1.

A Modified estimation for the steplenght of a descent nonlinear algorithm

Volume 4, Issue 2, December 2009, Pages 94-107
Abbas Y. AL-Bayati; and Ivan Subhi Latif

2.

A Modified Hybrid Partitioned VM-Method for Unconstrained Optimization

Volume 7, Issue 1, June 2012, Pages 153-170
Abbas Y. AL-Bayati; Basim A. Hassan

3.

A New Globally Convergent Self-Scaling Vm Algorithm for Convex and Nonconvex Optimization

Volume 6, Issue 1, June 2011, Pages 114-130
Abbas Y. AL-Bayati; Basim A. Hassan

4.

A New Non Quadratic Algorithm for Solving Non-Linear Optimization Problems

Volume 6, Issue 2, December 2011, Pages 201-212
Adham A. Ali

5.

A Proposed Modification on RC4 Algorithm by Increasing its Randomness

Volume 0, Issue 39, November 2017, Pages 349-372
Soukaena H. Hashem

6.

Authenticated Transmission of Client Server Network

Volume 7, Issue 3, July 2017, Pages 44-54
Rawaa Mohammed Abdul Hussein

7.

Automatic Summarization System For Arabic Texts

Volume 30, Issue 1, June 2012, Pages 63-75
Suhad Muhajer Kareem; Yusra Malik Dumamad

8.

Balancing the Multi Assembly line Using Ranked Positional Weight and COMSOAL Algorithms: Case Study at the Sewing line Factory (7) /the General Company for Leather Industries (GCLI/ Baghdad) Abstract

Volume 19, Issue 70, February 2013, Pages 31-62

9.

Building a mathematical model to Maximize the productivity company,s revenue using Integer linear fractional programming – with practical application Abstract

Volume 20, Issue 79, October 2014, Pages 310-336

10.

Ciphered Text Hiding in an Image using RSA algorithm

Volume 26, Issue 3, September 2015, Pages 879-884
Amer A. Al-Lehiebe

11.

Classification of Images Using Decision Tree

Volume 31, 6 B, June 2013, Pages 728-739
Emad K. Jabbar; Mayada jabbar kelain

12.

Comparing Bayes estimation with Maximum Likelihood Estimation of Generalized Inverted Exponential Distribution in Case of Fuzzy Data

Volume 23, Issue 101, December 2017, Pages 1-18
Qutaiba N. Nayef Al-Kazaz; Hawraa J. Kadhim Al-Saadi

13.

Comparison of some methods for estimating Poisson-Weibull distribution parameters

Volume 23, Issue 101, December 2017, Pages 452-475

14.

Content-Based Audio Retrieval by using Elitism GA-KNN Approach

Volume 9, Issue 1, June 2017, Pages 153-168
Sarah Hussein Toman; Muna Ghazi Abdul Sahib; Zinah Hussein Toman

15.

ESTIMATE CONFIDENE INTERAVALS FOR MONOTONE NONPARAMETRIC REGRESSION

Volume 10, Issue 1, February 2014, Pages 13-28
Dejla.I.Mahdi; Asmaa. N.Abdulla

16.

Estimating Angle of Arrival (AOA) for Wideband Signal by Sensor Delay Line (SDL) and Tapped Delay Line (TDL) Processors

Volume 24, Issue 4, May 2018, Pages 96-111
Bassim Sayed Mohammed; Dalya Khalid Hasan

17.

Fingerprint Recognition by Using Iterative Closest Point

Volume 7, Issue 4, October 2017, Pages 52-70
Rajaa .D. Reasan ali; Ban N. Dhannoon

18.

Implementation of Hybrid Combination of knapsack-RSA Cryptography Algorithm Using Mat lab Code

Volume 0, Issue 19, April 2018, Pages 49-56
Ali A. Abdul-Hameed; Mohamed N. Majeed; Saad. M. khalipha

19.

LBS Steganography Method an Mobile Image Based on NTRU Algorithm

Volume 0, Issue 1, October 2017, Pages 149-170
Zainab khyioon Abdalrdha; Mushtaq Talib Ajjah; Huda Abdul-alteef Abdul-ijabbar

20.

Modified Algorithm for Scheduling Problem

Volume 5, Issue 2, December 2010, Pages 106-114
Ayad M. Ramadan

21.

New Robust Estimation in Compound Exponential Weibull-Poisson Distribution for both contaminated and non-contaminated Data

Volume 24, Issue 106, December 2018, Pages 30-48
Entsar Arebe Al- doori

22.

Planning of motion strategy for hexapod robot using biogeography based optimization

Volume 25, Issue 5, October 2017, Pages 1870-1883
Hayder Mahdi Abdulridha; Hawraa Neema Jasem

23.

Simulation and Study of Multilevel Inverter System Fed by Photovoltaic Source

Volume 26, Issue 2, June 2018, Pages 302-310
Ali Abdulrazzak Jasim

24.

Speech Encryption Using Chaotic Map and Blowfish Algorithms

Volume 39, Issue 2, June 2013, Pages 68-76
Maysaa abd ulkareem Nasser and Iman Qays Abduljaleel

25.

Suggested Method for Encryption and Hiding Image using LCG and LSB

Volume 26, Issue 2, June 2018, Pages 66-77
Atheer Hussein Zyara

First Page Previous Page 1 2 Next Page Last Page


Journal Management System. Powered by ejournalplus.com