Volume 17 (2023)
Volume 16 (2022)
Volume 15 (2021)
Volume 14 (2020)
Volume 13 (2019)
Volume 12 (2018)
Volume 11 (2014)
Volume 10 (2013)
Volume 9 (2012)
Volume 8 (2011)
Volume 7 (2010)
Volume 6 (2009)
Volume 5 (2008)
Volume 4 (2007)
Volume 3 (2006)
Volume 2 (2005)
Volume 1 (2004)
Number of Articles: 47
Digital Image Watermarking Scheme Using Discrete Wavelet Transform Domain, Quantization, and Genetic Algorithm
Page 13-27
Parallel Programming for Solving Linear BVP’s by Linear Superposition using CS_Tools
Page 29-42
Use of General Regression Artificial Neural Network to Identify the Natural Growth of Head Circumference of the Baby
Page 43-52
Three Proposed Hybrid Genetic Algorithms
Page 53-64
The Discrimination of Red Blood Cells Infected by Hereditary Hemolytic Anemia
Page 65-78
Botne and Botnet Detection Survey
Page 79-89
Hiding Sensitive Frequent Itemsets over Privacy Preserving Distributed Data
Page 91-105
Hybrid System for Speech Coding Based on Contourlet Transformation
Page 107-117
Design and Implementation of a Voice Broadcasting System from a PC to Mobile Devices
Page 119-126
Principle Components Analysis and Multi Layer Perceptron Based Intrusion Detection System
Page 127-135
Existing Object Oriented Design Metrics a Study and Comparison
Page 137-147
Design and Implementation of OLAP System for Distributed Data Warehouse
Page 149-155
Using Artificial Intelligence Techniques For Intrusion Detection System
Page 157-175
State of Art: Semantic Web
Page 177-186
Developing Fault Tolerance Integrity Protocol for Distributed Real Time Systems
Page 187-193
Cuneiform Symbols Recognition Based on K-Means and Neural Network
Page 195-202
Authentication of Deoxyribo Nucleic Acid (DNA)
Page 17-23
Distributed Databases: ERP System as a Case Study Model in the Factory of Fabric and Weave in Mosul
Page 25-46
Building a System to People Identification Based on Human Hand Geometry
Page 47-60
An Algorithm for Smoker Detection
Page 61-74
Encrypted and Hiding Information in Digital Images using Wavelet Transformation and LSB Technology
Page 75-84
Building a Multi-Period Probability Dynamic Inventory Model with Application
Page 85-101
Reconcile an Appropriate Model for the Occurrence of Periods of Infection with Hepatitis C in the Province of Nineveh - A comparative Study with the Geometric Process Model -
Page 103-112
Identification of Some Variables Affecting the Granting of The Fundamentals of Computer and Internet Certificate (IC3)
Page 113-125
Adoption of the Co-Occurrence Matrix and Artificial Neural Networks in Fingerprint Recognition
Page 127-136
Using Kernel Estimator and K-Mean Clustering Approach to Hand Gesture Recognition
Page 137-145
The Use of the Artificial Immune Network Algorithm AIN in Distinguishing English Character Pattern
Page 147-156
Modeling and Analyzing Virtual Links Links Between the Sites of the Centers of the University of Mosul
Page 157-167
Use the Genetic Algorithm to Encode and Hide Gray Image Data
Page 169-182
An Analytical Mathematical Study of Artificial Neural Network Algorithms in the Suitability of a Model for Medical Diagnosis
Page 183-194
Improved LSB Method using Standard Deviation Scale
Page 195-208
Using Random Scrambling in Multi Media Encoding
Page 209-225
Development of Traditional Algorithm Used in Denoising to Enhance Contrast of the Color Images
Page 227-238
GLM for Image Steganography Technique
Page 239-249
Analysis of Basic Compounds in a Network Intrusion Detection System using NSL-KDD Data
Page 251-261
Hide Compressed Texts in an Audio File
Page 263-274
Use the Frequency Domain to Hide in Some Audio Files
Page 275-284
Suggested Method for Audio File Steganography
Page 285-295
Direct Transmission of Products Designs in Distributed Manufacturing
Page 297-307
Electronic Forecasting of Women's Jumping Events using Neural Networks
Page 309-321
Representation of the Wavelet Transform 2D using A 5/3 Filter on the Field Programmable Gate Array
Page 323-331
Dimensionality Reduction using Hybrid Algorithms and Their Application to Remote Sensing Data
Page 333-349
Estimate Programmatic Effort using the Traditional COCOMO Model and Neural Networks
Page 351-364
Building a Software System Using a Spiral Model to Evaluate the Overall Risk of Projects Using Fuzzy Number Theory
Page 365-384
Suggest a Reverse Engineering Tool to Analyze the Software Source Code Written in Java
Page 385-407
Building a Search Engine for the Personal Computer and the Local Network
Page 409-420
Design a Tool for Generating Test Cases using Swarm Intelligence
Page 421-444