Presentations and Authors


Last name A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Track:
 

General Papers

Analyzing the Effective of Laser Spot Size on the Blood Clot PDF
Riyadh Aziz Mirza, Abdulrazak Abdulsalam Mohammed
Seismic low-frequency shadow detection based on the Levenberg-Marquardt reassignment operators using S-transforms PDF
Rasoul Anvari, Adil Hussein Mohammed, Shima Rashidi
Probabilistic prediction of geological status of tunnel route using the Markov method PDF
Arsalan Mahmoodzadeh, Shima Rashidi, Adil Hussein Mohammed, Hunar Farid Hama Ali, Hawkar Hashim Ibrahim
Machine Learning Approaches to Enable Resource Forecasting Process of Road Tunnels Construction PDF
Arsalan Mahmoodzadeh, Shima Rashidi, Adil Hussein Mohammed, Hunar Farid Hama Ali, Hawkar Hashim Ibrahim
Diagnosis of Parkinson's disease through EEG signals based on artificial neural network and cuckoo search algorithm PDF
Rzgar Sirwan Raza, Adil Hussein Mohammed
Time-Reassigned Synchrosqueezing Transform and low-frequency shadows associated with gas detection. PDF
Rasoul Anvari, Adil Hussein Mohammed, Shima Rashidi
Water Scarcity in Erbil City: Problems and Innovative Solution PDF
Abdulqadir Ismail Abdullah, Adil Hussein Mohammed

Communication Engineering Systems

FANET Drone’s Data Applications, Mobility Models and Wi-Fi IEEE 802.11n Standards for Real and Non-Real Time Traffic
Ghassan Amanuel QasMarrogy, Areen Jamal Fadhil
Modeling of an Airport Traffic Control (ATC) Radars Using Mathcad PDF
Ghassan Amanuel QasMarrogy, Husham Jawad Ahmad
Quantifying the effect of the Temperature Variable on Optical Anisotropy of Line Spread Function at Image plane PDF
safaa mustafa hameed, ABDULRAZAK A. S. MOHAMMED, ADlL H. MOHAMMED
Influence of Antenna Beamwidth on the Observed Characteristics of an Outdoor Vehicular Channel PDF
Khalid Abdulraheem Al Mallak
Performance Analysis of Basic Automatic Repeat Request Protocols and Hybrid Automatic Repeat Request Protocol PDF
Mohammed Mansur Ibrahim, Mustapha Ismail, Muhammad Awwal Dawud, Hassan Fahmi Hassan
Hybrid Beamforming for Millimeter Wave Massive MIMO using Singular value Decomposition PDF
Antoun Elias Francis
Jamming Attack Against Structure-free of Wireless Sensor Networks PDF
Hussain Kamel Chaiel
High Band Rejection Using a Dual-Mode Ring Resonator to Create a Dual-Band BPF for 5G and Wireless Applications PDF
Ameer Basheer Yousif, Hussam Al-Saedi
Implementation of a New Algorithm for Drone Control Using BCI system PDF
Musaria Karim MAHMOOD
Design and implementation of microstrip directional coupler using in satellite communication PDF
Firas Zeki Mahmood
A COMPACT CIRCULARLY-POLARIZED SIW ANTENNA WITH WIDEBAND CHARACTERISTICS FOR SUB-6 GHZ APPLICATIONS
Muataz Almeshehe, Maalim Al-Abbasi, Tarik Abdul Latef, Ruqaia Kadhem
Vehicle Tracking System by Using GPS, GSM, and Arduino Technology PDF
Firas Zeki Mahmood
6G THz-Band Facing Propagation and Atmospheric Absorption Losses PDF
Abdulsattar M. Ahmed, Sayf A. Majeed, Younis S. Dawood

Artificial Intelligent System, Fuzzy Systems and Hybrid Systems

Image De-Hazing Using Deep Learning Approach PDF
Najwa Fadhil Abbas Alhadeethy, Akram M Zeki, Asadullah Shah
Extract the pain features from facial expressions by utilizing two DCNN model PDF
Elaf Noori Saddam, Saad Mutashar, wisam hasan ali
Route Discovery Development for Multiple Destination using Artificial Ant Colony: Google MAP Case Study
Reem Jafar Ismail, Mohammed Hussein Shukur, Samar Jaafar Ismeil
Route Discovery Development for Multiple Destination using Artificial Ant Colony: Google MAP Case Study
Reem Jafar Ismail, Mohammed Hussein Shukur, Samar Jaafar Ismael

Image Processing and Pattern Recognition

YOLO-V3 Based Real-time Drone Detection Algorithm PDF
Amin Z Sadik, Hamid R Alsanad
Efficient Multi-Hop One-Way Cooperative Image Transmission over WSN PDF
Kamal Tariq Y. Kamal
Face spoofing detection and Authentication Using Linear Binary Patterns, Gabor Features and Support Vector Machine PDF
Ahmed Mamoon Alkababji, Mustafa Haitham Alhabib, Mustafa Zuhaer Al-Dabagh

Data Mining, Knowledge Discovery, and Knowledge Management

Information Systems Governance and Green Information Technologies PDF
Laith R. Flaih
Loan Credibility Prediction using Naïve Bayes, Random Forest, and Logistic Regression: A Comparative Study PDF
Ahmed M. Zeki, Ranyah Taha, Sara Alshakrani
The relationships for some topological structure via fuzzy, soft, and fuzzy soft sets PDF
Salem Saleh, Mohammed Hussein Shukur, Amany Al-Salemi
Unsupervised Feature Selection Method based on Structural Particularity of Minimum Spanning Tree PDF
Rojiar Pir Mohammadiani, Maryam Mozaffari, Soma Solaiman Zadeh

Software Engineering and Software Development

Backend as a Service Cloud Computing Integrated with Cross-platform Mobile Development Framework to Create an E-learning application that works in Mobile and Web with a single codebase PDF
Osama mohammed ahmed
DEVELOPMENT AND EVALUATION OF AN ONLINE GAMIFIED ASSESSMENT ENVIRONMENT PDF
Tara Arif Hussein, Muesser Nat, HASAN FAHMI HASAN, ALYAA ASAAD MAHDI

Robotics, IoT

Detecting Denial of Service (DoS) attacks in Internet of Things (IoT) using Software Defined Networking (SDN) and ensemble learning
Shima Rashidi, Adil Hussein Mohammed, Yusra Ahmed Salih
Review of IoT and Robotics application (Special case Study in Iraq and Kurdistan Region) PDF
Abdullah Nahi, Laith Flaih, Khalid Jasim, Rajan Hossian
Simulation framework to measure the effect of applying smart house on the power consumption PDF
Ahmad Nashwan Abdulfattah, Abdullah Nahi, Yazen Saif Almashhadani
Vehicle Location System (VLS): A Mobile Application ‎
Mohamed El-baz, Akram Zeki

Information Technology and Computer Education

Review of Source Code Plagiarism Detection Techniques PDF
Raddam Sami, Hiren D Joshi
Source Code Plagiarism Detection using Random Forest Classifier PDF
Raddam Sami, Hiren D Joshi
Blended Learning Motivation: A Perception of Faculty Members PDF
Muesser Nat, Mohammed Mansur Ibrahim

Information Secuirty & Cryptography

Analysis the Security of Some Ciphers in Industrial Applications of Wireless Sensors Networks PDF
Khalid Fadhil Jasim, Mohammed Hussein Shukur, Laith Flaih, Abdullah A. Nahi
Risk Assessment for Selecting Cloud Deployment Model PDF
Ahmed M. Zeki, Hussain Ismaeel, Jasim Al-Safran
A perspective on the Development of Quantum Computers and the Security challenges PDF
Abdullah Nahi, Laith Flaih, Khalid Jasim
Empower E-wallets payment system by using A hybrid approach of Online and Offline Services
Mohammed Hussein Shukur, Khalid Jasim, Reem Jaafar Ismail, Laith R Flaih


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.

Cihan University-Erbil @2024 | Powered By Dr. Hasan Fahmi Al-Delawi