Volume 16 Issue 1
Published: 2025-06-25
Contents
Article
Using Socket.io Approach for Many-to-Many Bi-Directional Video Conferencing
Sameer Jasim Karam, Bikhtiyar Friyad Abdulrahman,
Video conferencing has become a critical need in todays world due to its importance in education and business to mention a few; also, recent years have witnessed a great revolution in communication...
Research Paper
Diagnosis Retinal Disease by using Deep Learning Models
attallh salih, Manar Y. Kashmoola
Deep learning approaches have shown to be useful in assisting physicians in making decisions about cancer, heart disease, degenerative brain disorders, and eye disease. In this work, a deep...
Use Various Mathematical Methods to Solve Three Dimensional Conduction Heat Equation in Cylindrical Coordinate
Ahmed Jassim, AHMED SALAR
In this paper we use the separation of variables method and L24c transform method to solve three-dimensional conduction heat equation in cylindrical coordinate and results plotted by using Matlab....
Performance Evaluation of Vehicle Ad hoc Networks Under Wi-Fi-6 Technology
Basim Mohammed Mahmood, Ahmed Salih Hasan,
Vehicle ad hoc networks are considered mobile networks where the nodes are mobile objects and can change their positions within an environment over time. These objects can be connected at any time...
Using The Hybrid GA-Ant Algorithm To Find The Optimal Path In Computer Networks
Ibtisam Kareem Turki,
Cost management is one of the performance standards in computer networks and routing strategies through which we can get effective paths in the computer network, reach the target and perform highly...
Construction of a complete (Ƙ,b)-span in PG(3,13)
Nada Yassen Kasm Yahya, Hamid Mohamed khalaf,
The main goal of this work is to find a spread of PG(3,13). By construct a complete span which represents applications of algebraic geometry in 3-dimensional projective space PG(3,q). We prove that...
Generalized h-Closed Sets in Topological Space
Beyda S. Abdullah,
This study introduce a new type of closed sets in topology called Generalized h-closed sets (briefly, gh-closed) define as follow: E be gh-closed set if CLh (E) U whenever E U and U is open set...
Multilevel Database Security for Android Using Fast Encryption Methods
Najla Badie AI Dabagh, Mahmood S. Mahmood,
Multilevel Security (MLS) is one of the ways that protects the stored information in the computer and mobile devices. It classifies users and information into levels of security; thus, the user can...
Managing Bank Loans By Using Neural Networks
ramadan al-Brahimi, Nima Abdullah AL-Fakhry AL-Fakhry
This study aims at recognizing the role of neural networks in deciding administrative decisions in banks. To achieve the aims, the study developed a suggested model that depends on artificial...
Adapted Single Scale Retinex Algorithm for Nighttime Image Enhancement
Mohammad Khalil Ismail, Zohair Al-Ameen,
Images captured at night with low-light conditions frequently have a loss of visible details, inadequate contrast, low brightness, and noise. Therefore, it is difficult to perceive, extract, and...
Non-Complex Statistics-Driven Algorithm for Enhancement of Grayscale and Color Images
Zohair Al-Ameen, Ahmed Waad Mohammed,
Low-contrast images are viewed with obscured details and are unfavorable to the observer. Hence, it is a necessity to process such an effect efficiently to get images with lucid details as the need...
Design and Implement an Application to Measure the Readiness of Teachers to Adopt E-learning in Mosul Schools After Pandemic COVID-19
Dena Rafaa Ahmed, Maisirreem Adhed Kamal, Rashad Alsaigh
Nowadays, due to the rapid increment of the pandemic COVID-19 which affects the teaching environment, a need appeared to use a new alternative education style, which helps to decrement the injuries...
On Positive Solution of a New Class of Nonlocal Fractional Equation with Integral Boundary Conditions
Noora L. Housain,
We prove that a positiveasolution to a given boundaryaproblem exists and is unique. This new boundaryacondition relates theanon-local unknown value of unknownafunction at with its influenceadue to...
An overview of Cuckoo Optimization Algorithm based Image Processing
Baydaa Sulaiman Bahnam
The Cuckoo Search (CS) algorithm is an effective swarm intelligence optimization algorithm whose important developments were presented by Yang and Deb in 2009. The CS algorithm has been used in...
Review Paper
Honey Encryption Security Techniques: A Review Paper
Ammar Abdul Majed Gharbi, Ahmed Sami Nori,
From time to time, we hear in the news about a breach or attack on some well-known companies as just news, but it is a serious problem because it is the privacy of citizens, their money in trade...
EMV Electronic Payment System and its Attacks: A Review
Ahmed ِAlqassab, Yassin Hikmat Ismael,
Recently,The Automated Teller Machines (ATM) and Point of Sale (POS) are based on the Europay, MasterCard and VisaCard (EMV) protocol. The goal of the EMV protocol is to enhance and improve the...
Quality of Service and Load Balancing in Cloud Computing: A Review
Muna Jawhar, Hanaa Mohammed Osman,
Cloud computing provides facilities. These facilities increased demand for its using as institutions and individuals moved to the cloud service. Therefore, cloud service providers must provide...
Disease Diagnosis Systems Using Machine Learning and Deep learning Techniques Based on TensorFlow Toolkit: A review
Firdews A.Alsalman, Shler Farhad Khorshid, Amira Bibo Sallow,
Machine learning and deep learning algorithms have become increasingly important in the medical field, especially for diagnosing disease using medical databases. Techniques developed within these...