المجلة العراقية لتكنولوجيا المعلومات最新文献

筛选
英文 中文
Color Halftone Visual Cryptography Scheme Using Dynamic Code Book And Error Diffusion Technique 采用动态码本和错误扩散技术的彩色半色调视觉密码方案
المجلة العراقية لتكنولوجيا المعلومات Pub Date : 1900-01-01 DOI: 10.34279/0923-009-004-005
R. S. Hameed, Abdul-Wahab Sami Ibrahim
{"title":"Color Halftone Visual Cryptography Scheme Using Dynamic Code Book And Error Diffusion Technique","authors":"R. S. Hameed, Abdul-Wahab Sami Ibrahim","doi":"10.34279/0923-009-004-005","DOIUrl":"https://doi.org/10.34279/0923-009-004-005","url":null,"abstract":"","PeriodicalId":422374,"journal":{"name":"المجلة العراقية لتكنولوجيا المعلومات","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114234049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Big Data Techniques:, A Survey 大数据技术:调查
المجلة العراقية لتكنولوجيا المعلومات Pub Date : 1900-01-01 DOI: 10.34279/0923-009-004-011
Jamal N. Hasoon, Assist. Prof. Dr. Rehab Hassan
{"title":"Big Data Techniques:, A Survey","authors":"Jamal N. Hasoon, Assist. Prof. Dr. Rehab Hassan","doi":"10.34279/0923-009-004-011","DOIUrl":"https://doi.org/10.34279/0923-009-004-011","url":null,"abstract":"Big data refer to the large volume of data, it can be analyzed for strategic Developing and better decisions. Big Data applications exaggerate in near few years because a traditional data techniques be limited specification. Various types of distributions and technologies used to suffer the Big Data challenges are developed. A survey of recent technologies are review for Big Data. The main technologies features are studied enable to extract knowledge from Big Data. Such distributions have some limitations and may differ in offerings and capacities. The used technologies face the increasing multi-streams and Big Data challenges. In this work review the big data technologies and challenge.","PeriodicalId":422374,"journal":{"name":"المجلة العراقية لتكنولوجيا المعلومات","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134629943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
3D Face Reconstruction Using Structure From Motion Technique 基于运动结构的三维人脸重建技术
المجلة العراقية لتكنولوجيا المعلومات Pub Date : 1900-01-01 DOI: 10.34279/0923-009-003-008
S. Shaker, N. A. Hamza
{"title":"3D Face Reconstruction Using Structure From Motion Technique","authors":"S. Shaker, N. A. Hamza","doi":"10.34279/0923-009-003-008","DOIUrl":"https://doi.org/10.34279/0923-009-003-008","url":null,"abstract":"","PeriodicalId":422374,"journal":{"name":"المجلة العراقية لتكنولوجيا المعلومات","volume":"282 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133350762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Cloud Computing Security Using Cryptography And Steganography 利用密码学和隐写术增强云计算安全性
المجلة العراقية لتكنولوجيا المعلومات Pub Date : 1900-01-01 DOI: 10.34279/0923-009-003-016
D. Ibrahim
{"title":"Enhancing Cloud Computing Security Using Cryptography And Steganography","authors":"D. Ibrahim","doi":"10.34279/0923-009-003-016","DOIUrl":"https://doi.org/10.34279/0923-009-003-016","url":null,"abstract":"The large challenge of data stored in “cloud computing “is confidence and security since the sensitive data saved into data centers in cloud. These critical data may be accessed, retrieved, or edited by unauthorized person(s) or machine(s). In addition, managing, organization of sensitive data may not be secure. Therefore, the security of data is highly interesting. To increase the security of data in data centers of cloud, we have introduced scheme to ensure data security in \"cloud computing\" by encoding secret data using two levels of encryption are DES & RSA algorithms. And then to enhancing the security we use LSB algorithm to hide these encrypted data inside edges of color images which is called steganography. The fundamental objective of this paper is to avoid data access by opponent users. This scheme hiding encrypted secret data within images and store these encrypted secret data at the data centers of cloud and retrieves data from it when it is wanted.","PeriodicalId":422374,"journal":{"name":"المجلة العراقية لتكنولوجيا المعلومات","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125877316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Computer –Based Intruder Detection Alarm System 基于计算机的入侵检测报警系统
المجلة العراقية لتكنولوجيا المعلومات Pub Date : 1900-01-01 DOI: 10.34279/0923-009-003-009
Izz Aboud Kadum, A. Altimimy, A. Hassan
{"title":"Computer –Based Intruder Detection Alarm System","authors":"Izz Aboud Kadum, A. Altimimy, A. Hassan","doi":"10.34279/0923-009-003-009","DOIUrl":"https://doi.org/10.34279/0923-009-003-009","url":null,"abstract":"","PeriodicalId":422374,"journal":{"name":"المجلة العراقية لتكنولوجيا المعلومات","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115628747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mobile Platform For Various Patients Case's Assessment Via Telemedicine 基于远程医疗的各类患者病例评估移动平台
المجلة العراقية لتكنولوجيا المعلومات Pub Date : 1900-01-01 DOI: 10.34279/0923-009-003-011
Nawar Ahmed Irsan, Bushra Hammad Amon, Shaymaa S. Samiea
{"title":"Mobile Platform For Various Patients Case's Assessment Via Telemedicine","authors":"Nawar Ahmed Irsan, Bushra Hammad Amon, Shaymaa S. Samiea","doi":"10.34279/0923-009-003-011","DOIUrl":"https://doi.org/10.34279/0923-009-003-011","url":null,"abstract":"","PeriodicalId":422374,"journal":{"name":"المجلة العراقية لتكنولوجيا المعلومات","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115088300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multilingual Text Summarization Based On LDA And Modified Pagerank 基于LDA和改进Pagerank的多语言文本摘要
المجلة العراقية لتكنولوجيا المعلومات Pub Date : 1900-01-01 DOI: 10.34279/0923-009-003-013
Z. Ali, Suhad Malallah
{"title":"Multilingual Text Summarization Based On LDA And Modified Pagerank","authors":"Z. Ali, Suhad Malallah","doi":"10.34279/0923-009-003-013","DOIUrl":"https://doi.org/10.34279/0923-009-003-013","url":null,"abstract":"","PeriodicalId":422374,"journal":{"name":"المجلة العراقية لتكنولوجيا المعلومات","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126854417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
معرف الكائن الرقمي "DOI" لوصف وترميز مصادر المعلومات في البيئة الرقمية:, الأهمية والاستخدام 数字“DOI”用于描述和编码数字环境中的信息来源:重要性和用途
المجلة العراقية لتكنولوجيا المعلومات Pub Date : 1900-01-01 DOI: 10.34279/0923-009-003-001
طلال ناظم الزهيرى
{"title":"معرف الكائن الرقمي \"DOI\" لوصف وترميز مصادر المعلومات في البيئة الرقمية:, الأهمية والاستخدام","authors":"طلال ناظم الزهيرى","doi":"10.34279/0923-009-003-001","DOIUrl":"https://doi.org/10.34279/0923-009-003-001","url":null,"abstract":"","PeriodicalId":422374,"journal":{"name":"المجلة العراقية لتكنولوجيا المعلومات","volume":"172 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122328452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
موقع الويب ماتريكس ومعاييره المعتمدة في ترتيب المواقع على الإنترنت 黑客帝国及其网站排名标准
المجلة العراقية لتكنولوجيا المعلومات Pub Date : 1900-01-01 DOI: 10.34279/0923-009-003-002
عطا محمود عطوه عبدالقادر عبدالقادر
{"title":"موقع الويب ماتريكس ومعاييره المعتمدة في ترتيب المواقع على الإنترنت","authors":"عطا محمود عطوه عبدالقادر عبدالقادر","doi":"10.34279/0923-009-003-002","DOIUrl":"https://doi.org/10.34279/0923-009-003-002","url":null,"abstract":"","PeriodicalId":422374,"journal":{"name":"المجلة العراقية لتكنولوجيا المعلومات","volume":"87 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129973842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reconstructing The Biological Images Using Morphological Processes And Evaluating Using Statistical Features 利用形态学过程重建生物图像并利用统计特征进行评价
المجلة العراقية لتكنولوجيا المعلومات Pub Date : 1900-01-01 DOI: 10.34279/0923-009-003-012
Amel H. Abbas, L. H. Abbas
{"title":"Reconstructing The Biological Images Using Morphological Processes And Evaluating Using Statistical Features","authors":"Amel H. Abbas, L. H. Abbas","doi":"10.34279/0923-009-003-012","DOIUrl":"https://doi.org/10.34279/0923-009-003-012","url":null,"abstract":"","PeriodicalId":422374,"journal":{"name":"المجلة العراقية لتكنولوجيا المعلومات","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130924962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信