Zobrazeno 1 - 10
of 58
pro vyhledávání: '"Siddeeq Y. Ameen"'
Autor:
Zainab Sh. Hammed, Siddeeq Y. Ameen
Publikováno v:
Emitter: International Journal of Engineering Technology, Vol 12, Iss 1 (2024)
Telecommunication has made tremendous improvements in terms of bandwidth, requiring good frequency location, high data rates, and wideband spectrum availability. One solution to these requirements is the millimeter wave frequency band of 30 GHz. Howe
Externí odkaz:
https://doaj.org/article/21e3218f636743f98a7aacdf209edaf5
Publikováno v:
Frontiers in Blockchain, Vol 7 (2024)
Scalability remains a critical challenge for blockchain technology, limiting its potential for widespread adoption in high-demand transactional systems. This paper proposes an innovative solution to this challenge by applying the Snake Optimization A
Externí odkaz:
https://doaj.org/article/9e572e00e8ff4308a5c06a53803c0b14
Publikováno v:
مجلة النهرين للعلوم الهندسية, Vol 12, Iss 1, Pp 1-12 (2009)
The wavelet transform provides good and in many times excellent results when used as a basic block transform in many systems such as electronic, communication, medical and even chemical systems. The paper uses the wavelet packet transform to adjust t
Externí odkaz:
https://doaj.org/article/d1394fa6591c4a6187cf5a368d6df785
Publikováno v:
مجلة النهرين للعلوم الهندسية, Vol 10, Iss 1, Pp 1-10 (2008)
Digital ciphering of speech signals based on one of modern cryptography algorithms, called the Rijndael algorithm, is studied and presented in this paper. The algorithm meets most of the requirements of security level in recent applications. A system
Externí odkaz:
https://doaj.org/article/0846e381ee224ab6a02eb68610d03af0
Autor:
Siddeeq Y. Ameen, Salih H. Ali
Publikováno v:
Journal of Engineering and Sustainable Development, Vol 11, Iss 1 (2007)
Quantum cryptography is anew branch of physics and cryptography which exploit quantum mechanical phenomena to guarantee the secrecy of cryptographic keys. This paper introduces the basic concepts, problems and methods of quantum key distribution. It
Externí odkaz:
https://doaj.org/article/f8fa0b604e9241d39b784444dd3dcd80
Autor:
Siddeeq Y. Ameen, Alaa N. Al-Qeicy
Publikováno v:
Journal of Engineering and Sustainable Development, Vol 10, Iss 1 (2006)
The topological design of networks in this work consists of finding a topology (directed and undirected links flow) that improve both the reliability index and increase the available shortest paths in the network without overloading the routing table
Externí odkaz:
https://doaj.org/article/f8283df1f30140bcb1b1798009a92686
Publikováno v:
Journal of Engineering and Sustainable Development, Vol 9, Iss 2 (2005)
The paper proposes a way for the implementation the Advanced Encryption Standard (AES), by matching the algorithm requirements with the hardware (specifically the Xilinx FPGA's) requirements. The aim from the new proposal was an implementation that i
Externí odkaz:
https://doaj.org/article/f1b514d0b0a0440e8582ed5537fba6ca
Autor:
Siddeeq Y. Ameen, Dilkhaz Y. Mohammed
Publikováno v:
European Journal of Engineering and Technology Research. 7:18-21
Third-party libraries are frequently utilized to save implementation time when developing new software. The significance of libraries in the creation of mobile applications cannot be overstated. Others can use the programmer's library created and sha
Publikováno v:
International Journal of Computers and Communications. 15:84-88
The paper presents two approaches for destroying steganogrphy content in an image. The first is the overwriting approach where a random data can be written again over steganographic images whereas the second approach is the denoising approach. With t
Autor:
Awder Mohammed Ahmed, Dindar Mikaeel Ahmed, Naaman Omar, Azar Abid Salih, Hajar Maseeh Yasin, Dakhaz Mustafa Abdullah, Shakir Fattah Kak, Zryan Najat Rashid, Ibrahim Mahmood Ibrahim, Siddeeq Y. Ameen
Publikováno v:
Asian Journal of Research in Computer Science. :33-52
Whether it's for work or personal well-being, keeping secrets or private information has become part of our everyday existence. Therefore, several researchers acquire an entire focus on secure transmitting secret information. Confidential information