Nabeel Salih Ali (orcid.org/0000-0001-9988-5619)
Nabeel Salih Ali (orcid.org/0000-0001-9988-5619)
Information Technology Research and Development Centre, University of Kufa, Kufa, Najaf Governorate
Verifisert e-postadresse på uokufa.edu.iq - Startside
Sitert av
Sitert av
A Review of Fog Computing and Machine Learning: Concepts, Applications, Challenges, and Open Issues
KH Abdulkareem, MA Mohammed, SS Gunasekaran, MN Al-Mhiqani, ...
IEEE Access 7, 153123-153140, 2019
Cyber-security incidents: a review cases in cyber-physical systems
MN Al-Mhiqani, R Ahmad, W Yassin, A Hassan, ZZ Abidin, NS Ali, ...
International Journal of Advanced Computer Science and Applications 9 (1 …, 2018
Attendance and Information System using RFID and Web-Based Application for Academic Sector
HD Rjeib, NS Ali, A Al Farawn, B Al-Sadawi, H Alsharqi
International Journal of Advanced Computer Science and Applications (IJACSA …, 2018
Real-Time Heart Pulse Monitoring Technique Using Wireless Sensor Network and Mobile Application
NS Ali, ZAA Alyasseri, A Abdulmohson
International Journal of Electrical and Computer Engineering 8 (6), 2018
Wireless Internet of Things-Based Air Quality Device for Smart Pollution Monitoring
NA Zakaria, ZZ Abidin, N Harum, LC Hau, NSI Ali, FA Jafar
International Journal of Advanced Computer Science and Applications 9 (11 …, 2018
A review of insider threat detection: Classification, machine learning techniques, datasets, open challenges, and recommendations
MN Al-Mhiqani, R Ahmad, Z Zainal Abidin, W Yassin, A Hassan, ...
Applied Sciences 10 (15), 5208, 2020
A Cluster-Based Feature Selection Method for Image Texture Classification
AFH Alharan, HK Fatlawi, NS Ali
Indonesian Journal of Electrical Engineering and Computer Science 14 (3 …, 2019
The effects of EEG feature extraction using multi-wavelet decomposition for mental tasks classification
ZAA Alyasseri, AT Khadeer, MA Al-Betar, A Abasi, S Makhadmeh, NS Ali
Proceedings of the International Conference on Information and Communication …, 2019
Protection Web Applications using Real-Time Technique to Detect Structured Query Language Injection Attacks
AS Ali, N. S., & Shibghatullah
International Journal of Computer Applications 149 (6), 26-32, 2016
EEG feature fusion for motor imagery: A new robust framework towards stroke patients rehabilitation
NK Al-Qazzaz, ZAA Alyasseri, KH Abdulkareem, NS Ali, MN Al-Mhiqani, ...
Computers in Biology and Medicine 137, 104799, 2021
A Framework Implementation of Surveillance Tracking System Based on PIR Motion Sensors
B Alathari, MF Kadhim, S Al-Khammasi, NS Ali
Indonesian Journal of Electrical Engineering and Computer Science 13 (1 …, 2019
Wireless Sensor Network and Web Application Hybrid Scheme for Healthcare Monitoring
ZAAA Ali, Nabeel Salih
Journal of Soft Computing and Decision Support Systems 4 (5), 1-7, 2017
Energy Efficient Cluster Based Routing Protocol for Dynamic and Static Nodes in Wireless Sensor Network
S Al-Khammasi, D Alhelal, NS Ali
Telkomnika 16 (5), 1974-1981, 2018
Attendance Management System for Educational Sector: Critical Review
ZH Arif, NS Ali, NA Zakaria, MN Al-Mhiqani
International Journal of Computer Science and Mobile Computing 7 (8), 60-66, 2018
A four-phase methodology for protecting web applications using an effective real-time technique
NS Ali
International Journal of Internet Technology and Secured Transactions 6 (4 …, 2017
Investigation Study of Cyber-Physical Systems: Characteristics, Application Domains, and Security Challenges
MN Al-Mhiqani, R Ahmad, KH Abdulkareem, NS Ali
ARPN Journal of Engineering and Applied Sciences 12 (22), 6557- 6567, 2017
Review of virtual reality trends (previous, current, and future directions), and their applications, technologies and technical issues
M Ali, N. S., & Nasser
J Eng Appl Sci 12 (3), 783-789, 2017
Management and Achieving System for Metal Detection Robot Using Wireless-Based Technology and Online Database Registry
HA Kadhim, NS Ali, DM Abdulsahib
International Journal of Power Electronics and Drive Systems 10 (1), 219-229, 2019
Review of the defensive approaches for structured query language injection attacks and their countermeasures
Journal of Theoretical and Applied Information Technology 76 (2), 258-269, 2015
Secured e-payment system based on automated authentication data and iterated salted hash algorithm
A Al Farawn, HD Rjeib, NS Ali, B Al-Sadawi
TELKOMNIKA Telecommunication, Computing, Electronics and Control 18 (1), 538-544, 2020
Systemet kan ikke utføre handlingen. Prøv på nytt senere.
Artikler 1–20