1.

An Embedded Data Using Slantlet Transform

Volume 8, Issue 3, October 2011, Pages 840-848
Enas Muzaffer Al-Ta; Iman Mohammed Ga; fer Alwan

2.

Authentication using Hidden Encrypted Barcode

Volume 10, Issue 3, August 2014, Pages 44-53
Sana Ahmed Kadhom

3.

Bioaccumulation of Some Trace elements in muscles of two species of fishes in Euphrates River near the center of Suq Al-Shouyukh city- south Iraq

Volume 5, Issue 2, June 2016, Pages 3-10
Afaq .T.Farhood; Rabab Ali Al-Mosawi; Bassad A. Al-Aboody; Manal B. Al-Temimi; Elham jwad kadhem bilale; Alaa Hussein Oleiwi AL-Awady; Amal KH. Khalaf; Ahmed H. Mohammad; Amal A. Mahmood; Nafaa. F. M. Al-Farhan; Manal B. Al-Tamemi; Khalid G. Al; Fartosi; Majida G . Magtooph; Abbas Hameed Al-Bedhany; Hawraa Ramadhan; Hamid Talib Al-Saad; Alaa Abdul Hassen Naif MD; Kadhim mohan manhil Al-majedy; Haider M. Hussein; Basim Y. Al-khafaji; Hazim T. Thwiny; Hassan J. Hasony; Kawther T. Khalaf; Khaled Kh. S. Al-Khafaji; Saleh Abud Kader Al-Essa; Amna Ali Hashem; Ali A. A. Al-Shawi; Ali Ghalib Mohammed Khidhir; Roaa Jafar El-Khairalla; Sabeeh H. Al-Mayah; Basim H. Abdullah; Nothiala R. Al- kassar; Huda Ameer Zaki; Yass K.Abbass; Ibtehal Q.Al-Sahlani; Wijdan R. Abdulhussien; Emad A. Mohammed; H. L. Saadon; Elisabet Perez-Cabre; Hassan H. Mohammed; Maria S. Millan; Shayma Thyab Gddoa Al-Sahlany; Amal Kadhim Al-Asady; Fatima F. Hassan; Saher A. Ali

4.

Build a trust and Reliable Authentication Module in Ad Hoc Network

Volume 22, Issue 9, December 2014, Pages 2647-2642
Sahar Adil

5.

Design And Implementation Of A Transparent Secure Lan

Volume 12, Issue 4, December 2006, Pages 1063-1076
Firas R. Barjas; Sufyan T. Faraj

6.

Design and Implementation of Iraqi Virtual Library

Volume 6, Issue 4, December 2010, Pages 52-61
Jalal B. Raouf; Mohammed Najm Abdulla; Bahaa I. Kazem

7.

Design Secured Smart Door Lock Based on Jaro Winkler Algorithm

Volume 21, Issue 6, October 2016, Pages 154-159
Sura Mahmood Abdullah

8.

Emergency Fuel Rationing system using RFID Smart Cards

Volume 13, Issue 1, March 2017, Pages 148-157
Noor Ahmed Khudhur

9.

Implementation of A security Service Provider for Intranets

Volume 14, Issue 2, June 2008, Pages 2416-2428
Wameedh N. Flayih; Hamid M. Ali

10.

IMPROVEMENT OF DATA INTEGRITY USING DIFFERENT ENCRYPTION ALGORITHMS

Volume 11, Issue 2, December 2011, Pages 1-6
Serwan Waleed Jirjees

11.

Influence of external distortions on multifactor optical identification tags with photon-counting

Volume 5, Issue 2, June 2016, Pages 88-96
Emad A. Mohammed; H. L. Saadon; Elisabet Perez-Cabre; Hassan H. Mohammed; Maria S. Millan

12.

Security Systems Based On Eye Movement Tracking Methods

Volume 10, Issue 3, December 2018, Pages 70-78

13.

Variant length, Self-extracted audio watermark for verification using LWT and random selections

Volume 13, Issue 2, April 2017, Pages 132-146
Hala Bhjet Abdul Wahab; Abdul-Mohssen Jaber Abdul-Hossen; Sana Ahmed Kadhom



Journal Management System. Powered by ejournalplus.com