咨询与建议

限定检索结果

文献类型

  • 84 篇 会议
  • 43 篇 期刊文献

馆藏范围

  • 127 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 74 篇 理学
    • 33 篇 物理学
    • 31 篇 数学
    • 20 篇 生物学
    • 9 篇 系统科学
    • 8 篇 统计学(可授理学、...
  • 57 篇 工学
    • 43 篇 计算机科学与技术...
    • 34 篇 软件工程
    • 19 篇 生物工程
    • 17 篇 信息与通信工程
    • 17 篇 生物医学工程(可授...
    • 9 篇 控制科学与工程
    • 8 篇 光学工程
    • 7 篇 电气工程
    • 5 篇 电子科学与技术(可...
    • 4 篇 动力工程及工程热...
    • 4 篇 安全科学与工程
    • 4 篇 网络空间安全
    • 3 篇 机械工程
    • 3 篇 化学工程与技术
    • 3 篇 交通运输工程
    • 3 篇 环境科学与工程(可...
  • 23 篇 管理学
    • 15 篇 图书情报与档案管...
    • 9 篇 管理科学与工程(可...
    • 6 篇 工商管理
  • 10 篇 医学
    • 9 篇 基础医学(可授医学...
    • 9 篇 临床医学
    • 8 篇 药学(可授医学、理...
  • 7 篇 法学
    • 6 篇 社会学
    • 3 篇 法学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 教育学

主题

  • 7 篇 feature extracti...
  • 4 篇 support vector m...
  • 4 篇 image segmentati...
  • 4 篇 authentication
  • 4 篇 training
  • 3 篇 chaotic systems
  • 3 篇 neural networks
  • 3 篇 wireless sensor ...
  • 3 篇 crime
  • 3 篇 classification a...
  • 3 篇 machine learning...
  • 3 篇 denial-of-servic...
  • 2 篇 sensor nodes
  • 2 篇 learning systems
  • 2 篇 ophthalmology
  • 2 篇 informatics
  • 2 篇 image edge detec...
  • 2 篇 wireless communi...
  • 2 篇 education
  • 2 篇 buildings

机构

  • 24 篇 informatics inst...
  • 7 篇 iraqi commission...
  • 6 篇 uruk university ...
  • 6 篇 university of in...
  • 6 篇 informatics inst...
  • 6 篇 iraqi commission...
  • 5 篇 informatics inst...
  • 5 篇 baghdad iraq
  • 5 篇 iraqi commission...
  • 5 篇 department of el...
  • 5 篇 informatics inst...
  • 4 篇 information inst...
  • 4 篇 uruk university ...
  • 4 篇 university of in...
  • 4 篇 iraqi commission...
  • 3 篇 iraqi commission...
  • 3 篇 communication en...
  • 3 篇 university of in...
  • 3 篇 department of co...
  • 3 篇 university of te...

作者

  • 5 篇 waleed al-jawher
  • 5 篇 al-jawher waleed
  • 4 篇 maysaa h. abdula...
  • 4 篇 al-jawher waleed...
  • 4 篇 farhan alaa k.
  • 3 篇 al-shamma omran
  • 3 篇 omran al-shamma
  • 3 篇 abdalrdha zainab...
  • 3 篇 amer s. el-ameer
  • 3 篇 sakran ammar abd...
  • 3 篇 hoomod haider k.
  • 3 篇 al-bakry abbas m...
  • 3 篇 jaber mustafa mu...
  • 3 篇 el-ameer amer s.
  • 3 篇 abdulameer maysa...
  • 3 篇 jassim mustafa m...
  • 3 篇 naif jolan rokan
  • 2 篇 alsaeedi ali hak...
  • 2 篇 khalid a. hussei...
  • 2 篇 muhammed saleh m...

语言

  • 122 篇 英文
  • 5 篇 其他
  • 1 篇 中文
检索条件"机构=Informatics Institute for Postgraduate Studies Iraqi Commission for Computer and Informatics"
127 条 记 录,以下是1-10 订阅
排序:
Enhanced Hyperchaotic Image Encryption with CAW Transform and Sea-Lion Optimizer
收藏 引用
Journal of Cyber Security and Mobility 2024年 第5期13卷 1207-1238页
作者: Abed, Qutaiba Kadhim Al-Jawher, Waleed Ameen Mahmoud Informatics Institute for Postgraduate Studies Iraqi Commission for Computers and Informatics Baghdad Iraq Uruk University Baghdad Iraq
One of the most effective methods for ensuring data security in the communication and information fields is encryption. There is an important role for multi-chaotic systems in the field of data encryption, due to its ... 详细信息
来源: 评论
A Secure and Efficient Optimized Image Encryption Using Block Compressive Sensing and Logistic Map Method
收藏 引用
Journal of Cyber Security and Mobility 2024年 第5期13卷 983-1006页
作者: Abed, Qutaiba Kadhim Al-Jawher, Waleed Ameen Mahmoud Informatics Institute for Postgraduate Studies Iraqi Commission for Computers and Informatics Baghdad Iraq Uruk University Baghdad Iraq
Recently, multimedia has developed and become very important for transferring images securely through public networks. This paper uses the COOT optimization algorithm with compressive sensing (CS) for image encryption... 详细信息
来源: 评论
A Hybrid Domain Medical Image Encryption Scheme Using URUK and WAM Chaotic Maps with Wavelet - Fourier Transforms
收藏 引用
Journal of Cyber Security and Mobility 2023年 第4期12卷 435-464页
作者: Abdul-Kareem, Ali Akram Al-Jawher, Waleed Ameen Mahmoud Iraqi Commission for Computers and Informatics Informatics Institute for Postgraduate Studies Baghdad Iraq Uruk University Baghdad Iraq
Image encryption is one of the most important techniques to maintain data confidentiality against illegal access and fraudulent usage. In this study, a new medical image encryption technique was developed by combining... 详细信息
来源: 评论
Enhanced Cancer Subclassification Using Multi-Omics Clustering and Quantum Cat Swarm Optimization
Iraqi Journal for Computer Science and Mathematics
收藏 引用
iraqi Journal for computer Science and Mathematics 2024年 第3期5卷 552-582页
作者: Ali, Ali Mahmoud Mohammed, Mazin Abed Informatics Institute for Postgraduate Studies Iraqi Commission for Computers & Informatics Baghdad Iraq Department of Artificial Intelligence College of Computer Science and Information Technology University of Anbar Anbar31001 Iraq
Integrating multiple omics data can significantly improve the accuracy of cancer subclassification, a challenging task due to the high dimensionality and limited sample sizes. The integration of these data sets can en... 详细信息
来源: 评论
Precise GANs Classification Based on Multi-Scale Comprehensive Performance Analysis
收藏 引用
Journal of Engineering Science and Technology Review 2023年 第3期16卷 137-148页
作者: Saeed, Asraa Jalil Hashim, Ahmed A. Iraqi Commission for Computers and Informatics Information Institute for Postgraduate Studies Baghdad Iraq College of Engineering Baghdad Iraq
GAN (Generative adversarial network) is a type of deep learning model that can generate fake data that looks real. GAN consists of two rival neural networks generator and discriminator. There are several types of GAN ... 详细信息
来源: 评论
Image Encryption Algorithm Based on Arnold Transform and Chaos Theory in the Multi-wavelet Domain
收藏 引用
International Journal of computers and Applications 2023年 第4期45卷 306-322页
作者: Abdul-Kareem, Ali Akram Al-Jawher, Waleed Ameen Mahmoud Iraqi Commission for Computers and Informatics Information Institute for Postgraduate Studies Baghdad Iraq Uruk University Baghdad Iraq
Image encryption is essential for ensuring data transmission security over open public networks. Using Multi-Wavelet Transform, Arnold transform, and two chaotic systems, a novel color image encryption technology is d... 详细信息
来源: 评论
Efficient Key Management in Lightweight Cryptography: A New Hashing-Based Approach  8
Efficient Key Management in Lightweight Cryptography: A New ...
收藏 引用
8th International Symposium on Multidisciplinary studies and Innovative Technologies, ISMSIT 2024
作者: Al-Mahmood, Haider H. Alsaad, Saad N. Informatics Institute for Postgraduate Studies Iraqi Commission for Computers and Informatics Baghdad Iraq University of Mustansiriyah Department of Computer Science College of Science Baghdad Iraq
Lightweight encryption methods are introduced to overcome the challenges of high-power consumption and high memory usage in the traditional cryptography system. The primary goal of the lightweight encryption technique... 详细信息
来源: 评论
Developing a method to detect driver drowsiness based on a single EEG channel and discriminated features
收藏 引用
International Journal of Intelligent Systems Technologies and Applications 2024年 第1期22卷 29-40页
作者: Hussein, Raed Mohammed George, Loay E. Miften, Firas Sabar Iraqi Commission for Computers and Informatics Informatics Institute of Postgraduate Studies Baghdad Iraq Computer Sciences Department University of Information Technology and Communication Baghdad Iraq Computer Sciences Department College of Education for Pure Science University of Thi-Qar Thi-Qar Iraq
Driver drowsiness is one of the leading causes of road deaths and transportation industry dangers. Due to its direct evaluation of neurophysiological brain activity, electroencephalography (EEG) has been regarded as o... 详细信息
来源: 评论
Digital Image Forgery Detection Based on Convolutional Neural Networks  6th
Digital Image Forgery Detection Based on Convolutional Neura...
收藏 引用
6th International conference on communication and computational technologies, ICCCT 2024
作者: Saleh, Noha M. Naji, Sinan A. Informatics Institute for Postgraduate Studies Iraqi Commission for Computers and Informatics Baghdad Iraq University of Information Technology and Communications Baghdad Iraq
Image authentication has become a hot topic with the currently available technology for manipulating and distributing images. Image authentication aims to ensure the authenticity of digital images and automatically de... 详细信息
来源: 评论
A classifier design for micro bubble generators based on deep learning technique
收藏 引用
Materials Today: Proceedings 2023年 80卷 2684-2696页
作者: Qaddoori, Ayman S. Saud, Jamila H. Hamad, F.A. Informatics Institute for Postgraduate Studies Iraqi Commission for Computer and Informatics Baghdad Iraq College of Science Mustansiriyah University Baghdad Iraq School of computing Engineering and Digital Technology Teesside University Middlesbrough United Kingdom
This paper aims to study the sizes of bubbles generated by the micro-bubble generator device (MBGs) in the water because of its impact on the dissolved oxygen percentage in the water and we find this in aquaculture wh... 详细信息
来源: 评论