كل البحوث المنشورة تحت تصنيف تكنولوجيا المعلومات

تضم القوائم ادناه كل ما تحتاج من بحوث اكاديمية ومقالات علمية منشورة تحت تصنيف تكنولوجيا المعلومات  التي استطعنا الحصول عليها نتمنى ان تفيدك في مسيرتك البحثية , لا تتردد في الكتابة الينا حول كيفية الاتصال بالناشر او للتبيلغ عن شكاوى تخص الجانب الاكاديمي من جامعة بابل على الانترنت وسنكون مسرورين للتفاعل معك خدمة للصالح العام

المقالات والبحوث المضافة مؤخراً - الاجمالي 12 موضوع
HLLR: Highest Lifetime Least Request policy for high performance Pending Interest Table  50 Views
HLLR is designed to replace entries in the PIT which has the minimum number of incoming faces with maximum Lifetime.
Adaptive Interest Packet Lifetime Due to Pending Interest Table Overflow  33 Views
The objective of this paper to propose a smart scheme named Adaptive LifeTime (ALT) in order to manage the Interest Lifetime at content routers that will adapt Lifetimes as a function of the network load
Performance Evaluation of the Replacement Policies for Pending Interest Table  29 Views
This paper study the performance of Interest drop rate, delay and Interest retransmission under different network topologies, i.e. Tree, Abilene, and Germany when the PIT is full.
A Taxonomy of Information-Centric Networking Architectures based on Data Routing and Name Resolution Approaches  41 Views
The taxonomy serves as a basis for research directions, challenges, implementation and future studies for standardizing the ICN routing and naming.
Data Encryption Employing Genetic Algorithm Based on a New Algorithm of Key Generator  99 Views
security by data encryption
TreeNet Model Based Prediction of Testing Effort Class  103 Views
This strudy presents the use of the regression capability of the TreeNet regression tool to predict software class testing effort
A Taxonomy of Pending Interest Table Implementation Approaches in Named Data Networking  115 Views
This paper aims to classify an extensive and critical concerning PIT implementation in a concise manner
Internet Protocol MANET vs Named Data MANET: A Critical Evaluation  36 Views
The goals of this paper have two ways: first, this study provides a performance comparison of IP-MANET to ND-MANET
Performance Analysis of Reactive and Proactive Routing Protocols in MANET  23 Views
The objectives of this study provides a performance comparison of MANET routing protocols
Simulation-based Performance of Transport Protocols Using MPEG-4 Traffics over 4G Network  54 Views
Although the LTE deployment is rapidly apace, there is a lack of performance evaluation of its protocols.
Review of Name Resolution and Data Routing for Information Centric Networking  46 Views
This paper provides a classification and review of the routing mechanisms that are proposed on six ICN architectures.
Review of Name Resolution and Data Routing for Information Centric Networking  27 Views
This paper provides a classification and review of the routing mechanisms that are proposed on six ICN architectures.

المقالات والبحوث الاكاديمية المنشورة تحت هذا التصنيف هي

Performance Evaluation of TCP, UDP and DCCP Traffic over 4G Network  53 Views
This study tries to evaluate if the old protocols suit with this new technology.
Using Abstraction Methods to Improve String Matching Algorithms  36 Views
All the work relies on of how enhance the time matching to be efficient.
Detection of Harmful Insects Based on Gray-Level Cooccurrence Matrix (GLCM) in Rural Areas  21 Views
The main idea shows that a tested image is composed of different texture regions of the insect and this will help to extract feature value.
A Cloud-Based Encryption for Document Storage Using Salesforce.com  17 Views
Security in Cloud Computing
Web Documents Similarity Using K-Shingle Tokens and MinHash Technique  15 Views
Document similarity
High Security Steganography Model Based on DWT, DCT and RSA  156 Views
The steganography is the science of concealing secret information in media files (i.e., image, text, audio, etc.), so that, such information is not noticeable by the eavesdropper.
Arabic Characters Identification Depending on Extracted Features of the Projection-Based Segmentation  225 Views
In this paper a developed a techniques to detect the skew angle and using different descriptors to recognize the Arabic characters and comparing the accuracy of each one
Robust Authentication Approach Based on Keyboard Graphical Password  270 Views
Now a days, it is fairly clear that the curve of challenges of authorized access has been increased sharply.
Data Encryption Scale for Large Data Scale in Cloud Computing  271 Views
Cloud computing is a power full platform to deliver applications over the internet or a private network. It considers the next technology in data manipulating and retrieving.
Meaning Extension of the Word ‘Sight’  406 Views
it is an analysis of the metaphoric , metonymic extension of the word sight
An Efficient Steganography Model Using Video Compression and Image Steganography  855 Views
A process of hiding the secret information in the cover media (i.e. image, audio, video, etc.) is called as Steganography
Automatic Facial Expression Recognition Based on Hybrid Approach  894 Views
The topic of automatic recognition of facial expressions deduce a lot of researchers in the late last century and has increased a great interest in the past few years
Design and Implementation of Python Program to Show a new mathematical miracles of Holy Quran by using Arithmetic Analysis Method  950 Views
this paper was published in Medwell Journals, 2016
Software package to implement operations on the permutation  880 Views
The Forth Scientific Conference of the College of Science University of Kerbala 2016 Journal of University of Kerbala
STUDY OF CHEMICAL ANALYSIS OF IRAQI PROPOLIS AND ACTIVE COMPONENT OF PROPLIS, IRAQ  856 Views
this paper was published in Journal of Science / Vol5 / Issue 11 / 2015 / 1095-1103.
IMPLEMANTATION OF FUSION MODEL TO RE-ENGINEER LEGACY SOFTWARE  907 Views
this paper was published in International Journal of Computer Science and Engineering (IJCSE) ISSN 2278-9960 Vol. 2, Issue 2, May 2013, 53-64 © IASET
Proposed Software Re-engineering Process That Combine Traditinal Software Reengineering Process With Spiral Model  922 Views
this paper was published in International Journal of Advanced Research in Computer Science Volume 4, No. 2, Jan-Feb 2013
The Need of Re-engineering in Software Engineering  952 Views
this paper was published in International Journal of Engineering and Technology Volume 2 No. 2, February, 2012
A Literature Review and Classification of Selected Software Engineering Researches  822 Views
This paper was published in International Journal of Engineering and Technology Volume 2 No. 7, July, 2012
Simulation of TCP Traffic over ATM Networks  899 Views
this artical was published in 2009 in first conference in Computer Engineering Department University of Technology
123456

البحث في الموقع

Authors, Titles, Abstracts

Full Text




خيارات العرض والخدمات


ادارة المستودع الاكاديمي


مجلة المحقق الحلي
مجلة العلوم الانسانية
مجلة العلوم التطبيقية والصرفة
احصائيات وارقام في المستودع
الدخول لحساب في الشبكة


link in the repository ادارة مستودع بيانات الجامعة

     uobabylon@gmail.com
     uob.it.operations@gmail.com
     uob.it.operations@uobabylon.edu.iq