Data Hiding by LSB Substitution Using Genetic Optimal Key-Permutation. M Mohamed, F Al-Afari, MA Bamatraf Int. Arab. J. e Technol. 2 (1), 11-17, 2011 | 53 | 2011 |
Automated classification of malignant and benign breast cancer lesions using neural networks on digitized mammograms MM Abdelsamea, MH Mohamed, M Bamatraf Cancer informatics 18, 1176935119857570, 2019 | 22 | 2019 |
A combined image Steganography technique based on edge concept and dynamic LSB MH Mohamed, MN AL-Aidroos, AM Bamatraf International Journal of Engineering Research and Technology 1 (8), 2012 | 15 | 2012 |
An effective image feature classiffication using an improved som M Abdelsamea, MH Mohamed, M Bamatraf arXiv preprint arXiv:1501.01723, 2015 | 11 | 2015 |
The impact of control flow obfuscation technique on software protection against human attacks MH BinShamlan, MA Bamatraf, AA Zain 2019 First International Conference of Intelligent Computing and Engineering …, 2019 | 6 | 2019 |
Keystroke authentication on enhanced needleman alignment algorithm S Bamatraf, M Bamatraf, O Hegazy Intelligent Information Management 2014, 2014 | 6 | 2014 |
Enhanced Self-Organizing Map Neural Network for DNA Sequence Classification M Mohamed, AA Al-Mehdhar, M Bamatraf, MR Girgis Scientific Research Publishing, 2013 | 5 | 2013 |
Interpretation trained neural networks based on genetic algorithms SS Ibrahim, MA Bamatraf International Journal of Artificial Intelligence & Applications 4 (1), 13, 2013 | 5 | 2013 |
Clustering analysis to improve web search ranking using PCA and RMSE MA Ko’adan, MA Bamatraf, KQ Shafal Advances on Smart and Soft Computing: Proceedings of ICACIn 2020, 93-105, 2021 | 4 | 2021 |
Experimental evaluation of the obfuscation techniques against reverse engineering MH Bin Shamlan, AS Alaidaroos, MH Bin Merdhah, MA Bamatraf, AA Zain Advances on Smart and Soft Computing: Proceedings of ICACIn 2020, 383-390, 2021 | 4 | 2021 |
Data hiding technique based on LSB matching towards high imperceptibility MH Mohamed, NM Al-Aidroos, MA Bamatraf MIS REVIEW: An International Journal 18 (1), 57-69, 2012 | 4 | 2012 |
Data hiding technique based on dynamic LSB NM AL-Aidroos, MH Mohamed, MA Bamatraf Naif Arab University for Security Sciences, 2011 | 4 | 2011 |
SOM PAD: Novel Data Security Algorithm on Self Organizing Map M Mohamed, A Al-Mehdhar, M Bamatraf Computer Science and Information Technology (CS and IT), 2012 | 3 | 2012 |
Data Benchmark Collection Of Patients With Malaria For Machine Learning: A Study In Hadhramout-Yemen R Al-Dhaibani, MAM Bamatraf, KQ Sha'Afal 2019 First International Conference Of Intelligent Computing And Engineering …, 2019 | 2 | 2019 |
Innovative Multi-Level Secure Steganographic Scheme based on Pixel Value Difference MH Marghny, NM AL-Aidroos, MA Bamatraf International Journal in Foundations of Computer Science & Technology 2 (6 …, 2012 | 2 | 2012 |
Innovative Multi-Level Secure Steganographic Scheme based on Pixel Value Difference MH Mohamed, NM Al-Aidroos, MA Bamatraf IEEE Annual Symposium on Foundations of Computer Science, 2012 | 2 | 2012 |
Mohd. Najib Mohd. Salleh,“ A Bamatraf, R Ibrahim Journal of Computing 3 (4), 1-8, 0 | 2 | |
Hadhramout University Journal of Natural & Applied Science s SA Bahwal, MA Jawass, FS Naji, AA Baeissa, SQM Saleh, MS Bashanaini, ... Sciences 14 (2), 5, 2020 | | 2020 |
Multimodal Biometric Authentication System using Steganography NM Al-Aidroos, HA Bahamish, MA Bamatraf | | 2020 |
The Improving Accurate Candidates for Missing Data Using Benefit Performance of (ML-SOM) ALM Abeer, M Bamatraf Hadhramout University Journal of Natural and Applied Sciences 17 (1), 2020 | | 2020 |