
Wafaa Mustafa AbduallahNawroz University, Duhok, Iraq · Department of Computer Science
Wafaa Mustafa Abduallah
PhD
About
21
Publications
9,733
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
426
Citations
Citations since 2017
Introduction
Additional affiliations
January 2015 - May 2019
Nawroz University, Duhok, Iraq
Position
- Lecturer
Publications
Publications (21)
Many policymakers envisage using a community model and Big Data technology to achieve the sustainability demanded by intelligent city components and raise living standards. Smart cities use different technology to make their residents more successful in their health, housing, electricity, learning, and water supplies. This involves reducing prices...
In recent years the graphic processing units (GPUs) programmability has increased and this lead to use in several areas. GPUs can tackle enormous data parallel issues at a higher speed than the conventional CPU. Moreover, GPUs considered more affordable and energy-efficient than distributed systems. This paper gives a comprehensive review of the se...
Internet of Things (IoT) introduces many intelligent applications that are closely attached to humans’ daily activities. This advanced technology attempts to bridge the gap between the information world and the physical world. Recent studies investigate efficient, flexible, scalable and reliable IoT systems that not only control things and devices...
ElGamal Cryptosystem (EC) is a non-deterministic scheme which produces different outputs for the same input, making the cryptosystem more secure. On the other hand, the efficiency of its cryptosystem is low as it produces a 2:1 expansion in size from plaintext to ciphertext, resulting in a delay in execution time. Therefore, this paper presents a M...
This project is sponsored by Universiti Tun Hussein Onn Malaysia under GPPS Vot H372. ABSTRACT Lately, incidents of serious damage due to Distributed Denial of Service (DDoS) attacks have been increasing, thereby leading to an urgent need for rapid attack detection and building of proper response mechanisms. Identifying new attacks only through sig...
The severity of acute lymphoblastic leukemia depends on the percentages of blast cells (abnormal white blood cells) in bone marrow
or peripheral blood. The manual microscopic examination of bone marrow is less accurate, time-consuming, and susceptible to errors,
thus making it difficult for lab workers to accurately recognize the characteristics of...
Concealing confidential messages within DNA sequences has turned into a well-known research in latest years. This paper presents a modified scheme which is based on the Table Lookup Substitution Method (TLSM) to increase its security. The proposed scheme uses an 8-bit binary coding to transform a reference DNA sequence into a binary format to incre...
Steganography is the science of hiding a secret message in cover media, without any perceptual distortion of the cover media. Using steganography, information can be hidden in the carrier items such as images, videos, sounds files, text files, while performing data transmission. In image steganography field, it is a major concern of the researchers...
In this paper, we present a novel method for data hiding within transform domain of the color images. Our method is based on dividing an image into blocks, then applying the proposed transform on specified blocks and hiding the secret message within those. We show that the security can be increased by following this method since it depends on a dif...
Steganography is the science of hiding a message signal in a host signal, without any perceptual distortion of the host signal. Using steganography, information can be hidden in the carrier items such as images, videos, sounds files, text files, while performing data transmission. In image steganography field, it is a major concern of the researche...
In this paper, we present an efficient scheme of color image steganography based on Mix Column Transform (MCT) on specified blocks selected according to secret key and hide the secret message within those using logical X-OR operation. Our experiments show that the security can be increased by following this method since it uses irreducible polynomi...
Steganography is the science of hiding a message signal in a host signal, without any perceptual distortion of the host signal. Using steganography, information can be hidden in the carrier items such as images, videos, sounds files, text files, while performing data transmission. In image steganography field, it is a major concern of the researche...
Intrusion handling in wireless mesh networks (WMNs) is a relatively less addressed topic. The difficulty may lie in the fact that there are other wireless networks for which some intrusion detection or prevention schemes are proposed that could also be applied in some way in a WMN setting. As those schemes are contributing, researchers may not find...
Today, many organizations are moving their computing services towards the
Cloud. This makes their computer processing available much more conveniently to
users. However, it also brings new security threats and challenges about safety
and reliability. In fact, Cloud Computing is an attractive and cost-saving
service for buyers as it provides accessi...
In this paper a two stage (stego-based-crypto) invertible technique is proposed based on cryptography and steganography algorithms. In order to increase the security, the proposed technique uses Rivest-Shamir-Adleman (RSA) cryptographic algorithm in the first stage for encrypting the secret message, and Integer Wavelet Transform (IWT) based lifting...