Cloud computing service models: A comparative study MU Bokhari, QM Shallal, YK Tamandani 2016 3rd International Conference on Computing for Sustainable Global …, 2016 | 90 | 2016 |
A review on symmetric key encryption techniques in cryptography MU Bokhari, QM Shallal International journal of computer applications 147 (10), 2016 | 87 | 2016 |
A survey on cloud computing MU Bokhari, Q Makki, YK Tamandani Big data analytics: proceedings of CSI 2015, 149-164, 2018 | 76 | 2018 |
Security and privacy issues in cloud computing MU Bokhari, QM Shallal, YK Tamandani 2016 3rd International Conference on Computing for Sustainable Global …, 2016 | 29 | 2016 |
Reducing the required time and power for data encryption and decryption using K-NN machine learning MU Bokhari, QM Shallal, YK Tamandani IETE Journal of Research 65 (2), 227-235, 2019 | 26 | 2019 |
Automated brain tumor classification using various deep learning models: a comparative study AA Abbood, QM Shallal, MA Fadhel, QM Shallal Indonesian Journal of Electrical Engineering and Computer Science 22 (1 …, 2021 | 22 | 2021 |
Two-step fuzzy logic system to achieve energy efficiency and prolonging the lifetime of WSNs YK Tamandani, MU Bokhari, QM Shallal Wireless Networks 23, 1889-1899, 2017 | 20 | 2017 |
Evaluation of hybrid encryption technique to secure data during transmission in cloud computing MU Bokhari, QM Shallal International Journal of Computer Applications 166 (4), 25-28, 2017 | 13 | 2017 |
Method to implement K-NN machine learningto classify data privacy in IoT environment Q Shallal, Z Hussien, AA Abbood Indonesian Journal of Electrical Engineering and Computer Science (IJEECS …, 2020 | 11 | 2020 |
Internet of things (IoT): a technology review, security issues, threats, and open challenges MAF Alaa Ahmed Abbood, Qahtan Makki Shallal Indonesian Journal of Electrical Engineering and Computer Science 20 (2 …, 2020 | 10 | 2020 |
A comparative study of various routing classes and their key goals in wireless sensor networks YK Tamandani, MU Bokhari, Q Makki Next-Generation Networks: Proceedings of CSI-2015, 271-279, 2018 | 4 | 2018 |
Intelligent hybrid technique to secure bluetooth communications AA Abbood, QM Shallal, HK Jabbar Recent Trends in Signal and Image Processing: ISSIP 2020, 135-144, 2021 | 3 | 2021 |
A Performance Analysis of Hybrid Technique using DES and RSA algorithms MU Bokhari, QM Shallal, YK Tamandani 2017 4th International Conference on Computing for Sustainable Global …, 2017 | 3 | 2017 |
Clustering similar time series data for the prediction the patients with heart disease QMS Raid Luaibi Lafta , Mohanad S. AL-Musaylh Indonesian Journal of Electrical Engineering and Computer Science 26 (2 …, 2022 | 2 | 2022 |
A comprehensive study of position based routing protocols in WSNs MU Bokhari, YK Tamandani, Q Makki 2015 4th International Conference on Reliability, Infocom Technologies and …, 2015 | 2 | 2015 |
An Optimal LEACH-Based Routing Protocol to Balance the Power Consumption and Extending the Lifetime of the WSNs YK Tamandani, MU Bokhari, Q Makki Proceedings of First International Conference on Information and …, 2016 | 1 | 2016 |
Enhancement of Tiny Encryption Algorithm for Resource-Constrained WSNs Using Four Connected Additive Fibonacci Generators AH Zyara, HI Mhaibes, QM Shallal Journal of Cyber Security and Mobility, 349-368, 2024 | | 2024 |
A Smart Content-Based Image Retrieval Approach Based on Texture Feature and Slantlet Transform HI Mhaibes, QM Shallal, MH Abood International journal of electrical and computer engineering systems 13 (8 …, 2022 | | 2022 |
Method to implement K-NN machine learning to classify data privacy in IoT environment AAA Qahtan Makki Shalall, Zaid Alaa Hussain Institute of Advanced Engineering and Science (IAES) 20 (2), 15-22, 2020 | | 2020 |
The Crop Monitoring System-Based on Wireless Sensors Network-(WSN) QM Shallal AUSrevista 9 (25), 113, 2019 | | 2019 |