• Home
  • Wafaa Mustafa Abduallah
Wafaa Mustafa Abduallah

Wafaa Mustafa Abduallah
Nawroz University, Duhok, Iraq · Department of Computer Science

PhD

About

21
Publications
9,733
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
426
Citations
Citations since 2017
11 Research Items
387 Citations
2017201820192020202120222023020406080100120140
2017201820192020202120222023020406080100120140
2017201820192020202120222023020406080100120140
2017201820192020202120222023020406080100120140
Additional affiliations
January 2015 - May 2019
Nawroz University, Duhok, Iraq
Position
  • Lecturer

Publications

Publications (21)
Article
Full-text available
Many policymakers envisage using a community model and Big Data technology to achieve the sustainability demanded by intelligent city components and raise living standards. Smart cities use different technology to make their residents more successful in their health, housing, electricity, learning, and water supplies. This involves reducing prices...
Article
Full-text available
In recent years the graphic processing units (GPUs) programmability has increased and this lead to use in several areas. GPUs can tackle enormous data parallel issues at a higher speed than the conventional CPU. Moreover, GPUs considered more affordable and energy-efficient than distributed systems. This paper gives a comprehensive review of the se...
Chapter
Internet of Things (IoT) introduces many intelligent applications that are closely attached to humans’ daily activities. This advanced technology attempts to bridge the gap between the information world and the physical world. Recent studies investigate efficient, flexible, scalable and reliable IoT systems that not only control things and devices...
Article
Full-text available
ElGamal Cryptosystem (EC) is a non-deterministic scheme which produces different outputs for the same input, making the cryptosystem more secure. On the other hand, the efficiency of its cryptosystem is low as it produces a 2:1 expansion in size from plaintext to ciphertext, resulting in a delay in execution time. Therefore, this paper presents a M...
Article
Full-text available
This project is sponsored by Universiti Tun Hussein Onn Malaysia under GPPS Vot H372. ABSTRACT Lately, incidents of serious damage due to Distributed Denial of Service (DDoS) attacks have been increasing, thereby leading to an urgent need for rapid attack detection and building of proper response mechanisms. Identifying new attacks only through sig...
Article
Full-text available
The severity of acute lymphoblastic leukemia depends on the percentages of blast cells (abnormal white blood cells) in bone marrow or peripheral blood. The manual microscopic examination of bone marrow is less accurate, time-consuming, and susceptible to errors, thus making it difficult for lab workers to accurately recognize the characteristics of...
Conference Paper
Full-text available
Concealing confidential messages within DNA sequences has turned into a well-known research in latest years. This paper presents a modified scheme which is based on the Table Lookup Substitution Method (TLSM) to increase its security. The proposed scheme uses an 8-bit binary coding to transform a reference DNA sequence into a binary format to incre...
Article
Full-text available
Steganography is the science of hiding a secret message in cover media, without any perceptual distortion of the cover media. Using steganography, information can be hidden in the carrier items such as images, videos, sounds files, text files, while performing data transmission. In image steganography field, it is a major concern of the researchers...
Article
In this paper, we present a novel method for data hiding within transform domain of the color images. Our method is based on dividing an image into blocks, then applying the proposed transform on specified blocks and hiding the secret message within those. We show that the security can be increased by following this method since it depends on a dif...
Thesis
Full-text available
Steganography is the science of hiding a message signal in a host signal, without any perceptual distortion of the host signal. Using steganography, information can be hidden in the carrier items such as images, videos, sounds files, text files, while performing data transmission. In image steganography field, it is a major concern of the researche...
Conference Paper
In this paper, we present an efficient scheme of color image steganography based on Mix Column Transform (MCT) on specified blocks selected according to secret key and hide the secret message within those using logical X-OR operation. Our experiments show that the security can be increased by following this method since it uses irreducible polynomi...
Conference Paper
Steganography is the science of hiding a message signal in a host signal, without any perceptual distortion of the host signal. Using steganography, information can be hidden in the carrier items such as images, videos, sounds files, text files, while performing data transmission. In image steganography field, it is a major concern of the researche...
Article
Full-text available
Intrusion handling in wireless mesh networks (WMNs) is a relatively less addressed topic. The difficulty may lie in the fact that there are other wireless networks for which some intrusion detection or prevention schemes are proposed that could also be applied in some way in a WMN setting. As those schemes are contributing, researchers may not find...
Article
Full-text available
Today, many organizations are moving their computing services towards the Cloud. This makes their computer processing available much more conveniently to users. However, it also brings new security threats and challenges about safety and reliability. In fact, Cloud Computing is an attractive and cost-saving service for buyers as it provides accessi...
Article
Full-text available
In this paper a two stage (stego-based-crypto) invertible technique is proposed based on cryptography and steganography algorithms. In order to increase the security, the proposed technique uses Rivest-Shamir-Adleman (RSA) cryptographic algorithm in the first stage for encrypting the secret message, and Integer Wavelet Transform (IWT) based lifting...

Network

Cited By