Article |
2020 |
Linear and nonlinear stochastic distribution for consensus problem in multi-agent systems. Linear and nonlinear stochastic distribution for consensus problem in multi-agent systems
, 32
(1)
pp.261-277
|
2020 |
Image De-Noising techniques: a comparative study. Journal of Advanced Computer Science And Technology Research
, 10
(2)
pp.21-37
|
2020 |
A proposed de-noising algorithm. The International Journal on Perceptive and Cognitive Computing (IJPCC)
, 6
(2)
pp.90-96
|
2019 |
Editorial: mobile networks in the era of big data. Mobile Networks and Applications
, 24
(4)
pp.1135-1138
|
2019 |
Increasing the runs in compressed data using a dedicated move to front algorithm. Journal of Computational and Theoretical Nanoscience
, 16
(3)
pp.903-906
|
2019 |
Optimal path planning for urban vehicles using
Internet of Things: a new navigation perspective. Journal of Computational and Theoretical Nanoscience
, 16
(3)
pp.1074-1080
|
2019 |
Detection of cracked digitized paintings and manuscripts
based on threshold techniques. Journal of Computational and Theoretical Nanoscience
, 16
(3)
pp.1108-1113
|
2019 |
The influence of Internet and social media on purchasing
decisions in Indonesia and a comparison between
Indonesia and Kuwait. Journal of Computational and Theoretical Nanoscience
, 16
(3)
pp.1029-1034
|
2019 |
Theoretical review of routing protocols used for
wireless community networks. Journal of Computational and Theoretical Nanoscience
, 16
(9)
pp.3656-3662
|
2019 |
A special issue on disruptive technologies: shaping the future of the industry. Journal of Computational and Theoretical Nanoscience
, 16
(3)
pp.799-799(1)
|
2019 |
Consensus algorithms blockchain: a comparative
study. International Journal on Perceptive and Cognitive Computing (IJPCC)
, 5
(2)
pp.66-71
|
2019 |
The scalability challenge of the blockchain:
a review. Journal of Advanced Computer Science and Technology Research
, 9
(2)
pp.13-19
|
2019 |
Emerging solutions in big data and cloud technologies for mobile networks. Mobile Networks and Applications
, 24
(3)
pp.1015-1017
|
2019 |
Neural network and principle component analysis
based numerical data analysis for stock market
prediction with machine learning techniques. Journal of Computational and Theoretical Nanoscience
, 16
(3)
pp.806-812
|
2019 |
Identifying skylines in cloud databases with incomplete data. Journal of Information and Communication Technology
, 18
(1)
pp.19-34
|
2018 |
Improving the cost factor of DLBCA lightweight block cipher algorithm. Indonesian Journal of Electrical Engineering and Computer Science
, 10
(2)
pp.786-791
|
2018 |
The influence of internet and social media on purchasing
decisions in Kuwait. Indonesian Journal of Electrical Engineering and Computer Science
, 10
(2)
pp.792-797
|
2018 |
A novel secret key generation based on image link. International Journal of Engineering and Technology
, 7
(2.5)
pp.23-26
|
2018 |
A scientific review of soft-computing techniques and methods
for stock market prediction. International Journal of Engineering and Technology
, 7
(2.5)
pp.27-31
|
2018 |
Analysis the components of SNOW 3G and ZUC ciphers in mobile systems. International Journal of Engineering & Technology
, 7
(4.15)
pp.519-523
|
2018 |
On randomness of compressed data using non-parametric
randomness tests. Bulletin of Electrical Engineering and Informatics
, 7
(1)
pp.63-69
|
2018 |
Implementation of dynamic fuzzy logic control of traffic
light with accident detection and action system using iTraffic simulation
Simulation. Indonesian Journal of Electrical Engineering and Computer Science
, 10
(1)
pp.100-109
|
2018 |
Multi-level of feature extraction and classification for X-Ray medical image. Indonesian Journal of Electrical Engineering and Computer Science
, 10
(1)
pp.154-167
|
2018 |
Technical approach in text mining for stock market prediction: a systematic review. Indonesian Journal of Electrical Engineering and Computer Science
, 10
(2)
pp.770-777
|
2018 |
A model for skyline query processing in a partially complete database. Advanced Science Letters
, 24
(2)
pp.1339-1343
|
2018 |
Using pre-determined patterns to analyze the common behavior of compressed data and their compressibility apeal. International Journal of Engineering & Technology
, 7
(2 (Special Issue 34))
pp.34-38
|
2018 |
Detection and restoration of cracked digitized paintings and
manuscripts using image processing. International Journal of Engineering & Technology
, 7
(2.34)
pp.39-43
|
2018 |
A review of steganographic methods and techniques. International Journal on Perceptive and Cognitive Computing (IJPCC)
, 4
(1)
pp.1-6
|
2017 |
A web and software-based approach blending social networks for online Qur'anic Arabic learning. The International Arab Journal of Information Technology
, 14
(1)
pp.80-90
|
2017 |
The influence of internet and social media on
purchasing decisions in Egypt and a comparison
between Egypt and Kuwait. International Journal of Computer Applications
, 178
(5)
pp.26-32
|
2017 |
Input significance analysis: feature ranking through synaptic weights manipulation for ANNS-based classifiers. Journal of Fundamental and Applied Sciences
, 9
(4S)
pp.639-662
|
2017 |
Input significance analysis: Feature selection through synaptic weights manipulation for EFuNNs classifier. Journal of Fundamental and Applied Sciences
, 9
(4S)
pp.681-709
|
2017 |
Reach a nonlinear consensus for MAS via doubly stochastic quadratic operators. International Journal of Control
, 90
(7)
pp.1-29
|
2017 |
Processing skyline queries in incomplete database: issues,
challenges and future trends. Journal of Computer Science
, 13
(11)
pp.590-601
|
2017 |
Analyzing brainwaves while listening to Quranic recitation compared with listening to music based on EEG signals. International Journal on Perceptive and Cognitive Computing (IJPCC)
, 3
(1)
pp.1-5
|
2017 |
A symmetric cryptosystem based on nondeterministic finite automata. Journal of Theoretical and Applied Information Technology ( JATIT )
, 95
(6)
pp.1489-1498
|
2017 |
A comparative performance analysis of modified DÓ§mÓ§si’s cryptosystem and data encryption standard. International Journal on Perceptive and Cognitive Computing (IJPCC)
, 3
(1)
pp.11-14
|
2017 |
Detection and restoration of cracked digitized paintings and
manuscripts using image processing - a survey. International Journal on Perceptive and Cognitive Computing
, 3
(2)
pp.1-6
|
2016 |
Analysis randomness properties of basic components of SNOW 3G cipher in mobile systems. International Journal on Perceptive and Cognitive Computing
, 2
pp.12-16
|
2016 |
Lightweight block cipher algorithms: review paper. International Journal of Enhanced Research in Science, Technology & Engineering
, 5
(5)
pp.136-143
|
2016 |
Emotion detection using physiological signals EEG & ECG. International Journal of Advancements in Computing Technology (IJACT)
, 8
(3)
pp.103-112
|
2016 |
Data recovery and business continuity in cloud computing: a review of the research literature. International Journal of Advancements in Computing Technology(IJACT)
, 8
(5)
pp.80-94
|
2016 |
Security and performance analysis of SCDSP. International Journal on Perceptive and Cognitive Computing (IJPCC)
, 2
(1)
pp.27-33
|
2016 |
Performance and security improvements of DÓ§mÓ§si’s cryptosystem. International Journal of Applied Mathematics and Statistics
, 55
(2)
pp.32-45
|
2016 |
An overview of cryptosystems based on finite automata. Journal of Advanced Review on Scientific Research
, 27
(1)
pp.1-7
|
2016 |
A framework for evaluating skyline queries over incomplete data. Procedia Computer Science
, 94
pp.191-198
|
2016 |
A new block cipher based on finite automata systems. International Journal on Perceptive and Cognitive Computing (IJPCC)
, 2
(1)
pp.23-26
|
2015 |
A new design of cryptographic hash function: gear
. International Journal on Perceptive and Cognitive Computing (IJPCC)
, 1
(1)
pp.29-34
|
2015 |
A new design of cryptographic hash function: gear. International Journal on Perceptive and Cognitive Computing (IJPCC)
, 1
(1)
pp.29-34
|
2015 |
CERT team involving GEs structured. International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences
, 3
(3)
pp.12-26
|
2015 |
CERT Technologies. International Journal of Innovation in Science and Mathematics
, 3
(6)
pp.275-282
|
2015 |
An adequate approach to image retrieval based on local level feature extraction . Mehran University Research Journal of Engineering & Technology
, 34
(4)
pp.337-348
|
2015 |
SCDSP: a novel stream cipher with dynamic structure and parameters. International Journal of Advancements in Computing Technology (IJACT)
, 7
(5)
pp.49-56
|
2015 |
Blogging: a new platform for spreading rumors!. CCIT Journal
, 9
(1)
pp.71-76
|
2014 |
Key-dependent s-box in lightweight block ciphers. Journal of Theoretical and Applied Information Technology
, 62
(2)
pp.554-559
|
2014 |
Kuwait government entities e-business continuity and
disaster recovery plan. Journal of Advanced Computer Science and Technology Research (JACSTR)
, 4
(3)
pp.62-75
|
2014 |
Comparative study on 4G/LTE cryptographic algorithms based on different factors. International Journal of Computer Science and Telecommunications
, 5
(7)
pp.7-10
|
2013 |
EEG emotion recognition based on the dimensional models of emotions. Procedia - Social and Behavioral Sciences
, 97
pp.30-37
|
2013 |
A new algorithm for human face detection using skin color tone. IOSR-Journal of Computer Engineering
, 11
(6)
pp.31-38
|
2013 |
MOIM: a novel design of cryptographic hash function. International Journal of Computer Engineering & Technology (IJECT)
, 4
(4)
pp.1-19
|
2013 |
Hash function of finalist SHA-3: analysis study. International Journal of Advanced Computer Science and Information Technology
, 2
(2)
pp.1-12
|
2013 |
Evaluation of usability problems of labor portal in Saudi Arabia. International Journal of Advanced Computer Science and Information Technology
, 2
(1)
pp.14-25
|
2013 |
Broad view of cryptographic hash functions. International Journal of Computer Science Issues (IJCSI)
, 10
(4)
pp.239-246
|
2013 |
Affective computing model using source-temporal domain. Procedia - Social and Behavioral Sciences
, 97
pp.54-62
|
2013 |
The ethical dilemma of software piracy: an inquiry from
an Islamic perspective. Creative Communication and Information Technology
, 7
(1)
pp.59-76
|
2013 |
Achieving security by combining Huffman and SLSB algorithms. Journal of Advanced Computer Science and Technology Research (JACSTR)
, 3
(4)
pp.163-172
|
2013 |
Comparative study between traffic control methods
Using simulation software
. International Journal of Machine Learning and Computing (IJMLC)
, 3
(5)
pp.424-429
|
2013 |
Emotion recognition model using source-temporal features and fuzzy. Lecture Notes in Computer Science (LNCS)
, 8226
(1)
pp.577-584
|
2012 |
Rational drug design using genetic algorithm: case of malaria disease. Journal of Emerging Trends in Computing and Information Sciences
, 3
(7)
pp.1093-1102
|
2012 |
Protection of the texts using Base64 and MD5. Journal of Advanced Computer Science and Technology Research(JACSTR)
, 2
(1)
pp.22-34
|
2012 |
Achieving security for images by LSB and MD5. Journal of Advanced Computer Science and Technology Research(JACSTR)
, 2
(3)
pp.127-139
|
2012 |
Designing a smart city in Kuwait: an initial study. Journal of Advanced Computer Science and Technology Research (JACSTR)
, 2
(3)
pp.116-126
|
2012 |
Smart cities: a survey. Journal of Advanced Computer Science and Technology Research (JACSTR)
, 2
(2)
pp.79-90
|
2012 |
Lightweight block ciphers: A comparative study. Journal of Advanced Computer Science and Technology Research(JACSTR)
, 2
(4)
pp.159-165
|
2011 |
A practical method for the analysis of genetic algorithms. Journal of Advanced Computer Science and Technology Research(JACSTR)
, 1
( )
pp.1-9
|
2011 |
Security threats of finger print biometric in network system environment. Journal of Advanced Computer Science and Technology Research (JACSTR)
, 1
(1)
pp.36-51
|
2011 |
An improved genetic algorithm for solving the multiprocessor scheduling problem. Australian Journal of Basic and Applied Sciences
|
2011 |
Frequencies determination of characters for Bahasa Melayu:
results of preliminary investigation
. Procedia - Social and Behavioral Sciences
, 27
pp.233-240
|
2006 |
Genetic-local hybrid optimizer for solving advance layout problem. Journal of Al Rafidain University College
, 8
(19)
pp.87-98
|
2006 |
Comparison between Lamarckian Evolution and Baldwin Evolution of neural network. Journal of Al Rafidain University College
, 8
(19)
pp.217-232
|
2006 |
New statistical Binary Random Test. Journal of Al Rafidain university college
, 8
(18)
pp.81-101
|
2004 |
Protecting an Internet Web File using Java. Journal of Al Rafidain University College- Iraq
, 7
(15)
pp.51-60
|
Conference or Workshop Item |
2019 |
XMIAR: X-ray medical image annotation and retrieval.
In: Computer Vision Conference, CVC 2019
|
2018 |
Scientific research in view of Quran and the creation of Allah s.w.t..
In: International Conference on Computer Assisted Systems in Health (CASH 2018)
|
2018 |
Disaster recovery in single-cloud and multi-cloud
environments: Issues and challenges.
In: The 4th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS)
|
2018 |
Scientific research in view of Quran and the creation of Allah s w t.
In: Seminar of Information Retrieval and knowledge management SIRKM 2018
|
2018 |
Structure of research proposal.
In: Postgraduate Development Program (Package 2)
|
2018 |
Cryptocurrency vs fiat currency: Architecture, algorithm, cashflow & ledger technology on emerging economy subtitle: The influential facts of cryptocurrency and fiat currency.
In: 2018 International Conference on Information and Communication Technology for the Muslim World (ICT4M)
|
2017 |
Analysis of confidentiality algorithms in different mobile generations.
In: 1st International Conference of Cihan University-Erbil on Communication Engineering and Computer Science (CIC-COCOS’17)
|
2017 |
A practical and interactive web-based software for online Qur’anic Arabic learning.
In: 6th International Conference on Information and Communication Technology for the Muslim World (ICT4M 2016)
|
2017 |
Skyline query processing for incomplete data in cloud environment.
In: The 6th International Conference on Computing and Informatics, ICOCI 2017
|
2016 |
Mobile technology generations and cryptographic algorithms: analysis study.
In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015)
|
2016 |
Automatic emotion recognition based on EEG and ECG signals while listening to quranic recitation compared with listening to music.
In: 6th International Conference on Information and Communication Technology for the Muslim World (ICT4M 2016)
|
2016 |
Computational properties of Watson-Crick context-free grammars.
In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015)
|
2016 |
A practical and interactive web-based software for online Qur'anic Arabic learning.
In: 2016 6th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2016)
|
2016 |
A performance improvement of Dömösi’s cryptosystem.
In: Progress in Applied Mathematics in Science and Engineering 2015
|
2016 |
Enhancing lightweight block cipher algorithm OLBCA through decreasing cost factor.
In: 4th International Conference on Advanced Computer Science Applications and Technologies, ACSAT 2015
|
2016 |
EEG-based emotion recognition while listening to Quran recitation compared with relaxing music using Valence-arousal model.
In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies
|
2016 |
Statistical analysis of the eSTREAM competition winners.
In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015)
|
2016 |
Statistical approach for a complex emotion recognition based on EEG features.
In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015)
|
2015 |
A performance improvement of Domosi’s cryptosystem .
In: 2015 Progress in Applied Mathematics in Science and Engineering (PIAMSE)
|
2015 |
Enhancing lightweight block cipher algorithm OLBCA
through decreasing cost factor.
In: 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015
|
2014 |
HISEC: a new lightweight block cipher algorithm.
In: The 7th International Conference on Security of Information and Networks (SIN'14)
|
2014 |
Feature ranking through weights manipulations for artificial neural networks-based classifiers.
In: 2014 Fifth International Conference on Intelligent Systems, Modelling and Simulation (ISMS 2014)
|
2014 |
Feature ranking through weights manipulations for artificial neural networks-based classifiers.
In: 2014 Fifth International Conference on Intelligent Systems, Modelling and Simulation (ISMS 2014)
|
2014 |
A study on the effects of EEG and ECG signals while listening to Qur’an recitation.
In: 2014 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014)
|
2014 |
A study on the effects of EEG and ECG signals while listening to Qur'an recitation.
In: 2014 the 5th International Conference on Information and Communication Technology for the Muslim World, ICT4M 2014
|
2014 |
Design and analysis of a new hash function gear.
In: 7th International Conference on Security of Information and Networks (SIN'14)
|
2014 |
A cognitive-affective measurement model based on the 12-point affective circumplex.
In: 2014 3rd International Conference on Advanced Computer Science Applications and Technologies
|
2014 |
A survey of intrusion detection system using case study Kuwait governments entiteis.
In: Advanced Computer Science Applications and Technologies (ACSAT), 2014 3rd International Conference
|
2014 |
CMAC-based computational model of affects (CCMA) for profiling emotion from EEG signals.
In: 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014)
|
2014 |
Comparative study of some symmetric ciphers in mobile systems.
In: 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014)
|
2014 |
Brain & heart from computer science perspective.
In: 3rd International Conference on Advanced Computer Science Applications and Technologies – ACSAT2014
|
2014 |
OLBCA: a new lightweight block cipher algorithm.
In: 3rd International Conference on Advanced Computer Science Applications and Technologies – ACSAT2014
|
2014 |
Security risk analysis used by Kuwait government sectors .
In: 3rd International Conference on Advanced Computer Science Applications and Technologies – ACSAT2014
|
2014 |
Cyber-attacks detection & protection in Kuwait government
sectors.
In: 3rd International Conference on Advanced Computer Science Applications and Technologies – ACSAT2014
|
2014 |
A study on the effects of EEG and ECG signals while listening to Qur'an recitation.
In: 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014)
|
2014 |
Dynamic linear feedback shift registers: a review.
In: 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014)
|
2013 |
Similarities and dissimilarities between character frequencies of written text of Melayu, English and Indonesian languages .
In: 2103 International Conference of Advanced Computer Science Applications and Technologies (ACSAT)
|
2013 |
SVG and Arabic font challenges and improvements.
In: 5th International Conference on Information and Communication Technology for the Muslim World
|
2013 |
A new fragile digital watermarking technique for a PDF digital Holy Quran.
In: 2013 International Conference on Advanced Computer Science Applications and Technologies (ACSAT)
|
2013 |
Setting-up a sulh-based, community mediation-type of online dispute resolution (ODR) in Malaysia.
In: 5th International Conference on Information and Communication Technology for the Muslim World
|
2013 |
Protection of the digital Holy Quran hash digest by using cryptography algorithms.
In: 2nd International Conference on Advanced Computer Science Applications and Technologies (ACSAT2013)
|
2013 |
Protection of the digital holy Quran using SAB hash function.
In: International Conference on Islamic Applications in Computer Science and Technologies
|
2013 |
e-Business continuity and disaster recovery plan case study: Kuwait government entities (GEs).
In: 2nd International Conference on Advanced Computer Science Applications and Technologies (ACSAT2013)
|
2013 |
Improving the security of LBlock lightweight algorithm using bit permutation.
In: 2nd International Conference on Advanced Computer Science Applications and Technologies (ACSAT2013)
|
2013 |
Improving PRESENT lightweight algorithms.
In: 2nd International Conference on Advanced Computer Science Applications and Technologies (ACSAT2013)
|
2013 |
Cryptographic hash function: A high level view.
In: International Conference on Informatics and Creative Multimedia (ICICM), 2013
|
2013 |
Joux multicollisions attack in sponge construction.
In: 6th International Conference on Security of Information and Networks
|
2013 |
Multicollisions in sponge construction.
In: International Conference on Informatics and Creative Multimedia (ICICM), 2013
|
2012 |
Protection of text using SHA1 and Base64.
In: 3rd International Conference on Cryptology and Computer Security 2012
|
2012 |
Protection of integrity and ownership of pdf documents using invisible signature.
In: 14th International Conference on Computer Modelling and Simulation (UKSim)
|
2012 |
Traffic management system based on wsn in Kuwait: an initial design.
In: International Conference on Informatics and Applications 2012
|
2012 |
Comparative study on content-based image retrieval CBIR).
In: International Conference on Advanced Computer Science Applications and Technologies
|
2012 |
Quality evaluation of “safeer” portal for Saudi students studying abroad .
In: International Conference on Advanced Computer Science Applications and Technologies
|
2012 |
Security of present s-box.
In: International Conference on Advanced Computer Science Applications and Technologies
|
2012 |
An improved full search block matching algorithm for imaging applications.
In: International Conference on Computer and Communication Engineering (ICCCE 2012)
|
2012 |
An anatomy of IGP and BGP routing protocols.
In: International Conference on Advanced Computer Science Applications and Technologies
|
2012 |
Comparison and analysis study of sha-3 finallists.
In: International Conference on Advanced Computer Science Applications and Technologies
|
2011 |
Frequencies determination of characters for Bahasa Melayu: results of preliminary investigation.
In: 12th Conference of the Pacific Association for Computational Linguistics (PACLING 2011)
|
1999 |
A genetic algorithm for the cryptanalysis of Chor-Rivest knapsack public key cryptosystem (PKC).
In: Third International Conference on Computational Intelligence and Multimedia Applications. ICCIMA'99
|
Book Section |
2015 |
Cryptographic hash function: a high level view.
In: Threat Detection and Countermeasures in Network Security
IGI Global
. ISBN 978-1-4666-6583-5
, pp.80-94
|
2015 |
Cryptographic hash function: a high level view.
In: Threat Detection and Countermeasures in Network Security
IGI Global
. ISBN 978-1-4666-6583-5
, pp.80-94
|
2011 |
Introduction.
In: Cryptography: past, present and future
IIUM Press
. ISBN 9789674181130
, pp.65-72
|
2011 |
The use of genetic algorithm in autonomous robot navigation .
In: Computer applications: theories and applications
IIUM Press
. ISBN 978-967-418-107-9
, pp.3-13
|
2011 |
Message Digest (MDx) family.
In: Cryptography: past, present and future
IIUM Press
. ISBN 9789674181130
, pp.73-80
|
2011 |
In-silico drug target design & its approaches .
In: Computer Applications: Theories and Applications
IIUM Press
. ISBN 978-967-418-107-9
, pp.15-26
|
2011 |
SHA family hash function.
In: Cryptography: past, present and future
IIUM Press
. ISBN 9789674181130
, pp.81-87
|
2011 |
RIPEMD and Chameleon hash function.
In: Cryptography: past, present and future
IIUM Press
. ISBN 9789674181130
, pp.89-96
|
2011 |
Molecular docking .
In: Computer applications: Theories and applications
IIUM Press
. ISBN 978-967-418-107-9
, pp.37-44
|
2011 |
The use of genetic algorithm in improving medical image segmentation techniques .
In: Computer applications: Theories and applications
IIUM Press
. ISBN 978-967-418-107-9
, pp.45-55
|
2011 |
Rivest-Shamir-Adleman (RSA).
In: Cryptography: past, present and future
IIUM Press
. ISBN 9789674181130
, pp.99-105
|
2011 |
Protection mechanisms using MD5 and Base64.
In: Computer Applications: Theories and Applications
IIUM Press
. ISBN 978-967-418-107-9
, pp.59-69
|
2011 |
Developed system for Quran protection using MD5 and Base64 .
In: Computer applications: Theories and applications
IIUM Press
. ISBN 978-967-418-107-9
, pp.71-84
|
2011 |
Protection mechanisms using LSB and MD5 .
In: Computer applications: Theories and applications
IIUM Press
. ISBN 978-967-418-107-9
, pp.85-98
|
2011 |
Cryptanalysis of RSA.
In: Cryptography: past, present and future
IIUM Press
. ISBN 9789674181130
, pp.107-112
|
2011 |
Developed system for Quran protection using LSB replacement and MD5 .
In: Computer applications: Theories and applications
IIUM Press
. ISBN 978-967-418-107-9
, pp.99-109
|
2011 |
Digital signature algorithm.
In: Cryptography: past, present and future
IIUM Press
. ISBN 9789674181130
, pp.113-115
|
2011 |
Background of zero-knowledge proof.
In: Cryptography: past, present and future
IIUM Press
. ISBN 9789674181130
, pp.117-120
|
2011 |
Interactive proof systems.
In: Cryptography: past, present and future
IIUM Press
. ISBN 9789674181130
, pp.121-126
|
2011 |
Zero-knowledge-proof.
In: Cryptography: past, present and future
IIUM Press
. ISBN 9789674181130
, pp.127-132
|
2011 |
Feige-Fiat-Shamir identification scheme.
In: Cryptography: past, present and future
IIUM Press
. ISBN 9789674181130
, pp.133-138
|
2011 |
Introduction.
In: Cryptography: past, present and future
IIUM Press
. ISBN 9789674181130
, pp.3-9
|
2011 |
Shamir’s threshold scheme.
In: Cryptography: past, present and future
IIUM Press
. ISBN 9789674181130
, pp.147-150
|
2011 |
Blakely’s secret sharing scheme.
In: Cryptography: past, present and future
IIUM Press
. ISBN 9789674181130
, pp.151-154
|
2011 |
The study of multicast listener discovery.
In: Advances in mobility management for IP networks
IIUM Press
. ISBN 9789674181406
, pp.27-31
|
2011 |
MIPV6 based approaches for mobility management.
In: Advances in mobility management for IP networks
IIUM Press
. ISBN 9789674181406
, pp.32-35
|
2011 |
Qualitative study of mobility management approaches.
In: Advances in mobility management for IP networks
IIUM Press
. ISBN 9789674181406
, pp.48-52
|
2011 |
Polyalphabetic substitution cipher.
In: Cryptography: past, present and future
IIUM Press
. ISBN 9789674181130
, pp.17-23
|
2011 |
Introduction.
In: Cryptography: past, present and future
IIUM Press
. ISBN 9789674181130
, pp.141-146
|
2011 |
Internal structure of computer systems.
In: Introduction of computer systems and applications
IIUM Press
. ISBN 9789674180850
, pp.1-8
|
2011 |
Interfaces and protocols.
In: Introduction of computer systems and applications
IIUM Press
. ISBN 9789674180850
, pp.9-16
|
2011 |
Firmware program.
In: Introduction of computer systems and applications
IIUM Press
. ISBN 9789674180850
, pp.17-22
|
2011 |
Graphical user interfaces.
In: Introduction of computer systems and applications
IIUM Press
. ISBN 9789674180850
, pp.23-30
|
2011 |
Short cut and hard drive.
In: Introduction of computer systems and applications
IIUM Press
. ISBN 9789674180850
, pp.31-38
|
2011 |
Windows explorer.
In: Introduction of computer systems and applications
IIUM Press
. ISBN 9789674180850
, pp.39-46
|
2011 |
Folder and directory.
In: Introduction of computer systems and applications
IIUM Press
. ISBN 9789674180850
, pp.47-53
|
2011 |
Control panel and screen savers.
In: Introduction of computer systems and applications
IIUM Press
. ISBN 9789674180850
, pp.65-72
|
2011 |
Basic operating system setting.
In: Introduction of computer systems and applications
IIUM Press
. ISBN 9789674180850
, pp.81-86
|
2011 |
Hardware configuration.
In: Introduction of computer systems and applications
IIUM Press
. ISBN 9789674180850
, pp.73-79
|
2011 |
Windows installation.
In: Introduction of computer systems and applications
IIUM Press
. ISBN 9789674180850
, pp.87-98
|
2011 |
Monoalphabetic substitution cipher.
In: Cryptography: past, present and future
IIUM Press
. ISBN 9789674181130
, pp.11-16
|
2011 |
Network security setting.
In: Introduction of computer systems and applications
IIUM Press
. ISBN 9789674180850
, pp.99-106
|
2011 |
Task scheduling.
In: Introduction of computer systems and applications
IIUM Press
. ISBN 9789674180850
, pp.107-112
|
2011 |
Basic storage management.
In: Introduction of computer systems and applications
IIUM Press
. ISBN 9789674180850
, pp.113-118
|
2011 |
Logical drive.
In: Introduction of computer systems and applications
IIUM Press
. ISBN 9789674180850
, pp.119-125
|
2011 |
Storage management.
In: Introduction of computer systems and applications
IIUM Press
. ISBN 9789674180850
, pp.127-134
|
2011 |
Basic disk management.
In: Introduction of computer systems and applications
IIUM Press
. ISBN 9789674180850
, pp.135-140
|
2011 |
Machine based cryptography.
In: Cryptography: past, present and future
IIUM Press
. ISBN 9789674181130
, pp.25-30
|
2011 |
Disk management.
In: Introduction of computer systems and applications
IIUM Press
. ISBN 9789674180850
, pp.141-146
|
2011 |
Cascade style sheets.
In: Introduction of computer systems and applications
IIUM Press
. ISBN 9789674180850
, pp.147-155
|
2011 |
Block and stream cipher.
In: Cryptography: past, present and future
IIUM Press
. ISBN 9789674181130
, pp.33-38
|
2011 |
Image editing.
In: Introduction of computer systems and applications
IIUM Press
. ISBN 9789674180850
, pp.157-164
|
2011 |
Image effects.
In: Introduction of computer systems and applications
IIUM Press
. ISBN 9789674180850
, pp.165-172
|
2011 |
Image tool function.
In: Introduction of computer systems and applications
IIUM Press
. ISBN 9789674180850
, pp.173-179
|
2011 |
Data Encryption Standard (DES).
In: Cryptography: past, present and future
IIUM Press
. ISBN 9789674181130
, pp.39-46
|
2011 |
Image clone 1.
In: Introduction of computer systems and applications
IIUM Press
. ISBN 9789674180850
, pp.181-191
|
2011 |
Image clone 2.
In: Introduction of computer systems and applications
IIUM Press
. ISBN 9789674180850
, pp.193-197
|
2011 |
Image and special effects.
In: Introduction of computer systems and applications
IIUM Press
. ISBN 9789674180850
, pp.199-204
|
2011 |
Basic text effects.
In: Introduction of computer systems and applications
IIUM Press
. ISBN 9789674180850
, pp.205-212
|
2011 |
Text animation.
In: Introduction of computer systems and applications
IIUM Press
. ISBN 9789674180850
, pp.213-219
|
2011 |
Advanced Encryption Standard (AES).
In: Cryptography: past, present and future
IIUM Press
. ISBN 9789674181130
, pp.47-52
|
2011 |
Text effects.
In: Introduction of computer systems and applications
IIUM Press
. ISBN 9789674180850
, pp.221-226
|
2011 |
Image filtering.
In: Introduction of computer systems and applications
IIUM Press
. ISBN 9789674180850
, pp.227-232
|
2011 |
Image quality improvement.
In: Introduction of computer systems and applications
IIUM Press
. ISBN 9789674180850
, pp.233-239
|
2011 |
Trivium and Rabbit stream cipher.
In: Cryptography: past, present and future
IIUM Press
. ISBN 9789674181130
, pp.53-61
|