Zobrazeno 1 - 10
of 12
pro vyhledávání: '"Nada Hussein M. Ali"'
Autor:
Suaad Ali Abead, Nada Hussein M. Ali
Publikováno v:
Journal of Applied Engineering and Technological Science, Vol 5, Iss 2 (2024)
Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processin
Externí odkaz:
https://doaj.org/article/94fa1c79804e44b490feee54c471260d
Publikováno v:
JOIV: International Journal on Informatics Visualization, Vol 2, Iss 2, Pp 63-67 (2018)
Error correction and error detection techniques are often used in wireless transmission systems. A color image of type BMP is considered as an application of developed lookup table algorithms to detect and correct errors in these images. Decimal Matr
Externí odkaz:
https://doaj.org/article/11089e6106724a3cb0437de9aeaf9492
Autor:
Fatima Faiz Saleh, Nada Hussein M. Ali
Publikováno v:
Iraqi Journal of Science. :3652-3661
Today the Genetic Algorithm (GA) tops all the standard algorithms in solving complex nonlinear equations based on the laws of nature. However, permute convergence is considered one of the most significant drawbacks of GA, which is known as increasing
Publikováno v:
JOIV: International Journal on Informatics Visualization, Vol 2, Iss 2, Pp 63-67 (2018)
Error correction and error detection techniques are often used in wireless transmission systems. A color image of type BMP is considered as an application of developed lookup table algorithms to detect and correct errors in these images. Decimal Matr
Publikováno v:
ICGS3
Wireless networks are the most significant network in these days. There are many types of these networks playing different roles and functions. For instance, Mobile ad-hoc network (MANET) is a set of mobile nodes that communicate with radio links. MA
Publikováno v:
Journal of Information Security and Applications. 58:102798
This paper proposes a lightweight and low energy encryption algorithm to secure voice traffic over wireless networks. The proposed algorithm meets the requirements of voice traffic and is suitable for wireless devices. It is capable to reduce the exe
Autor:
Marwa Emad Mahdi, Nada Hussein M. Ali
Publikováno v:
IOP Conference Series: Materials Science and Engineering. 737:012244
Due to the ever-increasing digitization, the authentication of digital media content is becoming more and more important. Authentication, in general, means deciding whether a digital media is authentic or not, that is, if it matches a given original
Publikováno v:
International Journal of Advanced Computer Science and Applications. 9
This paper proposed different approaches to enhance the performance of the Elliptic Curve Cryptography (ECC) algorithm. ECC is vulnerable to attacks by exploiting the public parameters of ECC to solve Discrete Logarithm Problem (DLP). Therefore, thes
Publikováno v:
International Journal of Computer Applications. 83:1-6
The Advanced Encryption Standard (AES) is using in a large scale of applications that need to protect their data and information. A nonlinear substitution operation is the main factor of the AES cipher system strength. The S-Box component that used i
Publikováno v:
مجلة المنصور. :49