Content Posted in 2026
A Classifier-Driven Deep Learning Clustering Approach to Enhance Data Collection in MANETs, Ali Abdullah Ali, Mohammed Khaleel Hussein, and Mohammed Ahmed Subhi
A Comparative study of Chest Radiographs and Detection of The Covid 19 Virus Using Machine Learning Algorithm, Shaimaa Q. Sabri, Jahwar Y. Arif, Ghada A. Taqa, and Ahmet Çınar
A Comparative Study of RFID System Performance in Large-Scale Network Planning Facility, Ali Abdulqader Al Qisi, Azli Bin Nawawi, and Adel Muhsin Elewe
A Comprehensive Review of Security Measures in Database Systems: Assessing Authentication, Access Control, and Beyond, Habeeb Omotunde and Maryam Ahmed
Active learning with Bayesian CNN Using the BALD Method for Hyperspectral Image Classification, Mahmood Siddeeq Qadir and Gokhan BİLGİN
A Deep Learning Approach for Identifying Malicious Activities in the Industrial Internet of Things, Mohammed Amin Almaiah, Fuad Ali El-Qirem, Rami Shehab, and Khaled Sulieman Momani
Advanced cyber security using Spectral entity feature selection based on Cyber Crypto Proof Security Protocol (C2PSP), GOPALAKRISHNAN S, Karabi Saikia, and Ranadheer Reddy Vallem
Advanced Image Processing Techniques for Automated Detection of Healthy and Infected Leaves in Agricultural Systems, E.D. Kanmani Ruby, G. Amirthayogam, G. Sasi, T. Chitra, Abhishek Choubey, and S. Gopalakrishnan
Advanced Machine Learning Approaches for Enhanced GDP Nowcasting in Syria Through Comprehensive Analysis of Regularization Techniques, Khder Alakkari, Bushra Ali, Mostafa Abotaleb, Rana Ali Abttan, and Pushan Kumar Dutta
Advanced Machine Learning Models for Accurate Kidney Cancer Classification Using CT Images, Dhuha Abdalredha Kadhim and Mazin Abed Mohammed
Advances and Insights in Image Texture Analysis : A Review, Ghaith H. Alashour and Nidhal K. El Abbadi
Adversarial Attacks on Hybrid Attention Integrated Transfer Learning for Lung Cancer CT Classification, Omar Ibrahim Obaid and Abdulbasit alazawi
A Dynamic DNA Cryptosystem for Secure File Sharing, Kanaan J. Brakas and Mafaz Alanezi
A Framework for Automated Big Data Analytics in Cybersecurity Threat Detection, Mohamed Ariff Ameedeen, Rula A. Hamid, Theyazn H. Aldhyani, Laith Abdul Khaliq Al-Nassr, Sunday Olusanya Olatunji, and Priyavahani Subramanian
Agentic AI-Enhanced Virtual Reality for Adaptive Immersive Learning Environments, Indra Kishor, Udit Mamodiya, Mohammed Almaayah, Amer Alqutaish, Rami Shehab, and Theyazn H. H. Aldhyani
Agent-Interacted Big Data-Driven Dynamic Cartoon Video Generator, Yasmin Makki Mohialden, Abbas Akram khorsheed, and Nadia Mahmood Hussien
A Hybrid Machine Learning Approach for Enhanced Diabetes Prediction: Integrating Image and Numerical Data, Ahmad Shaker Abdalrada, Ali Fahem Neamah, Huda Lafta Majeed, and Ahmed Raad Al-Sudani
AI-Driven Smart Contract Vulnerability Detection: A Systematic Review of Methods, Challenges, and Future Prospects, Saad AL Azzam, Raenu AL Kolandaisamy, and Ghassan AL Dharhani
AI-Powered Cyber Threats: A Systematic Review, Mafaz Alanezi and Ruah Mouad Alyas AL-Azzawi
Analysing the Connection Between AI and Industry 4.0 from a Cybersecurity Perspective: Defending the Smart Revolution, Indu Bala, Maad M. Mijwil, Guma Ali, and Emre Sadıkoğlu
Analysis of climate change in Chelyabinsk and Kurgan: effects of temperature and precipitation from 1990 to 2020 based on CRU data, Irina Potoroko, Ammar Kadi, and Ali Subhi Alhumaima
An Analysis of the Internet of Everything, Roheen Qamar and Baqar Ali Zardari
An Artificial Intelligence-based System for Detecting Meta Fake Profiles via Gradient Boosting and Multilayer Perception, Ruaa A. Al-Falluji, Marwan Ali Albahar, and Ahmad Mousa Altamimi
An Effective Feature Optimization Model for Android Malware Detection, Hussein K. Almulla, Hussam J. Mohammed, Nathan Clarke, Ahmed Adnan Hadi, and Ahmed Adnan Hadi
An efficient cyber security system based on flow-based anomaly detection using Artificial neural network, J. Jasmine Hephzipah, Ranadheer Reddy Vallem, M. Sahaya Sheela, and G. Dhanalakshmi
An Efficient Distributed Intrusion Detection System that Combines Traditional Machine Learning Techniques with Advanced Deep Learning, Wisam Ali Hussein Salman and CHAN HUAH YONG
An English-Swahili Email Spam Detection Model for Improved Accuracy Using Convolutional Neural Networks, Leshan Sankaine, John G. Ndia, and Dennis Kaburu
A New Framework Enhancing, Evaluation, and Benchmarking for Cybersecurity DDoS Attack Detection Models Through the Integration of BWM and VIKOR Methods, Alaa Mohammed Mahmood, İsa AVCI, and Sahar Yousif Mohammed
A New Lightweight Cryptosystem for IoT in Smart City Environments, Firas Hazzaa, Md Mahmudul Hasan, Akram Qashou, Sufian Yousef, and Sufian Yousef
A New Tiger Beetle Algorithm for Cybersecurity, Medical Image Segmentation and Other Global Problems Optimization, Ahmed Saihood, Mohammed Adel Al-Shaher, and Mohammed A. Fadhel
An Extensive Examination of the IoT and Blockchain Technologies in Relation to their Applications in the Healthcare Industry, Karthik Kumar Vaigandla, Madhu Kumar Vanteru, and Mounika Siluveru
ANILA: Adaptive Neuro-Inspired Learning Algorithm for Efficient Machine Learning, AI Optimization, and Healthcare Enhancement, Ismael Khaleel, Wijdan Noaman Marzoog, and Ghada Al-Kateb
Anomaly-Based IDS (Intrusion Detection System) for Cyber-Physical Systems, Ahmad Muter Awaad, Khattab M. Alheeti, and Abdul Kream A.H. Najem
Anomaly detection in encrypted HTTPS traffic using machine learning: a comparative analysis of feature selection techniques, Hind Raad Ibraheem, Nashwan Dheyaa Zaki, and Mohammed Ibrahim Al-mashhadani
Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model, Mohammed Subhi, Omar Fitian Rashid, Safa Ahmed Abdulsahib, Mohammed Khaleel Hussein, and Mohammed Khaleel Hussein
An optimized model for Liver disease classification based on BPSO Using Machine learning models, El-Sayed M. El-Kenawy, Nima Khodadadi, Abdelhameed Ibrahim, Marwa M. Eid, Ahmed M. Osman, and Ahmed M. Elshewey
An optimized model for network intrusion detection in the network operating system environment, Abbas A. Abdulhameed, Sundos A. Hameed Alazawi, and Ghassan Muslim Hassan
A Novel AI-based Dependency-aware Algorithm for Prioritizing Software Requirements in Large-scale Projects, Nahla Mohamed, Waleed Helmy, and Sherif Mazen
A Novel Approach of Reducing Energy Consumption by utilizing Big Data analysis in Mobile Cloud Computing, Mostafa Abdulghafoor Mohammed and Nicolae Țăpuș
A Novel Diffusion-Based Cryptographic Method for Cyber Security, Kamaran Adil Ibrahim, Basim Najim Al-Din Abed, and Sura Abed Sarab Hussien
A Novel Hybrid Fusion Model for Intrusion Detection Systems Using Benchmark Checklist Comparisons, Widad K. Mohammed, Mohammed A. Taha, and Saleh M. Mohammed
A Novel Multi-Layered Secure Image Encryption Scheme Utilizing Protein Sequences, Dynamic Mealy Machines, 3D-AS Scrambling, and Chaotic Systems, Radhwan Jawad Kadhim and Hussein K. Khafaji
An Overview on Deep Leaning Application of Big Data, Rofia Abada, Abdulhalim Musa Abubakar, and Muhammad Tayyab Bilal
AntDroidNet Cybersecurity Model: A Hybrid Integration of Ant Colony Optimization and Deep Neural Networks for Android Malware Detection, Riyadh Rahef Nuiaa Al Ogaili, Osamah Adil Raheem, Mohamed H Ghaleb Abdkhaleq, Zaid Abdi Alkareem Alyasseri, Zaid Abdi Alkareem Alyasseri, Ali Hakem Alsaeedi, Yousif Raad Muhsen, and Selvakumar Manickam
Anti-Cyber Childhood Exploitation: An Online Game Chat Monitoring System, Saja J. Mohammed, Awos K. Ali, and Ibrahim M. Ahmed
Approach for Detecting Face Morphing Attacks Using Convolution Neural Network, Essa M. Namis, Khalid Shaker, and Sufyan Al-Janabi
A Process of Penetration Testing Using Various Tools, K. Deepika kongara and Shivani Krishnama
A Proposed Algorithm For Avoiding Jammer In Structure-Free Wireless Sensor Networks, Zainab Shaker Matar Al-Husseini, Hussain K. Chaiel, Amel Meddeb, Ahmed Fakhfakh, and Ahmed Fakhfakh
A Review of Image Steganography Based on Metaheuristic Optimization Algorithms, Fatima Abdulhussain Khalil, Ammar Ali Neamah, and Hasanen Alyasiri
A Robust Model for Android Malware Detection via ML and DL classifiers, Omar Almomani, Areen Arabiat, Muneera Al Tayeb, Mohammed Amin Almaiah, Mansour Obeidat, Theyazn H. H. Aldhyani, Rami Shehab, and Mahmood Rowad
Artificial Intelligence and Cybersecurity in Face Sale Contracts: Legal Issues and Frameworks, Lobna Abdalhusen Easa Al-saeedi, Doaa Fadhil Gatea Albo mohammed, Firas Jamal Shakir, Faris Kamil Hasan, Faris Kamil Hasan, Yahya Layth Khaleel, and Mustafa Abdulfattah Habeeb
Artificial Neural Networks Advantages and Disadvantages, Maad M. Mijwel
Artificial Neural Networks: An Overview, Roheen Qamar and Baqar Ali Zardari
A Secure Password based Authentication with Variable Key Lengths Based on the Image Embedded Method, Seerwan Waleed Jirjees, Farah Flayyeh Alkhalid, Ahmed Mudheher Hasan, Amjad Jaleel Humaidi, and Amjad Jaleel Humaidi
Assessing the Transformative Influence of ChatGPT on Research Practices among Scholars in Pakistan, Nayab Arshad, Mehran Ullah Baber, and Adnan Ullah
A Stacked Ensemble Classifier for Email Spam Detection via an Evolutionary Algorithm, Salam Al-augby, Hasanen Alyasiri, Fahad Ghalib Abdulkadhim, Zahraa Ch. Oleiwi, and Zahraa Ch. Oleiwi
A Survey on Distributed Reinforcement Learning, Maroning Useng and Suleiman Abdulrahman
A Systematic Literature Review on Cyber Attack Detection in Software-Define Networking (SDN), Dalia Shihab Ahmed, Abbas Abdulazeez Abdulhameed, and Methaq T. Gaata
A Systematic Review of Metaverse Cybersecurity: Frameworks, Challenges, and Strategic Approaches in a Quantum-Driven Era, Hasan Ali Al-Tameemi, Ghadeer Ghazi Shayea, Mishall Al-Zubaidie, Yahya Layth Khaleel, Yahya Layth Khaleel, Noor Al-Huda K. Hussein, Raad Z. Homod, Mohammad Aljanabi, O. S. Albahri, A. H. Alamoodi, Maad M. Mijwil, Mohammed A. Fadhel, Iman Mohamad Sharaf, Mohanad G. Yaseen, Ahmed Hussein Ali, U. S. Mahmoud, Saleh M. Mohammed, and A. S. Albahri
Automated Video Colorization Techniques for Enhanced Visual Realism and Computational Efficiency, Zahoor M. Aydam and Nidhal K. El Abbadi
Automated Water Quality Assessment Using Big Data Analytics, Yasmin Makki Mohialden, Nadia Mahmood Hussien, and Saba Abdulbaqi Salman
Big data analysis, Rana Talib Rasheed, Mostafa Abdulgafoor Mohammed Mostafa Abdulgafoor Mohammed, and Nicolae Tapus Nicolae Tapus
Big Data Distributed Support Vector Machine, Raed Abdulkareem Hasan, Tole Sutikno Tole Sutikno, and Mohd Arfian ismail Mohd Arfian Ismail
Big Data Distributed Support Vector Machine, Baby Nirmala, Raed Abueid, and Munef Abdullah Ahmed
Big Data Machine Learning Using Apache Spark Mllib, Ziaul Hasan, Hong Jie Xing Hong Jie Xing, and M. Idrees Magray M. Idrees Magray
Big Data Processing: A review, Taufik Gusman, Mohammad Naeemullah, and Adeeb Mansoor Qasim
Big Data Sentiment Analysis of Twitter Data, Ahmed Hussein Ali and Harish Kumar Kumar Kumar
Blockchain and Distributed Ledger Technologies for IoT Security: A Survey paper, Suleiman Abdulrahman and Maroning Useng
Blockchain and Federated Learning in Edge-Fog-Cloud Computing Environments for Smart Logistics, Guma Ali, Adebo Thomas, Maad M. Mijwil, Kholoud Al-Mahzoum, Kholoud Al-Mahzoum, Ayodeji Olalekan Salau, Ioannis Adamopoulos, Indu Bala, and Aseed Yaseen Rashid Al-jubori
Blockchain-Based Accountability: A Systematic Literature Review, Nabeel Z. Tawfeeq and Dujan B. Taha
Blockchain-Based Metadata Management in Distributed File Systems, Huda A. Alameen and Furkan Rabee
Blockchain-Integrated Edge-Cloud-Enabled Healthcare Data Analytics Based on Distributed Federated Learning and Deep Neural Networks, Mazin Abed Mohammed, Mohd Khanapi Abd Ghani, Israa Badr Al-Mashhadani, Sajida Memon, Sajida Memon, Haydar Abdulameer Marhoon, and Marwan Ali Albahar
Blockchain-Powered Dynamic Segmentation in Personal Health Record, Mishall Al-Zubaidie and Wid Alaa Jebbar
Blockchain technology applications, concerns and recommendations for public sector, Mohanad Ghazi Yaseen, Mahadi Bahari, and Omar A. Hammood
Bridging Law and Machine Learning: A Cybersecure Model for Classifying Digital Real Estate Contracts in the Metaverse, Faris Kamil Mihna, Hazim Akram Sallal, Lobna Abdalhusen Al-Seedi, Hasan Ali Al- Tameemi, Mustafa Abdulfattah Habeeb, Yahya Layth Khaleel, and Dheyaa A. Mohammed
Challenges and Future Directions for Intrusion Detection Systems Based on AutoML, Zainab Ali Abbood, Ismael Khaleel, and Karan Aggarwal
Character Recognition By Implementing FPGA-Based Artificial Neural Network, Ahmed Hussein Ali, Mostafa Abdulghfoor Mohammed, and Munef Abdullah Ahmed
Character Recognition Techniques and approaches: a literature review, Mostafa Abdulghfoor Mohammed and Shuyuan Yang
ChatGPT and Big Data: Enhancing Text-to-Speech Conversion, Hatim Abdelhak Dida, DSK Chakravarthy, and Fazle Rabbi
ChatGPT: Exploring the Role of Cybersecurity in the Protection of Medical Information, Maad Mijwil, Mohammad Aljanabi, and Ahmed Hussein Ali
ChatGPT: Future Directions and Open possibilities, Mohammad Aljanabi
ChatGPT in Waste Management: Is it a Profitable, Thaeer Mueen Sahib, Hussain A. Younis, Osamah Mohammed Alyasiri, Ahmed Hussein Ali, Sani Salisu, Ameen A. Noore, Israa M. Hayder, and Misbah Shahid
Climate Changes through Data Science: Understanding and Mitigating Environmental Crisis, Ahmed Hussein Ali and Rahul Thakkar
Clustering Algorithms and Comparisons in Vehicular Ad Hoc Networks, RADHAKRISHNA KARNE and Sreeja TK
CNNs in Image Forensics: A Systematic Literature Review of Copy-Move, Splicing, Noise Detection, and Data Poisoning Detection Methods, Mohammed R. Subhi, Salman Yussof, Liyana Adilla binti Burhanuddin Adilla binti Burhanuddin, Firas Layth Khaleel, and Firas Layth Khaleel
Collaborative Intrusion Detection System to Identify Joint Attacks in Routing Protocol for Low-Power and Lossy Networks Routing Protocol on the Internet of Everything, Omar A. Abdulkareem, Raja Kumar Kontham, and Farhad E. Mahmood
Color Image Encryption Based on a New Symmetric Lightweight Algorithm, Ala’a Talib Khudhair, Abeer Tariq Maolood, and Ekhlas Khalaf Gbashi
Comprehensive study of Integrating Clustering and Adversarial Learning for Enhanced Recommender Systems: A Systematic Review of Hybrid Methodologies and Applications, M. E. Alqaysi, Murtadha M. Hamad, and Ahmed Subhi Abdalkafor
Computer Networking and Cloud-Based Learning/Teaching Environment Using Virtual Labs Tools: A Review and Future Aspirations, Mishall Al-Zubaidie, Raad A. Muhajjar, and Lauy Abdulwahid Shihabe
Concise Comparison of CNN Models On a Specified Dataset, Humam K. Yaseen, Saif S. Kareem, Bashar I. Hameed, and Salam K. Abdullah
Coupling a dual tree - complex wavelet transform with K-means to clustering the epileptic seizures in EEG signals, Raid Lafta and Rasha Hallem Razzaq
Credit Card Fraud Detection based on Deep Learning Models, El-Sayed M. El-Kenawy, Ahmed Mohamed Zaki, Wei Hong Lim, Abdelhameed Ibrahim, Marwa M. Eid, Ahmed Osman Osman, and Ahmed M. Elshewey
CryptoGenSec: A Hybrid Generative AI Algorithm for Dynamic Cryptographic Cyber Defence, Ghada Al-Kateb, Ismael Khaleel, and Mohammad Aljanabi
Current cutting-edge research in computer science, Mohanad Ghazi Yaseen, Mohammad Aljanabi, Ahmed Hussein Ali, and Saad Abbas Abd
Cyber-Attack Detection for Cloud-Based Intrusion Detection Systems, Muna Ismael Shihan Al-jumaili and Jad Bazzi
Cybersecurity and Artificial Intelligence Applications: A Bibliometric Analysis Based on Scopus Database, O. S. Albahri and A. H. AlAmoodi
Cybersecurity Awareness among Special Needs Students: The Role of Parental Control, Hapini Awang, Nur Suhaili Mansor, Mohamad Fadli Zolkipli, Sarkin Tudu Shehu Malami, Sarkin Tudu Shehu Malami, and Yau Ti Dun
Cybersecurity Challenges in Smart Cities: An Overview and Future Prospects, Maad Mijwil, Ruchi Doshi, Kamal Kant Hiran, Abdel-Hameed Al-Mistarehi, and Abdel-Hameed Al-Mistarehi
Cybersecurity Defence Mechanism Against DDoS Attack with Explainability, Alaa Mohammed Mahmood and İsa Avcı
Cybersecurity for Sustainable Smart Healthcare: State of the Art, Taxonomy, Mechanisms, and Essential Roles, Guma Ali and Maad M. Mijwil
Cybersecurity risk assessment for identifying threats, vulnerabilities and countermeasures in the IoT, Mohammed Amin Almaiah, Rami Shehab, Tayseer Alkhdour, Mansour Obeidat, and Mansour Obeidat
Cyber Security System Based on Machine Learning Using Logistic Decision Support Vector, Sahaya Sheela M, Hemanand D, and Ranadheer Reddy Vallem
DAGchains: An Improved Blockchain Structure Based on Directed Acyclic Graph Construction and Distributed Mining, Abbas Mahdi and Furkan Rabee
Data Mining and Machine Learning-Based Healthcare Monitoring in Cloud-IoT, Sarah Amer, Rania Hazim, and Wassan Kader
Data Mining Utilizing Various Leveled Clustering Procedures on the Position of Workers in a Data Innovation Firm, Hussein Alkattan, Noor Razzaq Abbas, Oluwaseun A. Adelaja, Mostafa Abotaleb, and Guma Ali
Deepfake Detection in Video and Audio Clips: A Comprehensive Survey and Analysis, Wurood A. Jbara, Noor Al-Huda K. Hussein, and Jamila H. Soud
Deep Learning Approaches for Gender Classification from Facial Images, Mustafa Abdulfattah Habeeb, Yahya Layth Khaleel, Reem D. Ismail, Z. T. Al-Qaysi, and Fatimah N. Ameen
Deep Learning-based English-Arabic Machine Translation for Sulfur Manufacture Texts, Diadeen Ali Hameed and Belal Al-Khateeb
Deep Learning Model for Hand Movement Rehabilitation, Reem D. Ismail, Qabas A. Hameed, Mustafa Abdulfattah Habeeb, Yahya Layth Khaleel, and Fatimah N. Ameen
DeepSeek: Is it the End of Generative AI Monopoly or the Mark of the Impending Doomsday?, Malik Sallam, Kholoud Al-Mahzoum, Mohammed Sallam, and Maad M. Mijwil
DeFi Governance and Decision-Making on Blockchain, Hassan Hamid Ekal and Shams N. Abdul-wahab
Dental segmentation via enhanced YOLOv8 and image processing techniques, Dhiaa Mohammed Abed, Shuzlina Abdul-Rahman, and Sofianita Mutalib
Department of Computer Engineering, University of Diyala, 32001 Diyala, Iraq., Mustafa Abdulfattah Habeeb and Yahya Layth Khaleel
Design and Development of Hybrid Spectrum Access Technique for CR-IoT Network, sandeep Singh
Design and Practical Implementation of a Stream Cipher Algorithm Based on a Lorenz System, Hayder Mazin Makki Alibraheemi, Mazen M. A. Al Ibraheemi, and Zainb Hassan Radhy
Detection of False Data Injection Attack using Machine Learning approach, Siti Nur Fathin Najwa Binti Mustaffa and muhammad Farhan
Development and construction of new scanning antennas with high remote sensing capability for wireless communication systems in the millimeter wavelength range, Nagham Habeeb Shakir, Sarah R. Hashim, Ahmed Sileh Gifal, Ahmed Dheyaa Radhi, Alaa G.K. Alshami, Rusul Mansoor AlAmri, and Hussein Mohammed Ali
Development of real-time threat detection systems with AI-driven cybersecurity in critical infrastructure, Noora Zidan Khalaf, Israa Ibraheem Al Barazanchi, Israa Ibraheem Al Barazanchi, A. D. Radhi, A. D. Radhi, Pritesh Shah, and Ravi Sekhar
Development of Robust and Efficient Symmetric Random Keys Model based on the Latin Square Matrix, Nada Hussein M. Ali, Mays M. Hoobi, and Dunia F. Saffo
DGEN: A Dynamic Generative Encryption Network for Adaptive and Secure Image Processing, Mohammed Rajih Jassim, Qusay M. Salih, and Ghada Al-Kateb
Diabetes at a Glance: Assessing AI Strategies for Early Diabetes Detection and Intervention via a Mobile App, Ayad Hameed Mousa, Ibrahim Oday Alrubaye, Mayameen S. Kadhim, Ahmed Dheyaa Radhi, Mudatheer M. Al-Slivani, Rusul Mansoor Al-Amri, and Liaw Geok Pheng
Distributed Denial of Service Attack Detection in IoT Networks using Deep Learning and Feature Fusion: A Review, Abdulhafiz Nuhu, Anis Farihan Mat Raffei, Mohd Faizal Ab Razak, Abubakar Ahmad, and Abubakar Ahmad
Distributed Reduced Convolution Neural Networks, Mohammad Alajanbi, Donato Malerba Donato Malerba, and He Liu He Liu
Effectual Text Classification in Data Mining: A Practical Approach, Israa Ezzat, Alaa Wagih Abdulqader, and Atheel Sabih Shaker
Efficient Coherent Trust based Location Aware Clustering for Communication in Mobile Ad Hoc Networks, Ali Alsalamy, Nejood F. Abdulsattar, and Dheyaa Abdulameer Mohammed
Encrypting Text Messages via Iris Recognition and Gaze Tracking Technology, Sura Abed Sarab Hussien, Basim Najim Al-din Abed, and Kamaran Adil Ibrahim
End-to-End License Plate Detection and Recognition in Iraq Using a Detection Transformer and OCR, Younis Al-Arbo, Hanaa F. Mahmood, and Asmaa Alqassab
Enhanced Audio Encryption Scheme: Integrating Blowfish, HMAC-SHA256, and MD5 for Secure Communication, Jenan Ayad, Noor Qaddoori, and Hasanain Maytham
Enhanced IOT Cyber-Attack Detection Using Grey Wolf Optimized Feature Selection and Adaptive SMOTE, Sura Abed Sarab Hussien, Mustafa S. Ibrahim Alsumaidaie, and Nada Hussein M. Ali
Enhanced Key Generation Method using Deep Q-Networks Algorithm with Chaotic Maps, Ali A. Mahdi and Mays M. Hoobi
Enhanced TEA Algorithm Performance using Affine Transformation and Chaotic Arnold Map, Nada Hussein M. Ali, Mays M. Hoobi, and Sura Abed Sarab Hussien
Enhancing Crime Detection in Video Surveillance via a Lightweight Blockchain and Homomorphic Encryption-based Computer Vision System, Tanya Abdulsattar Jaber
Enhancing Cybersecurity in Smart Education with Deep Learning and Computer Vision: A Survey
Enhancing Cybersecurity with Machine Learning: A Hybrid Approach for Anomaly Detection and Threat Prediction, Adil M. Salman, Bashar Talib Al-Nuaimi, Alhumaima Ali Subhi, Hussein Alkattan, and Hussein Alkattan
Enhancing Electronic Agriculture Data Security with a Blockchain-Based Search Method and E-Signatures, Duaa Hammoud Tahayur and Mishall Al-Zubaidie
Enhancing Hybrid Spectrum Access in CR-IoT Networks: Reducing Sensing Time in Low SNR Environments, Nthatisi Margaret Hlapisi
Enhancing Internet of Things (IoT) Network Security: A Machine Learning-Driven Framework for Real-Time Intrusion Detection and Anomaly Classification, Loiy Alsbatin, Firas Zawaideh, Basem Mohamad Alrifai, Tareq A. Alawneh, and Tareq A. Alawneh
Enhancing Intrusion Detection Systems with Adaptive Neuro-Fuzzy Inference Systems, Jitender Sharma, Sonia ., Karan Kumar, Pankaj Jain, Pankaj Jain, and Hussein Alkattan
Enhancing Motion Detection in Video Surveillance Systems Using the Three-Frame Difference Algorithm, Suhaib Qassem Yahya Al-Hashemi, Majid Salal Naghmash, and Ahmad Ghandour
Enhancing Multifactor Authentication Using Machine Learning Techniques, Rafea Mohammed Ibrahim
Enhancing Routing Efficiency in VANETs by Leveraging 5G to Mitigate Congestion, Yusor Rafid Bahar Al-Mayouf, Omar Adil Mahdi, Heba Hussain Hadi, Suleman Khan, and Mazin Abed Mohammed
Enhancing Security and Performance in Vehicular Adhoc Networks: A Machine Learning Approach to Combat Adversarial Attacks, Mustafa Abdulfattah Habeeb, Yahya Layth Khaleel, and Ahmed Raheem Abdulnabi
Enhancing Throughput in a Network Function Virtualization Environment via the Manta Ray Foraging Optimization Algorithm, Sanaa S. Alwan and Asia Ali Salman
Enhancing Traffic Data Security in Smart Cities Using Optimized Quantum-Based Digital Signatures and Privacy-Preserving Techniques, Tuqa Ghani Tregi and Mishall Al-Zubaidie
Enhancing User Authentication through the Implementation of the ForestPA Algorithm for Smart Healthcare Systems, Nurul Syafiqah Zaidi, Al-Fahim Mubarak Ali, Ahmad Firdaus, Adamu Abubakar Ibrahim, Adamu Abubakar Ibrahim, and Mohd Faizal Ab Razak
Enhancing XML-based Compiler Construction with Large Language Models: A Novel Approach, Idrees A. Zahid and Shahad Sabbar Joudar
Ensure Privacy-Preserving Using Deep Learning, Abeer Dawood Salman and Ruqayah Rabeea Al-Dahhan
Exploring the Evolution of AI Integration in English as a Foreign Language Education: A Scopus-Based Bibliometric Analysis (1997-2023), Mohanad G. Yaseen and Sara S. Alnakeeb
Exploring the Impact of Blockchain Revolution on the Healthcare Ecosystem: A Critical Review, Maad M. Mijwil, Mohammad Aljanabi, Mostafa Abotaleb, Ban Salman Shukur, Ban Salman Shukur, Indu Bala, Kamal Kant Hiran, Ruchi Doshi, and Klodian Dhoska
Exploring the Top Five Evolving Threats in Cybersecurity: An In-Depth Overview, Maad Mijwil, Omega John Unogwu, Youssef Filali, Indu Bala, and Indu Bala
Face Morphing Attacks Detection Approaches: A Review, Essa Mokna Namis, Khalid Shakir Jasim, and Sufyan Al-Janabi
From Machine Learning to Artificial General Intelligence: A Roadmap and Implications, Omar Ibrahim Obaid
From Monochrome to Color: Efficient Techniques for Realistic Video Colorization, Zahoor M. Aydam and Nidhal K. El Abbadi
Generalized Time Domain Prediction Model for Motor Imagery-based Wheelchair Movement Control, Z. T. Al-Qaysi, M. S. Suzani, Nazre bin Abdul Rashid, Reem D. Ismail, M. A. Ahmed, Rasha A. Aljanabi, and Veronica Gil-Costa
Global Research Trends and Collaboration in MITRE ATT&CK Framework: A Bibliometric and Network Analysis in Cybersecurity, Asad Maqsood, Syifak Izhar Hisham, and Ahmad Firdaus
Harmony Search for Security Enhancement, Rana Talib Rasheed, Yitong Niu, and Shamis N. Abd
Harnessing the Potential of Artificial Intelligence in Managing Viral Hepatitis, Guma Ali, Maad M. Mijwil, Ioannis Adamopoulos, Bosco Apparatus Buruga, Murat Gök, and Malik Sallam
HAZE-IMAGE-DATASET: A Large-Scale Benchmark for Image Dehazing in Variable Fog and Low-Light Conditions, Mustafa J. Shahbaz and Ali A.D. Al-Zuky
Healthcare Intelligence and Decision Making: Big Data’s Role in Predictive Analytics for Clinical Decision-Making, Sahar Yousif Mohammed, Noora Saleem Jumaah, Estabraq Abbas, Haifaa Mhammad Ali, and Mohammad Aljanabi
Healthcare Security in Edge-Fog-Cloud Environment using Blockchain: A Systematic Review, Zaid J. Al-Araji, Mahmood S. AlKhaldee, Ammar Awad Mutlag, Zaid Ali Abdulkadhim, Zaid Ali Abdulkadhim, Sharifah Sakinah Syed Ahmad, Namaa N. Hikmat, Ayad Yassen, Abdullah A. Ibrahim Al-Dulaimi, Najwa N. Hazem Al-Sheikh, and Ammar Hashim Ali
Hybrid Classifier for Detecting Zero-Day Attacks on IoT Networks, Rana M. Zaki and Inam S. Naser
Hybrid Cooperative Spectrum Structured (HCSS) Approach for Adaptive Routing in Cognitive Radio Ad Hoc Networks, Sadeem Dheyaa Shamsi, Ameer Sameer Hamood Mohammed Ali, and Wameed Deyah Shamsi
Hybrid Model for Forecasting Temperature in Khartoum Based on CRU data, Hussein Alkattan, Alhumaima Ali Subhi, Laith Farhan, and Ghazwan Al-mashhadani
Hybrid Quantum-Assisted Deep Learning Model for Early-Stage Alzheimer’s Disease Classification Based on MRI Images, Eman A. Radhi, Mohammed Y. Kamil, and Mazin Abed Mohammed
Hybrid Spotted Hyena based Load Balancing algorithm (HSHLB), Raed A. Hasan, Mustafa M. Akawee, Enas F. Aziz, Omar A. Hammood, Aws Saad Showket, Husniyah Jasim, Mohammed A. Alkhafaji, Omar K. Ahmed, and Khalil Yasin
Improved Blockchain Technique based on Modified SLIM Algorithm for Cyber Security, Sarah Mohammed Shareef and Rehab Flaih Hassan
Improved feature selection method for features reduction in intrusion detection systems, Naeemullah Khan, Ismael Khaleel, and Elika Daghighi
Improvement of Internet of Things (IoT) Interference Based on Pre-Coding Techniques over 5G Networks, Inas F. Jaleel, Rasha S. Ali, and Ghassan A. Abed
Improvement of the Face Recognition Systems Security Against Morph Attacks using the Developed Siamese Neural Network, Sura Abed Sarab Hussien, Thair Abed Sarab Hussien, and Nada Hussein M. Ali
Infusing k-means for securing IoT services in edge computing, Tam Sakirin and Iqra Asif
Integration and development of learning management features into the Colums platform, Samer Qahtan Hameed, Tam Sakirin, and Yahya Hakami
Intelligent Forecasting of Solar Atmospheric Disturbances via Capsule Neural Networks and Space Weather Data, Eman Turki Mahdi, Mohammed E. Seno, and Abdullah I. Abdulghafar
Intelligent Techniques for Autism Spectrum Disorder Diagnosis: A Review, Ekraam Jabier, Ali Fadhil Marhoon, and Ammar A. Aldair
Intermediary Decentralized Computing and Private Blockchain Mechanisms for Privacy Preservation in the Internet of Medical Things, Rasha Halim Razzaq, Mishall Al-Zubaidie, and Rajaa Ghali Atiyah
Introduction to The Data Mining Techniques in Cybersecurity, Israa Ezzat Salem, Maad Mijwil, Alaa Wagih Abdulqader, Marwa M. Ismaeel, Marwa M. Ismaeel, and Anas M. Zein Alaabdin
Introduction to Wi-Fi 7: A Review of History, Applications, Challenges, Economical Impact and Research Development, Sallar Salam Murad, Rozin Badeel, Banan Badeel Abdal, Tasmeea Rahman, and Tahsien Al-Quraishi
Intrusion Detection: A Review, Mohammad Aljanabi, Mohd Arfian Ismail, Raed Abdulkareem Hasan, Junaida Sulaiman, and Junaida Sulaiman
Large Scale Data Using K-Means, Raheela zaib and OURLIS Ourabah
Learning management system developments and challenges: A literature review, Samer Qahtan Hameed and Hind Salman Hasan
Learning Techniques-Based Malware Detection: A Comprehensive Review, Sarah Fouad Ali, Musaab Riyadh Abdulrazzaq, and Methaq Talib Gaata
Leveraging AI and Big Data in Low-Resource Healthcare Settings
Leveraging Artificial Intelligent for Optimized Crop Production: An ANN-Based Approach, Yahya Layth Khaleel, Fadya A. Habeeb, Mustafa Abdulfattah Habeeb, and Fatimah N. Ameen
Lightweight Deep Reinforcement Learning Model for Energy-Efficient Resource Allocation in Edge Computing, Ghassan A. Abed and Mohanad A. Al-askari
LipPrint: Using Lip Movements as a Silent Password, Ahmed Ketab and Nidhal K. El Abbadi
Machine Learning and Data Mining Methods for Cyber Security: A Survey, Ziaul Hasan, Hassan r. Mohammad, and Maka Jishkariani
Machine Learning Application on Employee Promotion, Muhannad Ilwani, Ghalia Nassreddine, and Joumana Younis
Machine Learning-Based Detection of Smartphone Malware: Challenges and Solutions, Amneh Alamleh, Sattam Almatarneh, Ghassan Samara, Mohammad Rasmi, and Mohammad Rasmi
Mapping the Evolution of Intrusion Detection in Big Data: A Bibliometric Analysis, Mohanad G. Yaseen and A. S. Albahri
Measuring the Extent of Cyberbullying Comments in Facebook Groups for Mosul University Students, Kanaan J. Brakas and Mafaz Alanezi
Memristive-Based Physical Unclonable Function Design of Authentication Architectures: A Systematic Review, Hussien Al-Ani and Israa Al-Mashhadani
Mitigating Zero-Day Vulnerabilities in IIoT Systems: Challenges and Advances in AI-Powered Intrusion Detection Systems, Khalid Asaad Hashim, Yusnani Binti Mohd Yussoff, and Shahrani Binti - Binti Shahbudin
MLP and RBF Algorithms in Finance: Predicting and Classifying Stock Prices amidst Economic Policy Uncertainty, Bushra Ali, Khder Alakkari, Mostafa Abotaleb, Maad M. Mijwil, and Klodian Dhoska
Mobile Big Data Analytics Using Deep Learning and Apache Spark, Muhammad Azeem, Bassam M. Abualsoud, and Dimuthu Priyadarshana
MobileNetV1-Based Deep Learning Model for Accurate Brain Tumor Classification
Multilevel Text Protection System Using AES and DWT-DCT-SVD Techniques, Nuha Mohammed Khassaf and Nada Hussein M. Ali
Navigating the Metaverse of Big Data: A Bibliometric Journey, O. S. Albahri and A. H. AlAmoodi
Navigating the Void: Uncovering Research Gaps in the Detection of Data Poisoning Attacks in Federated Learning-Based Big Data Processing: A Systematic Literature Review, Mohammad Aljanabi and Hijaz Ahmad
New Recruitment Approach Based on Logistic Regression Model, Ishraq Hatif Abd Almajed, Ghalia Nassreddine, and Joumana Younis
Novel Convolutional Neural Networks based Jaya algorithm Approach for Accurate Deepfake Video Detection, Zahraa Faiz Hussain and Hind Raad Ibraheem
Optimized Deep Learning Model Using Binary Particle Swarm Optimization for Phishing Attack Detection: A Comparative Study, El-Sayed M. El-Kenawy, Marwa M. Eid, Hussein Lafta Hussein, Ahmed M. Osman, and Ahmed M. Osman
Optimized Wavelet Scatter Method for Accurate Classification and Segmentation of Lung Nodules, Enas Hamood Al-Saadi, Ahmed Nidhal Khdiar, and Nidhal K. El Abbadi
Optimizing Big Data Analytics for Reliability and Resilience: A Survey of Techniques and Applications, El-Houcine El Baqqaly and Alaa Hussein Khaleel
Optimizing Cybersecurity in 5G-Enabled IoT Networks via a Resource-Efficient Random Forest Model, Zainab Ali Abbood, Aysar Hadi Oleiwi, Raghad Tariq Al-Hassani, Jenan Ayad, and Jenan Ayad
Overview of the CICIoT2023 Dataset for Internet of Things Intrusion Detection Systems, Wisam Ali Hussein Salman and Chan Huah Yong
Parallel Generalized Hebbian Algorithm for Large Scale Data Analytics, Mohanad G. Yaseen, Mohammad Naeemullah Mohammad Naeemullah, and Ibarhim Adeb Mansoor Ibarhim Adeb Mansoor
Parallel Machine Learning Algorithms, Saba Abdulbaqi Salman, Saad Ahmed Dheyab, Qusay Medhat Salih, and Waleed A. Hammood
Portable Smart Emergency System Using Internet of Things (IOT), Batool Jamal, Muneera Alsaedi, and Parag Parandkar
Potato disease identification using transfer learning approaches, Tarza Hasan Abdullah
Precise Kidney Stone Localization in Medical Imaging via a Capsule Network, Omar Hammad Jasim, Daniah Abdul Qahar Shakir, Mohammed Shihab Hamad, and Waleed Kareem Awad
Predicting Carbon Dioxide Emissions with the Orange Application: An Empirical Analysis, israa ezzat and Alaa Wagih Abdulqader
PRIFLEX: A Secure Federated Learning Framework for Evaluating Privacy Leakage and Defense in Cross-Modal Medical Data, Mohammad Othman Nassar and Feras Fares AL-Mashagba
PSOA-CRL: A Hybrid Multi-Objective Routing Mechanism Using Particle Swarm Optimization and Actor-Critic Reinforcement Learning For VANETs, Mustafa Maad Hamdi, Baraa Saad Abdulhakeem, and Ahmed Adil Nafea
QIS-Box: Pioneering Ultralightweight S-Box Generation with Quantum Inspiration, Ghada Alkateb
Real-Time SDN–IoT Integrated Framework for Intelligent Emergency Vehicle Prioritization in Smart Cities, Sura F. Ismail
Recognition of Alzheimer’s Disease stages via InceptionV3 and ResNet50, Iman Aljubouri, Mostafa Ragheb, and Mohamad Hamady
Review on Blockchain Technology : Architecture, Characteristics, Benefits, Algorithms, Challenges and Applications, Karthik Kumar Vaigandla, Radha Krishna Karne, Mounika Siluveru, Madhavi Kesoju, and Madhavi Kesoju
Robust and Efficient Methods for Key Generation using Chaotic Maps and A2C Algorithm, Ali A. Mahdi and Mays M. Hoobi
ROI – Enhancing Detection of Citrus Disease Based on YOLOv10, Raya N. Ismail, Armaneesa Naaman Hasoon, Israa Rafaa Abdulqader, and Salwa Khalid Abdulateef
Role of ChatGPT in Computer Programming., Som Biswas
Scalable Neural Network Algorithms for High Dimensional Data, Mukesh Soni and Marwan Ali Shnan
SDN-Cloud Incident Detection & Response with Segmented Federated Learning for the IoT, Anas Harchi, Hicham Toumi, and Mohamed Talea
Secured Multi-Objective Optimisation-Based Protocol for Reliable Data Transmission in Underwater Wireless Sensor Networks, Mostfa Albdair, Zainab Rustum mohsin, Ahmed Saihood, Aqeel M. Hamad, and Aqeel M. Hamad
Securing Real-Time Data Transfer in Healthcare IoT Environments with Blockchain Technology, Safa Hussein Oleiwi, Saraswathy Shamini Gunasekaran, Karrar Ibrahim AbdulAmeer, Mazin Abed Mohammed, and Mazin Abed Mohammed
Securing the Internet of Wetland Things (IoWT) Using Machine and Deep Learning Methods: A Survey
Securing Tomorrow: Navigating the Evolving Cybersecurity Landscape, A. S. Albahri, Mohanad G. Yaseen, Mohammad Aljanabi, Ahmed Hussein Ali, and Ahmed Hussein Ali
Security and Privacy in IoT-based Healthcare Systems: A Review, Omar Ibrahim Obaid and Saba Abdul-Baqi Salman
Segment Anything: A Review, Firas Hazzaa, Innocent Udoidiong, Akram Qashou, and Sufian Yousef
Self-Attention Enhanced Dual BiGRU for Arabic Fake News Detection, Baqer M. Merzah, Jafar Razmara, and Jaber Karimpour
Shared Generator-Based Serverless Multimodal Federated Learning For Medical Image Analysis, Mohammed Adel Al-Shahe, Ahmed Saihood, and Mustafa Asaad Hasan
Smartphone Authentication Based on 3D Touch Sensor and Finger Locations on Touchscreens via Decision-Making Techniques, Moceheb Lazam Shuwandy, Rawan Adel Fawzi Alsharida, and Maytham M. Hammood
SQL Injection Attack Detection Using Machine Learning Algorithm, Taseer Muhammad and Hamayoon Ghafory
SQL Injection Attack: Quick View, Vugar Abdullayev and Alok Singh Chauhan
Student’s Rating System for Teachers: A Tool for Teacher Scheduling Consideration, NAOMI BAJAO, Jose Primo Bardoquillo, Jhay Concha, Mae Fatima Monsanto, and Ma.Chrisfie Karen Mojar
Study and Analysis of OFDM under Rayleigh fading Channel using Various Modulation Methods, Sowmya Kalakoti, Uday Kiran Vashapaka, Mokshith Reddy Gujjula, Harika Surasi, and Siddartha Kusuma
Synergizing Quantum-Safe Signatures with JWT for Unparalleled Security in Web Applications, Kalpana B. N and R Saravana Kumar
Synthesizing Deception: Countering Large Language Model-Generated Phishing Campaigns through Adaptive Semantic Anomaly Detection, Bekim Fetaji and Debabrata Samanta
The Data-Driven Future of Healthcare: A Review, Muhammad Miftahul Amri and Saad Abbas Abed
The Ethical Implications of DALL-E: Opportunities and Challenges, Kai-Qing Zhou and Hatem Nabus
The impact of Blockchain technique on trustworthy healthcare sector, Nour Sadeq, Zeid Hamzeh, Ghalia Nassreddine, Tamima ElHassan, and Tamima ElHassan
The Next Frontier in Computer Science, Trends and Research Opportunities, Mostafa Abdulghafoor Mohammed, Z. T. Al-qaysi, and Tahsien Al-Quraishi
Theoretical Background of Cryptography, Rusul Mansoor Al-Amri, Dalal N. Hamood, and Alaa Kadhim Farhan
Theoretical Background of steganography, Shams N. Abdul-wahab, Mostafa Abdulghafoor Mohammed, and Omar A. Hammood
The Purpose of Cybersecurity Governance in the Digital Transformation of Public Services and Protecting the Digital Environment, Maad Mijwil, Youssef Filali, Mohammad Aljanabi, Mariem Bounabi, and Mariem Bounabi
The Renewable, Sustainable, and Clean Energy in Iraq Between Reality and Ambition According to the Paris Agreement on Climate Change, Noah Mohammed Saleh, Ali Mohammed Saleh, Raed Abdulkareem Hasan, and Hadi Hamdi Mahdi
Threat Detection Based on Explainable AI (XAI) and Hybrid Learning, Shatha J. Mohammed and Bashar M. Nema
Threats Detection in the Internet of Things Using Convolutional neural networks, long short-term memory, and gated recurrent units, Naomi A. Bajao and Jae-an Sarucam
Towards Achieving the UN Sustainable Development Goals: The Role of AI in Municipality Services, Thabit Sultan Mohammed, Karim Mohammed Aljebory, and Ahmed Thabit Sultan
Towards Autonomous Optical Fibre Networks: High-Precision EDFA Gain and Spectral Response Prediction via Hybrid CNN-LSTM Deep Learning, Ibtesam Hussien Htaat, Mudhafar Hussein Ali, and Abdulla Khudiar Abass
Transaction Security and Management of Blockchain-Based Smart Contracts in E-Banking-Employing Microsegmentation and Yellow Saddle Goatfish, Wid Jebbar and Mishall Al-Zubaidie
Transfer Learning: A New Promising Techniques, Ahmed Hussein Ali, Mohanad G. Yaseen, Mohammad Aljanabi, and Saad Abbas Abed
Transformer-Based Genomic Classification and Simulation of Heat-Responsive Genes in Citrus limon, Ali Fahem Neamah, Zahraa A. Abdalkareem, Mostafa A. Mohammed, Jasim Ibrahim Ahmed, and Phaklen Ehkan
Ubiquitous Trust Management and Power Optimization for UAV Assisted Mobile Communication, Nejood F. Abdulsattar, Ali Alsalamy, and Ghadeer Ghazi Shayea
UIR: Implementing Deep Neural Networks in addition to Conventional Algorithms for Ultra-Image Recovery, Ali Salim Rasheed, Alaa Hamza Omran, Mohammad Aljanabi, Mohammed Almaayah, Rami Shehab, Mansour Obeidat, Theyazn H. H. Aldhyani, and Mosleh Hmoud Al-Adhaileh
Uniform Resource Locator Protection Scheme for the Mitigation of Man-In-The-Middle Stripping Attacks, Duaa Sameer Zhraw, Mohammed Abdulridha Hussain, Zaid Ameen Abduljabbar, Vincent Omollo Nyangaresi, Ali Hasan Ali, and Husam A. Neamah
Unlocking the Full Potential of Spectrum: A Comprehensive Review of Cognitive Radio Technology
User preferences for ChatGPT-powered conversational interfaces versus traditional methods, Tam Sakirin and Rachid Ben Said
Using Data Anonymization in big data analytics security and privacy, Abdulatif Ali Hussain, Ismael Khaleel, and Tahsien Al-Quraishi
Using Information Technology for Comprehensive Analysis and Prediction in Forensic Evidence, Faris Kamil Hasan Mihna, Mustafa Abdulfattah Habeeb, Yahya Layth Khaleel, Yasir Hussein Ali, and Yasir Hussein Ali
Using Neural Networks to Model Complex Mathematical Functions, Abdelfatah kouidere and Mondher Damak
Using Wearable Technology for Context-Aware of Pilgrimage Management System During/Post-Pandemic of Covid-19, Fatina Shukur, Ahmed Al-Fatlawi, Safaa Jasim Mosa, and Nasir Ibrahim
Validation Framework for Robust and Explainable Machine Learning Models in Autism Spectrum Disorder Triage, Ghadeer Ghazi Shayea, Mohd Hazli Mohammed Zabil, A. S. Albahri, Rula A. Hamid, O. S. Albahri, A. H. Alamoodi, and Iman Mohamad Sharaf
Virtual Personalities and Smart Analytics in the Digital Environment: Legal and Applied Framework for Big Data and Financial Transaction, Hazim Akram Sallal, Faris Kamil Mihna, Lobna Abdalhusen Al-Seedi, Mustafa Abdulfattah Habeeb, and Yahya Layth Khaleel
WOA-COVID-19: Whale Optimization Algorithm for Selection of Multi-Examination Features based on COVID-19 Infections, Karrar Hameed Abdulkareem, Mazin Abed Mohammed, Zaid Abdi Alkareem Alyasseri, Dawood Zahi Khutar, and Osama Ahmad Alomari
Zero-Day Vulnerabilities: Unveiling the Threat Landscape in Network Security, Raheela zaib and Kai-Qing Zhou