Volume 16 Issue 1

Published: 2025-06-25

Contents


Article
Using Socket.io Approach for Many-to-Many Bi-Directional Video Conferencing

Sameer Jasim Karam, Bikhtiyar Friyad Abdulrahman,

Video conferencing has become a critical need in todays world due to its importance in education and business to mention a few; also, recent years have witnessed a great revolution in communication...

Pages: 81-86
Research Paper
Diagnosis Retinal Disease by using Deep Learning Models

attallh salih, Manar Y. Kashmoola

Deep learning approaches have shown to be useful in assisting physicians in making decisions about cancer, heart disease, degenerative brain disorders, and eye disease. In this work, a deep...

Pages: 51-58
Use Various Mathematical Methods to Solve Three Dimensional Conduction Heat Equation in Cylindrical Coordinate

Ahmed Jassim, AHMED SALAR

In this paper we use the separation of variables method and L24c transform method to solve three-dimensional conduction heat equation in cylindrical coordinate and results plotted by using Matlab....

Pages: 131-135
Performance Evaluation of Vehicle Ad hoc Networks Under Wi-Fi-6 Technology

Basim Mohammed Mahmood, Ahmed Salih Hasan,

Vehicle ad hoc networks are considered mobile networks where the nodes are mobile objects and can change their positions within an environment over time. These objects can be connected at any time...

Pages: 103-109
Using The Hybrid GA-Ant Algorithm To Find The Optimal Path In Computer Networks

Ibtisam Kareem Turki,

Cost management is one of the performance standards in computer networks and routing strategies through which we can get effective paths in the computer network, reach the target and perform highly...

Pages: 121-129
Construction of a complete (Ƙ,b)-span in PG(3,13)

Nada Yassen Kasm Yahya, Hamid Mohamed khalaf,

The main goal of this work is to find a spread of PG(3,13). By construct a complete span which represents applications of algebraic geometry in 3-dimensional projective space PG(3,q). We prove that...

Pages: 137-147
Generalized h-Closed Sets in Topological Space

Beyda S. Abdullah,

This study introduce a new type of closed sets in topology called Generalized h-closed sets (briefly, gh-closed) define as follow: E be gh-closed set if CLh (E) U whenever E U and U is open set...

Pages: 97-102
Multilevel Database Security for Android Using Fast Encryption Methods

Najla Badie AI Dabagh, Mahmood S. Mahmood,

Multilevel Security (MLS) is one of the ways that protects the stored information in the computer and mobile devices. It classifies users and information into levels of security; thus, the user can...

Pages: 87-96
Managing Bank Loans By Using Neural Networks

ramadan al-Brahimi, Nima Abdullah AL-Fakhry AL-Fakhry

This study aims at recognizing the role of neural networks in deciding administrative decisions in banks. To achieve the aims, the study developed a suggested model that depends on artificial...

Pages: 149-155
Adapted Single Scale Retinex Algorithm for Nighttime Image Enhancement

Mohammad Khalil Ismail, Zohair Al-Ameen,

Images captured at night with low-light conditions frequently have a loss of visible details, inadequate contrast, low brightness, and noise. Therefore, it is difficult to perceive, extract, and...

Pages: 59-69
Non-Complex Statistics-Driven Algorithm for Enhancement of Grayscale and Color Images

Zohair Al-Ameen, Ahmed Waad Mohammed,

Low-contrast images are viewed with obscured details and are unfavorable to the observer. Hence, it is a necessity to process such an effect efficiently to get images with lucid details as the need...

Pages: 71-80
Design and Implement an Application to Measure the Readiness of Teachers to Adopt E-learning in Mosul Schools After Pandemic COVID-19

Dena Rafaa Ahmed, Maisirreem Adhed Kamal, Rashad Alsaigh

Nowadays, due to the rapid increment of the pandemic COVID-19 which affects the teaching environment, a need appeared to use a new alternative education style, which helps to decrement the injuries...

Pages: 41-50
On Positive Solution of a New Class of Nonlocal Fractional Equation with Integral Boundary Conditions

Noora L. Housain,

We prove that a positiveasolution to a given boundaryaproblem exists and is unique. This new boundaryacondition relates theanon-local unknown value of unknownafunction at with its influenceadue to...

Pages: 37-40
An overview of Cuckoo Optimization Algorithm based Image Processing

Baydaa Sulaiman Bahnam

The Cuckoo Search (CS) algorithm is an effective swarm intelligence optimization algorithm whose important developments were presented by Yang and Deb in 2009. The CS algorithm has been used in...

Pages: 31-36
Review Paper
Honey Encryption Security Techniques: A Review Paper

Ammar Abdul Majed Gharbi, Ahmed Sami Nori,

From time to time, we hear in the news about a breach or attack on some well-known companies as just news, but it is a serious problem because it is the privacy of citizens, their money in trade...

Pages: 1-14
EMV Electronic Payment System and its Attacks: A Review

Ahmed ِAlqassab, Yassin Hikmat Ismael,

Recently,The Automated Teller Machines (ATM) and Point of Sale (POS) are based on the Europay, MasterCard and VisaCard (EMV) protocol. The goal of the EMV protocol is to enhance and improve the...

Pages: 23-29
Quality of Service and Load Balancing in Cloud Computing: A Review

Muna Jawhar, Hanaa Mohammed Osman,

Cloud computing provides facilities. These facilities increased demand for its using as institutions and individuals moved to the cloud service. Therefore, cloud service providers must provide...

Pages: 15-22
Disease Diagnosis Systems Using Machine Learning and Deep learning Techniques Based on TensorFlow Toolkit: A review

Firdews A.Alsalman, Shler Farhad Khorshid, Amira Bibo Sallow,

Machine learning and deep learning algorithms have become increasingly important in the medical field, especially for diagnosing disease using medical databases. Techniques developed within these...

Pages: 111-120