Preaload Image
Back

كلية العلوم  |  جامعة ديالى

قسم علوم الحاسوب

أ.د. زياد طارق مصطفى  | البحوث المنشورة

ت عنوان البحث أسم المجلة تأريخ النشر Impact No. أختصاص البحث تصنيف المجلة رابط البحث
1. Hiding Secret Audio Message Inside Smaller Size Audio Cover Diyala Journal For Pure Science 2010   Computer and Network Security محلية
2. Effect of Data Type on Point to Point Bluetooth Link Diyala Journal For Pure Science 2010 3.715 Computer Communications محلية
3. Simulation of New Covert Audio Cryptographic Model 3rd International Conference on Machine Learning and Computing ICMLC 2011 2011   Computer and Network Security عالمية غير مصنفة
4. Development of Multilayer New Covert Audio Cryptographic Model  International Journal of Machine Learning and Computing IJMLC 2011   Computer and Network Security عالمية غير مصنفة
5. Signature Steganography Tikrit Journal of Pure Science 2012   Computer and Network Security محلية
6. OffLine Signature Identification Using Moment Algorithm Diyala Journal For Pure Science 2012 3.715 Computer and Network Security محلية
7. Comparison between PSO and Firefly Algorithms in Fingerprint Authentication International Journal of Engineering and Innovative Technology IJEIT 2013 5.342 Computer and Network Security عالمية غير مصنفة
8. Effect of Communication Channel on Transferred Data Diyala Journal For Pure Science 2013 3.715 Computer and Network Security محلية
9. Features extraction of fingerprints using firefly algorithm 6th International Conference on Security of Information and Networks  2013     SCOPUS
10. Enhancing Protocol Steganography Using Firefly Algorithm International Journal of Scientific  Engineering Research  IJSER  2014     عالمية غير مصنفة
11. Cipher System using Artificial Bees Colony Algorithm Diyala Journal For Pure Science 2014 3.715 Computer and Network Security محلية
12. Packet Steganography Using IP ID Diyala Journal For Pure Science 2014 3.715 Computer and Network Security محلية
13. Image Steganography between Firefly and PSO Algorithms International Journal of Computer Science and Information Security IJCSIS 2017   Computer and Network Security عالمية غير مصنفة
14. Enhancement of RC4 Algorithm using PUF International Journal of Engineering and Innovative Technology IJEIT 2017   Computer and Network Security عالمية غير مصنفة
15. IMAGE STEGANOGRAPHY BASED THE BEHAVIOR OF PARTICLE SWARM OPTIMIZATION Journal of Theoretical  Applied Information Technology 2018   Computer and Network Security SCOPUS