Vol. 41 No. 1 (2014): Iraqi Journal for Computers and Informatics

Published: 2014-12-31

Articles

  • Gate Control System for New Iraqi License Plate

    Furat Tawfeeq, Yasmine Tabra
    1-3
    DOI: https://doi.org/10.25195/ijci.v41i1.89
  • Traffic Management in Wireless Sensor Network Based on Modified Neural Networks

    Nadia Shiltagh, Zainab Faisal
    4-8
    DOI: https://doi.org/10.25195/ijci.v41i1.90
  • Network Coded Modulation for Two Way Relay Networks

    Abdulkareem Kadhim, Karrar Ali
    9-14
    DOI: https://doi.org/10.25195/ijci.v41i1.91
  • Design and Implementation of Wireless Electric Power Meter Based on XBee Model

    Mofeed Rashid
    15-19
    DOI: https://doi.org/10.25195/ijci.v41i1.92
  • A Framework Prototype for E-Authentication of Iraqi Civil-Identity Certificate

    Imad Mohamad, Aws Abdulsahib
    20-25
    DOI: https://doi.org/10.25195/ijci.v41i1.93
  • Partial Encryption in Digital Image Based On Plasma Encoding Techniques

    Hala Abdul Wahab, Sura Sarab
    26-31
    DOI: https://doi.org/10.25195/ijci.v41i1.94
  • A Proposed Methodology for Identifying and Evaluating an E-Forms Application

    Imad AL-Hussaini, Mustafa Ibrahim
    32-38
    DOI: https://doi.org/10.25195/ijci.v41i1.95
  • Character Recognition Using Neural Network Learned by Artificial Bee Algorithm

    Bassim Jumaa, Ayad Naser, Maryam khalaf
    39-46
    DOI: https://doi.org/10.25195/ijci.v41i1.96
  • SMS Encryption by Using Android Operating System

    Jane Stephan, Zahra Dhaief
    47-50
    DOI: https://doi.org/10.25195/ijci.v41i1.97
  • Using Data Marts Approach in Iraqi Educational Institution process

    Alla Yassin
    51-54
    DOI: https://doi.org/10.25195/ijci.v41i1.98
  • Using Genetic Algorithm to Break Knapsack Cipher with Sequence Size 16

    Safaa Omran, Ali Al_Khalid, Israa Ali
    55-59
    DOI: https://doi.org/10.25195/ijci.v41i1.99
  • A Proposed Firewall for Viruses and Steganography Image

    Sura Abdullah
    60-65
    DOI: https://doi.org/10.25195/ijci.v41i1.100
  • RSA Cryptographic Key Generation Using Fingerprint Minutiae

    Mofeed Rashid, Huda Zaki
    66-69
    DOI: https://doi.org/10.25195/ijci.v41i1.101