关注
Alaa Mohammed Abdul-Hadi
Alaa Mohammed Abdul-Hadi
在 coeng.uobaghdad.edu.iq 的电子邮件经过验证
标题
引用次数
引用次数
年份
On the computational aspects of Charlier polynomials
BMM Alaa M.Abdul-Hadi, Sadiq H. Abdulhussain
Cogent Engineering 7 (1), 1-21, 2020
38*2020
On computational aspects of Krawtchouk polynomials for high orders
AH Basheera M Mahmmod, Alaa M Abdul-Hadi, Sadiq H Abdulhussain
Journal of Imaging 6 (8), 81, 2020
332020
Web systems availability assessment considering attacks on service configuration vulnerabilities
V Kharchenko, AM Abdul-Hadi, A Boyarchuk, Y Ponochovny
Proceedings of the Ninth International Conference on Dependability and …, 2014
122014
Throughput estimation with regard to airtime consumption unfairness in mixed data rate Wi-Fi networks
AM Abdul-Hadi, O Tarasyuk, A Gorbenko, V Kharchenko, T Hollstein
Communications-Scientific letters of the University of Zilina 16 (1), 84-89, 2014
82014
Performance evaluation of frequency division duplex (FDD) massive multiple input multiple output (MIMO) under different correlation models
AM Abdul-Hadi, MA Naser, M Alsabah, SH Abdulhussain, BM Mahmmod
PeerJ Computer Science 8, e1017, 2022
62022
Reservoir Network With Structural Plasticity for Human Activity Recognition
AM Zyarah, AM Abdul-Hadi, D Kudithipudi
IEEE Transactions on Emerging Topics in Computational Intelligence, 1-11, 2023
32023
Estimating throughput unfairness in a mixed data rate Wi-Fi environment
A Gorbenko, O Tarasyuk, V Kharchenko, AM Abdul-Hadi
The International Conference on Digital Technologies 2013, 181-184, 2013
32013
Downlink Training Sequence Design Based on Waterfilling Solution for Low-Latency FDD Massive MIMO Communications Systems
MA Naser, AM Abdul-Hadi, M Alsabah, BM Mahmmod, A Majeed, ...
Electronics 12 (11), 2494, 2023
22023
Improved throughput of Elliptic Curve Digital Signature Algorithm (ECDSA) processor implementation over Koblitz curve k-163 on Field Programmable Gate Array (FPGA)
FG Tawfeeq, AM Abdul-Hadi
Baghdad Science Journal 17 (3 (Suppl.)), 1029-1029, 2020
22020
Performance evaluation of scalar multiplication in elliptic curve cryptography implementation using different multipliers over binary field GF (2233)
AM Abdul-Hadi, FG Tawfeeq
Journal of Engineering 26 (9), 45-64, 2020
22020
Otsenka intensivnosti ataka na uyazvimosti dostupnosti kommercheskikh veb-servisov
AM Abdul-Hadi
Assessment of the intensity of the attack on the vulnerability of the …, 2013
22013
Formirovaniye podmnozhestv uyazvimostey dostupnosti kommercheskikh veb-servisov
VSK Alaa Mohammed Abdul-Hadi, Yu. L . Ponochovny
KVSAM, 2013
2*2013
Ponochovny Yu. L. and Kharchenko V. S.(2013),"
AM Abdul-Hadi
Razrabotka bazovykh markovskikh modeley dlya issledovaniya gotovnosti …, 2013
2*2013
Development of basic Markov’s model research availability of commercial web services
AM Abdul-Hadi, Y Ponochovny, V Kharchenko
Radioelectronic and computer systems (64), 186-191, 2013
22013
INFLUENCE OF COGON GRASS AND KIND OF SUPPLAMANTION THE BIOLOGICAL EFFICINCY AND STORAGE OF PLEUROTUS OSTREATUS
AEM Abdul-Hadi, KI Mustaf
Diyala Agricultural Sciences Journal 2 (1), 208-235, 2010
22010
Design and Implementation of Input/Output Port Blocker System to Thwart Input Output Attacks
AMAH Marwa Q. Abbas
Journal of Engineering and Applied Siences 14 (19), 7098-7104, 2019
2019
Software based Method to Specify the Extreme Learning Machine Network Architecture Targeting Hardware Platforms
AM Abdul-Hadi, AM Zyarah, HM Abdul-Hadi
International Journal of Computer Applications 975, 8887, 2016
2016
Evaluating Windows Vista User Account Security
AB Alaa Mohammed Abdul-Hadi
Baghdad Science Journal 8 (2), 419-428, 2011
2011
porting security services to a mobile platform to support a trusted mobile application
2008
系统目前无法执行此操作,请稍后再试。
文章 1–19