Volume 23 (2023)
Volume 22 (2022)
Volume 20 (2020)
Volume 19 (2019)
Volume 18 (2018)
Volume 17 (2017)
Volume 16 (2016)
Volume 15 (2015)
Volume 14 (2014)
Volume 13 (2013)
Volume 12 (2012)
Volume 11 (2011)
Volume 10 (2010)
Volume 9 (2009)
Volume 8 (2008)
Volume 7 (2007)
Volume 6 (2006)
Volume 5 (2005)
Volume 4 (2004)
Visible Light Fidelity Technology: Survey

Kawther Dawood Salman; Ekhlas Kadum Hamza

Volume 21, Issue 2 , June 2021, Page 1-15

Abstract
  Wireless Fidelity (Wi-Fi) is particularly popular today. Every place hashotspots to access the internet via Wi-Fi, including homes, offices, colleges, and otherpublic places. This increased number of users, and hence the use of bandwidth, has led toradio spectrum congestion. Thus, in the year of 2011, ...  Read More ...

FPGA-Based Multi-Core MIPS Processor Design

Sarah M. Al-sudany; .Ahmed S. Al-Araji1; Bassam M. Saeed

Volume 21, Issue 2 , June 2021, Page 16-35

Abstract
  This research presents a study for multicore Reduced Instruction SetComputer (RISC) processor implemented on the Field Programmable GateArray(FPGA).The Microprocessor without- Interlocked Pipeline Stages (MIPS)processor is designed for the implementation of educational purposes, as well as it isexpected ...  Read More ...

Dual Architecture Deep Learning Based Object Detection System for Autonomous Driving

Mahmoud M. Mahmoud; Ahmed R. Nasser

Volume 21, Issue 2 , June 2021, Page 36-43

Abstract
  Object detection of autonomous vehicles presents a big challenge forresearchers due to the requirements of accuracy and precision in real-time.This work presents a deep learning approach based on a dual architecturedesign of the network. A highly accurate multi-class network of convolutionalneural networks ...  Read More ...

An Optimal Path Planning Algorithms for a Mobile Robot

Omar Abdul Razzaq Abdul Wahhab; .Ahmed S. Al-Araji1

Volume 21, Issue 2 , June 2021, Page 44-58

Abstract
  The goal of navigating a mobile robot is to find the optimal path to direct itsmovement, so path planning is the best solution to find the optimal path. Therefore, thetwo most important problems of path planning must be solved; the first is that the pathmust avoid collision with obstacles, and second ...  Read More ...

Implementation of Spectrum Sensing based OFDM Transceiver using Xilinx System Generator

Areej Munadel Kadhum; Ekhlas Kadum Hamza

Volume 21, Issue 2 , June 2021, Page 59-69

Abstract
  with the introduction of new standards at a fast pace, wireless communicationis experiencing great development and growth, thereby raising the level of demand forradio spectrum. The spectrum, however, is a limited resource and cannot be subdividedindefinitely to satisfy any use. As a result, spectrum ...  Read More ...

Parallel Heat-Exchangers Network Optimization Using Sliding Mode Extremum Seeking with integral Anti Wind Up Scheme

Taha Adel Al-Gadery; Shibly Ahmed Al-Samarraie

Volume 21, Issue 2 , June 2021, Page 70-84

Abstract
  In this paper, we study the Sliding Mode Extremum Seeking (SMES)optimization method for a Heat Exchangers Network. The studied network is constructedfrom plate Heat Exchangers, in which several thermal sources are used to heat a commoncold stream that is distributed between the several branches of the ...  Read More ...

Fuzzy Like Pid Controller Based on Sso Design for Congestion Avoidance in Internet Router

Mohammed I. Berbek; Ahmed A. Oglah

Volume 21, Issue 2 , June 2021, Page 85-101

Abstract
  today The topic of contention is the quality of computer networkservice. Efficient data handling is important. Each router offers a buffer spacewhere packets can be held before being sent until they are processed. Thetheory of packet congestion control is TCP (Transmission Control Protocol).(AQM) is ...  Read More ...

A Comparative Study of Researches Based on Magic Square in Encryption with Proposing a New Technology

Ibrahim Malik ALattar; Abdul Monem S Rahma

Volume 21, Issue 2 , June 2021, Page 102-114

Abstract
  This paper aims to develop a new cryptographic algorithm that isbased on the magic square method of order five with multi message lengths tobe more complex in order to increase the complexity; in addition to comparingthe cipher with the use of the magic square of order five, four and three (allsingle ...  Read More ...

Comparison of Three Proposal Methods in Steganography Encryption Secret Message using PVD and MapReduce

Huda Ghazie Abd UL Sahib; Maisa Abid Ali Khodher

Volume 21, Issue 2 , June 2021, Page 115-131

Abstract
  This paper will present a comparison between three proposed methods. All of these methodsinclude hiding a secret message inside a video for the aim of transferring it to another party with highsecurity and a high embedding rate in order to ensure that the secret message is not discovered by theattacker. ...  Read More ...

Assessment of Service Departments in the Governorates Through Social Media Comments

Sura Sabah Rasheed; Ahmed T. Sadiq

Volume 21, Issue 2 , June 2021, Page 132-142

Abstract
  Social media have been increasing obviously and widely due to the fact that it is a mediafor users who express their emotions using reviews and comments on a variety of areas in life. In thepresent study, a modest model has been suggested for the assessment of service departments with theuse of reviews ...  Read More ...