-
1
-
-
77954808901
-
Overview: Suitability of using symmetric key to secure multimedia data
-
Abomhara, M., O. Zakaria, O.O. Khalifa, A.A. Zaidan, B.B. Zaidan and O.A. Hamdan, 2010a. Overview: Suitability of using symmetric key to secure multimedia data. J. Applied Sci., 10: 1656-1661.
-
(2010)
J. Applied Sci.
, vol.10
, pp. 1656-1661
-
-
Abomhara, M.1
Zakaria, O.2
Khalifa, O.O.3
Zaidan, A.A.4
Zaidan, B.B.5
Hamdan, O.A.6
-
2
-
-
77954822380
-
Video compression techniques: An overview
-
Abomhara, M., O.O. Khalifa, O. Zakaria, A.A. Zaidan, B.B. Zaidan and A. Rame, 2010b. Video compression techniques: An overview. J. Applied Sci., 10: 1834-1840.
-
(2010)
J. Applied Sci.
, vol.10
, pp. 1834-1840
-
-
Abomhara, M.1
Khalifa, O.O.2
Zakaria, O.3
Zaidan, A.A.4
Zaidan, B.B.5
Rame, A.6
-
3
-
-
74349117323
-
A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm
-
Ahmed, M.A., M.L.M. Kiah, B.B. Zaidan and A. A. Zaidan, 2010. A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm. J. Applied Sci., 10: 59-64.
-
(2010)
J. Applied Sci.
, vol.10
, pp. 59-64
-
-
Ahmed, M.A.1
Kiah, M.L.M.2
Zaidan, B.B.3
Zaidan, A.A.4
-
4
-
-
77954800078
-
Hiding data in video file: An overview
-
Al-Frajat, A.K., H.A. Jalab, Z.M. Kasirun, A.A. Zaidan and B.B. Zaidan, 2010. Hiding data in video file: An overview. J. Applied Sci., 10: 1644-1649.
-
(2010)
J. Applied Sci.
, vol.10
, pp. 1644-1649
-
-
Al-Frajat, A.K.1
Jalab, H.A.2
Kasirun, Z.M.3
Zaidan, A.A.4
Zaidan, B.B.5
-
5
-
-
78951479954
-
Using the features of mosaic image and AES cryptosystem to implement an extremely high rate and high secure data hidden: Analytical study
-
Alam, G.M., M.L.M. Kiah, B.B. Zaidan, A.A. Zaidan and H.O. Alanazi, 2010. Using the features of mosaic image and AES cryptosystem to implement an extremely high rate and high secure data hidden: Analytical study. Sci. Res. Essays, 5: 3254-3260.
-
(2010)
Sci. Res. Essays
, vol.5
, pp. 3254-3260
-
-
Alam, G.M.1
Kiah, M.L.M.2
Zaidan, B.B.3
Zaidan, A.A.4
Alanazi, H.O.5
-
6
-
-
78049468900
-
Securing electronic medical records transmissions over unsecured communications: An overview for better medical governance
-
Alanazi, H.O., H.A. Jalab, G.M. Alam, B.B. Zaidan and A. A. Zaidan, 2010a. Securing electronic medical records transmissions over unsecured communications: An overview for better medical governance. J. Med. Plants Res., 4: 2059-2074.
-
(2010)
J. Med. Plants Res.
, vol.4
, pp. 2059-2074
-
-
Alanazi, H.O.1
Jalab, H.A.2
Alam, G.M.3
Zaidan, B.B.4
Zaidan, A.A.5
-
7
-
-
79957461639
-
Secure topology for electronic medical record transmissions
-
Alanazi, H.O., M.L.M. Kiah, A.A. Zaidan, B.B. Zaidan and G.M. Alam, 2010b. Secure topology for electronic medical record transmissions. Int. J. Pharmacol., 6: 954-958.
-
(2010)
Int. J. Pharmacol.
, vol.6
, pp. 954-958
-
-
Alanazi, H.O.1
Kiah, M.L.M.2
Zaidan, A.A.3
Zaidan, B.B.4
Alam, G.M.5
-
9
-
-
38949159171
-
Investigating the limits of SOAP performance for scientific computing
-
July 23-26, Edinburgh, Scotland, UK
-
Chiu, K., M. Govindaraju and R. Bramley, 2002. Investigating the limits of SOAP performance for scientific computing. Proceedings of the 11th IEEE International Symposium on High Performance Distributed Computing, July 23-26, Edinburgh, Scotland, UK., pp: 246-254.
-
(2002)
Proceedings of the 11th IEEE International Symposium on High Performance Distributed Computing
, pp. 246-254
-
-
Chiu, K.1
Govindaraju, M.2
Bramley, R.3
-
11
-
-
77954824252
-
On the Capacity and security of steganography approaches: An overview
-
Hmood, A.K., H.A. Jalab, Z.M. Kasirun, A.A. Zaidan and B. B. Zaidan, 2010a. On the Capacity and security of steganography approaches: An overview. J. Applied Sci., 10: 1825-1833.
-
(2010)
J. Applied Sci.
, vol.10
, pp. 1825-1833
-
-
Hmood, A.K.1
Jalab, H.A.2
Kasirun, Z.M.3
Zaidan, A.A.4
Zaidan, B.B.5
-
12
-
-
77958064851
-
On the accuracy of hiding information metrics: Counterfeit protection for education and important certificates
-
Hmood, A.K., Z.M. Kasirun, H.A. Jalab, G.M. Alam, A.A. Zaidan and B.B. Zaidan, 2010b. On the accuracy of hiding information metrics: Counterfeit protection for education and important certificates. Int. J. Phys. Sci., 5: 1054-1062.
-
(2010)
Int. J. Phys. Sci.
, vol.5
, pp. 1054-1062
-
-
Hmood, A.K.1
Kasirun, Z.M.2
Jalab, H.A.3
Alam, G.M.4
Zaidan, A.A.5
Zaidan, B.B.6
-
13
-
-
77954829600
-
An overview on hiding information technique in images
-
Hmood, A.K., B.B. Zaidan, A.A. Zaidan and H.A. Jalab, 2010c. An overview on hiding information technique in images. J. Applied Sci., 10: 2094-2100.
-
(2010)
J. Applied Sci.
, vol.10
, pp. 2094-2100
-
-
Hmood, A.K.1
Zaidan, B.B.2
Zaidan, A.A.3
Jalab, H.A.4
-
14
-
-
84959278830
-
Evaluating SOAP for high performance business applications: Real-time trading systems
-
May 20-24, Budapest, Hungary
-
Kohlhoff, C. and R. Steele, 2003. Evaluating SOAP for high performance business applications: Real-time trading systems. Proceedings of the WWW 2003, May 20-24, Budapest, Hungary, pp: 1-9.
-
(2003)
Proceedings of the WWW 2003
, pp. 1-19
-
-
Kohlhoff, C.1
Steele, R.2
-
15
-
-
77952268534
-
Challenges of hidden data in the unused area two within executable files
-
Naji, A.W., A.A. Zaidan and B.B. Zaidan, 2009. Challenges of hidden data in the unused area two within executable files. J. Comput. Sci., 5: 890-897.
-
(2009)
J. Comput. Sci.
, vol.5
, pp. 890-897
-
-
Naji, A.W.1
Zaidan, A.A.2
Zaidan, B.B.3
-
16
-
-
55849115671
-
Gathering product data from smart products
-
(EIS'08), Barcelona
-
Nyman, J., K. Framling and V. Michel, 2008. Gathering product data from smart products. Proceedings 10th International Conference on Enterprise Information Systems, (EIS'08), Barcelona, pp: 252-257.
-
(2008)
Proceedings 10th International Conference on Enterprise Information Systems
, pp. 252-257
-
-
Nyman, J.1
Framling, K.2
Michel, V.3
-
17
-
-
77955146619
-
A scalable and secure position-based routing protocol for ad-hoc networks
-
Qabajeh, L.K., M.L.M. Kiah and M.M. Qabajeh, 2009. A scalable and secure position-based routing protocol for ad-hoc networks. Malaysian J. Comput. Sci., 22: 99-120.
-
(2009)
Malaysian J. Comput. Sci.
, vol.22
, pp. 99-120
-
-
Qabajeh, L.K.1
Kiah, M.L.M.2
Qabajeh, M.M.3
-
18
-
-
84857780686
-
Impact of spam advertisement through email: A study to assess the influence of the anti-spam on the email marketing
-
Raad, M., N.M. Yeasin, G.M. Alam, B.B. Zaidan and A. A. Zaidan, 2010. Impact of spam advertisement through email: A study to assess the influence of the anti-spam on the email marketing. Afr. J. Bus. Manage., 4: 2362-2367.
-
(2010)
Afr. J. Bus. Manage.
, vol.4
, pp. 2362-2367
-
-
Raad, M.1
Yeasin, N.M.2
Alam, G.M.3
Zaidan, B.B.4
Zaidan, A.A.5
-
20
-
-
78650269547
-
Shoulder surfing resistance using penup event and neighbouring connectivity manipulation
-
Yee, P.L. and M.L.M. Kiah, 2010. Shoulder surfing resistance using penup event and neighbouring connectivity manipulation. Malaysian J. Comput. Sci., 23: 121-140.
-
(2010)
Malaysian J. Comput. Sci.
, vol.23
, pp. 121-140
-
-
Yee, P.L.1
Kiah, M.L.M.2
-
21
-
-
77954826595
-
Investigate the capability of applying hidden data in text file: An overview
-
Zaidan, A.A., B.B. Zaidan, A.K. Al-Fraja and H.A. Jalab, 2010a. Investigate the capability of applying hidden data in text file: An overview. J. Applied Sci., 10: 1916-1922.
-
(2010)
J. Applied Sci.
, vol.10
, pp. 1916-1922
-
-
Zaidan, A.A.1
Zaidan, B.B.2
Al-Fraja, A.K.3
Jalab, H.A.4
-
22
-
-
77954833269
-
An overview: Theoretical and mathematical perspectives for advance enciyption standard/rijndael
-
Zaidan, A.A., B.B. Zaidan, A.K. Al-Frajat and H.A. Jalab, 2010b. An overview: Theoretical and mathematical perspectives for advance enciyption standard/rijndael. J. Applied Sci., 10: 2161-2167.
-
(2010)
J. Applied Sci.
, vol.10
, pp. 2161-2167
-
-
Zaidan, A.A.1
Zaidan, B.B.2
Al-Frajat, A.K.3
Jalab, H.A.4
-
23
-
-
77957325769
-
Novel approach for high (secure and rate) data hidden within triplex space for non multimedia file
-
Zaidan, A.A., B.B. Zaidan, H.O. Alanazi, A. Gani, O. Zakaria and G.M. Alam, 2010c. Novel approach for high (secure and rate) data hidden within triplex space for non multimedia file. Sci. Res. Essays, 5: 1965-1977.
-
(2010)
Sci. Res. Essays
, vol.5
, pp. 1965-1977
-
-
Zaidan, A.A.1
Zaidan, B.B.2
Alanazi, H.O.3
Gani, A.4
Zakaria, O.5
Alam, G.M.6
-
24
-
-
78649273195
-
Novel multi-cover steganography using remote sensing image and general recursion neural cryptosystem
-
Zaidan, A.A., B.B. Zaidan, A.Y. Taqa, K.M.S. Mustafa, G.M. Alam and H.A. Jalab, 2010 Od. Novel multi-cover steganography using remote sensing image and general recursion neural cryptosystem. Int. J. Phys. Sci., 5: 1992-2000.
-
(2010)
Int. J. Phys. Sci.
, vol.5
, pp. 1992-2000
-
-
Zaidan, A.A.1
Zaidan, B.B.2
Taqa, A.Y.3
Mustafa, K.M.S.4
Alam, G.M.5
Jalab, H.A.6
-
25
-
-
77954783981
-
On the differences between hiding information and cryptography techniques: An overview
-
Zaidan, B.B., A.A. Zaidan, A.K. Al-Frajat and H.A. Jalab, 2010e. On the differences between hiding information and cryptography techniques: An overview. J. Applied Sci., 10: 1650-1655.
-
(2010)
J. Applied Sci.
, vol.10
, pp. 1650-1655
-
-
Zaidan, B.B.1
Zaidan, A.A.2
Al-Frajat, A.K.3
Jalab, H.A.4
-
26
-
-
78649299082
-
StegoMos: A secure novel approach of high rate data hidden using mosaic image and ANN-BMP cryptosystem
-
Zaidan, B.B., A.A. Zaidan, A. Taqa, G.M. Alam, M.L.M. Kiah and H.A. Jalab, 2010f. StegoMos: A secure novel approach of high rate data hidden using mosaic image and ANN-BMP cryptosystem. Int. J. Phys. Sci., 5: 1796-1806.
-
(2010)
Int. J. Phys. Sci.
, vol.5
, pp. 1796-1806
-
-
Zaidan, B.B.1
Zaidan, A.A.2
Taqa, A.3
Alam, G.M.4
Kiah, M.L.M.5
Jalab, H.A.6
-
27
-
-
78651075908
-
A new hybrid module for skin detector using fuzzy inference system structure and explicit rules
-
(In Press)
-
Zaidan, A.A., H.A. Karim, N.N. Ahmed, G.M. Alam and B.B. Zaidan, 2010g. A new hybrid module for skin detector using fuzzy inference system structure and explicit rules. Int. J. Phys. Sci., (In Press).
-
(2010)
Int. J. Phys. Sci.
-
-
Zaidan, A.A.1
Karim, H.A.2
Ahmed, N.N.3
Alam, G.M.4
Zaidan, B.B.5
-
28
-
-
78649415172
-
Increase reliability for skin detector using backprobgation neural network and heuristic rules based on YCbCr
-
Zaidan, A.A., N.N. Ahmed, H.A. Karim, G.M. Alam and B.B. Zaidan, 2010h. Increase reliability for skin detector using backprobgation neural network and heuristic rules based on YCbCr. Sci. Res. Essays, 5: 2931-2946.
-
(2010)
Sci. Res. Essays
, vol.5
, pp. 2931-2946
-
-
Zaidan, A.A.1
Ahmed, N.N.2
Karim, H.A.3
Alam, G.M.4
Zaidan, B.B.5
-
29
-
-
78751500455
-
A novel hybrid module of skin detector using grouping histogram technique for bayesian method and segment skin adjacent-nested technique for neural network
-
(In Press)
-
Zaidan, A.A., H.A. Karim, N.N. Ahmed, G.M. Alam and B.B. Zaidan, 2010i. A novel hybrid module of skin detector using grouping histogram technique for bayesian method and segment skin adjacent-nested technique for neural network. Int. J. Phys. Sci., (In Press).
-
(2010)
Int. J. Phys. Sci.
-
-
Zaidan, A.A.1
Karim, H.A.2
Ahmed, N.N.3
Alam, G.M.4
Zaidan, B.B.5
-
30
-
-
78751509177
-
Spam influence on the business and economy: Theoretical and experimental study for textual anti-spam filtering using mature document processing and naïve bayesian classifier
-
(In Press)
-
Zaidan, A.A., N.N. Ahmed, H.A. Karim, G.M. Alam and B.B. Zaidan, 2010j. Spam influence on the business and economy: theoretical and experimental study for textual anti-spam filtering using mature document processing and naïve bayesian classifier. Afr. J. Bus. Manage., (In Press).
-
(2010)
Afr. J. Bus. Manage.
-
-
Zaidan, A.A.1
Ahmed, N.N.2
Karim, H.A.3
Alam, G.M.4
Zaidan, B.B.5
|