Volume 17 (2023)
Volume 16 (2022)
Volume 15 (2021)
Volume 14 (2020)
Volume 13 (2019)
Volume 12 (2018)
Volume 11 (2017)
Volume 10 (2016)
Volume 9 (2015)
Volume 8 (2014)
Volume 7 (2013)
Volume 6 (2012)
Volume 5 (2011)
Volume 4 (2010)
Volume 3 (2009)
Volume 2 (2008)
Volume 1 (2007)
Number of Articles: 26
Performance Testing Technique for Applied Programs
Volume 6, Issue 2 , August 2012, Page 1-5
Abstract
In this paper, software was preparedto use for measuring the programs performance because of the importance of measuring the programs performance. The performance of any program basically ... Read More ...Face Detection by Skin Color based on Elman Neural Network
Volume 6, Issue 2 , August 2012, Page 1-5
Abstract
In this paper, a propose system was present for face detection by the color of skin which is the main feature in the skin, the system depends on the color properties that extracted ... Read More ...Optimal Code book Generating LBG Algorithm
Volume 6, Issue 2 , August 2012, Page 6-12
Abstract
In this research, have been applied(LBG) algorithm to create optimal code book tat used in vector quantization, which use in widely for image and signal processing .It use in image ... Read More ...Trusted Cloud Computing
Volume 6, Issue 2 , August 2012, Page 6-13
Abstract
Cloud computing is a new consumption and delivery model for IT services. The cloud has become an attractive platform for enterprises to deploy and execute their business services for ... Read More ...A New VQ Technique for Steganography in JPG
Volume 6, Issue 2 , August 2012, Page 13-19
Abstract
present research was aimed to implement a new Steganographic algorithm for colored images in Vector Quantization (VQ) compressed domain, since the compressed image considers a secure ... Read More ...The Mechanism of Deliberate Jamming On the Broadcast Satellite Service.
Volume 6, Issue 2 , August 2012, Page 14-21
Abstract
A direct broadcast satellite is making maximum efforts to transmission the TV signal from the source to the receiving in the small home earth stations, especially the important events ... Read More ...Standard printed musical note recognition based on neural network
Volume 6, Issue 2 , August 2012, Page 20-25
Abstract
Artificial neural network is widely used for many computer applications and assure it success in all of these fields, like recognition applications. In this paper the a supervised NN ... Read More ...Management of Identity and Access in the Cloud
Volume 6, Issue 2 , August 2012, Page 22-33
Abstract
Cloud computing is new technology that provides cheaper, easier, and more powerful processes to customers over internet. The cloud service provider (CSP) provides virtualized resources ... Read More ...An Enhanced Authentication Based on Biometric and Neural Network
Volume 6, Issue 2 , August 2012, Page 26-32
Abstract
Because of the significant in the field of information technology, increasing means of communication and networks , proliferation of electronic crimes and personality theft, the security ... Read More ...Achieve reliable and confidential message using Pretty Good Privacy (PGP) algorithm
Volume 6, Issue 2 , August 2012, Page 33-39
Abstract
The paper aims at verifying the reliability of the exchanged data and information. The study conducted using the Pretty Good Privacy (PGP) algorithm application within a network of ... Read More ...A Neural-Network-Based Simulated Model for Controlling Electrical Furnace Using Silicon Carbide Heating Elements
Volume 6, Issue 2 , August 2012, Page 34-40
Abstract
is obvious that Artificial Neural Networks (ANN) is a successful method for system control and simulating nonlinear loads. This paper suggests an ANN model that can simulate the effects ... Read More ...Implementation of a Proposal Encryption Algorithm for Voice over Internet Protocol (VoIP)
Volume 6, Issue 2 , August 2012, Page 40-47
Abstract
The process of transfer a speech signal by high confidentially and as quickly as possible through the Internet needs to develop compression and encryption technology for a speech signal, ... Read More ...The New Intelligent System for the Protection of E-learning from Penetration
Volume 6, Issue 2 , August 2012, Page 41-44
Abstract
This paper focuses on the design new intelligent system to prevent the e-learning from attack. electronic learning (e-learning) systems are becoming widely used tools for distance education/training ... Read More ...Design of Embedded Image Processing System Using FPGAs
Volume 6, Issue 2 , August 2012, Page 45-49
Abstract
The work aims to design an image processing system to be configured on Spartan-3E FPGA. Embedded design techniques were adopted to construct a soft core processor system. Intel strata ... Read More ...Copyright Authentication By Using Karhunen-Loeve Transform
Volume 6, Issue 2 , August 2012, Page 50-57
Abstract
Authentication is a raised as one of the important subject in field of security. So many techniques for improving authentication were appeared during the last three decades.This paper ... Read More ...Key Management Scheme for Mobile Wireless Sensor Networks
Volume 6, Issue 2 , August 2012, Page 58-64
Abstract
Wireless sensor networks (WSNs) are infrastructure-less and resource constraint networks composed of many sensor nodes. These sensors collect information from the area of sense and ... Read More ...AN IMPLEMENTATION OF FIREWALL SYSTEM USING MIKROTIK ROUTER OS
Volume 6, Issue 2 , August 2012, Page 65-69
Abstract
This work concerned with implementing packet filtering firewall by using Mikrotik Router OS, and tested on a LAN. In the host machine, the programs VMware workstation and Wireshark ... Read More ...TORDES-THE NEW SYMMETRIC KEY ALGORITHM
Volume 6, Issue 2 , August 2012, Page 70-74
Abstract
The selective application of technology and related procedural safeguard is an important responsibility for cryptographic algorithm to its electronic data systems. This paper specifies ... Read More ...Back propagation Neural Network Proposed Algorithm to learn deaf a Computer Commands by Hand Gestures
Volume 6, Issue 2 , August 2012, Page 75-78
Abstract
Sign language Plays important role in activating the relation between people and computers , through the activation of the concept of hand movements and provide easier way for people ... Read More ...New Construction of a Chaotic Generator on the Lorenz Attractor
Volume 6, Issue 2 , August 2012, Page 79-84
Abstract
it be known that the chaotic phenomena can be obtained from relatively simple systems that are governed by a small number of variables. The system will then be deterministic, although ... Read More ...Improving Efficiency of Round Robin Scheduling Using Ascending Quantum And Minumim-Maxumum Burst Time
Volume 6, Issue 2 , August 2012, Page 85-89
Abstract
Round Robin (RR) is a kind of process algorithms, where the time quantum is fixed along the processes execution. In the other hand it depending on the First Come First Serve (FCFS) ... Read More ...The Mechanism of Monitoring and Tracking of Healthcare Systems
Volume 6, Issue 2 , August 2012, Page 90-94
Abstract
This work concerned with e-healthcare that transmit digital medical data through healthcare system. Online monitoring is concentrated on the process of monitoring and tracking of people ... Read More ...The Role of Metadata for Effective Data Warehouse
Volume 6, Issue 2 , August 2012, Page 95-100
Abstract
Metadata efficient method for managing Data Warehouse (DW). It is also an effective tool in reducing the time or speed to answer queries. In addition, it achieved capabilities of the ... Read More ...The Use of Two Transform Methods in Fingerprints Recognition
Volume 6, Issue 2 , August 2012, Page 101-108
Abstract
Finger prints are the oldest and most widely used form of biometric identification. Despite the widespread use of fingerprints, there is little statistical theory on the uniqueness ... Read More ...Data Hiding In Contourlet Coefficients Based On Their Energy
Volume 6, Issue 2 , August 2012, Page 109-123
Abstract
The data hiding is one of the most important subject in field of computer science, so a lot of technique was developed and modified to satisfy the optimum lend of hiding. In this research ... Read More ...Design and Multiplierless Implementations of ECG-Based 1st Order Gaussian Derivative Wavelet Filter with Lattice Structures
Volume 6, Issue 2 , August 2012, Page 124-134