كل البحوث المنشورة تحت تصنيف العلوم للبنات

تضم القوائم ادناه كل ما تحتاج من بحوث اكاديمية ومقالات علمية منشورة تحت تصنيف العلوم للبنات  التي استطعنا الحصول عليها نتمنى ان تفيدك في مسيرتك البحثية , لا تتردد في الكتابة الينا حول كيفية الاتصال بالناشر او للتبيلغ عن شكاوى تخص الجانب الاكاديمي من جامعة بابل على الانترنت وسنكون مسرورين للتفاعل معك خدمة للصالح العام

المقالات والبحوث المضافة مؤخراً - الاجمالي 12 موضوع
Adaptive Message Authentication Protocol for Performance Improvement in ZigBee Wireless Sensor Network  477 Views
This study tested the impact of message authentication over the network performance in terms of the throughput and data packet delivery ratio
A Proposed DNA Postfix Hiding Method  495 Views
The paper proposes a method to hide data in a Deoxy ribonucleic acid (DNA) using Postfix conversion according to the embedded bits
Build a trust and Reliable Authentication Module in Ad Hoc Network  489 Views
propose an authentication module to assist in building a trust relationships between ad hoc nodes by using Kerberos protocolIncluding Kerberos in ad hoc net prevents of identity forgery
ECC based blind Steganography-DNA for Hidden Information  489 Views
exploiting the DNA for hide information that encrypted bt ECC algorithm
Data Hiding Based DNA Issues: A Review  467 Views
a review about published DNA based data hiding techniques using the DNA as a safeguard to critical data that transmitted on an insecure channel
Survey of Features Extraction and Classification Techniques for Speaker Identification  469 Views
The primary purpose of is to explain the common speaker recognition methods.
New Programmatic OTP Algorithm  465 Views
creat new method for OTP ecryption
Cryptanalysis Using DNA-Sticker Algorithm  446 Views
cryptanalysis using DNA computing Sticker model
البحث الاول  406 Views
Suggesting new words to extract keywords from title and abstract
A Comparative Study of Image Steganography Based on Edge Detection  386 Views
A Comparative Study of Image Steganography Based on Edge Detection
Soft mathematical system to solve black box problem through development the FARB based on hyperbolic and polynomial functions  292 Views
This work attempts to design a method for computerbased mathematical model of multi-parametric datasets that their features are fully-automatic structural and parametric optimization of models
New Approach of Iris Localization for Personal Identification  344 Views
New Approach of Iris Localization for Personal Identification

المقالات والبحوث الاكاديمية المنشورة تحت هذا التصنيف هي

Study the impact of using Lock-free buffer to communicate the DOACROSS loop iterations EHA Alwan Journal ofB abylon University/Pure and Applied Sciences  197 Views
Communication dependency overhead becomes the biggest obstacle that facing the parallelizing loops containing loop-carried dependencies such us DOACROSSloop. Although of a substantial researcheshad been devoted tothis field, the problem still far from solve
Spam Email Image Classification Based on Text and Image Features  268 Views
Spam Email Image Classification Based on Text and Image Features
Enhanced Blowfish Algorithm for Image Encryption Based on Chaotic Map  258 Views
Enhanced Blowfish Algorithm for Image Encryption Based on Chaotic Map
Text Region Extraction for Noisy Spam Image  251 Views
Text Region Extraction for Noisy Spam Image
Iris Recognition System Based on Lifting Wavelet  226 Views
Iris Recognition System Based on Lifting Wavelet
The classification of heart sound by using ANNS  224 Views
Heart auscultation (the interpretation by a physician of heart sounds) is a fundamental component in cardiac diagnosis. It is, however, a difficult skill to acquire. In this work, we present a study for a system intended to aid in heart sound classification based on a FFT of the sounds and a neural network
Color Image Compression Using DPCM with DCT, DWT and Quadtree Coding Scheme  243 Views
Color Image Compression Using DPCM with DCT, DWT and Quadtree Coding Scheme
Parallel Genetic Algorithm for Optimizing Compiler Sequences Ordering  200 Views
Recent compilers provided many of optimization passes, thus even for expert programmers it is really hard to know which compiler optimization among several optimizations passes can improve program performance. Moreover, the search space for optimization sequences is very huge
Iris identification system based on RLM texture features  174 Views
Iris identification system based on RLM texture features
Using Machine Learning to Predict the Sequences of Optimization Passes  159 Views
Recent compilers provided many of optimization passes, thus even for expert programmers it is really hard to know which compiler optimization among several optimizations passes can improve program performance. Moreover, the search space for optimization sequences is very huge
Using Machine Learning to Predict the Sequences of Optimization Passes  143 Views
Recent compilers provided many of optimization passes, thus even for expert programmers it is really hard to know which compiler optimization among several optimizations passes can improve program performance. Moreover, the search space for optimization sequences is very huge
Selecting Best CPU frequency for energy saving in cluster using genetic algorithm  138 Views
Dynamic voltage and frequency scaling (DVFS) is a technique mainly used for reducing the consumed energy of computer’s processor. Its only drawback detracting the performance of parallel application when executing them over parallel platform.
In Predictable Outcome of Some Complex Function on Space  176 Views
The Main advantage of this work is to concentrate on the outcome of the function as a function of ( ) , ( ) . This type of work has been studied deeply by [HIL , 12] . Here , we see that the outcomes of the function are depending on the of the function ( ) . More deeply , s value will appear as a matrix of zero triangle values depending 0n the positive of on the real line .
Multi-objective Optimization of Grid Computing for Performance, Energy and Cost  135 Views
In this paper, new multi-objective optimization algorithm is proposed. It optimizes the execution time, the energy consumption and the cost of booked nodes in the grid architecture at the same time.
Programs features clustering to find optimization sequence using genetic algorithm  140 Views
Finding the best optimization sequence order that can improve the performance for even a simple program is not an easy task.
Wavelet transform based technique for text image localization  188 Views
Wavelet transform based technique for text image localization
Wavelet transform based technique for text image localization  173 Views
البحث العلمي
Finding a Good Global Sequence using Multi-Level Genetic Algorithm   134 Views
Trying all the optimization sequences manually to find out a
Enhancing Replacement Policy of Content-Centric Networking to Support Reaction toward Natural Disaster  248 Views
Replacement policy in Content-Centric Networking (CCN) is a necessary and current, function as an important part in Interest packet caching. Pending Interest Table (PIT) is the main and core cache tables in CCN and plays a signi?cant role for recording the information of Interest packets that are forwarded but are still waiting for matching with incoming Data packets. However, PIT management is more fundamental with regard to CCN operations for better memory ef?ciency. The PIT size determination of the forwarding system is a difficult problem in PIT management. Due to the limited PIT sizing, PIT replacement is utilized to remove the current entry from PIT and constructing a new space for the incoming entry to it. In a disaster area, this problem is due to the massive Interest packet that generating by survivors from the disaster and rescuers. The PIT over?ow could be subjected due to use of long Interest lifetimes that would simultaneously increase the number of entries in the PIT. Thus particularly when there is no flexible replacement policy, hence affecting PIT performance. Therefore, the ultimate aim of this paper is to develop the replacement policy that can deal with this problem. The proposed policy is a PIT management based on CCN PIT replacement policy for managing the PIT during a natural disaster, which can lead to mitigating PIT over?owing. The results showed the overall scenarios, the proposed policy better PIT memory usage as well as decreasing the Interest drop, delay time, Interest lifetime and Interest retransmission. A positive signi?cance in?uence in this work would be to presents a formulate a rule as a function which can decrease the delay and thus be leading to increasing PIT utilization, which will be very much useful for survivors, emergency rescue teams as well as emergency operation centers.
A Comparative Study of Image Steganography Based on Edge Detection  174 Views
Information security has become the main concern of the most famous researchers and the focus of their attention, as they are constantly trying to find the best and safest ways to transfer information
12345678910...

البحث في الموقع

Authors, Titles, Abstracts

Full Text




خيارات العرض والخدمات


ادارة المستودع الاكاديمي


مجلة المحقق الحلي
مجلة العلوم الانسانية
مجلة العلوم التطبيقية والصرفة
احصائيات وارقام في المستودع
الدخول لحساب في الشبكة


link in the repository ادارة مستودع بيانات الجامعة

     uobabylon@gmail.com
     uob.it.operations@gmail.com
     uob.it.operations@uobabylon.edu.iq