OS Guma'a, QM Hussein, ZT Mustafa - … Indonesian Journal of …, 2019 - academia.edu
In several aspects, interest in IoT has become considerable by researchers and academics in recent years. Data security becomes one of the important challenges facing development …
NQ Mohammed, A Amir, MH Salih, H Arrfou… - J. Commun., 2022 - jocm.us
This paper presents an efficient parallelism architecture that uses a dual-computing engine architecture to better throughput using both spatial and temporal parallelism on FPGA …
High-security cryptography algorithms like AES require high computational capabilities to achieve information security. Therefore, it is necessary to use parallel computing …
B Bordel, R Alcarria, T Robles - World Conference on Information Systems …, 2023 - Springer
To build robust secure channels for information exchange, distributed computing systems must generate and handle high-entropy secret keys. However, solutions to generate those …
NQ Mohammed, A Amir, MH Salih… - International Journal of …, 2022 - academia.edu
Applications, such as Internet of Things, deal with huge amount of transmitted, processed and stored images that required a high computing capability. Therefore, there is a need a …
Word recognition on the digital images is an analytical area that aims to construct a computer system that can mechanically scan text from images. Documents are now …
F Amer, QM Hussein, MSM Altaei - Journal of Madenat Alelem …, 2022 - 116.203.176.164
The process of retrieving document images in digital media depending on their content is difficult, especially when the number of images is very large. Therefore, there is a need to …
O SaptiGuma'aa, QM Husseinb, O SadeqSalmanc… - 2020 - academia.edu
Internet of things (IoT) deals with massive collected data. Most of these data are personality information that needs to be protected from hacking and unauthorized access. In other hand …