-
1Academic Journal
المؤلفون: Lina Aziz Swadi, Haider M. Al-Mashhadi
المصدر: Letters in High Energy Physics, Vol 2024, Iss 1 (2024)
مصطلحات موضوعية: smart meter, blockchain, IoT, security, sustainability, Nuclear and particle physics. Atomic energy. Radioactivity, QC770-798
-
2Academic Journal
المؤلفون: Haider M. Al-Mashhadi, Abdulhusein Latef Khudhair
المصدر: TELKOMNIKA (Telecommunication, Computing, Electronics and Control), 21(2), 324-332, (2023-04-01)
مصطلحات موضوعية: Artificial intelligence, Electronic-Doctor, Fuzzy logic system, Healthcare Kidney diseases
Relation: https://doi.org/10.12928/telkomnika.v21i2.22785; oai:zenodo.org:7637801
-
3Academic Journal
المصدر: TELKOMNIKA Telecommunication, Computing, Electronics and Control, 18(6), 2992~2998, (2020-11-19)
مصطلحات موضوعية: Correlation, Encryption, Entropy, Fuzzy logic, NPCR
Relation: https://doi.org/10.12928/TELKOMNIKA.v18i6.14340; oai:zenodo.org:4280188
-
4Academic Journal
المصدر: TELKOMNIKA Telecommunication, Computing, Electronics and Control, 18(4), 1834 - 1842, (2020-07-14)
مصطلحات موضوعية: Authentication methods, Cloud computing, e-Government, Hash algorithm, QR code
Relation: https://doi.org/10.12928/TELKOMNIKA.v18i4.14339; oai:zenodo.org:3943053
-
5
المؤلفون: Alaa Dhahi Khaleefah, Haider M. Al-Mashhadi
المصدر: Informatica. 47
مصطلحات موضوعية: Artificial Intelligence, Software, Computer Science Applications, Theoretical Computer Science
-
6
المصدر: 2021 1st Babylon International Conference on Information Technology and Science (BICITS).
مصطلحات موضوعية: Cryptocurrency, Blockchain, Broadcasting (networking), Computer science, business.industry, Proof-of-work system, Scalability, Topology (electrical circuits), Network topology, business, Database transaction, Computer network
-
7
مصطلحات موضوعية: Authentication methods, Computer science, business.industry, Hash function, Cloud computing, Hash algorithm, QR code, Multi-factor authentication, Barcode, Computer security, computer.software_genre, law.invention, Appropriation, e-Government, law, Order (business), Code (cryptography), Electrical and Electronic Engineering, business, Database transaction, computer
-
8
المصدر: Journal of Southwest Jiaotong University. 54
مصطلحات موضوعية: Entertainment, Raspberry pi, Multidisciplinary, business.industry, Computer science, Operating system, Human multitasking, Internet of Things, business, computer.software_genre, computer
-
9
المؤلفون: Haider M. Al-Mashhadi
المصدر: International Journal of Computer Applications. 157:22-26
مصطلحات موضوعية: Fuzzy logic system, Information retrieval, Computer science, Quality assessment, business.industry, 02 engineering and technology, computer.software_genre, Encryption, Image (mathematics), Fuzzy electronics, 0202 electrical engineering, electronic engineering, information engineering, 020201 artificial intelligence & image processing, Data mining, business, computer
-
10
المصدر: TELKOMNIKA (Telecommunication Computing Electronics and Control). 18:2992
مصطلحات موضوعية: Pixel, business.industry, Computer science, Entropy, Chaotic, Encryption, NPCR, computer.software_genre, Fuzzy logic, Correlation, Digital image, Cipher, Entropy (information theory), The Internet, Data mining, Electrical and Electronic Engineering, business, computer
-
11
المؤلفون: Iman Q. Abduljaleel, Haider M. Al-Mashhadi
المصدر: 2017 International Conference on Current Research in Computer Science and Information Technology (ICCIT).
مصطلحات موضوعية: Theoretical computer science, Channel (digital image), business.industry, ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION, Chaotic, Eavesdropping, Man-in-the-middle attack, Encryption, Image (mathematics), Scrambling, Hybrid cryptosystem, business, Algorithm, Mathematics
-
12
المؤلفون: Hala B. Abdul-Wahab, Haider M. Al-Mashhadi, Rehab F. Hassan
المصدر: GSCIT
مصطلحات موضوعية: Secure Hash Algorithm, Authentication, Computer science, business.industry, Distributed computing, Pass the hash, Hash function, Data security, Cryptography, MDC-2, Cryptographic protocol, Hash-based message authentication code, Merkle tree, Secure Hash Standard, MD5, Collision attack, SHA-2, Hash chain, Cryptographic hash function, Message authentication code, business, Algorithm, Computer network