العنوان : استاذ
الكلية : التربية للعلوم الصرفة
القسم : الحاسبات
البريد الالكتروني : Iman.abduljaleel@uobasrah.edu.iq
رابط Google Scholar: | https://scholar.google.com/citations?hl=ar&user=zCRiJVQAAAAJ&view_op=list_works&gmla=AJsN-F4ZxmOd_-4... |
---|---|
رابط Research Gate : | https://www.researchgate.net/profile/Iman_Abduljaleel |
رابط Web of Science : | https://publons.com/researcher/2914857/iman-qays/ |
رابط Scopus : | https://www.scopus.com/authid/detail.uri?authorId=57195287313 |
رابط ORCID : | https://orcid.org/0000-0002-8068-5710 |
عنوان البحث | النوع | الناشر | السنة | عالمي | مفرد | ثومبسون رويتر (كلارفيت) |
سكوبس | تحميل |
---|---|---|---|---|---|---|---|---|
Hiding scrambled text messages in speech signals using a lightweight hyperchaotic map and conditional LSB mechanism | بحث مجلة | PLOS ONE | 2024 | |||||
A Provably Secure Anonymous Authentication Protocol for Consumer and Service Provider Information Transmissions in Smart Grids | بحث مجلة | Cryptography | 2024 | |||||
Deep Sentiment Analysis System with Attention Mechanism for the COVID-19 Vaccine | بحث مجلة | Tem Journal | 2024 | |||||
Low complexity smart grid security protocol based on elliptic curve cryptography, biometrics and hamming distance | بحث مجلة | PLOS ONE | 2024 | |||||
A provably lightweight and secure DSSE scheme, with a constant storage cost for a smart device client | بحث مجلة | PLOS ONE | 2024 | |||||
Lightweight Integrity Preserving Scheme for Secure Data Exchange in Cloud-Based IoT Systems | بحث مجلة | Applied Sciences | 2023 | |||||
Energy Efficient Dynamic Symmetric Key Based Protocol for Secure Traffic Exchanges in Smart Homes | بحث مجلة | Applied Sciences | 2022 | |||||
Optimized Hysteresis Region Authenticated Handover for 5G HetNets | فصل من كتاب | Artificial Intelligence and Sustainable Computing | 2022 | |||||
A Lightweight Hybrid Scheme for Hiding TextMessages in Colour Images Using LSB, Lah Transformand Chaotic Techniques | بحث مجلة | Journal of Sensor and Actuator Networks | 2022 | |||||
Provably Secure and Fast Color Image Encryption Algorithm Based on S-Boxes and Hyperchaotic Mapping | بحث مجلة | IEEE Access | 2022 | |||||
Dynamic Ephemeral and Session Key Generation Protocol for Next Generation Smart Grids | بحث مجلة | Springer Nature Switzerland AG 2022 | 2022 | |||||
Session-Dependent Token-Based Payload Enciphering Scheme for Integrity Enhancements in Wireless Networks | بحث مجلة | Journal of Sensor and Actuator Networks | 2022 | |||||
Speech Encryption Technique using S - box based on Multi Chaotic Maps | بحث مجلة | TEM Journal | 2021 | |||||
Speech signal compression and encryption based on sudoku, fuzzy C-means and threefish cipher | بحث مجلة | International Journal of Electrical and Computer Engineering (IJECE) | 2021 | |||||
An Image of Encryption Algorithm Using Graph Theory and Speech Signal Key Generation | بحث مؤتمر | IOP | 2021 | |||||
Secure image hiding in speech signal by steganography-mining and encryption | بحث مجلة | Indonesian Journal of Electrical Engineering and Computer Science | 2021 | |||||
Towards Security and Privacy Preservation in 5G Networks | بحث مؤتمر | Telecommunications forum TELFOR | 2021 | |||||
Significant Medical Image Compression Techniques: A Review | بحث مجلة | TELKOMNIKA Telecommunication, Computing, Electronics and Control | 2021 | |||||
Hide Medical Images in a Speech Signal using DNA Coding and Fuzzy C-Means | بحث مؤتمر | IEEE | 2021 | |||||
CHAOTIC IMAGE CRYPTOGRAPHY SYSTEMS: A REVIEW | بحث مجلة | مجلة سامراء للعلوم الصرفة | 2021 | |||||
Hiding text in speech signal using K-means, LSB techniques and chaotic maps | بحث مجلة | International Journal of Electrical and Computer Engineering | 2020 | |||||
A novel technique for speech encryption based on k-means clustering and quantum chaotic map | بحث مجلة | Bulletin of Electrical Engineering and Informatics | 2020 | |||||
Color Image Encryption using Chaotic Maps, Triangular Scrambling, with DNA Sequences | بحث مجلة | IEEE | 2017 | |||||
Leaf Recognition based on Neural Network Feed-Forward and Support Vector Machine Classifiers | بحث مجلة | International Journal of computer Science and Mobile Computing | 2017 | |||||
Analysis of a Modified on Rivets Cipher (RC4) Algorithm by Chaotic Algorithm | بحث مجلة | Journal of College of Education / Wasit, Volume 1, Issue 27, Pages 473-484 | 2017 | |||||
Hiding a medical image in an audio file Using (Curvelet / IWT) transforms and modified LBS method | بحث مجلة | مجلة البصرة للعلوم | 2016 | |||||
Using IWT and LSB Method to Hide Encrypted image in Color image | بحث مجلة | مجلة ابحاث البصرة - العلميات | 2016 | |||||
Proposed Image Encryption Algorithm Using Block Rotation And Elliptic Curve Cryptography | بحث مجلة | مجلة ميسان للدراسات الاكاديمية | 2014 | |||||
Speech encryption using Chaotic Map and Blowfish Algorithms | بحث مجلة | مجله ابحاث البصرة-العلميات | 2013 | |||||
Hybrid Proposed Method Using Statistical Linguistic Features (SLF) And Neural Network In Arabic Texts Summarization | بحث مجلة | مجلة البصرة للعلوم | 2013 | |||||
Isolated handwritten Arabic Optical Character Recognition (IHAOCR) using Wavelet\Curvelet Feature Extraction | بحث مجلة | مجله القادسيه لعلوم الحاسوب والرياضيات | 2012 | |||||
Comparing Study Using DWT/CT transform in image Denoising process | بحث مجلة | مجلة البصرة للعلوم | 2012 | |||||
Speech encryption Technique based on Bio-Chaotic Algorithm | بحث مجلة | مجلة المنصور,عدد 17 | 2012 | |||||
خوارزمية مقترحة لتحديد زاوية انحراف النصوص العربية المكتوبة يدويا باستخدام تحويليHough \ Radon | بحث مجلة | مجلة الرياضيات والحاسبات \ جامعة القادسية \ العدد 1 | 2011 | |||||
التمييــــــز الآلــــي لمخطـــــوطات برايـــــــل العــــــربية | بحث مجلة | مجلة الرياضيات والحاسبات \ جامعة الكوفة\ العدد 3 | 2011 | |||||
Speech Analysis Technique For Speech Compression | بحث مجلة | i-manager's Journal on Software Engineering | 2011 | |||||
An Automatic Recognizer for Iraqi License Plates Using ELMAN Neural Network | بحث مجلة | J. Software Engineering & Applications | 2010 |