Follow
Naeem Th.Yousir
Naeem Th.Yousir
Lecturer Software as a service in Cloud Computing environment , AL-Nahrain University
Verified email at coie-nahrain.edu.iq - Homepage
Title
Cited by
Cited by
Year
Intelligent Enhancement of Organization Work Flow and Work Scheduling Using Machine Learning Approach Tree Algorithm
NTY Tareq Abed Mohammed, Yaser Issam Hamodi
IJCSNS International Journal of Computer Science and Network Security 18 (No …, 2018
4*2018
Development of a Unifying Theory for Data Mining Using Clustering Techniques.
YI Hamodi, RR Hussein, NT Yousir
Webology 17 (2), 2020
32020
Deep Residual Learning Image Recognition Model For Skin Cancer Disease Detection and Classification
SM Jamal Mustafa Al-Tuwaijari, Naeem Th.Yousie, Nafea Ali Majeed Alhammad
Acta Informatica Pragensia 12 (1), 13, 2023
2*2023
Data Mining Approach in Predicting House Price for Automated Property Appraiser Systems
NT Yousir, SM Abdulameer, SA Mostafa
International Conference On Innovative Computing And Communication, 543-554, 2023
12023
Efficiently-managed Cloudly-Secured Mobile User Data Sharing Code Implementation
NT Yousir, S Hasan
Iraqi Journal of Science, 180-184, 2021
12021
Sentiment Analysis for Iraqis Dialect in Social Media Using Machine Learning Algorithms
BM Sabbar, NT Yousir, LA Habeeb
Iraqi Journal of Information and Communications Technology (IJICT) 1 (2), 2018
12018
Single-Camera Computer Vision Algorithm for Robot Shortest Path Estimator using morphological structuring element with variable sizes
SSJ Sami Hasan, Naeem Th.Yousir
International Journal of Engineering and Technology (UAE) 7 (29), 248-254, 2018
1*2018
Optimization of Mobile User Data Sharing on Secure Cloud
NT Yousir
Journal of Fundamental and Applied Sciences ISSN 1112-9867 10 (5s 2018), 183-186, 2018
12018
Virtual Private Multimedia Network Published As Saas (Software As A Servıce) in Cloud Computing Environment
N Thjeel Yousir
Fen Bilimleri Enstitüsü, 2014
12014
Deep Learning Approach for Predicting Prostate Cancer from MRI Images
CW Chun, NT Yousir, SM Abdulameer, SA Mostafa, AA Hezam
Journal of Soft Computing and Data Mining 3 (2), 1-9, 2022
2022
Detecting Compromised User Account Based on User Behavior Analysis
N yousir
Solid State Technology 63 (6), 2020
2020
Spark Architecture and Fractional Artificial Bee Colony-Chaotic Fruitfly RideNN for Big data Classification in Internet of Things
NT Yousir
International Journal of Engineering and Advanced Technology (IJEAT) 9 (ISSN …, 2019
2019
ARTIFICIAL INTELLIGENCE IN THE MANAGEMENT OF THE FIRM
NTYYSZ Yaser Issam Hamodi1
European Journal of Computer Science and Information Technology 3 (ISSN 2054 …, 2018
2018
artificial intelligence in the management of the firm
NTYYSZ Yaser Issam Hamodi1
European Journal of Computer Science and Information Technology 6 (3), 13-23, 2018
2018
Demographic Analysis and Identification of E-Commerce Spending Tendencies
NT Yousir
International Journal of Scientific and Engineering Research (IJSER) - (ISSN …, 2017
2017
E-Government for Modern Municipal Corporation
NT Yousir
International Journal of Database Theory and Application 9 (4), 231-238, 2016
2016
Genetic-Based Multiresolution Noisy Color Image Segmentation
NT Yousir
Al-Nahrain Journal for Engineering Sciences 13 (2), 167-174, 2010
2010
Employing" Mobile Agents (MAs)" In the Internet services
AT Yassin
Journal of Baghdad College of Economic sciences University, 2008
2008
Development of a Unifying Theory for Data Mining using Clustering Techniques
NTY Yaser Issam Hamodi,Ruaa Riyadh Hussein
http://www.webology.org, 0
Security in E-government
SWEB SITES
The system can't perform the operation now. Try again later.
Articles 1–20