Abstract: Traditional routing protocols in mobile ad hoc networks (MANETs) face the high-energy resources consumption due to process of route discovery. In a MANET, a mobile node consumes its power mainly because of message communication and message processing. The power consumption of a mobile node for communication is the highest ...Read More »
2nd Cihan University-Erbil International Conference on Literature and Arts (CIC-LITART’18) June 27-2...
2nd Cihan University-Erbil International Conference on Administrative and Financial Sciences (CIC-ADFIS’18)
2nd Cihan University-Erbil International Conference on Administrative and Financial Sciences (CIC-AD...
3rd International Conference of Cihan University-Erbil on Law, International Relations, and Media (...
Cihan University-Erbil, Kurdistan Region-Iraq April 26-27, 2017 Call for Papers We are please...
5th International Conference of Cihan University-Erbil on Administration and Financial Sciences (CIC...
Abstract: License plate recognition (LPR) system is an important system in our life. LPR is an image processing and a character recognition system that used to recognize any car from the others. An automatic license plate recognition system for Iraqi car license plates is proposed in this paper. An optical ...Read More »
PerfectC2MIS: A perfect FileMaker r-database based comprehensive Class cumunication Course Management Information System
Abstract: As most of us are unaware that we have a very effective and efficient relational database with the name FileMaker which falls under the category of less known Relational Database Management System (RDBMS) to develop and deploy all types of computer applications to manage the business of a Small ...Read More »
Abstract: This study examines the factors that affect the adoption of Location Based Identification LBI in the developing countries and more specific in Kurdistan Regional of Iraq (KRI). LBI has different names in different countries such as postcode in the United Kingdom and zip code in the United States. As ...Read More »
Abstract: This paper aims to determine the role of international standards for data security to increase the efficiency of EPublishing over cloud computing by a case study to a sample of academics and researchers, and to achieve the objectives of this paper a questionnaire was developed to gather data from ...Read More »
Abstract: The concern of information security and data protection is growing and getting more critical day by day within organizations and companies. This has led developers and researchers to find advanced ways of defense against attacks on networks. One of these ways is using Honeypots. Honeypot is an information security ...Read More »
Abstract: According to the wide developments in the area of communications, there is a demand for secure system for data transmissions. Hence, a new algorithm and security standards are developed. One of these algorithms and standards are the Hash function. In this paper, a Hash system SHA-2 MIPS (Microprocessor without ...Read More »
Abstract: Reconfigurable cache memory is important to improve the cache performance and reduces the energy consumption. In this paper, a review for previous papers related with reconfigurable cache memory were presented and compared it with our work in which we implemented two dimensional reconfigurable cache memory with exploitation of full ...Read More »