Volume 17 (2023)
Volume 16 (2022)
Volume 15 (2021)
Volume 14 (2020)
Volume 13 (2019)
Volume 12 (2018)
Volume 11 (2017)
Volume 10 (2016)
Volume 9 (2015)
Volume 8 (2014)
Volume 7 (2013)
Volume 6 (2012)
Volume 5 (2011)
Volume 4 (2010)
Volume 3 (2009)
Volume 2 (2008)
Volume 1 (2007)
Main Subjects = Computer
Number of Articles: 74
A Neural-Network-Based Simulated Model for Controlling Electrical Furnace Using Silicon Carbide Heating Elements
Volume 6, Issue 2 , August 2012, , Page 34-40
Abstract
is obvious that Artificial Neural Networks (ANN) is a successful method for system control and simulating nonlinear loads. This paper suggests an ANN model that can simulate the effects ... Read More ...The New Intelligent System for the Protection of E-learning from Penetration
Volume 6, Issue 2 , August 2012, , Page 41-44
Abstract
This paper focuses on the design new intelligent system to prevent the e-learning from attack. electronic learning (e-learning) systems are becoming widely used tools for distance education/training ... Read More ...Design of Embedded Image Processing System Using FPGAs
Volume 6, Issue 2 , August 2012, , Page 45-49
Abstract
The work aims to design an image processing system to be configured on Spartan-3E FPGA. Embedded design techniques were adopted to construct a soft core processor system. Intel strata ... Read More ...Copyright Authentication By Using Karhunen-Loeve Transform
Volume 6, Issue 2 , August 2012, , Page 50-57
Abstract
Authentication is a raised as one of the important subject in field of security. So many techniques for improving authentication were appeared during the last three decades.This paper ... Read More ...Key Management Scheme for Mobile Wireless Sensor Networks
Volume 6, Issue 2 , August 2012, , Page 58-64
Abstract
Wireless sensor networks (WSNs) are infrastructure-less and resource constraint networks composed of many sensor nodes. These sensors collect information from the area of sense and ... Read More ...AN IMPLEMENTATION OF FIREWALL SYSTEM USING MIKROTIK ROUTER OS
Volume 6, Issue 2 , August 2012, , Page 65-69
Abstract
This work concerned with implementing packet filtering firewall by using Mikrotik Router OS, and tested on a LAN. In the host machine, the programs VMware workstation and Wireshark ... Read More ...TORDES-THE NEW SYMMETRIC KEY ALGORITHM
Volume 6, Issue 2 , August 2012, , Page 70-74
Abstract
The selective application of technology and related procedural safeguard is an important responsibility for cryptographic algorithm to its electronic data systems. This paper specifies ... Read More ...Back propagation Neural Network Proposed Algorithm to learn deaf a Computer Commands by Hand Gestures
Volume 6, Issue 2 , August 2012, , Page 75-78
Abstract
Sign language Plays important role in activating the relation between people and computers , through the activation of the concept of hand movements and provide easier way for people ... Read More ...New Construction of a Chaotic Generator on the Lorenz Attractor
Volume 6, Issue 2 , August 2012, , Page 79-84
Abstract
it be known that the chaotic phenomena can be obtained from relatively simple systems that are governed by a small number of variables. The system will then be deterministic, although ... Read More ...Improving Efficiency of Round Robin Scheduling Using Ascending Quantum And Minumim-Maxumum Burst Time
Volume 6, Issue 2 , August 2012, , Page 85-89
Abstract
Round Robin (RR) is a kind of process algorithms, where the time quantum is fixed along the processes execution. In the other hand it depending on the First Come First Serve (FCFS) ... Read More ...The Mechanism of Monitoring and Tracking of Healthcare Systems
Volume 6, Issue 2 , August 2012, , Page 90-94
Abstract
This work concerned with e-healthcare that transmit digital medical data through healthcare system. Online monitoring is concentrated on the process of monitoring and tracking of people ... Read More ...The Role of Metadata for Effective Data Warehouse
Volume 6, Issue 2 , August 2012, , Page 95-100
Abstract
Metadata efficient method for managing Data Warehouse (DW). It is also an effective tool in reducing the time or speed to answer queries. In addition, it achieved capabilities of the ... Read More ...The Use of Two Transform Methods in Fingerprints Recognition
Volume 6, Issue 2 , August 2012, , Page 101-108
Abstract
Finger prints are the oldest and most widely used form of biometric identification. Despite the widespread use of fingerprints, there is little statistical theory on the uniqueness ... Read More ...Data Hiding In Contourlet Coefficients Based On Their Energy
Volume 6, Issue 2 , August 2012, , Page 109-123
Abstract
The data hiding is one of the most important subject in field of computer science, so a lot of technique was developed and modified to satisfy the optimum lend of hiding. In this research ... Read More ...Design and Multiplierless Implementations of ECG-Based 1st Order Gaussian Derivative Wavelet Filter with Lattice Structures
Volume 6, Issue 2 , August 2012, , Page 124-134
Abstract
In this paper, the 1st order Gaussian derivative wavelet function utilized in the design of some corresponding filter banks. Since the 1st order Gaussian derivative function has a similar ... Read More ...DCT Image Compression by Run-Length and Shift Coding Techniques.
Volume 5, Issue 3 , December 2011, , Page 39-44
Abstract
The mathematical concept of a DCT transform is a powerful tool in many areas; it is also, served as an approach in image processing discipline. In this work an image is processed as ... Read More ...Developed Protocol for Key Exchange Based on Irreducible Polynomial
Volume 5, Issue 3 , December 2011, , Page 45-49
Abstract
The Aim of this paper is to design a protocol for key exchanging to work on the available computers for different data security application. This paper proposed idea to modify the Diffie-Hellman ... Read More ...٣ حاسوبیاً ×٣× خوارزمیة مقترحة لحل مسألة مکعب روبک ٣
Volume 5, Issue 3 , December 2011, , Page 57-64
Abstract
This paper tackled recruitment of computer to solve Rubik's cube ٣×٣×٣ through a proposed algorithm generate 4 steps (movements) for each face of Rubik's cube's faces ... Read More ...Web Usage Pattern Discovery Using Time Stamp Association Rules
Volume 4, Issue 2 , August 2010, , Page 99-104
Abstract
Abstract: Association rules are typically used to describe what items are frequently bought together. One could also use them in web usage mining to describe the pages that are often ... Read More ...Design and Implementation of Virtual Grid-Based Parallel Computer (VGBPC)
Volume 3, Issue 3 , December 2009, , Page 101-108
Abstract
: Many Areas in Science and industrial applications requires huge computation power that is must achieve the desired level of computation. The field of distributed computing covers ... Read More ...Fibers Direction Effect on Tensile Elasticity of Epoxy Composites Using Computer modeling
Volume 3, Issue 3 , December 2009, , Page 109-115
Abstract
In this research a sample of glass fiber reinforced Epoxy Composite was subjected to a tensile load to study the effect of fiber directions on the tensile elasticity theoretically using ... Read More ...The Numerical Solution for Energy Levels for Harmonic Oscillator and Perturbation Parameters (λ, g, µ, α, I ,N ,M
Volume 3, Issue 1 , April 2009, , Page 95-102
Abstract
he study of energy levels for Harmonic Oscillator a one-dimensional are calculated by eigenvalues and eigenenergy for Schrodinger equation ( ; , , ) ( ) 0 2 2 = ú û ù ... Read More ...A STUDY OF EFFECT OF REINFORCING FIBERS DIRECTION FOR THE POLYMER COMPOSITES ON THE THERMAL CHARACTERIZATION USING COMPUTER MODELING
Volume 2, Issue 3 , December 2008, , Page 65-75
Abstract
ABSTRACT:The study was created using "ANSYS 5.4" the Physical CAD tool to find out the effect of fiber direction on thermal characterization for tow types of the polymer composites. ... Read More ...ERROR CORRECTING CODE USING LATIN SQUARE
Volume 2, Issue 3 , December 2008, , Page 81-91
Abstract
ABSTRACT:Digital data stored in computers or transmitted over computer networks are constantly subject to error due to the physical medium in which they are stored or transmitted. Error-correction ... Read More ...STUDY OF AMYLASE ENZYME AND AMYLASE CREATININE CLEARACE RATE IN NON INSULIN DEPENDENT DIABETES MELLITUS
Volume 2, Issue 3 , December 2008, , Page 82-87