关注
Dujan B. Taha
Dujan B. Taha
University of Mosul, College of Computer Science and Mathematics
在 uomosul.edu.iq 的电子邮件经过验证
标题
引用次数
引用次数
年份
A comparison study for intrusion database (KDD99, NSL-KDD) based on self organization map (SOM) artificial neural network
DB Mahmood Subhy, LAHEEB M. IBRAHIM
Journal of Engineering Science and Technology 8 (1), 107-119, 2013
1782013
From cloud computing security towards homomorphic encryption: A comprehensive review
SJ Mohammed, DB Taha
TELKOMNIKA (Telecommunication Computing Electronics and Control) 19 (4 …, 2021
212021
A comparison between the performance of DWT and LWT in image watermarking
DB Taha, TB Taha, NB Al Dabagh
Bulletin of Electrical Engineering and Informatics 9 (3), 1005-1014, 2020
212020
Performance evaluation of RSA, ElGamal, and paillier partial homomorphic encryption algorithms
SJ Mohammed, DB Taha
2022 International Conference on Computer Science and Software Engineering …, 2022
202022
A new tamper detection algorithm for video
S A Hasso, T Basheer Taha
Journal of Engineering Science and Technology (JESTEC) 15 (5), 3375-3387, 2020
82020
Privacy Preserving Algorithm using Chao-Scattering of Partial Homomorphic Encryption
SJ Mohammed, DB Taha
Journal of Physics: Conference Series 1963 (1), 012154, 2021
72021
Paillier cryptosystem enhancement for Homomorphic Encryption technique
SJ Mohammed, DB Taha
Multimedia Tools and Applications 83 (8), 22567-22579, 2024
62024
Digital image watermarking algorithm based on texture masking model
T Basheer Taha
Journal of Engineering Science and Technology 14 (6), 3347-3360, 2019
52019
Conducting multi-class security metrics from enterprise architect class diagram
OS Mohammed, DB Taha
International Journal of Computer Science and Information Security 14 (4), 56, 2016
42016
Handwritten text recognition using crnn
AA Idris, DB Taha
2022 8th International Conference on Contemporary Information Technology and …, 2022
32022
Machine learning for software vulnerability detection: A survey
SJ Ahmed, DB Taha
2022 8th International Conference on Contemporary Information Technology and …, 2022
32022
Implementation of OCR using Convolutional Neural Network (CNN): A Survey
AA Alkaddo, D Albaqal
Journal of Education and Science 31 (3), 27-41, 2022
22022
Measure extendibility/extensibility quality attribute using object oriented design metric
TR Alreffaee, MMA Dabdawb, DB Taha
TELKOMNIKA (Telecommunication Computing Electronics and Control) 19 (5 …, 2021
22021
Towards a New Metric for Watermarked Image Assessment
DB Taha, TB Taha
2019 2nd International Conference on Electrical, Communication, Computer …, 2019
22019
Conducting Security Metrics for Object-oriented Class Design
DB Taha, OS Mohammed
International Journal of Computer Science and Information Security 15 (8), 2017
22017
Digital Image Recovery Based on Lifting Wavelet Transform
TB Taha, DB Taha, R Ngadiran, P Ehkhan
Journal of Physics: Conference Series 1962 (1), 012021, 2021
12021
IMAGE WATERMARKING ALGORITHM BASED ON A COMBINATION OF TEXTURE MAPPING AND BIT SUBSTITUTION METHOD
DB TAHA, TB TAHA, P EHKAN
Journal of Theoretical and Applied Information Technology 97 (8), 2019
12019
Webapp Effort Estimation using Cosmic Method
AT Ahmed, DB Taha
International Journal of Computer Applications 975, 8887, 2018
12018
The Development of the Secure Quality Dataset (SQDS): Combining Security and Quality Measures Using Deep Machine Learning for Code Smell Detection
H M Yahya, D B Taha
International Journal of Computing and Digital Systems 16 (1), 995-1006, 2024
2024
Employing derivatives for creating texture masks for digital images
TB Taha, R Ngadiran, DB Taha
AIP Conference Proceedings 2898 (1), 2024
2024
系统目前无法执行此操作,请稍后再试。
文章 1–20