• Home
  • Search
  • Browse Collections
  • My Account
  • About
  • DC Network Digital Commons Network™
Skip to main content
Mesopotamian Academic Press Mesopotamian Academic Press
  • Home
  • My Account
  • FAQ
  • About

    Content Posted in 2026

    PDF

    A Classifier-Driven Deep Learning Clustering Approach to Enhance Data Collection in MANETs, Ali Abdullah Ali, Mohammed Khaleel Hussein, and Mohammed Ahmed Subhi

    PDF

    A Comparative study of Chest Radiographs and Detection of The Covid 19 Virus Using Machine Learning Algorithm, Shaimaa Q. Sabri, Jahwar Y. Arif, Ghada A. Taqa, and Ahmet Çınar

    PDF

    A Comparative Study of RFID System Performance in Large-Scale Network Planning Facility, Ali Abdulqader Al Qisi, Azli Bin Nawawi, and Adel Muhsin Elewe

    PDF

    A Comprehensive Review of Security Measures in Database Systems: Assessing Authentication, Access Control, and Beyond, Habeeb Omotunde and Maryam Ahmed

    PDF

    Active learning with Bayesian CNN Using the BALD Method for Hyperspectral Image Classification, Mahmood Siddeeq Qadir and Gokhan BİLGİN

    PDF

    A Deep Learning Approach for Identifying Malicious Activities in the Industrial Internet of Things, Mohammed Amin Almaiah, Fuad Ali El-Qirem, Rami Shehab, and Khaled Sulieman Momani

    PDF

    Advanced cyber security using Spectral entity feature selection based on Cyber Crypto Proof Security Protocol (C2PSP), GOPALAKRISHNAN S, Karabi Saikia, and Ranadheer Reddy Vallem

    PDF

    Advanced Image Processing Techniques for Automated Detection of Healthy and Infected Leaves in Agricultural Systems, E.D. Kanmani Ruby, G. Amirthayogam, G. Sasi, T. Chitra, Abhishek Choubey, and S. Gopalakrishnan

    PDF

    Advanced Machine Learning Approaches for Enhanced GDP Nowcasting in Syria Through Comprehensive Analysis of Regularization Techniques, Khder Alakkari, Bushra Ali, Mostafa Abotaleb, Rana Ali Abttan, and Pushan Kumar Dutta

    PDF

    Advanced Machine Learning Models for Accurate Kidney Cancer Classification Using CT Images, Dhuha Abdalredha Kadhim and Mazin Abed Mohammed

    PDF

    Advances and Insights in Image Texture Analysis : A Review, Ghaith H. Alashour and Nidhal K. El Abbadi

    PDF

    Adversarial Attacks on Hybrid Attention Integrated Transfer Learning for Lung Cancer CT Classification, Omar Ibrahim Obaid and Abdulbasit alazawi

    PDF

    A Dynamic DNA Cryptosystem for Secure File Sharing, Kanaan J. Brakas and Mafaz Alanezi

    PDF

    A Framework for Automated Big Data Analytics in Cybersecurity Threat Detection, Mohamed Ariff Ameedeen, Rula A. Hamid, Theyazn H. Aldhyani, Laith Abdul Khaliq Al-Nassr, Sunday Olusanya Olatunji, and Priyavahani Subramanian

    PDF

    Agentic AI-Enhanced Virtual Reality for Adaptive Immersive Learning Environments, Indra Kishor, Udit Mamodiya, Mohammed Almaayah, Amer Alqutaish, Rami Shehab, and Theyazn H. H. Aldhyani

    PDF

    Agent-Interacted Big Data-Driven Dynamic Cartoon Video Generator, Yasmin Makki Mohialden, Abbas Akram khorsheed, and Nadia Mahmood Hussien

    PDF

    A Hybrid Machine Learning Approach for Enhanced Diabetes Prediction: Integrating Image and Numerical Data, Ahmad Shaker Abdalrada, Ali Fahem Neamah, Huda Lafta Majeed, and Ahmed Raad Al-Sudani

    PDF

    AI-Driven Smart Contract Vulnerability Detection: A Systematic Review of Methods, Challenges, and Future Prospects, Saad AL Azzam, Raenu AL Kolandaisamy, and Ghassan AL Dharhani

    PDF

    AI-Powered Cyber Threats: A Systematic Review, Mafaz Alanezi and Ruah Mouad Alyas AL-Azzawi

    PDF

    Analysing the Connection Between AI and Industry 4.0 from a Cybersecurity Perspective: Defending the Smart Revolution, Indu Bala, Maad M. Mijwil, Guma Ali, and Emre Sadıkoğlu

    PDF

    Analysis of climate change in Chelyabinsk and Kurgan: effects of temperature and precipitation from 1990 to 2020 based on CRU data, Irina Potoroko, Ammar Kadi, and Ali Subhi Alhumaima

    PDF

    An Analysis of the Internet of Everything, Roheen Qamar and Baqar Ali Zardari

    PDF

    An Artificial Intelligence-based System for Detecting Meta Fake Profiles via Gradient Boosting and Multilayer Perception, Ruaa A. Al-Falluji, Marwan Ali Albahar, and Ahmad Mousa Altamimi

    PDF

    An Effective Feature Optimization Model for Android Malware Detection, Hussein K. Almulla, Hussam J. Mohammed, Nathan Clarke, Ahmed Adnan Hadi, and Ahmed Adnan Hadi

    PDF

    An efficient cyber security system based on flow-based anomaly detection using Artificial neural network, J. Jasmine Hephzipah, Ranadheer Reddy Vallem, M. Sahaya Sheela, and G. Dhanalakshmi

    PDF

    An Efficient Distributed Intrusion Detection System that Combines Traditional Machine Learning Techniques with Advanced Deep Learning, Wisam Ali Hussein Salman and CHAN HUAH YONG

    PDF

    An English-Swahili Email Spam Detection Model for Improved Accuracy Using Convolutional Neural Networks, Leshan Sankaine, John G. Ndia, and Dennis Kaburu

    PDF

    A New Framework Enhancing, Evaluation, and Benchmarking for Cybersecurity DDoS Attack Detection Models Through the Integration of BWM and VIKOR Methods, Alaa Mohammed Mahmood, İsa AVCI, and Sahar Yousif Mohammed

    PDF

    A New Lightweight Cryptosystem for IoT in Smart City Environments, Firas Hazzaa, Md Mahmudul Hasan, Akram Qashou, Sufian Yousef, and Sufian Yousef

    PDF

    A New Tiger Beetle Algorithm for Cybersecurity, Medical Image Segmentation and Other Global Problems Optimization, Ahmed Saihood, Mohammed Adel Al-Shaher, and Mohammed A. Fadhel

    PDF

    An Extensive Examination of the IoT and Blockchain Technologies in Relation to their Applications in the Healthcare Industry, Karthik Kumar Vaigandla, Madhu Kumar Vanteru, and Mounika Siluveru

    PDF

    ANILA: Adaptive Neuro-Inspired Learning Algorithm for Efficient Machine Learning, AI Optimization, and Healthcare Enhancement, Ismael Khaleel, Wijdan Noaman Marzoog, and Ghada Al-Kateb

    PDF

    Anomaly-Based IDS (Intrusion Detection System) for Cyber-Physical Systems, Ahmad Muter Awaad, Khattab M. Alheeti, and Abdul Kream A.H. Najem

    PDF

    Anomaly detection in encrypted HTTPS traffic using machine learning: a comparative analysis of feature selection techniques, Hind Raad Ibraheem, Nashwan Dheyaa Zaki, and Mohammed Ibrahim Al-mashhadani

    PDF

    Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model, Mohammed Subhi, Omar Fitian Rashid, Safa Ahmed Abdulsahib, Mohammed Khaleel Hussein, and Mohammed Khaleel Hussein

    PDF

    An optimized model for Liver disease classification based on BPSO Using Machine learning models, El-Sayed M. El-Kenawy, Nima Khodadadi, Abdelhameed Ibrahim, Marwa M. Eid, Ahmed M. Osman, and Ahmed M. Elshewey

    PDF

    An optimized model for network intrusion detection in the network operating system environment, Abbas A. Abdulhameed, Sundos A. Hameed Alazawi, and Ghassan Muslim Hassan

    PDF

    A Novel AI-based Dependency-aware Algorithm for Prioritizing Software Requirements in Large-scale Projects, Nahla Mohamed, Waleed Helmy, and Sherif Mazen

    PDF

    A Novel Approach of Reducing Energy Consumption by utilizing Big Data analysis in Mobile Cloud Computing, Mostafa Abdulghafoor Mohammed and Nicolae Țăpuș

    PDF

    A Novel Diffusion-Based Cryptographic Method for Cyber Security, Kamaran Adil Ibrahim, Basim Najim Al-Din Abed, and Sura Abed Sarab Hussien

    PDF

    A Novel Hybrid Fusion Model for Intrusion Detection Systems Using Benchmark Checklist Comparisons, Widad K. Mohammed, Mohammed A. Taha, and Saleh M. Mohammed

    PDF

    A Novel Multi-Layered Secure Image Encryption Scheme Utilizing Protein Sequences, Dynamic Mealy Machines, 3D-AS Scrambling, and Chaotic Systems, Radhwan Jawad Kadhim and Hussein K. Khafaji

    PDF

    An Overview on Deep Leaning Application of Big Data, Rofia Abada, Abdulhalim Musa Abubakar, and Muhammad Tayyab Bilal

    PDF

    AntDroidNet Cybersecurity Model: A Hybrid Integration of Ant Colony Optimization and Deep Neural Networks for Android Malware Detection, Riyadh Rahef Nuiaa Al Ogaili, Osamah Adil Raheem, Mohamed H Ghaleb Abdkhaleq, Zaid Abdi Alkareem Alyasseri, Zaid Abdi Alkareem Alyasseri, Ali Hakem Alsaeedi, Yousif Raad Muhsen, and Selvakumar Manickam

    PDF

    Anti-Cyber Childhood Exploitation: An Online Game Chat Monitoring System, Saja J. Mohammed, Awos K. Ali, and Ibrahim M. Ahmed

    PDF

    Approach for Detecting Face Morphing Attacks Using Convolution Neural Network, Essa M. Namis, Khalid Shaker, and Sufyan Al-Janabi

    PDF

    A Process of Penetration Testing Using Various Tools, K. Deepika kongara and Shivani Krishnama

    PDF

    A Proposed Algorithm For Avoiding Jammer In Structure-Free Wireless Sensor Networks, Zainab Shaker Matar Al-Husseini, Hussain K. Chaiel, Amel Meddeb, Ahmed Fakhfakh, and Ahmed Fakhfakh

    PDF

    A Review of Image Steganography Based on Metaheuristic Optimization Algorithms, Fatima Abdulhussain Khalil, Ammar Ali Neamah, and Hasanen Alyasiri

    PDF

    A Robust Model for Android Malware Detection via ML and DL classifiers, Omar Almomani, Areen Arabiat, Muneera Al Tayeb, Mohammed Amin Almaiah, Mansour Obeidat, Theyazn H. H. Aldhyani, Rami Shehab, and Mahmood Rowad

    PDF

    Artificial Intelligence and Cybersecurity in Face Sale Contracts: Legal Issues and Frameworks, Lobna Abdalhusen Easa Al-saeedi, Doaa Fadhil Gatea Albo mohammed, Firas Jamal Shakir, Faris Kamil Hasan, Faris Kamil Hasan, Yahya Layth Khaleel, and Mustafa Abdulfattah Habeeb

    PDF

    Artificial Neural Networks Advantages and Disadvantages, Maad M. Mijwel

    PDF

    Artificial Neural Networks: An Overview, Roheen Qamar and Baqar Ali Zardari

    PDF

    A Secure Password based Authentication with Variable Key Lengths Based on the Image Embedded Method, Seerwan Waleed Jirjees, Farah Flayyeh Alkhalid, Ahmed Mudheher Hasan, Amjad Jaleel Humaidi, and Amjad Jaleel Humaidi

    PDF

    Assessing the Transformative Influence of ChatGPT on Research Practices among Scholars in Pakistan, Nayab Arshad, Mehran Ullah Baber, and Adnan Ullah

    PDF

    A Stacked Ensemble Classifier for Email Spam Detection via an Evolutionary Algorithm, Salam Al-augby, Hasanen Alyasiri, Fahad Ghalib Abdulkadhim, Zahraa Ch. Oleiwi, and Zahraa Ch. Oleiwi

    PDF

    A Survey on Artificial Intelligence in Cybersecurity for Smart Agriculture: State-of-the-Art, Cyber Threats, Artificial Intelligence Applications, and Ethical Concerns

    PDF

    A Survey on Distributed Reinforcement Learning, Maroning Useng and Suleiman Abdulrahman

    PDF

    A Systematic Literature Review on Cyber Attack Detection in Software-Define Networking (SDN), Dalia Shihab Ahmed, Abbas Abdulazeez Abdulhameed, and Methaq T. Gaata

    PDF

    A Systematic Review of Metaverse Cybersecurity: Frameworks, Challenges, and Strategic Approaches in a Quantum-Driven Era, Hasan Ali Al-Tameemi, Ghadeer Ghazi Shayea, Mishall Al-Zubaidie, Yahya Layth Khaleel, Yahya Layth Khaleel, Noor Al-Huda K. Hussein, Raad Z. Homod, Mohammad Aljanabi, O. S. Albahri, A. H. Alamoodi, Maad M. Mijwil, Mohammed A. Fadhel, Iman Mohamad Sharaf, Mohanad G. Yaseen, Ahmed Hussein Ali, U. S. Mahmoud, Saleh M. Mohammed, and A. S. Albahri

    PDF

    Automated Video Colorization Techniques for Enhanced Visual Realism and Computational Efficiency, Zahoor M. Aydam and Nidhal K. El Abbadi

    PDF

    Automated Water Quality Assessment Using Big Data Analytics, Yasmin Makki Mohialden, Nadia Mahmood Hussien, and Saba Abdulbaqi Salman

    PDF

    Big data analysis, Rana Talib Rasheed, Mostafa Abdulgafoor Mohammed Mostafa Abdulgafoor Mohammed, and Nicolae Tapus Nicolae Tapus

    PDF

    Big Data Distributed Support Vector Machine, Raed Abdulkareem Hasan, Tole Sutikno Tole Sutikno, and Mohd Arfian ismail Mohd Arfian Ismail

    PDF

    Big Data Distributed Support Vector Machine, Baby Nirmala, Raed Abueid, and Munef Abdullah Ahmed

    PDF

    Big Data Machine Learning Using Apache Spark Mllib, Ziaul Hasan, Hong Jie Xing Hong Jie Xing, and M. Idrees Magray M. Idrees Magray

    PDF

    Big Data Processing: A review, Taufik Gusman, Mohammad Naeemullah, and Adeeb Mansoor Qasim

    PDF

    Big Data Sentiment Analysis of Twitter Data, Ahmed Hussein Ali and Harish Kumar Kumar Kumar

    PDF

    Blockchain and Distributed Ledger Technologies for IoT Security: A Survey paper, Suleiman Abdulrahman and Maroning Useng

    PDF

    Blockchain and Federated Learning in Edge-Fog-Cloud Computing Environments for Smart Logistics, Guma Ali, Adebo Thomas, Maad M. Mijwil, Kholoud Al-Mahzoum, Kholoud Al-Mahzoum, Ayodeji Olalekan Salau, Ioannis Adamopoulos, Indu Bala, and Aseed Yaseen Rashid Al-jubori

    PDF

    Blockchain-Based Accountability: A Systematic Literature Review, Nabeel Z. Tawfeeq and Dujan B. Taha

    PDF

    Blockchain-Based Metadata Management in Distributed File Systems, Huda A. Alameen and Furkan Rabee

    PDF

    Blockchain-Integrated Edge-Cloud-Enabled Healthcare Data Analytics Based on Distributed Federated Learning and Deep Neural Networks, Mazin Abed Mohammed, Mohd Khanapi Abd Ghani, Israa Badr Al-Mashhadani, Sajida Memon, Sajida Memon, Haydar Abdulameer Marhoon, and Marwan Ali Albahar

    PDF

    Blockchain-Powered Dynamic Segmentation in Personal Health Record, Mishall Al-Zubaidie and Wid Alaa Jebbar

    PDF

    Blockchain technology applications, concerns and recommendations for public sector, Mohanad Ghazi Yaseen, Mahadi Bahari, and Omar A. Hammood

    PDF

    Bridging Law and Machine Learning: A Cybersecure Model for Classifying Digital Real Estate Contracts in the Metaverse, Faris Kamil Mihna, Hazim Akram Sallal, Lobna Abdalhusen Al-Seedi, Hasan Ali Al- Tameemi, Mustafa Abdulfattah Habeeb, Yahya Layth Khaleel, and Dheyaa A. Mohammed

    PDF

    Challenges and Future Directions for Intrusion Detection Systems Based on AutoML, Zainab Ali Abbood, Ismael Khaleel, and Karan Aggarwal

    PDF

    Character Recognition By Implementing FPGA-Based Artificial Neural Network, Ahmed Hussein Ali, Mostafa Abdulghfoor Mohammed, and Munef Abdullah Ahmed

    PDF

    Character Recognition Techniques and approaches: a literature review, Mostafa Abdulghfoor Mohammed and Shuyuan Yang

    PDF

    ChatGPT and Big Data: Enhancing Text-to-Speech Conversion, Hatim Abdelhak Dida, DSK Chakravarthy, and Fazle Rabbi

    PDF

    ChatGPT: Exploring the Role of Cybersecurity in the Protection of Medical Information, Maad Mijwil, Mohammad Aljanabi, and Ahmed Hussein Ali

    PDF

    ChatGPT: Future Directions and Open possibilities, Mohammad Aljanabi

    PDF

    ChatGPT in Waste Management: Is it a Profitable, Thaeer Mueen Sahib, Hussain A. Younis, Osamah Mohammed Alyasiri, Ahmed Hussein Ali, Sani Salisu, Ameen A. Noore, Israa M. Hayder, and Misbah Shahid

     

    Climate Changes through Data Science: Understanding and Mitigating Environmental Crisis, Ahmed Hussein Ali and Rahul Thakkar

    PDF

    Clustering Algorithms and Comparisons in Vehicular Ad Hoc Networks, RADHAKRISHNA KARNE and Sreeja TK

    PDF

    CNNs in Image Forensics: A Systematic Literature Review of Copy-Move, Splicing, Noise Detection, and Data Poisoning Detection Methods, Mohammed R. Subhi, Salman Yussof, Liyana Adilla binti Burhanuddin Adilla binti Burhanuddin, Firas Layth Khaleel, and Firas Layth Khaleel

    PDF

    Collaborative Intrusion Detection System to Identify Joint Attacks in Routing Protocol for Low-Power and Lossy Networks Routing Protocol on the Internet of Everything, Omar A. Abdulkareem, Raja Kumar Kontham, and Farhad E. Mahmood

    PDF

    Color Image Encryption Based on a New Symmetric Lightweight Algorithm, Ala’a Talib Khudhair, Abeer Tariq Maolood, and Ekhlas Khalaf Gbashi

    PDF

    Comprehensive study of Integrating Clustering and Adversarial Learning for Enhanced Recommender Systems: A Systematic Review of Hybrid Methodologies and Applications, M. E. Alqaysi, Murtadha M. Hamad, and Ahmed Subhi Abdalkafor

    PDF

    Computer Networking and Cloud-Based Learning/Teaching Environment Using Virtual Labs Tools: A Review and Future Aspirations, Mishall Al-Zubaidie, Raad A. Muhajjar, and Lauy Abdulwahid Shihabe

    PDF

    Concise Comparison of CNN Models On a Specified Dataset, Humam K. Yaseen, Saif S. Kareem, Bashar I. Hameed, and Salam K. Abdullah

    PDF

    Coupling a dual tree - complex wavelet transform with K-means to clustering the epileptic seizures in EEG signals, Raid Lafta and Rasha Hallem Razzaq

    PDF

    Credit Card Fraud Detection based on Deep Learning Models, El-Sayed M. El-Kenawy, Ahmed Mohamed Zaki, Wei Hong Lim, Abdelhameed Ibrahim, Marwa M. Eid, Ahmed Osman Osman, and Ahmed M. Elshewey

    PDF

    CryptoGenSec: A Hybrid Generative AI Algorithm for Dynamic Cryptographic Cyber Defence, Ghada Al-Kateb, Ismael Khaleel, and Mohammad Aljanabi

    PDF

    Current cutting-edge research in computer science, Mohanad Ghazi Yaseen, Mohammad Aljanabi, Ahmed Hussein Ali, and Saad Abbas Abd

    PDF

    Cyber-Attack Detection for Cloud-Based Intrusion Detection Systems, Muna Ismael Shihan Al-jumaili and Jad Bazzi

    PDF

    Cybersecurity and Artificial Intelligence Applications: A Bibliometric Analysis Based on Scopus Database, O. S. Albahri and A. H. AlAmoodi

    PDF

    Cybersecurity Awareness among Special Needs Students: The Role of Parental Control, Hapini Awang, Nur Suhaili Mansor, Mohamad Fadli Zolkipli, Sarkin Tudu Shehu Malami, Sarkin Tudu Shehu Malami, and Yau Ti Dun

    PDF

    Cybersecurity Challenges in Smart Cities: An Overview and Future Prospects, Maad Mijwil, Ruchi Doshi, Kamal Kant Hiran, Abdel-Hameed Al-Mistarehi, and Abdel-Hameed Al-Mistarehi

    PDF

    Cybersecurity Defence Mechanism Against DDoS Attack with Explainability, Alaa Mohammed Mahmood and İsa Avcı

    PDF

    Cybersecurity for Sustainable Smart Healthcare: State of the Art, Taxonomy, Mechanisms, and Essential Roles, Guma Ali and Maad M. Mijwil

    PDF

    Cybersecurity risk assessment for identifying threats, vulnerabilities and countermeasures in the IoT, Mohammed Amin Almaiah, Rami Shehab, Tayseer Alkhdour, Mansour Obeidat, and Mansour Obeidat

    PDF

    Cyber Security System Based on Machine Learning Using Logistic Decision Support Vector, Sahaya Sheela M, Hemanand D, and Ranadheer Reddy Vallem

    PDF

    DAGchains: An Improved Blockchain Structure Based on Directed Acyclic Graph Construction and Distributed Mining, Abbas Mahdi and Furkan Rabee

    PDF

    Data Mining and Machine Learning-Based Healthcare Monitoring in Cloud-IoT, Sarah Amer, Rania Hazim, and Wassan Kader

    PDF

    Data Mining Utilizing Various Leveled Clustering Procedures on the Position of Workers in a Data Innovation Firm, Hussein Alkattan, Noor Razzaq Abbas, Oluwaseun A. Adelaja, Mostafa Abotaleb, and Guma Ali

    PDF

    Deepfake Detection in Video and Audio Clips: A Comprehensive Survey and Analysis, Wurood A. Jbara, Noor Al-Huda K. Hussein, and Jamila H. Soud

    PDF

    Deep Learning Approaches for Gender Classification from Facial Images, Mustafa Abdulfattah Habeeb, Yahya Layth Khaleel, Reem D. Ismail, Z. T. Al-Qaysi, and Fatimah N. Ameen

    PDF

    Deep Learning-based English-Arabic Machine Translation for Sulfur Manufacture Texts, Diadeen Ali Hameed and Belal Al-Khateeb

    PDF

    Deep Learning Model for Hand Movement Rehabilitation, Reem D. Ismail, Qabas A. Hameed, Mustafa Abdulfattah Habeeb, Yahya Layth Khaleel, and Fatimah N. Ameen

    PDF

    DeepSeek: Is it the End of Generative AI Monopoly or the Mark of the Impending Doomsday?, Malik Sallam, Kholoud Al-Mahzoum, Mohammed Sallam, and Maad M. Mijwil

    PDF

    DeFi Governance and Decision-Making on Blockchain, Hassan Hamid Ekal and Shams N. Abdul-wahab

    PDF

    Dental segmentation via enhanced YOLOv8 and image processing techniques, Dhiaa Mohammed Abed, Shuzlina Abdul-Rahman, and Sofianita Mutalib

    PDF

    Department of Computer Engineering, University of Diyala, 32001 Diyala, Iraq., Mustafa Abdulfattah Habeeb and Yahya Layth Khaleel

    PDF

    Design and Development of Hybrid Spectrum Access Technique for CR-IoT Network, sandeep Singh

    PDF

    Design and Practical Implementation of a Stream Cipher Algorithm Based on a Lorenz System, Hayder Mazin Makki Alibraheemi, Mazen M. A. Al Ibraheemi, and Zainb Hassan Radhy

    PDF

    Detection of False Data Injection Attack using Machine Learning approach, Siti Nur Fathin Najwa Binti Mustaffa and muhammad Farhan

    PDF

    Development and construction of new scanning antennas with high remote sensing capability for wireless communication systems in the millimeter wavelength range, Nagham Habeeb Shakir, Sarah R. Hashim, Ahmed Sileh Gifal, Ahmed Dheyaa Radhi, Alaa G.K. Alshami, Rusul Mansoor AlAmri, and Hussein Mohammed Ali

    PDF

    Development of real-time threat detection systems with AI-driven cybersecurity in critical infrastructure, Noora Zidan Khalaf, Israa Ibraheem Al Barazanchi, Israa Ibraheem Al Barazanchi, A. D. Radhi, A. D. Radhi, Pritesh Shah, and Ravi Sekhar

    PDF

    Development of Robust and Efficient Symmetric Random Keys Model based on the Latin Square Matrix, Nada Hussein M. Ali, Mays M. Hoobi, and Dunia F. Saffo

    PDF

    DGEN: A Dynamic Generative Encryption Network for Adaptive and Secure Image Processing, Mohammed Rajih Jassim, Qusay M. Salih, and Ghada Al-Kateb

    PDF

    Diabetes at a Glance: Assessing AI Strategies for Early Diabetes Detection and Intervention via a Mobile App, Ayad Hameed Mousa, Ibrahim Oday Alrubaye, Mayameen S. Kadhim, Ahmed Dheyaa Radhi, Mudatheer M. Al-Slivani, Rusul Mansoor Al-Amri, and Liaw Geok Pheng

    PDF

    Distributed Denial of Service Attack Detection in IoT Networks using Deep Learning and Feature Fusion: A Review, Abdulhafiz Nuhu, Anis Farihan Mat Raffei, Mohd Faizal Ab Razak, Abubakar Ahmad, and Abubakar Ahmad

    PDF

    Distributed Reduced Convolution Neural Networks, Mohammad Alajanbi, Donato Malerba Donato Malerba, and He Liu He Liu

    PDF

    Effectual Text Classification in Data Mining: A Practical Approach, Israa Ezzat, Alaa Wagih Abdulqader, and Atheel Sabih Shaker

    PDF

    Efficient Coherent Trust based Location Aware Clustering for Communication in Mobile Ad Hoc Networks, Ali Alsalamy, Nejood F. Abdulsattar, and Dheyaa Abdulameer Mohammed

    PDF

    Encrypting Text Messages via Iris Recognition and Gaze Tracking Technology, Sura Abed Sarab Hussien, Basim Najim Al-din Abed, and Kamaran Adil Ibrahim

    PDF

    End-to-End License Plate Detection and Recognition in Iraq Using a Detection Transformer and OCR, Younis Al-Arbo, Hanaa F. Mahmood, and Asmaa Alqassab

    PDF

    Enhanced Audio Encryption Scheme: Integrating Blowfish, HMAC-SHA256, and MD5 for Secure Communication, Jenan Ayad, Noor Qaddoori, and Hasanain Maytham

    PDF

    Enhanced IOT Cyber-Attack Detection Using Grey Wolf Optimized Feature Selection and Adaptive SMOTE, Sura Abed Sarab Hussien, Mustafa S. Ibrahim Alsumaidaie, and Nada Hussein M. Ali

    PDF

    Enhanced Key Generation Method using Deep Q-Networks Algorithm with Chaotic Maps, Ali A. Mahdi and Mays M. Hoobi

    PDF

    Enhanced TEA Algorithm Performance using Affine Transformation and Chaotic Arnold Map, Nada Hussein M. Ali, Mays M. Hoobi, and Sura Abed Sarab Hussien

    PDF

    Enhancing Crime Detection in Video Surveillance via a Lightweight Blockchain and Homomorphic Encryption-based Computer Vision System, Tanya Abdulsattar Jaber

    PDF

    Enhancing Cybersecurity in Smart Education with Deep Learning and Computer Vision: A Survey

    PDF

    Enhancing Cybersecurity with Machine Learning: A Hybrid Approach for Anomaly Detection and Threat Prediction, Adil M. Salman, Bashar Talib Al-Nuaimi, Alhumaima Ali Subhi, Hussein Alkattan, and Hussein Alkattan

    PDF

    Enhancing Electronic Agriculture Data Security with a Blockchain-Based Search Method and E-Signatures, Duaa Hammoud Tahayur and Mishall Al-Zubaidie

    PDF

    Enhancing Hybrid Spectrum Access in CR-IoT Networks: Reducing Sensing Time in Low SNR Environments, Nthatisi Margaret Hlapisi

    PDF

    Enhancing Internet of Things (IoT) Network Security: A Machine Learning-Driven Framework for Real-Time Intrusion Detection and Anomaly Classification, Loiy Alsbatin, Firas Zawaideh, Basem Mohamad Alrifai, Tareq A. Alawneh, and Tareq A. Alawneh

    PDF

    Enhancing Intrusion Detection Systems with Adaptive Neuro-Fuzzy Inference Systems, Jitender Sharma, Sonia ., Karan Kumar, Pankaj Jain, Pankaj Jain, and Hussein Alkattan

    PDF

    Enhancing Motion Detection in Video Surveillance Systems Using the Three-Frame Difference Algorithm, Suhaib Qassem Yahya Al-Hashemi, Majid Salal Naghmash, and Ahmad Ghandour

    PDF

    Enhancing Multifactor Authentication Using Machine Learning Techniques, Rafea Mohammed Ibrahim

    PDF

    Enhancing Routing Efficiency in VANETs by Leveraging 5G to Mitigate Congestion, Yusor Rafid Bahar Al-Mayouf, Omar Adil Mahdi, Heba Hussain Hadi, Suleman Khan, and Mazin Abed Mohammed

    PDF

    Enhancing Security and Performance in Vehicular Adhoc Networks: A Machine Learning Approach to Combat Adversarial Attacks, Mustafa Abdulfattah Habeeb, Yahya Layth Khaleel, and Ahmed Raheem Abdulnabi

    PDF

    Enhancing Throughput in a Network Function Virtualization Environment via the Manta Ray Foraging Optimization Algorithm, Sanaa S. Alwan and Asia Ali Salman

    PDF

    Enhancing Traffic Data Security in Smart Cities Using Optimized Quantum-Based Digital Signatures and Privacy-Preserving Techniques, Tuqa Ghani Tregi and Mishall Al-Zubaidie

    PDF

    Enhancing User Authentication through the Implementation of the ForestPA Algorithm for Smart Healthcare Systems, Nurul Syafiqah Zaidi, Al-Fahim Mubarak Ali, Ahmad Firdaus, Adamu Abubakar Ibrahim, Adamu Abubakar Ibrahim, and Mohd Faizal Ab Razak

    PDF

    Enhancing XML-based Compiler Construction with Large Language Models: A Novel Approach, Idrees A. Zahid and Shahad Sabbar Joudar

    PDF

    Ensure Privacy-Preserving Using Deep Learning, Abeer Dawood Salman and Ruqayah Rabeea Al-Dahhan

    PDF

    Examining Ghana's National Health Insurance Act, 2003 (Act 650) to Improve Accessibility of Artificial Intelligence Therapies and Address Compensation Issues in Cases of Medical Negligence

    PDF

    Exploring the Evolution of AI Integration in English as a Foreign Language Education: A Scopus-Based Bibliometric Analysis (1997-2023), Mohanad G. Yaseen and Sara S. Alnakeeb

    PDF

    Exploring the Impact of Blockchain Revolution on the Healthcare Ecosystem: A Critical Review, Maad M. Mijwil, Mohammad Aljanabi, Mostafa Abotaleb, Ban Salman Shukur, Ban Salman Shukur, Indu Bala, Kamal Kant Hiran, Ruchi Doshi, and Klodian Dhoska

    PDF

    Exploring the Top Five Evolving Threats in Cybersecurity: An In-Depth Overview, Maad Mijwil, Omega John Unogwu, Youssef Filali, Indu Bala, and Indu Bala

    PDF

    Face Morphing Attacks Detection Approaches: A Review, Essa Mokna Namis, Khalid Shakir Jasim, and Sufyan Al-Janabi

    PDF

    From Machine Learning to Artificial General Intelligence: A Roadmap and Implications, Omar Ibrahim Obaid

    PDF

    From Monochrome to Color: Efficient Techniques for Realistic Video Colorization, Zahoor M. Aydam and Nidhal K. El Abbadi

    PDF

    Generalized Time Domain Prediction Model for Motor Imagery-based Wheelchair Movement Control, Z. T. Al-Qaysi, M. S. Suzani, Nazre bin Abdul Rashid, Reem D. Ismail, M. A. Ahmed, Rasha A. Aljanabi, and Veronica Gil-Costa

    PDF

    Global Research Trends and Collaboration in MITRE ATT&CK Framework: A Bibliometric and Network Analysis in Cybersecurity, Asad Maqsood, Syifak Izhar Hisham, and Ahmad Firdaus

    PDF

    Harmony Search for Security Enhancement, Rana Talib Rasheed, Yitong Niu, and Shamis N. Abd

    PDF

    Harnessing the Potential of Artificial Intelligence in Managing Viral Hepatitis, Guma Ali, Maad M. Mijwil, Ioannis Adamopoulos, Bosco Apparatus Buruga, Murat Gök, and Malik Sallam

    PDF

    HAZE-IMAGE-DATASET: A Large-Scale Benchmark for Image Dehazing in Variable Fog and Low-Light Conditions, Mustafa J. Shahbaz and Ali A.D. Al-Zuky

    PDF

    Healthcare Intelligence and Decision Making: Big Data’s Role in Predictive Analytics for Clinical Decision-Making, Sahar Yousif Mohammed, Noora Saleem Jumaah, Estabraq Abbas, Haifaa Mhammad Ali, and Mohammad Aljanabi

    PDF

    Healthcare Security in Edge-Fog-Cloud Environment using Blockchain: A Systematic Review, Zaid J. Al-Araji, Mahmood S. AlKhaldee, Ammar Awad Mutlag, Zaid Ali Abdulkadhim, Zaid Ali Abdulkadhim, Sharifah Sakinah Syed Ahmad, Namaa N. Hikmat, Ayad Yassen, Abdullah A. Ibrahim Al-Dulaimi, Najwa N. Hazem Al-Sheikh, and Ammar Hashim Ali

    PDF

    Hybrid Classifier for Detecting Zero-Day Attacks on IoT Networks, Rana M. Zaki and Inam S. Naser

    PDF

    Hybrid Cooperative Spectrum Structured (HCSS) Approach for Adaptive Routing in Cognitive Radio Ad Hoc Networks, Sadeem Dheyaa Shamsi, Ameer Sameer Hamood Mohammed Ali, and Wameed Deyah Shamsi

    PDF

    Hybrid Model for Forecasting Temperature in Khartoum Based on CRU data, Hussein Alkattan, Alhumaima Ali Subhi, Laith Farhan, and Ghazwan Al-mashhadani

    PDF

    Hybrid Quantum-Assisted Deep Learning Model for Early-Stage Alzheimer’s Disease Classification Based on MRI Images, Eman A. Radhi, Mohammed Y. Kamil, and Mazin Abed Mohammed

    PDF

    Hybrid Spotted Hyena based Load Balancing algorithm (HSHLB), Raed A. Hasan, Mustafa M. Akawee, Enas F. Aziz, Omar A. Hammood, Aws Saad Showket, Husniyah Jasim, Mohammed A. Alkhafaji, Omar K. Ahmed, and Khalil Yasin

    PDF

    Improved Blockchain Technique based on Modified SLIM Algorithm for Cyber Security, Sarah Mohammed Shareef and Rehab Flaih Hassan

    PDF

    Improved feature selection method for features reduction in intrusion detection systems, Naeemullah Khan, Ismael Khaleel, and Elika Daghighi

    PDF

    Improvement of Internet of Things (IoT) Interference Based on Pre-Coding Techniques over 5G Networks, Inas F. Jaleel, Rasha S. Ali, and Ghassan A. Abed

    PDF

    Improvement of the Face Recognition Systems Security Against Morph Attacks using the Developed Siamese Neural Network, Sura Abed Sarab Hussien, Thair Abed Sarab Hussien, and Nada Hussein M. Ali

    PDF

    Infusing k-means for securing IoT services in edge computing, Tam Sakirin and Iqra Asif

    PDF

    Integration and development of learning management features into the Colums platform, Samer Qahtan Hameed, Tam Sakirin, and Yahya Hakami

    PDF

    Intelligent Forecasting of Solar Atmospheric Disturbances via Capsule Neural Networks and Space Weather Data, Eman Turki Mahdi, Mohammed E. Seno, and Abdullah I. Abdulghafar

    PDF

    Intelligent Techniques for Autism Spectrum Disorder Diagnosis: A Review, Ekraam Jabier, Ali Fadhil Marhoon, and Ammar A. Aldair

    PDF

    Intermediary Decentralized Computing and Private Blockchain Mechanisms for Privacy Preservation in the Internet of Medical Things, Rasha Halim Razzaq, Mishall Al-Zubaidie, and Rajaa Ghali Atiyah

    PDF

    Introduction to The Data Mining Techniques in Cybersecurity, Israa Ezzat Salem, Maad Mijwil, Alaa Wagih Abdulqader, Marwa M. Ismaeel, Marwa M. Ismaeel, and Anas M. Zein Alaabdin

    PDF

    Introduction to Wi-Fi 7: A Review of History, Applications, Challenges, Economical Impact and Research Development, Sallar Salam Murad, Rozin Badeel, Banan Badeel Abdal, Tasmeea Rahman, and Tahsien Al-Quraishi

    PDF

    Intrusion Detection: A Review, Mohammad Aljanabi, Mohd Arfian Ismail, Raed Abdulkareem Hasan, Junaida Sulaiman, and Junaida Sulaiman

    PDF

    Large Scale Data Using K-Means, Raheela zaib and OURLIS Ourabah

    PDF

    Learning management system developments and challenges: A literature review, Samer Qahtan Hameed and Hind Salman Hasan

    PDF

    Learning Techniques-Based Malware Detection: A Comprehensive Review, Sarah Fouad Ali, Musaab Riyadh Abdulrazzaq, and Methaq Talib Gaata

    PDF

    Leveraging AI and Big Data in Low-Resource Healthcare Settings

    PDF

    Leveraging Artificial Intelligent for Optimized Crop Production: An ANN-Based Approach, Yahya Layth Khaleel, Fadya A. Habeeb, Mustafa Abdulfattah Habeeb, and Fatimah N. Ameen

    PDF

    Lightweight Deep Reinforcement Learning Model for Energy-Efficient Resource Allocation in Edge Computing, Ghassan A. Abed and Mohanad A. Al-askari

    PDF

    LipPrint: Using Lip Movements as a Silent Password, Ahmed Ketab and Nidhal K. El Abbadi

    PDF

    Machine Learning and Data Mining Methods for Cyber Security: A Survey, Ziaul Hasan, Hassan r. Mohammad, and Maka Jishkariani

    PDF

    Machine Learning Application on Employee ‎Promotion, Muhannad Ilwani, Ghalia Nassreddine, and Joumana Younis

    PDF

    Machine Learning-Based Detection of Smartphone Malware: Challenges and Solutions, Amneh Alamleh, Sattam Almatarneh, Ghassan Samara, Mohammad Rasmi, and Mohammad Rasmi

    PDF

    Mapping the Evolution of Intrusion Detection in Big Data: A Bibliometric Analysis, Mohanad G. Yaseen and A. S. Albahri

    PDF

    Measuring the Extent of Cyberbullying Comments in Facebook Groups for Mosul University Students, Kanaan J. Brakas and Mafaz Alanezi

    PDF

    Memristive-Based Physical Unclonable Function Design of Authentication Architectures: A Systematic Review, Hussien Al-Ani and Israa Al-Mashhadani

    PDF

    Mitigating Zero-Day Vulnerabilities in IIoT Systems: Challenges and Advances in AI-Powered Intrusion Detection Systems, Khalid Asaad Hashim, Yusnani Binti Mohd Yussoff, and Shahrani Binti - Binti Shahbudin

    PDF

    MLP and RBF Algorithms in Finance: Predicting and Classifying Stock Prices amidst Economic Policy Uncertainty, Bushra Ali, Khder Alakkari, Mostafa Abotaleb, Maad M. Mijwil, and Klodian Dhoska

    PDF

    Mobile Big Data Analytics Using Deep Learning and Apache Spark, Muhammad Azeem, Bassam M. Abualsoud, and Dimuthu Priyadarshana

    PDF

    MobileNetV1-Based Deep Learning Model for Accurate Brain Tumor Classification

    PDF

    Multilevel Text Protection System Using AES and DWT-DCT-SVD Techniques, Nuha Mohammed Khassaf and Nada Hussein M. Ali

    PDF

    Navigating the Metaverse of Big Data: A Bibliometric Journey, O. S. Albahri and A. H. AlAmoodi

    PDF

    Navigating the Void: Uncovering Research Gaps in the Detection of Data Poisoning Attacks in Federated Learning-Based Big Data Processing: A Systematic Literature Review, Mohammad Aljanabi and Hijaz Ahmad

    PDF

    New Recruitment Approach Based on Logistic Regression Model, Ishraq Hatif Abd Almajed, Ghalia Nassreddine, and Joumana Younis

    PDF

    Novel Convolutional Neural Networks based Jaya algorithm Approach for Accurate Deepfake Video Detection, Zahraa Faiz Hussain and Hind Raad Ibraheem

    PDF

    Optimized Deep Learning Model Using Binary Particle Swarm Optimization for Phishing Attack Detection: A Comparative Study, El-Sayed M. El-Kenawy, Marwa M. Eid, Hussein Lafta Hussein, Ahmed M. Osman, and Ahmed M. Osman

    PDF

    Optimized Wavelet Scatter Method for Accurate Classification and Segmentation of Lung Nodules, Enas Hamood Al-Saadi, Ahmed Nidhal Khdiar, and Nidhal K. El Abbadi

    PDF

    Optimizing Big Data Analytics for Reliability and Resilience: A Survey of Techniques and Applications, El-Houcine El Baqqaly and Alaa Hussein Khaleel

    PDF

    Optimizing Cybersecurity in 5G-Enabled IoT Networks via a Resource-Efficient Random Forest Model, Zainab Ali Abbood, Aysar Hadi Oleiwi, Raghad Tariq Al-Hassani, Jenan Ayad, and Jenan Ayad

    PDF

    Overview of the CICIoT2023 Dataset for Internet of Things Intrusion Detection Systems, Wisam Ali Hussein Salman and Chan Huah Yong

    PDF

    Parallel Generalized Hebbian Algorithm for Large Scale Data Analytics, Mohanad G. Yaseen, Mohammad Naeemullah Mohammad Naeemullah, and Ibarhim Adeb Mansoor Ibarhim Adeb Mansoor

    PDF

    Parallel Machine Learning Algorithms, Saba Abdulbaqi Salman, Saad Ahmed Dheyab, Qusay Medhat Salih, and Waleed A. Hammood

    PDF

    Portable Smart Emergency System Using Internet of Things (IOT), Batool Jamal, Muneera Alsaedi, and Parag Parandkar

    PDF

    Potato disease identification using transfer learning approaches, Tarza Hasan Abdullah

    PDF

    Precise Kidney Stone Localization in Medical Imaging via a Capsule Network, Omar Hammad Jasim, Daniah Abdul Qahar Shakir, Mohammed Shihab Hamad, and Waleed Kareem Awad

    PDF

    Predicting Carbon Dioxide Emissions with the Orange Application: An Empirical Analysis, israa ezzat and Alaa Wagih Abdulqader

    PDF

    PRIFLEX: A Secure Federated Learning Framework for Evaluating Privacy Leakage and Defense in Cross-Modal Medical Data, Mohammad Othman Nassar and Feras Fares AL-Mashagba

    PDF

    PSOA-CRL: A Hybrid Multi-Objective Routing Mechanism Using Particle Swarm Optimization and Actor-Critic Reinforcement Learning For VANETs, Mustafa Maad Hamdi, Baraa Saad Abdulhakeem, and Ahmed Adil Nafea

    PDF

    QIS-Box: Pioneering Ultralightweight S-Box Generation with Quantum Inspiration, Ghada Alkateb

    PDF

    Real-Time SDN–IoT Integrated Framework for Intelligent Emergency Vehicle Prioritization in Smart Cities, Sura F. Ismail

    PDF

    Recognition of Alzheimer’s Disease stages via InceptionV3 and ResNet50, Iman Aljubouri, Mostafa Ragheb, and Mohamad Hamady

    PDF

    Review on Blockchain Technology : Architecture, Characteristics, Benefits, Algorithms, Challenges and Applications, Karthik Kumar Vaigandla, Radha Krishna Karne, Mounika Siluveru, Madhavi Kesoju, and Madhavi Kesoju

    PDF

    Robust and Efficient Methods for Key Generation using Chaotic Maps and A2C Algorithm, Ali A. Mahdi and Mays M. Hoobi

    PDF

    ROI – Enhancing Detection of Citrus Disease Based on YOLOv10, Raya N. Ismail, Armaneesa Naaman Hasoon, Israa Rafaa Abdulqader, and Salwa Khalid Abdulateef

    PDF

    Role of ChatGPT in Computer Programming., Som Biswas

    PDF

    Scalable Neural Network Algorithms for High Dimensional Data, Mukesh Soni and Marwan Ali Shnan

    PDF

    SDN-Cloud Incident Detection & Response with Segmented Federated Learning for the IoT, Anas Harchi, Hicham Toumi, and Mohamed Talea

    PDF

    Secured Multi-Objective Optimisation-Based Protocol for Reliable Data Transmission in Underwater Wireless Sensor Networks, Mostfa Albdair, Zainab Rustum mohsin, Ahmed Saihood, Aqeel M. Hamad, and Aqeel M. Hamad

    PDF

    Securing Real-Time Data Transfer in Healthcare IoT Environments with Blockchain Technology, Safa Hussein Oleiwi, Saraswathy Shamini Gunasekaran, Karrar Ibrahim AbdulAmeer, Mazin Abed Mohammed, and Mazin Abed Mohammed

    PDF

    Securing the Internet of Wetland Things (IoWT) Using Machine and Deep Learning Methods: A Survey

    PDF

    Securing Tomorrow: Navigating the Evolving Cybersecurity Landscape, A. S. Albahri, Mohanad G. Yaseen, Mohammad Aljanabi, Ahmed Hussein Ali, and Ahmed Hussein Ali

    PDF

    Security and Privacy in IoT-based Healthcare Systems: A Review, Omar Ibrahim Obaid and Saba Abdul-Baqi Salman

    PDF

    Segment Anything: A Review, Firas Hazzaa, Innocent Udoidiong, Akram Qashou, and Sufian Yousef

    PDF

    Self-Attention Enhanced Dual BiGRU for Arabic Fake News Detection, Baqer M. Merzah, Jafar Razmara, and Jaber Karimpour

    PDF

    Shared Generator-Based Serverless Multimodal Federated Learning For Medical Image Analysis, Mohammed Adel Al-Shahe, Ahmed Saihood, and Mustafa Asaad Hasan

    PDF

    Smartphone Authentication Based on 3D Touch Sensor and Finger Locations on Touchscreens via Decision-Making Techniques, Moceheb Lazam Shuwandy, Rawan Adel Fawzi Alsharida, and Maytham M. Hammood

    PDF

    SQL Injection Attack Detection Using Machine Learning Algorithm, Taseer Muhammad and Hamayoon Ghafory

    PDF

    SQL Injection Attack: Quick View, Vugar Abdullayev and Alok Singh Chauhan

    PDF

    Student’s Rating System for Teachers: A Tool for Teacher Scheduling Consideration, NAOMI BAJAO, Jose Primo Bardoquillo, Jhay Concha, Mae Fatima Monsanto, and Ma.Chrisfie Karen Mojar

    PDF

    Study and Analysis of OFDM under Rayleigh fading Channel using Various Modulation Methods, Sowmya Kalakoti, Uday Kiran Vashapaka, Mokshith Reddy Gujjula, Harika Surasi, and Siddartha Kusuma

    PDF

    Synergizing Quantum-Safe Signatures with JWT for Unparalleled Security in Web Applications, Kalpana B. N and R Saravana Kumar

    PDF

    Synthesizing Deception: Countering Large Language Model-Generated Phishing Campaigns through Adaptive Semantic Anomaly Detection, Bekim Fetaji and Debabrata Samanta

    PDF

    The Data-Driven Future of Healthcare: A Review, Muhammad Miftahul Amri and Saad Abbas Abed

    PDF

    The Ethical Implications of DALL-E: Opportunities and Challenges, Kai-Qing Zhou and Hatem Nabus

    PDF

    The Evolving Role of Artificial Intelligence in the Future of Distance Learning: Exploring the Next Frontier

    PDF

    The impact of Blockchain technique on trustworthy healthcare sector, Nour Sadeq, Zeid Hamzeh, Ghalia Nassreddine, Tamima ElHassan, and Tamima ElHassan

    PDF

    The Next Frontier in Computer Science, Trends and Research Opportunities, Mostafa Abdulghafoor Mohammed, Z. T. Al-qaysi, and Tahsien Al-Quraishi

    PDF

    Theoretical Background of Cryptography, Rusul Mansoor Al-Amri, Dalal N. Hamood, and Alaa Kadhim Farhan

    PDF

    Theoretical Background of steganography, Shams N. Abdul-wahab, Mostafa Abdulghafoor Mohammed, and Omar A. Hammood

    PDF

    The Purpose of Cybersecurity Governance in the Digital Transformation of Public Services and Protecting the Digital Environment, Maad Mijwil, Youssef Filali, Mohammad Aljanabi, Mariem Bounabi, and Mariem Bounabi

    PDF

    The Renewable, Sustainable, and Clean Energy in Iraq Between Reality and Ambition According to the Paris Agreement on Climate Change, Noah Mohammed Saleh, Ali Mohammed Saleh, Raed Abdulkareem Hasan, and Hadi Hamdi Mahdi

    PDF

    Threat Detection Based on Explainable AI (XAI) and Hybrid Learning, Shatha J. Mohammed and Bashar M. Nema

    PDF

    Threats Detection in the Internet of Things Using Convolutional neural networks, long short-term memory, and gated recurrent units, Naomi A. Bajao and Jae-an Sarucam

    PDF

    Towards Achieving the UN Sustainable Development Goals: The Role of AI in Municipality Services, Thabit Sultan Mohammed, Karim Mohammed Aljebory, and Ahmed Thabit Sultan

    PDF

    Towards Autonomous Optical Fibre Networks: High-Precision EDFA Gain and Spectral Response Prediction via Hybrid CNN-LSTM Deep Learning, Ibtesam Hussien Htaat, Mudhafar Hussein Ali, and Abdulla Khudiar Abass

    PDF

    Transaction Security and Management of Blockchain-Based Smart Contracts in E-Banking-Employing Microsegmentation and Yellow Saddle Goatfish, Wid Jebbar and Mishall Al-Zubaidie

    PDF

    Transfer Learning: A New Promising Techniques, Ahmed Hussein Ali, Mohanad G. Yaseen, Mohammad Aljanabi, and Saad Abbas Abed

    PDF

    Transformer-Based Genomic Classification and Simulation of Heat-Responsive Genes in Citrus limon, Ali Fahem Neamah, Zahraa A. Abdalkareem, Mostafa A. Mohammed, Jasim Ibrahim Ahmed, and Phaklen Ehkan

    PDF

    Ubiquitous Trust Management and Power Optimization for UAV Assisted Mobile Communication, Nejood F. Abdulsattar, Ali Alsalamy, and Ghadeer Ghazi Shayea

    PDF

    UIR: Implementing Deep Neural Networks in addition to Conventional Algorithms for Ultra-Image Recovery, Ali Salim Rasheed, Alaa Hamza Omran, Mohammad Aljanabi, Mohammed Almaayah, Rami Shehab, Mansour Obeidat, Theyazn H. H. Aldhyani, and Mosleh Hmoud Al-Adhaileh

    PDF

    Uniform Resource Locator Protection Scheme for the Mitigation of Man-In-The-Middle Stripping Attacks, Duaa Sameer Zhraw, Mohammed Abdulridha Hussain, Zaid Ameen Abduljabbar, Vincent Omollo Nyangaresi, Ali Hasan Ali, and Husam A. Neamah

    PDF

    Unlocking the Full Potential of Spectrum: A Comprehensive Review of Cognitive Radio Technology

    PDF

    User preferences for ChatGPT-powered conversational interfaces versus traditional methods, Tam Sakirin and Rachid Ben Said

    PDF

    Using Data Anonymization in big data analytics security and privacy, Abdulatif Ali Hussain, Ismael Khaleel, and Tahsien Al-Quraishi

    PDF

    Using Information Technology for Comprehensive Analysis and Prediction in Forensic Evidence, Faris Kamil Hasan Mihna, Mustafa Abdulfattah Habeeb, Yahya Layth Khaleel, Yasir Hussein Ali, and Yasir Hussein Ali

    PDF

    Using Machine Learning to Enhance Interaction and Creativity Among Children By Using The Scratch And Mblock Programming Languages and Many Different Kids’ Machine Learning Platforms For Designing A.I Programs, Amani Y. Noori

    PDF

    Using Neural Networks to Model Complex Mathematical Functions, Abdelfatah kouidere and Mondher Damak

    PDF

    Using Wearable Technology for Context-Aware of Pilgrimage Management System During/Post-Pandemic of Covid-19, Fatina Shukur, Ahmed Al-Fatlawi, Safaa Jasim Mosa, and Nasir Ibrahim

    PDF

    Validation Framework for Robust and Explainable Machine Learning Models in Autism Spectrum Disorder Triage, Ghadeer Ghazi Shayea, Mohd Hazli Mohammed Zabil, A. S. Albahri, Rula A. Hamid, O. S. Albahri, A. H. Alamoodi, and Iman Mohamad Sharaf

    PDF

    Virtual Personalities and Smart Analytics in the Digital Environment: Legal and Applied Framework for Big Data and Financial Transaction, Hazim Akram Sallal, Faris Kamil Mihna, Lobna Abdalhusen Al-Seedi, Mustafa Abdulfattah Habeeb, and Yahya Layth Khaleel

    PDF

    WOA-COVID-19: Whale Optimization Algorithm for Selection of Multi-Examination Features based on COVID-19 Infections, Karrar Hameed Abdulkareem, Mazin Abed Mohammed, Zaid Abdi Alkareem Alyasseri, Dawood Zahi Khutar, and Osama Ahmad Alomari

    PDF

    Zero-Day Vulnerabilities: Unveiling the Threat Landscape in Network Security, Raheela zaib and Kai-Qing Zhou

 
 
 

Search

Advanced Search

  • Notify me via email or RSS

Browse

  • Collections
  • Disciplines
  • Authors
  • Author FAQ
  • Submit Research
 
Elsevier - Digital Commons

Home | My Account | Accessibility Statement

Privacy Copyright