Search Results - "Laheeb Ibrahim"

Refine Results
  1. 1

    Deepfake Detection Model Based on Combined Features Extracted from Facenet and PCA Techniques by Al_Dulaimi, Duha Amir, Ibrahim, Laheeb

    “…Recently, the increase in the emergence of fake videos that have a high degree of accuracy makes it difficult to distinguish from real ones. This is due to the…”
    Get full text
    Journal Article
  2. 2

    Software development effort estimation techniques: a survey by Ahmad, Farah Basil, Ibrahim, Lahib Muhammad

    “…Software effort estimation (SEE) is used in accurately predicting the effort in terms of (person-hours or person-months). although there are many models,…”
    Get full text
    Journal Article
  3. 3

    Survey on Human Activity Recognition using Smartphone by KH, Adeeba, Ibrahim, Laheeb

    “…The field of Human Activity Recognition (HAR) is an active research field in which methods are being developed to understand human behavior by interpreting…”
    Get full text
    Journal Article
  4. 4

    ANOMALY NETWORK INTRUSION DETECTION SYSTEM BASED ON DISTRIBUTED TIME-DELAY NEURAL NETWORK (DTDNN) by LAHEEB MOHAMMAD IBRAHIM

    “…In this research, a hierarchical off-line anomaly network intrusion detection system based on Distributed Time-Delay Artificial Neural Network is introduced…”
    Get full text
    Journal Article
  5. 5

    A COMPARISON STUDY FOR INTRUSION DATABASE (KDD99, NSL-KDD) BASED ON SELF ORGANIZATION MAP (SOM) ARTIFICIAL NEURAL NETWORK by LAHEEB M. IBRAHIM, DUJAN T. BASHEER, MAHMOD S. MAHMOD

    “…Detecting anomalous traffic on the internet has remained an issue of concern for the community of security researchers over the years. The advances in the area…”
    Get full text
    Journal Article
  6. 6

    Intrusion Detection System Based on Machine Learning Techniques: A Survey by Sheet, Omar I., Ibrahim, Laheeb M.

    “…The volume of network traffic data has become so big and complicated as a result of the development in Internet-based services that it is extremely difficult…”
    Get full text
    Conference Proceeding
  7. 7

    Software effort estimation Based on long short term memory and stacked long short term memory by Ahmad, Farah B., Ibrahim, Laheeb M.

    “…Software effort estimation (SEE) is an important process for predicting the effort required to develop or maintain software projects. It is considered one of…”
    Get full text
    Conference Proceeding
  8. 8

    Software Development Effort Estimation Techniques Using Long Short Term Memory by Ahmad, Farah B., Ibrahim, Laheeb M.

    “…The Software Effort Estimation (SEE) process is used to predict the effort involved in developing a software project inaccuracy. This process permeates the…”
    Get full text
    Conference Proceeding
  9. 9

    Efficient Genetic Algorithms for Arabic Handwritten Characters Recognition by Ibrahim, Laheeb

    “…The main challenge in Arabic handwritten character recognition involves the development of a method that can generate descriptions of the handwritten objects…”
    Get full text
    Journal Article
  10. 10

    Use Artificial Neural Network Neococcontron in Distinguishing Handwritten Arabic Numerals by Ibrahim, Laheeb, Ali, Hanan

    “…Artificial Neural Networks have wide applications now a day, Among these are in the field of pattern recognition and image processing. This is due to the fact…”
    Get full text
    Journal Article
  11. 11

    Computer Network System for Fire Flame detection from Digital Video using Fractal Geometry by Ibrahim, Laheeb, Alsaif, Khalil, Ahmed, Hasan

    “…This research aims to build a computer network system that works on detecting and locating flame by using fractal geometry in the digital video through…”
    Get full text
    Journal Article
  12. 12

    Face Recognition using Artificial Intelligent Techniques by Ibrahim, Laheeb, Saleh, Ibrahim

    “…Face recognition is considered one of the visual tasks which humans can do almost effortlessly while for computers it is a difficult and challenging task. This…”
    Get full text
    Journal Article
  13. 13

    Detect Flame Fire Using Fractal Geometry in Color Digital Images by Ibrahim, Laheeb, Alsaif, Khalil, Alnima, Hasan

    “…Pattern recognition, which takes features extraction as a basis for decision making, is considered as of the cutting-edge technologies. It is used in various…”
    Get full text
    Journal Article
  14. 14

    Face Mask Detection During COVID-19 Pandemic Using NASNetMobile and CNN Deep Learning Algorithms by Abdullah, Mohammed AbdulSattar AbdulGhani, Ibrahim, Laheeb Mohammed

    “…The coronavirus (COVID-19) pandemic has led to a health, economic, and social crisis, resulting in many casualties and disrupting daily life, trade, and global…”
    Get full text
    Conference Proceeding
  15. 15

    Efficiency of Artificial Neural Networks (Percepton Network) in the Diagnosis of Thyroid Diseases by Dawood, Suher, Ibrahim, Laheeb, Kharofa, Nabil

    “…Thyroid gland software which was obtained through research is considered an effective system to diagnosed thyroid gland automatically. This is done by a built …”
    Get full text
    Journal Article
  16. 16

    The Multilevel Encryption Model: A review by Mais Irreem Kamal, Laheeb Ibrahim

    “…Multilevel encryption is a system used to protect sensitive data and information with multiple overlapping encryption methods. This system aims to increase the…”
    Get full text
    Journal Article
  17. 17

    Protection Data-in-Motion Stored in Database System by Ibrahim, Laheeb, Hasan, Mohammed

    “…In this project, a simple model of the client/server relational database has been designed through using the idea of the SQL (Structure Query Language) server,…”
    Get full text
    Journal Article
  18. 18

    Software for Arabic Machine Printed Optical Character Recognition (MACRS) by Al- Obaidi, Mahdi, Ibrahim, Laheeb

    “…Machine printed Arabic Character Recognition System (MACRS] is concerned with recognition of machine printed alphanumeric Arabic characters. In the present…”
    Get full text
    Journal Article
  19. 19
  20. 20