4   Artículos

 
en línea
Ibtisam A. Aljazaery,Haider Th. Salim Alrikabi,Mustafa Rabea Aziz     Pág. pp. 34 - 47
One of the techniques used in information security is the concealment technique, where the information to be hidden within another information medium to be saved in the process of messaging between two sides without detection. In this paper, an algorithm... ver más

 
en línea
Abdul Hadi M. Alaidi,Ibtisam A. Aljazaery,Haider TH. Salim Alrikabi,Ibrahim Nasir Mahmood,Faisal Theyab Abed     Pág. pp. 32 - 40
In Iraq, the number of people who own vehicles has grown up significantly. However, this increment in vehicles number doesn?t accomplished by a study of roads and intersections expansion. As a result, traffic jams became a big problem that led to long wa... ver más

« Anterior     Página: 1 de 1     Siguiente »