أبحاثي في الجامعة
اضافة بحث جديد
أبحاثي في الجامعة
Title | المجلة/ المؤتمر | سنة النشر |
---|---|---|
Publication Title | المجلة/ المؤتمر | سنة النشر |
A Framework for the Generation of Class Diagram from Text Requirements using Natural language Processing | International Journal of Advanced Trends in Computer Science and Engineering | 2021-02-01 |
Development of Optimized Itinerary Agent Design Pattern Using Ant-Colony Algorithm | International Journal of Advanced Trends in Computer Science and Engineering | 2021-02-01 |
Segmented Block Cipher Algorithm Based on ASCII-Codes Maneuver | ournal of Computer Science | 2017-12-14 |
A NOVEL AUTHENTICATION AND AUTHORIZATION MODEL BASED ON MULTIPLE ENCRYPTION TECHNIQUES FOR ADOPTING SECURE E-LEARNING SYSTEM. | Journal of Theoretical & Applied Information Technology | 2018-03-31 |
Embedded key cryptosystem for cloud computing applications | ACM International Conference Proceeding Series | 2018-06-01 |
Lightweight Cryptosystem for Image Encryption using Auto-Generated Key | Journal of Engineering and Applied Sciences | 2018-08-01 |
Educational Video Classification Using Fuzzy Logic Classifier Based on Arabic Closed Captions | International Conference on Information, Communication and Computing Technology Intelligent Computing Paradigm and Cutting-edge Technologies | 2020-01-18 |
MATHEMATICAL MODEL FOR COMPARING PERFORMANCE EVALUATION OF MOBILE AGENT PLATFORMS | Journal of Theoretical and Applied Information Technology | 2020-01-31 |
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS) | International Journal of Network Security & Its Applications | 2015-05-01 |
Cloud Computing Challenges And Solutions | International Journal of Computer Networks & Communications | 2013-09-01 |
A Robust User Authentication Technique in Online Examination | International Journal of Computing | 2021-12-31 |
Secure communication: A Proposed public key watermark system | International Journal of Information Security and Privacy | 2013-10-01 |
A comparison of data encryption algorithms with the proposed algorithm: Wireless security | The 6th International Conference on Networked Computing and Advanced Information Management | 2010-08-18 |
Copyright protection of relational database systems | Book | 2010-01-01 |
Feature: A secure wifi system for wireless networks: an experimental evaluation | Network Security | 2010-06-01 |
A secure model for building e-learning systems | Network Security | 2012-01-28 |
A formal evaluation of the security schemes for wireless networks | Research Journal of Applied Sciences, Engineering and Technology | 2011-09-20 |
Using a DNA tape as a key for encrypt images | International Journal of Electronic Security and Digital Forensics | 2022-05-30 |
Database Copyright Protection using Watermarking Arabic-Characters | International Journal of Advances in Computer Science and Technology | 2014-11-01 |
Medical Assistance Mobile Service Robot | Iraq University College Journal of Engineering and Applied Sciences | 2022-06-27 |
A message encryption scheme inspired by Sudoku puzzle | International Journal of Information and Computer Security | 2023-08-03 |
Blockchain-Based Secure Transactions | Handbook of Research on Blockchain Technology and the Digitalization of the Supply Chain | 2023-10-15 |
Concerns from Cloud Security Issues: Challenges and Open Problems | International Journal of Advances in Computer Science and Technology | 2023-01-23 |
A new encryption system for IoT devices using embedded key cryptosystem | International Journal of Electronic Security and Digital Forensics | 2023-01-01 |