Vol. 49 No. 2 (2023): Volume 49 Issue 2 Year 2023

Published: 2023-08-14

Articles

  • USING SPECIAL LETTERS AND DIACRITICS IN STEGANOGRAPHY IN HOLY QURAN

    Nooruldeen Subhi Shakir, Mohammed Salih Mahdi
    1-8
    DOI: https://doi.org/10.25195/ijci.v49i2.417
  • UNDERGROUND CRUDE OIL PIPELINE LEAKAGE DETECTION USING DEXINED DEEP LEARNING TECHNIQUES AND LAB COLOR SPACE

    Muhammad H. Obaid
    9-19
    DOI: https://doi.org/10.25195/ijci.v49i2.418
  • PREDICTING MEDICINE DEMAND USING DEEP LEARNING TECHNIQUES

    Bashaer Abdurahman Mousa, Belal Al-Khateeb
    20-27
    DOI: https://doi.org/10.25195/ijci.v49i2.427
  • AN OVERVIEW SMART ASSISTANT SYSTEM FOR OLD PEOPLE USING INTERNET OF THINGS

    Luma Sabbar Zamel, Jolan Rokan Naif
    28-36
    DOI: https://doi.org/10.25195/ijci.v49i2.432
  • COMPARATIVE STUDY OF FONT RECOGNITION USING CONVOLUTIONAL NEURAL NETWORKS AND TWO FEATURE EXTRACTION METHODS WITH SUPPORT VECTOR MACHINE

    Aveen Jalal Mohammed, Jwan Abdulkhaliq Mohammed, Amera Ismail Melhum
    37-43
    DOI: https://doi.org/10.25195/ijci.v49i2.434
  • DIAGNOSE EYES DISEASES USING VARIOUS FEATURES EXTRACTION APPROACHES AND MACHINE LEARNING ALGORITHMS

    Zahraa Najm Abed, Abbas M Al-Bakry
    44-52
    DOI: https://doi.org/10.25195/ijci.v49i2.437
  • DDOS ATTACK DETECTION USING HYBRID (CCN AND LSTM) ML MODEL

    Thura Jabbar Khaleel , Nadia Adnan Shiltagh
    53-61
    DOI: https://doi.org/10.25195/ijci.v49i2.446
  • EDIBLE FISH IDENTIFICATION BASED ON MACHINE LEARNING

    Israa Mohammed Hassoon, Shaymaa Akram Hantoosh
    62-72
    DOI: https://doi.org/10.25195/ijci.v49i2.455
  • DYNAMIC THRESHOLDING GA-BASED ECG FEATURE SELECTION IN CARDIOVASCULAR DISEASE DIAGNOSIS

    Hasanain F. Hashim, Meriam JEMEL, Nadia Ben Azzouna
    73-82
    DOI: https://doi.org/10.25195/ijci.v49i2.456
  • COMPARATIVE STUDY OF CHAOTIC SYSTEM FOR ENCRYPTION

    Doaa S. Salman , Jolan Rokan Naif
    83-92
    DOI: https://doi.org/10.25195/ijci.v49i2.457
  • ENSEMBLE MACHINE LEARNING APPROACH FOR IOT INTRUSION DETECTION SYSTEMS

    Baseem A. Kadheem Hammood, Ahmed T. Sadiq
    93-99
    DOI: https://doi.org/10.25195/ijci.v49i2.458
  • Evaluation of Image Cryptography by Using Secret Session Key and SF Algorithm

    Noor Kareem Jumaa, Abbas Muhammed Allawy
    100-110
    DOI: https://doi.org/10.25195/ijci.v49i2.459