A

  • Abbas, Ayad R. Unmasking Deepfakes Based on Deep Learning and Noise Residuals [Volume 22, Issue 3, 2022, Page 111-117]

  • Abboud, Sahar Adil Machine Learning Approach Based on Automated Classification for Leg Rehabilitation [Volume 22, Issue 4, 2022, Page 140-151]

  • Abdulameer, Hadeel I. Fractional Order Fuzzy Like PID Controller Design for Three Links Rigid Robot Manipulator [Volume 22, Issue 4, 2022, Page 80-98]

  • Abdul Hassan, Alia Karim Optimizing Artificial Neural Networks Using Levy- Chaotic Mapping on Wolf Pack Optimization Algorithm for Detect Driving Sleepiness [Volume 22, Issue 3, 2022, Page 128-136]

  • Abdulhoseen, Abdulmohsen Jaber Holographic Digital Image Watermarking Based on Chaos Techniques [Volume 22, Issue 1, 2022, Page 43-54]

  • Abdulhussain, Donya Yasir Holographic Digital Image Watermarking Based on Chaos Techniques [Volume 22, Issue 1, 2022, Page 43-54]

  • Abdullah, Basma Wael A Convolutional Neural Network for Detecting COVID-19 from Chest X-ray Images [Volume 22, Issue 3, 2022, Page 1-14]

  • Abdullah, Hasanen Lung Cancer Prediction and Risk Factors Identification using Artificial Neural Network [Volume 22, Issue 1, 2022, Page 55-62]

  • Abdullah, Mohammed Najm A Framework for Predicting Airfare Prices Using Machine Learning [Volume 22, Issue 3, 2022, Page 81-96]

  • Abdullah, Mohammed Najm Combinatorial Testing Approaches: A Systematic Review [Volume 22, Issue 4, 2022, Page 60-79]

  • Abdullah, Mohammed Najm Machine Learning Approach Based on Automated Classification for Leg Rehabilitation [Volume 22, Issue 4, 2022, Page 140-151]

  • Abdulmunim, Matheel Auto-Correction Model for Lip Reading System [Volume 22, Issue 1, 2022, Page 63-71]

  • Abdulmunim, Matheel Convolutional Recurrent Neural Networks for Text Lecture Summarization [Volume 22, Issue 2, 2022, Page 27-39]

  • Abdulsatar, Sinan M. PAPR Reduction for Different O-OFDM in VLC Using -Law Companding and Convolutional Encoder [Volume 22, Issue 2, 2022, Page 13-26]

  • Abdul wahab, Hala Bahjat SNOW3G Modified by using PLL Algorithms in Magic Cube [Volume 22, Issue 3, 2022, Page 137-146]

  • Ahmed, Hanaa Mohsin Intelligent Surveillance Robot for Monitoring International Border Security [Volume 22, Issue 1, 2022, Page 11-22]

  • Ahmed, Hanaa Mohsin Applying Gamma and Histogram Equalization Algorithms for Improving System-performance of Face Recognition-based CNN [Volume 22, Issue 1, 2022, Page 108-117]

  • Ahmed, Hanaa Mohsin A Convolutional Neural Network for Detecting COVID-19 from Chest X-ray Images [Volume 22, Issue 3, 2022, Page 1-14]

  • Ahmed, Rasha Ismail Cardiovascular Patients Monitoring Using Internet of Things And Decision Tree [Volume 22, Issue 4, 2022, Page 152-159]

  • Ahmed, Ruaa Hameed Robust Sensor Fault Estimation for Control Systems Affected by Friction Force [Volume 22, Issue 3, 2022, Page 34-47]

  • Ahmed, Shaymaa Taha Predicting Alzheimer's Disease Using Filter Feature Selection Method [Volume 22, Issue 4, 2022, Page 13-27]

  • Albahadili, Riyadh Jabbar Environmental Pollution Monitoring System Based on IoT [Volume 22, Issue 1, 2022, Page 1-10]

  • AlHamdani, Wasim Generating Honeyword Based on A Proposed Bees Algorithm [Volume 22, Issue 4, 2022, Page 177-191]

  • Alhassany, Roaa E. Automatic Quality of Experience Measuring for Video Conference in Real-Time [Volume 22, Issue 3, 2022, Page 118-127]

  • Ali, Akbas Ezaldeen Detection Covid-19 Based on Chest X-ray Images Using Convolution Neural Networks [Volume 22, Issue 1, 2022, Page 34-42]

  • Ali, Akbas Ezaldeen Auto-Correction Model for Lip Reading System [Volume 22, Issue 1, 2022, Page 63-71]

  • Ali, Mohammed Abduljabbar Detection And Count of Human Bodies In a Crowd Scene Based on Enhancement Features By Using The YOLO v5 Algorithm [Volume 22, Issue 2, 2022, Page 125-134]

  • Ali, Yossra Task Scheduling in Cloud Computing Based on The Cuckoo Search Algorithm [Volume 22, Issue 1, 2022, Page 86-96]

  • Ali, Yossra Hussain Systematic Review on Cyber-Security Applications [Volume 22, Issue 4, 2022, Page 28-36]

  • Almoanf, Dhuha Abd Medical Image Enhancement Techniques [Volume 22, Issue 4, 2022, Page 48-59]

  • Alsaedi, Emad M. RCAE_BFV: Retrieve Encrypted Images using Convolution AutoEncoder and BFV [Volume 22, Issue 3, 2022, Page 48-61]

  • Ashor, shayma Applying Gamma and Histogram Equalization Algorithms for Improving System-performance of Face Recognition-based CNN [Volume 22, Issue 1, 2022, Page 108-117]

B

  • Badee, Wid Design of Smart Irrigation System for Vegetable Farms Based on Efficient Wireless Sensor Network [Volume 22, Issue 1, 2022, Page 72-85]

C

  • Croock, Muayad Sadik Design of Smart Irrigation System for Vegetable Farms Based on Efficient Wireless Sensor Network [Volume 22, Issue 1, 2022, Page 72-85]

D

  • Drewil, Ghufran Isam Environmental Pollution Monitoring System Based on IoT [Volume 22, Issue 1, 2022, Page 1-10]

E

  • Essad, H. Saeed Intelligent Surveillance Robot for Monitoring International Border Security [Volume 22, Issue 1, 2022, Page 11-22]

F

  • Fadhil, Heba Mohammed A Framework for Predicting Airfare Prices Using Machine Learning [Volume 22, Issue 3, 2022, Page 81-96]

  • Fadhil, Heba Mohammed Combinatorial Testing Approaches: A Systematic Review [Volume 22, Issue 4, 2022, Page 60-79]

  • Fadhil, Mohammed Natiq Software Defined Network Implementation by Using OpenDayLight Centralized Controller [Volume 22, Issue 4, 2022, Page 167-176]

  • Fadhil, Shaymaa Ammar Color Visual Cryptography Based on Three Dimensional Chaotic Map [Volume 22, Issue 2, 2022, Page 1-12]

  • Farhan, Alaa K. Designing a New Lightweight AES Algorithm to Improve the Security of the IoT Environment [Volume 22, Issue 2, 2022, Page 96-108]

  • Farhan, Alaa Kadhim RCAE_BFV: Retrieve Encrypted Images using Convolution AutoEncoder and BFV [Volume 22, Issue 3, 2022, Page 48-61]

  • Flaieh, Enass Hassan A Comparative Study of Graph Search Algorithms for Planar Manipulator to Avoid Obstacle Collision [Volume 22, Issue 4, 2022, Page 99-114]

G

  • Gbashi, Ekhlas Khalaf A Lightweight Hash Function Based on Enhanced Chaotic Map Algorithm(Keccak) [Volume 22, Issue 2, 2022, Page 53-62]

  • Ghani, Rana Fareed Collision Prediction Based on Vehicular Communication System [Volume 22, Issue 3, 2022, Page 72-80]

  • Ghani, Rana F. Automatic Quality of Experience Measuring for Video Conference in Real-Time [Volume 22, Issue 3, 2022, Page 118-127]

  • Ghani, Rana Fareed Machine Learning Techniques for Vehicle Detection [Volume 22, Issue 4, 2022, Page 1-12]

  • Ghani, Rana F. A Proposed Authentication Method for Document in Blockchain Based E-Government System [Volume 22, Issue 4, 2022, Page 127-139]

  • Ghani, Rana Fareed Cardiovascular Patients Monitoring Using Internet of Things And Decision Tree [Volume 22, Issue 4, 2022, Page 152-159]

  • Ghareeb, Yusra Ahmed A Lightweight Hash Function Based on Enhanced Chaotic Map Algorithm(Keccak) [Volume 22, Issue 2, 2022, Page 53-62]

  • Ghazi, Muna Convolutional Recurrent Neural Networks for Text Lecture Summarization [Volume 22, Issue 2, 2022, Page 27-39]

H

  • Hassan, Nidaa Flaih Comparative of Viola-Jones and YOLO v3 for Face Detection in Real time [Volume 22, Issue 2, 2022, Page 63-72]

  • Hilool, Ali khalid Intrusion Detection System Based on Ada boosting and Bagging Algorithm [Volume 22, Issue 2, 2022, Page 85-95]

  • Humaidi, Amjad Jaleel A Comparative Study of Graph Search Algorithms for Planar Manipulator to Avoid Obstacle Collision [Volume 22, Issue 4, 2022, Page 99-114]

  • Hussain, Abir Jaafar Detection And Count of Human Bodies In a Crowd Scene Based on Enhancement Features By Using The YOLO v5 Algorithm [Volume 22, Issue 2, 2022, Page 125-134]

  • Hussain, Ayat Naji Machine Learning Approach Based on Automated Classification for Leg Rehabilitation [Volume 22, Issue 4, 2022, Page 140-151]

  • Hussain, Nada Auto-Correction Model for Lip Reading System [Volume 22, Issue 1, 2022, Page 63-71]

  • Hussein, Adil Yousef Meerkat Clan-Based Feature Selection in Random Forest Algorithm for IoT Intrusion Detection [Volume 22, Issue 3, 2022, Page 15-24]

  • Hussein, Fatimah I. Optimal Linear Quadratic Control for Knee-Ankle Orthosis System [Volume 22, Issue 2, 2022, Page 109-124]

  • Hussien, hala khalid Survey: Recent Techniques of Image Fragile Watermarking [Volume 22, Issue 2, 2022, Page 135-145]

I

  • Ibrahim, Nuha Task Scheduling in Cloud Computing Based on The Cuckoo Search Algorithm [Volume 22, Issue 1, 2022, Page 86-96]

  • Ismael, Mutaz Haqi Proposed Secure Key for Healthcare Platform [Volume 22, Issue 1, 2022, Page 23-33]

J

  • Jabbar, Abdulqader Falhi Collision Prediction Based on Vehicular Communication System [Volume 22, Issue 3, 2022, Page 72-80]

  • Jafer, Shatha H. Intrusion Detection System Based on Ada boosting and Bagging Algorithm [Volume 22, Issue 2, 2022, Page 85-95]

  • Jaleel, Hassan Hassan Intelligent Parameter Tuning using Deep Q-network in Adaptive Queue Management Systems [Volume 22, Issue 3, 2022, Page 62-71]

  • Jameel, Wildan J. Unmasking Deepfakes Based on Deep Learning and Noise Residuals [Volume 22, Issue 3, 2022, Page 111-117]

  • Jamil, Abeer Salim Comparative of Viola-Jones and YOLO v3 for Face Detection in Real time [Volume 22, Issue 2, 2022, Page 63-72]

  • Jasim, Sarah Saadoon Optimizing Artificial Neural Networks Using Levy- Chaotic Mapping on Wolf Pack Optimization Algorithm for Detect Driving Sleepiness [Volume 22, Issue 3, 2022, Page 128-136]

  • Jassim, Sameeh Abdulghafour Designing a New Lightweight AES Algorithm to Improve the Security of the IoT Environment [Volume 22, Issue 2, 2022, Page 96-108]

  • Jumaa, Basim Abdul baki Machine Learning Approach Based on Automated Classification for Leg Rehabilitation [Volume 22, Issue 4, 2022, Page 140-151]

K

  • Kadhem, Suhad M. Unmasking Deepfakes Based on Deep Learning and Noise Residuals [Volume 22, Issue 3, 2022, Page 111-117]

  • Kadhem, Suhad Malallah Predicting Alzheimer's Disease Using Filter Feature Selection Method [Volume 22, Issue 4, 2022, Page 13-27]

  • Kamal, Zainab A. A Proposed Authentication Method for Document in Blockchain Based E-Government System [Volume 22, Issue 4, 2022, Page 127-139]

  • K. Farhan, Alaa Color Visual Cryptography Based on Three Dimensional Chaotic Map [Volume 22, Issue 2, 2022, Page 1-12]

M

  • Mahdi, Bashar Saadoon Image Protection Using Genetic Algorithm and Cipher Technique [Volume 22, Issue 4, 2022, Page 160-166]

  • Mahmood, Israa N. Lung Cancer Prediction and Risk Factors Identification using Artificial Neural Network [Volume 22, Issue 1, 2022, Page 55-62]

  • Mahyob, Zainab Kareem The Techniques of Based Internet Key Exchange (IKE) Protocol to Secure Key Negotiation [Volume 22, Issue 3, 2022, Page 147-154]

  • Majeed, Ali M. A Survey of Power Consumption Minimization in WSN Using Feedback Control Strategies [Volume 22, Issue 4, 2022, Page 37-47]

  • Makhrib, Zainab F. A Hybrid Digital Image Watermarking By Using DWT and LSB Method [Volume 22, Issue 4, 2022, Page 115-126]

  • MaoLood, Abeer Proposed Secure Key for Healthcare Platform [Volume 22, Issue 1, 2022, Page 23-33]

  • M. Hameed, Samir PAPR Reduction for Different O-OFDM in VLC Using -Law Companding and Convolutional Encoder [Volume 22, Issue 2, 2022, Page 13-26]

  • Mohamed, Mohamed J. Fractional Order Fuzzy Like PID Controller Design for Three Links Rigid Robot Manipulator [Volume 22, Issue 4, 2022, Page 80-98]

  • Mohammed, Athraa Jasim Machine Learning Techniques for Vehicle Detection [Volume 22, Issue 4, 2022, Page 1-12]

  • Mohsin, Rasha Mohammed Mohsin Mohammed Cardiovascular Patients Monitoring Using Internet of Things And Decision Tree [Volume 22, Issue 4, 2022, Page 152-159]

  • Muhajjar, Ra'ad A. Survey: Recent Techniques of Image Fragile Watermarking [Volume 22, Issue 2, 2022, Page 135-145]

  • Muhammed, Mustafa Laith A Comparative Study of Graph Search Algorithms for Planar Manipulator to Avoid Obstacle Collision [Volume 22, Issue 4, 2022, Page 99-114]

  • Muttasher, Ghaida Intelligent Parameter Tuning using Deep Q-network in Adaptive Queue Management Systems [Volume 22, Issue 3, 2022, Page 62-71]

N

  • Naser, Shaymaa Mahmood Systematic Review on Cyber-Security Applications [Volume 22, Issue 4, 2022, Page 28-36]

O

  • Obaida, Tameem Comparative of Viola-Jones and YOLO v3 for Face Detection in Real time [Volume 22, Issue 2, 2022, Page 63-72]

  • Ogla, Raheem AbdulSahib The Techniques of Based Internet Key Exchange (IKE) Protocol to Secure Key Negotiation [Volume 22, Issue 3, 2022, Page 147-154]

Q

  • Qasim, Raad Abdul Ameer Image Protection Using Genetic Algorithm and Cipher Technique [Volume 22, Issue 4, 2022, Page 160-166]

R

  • Raafat, Safanah Optimal Linear Quadratic Control for Knee-Ankle Orthosis System [Volume 22, Issue 2, 2022, Page 109-124]

  • Raafat, Safanah M. A Survey of Power Consumption Minimization in WSN Using Feedback Control Strategies [Volume 22, Issue 4, 2022, Page 37-47]

  • Ramadhan, Najat M. A Survey of Power Consumption Minimization in WSN Using Feedback Control Strategies [Volume 22, Issue 4, 2022, Page 37-47]

S

  • Sabah Abed, Salah Software Defined Network Implementation by Using OpenDayLight Centralized Controller [Volume 22, Issue 4, 2022, Page 167-176]

  • Sabbah, Thabit Sulaiman Hybridized Dimensionality Reduction Method for Machine Learning based Web Pages Classification [Volume 22, Issue 3, 2022, Page 97-110]

  • Sabri, Atheer Alaa PAPR Reduction for Different O-OFDM in VLC Using -Law Companding and Convolutional Encoder [Volume 22, Issue 2, 2022, Page 13-26]

  • Sadiq, Ahmed T. Detection And Count of Human Bodies In a Crowd Scene Based on Enhancement Features By Using The YOLO v5 Algorithm [Volume 22, Issue 2, 2022, Page 125-134]

  • Sadiq, Ahmed T. Meerkat Clan-Based Feature Selection in Random Forest Algorithm for IoT Intrusion Detection [Volume 22, Issue 3, 2022, Page 15-24]

  • Sadiq, Ahmed T. Generating Honeyword Based on A Proposed Bees Algorithm [Volume 22, Issue 4, 2022, Page 177-191]

  • Safaa, Noor Unknown Input Observer-Based Decentralized PID- BFO Algorithm for Interconnected Systems Against Fault Actuator [Volume 22, Issue 2, 2022, Page 40-52]

  • Salman, Asia Ali Collision Prediction Based on Vehicular Communication System [Volume 22, Issue 3, 2022, Page 72-80]

  • Salman, Aymen Dawood An Efficient Electronic Payment Using Biometric Authentication [Volume 22, Issue 3, 2022, Page 25-33]

  • Shaker, Montadher Sami Robust Sensor Fault Estimation for Control Systems Affected by Friction Force [Volume 22, Issue 3, 2022, Page 34-47]

  • Shaker, Shaimaa H. Medical Image Enhancement Techniques [Volume 22, Issue 4, 2022, Page 48-59]

  • Shihab, Maryam Raad Machine Learning Techniques for Vehicle Detection [Volume 22, Issue 4, 2022, Page 1-12]

T

  • Talib, Ahmed Abdul Karim An Efficient Electronic Payment Using Biometric Authentication [Volume 22, Issue 3, 2022, Page 25-33]

  • Turner, Scott Optimizing Artificial Neural Networks Using Levy- Chaotic Mapping on Wolf Pack Optimization Algorithm for Detect Driving Sleepiness [Volume 22, Issue 3, 2022, Page 128-136]

W

  • Wala aldeen khairi, Teaba Framework For Modeling and Simulation of Secure Cloud Services [Volume 22, Issue 1, 2022, Page 97-107]

Y

  • Yasser, Yasser A. Generating Honeyword Based on A Proposed Bees Algorithm [Volume 22, Issue 4, 2022, Page 177-191]

  • Younis, Mohammed Issam A Framework for Predicting Airfare Prices Using Machine Learning [Volume 22, Issue 3, 2022, Page 81-96]

  • Younis, Mohammed Issam Combinatorial Testing Approaches: A Systematic Review [Volume 22, Issue 4, 2022, Page 60-79]

  • Yousif, Ayman Basheer Intelligent Parameter Tuning using Deep Q-network in Adaptive Queue Management Systems [Volume 22, Issue 3, 2022, Page 62-71]

Z

  • Zaki, Rana Mohammed SNOW3G Modified by using PLL Algorithms in Magic Cube [Volume 22, Issue 3, 2022, Page 137-146]

  • Zeki, Suhiar Mohammed The Techniques of Based Internet Key Exchange (IKE) Protocol to Secure Key Negotiation [Volume 22, Issue 3, 2022, Page 147-154]