Items where Author is "Taha, Imad"
Up a level |
Alkandari, Abdulaziz M and Alkandari, Khalil Ibrahim and Taha, Imad and Alahmad, Mohammad A. (2015) A new design of cryptographic hash function: gear. International Journal on Perceptive and Cognitive Computing (IJPCC), 1 (1). pp. 29-34. ISSN 2462 - 229X
Taha, Imad and Alahmad, Mohammad A. (2015) Cryptographic hash function: a high level view. In: Threat Detection and Countermeasures in Network Security. IGI Global, USA, pp. 80-94. ISBN 978-1-4666-6583-5
Taha, Imad and Alahmad, Mohammad (2013) SVG and Arabic font challenges and improvements. In: 5th International Conference on Information and Communication Technology for the Muslim World, 26-28 March 2013, Morocco.
Othman, Marini and Abdul Rahman, Abdul Wahab and Karim, Izzah and Dzulkifli, Mariam Adawiah and Taha, Imad (2013) EEG emotion recognition based on the dimensional models of emotions. Procedia - Social and Behavioral Sciences, 97. pp. 30-37. ISSN 1877-0428
Taha, Imad and Farid, Sumaira and Hussain, Ayyaz (2012) Comparative study on content-based image retrieval CBIR). In: International Conference on Advanced Computer Science Applications and Technologies , 26-28 Nov 2012, The Palace of Golden Horses- KL.
Taha, Imad and Alahmad, Mohammad and Munther, Khansaa (2012) Comparison and analysis study of sha-3 finallists. In: International Conference on Advanced Computer Science Applications and Technologies , 26-28 Nov 2012, The Palace of Golden Horses, KL.
Taha, Imad and Alzuabi, Haifa (2012) Quality evaluation of “safeer” portal for Saudi students studying abroad. In: International Conference on Advanced Computer Science Applications and Technologies .
Taha, Imad and Salim, Sufyan (2012) Security of present s-box. In: International Conference on Advanced Computer Science Applications and Technologies , 26-28 Nov 2012, The Palace of Golden Horses- KL.
Taha, Imad and Alkandari, Abdulrahman (2012) An anatomy of IGP and BGP routing protocols. In: International Conference on Advanced Computer Science Applications and Technologies , 26-28 Nov 2012, The Palace of Golden Horses, KL.
Salim, Sufya and Taha, Imad (2012) Lightweight block ciphers: A comparative study. Journal of Advanced Computer Science and Technology Research(JACSTR), 2 (4). pp. 159-165. ISSN 2231-8852
Taha, Imad and Alahmad, Mohammad and Ahmad, Hanadi (2012) Protection of text using SHA1 and Base64. In: 3rd International Conference on Cryptology and Computer Security 2012, 4-6 June, 2012, Langkawi.
Taha, Imad and Alkandari, Abdulrahman and alnasheet, Meshal (2012) Traffic management system based on wsn in Kuwait: an initial design. In: International Conference on Informatics and Applications 2012, 3-5 June 2012, Kuala Terengganu, Malaysia.
Taha, Imad and Alahmad, Mohammad and Ahmad, Hanadi (2012) Protection of the texts using Base64 and MD5. Journal of Advanced Computer Science and Technology Research(JACSTR), 2 (1). pp. 22-34. ISSN 2231-8852
Taha, Imad and Zeki, Akram M. and Pathan, Al-Sakib Khan and makarim, rusydi (2012) Protection of integrity and ownership of pdf documents using invisible signature. In: 14th International Conference on Computer Modelling and Simulation (UKSim), 28-30 March 2012, Cambridge, UK. (In Press)
Taha, Imad and Ahmad, Mohammad A. (2011) Security threats of finger print biometric in network system environment. Journal of Advanced Computer Science and Technology Research (JACSTR), 1 (1). pp. 36-51. ISSN 2231-8852
Taha, Imad and Inazy, Qabas (2006) Comparison between Lamarckian Evolution and Baldwin Evolution of neural network. Journal of Al Rafidain University College, 8 (19). pp. 217-232. ISSN 1681-6870
Taha, Imad and Ibrahim Habra, Hind Saleem (2006) Genetic-local hybrid optimizer for solving advance layout problem. Journal of Al Rafidain University College, 8 (19). pp. 87-98. ISSN 1681-6870
Taha, Imad and Hasan, Luay (2006) New statistical Binary Random Test. Journal of Al Rafidain university college , 8 (18). pp. 81-101. ISSN 1681-6870
Taha, Imad and Naef, Asaad (2004) Protecting an Internet Web File using Java. Journal of Al Rafidain University College- Iraq, 7 (15). pp. 51-60. ISSN 1681-6870
Taha, Imad and Sahasrabuddhe, H.V. (1999) A genetic algorithm for the cryptanalysis of Chor-Rivest knapsack public key cryptosystem (PKC). In: Third International Conference on Computational Intelligence and Multimedia Applications. ICCIMA'99, 23-26 September 2009, New Delhi.