Folgen
Mohammed Abdullah M. Bamatraf
Mohammed Abdullah M. Bamatraf
Hadhramout university
Bestätigte E-Mail-Adresse bei hu.edu.ye - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Data Hiding by LSB Substitution Using Genetic Optimal Key-Permutation.
M Mohamed, F Al-Afari, MA Bamatraf
Int. Arab. J. e Technol. 2 (1), 11-17, 2011
512011
Automated classification of malignant and benign breast cancer lesions using neural networks on digitized mammograms
MM Abdelsamea, MH Mohamed, M Bamatraf
Cancer informatics 18, 1176935119857570, 2019
222019
A combined image Steganography technique based on edge concept and dynamic LSB
MH Mohamed, NM AL-Aidroos, AM Bamatraf
International Journal of Engineering Research and Technology 1 (8), 2012
142012
An effective image feature classiffication using an improved som
M Abdelsamea, MH Mohamed, M Bamatraf
arXiv preprint arXiv:1501.01723, 2015
102015
Keystroke authentication on enhanced needleman alignment algorithm
S Bamatraf, M Bamatraf, O Hegazy
Intelligent Information Management 2014, 2014
62014
Enhanced Self-Organizing Map Neural Network for DNA Sequence Classification
M Mohamed, AA Al-Mehdhar, M Bamatraf, MR Girgis
Scientific Research Publishing, 2013
52013
Interpretation trained neural networks based on genetic algorithms
SS Ibrahim, MA Bamatraf
International Journal of Artificial Intelligence & Applications 4 (1), 13, 2013
42013
Data hiding technique based on LSB matching towards high imperceptibility
MH Mohamed, NM Al-Aidroos, MA Bamatraf
MIS REVIEW: An International Journal 18 (1), 57-69, 2012
42012
Data hiding technique based on dynamic LSB
NM AL-Aidroos, MH Mohamed, MA Bamatraf
Naif Arab University for Security Sciences, 2011
42011
Clustering analysis to improve web search ranking using PCA and RMSE
MA Ko’adan, MA Bamatraf, KQ Shafal
Advances on Smart and Soft Computing: Proceedings of ICACIn 2020, 93-105, 2021
32021
SOM PAD: Novel Data Security Algorithm on Self Organizing Map
M Mohamed, A Al-Mehdhar, M Bamatraf
Computer Science and Information Technology (CS and IT), 2012
32012
The impact of control flow obfuscation technique on software protection against human attacks
MH BinShamlan, MA Bamatraf, AA Zain
2019 First International Conference of Intelligent Computing and Engineering …, 2019
22019
Data Benchmark Collection Of Patients With Malaria For Machine Learning: A Study In Hadhramout-Yemen
R Al-Dhaibani, MAM Bamatraf, KQ Sha'Afal
2019 First International Conference Of Intelligent Computing And Engineering …, 2019
22019
Innovative Multi-Level Secure Steganographic Scheme based on Pixel Value Difference
MH Marghny, NM AL-Aidroos, MA Bamatraf
International Journal in Foundations of Computer Science & Technology 2 (6 …, 2012
22012
Mohd. Najib Mohd. Salleh,“
A Bamatraf, R Ibrahim
Journal of Computing 3 (4), 1-8, 0
2
Experimental Evaluation of the Obfuscation Techniques Against Reverse Engineering
MH Bin Shamlan, AS Alaidaroos, MH Bin Merdhah, MA Bamatraf, AA Zain
Advances on Smart and Soft Computing: Proceedings of ICACIn 2020, 383-390, 2021
12021
Innovative Multi-Level Secure Steganographic Scheme based on Pixel Value Difference
MH Mohamed, NM Al-Aidroos, MA Bamatraf
International Journal in Foundations of Computer Science & Technology …, 0
1
Hadhramout University Journal of Natural & Applied Science s
SA Bahwal, MA Jawass, FS Naji, AA Baeissa, SQM Saleh, MS Bashanaini, ...
Sciences 14 (2), 5, 2020
2020
Multimodal Biometric Authentication System using Steganography
NM Al-Aidroos, HA Bahamish, MA Bamatraf
2020
The Improving Accurate Candidates for Missing Data Using Benefit Performance of (ML-SOM)
ALM Abeer, M Bamatraf
Hadhramout University Journal of Natural and Applied Sciences 17 (1), 2020
2020
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20