كل البحوث المنشورة تحت تصنيف تكنولوجيا المعلومات

تضم القوائم ادناه كل ما تحتاج من بحوث اكاديمية ومقالات علمية منشورة تحت تصنيف تكنولوجيا المعلومات  التي استطعنا الحصول عليها نتمنى ان تفيدك في مسيرتك البحثية , لا تتردد في الكتابة الينا حول كيفية الاتصال بالناشر او للتبيلغ عن شكاوى تخص الجانب الاكاديمي من جامعة بابل على الانترنت وسنكون مسرورين للتفاعل معك خدمة للصالح العام

المقالات والبحوث المضافة مؤخراً - الاجمالي 12 موضوع
Pending Interest Table Control Management in Named Data Network  922 Views
Journal of Network and Computer Applications
[A PROACTIVE DATA SECURITY SCHEME OF FILES USING MINHASH TECHNIQUE  2878 Views
Cloud Security and Data Mining
HLLR: Highest Lifetime Least Request policy for high performance Pending Interest Table  1794 Views
HLLR is designed to replace entries in the PIT which has the minimum number of incoming faces with maximum Lifetime.
Adaptive Interest Packet Lifetime Due to Pending Interest Table Overflow  1778 Views
The objective of this paper to propose a smart scheme named Adaptive LifeTime (ALT) in order to manage the Interest Lifetime at content routers that will adapt Lifetimes as a function of the network load
Performance Evaluation of the Replacement Policies for Pending Interest Table  1765 Views
This paper study the performance of Interest drop rate, delay and Interest retransmission under different network topologies, i.e. Tree, Abilene, and Germany when the PIT is full.
A Taxonomy of Information-Centric Networking Architectures based on Data Routing and Name Resolution Approaches  1779 Views
The taxonomy serves as a basis for research directions, challenges, implementation and future studies for standardizing the ICN routing and naming.
Data Encryption Employing Genetic Algorithm Based on a New Algorithm of Key Generator  1985 Views
security by data encryption
TreeNet Model Based Prediction of Testing Effort Class  1938 Views
This strudy presents the use of the regression capability of the TreeNet regression tool to predict software class testing effort
A Taxonomy of Pending Interest Table Implementation Approaches in Named Data Networking  1979 Views
This paper aims to classify an extensive and critical concerning PIT implementation in a concise manner
Internet Protocol MANET vs Named Data MANET: A Critical Evaluation  1589 Views
The goals of this paper have two ways: first, this study provides a performance comparison of IP-MANET to ND-MANET
Performance Analysis of Reactive and Proactive Routing Protocols in MANET  1295 Views
The objectives of this study provides a performance comparison of MANET routing protocols
Simulation-based Performance of Transport Protocols Using MPEG-4 Traffics over 4G Network  1889 Views
Although the LTE deployment is rapidly apace, there is a lack of performance evaluation of its protocols.

المقالات والبحوث الاكاديمية المنشورة تحت هذا التصنيف هي

Review of Name Resolution and Data Routing for Information Centric Networking  1452 Views
This paper provides a classification and review of the routing mechanisms that are proposed on six ICN architectures.
Review of Name Resolution and Data Routing for Information Centric Networking  963 Views
This paper provides a classification and review of the routing mechanisms that are proposed on six ICN architectures.
Performance Evaluation of TCP, UDP and DCCP Traffic over 4G Network  1682 Views
This study tries to evaluate if the old protocols suit with this new technology.
Using Abstraction Methods to Improve String Matching Algorithms  1384 Views
All the work relies on of how enhance the time matching to be efficient.
Detection of Harmful Insects Based on Gray-Level Cooccurrence Matrix (GLCM) in Rural Areas  1329 Views
The main idea shows that a tested image is composed of different texture regions of the insect and this will help to extract feature value.
A Cloud-Based Encryption for Document Storage Using Salesforce.com  1236 Views
Security in Cloud Computing
Web Documents Similarity Using K-Shingle Tokens and MinHash Technique  1080 Views
Document similarity
High Security Steganography Model Based on DWT, DCT and RSA  1264 Views
The steganography is the science of concealing secret information in media files (i.e., image, text, audio, etc.), so that, such information is not noticeable by the eavesdropper.
Arabic Characters Identification Depending on Extracted Features of the Projection-Based Segmentation  1223 Views
In this paper a developed a techniques to detect the skew angle and using different descriptors to recognize the Arabic characters and comparing the accuracy of each one
Robust Authentication Approach Based on Keyboard Graphical Password  1028 Views
Now a days, it is fairly clear that the curve of challenges of authorized access has been increased sharply.
Data Encryption Scale for Large Data Scale in Cloud Computing  1039 Views
Cloud computing is a power full platform to deliver applications over the internet or a private network. It considers the next technology in data manipulating and retrieving.
Meaning Extension of the Word ‘Sight’  1022 Views
it is an analysis of the metaphoric , metonymic extension of the word sight
Unified Strategy for Intensification and Diversification Balance in ACO Metaheuristic  1015 Views
Proposed new optimization approach
An Efficient Steganography Model Using Video Compression and Image Steganography  1893 Views
A process of hiding the secret information in the cover media (i.e. image, audio, video, etc.) is called as Steganography
Automatic Facial Expression Recognition Based on Hybrid Approach  1670 Views
The topic of automatic recognition of facial expressions deduce a lot of researchers in the late last century and has increased a great interest in the past few years
Design and Implementation of Python Program to Show a new mathematical miracles of Holy Quran by using Arithmetic Analysis Method  2014 Views
this paper was published in Medwell Journals, 2016
Software package to implement operations on the permutation  1647 Views
The Forth Scientific Conference of the College of Science University of Kerbala 2016 Journal of University of Kerbala
STUDY OF CHEMICAL ANALYSIS OF IRAQI PROPOLIS AND ACTIVE COMPONENT OF PROPLIS, IRAQ  1942 Views
this paper was published in Journal of Science / Vol5 / Issue 11 / 2015 / 1095-1103.
IMPLEMANTATION OF FUSION MODEL TO RE-ENGINEER LEGACY SOFTWARE  1717 Views
this paper was published in International Journal of Computer Science and Engineering (IJCSE) ISSN 2278-9960 Vol. 2, Issue 2, May 2013, 53-64 © IASET
Proposed Software Re-engineering Process That Combine Traditinal Software Reengineering Process With Spiral Model  2012 Views
this paper was published in International Journal of Advanced Research in Computer Science Volume 4, No. 2, Jan-Feb 2013
123456

البحث في الموقع

Authors, Titles, Abstracts

Full Text




خيارات العرض والخدمات


ادارة المستودع الاكاديمي


مجلة المحقق الحلي
مجلة العلوم الانسانية
مجلة العلوم التطبيقية والصرفة
احصائيات وارقام في المستودع
الدخول لحساب في الشبكة


link in the repository ادارة مستودع بيانات الجامعة

     uobabylon@gmail.com
     uob.it.operations@gmail.com
     uob.it.operations@uobabylon.edu.iq