Real-time face detection in digital video-based on Viola-Jones supported by convolutional neural networks TH Obaida, AS Jamil, NF Hassan International Journal of Electrical and Computer Engineering (IJECE) 12 (3 …, 2022 | 20 | 2022 |
Employing neural style transfer for generating deep dream images LR Al-Khazraji, AR Abbas, AS Jamil ARO-THE SCIENTIFIC JOURNAL OF KOYA UNIVERSITY 10 (2), 134-141, 2022 | 13 | 2022 |
The Effect of Changing Targeted Layers of the DeepDream Technique Using VGG-16 Model ASJ Lafta R. Al-Khazraji, Ayad R. Abbas International journal of online and biomedical engineering 19 (3), 34-47, 2023 | 10 | 2023 |
A Systematic Review of Deep Dream LR Al-Khazraji, AR Abbas, AS Jamil IRAQI J. Comput. Commun. Control Syst. Eng 23, 192-209, 2023 | 9 | 2023 |
Comparative of Viola-Jones and YOLO v3 for Face Detection in Real time T Obaida, NF Hassan, AS Jamil Iraqi Journal Of Computers, Communications, Control And Systems Engineering …, 2022 | 9 | 2022 |
Text hiding in Color Images using the Secret Key Transformation Function in GF (2n) NHM Ali, AMS Rahma, AS Jamil Iraqi Journal of Science 56 (4B), 3240-3245, 2015 | 8 | 2015 |
Cyber Security for Medical Image Encryption using Circular Blockchain Technology Based on Modify DES Algorithm AMSR Abeer Salim Jamil International journal of online and biomedical engineering 19 (3), 99-112, 2023 | 6 | 2023 |
Software engineering cost estimation using COCOMO II model HR Ismaeel, AS Jamil Al-Mansour Journal 10 (1), 86-111, 2007 | 6 | 2007 |
A hybrid Artistic Model Using Deepy-Dream Model and Multiple Convolutional Neural Networks Architectures LR Al-Khazraji, AR Abbas, AS Jamil, AJ Hussain IEEE Access, 2023 | 5 | 2023 |
An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments NFH Abeer Salim Jamil , Raghad Abdulaali Azeez International journal of online and biomedical engineering 19 ((01)), 93-106, 2023 | 5 | 2023 |
Image encryption based on multi-level keys on RC5 algorithm AS Jamil, AMS Rahma iJIM 16 (17), 101, 2022 | 5 | 2022 |
A Review: Video Encryption Techniques, Advantages And Disadvantages TH Obaida, AS Jamil, NF Hassan Webology (ISSN: 1735-188X) 19 (1), 2022 | 5 | 2022 |
A Partial Face Encryption in Real World Experiences Based on Features Extraction from Edge Detection RA Azeez, AS Jamil, MS Mahdi iJIM 17 (07), 69, 2023 | 3 | 2023 |
Using Shape Representation to Design Panorama Video System AS Jamil, AMS Rahma, NHM Ali مجلة المنصور, 49-66, 2016 | 3 | 2016 |
Multibiometric System with Runs Bits Permutation for Creating Cryptographic key Generation Technique NFH Raghad Abdulaali Azeez,, Abeer Salim Jamil, Ayad Al-Adhami Iraqi Journal of Science 64 (No. 1), pp: 452-468, 2023 | 2 | 2023 |
Designing a Digital System for the Security of a Building Based on Behavioral Tracking abeer salim jamil University of Technology ,Computer Science Department,2015, 2015 | 2 | 2015 |
The Proposed Design of the Monitoring System for Security Breaches of Buildings Based on Behavioral Tracking ASJ Abdul Monem S. Rahma International Journal of Computer Science and Network Security 14 (7), 37-40, 2014 | 2* | 2014 |
Generating various deep dream images through maximizing the loss function of particular layers using inception-v3 and inception-ResNet-V2 models LR Al-Khazraji, AR Abbas, AS Jamil Iraqi Journal of Science, 3468-3483, 2024 | 1 | 2024 |
Used SLIM model to estimate software cost AS Jamil Al-Mansour Journal 10 (1), 49-63, 2007 | 1 | 2007 |
Improvement of rabbit lightweight stream cipher for image encryption using Lévy flight TH Obaida, AS Jamil, NF Hassan | 1 | |