A new approach to model machine learning by using complex bipolar intuitionistic fuzzy information N Jan, R Maqsood, A Nasir, MS Alhilal, A Alabrah, N Al-Aidroos Journal of Function Spaces 2022, 1-17, 2022 | 20 | 2022 |
An innovative approach to investigate the effects of artificial intelligence based on complex bipolar picture fuzzy information N Jan, B Akram, A Nasir, MS Alhilal, A Alabrah, N Al-Aidroos Scientific Programming 2022, 1-20, 2022 | 15 | 2022 |
A combined image Steganography technique based on edge concept and dynamic LSB MH Mohamed, NM AL-Aidroos, AM Bamatraf International Journal of Engineering Research and Technology 1 (8), 2012 | 14 | 2012 |
Image steganography based on LSB matching and image enlargement NM Al-Aidroos, HA Bahamish 2019 First International Conference of Intelligent Computing and Engineering …, 2019 | 6 | 2019 |
Using Chemical Composition of Crude Oil and Artificial Intelligence Techniques to Predict the Reservoir Fluid Properties SO Baarimah, NM Al-Aidroos, KS Ba-Jaalah 2019 First International Conference of Intelligent Computing and Engineering …, 2019 | 4 | 2019 |
Data hiding technique based on LSB matching towards high imperceptibility MH Mohamed, NM Al-Aidroos, MA Bamatraf MIS REVIEW: An International Journal 18 (1), 57-69, 2012 | 4 | 2012 |
Data hiding technique based on dynamic LSB NM AL-Aidroos, MH Mohamed, MA Bamatraf Naif Arab University for Security Sciences, 2011 | 4 | 2011 |
Cyber-Security and Social Media Risks Assessment by Using the Novel Concepts of Complex Cubic T-Spherical Fuzzy Information B Akram, N Jan, A Nasir, A Alabrah, MS Alhilal, N Al-Aidroos Scientific Programming 2022, 31, 2022 | 3 | 2022 |
A Comparative Study Between RIPEMD160 and SHA256 Hash Functions On Digital Holy Quran Integrity Verification NMAAHS Baqtian Int. J. Sc. Res. in Network Security and Communication 10 (4), 1-7, 2022 | 2* | 2022 |
Efficient and Secure Key Management and Authentication Scheme for WBSNs Using CP-ABE and Consortium Blockchain NAA Jawaid Iqbal, Hajira Bibi, Noor Ul Amin, Hussain AlSalman, Syed Sajid ... Journal of Sensors, 20 pages, 2022 | 2 | 2022 |
Bat Algorithm for Protein Conformational Search HA Bahamish, NM Al-Aidroos, AN Boraik 2019 First International Conference of Intelligent Computing and Engineering …, 2019 | 2 | 2019 |
Innovative Multi-Level Secure Steganographic Scheme based on Pixel Value Difference MH Mohamed, NM Al-Aidroos, MA Bamatraf International Journal in Foundations of Computer Science & Technology …, 2012 | 2* | 2012 |
Three Hash Functions Comparison on Digital Holy Quran Integrity Verification HSBNM Al-Aidroos International Journal of Scientific Research in Network Security and …, 2023 | 1* | 2023 |
Modified Crow Search Algorithm for Protein Structure Prediction HABNMAAAN Boraik International Research Journal of Engineering and Technology (IRJET) 8 (2), 2021 | 1* | 2021 |
Data Hiding Enhancement in Arabic Text AS Al-Dini, NM Al-Aidroos, Q Khalid International Journal of Engineering and Artificial Intelligence 2 (1), 32 …, 2021 | 1 | 2021 |
Analysis of the Major Investment Object by Using a Novel Approach Based on Neutrosophic Information MU Farooq, R Anjum, A Gaffar, H Bashir, N Al-Aidroos, A Alsanad Computational Intelligence and Neuroscience 2022, 2022 | | 2022 |
Research Article Efficient and Secure Key Management and Authentication Scheme for WBSNs Using CP-ABE and Consortium Blockchain J Iqbal, H Bibi, NU Amin, H AlSalman, SS Ullah, S Hussain, N Al-Aidroos | | 2022 |
Research Article Analysis of the Major Investment Object by Using a Novel Approach Based on Neutrosophic Information MU Farooq, R Anjum, A Gaffar, H Bashir, N Al-Aidroos, A Alsanad | | 2022 |
Multimodal Biometric Authentication System using Steganography NM Al-Aidroos, HA Bahamish, MA Bamatraf International Research Journal of Engineering and Technology (IRJET) 7 (11), 2020 | | 2020 |
A High Imperceptibility Image Steganography Technique NMAAMHMMA Bamatraf The 2nd International Conference on Mathematics & Information Science, Sohag …, 2011 | | 2011 |