Undo
Follow
Hayfaa Abdulzahra Atee
Hayfaa Abdulzahra Atee
Middle Technical University - Institute of Administration Rusafa
Verified email at mtu.edu.iq
Title
Cited by
Cited by
Year
Extreme learning machine based optimal embedding location finder for image steganography
HA Atee, R Ahmad, NM Noor, AMS Rahma, Y Aljeroudi
PloS one 12 (2), e0170329, 2017
332017
Cryptography and image steganography using dynamic encryption on LSB and color image based data hiding
HA Atee, R Ahmad, NM Noor
Middle-East Journal of Scientific Research 23 (7), 1450-1460, 2015
162015
Cryptanalysis cipher text using new modeling: Text encryption using elliptic curve cryptography
MA Naji, DA Hammood, HA Atee, RS Jebur, HA Rahim, RB Ahmad
AIP Conference Proceedings 2203 (1), 020003, 2020
102020
Cryptanalysis cipher text using new modeling: Text encryption using elliptic curve cryptography
RBA Maitham Ali Naji, Dalal Abdulmohsin Hammood, Hayfaa Abdulzahra Atee ...
AIP Conference Proceedings 2203, 020003 (2020) 2203 (1), 020003-1-020003-9, 2020
10*2020
Machine Learning Based Key Generating for Cryptography** Hayfaa A. Atee,“Robiah Ahmad,“Norliza Mohd Noor and** Abidulkarim K. Ilijan" Foundation of Technical Education, Higher …
HA Atee
Journal of Engineering and Applied Sciences 100 (8), 1829-1834, 2016
82016
Breaking A Playfair Cipher Using Single and Multipoints Crossover Based on Heuristic Algorithms
MA Naji, HA Atee, RS Jebur, DA Hammood, CS Der, AS Abosinnee, ...
2021 4th International Iraqi Conference on Engineering Technology and Their …, 2021
62021
A steganography approach based on particle swarm optimization and least significant bit in color images
HA Atee, DA Hammood, AKI Yasari
AIP Conference Proceedings 2496 (1), 2022
52022
TEXT IN IMAGE STEGANOGRAPHY BASED ON A DYNAMIC NON-SEQUENTIAL LEAST SIGNIFICANT BIT TECHNIQUE IN GRAYSCALE AND RGB IMAGES
NMN HAYFAA ABDULZAHRA ATEE, ABIDULKARIM K.I.YASARI, ROBIAH AHMAD
Journal of Theoretical and Applied Information Technology 97 (5), 1615-1622, 2019
52019
Flexible online multi-objective optimization framework for ISA100. 11a standard in beacon-enabled CSMA/CA mode
AKI Yasari, LA Latiff, RA Dziyauddin, MA Lilo, Y Aljeroudi, HA Atee
Computers & Electrical Engineering 64, 537-551, 2017
52017
A novel extreme learning machine‐based cryptography system
HA Atee, R Ahmad, NM Noor, AMS Rahma, MS Sallam
Security and Communication Networks 9 (18), 5472-5489, 2016
52016
Iraqi Stock Market Prediction Using Artificial Neural Network and Long Short-Term Memory
SHA AlHakeem, NJ Al-Anber, HA Atee, MM Amrir
Journal of Techniques 5 (1), 156-163, 2023
32023
AN IMPROVED CHAOTIC RADIAL BASIS RESONANCE THEORETIC NEURAL NETWORK INTEGRATED WITH GENETIC ALGORITHM FOR ENHANCING SECURITY IN IMAGE TRANSMISSION
HA Atee
32018
A Combined Crypto-Stego System Using Dynamic Encryption Assisted Intensity Color Steganography
Hayfaa Abdulzahra Atee, Robiah Ahmad, Norliza Mohd Noor, Abidulkarim K. Ilijan
International Journal of Control Theory and Applications 9 (30), 175-184, 2016
22016
Development of A New Way To Encrypt The Arabic Language Letters Using The Symmetric Encryption System
HAZ Atee
Journal of Techniques 24 (6), 2011
22011
Iraqi Stock Market Prediction Using Hybrid LSTM and CNN Algorithm
S AlHakeem, N Al-Anber, H Atee
2022 Fifth College of Science International Conference of Recent Trends in …, 2022
12022
Lazy multi-level dynamic traffic load balancing protocol for data center (lmdtlb)
AK Yasari, AD Abbas, HA Atee, L Latiff, RA Dziyauddin
Journal of Engineering Science and Technology 16 (3), 2439-2453, 2021
12021
Implantation of Caesar and Hill Cipher on Database for Better Security
M Naji, DA Hammood, HA Atee, S Yahia
Eur. J. Technol. Eng 18, 24, 2019
12019
ADVANCED ENCRYPTION STANDARD ALGORITHM VERSUS EXTREME LEARNING MACHINE BASED WEIGHT: A COMPARATIVE STUDY
HA Atee, R Ahmad, NM Noor, AK Ilijan
12017
Improved Search Pattern with Discrete Wavelet Transform for Video Steganography
HA Atee, AKI Yasari, DA Hammood
International Conference on Emerging Technologies and Intelligent Systems …, 2021
2021
Machine Learning Based Key Generating for Cryptography
NMNAKI Hayfaa A. Atee, Robiah Ahmad
Journal of Engineering and Applied Sciences 100 (8), 1829-1834, 2016
2016
The system can't perform the operation now. Try again later.
Articles 1–20