- الإصدار 5، العدد 2 ـــــ فبراير 2026 ـــــ Vol. 5, No. 2
- الإصدار 5، العدد 1 ـــــ يناير 2026 ـــــ Vol. 5, No. 1
- الإصدار 4، العدد 12 ـــــ ديسمبر 2025 ـــــ Vol. 4, No. 12
- الإصدار 4، العدد 11 ـــــ نوفمبر 2025 ـــــ Vol. 4, No. 11
- الإصدار 4، العدد 10 ـــــ أكتوبر 2025 ـــــ Vol. 4, No. 10
- الإصدار 4، العدد 9 ـــــ سبتمبر 2025 ـــــ Vol. 4, No. 9
- الإصدار 4، العدد 7 ـــــ يوليو 2025 ـــــ Vol. 4, No. 7
- الإصدار 4، العدد 6 ـــــ يونيو 2025 ـــــ Vol. 4, No. 6
- الإصدار 4، العدد 5 ـــــ مايو 2025 ـــــ Vol. 4, No. 5
- الإصدار 4، العدد 4 ـــــ أبريل 2025 ـــــ Vol. 4, No. 4
- الإصدار 4، العدد 3 ـــــ مارس 2025 ـــــ Vol. 4, No. 3
- الإصدار 4، العدد 2 ـــــ فبراير 2025 ـــــ Vol. 4, No. 2
- الإصدار 4، العدد 1 ـــــ يناير 2025 ـــــ Vol. 4, No. 1
- الإصدار 3، العدد 12 ـــــ ديسمبر 2024 ـــــ Vol. 3, No. 12
- الإصدار 3، العدد 11 ـــــ نوفمبر 2024 ـــــ Vol. 3, No. 11
- الإصدار 3، العدد 10 ـــــ أكتوبر 2024 ـــــ Vol. 3, No. 10
- الإصدار 3، العدد 9 ـــــ سبتمبر 2024 ـــــ Vol. 3, No. 9
- الإصدار 3، العدد 8 ـــــ أغسطس 2024 ـــــ Vol. 3, No. 8
- الإصدار 3، العدد 7 ـــــ يوليو 2024 ـــــ Vol. 3, No. 7
- الإصدار 3، العدد 6 ـــــ يونيو 2024 ـــــ Vol. 3, No. 6
- الإصدار 3، العدد 5 ـــــ مايو 2024 ـــــ Vol. 3, No. 5
- الإصدار 3، العدد 4 ـــــ إبريل 2024 ـــــ Vol. 3, No. 4
- الإصدار 3، العدد 3 ـــــ مارس 2024 ـــــ Vol. 3, No. 3
- الإصدار 3، العدد 2 ـــــ فبراير 2024 ـــــ Vol. 3, No. 2
- الإصدار 3، العدد 1 ـــــ يناير 2024 ـــــ Vol. 3, No. 1
- الإصدار 2، العدد 8 ـــــ ديسمبر 2023 ـــــ Vol. 2, No. 8
- الإصدار 2، العدد 7 ـــــ نوفمبر 2023 ـــــ Vol. 2, No. 7
- الإصدار 2، العدد 6 ـــــ أكتوبر 2023 ـــــ Vol. 2, No. 6
- الإصدار 2، العدد 5 ـــــ سبتمبر 2023 ـــــ Vol. 2, No. 5
- الإصدار 2، العدد 4 ـــــ أغسطس 2023 ـــــ Vol. 2, No. 4
- الإصدار 2، العدد 3 ـــــ يوليو 2023 ـــــ Vol. 2, No. 3
- الإصدار 2، العدد 2 ـــــ يونيو 2023 ـــــ Vol. 2, No. 2
- الإصدار 2، العدد 1 ـــــ مارس 2023 ـــــ Vol. 2, No. 1
- الإصدار 1، العدد 1 ـــــ ديسمبر 2022 ـــــ Vol. 1, No. 1
- Uncategorized
أحدث الأبحاث
- Hardware Co-Simulation Based Deep Neural Networks for Liver Diseases Detection in MRI ImagesAuthors Department of Information Technology Management, Technical College of Management /Mosul, Northern Technical University, Mosul, 41001, Iraq [email protected] Technical College of Management/Mosul, Northern Technical University, Mosul, 41001, Iraq Department of Statistics and Informatics Techniques, Technical College of Management /Mosul, Northern… اقرأ المزيد »Hardware Co-Simulation Based Deep Neural Networks for Liver Diseases Detection in MRI Images
- A Noise-Aware Image Enhancement Framework Based on Joint Spatial–Frequency AnalysisAuthors Department of Computer Science, College of Computer Science and Information Technology, University of Anbar, Ramadi, Iraq [email protected] Department of Computer Networks Systems, College of Computer Science and Information Technology, University of Anbar, Ramadi, Iraq [email protected] Paper DOI https://doi.org/10.59992/IJCI.2026.v5n2p2 Abstract… اقرأ المزيد »A Noise-Aware Image Enhancement Framework Based on Joint Spatial–Frequency Analysis
- A Comparative Study of Artificial Neural Networks and Reinforcement Learning ModelsAuthors Assistant Professor, Faculty of Information Technology, University of Bisha, Kingdom of Saudi Arabia [email protected] Paper DOI https://doi.org/10.59992/IJCI.2026.v5n2p3 Abstract Cyber-attacks have grown more sophisticated, posing critical threats to national infrastructure and data integrity. Deep learning methods, particularly Artificial Neural Networks… اقرأ المزيد »A Comparative Study of Artificial Neural Networks and Reinforcement Learning Models
- A Consideration of Potential Strategies for Patient Safety from Cyberattack in the Healthcare DomainAuthors Department of Computer Networks, College of Computing and informatics, University of Al-Hamdaniya, Iraq [email protected] Department of Computer Networks, College of Computing and informatics, University of Al-Hamdaniya, Iraq [email protected] Department of Computer Networks, College of Computing and informatics, University of… اقرأ المزيد »A Consideration of Potential Strategies for Patient Safety from Cyberattack in the Healthcare Domain
- A Comprehensive Model for Evaluating Website Competence Using Web Mining TechniquesAuthors Faculty of Computer Science and Information Technology, AL-Neelain University, Khartoum, Sudan [email protected] https://orcid.org/0009-0006-8188-4961 Associate Professor in Al-Neelain University, Faculty of Computers and Information Technology –Khartoum, Sudan [email protected] https://orcid.org/0009-0001-7076-4212. Paper DOI https://doi.org/10.59992/IJCI.2026.v5n1p1 Abstract Evaluating websites has become increasingly critical as… اقرأ المزيد »A Comprehensive Model for Evaluating Website Competence Using Web Mining Techniques
- A Self-Supervised Damage-Aware Vision Transformer for Image Enhancement in Low-Quality and Post-Conflict EnvironmentsAuthors MSc, Computer Science, University of Anbar, Ramadi, Iraq [email protected] MSc, Computer Science, University of Anbar, Ramadi, Iraq [email protected] Paper DOI https://doi.org/10.59992/IJCI.2026.v5n1p2 Abstract In such environment fraught with both conflict and scarcity of resources, images captured by surveillance cameras, mobile… اقرأ المزيد »A Self-Supervised Damage-Aware Vision Transformer for Image Enhancement in Low-Quality and Post-Conflict Environments
- A proposed method for computing convolution neural network algorithmsAuthors Electronic Engineering Dept., College of Electrical Engineering, University of Technology, Iraq Electronic Engineering Dept., College of Electrical Engineering, University of Technology, Iraq [email protected] Electronic Engineering Dept., College of Electrical Engineering, University of Technology, Iraq Electronic Engineering Dept., College of… اقرأ المزيد »A proposed method for computing convolution neural network algorithms
- A Real-Time Vision-Based System for Driver Fatigue and Distraction Monitoring Using a Single In-Cabin RGB CameraAuthors College of Education, Computer Sciences, Mustansiriyah University, Baghdad, Iraq [email protected] Paper DOI https://doi.org/10.59992/IJCI.2026.v5n1p4 Abstract Driver fatigue and distraction are among the leading causes of road accidents worldwide, posing a critical challenge for intelligent transportation systems (ITS). Vision-based driver monitoring… اقرأ المزيد »A Real-Time Vision-Based System for Driver Fatigue and Distraction Monitoring Using a Single In-Cabin RGB Camera
- نموذج بيزي لتقدير مخاطر الأمن السيبراني بالاعتماد على مصنف Naive Bayesبيانات الباحث مدرس، الكلية التقنية الإدارية، الجامعة التقنية الشمالية، الموصل، العراق [email protected] مدرس دكتور، الكلية التقنية الإدارية، الجامعة التقنية الشمالية، الموصل، العراق [email protected] DOI البحث https://doi.org/10.59992/IJCI.2026.v5n1p5 ملخص البحث تناول البحث تحليل بيانات الأمن السيبراني وتفسير العلاقة بين متغيرين الأول يمثل… اقرأ المزيد »نموذج بيزي لتقدير مخاطر الأمن السيبراني بالاعتماد على مصنف Naive Bayes
- Analysis of the Study Cybersecurity Awareness for Human-Centered Protection Model in System Environments and Users BehaviorAuthors Future University, Sudan- Faculty of Telecommunication and Space Technology Engineering, Suzhou University, China [email protected], [email protected] Paper DOI https://doi.org/10.59992/IJCI.2025.v4n12p1 Abstract This paper explores the critical role of human behavior in cybersecurity vulnerabilities, emphasizing the psychological and social factors that influence… اقرأ المزيد »Analysis of the Study Cybersecurity Awareness for Human-Centered Protection Model in System Environments and Users Behavior
- Assessing the Needs and Limitations of Health Information Systems in SudanAuthors PhD Candidate, Department of Information Technology, College of Graduate Studies, National Ribat University, Sudan [email protected] Professor, Faculty of Computer Studies, National Ribat University, Sudan M.Sc. Graduate, Dept. of Software Engineering, Faculty of Computer Science and Information Technology, University of… اقرأ المزيد »Assessing the Needs and Limitations of Health Information Systems in Sudan
- The Impact of Social Media Advertising on Customer Deception in the Context of CybersecurityAuthors Shaqra University, Department of Computer Science, College of Computing and Information Technology, Shaqra, Riyadh 11961, Saudi Arabia [email protected] Paper DOI https://doi.org/10.59992/IJCI.2025.v4n11p1 Abstract Social media advertising has changed the way businesses trade on consumers as the personalized and engaging content… اقرأ المزيد »The Impact of Social Media Advertising on Customer Deception in the Context of Cybersecurity
- IoT Security and Privacy Issues: A TaxonomyAuthors Software Engineering Department, College of Computer Science and Information System, Prince Sultan University, Riyadh, 11586, Saudi Arabia [email protected] Paper DOI https://doi.org/10.59992/IJCI.2025.v4n11p2 Abstract The Internet of Things, IoT, is affecting almost every part of our life and it is connecting… اقرأ المزيد »IoT Security and Privacy Issues: A Taxonomy
- Data-Driven Analysis of the Psychosocial and Behavioral Effects of Social Media Usage in Arabian Gulf SocietiesAuthors Training team member at the Public Authority for Applied Education and Training (PAAET) – Higher Institute for Administration Services, Kuwait [email protected] Paper DOI https://doi.org/10.59992/IJCI.2025.v4n11p3 Abstract The swift digitization of Gulf societies has changed the ways people communicate and present… اقرأ المزيد »Data-Driven Analysis of the Psychosocial and Behavioral Effects of Social Media Usage in Arabian Gulf Societies
- Explainable AI: Objection Detection in Automated Vehicles using YOLOAuthors College of Computer Science and Engineering, Taibah University, Madinah, Saudi Arabia Associate Professor, Department of Computer Science, College of Computer Science and Engineering, Taibah University, Madinah, Saudi Arabia [email protected] Paper DOI https://doi.org/10.59992/IJCI.2025.v4n10p1 Abstract There is a recognized need for… اقرأ المزيد »Explainable AI: Objection Detection in Automated Vehicles using YOLO