default search action
Alaa Kadhim Farhan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Azhar F. Al-zubidi, Alaa Kadhim Farhan, Sayed M. Towfek:
Predicting DoS and DDoS attacks in network security scenarios using a hybrid deep learning model. J. Intell. Syst. 33(1) (2024) - [c4]Nadia M. G. Al-Saidi, Suzan J. Obaiys, Nawras A. Alwan, Arkan J. Mohammed, Alaa Kadhim Farhan, Yeliz Karaca:
Secure Image Encryption Using Single-Mode Fiber and Dense Wavelength Division Multiplexing in Chaotic Systems. ICCSA (Workshops 1) 2024: 72-90 - 2023
- [j10]Safa S. Abdul-Jabbar, Alaa Kadhim Farhan, Alexander S. Luchinin:
Comparative Study of Anemia Classification Algorithms for International and Newly CBC Datasets. Int. J. Online Biomed. Eng. 19(6): 141-157 (2023) - [c3]Zainab Khyioon Abdalrdha, Abbas Mohsin Al-Bakry, Alaa Kadhim Farhan:
CNN Hyper-Parameter Optimizer based on Evolutionary Selection and GOW Approach for Crimes Tweet Detection. DeSE 2023: 569-574 - [c2]Zainab Khyioon Abdalrdha, Abbas Mohsin Al-Bakry, Alaa Kadhim Farhan:
Improving the CNN Model for Arabic Crime Tweet Detection Based on an Intelligent Dictionary. DeSE 2023: 748-753 - 2022
- [j9]Safa S. Abdul-Jabbar, Alaa Kadhim Farhan, Abdelaziz A. Abdelhamid, Mohamed Elsayed Ghoneim:
Razy: A String Matching Algorithm for Automatic Analysis of Pathological Reports. Axioms 11(10): 547 (2022) - [j8]Rasha S. Ali, Omar Zeyad Akif, Sameeh Abdulghafour Jassim, Alaa Kadhim Farhan, El-Sayed M. El-Kenawy, Abdelhameed Ibrahim, Mohamed Elsayed Ghoneim, Abdelaziz A. Abdelhamid:
Enhancement of the CAST Block Algorithm Based on Novel S-Box for Image Encryption. Sensors 22(21): 8527 (2022) - [j7]Hayder Natiq, Nadia M. G. Al-Saidi, Suzan J. Obaiys, Mohammed Najah Mahdi, Alaa Kadhim Farhan:
Image Encryption Based on Local Fractional Derivative Complex Logistic Map. Symmetry 14(9): 1874 (2022) - [c1]Emad M. Alsaedi, Alaa Kadhim Farhan, Mayadah Waheed Falah, Bashra Kadhim Oleiwi:
Classification of Encrypted Data Using Deep Learning and Legendre Polynomials. ICR 2022: 331-345 - 2021
- [j6]Adi Alhudhaif, Musheer Ahmad, Ahmed Alkhayyat, Nestor Tsafack, Alaa Kadhim Farhan, Rafeeq Ahmed:
Block Cipher Nonlinear Confusion Components Based on New 5-D Hyperchaotic System. IEEE Access 9: 87686-87696 (2021) - [j5]Amjad Hussain Zahid, Lo'ai Tawalbeh, Musheer Ahmad, Ahmed Alkhayyat, Malik Tahir Hassan, Atif Manzoor, Alaa Kadhim Farhan:
Efficient Dynamic S-Box Generation Using Linear Trigonometric Transformation for Security Applications. IEEE Access 9: 98460-98475 (2021) - 2020
- [j4]Ammar Mohammed Ali, Alaa Kadhim Farhan:
Enhancement of QR Code Capacity by Encrypted Lossless Compression Technology for Verification of Secure E-Document. IEEE Access 8: 27448-27458 (2020) - [j3]Ammar Mohammed Ali, Alaa Kadhim Farhan:
A Novel Improvement With an Effective Expansion to Enhance the MD5 Hash Function for Verification of a Secure E-Document. IEEE Access 8: 80290-80304 (2020)
2010 – 2019
- 2019
- [j2]Alaa Kadhim Farhan, Rasha Subhi Ali, Hayder Natiq, Nadia M. G. Al-Saidi:
A New S-Box Generation Algorithm Based on Multistability Behavior of a Plasma Perturbation Model. IEEE Access 7: 124914-124924 (2019) - [j1]Alaa Kadhim Farhan, Nadia M. G. Al-Saidi, Abeer Tariq Maolood, Fahimeh Nazarimehr, Iqtadar Hussain:
Entropy Analysis and Image Encryption Application Based on a New Chaotic System Crossing a Cylinder. Entropy 21(10): 958 (2019)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 20:51 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint