كاميرات المراقبة بين دواعي الإستعمال وإنتهاك الخصوصية |
Amal Abdul Jabbar, Nadia Kaab |
A New Modified Fatha Method For Arabic Text Steganography |
Dr. Suhad Mal Allah, Farah R. Shareef |
A Proposed Registration Method Using Tracking Interest Features for Augmented Reality |
Dr. Abdul Ameer Abdullah, Dr. Yousra Hussien, Ikhlas Watan |
A Survey: Medical Augmented Reality |
Ikhlas Watan, Dr. Abdul Ameer Abdullah, Dr. Yousra Hussine |
An Efficient Image Thresholding Method for Arabic Handwriting Recognition System |
Dr. Aliaa Kareem, Mustafa Salam Khadum |
An Efficient Preprocessing Framework for Arab ic Handwriting Recognition System |
Dr. Aliaa Kareem, Mustafa Salam Khadum |
An Enhancement Method Based on Modifying CFB Mode for Key Generation in AES Algorithm |
Dr. Hasanen Samir, Dr. Maha Abdul Kareem, Dalal Hmoud |
An Image Coding and Embedding Strategy Based on Channel Variations and DNA Sequences |
Dr. Matheel Imad Aldeen |
An Improved Method to Recognize the Iraqi License Plates Using Local Projections |
Nada Najeel, Dr. Loay Idwar |
|
Active Voice Detection Using Ridgelet Transform |
Dr. Hanaa Mohsen |
Application of FPTRNG and Logistic Map in Cryptography |
Dr. Hanaa Mohsen |
Arabic Handwriting Text Recognition Based on Efficient Segmentation, DCT and HOG Features |
Dr. Aliaa Kareem, Mustafa Salam |
|
Arabic Language Document Steganography Based On Huffman Code Using DRLR As (RNG) |
Dr. Hanaa Mohsen, Maisaa Abid Ali |
|
Arabic Language Text Steganography Besed on Microsoft Word documents |
Dr. Hanaa Mohsen, Maisaa Abid Ali |
|
Arabic Language Text Steganography Based on Singular Value Decomposition (SVD) |
Dr. Hanaa Mohsen, Maisaa Abid Ali |
Authentication of Digital Video Encryption |
Asmaa Hasan, Dr. Shaimaa Hameed |
|
Centerline Extraction: A Review |
Zahraa Naji, Dr. Yousra Hussien |
Collision Avoidance Using Cat Swarm Algorithm for Multi Mobile Robot Path Planning in Dynamic Environment |
Dr. Aliaa Kareem, Themar Ali |
Color Image Denoising Using 3D Wavelet Transform |
Dr. Matheel Imad Aldeen, Rabab Farhan |
Color Image Encryption Depend on DNA Computing |
Dr. Matheel Imad Aldeen, Zena Mohammed |
Comparison of Eight Proposed Security Methods using Linguistic Steganography Text |
Dr. Hanaa Mohsen, Maisaa Abid Ali |
Copyright Protection Service for Mobile Images |
Dr. Israa Abdul Ameer, Dr. Suhad Mal Allah |
Classification of Gender Face Image Based on Slantlet Transform |
Dr. Nidaa Flieh, Reem Majeed |
Design of an Efficient Face Recognition Algorithm based on Hybrid Method of Eigen Faces and Gabor Filter |
Dr. Matheel Imad Aldeen, Fatima Bahjat |
Design Recommendation System in E-Commerce Site |
Dr. Ayad Rodhan, Shaimaa Ashor |
Design Secured Smart Door Lock Based on Jaro Winkler Algorithm |
Sura Mahmoud |
Embedding a Digitized Watermark Upon Colored Image Using Wavelet Transform with Comparative Technique |
Dr. Matheel Imad Aldeen |
Encrypted Image Watermark in Audio Files Using Homogenous Deffie-Hellman with Chebyshev Polynomial |
Dr. Hala Bahjat, Dr. Abdul Mohsen Jaber, Sana Ahmed |
Enhance Inverted Index Using in Information Retrieval |
Dr. Aliaa Kareem, Duaa Netaisha |
Face Image Enhancement using Wavelet Denoising and Gabor Filters |
Dr. Israa Abdul Ameer |
Face Retrieval Using Image Moments and Genetic Algorithm |
Wathiq Najah, Dr. Yousra Hussien |
Fast and Accurate Registration Method for MRI images |
Ikhlas Watan, Dr. Yousra Hussien, Dr. Abdul Ameer Abdullah |
Genetic –Based Face Retrieval Using Statistical Features |
Dr. Yousra Hussien, Watheq Najah |
Hiding and Encryption of Secret Image Using Secret Sharing Scheme |
Dr. Yousra Hussien, Hussien Juiez/td>
|
Hybrid Algorithm to Protect Computer Networks Based on Human Biometrics and Computer Attributes |
Dr. Rahim Abdul Sahib |
Images Encryption Using Chaos and Random Generation |
Dr. Yousra Hussien, Zahraa Abdul Hameed |
Images Encryption Using Symmetric Encryption Alogorithm Based on Random Keye Generator |
Asmaa Hasan Mohsen, Dr. Shaimaa Hameed |
Image Seam Carving Based on Content Aware Resizing by Gradient Method |
Dr. Matheel Imad Aldeen, Rana Mohammed |
Implement Interactive E-Learning System Based on Cloud Computing |
Dr. Rahim Abul Sahib |
Improvement Majority Function in A5/1 stream cipher Algorithm |
Dr. Hala Bahjat, Muhanned Ali |
Improving Compression Ratio For Encrypted Secret Message in AES Encryption by Using GZIP Compression |
Dr. Suhad Mal Allah, Farah R. Shareef |
Improving Hiding Security of Arabic Text Steganography by Hybrid AES Cryptography and Text Steganography |
Dr. Suhad Mal Allah, Farah R. Shareef |
Improving Security of ID Card and Passport Using Cubic Spline Curve |
Dr. Abdul Mohsen Jaber, Dr. Ayad Rodhan, Dhiaa Abid |
Medical Texture Recognition Based on Intelligent Technique |
Dr. Hasanen Samir, Hajir Mazin |
Message Authentication Using New Hash Function |
Dr. Hasanen Samir, Dr. Maha Humoud, Dalal N. Humoud |
Object Tracking using Proposed Framework of KalmanGuided Harmony Search Filter |
Dr. Hasanen Samir, Dr. Maha Abdul Kareem, Dala Hmoud |
Proposal New Cache Coherence Protocol to Optimize CPU Time through Simulation Caches |
Dr. Luma Faik, Dr. Maha Abdul Kareem, Abeer Dhiaa |
Proposed Arabic Text Steganography Method Based on New Coding Technique |
Dr. Suhad Mal Allah, Dhurgam Wameedh |
Propessed Business Intelligence System through Big Data |
Dr. Hasanen Samir, Saif Bashar |
Proposed Hyperchaotic System for Image Encryption |
Dr. Aliaa Kareem |
Proposed IF_THEN Grammar to Translate English Language Sentence to American Sign Language Sentence |
Asmaa Hamandi, Dr. Aliaa Kareem, Dr. Hala Bahjat |
Proposed Image Similarity Metric with Multi Block Histogram used in Video Tracking |
Dr. Aliaa Kareem, Dr. Hasanen Samir, Ikbas Iz Aldeen |
Proposed Method to Encrypt Images to Mobile Device Based on the Principles of Shannon |
Dr. Hanaa Mohsen, Anwar Abbas |
SAR Images Watermarking Based on Multiwavelet and Curvelet Transforms |
Dr. Matheel Imad Aldeen, Rabab Farhan |
Segmentation Brain Tumor and Diagnosing Using Watershed Algorithm |
Dr. Matheel Imad Aldeen, Hind Hameed |
Sense-Based Information Retrieval Using Artificial Bee Colony Approach |
Dr. Aliaa Kareem, Mustafa Jasim |
Simple Detection Model to Suspicious Viber Messages |
Dr. Hanaa Mohsen, Noor Basim |
Speech Encryption Based on Wavelet Transformation and Chaotic Map |
Dr. Hala Bahjat, Sundus Mahdi |
|
Steganography Arabic Text Based on Natural Language Process Documents |
Dr. Hanaa Mohsen, Maisaa Abid Ali |
|
Steganography Based on Arabic Language Texts by Kashida Using STRI As RNG |
Dr. Hanaa Mohsen, Maisaa Abid Ali |
|
Steganography Techniques for Arabic Language Texts Utilizing Single-Double Quotation Using RNG |
Dr. Hanaa Mohsen, Maisaa Abid Ali |
|
Stream Cipher with Space-Time Block Code |
Dr. Hanaa Mohsen, Anwar Abbas |
|
Text Steganography Method Based On Modified Run Length Encoding |
Dr. Suhad Mal Allah |
The Design of Efficient Algorithm for Face Recognition Based on Hybrid PCA-Wavelet Transform |
Dr. Matheel Imad Aldeen, Fatima Bahjat |
Utilization of Edge Information in Handwritten Numerals Recognition |
Lect. Asst. Nada Najeel |
Variant length, Self-extracted audio watermark for verification using LWT and random selections |
Dr. Hala Bahjat, Dr. Abdul Mohsen Jaber, Sana Ahmed |
Video Inpainting Using Seam Carving Method |
Dr. Matheel Imad Aldeen, Rana Mohammed |