General Papers
Analyzing the Effective of Laser Spot Size on the Blood Clot | |
Riyadh Aziz Mirza, Abdulrazak Abdulsalam Mohammed |
Seismic low-frequency shadow detection based on the Levenberg-Marquardt reassignment operators using S-transforms | |
Rasoul Anvari, Adil Hussein Mohammed, Shima Rashidi |
Probabilistic prediction of geological status of tunnel route using the Markov method | |
Arsalan Mahmoodzadeh, Shima Rashidi, Adil Hussein Mohammed, Hunar Farid Hama Ali, Hawkar Hashim Ibrahim |
Machine Learning Approaches to Enable Resource Forecasting Process of Road Tunnels Construction | |
Arsalan Mahmoodzadeh, Shima Rashidi, Adil Hussein Mohammed, Hunar Farid Hama Ali, Hawkar Hashim Ibrahim |
Diagnosis of Parkinson's disease through EEG signals based on artificial neural network and cuckoo search algorithm | |
Rzgar Sirwan Raza, Adil Hussein Mohammed |
Time-Reassigned Synchrosqueezing Transform and low-frequency shadows associated with gas detection. | |
Rasoul Anvari, Adil Hussein Mohammed, Shima Rashidi |
Water Scarcity in Erbil City: Problems and Innovative Solution | |
Abdulqadir Ismail Abdullah, Adil Hussein Mohammed |
Communication Engineering Systems
FANET Drone’s Data Applications, Mobility Models and Wi-Fi IEEE 802.11n Standards for Real and Non-Real Time Traffic | |
Ghassan Amanuel QasMarrogy, Areen Jamal Fadhil |
Modeling of an Airport Traffic Control (ATC) Radars Using Mathcad | |
Ghassan Amanuel QasMarrogy, Husham Jawad Ahmad |
Quantifying the effect of the Temperature Variable on Optical Anisotropy of Line Spread Function at Image plane | |
safaa mustafa hameed, ABDULRAZAK A. S. MOHAMMED, ADlL H. MOHAMMED |
Influence of Antenna Beamwidth on the Observed Characteristics of an Outdoor Vehicular Channel | |
Khalid Abdulraheem Al Mallak |
Performance Analysis of Basic Automatic Repeat Request Protocols and Hybrid Automatic Repeat Request Protocol | |
Mohammed Mansur Ibrahim, Mustapha Ismail, Muhammad Awwal Dawud, Hassan Fahmi Hassan |
Hybrid Beamforming for Millimeter Wave Massive MIMO using Singular value Decomposition | |
Antoun Elias Francis |
Jamming Attack Against Structure-free of Wireless Sensor Networks | |
Hussain Kamel Chaiel |
High Band Rejection Using a Dual-Mode Ring Resonator to Create a Dual-Band BPF for 5G and Wireless Applications | |
Ameer Basheer Yousif, Hussam Al-Saedi |
Implementation of a New Algorithm for Drone Control Using BCI system | |
Musaria Karim MAHMOOD |
Design and implementation of microstrip directional coupler using in satellite communication | |
Firas Zeki Mahmood |
A COMPACT CIRCULARLY-POLARIZED SIW ANTENNA WITH WIDEBAND CHARACTERISTICS FOR SUB-6 GHZ APPLICATIONS | |
Muataz Almeshehe, Maalim Al-Abbasi, Tarik Abdul Latef, Ruqaia Kadhem |
Vehicle Tracking System by Using GPS, GSM, and Arduino Technology | |
Firas Zeki Mahmood |
6G THz-Band Facing Propagation and Atmospheric Absorption Losses | |
Abdulsattar M. Ahmed, Sayf A. Majeed, Younis S. Dawood |
Artificial Intelligent System, Fuzzy Systems and Hybrid Systems
Image De-Hazing Using Deep Learning Approach | |
Najwa Fadhil Abbas Alhadeethy, Akram M Zeki, Asadullah Shah |
Extract the pain features from facial expressions by utilizing two DCNN model | |
Elaf Noori Saddam, Saad Mutashar, wisam hasan ali |
Route Discovery Development for Multiple Destination using Artificial Ant Colony: Google MAP Case Study | |
Reem Jafar Ismail, Mohammed Hussein Shukur, Samar Jaafar Ismeil |
Route Discovery Development for Multiple Destination using Artificial Ant Colony: Google MAP Case Study | |
Reem Jafar Ismail, Mohammed Hussein Shukur, Samar Jaafar Ismael |
Image Processing and Pattern Recognition
YOLO-V3 Based Real-time Drone Detection Algorithm | |
Amin Z Sadik, Hamid R Alsanad |
Efficient Multi-Hop One-Way Cooperative Image Transmission over WSN | |
Kamal Tariq Y. Kamal |
Face spoofing detection and Authentication Using Linear Binary Patterns, Gabor Features and Support Vector Machine | |
Ahmed Mamoon Alkababji, Mustafa Haitham Alhabib, Mustafa Zuhaer Al-Dabagh |
Data Mining, Knowledge Discovery, and Knowledge Management
Information Systems Governance and Green Information Technologies | |
Laith R. Flaih |
Loan Credibility Prediction using Naïve Bayes, Random Forest, and Logistic Regression: A Comparative Study | |
Ahmed M. Zeki, Ranyah Taha, Sara Alshakrani |
The relationships for some topological structure via fuzzy, soft, and fuzzy soft sets | |
Salem Saleh, Mohammed Hussein Shukur, Amany Al-Salemi |
Unsupervised Feature Selection Method based on Structural Particularity of Minimum Spanning Tree | |
Rojiar Pir Mohammadiani, Maryam Mozaffari, Soma Solaiman Zadeh |
Software Engineering and Software Development
DEVELOPMENT AND EVALUATION OF AN ONLINE GAMIFIED ASSESSMENT ENVIRONMENT | |
Tara Arif Hussein, Muesser Nat, HASAN FAHMI HASAN, ALYAA ASAAD MAHDI |
Robotics, IoT
Detecting Denial of Service (DoS) attacks in Internet of Things (IoT) using Software Defined Networking (SDN) and ensemble learning | |
Shima Rashidi, Adil Hussein Mohammed, Yusra Ahmed Salih |
Review of IoT and Robotics application (Special case Study in Iraq and Kurdistan Region) | |
Abdullah Nahi, Laith Flaih, Khalid Jasim, Rajan Hossian |
Simulation framework to measure the effect of applying smart house on the power consumption | |
Ahmad Nashwan Abdulfattah, Abdullah Nahi, Yazen Saif Almashhadani |
Vehicle Location System (VLS): A Mobile Application | |
Mohamed El-baz, Akram Zeki |
Information Technology and Computer Education
Review of Source Code Plagiarism Detection Techniques | |
Raddam Sami, Hiren D Joshi |
Source Code Plagiarism Detection using Random Forest Classifier | |
Raddam Sami, Hiren D Joshi |
Blended Learning Motivation: A Perception of Faculty Members | |
Muesser Nat, Mohammed Mansur Ibrahim |
Information Secuirty & Cryptography
Analysis the Security of Some Ciphers in Industrial Applications of Wireless Sensors Networks | |
Khalid Fadhil Jasim, Mohammed Hussein Shukur, Laith Flaih, Abdullah A. Nahi |
Risk Assessment for Selecting Cloud Deployment Model | |
Ahmed M. Zeki, Hussain Ismaeel, Jasim Al-Safran |
A perspective on the Development of Quantum Computers and the Security challenges | |
Abdullah Nahi, Laith Flaih, Khalid Jasim |
Empower E-wallets payment system by using A hybrid approach of Online and Offline Services | |
Mohammed Hussein Shukur, Khalid Jasim, Reem Jaafar Ismail, Laith R Flaih |
This work is licensed under a Creative Commons Attribution 3.0 License.
Cihan University-Erbil @2024 | Powered By Dr. Hasan Fahmi Al-Delawi