Zobrazeno 1 - 10
of 64
pro vyhledávání: '"Ali Makki Sagheer"'
Publikováno v:
Algorithms, Vol 17, Iss 6, p 229 (2024)
One of the most essential components of human life is sleep. One of the first steps in spotting abnormalities connected to sleep is classifying sleep stages. Based on the kind and frequency of signals obtained during a polysomnography test, sleep pha
Externí odkaz:
https://doaj.org/article/a315747c34eb449d8a5e697818a0ac73
Publikováno v:
Baghdad Science Journal, Vol 21, Iss 1 (2024)
Blockchain is an innovative technology that has gained interest in all sectors in the era of digital transformation where it manages transactions and saves them in a database. With the increasing financial transactions and the rapidly developed socie
Externí odkaz:
https://doaj.org/article/7b9ed4b0ae0542368444074e0437f607
Publikováno v:
Iraqi Journal for Computer Science and Mathematics, Vol 4, Iss 2 (2023)
Electronic voting has become popular in democratic countries, and thus the cyber security of this system is demanded. In this paper, some attacks were made on a proposed electronic election model based on blockchain technology, where the impact of ea
Externí odkaz:
https://doaj.org/article/61767cb5e5ff42848684cd1d1d1e8b73
Publikováno v:
Ibn Al-Haitham Journal for Pure and Applied Sciences, Vol 2021, Pp 82-95 (2021)
Big data usually running in large-scale and centralized key management systems. However, the centralized key management systems are increasing the problems such as single point of failure, exchanging a secret key over insecure channels, third-party q
Externí odkaz:
https://doaj.org/article/41cb7aa741d04086bc6652e625b06708
Publikováno v:
Mendel, Vol 27, Iss 2 (2021)
Computer-aided diagnosis methods are being developed to assist radiologists to improve the interpretation of mammograms for the detection and diagnose of breast cancer, reduce the errors and mistakes made by human beings. In addition, it provides a m
Externí odkaz:
https://doaj.org/article/0a57794d267343eb8e1af8cb6ae792f2
Publikováno v:
Iraqi Journal for Computers and Informatics, Vol 43, Iss 1, Pp 44-48 (2017)
With development, technology, computer science, computer networks and transmission of multimedia between two or more parts, a security of multimedia becomes an essential issue since most of the systems became easy to attack. In this newspaper, we sug
Externí odkaz:
https://doaj.org/article/b7765e29c0b640c783498578c408184f
Autor:
Ammar Hammad Ali, Ali Makki Sagheer
Publikováno v:
Iraqi Journal for Computers and Informatics, Vol 43, Iss 1, Pp 22-27 (2017)
In this paper, a secure chatting application with end to end encryption for smart phones that used the android OS has been proposed. This is achieved by the use of public key cryptography techniques. The proposed application used the Elliptic Curve
Externí odkaz:
https://doaj.org/article/9f4367a647054cfb94a3c455ccf7deb1
Publikováno v:
مجلة جامعة الانبار للعلوم الصرفة, Vol 2, Iss 3, Pp 81-91 (2012)
ABSTRACT:Digital data stored in computers or transmitted over computer networks are constantly subject to error due to the physical medium in which they are stored or transmitted. Error-correction codes are means of introducing redundancy in the data
Externí odkaz:
https://doaj.org/article/8c4225e0f9184b6da759ddf58783e315
Autor:
null Daniah Abul Qahar Shakir, null Ahmad Salim, null Seddiq Q. Abd Al-Rahman, null Ali Makki Sagheer
Publikováno v:
Journal of Techniques. 5:122-128
In the age of the Internet, a lot of images are circulated among users, and some of these images contain financial or personal information that requires confidentiality. Encryption algorithms existed for a long time, and the data used was focused on
Publikováno v:
Baghdad Science Journal.
Blockchain is an innovative technology that has gained interest in all sectors in the era of digital transformation where it manages transactions and saves them in a database. With the increasing financial transactions and the rapidly developed socie