Name : Ali A. Yassin

title : Professor

College : Education for Pure Sciences

Department : Computer Science

Email : ali.yassin@uobasrah.edu.iq

Ali A. Yassin

Publications

Title of Search Type Publisher year Global Single Thompson Reuters
(Clarivate)
Scopes Download
Omicron virus emotions understanding system based on deep learning architecture Journal Journal of Ambient Intelligence and Humanized Computing 2023 download
Locality Improvement Scheme Based on QR Code Technique within Inverted Index Journal Informatica 2023
Secure two-factor mutual authentication scheme using shared image in medical healthcare environment Journal Bulletin of Electrical Engineering and Informatics 2023
Secure two-factor mutual authentication scheme using shared image in medical healthcare environment Journal Bulletin of Electrical Engineering and Informatics 2023
Secure Electronic Healthcare Record Using Robust Authentication Scheme, Journal IAENG International Journal of Computer Science 2023
Breast Cancer Prediction Using Soft Voting Classifier Based on Machine Learning Models Journal IAENG International Journal of Computer Science 2023
Omicron virus emotions understanding system based on deep learning architecture Journal Journal of Ambient Intelligence and Humanized Computing 2023
A lightweight and secure multilayer authentication scheme for wireless body area networks in healthcare system Journal International Journal of Electrical and Computer Engineering (IJECE) 2023
Authentication Healthcare Scheme in WBAN Journal Iraqi Journal for Electrical and Electronic Engineering 2023
Using Pearson Correlation and Mutual Information (PC-MI) to Select Features for Accurate Breast Cancer Diagnosis Based on a Soft Voting Classifier Journal Iraqi Journal for Electrical and Electronic Engineering 2023
Towards for Designing Educational System Using Role-Based Access Control Journal International Journal of Intelligent Engineering and Systems 2023
Secure Electronic Healthcare Record based on Distributed Global Database and Schnorr Signcryption Journal Journal for Electrical and Electronic Engineering 2023
Secure Electronic Healthcare Record based on Distributed Global Database and Schnorr Signcryption Journal Journal for Electrical and Electronic Engineering 2023
Virtual SmartCards-based Authentication in Healthcare Systems and Applications Journal International Journal of Computer Information Systems and Industrial Management Applications 2023
Improving the Performance of Searchable Symmetric Encryption by Optimizing Locality Journal Basrah Researches Sciences 2023
, EPSAPI: An efficient and provably secure authentication protocol for an IoT application environment Journal Peer-to-Peer Networking and Applications 2022
Secure authentication and privacy-preserving to improve video streaming vehicle ad-hoc network Journal Indonesian Journal of Electrical Engineering and Computer Science 2022
Building an efficient content based image retrieval system by changing the database structure Journal Indonesian Journal of Electrical Engineering and Computer Science 2022
Electronic Health Records System Using Blockchain Technology Journal Webology, Volume 18, Special Issue on Current Trends in Management and Information Technology, October, 2021 2021
Password authentication scheme based on smart card and QR code Journal Indonesian Journal of Electrical Engineering and Computer Science 2021
An Efficient Mechanism to Prevent the Phishing Attacks. Journal Iraqi Journal for Electrical & Electronic Engineering 2021
Towards design strong emergency and COVID-19 authentication scheme in VANET Journal Indonesian Journal of Electrical Engineering and Computer Science 2021
Towards for Designing Intelligent Health Care System Based on Machine Learning Journal Iraqi Journal for Electrical & Electronic Engineering 2021
A Novel Image Encryption Scheme Based on DCT transform and DNA Sequence Journal Institute of Advanced Engineering and Science (IAES) 2021
Towards design strong emergency and COVID-19 authentication scheme in VANET Journal Institute of Advanced Engineering and Science (IAES) 2021
Multi-factor Authentication for an Administrator’s Devices in an IoT Environment Journal Springer 2021
SMART CITY SECURITY: FACE-BASED IMAGE RETRIEVAL MODEL USING GRAY LEVEL CO-OCCURRENCE MATRIX Journal : Journal of Information and Communication Technology (JICT) Vol.19, No.3, July 2020, UUM Press 2020
Novel Scheme for Enhancing Storage Management and Performance and Saving Energy of Mobile Cloud Computing Journal (Journal of Computer Science (JCS, Science Publication 2019
Low-Overhead Remote User Authentication Protocol for IoT Based on a Fuzzy Extractor and Feature Extraction Journal IEEE Access, IF=4 2019
Robust Conditional Privacy-Preserving Authentication based on Pseudonym Root with Cuckoo Filter in Vehicular Ad Hoc Networks Journal KSII Transactions on Internet and Information Systems, IF=0.666 2019
Efficient Conditional Anonymity With Message Integrity and Authentication in a Vehicular Ad-Hoc Network Journal IEEE Access 2019
A New Scheme for Removing Duplicate Files from Smart Mobile Devices: Images as a Case Study Journal (Cihan University-Erbil Scientific Journal (CUESJ 2019
Authentication and revocation scheme for VANETs based on Chinese remainder theorem Conference Poster Paper,(The 21th IEEE International Conference on High Performance Computing and Communications (HPCC-2019) 2019
Efficient and Flexible Multi-Factor Authentication Protocol Based on Fuzzy Extractor of Administrator’s Fingerprint and Smart Mobile Device Journal Cryptography ,MDPI 2019
Flexible and Efficient Authentication of IoT Cloud Scheme Using Crypto Hash Function Conference ACM 2018
TOWARD FOR STRONG AUTHENTICATION CODE IN CLOUD OF INTERNET OF THINGS BASED ON DWT AND STEGANOGRAPHY. Journal Journal of Theoretical and Applied Information Technology 2018
Privacy preserving search over multiple servers Journal Inderscience Publishers (IEL) 2017
Computing the shortest route among multiple points without revealing their geographical locations Journal Journal of Al-Qadisiyah for computer science and mathematics 2017
A Distributed Clustering Methodology for Connecting Dense Sensor Network Fields Journal IJIREC 2016
Secure and efficient e-health scheme based on the Internet of Things Conference IEEE 2016
Strong Authentication Scheme Based on Hand Geometry and Smart Card Factors Journal Multidisciplinary Digital Publishing Institute 2016
Ensuring Data Integrity Scheme Based on Digital Signature and Iris Features in Cloud Journal Indonesian Journal of Electrical Engineering and Computer Science 2016
Towards Efficient Authentication Scheme with Biometric Key Management in Cloud Environment Conference IEEE 2016
An Efficient Public Verifiability and Data Integrity Using Multiple TPAs in Cloud Data Storage Conference IEEE 2016
MACLESS Steganography using Double-stegging with Handwritten Signature in Cloud Computing Conference IEEE 2016
Public Auditing for Secure Shared Data Storage in Cloud with Multi-User Modification Conference IEEE 2016
Robust Scheme to Protect Authentication Code of Message/Image Documents in Cloud Computing Conference IEEE 2016
New data integrity scheme employing wavelet-based digital watermarking in cloud environment Conference IEEE 2015
Robust image document authentication code with autonomous biometrie key generation, selection, and updating in cloud environment Conference IEEE 2015
Public auditing for secure data storage in cloud through a third party auditor using modern ciphertext Conference IEEE 2015
Robust Image Document Authentication Code with Autonomous Biometric Key Generation, Selection, and Updating in Cloud Environment Conference IEEE 2015
Public Auditing for Secure Data Storage in Cloud through a Third Party Auditor Using Modern Ciphertext Conference IEEE 2015
New Data Integrity Scheme Employing Wavelet-Based Digital Watermarking in Cloud Environment Conference IEEE 2015
Password Authentication Between Past And Future: Survey Conference Digenets Co 2015
Cloud authentication based on encryption of digital image using edge detection Conference IEEE 2015
Secure and Efficient Data Integrity Based on Iris Features in Cloud Computing Conference IEEE 2014
An efficient and robust one-time message authentication code scheme using feature extraction of iris in cloud computing Conference IEEE 2014
A New Message Authentication Code Scheme Based on Feature Extraction of Fingerprint in Cloud Computing Journal International Journal of Engineering Research & Technology 2014
Towards efficient yet privacy-preserving approximate search in cloud computing Journal OUP 2014
Fast Video compression method based on wavelet transform and simple efficient search algorithm Journal J.Thi-Qar Sci 2014
Security and integrity of data in cloud computing based on feature extraction of handwriting signature Journal sdiwc 2014
Efficiency and Flexibility of Fingerprint Scheme Using Partial Encryption and Discrete Wavelet Transform to Verify User in Cloud Computing Journal hindawi 2014
Cloud Authentication Based on Anonymous One-Time Password. Book Chapter in Cloud computing Chapter Springer Press 2013
Using Discrete Wavelet Transformation To Enhance Underwater Image Journal International Journal of Computer Science Issue 2013
Efficient and Secure Mutual Authentication Scheme in Cloud Computing Journal 2013
Secure Password by Using Two Factor Authentication in Cloud Computing Conference SERSC Publishing 2013
Design New Algorithm For Partial Image Encryption Based colors Space Journal Journal of University of Babylon 2013
A Practical Privacy preserving Password authentication Scheme for Cloud Computing Conference IEEE 2012
Encrypted Remote User Authentication Scheme by Using Smart Card Chapter Springer Press 2012
Anonymous Password Authentication Scheme by Using Digital Signature and Fingerprint in Cloud Computing Conference IEEE Press 2012
Efficient Password-based Two Factors Authentication in Cloud Computing Journal International Journal of Security and Its Applications 2012
Secure Rank-Ordered Search of Multi-keyword Trapdoor over Encrypted Cloud Data Conference IEEE Press 2012
Approximate Keyword-based Search over Encrypted Cloud Data Conference IEEE Press 2012
Towards Privacy Preserving Mining over Distributed Cloud Databases Conference IEEE Press 2012
Design A System For Image Matching By Using Fuzzy C-Means Clusters Journal IASJ 2011
Partial Encryption Of Color Image By Edge Detection Journal Journal of Al-Qadisiyah for computer science and 2010
Building Recognition Journal Thi-Qar University Journal for Engineering Sciences 2010
Design Algorithm for Text and Figures Separating from Printed Image Document Journal (Journal of Basrah Researches (Sciences 2007