Search Results - "Ibrahim, laheeb"
-
1
Deepfake Detection Model Based on Combined Features Extracted from Facenet and PCA Techniques
Published in AL-Rafidain journal of computer sciences and mathematics (23-12-2023)“…Recently, the increase in the emergence of fake videos that have a high degree of accuracy makes it difficult to distinguish from real ones. This is due to the…”
Get full text
Journal Article -
2
Software development effort estimation techniques: a survey
Published in al-Tarbiyah wa-al-ʻilm lil-ʻulūm al-insānīyah : majallah ʻilmīyah muḥakkamah taṣduru ʻan Kullīyat al-Tarbiyah lil-ʻUlūm al-Insānīyah fī Jāmiʻat al-Mawṣil (01-03-2022)“…Software effort estimation (SEE) is used in accurately predicting the effort in terms of (person-hours or person-months). although there are many models,…”
Get full text
Journal Article -
3
Survey on Human Activity Recognition using Smartphone
Published in AL-Rafidain journal of computer sciences and mathematics (01-06-2021)“…The field of Human Activity Recognition (HAR) is an active research field in which methods are being developed to understand human behavior by interpreting…”
Get full text
Journal Article -
4
ANOMALY NETWORK INTRUSION DETECTION SYSTEM BASED ON DISTRIBUTED TIME-DELAY NEURAL NETWORK (DTDNN)
Published in Journal of engineering science & technology (01-12-2010)“…In this research, a hierarchical off-line anomaly network intrusion detection system based on Distributed Time-Delay Artificial Neural Network is introduced…”
Get full text
Journal Article -
5
A COMPARISON STUDY FOR INTRUSION DATABASE (KDD99, NSL-KDD) BASED ON SELF ORGANIZATION MAP (SOM) ARTIFICIAL NEURAL NETWORK
Published in Journal of engineering science & technology (01-02-2013)“…Detecting anomalous traffic on the internet has remained an issue of concern for the community of security researchers over the years. The advances in the area…”
Get full text
Journal Article -
6
Intrusion Detection System Based on Machine Learning Techniques: A Survey
Published in 2022 2nd International Conference on Advances in Engineering Science and Technology (AEST) (24-10-2022)“…The volume of network traffic data has become so big and complicated as a result of the development in Internet-based services that it is extremely difficult…”
Get full text
Conference Proceeding -
7
Software effort estimation Based on long short term memory and stacked long short term memory
Published in 2022 8th International Conference on Contemporary Information Technology and Mathematics (ICCITM) (31-08-2022)“…Software effort estimation (SEE) is an important process for predicting the effort required to develop or maintain software projects. It is considered one of…”
Get full text
Conference Proceeding -
8
Software Development Effort Estimation Techniques Using Long Short Term Memory
Published in 2022 International Conference on Computer Science and Software Engineering (CSASE) (15-03-2022)“…The Software Effort Estimation (SEE) process is used to predict the effort involved in developing a software project inaccuracy. This process permeates the…”
Get full text
Conference Proceeding -
9
Efficient Genetic Algorithms for Arabic Handwritten Characters Recognition
Published in AL-Rafidain journal of computer sciences and mathematics (01-07-2009)“…The main challenge in Arabic handwritten character recognition involves the development of a method that can generate descriptions of the handwritten objects…”
Get full text
Journal Article -
10
Use Artificial Neural Network Neococcontron in Distinguishing Handwritten Arabic Numerals
Published in AL-Rafidain journal of computer sciences and mathematics (01-03-2009)“…Artificial Neural Networks have wide applications now a day, Among these are in the field of pattern recognition and image processing. This is due to the fact…”
Get full text
Journal Article -
11
Computer Network System for Fire Flame detection from Digital Video using Fractal Geometry
Published in AL-Rafidain journal of computer sciences and mathematics (01-06-2010)“…This research aims to build a computer network system that works on detecting and locating flame by using fractal geometry in the digital video through…”
Get full text
Journal Article -
12
Face Recognition using Artificial Intelligent Techniques
Published in AL-Rafidain journal of computer sciences and mathematics (01-07-2009)“…Face recognition is considered one of the visual tasks which humans can do almost effortlessly while for computers it is a difficult and challenging task. This…”
Get full text
Journal Article -
13
Detect Flame Fire Using Fractal Geometry in Color Digital Images
Published in AL-Rafidain journal of computer sciences and mathematics (01-03-2009)“…Pattern recognition, which takes features extraction as a basis for decision making, is considered as of the cutting-edge technologies. It is used in various…”
Get full text
Journal Article -
14
Face Mask Detection During COVID-19 Pandemic Using NASNetMobile and CNN Deep Learning Algorithms
Published in 2022 4th International Conference on Current Research in Engineering and Science Applications (ICCRESA) (20-12-2022)“…The coronavirus (COVID-19) pandemic has led to a health, economic, and social crisis, resulting in many casualties and disrupting daily life, trade, and global…”
Get full text
Conference Proceeding -
15
Efficiency of Artificial Neural Networks (Percepton Network) in the Diagnosis of Thyroid Diseases
Published in AL-Rafidain journal of computer sciences and mathematics (01-07-2006)“…Thyroid gland software which was obtained through research is considered an effective system to diagnosed thyroid gland automatically. This is done by a built …”
Get full text
Journal Article -
16
The Multilevel Encryption Model: A review
Published in AL-Rafidain journal of computer sciences and mathematics (01-06-2024)“…Multilevel encryption is a system used to protect sensitive data and information with multiple overlapping encryption methods. This system aims to increase the…”
Get full text
Journal Article -
17
Protection Data-in-Motion Stored in Database System
Published in AL-Rafidain journal of computer sciences and mathematics (01-12-2005)“…In this project, a simple model of the client/server relational database has been designed through using the idea of the SQL (Structure Query Language) server,…”
Get full text
Journal Article -
18
Software for Arabic Machine Printed Optical Character Recognition (MACRS)
Published in AL-Rafidain journal of computer sciences and mathematics (01-07-2006)“…Machine printed Arabic Character Recognition System (MACRS] is concerned with recognition of machine printed alphanumeric Arabic characters. In the present…”
Get full text
Journal Article -
19
Proposing And Design a Model to Develop the Global Virtual Team (GVT) Performance in Global Software Development (GSD)
Published in al-Tarbiyah wa-al-ʻilm lil-ʻulūm al-insānīyah : majallah ʻilmīyah muḥakkamah taṣduru ʻan Kullīyat al-Tarbiyah lil-ʻUlūm al-Insānīyah fī Jāmiʻat al-Mawṣil (01-06-2023)“…The development of Information and Communication Technology (ICT), globalization of software, search for an abundance of cost and time, and improving the…”
Get full text
Journal Article -
20
Encrypted Data Hiding & Retrieval of an Image using LSB Based on RBF Network
Published in AL-Rafidain journal of computer sciences and mathematics (30-12-2010)Get full text
Journal Article