|
local |
2011-01 |
Iraqi Journal of Information Technology |
أ.م.د . علي شاكر محمود |
Comparative Analysis of Mutation Schemes Used in Genetic Algorithms |
1 |
|
local |
2012-01 |
Iraqi Journal of Information Technology |
أ.م.د . علي شاكر محمود |
Image Encryption and Decryption Using Genetic Algorithms |
2 |
|
other_w |
2019-12 |
JOURNAL OF SOUTHWEST JIAOTONG UNIVERSITY |
أ.م.د . علي شاكر محمود |
Video Enhancement Utilizing Old and Low Contrast |
3 |
|
scopus |
2019-08 |
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS |
أ.م.د . علي شاكر محمود |
Detection Copy-Move Forgery in Image Via Quaternion Polar Harmonic Transforms |
4 |
|
scopus |
2019-01 |
Journal of Information Hiding and Multimedia Signal Processing |
أ.م.د . علي شاكر محمود |
Design Random Number Generator Utilizing The Futoshiki Puzzle |
5 |
|
thomson |
2018-05 |
Journal of Information Security and Applications |
أ.م.د . علي شاكر محمود |
Novel method for image security system based on improved SCAN method and pixel rotation technique |
6 |
|
scopus |
2018-08 |
Journal of Engineering and Applied Sciences |
أ.م.د . علي شاكر محمود |
Wichmann-Hill PRNG based design smart digital door lock using Android-Arduino |
7 |
|
other_w |
2014-03 |
International Journal of Computer Science Issues |
أ.م.د . علي شاكر محمود |
State of the Art of Image Ciphering: A Review |
8 |
|
other_w |
2016-04 |
Modern Applied Science; |
أ.م.د . علي شاكر محمود |
Implementation of the Binary Random Number Generator Using the Knight Tour Problem |
9 |
|
scopus |
2017-04-15 |
Journal of Theoretical and Applied Information Technology |
أ.م.د . علي شاكر محمود |
GENERATING AND EXPANDING OF AN ENCRYPTION KEY BASED ON KNIGHT TOUR PROBLEM |
10 |