18 Items
Hybrid Algorithm (DES-Present) for encryption image color using 2D-Chaotic System
Suha Husam, Haider Kadhim Hoomod, Khalid Ali Hussein
49-63
A comprehensive Analysis of Approaches and Difficulties for Cybersecurity Threats- Article Review
omar Alsaif, Amer Mohamed Shhatha
126-139
A Comprehensive Study of Usage-Based Web Mining
Noor Al-Deen Alaa , Israa Tahseen Ali,
76-92
A review: The Self-Driving Car’s Requirements and The Challenges it Faces
Hussam Jaafar Kadhim, Amel Hussein Abbas
135-150
A study on offline handwritten Chinese character recognition based on chaotic iteration
W. B. Yu , T. T. Ma
62-75
Design Sequential Hybrid Lightweight Algorithms For Encryption Data Using RC6 Algorithm
Mohammed Taha, Khalid Ali Hussein
1-11
Development and Evaluation of an Innovative Three-Dimensional Hyperchaotic map
Walaa Hadi Abdulnabi, Sadiq A. Mehdi, Sawsen Abdulhadi Mahmood
113-125
Diagnosis of heart disease using clinical data of cardiac patients
Evan Abed alelah, Babak Karasfi
144-158
Enhance Key Stage Generation for Developing Kasumi Encryption Algorithm
Ahmed Ali salih, Ali Shakir Mahmood
104-112
Image Encryption Performance Analysis Using Reversible Logic Gates
Khalid Kadhim Jabbar, Fahmi Ghozzi, Ahmed Fakhfakh
93–103
amel hawwal jasim, Haider k. Hoomod
1-11
Leukemia Detection using Machine Learning Algorithms: Current trends and future directions
Amal A. Maryoosh, Saeid Pashazadeh
33-49
Leveraging hybrid database models for enhanced gene-disease association analysis
Sama Salam Samaan , Saja Dheyaa Khudhur, Omar Nowfal Mohammed Tahe
153-168
80-92
Secure authentication scheme to thwart known authentication attacks using Mobile Device
Mazin Adnan Abbas
46-61
Asia Abdullah Ahmed , Nada Hussein M. Ali
135-152
juliet kadum, Jamal Mustafa Al-Tuwaijar, Amaal Kadum, Sadam Hameed Rasheed
64-81
suaad saber, Xeina Abbas, Noor Hamady Muhsin
157-169