Subscribe Now Subscribe Today
Science Alert
 
    Publisher: Asian Network for Scientific Information
   
  Journal of Applied Sciences seeks to promote and disseminate the knowledge by publishing original research findings, review articles and short communications in the broad field of applied sciences. Scope of the journal includes: Biology, chemistry, physics, environmental, business and economics, finance, mathematics and statistics, geology, engineering, computer science, social sciences, natural and technological sciences, linguistics, medicine and architecture, food science, environmental science, agricultural engineering. Journal of Applied Sciences now accepting new submissions. Submit your best paper via online submission system.
  Editor-in-Chief:  Gazi Mahabubul Alam
 
 
AL-Ani, Z.K., A.A. Zaidan, B.B. Zaidan and H.O. Alanazi, 2010. Overview: main fundamentals for steganography. J. Comput., 2: 158-165.
Direct Link  |  
Abdul-Talib, Y.Y., B.B. Zaidan, A.A. Zaidan and A.W. Naji, 2009. Optimizing security and flexibility by designing a high security system for e-government servers. ICOCI09, University Utara Malaysia, pp: 355-358..
Abomhara, M., O. Zakaria, O.O. Khalifa, A.A. Zaidan and B.B. Zaidan, 2010. Enhancing selective encryption for H.264/AVC using advanced encryption standard. Int. J. Comput. Theory Eng., 2: 223-229.
Abomhara, M., O.O. Khalifa, O. Zakaria, A.A. Zaidan, B.B. Zaidan and A. Rame, 2010. Video compression techniques: An overview. J. Applied Sci., 10: 1834-1840.
CrossRef  |  Direct Link  |  
Abomhara, M., O.O. Khalifa, O. Zakaria, A.A. Zaidan, B.B. Zaidan and H.O. Alanazi, 2010. Suitability of using symmetric key to secure multimedia data: An overview. J. Applied Sci., 10: 1656-1661.
CrossRef  |  Direct Link  |  
Ahmed, M.A., M.L.M. Kiah, B.B. Zaidan and A.A. Zaidan, 2010. A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm. J. Applied Sci., 10: 59-64.
CrossRef  |  Direct Link  |  
Al Abdullah, F.S., F.H. Alshammari, R. Alnaqeib, H.A. Jalab and A.A. Zaidan et al., 2010. Analytical study on internet banking system. J. Comput., 2: 140-146.
Direct Link  |  
Al-Bakri, S.H., M.L.M. Kiah, A.A. Zaidan, B.B. Zaidan and G.M. Alam, 2011. Securing peer-to-peer mobile communications using public key cryptography: New security strategy. Int. J. Phys. Sci., 6: 930-938.
Direct Link  |  
Al-Frajat, A.K., H.A. Jalab, Z.M. Kasirun, A.A. Zaidan and B.B. Zaidan, 2010. Hiding data in video file: An overview. J. Applied Sci., 10: 1644-1649.
CrossRef  |  Direct Link  |  
Alaa, T., A.A. Zaidan and B.B. Zaidan, 2009. New framework for high secure data hidden in the MPEG using AES encryption algorithm. Int. J. Comput. Electr. Eng., 1: 566-571.
Alam, G.M., M.L.M. Kiah, B.B. Zaidan, A.A. Zaidan and H.O. Alanazi, 2010. Using the features of mosaic image and AES cryptosystem to implement an extremely high rate and high secure data hidden: Analytical study. Sci. Res. Essays, 5: 3254-3260.
Direct Link  |  
Alanazi, H.O., A.H. Jalab, A.A. Zaidan and B.B. Zaidan, 2010. New frame work of hidden data with in non multimedia file. Int. J. Comput. Network Security, 2: 46-54.
Direct Link  |  
Alanazi, H.O., A.A. Zaidan, B.B. Zaidan, H.A. Jalab and Z.K. AL-Ani, 2010. New classification methods for hiding information into two parts: multimedia files and non multimedia files. J. Comput., 2: 144-151.
Direct Link  |  
Alanazi, H.O., B.B Zaidan, A.A. Zaidan, A.H. Jalab, M. Shabbir and Y. Al-Nabhani, 2010. New comparative study between DES, 3DES and AES within nine factors. J. Comput., 2: 152-157.
Direct Link  |  
Alanazi, H.O., B.B. Zaidan and A.A. Zaidan, 2010. 3D skull recognition using 3D matching technique. J. Comput., 2: 121-126.
Direct Link  |  
Alanazi, H.O., H.A. Jalab, G.M. Alam, B.B. Zaidan and A.A. Zaidan, 2010. Securing electronic medical records transmissions over unsecured communications: An overview for better medical governance. J. Med. Plants Res., 4: 2059-2074.
Direct Link  |  
Alanazi, H.O., R. Alnaqeib, M.A. Zaidan, A.A. Zaidan, B.B. Zaidan and O. Noori, 2010. Towards improving E-registration system using email technology and knowledge management. Int. J. Comput. Intell. Inf. Secur., 1: 10-16.
Alanazi, H.O., R.M. Noor, B.B. Zaidan and A.A. Zaidan, 2010. Intrusion detection system: overview. J. Comput., 2: 130-133.
Direct Link  |  
Alanizi, H.O., M.L.M. Kiah, A.A. Zaidan, B.B. Zaidan and G.M. Alam, 2010. Secure topology for electronic medical record transmissions. Int. J. Pharmacol., 6: 954-958.
CrossRef  |  Direct Link  |  
Aljudi, H.H., B.B. Zaidan, A.A. Zaidan and Z.M. Hamad, 2010. Arabic syntax impact on the English-Arabic, Arabic-English-E-translation. Int. J. Comput. Intell. Inf. Secur., 1: 13-20.
Aljudi, H.H., B.B. Zaidan, A.A. Zaidan, Z.M. Hamad, R. Alnaqeib and H.T. Madhloom, 2010. The roll of knowledge shearing and Web-based applications on learning language. Int. J. Comput. Intell. Inform. Secur., 1: 77-82.
Alnaqeib, R., F.H. Alshammari, M.A. Zaidan, A.A. Zaidan and B.B. Zaidan et al., 2010. An overview: Extensible markup language technology. J. Comput., 2: 177-181.
Direct Link  |  
Alnaqeib, R., H.O. Alanazi, M.A. Zaidan, A.A. Zaidan, B.B. Zaidan and Z.M. Hazza, 2010. New quantitative study for E-registration system. J. Comput. Sci. Eng., 2: 26-31.
Alshammari, F.H., R. Alnaqeib, M.A. Zaidan, A.K. Hmood, B.B. Zaidan and A.A. Zaidan, 2010. New quantitative study for dissertations repository system. J. Comput., 2: 85-93.
Direct Link  |  
Aos, A.Z., A.W. Naji, S.A. Hameed, F. Othman and B.B. Zaidan, 2009. Approved Undetectable-antivirus steganography for multimedia information in PE-File. Proceedings of the International Association of Computer Science and Information Technology-Spring Conference, April 17-20, 2009, Singapore, pp: 437-441.
CrossRef  |  
Elnajjar, M., A.A. Zaidan, B.B. Zaidan, M.E.M.Sharif and H.O.Alanazi, 2010. Optimization digital image watermarking technique for patent protection. J. Comput., 2: 142-148.
Direct Link  |  
Eltahir, M.E., M.L.M. Kiah, B.B. Zaidan and A.A. Zaidan, 2009. High rate video streaming steganography. Proceedings of the 2009 International Conference on Future Computer and Communication, April 03-05, IEEE Computer Society, Kuala Lumpur, Malaysia, pp: 550-553.
Direct Link  |  
Gani, A., M.K. Hassan, A.A. Zaidan and B.B. Zaidan, 2011. Intelligent routing information protocol using full triggered update mechanism. Int. J. Phys. Sci., 6: 2750-2761.
Direct Link  |  
Hameed, S.A., B.B. Zaidan, A.A. Zaidan, A.W. Naji and O. Faroq, 2009. Novel simulation framework of three-dimensional skull bio-metric measurement. Int. J. Comput. Sci. Eng., 1: 270-275.
Direct Link  |  
Hameed, S.A., B.B. Zaidan, A.A. Zaidan, A.W. Naji and O.F. Tawfiq, 2010. An accurate method to obtain bio-metric measurements for three dimensional skull. J. Applied Sci., 10: 145-150.
CrossRef  |  Direct Link  |  
Hasan, A.K., A.A. Zaidan, B.B. Zaidan, A. Majeed, R. Salleh, O. Zakaria and A. Zuheir, 2009. Enhancement throughput of unplanned wireless mesh networks deployment using Partitioning Hierarchical Cluster (PHC). World Acad. Sci. Eng. Technol., 54: 480-484.
Direct Link  |  
Hasan, A.K., A.A. Zaidan, B.B. Zaidan, R. Salleh, O. Zakaria and S.M. Mohammed, 2009. Throughput optimization of unplanned wireless mesh networks deployment using Partitioning Hierarchical Cluster (PHC). Proceedings of the International Multi Conference of Engineers and Computer Scientists, July 1-3, 2009, London, UK., pp: 907-911.
Hmood, A.K., B.B. Zaidan, A.A. Zaidan and H.A. Jalab, 2010. An overview on hiding information technique in images. J. Applied Sci., 10: 2094-2100.
CrossRef  |  Direct Link  |  
Hmood, A.K., B.B. Zaidan, A.A. Zaidan and H.A.Jalab, 2010. A novel approach for corrosion detection using texture analysis. Int. J. Computat. Intell. Inform. Security, 1: 70-75.
Hmood, A.K., H.A. Jalab, Z.M. Kasirun, B.B. Zaidan and A.A. Zaidan, 2010. On the capacity and security of steganography approaches: An overview. J. Applied Sci., 10: 1825-1833.
CrossRef  |  Direct Link  |  
Hmood, A.K., Z.M. Kasirun, H.A. Jalab, G.M. Alam, A.A. Zaidan and B.B. Zaidan, 2010. On the accuracy of hiding information metrics: Counterfeit protection for education and important certificates. Int. J. Phys. Sci., 5: 1054-1062.
Direct Link  |  
Islam, M.R., A.W. Naji, A.A. Zaidan and B.B. Zaidan, 2010. New system for secure cover file of hidden data in the image page within executable file using statistical steganography techniques. Int. J. Comput. Sci. Inform. Secur., 7: 273-279.
Direct Link  |  
Jalab, H., A. Zaidan and B.B. Zaidan, 2009. Frame selected approach for hiding data within MPEG video using bit plane complexity segmentation. J. Comput., 1: 108-113.
Direct Link  |  
Jalab, H.A., A.A. Zaidan and B.B. Zaidan, 2010. New design for information hiding with in steganography using distortion techniques. Int. J. Eng. Technol., 2: 72-77.
Direct Link  |  
Jawad, M.M., S.T. Abdul Qader, B.B. Zaidan, A.A. Zaidan, I.T. Abdul Qader and A.W. Naji, 2011. An Overview: Laser Applications in Dentistry Int. J. Pharmacol., 7: 189-197.
Jawad, M.M., S.T.A. Qader, A.A. Zaidan, B.B. Zaidan, A.W. Naji, I.T.A. Qader, 2011. An overview of laser principle, laser-tissue interaction mechanisms and laser safety precautions for medical laser users. Int. J. Pharmacol., 7: 149-160.
Kiah, M.L.M., A. Haiqi, B.B. Zaidan and A.A. Zaidan, 2014. Open source EMR software: Profiling, insights and hands-on analysis. Comput. Methods Prog. Biomed., 117: 360-382.
CrossRef  |  Direct Link  |  
Kiah, M.L.M., B.B. Zaidan, A.A. Zaidan, A.M. Ahmed and S.H. Al-bakri, 2011. A review of audio based steganography and digital watermarking. Int. J. Phys. Sci., 6: 3837-3850.
Direct Link  |  
Kiah, M.L.M., B.B. Zaidan, A.A. Zaidan, M. Nabi and R. Ibraheem, 2014. MIRASS: Medical informatics research activity support system using information mashup network. J. Med. Syst., 38: 37-37.
CrossRef  |  PubMed  |  Direct Link  |  
Kiah, M.M., M.S. Nabi, B.B. Zaidan and A.A. Zaidan, 2013. An enhanced security solution for electronic medical records based on AES hybrid technique with SOAP/XML and SHA-1. J. Med. Syst., Vol. 37. 10.1007/s10916-013-9971-2.
CrossRef  |  
Kiah, M.M., S.H. Al-Bakri, A.A. Zaidan, B.B. Zaidan and M. Hussain, 2014. Design and develop a video conferencing framework for real-time telemedicine applications using secure group-based communication architecture. J. Med. Syst., 38: 1-11.
CrossRef  |  
Madhloom, H.T., S.A. Kareem, H. Ariffin, A.A. Zaidan, H.O. Alanazi and B.B. Zaidan, 2010. An automated white blood cell nucleus localization and segmentation using image arithmetic and automatic threshold. J. Applied Sci., 10: 959-966.
CrossRef  |  Direct Link  |  
Majeed, A., A.A. Zaidan, B.B. Zaidan and L.M. Kiah, 2009. Towards for admission control in WIMAX relay station mesh network for mobile stations out of coverage using Ad-Hoc‖. World Acad. Sci. Eng. Technol., 54: 463-467.
Majeed, A., A.A. Zaidan, B.B. Zaidan, S.M. Mohammed and R.Z. Raji, 2009. Employ the Ad-hoc admission control on WIMAX relay station to give the coverage for the mobile stations out of coverage. Proceedings of the International Multi Conference of Engineers and Computer Scientists, July 1-3, 2009, London, UK., pp: 875-879.
Majeed, A., M.L.M. Kiah, H.T. Madhloom, B.B. Zaidan and A.A. Zaidan, 2009. Novel approach for high secure and high rate data hidden in the image using image texture analysis. Int. J. Eng. Technol., 1: 63-69.
Direct Link  |  
Medani, A, A. Gani, O. Zakaria, A.A. Zaidan and B.B. Zaidan, 2011. Review of mobile SMS security issues and techniques towards the solution. Sci. Res. Essays, 6: 1147-1165.
Direct Link  |  
Muhamadi, I.A., A.A. Zaidan, S. Raviraja, M.A. Zaidan, B.B. Zaidan and C. Mapundu, 2009. Auto notification service for the student record retrieval system using Short Message Service (SMS). Int. J. Comput. Sci. Network Secur., 9: 200-208.
Direct Link  |  
Muhamadi, I.A.S., A.A. Zaidan, S. Raviraja, M.A. Zaidan and B.B. Zaidan et al., 2009. Auto notification service for the student record retrieval system using electronic mail message (EMM). Int. J. Comput. Sci. Network Secur., 9: 295-303.
Direct Link  |  
Muhamadi, I.A.S., M.A. Zaidan, A.A. Zaidan and B.B. Zaidan, 2009. Student record retrieval system using knowledge sharing. Int. J. Comput. Sci. Network Secur., 9: 97-106.
Direct Link  |  
Muhamadi, I.A.S., S.Raviraja, A.A. Zaidan, M.A. Zaidan and B.B. Zaidan et al., 2009. Enhanced admin role of the student record retrieval system using knowledge-sharing and rationale method. Int. J. Comput. Sci. Network Secur., 9: 269-276.
Direct Link  |  
Muhamadi, I.A.S., S.Raviraja, B.B. Zaidan, A.A. Zaidan and M.A. Zaidan et al., 2009. New quantitative study for the student record retrieval system. Int. J. Comput. Sci. Network Secur., 9: 304-311.
Direct Link  |  
Nabi, M.S., M.L.M. Kiah, A.A. Zaidan and B.B. Zaidan, 2013. Suitability of adopting S/MIME and open pgp email messages protocol to secure electronic medical records. Proceedings of the 2nd International Conference on Future Generation Communication Technology, November 12-14, 2013, UK., pp: 93-97.
Nabi, M.S.A., M.L.M. Kiah, B.B. Zaidan, A.A. Zaidan and G.M. Alam, 2010. Suitability of SOAP protocol in securing transmissions of EMR database. Int. J. Pharmacol., 6: 959-964.
Naji, A., A. Zaidan, B. Zaidan and I.A.S. Muhamadi, 2009. Novel approach for cover file of hidden data in the unused area two within EXE file using distortion techniques and advance encryption standard. Proceedings of the International Conference on Computer, Electrical, and Systems Science and Engineering, May 4-6, 2009, Ottawa, Canada, pp: 26-28.
Naji, A.W., A.A. Zaidan and B.B. Zaidan, 2009. Challenges of hidden data in the unused area two within executable files. J. Comput. Sci., 5: 890-897.
CrossRef  |  Direct Link  |  
Naji, A.W., A.A. Zaidan, B.B. Zaidan and I.A.S. Muhamadi, 2009. New approach of hidden data in the portable executable file without change the size of carrier file using distortion techniques. Proceeding of the World Academy of Science Engineering and Technology Conference, August 26-28, 2009, Singapore, pp: 493-497.
Naji, A.W., A.A. Zaidan, B.B. Zaidan and I.A.S. Muhamadi, 2009. Novel approach for cover file of hidden data in the unused area two within EXE file using distortion techniques and advance encryption standard. Proceeding of the World Academy of Science Engineering and Technology Conference, August 26-28, 2009, Singapore, pp: 498-502.
Naji, A.W., A.A. Zaidan, B.B.A. Shihab and O.O. Khalifa, 2009. Novel approach of hidden data in the (Unused area 2 within EXE file) using computation between cryptography and steganography. Int. J. Comput. Sci. Network Secur., 9: 294-300.
Naji, A.W., A.S. Housain, B.B. Zaidan, A.A. Zaidan and S.A. Hameed, 2011. Security improvement of credit card online purchasing system. Scient. Res. Essays, 6: 3357-3370.
Direct Link  |  
Naji, A.W., B.A. Hamida, X.S. Cheng, M.A. Mahdi and S. Harun et al., 2011. Review of erbium-doped fiber amplifier. Int. J. Phys. Sci., 6: 4674-4689.
Direct Link  |  
Naji, A.W., H.A. Shihab, B.B. Zaidan, F. Al-Khateeb Wajdi, O.O. Khalifa, A.A. Zaidan and S.T. Gunawan, 2009. Novel framework for hidden data in the image page within executable file using computation between advanced encryption standard and distortion techniques. Int. J. Comput. Sci. Inform. Secur., 3: 73-78.
Direct Link  |  
Naji, A.W., M.A. Mohammed, B.B. Zaidan, A.A. Zaidan, Wajdi ALKhateeb, K.A.S. Al- Khateeb and M.A. Mahdi, 2011. A novel theoretical analysis of quadruple pass Erbium doped fiber amplifier. Int. J. Physc. Sci., 6: 2393-2398.
Direct Link  |  
Naji, A.W., S.A. Hameed, M.R. Islam, B.B. Zaidan, T.S. Gunawan and A.A. Zaidan, 2009. Stego-analysis chain, session two novel approach of stego-analysis system for image file. Proceedings of the International Conference on IACSIT Spring Conference, April 17-20, Singapore, pp: 398-401.
Direct Link  |  
Naji, A.W., T.S. Gunawan, A.A. Zaidan, O.O. Khalifa, B.B. Zaidan, W.F. Al-Khateeb and S.A. Hameed, 2009. New approach of hidden data in the portable executable file without change the size of carrier file using statistical technique. Int. J. Comput. Sci. Network Secur., 9: 218-224.
Direct Link  |  
Naji, A.W., T.S. Gunawan, S.A. Hameed, B.B. Zaidan and A.A Zaidan, 2009. Stego-analysis chain, session one" investigations on steganography weakness vs stego-analysis system for multimedia file. Proceedings of International Association of Computer Science and Information Technology, April 17-20, 2009, Singapore, pp: 405-409.
CrossRef  |  
Nidhal, S., M.A.M Ali, A.A. Zaidan, B.B. Zaidan and H. Najah, 2011. Computerized algorithm for fetal heart rate baseline and baseline variability estimation based on distance between signal average and α value. Int. J. Pharmacol., 7: 228-237.
Othman, F., L. Maktom, A.Y. Taqa, B.B. Zaidan and A.A. Zaidan, 2009. An extensive empirical study for the impact of increasing data hidden on the images texture. Proceedings of the International Conference on Future Computer and Communication, April 3-5, IEEE Computer Society, Kuala Lumpur, Malysia, pp: 477-481.
Direct Link  |  
Raad, M., N.M. Yeassen, G.M. Alam, B.B. Zaidan and A.A. Zaidan, 2010. Impact of spam advertisement through e-mail: A study to assess the influence of the anti-spam on the e-mail marketing. Afr. J. Bus. Manage., 4: 2362-2367.
Direct Link  |  
Salem, Y., M. Abomhara, O.O. Khalifa, A.A. Zaidan and B.B. Zaidan, 2011. A review on multimedia communications cryptography. Res. J. Inform. Technol., 3: 146-152.
CrossRef  |  Direct Link  |  
Watari, M.A., A.A. Zaidan and B.B. Zaidan, 2013. Securing m-government transmission based on symmetric and asymmetric algorithms: A review. Asian J. Sci. Res., 6: 632-649.
CrossRef  |  Direct Link  |  
Yass, A.A., N.A. Yasin, G.M. Alam, B.B. Zaidan and A.A. Zaidan, 2011. SSME architecture design in reserving parking problems in Malaysia. Afr. J. Bus. Manage., 4: 3911-3923.
Direct Link  |  
Zaidan, A. and B. Zaidan, 2009. Novel approach for high secure data hidden in MPEG video using public key infrastructure. Int. J. Comput. Network Security, 1: 1985-1993.
Zaidan, A., B. Zaidan and F. Othman, 2009. New technique of hidden data in pe-file with in unused area one. Int. J. Comput. Electrical Eng., 1: 1793-8198.
Direct Link  |  
Zaidan, A.A. and B.B. Zaidan, 2009. Novel approach for high secure data hidden in MPEG video using public key infrastructure. Int. J. Comput. Network Secur., 1: 71-76.
Zaidan, A.A., A.W. Naji, S.A. Hameed, F. Othman and B.B. Zaidan, 2009. Approved undetectable-antivirus steganography for multimedia information in PE-file. Proceedings of the International Association of Computer Science and Information Technology-Spring Conference, April 17-20, 2009, Singapore, pp: 425-429.
Zaidan, A.A., B.B. Zaidan and A. Majeed, 2009. High securing cover-file of hidden data using statistical technique and AES encryption algorithm. World Acad. Sci. Eng. Technol., 54: 468-479.
Direct Link  |  
Zaidan, A.A., B.B. Zaidan and A.H. Jalab, 2010. A new system for hiding data within (Unused Area Two + Image Page) of portable executable file using statistical technique and advance encryption standard. Int. J. Comput. Theory Eng., 2: 220-227.
Direct Link  |  
Zaidan, A.A., B.B. Zaidan and F. Othman, 2009. New technique of hidden data in pe-file with in unused area one. Int. J. Comput. Electr. Eng., 1: 642-650.
Direct Link  |  
Zaidan, A.A., B.B. Zaidan, A. Al-Haiqi, M.L.M. Kiah, M. Hussain and M. Abdulnabi, 2014. Evaluation and selection of open-source EMR software packages based on integrated AHP and TOPSIS. J. Biomed. Inf., 10.1016/j.jbi.2014.11.012.
CrossRef  |  Direct Link  |  
Zaidan, A.A., B.B. Zaidan, A.K. Al-Fraja and H.A. Jalab, 2010. Investigate the capability of applying hidden data in text file: An overview. J. Applied Sci., 10: 1916-1922.
CrossRef  |  Direct Link  |  
Zaidan, A.A., B.B. Zaidan, A.K. Al-Frajat and H.A. Jalab, 2010. An overview: Theoretical and mathematical perspectives for advance encryption standard/rijndael. J. Applied Sci., 10: 2161-2167.
CrossRef  |  Direct Link  |  
Zaidan, A.A., B.B. Zaidan, A.Y. Taqa, M.A. Sami, G.M. Alam and A.H. Jalab, 2010. Novel multi-cover steganography using remote sensing image and general recursion neural cryptosystem. Int. J. Phys. Sci., 5: 1776-1786.
Direct Link  |  
Zaidan, A.A., B.B. Zaidan, H.A. Jalab, H.O. Alanazi and R. Alnaqeib, 2010. Offline arabic handwriting recognition using artificial neural network. J. Comput. Sci. Eng., 1: 55-58.
Direct Link  |  
Zaidan, A.A., B.B. Zaidan, H.O. Alanazi, A. Gani, O. Zakaria and G.M. Alam, 2010. Novel approach for high (Secure and rate) data hidden within triplex space for executable file. Sci. Res. Essays, 5: 1965-1977.
Direct Link  |  
Zaidan, A.A., B.B. Zaidan, R. Alnaqeib and H.O. Alanazi, 2010. New search for video compression. Int. J. Comput. Intell. Inf. Secur., 1: 67-73.
Zaidan, A.A., F. Othman, B.B. Zaidan, R.Z. Raji, A.K. Hasan and A.W. Naji, 2009. Securing Cover-file without limitation of hidden data size using computation between cryptography and steganography. Proceedings of the World Congress on Engineering, July 1-3, 2009, London, UK., pp: 259-265.
Zaidan, A.A., F. Othman, B.B. Zaidan, R.Z. Raji, H.K. Ahmed and A.W. Naji, 2009. Securing cover-file without limitation of hidden data size using computation between cryptography and steganography. Proc. World Cong. Eng., 1: 259-265.
Direct Link  |  
Zaidan, A.A., H. Abdul Karim, N.N. Ahmad, B.B. Zaidan and A. Sali, 2014. A four-phases methodology to propose Anti-pornography system based on neural and bayesian methods of artificial intelligence. Int. J. Pattern Recognit. Artif. Intell., Vol. 28. 10.1142/S0218001414590010.
CrossRef  |  
Zaidan, A.A., H.A. Karim, N.N. Ahmad, B.B. Zaidan and A. Sali, 2013. An automated anti-pornography system using a skin detector based on artificial intelligence: A review. Int. J. Pattern Recognit. Artif. Intell., Vol. 27. 10.1142/S0218001413500122.
CrossRef  |  
Zaidan, A.A., H.A. Karim, N.N. Ahmad, G.M. Ala and B.B. Zaidan, 2010. A novel hybrid module of skin detector using grouping histogram technique for bayesian method and segment adjacent-nested technique for neural network. Int. J. Phys. Sci., 5: 2471-2492.
Direct Link  |  
Zaidan, A.A., N.N. Ahmad, H. Abdul Karim, M. Larbani and B.B. Zaidan et al., 2014. Image skin segmentation based on multi-agent learning Bayesian and neural network. Eng. Appl. Artif. Intell., 32: 136-150.
CrossRef  |  Direct Link  |  
Zaidan, A.A., N.N. Ahmad, H. Abdul Karim, M. Larbani and B.B. Zaidan et al., 2014. On the multi-agent learning neural and Bayesian methods in skin detector and pornography classifier: An automated anti-pornography system. Neurocomput., 131: 397-418.
CrossRef  |  Direct Link  |  
Zaidan, A.A., N.N. Ahmad, H.A. Karim, G.M. Alam and B.B. Zaidan, 2010. A new hybrid module for skin detector using fuzzy inference system structure and explicit rules. Int. J. Phys. Sci., 5: 2084-2097.
Direct Link  |  
Zaidan, A.A., N.N. Ahmed, H. Abdul Karim, G.M. Alam and B.B. Zaidan, 2011. Spam influence on business and economy: theoretical and experimental studies for textual anti-spam filtering using mature document processing and naive Bayesian classifier. Afr. J. Bus. Manage., 5: 596-607.
Direct Link  |  
Zaidan, A.A., N.N. Ahmed, H.A. Karim, G.M. Alam and B.B. Zaidan, 2010. Increase reliability for skin detector using backprobgation neural network and heuristic rules based on YCbCr. Sci. Res. Essays, 5: 2931-2946.
Direct Link  |  
Zaidan, B., A.A. Zaidan, F. Othman, R.Z. Raji, S. Mohammed and M. Abdulrazzaq, 2009. Quality of image vs. quantity of data hidden in the image. Proceedings of the 2009 International Conference on Image Processing, Computer Vision and Pattern Recognition, (ICIPCVPR`09), CSREA Press, Las Vegas Nevada, USA., pp: 343-350.
Zaidan, B.B., A.A. Zaidan and F. Othman, 2008. Enhancement of the amount of hidden data and the quality of image. Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur, Malaysia..
Zaidan, B.B., A.A. Zaidan and H. Mwafak, 2009. New comprehensive study to assess comparatively the QKD, XKMS, KDM in the PKI encryption algorithms. Int. J. Comput. Sci. Eng., 1: 263-268.
Direct Link  |  
Zaidan, B.B., A.A. Zaidan and M.L.M. Kiah, 2011. Impact of data privacy and confidentiality on developing telemedicine applications: A review participates opinion and expert concerns. Int. J. Pharmacol., 7: 382-387.
CrossRef  |  Direct Link  |  
Zaidan, B.B., A.A. Zaidan, A. Taqa and F. Othman, 2009. Stego-image vs stego-analysis system. Int. J. Comput. Electr. Eng., 1: 572-578.
CrossRef  |  Direct Link  |  
Zaidan, B.B., A.A. Zaidan, A. Taqa, G.M. Alam, M.L.M. Kiah and H.A. Jalab, 2010. StegoMos: A secure novel approach of high rate data hidden using mosaic image and ANN-BMP cryptosystem. Int. J. Phys. Sci., 5: 1796-1806.
Direct Link  |  
Zaidan, B.B., A.A. Zaidan, A.K. Al-Frajat and H.A. Jalab, 2010. On the differences between hiding information and cryptography techniques: An overview. J. Applied Sci., 10: 1650-1655.
CrossRef  |  Direct Link  |  
Zaidan, B.B., A.A. Zaidan, F. Othman and A. Rahem, 2009. Novel approach of hidden data in the unused area 1 within exe files using computation between cryptography and steganography. Proceedings of the International Conference on Cryptography Coding and Information Security, June 24-26, Academic and Scientific Research Organizations, Paris, France, pp: 1-22.
Direct Link  |  
Zaidan, B.B., A.A. Zaidan, H.O. Alanazi and R. Alnaqeib, 2010. Towards corrosion detection system. Int. J. Comput. Sci. Issues, 7: 33-36.
Direct Link  |  
Zaidan, M.A., A.A. Zaidan, B.B. Zaidan, H.T. Madhloom, H.O. Alanazi and R. Alnaqeib, 2010. On the module of E-registration system. J. Comput. Sci. Eng., 2: 6-15.
Zakaria, O., M. Abomhara, O.O. Khalifa, A.A. Zaidan and B.B. Zaidan, 2011. An Experiment of scalable video security solution using H.264/AVC and AES: Selective Cryptography. Int. J. Physical Sci., 6: 4075-4085.
Direct Link  |