Skip to main content
The Robotic Remote Laboratory (RRL) controls the Robot labs via the Internet and applies the Robot experiment in easy and advanced way. If we want to enhance the RRL system, we must study requirements of the Robot experiment deeply. One... more
    • by 
    •   4  
      RoboticsComputer ScienceComputer NetworksElectrical and Computer Engineering (ECE)
Global university rankings have cemented the notion of a world university market arranged in a single "league table" for comparative purposes and have given a powerful impetus to intranational and international competitive pressures in... more
    • by 
E-library system makes the work of a person who is in charge of the library more convenient to search, arrange and make an inventory of the contents of the library. In this paper, a search system for an E-Library for the academic... more
    • by 
    •   3  
      EngineeringComputer ScienceInformation Retrieval
The rapid increase in the era of the technological revolution and the Internet, especially the social media, have created a new reality in the daily life of the societies in general and of the university students in particular, so this... more
    • by 
    • Computer Science
Many peoples use Facebook to connect and share their views on various issues, with the majority of user-generated content consisting of textual information. Since there is so much actual data from people who are posting messages on their... more
    • by 
    •   5  
      Computer ScienceDistributed ComputingSentiment AnalysisLibrary and Information Studies
    The last two decades have seen a marked increase in the illegal activities on the Dark Web. Prompt evolvement and use of sophisticated protocols make it difficult for security agencies to identify and investigate these activities by... more
    • by 
The written words are very vital matter in Arabians and Islamic, and so beautifying it and production it into an art form served as an approach to tribute, Allah. These words were compiled into the Qur'an or holy book of Islam. The aim of... more
    • by 
The Kufic font takes its name from the location in which the font was created around the end of the seventh century, Kufa, Iraq. Kufic was the principal script used to replicate the Qur'ans until approximately the eleventh century.... more
    • by 
    • Computer Graphics
A writing system as a set of visible used to represent units of language in a systematic way. Egyptian hieroglyphs were a formal writing system used by the ancient Egyptians that combined logographic and alphabetic elements. In serious... more
    • by 
A graph is a collection of vertices or nodes, pairs of which are joined by lines or edges, can be used not only to represent physical relationships, but also to represent logical, biological, and arithmetic relationships. The attributes... more
    • by 
    •   2  
      Graph DrawingGenitic algorithms
One of the important issue in network is security, especially when computer usage is increasing for both social and business areas. So, the secure communications through public and private channels are the main objective for researches.... more
    • by  and +2
    • Digital Data Hiding
Network security, and secure communications through public and private channels are more important issue specially when computer usage is increasing, for both social and business areas. Data hiding is one of approach to obtain a secure... more
    • by  and +1
    • Digital Data Hiding
With the rapid development of Internet, safe covert communications in the network environment become an essential research direction. Steganography is a significant means that secret information is embedded into cover data imperceptibly... more
    • by  and +2
    •   2  
      Digital Data HidingText Steganography
Data hiding has appeared as an important research field to resolve the problems in network security, and secure communications through public and private channels. Text steganography is most challenging because of the presence of very... more
    • by  and +1
    •   2  
      Digital Data HidingText Steganography
During recent years, information security plays major roles with the wide use and development in communications networks. Stronger encryption and decryption represent the important demand in most applications. This strength can be... more
    • by  and +1
    •   4  
      Natural Language ProcessingCryptographyInformation HidingData mining and Text mining
Named Entity Recognition (NER) is a standout research amongst the most imperative ones in information extraction. Furthermore, it is a sub step in many text processing applications. This study uses rule based method for matching Allah's... more
    • by 
    •   2  
      Machine LearningComputational Linguistics
    • by 
The Kufic font takes its name from the location in which the font was created around the end of the seventh century, Kufa, Iraq.  Kufic was the principal script used to replicate the Qur’ans until approximately the eleventh century.... more
    • by 
    • Computer Graphics
A writing system as a set of visible used to represent units of language in a systematic way. Egyptian hieroglyphs were a formal writing system used by the ancient Egyptians that combined logographic and alphabetic elements. In serious... more
    • by 
    • Computer Science
With the rapid development of Internet, safe covert communications in the network environment become an essential research direction. Steganography is a significant means that secret information is embedded into cover data imperceptibly... more
    • by 
    •   3  
      Computer ScienceDigital Data HidingText Steganography