Follow
mohammad kadhim, M. K. Abdul-Hussein
mohammad kadhim, M. K. Abdul-Hussein
Lecturer
Verified email at almamonuc.edu.iq - Homepage
Title
Cited by
Cited by
Year
Design a system for an approved video copyright over cloud based on biometric iris and random walk generator using watermark technique
RA Azeez, MK Abdul-Hussein, MS Mahdi, HTHS ALRikabi
Periodicals of Engineering and Natural Sciences 10 (1), 178-187, 2021
502021
Evaluation of the interference’s impact of cooperative surveillance systems signals processing for healthcare
MK Abdul-Hussein, H Alrikabi
International Journal of Online and Biomedical Engineering (iJOE), 2022
472022
Secured Transfer and Storage Image Data for Cloud Communications.
MK Abdul-Hussein, HTH ALRikabi
International Journal of Online & Biomedical Engineering 19 (6), 2023
192023
Method of calculating the detection zone boundaries of the Rayleigh Wi-Fi wireless channel with quasi-static fading
AA Strelnitskiy, VM Shokalo, EV Yagudina, MK Abdul-Hussein
Radioelectronics and Communications Systems 55 (10), 452-457, 2012
72012
Refined model for calculation of limiting secret efficiency of Wi-Fi communication channel
VM Shokalo, AA Strelnitsky, MK Abdul-Hussein, EV Yagudina
Telecommunications and Radio Engineering 71 (16), 2012
32012
Li-Fi Future Technology, Architecture, and their Constraints
MK Abdul-Hussein, HTHS ALRikabi
Texas Journal of Engineering and Technology 9, 167-174, 2022
12022
The method of calculating detection areas of digital communication systems
OO Strelnitskiy, VM Shokalo, EV Yagudina, MK Abdul-Hussein
Proceedings of International Conference on Modern Problem of Radio …, 2012
12012
E-learning in the Cloud Computing Environment: Features, Architecture, Challenges, and Solutions.
MJ Al-Dujaili, HTH ALRikabi, MK Abdul-Hussein, HA Kanber, ...
International Journal of Engineering Pedagogy 14 (1), 2024
2024
Network Intrusion Detection Systems for Attack Detection and Prevention
MK Abdul-Hussein
Journal of Al-Ma'moon College 1 (39), 246-261, 2023
2023
Ìåòîä ðàñ÷åòà ãðàíèöû çîíû îáíàðóæåíèÿ ðýëååâñêîãî Wi-Fi ðàäèîêàíàëà ñ êâàçèñòàòè÷åñêèìè çàìèðàíèÿìè
ÀÀ Ñòðåëüíèöêèé, ÂÌ Øîêàëî, ÅÂ ßãóäèíà, ÌÊ Àáäóë-Õóññåéí
³ñò³ âèùèõ ó÷áîâèõ çàêëàä³â. Ðàä³îåëåêòðîí³êà 55 (10), 26-34, 2012
2012
Ìåòîä ïîñòðîåíèÿ çîí îáíàðóæåíèÿ Wi-Fi êàíàëîâ ñâÿçè
ÌÊÀÕ ê.ò.í. À. À. Ñòðåëüíèöêèé, ä.ò.í. Â. Ì. Øîêàëî, Å. Â. ßãóäèíà
ÊÎÍÔÅÐÅÍÖÈÈ "ÑÈÝÒ-2012", 2012
2012
Íîâ³ ðåçóëüòàòè äîñë³äæåíü çîí âèÿâëåííÿ ðåëåºâñüêèõ êàíàë³â çâ'ÿçêó
ÌÊÀÕ Îëåêñ³é Ñòðåëüíèöüêèé, Âîëîäèìèð Øîêàëî, Îëåíà ßãóä³íà
Õàðê. íàö. óí-ò ðàä³îåëåêòðîí³êè, 2012
2012
ÏÐÎÑÒÎÉ ÑÏÎÑÎÁ ÎÁÅÑÏÅ×ÅÍÈß ÑÊÐÛÒÍÎÑÒÈ ÊÀÍÀËΠÑÂßÇÈ ÓÐÎÂÍß LAN
ÌÊÀÕ Ñòðåëüíèöêèé À.À., Øîêàëî Â.Ì., ßãóäèíà Å.Â.
ÑÇÈ_ñïåöâûïóñê, 2012
2012
Óñîâåðøåíñòâîâàííàÿ ìîäåëü ðàñ÷åòà ïðåäåëüíîé ñåêðåòíîé ïðîèçâîäèòåëüíîñòè Wi-Fi êàíàëà ñâÿçè
ÂÌ Øîêàëî, ÀÀ Ñòðåëüíèöêèé, ÌÊ Àáäóë-Õóññåéí, ÅÂ ßãóäèíà
Ðàäèîòåõíèêà, 190-195, 2012
2012
Improving random keys of WLAN security algorithms
PDAAS Mohammad K. Abdul-Hussein
ÊÎÍÔÅÐÅÍÖÈÈ "ÑÈÝÒ-2011", 2011
2011
ÌÅÒÎÄ ÐÀÑ×ÅÒÀ ÐÀÄÈÎÊÀÍÀËÀ ÖÈÔÐÎÂÛÕ ÑÈÑÒÅÌ ÏÅÐÅÄÀ×È ÈÍÔÎÐÌÀÖÈÈ Ñ ÇÀÄÀÍÍÎÉ ÂÅÐÎßÒÍÎÑÒÜÞ ÎÁÍÀÐÓÆÅÍÈß
ÅÂß Ì.Ê. ÀÁÄÓË-ÕÓÑÑÅÉÍ, À.À. ÑÒÐÅËÜÍÈÖÊÈÉ, êàíä. òåõí. íàóê, À.Å ...
Ðàäèîòåõíèêà, 2011
2011
Ó÷åò âëèÿíèÿ íà ñêðûòíîñòü wi-fi êàíàëîâ ñâÿçè èõ ýëåêòðîäèíàìè÷åñêèõ õàðàêòåðèñòèê è óñëîâèé ðàñïðîñòðàíåíèÿ ðàäèîâîëí
ÀÀ Ñòðåëüíèöêèé, ÂÌ Øîêàëî, ÅÂ ßãóäèíà, ÌÊ Àáäóë-Õóññåéí
ÕÍÓÐÝ, 2011
2011
Ìîäåëèðîâàíèå è ýêñïåðèìåíòàëüíîå îïðåäåëåíèå âåðîÿòíîñòè îáíàðóæåíèÿ ôóíêöèîíèðîâàíèÿ Wi-Fi ðàäèîêàíàëà
ÀÀ Ñòðåëüíèöêèé, ÂÌ Øîêàëî, ÅÂ ßãóäèíà, ÌÊ Àáäóë-Õóññåéí, ...
Íàóêîâèé â³ñíèê ×åðí³âåöüêîãî óí³âåðñèòåòó. Ô³çèêà, åëåêòðîí³êà, 27-30, 2011
2011
ÓÑÎÂÅÐØÅÍÑÒÂÎÂÀÍÈÅ ÌÅÒÎÄÀ ÏÎÂÛØÅÍÈß ÑÊÐÛÒÍÎÑÒÈ ËÅÃÈÒÈÌÍÎÃÎ ÊÀÍÀËÀ ÑÂßÇÈ ÇÀ Ñ×ÅÒ ÐÀÁÎÒÛ ÏÎÄ «ÈÑÊÓÑÑÒÂÅÍÍÛÌ ØÓÌÎÌ»
ÀÀ Ñòðåëüíèöêèé, ÂÌ Øîêàëî, ÅÂ ßãóäèíà, ÌÊ Àáäóë-Õóññåéí
ÎÐÃÀͲÇÀÒÎÐÈ ÊÎÍÔÅÐÅÍÖ²¯, 310, 0
The system can't perform the operation now. Try again later.
Articles 1–19