كلية العلوم | جامعة ديالى
قسم علوم الحاسوب
الابحاث العلمية
اسم الباحث | عنوان البحث | اسم المجلة | تاريخ النشر | موقع النشر |
Abdukbasit Kadhim Shukur Alazzzawi | 1. Face recognition based on multi features extractors | IEEE | 01/08/2017 | Scopus مع باحثين اجانب |
Abdulbasit Kadhim Shukur | Neural network behavior analysis based on transfer functions MLP & RB in face recognition | ACM | 12/08/2018 | Scopus مع باحثين اجانب |
Abdulbasit Kadhim Shukur Alazzawi | 3. Evaluation of face recognition system based on second order filters.DWT and new feature extraction method | IJCSNC Journal -KOREA | 01/03/2018 | web of Science |
Abdulbasit Kadhim Sukur Alazzawi | Performance of Face Recognition System Using Gradient Laplacian Operators and New Features Extraction Method Based on Linear Regression Slope | Mathematical Problems in Engineering | 08/12/2018 | Scopus مع باحثين اجانب |
Binary Particle Swarm Optimization Versus Hybrid Genetic Algorithm for Inferring Well Supported Phylogenetic | Binary Particle Swarm Optimization Versus Hybrid Genetic Algorithm for Inferring Well Supported Phylogenetic | Springer International Publishing | 31/07/2016 | Scopus مع باحثين اجانب |
Dheyab Salman Ibrahim | Hybrid Approach to Detect Spam Emails using Preventive and Curing Techniques | Journal of AL-Qadisiyah for computer science and mathematics | 08/04/2018 | مجلات محلية |
Dheyab Salman Ibrahim | Enhancing Cloud Computing Security using Cryptography & Steganography | Iraqi Journal of Information Technology | 03/08/2019 | مجلات محلية |
Dheyab Salman Ibrahim | Increasing Security for Cloud Computing By Steganography in Image Edges | Al-Mustansiriyah Journal of Science | 06/07/2016 | مجلات محلية |
Dheyab Salman Ibrahim1 | Wireless Network Slicing: A Survey | SCITEPRESS | 09/02/2020 | Scopus |
Juliet Kadum | COMPUTER VISION BASED APPROACH FOR FOOD PACKAGING INSPECTION | International Journal of Psychosocial Rehabilitation | 25/04/2020 | Scopus |
Juliet Kadum | Most Appropriate Materials Selection of 13A Plug Casing utilizing CES EduPack | Solid State Technology | 16/10/2020 | Scopus |
Juliet Kadum | Solving Optimization Problem in Face Recognition based on Filtering and Face Position | Solid State Technology | 29/02/2020 | Scopus |
Jumana Waleed | An Expansion in Classification of Eye Gaze Detection Methods | Journal of Engineering and Applied Sciences | 01/08/2018 | Scopus |
Jumana Waleed | An Expanded Vision of Breast Cancer Diagnosis Approaches Based on Machine Learning Techniques | 2019 International Engineering Conference (IEC) | 09/01/2020 | Scopus |
Jumana Waleed | The Security Threats and Solutions of Network Functions Virtualization: A Review | Journal of Al-Qadisiyah for computer science and mathematics | 25/12/2020 | مجلات محلية |
Jumana Waleed | Driver’s Drowsiness Monitoring and Alarming Auto-System Based on EOG Signals | 2019 2nd International Conference on Engineering Technology and its Applications (IICETA) | 27/02/2020 | Scopus |
Jumana Waleed | Effects of JPEG and JPEG2K Standard Algorithms on Compression of Laser Speckle Images Image Quality and on a Clinical Parameter Accuracy | Journal of Engineering and Applied Sciences | 01/01/2019 | web of Science |
Jumana Waleed | An Efficient Scheme of Digital Image Watermarking Based on Hessenberg Factorization and DWT | 2020 International Conference on Computer Science and Software Engineering (CSASE) | 16/07/2020 | Scopus |
Jumana Waleed | Algebraic Authentication Scheme | 2017 Second Al-Sadiq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA) | 27/05/2019 | Scopus |
Jumana Waleed | Smart home as a new trend, a simplicity led to revolution | 2018 1st International Scientific Conference of Engineering Sciences-3rd Scientific Conference of Engineering Science (ISCES) | 19/04/2018 | Scopus |
Jumana Waleed | An Optimized Zero-Watermarking Technique Based on SFL Algorithm | 2019 2nd International Conference on Electrical, Communication, Computer, Power and Control Engineering (ICECCPCE) | 23/04/2020 | Scopus |
Jumana Waleed | ASystematic Mapping Study on Brain Tumors Recognition Based on Machine Learning Algorithms | 2020 3rd International Conference on Engineering Technology and its Applications (IICETA) | 21/01/2021 | Scopus |
Jumana Waleed | An Inclusive Survey of Machine Learning based Hand Gestures Recognition Systems in Recent Applications | 2nd International Scientific Conference of Engineering Sciences (ISCES 2020) 16th-17th December 2020, Diyala, Iraq | 25/02/2021 | web of Science |
Jumana Waleed | A singular value decomposition based approach for the compression of encrypted images | International Journal of Engineering and Technology(UAE) | 01/01/2018 | Scopus |
Jumana Waleed | Human Speech and Facial Emotion Recognition Technique Using SVM | 2020 International Conference on Computer Science and Software Engineering (CSASE) | 16/07/2020 | Scopus |
Jumana Waleed | An Efficient and Fast Digital Image Copy-Move Forensic Technique | 2018 2nd International Conference for Engineering, Technology and Sciences of Al-Kitab (ICETS) | 30/05/2019 | Scopus |
Jumana Waleed | Secure Data In LoRaWAN Network By Adaptive Method Of Elliptic-curve Cryptography | 2019 International Conference on Computing and Information Science and Technology and Their Applications (ICCISTA) | 12/09/2019 | Scopus |
Jumana Waleed | Secure Data Transmissions for Iraqi National Identification Card Using LoRaWAN Protocol | 2019 2nd International Conference on Engineering Technology and its Applications (IICETA) | 27/02/2020 | Scopus |
Jumana Waleed | Mamdani FIS Combined With LU Decomposition Method and Two-Level LWT for Image Watermarking Technique | 2020 3rd International Conference on Engineering Technology and its Applications (IICETA) | 21/01/2021 | Scopus |
Jumana Waleed | An Effective Blind Detection Technique for Medical Images Forgery | Webology | 01/12/2020 | Scopus |
Jumana Waleed | Emotions Polarity of Tweets Based on Semantic Similarity and User Behavior Features | 2020 1st. Information Technology To Enhance e-learning and Other Application (IT-ELA) | 16/11/2020 | Scopus |
Jumana Waleed | The Inclusion of Watermarks Based on QR Code Analysis | International Journal of Engineering and Technology(UAE) | 01/01/2018 | Scopus |
Jumana Waleed | Information Hiding Based on Retina Random Number Keys | Solid State Technology | 30/07/2020 | web of Science |
Jumana Waleed | Eye-Gaze Estimation Systems for Multi-Applications: An Implementation of Approach Based on Laptop Webcam | Diyala Journal For Pure Science | 01/04/2018 | مجلات محلية |
Jumana Waleed | Development of Breast Cancer Diagnosis System Based on Fuzzy Logic And Probabilistic Neural Network | Eastern-European Journal of Enterprise Technologies | 31/08/2020 | Scopus |
Jumana Waleed | Comprehensive expansion in Anti-Forensics Techniques (AFTs) based compressed image | 2017 Annual Conference on New Trends in Information & Communications Technology Applications (NTICT) | 13/07/2017 | Scopus |
Jumana Waleed | IMPLEMENTATION OF DRIVER’S DROWSINESS ASSISTANCE MODEL BASED ON EYE MOVEMENTS DETECTION | Eastern-European Journal of Enterprise Technologies | 22/10/2020 | Scopus |
Jumana Waleed | Preservation Authentication and Authorization on Blockchain | 2019 2nd International Conference on Engineering Technology and its Applications (IICETA) | 27/02/2020 | Scopus |
khalid mohammed saffer | Evolutionary trajectory hybridization for improving deep learning accuracy in medical data prediction system | Materials Today: Proceedings | 13/09/2021 | Scopus |
khalid mohammed saffer | Determine the Close Friends for Twitter Users by Analyzing Users Public Data Name | Iraqi Journal for Computers and Informatics | 01/06/2016 | مجلات محلية |
khalid mohammed saffer | OPTIMAL CAPACITOR PLACEMENT IN RADIAL DISTRIBUTION SYSTEM USING MOTH FLAME OPTIMIZATION ALGORITHM | JOURNAL OF SOUTHWEST JIAOTONG UNIVERSITY | 01/06/2019 | Scopus |
khalid mohammed saffer | Effect of Diversification and Intensification Trade-Off in Anemia Medical Data Classification | REVISTA AUS | 25/08/2019 | Scopus |
khalid mohammed saffer | Multiple DGs for Reducing Total Power Losses in Radial Distribution Systems Using Hybrid WOA-SSA Algorithm | Hindawi International Journal of Photoenergy | 31/03/2019 | Scopus مع باحثين اجانب |
khalid mohammed saffer | A Heuristic Approach for Optimal Planning and Operation of Distribution Systems | Hindawi Journal of Optimization | 06/03/2018 | web of Science |
khalid mohammed saffer | A SYSTEMATIC MAPPING STUDY ON RUNTIME MONITORING OF SERVICES | The Iraqi Journal For Mechanical And Material Engineering | 01/12/2016 | مجلات محلية |
khalid mohammed saffer | Applying Swarm Algorithms on Unsupervised Color Image Classification | Journal of Babylon University for Pure and Applied Sciences | 01/06/2016 | مجلات محلية |
khalid mohammed saffer | A novel algorithm for estimation of Twitter users location using public available information | INTERNATIONAL JOURNAL ON SMART SENSING AND INTELLIGENT SYSTEMS | 09/07/2020 | Scopus |
Prof. Ziyad Tariq Mustafa Al-Ta’i | ModifiedPublic KeyCryptosystem for the Internet of ThingsApplications to Improve Security and Processing Speed | International Journal of Advanced Science and Technology | 01/01/2020 | web of Science |
Robust face recognition algorithm based on linear operators discrete wavelet transformation and simple linear regression | Robust face recognition algorithm based on linear operators discrete wavelet transformation and simple linear regression | ACM | 12/08/2018 | Scopus مع باحثين اجانب |
Wasan Ahmed Ali | Preservation Authentication and Authorization on Blockchain | ieee | 25/05/2020 | Scopus |
Wasan Ahmed Ali | Preservation Authentication and Authorization on Blockchain | ieee | 25/05/2020 | Scopus |
Zainab Mohammed Ali | The Application of Data Mining for Predicting Academic Performance Using K-means Clustering and Naïve Bayes Classification | International Journal of Psychosocial Rehabilitation | 01/02/2020 | Scopus |
Zainab Mohammed Ali Al-Azzawi | Effects of JPEG and JPEG2K Standard Algorithms on Compression of Laser Speckle images: Hmage Quality and on a Clinical Parameter Accuracy | Journal of Engineering And Applied Sciences | 01/09/2019 | Scopus |
Ziyad Tariq Mustafa | Dynamic keys generation for internet of things | Indonesian Journal of Electrical Engineering and Computer Science | 01/05/2020 | Scopus |
Ziyad Tariq Mustafa | Online Intrusion Detection System Using C4.5 Algorithm with Honeypot | Journal of Engineering and Applied Sciences | 01/08/2020 | web of Science |
Ziyad Tariq Mustafa Al-Ta’ | Comparison Between Bat Algorithm and Harmony Algorithm using Retina Authentication | Journal of Engineering and Applied Sciences | 04/01/2019 | web of Science |
Ziyad Tariq Mustafa Al-Ta’ i | Improvement of Authentication in Smartphones Using Embedded Pattern-Based Features | International Journal of Computer Science and Mobile Computing | 15/03/2019 | web of Science |
Ziyad Tariq Mustafa Al-Ta’i | Heart Disease Prediction System Using Optimization Techniques | International Conference on New Trends in Information and Communications Technology Applications | 13/08/2020 | Scopus |
Ziyad Tariq Mustafa Al-Ta’i | HUMAN EAR RECOGNITION USING SURF-PSO TECHNIQUE | Journal of Theoretical and Applied Information Technology | 15/02/2019 | web of Science |
Ziyad Tariq Mustafa Al-Ta’i | Image Steganography between Firefly and PSO Algorithms | International Journal of Computer Science and Information Security (IJCSIS) | 01/01/2017 | Scopus |
Ziyad Tariq Mustafa Al-Ta’i | Secure Distributed Data Using Multi-Cloud | International Journal of Innovative Technology and Exploring Engineering (IJITEE) | 01/02/2020 | web of Science |
ZIYAD TARIQ MUSTAFA AL-TA’I | IMAGE STEGANOGRAPHY BASED THE BEHAVIOR OF PARTICLE SWARM OPTIMIZATION | Journal of Theoretical & Applied Information Technology | 30/06/2018 | Scopus |
Ziyad Tariq Mustafa Al-Ta’i | Digital Signature of Document using Human Palm | (International Journal of Engineering and Advanced Technology (IJEAT | 01/10/2019 | Scopus |
Ziyad Tariq Mustafa Al-Ta’i | Feature Selection using Hybrid Dragonfly Algorithm in a Heart Disease Predication System | International Journal of Engineering and Advanced Technology (IJEAT) | 01/08/2019 | web of Science |
Ziyad Tariq Mustafa Al-Ta’i | Using Magic Cube and a Modified LSB for Audio Steganography | International Journal of Engineering & Technology | 01/02/2019 | مجلات محلية |
Ziyad Tariq Mustafa Al-Ta’i | Q-NTRU Cryptosystem for IoT Applications | Journal of Southwest Jiaotong University | 01/08/2019 | Scopus |
Ziyad Tariq Mustafa Al-Ta’i | An Enhancement of LSB Audio Steganography Using Magic Cube | Diyala Journal of Pure Sciences | 13/02/2019 | مجلات محلية |
Ziyad Tariq Mustafa Al-Ta’i | Improved RC6 Algorithm using Two Types of Chaos Maps | International Journal of Engineering and Advanced Technology (IJEAT) | 01/10/2019 | Scopus |
Ziyad Tariq Mustafa Al-Ta’i | Comparison Between PSO and HPSO In Image Steganography | International Journal of Computer Science and Information Security (IJCSIS) | 01/08/2017 | web of Science |
ا.م.د بشار طالب حميد | Binary Particle Swarm Optimization versus Hybrid Genetic Algorithm for Inferring Well Supported Phylogenetic Trees | Lecture Notes in Computer Science (Springer International Publishing) | 09/01/2016 | web of Science مع باحثين اجانب |
ا.م.د بشار طالب حميد | Ancestral Reconstruction and Investigations of Genomic Recombination on some Pentapetalae Chloroplasts | Journal of integrative bioinformatics | 01/12/2019 | web of Science مع باحثين اجانب |
ا.م.د بشار طالب حميد | On the Ability to Reconstruct Ancestral Genomes from Mycobacterium Genus | BMC Bioinformatics(Springer International Publishing) | 01/04/2018 | web of Science مع باحثين اجانب |
ا.م.د بشار طالب حميد | Relation between Gene Content and Taxonomy in Chloroplasts | International Journal of Bioscience, Biochemistry and Bioinformatics | 20/01/2017 | Scopus مع باحثين اجانب |
ا.م.د بشار طالب حميد | On the reconstruction of the ancestral bacterial genomes in genus Mycobacterium and Brucella | BMC Systems Biology (Springer International Publishing) | 20/11/2018 | Scopus مع باحثين اجانب |
ا.م.د بشار طالب حميد | Comparison of Metaheuristics to Measure Gene Effects on Phylogenetic Supports and Topologies | BMC Bioinformatics(Springer International Publishing) | 01/04/2017 | web of Science مع باحثين اجانب |
ا.م.د بشار طالب حميد | An Improved Deep CNN for Plants Diseases Detection and Diagnosis | Solid State Technology | 08/06/2020 | Scopus |
ا.م.د بشار طالب حميد | Effects of JPEG and JPEG2K Standard Algorithms on Compression of Laser Speckle Images: Image Quality and on a Clinical Parameter Accuracy | Journal of Engineering and Applied Sciences | 07/01/2019 | Scopus |
ا.م.د جمال مصطفى عباس | Plant Leaf Diseases Detection and Classification Using Image Processing and Deep Learning Techniques | 2020 International Conference on Computer Science and Software Engineering (CSASE))IEEE | 16/07/2020 | Scopus |
اسماعيل صالح عارف | Online Intrusion Detection System using C4.5 Algorithm with Honeypot | Medwell | 27/11/2020 | Scopus |
برهان مولان صالح | Misuse detection in a simulated IaaS environment | International Workshop on Emerging Technologies for Authorization and Authentication | 09/07/2018 | Scopus مع باحثين اجانب |
برهان مولان صالح | Behavioural Profiling for Transparent Verification in Cloud Storage Services | Journal of Information Warfare | 10/01/2018 | Scopus مع باحثين اجانب |
برهان مولان صالح | Continuous identity verification in cloud storage services using behavioural profiling | ECCWS 2018 17th European Conference on Cyber Warfare and Security V2 | 06/01/2018 | Scopus مع باحثين اجانب |
برهان مولان صالح | Adaptive behavioral profiling for identity verification in cloud computing: A model and preliminary analysis | GSTF Journal on Computing (JoC) | 08/10/2016 | Scopus مع باحثين اجانب |
جمال مصطفى عباس | An Enhanced Fireworks Algorithm to Generate Prime Key for Multiple Users in Fingerprinting Domain | Bulletin of Electrical Engineering and Informatics (BEEI)2 | 20/02/2020 | Scopus |
جمال مصطفى عباس | Image Steganography between Firefly and PSO Algorithms | International Journal of Computer Science and Information Security | 01/02/2017 | Scopus |
جمال مصطفى عباس | HUMAN EAR RECOGNITION USING SURF-PSO TECHNIQUE | Journal of Theoretical and Applied Information Technology | 15/02/2019 | Scopus |
جمال مصطفى عباس | Satellite Images Scene Classification Based Support Vector Machines and K-Nearest Neighbor | Diyala Journal For Pure Science | 22/04/2019 | مجلات محلية |
جمال مصطفى عباس | Cancer Classification Using Gaussian Naive Bayes Algorithm | 2019 International Engineering Conference (IEC) | 10/06/2019 | Scopus |
جمال مصطفى عباس | Text In Image Steganography Hiding Based Convolution Techniques | International Journal of Advanced Science and Technology | 20/03/2020 | Scopus |
جمال مصطفى عباس | A Multi Biometric for Adoptive Key Generation Using Shark Smell Optimization Algorithm | Solid State Technology | 12/09/2020 | Scopus |
جمال مصطفى عباس | Deep Learning Techniques Toward Advancement of Plant Leaf Diseases Detection | 2020 2nd Al-Noor International Conference for Science and Technology (NICST) | 28/08/2020 | Scopus |
جمال مصطفى عباس | Plant Leaf Diseases Detection and Classification Using Image Processing and Deep Learning Techniques | 2020 International Conference on Computer Science and Software Engineering (CSASE) | 16/07/2020 | Scopus |
جمال مصطفى عباس | Intelligent System For Human Age Estimation Using Hybrid Machine Learning Technique | International Journal of Advanced Science and Technology | 22/04/2020 | Scopus |
جمال مصطفى عباس | Brain Tumors Classification by Using Gray Level Cooccurrence Matrix, Genetic Algorithm and Probabilistic Neural Network | Diyala Journal of Medicine | 15/06/2018 | مجلات محلية |
جمال مصطفى عباس | A Hybrid Approach for Classification of MRI Brain Tumors Using Genetic Algorithm, K-Nearest Neighbor and Probabilistic Neural Network | International Journal of Computer Science and Information Security (IJCSIS) | 22/05/2018 | Scopus |
جمال مصطفى عباس | An Employed of PNN algorithm in Smart Farming System for Early Plant Disease Detection and Diagnosis | Solid State Technology | 06/12/2020 | Scopus |
جمال مصطفى عباس | Face Detection System Based Viola-Jones Algorithm | Conference: 2020 6th International Engineering Conference “Sustainable Technology and Development” (IEC) | 23/06/2020 | Scopus |
جمال مصطفى عباس | Performance Evaluation of Face Image Recognition Based Voila–Joins with SVM | Iraqi Journal of Information Technology | 06/04/2018 | Scopus |
جمال مصطفى عباس | Face Image Recognition Based on Linear Discernment Analysis and Cuckoo Search Optimization with SVM | International Journal of Computer Science and Information Security | 11/02/2017 | Scopus |
جمال مصطفى عباس | Creation Optimal Materialized Views using Bitmap Index and Firefly Algorithm in Data Warehouse | 2019 2nd Scientific Conference of Computer Sciences (SCCS) | 3/7/0019 | Scopus |
جمال مصطفى عباس | Selection of Optimal Materialized Views in Data Warehouse Using Hybrid Technique | International Journal of Computer Science and Mobile Computing | 04/05/2019 | Scopus |
جمال مصطفى عباس | Image encryption based on fractal geometry and chaotic map | Diyala Journal for Pure Science | 09/12/2018 | مجلات محلية |
جمال مصطفى عباس | Multi-Cipher Technique based on RNA and Chebyschev Map | Iraqi Journal of information Technology | 13/06/2015 | Scopus |
حازم نومان عبد | The impact of digital communication on social networks: A review | International Journal of Computer Science and Mobile Computing | 01/01/2016 | مجلات محلية |
حازم نومان عبد | Robust and secured image steganography using lsb and encryption with qr code | Journal of AL-Qadisiyah for computer science and mathematics | 20/08/2017 | مجلات محلية |
حازم نومان عبد | Increasing security for RC4 algorithm by using PUF-based random number generators | International Journal of Engineering and Technology(UAE) | 04/07/2018 | Scopus |
حازم نومان عبد | Hiding information in an image based on bats algorithm | Iraqi Journal of Information Technology | 02/01/2018 | مجلات محلية |
حازم نومان عبد | Multilevel hiding text security using hybrid technique steganography and cryptography | International Journal of Engineering & Technology | 04/07/2018 | Scopus |
حازم نومان عبد | The Application of Data Mining for Predicting Academic Performance Using K-means Clustering and Naïve Bayes Classification | International Journal of Psychosocial Rehabilitation | 24/02/2020 | Scopus |
رجاء احمد علي | Fast Dynamic Random Numbers Generator and Applications in Cryptosystems (FDRNG) | Diyala Journal for Pure Sciences | 07/01/2017 | مجلات محلية |
رجاء احمد علي | Investigation Framework of Online Analytical Processing in Academic Information Systems to Support Decision Making | Jour of Adv Research in Dynamical & Control Systems | 12/12/2018 | Scopus |
رجاء احمد علي | Random Number Generator based on Hybrid Algorithm between Particle Swarm Optimization (PSO) Algorithm and 3D-Chaotic System and its Application | Iraqi Journal of Information Technology. V.8 N.3. 2018 | 10/08/2018 | مجلات محلية |
رجاء احمد علي | Multilevel hiding text security using hybrid technique steganography and cryptography | International Journal of Engineering & Technology | 07/04/2018 | Scopus |
طه حسن محمد | Information Hiding Based on Retina Random Number Keys | Solid State Technology | 30/07/2020 | Scopus |
طه حسن محمد | ECC Based Data Retrieval Using LoRaWAN Technology | International Journal of Engineering & Technology | 06/06/2018 | Scopus |
طه حسن محمد | Citation Networks Iraqi Universities Case Study | 2020 3rd International Conference on Engineering Technology and its Applications (IICETA) | 06/09/2020 | Scopus |
طه حسن محمد | NO-REFERENCE OBJECTIVE VIDEO QUALITY METRIC BASED ON WATERMARKING TECHNIQUE USING DISCRETE COSINE TRANSFORM | International Journal of Advanced Research (IJAR) | 09/08/2017 | Scopus |
طه حسن محمد | IMPROVED APPROACH TO IRIS SEGMENTATION BASED ON BRIGHTNESS CORRECTION FOR IRIS RECOGNITION SYSTEM | Journal of Theoretical and Applied Information Technology | 05/11/2017 | Scopus |
طه حسن محمد | Impact of Dimensionality Reduction on The Accuracy of Data Classification | 2020 3rd International Conference on Engineering Technology and its Applications (IICETA) | 06/09/2020 | Scopus |
طه حسن محمد | A digital signature system based on real time face recognition | 2019 IEEE 9th International Conference on System Engineering and Technology (ICSET) | 07/10/2019 | Scopus |
طه حسن محمد | Generating and Validating DSA Private Keys from Online Face Images for Digital Signatures | International Journal on Advanced Science, Engineering and Information Technology | 01/06/2019 | Scopus |
طه حسن محمد | Batool Abd Alhadi, Taha Mohammed Hasan, Hadi Athab Hamed | International Conference on New Trends in Information and Communications Technology Applications | 15/06/2020 | Scopus |
طه حسن محمد | Maintaining the Integrity of Encrypted Data by Using the Improving Hash Function Based on GF (????) | TEM Journal | 01/08/2020 | Scopus |
طه حسن محمد | Multi-Authority System based Personal Health Record in Cloud Computing | Journal of AL-Qadisiyah for computer science and mathematics | 06/08/2017 | مجلات محلية |
طه حسن محمد | Secure data in lorawan network by adaptive method of elliptic-curve cryptography | 2019 International Conference on Computing and Information Science and Technology and Their Applications (ICCISTA) | 03/03/2019 | Scopus |
طه حسن محمد | Fast Dynamic Random Numbers Generator and Applications in Cryptosystems (FDRNG) | Diyala Journal for Pure Sciences | 05/11/2017 | مجلات محلية |
طه حسن محمد | An Expanded Vision of Breast Cancer Diagnosis Approaches Based on Machine Learning Techniques | 2019 International Engineering Conference (IEC) | 23/06/2019 | Scopus |
طه حسن محمد | Effects of JPEG and JPEG2K Standard Algorithms on Compression of Laser Speckle Images Image Quality and on a Clinical Parameter Accuracy | Journal of Engineering and Applied Sciences | 15/04/2019 | Scopus |
طه حسن محمد | An Expansion in Classification of Eye Gaze Detection Methods | Journal of Engineering and Applied Sciences | 06/08/2018 | Scopus |
طه حسن محمد | Eye-gaze estimation systems for multi-applications: An implementation of approach based on laptop webcam | Diyala Journal For Pure Science | 01/04/2018 | مجلات محلية |
طه حسن محمد | Comprehensive expansion in Anti-Forensics Techniques (AFTs) based compressed image | IEEE | 07/03/2017 | Scopus |
طه حسن محمد | IMPLEMENTATION OF DRIVER’S DROWSINESS ASSISTANCE MODEL BASED ON EYE MOVEMENTS DETECTION | Восточно-Европейский журнал передовых технологий | 01/09/2020 | Scopus |
طه حسن محمد | MATHEMATICAL TRANSFORMATIONS WITH SPIHT ALGORITHM FOR STEGANOGRAPHY TECHNIQUES | Journal of Theoretical and Applied Information Technology | 31/05/2018 | Scopus |
طه حسن محمد | Abbreviated View of Deepfake Videos Detection Techniques | 2020 6th International Engineering Conference “Sustainable Technology and Development”(IEC) | 26/02/2020 | Scopus |
طه حسن محمد | Effective and Fast DeepFake Detection Method Based on Haar Wavelet Transform | IEEE | 16/04/2020 | Scopus |
طه حسن محمد | Enhanced Approach to Iris Normalization Using Circular Distribution for Iris Recognition system | (IJCSIS) International Journal of Computer Science and Information Security | 01/09/2017 | Scopus |
طه حسن محمد | Authentication on Smartphones based Iris Recognition | Journal of Engineering and Applied Sciences | 01/06/2019 | Scopus |
طه حسن محمد | A review of image retrieval based on ontology model | Journal of Al-Qadisiyah for computer science and mathematics | 16/02/2020 | مجلات محلية |
طه حسن محمد | Secure Data Transmissions for Iraqi National Identification Card Using LoRaWAN Protocol | 2019 2nd International Conference on Engineering Technology and its Applications (IICETA) | 27/08/2019 | Scopus |
طه حسن محمد | Smart Home as a New Trend, a Simplicity Led to Revolution | 2018 1st International Scientific Conference of Engineering Sciences – 3rd Scientific Conference of Engineering Science (ISCES) | 07/01/2018 | Scopus |
طه حسن محمد | Improving Security and Sharing Management in Cloud Computing Using TPA | 2019 1st AL-Noor International Conference for Science and Technology (NICST) | 25/10/2019 | Scopus |
طه حسن محمد | Cryptosystems using an improving hiding technique based on latin square and magic square | Indonesian Journal of Electrical Engineering and Computer Science | 15/10/2020 | Scopus |
طه حسن محمد | Maintaining the Integrity of Encrypted Data by Using the Improving Hash Function Based on GF ( ) | TEM | 02/08/2020 | Scopus |
طه حسن محمد | Development of Breast Cancer Diagnosis System Based on Fuzzy Logic and Probabilistic Neural Network | Eastern-European Journal of Enterprise Technologies | 31/08/2020 | Scopus |
طه حسن محمد | An Effective Blind Detection Technique for Medical Images Forgery | Webology | 01/12/2020 | Scopus |
طه حسن محمد | Correlated Hierarchical Autoregressive Models Image Compression | Diyala Journal for Pure Sciences | 7/1/0217 | مجلات محلية |
طه حسن محمد | IoE prototype for scalable infrastructures, architectures and platforms | Int. Robot. Autom. J | 01/06/2018 | Scopus |
طه حسن محمد | Brain Computer Interface Enhancement Based on Stones Blind Source Separation and Naive Bayes Classifier | nternational Conference on New Trends in Information and Communications Technology Applications | 15/06/2020 | Scopus |
طه حسن ممد | Retina random number generator for stream cipher cryptography | International Journal of Computer Science and Mobile Computing | 10/09/2019 | Scopus |
ظاهر عبد الهادي عبد الله | Scq Author Name Pages ID | Presents an index of the authors whose articles are published in the conference proceedings record. | 12/12/2018 | Scopus |
ظاهر عبد الهادي عبد الله | Effect Z-score Normalization on Accuracy of classification of liver disease | Turkish Journal of Computer and Mathematics Education (TURCOMAT) | 31/07/2021 | Scopus |
ظاهر عبد الهادي عبد الله | Breast Cancer Classification: Using Hybrid Technique (Association Rules and Deep Neural Network) | Journal of Physics: Conference Series | 12/09/2019 | Scopus |
ظاهر عبد الهادي عبد الله | Brain Tumors Classification by Using Gray Level Co-occurrence Matrix, Genetic Algorithm and Probabilistic Neural Network | Diyala Journal of Medicine | 16/08/2018 | مجلات محلية |
ظاهر عبد الهادي عبد الله | Comprehensive Display of Digital Image Copy-Move Forensics Techniques | 2018 International Conference on Engineering Technology and their Applications (IICETA) | 08/05/2018 | Scopus |
ظاهر عبد الهادي عبد الله | An efficient and fast digital image copy-move forensic technique | 2018 2nd International Conference for Engineering, Technology and Sciences of Al-Kitab (ICETS) | 04/12/2018 | Scopus |
ظاهر عبد الهادي عبد الله | Skin Cancer Classification Using CNN | Solid State Technology | 30/07/2020 | Scopus |
ظاهر عبد الهادي عبد الله | A Hybrid Approach for Classification of MRI Brain Tumors Using Genetic Algorithm, K-Nearest Neighbor and Probabilistic Neural Network | International Journal of Computer Science and Information Security (IJCSIS) | 10/05/2018 | Scopus |
ظاهر عبد الهادي عبد الله | Enhancement of RC4 Algorithm using PUF | International Journal of Engineering and Innovative Technology (IJEIT) | 01/12/2017 | Scopus |
ظاهر عبد الهادي عبد الله | Classification of Liver Dataset Using Data Mining Algorithms | International Conference for pure Science ICPS-2021 | 27/05/2021 | Scopus |
ظاهر عبد الهادي عبد الله | Random Numbers Generator Using Microcontroller PUF | International Journal of Computer Science and Information Security (IJCSIS) | 07/09/2017 | Scopus |
ظاهر عبد الهادي عبد الله | Improvement of Authentication in Smartphones Using Embedded Pattern-Based Features | International Journal of Computer Science and Mob | 15/03/2019 | Scopus |
ظاهر عبد الهادي عبد الله | مصادقة حركة الأصابع باستخدام المقاييس الحيوية | جامعة ديالى | 02/06/2019 | مجلات محلية |
ظاهر عبد الهادي عبد الله | Cancer Classification Using Gaussian Naive Bayes Algorithm | IEEE | 15/04/2019 | Scopus |
عادل عبد الوهاب | AutoCryoPicker: an unsupervised learning approach for fully automated single particle picking in Cryo-EM images | BMC bioinformatics | 31/12/2019 | Scopus مع باحثين اجانب |
عادل عبد الوهاب | Auto3DCryoMap: an automated particle alignment approach for 3D cryo-EM density map reconstruction | BMC bioinformatics | 06/12/2020 | Scopus مع باحثين اجانب |
عادل عبد الوهاب | Simulation design and testing of a dielectric embedded tapered slot UWB antenna for breast cancer detection | Progress In Electromagnetics Research C | 12/03/2017 | Scopus |
عادل عبد الوهاب | Localized deep-CNN structure for face recognition | 2018 11th International Conference on Developments in eSystems Engineering (DeSE) | 22/09/2018 | Scopus مع باحثين اجانب |
عادل عبد الوهاب | DeepCryoPicker: fully automated deep neural network for single protein particle picking in cryo-EM | BMC Bioinformatics | 09/11/2020 | Scopus مع باحثين اجانب |
عادل عبد الوهاب | Time series social network visualization based on dimension reduction | Václav Skala-UNION Agency | 04/05/2018 | Scopus |
عادل عبد الوهاب | Deep Tweets Analyzer Model for Twitter Mood Visualization and Prediction Based Deep Learning Approach | International Journal of Computer and Communication Engineering | 08/09/2019 | Scopus مع باحثين اجانب |
عادل عبد الوهاب | NLP based sentiment analysis for Twitter’s opinion mining and visualization | Eleventh International Conference on Machine Vision (ICMV 2018) | 15/03/2019 | Scopus مع باحثين اجانب |
عادل عبد الوهاب | NLP based sentiment analysis for Twitter’s opinion mining and visualization | Eleventh International Conference on Machine Vision (ICMV 2018) | 15/03/2019 | Scopus مع باحثين اجانب |
عادل عبد الوهاب | A Robust Spatially Invariant Model for Latent Fingerprint Authentication Approach | 2017 10th International Conference on Developments in eSystems Engineering (DeSE) | 14/06/2017 | Scopus مع باحثين اجانب |
عادل عبد الوهاب | Deep learning approach for secondary structure protein prediction based on first level features extraction using a latent cnn structure | Int. J. Adv. Comput. Sci. Appl | 01/04/2017 | Scopus |
عادل عبد الوهاب | Fully automated deep supervised and unsupervised learning approaches for 3D protein cryo-EM density map reconstruction | University of Missouri–Columbia | 02/06/2019 | Scopus |
عادل عبد الوهاب | Correlated Feature Selection Model based on Swarm Intelligence to Enhance Rotational Invariant Fingerprint Authentication using Firefly Optimized Algorithm | International Journal of Advanced Research in Computer and Communication Engineering | 02/10/2016 | Scopus |
عادل عبد الوهاب | Contrast Level Test-based Methodology for Speed-Up MRI Brain Tumor Detection and Localization Approach | International Journal of Innovative Research in Computer and Communication Engineering | 16/10/2016 | Scopus |
عادل عبد الوهاب | An Efficient Spatially Invariant Model for Fingerprint Authentication based on Particle Swarm Optimization | Progress in Biomedical Engineering Research | 22/03/2016 | Scopus |
عادل عبد الوهاب | Robust Facial Image Gender Identification Based on a Comparison between Non-Boosted and AdaBoosted Classification Algorithms | Robust Facial Image Gender Identification Based on a Comparison between Non-Boosted and AdaBoosted Classification Algorithms | 05/09/2016 | Scopus |
عادل عبد الوهاب | Anes Ouadou, John J Tanner, Jianlin Cheng | Genes | 23/09/2019 | Scopus |
عادل عبد الوهاب | Simulation design and testing of a dielectric embedded tapered slot UWB antenna for breast cancer detection | Progress In Electromagnetics Research C | 12/03/2017 | Scopus |
عادل عبد الوهاب | Localized Deep Norm-CNN Structure for Face Verification | 2018 17th IEEE International Conference on Machine Learning and Applications (ICMLA) | 17/12/2018 | Scopus مع باحثين اجانب |
عادل عبد الوهاب | Personalize review selection using PeRView | International Conference on Knowledge Science, Engineering and Management | 17/08/2018 | Scopus |
علي عبد الرحمن محمود | Classifying imbalanced multi-modal sensor data for human activity recognition in a smart home using deep learning | 2020 International Joint Conference on Neural Networks (IJCNN) | 19/07/2020 | Scopus مع باحثين اجانب |
علي عبدالرحمن محمود | Activity recognition from multi-modal sensor data using a deep convolutional neural network | Science and Information Conference | 10/07/2018 | Scopus مع باحثين اجانب |
علي عبدالرحمن محمود | Fingerprint classification using a deep convolutional neural network | 2018 4th International Conference on Information Management (ICIM) | 25/05/2018 | Scopus مع باحثين اجانب |
علي عبدالرحمن محمود | Hand gesture recognition using an adapted convolutional neural network with data augmentation | 2018 4th International conference on information management (ICIM) | 25/05/2018 | Scopus مع باحثين اجانب |
علي عبدالرحمن محمود | A hybrid model for classification of biomedical data using feature filtering and a convolutional neural network | 2018 Fifth International Conference on Social Networks Analysis, Management and Security (SNAMS) | 15/10/2018 | Scopus مع باحثين اجانب |
علي عبدالرحمن محمود | On-line voltage stability monitoring using an Ensemble AdaBoost classifier | 2018 4th International Conference on Information Management (ICIM) | 25/05/2018 | Scopus مع باحثين اجانب |
علي عبدالرحمن محمود | Arabic Handwritten Digit Recognition Based on Restricted Boltzmann Machine and Convolutional Neural Networks | Information | 09/11/2017 | Scopus |
م.م ليلى عبد الحق اسماعيل خليل | Pattern Discovery for Text Mining Measured by Levenshtein Edit Distance | IEEE explore | 09/01/2020 | Scopus |
مصطفى جمال عباس | Breast Cancer Classification: Using Hybrid Technique (Association Rules and Deep Neural Network) | Journal of Physics: Conf. Series 1294 (2019) 042009 | 23/09/2019 | Scopus |
مصطفى جمال عباس | Intelligent Human Age Estimation Based Machine Learning Techniques | 2019 1st AL-Noor International Conference for Science and Technology (NICST) | 25/06/2020 | Scopus |
مصطفى جمال عباس | Satellite Images Multiple Data Using Clustering Techniques | Iraqi Journal of Information Technology. V | 23/02/2018 | Scopus |
منتظر خميس مصطفى | A Real-Time American Sign Language Recognition System using Convolutional Neural Network for Real Datasets | TEM Journal | 02/09/2020 | Scopus |
منتظر خميس مصطفى | Multi-objective feature selection: hybrid of salp swarm and simulated annealing approach | موتمر | 02/10/2018 | Scopus |
منتظر خميس مصطفى | Hybrid SCA-CS optimization algorithm for feature selection in classification problems | AIP Conference Proceedings | 12/04/2020 | Scopus |
منتظر خميس مصطفى | Train the Multi-Layer Perceptrons Based on Crow Search Algorithm | 2020 1st. Information Technology To Enhance e-learning and Other Application (IT-ELA | 12/07/2020 | Scopus |
منتظر خميس مصطفى | A new approach for features selection based on binary slap swarm algorithm. | Journal of Theoretical & Applied Information Technology | 15/04/2018 | Scopus |
وسن سعد احمد | Construction a MATLAB Program to Solving the Timetable Scheduling Problem | Journal of Engineering and Applied Sciences | 01/10/2018 | Scopus |
وسن سعد أحمد | A novel algorithm for generating an edge-regular graph | Procedia Computer Science | 01/01/2020 | Scopus |
وسن سعد أحمد | Train the Multi-Layer Perceptrons Based on Crow Search Algorithm | IEEE | 16/11/2020 | Scopus |
وسن سعد أحمد | The Application of Data Mining for Predicting Academic Performance Using K-means Clustering and Naïve Bayes Classification | International Journal of Psychosocial Rehabilitation | 15/06/2020 | Scopus |
وسن سعد أحمد | Increasing security for RC4 algorithm by using PUF-based random number generators | International Journal of Engineering and Technology(UAE) | 01/11/2018 | Scopus |
الابحاث المنشورة 2009 -2015
اسم التدريسي |
اسم البحث |
اسم المجلة |
معامل التاثير |
العدد/التاريخ NO. |
أ.د زياد طارق مصطفى الطائي |
Effect of Block Quantization on Walsh Transform Coding |
Journal of Al-Rafidain University College,Baghdad,1995. |
|
|
Audio Steganography Using Masking Effect |
Journal of Al-Rafidain University College for Sciences (Special Issue) First Workshop on Information Hiding Technologies, Baghdad, May 15, 2002 |
|
Special Issue |
|
Audio Steganography Using Transform Technique |
Diyala Journal for Applied Researches Vol.1, No.2, 2005. |
|
Vol.1, No.2, 2005. |
|
Audio in Image Steganography Using Same Weak Point in HAS&HVS |
Diyala Journal for Applied Researches Vol.1, No.1, 2005 |
|
Vol.1, No.1, 2005 |
|
Open Code Speech |
Diyala Journal for Applied Researches Vol.1, No.1, 2005 |
|
Vol.1, No.1, 2005 |
|
Image Cryptography Using Secret Sharing |
Diyala Journal for Applied Researches Vol.2, No.1, 2006 |
|
Vol.2, No.1, 2006 |
|
Implementation of Invisible Spread Spectrum Image Watermarking |
Diyala Journal for Applied Researches Vol.2, No.1, 2005 |
|
Vol.2, No.1, 2005 |
|
Double Layer Audio Hiding |
Journal of Diyala Scientific Issue, No.22, 2006. |
|
Scientific Issue, No.22, 2006. |
|
Development of Signature in Signature Hiding Model |
Proceedings of Eleventh Conference of Foundation of Technical Education, Baghdad, 23-24 March, 2009. |
|
|
|
Development of Binary Image Steganographic Model |
Journal of Diyala Scientific Issue, No.39, 2009. |
|
No.39, 2009. |
|
Using Wavelet Transform as an Audio Steganographic Tool |
Proceedings of Tenth Conference of Al-Ma’mon University College , Baghdad, 22-23 March, 2009. |
|
|
|
Evaluation of Wavelet Transform Audio Hiding |
Journal of Diyala Scientific Issue, No.39, 2009. |
|
Scientific Issue, No.39, 2009. |
|
Effect of Data Type on point to point Bluetooth Link |
Diyala Journal for Pure Sciences, Vol.6, Issue 1, 2010 |
|
Vol.6, Issue 1 2010 |
|
Simulation of New Covert Audio Cryptographic Model |
2011 3rd International Conference on Machine Learning and Computing |
|
2011 |
|
Development of Multilayer New Covert Audio Cryptographic Model |
International Journal of Machine Learning and Computing1 |
|
, Vol. 1, No. 2, June 2011 |
|
Off-Line Signature Identification Using Moment Algorithm |
Diyala Journal for Pure Sciences, Vol. 8, No.3, July 2012 |
|
Vol. 8, No.3, July 2012 |
|
Effect of Communication Channel on Transferred Data |
Diyala Journal for Pure Sciences, Vol. 9, No.4, October 2013 |
1.895 |
Vol. 9, No.4, October 2013 |
|
Comparison between PSO and Firefly Algorithms in Fingerprint Authentication |
International Journal of Engineering and Innovative Technology |
|
Volume 3, Issue 1,July 2013
|
|
Features Extraction of Fingerprints using Firefly Algorithm |
SIN’13,Nov26-28-2013,Aksaray,Turkey ACM 978-1-4503-2498-4/13/11.…$15.00. http://dx.doi.org/10.1145/2523514.252701 |
|
2013 |
|
Packet Steganography using IP ID |
Diyala Journal for Pure Sciences |
|
Vol.10, No.4, PP1-10 2014 |
|
Enhancing Protocol Steganography Using Firefly Algorithm |
International Journal of Scientific & Engineering Research, Volume 5, Issue 3, March-2014. ISSN 2229-5518 |
|
Volume 5, Issue 3, March-2014. |
|
Cipher System using Artificial Bees Colony Algorithm |
Diyala Journal for Pure Sciences, Vol. 10, No.1, 2014 |
|
Vol. 10, No.1, 2014 |
|
أ.د ظاهر عبدالهادي عبدالله |
Evaluation of Wavelet transforms audio hiding. |
|
|
2010 |
Audio Steganography using transforms Technique. |
|
|
2010 |
|
An Equivalent Distribution Coxian distribution. |
|
|
2010 |
|
Audio in Image Steganography using same weak point HAS and HVS. |
|
|
2011 |
|
Modeling and Evaluation of Queuing Systems. |
|
|
2012 |
|
Objective flow-shop scheduling using PSO Algorithm. |
|
|
2012 |
|
أ. ناجي مطر سحيب |
Complex public key cryptosystems |
مجلة المنصور |
|
2010 |
Non-Linear behavior of eneryption |
مجلة ديالى |
|
2011 |
|
Seheduling job Families on A single machine |
مجلة ام سلمى |
|
2010 |
|
Arabic Stego_ System based on Aabic Language Structure and Pronunciation |
مجلة المنصور |
|
2013 |
|
Fourth – order Eigenvalue Problem with Eigenvalue Contained in Tow – Point Boundary Condition |
مجلة كلية بغداد للعلوم الاقتصادية |
|
2013 |
|
Fast Neural Synchronizations Using geometrical Analysis for Random Walk in Search Space |
مجلة تكنلوجيا المعلومات |
|
2013 |
|
أ.م.د.طه محمد حسن
|
The Impact of Image Structure on the Fractal Image Compression (FIC) |
2011 International Conference on Computer Applications and Network Security |
|
3(8): 757-764, 2011
|
Two Suggested Methods for Faster Fractal Image Compression |
Research Journal of Applies Sciences, Engineering and Technology |
|
VOL. 6, NO. 6, DECEMBER 2011 |
|
An Adaptive Algorithm for Improving the Fractal Image Compression (FIC) |
JOURNAL OF MULTIMEDIA |
|
Vol. 10, Issue 2, No 1, March 2013 |
|
An Adaptive Fractal Image Compression |
IJCSI International Journal of Computer Science Issues |
|
|
|
أ.م.د.جمال مصطفى عباس |
Automated Generic weak point analysis of Business Process |
Proceedings of the 26th UK Performance Engineering Workshop, UK, 2010.
|
|
2010 |
Generic Business Process Model for Quantitative Evaluation |
Poster Session at The Newcastle Connection 2012, UK, 2012.
|
|
2012 |
|
م.يحيى محمد حسين |
A Miniaturized Folded Microstrip MIMO Antenna Array for Biomedical Applications
|
DIYALA JOURNAL OF ENGINEERING SCIENCES
|
Awaiting |
March 2015 |
Conformal Antenna Array for MIMO Applications |
Journal of Electromagnetic Analysis and Applications |
0.96 |
March 2014 |
|
Parity Assisted Decoding for QAM in AWGN Channels |
International Journal of Engineering and Innovative Technology (IJEIT) |
0.477 |
February 2014 |
|
Spectrally Efficient Modulation and Turbo Coding for Wireless Communication in Gaussian Channel |
International Journal of Engineering and Innovative Technology (IJEIT) |
0.477 |
February 2014 |
|
A Systematic Approach for Design, Fabrication and Testing of Microstrip Antenna Using Ink-Jet Printing |
Hindawi Publishing Corporation International Journal of Antenna . & Propagation |
0.8277 |
2012 |
|
Theory of Gain Enhancement of UC-PBG Antenna Structure Without Invoking Maxwell’s Equations: An Array Signal Processing Approach |
Progress In Electromagnetics Research B |
|
2011 |
|
Flexible Printed Monopole Antennas for WLAN Applications |
IEEE AP-S International Symposium on Antennas and Propagation NC/URSI National Radio Science Meeting in Spokane, Washington, USA, |
|
July 2011 |
|
Miniaturized microstrip antenna array with ultra mutual coupling reduction for wearable MIMO systems
|
IEEE AP-S International Symposium on Antennas and Propagation NC/URSI National Radio Science Meeting in Spokane, Washington, USA, |
|
3-8 July 2011 |
|
م.منتظر خميس مصطفى |
A proposed Algorithm For Circle Detection Using Prewitt Edge Detection Technique
|
International Journal of Development Research (IJDR) |
1.25 |
February, 2014 |
Hiding Information using Circular Distribution |
مجلة كلية التربية / الجامعة المستنصرية |
|
قابل للنشر بتاريخ 2/2/2015 |
|
م.رجاء احمد علي |
Cipher System using ABC Algorithm
|
مجلة كلية العلوم الصرفة/كلية العلوم / جامعة ديالى
|
|
2/4/2014 |
Hiding Information using Circular Distribution |
مجلة كلية التربية / الجامعة المستنصرية |
|
قابل للنشر بتاريخ 2/2/2015 |
|
م.ذياب سلمان ابراهيم |
تاثير قناة الاتصال على البيانات المنقولة (effect of channel on transfer data) |
مجلة ديالى/للعلوم الصرفة
|
|
481 في 21/10/2013 |
م.حازم نومان عبد جميل |
An ontology-based search engine for postgraduate students information at the ministry of higher education portal of Iraq |
International Conference Intelligent Systems Design and Applications (ISDA).IEEE |
|
2013 |
An ontology-based search engine for postgraduate students information at the ministry of higher education portal of Iraq |
InternationalJournal of Network and Innovative Computing. Extension paper |
|
2014 |
|
Evaluation on the LMS for Deaf and Mute Students for Education Purpose: A Case Study of Amal Institution in Iraq |
2nd National Graduate Conference,UNITEN |
|
2014 |
|
An ontology-based Framework for Information Integration in Iraq Education |
LAP LAMBERT Academic Publishing (November 20, 2014) |
|
2014 |
|
م.علي عبد الرحمن محمود | Develop A Hybrid E-Learning Model For Distance Learning Implementation: Case Study University Of Technology In Iraq | Arab Journal for Quality in Education | 2014 | |
A Survey on Readiness and Preference in Adopting Distance Learning: Case at University Of Technology, Iraq | 2nd National Graduate Conference,UNITEN | 2014 | ||
The Way Forward For Distance Learning In Countries with Low ICT Implementation: The Iraq Case | 2nd National Graduate Conference,UNITEN | 2014 | ||
Hiding Information using Circular Distribution | Journal of the college of education, The University of Al-Mustansirya | 2015 | ||
أ.م.د. جمانة وليد صالح | “Building a Security System to Protect the Secret Data from Being Stolen in Diyala University by Using Text Steganography in Sound Files” | The First Scientific Conference for Diyala University (13-14) December 2009 | 2009 | |
“Integral Algorithm to Embed Imperceptible Watermark into Anaglyph 3D Video “ | International Journal of Advancements in Computing Technology |
indexed in (EI) and Scopus |
2013 | |
“Nose Tip Localization in Three-Dimensional Facial Mesh Data” | International Journal of Advancements in Computing Technology | indexed in (EI) | 2013 | |
“A robust Optimal Zero-Watermarking Technique for Secret Watermark Sharing” | International Journal of Security and Its Applications |
indexed in (EI) and Scopus |
2014 | |
“A Survey of Digital Image Watermarking Optimization based on Nature Inspired Algorithms NIAs” | International Journal of Security and Its Applications |
indexed in (EI) and Scopus |
2014 | |
Optimal Positions Selection for Watermark Inclusion based on a Nature Inspired Algorithm” | International Journal of Signal Processing, Image Processing and Pattern Recognition | indexed in (EI) | 2015 | |
“An Immune Secret QR-Code Sharing based on a Twofold Zero-Watermarking Scheme” | International Journal of Multimedia and Ubiquitous Engineering |
indexed in (EI) and Scopus |
2015 | |
“An Optimized Digital Image Watermarking Technique Based on Cuckoo Search (CS)” | ICIC Express Letters Part B: Applications |
indexed in (EI) and Scopus |
2015 | |
“Imperceptible 3D Video Watermarking Technique Based on Scene Change Detection” | International Journal of Advanced Science and Technology | 2015 | ||
“A Novel Olfactory Displays’ Scent Dispersing Module” | International Journal of Hybrid Information Technology | indexed in (EI) | 2015 | |
“Smell Impregnated Images, Encoding, Generation and Its Implications” | International Journal of Control and Automation |
indexed in (EI) and Scopus |
2015 | |
“Multiple Node Selection Aimed to Optimum Data Delivery Route Using Discrete Cuckoo Search Algorithm for Wireless Sensor Networks” | Journal of Computational and Theoretical Nanoscience | 1.34 | 2015 | |
“Face Detection and Pose Estimation Based on Evaluating Facial Feature Selection “ | International Journal of Hybrid Information Technology | indexed in (EI) | 2015 | |
“Head Pose Estimation Based On Detecting Facial Features” | International Journal of Multimedia and Ubiquitous Engineering |
indexed in (EI) and Scopus |
2015 | |
“Heat based odors delivery apparatus for interactive game playing” | International Journal of Multimedia and Ubiquitous Engineering |
indexed in (EI) and Scopus |
2015 | |
“Ancient Cuneiform Text Extraction Based on Automatic Wavelet Selection” | International Journal of Multimedia and Ubiquitous Engineering |
indexed in (EI) and Scopus |
2015 | |
“Anaglyph video smell presentation using micro-porous piezoelectric film olfactory display” | Displays, Elsevier | 1.03 | 2015 |
الابحاث المنشورة 2016 -2017
الابحاث المنشورة 2017 -2018
الاسم |
عنوان البحث |
أسم المجلة |
نوع المجلة |
تاريخ النشر |
المجلد والعدد |
ا.د زياد طارق مصطفى الطائي |
Random Numbers Generator Using Microcontroller PUF |
International Journal of Computer Science and Information Security (IJCSIS) |
عالمية |
September 2017 |
Vol. 15, No. 9 |
Enhancement of RC4 Algorithm using PUF |
International Journal of Engineering and Innovative Technology (IJEIT) |
عالمية |
December 2017 |
Volume 7 Issue 6 |
|
IMAGE STEGANOGRAPHY BASED THE BEHAVIOR OF PARTICLE SWARM OPTIMIZATION |
Journal of Theoretical and Applied Information Technology (JATIT) |
Scopus |
30th June 2018 |
Vol.96. No 12 |
|
أ.م.د. جمال مصطفى عباس |
Face Image Recognition Based on Linear Discernment Analysis and Cuckoo Search Optimization with SVM |
International Journal of Computer Science and Information Security (IJCSIS) |
عالمية |
November 2017 |
Volume 15 No. 11 |
Performance Evaluation of Face Image Recognition Based Voila–Joins with SVM |
Iraqi Journal of Information Technology |
محلية |
20/2/2018 |
قبول نشر |
|
A Hybrid Approach for Classification of MRI Brain Tumors Using Genetic Algorithm, K-Nearest Neighbor and Probabilistic Neural Network |
International Journal of Computer Science and Information Security (IJCSIS) |
عالمية |
May 2018 |
Vol. 16, No. 5 |
|
Satellite Images Multiple Data Using Clustering Techniques |
Iraqi Journal of Information Technology |
محلية |
15/5/2018 |
قبول نشر |
|
Brain Tumors Classification by Using Gray Level Cooccurrence Matrix, Genetic Algorithm and Probabilistic Neural Network |
Diyala Journal of Medicine |
محلية |
June 2018 |
Volume 14 Issue 2 |
|
ا.د ظاهر عبد الهادي عبدالله |
Random Numbers Generator Using Microcontroller PUF |
International Journal of Computer Science and Information Security (IJCSIS) |
عالمية |
September 2017 |
Vol. 15, No. 9 |
Enhancement of RC4 Algorithm using PUF |
International Journal of Engineering and Innovative Technology (IJEIT) |
عالمية |
December 2017 |
Volume 7 Issue 6 |
|
A Hybrid Approach for Classification of MRI Brain Tumors Using Genetic Algorithm, K-Nearest Neighbor and Probabilistic Neural Network |
International Journal of Computer Science and Information Security (IJCSIS) |
عالمية |
May 2018 |
Vol. 16, No. 5 |
|
Brain Tumors Classification by Using Gray Level Cooccurrence Matrix, Genetic Algorithm and Probabilistic Neural Network |
Diyala Journal of Medicine |
محلية |
June 2018 |
Volume 14 Issue 2 |
|
ا. ناجي مطر سحيب |
Improved Approach to Iris segmentation Based on Brightness Correction for Iris Recognition System |
Journal of Theoretical and Applied Information Technology |
Scopus |
15/12/2017 |
95-23 |
Mathematical Transformations with SPIHT Algorithm for Steganography Techniques |
Journal of Theoretical and Applied Information Technology |
Scopus |
31/5/2018 |
96-10 |
|
Enhanced Approach to Iris Normalization Using Circular Distribution for Iris Recognition system |
International Journal of Computer Science and Information Security |
عالمية |
9/2017 |
15-9 |
|
Increasing security for RC4 algorithm by using PUF-based random number generators |
International Journal of Engineering and Technology(UAE) |
Scopus |
2018 |
7-4 |
|
Improved RC4 Algorithm Based on Multi-Chaotic Maps |
Research Journal of Applied Sciences, Engineering and Technology |
عالمية |
15/1/2018 |
15-1 |
|
أ. م. د. طه محمد حسن |
Improved Approach to Iris segmentation Based on Brightness Correction for Iris Recognition System |
Journal of Theoretical and Applied Information Technology |
Scopus |
15/12/2017 |
95-23 |
Mathematical Transformations with SPIHT Algorithm for Steganography Techniques |
Journal of Theoretical and Applied Information Technology |
Scopus |
31/5/2018 |
96-10 |
|
Enhanced Approach to Iris Normalization Using Circular Distribution for Iris Recognition system |
International Journal of Computer Science and Information Security |
عالمية |
9/2017 |
-915 |
|
An Expansion in Classification of Eye Gaze Detection Methods |
Journal of Engineering and Applied Sciences |
Scopus |
1/8/2018 |
13-13 |
|
ECC Based Data Retrieval Using LoRaWAN Technology |
International Journal of Engineering and Technology(UAE) |
Scopus |
2018 |
7-4 |
|
Eye-Gaze Estimation Systems for Multi-Applications: An Implementation of Approach Based on Laptop Webcam |
Diyala Journal For Pure Science |
محلية |
April. 2018 |
14-2 |
|
Smart home as a new trend, a simplicity led to revolution |
2018 1st International Scientific Conference of Engineering Sciences – 3rd Scientific Conference of Engineering Science (ISCES), Publisher: IEEE |
Scopus |
10-11 January 2018 |
– |
|
أ. م. د. جمانه وليد صالح |
A singular value decomposition based approach for the
compression of encrypted images |
International Journal of Engineering and Technology(UAE) |
Scopus |
6/2018 |
Vol.7, No.3 |
Eye-Gaze Estimation Systems for Multi-Applications: An Implementation of Approach Based on Laptop Webcam |
Diyala Journal For Pure Science |
Scopus |
April 2018 |
Vol. 14, No. 2 |
|
An Expansion in Classification of Eye Gaze Detection Methods |
Journal of Engineering and Applied Sciences |
Scopus |
Vol. 13, No. 13 |
||
The inclusion of watermarks based on QR Code analysis |
International Journal of Engineering and Technology(UAE) |
Scopus |
6/2018 |
Vol.7, No.2.9 |
|
Implementation of key-cryptosystem for efficient data sharing in cloud environment |
International Journal of Engineering and Technology(UAE) |
Scopus |
6/2018 |
Vol.7, No.3 |
|
Algebraic Authentication Scheme |
2017 Second Al-Sadiq International Conference on Multidisciplinary in IT and Communication Science and Applications (2nd-AIC-MITC’17), IEEE sponsored, December 2017 |
Scopus |
12/2017 |
– |
|
Smart home as a new trend, a simplicity led to revolution |
2018 1st International Scientific Conference of Engineering Sciences – 3rd Scientific Conference of Engineering Science (ISCES), 10-11 January 2018, IEEE |
Scopus |
10-11 January 2018 |
– |
|
Comprehensive Display of Digital Image Copy-Move Forensics Techniques |
International Iraqi Conference on Engineering Technology and its Application (IICETA) – 9 May 2018, IEEE |
Scopus |
9 May 2018 |
– |
|
م. د. خالد محمد صفر |
A Heuristic Approach for Optimal Planning and Operation of Distribution Systems |
Hindawi Journal of Optimization |
ESCI Journal |
2018 / 1 / 4 |
Vol. 2018, No. 6258350 |
أ. م. د. بشار طالب حميد |
Relation between Gene Content and Taxonomy in Chloroplasts |
International Journal of Bioscience, Biochemistry and Bioinformatics (IJBBB) |
Scopus |
2017 |
Vol.7(1) : 41-50 ISSN : 2010-3638. |
On the Ability to Reconstruct Ancestral Genomes from Mycobacterium Genus |
Springer Nature/ |
كل التصانيف |
2017 |
Vol: 10208 |
|
Ancestral reconstruction and investigations of genomic recombination on Campanulids chloroplasts |
Integrative Bioinformatics (JIB) |
كل التصانيف |
2018 |
قيد النشر |
|
Comparison of Metaheuristics to Measure Gene Effects on Phylogenetic Supports and Topologies |
Springer Nature/ |
كل التصانيف |
2018 |
Vol : 19(Suppl 7): 218. |
|
Investigating the ancestral reconstruction of bacterial genomes |
Springer Nature/ BMC Systems Biology |
كل التصانيف |
2018 |
12(Suppl 5): 100. Vol |
|
Ancestral reconstruction and investigations of genomic recombination on Campanulids Chloroplasts |
HAL tel.archives-ouvertes.fr |
عالمية |
2017 |
NUMBER = {2017UBFCD042} |
|
م. وسن سعد أحمد |
Increasing security for RC4 algorithm by using PUF-based random number generators |
International Journal of Engineering and Technology(UAE) |
Scopus |
2018 |
Vol.7, No.4 |
م. حازم نومان عبد |
Increasing security for RC4 algorithm by using PUF-based random number generators |
International Journal of Engineering and Technology(UAE) |
Scopus |
2018 |
Vol.7, No.4 |
Multilevel hiding text security using hybrid technique steganography and cryptography |
International Journal of Engineering and Technology(UAE) |
Scopus |
2018 |
Vol.7, No.4 |
|
أ. م. د. عبدالباسط كاظم شكر |
Performance of Face Recognition System Using Gradient Laplacian Operators and New Features Extraction Method Based on Linear Regression Slope (SCI-SCOPUS) |
Mathematical Problems in Engineering |
Scopus |
August 2018 |
Volume 2018, Article ID 1929836, 12 pages |
Evaluation of Face Recognition Techniques Using 2nd Order Derivative and New Feature Extraction Method Based on Linear Regression Slope) |
IJCSNS International Journal of Computer Science and Network Security |
(Web of Science -cleveite |
December 2017 |
Vol. 18 No. 3 pp. 169-177 |
|
EDGE DETECTION-APPLICATION OF (FIRST AND SECOND) ORDER DERIVATIVE IN IMAGE PROCESSING |
Diyala Journal of Engineering and Sciences |
Local |
2017 |
8 (1.5) 283-289 |
|
IEEE |
Scopus |
August 2017 |
DOI: 10.1109/ICEngTechnol.2017.8308210 Conference: 2017 International Conference on Engineering and Technology (ICET) |
||
م. ذياب سلمان ابراهيم |
Hybrid Approach to Detect Spam Emails using Preventive and Curing Techniques |
Journal of AL-Qadisiyah for computer science and mathematics |
محلية |
2018 |
Vol.10 No.3 |
م. غسان صبيح محمود |
Data Security Protection in Cloud Computing by using Encryption |
Kirkuk University Journal /Scientific Studies (KUJSS) |
محلية |
September 2017 |
Vol. 12, No. 4 |
Image in Image Steganography based on modified Advanced Encryption Standard and Lest Significant Bit Algorithms |
Journal of University of Babylon for Pure and Applied Sciences, |
محلية |
9/2018 |
Vol. 26, No. 8 |
|
PSO-based steganography scheme using DWT-SVD and cryptography techniques for cloud data confidentiality and integrity |
JOURNAL OF COMPUTERS |
سكوباس |
July 4, 2018 |
قبول نشر |
|
م. عادل عبد الجبار محمد |
Multilevel hiding text security using hybrid technique steganography and cryptography |
International Journal of Engineering and Technology(UAE) |
Scopus |
2018 |
7-4 |
IoT Devices and Sensors Management Framework for Mobile E-health Applications |
Journal of Advanced Research in Dynamical and Control Systems – JARDCS |
Scopus |
Sep, 2018 |
-210 |
|
م. رجاء احمد علي |
Multilevel hiding text security using hybrid technique steganography and cryptography |
International Journal of Engineering and Technology(UAE) |
Scopus |
2018 |
Vol. 7, No.4 |
م. يحيى محمد حسين محمد |
Miniaturized Wide Band Folded Microstrip Antennas Based Metamaterials |
Scholars Press |
book |
March 2018 |
ISBN: 9786202308090 |
Enhancing the Microstrip Antenna Gain Using a Novel EBG Lens Based on a Single Layer |
2018 11th International Symposium on Communication Systems, Networks & Digital Signal Processing (CSNDSP) |
Scopus |
18-20 July 2018 |
– |
|
Design and analysis of Ultra-Wide Band (UWB) antennas based on metamaterial |
2018 11th International Symposium on Communication Systems, Networks & Digital Signal Processing (CSNDSP) |
Scopus |
18-20 July 2018 |
– |
اسم الباحث | عنوان البحث | اسم المجلة | تاريخ النشر | موقع النشر |
Juliet Kazem Daoud | The Effect of Integration and Effectiveness of Artificial Neural Networks on Information Security Tasks | AIP Conference Proceedings (ISSN: 0094-243X, 1551-7616, MAICT-2021) | ||
Juliet Kazem Daoud | Optimization of Max-Min and Min-Min Task Scheduling Algorithms Using GA in Cloud Computing | 5th International Conference on Engineering Technology and its Applications 2022 – (5thIICETA2022) | ||
Prof. Dr. Taha Muhammad Hassan | Digital Modulation Classification Based On Chicken Swarm Optimization and Random Forest | Journal of Engineering Science & Technology (JESTEC) | ||
Juliet Kazem Daoud | GPS Data Protecting Using RC6 and ABC Algorithms | Design Engineering | 9/24/2021 | http://thedesigneng ineering.com/ index.php/DE/article /view/4653 |
and Wassan Ahmed Ali | A Hybrid Intelligent System of Heart Disease Detection Using Machine Learning | International Journal of Computer Science and Information Security | 11/17/2021 | https://sites.goog le.com/site/ ijcsis/all-volumes-issues/vol-19-no-11-nov-2021 |
Jumana Walid Saleh | A Review of Recent Development of Security Schemes for UAVs Communication | Journal of Al-Ma’moon College | 10/1/2021 | https://www.iasj.n et/iasj/ download/f485ef 50d6eadd5e |
Jumana Walid Saleh | An Effective and Accurate CNN Model for Detecting Tomato Leaves Diseases | 2021 4th International Iraqi Conference on Engineering Technology and Their Applications (IICETA) | 2/25/2022 | https://ieeexplor e.ieee.org/ abstract/docume nt/9717816 |
Taha Muhammad Hassan | Face Spoofing Detection Using Deep CNN | Turkish Journal of Computer and Mathematics Education | 12/1/2021 | https://turcomat.o rg/index.php/t urkbilmat/article/vi ew/9485/7269 |
Abdul Basit Kazem Shukr | Application of machine learning and deep learning in predicting oil reserve porosity | Solid state technology | 10/1/2022 | http//application of machine learning and deep learning in predicating oil reservoir porosity |
Jumana Walid Saleh | Facemask Wearing Detection Based on Deep CNN to Control COVID-19 Transmission | 2022 Muthanna International Conference on Engineering Science and Technology (MICEST) | 6/14/2022 | https://ieeexplore .ieee.org/ document/9790 197 |
Taha Muhammad Hassan | Analysis of techniques and approaches to palmprint | International journal of Nonlinear Analysis and Application | 4/28/2022 | https://ijnaa.semn an.ac.ir/ article_6439.ht ml |
Ziad Tariq Mustafa Al-Taie | A review on video violence detection approaches | International Journal of Nonlinear Analysis and Applicationspl. | 4/1/2022 | https://ijnaa.semn an.ac.ir/article_6369_ 7c58ca60c7912451 c97d090d9bbf46d7.pdf |
. Ziad Tariq Mustafa | COMPARISON OF DATA MINING ALGORITHMS FOR DIAGNOSIS OF DIABETES MELLITUS | International Journal of Computer Science and Engineering (IJCSE) | 12/1/2021 | https://www.acade mia.edu/50909283/ COMPARISON_O F_DATA _MINING_ALGOR ITHMS_FOR_ DIAGNOSIS_OF_D IABETES_MELLITUS?from_sitemaps=tru e&version=2 |
Adel Abdel Wahab Ghaidan | Correction to:Auto3DCryoMap:an automated particle alignment for 3D cryo-EM density map reconstruction | BMB bioinformatics | 2/1/2022 | https://bmcbioinform atics.biomedcentral.com /articles/10.1186/s12859-022-04630-0 |
Adel Abdel Wahab Ghaidan | Fully Automated Human Finger Vein Binary Pattern Extraction-Based Double Optimization Stages of Unsupervised Learning Approach | International Journal of Nonlinear Analysis and Application | 7/1/2022 | Non |
Ziad Tariq Mustafa | COVID-19 Diagnosis based on Data Mining Techniques | NeuroQuantology | 6/1/2022 | https://www.resear chgate.net/publication /361427457_COV ID-19_Diagnosis_bas ed_on_Data_Mining _Techniques |
Juliet Kazem Daoud | Routing Protocols – based Clustering in WSNs | 4th International Iraqi Conference on Engineering Technology and Their Applications (IICETA-2021), Islamic University, AL-Najaf, Iraq | 2/25/2022 | https://ieeexplore.iee e.org/abstract/ document/9717419 |
Khaled Muhammad Safar | Evolutionary trajectory hybridization for improving deep learning accuracy in medical data prediction system | Materials Today: Proceedings | 9/13/2021 | https://www.science direct.com/science /article/pii/S221478 5321056492?dgcid=author |
Prof. Dr. Bashar Talib Hamid | A survey of deep learning-based object detection: Application and open issues | Int. J. Nonlinear Anal. Appl | 5/1/2022 | https://ijnaa.semnan. ac.ir/article _6525.html |
Jamal Mustafa Abbas Al-Tuwaijri | Analysis of challenges and methods for face detection systems: A survey | https://ijnaa.semnan.ac.ir/ | 2/22/2022 | https://ijnaa.semnan .ac.ir/article _6222.html |
Jamal Mustafa Abbas Al-Tuwaijri | A survey on various machine learning approaches for human electrocardiograms identification | Internatinal Journal of Nonlinear Analysis and Applications | 2/21/2022 | https://ijnaa.semnan. ac.ir/article_6223.html |
Jamal Mustafa Abbas Al-Tuwaijri | Electrocardiogram ECG For Human Identification Based on Machine Learning Techniques and Deep Learning | NeuroQuantology | 6/22/2022 | https://www.neuroq uantology .com/article.php?id=3429 |
Israa Safaa Ahmed | Improving Prediction of Plant Disease using K-Efficient Clustering and Classification Algorithms | IAES international journal of artificial intelligence | 7/1/2022 | https://ijai.iaescore.com /index.php/IJAI/article/vi ew/21045 |
Sun Saad Ahmed | Development of mandelbrot set for the logistic map with two parameters in the complex plane | Eastern-European Journal of Enterprise Technologies, | 12/29/2021 | http://journals.uran.ua/ eejet/index |
Jumana Walid Saleh | News Aggregation and Fake News Detection Using Deep Learning: An Abbreviate Survey | Guangdianzi Jiguang/Journal of Optoelectronics Laser | 5/10/2022 | http://www.gdzjg.org/ind ex.php/JOL/article/view/371 |
Jumana Walid Saleh | Skin Cancer Classification Dermatologist-Level based on Deep Learning Model | Acta Scientiarum – Technology | ||
. Jumana Walid Saleh | Two Stages of Algebraic Matrix Decomposition in Optimal Image Steganographic Approach | Fifth International Iraqi Conference on Engineering Technology and its Applications (5th IICETA) | ||
Bashar Talib Hamid | Phylogenetic Tree Construction to Reveal the Detailed Evolution of SARS-CoV-2 | JOURNAL OF ALGEBRAIC STATISTICS | 6/5/2022 | https://publishoa.com/index. php/journal/article/view/197 |
Moulin’s proof is valid | IDENTIFY OFFENSIVE TWEET LANGUAGE BASED ON MACHINE LEARNING (IOTLML) | Turkish Journal of Physiotherapy and Rehabilitation | 12/20/2021 | https://turkjphysiotherreha bill.org/pub/32-3.html |
a. M. Dr.. Jumana Walid Saleh | Tweet Sentiment Polarity Detection Based on Semantic Similarity | Diyala Journal for Pure Science | 4/1/2022 | https://djps.uodiyala.ed u.iq/pages?id=531 |