Search Results - "Mstafa, Ramadhan J."

Refine Results
  1. 1

    A Robust and Secure Video Steganography Method in DWT-DCT Domains Based on Multiple Object Tracking and ECC by Mstafa, Ramadhan J., Elleithy, Khaled M., Abdelfattah, Eman

    Published in IEEE access (2017)
    “…Over the past few decades, the art of secretly embedding and communicating digital data has gained enormous attention because of the technological development…”
    Get full text
    Journal Article
  2. 2

    Identifying Severity Grading of Knee Osteoarthritis from X-ray Images Using an Efficient Mixture of Deep Learning and Machine Learning Models by Ahmed, Sozan Mohammed, Mstafa, Ramadhan J

    Published in Diagnostics (Basel) (24-11-2022)
    “…Recently, many diseases have negatively impacted people's lifestyles. Among these, knee osteoarthritis (OA) has been regarded as the primary cause of activity…”
    Get full text
    Journal Article
  3. 3

    A Comprehensive Survey on Bone Segmentation Techniques in Knee Osteoarthritis Research: From Conventional Methods to Deep Learning by Ahmed, Sozan Mohammed, Mstafa, Ramadhan J

    Published in Diagnostics (Basel) (01-03-2022)
    “…Knee osteoarthritis (KOA) is a degenerative joint disease, which significantly affects middle-aged and elderly people. The majority of KOA is primarily based…”
    Get full text
    Journal Article
  4. 4

    A Review on Deep Sequential Models for Forecasting Time Series Data by Ahmed, Dozdar Mahdi, Hassan, Masoud Muhammed, Mstafa, Ramadhan J.

    “…Deep sequential (DS) models are extensively employed for forecasting time series data since the dawn of the deep learning era, and they provide forecasts for…”
    Get full text
    Journal Article
  5. 5

    Improving AODV Routing Protocol for Image Transmission Over Mobile Video Sensor Networks by Atto, Muhsin, Mstafa, Ramadhan J., Alkhayyat, Ahmed

    Published in IEEE access (2020)
    “…Wireless Sensor Networks (WSNs) have become extremely popular for sensing, collecting, and transmitting data across different environments. In particular, the…”
    Get full text
    Journal Article
  6. 6

    A New Video Steganography Scheme Based on Shi-Tomasi Corner Detector by Mstafa, Ramadhan J., Younis, Younis M., Hussein, Haval I., Atto, Muhsin

    Published in IEEE access (01-01-2020)
    “…Recent developments in the speed of the Internet and information technology have made the rapid exchange of multimedia information possible. However, these…”
    Get full text
    Journal Article
  7. 7

    Impact of Video Motion Content on HEVC Coding Efficiency by Salih, Khalid A. M, Ali, Ismail Amin, Mstafa, Ramadhan J

    Published in Computers (Basel) (01-08-2024)
    “…Digital video coding aims to reduce the bitrate and keep the integrity of visual presentation. High-Efficiency Video Coding (HEVC) can effectively compress…”
    Get full text
    Journal Article
  8. 8

    Lightweight deep CNN-based models for early detection of COVID-19 patients from chest X-ray images by Hussein, Haval I., Mohammed, Abdulhakeem O., Hassan, Masoud M., Mstafa, Ramadhan J.

    Published in Expert systems with applications (01-08-2023)
    “…Hundreds of millions of people worldwide have recently been infected by the novel Coronavirus disease (COVID-19), causing significant damage to the health,…”
    Get full text
    Journal Article
  9. 9

    A video steganography algorithm based on Kanade-Lucas-Tomasi tracking algorithm and error correcting codes by Mstafa, Ramadhan J., Elleithy, Khaled M.

    Published in Multimedia tools and applications (01-09-2016)
    “…Due to the significant growth of video data over the Internet, video steganography has become a popular choice. The effectiveness of any steganographic…”
    Get full text
    Journal Article
  10. 10

    Compressed and raw video steganography techniques: a comprehensive survey and analysis by Mstafa, Ramadhan J., Elleithy, Khaled M.

    Published in Multimedia tools and applications (01-10-2017)
    “…In the last two decades, the science of covertly concealing and communicating data has acquired tremendous significance due to the technological advancement in…”
    Get full text
    Journal Article
  11. 11

    A blind and robust color image watermarking scheme based on DCT and DWT domains by Mohammed, Abdulhakeem O., Hussein, Haval I., Mstafa, Ramadhan J., Abdulazeez, Adnan M.

    Published in Multimedia tools and applications (01-09-2023)
    “…With the emergence of the Internet of Things (IoT) and many smart gadgets that support artificial intelligence, it is easier than ever to acquire, reproduce,…”
    Get full text
    Journal Article
  12. 12

    Person-independent facial expression recognition based on the fusion of HOG descriptor and cuttlefish algorithm by Hussein, Haval I., Dino, Hivi Ismat, Mstafa, Ramadhan J., Hassan, Masoud Muhammed

    Published in Multimedia tools and applications (01-03-2022)
    “…This paper proposes an efficient approach for person-independent facial expression recognition based on the fusion of Histogram of Oriented Gradients (HOG)…”
    Get full text
    Journal Article
  13. 13

    AR-Assisted Children Book For Smart Teaching And Learning Of Turkish Alphabets by Ahmed L. Alyousify, Ramadhan J. Mstafa

    Published in Virtual Reality & Intelligent Hardware (01-06-2022)
    “…Augmented reality (AR), virtual reality (VR), and remote-controlled devices are driving the need for a better 5G infrastructure to support faster data…”
    Get full text
    Journal Article
  14. 14

    A Study of Gender Classification Techniques Based on Iris Images: A Deep Survey and Analysis by Hasan, Basna Mohammed Salih, Mstafa, Ramadhan J.

    “…Gender classification is attractive in a range of applications, including surveillance and monitoring, corporate profiling, and human-computer interaction…”
    Get full text
    Journal Article
  15. 15

    EM-SEP: An efficient modified stable election protocol by Malluh, Arafat Abu, Elleithy, Khaled M., Qawaqneh, Zakariya, Mstafa, Ramadhan J., Alanazi, Adwan

    “…Recently wireless sensor networks (WSN) became an interesting topic because of its increasing usage in many fields; medical systems, environment monitoring,…”
    Get full text
    Conference Proceeding
  16. 16

    An Enhanced ElGamal Cryptosystem for Image Encryption and Decryption by Hussein, Haval I., Mstafa, Ramadhan J., Mohammed, Abdulhakeem O., Younis, Younis M.

    “…ElGamal cryptosystem is one of the well-known public-key algorithms for its ability to generate different ciphertexts for the same plaintext on successive…”
    Get full text
    Conference Proceeding
  17. 17

    A DCT-based robust video steganographic method using BCH error correcting codes by Mstafa, Ramadhan J., Elleithy, Khaled M.

    “…Due to the significant growth of video data over the Internet, it has become a popular choice for data hiding field. The performance of any steganographic…”
    Get full text
    Conference Proceeding
  18. 18

    A New Video Steganography Algorithm Based on the Multiple Object Tracking and Hamming Codes by Mstafa, Ramadhan J., Elleithy, Khaled M.

    “…In the modern world, video steganography has become a popular option for secret data communication. The performance of any steganography algorithm is based on…”
    Get full text
    Conference Proceeding
  19. 19

    A high payload video steganography algorithm in DWT domain based on BCH codes (15, 11) by Mstafa, Ramadhan J., Elleithy, Khaled M.

    “…Video steganography has become a popular topic due to the significant growth of video data over the Internet. The performance of any steganography algorithm…”
    Get full text
    Conference Proceeding
  20. 20

    A highly secure quantum communication scheme for Blind Signature using qubits and qutrits by Malluh, Arafat Abu, Elleithy, Khaled M., Alanazi, Adwan, Mstafa, Ramadhan J.

    “…The advances in hardware speed has being rapidly increased rapidly in the recent years, which will lead to the ability to decrypt well known decryption…”
    Get full text
    Conference Proceeding