Most Recent Additions*
Survey: A Study on Image Encryption Using DNA in Bioinformatics
Rana M. Zaki, Zaed S. Mahdi, and Matheel E. Abdulmunim
New Feature Selection Using Principal Component Analysis
Zaid Mundher Radeef, Soukaena Hassan Hashem, and Ekhlas Khalaf Gbashi
Development of a Hybrid Methodology of Deep Learning and Machine Learning for Lung Nodule Detection in Medical Computed Tomography Images
Zaed S. Mahdi, Rana M. Zaki, Alaa Kadhim Farhan, and Negar Majma
Enhancing Image Classification Using a Convolutional Neural Network Model
Zena M. Saadi, Ahmed T. Sadiq, Omar Z. Akif, and Marwa M. Eid
Improved Rapidly-Exploring Random Tree using Firefly Algorithm for Robot Path Planning
Dena Kadhim Muhsen, Firas Abdulrazzaq Raheem, Yuhanis Yusof, Ahmed T. Sadiq, and Faiz Al Alawy
Unraveling the Versatility and Impact of Multi-Objective Optimization: Algorithms, Applications, and Trends for Solving Complex Real-World Problems
Noor A. Rashed, Yossra H. Ali, Tarik A. Rashid, and A. Salih
Optimization of Resources Allocation using Evolutionary Deep Learning
Sanaa Ali Jabber, Soukaena H. Hashem, and Shatha H. Jafer
Face Mask Detection Based on Deep Learning: A Review
Shahad Fadhil Abbas, Shaimaa Hameed Shaker, and Firas. A. Abdullatif
Strangeness Detection from Crowded Video Scenes by Hand-Crafted and Deep Learning Features
Ali A. Hussan, Shaimaa H. Shaker, and Akbas Ezaldeen Ali
A Comprehensive Analysis of Deep Learning and Swarm Intelligence Techniques to Enhance Vehicular Ad-hoc NETwork Performance
Hussein K. Abdul Atheem, Israa T. Ali, and Faiz A. Al Alawy
A Novel Approach to Generate Dynamic S-Box for Lightweight Cryptography Based on the 3D Hindmarsh Rose Model
Ala'a Talib Khudhair, Abeer Tariq Maolood, and Ekhlas Khalaf Gbashi
The Robust Digital Video Watermarking Methods: A Comparative Study
Ebtehal Talib, Abeer Salim Jamil, Nidaa Flaih Hassan, and Muhammad Ehsan Rana
FOXANN: A Method for Boosting Neural Network Performance
Mahmood A. Jumaah, Yossra H. Ali, Tarik A. Rashid, and S. Vimal
Surveying Machine Learning in Cyberattack Datasets: A Comprehensive Analysis
Azhar F. Al-zubidi, Alaa Kadhim Farhan, and El-Sayed M. El-Kenawy
*Updated as of 01/17/25.