Performance Analysis of 15kW Solar PV System
R. H. Rhaif, A. F. Atwan,N. K. Kasim
1-14
Ataa Jamal Mohammed, Suhad A. Hamdan
15-30
Some Results of Representation of the Character Table of S_6
Maysaa Zaki Salman
31-45
Secure authentication scheme to thwart known authentication attacks using Mobile Device
Mazin Adnan Abbas
46-61
A study on offline handwritten Chinese character recognition based on chaotic iteration
W. B. Yu , T. T. Ma
62-75
A Comprehensive Study of Usage-Based Web Mining
Noor Al-Deen Alaa , Israa Tahseen Ali,
76-92
Image Encryption Performance Analysis Using Reversible Logic Gates
Khalid Kadhim Jabbar, Fahmi Ghozzi, Ahmed Fakhfakh
93–103
Estimation of Weibull Parameters for Wind Energy Application in Al Shihabi City
Karar K. Kraem, Amani I. Altmimi, Thaer O. Roomi
104-114
nc Open- Sets in Topological Space
Zainab Khalid Raheem Sanaa Hamdi Jasem
115-123
G. Z.Alwan ,b W. J. Aziz ,c R. S. Sabry
124-134
A review: The Self-Driving Car’s Requirements and The Challenges it Faces
Hussam Jaafar Kadhim, Amel Hussein Abbas
135-150