Zobrazeno 1 - 10
of 20
pro vyhledávání: '"Wafaa Mustafa Abduallah"'
Publikováno v:
Eurasian Journal of Science and Engineering, Vol 8, Iss 3, Pp 188-203 (2022)
The safety and security of newborns in hospitals is one of the most common problems in the world. There are many problems related to the security of children, such as cases of Kidnapping and exchange of children in hospitals and public places. In thi
Externí odkaz:
https://doaj.org/article/8a851347bcfb414497589f5a5d0deb80
Autor:
Bashar Ahmed Khalaf, Salama A. Mostafa, Aida Mustapha, Mazin Abed Mohammed, Wafaa Mustafa Abduallah
Publikováno v:
IEEE Access, Vol 7, Pp 51691-51713 (2019)
Until now, an effective defense method against Distributed Denial of Service (DDoS) attacks is yet to be offered by security systems. Incidents of serious damage due to DDoS attacks have been increasing, thereby leading to an urgent need for new atta
Externí odkaz:
https://doaj.org/article/1be0d755702b4b95aef21c672cb15236
Publikováno v:
International Journal of Computers and Applications. :1-7
ElGamal Cryptosystem (EC) is a non-deterministic scheme which produces different outputs for the same input, making the cryptosystem more secure. On the other hand, the efficiency of its cryptosyst...
Publikováno v:
Pattern Recognition Letters. 125:85-90
The severity of acute lymphoblastic leukemia depends on the percentages of blast cells (abnormal white blood cells) in bone marrow or peripheral blood. The manual microscopic examination of bone marrow is less accurate, time-consuming, and susceptibl
Publikováno v:
International Journal of Computing and Digital Systems. 8:497-504
Autor:
Wafaa Mustafa Abduallah, Salama A. Mostafa, Mazin Abed Mohammed, Aida Mustapha, Bashar Ahmed Khalaf
Publikováno v:
IEEE Access, Vol 7, Pp 51691-51713 (2019)
Until now, an effective defense method against Distributed Denial of Service (DDoS) attacks is yet to be offered by security systems. Incidents of serious damage due to DDoS attacks have been increasing, thereby leading to an urgent need for new atta
Publikováno v:
2020 International Conference on Computer Science and Software Engineering (CSASE).
In this paper, a new method of secured reversible data hiding that depends on modified pixel expansion has been proposed. The coloured image is divided into three layers (red, green, and blue); then, the blue-layer will be selected as a cover-media f
Publikováno v:
Academic Journal of Nawroz University. 6:83-88
People are always looking for secure methods to protect valuable information against unauthorized access or use. That's why; disciplines like cryptography and steganography are gaining a great interest among researchers. Recent steganographic techniq
Publikováno v:
Academic Journal of Nawroz University. 6:101-105
The transformation of vast amount of information through the network channels appeared widely from one site to another and these information may be disclosed to the third party or the attackers. Thus, the protection process of transformed information
Publikováno v:
Academic Journal of Nawroz University. 6:59-63
People are getting more concerned to protect their houses from unauthorized people, the status of the house environment like temperature, humidity, gas leakage and fire. The proposed system can monitor a house by use of sensors that are integrated wi