Showing 1 - 8 results of 8 for search 'Melad Saeed' Skip to content
    • About the Library
    • Rules and Regulations
    • Library Services
    • Library Hours
  • Library News
    • Digital Repository
    • Google Scholar
    • ResearchGate
    • AJoGPL
    • KURJ
    • AJLS
    • MyLOFT
    • Lexis Plus UK
    • Britannica Academic
    • Research Support Tools
    • Quick Resource Links
  • Login
Advanced
  • Author
  • Melad Saeed
Showing 1 - 8 results of 8 for search 'Melad Saeed', query time: 0.01s Refine Results
  1. 1
    Stream Cipher Using Genetic Algorithm

    Stream Cipher Using Genetic Algorithm by Melad saeed

    Published 2009-09-01
    Get full text
    Article
    Save to List
    Saved in:
  2. 2
    Hyper Secure Algorithm for Text

    Hyper Secure Algorithm for Text by Melad saeed

    Published 2011-12-01
    Get full text
    Article
    Save to List
    Saved in:
  3. 3
    Chaotic Watermarking for Authentication

    Chaotic Watermarking for Authentication by Melad Saeed

    Published 2013-07-01
    Get full text
    Article
    Save to List
    Saved in:
  4. 4
    Authentication of data hiding using co-occurrence matrix

    Authentication of data hiding using co-occurrence matrix by Melad saeed, Ghada thanoon

    Published 2012-07-01
    Get full text
    Article
    Save to List
    Saved in:
  5. 5
    A Comprehensive Study of Traditional and Deep-learning Schemes for Privacy and Data Security in the Cloud

    A Comprehensive Study of Traditional and Deep-learning Schemes for Privacy and Data Security in the Cloud by mohammed sheet, Melad saeed

    Published 2022-12-01
    Get full text
    Article
    Save to List
    Saved in:
  6. 6
    Hiding Encryption Text by DNA using Exploiting Modification Direction Algorithm

    Hiding Encryption Text by DNA using Exploiting Modification Direction Algorithm by Mohammad Hashim, Melad saeed

    Published 2021-06-01
    Get full text
    Article
    Save to List
    Saved in:
  7. 7
    Development Hyper Algorithm for Encryption Arabic Text using Mors Code

    Development Hyper Algorithm for Encryption Arabic Text using Mors Code by Najla Dabagh, Melad saeed, Subhi Hamadi

    Published 2007-07-01
    Get full text
    Article
    Save to List
    Saved in:
  8. 8
    Chaotic Encryption Based on Biometric Key

    Chaotic Encryption Based on Biometric Key by Saja Mohammed, Melad saeed, Ielaf Abdul Majjed

    Published 2010-12-01
    Get full text
    Article
    Save to List
    Saved in:

Search Tools:

  • RSS Feed
  • Email Search

Search Options

  • Search History
  • Advanced Search

Find More

  • Browse the Catalog
  • Explore Channels
  • Course Reserves
  • New Items

Need Help?

  • Search Tips
  • Ask a Librarian
  • FAQs