Random-tree diameter and the diameter-constrained MST A Abdalla, N Deo International Journal of Computer Mathematics 79 (6), 651-663, 2002 | 74 | 2002 |
Computing a diameter-constrained minimum spanning tree in parallel N Deo, A Abdalla Italian Conference on Algorithms and Complexity, 17-31, 2000 | 64 | 2000 |
An audio shuffle-encryption algorithm AA Tamimi, AM Abdalla The world congress on engineering and computer science, 2014 | 59 | 2014 |
Hiding an image inside another image using variable-rate steganography AA Tamimi, AM Abdalla, O Al-Allaf International Journal of Advanced Computer Science and Applications (IJACSA …, 2013 | 58 | 2013 |
A shuffle image-encryption algorithm AA Yahya, AM Abdalla Journal of Computer Science 4 (12), 999, 2008 | 54 | 2008 |
Performance analysis of biometric recognition modalities DR Ibrahim, AA Tamimi, AM Abdalla 2017 8th international conference on information technology (ICIT), 980-984, 2017 | 21 | 2017 |
An AES-Based Encryption Algorithm with Shuffling. A Yahya, AM Abdalla Security and Management [Eds: Arabnia, H; Daimi, K], 113-116, 2009 | 20 | 2009 |
A simple flexible cryptosystem for meshed 3D objects and images MAAJA Mizher, R Sulaiman, AMA Abdalla, MAA Mizher Journal of King Saud University-Computer and Information Sciences 33 (6 …, 2021 | 19 | 2021 |
Comparative study of compression techniques for synthetic videos A Abdalla, A Mazhar, M Salah, S Khalaf The International Journal of Multimedia & Its Applications (IJMA) Vol 6, 2014 | 19 | 2014 |
A survey of image encryption algorithms QH Makki, AM Abdalla, AA Tamimi 2021 International Conference on Information Technology (ICIT), 598-602, 2021 | 18 | 2021 |
Deep learning weather forecasting techniques: literature survey AM Abdalla, IH Ghaith, AA Tamimi 2021 International conference on information technology (ICIT), 622-626, 2021 | 15 | 2021 |
Computing a diameter-constrained minimum spanning tree AM Abdalla University of Central Florida, 2001 | 13 | 2001 |
Big data quality factors, frameworks and challenges M Abdallah, M Muhairat, A Althunibat, A Abdalla Compusoft 9 (8), 3785-3790, 2020 | 12 | 2020 |
Parallel heuristics for the diameter-constrained MST problem A Abdalla, N Deo, R Franceschini Congressus Numerantium, 97-118, 1999 | 12 | 1999 |
An image encryption algorithm with XOR and S-box AA Tamimi, AM Abdalla Proceedings of the International Conference on Image Processing, Computer …, 2015 | 11 | 2015 |
Algorithm for image mixing and encryption AM Abdalla, AA Tamimi The International Journal of Multimedia & Its Applications 5 (2), 15, 2013 | 11 | 2013 |
A double-shuffle image-encryption algorithm AA Tamimi, AM Abdalla Proceedings of the International Conference on Image Processing, Computer …, 2012 | 11 | 2012 |
A Fault-Handling Method for the Hamiltonian Cycle in the Hypercube Topology AA Hnaif, AA Tamimi, AM Abdalla, I Jebril Computers, Materials and Continua 68 (1), 505-519, 2021 | 10 | 2021 |
A Variable Circular-Shift Image-Encryption Algorithm AA Tamimi, AM Abdalla | 10 | 2017 |
A brief program robustness survey AM Abdalla, MM Abdallah, MI Salah International Journal of Software Engineering & Applications 8 (1), 1-10, 2017 | 10 | 2017 |