Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Hazim Noman Abed"'
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 34, Iss 7, Pp 4008-4021 (2022)
Cloud computing is a model that enables users to store their data remotely and enjoy the applications and services provided by this model on demand through a common set of configurable computing resources, without the burden of local data storage as
Externí odkaz:
https://doaj.org/article/aefcc2478eb94b5e8773d43dcf7aca5b
Publikováno v:
Malaysian Journal of Science and Advanced Technology, Vol 1, Iss 3 (2021)
Cloud computing is a model for providing online services. These services can be accessed on a pay-per-use basis from anywhere at any time. However, data security in the cloud has become a very big problem. A major concern about data security is the c
Externí odkaz:
https://doaj.org/article/8767556c5a11438691f5e4cc81928fda
Publikováno v:
Journal of King Saud University - Computer and Information Sciences. 34:4008-4021
Cloud computing is a model that enables users to store their data remotely and enjoy the applications and services provided by this model on demand through a common set of configurable computing resources, without the burden of local data storage as
Publikováno v:
2ND INTERNATIONAL CONFERENCE ON MATHEMATICAL TECHNIQUES AND APPLICATIONS: ICMTA2021.
Autor:
Ahmed Luay Ahmed, Noor Hasan Hassoon, Layla AL.hak, Mahdi Edan, Hazim Noman Abed, Sura Khalil Abd
Publikováno v:
Eastern-European Journal of Enterprise Technologies; Vol. 5 No. 2(119) (2022): Information technology. Industry control systems; 55-61
Eastern-European Journal of Enterprise Technologies; Том 5 № 2(119) (2022): Інформаційні технології. Системи управління в промисловості; 55-61
Eastern-European Journal of Enterprise Technologies; Том 5 № 2(119) (2022): Інформаційні технології. Системи управління в промисловості; 55-61
Most security system's essential errand is to check that the people are in fact who they claim to be. In Contrast to traditional techniques such as passwords and smart cards that are used in some organizations, fingerprint identification may be prefe
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::73acb55e4bf11ea0aaec1942e651e512
https://zenodo.org/record/7361683
https://zenodo.org/record/7361683
Publikováno v:
International Journal of Psychosocial Rehabilitation. 24:2143-2151
Autor:
Hazim Noman Abed
Publikováno v:
Journal of Al-Qadisiyah for computer science and mathematics. 9:1-9
The great development obtained with digital communication system depends on the improvement of the amount and security of transmitting information, the secrecy of data transmitted becomes a main subject for the researcher. Cryptography and Steganogra
Publikováno v:
المجلة العراقية لتكنولوجيا المعلومات. :128
Publikováno v:
ISDA
In recent times, information integration has gained importance in the provision of focused and structured information for more comprehensive purposes in the educational domain. Although the Ministry of Higher Education in Iraq has a Web portal that p