Folgen
Naziha Mohammed Ali Al-Aidroos
Naziha Mohammed Ali Al-Aidroos
Associated Professor of Computer Science (Data Security), Hadhramout University
Bestätigte E-Mail-Adresse bei hu.edu.ye
Titel
Zitiert von
Zitiert von
Jahr
A new approach to model machine learning by using complex bipolar intuitionistic fuzzy information
N Jan, R Maqsood, A Nasir, MS Alhilal, A Alabrah, N Al-Aidroos
Journal of Function Spaces 2022, 1-17, 2022
182022
An innovative approach to investigate the effects of artificial intelligence based on complex bipolar picture fuzzy information
N Jan, B Akram, A Nasir, MS Alhilal, A Alabrah, N Al-Aidroos
Scientific Programming 2022, 1-20, 2022
142022
A combined image Steganography technique based on edge concept and dynamic LSB
MH Mohamed, NM AL-Aidroos, AM Bamatraf
International Journal of Engineering Research and Technology 1 (8), 2012
142012
Image steganography based on LSB matching and image enlargement
NM Al-Aidroos, HA Bahamish
2019 First International Conference of Intelligent Computing and Engineering …, 2019
62019
Using Chemical Composition of Crude Oil and Artificial Intelligence Techniques to Predict the Reservoir Fluid Properties
SO Baarimah, NM Al-Aidroos, KS Ba-Jaalah
2019 First International Conference of Intelligent Computing and Engineering …, 2019
42019
Data hiding technique based on LSB matching towards high imperceptibility
MH Mohamed, NM Al-Aidroos, MA Bamatraf
MIS REVIEW: An International Journal 18 (1), 57-69, 2012
42012
Data hiding technique based on dynamic LSB
NM AL-Aidroos, MH Mohamed, MA Bamatraf
Naif Arab University for Security Sciences, 2011
42011
Cyber-Security and Social Media Risks Assessment by Using the Novel Concepts of Complex Cubic T-Spherical Fuzzy Information
B Akram, N Jan, A Nasir, A Alabrah, MS Alhilal, N Al-Aidroos
Scientific Programming 2022, 31, 2022
32022
A Comparative Study Between RIPEMD160 and SHA256 Hash Functions On Digital Holy Quran Integrity Verification
NMAAHS Baqtian
Int. J. Sc. Res. in Network Security and Communication 10 (4), 1-7, 2022
2*2022
Efficient and Secure Key Management and Authentication Scheme for WBSNs Using CP-ABE and Consortium Blockchain
NAA Jawaid Iqbal, Hajira Bibi, Noor Ul Amin, Hussain AlSalman, Syed Sajid ...
Journal of Sensors, 20 pages, 2022
22022
Bat Algorithm for Protein Conformational Search
HA Bahamish, NM Al-Aidroos, AN Boraik
2019 First International Conference of Intelligent Computing and Engineering …, 2019
22019
Three Hash Functions Comparison on Digital Holy Quran Integrity Verification
HSBNM Al-Aidroos
International Journal of Scientific Research in Network Security and …, 2023
1*2023
Modified Crow Search Algorithm for Protein Structure Prediction
HABNMAAAN Boraik
International Research Journal of Engineering and Technology (IRJET) 8 (2), 2021
1*2021
Data Hiding Enhancement in Arabic Text
AS Al-Dini, NM Al-Aidroos, Q Khalid
International Journal of Engineering and Artificial Intelligence 2 (1), 32 …, 2021
12021
Innovative Multi-Level Secure Steganographic Scheme based on Pixel Value Difference
MH Mohamed, NM Al-Aidroos, MA Bamatraf
International Journal in Foundations of Computer Science & Technology …, 2012
1*2012
Analysis of the Major Investment Object by Using a Novel Approach Based on Neutrosophic Information
MU Farooq, R Anjum, A Gaffar, H Bashir, N Al-Aidroos, A Alsanad
Computational Intelligence and Neuroscience 2022, 2022
2022
Research Article Efficient and Secure Key Management and Authentication Scheme for WBSNs Using CP-ABE and Consortium Blockchain
J Iqbal, H Bibi, NU Amin, H AlSalman, SS Ullah, S Hussain, N Al-Aidroos
2022
Research Article Analysis of the Major Investment Object by Using a Novel Approach Based on Neutrosophic Information
MU Farooq, R Anjum, A Gaffar, H Bashir, N Al-Aidroos, A Alsanad
2022
Multimodal Biometric Authentication System using Steganography
NM Al-Aidroos, HA Bahamish, MA Bamatraf
International Research Journal of Engineering and Technology (IRJET) 7 (11), 2020
2020
A High Imperceptibility Image Steganography Technique
NMAAMHMMA Bamatraf
The 2nd International Conference on Mathematics & Information Science, Sohag …, 2011
2011
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20