shanubhogue
DriverDrowsyandYawnSystemAlertUsingDeepCascadeConvolutionNeuralNetworkDCCNN, Zainab Ali Abbood and Janan Farag Yonan
EAMSA 512: New 512 Bits Encryption Algorithm Based on Modified SALSA20, Nashwan Dheyaa Zaki, Jolan Rokan Naif, Israa S. Ahmed, and Haider K. Hoomod
Early Detection of Cardiovascular Disease Utilizing Machine Learning Techniques: Evaluating the Predictive Capabilities of Seven Algorithms, Maad M. Mijwil, Alaa K. Faieq, and Mohammad Aljanabi
Economic Order Quantity in a Fuzzy Environment for a PeriodicInventory Model with Variable Demand, K Kalaiarasi, H Mary Henrietta, M Sumathi, and A Stanley Raj
E-Learning Management Technology Integration for Laboratory Usage, Mohammed Khaleel Hussein, Mohammed Ahmed Subhi, Saleh Mahdi Mohammed, and Mayasah Al-khateeb
Elementary Treatise on Melted-like Curves Derived from CenterEllipse and Circle, Laith H. M Al-ossmi
Embedded Deep Learning to Improve the Performance of Approaches for Extinct Heritage Images Denoising, Ali Salim Rasheed, Alaa Hamza Omran, and Reem D. Ismail
Embedded Schemes of the Runge-Kutta Type for the Direct Solution of Fourth-Order Ordinary Differential Equations, F. A. Fawzi and Nizam G. Ghawadri
Emotion Recognition Using Various Measures and Computational Methods: Review, Abir Hamrouni and Fatima Bendella
Energy Optimization in Wireless Sensor Networks: A Review, Zahraa Hammodi, Ahmed Al Hilli, and Mohanad Al-Ibadi
Energy Optimized LDPC Codes for Next-Generation MIMO OFDM Systems, Indu Bala, Komal Arora, and Maad M. Mijwil
Enhanced Cancer Subclassification Using Multi-Omics Clustering and Quantum Cat Swarm Optimization, Mazin Abed Mohammed and Ali Mahmoud Ali
Enhancement Methods for Energy Consumption Prediction in Smart House based on Machine Learning, Musa A. Hameed, Esam T. Yassen, and Wesam M. Jasim
Enhancing Efficiency and Fine-Grained Control in Redactable Blockchains with EPBCHF, Mohd Najwadi Yusoff, Shams Mhmood Abd Ali, and Hasan Falah Hasan
Enhancing Student'sPerformance Classification Using Ensemble Modeling, Ahmed Adil Nafea, Muthanna Mishlish, Ali Muwafaq haban Shaban, Mohammed M. AL-Ani, Khattab M Ali Alheeti, and Hussam J. Mohammed
Enhancing the Zebra Optimization Algorithm with Chaotic Sinusoidal Map for Versatile Optimization, D Anand, Osamah Ibrahim Khalaf, and G Rajesh Chandra
Enhancing Wireless Sensor Networks Features Using Software-Defined Networking Techniquesand ACO Algorithms, Ghassan A. Abed
Ensemble Machine Learning Techniques for Attack Prediction inNIDS Environment, T. Sreenivasula reddy and R Sathya
Essentially Retractable Modules Relative To A Submodule And Some Generalizations, Shukur Neamah Al-Aeashi and Fatimah Hussein Al-Bakaa
Estimating Long-run Elasticity betweenCrude Oil Consumption, Real Oil Price, and Real GDP in Global Markets, Aysar Y. FAHAD, Ahmad Hussei BATTAL, and Asmaa YASEEN
Evaluation Algorithms Based on Fuzzy C-means for the DataClustering of Cancer Gene Expression, Omar Al- anabee and Basad Al Sarray
Explainable Machine Learning Approach enables Computer-Aided Identification System for Children Autism Spectrum Disorder (C-ASD), Karrar Hameed Abdulkareem, Zainab Hussein Arif, and Mazin Abed Mohammed
Exploring Advanced Analysis Technique for Shallow Water FlowModels with Diverse Applications, Rasha F. El-Agamy, Hijaz Ahmad, Gamal M. Ismail, Ibrahim Alraddadi, Mohammad Aljanabi, and Umar Farooq
Extensive Review of State-of-the-Art Classification Techniques for Cuneiform SymbolImaging: Open Issues and Challenges, Belal Al Khateeb, Farah Maath, and Maha Mahmood
Face Detection Performance Using CNNs and Bug BonutyProgram (BBP), Yasmin Makki Mohialden, Saba Abdulbaqi Salman, and Nadia Mahmood Hussien
Facial Recognition Technology-Based AttendanceManagement System Application in Smart Classroom, Ahmad S. Lateef and Mohammed Y. Kamil
FCNN Model for Diagnosis and Analysis of Symmetric KeyCryptosystem, Ali H. Alwan and Ali H. Kashmar
Formulating an Advanced Security Protocol for Internet of Medical Things based on Blockchain and Fog Computing Technologies, Rasha Halim Razzaq and Mishall Al Zubaidie
Fuzzy Soc-T-ABSO Sub-Modules, Saad S. Marie and Hatam Y. Khalaf
Fuzzy-weightedzero-inconsistency, FWZIC,Multi-criteria Decision Making, MCDM, Weighting Methods, Fuzzy Set, Mahmood M. Salih and Rasha A. Yousif
Gene Expression Analysis via Spatial Clustering and EvaluationIndexing, Awrad D. Salman
Gradient Techniques to Predict Distributed Denial-Of-ServiceAttack, Roheen Qamar
HardVoting Approach using SVM, Naïve Bays and Decision Tree forKurdish Fake NewsDetection, Rania Azad M. San Ahmed
Has the Future Started? The Current Growth of ArtificialIntelligence, Machine Learning, and Deep Learning, Maad M. Mijwil, Karan Aggarwal, Sonia Sonia, Abdel Hameed Al-Mistarehi, Safwan Alomari, Murat Gök, Anas M. Zein Alaabdin, and Safaa H. Abdulrhman
Healthcare Privacy-Preserving Federated Transfer Learning using CKKS-Based Homomorphic Encryption and PYHFELTool, Anmar A. Al-Janabi, Sufyan Al Janabi, and Belal Al Khateeb
Heart disease classification using optimized Machine learning algorithms, Mohammad Abood Kadhim and Abdulkareem Merhej Radhi2
Homotopy analysis method for solving fuzzy Nonlinear Volterra integral equation of the second kind, Rana Hussein and Moez Khenissi
Hybrid Honey Badger Algorithm with Artificial Neural Network(HBA-ANN)for Website Phishing Detection, Muhammad Arif Mohamad, Muhammad Aliif Ahmad, and Zuriani Mustaffa
Hybrid Model for Motor Imagery Biometric Identification, Z. T. Al-Qaysi, Rasha A. Aljanabi, M A. Ahmed, and Mahmood M. Salih
Identification Method of Power Internet Attack Information Based on Machine Learning, Yitong Niu and Korneev Andrei
Identification of Faulty Sensor Nodes in WBAN Using Genetically Linked Artificial Neural Network, Israa Ibraheem Al_Barazanchi, Haider Rasheed Abdulshaheed, Mayasa M. Abdulrahman, and Jamal Fadhil Tawfeq
Image Steganography Based on ChaoticFunction andRandomize Function, Rusul Mansoor Al-Amri, Dalal N. Hamood, and Alaa Kadhim Farhan
Image Watermarking using Firefly Algorithm–IWT-SVD for Copyright Protection, Anjahul Khuluq, Ferda Ernawan, Agit Amrullah, and Mohd Arfian Ismail
Impact of Chat GPT on Scientific Research: Opportunities, Risks, Limitations, and Ethical Issues, Omar Ibrahim Obaid, Ahmed Hussein Ali, and Mohanad Ghazi Yaseen
Impact of Couple Stress withRotation on Walters,B Fluid in Porous Medium, Zainab A. Jaafar, Mizal H. Thawi, and Liqaa Z. Hummady
Implementing an Automated Inventory Management System for Small and Medium-sized Enterprises, Mohanad Ghazi, Hayder Sabah Salih, and Mohammad Al janabi
Improved Artificial Neural Networks Based Whale Optimization Algorithm, Mostafa Abdulghafoor Mohammed, Royida A.Ibrahem Alhayali, Mostafa Khaled Abd Alrahman Aladamey, Mohammed Rashid Subhi, Amiza Amir, and Zahraa A. Abdalkareem
Improves Intrusion Detection Performance InWireless Sensor Networks Through Machine Learning, Enhanced By An Accelerated Deep Learning Model With Advanced Feature Selection, Hadeel M. Saleh, Hend Marouane, and Ahmed Fakhfakh
Improving Process Efficiency in Iraqi universities:a proposed management information system, Mohanad Ghazi Yaseen, Hayder Sabah Salih, Mohammed Aljanabi, Ahmed Hussien Ali, and Saad Abbas Abd
Improving security in the 5G-based medicalInternet of Things toimprove the qualityofpatient services, Israa Ibraheem Al_Barazanchi, Kholood J. Moulood, and Muneer Sameer Gheni Mansoor
Integrating Artificial Intelligence in Public Relations and Media: A Bibliometric Analysis of Emerging Trends and Influences, Akhmed Kaleel and Mohammed Shukri Alomari
Integrating Edge Computing and Software Defined Networking in Internet of Things: A Systematic Review, Mohamed Ariff Ameedeen, Imran Edzereiq Kamarudin, Mohd Faizal Ab Razak, and Azlee Zabidi
Integrating Image Data Fusion and ResNet Method for Accurate Fish Freshness Classification, Yahya Layth Khaleel, Mustafa Abdulfattah Habeeb, and Ghadeer Ghazi Shayea
Integrating Intelligent Systems in MANET-IoT Environment based on Subjective Context, Qahtan M. Yas and Abdulbasi ALAZZAWI
Intelligent Detection of Distributed Denial of Service Attacks: A Supervised Machine Learning and Ensemble Approach, Mustafa S. Ibrahim Alsumaidaie, Khattab M. Ali Alheeti, and Abdul Kareem Alaloosy
Intelligent Household Load Identification Using Multilevel Random Forest on Smart Meters, Israa Badr Al-Mashhadani and Waleed Khaled
Internet applications in libraries and information centers, Mohammed Thakir haamood
Investigating Intrusion Detection System Using Federated Learning for IoT Security Challenges, Mohammed Q. Mohammed, Zena Abd Alrahman, and Aouf R. Shehab
Investigating the Use of an Adaptive Neuro-Fuzzy InferenceSystem in Software Development Effort Estimation, Zainab Rustum Mohsin
Kernel semi-parametric model improvement based on quasi-oppositional learning pelican optimization algorithm, Firas Ahmed Yonis AL-Taie, Omar Saber Qasim, and Zakariya Yahya Algamal
LEARNERS' EMOTIONS ESTIMATION USING VIDEO PROCESSING TECHNIQUES FOR OPTIMUM E-LEARNING EXPERIENCE, Mohammed Ahmed Subhi, Mohammed Khaleel Hussein, Ali Abdullah Ali, and Saleh Mahdi Mohammed
Main challenges (generation and returnedenergy) in a deep intelligent analysis technique for renewable energy applications, Samaher Al Janabi, Ghada S. Mohammed, and Thekra Abbas
Metaverse: open possibilities, Mohammed Aljanabi and Sahar Yousif Mohammed
Mobile Augmented Reality Framework in STEM Education: A Systematic Literature Review, Danakorn Nincarean Eh Phon and Nur Fatin Razlieya Binti Mohd Razali
Modelling Security Factors Influencing E-Wallet Adoption in Malaysia, Adi Badiozaman Ruhani, Nur Suhaili Mansor, Hapini Awang, Mohamad Fadli Zolkipli, Khuzairi Mohd Zaini, and Abderrahmane Benlahcene
Modified Jackknifed Ridge Estimator in Bell Regression Model: Theory, Simulation and Applications, Zakariya Yahya Algamal, Adewale F. Lukman, B. M Golam Kibria, and Arowolo Olatunji Taofik
More-SPEED: Enhancing Protein Activity Prediction from DNA Sequences, Samahe Al Janabi and Zena Kadhuim
Multi-Strategy Fusion forEnhancingLocalization in Wireless Sensor Networks (WSNs), Mahdi Abed Salman and Muhammed Abaid Mahdi
New Structures of Soft Permutation in Commutative Q-Algebras, Moataz Sajid Sharqi and Shuker khalil
New Three-Parameter Exponentiated Benini Distribution: Properties and Applications, Elif Yıldırım, Gamze Özel, Christophe Chesneaul, Farrukh Jamal, and Ahmed M. Gemeay
New Virtual Environment Based on Python Programming, Omar Abdulwahabe Mohamad
Numerical Approach for Solving fuzzy Integro-DifferentialEquations, Fatima K. Dawood and Rokan Khaji
Numerical Solution of Fractional Integro-Differential EquationsVia Fourth-Degree Hat Functions, Jehad K. Mohammed, Ayad R. Khudair, and N Rajesh Pandian
Offline Handwritten Signature Identification based on Hybrid Features and Proposed Deep Model, Zainab Hashim, Hanaa Mohsin, and Ahmed Alkhayyat
On Differential Subordination and Superordination for UnivalentFunction Involving New Operator, Mustafa I. Hameed, Buthyna Najad Shihab, and Samaila Bello
On(n,)- quasi Operators, Salim Dawood Mohsen
On the Involutive Matrices of the kth Degree, Hasan KELE ̧S and Basaad Ali Hussain
ParametersEstimation of a Proposed Non-Homogeneous Poisson Process and Estimation of the Reliability Function Using the Gompertz Process: A Comparative Analysis of Artificially Intelligent and Traditional Methods, Adel Sufyan Hussain, Yaseen Adel Oraibi, Muthanna Subhi Sulaiman, and Ahmed Sami Abdulghafour
Particle Swarm Optimization for Penalize Cox Models in Long-Term Prediction of Breast Cancer Data, Ehab Abbas Fadhil and Basad Al Sarray
Phishing Attacks Detection by Using Artificial Neural Networks, Majeed Jasim Nabet and Loay E. George
Picard and Adomian decomposition methods for a fractionalquadratic integral equation viaζ-generalizedξ-fractional integral, Ali Hasan Ali, Alan Jalal Abdulqader, Saleh S. Redhwan, Omar Bazighifan, and Awad T. Alabdala
Posinormality of Operators Treated by Weyl's Theorem on Unbounded Hilbert Space, Abbas G. Rajij, Dalia S. Ali, Huseyin Cakalli, and Nadia M. G. Al-Saidi
Predicting Diabetes Disease Occurrence Using Logistic Regression: An Early Detection Approach, Ahmad Shaker Abdalrada, Ali Fahem Neamah, and Hayder Murad
Prompt Engineering: Guiding the Way to Effective Large Language Models, Mohammad Aljanabi, Mohanad Ghazi Yaseen, Ahmed Hussein Ali, and Mostafa Abdulghafoor Mohammed
Prompt Engineering: Unleashing the Power of LargeLanguage Models to Defend Against Social Engineering Attacks, Prof. Bashar M. Nema, Ahmed I. Nezer, and Wisam Makki Salim
Properties of Chmielinski-orthogonality by using Kadets-Kleeproperty, Saied A. Jhonny and Buthainah A. A. Ahmed
Proposed method for scale drawing calculating depending on theline detector and length detector, Huda Dheyauldeen Najeeb and Rana Fareed Ghani
Proposed New Framework Scheme for Path Loss in Wireless BodyArea Network, Israa Al_Barazanchi, Yitong Niu, Haider Rasheed Abdulshaheed, Wahidah Hashim, Ammar Ahmed Alkahtani, Elika Daghighi, Zahraa A. Jaaz, and Shihab A. Shawkat
Rad-Quasi-Prime Submodules, Rana NooriMajeed, Ghaleb Ahmed Hammood, Mahmood S. Fiadh, and Lemya Abd Alameer Hadi
Rao-SVM Machine Learning Algorithm for Intrusion Detection System, Shamis N. Abd, Mohammad Alsajri, and Hind Raad Ibraheem
Real-TimeLie-Speech Determination Using Voice-Stress Technology, Fadi K. Al-Dhaher, Duraid Y. Mohammed, Mohammed Khalaf, Khamis A. Al-Karawi, Mohammad Sarfraz, and Muhammad Mazin Al Maathidi
Remove NoiseFrom Movies by Using Hybrid Smooth Algorithm, Faten Azeez Mustafa, Hanan Hamid Ali, and Aseel Waleed Ali
Resource Allocation and Edge Computing for Dual Hop Communication in Satellite Assisted UAVs enabled VANETs, Ahmed Adil Nafea, Mustafa Maad Hamdi, and Sami Abduljabbar Rashid
Review of Mathematical Modelling Techniques with Applicationsin Biosciences, Ahmed Hasan Alridha, Ahmed Sabah Al-Jilawi, and Fouad H. Abd Alsharify
Review on unrelated parallel machine scheduling problem with additional resources, Munther H. Abed and Mohd Nizam Mohmad Kahar
Robust-Fragile Watermarking Using Integer Wavelet Transform for Tampered Detection and Copyright Protection, Hendra Budi, Ferda Ernawan, and Agit Amrullah
Robust Image Watermarking Based on IWT-DCT-SVD for Copyright Protection, Syafiqul Shubuh, Ferda Ernawan, Agit Amrullah, and Prajanto Wahyu
Robust Image Watermarking Based on LiftingWavelet Transfrom-Hessenberg Decomposition for Copyright Protection, Ferda Ernawan, Agung Sudrajat, and Agit Amrullah
Robust Image Watermarking Based on Schur Decomposition, Ahmad Toha, Ferda Ernawan, and Agit Amrullah
Sadik and complex Sadik integral transforms of system of ordinary differential equations, Intidhar Zamil Mushtt and Emad A. Kuffi
Secure Blind Medical Image Watermarking Using Hybrid Feature Extraction Techniques, Sawsan D. Mahmood, Yassine Aribi, Fadoua Drira, and Adel M. Alimi
Secure Healthcare Systems and Big Data: A Bibliometrics Analysis, Rasha Talal Hameed, Saad Ahmed Dheyab, Saba Abdulbaqi Salman, Ahmed Hussein Ali, and Omar Abdulwahabe Mohamad
Secure Heart Disease Classification System Based on Three Pass Protocol and Machine Learning, Randa shaker Abd-Alhussain, Hadab Khalid Obayes, and Farah Al Shareefi
Security Attacks on E-Voting System Using Blockchain, Saba Abdulbaqi Salman, Sufyan Al Janabi, and Ali Makki Sagheer
SEEK Mobility Adaptive Protocol Destination Seeker Media Access Control Protocol for Mobile WSNs, Zainab Ali Abbood, Atheel Sabih Shaker, Omar F. Youssif, Mohammad Aljanabi, and Mahdi S. Mahdi
Sentiment Analysis using Optimised Feature Sets in DifferentFacebook/Twitter Dataset Domains with Big Data, Mohammed Ibrahim Al-mashhadani, Kilan M. Hussein, Enas Tariq Khudir, and Muhammad lyas
Smart Door controller for handicapped people based on face recognition and voice command technique, Rana Talib Rasheed
Socio-Transactional Impact of Recency, Frequency, and MonetaryFeatures oN Customers’ Behaviour in Telecoms’ Churn Prediction, Ayodeji O.J Ibitoye, Clement ONIME, Nashwan Dheyaa Zaki, and Olufade F.W Onifade
Soft Computing-Based Generalized Least Deviation MethodAlgorithm for Modeling and Forecasting COVID-19 usingQuasilinear Recurrence Equations, Mostafa Abotaleb
Solving tri-criteria:total completion time, total late work, and maximum earliness by using exact, and heuristic methods on single machine scheduling problem, Nagham M. Neamah and Bayda A. Kalaf
Some Methods to Estimate the Parameters of GeneralizedExponential Rayleigh Model by Simulation, Rehab Noori Shalan and Iden Hassan Alkanani
SPEAKER IDENTIFICATION MODEL BASED ON DEEPNURAL NETWOKS, Saadaldeen Rashid Ahmed, Zainab Ali Abbood, hameed Mutlag Farhan, Baraa Taha Yasen, Mohammed Rashid Ahmed, and Adil Deniz Duru
Spectral CG Algorithm for Solving Fuzzy Nonlinear Equations, Mezher M. Abed, Ufuk Öztürk, and Hisham M. Khudhur
Stable Heterogeneous Traffic Flow with Effective Localization and Path Planning in Wireless Network Connected and Automated Vehicles in~Internet of Vehicular Things (IoVT), Ahmed N. Rashid and Ahmed Mahdi Jubair
Structural Reliability and Optimization Using Differential Geometric Approaches, Saad Abbas Abed, Mona Ghassan, Shaemaa Qaes, Mahmood S. Fiadh, and Zaid Amer Mohammed
SUMER: A New Family of Lightweight and Traditional Block Ciphers with Multi-Modes, Omar A. Dawood
Survey: (Blockchain-Based Solution for COVID-19 and SmartContract Healthcare Certification), Noor Sabah, Ali Sagheer, and Omar Dawood
Survey of Intrusion Detection Using Deep Learning in the Internetof Things, Baraa I. Farhan and Ammar D. Jasim
Survey on Generative Adversarial Behavior in Artificial NeuralTasks, Roheen Qamar, Naomi Bajao, Iswanto Suwarno, and Fareed Ahmed Jokhio
Tackling the Berth Allocation Problem via Harmony Search Algorithm, Hazlina Hamdan, Bilal Ahmed, Abdullah Muhammed, and Nor Azura Husin
Taxonomy, Open Challenges, Motivations, and Recommendations in Driver Behavior Recognition: A Systematic Review, Mohamed A. Ahmed, Mohammed Basim Omar, Harith A. Hussein, Z.T Al Qaysi, Mahmood M. Salih, S A. Hamddi, Qabas A. Hameed, and Reem D. Ismail
The Early Warning of Financial Failurefor Iraqi Banks Based on Robust Adaptive Lasso Logistic Regression, Hassan S. Uraibi and Aqeel Jaafar Abbas
The Gompertz Nadarajah-Haghighi (GoNH) Distribution Properties with Application to Real Data, Dalya Dh Ahmed and Mundher A. Khaleel
The New Strange Generalized Rayleigh Family: Characteristics and Applications to COVID-19 Data, Alaa Abdulrahman Khalaf and Mundher Abdullah haleel
The optimal scaling factor based on SecantMethod for imagewatermarkingusing the hybrid DTCWT-DCT domain, Mohamed Lebcir, Suryanti Awang, and Ali Benziane
The Significance of Cannibalism, Panic, and Sanctuary in the Interactions Between Prey and Predator with a Stage Structure, Ahmed Sami Abdulghafour and Raid Kamel Naji
The Significance of Machine Learning and Deep Learning Techniques in Cybersecurity: A Comprehensive Review, Maad M. Mijwil, Israa Ezzat Salem, and Marwa M. Ismaeel
The Use of DCNN for Road Path Detection and Segmentation, Nada Mohammed Murad, Lilia Rejeb1, and Lamjed Ben Said
Towards a new curvature produced by the tangent of a circle andan ellipse: The Nada’s curve, Laith H. M. Al-ossmi and Baqir Ali Zardari
Towards Artificial Intelligence-Based Cybersecurity: The Practices and ChatGPT Generated Ways to Combat Cybercrime, Maad M. Mijwil, Mohammad Aljanabi, and ChatGPT ChatGPT
TWO-STAGE SHRINKAGE BAYESIAN ESTIMATORS FORTHE SHAPE PARAMETER OF PARETO DISTRIBUTIONDEPENDENT ON KATTI’S REGIONS, Marwa Hashem Abd Ali, Alaa Khlaif Jiheel, and Zuhair Al Hemyari
Unlocking the Potential: Synergizing IoT, Cloud Computing, and Big Data for a Bright Future, Zeena N. Al-kateeb and Dhuha Basheer Abdullah
Unveiling The Shadows: The Influence of Anonymity and Fake Accounts on Cyberbully Intention in Social Media, Muzdalini Malik, Hapini Awang, Nur Suhaili Mansor, Mohamad Fadli Zolkipli, Khuzairi Mohd Zaini, and Abdulrazak F. Shahatha Al-Mashhadani
Using Ideal Time Horizon for Energy Cost Determination, Raed Abdulkareem Hasan, Hadee W. Abdulwahid, and Arwa Sahib Abdalzahra
Various Closed-Form Solitonic Wave Solutions of Conformable Higher-Dimensional Fokas Model in Fluids and Plasma Physics, Mohammad A. Tashtoush, Israa A. Ibrahim, Wafaa M. Taha, Mizal H. Dawi, Ali F. Jameel, and Emad A. Az-Zo’bi
Vertex and region colourings of planar idempotent divisor graphsof commutative rings., Mohammed N. Authman, Husam Q. Mohammad, and Nazar H. Shuker
W-visible submodules and W-fully visible modules, Mahmood S. Fiadh, Buthyna N. Shihab, and Munther H. Abed