Issue 03

 

Recent Submissions

  • Al-Emran,Mostafa (2015)
    Q-learning is a one of the well-known Reinforcement Learning algorithms that has been widely used in various problems. The main contribution of this work is how to speed up the learning in a single agent environment (e.g. ...
  • Khan,Salman A. (2015)
    Playfair cipher is an interesting data encryption technique with a medium level of complexity, and therefore, is suitable for security of wireless and mobile systems. Different sizes of the matrices used for key have been ...
  • Ahmed, Hany Hashem; Kelash, Hamdy M.; Tolba, Maha S.; ELRashidy, Mohammed A. . (2015)
    Nowadays Biometric plays vital role in many applications. It is defined as the credentials of people based on their physiological or behavioral characteristics. Biometric recognition can be classified into various types ...
  • Jumaah, Alaa K.; Al-Janabi, Sufyan; Ali, Nazar Abedlqader (2015)
    Many privacy preserving data mining algorithms attempt to hide what database owners consider as sensitive. Specifically, in the association rules domain, many of these algorithms are based on item restriction methods; that ...
  • Al-Naima, Fawzi M.; Hasan, Mohannad M. (2015)
    This paper presents a fuel dispensing system based on RFID technology. The system can improve the fueling process in order to make it much easier, secure and reliable. It prevents unauthorized fueling by assigning a specified ...

All Journals


Advanced Search

Browse

Administrator Account