كل البحوث المنشورة تحت تصنيف تكنولوجيا المعلومات

تضم القوائم ادناه كل ما تحتاج من بحوث اكاديمية ومقالات علمية منشورة تحت تصنيف تكنولوجيا المعلومات  التي استطعنا الحصول عليها نتمنى ان تفيدك في مسيرتك البحثية , لا تتردد في الكتابة الينا حول كيفية الاتصال بالناشر او للتبيلغ عن شكاوى تخص الجانب الاكاديمي من جامعة بابل على الانترنت وسنكون مسرورين للتفاعل معك خدمة للصالح العام

المقالات والبحوث المضافة مؤخراً - الاجمالي 12 موضوع
[A PROACTIVE DATA SECURITY SCHEME OF FILES USING MINHASH TECHNIQUE  184 Views
Cloud Security and Data Mining
HLLR: Highest Lifetime Least Request policy for high performance Pending Interest Table  342 Views
HLLR is designed to replace entries in the PIT which has the minimum number of incoming faces with maximum Lifetime.
Adaptive Interest Packet Lifetime Due to Pending Interest Table Overflow  346 Views
The objective of this paper to propose a smart scheme named Adaptive LifeTime (ALT) in order to manage the Interest Lifetime at content routers that will adapt Lifetimes as a function of the network load
Performance Evaluation of the Replacement Policies for Pending Interest Table  326 Views
This paper study the performance of Interest drop rate, delay and Interest retransmission under different network topologies, i.e. Tree, Abilene, and Germany when the PIT is full.
A Taxonomy of Information-Centric Networking Architectures based on Data Routing and Name Resolution Approaches  349 Views
The taxonomy serves as a basis for research directions, challenges, implementation and future studies for standardizing the ICN routing and naming.
Data Encryption Employing Genetic Algorithm Based on a New Algorithm of Key Generator  458 Views
security by data encryption
TreeNet Model Based Prediction of Testing Effort Class  369 Views
This strudy presents the use of the regression capability of the TreeNet regression tool to predict software class testing effort
A Taxonomy of Pending Interest Table Implementation Approaches in Named Data Networking  548 Views
This paper aims to classify an extensive and critical concerning PIT implementation in a concise manner
Internet Protocol MANET vs Named Data MANET: A Critical Evaluation  359 Views
The goals of this paper have two ways: first, this study provides a performance comparison of IP-MANET to ND-MANET
Performance Analysis of Reactive and Proactive Routing Protocols in MANET  294 Views
The objectives of this study provides a performance comparison of MANET routing protocols
Simulation-based Performance of Transport Protocols Using MPEG-4 Traffics over 4G Network  387 Views
Although the LTE deployment is rapidly apace, there is a lack of performance evaluation of its protocols.
Review of Name Resolution and Data Routing for Information Centric Networking  326 Views
This paper provides a classification and review of the routing mechanisms that are proposed on six ICN architectures.

المقالات والبحوث الاكاديمية المنشورة تحت هذا التصنيف هي

Review of Name Resolution and Data Routing for Information Centric Networking  219 Views
This paper provides a classification and review of the routing mechanisms that are proposed on six ICN architectures.
Performance Evaluation of TCP, UDP and DCCP Traffic over 4G Network  277 Views
This study tries to evaluate if the old protocols suit with this new technology.
Using Abstraction Methods to Improve String Matching Algorithms  265 Views
All the work relies on of how enhance the time matching to be efficient.
Detection of Harmful Insects Based on Gray-Level Cooccurrence Matrix (GLCM) in Rural Areas  230 Views
The main idea shows that a tested image is composed of different texture regions of the insect and this will help to extract feature value.
A Cloud-Based Encryption for Document Storage Using Salesforce.com  176 Views
Security in Cloud Computing
Web Documents Similarity Using K-Shingle Tokens and MinHash Technique  149 Views
Document similarity
High Security Steganography Model Based on DWT, DCT and RSA  339 Views
The steganography is the science of concealing secret information in media files (i.e., image, text, audio, etc.), so that, such information is not noticeable by the eavesdropper.
Arabic Characters Identification Depending on Extracted Features of the Projection-Based Segmentation  389 Views
In this paper a developed a techniques to detect the skew angle and using different descriptors to recognize the Arabic characters and comparing the accuracy of each one
Robust Authentication Approach Based on Keyboard Graphical Password  426 Views
Now a days, it is fairly clear that the curve of challenges of authorized access has been increased sharply.
Data Encryption Scale for Large Data Scale in Cloud Computing  424 Views
Cloud computing is a power full platform to deliver applications over the internet or a private network. It considers the next technology in data manipulating and retrieving.
Meaning Extension of the Word ‘Sight’  493 Views
it is an analysis of the metaphoric , metonymic extension of the word sight
Unified Strategy for Intensification and Diversification Balance in ACO Metaheuristic  557 Views
Proposed new optimization approach
An Efficient Steganography Model Using Video Compression and Image Steganography  1077 Views
A process of hiding the secret information in the cover media (i.e. image, audio, video, etc.) is called as Steganography
Automatic Facial Expression Recognition Based on Hybrid Approach  1104 Views
The topic of automatic recognition of facial expressions deduce a lot of researchers in the late last century and has increased a great interest in the past few years
Design and Implementation of Python Program to Show a new mathematical miracles of Holy Quran by using Arithmetic Analysis Method  1154 Views
this paper was published in Medwell Journals, 2016
Software package to implement operations on the permutation  1077 Views
The Forth Scientific Conference of the College of Science University of Kerbala 2016 Journal of University of Kerbala
STUDY OF CHEMICAL ANALYSIS OF IRAQI PROPOLIS AND ACTIVE COMPONENT OF PROPLIS, IRAQ  1077 Views
this paper was published in Journal of Science / Vol5 / Issue 11 / 2015 / 1095-1103.
IMPLEMANTATION OF FUSION MODEL TO RE-ENGINEER LEGACY SOFTWARE  1121 Views
this paper was published in International Journal of Computer Science and Engineering (IJCSE) ISSN 2278-9960 Vol. 2, Issue 2, May 2013, 53-64 © IASET
Proposed Software Re-engineering Process That Combine Traditinal Software Reengineering Process With Spiral Model  1148 Views
this paper was published in International Journal of Advanced Research in Computer Science Volume 4, No. 2, Jan-Feb 2013
The Need of Re-engineering in Software Engineering  1159 Views
this paper was published in International Journal of Engineering and Technology Volume 2 No. 2, February, 2012
123456

البحث في الموقع

Authors, Titles, Abstracts

Full Text




خيارات العرض والخدمات


ادارة المستودع الاكاديمي


مجلة المحقق الحلي
مجلة العلوم الانسانية
مجلة العلوم التطبيقية والصرفة
احصائيات وارقام في المستودع
الدخول لحساب في الشبكة


link in the repository ادارة مستودع بيانات الجامعة

     uobabylon@gmail.com
     uob.it.operations@gmail.com
     uob.it.operations@uobabylon.edu.iq