Zobrazeno 1 - 10
of 13
pro vyhledávání: '"Talib M. Jawad"'
Autor:
Nassren A. Alwahed, Talib M. Jawad
Publikováno v:
Iraqi Journal of Information & Communication Technology, Vol 2, Iss 2 (2019)
Abstract Most systems of speaker recognition work on speech feature primarily classified of being a low level which considerably relies on speaker physical characteristics and, to the lower extent, the acquired speaking habits. In this paper present
Externí odkaz:
https://doaj.org/article/99f37e561c0542339757d00dc8060492
Publikováno v:
Iraqi Journal of Science. :249-258
Digital forensic is part of forensic science that implicitly covers crime related to computer and other digital devices. It‟s being for a while that academic studies are interested in digital forensics. The researchers aim to find out a discipline
Publikováno v:
Lecture Notes on Data Engineering and Communications Technologies ISBN: 9783030707125
Dam management systems have risen as the most salient challenge of e-government in Iraq that needs IT infrastructure, data integrity, and user privacy protection versus the internet threats that rendering such critical infrastructures useless. This c
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::31d43cc03736069f6ee25b809bfd6162
https://doi.org/10.1007/978-3-030-70713-2_76
https://doi.org/10.1007/978-3-030-70713-2_76
Autor:
Talib M. Jawad Abbas, Refed A. Jaleel
Publikováno v:
2020 International Conference on Electrical, Communication, and Computer Engineering (ICECCE).
This paper presents and discuss advantage about the design and implementation of Decision Support System by building data mart, which is a place for the storage and participation of data, which users can readily utilize to product improved decisions.
Autor:
Talib M. Jawad Abbas
Publikováno v:
Iraqi Journal of Information & Communications Technology. 1:13-23
Chain of custody plays an important role in determine integrity of digital evidence, because the chain of custody works on a proof that evidence has not been altered or changed through all phases, and must include documentation on how evidence is gat
Publikováno v:
Indonesian Journal of Electrical Engineering and Computer Science. 23:1018
In the present time, dam management is considered one of the important challenges for e-government in Iraq, becuase it needs information technology infrastructure, data integrity and protection of user privacy against Internet threats that render suc
Autor:
Talib M. Jawad, Noor A. Ali
Publikováno v:
Journal of Al-Nahrain University-Science. 19:137-144
Autor:
Talib M. Jawad Abbas
Publikováno v:
Journal of Al-Nahrain University-Science. 18:153-162
With the proliferation of the digital crime around the world, there are numerous and diverse digital forensic investigation models for driving digital investigation processes. Now more than ever, it must be a criminal investigation to obtain digital
Publikováno v:
Journal of Fundamental and Applied Sciences; Vol 10, No 4S (2018): Special Issue; 649-653
This article was withdrawn and retracted by the Journal of Fundamental and Applied Sciences and has been removed from AJOL at the request of the journal Editor in Chief and the organisers of the conference at which the articles were presented (www.ic
Publikováno v:
Journal of Kufa for Mathematics and Computer. 1:57-74
Techniques and applications for information hiding have become increasingly more sophisticated and widespread. With high-resolution digital images as carriers, detecting the presence of hidden messages has also become considerably more difficult. It