Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Farah Neamah Abbas"'
Publikováno v:
Journal La Multiapp. 3:44-51
Vehicular Ad_hoc Network (VANET) is a sophisticated elegance of devoted cellular network that permits automobiles to intelligently communicate for different roadside infrastructure. VANETs bring with it some of demanding situations associated with Qu
Publikováno v:
International Journal of Engineering Research and Advanced Technology. :01-08
Publikováno v:
Global Journal of Engineering and Technology Advances. 6:018-032
These days, security threats detection, generally discussed to as intrusion, has befitted actual significant and serious problem in network, information and data security. Thus, an intrusion detection system (IDS) has befitted actual important elemen
Publikováno v:
International Journal of Scientific Research in Science, Engineering and Technology. :230-240
The importance of encryption in most organizations, therefore, it became necessary to encrypt data because data security is an essential component in order to maintain the security of data and information in various institutions. Encryption also help
Publikováno v:
International Journal of Engineering Research and Advanced Technology. :01-08
Nowadays, SMS or messaging is a very common way of communication. So, it differs from the apps and instant messaging available but SMS is still one of the broad communication methods as it does not require internet connection and sending inexpensive,
Publikováno v:
Journal of Physics: Conference Series. 2322:012093
This research is inspired by the constraints of the present video steganography methods and to enhance their performance. It contributes its objective via employing the transforming steps to involve the processing of both cover videos and clandestine
Autor:
Zainab Khyioon Abdalrdha, Farah Neamah Abbas, Rasha Thamer Shawe, Salam Ayad Hussein, Ahmed Kareem Ridha
Publikováno v:
Journal of Southwest Jiaotong University. 54
The rapid development of most multimedia technologies led to the creation and transmission of much of this type of data in various fields, including medical, military and commercial, which contain sensitive information that can only be accessed by th
Publikováno v:
International Journal of Engineering Research and Technology. 13:2955