IIUM Repository

Items where Author is "Taha, Imad"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 20.

Article

Alkandari, Abdulaziz M and Alkandari, Khalil Ibrahim and Taha, Imad and Alahmad, Mohammad A. (2015) A new design of cryptographic hash function: gear. International Journal on Perceptive and Cognitive Computing (IJPCC), 1 (1). pp. 29-34. ISSN 2462 - 229X

Othman, Marini and Abdul Rahman, Abdul Wahab and Karim, Izzah and Dzulkifli, Mariam Adawiah and Taha, Imad (2013) EEG emotion recognition based on the dimensional models of emotions. Procedia - Social and Behavioral Sciences, 97. pp. 30-37. ISSN 1877-0428

Salim, Sufya and Taha, Imad (2012) Lightweight block ciphers: A comparative study. Journal of Advanced Computer Science and Technology Research(JACSTR), 2 (4). pp. 159-165. ISSN 2231-8852

Taha, Imad and Alahmad, Mohammad and Ahmad, Hanadi (2012) Protection of the texts using Base64 and MD5. Journal of Advanced Computer Science and Technology Research(JACSTR), 2 (1). pp. 22-34. ISSN 2231-8852

Taha, Imad and Ahmad, Mohammad A. (2011) Security threats of finger print biometric in network system environment. Journal of Advanced Computer Science and Technology Research (JACSTR), 1 (1). pp. 36-51. ISSN 2231-8852

Taha, Imad and Inazy, Qabas (2006) Comparison between Lamarckian Evolution and Baldwin Evolution of neural network. Journal of Al Rafidain University College, 8 (19). pp. 217-232. ISSN 1681-6870

Taha, Imad and Ibrahim Habra, Hind Saleem (2006) Genetic-local hybrid optimizer for solving advance layout problem. Journal of Al Rafidain University College, 8 (19). pp. 87-98. ISSN 1681-6870

Taha, Imad and Hasan, Luay (2006) New statistical Binary Random Test. Journal of Al Rafidain university college , 8 (18). pp. 81-101. ISSN 1681-6870

Taha, Imad and Naef, Asaad (2004) Protecting an Internet Web File using Java. Journal of Al Rafidain University College- Iraq, 7 (15). pp. 51-60. ISSN 1681-6870

Book Chapter

Taha, Imad and Alahmad, Mohammad A. (2015) Cryptographic hash function: a high level view. In: Threat Detection and Countermeasures in Network Security. IGI Global, USA, pp. 80-94. ISBN 978-1-4666-6583-5

Proceeding Paper

Taha, Imad and Alahmad, Mohammad (2013) SVG and Arabic font challenges and improvements. In: 5th International Conference on Information and Communication Technology for the Muslim World, 26-28 March 2013, Morocco.

Taha, Imad and Farid, Sumaira and Hussain, Ayyaz (2012) Comparative study on content-based image retrieval CBIR). In: International Conference on Advanced Computer Science Applications and Technologies , 26-28 Nov 2012, The Palace of Golden Horses- KL.

Taha, Imad and Alahmad, Mohammad and Munther, Khansaa (2012) Comparison and analysis study of sha-3 finallists. In: International Conference on Advanced Computer Science Applications and Technologies , 26-28 Nov 2012, The Palace of Golden Horses, KL.

Taha, Imad and Alzuabi, Haifa (2012) Quality evaluation of “safeer” portal for Saudi students studying abroad. In: International Conference on Advanced Computer Science Applications and Technologies .

Taha, Imad and Salim, Sufyan (2012) Security of present s-box. In: International Conference on Advanced Computer Science Applications and Technologies , 26-28 Nov 2012, The Palace of Golden Horses- KL.

Taha, Imad and Alkandari, Abdulrahman (2012) An anatomy of IGP and BGP routing protocols. In: International Conference on Advanced Computer Science Applications and Technologies , 26-28 Nov 2012, The Palace of Golden Horses, KL.

Taha, Imad and Alahmad, Mohammad and Ahmad, Hanadi (2012) Protection of text using SHA1 and Base64. In: 3rd International Conference on Cryptology and Computer Security 2012, 4-6 June, 2012, Langkawi.

Taha, Imad and Alkandari, Abdulrahman and alnasheet, Meshal (2012) Traffic management system based on wsn in Kuwait: an initial design. In: International Conference on Informatics and Applications 2012, 3-5 June 2012, Kuala Terengganu, Malaysia.

Taha, Imad and Zeki, Akram M. and Pathan, Al-Sakib Khan and makarim, rusydi (2012) Protection of integrity and ownership of pdf documents using invisible signature. In: 14th International Conference on Computer Modelling and Simulation (UKSim), 28-30 March 2012, Cambridge, UK. (In Press)

Taha, Imad and Sahasrabuddhe, H.V. (1999) A genetic algorithm for the cryptanalysis of Chor-Rivest knapsack public key cryptosystem (PKC). In: Third International Conference on Computational Intelligence and Multimedia Applications. ICCIMA'99, 23-26 September 2009, New Delhi.

This list was generated on Sat Apr 20 13:21:51 2024 +08.