Important parameters analysis of the single-walled carbon nanotubes composite materials YN Jurn, F Malek, SA Mahmood, WW Liu, EK Gbashi, MA Fakhri ARPN Journal of Engineering and Applied Sciences 11 (8), 5108-5113, 2016 | 23 | 2016 |
Intrusion detection system for NSL-KDD dataset based on deep learning and recursive feature elimination B Mohammed, EK Gbashi Engineering and Technology Journal 39 (7), 1069-1079, 2021 | 21 | 2021 |
Novel lightweight video encryption method based on ChaCha20 stream cipher and hybrid chaotic map ESM Abeer Tariq Maolood, Ekhlas Khalaf Gbashi International Journal of Electrical and Computer Engineering (IJECE) 12 …, 2022 | 11* | 2022 |
Propose hmnids hybrid multilevel network intrusion detection system SK Majeed, SH Hashem, IK Gbashi International Journal of Computer Science Issues (IJCSI) 10 (5), 200, 2013 | 7 | 2013 |
E-voting System Based on Ethereum Blockchain Technology Using Ganache and Remix Environments EKG Hind S. Hassan,Rehab Hassan Engineering and Technology Journal 41 (4), 562- 577, 2023 | 6* | 2023 |
Text Compression & Encryption Method Based on RNA and MTF DE Gbashi Iraqi Journal of Science 58 (ISSN: 0067-2904), pp: 1149-1158, 2017 | 6 | 2017 |
Improvement Personalization of Website Using Database and Cookies", EK Gbashi Eng. & Tech. Journal 28, 2010 | 5 | 2010 |
Proposed secret encoding method based genetic algorithm for elliptic curve cryptography method EK Gbashi Iraqi Journal of Information Technology 8 (3), 2018 | 4 | 2018 |
Scale-invariant feature transform algorithm with fast approximate nearest neighbor EK Gbash, SM Saleh Baghdad Science Journal 14 (3), 0651-0651, 2017 | 4 | 2017 |
Proposed vision for Network Intrusion Detection System Using Latent Semantic Analysis and Data Mining EK Gbashi 2014 6th Computer Science and Electronic Engineering Conference (CEEC …, 2014 | 4 | 2014 |
Development of Electronic Elections Systems: A Review H Salman, R Hasan, EK Gbashi Webology 19 (1), 1750-1762, 2022 | 3 | 2022 |
Novel Dynamic S-Box Based on Password Key and Circle Map ATM Ala'a Talib Khudhair, Ekhlas Khalaf Gbashi Iraqi Journal of Science 64 (9), 4767-4778, 2023 | 1* | 2023 |
Novel Dynamic S-Box Based on Password Key and Circle Map. AT Khudhair, EK Gbashi, AT Maolood Iraqi Journal of Science 64 (9), 2023 | 1 | 2023 |
NTRU_ SSS: Anew Method Signcryption Post Quantum Cryptography Based on Shamir’s Secret Sharing. AI Hussein, AT MaoLood, EK Gbashi Computers, Materials & Continua 76 (1), 2023 | 1 | 2023 |
Privacy Security System for Video Data Transmission in Edge-Fog-cloud Environment. EK Gbashi, AT Maolood, YN Jurn International Journal of Intelligent Engineering & Systems 16 (2), 2023 | 1 | 2023 |
A Novel Chaotic map to improve Security Image Based on Mandelbrot Fractals AI Hussein, AT MaoLood, EK Gbashi 2022 International Conference on Data Science and Intelligent Computing …, 2022 | 1 | 2022 |
Chaotic System and DNA Computing operations for image Encryption Based on Pixels Shuffling EKG Alaa kadhim Farhan Al-Qadisiyah Journal of Pure Science 26 (2), pp. Comp. 1–14, 2021 | 1 | 2021 |
Spam Classification Using Genetic Algorithm. RA Atta, EK Gbashi Iraqi Journal of Information Technology 9, 2018 | 1 | 2018 |
Generate Cryptographic key using generated 3D-Digital Image HBA Wahab, SM Kadhum, EK Gbashi | 1 | 2009 |
A review of Chaotic Maps used for Generating Secure Random Keys B Abdulwahid Hameed, EK Gbashi BIO Web of Conferences 97, 00070, 2024 | | 2024 |