• Home
  • Search
  • Browse Collections
  • My Account
  • About
  • DC Network Digital Commons Network™
Skip to main content
Iraqi Journal for Computer Science and Mathematics
  • Home
  • My Account
  • FAQ

    Content Posted in 2024

    PDF

    0544A New Ridge-Type Estimator for the Gamma regression model, Zakariya Yahya Algamal, Ahmed Maher Salih, and Mundher Abdullah Khaleel

    PDF

    181Routing Techniques in Network-On-Chip Based Multiprocessor-System-on-Chip forIOT:A Systematic Review

    PDF

    2-Visible Submodules and Fully 2-Visible Modules, Mahmood S. Fiadh and Wafaa H. Hanoon

    PDF

    3D MODEL VISUALIZATION FUNCTION FOR RESPONSIVE WEB DESIGN, Sora Nazhan KAMAL and Abdullahi Abdu IBRAHIM

    PDF

    A Brief Review of Big Data Analytics Based on Machine Learning, Ahmed Hussein Ali, Mahmood Zaki Abdullah, Shams N. Abdul-wahab, and Mohammad Al sajri

    PDF

    A Classification of Al-hur Arabic Poetry and Classical ArabicPoetry by Using Support Vector Machine, Naïve Bayes, and LinearSupport Vector Classification, Muneef Abdullah Ahmed

    PDF

    A Comprehensive Analysis of Partition Dimensions in Efavirenz Abacavir Lamivudine Doravirine of Anti-HIV Drug Structures, R. Nithya Raj, R. Sundara Rajan, and Hijaz Ahmad

    PDF

    A Comprehensive Review of Software Development Life Cycle methodologies: Pros, Cons, and Future Directions, Qahtan M. Yas, Abdulbasit ALazzawi, and Bahbibi Rahmatullah

    PDF

    A Comprehensive Review on Cybersecurity Issues and Their Mitigation Measures in FinTech, Guma Ali, Maad M. Mijwil, Bosco Apparatus Buruga, and Mostafa Abotaleb

    PDF

    Adaptive Heterogeneity Index Cloudlet Scheduler for Variable Workload and Virtual Machine Configuration, D Gritto and P Muthulakshmi

    PDF

    Addressing Challenges in Hate Speech Detection Using BERT-Based Models: A Review, Jinan Ali Aljawazeri and Mahdi Nsaif Jasim

    PDF

    A Generating Distorted CAPTCHA Images Using a Machine Learning Algorithm, Saba Abdulbaqi Salman, Yasmin Makki Mohialden, and Nadia Mahmood Hussien

    PDF

    A Hybrid Integrated Model for Big Data Applications Based on Association Rules and Fuzzy Logic: A Review, Hind R. Ibraheem and Murtadha M. Hamad

    PDF

    A Machine Learning Algorithms for Detecting Phishing Websites: A Comparative Study, Dr. Mohammed A. Taha, Haider D. A. Jabar, and Widad K. Mohammed

    PDF

    Analysis of H-index and Papers Citation in Computer Science Field usingK-Means ClusteringAlgorithm, Omar Ibrahim Obaid

    PDF

    Analysis of the False Prediction of the Logistic Regression Algorithm in SQL Payload Classification and its Impact on the Principles of Information Security (CIA), Omar Salah F Shareef, Rehab Flaih Hasan, and Ammar Hatem Farhan

    PDF

    Analyzing the User'sSentiments of ChatGPT Using Twitter Data, Tarık Talan, Adem Korkmaz, and Cemal Aktürk

    PDF

    An Articulate Heart Attack Detection System Using Mine Blast Optimization (MBO) Based Multilayer Perceptron Neural Network (MLPNN) Model, N Rajesh Pandian, D Shanth, and N Selvaganesh

    PDF

    An Automated Lion-Butterfly Optimization (LBO) based Stacking Ensemble Learning Classification (SELC) Model for Lung Cancer Detection, N Ashokkumar, S Swapna Rani, V Suganya, S Selvi, and S Prema

    PDF

    An Automated Prostate-cancer Prediction System (APPS) Based on Advanced DFO-ConGA2L Model using MRI Imaging Technique, E Sathesh Abraham Leo and K Nattar Kannan

    PDF

    A New Approach to Improve Transmitting and Receiving Timing in Orthogonal Frequency Division Multiplexing (OFDM) Systems, Ghassan A. Abed

    PDF

    A New Simple 6D Hyperchaotic System withHyperbolic Equilibrium and Its Electronic Circuit, Zaidoon Sh Al-Talib and Saad Fawzi Al-Azzawi

    PDF

    An Integrative Computational Intelligence for Robust Anomaly Detection in Social Networks, Helina Rajini Suresh, K R. Harsavarthini, R Mageswaran, Hirald Dwaraka Praveena, C Gnanaprakasam, and C.Sakthi Lakshmi Priya

    PDF

    An Intelligent Prairie Dog Optimization (IPDO) and Deep Auto-Neural Network (DANN) based IDS for WSN Security, D Hemanand, P Mohankumar, N Manoj Kumar, S Vaitheki, and P Saranya

    PDF

    An investigation of Internet Service Provider selection criteria: A systematic literature review, Mohammed Naji, Sivadass Thiruchelvam, and Mohammed Khudari

    PDF

    A Novel Biased Probability Neural Network (BPNN) and Regularized Extreme Learning Machine (RELM) based Hearing Loss Prediction System, N Selvaganesh and D Shanthi

    PDF

    A Novel Deep Learning Approach for Classification of Bird Sound Using Mel Frequency Cepstral Coefficients, Aymen Saad, Muhammad Mun’im Ahmad Zabidi, Israa S. Kamil, and Usman Ullah Sheikh

    PDF

    A Novel Method for Hill Cipher Encryption and Decryption Using Gaussian Integers Implemented inBanking Systems, Saba Abdulbaqi Salman, Yasmin Makki Mohialden, Abbas Abdulhameed, and Nadia Mahmood Hussien

    PDF

    An Overview of Content-BasedImage Retrieval Methods And Techniques, M H. Hadid, Qasim Mohammed Hussein, Z T. Al-Qaysi, M A. Ahmed, and Mahmood M. Salih

    PDF

    (A-n) – Potent Operators on Hilbert Space, Laith K. Shaakir, Elaf S. Abdulwahid, and Anas A. Hijab

    PDF

    Ant Colony Optimization Algorithm in the Hopfield NeuralNetwork for Agricultural Soil Fertility Reverse Analysis, Hamza Abubakar and Abdullahi Muhammad

    PDF

    Applications for the groups , where prime upper than 9, Lemya Abd Alameer Hadi, Mahmood S. Fiadh, Niran Sabah Jasim, and Jabbar Abed Eleiwy

    PDF

    Applicationsof information technology (IT) in Iraq's petroleum industry, Saad Albawi, Whalaa alkhaisi, Yasser Almadany, and Mohammad Ibrahim Almashhadni

    PDF

    Approach for Detecting Arabic Fake News using Deep Learning, Khalid Shaker and Arwa Alqudsi

    PDF

    Approximation of an Inertial Iteration Method for a Set-ValuedQuasi Variational Inequality, Mohammad Akram

    PDF

    Arabic Chatbots Challenges and Solutions: A Systematic Literature Review, Soufiyan Ouali and Said El Garouani

    PDF

    A Review of Machine Learning Techniques Utilised in Self-Driving Cars, Zahraa Salah Dhaif and Nidhal K. El Abbadi

    PDF

    A Review of Optimization Techniques: Applications and Comparative Analysis, Ahmed Hasan Alridha, Fouad H. Abd Alsharify, and Zahir Al-Khafaji

    PDF

    A Review Of TextMining Techniques: Trends, and Applications In Various Domains, Hiba J. Aleqabie, Mais Saad Sfoq, Rand Abdulwahid Albeer, and Enaam Hadi Abd

    PDF

    A Review of the Integration Between Geospatial Artificial Intelligence and Remote Sensing, Abeer A. Mohamad Alshiha

    PDF

    Artificial Intelligence in Education: Mathematics Teachers’ Perspectives, Practices and Challenges, Mohammad A. Tashtoush, Yousef Wardat, Rommel Al Ali, and Shoeb Saleh

    PDF

    A Study of Blockchain-Based Internet of Things, Roheen Qamar

    PDF

    A Systematic Survey on the Research of AI-predictiveModelsforWastewater Treatment Processes, Varun Geetha Mohan, Al-Fahim Mubarak Ali, and Mohamed Ariff Ameedeen

    PDF

    Automated Fake News Detection System, Saja A. Al-obaidi and Tuba Çağlıkantar

    PDF

    Automatic Temperature Control System Using African vultures optimization algorithm, Mostafa Abdulghafoor Mohammed, Muntadher Khamees, and Dina Hassan Abbas

    PDF

    Auto–Transition in RADG based on chaotic System, Laith M. Kadhum, Ahmad Firdaus, Mohamad Fadli Bin Zolkipli, Syifak Izhar Hisham, Luhur Bayuaji, and Mohd Faizal Ab Razak

    PDF

    Big Data Classification Efficiency Based on Linear Discriminant Analysis, Ahmed Hussein Ali, Zahraa Faiz Hussain, and Shamis N. Abd

    PDF

    Big Data Streaming Platforms: A Review, Harish Kumar and Mohd Arfian Ismail

    PDF

    Bitcoin Layer Two Scaling Solutions:Lightening Payment Channels Network Comprehensive Review, Mechanisms, Challenges, Open Issues and Future Research Directions, Mohd Najwadi Bin Yusoff, Hasan Falah Hasan, and Shams Mhmood Abd Ali

    PDF

    Blockchain-Technology-Based Solutions for IOT Security, Israa Al-Barazanchi, Aparna Murthy, Ahmad Abdul Qadir Al Rababah, Ghadeer Khader, Haider Rasheed Abdulshaheed, Elika Daghighi, and Yitong Niu

    PDF

    Blood Cell Microscopic Image Classification in ComputerAided Diagnosis Using Machine Learning: A Review, Teba Mazin Makki and Khamael Al Dulaimi

    PDF

    Breast cancer images Classification using a new transfer learning technique, Mazin Abed Mohammed, Abdulrahman Abbas Mukhlif, and Belal Al Khateeb

    PDF

    Chaotic Dynamics in the 2D System of Nonsmooth OrdinaryDifferential Equations, Zain-Aldeen S. A. Rahman, Basil H. Jasim, and Yasir I. A. Al-Yasir

    PDF

    Characterizations ofsf-simple extension of topologies, Mohammed Abbas Yaseen and Raad Aziz Hussain

    PDF

    ChatGpt: Open Possibilities, Mohammad Aljanabi, Mohanad Ghazi, Ahmed Hussein Ali, and Saad Abas Abed

    PDF

    Classification of COVID-19 Symptoms Using MultilayerPerceptron, Mohd Arfian Ismail, Nurulain Nusrah Mohd Azam, Mohd Saberi Mohamad, Ashraf Osman Ibrahim, and Shermina Jeba

    PDF

    CNN-PS: Electroencephalogram Classification of Brain States Using Hybrid Machine -Deep Learning Approach, Osama Mohsin Abdulaziz and O A. Saltykova

    PDF

    Comparison of non-linear time series models (Beta-t-EGARCH and NARMAX models) with Radial Basis Function Neural Network usingReal Data, Hiba H. Abdullah, Nihad S. Khalaf, and Nooruldeen A. Noori

    PDF

    Computation of the Stabilizing Solution to Nash-Riccati Equations

    PDF

    Constant-Stress Partially Accelerated Life Testing for Weibull Inverted Exponential Distribution with Censored Data, Samah M. Ahmed

    PDF

    Convex Optimization Techniques for High-Dimensional Data Clustering Analysis: A Review, Ahmed Yacoub Yousif and Basad Al Sarray

    PDF

    Convolutional Neural Networks for Dementia Severity Classification: Ordinal Versus Regular Methods, Ambresh Bhadrashetty and P. Sandhya

    PDF

    Convolutional Neural Networks using FPGA-based Pipelining, Ahmed Hussein Ali and Gheni A. Ali

    PDF

    Correlation with the fundamental PSO and PSO modifications tobe hybrid swarm optimization, Raed A. Hasan, Suhe Shahab Najim, and Munef Abdullah Ahmed

    PDF

    COVID-19 Patients’ Health Monitoring System using FuzzyOntology and Internet of Things, Abdelhalim Hadjadj and Khaled Halimi

    PDF

    Critical factors affecting the adoption of open source software inpublic organizations, Mohanad G. Yaseen, Saad A. Abd, and Ibarhim Adeb

    PDF

    Decision-making techniques based on similarity measures ofpossibility interval fuzzy soft environment, Faisa Al Sharqi, Ashraf Al Quran, and Mamika Ujianita Romdhini

    PDF

    Design and Development of IoT-Enabled Power Management System for Smart Home with Enhanced Security Feature, Indu Bala and Bhukya Arun Kumar

    PDF

    Designing and Implementing an ECG Reader and Heart Disease Classification Device Using Deep Learning (Comprehensive Review), Ghasaq Saad Jameel, M N. Al-Turfi, Dr. Hussain Falih Mahdi, and Saba Nasser Hussain

    PDF

    Design of Quality Improvement Technique Through Ridgelet Transform on Watermarked Video, Rasha I. Ahmed and Sura Mazin Ali

    PDF

    Detecting Abnormal Driving Behavior Using Modified DenseNet, Aisha Ayad and Matheel E. Abdulmunim

    PDF

    Detecting Arabic Misinformation Using an Attention Mechanism-Based Model, Bashar M. Nema and Mohammed Haqqi Al-Tai

    PDF

    Detecting Data Poisoning Attacks in Federated Learning for Healthcare Applications Using Deep Learning, Mohammed Aljanabi, Alaa Hamza Omran, and Sahar Yousif Mohammed

    PDF

    Detecting the Speaker Language Using CNN Deep LearningAlgorithm, Fawziya M. Rammo and Mohammed N. Al-Hamdani

    PDF

    Detection of anomalies and Data Drift in a time-series dismissal prediction system, Nataliya Boyko and Roman Kovalchuk

    PDF

    Detection of pedophilia content online: A case study usingTelegram, Shafran Packeer and D.T.V Kannangara

    PDF

    Development of an Intelligent Detection Method of DC Series ArcFault in Photovoltaic System Using Multilayer Perceptron andBi-Directional Long Short-Term Memory, Alaa Hamza Omran, Dalila Mat Said, Siti Maherah Hussin, Sadiq H. Abdulhussein, Nasarudin Ahmad, and Haidar Samet

    PDF

    Development of Robotto ImproveLearning of Programming Skills among Students, Aminu Aminu Muazu, Ahmad Sobri Hashim, Mohammad Ateff Md Yusof, and Noreen Izza Arshad

    PDF

    Development of synthetic data generator for ornament based on data mining techniques, Ahmed Hussein Ali, Saad Ahmed Dheyab, and Rasha Talal Hameed

    PDF

    Develop Secure Software specifications for Android App concealing the Information and Safeguarding Data, Huda Abdulaali Abdulbaqi, Ahmmad Mohamad Ghandour, and Thekrayat Abbas Jawad

    PDF

    Distinguishing between Student-Authored and ChatGPT-Generated Texts:A Preliminary Exploration of HumanEvaluation Techniques, Md Saiful Alam, Adelina Asmawi, Mohammad Hamidul Haque, Md Nurullah Patwary, Md Mohib Ullah, and Sayeda Fatema

    PDF

    Double-Stage Shrinkage Estimation of Reliability Function forBurr XII Distribution, Iman Jalil Atewi, Alaa Khlaif Jiheel, and Ashok Ramdas Rao Shanubhogue

    PDF

    DriverDrowsyandYawnSystemAlertUsingDeepCascadeConvolutionNeuralNetworkDCCNN, Zainab Ali Abbood and Janan Farag Yonan

    PDF

    EAMSA 512: New 512 Bits Encryption Algorithm Based on Modified SALSA20, Nashwan Dheyaa Zaki, Jolan Rokan Naif, Israa S. Ahmed, and Haider K. Hoomod

    PDF

    Early Detection of Cardiovascular Disease Utilizing Machine Learning Techniques: Evaluating the Predictive Capabilities of Seven Algorithms, Maad M. Mijwil, Alaa K. Faieq, and Mohammad Aljanabi

    PDF

    Economic Order Quantity in a Fuzzy Environment for a PeriodicInventory Model with Variable Demand, K Kalaiarasi, H Mary Henrietta, M Sumathi, and A Stanley Raj

    PDF

    E-Learning Management Technology Integration for Laboratory Usage, Mohammed Khaleel Hussein, Mohammed Ahmed Subhi, Saleh Mahdi Mohammed, and Mayasah Al-khateeb

    PDF

    Elementary Treatise on Melted-like Curves Derived from CenterEllipse and Circle, Laith H. M Al-ossmi

    PDF

    Embedded Deep Learning to Improve the Performance of Approaches for Extinct Heritage Images Denoising, Ali Salim Rasheed, Alaa Hamza Omran, and Reem D. Ismail

    PDF

    Embedded Schemes of the Runge-Kutta Type for the Direct Solution of Fourth-Order Ordinary Differential Equations, F. A. Fawzi and Nizam G. Ghawadri

    PDF

    Emotion Recognition Using Various Measures and Computational Methods: Review, Abir Hamrouni and Fatima Bendella

    PDF

    Energy Optimization in Wireless Sensor Networks: A Review, Zahraa Hammodi, Ahmed Al Hilli, and Mohanad Al-Ibadi

    PDF

    Energy Optimized LDPC Codes for Next-Generation MIMO OFDM Systems, Indu Bala, Komal Arora, and Maad M. Mijwil

    PDF

    Enhanced Cancer Subclassification Using Multi-Omics Clustering and Quantum Cat Swarm Optimization, Mazin Abed Mohammed and Ali Mahmoud Ali

    PDF

    Enhancement Methods for Energy Consumption Prediction in Smart House based on Machine Learning, Musa A. Hameed, Esam T. Yassen, and Wesam M. Jasim

    PDF

    Enhancing Efficiency and Fine-Grained Control in Redactable Blockchains with EPBCHF, Mohd Najwadi Yusoff, Shams Mhmood Abd Ali, and Hasan Falah Hasan

    PDF

    Enhancing Student'sPerformance Classification Using Ensemble Modeling, Ahmed Adil Nafea, Muthanna Mishlish, Ali Muwafaq haban Shaban, Mohammed M. AL-Ani, Khattab M Ali Alheeti, and Hussam J. Mohammed

    PDF

    Enhancing the Zebra Optimization Algorithm with Chaotic Sinusoidal Map for Versatile Optimization, D Anand, Osamah Ibrahim Khalaf, and G Rajesh Chandra

    PDF

    Enhancing Wireless Sensor Networks Features Using Software-Defined Networking Techniquesand ACO Algorithms, Ghassan A. Abed

    PDF

    Ensemble Machine Learning Techniques for Attack Prediction inNIDS Environment, T. Sreenivasula reddy and R Sathya

    PDF

    Essentially Retractable Modules Relative To A Submodule And Some Generalizations, Shukur Neamah Al-Aeashi and Fatimah Hussein Al-Bakaa

    PDF

    Estimating Long-run Elasticity betweenCrude Oil Consumption, Real Oil Price, and Real GDP in Global Markets, Aysar Y. FAHAD, Ahmad Hussei BATTAL, and Asmaa YASEEN

    PDF

    Evaluation Algorithms Based on Fuzzy C-means for the DataClustering of Cancer Gene Expression, Omar Al- anabee and Basad Al Sarray

    PDF

    Explainable Machine Learning Approach enables Computer-Aided Identification System for Children Autism Spectrum Disorder (C-ASD), Karrar Hameed Abdulkareem, Zainab Hussein Arif, and Mazin Abed Mohammed

    PDF

    Exploring Advanced Analysis Technique for Shallow Water FlowModels with Diverse Applications, Rasha F. El-Agamy, Hijaz Ahmad, Gamal M. Ismail, Ibrahim Alraddadi, Mohammad Aljanabi, and Umar Farooq

    PDF

    Extensive Review of State-of-the-Art Classification Techniques for Cuneiform SymbolImaging: Open Issues and Challenges, Belal Al Khateeb, Farah Maath, and Maha Mahmood

    PDF

    Face Detection Performance Using CNNs and Bug BonutyProgram (BBP), Yasmin Makki Mohialden, Saba Abdulbaqi Salman, and Nadia Mahmood Hussien

    PDF

    Facial Recognition Technology-Based AttendanceManagement System Application in Smart Classroom, Ahmad S. Lateef and Mohammed Y. Kamil

    PDF

    FCNN Model for Diagnosis and Analysis of Symmetric KeyCryptosystem, Ali H. Alwan and Ali H. Kashmar

    PDF

    Formulating an Advanced Security Protocol for Internet of Medical Things based on Blockchain and Fog Computing Technologies, Rasha Halim Razzaq and Mishall Al Zubaidie

    PDF

    Fuzzy Soc-T-ABSO Sub-Modules, Saad S. Marie and Hatam Y. Khalaf

    PDF

    Fuzzy-weightedzero-inconsistency, FWZIC,Multi-criteria Decision Making, MCDM, Weighting Methods, Fuzzy Set, Mahmood M. Salih and Rasha A. Yousif

    PDF

    Gene Expression Analysis via Spatial Clustering and EvaluationIndexing, Awrad D. Salman

    PDF

    Gradient Techniques to Predict Distributed Denial-Of-ServiceAttack, Roheen Qamar

    PDF

    HardVoting Approach using SVM, Naïve Bays and Decision Tree forKurdish Fake NewsDetection, Rania Azad M. San Ahmed

    PDF

    Has the Future Started? The Current Growth of ArtificialIntelligence, Machine Learning, and Deep Learning, Maad M. Mijwil, Karan Aggarwal, Sonia Sonia, Abdel Hameed Al-Mistarehi, Safwan Alomari, Murat Gök, Anas M. Zein Alaabdin, and Safaa H. Abdulrhman

    PDF

    Healthcare Privacy-Preserving Federated Transfer Learning using CKKS-Based Homomorphic Encryption and PYHFELTool, Anmar A. Al-Janabi, Sufyan Al Janabi, and Belal Al Khateeb

    PDF

    Heart disease classification using optimized Machine learning algorithms, Mohammad Abood Kadhim and Abdulkareem Merhej Radhi2

    PDF

    Homotopy analysis method for solving fuzzy Nonlinear Volterra integral equation of the second kind, Rana Hussein and Moez Khenissi

    PDF

    Hybrid Honey Badger Algorithm with Artificial Neural Network(HBA-ANN)for Website Phishing Detection, Muhammad Arif Mohamad, Muhammad Aliif Ahmad, and Zuriani Mustaffa

    PDF

    Hybrid Model for Motor Imagery Biometric Identification, Z. T. Al-Qaysi, Rasha A. Aljanabi, M A. Ahmed, and Mahmood M. Salih

    PDF

    Identification Method of Power Internet Attack Information Based on Machine Learning, Yitong Niu and Korneev Andrei

    PDF

    Identification of Faulty Sensor Nodes in WBAN Using Genetically Linked Artificial Neural Network, Israa Ibraheem Al_Barazanchi, Haider Rasheed Abdulshaheed, Mayasa M. Abdulrahman, and Jamal Fadhil Tawfeq

    PDF

    Image Steganography Based on ChaoticFunction andRandomize Function, Rusul Mansoor Al-Amri, Dalal N. Hamood, and Alaa Kadhim Farhan

    PDF

    Image Watermarking using Firefly Algorithm–IWT-SVD for Copyright Protection, Anjahul Khuluq, Ferda Ernawan, Agit Amrullah, and Mohd Arfian Ismail

    PDF

    Impact of Chat GPT on Scientific Research: Opportunities, Risks, Limitations, and Ethical Issues, Omar Ibrahim Obaid, Ahmed Hussein Ali, and Mohanad Ghazi Yaseen

    PDF

    Impact of Couple Stress withRotation on Walters,B Fluid in Porous Medium, Zainab A. Jaafar, Mizal H. Thawi, and Liqaa Z. Hummady

    PDF

    Implementing an Automated Inventory Management System for Small and Medium-sized Enterprises, Mohanad Ghazi, Hayder Sabah Salih, and Mohammad Al janabi

    PDF

    Improved Artificial Neural Networks Based Whale Optimization Algorithm, Mostafa Abdulghafoor Mohammed, Royida A.Ibrahem Alhayali, Mostafa Khaled Abd Alrahman Aladamey, Mohammed Rashid Subhi, Amiza Amir, and Zahraa A. Abdalkareem

    PDF

    Improvement of Network Reliability by Hybridization of thePenalty Technique Based on Metaheuristic Algorithms

    PDF

    Improves Intrusion Detection Performance InWireless Sensor Networks Through Machine Learning, Enhanced By An Accelerated Deep Learning Model With Advanced Feature Selection, Hadeel M. Saleh, Hend Marouane, and Ahmed Fakhfakh

    PDF

    Improving Process Efficiency in Iraqi universities:a proposed management information system, Mohanad Ghazi Yaseen, Hayder Sabah Salih, Mohammed Aljanabi, Ahmed Hussien Ali, and Saad Abbas Abd

    PDF

    Improving security in the 5G-based medicalInternet of Things toimprove the qualityofpatient services, Israa Ibraheem Al_Barazanchi, Kholood J. Moulood, and Muneer Sameer Gheni Mansoor

    PDF

    Integrating Artificial Intelligence in Public Relations and Media: A Bibliometric Analysis of Emerging Trends and Influences, Akhmed Kaleel and Mohammed Shukri Alomari

    PDF

    Integrating Edge Computing and Software Defined Networking in Internet of Things: A Systematic Review, Mohamed Ariff Ameedeen, Imran Edzereiq Kamarudin, Mohd Faizal Ab Razak, and Azlee Zabidi

    PDF

    Integrating Image Data Fusion and ResNet Method for Accurate Fish Freshness Classification, Yahya Layth Khaleel, Mustafa Abdulfattah Habeeb, and Ghadeer Ghazi Shayea

    PDF

    Integrating Intelligent Systems in MANET-IoT Environment based on Subjective Context, Qahtan M. Yas and Abdulbasi ALAZZAWI

    PDF

    Intelligent Detection of Distributed Denial of Service Attacks: A Supervised Machine Learning and Ensemble Approach, Mustafa S. Ibrahim Alsumaidaie, Khattab M. Ali Alheeti, and Abdul Kareem Alaloosy

    PDF

    Intelligent Household Load Identification Using Multilevel Random Forest on Smart Meters, Israa Badr Al-Mashhadani and Waleed Khaled

    PDF

    Internet applications in libraries and information centers, Mohammed Thakir haamood

    PDF

    Investigating Intrusion Detection System Using Federated Learning for IoT Security Challenges, Mohammed Q. Mohammed, Zena Abd Alrahman, and Aouf R. Shehab

    PDF

    Investigating the Use of an Adaptive Neuro-Fuzzy InferenceSystem in Software Development Effort Estimation, Zainab Rustum Mohsin

    PDF

    Kernel semi-parametric model improvement based on quasi-oppositional learning pelican optimization algorithm, Firas Ahmed Yonis AL-Taie, Omar Saber Qasim, and Zakariya Yahya Algamal

    PDF

    LEARNERS' EMOTIONS ESTIMATION USING VIDEO PROCESSING TECHNIQUES FOR OPTIMUM E-LEARNING EXPERIENCE, Mohammed Ahmed Subhi, Mohammed Khaleel Hussein, Ali Abdullah Ali, and Saleh Mahdi Mohammed

    PDF

    Main challenges (generation and returnedenergy) in a deep intelligent analysis technique for renewable energy applications, Samaher Al Janabi, Ghada S. Mohammed, and Thekra Abbas

    PDF

    Metaverse: open possibilities, Mohammed Aljanabi and Sahar Yousif Mohammed

    PDF

    Mobile Augmented Reality Framework in STEM Education: A Systematic Literature Review, Danakorn Nincarean Eh Phon and Nur Fatin Razlieya Binti Mohd Razali

    PDF

    Modelling Security Factors Influencing E-Wallet Adoption in Malaysia, Adi Badiozaman Ruhani, Nur Suhaili Mansor, Hapini Awang, Mohamad Fadli Zolkipli, Khuzairi Mohd Zaini, and Abderrahmane Benlahcene

    PDF

    Modified Jackknifed Ridge Estimator in Bell Regression Model: Theory, Simulation and Applications, Zakariya Yahya Algamal, Adewale F. Lukman, B. M Golam Kibria, and Arowolo Olatunji Taofik

    PDF

    More-SPEED: Enhancing Protein Activity Prediction from DNA Sequences, Samahe Al Janabi and Zena Kadhuim

    PDF

    Multi-Strategy Fusion forEnhancingLocalization in Wireless Sensor Networks (WSNs), Mahdi Abed Salman and Muhammed Abaid Mahdi

    PDF

    New Structures of Soft Permutation in Commutative Q-Algebras, Moataz Sajid Sharqi and Shuker khalil

    PDF

    New Three-Parameter Exponentiated Benini Distribution: Properties and Applications, Elif Yıldırım, Gamze Özel, Christophe Chesneaul, Farrukh Jamal, and Ahmed M. Gemeay

    PDF

    New Virtual Environment Based on Python Programming, Omar Abdulwahabe Mohamad

    PDF

    Numerical Approach for Solving fuzzy Integro-DifferentialEquations, Fatima K. Dawood and Rokan Khaji

    PDF

    Numerical Solution of Fractional Integro-Differential EquationsVia Fourth-Degree Hat Functions, Jehad K. Mohammed, Ayad R. Khudair, and N Rajesh Pandian

    PDF

    Offline Handwritten Signature Identification based on Hybrid Features and Proposed Deep Model, Zainab Hashim, Hanaa Mohsin, and Ahmed Alkhayyat

    PDF

    On Differential Subordination and Superordination for UnivalentFunction Involving New Operator, Mustafa I. Hameed, Buthyna Najad Shihab, and Samaila Bello

    PDF

    On(n,)- quasi Operators, Salim Dawood Mohsen

    PDF

    On the Involutive Matrices of the kth Degree, Hasan KELE ̧S and Basaad Ali Hussain

    PDF

    ParametersEstimation of a Proposed Non-Homogeneous Poisson Process and Estimation of the Reliability Function Using the Gompertz Process: A Comparative Analysis of Artificially Intelligent and Traditional Methods, Adel Sufyan Hussain, Yaseen Adel Oraibi, Muthanna Subhi Sulaiman, and Ahmed Sami Abdulghafour

    PDF

    Particle Swarm Optimization for Penalize Cox Models in Long-Term Prediction of Breast Cancer Data, Ehab Abbas Fadhil and Basad Al Sarray

    PDF

    Phishing Attacks Detection by Using Artificial Neural Networks, Majeed Jasim Nabet and Loay E. George

    PDF

    Picard and Adomian decomposition methods for a fractionalquadratic integral equation viaζ-generalizedξ-fractional integral, Ali Hasan Ali, Alan Jalal Abdulqader, Saleh S. Redhwan, Omar Bazighifan, and Awad T. Alabdala

    PDF

    Posinormality of Operators Treated by Weyl's Theorem on Unbounded Hilbert Space, Abbas G. Rajij, Dalia S. Ali, Huseyin Cakalli, and Nadia M. G. Al-Saidi

    PDF

    Predicting Diabetes Disease Occurrence Using Logistic Regression: An Early Detection Approach, Ahmad Shaker Abdalrada, Ali Fahem Neamah, and Hayder Murad

    PDF

    Prompt Engineering: Guiding the Way to Effective Large Language Models, Mohammad Aljanabi, Mohanad Ghazi Yaseen, Ahmed Hussein Ali, and Mostafa Abdulghafoor Mohammed

    PDF

    Prompt Engineering: Unleashing the Power of LargeLanguage Models to Defend Against Social Engineering Attacks, Prof. Bashar M. Nema, Ahmed I. Nezer, and Wisam Makki Salim

    PDF

    Properties of Chmielinski-orthogonality by using Kadets-Kleeproperty, Saied A. Jhonny and Buthainah A. A. Ahmed

    PDF

    Proposed method for scale drawing calculating depending on theline detector and length detector, Huda Dheyauldeen Najeeb and Rana Fareed Ghani

    PDF

    Proposed New Framework Scheme for Path Loss in Wireless BodyArea Network, Israa Al_Barazanchi, Yitong Niu, Haider Rasheed Abdulshaheed, Wahidah Hashim, Ammar Ahmed Alkahtani, Elika Daghighi, Zahraa A. Jaaz, and Shihab A. Shawkat

    PDF

    Rad-Quasi-Prime Submodules, Rana NooriMajeed, Ghaleb Ahmed Hammood, Mahmood S. Fiadh, and Lemya Abd Alameer Hadi

    PDF

    Rao-SVM Machine Learning Algorithm for Intrusion Detection System, Shamis N. Abd, Mohammad Alsajri, and Hind Raad Ibraheem

    PDF

    Real-TimeLie-Speech Determination Using Voice-Stress Technology, Fadi K. Al-Dhaher, Duraid Y. Mohammed, Mohammed Khalaf, Khamis A. Al-Karawi, Mohammad Sarfraz, and Muhammad Mazin Al Maathidi

    PDF

    Remove NoiseFrom Movies by Using Hybrid Smooth Algorithm, Faten Azeez Mustafa, Hanan Hamid Ali, and Aseel Waleed Ali

    PDF

    Resource Allocation and Edge Computing for Dual Hop Communication in Satellite Assisted UAVs enabled VANETs, Ahmed Adil Nafea, Mustafa Maad Hamdi, and Sami Abduljabbar Rashid

    PDF

    Review of Mathematical Modelling Techniques with Applicationsin Biosciences, Ahmed Hasan Alridha, Ahmed Sabah Al-Jilawi, and Fouad H. Abd Alsharify

    PDF

    Review on unrelated parallel machine scheduling problem with additional resources, Munther H. Abed and Mohd Nizam Mohmad Kahar

    PDF

    Robust-Fragile Watermarking Using Integer Wavelet Transform for Tampered Detection and Copyright Protection, Hendra Budi, Ferda Ernawan, and Agit Amrullah

    PDF

    Robust Image Watermarking Based on IWT-DCT-SVD for Copyright Protection, Syafiqul Shubuh, Ferda Ernawan, Agit Amrullah, and Prajanto Wahyu

    PDF

    Robust Image Watermarking Based on LiftingWavelet Transfrom-Hessenberg Decomposition for Copyright Protection, Ferda Ernawan, Agung Sudrajat, and Agit Amrullah

    PDF

    Robust Image Watermarking Based on Schur Decomposition, Ahmad Toha, Ferda Ernawan, and Agit Amrullah

    PDF

    Sadik and complex Sadik integral transforms of system of ordinary differential equations, Intidhar Zamil Mushtt and Emad A. Kuffi

    PDF

    Secure Blind Medical Image Watermarking Using Hybrid Feature Extraction Techniques, Sawsan D. Mahmood, Yassine Aribi, Fadoua Drira, and Adel M. Alimi

    PDF

    Secure Healthcare Systems and Big Data: A Bibliometrics Analysis, Rasha Talal Hameed, Saad Ahmed Dheyab, Saba Abdulbaqi Salman, Ahmed Hussein Ali, and Omar Abdulwahabe Mohamad

    PDF

    Secure Heart Disease Classification System Based on Three Pass Protocol and Machine Learning, Randa shaker Abd-Alhussain, Hadab Khalid Obayes, and Farah Al Shareefi

    PDF

    Security Attacks on E-Voting System Using Blockchain, Saba Abdulbaqi Salman, Sufyan Al Janabi, and Ali Makki Sagheer

    PDF

    SEEK Mobility Adaptive Protocol Destination Seeker Media Access Control Protocol for Mobile WSNs, Zainab Ali Abbood, Atheel Sabih Shaker, Omar F. Youssif, Mohammad Aljanabi, and Mahdi S. Mahdi

    PDF

    Sentiment Analysis using Optimised Feature Sets in DifferentFacebook/Twitter Dataset Domains with Big Data, Mohammed Ibrahim Al-mashhadani, Kilan M. Hussein, Enas Tariq Khudir, and Muhammad lyas

    PDF

    Smart Door controller for handicapped people based on face recognition and voice command technique, Rana Talib Rasheed

    PDF

    Socio-Transactional Impact of Recency, Frequency, and MonetaryFeatures oN Customers’ Behaviour in Telecoms’ Churn Prediction, Ayodeji O.J Ibitoye, Clement ONIME, Nashwan Dheyaa Zaki, and Olufade F.W Onifade

    PDF

    Soft Computing-Based Generalized Least Deviation MethodAlgorithm for Modeling and Forecasting COVID-19 usingQuasilinear Recurrence Equations, Mostafa Abotaleb

    PDF

    Solving tri-criteria:total completion time, total late work, and maximum earliness by using exact, and heuristic methods on single machine scheduling problem, Nagham M. Neamah and Bayda A. Kalaf

    PDF

    Some Methods to Estimate the Parameters of GeneralizedExponential Rayleigh Model by Simulation, Rehab Noori Shalan and Iden Hassan Alkanani

    PDF

    SPEAKER IDENTIFICATION MODEL BASED ON DEEPNURAL NETWOKS, Saadaldeen Rashid Ahmed, Zainab Ali Abbood, hameed Mutlag Farhan, Baraa Taha Yasen, Mohammed Rashid Ahmed, and Adil Deniz Duru

    PDF

    Spectral CG Algorithm for Solving Fuzzy Nonlinear Equations, Mezher M. Abed, Ufuk Öztürk, and Hisham M. Khudhur

    PDF

    Stable Heterogeneous Traffic Flow with Effective Localization and Path Planning in Wireless Network Connected and Automated Vehicles in~Internet of Vehicular Things (IoVT), Ahmed N. Rashid and Ahmed Mahdi Jubair

    PDF

    Structural Reliability and Optimization Using Differential Geometric Approaches, Saad Abbas Abed, Mona Ghassan, Shaemaa Qaes, Mahmood S. Fiadh, and Zaid Amer Mohammed

    PDF

    SUMER: A New Family of Lightweight and Traditional Block Ciphers with Multi-Modes, Omar A. Dawood

    PDF

    Survey: (Blockchain-Based Solution for COVID-19 and SmartContract Healthcare Certification), Noor Sabah, Ali Sagheer, and Omar Dawood

    PDF

    Survey of Intrusion Detection Using Deep Learning in the Internetof Things, Baraa I. Farhan and Ammar D. Jasim

    PDF

    Survey on Generative Adversarial Behavior in Artificial NeuralTasks, Roheen Qamar, Naomi Bajao, Iswanto Suwarno, and Fareed Ahmed Jokhio

    PDF

    Tackling the Berth Allocation Problem via Harmony Search Algorithm, Hazlina Hamdan, Bilal Ahmed, Abdullah Muhammed, and Nor Azura Husin

    PDF

    Taxonomy, Open Challenges, Motivations, and Recommendations in Driver Behavior Recognition: A Systematic Review, Mohamed A. Ahmed, Mohammed Basim Omar, Harith A. Hussein, Z.T Al Qaysi, Mahmood M. Salih, S A. Hamddi, Qabas A. Hameed, and Reem D. Ismail

    PDF

    The Early Warning of Financial Failurefor Iraqi Banks Based on Robust Adaptive Lasso Logistic Regression, Hassan S. Uraibi and Aqeel Jaafar Abbas

    PDF

    The Gompertz Nadarajah-Haghighi (GoNH) Distribution Properties with Application to Real Data, Dalya Dh Ahmed and Mundher A. Khaleel

    PDF

    The New Strange Generalized Rayleigh Family: Characteristics and Applications to COVID-19 Data, Alaa Abdulrahman Khalaf and Mundher Abdullah haleel

    PDF

    The optimal scaling factor based on SecantMethod for imagewatermarkingusing the hybrid DTCWT-DCT domain, Mohamed Lebcir, Suryanti Awang, and Ali Benziane

    PDF

    The Significance of Cannibalism, Panic, and Sanctuary in the Interactions Between Prey and Predator with a Stage Structure, Ahmed Sami Abdulghafour and Raid Kamel Naji

    PDF

    The Significance of Machine Learning and Deep Learning Techniques in Cybersecurity: A Comprehensive Review, Maad M. Mijwil, Israa Ezzat Salem, and Marwa M. Ismaeel

    PDF

    The Use of DCNN for Road Path Detection and Segmentation, Nada Mohammed Murad, Lilia Rejeb1, and Lamjed Ben Said

    PDF

    Towards a new curvature produced by the tangent of a circle andan ellipse: The Nada’s curve, Laith H. M. Al-ossmi and Baqir Ali Zardari

    PDF

    Towards Artificial Intelligence-Based Cybersecurity: The Practices and ChatGPT Generated Ways to Combat Cybercrime, Maad M. Mijwil, Mohammad Aljanabi, and ChatGPT ChatGPT

    PDF

    TWO-STAGE SHRINKAGE BAYESIAN ESTIMATORS FORTHE SHAPE PARAMETER OF PARETO DISTRIBUTIONDEPENDENT ON KATTI’S REGIONS, Marwa Hashem Abd Ali, Alaa Khlaif Jiheel, and Zuhair Al Hemyari

    PDF

    Unlocking the Potential: Synergizing IoT, Cloud Computing, and Big Data for a Bright Future, Zeena N. Al-kateeb and Dhuha Basheer Abdullah

    PDF

    Unveiling The Shadows: The Influence of Anonymity and Fake Accounts on Cyberbully Intention in Social Media, Muzdalini Malik, Hapini Awang, Nur Suhaili Mansor, Mohamad Fadli Zolkipli, Khuzairi Mohd Zaini, and Abdulrazak F. Shahatha Al-Mashhadani

    PDF

    Using Ideal Time Horizon for Energy Cost Determination, Raed Abdulkareem Hasan, Hadee W. Abdulwahid, and Arwa Sahib Abdalzahra

    PDF

    Various Closed-Form Solitonic Wave Solutions of Conformable Higher-Dimensional Fokas Model in Fluids and Plasma Physics, Mohammad A. Tashtoush, Israa A. Ibrahim, Wafaa M. Taha, Mizal H. Dawi, Ali F. Jameel, and Emad A. Az-Zo’bi

    PDF

    Vertex and region colourings of planar idempotent divisor graphsof commutative rings., Mohammed N. Authman, Husam Q. Mohammad, and Nazar H. Shuker

    PDF

    W-visible submodules and W-fully visible modules, Mahmood S. Fiadh, Buthyna N. Shihab, and Munther H. Abed

 
 
 

Search

Advanced Search

  • Notify me via email or RSS

Browse

  • Disciplines
  • Authors
 
Elsevier - Digital Commons

Home | My Account | Accessibility Statement

Privacy Copyright