-
1
-
-
77954808901
-
Suitability of Using Symmetric Key to Secure Multimedia Data: An Overview
-
Abomhara M, Khalifa OO, Zakaria O, Zaidan AA, Zaidan BB, Alanazi HO (2010). Suitability of Using Symmetric Key to Secure Multimedia Data: An Overview. J. Appl. Sci., 10(15): 1656-1661.
-
(2010)
J. Appl. Sci
, vol.10
, Issue.15
, pp. 1656-1661
-
-
Abomhara, M.1
Khalifa, O.O.2
Zakaria, O.3
Zaidan, A.A.4
Zaidan, B.B.5
Alanazi, H.O.6
-
2
-
-
78049468900
-
Securing Electronic Medical Records Transmissions over Unsecured Communications: An Overview for Better Medical Governance
-
In press
-
Alanazi HO, Jalab HA, Zaidan BB, Zaidan AA, Alam GM (2010). Securing Electronic Medical Records Transmissions over Unsecured Communications: An Overview for Better Medical Governance. J. Medicinal Plants Res. In press.
-
(2010)
J. Medicinal Plants Res
-
-
Alanazi, H.O.1
Jalab, H.A.2
Zaidan, B.B.3
Zaidan, A.A.4
Alam, G.M.5
-
3
-
-
77954800078
-
Hiding Data in Video File: An Overview
-
Al-Frajat AK, Jalab HA, Kasirun ZM, Zaidan AA, Zaidan BB (2010). Hiding Data in Video File: An Overview. J. Appl. Sci., 10(15): 1644-1649.
-
(2010)
J. Appl. Sci.
, vol.10
, Issue.15
, pp. 1644-1649
-
-
Al-Frajat, A.K.1
Jalab, H.A.2
Kasirun, Z.M.3
Zaidan, A.A.4
Zaidan, B.B.5
-
5
-
-
77954421340
-
The use of artificial neural network for prediction of grain size of 17-4 pH stainless steel powders
-
Findik T, Tasdemir S, Sahin S (2010). The use of artificial neural network for prediction of grain size of 17-4 pH stainless steel powders. Scientific Res. Essays, 5(11): 1274-1283.
-
(2010)
Scientific Res. Essays
, vol.5
, Issue.11
, pp. 1274-1283
-
-
Findik, T.1
Tasdemir, S.2
Sahin, S.3
-
6
-
-
78649301031
-
Starry Night
-
Gogh V (2010). Starry Night. Mosaic Creator Gallery, http://www.aolej.com/mosaic/3giga.htm.
-
(2010)
Mosaic Creator Gallery
-
-
Gogh, V.1
-
7
-
-
77949295218
-
Outlier detection for geodetic nets using ADALINE learning algorithm
-
Gullu M, Yilmaz I (2010). Outlier detection for geodetic nets using ADALINE learning algorithm. Scientific Res. Essays, 5(5): 440-447.
-
(2010)
Scientific Res. Essays
, vol.5
, Issue.5
, pp. 440-447
-
-
Gullu, M.1
Yilmaz, I.2
-
8
-
-
78549286926
-
Electronic transaction of internet banking and its perception of Malaysian online customers
-
Haque A, Tarofder AK, Rahman S, Raquib MA (2009). Electronic transaction of internet banking and its perception of Malaysian online customers. Afri. J. Bus. Manage., 3(6): 248-259.
-
(2009)
Afri. J. Bus. Manage
, vol.3
, Issue.6
, pp. 248-259
-
-
Haque, A.1
Tarofder, A.K.2
Rahman, S.3
Raquib, M.A.4
-
9
-
-
77954499630
-
Information and communication technology for participatory based decision-making-E-management for administrative efficiency in Higher Education
-
Hashim F, Alam GM, Siraj S (2010). Information and communication technology for participatory based decision-making-E-management for administrative efficiency in Higher Education. Int. J. Phys. Sci., 5(4): 383-392.
-
(2010)
Int. J. Phys. Sci
, vol.5
, Issue.4
, pp. 383-392
-
-
Hashim, F.1
Alam, G.M.2
Siraj, S.3
-
10
-
-
77958064851
-
On the Accuracy of Hiding Information Metrics: Counterfeit protection for education and important certificates
-
Hmood AK, Kasirun ZM, Jalab H, Zaidan AA, Zaidan BB, Alam GM (2010c). On the Accuracy of Hiding Information Metrics: Counterfeit protection for education and important certificates. Int. J. Phys. Sci., 5(7): 1054-1062.
-
(2010)
Int. J. Phys. Sci
, vol.5
, Issue.7
, pp. 1054-1062
-
-
Hmood, A.K.1
Kasirun, Z.M.2
Jalab, H.3
Zaidan, A.A.4
Zaidan, B.B.5
Alam, G.M.6
-
11
-
-
77954829600
-
An overview on hiding information technique in images
-
Hmood AK, Zaidan BB, Zaidan AA, Jalab HA (2010a). An overview on hiding information technique in images. J. Appl. Sci., 10(18): 2094-2100.
-
(2010)
J. Appl. Sci
, vol.10
, Issue.18
, pp. 2094-2100
-
-
Hmood, A.K.1
Zaidan, B.B.2
Zaidan, A.A.3
Jalab, H.A.4
-
12
-
-
77954824252
-
On the capacity and security of steganography approaches: An overview
-
Hmood AK, Jalab HA, Kasirun ZM, Zaidan BB, Zaidan AA (2010b). On the capacity and security of steganography approaches: An overview. J. Appl. Sci., 10(16): 1825-1833.
-
(2010)
J. Appl. Sci
, vol.10
, Issue.16
, pp. 1825-1833
-
-
Hmood, A.K.1
Jalab, H.A.2
Kasirun, Z.M.3
Zaidan, B.B.4
Zaidan, A.A.5
-
13
-
-
78649274853
-
Fault Diagnosis Using Neural Network
-
Sana'a University J. Sci. Technol. (SUJST)
-
Jalab HA (2006). Fault Diagnosis Using Neural Network. Sana'a University J. Sci. Technol. (SUJST), 3(1): 57-63.
-
(2006)
, vol.3
, Issue.1
, pp. 57-63
-
-
Jalab, H.A.1
-
14
-
-
70350050538
-
Adaptive lifting based image compression scheme for narrow band transmission system
-
Kanvel N, Monie EC (2009). Adaptive lifting based image compression scheme for narrow band transmission system. Int. J. Phys. Sci., 4(4): 194-164.
-
(2009)
Int. J. Phys. Sci
, vol.4
, Issue.4
, pp. 194-164
-
-
Kanvel, N.1
Monie, E.C.2
-
15
-
-
59249099804
-
StegCure: A comprehensive steganographic tool using enhanced LSB scheme
-
Por LY, Lai WK, Alireza Z, Ang TF, Su MT, Delina B (2008). StegCure: a comprehensive steganographic tool using enhanced LSB scheme. W. Trans. on Comp., 7(8): 1309-1318.
-
(2008)
W. Trans. On Comp
, vol.7
, Issue.8
, pp. 1309-1318
-
-
Por, L.Y.1
Lai, W.K.2
Alireza, Z.3
Ang, T.F.4
Su, M.T.5
Delina, B.6
-
16
-
-
77955146619
-
A Scalable and Secure Position-Based Routing Protocol for Ad-Hoc Networks
-
Qabajeh LK, Kiah ML, Qabajeh MM (2009). A Scalable and Secure Position-Based Routing Protocol for Ad-Hoc Networks. Malaysian J. Computer Sci., 22(2): 99-120.
-
(2009)
Malaysian J. Computer Sci
, vol.22
, Issue.2
, pp. 99-120
-
-
Qabajeh, L.K.1
Kiah, M.L.2
Qabajeh, M.M.3
-
17
-
-
77953587765
-
Application of Neural Network models on analysis of prismatic structures
-
Tay IN (2010). Application of Neural Network models on analysis of prismatic structures. Scientific Res. Essays, 5(9): 978-989.
-
(2010)
Scientific Res. Essays
, vol.5
, Issue.9
, pp. 978-989
-
-
Tay, I.N.1
-
18
-
-
77957325769
-
Novel Approach for High (Secure and Rate) Data Hidden within Triplex Space for Executable File
-
Essays, in press
-
Zaidan AA, Zaidan BB, Alanazi O, Hamdan G, Abdullah ZO, Alam GM (2010a). Novel Approach for High (Secure and Rate) Data Hidden within Triplex Space for Executable File. Scientific Res. Essays, in press.
-
(2010)
Scientific Res
-
-
Zaidan, A.A.1
Zaidan, B.B.2
Alanazi, O.3
Hamdan, G.4
Abdullah, Z.O.5
Alam, G.M.6
-
19
-
-
77954826595
-
Investigate the Capability of Applying Hidden Data in Text File: An Overview
-
Zaidan AA, Zaidan BB, Al-Fraja Ali K, Jalab HA (2010b). Investigate the Capability of Applying Hidden Data in Text File: An Overview. J. Appl. Sci., 10(17): 1916-1922.
-
(2010)
J. Appl. Sci
, vol.10
, Issue.17
, pp. 1916-1922
-
-
Zaidan, A.A.1
Zaidan, B.B.2
Al-Fraja Ali, K.3
Jalab, H.A.4
-
20
-
-
77954783981
-
On the Differences between Hiding Information and Cryptography Techniques: An Overview
-
Zaidan BB, Zaidan AA, Al-Frajat AK, Jalab HA (2010c). On the Differences between Hiding Information and Cryptography Techniques: An Overview. J. Appl. Sci., 10(15): 1650-1655.
-
(2010)
J. Appl. Sci
, vol.10
, Issue.15
, pp. 1650-1655
-
-
Zaidan, B.B.1
Zaidan, A.A.2
Al-Frajat, A.K.3
Jalab, H.A.4
-
21
-
-
77954828213
-
Quality of Image vs. Quantity of Data Hidden in the Image
-
Las Vigas, Nevada, USA
-
Zaidan BB, Zaidan AA, Othman F, Raji RZ, Mohammed SM, Abdulrazzaq MM (2009a). Quality of Image vs. Quantity of Data Hidden in the Image. International Conference on Image Processing, Computer Vision, and Pattern Recognition (IPCV'09), Las Vigas, Nevada, USA.
-
(2009)
International Conference On Image Processing, Computer Vision, and Pattern Recognition (IPCV'09)
-
-
Zaidan, B.B.1
Zaidan, A.A.2
Othman, F.3
Raji, R.Z.4
Mohammed, S.M.5
Abdulrazzaq, M.M.6
-
22
-
-
77958518850
-
Stego-Image Vs Stego-Analysis System
-
Zaidan BB, Zaidan AA, Taqa A, Othman F (2009b). Stego-Image Vs Stego-Analysis System. Int. J. Eng. Technol. (IJET), 1(5): 596-602.
-
(2009)
Int. J. Eng. Technol. (IJET)
, vol.1
, Issue.5
, pp. 596-602
-
-
Zaidan, B.B.1
Zaidan, A.A.2
Taqa, A.3
Othman, F.4
|