Volume 17 (2023)
Volume 16 (2022)
Volume 15 (2021)
Volume 14 (2020)
Volume 13 (2019)
Volume 12 (2018)
Volume 11 (2017)
Volume 10 (2016)
Volume 9 (2015)
Volume 8 (2014)
Volume 7 (2013)
Volume 6 (2012)
Volume 5 (2011)
Volume 4 (2010)
Volume 3 (2009)
Volume 2 (2008)
Volume 1 (2007)
Main Subjects = Computer
Number of Articles: 74
Hyperchaotic technology-based efficient image encryption algorithm an overview.
Volume 17, Issue 2 , December 2023, , Page 234-244
Abstract
Multimedia data encryption is so crucial because the multimedia encryption algorithm needs more time and memory, and it is difficult to implement. Because of this, the hyperchaotic ... Read More ...Optimization Methods for Image Thresholding: A review
Volume 17, Issue 1 , June 2023, , Page 137-148
Abstract
Setting a border with the proper gray level in processing images to separate objects from their backgrounds is crucial. One of the simplest and most popular methods of segmenting pictures ... Read More ...A Multilevel Image Thresholding Based on Hybrid Jaya Algorithm and Simulated Annealing
Volume 17, Issue 1 , June 2023, , Page 149-157
Abstract
Thresholding is a method for region-based image segmentation, which is important in image processing applications such as object recognition Multilevel. Thresholding is used to find ... Read More ...OBTAINING UNIQUE BY ANALYZING DNA USING A NEURO-FUZZY ALGORITHM
Volume 17, Issue 1 , June 2023, , Page 158-168
Abstract
In this study, the problems of accurate exemplification and a trustworthy test for judging DNA base-calling were discussed. The study of this problem was done by utilizing a model to ... Read More ...Visual secret sharing and related Works -A Review
Volume 17, Issue 1 , June 2023, , Page 169-187
Abstract
The accelerated development of network technology and internet applications has increased the significance of protecting digital data and images from unauthorized access and manipulation. ... Read More ...Central Kurdish Automatic Speech Recognition using Deep Learning
Volume 16, Issue 2 , December 2022, , Page 108-118
Abstract
Automatic Speech Recognition (ASR) as an interesting field of speech processing, is nowadays utilized in real applications which are implemented using various techniques. Amongst them, ... Read More ...Central Kurdish Sentiment Analysis Using Deep Learning
Volume 16, Issue 2 , December 2022, , Page 119-130
Abstract
Sentiment Analysis (SA) as a type of opinion mining and as a more general topic than polarity detection, is widely used for analyzing user's reviews or comments of online expressions, ... Read More ...A Framework for QKD-based Electronic Voting
Volume 14, Issue 2 , August 2020, , Page 95-103
Abstract
This paper deals with the security aspect of electronic voting (e-voting) by introducing quantum key distribution (QKD) to the e-voting process. This can offer an extremely high level ... Read More ...IMPLEMENTING SKETCH-BASED IMAGE RETRIEVAL SYSTEM USING EDGE DETECTION AND SIFT ALGORITHM
Volume 13, Issue 2 , August 2019, , Page 55-63
Abstract
Throughout the past few years, several researchers have introduced various methods and various algorithms for a precise and dependable sketch-based image retrieval system. In this paper, ... Read More ...Apriori Method of Mining Secure Data in Social Media
Volume 13, Issue 1 , April 2019, , Page 41-49
Abstract
As can be seen all around us, social media sites such as Facebook, Twitter, YouTube and Flickr and other became more importance grow rapidly in the last few years. This growth in social ... Read More ...A Technique for Discovering Similarities between Texts Based on Extracting Features from the Text
Volume 13, Issue 1 , April 2019, , Page 50-54
Abstract
The discovery of the similarity between two texts is very important and useful in many applications. The similarity between texts is the core research area of dataset, data warehouse, ... Read More ...Diabetes Classification Using ID3 and Naïve Bayes Algorithms
Volume 12, Issue 3 , December 2018, , Page 38-46
Abstract
Diabetes can be defined as a chronic disease identified by high levels of blood glucose that result from issues in the way insulin is generated, the way insulin works, or both those ... Read More ...Overview for Internet of Things: Basics, Components and Applications
Volume 12, Issue 3 , December 2018, , Page 47-58
Abstract
There are significant developments in the field of remote sensing, communications, and control in the world today. The Internet of Things (IoT) is the result of cooperation between ... Read More ...THEORY OF QUASI-CATEGORIES AS A THEORETICAL BASE FOR THE CONSTRUCTION OF BRAIN LIKE COMPUTERS
Volume 12, Issue 3 , December 2018, , Page 59-70
Abstract
The article gives a definition of the concept of a modified category and formulates the problem of developing a theory of modified categories that opens the way to building high-performance ... Read More ...Textual Analysis Applications: Subject Review
Volume 12, Issue 3 , December 2018, , Page 71-83
Abstract
This paper is a literature survey about applications of textual analysis. It aims to provide brief description about the common textual analysis applications. The paper talks about ... Read More ...A Proposed Method for Achieving the Confidentiality of Arabic Texts
Volume 12, Issue 2 , August 2018, , Page 49-56
Abstract
Due to the rapid development of distributed computing systems, the use of local networks, and the huge expansion of the Internet, the process of maintaining the confidentiality of information ... Read More ...Personal Identification based on Multi Biometric Traits
Volume 11, Issue 1 , April 2017, , Page 68-75
Abstract
The biometric system that based on single biometric measure (Unimodal) are usually contained variety of problems and limitation like noisy data, does not provide high security and non-university, ... Read More ...New Stenographic method to hiding information in digital image
Volume 9, Issue 2 , August 2015, , Page 80-84
Abstract
Steganography is the art of hiding information in different cover media, then sending & displaying the hidden information especially in public places, Therefore, different methods ... Read More ...EVALUATION AND ENHANCEMENT OF CONTRACT IN DIGITAL IMAGES
Volume 7, Issue 3 , December 2013, , Page 135-149
Abstract
The optical imaging systems, do not give a perfect and ideal image. But mostly give images with limited resolutions i.e. give images with blurr edges. This blurring attributed to two ... Read More ...ENHANCING TRANSPOSITION CIPHER METHODS USING DNA ENCRYPTION
Volume 7, Issue 1 , April 2013, , Page 233-239
Abstract
Recent studies have shown the Deoxyribo nucleic acid (DNA) have several important features including the indiscriminate nature of the sequence of nitrogenous bases consisting the acid ... Read More ...Face Detection by Skin Color based on Elman Neural Network
Volume 6, Issue 2 , August 2012, , Page 1-5
Abstract
In this paper, a propose system was present for face detection by the color of skin which is the main feature in the skin, the system depends on the color properties that extracted ... Read More ...Trusted Cloud Computing
Volume 6, Issue 2 , August 2012, , Page 6-13
Abstract
Cloud computing is a new consumption and delivery model for IT services. The cloud has become an attractive platform for enterprises to deploy and execute their business services for ... Read More ...A New VQ Technique for Steganography in JPG
Volume 6, Issue 2 , August 2012, , Page 13-19
Abstract
present research was aimed to implement a new Steganographic algorithm for colored images in Vector Quantization (VQ) compressed domain, since the compressed image considers a secure ... Read More ...Management of Identity and Access in the Cloud
Volume 6, Issue 2 , August 2012, , Page 22-33
Abstract
Cloud computing is new technology that provides cheaper, easier, and more powerful processes to customers over internet. The cloud service provider (CSP) provides virtualized resources ... Read More ...Achieve reliable and confidential message using Pretty Good Privacy (PGP) algorithm
Volume 6, Issue 2 , August 2012, , Page 33-39