Hyperchaotic technology-based efficient image encryption algorithm an overview.
Hyperchaotic technology-based efficient image encryption algorithm an overview.

Kawthar M. Khalaf; Ali M. Sagheer

Volume 17, Issue 2 , December 2023, , Page 234-244

https://doi.org/10.37652/juaps.2023.181570

Abstract
  Multimedia data encryption is so crucial because the multimedia encryption algorithm needs more time and memory, and it is difficult to implement. Because of this, the hyperchaotic ...  Read More ...
Optimization Methods for Image Thresholding: A review
Optimization Methods for Image Thresholding: A review

Bushra A. Abd; Azmi T. Hussein Alrawi; Atheer Bassel

Volume 17, Issue 1 , June 2023, , Page 137-148

https://doi.org/10.37652/juaps.2023.178875

Abstract
  Setting a border with the proper gray level in processing images to separate objects from their backgrounds is crucial. One of the simplest and most popular methods of segmenting pictures ...  Read More ...
A Multilevel Image Thresholding Based on Hybrid Jaya Algorithm and Simulated Annealing
A Multilevel Image Thresholding Based on Hybrid Jaya Algorithm and Simulated Annealing

Bushra A. Abd; Azmi T. Hussein Alrawi; Atheer Bassel

Volume 17, Issue 1 , June 2023, , Page 149-157

https://doi.org/10.37652/juaps.2023.178876

Abstract
  Thresholding is a method for region-based image segmentation, which is important in image processing applications such as object recognition Multilevel. Thresholding is used to find ...  Read More ...
OBTAINING UNIQUE BY ANALYZING DNA USING A NEURO-FUZZY ALGORITHM
OBTAINING UNIQUE BY ANALYZING DNA USING A NEURO-FUZZY ALGORITHM

Thaaer kh. Asman; hadeel mohammed saleh; Alaa Hamid Mohammed

Volume 17, Issue 1 , June 2023, , Page 158-168

https://doi.org/10.37652/juaps.2023.178906

Abstract
  In this study, the problems of accurate exemplification and a trustworthy test for judging DNA base-calling were discussed. The study of this problem was done by utilizing a model to ...  Read More ...
Visual secret sharing and related Works -A Review
Visual secret sharing and related Works -A Review

Nahidah T. Darweesh; Ali Makki Sagheer

Volume 17, Issue 1 , June 2023, , Page 169-187

https://doi.org/10.37652/juaps.2023.178907

Abstract
  The accelerated development of network technology and internet applications has increased the significance of protecting digital data and images from unauthorized access and manipulation. ...  Read More ...
Central Kurdish Automatic Speech Recognition using Deep Learning
Central Kurdish Automatic Speech Recognition using Deep Learning

Abdulhady Abdullah; Hadi Veisi

Volume 16, Issue 2 , December 2022, , Page 108-118

https://doi.org/10.37652/juaps.2022.176500

Abstract
  Automatic Speech Recognition (ASR) as an interesting field of speech processing, is nowadays utilized in real applications which are implemented using various techniques. Amongst them, ...  Read More ...
Central Kurdish Sentiment Analysis Using Deep Learning
Central Kurdish Sentiment Analysis Using Deep Learning

Kozhin Awlla; Hadi Veisi

Volume 16, Issue 2 , December 2022, , Page 119-130

https://doi.org/10.37652/juaps.2022.176501

Abstract
  Sentiment Analysis (SA) as a type of opinion mining and as a more general topic than polarity detection, is widely used for analyzing user's reviews or comments of online expressions, ...  Read More ...
A Framework for QKD-based Electronic Voting
A Framework for QKD-based Electronic Voting

Ibrahim Khaleel; Sufyan T. Faraj Al-Janabi; Ali Jbaeer Dawood

Volume 14, Issue 2 , August 2020, , Page 95-103

https://doi.org/10.37652/juaps.2022.172395

Abstract
  This paper deals with the security aspect of electronic voting (e-voting) by introducing quantum key distribution (QKD) to the e-voting process. This can offer an extremely high level ...  Read More ...
IMPLEMENTING SKETCH-BASED IMAGE RETRIEVAL SYSTEM USING EDGE DETECTION AND SIFT ALGORITHM
IMPLEMENTING SKETCH-BASED IMAGE RETRIEVAL SYSTEM USING EDGE DETECTION AND SIFT ALGORITHM

AHMED SHIHAB AHMED

Volume 13, Issue 2 , August 2019, , Page 55-63

https://doi.org/10.37652/juaps.2022.172129

Abstract
  Throughout the past few years, several researchers have introduced various methods and various algorithms for a precise and dependable sketch-based image retrieval system. In this paper, ...  Read More ...
Apriori Method of Mining Secure Data in Social Media
Apriori Method of Mining Secure Data in Social Media

Zahraa Raji Mohi

Volume 13, Issue 1 , April 2019, , Page 41-49

https://doi.org/10.37652/juaps.2022.171873

Abstract
  As can be seen all around us, social media sites such as Facebook, Twitter, YouTube and Flickr and other became more importance grow rapidly in the last few years. This growth in social ...  Read More ...
A Technique for Discovering Similarities between Texts Based on Extracting Features from the Text
A Technique for Discovering Similarities between Texts Based on Extracting Features from the Text

Alaa Abdalqahar Jihad; Mortadha M. Hamad

Volume 13, Issue 1 , April 2019, , Page 50-54

https://doi.org/10.37652/juaps.2022.171876

Abstract
  The discovery of the similarity between two texts is very important and useful in many applications. The similarity between texts is the core research area of dataset, data warehouse, ...  Read More ...
Diabetes Classification Using ID3 and Naïve Bayes Algorithms
Diabetes Classification Using ID3 and Naïve Bayes Algorithms

Khalid Jassim; Hadeel M. Saleh

Volume 12, Issue 3 , December 2018, , Page 38-46

https://doi.org/10.37652/juaps.2022.171841

Abstract
  Diabetes can be defined as a chronic disease identified by high levels of blood glucose that result from issues in the way insulin is generated, the way insulin works, or both those ...  Read More ...
Overview for Internet of Things: Basics, Components and Applications
Overview for Internet of Things: Basics, Components and Applications

Safa Ahmed; Nahla Fadhil Alwan; Ammar Mohamed Ali

Volume 12, Issue 3 , December 2018, , Page 47-58

https://doi.org/10.37652/juaps.2022.171846

Abstract
  There are significant developments in the field of remote sensing, communications, and control in the world today. The Internet of Things (IoT) is the result of cooperation between ...  Read More ...
THEORY OF QUASI-CATEGORIES AS A THEORETICAL BASE FOR THE CONSTRUCTION OF BRAIN LIKE COMPUTERS
THEORY OF QUASI-CATEGORIES AS A THEORETICAL BASE FOR THE CONSTRUCTION OF BRAIN LIKE COMPUTERS

Ammar Baghdadi

Volume 12, Issue 3 , December 2018, , Page 59-70

https://doi.org/10.37652/juaps.2022.171855

Abstract
  The article gives a definition of the concept of a modified category and formulates the problem of developing a theory of modified categories that opens the way to building high-performance ...  Read More ...
Textual Analysis Applications: Subject Review
Textual Analysis Applications: Subject Review

Abeer Al-Mashhsdany; Safa A. Ahmed

Volume 12, Issue 3 , December 2018, , Page 71-83

https://doi.org/10.37652/juaps.2022.171861

Abstract
  This paper is a literature survey about applications of textual analysis. It aims to provide brief description about the common textual analysis applications. The paper talks about ...  Read More ...
A Proposed Method for Achieving the Confidentiality of Arabic Texts
A Proposed Method for Achieving the Confidentiality of Arabic Texts

Yaseen Hikmat Ismaiel

Volume 12, Issue 2 , August 2018, , Page 49-56

https://doi.org/10.37652/juaps.2022.171807

Abstract
  Due to the rapid development of distributed computing systems, the use of local networks, and the huge expansion of the Internet, the process of maintaining the confidentiality of information ...  Read More ...
Personal Identification based on Multi Biometric Traits
Personal Identification based on Multi Biometric Traits

Wigdan J. Al-Kubaisy; Muzhir S. Al-Ani

Volume 11, Issue 1 , April 2017, , Page 68-75

https://doi.org/10.37652/juaps.2017.141533

Abstract
  The biometric system that based on single biometric measure (Unimodal) are usually contained variety of problems and limitation like noisy data, does not provide high security and non-university, ...  Read More ...
New Stenographic method to hiding information in digital image
New Stenographic method to hiding information in digital image

Falath M.Mohammed

Volume 9, Issue 2 , August 2015, , Page 80-84

https://doi.org/10.37652/juaps.2015.124504

Abstract
  Steganography is the art of hiding information in different cover media, then sending & displaying the hidden information especially in public places, Therefore, different methods ...  Read More ...
EVALUATION AND ENHANCEMENT OF CONTRACT IN DIGITAL IMAGES
EVALUATION AND ENHANCEMENT OF CONTRACT IN DIGITAL IMAGES

Abdullah H. Muhammad; Shahla U.Umar

Volume 7, Issue 3 , December 2013, , Page 135-149

https://doi.org/10.37652/juaps.2013.97183

Abstract
  The optical imaging systems, do not give a perfect and ideal image. But mostly give images with limited resolutions i.e. give images with blurr edges. This blurring attributed to two ...  Read More ...
ENHANCING TRANSPOSITION CIPHER METHODS USING DNA ENCRYPTION
ENHANCING TRANSPOSITION CIPHER METHODS USING DNA ENCRYPTION

YASEEN H. ASNAEEL; NAJLA B. IBRAHEAM

Volume 7, Issue 1 , April 2013, , Page 233-239

https://doi.org/10.37652/juaps.2013.83081

Abstract
  Recent studies have shown the Deoxyribo nucleic acid (DNA) have several important features including the indiscriminate nature of the sequence of nitrogenous bases consisting the acid ...  Read More ...
Face Detection by Skin Color based on Elman Neural Network
Face Detection by Skin Color based on Elman Neural Network

Ghada Thanoon; Nadia maan; Amera Istiqlal

Volume 6, Issue 2 , August 2012, , Page 1-5

https://doi.org/10.37652/juaps.2012.63370

Abstract
  In this paper, a propose system was present for face detection by the color of skin which is the main feature in the skin, the system depends on the color properties that extracted ...  Read More ...
Trusted Cloud Computing
Trusted Cloud Computing

Kashif Kifayat; Waleed K. Awad; Sufyan T. Faraj

Volume 6, Issue 2 , August 2012, , Page 6-13

https://doi.org/10.37652/juaps.2012.63157

Abstract
  Cloud computing is a new consumption and delivery model for IT services. The cloud has become an attractive platform for enterprises to deploy and execute their business services for ...  Read More ...
A New VQ Technique for Steganography in JPG
A New VQ Technique for Steganography in JPG

Ansam Osama Abdulmajeed; Ahmed Sami Nori

Volume 6, Issue 2 , August 2012, , Page 13-19

https://doi.org/10.37652/juaps.2012.63372

Abstract
  present research was aimed to implement a new Steganographic algorithm for colored images in Vector Quantization (VQ) compressed domain, since the compressed image considers a secure ...  Read More ...
Management of Identity and Access in the Cloud
Management of Identity and Access in the Cloud

Kashif Kifayat; Sameeh Abdulghafour Jassim; Sufyan T. Faraj

Volume 6, Issue 2 , August 2012, , Page 22-33

https://doi.org/10.37652/juaps.2012.63234

Abstract
  Cloud computing is new technology that provides cheaper, easier, and more powerful processes to customers over internet. The cloud service provider (CSP) provides virtualized resources ...  Read More ...
Achieve reliable and confidential message using Pretty Good Privacy (PGP) algorithm
Achieve reliable and confidential message using Pretty Good Privacy (PGP) algorithm

Raya Jassim Essa

Volume 6, Issue 2 , August 2012, , Page 33-39

https://doi.org/10.37652/juaps.2012.63375

Abstract
  The paper aims at verifying the reliability of the exchanged data and information. The study conducted using the Pretty Good Privacy (PGP) algorithm application within a network of ...  Read More ...