متابعة
Haidar M. Al-Mashhadi
Haidar M. Al-Mashhadi
Prof. Dr. in College of Computer Science and Information Technology, Information Systems
بريد إلكتروني تم التحقق منه على uobasrah.edu.iq
عنوان
عدد مرات الاقتباسات
عدد مرات الاقتباسات
السنة
Color image encryption using chaotic maps, triangular scrambling, with DNA sequences
HM Al-Mashhadi, IQ Abduljaleel
2017 International Conference on Current Research in Computer Science and …, 2017
322017
A survey of email service; attacks, security methods and protocols
HM Al-Mashhadi, MH Alabiech
International Journal of Computer Applications 162 (11), 2017
132017
HYBRID HOMOMORPHIC CRYPTOSYSTEM FOR SECURE TRANSFER OF COLOR IMAGE ON PUBLIC CLOUD
ALAAAK HAIDER M. AL-MASHHADI
Journal of Theoretical and Applied Information Technology 96 (19), 6474-6486, 2018
12*2018
Secure and time efficient hash-based message authentication algorithm for wireless sensor networks
HM Al-Mashhadi, HB Abdul-Wahab, RF Hassan
2014 Global Summit on Computer & Information Technology (GSCIT), 1-7, 2014
122014
The quality of image encryption techniques by reasoned logic
MK Hussein, KR Hassan, HM Al-Mashhadi
TELKOMNIKA (Telecommunication Computing Electronics and Control) 18 (6 …, 2020
112020
Data security protocol for wireless sensor network using chaotic map
HM Al-Mashhadi, HB Abdul-Wahab, RF Hassan
International Journal of Computer Science and Information Security 13 (8), 80, 2015
82015
Improving blockchain consensus mechanism via network clusters
AJ Al-Musharaf, SM Al-Alak, HM Al-Mashhadi
2021 1st Babylon International Conference on Information Technology and …, 2021
62021
QR code based two-factor authentication to verify paper-based documents
MAU Naser, ET Jasim, HM Al-Mashhadi
TELKOMNIKA (Telecommunication Computing Electronics and Control) 18 (4 …, 2020
62020
IoT Based Multitasking Games and Entertainment Arcade Station using Raspberry-Pi
HMJ Iman Mohsin Hassan, Haider M. Al-Mashhadi, Kareem Radhi Hassan
JOURNAL OF SOUTHWEST JIAOTONG UNIVERSITY 54 (3), 7, 2019
62019
Methodologies, Requirements, and Challenges of Cybersecurity Frameworks: A Review
AD Khaleefah, HM Al-Mashhadi
Iraqi Journal of Science, 2024
52024
Quality Assessment for Image Encryption Techniques using Fuzzy Logic System
HM Al-Mashhadi
International Journal of Computer Applications 157 (5), 22-26, 2017
42017
Chaotic Encryption Scheme for Wireless Sensor Network’s Message
HM Al-Mashhadi, HB AbdulWahab, RF Hassan
Proc World Symp Comput Netw Inf Sec, 116-120, 2014
32014
Detection of iot botnet cyber attacks using machine learning
AD Khaleefah, HM Al-Mashhadi
Informatica 47 (6), 2023
22023
Symmetric ECC with Variable Key using Chaotic Map
HM Al-Mashhadi, MH Alabiech
International Journal of Computer Science Issues (IJCSI) 14 (6), 24-28, 2017
22017
Enforcement of Color Image Copyright Using the Frequency Domain
MK Haider M. Al-Mashhadi, Zainab Dahoos
Journal Basrah Researches ((Sciences)) 35 (1), 17-25, 2009
2*2009
Big data aggregation, visualization and clustering for Smart Grid in Smart City using machine learning
HM Al-Mashhadi, HJ Fahad
IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING …, 2023
12023
Design and Implementation of a Smart Integrated Framework to Monitor and Control the Smart City using the Internet of Things
HM Al-Mashhadi, KR Hassan
Journal of Southwest Jiaotong University 54 (6), 2019
12019
Design and Implementation IOT2ALK cloud Computing Platform for IOT Applications
ZK Mohsin, HM Al-Mashhadi, MN Tahan
BIO Web of Conferences 97, 00046, 2024
2024
Enhanced Security of Iraqi National Card Based on Blockchain Technique
MM Ashor, HM Al-Mashhadi
Iraqi Journal of Intelligent Computing and Informatics (IJICI) 2 (2), 58-67, 2023
2023
Design AI platform using fuzzy logic technique to diagnose kidney diseases
HM Al-Mashhadi, AL Khudhair
TELKOMNIKA (Telecommunication Computing Electronics and Control) 21 (2), 324-332, 2023
2023
يتعذر على النظام إجراء العملية في الوقت الحالي. عاود المحاولة لاحقًا.
مقالات 1–20