10 Items
A comprehensive Analysis of Approaches and Difficulties for Cybersecurity Threats- Article Review
omar Alsaif, Amer Mohamed Shhatha
126-139
A Comprehensive Study of Usage-Based Web Mining
Noor Al-Deen Alaa , Israa Tahseen Ali,
76-92
A review: The Self-Driving Car’s Requirements and The Challenges it Faces
Hussam Jaafar Kadhim, Amel Hussein Abbas
135-150
A study on offline handwritten Chinese character recognition based on chaotic iteration
W. B. Yu , T. T. Ma
62-75
Enhance Key Stage Generation for Developing Kasumi Encryption Algorithm
Ahmed Ali salih, Ali Shakir Mahmood
104-112
Image Encryption Performance Analysis Using Reversible Logic Gates
Khalid Kadhim Jabbar, Fahmi Ghozzi, Ahmed Fakhfakh
93–103
Leukemia Detection using Machine Learning Algorithms: Current trends and future directions
Amal A. Maryoosh, Saeid Pashazadeh
33-49
80-92
Secure authentication scheme to thwart known authentication attacks using Mobile Device
Mazin Adnan Abbas
46-61
suaad saber, Xeina Abbas, Noor Hamady Muhsin
157-169