Browsing by Author "Iraq"

Sort by: Order: Results:

  • Al-Ameen, Zohair; Younis, Zainab Khalid; Al-Ameen, Shamil (2021-07-27)
    Contrast is an important feature in an image because the low-contrast effect causes poor details visibility, and the high-contrast effect leads to better-perceived details. The low-contrast effect happens due to many ...
  • Alsaqre, Falah (2020-03-01)
    Two-dimensional principal component analysis (2DPCA) and its variants have been successfully used for the task of face recognition (FR). However, one of the major limitations of 2DPCA-based FR methods is that they only ...
  • Rajab, Maha (2023-05-03)
    The use of hand features for human identification is a reliable and convenient method that has a greater influence than other biometric techniques because of its simplicity and dependability. In this study, we suggested a ...
  • Anas Aldabagh, Hanan; Talal Ibrahim, Ruba (2024-05-19)
    Water is the secret of life and makes up almost 70% of the Earth’s surface. It has become necessary to protect the water resources around us from pollution and neglect, which can result in the loss of life and health. ...
  • Ibrahim, Ruba Talal; Ramo, Fawziya Mahmood (2023-01-29)
    The importance of personality traits in education, employment, and disease detection has prompted several studies to construct intelligent systems that can identify any individual’s personality traits based on their ...
  • Abed Mohammed, Ahmed; Sumari, Putra; Attabi, kassem (2024-06-01)
    Diabetes is the ”silent killer,” stealing the lives of millions of people worldwide. There are many reasons for diabetes, such as increasing glucose, Cholesterol, systolic BP, and Age. These are considered to be the four ...
  • Al-Rahman, Seddiq Q. Abd; Sagheer, Ali; A. Dawood, Omar (2021-07-11)
    The speed development of the Internet applications and the explosive technology growth changed the lifestyle radically. The amount of data is increasing rapidly. Many of these data are sensitive and private. To protect ...
  • Ahmed, Ahmed; S. Alghareb, Faris (2024-03-06)
    In recent years, deep learning-based algorithms have been immensely employed and tested in a variety of real-world applications. The efficacy of such algorithms has been thoroughly examined in a practical setting. In this ...
  • Ali, Younis Salahaddin; Abdullah, Hozan (2020-04-01)
    The English common law, whose origins are based upon custom and judicial precedents, including the doctrine of illegality to nullify contracts. And according to which, contracts are classified into illegal and void ones, ...
  • Abbas Fadhil Al-Husainy, Mohammed; A. A. Al-Sewadi, Hamza; Al-Shargabi, Bassam (2021-08-23)
    Due to the ever-increasing cybercrime and hazards on digital information stored or in transit over computer clouds and networks, so many encryption algorithms were developed and practically implemented. On the other hand, ...
  • Salim, Ahmad; Abdulbasit Mohammed, Khitam; Maath Jasem, Farah; Makki Sagheer, Ali (2023-07-23)
    Steganography is the study of invisible communication, which typically focuses on methods of concealing the existence of the communicated message. Steganography is now widely used as a means of protecting sensitive data. ...
  • Qadir, Hewa Ibrahim; Qadir, Dhahir Majeed (2020-10-01)
    The basic principle is that partners have the right to request the removing of common property among them, however this right may collide with some cases that are the presence of a legal text or condition that compels ...
  • Aamer Fadhil, Saif; Emad Kadhim, Lubna; Ahmed Hamdi, Mahmood; Abbas Ahmed, Amjed; Kamrul Hasan, Mohammad; Islam, Shayla; Hafizah Mohd Aman, Azana; Safie, Nurhizam (2024-05-09)
    Cloud computing has emerged as an essential element of the modern and future industry. Various corporates utilizes the capabilities of cloud computing services. There is skeptism and fear regarding application of cloud ...
  • Mamdoh Abdulatef, Wasan; Rami Alomari, Zainab; Ahmed Al-zubaidy , Mahmod (2024-03-23)
    The adaptive filtering algorithm of Normalized Least Mean Square (NLMS) is known to be highly efficient in terms of requiring less number of iterations compared to the reference Least Mean Square (LMS) method, at the cost ...
  • Thanoon, Hamsa Fawaz; F. Kamal, Layth; F. Flaih, Firas M. (2021-08-04)
    The grounding is the connection of the metal structures of machines and electrical equipment in locked connection with the ground to prevent destructive potential. Besides, to connect the neutral point in the three-phase ...
  • M. Shafiq Surameery, Nigar; Alazzawi, Abdulbasit; T. Asaad, Aras (2024-04-30)
    This systematic review explores the emerging field of Alzheimer's disease (AD) diagnosis using recent advances in machine learning (ML) and deep learning (DL) methods using EEG signals. This review focuses on 38 key articles ...
  • Nourildean, Shayma W.; Mohammed, Yousra A. (2023-05-07)
    Citizens and urban settings have benefited significantly from major advances in the quality of life and services provided by smart homes. Among other things, they are fully capable of controlling physical objects in real ...
  • Fawaz, Ghazwan (2024-03-10)
    Routing serves as a cornerstone of network management, pivotal in determining the optimal path for data transmission. This research endeavor endeavors to scrutinize and assess improved routing algorithms customized for ...
  • Saadoon, Hawraa J; Jamel, Thamer M; Khazal, Hasan F (2022-02-15)
    In order to design and planning for the next generation wireless communications system, for the channel, it is important to use a suitable model for predicting appropriate and optimum frequencies. This paper is regarded ...
  • Alsaad, Saad Najim; Hussien, Nadia Mahmood (2021-11-29)
    An alarm is an audio or visual signal to alert people of a problem, danger or something undesirable. Some alarm systems are used for security purposes during producing warning signal in form of sound, light or send alarm ...

All Journals

Browse

Administrator Account