Detecting Phishing Cyber Attack Based on Fuzzy Rules and Differential Evaluation AAK Rawaa Mohammed Abdul-Hussein 1, Ahmed H. Mohammed 2 TEM Journal 11 (2), pages 543-551, 2022 | 3 | 2022 |
Subject review: Video compression Algorithms ا.م. امل عباس كاظم م. ازل منشد عبد د.م. زهير حسين علي International Journal of Engineering Research and Advanced Technology …, 2020 | | 2020 |
Subject Review: Text clustering Algorithms م.د زهير حسين علي أ.م أمل عباس م أزل منشد INTERNATIONAL JOURNAL OF ENGINEERING RESEARCH AND ADVANCED TECHNOLOGY …, 2020 | | 2020 |
OBJECT DETECTION AND TRACKING METHOD USING S3TRONG POINTS EXTRACTION AND THEIR CORRESPONDENCE م.د. اخلاص وطن غنداوي م. خالدة علي احمد ا.م.امل عباس International Journal of Modern Trends in Engineering & Research Volume 7 …, 2020 | | 2020 |
IMAGE CIPHER SYSTEM BASED ON RSA AND CHAOTIC MAPS .م. د اخلاص عباس 2-- تيسير كرم 3--ا.م. امل عباس كاظم Eurasian JOURNAL OF MATHEMATICAL AND COMPTUTER APPLICAIONS ISSN 2305-6172 …, 2019 | | 2019 |
Shape Model Construction for MRI Brain Tumor Detection AmalAbbasKhadhim Computer Science Department- Collageof Education Al-Mustansiriya University A Abbbas journal of the college of education 5 (2015), 10, 2015 | | 2015 |
advanced method for video image compression A Abbbas journal of the college of education 1 (2014), 16, 2014 | | 2014 |
New Image Encryption Method Based on two Stage Scrambling By Zuhair Hussein ALI Amal Abbbas Kadhim Department of computer science Collage of Education Al … ZHALIA Abbbas journal of the college of basic education 20 (2014), 6, 2014 | | 2014 |
adaptive H.263 image video compression by using quarter-pixel and compression with half-pixel and integer pixel A Abbbas journal of the college of education 1 (2006), 14, 2006 | | 2006 |