Abstract: Traditional routing protocols in mobile ad hoc networks (MANETs) face the high-energy resources consumption due to process of route discovery. In a MANET, a mobile node consumes its power mainly because of message communication and message processing. The power consumption of a mobile node for communication is the highest ...Read More »
3rd International Conference of Cihan University-Erbil on Law, International Relations, and Media (...
Cihan University-Erbil, Kurdistan Region-Iraq April 26-27, 2017 Call for Papers We are please...
5th International Conference of Cihan University-Erbil on Administration and Financial Sciences (CIC...
2nd International Conference of Cihan University-Erbil on Communication Engineering and Computer Science (CIC-COCOS’17)
March 29-30, 2017 Cihan University-Erbil, Kurdistan Region-Iraq Call for Papers We are please...
Abstract: License plate recognition (LPR) system is an important system in our life. LPR is an image processing and a character recognition system that used to recognize any car from the others. An automatic license plate recognition system for Iraqi car license plates is proposed in this paper. An optical ...Read More »
PerfectC2MIS: A perfect FileMaker r-database based comprehensive Class cumunication Course Management Information System
Abstract: As most of us are unaware that we have a very effective and efficient relational database with the name FileMaker which falls under the category of less known Relational Database Management System (RDBMS) to develop and deploy all types of computer applications to manage the business of a Small ...Read More »
Abstract: This study examines the factors that affect the adoption of Location Based Identification LBI in the developing countries and more specific in Kurdistan Regional of Iraq (KRI). LBI has different names in different countries such as postcode in the United Kingdom and zip code in the United States. As ...Read More »
Abstract: This paper aims to determine the role of international standards for data security to increase the efficiency of EPublishing over cloud computing by a case study to a sample of academics and researchers, and to achieve the objectives of this paper a questionnaire was developed to gather data from ...Read More »
Comparative Study for Color Edge Detection Using Vector Value, YCbCr Color Space and Least Square Numerical Method
Abstract: Edge detection plays an important role in imageEdge detection plays an important role in image processing, pattern recognition and computer vision applications. Most of edge detection schemes are based on finding maximum in the first derivative of the image function or zero crossings in the second derivative of the ...Read More »
Abstract: The concern of information security and data protection is growing and getting more critical day by day within organizations and companies. This has led developers and researchers to find advanced ways of defense against attacks on networks. One of these ways is using Honeypots. Honeypot is an information security ...Read More »
Abstract: According to the wide developments in the area of communications, there is a demand for secure system for data transmissions. Hence, a new algorithm and security standards are developed. One of these algorithms and standards are the Hash function. In this paper, a Hash system SHA-2 MIPS (Microprocessor without ...Read More »