Personal information

Activities

Works (27)

Enhancing Cybersecurity: Detecting Hidden Information in Spatial Domain Images Using Convolutional Neural Networks

Journal of Cybersecurity and Information Management
2025 | Journal article
Part of ISSN: 2769-7851
Part of ISSN: 2690-6775
Contributors: Akram Akram; Informatics Institute for Postgraduate Studies Iraqi Commission for Computers Informatics, Baghdad, Iraq; University of Information Technology and Communications, Baghdad, Iraq; Huda Tayyeh
Source: Self-asserted source
Huda Tayyeh

The Blockchain for Healthcare 4.0 Apply in Standard Secure Medical Data Processing Architecture

Internet Technology Letters
2024 | Journal article
Contributors: Ozturk, Bilal A.; Tayyeh, Huda Kadhim; Namiq, Heba Emad; Mahajan, Hemant B.; Junnarkar, Aparna A.; Uke, Nilesh; Shamaileh, Anas Atef; Deshpande, Sarita D.; Futane, Pravin R.; Rane, Milind
Source: check_circle
Web of Science Researcher Profile Sync

Balancing Privacy and Performance: A Differential Privacy Approach in Federated Learning

Computers
2024-10-24 | Journal article
Contributors: Huda Kadhim Tayyeh; Ahmed Sabah Ahmed AL-Jumaili
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

A Long Short Term Memory Model for Character-based Analysis of DNS Tunneling Detection

Scalable Computing: Practice and Experience
2024-10-01 | Journal article
Part of ISSN: 1895-1767
Contributors: Huda Kadhim Tayyeh; Ahmed Sabah Ahmed AL-Jumaili
Source: Self-asserted source
Huda Tayyeh

Character-Level Embedding using FastText and LSTM for Biomedical Named Entity Recognition

Scalable Computing: Practice and Experience
2024-10-01 | Journal article
Part of ISSN: 1895-1767
Contributors: Ahmed Sabah Ahmed AL-Jumaili; Huda Kadhim Tayyeh
Source: Self-asserted source
Huda Tayyeh

A comprehensive review on S-box generation methods

AIP Conference Proceedings
2024-09-19 | Conference paper
Part of ISSN: 0094-243X
Contributors: Rasha S. Ali; Rajaa K. Hasoun; Huda Kadhim Tayyeh; Mohammed Q. Mohammed
Source: Self-asserted source
Huda Tayyeh

Deep learning-based image Steganalysis

AIP Conference Proceedings
2024-09-19 | Conference paper
Part of ISSN: 0094-243X
Contributors: Akram Kadhim Mshet; Huda Kadhim Tayyeh
Source: Self-asserted source
Huda Tayyeh

AlexNet Convolutional Neural Network Architecture with Cosine and Hamming Similarity/Distance Measures for Fingerprint Biometric Matching

Baghdad Science Journal
2023-12-05 | Journal article
Contributors: Ahmed Sabah Ahmed AL-Jumaili; Huda Kadhim Tayyeh; Abeer Alsadoon
Source: check_circle
Crossref

Recurrent Neural Network Document Embedding Method for Adverse Drug Reaction Detection from Medical Reviews

革新的コンピューティング・情報・制御に関する速報
2022 | Journal article
Part of ISSN: 1881803X
Contributors: Ahmed Sabah Ahmed AL-Jumaili; Huda Kadhim Tayyeh
Source: Self-asserted source
Huda Tayyeh

A combination of least significant bit and deflate compression for image steganography

International Journal of Electrical and Computer Engineering (IJECE)
2022-02-01 | Journal article
Part of ISSN: 2722-2578
Part of ISSN: 2088-8708
Contributors: Huda Kadhim Tayyeh; Ahmed Sabah Ahmed AL-Jumaili
Source: Self-asserted source
Huda Tayyeh

A New Approach of Classical Hill Cipher in Public Key Cryptography

International Journal of Nonlinear Analysis and Applications
2021 | Journal article
Contributors: Hasoun, Rajaa K.; Khlebus, Sameerah Faris; Tayyeh, Huda Kadhim
Source: check_circle
Web of Science Researcher Profile Sync

A new approach of classical Hill Cipher in public key cryptography

International Journal of Nonlinear Analysis and Applications
2021-07 | Journal article
Contributors: Rajaa K. Hasoun; Sameerah Faris Khlebus; Huda Kadhim Tayyeh
Source: Self-asserted source
Huda Tayyeh

A Hybrid Method of Linguistic and Statistical Features for Arabic Sentiment Analysis

Baghdad Science Journal
2020-03-18 | Journal article
Part of ISSN: 2411-7986
Part of ISSN: 2078-8665
Contributors: Ahmed Sabah AL-Jumaili
Source: Self-asserted source
Huda Tayyeh

Classifying confidential data using SVM for efficient cloud query processing

TELKOMNIKA (Telecommunication Computing Electronics and Control)
2019-12-01 | Journal article
Part of ISSN: 2302-9293
Part of ISSN: 1693-6930
Contributors: Huda Kadhim Tayyeh; Ahmed Sabah Ahmed Al-Jumaili
Source: Self-asserted source
Huda Tayyeh

Novel steganography scheme using Arabic text features in Holy Quran

International Journal of Electrical and Computer Engineering (IJECE)
2019-06-01 | Journal article
Part of ISSN: 2088-8708
Part of ISSN: 2088-8708
Contributors: Huda Kadhim Tayyeh; Mohammed Salih Mahdi; Ahmed Sabah Ahmed AL-Jumaili
Source: Self-asserted source
Huda Tayyeh

Virtual Human for Assisted Healthcare: Application and Technology

International Conference on interactive Digital Media on 11th and 12th of Dec 2018, :Liverpool, United Kingdom
2018-11-12 | Conference paper
Contributors: Huda Tayyeh
Source: Self-asserted source
Huda Tayyeh

A Backpropagation Neural Network for Splitting Identifiers

Journal of Computer Science
2018-10-01 | Journal article
Part of ISSN: 1549-3636
Contributors: Ahmed Sabah Ahmed AL-Jumaili; Huda Kadhim Tayyeh; Ruqaia Jawad Kadhem
Source: Self-asserted source
Huda Tayyeh

Maximizing the power of solar cells by using intelligent solar tracking system based on FPGA

2018 Advances in Science and Engineering Technology International Conferences (ASET)
2018-02 | Conference paper
Contributors: Alaa Hamza Omran; Yaser M. Abid; Ahmed Sabah Ahmed; Huda Kadhim; Ruqaia Jwad
Source: Self-asserted source
Huda Tayyeh
grade
Preferred source (of 2)‎

Design of artificial neural networks system for intelligent chessboard

2017 4th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS)
2017-11 | Conference paper
Contributors: Alaa Hamza Omran; Yaser M. Abid; Huda Kadhim
Source: Self-asserted source
Huda Tayyeh
grade
Preferred source (of 2)‎

Factors Influencing the Acceptance of Augmented Reality in Education: A Review of the Literature

Journal of Computer Science
2017-11-01 | Journal article
Part of ISSN: 1549-3636
Contributors: Che Samihah Che Dalim; Hoshang Kolivand; Huda Kadhim; Mohd Shahrizal Sunar; Mark Billinghurst
Source: Self-asserted source
Huda Tayyeh
grade
Preferred source (of 2)‎

Comparing Two Estimators of Reliability Function for Three Extended Rayleigh Distribution

American Journal of Mathematics and Statistics
2017-07-06 | Journal article
Contributors: Huda Tayyeh
Source: Self-asserted source
Huda Tayyeh

Recommender system in the context of big data: Implementing SVD-based recommender system using apache hadoop and spark

Effective Big Data Management and Opportunities for Implementation
2016 | Book chapter
EID:

2-s2.0-85018071630

Contributors: Almohsen, K.A.; Al-Jobori, H.K.
Source: Self-asserted source
Huda Tayyeh via Scopus - Elsevier

Trust relationship model to enhance security and privacy for cloud environment

Third International Conference on Advances In Computing, Communication And Information Technology
2015 | Conference paper
Contributors: Huda Tayyeh
Source: Self-asserted source
Huda Tayyeh

Recommender Systems in Light of Big Data

International Journal of Electrical and Computer Engineering (IJECE)
2015-12-01 | Journal article
Part of ISSN: 2088-8708
Part of ISSN: 2088-8708
Contributors: Khadija A. Almohsen; Huda Al-Jobori
Source: Self-asserted source
Huda Tayyeh
grade
Preferred source (of 2)‎

Automatic Queuing Model for Banking Application

International Journal of Advanced Computer Science and Applications
2011 | Journal article
Contributors: Huda Tayyeh
Source: Self-asserted source
Huda Tayyeh

NON-HOMOGENEOUS STEGANOGRAPHY USING GENETIC SIMULATED ANNEALING

International Journal of Information Science and Computer Mathematics
2010-08 | Journal article
Contributors: Huda Tayyeh
Source: Self-asserted source
Huda Tayyeh

Recommender System in the Context of Big Data

Effective Big Data Management and Opportunities for Implementation
Book chapter
Part of ISSN: 2327-1981
Part of ISSN: 2327-199X
Contributors: Khadija Ateya Almohsen; Huda Kadhim Al-Jobori
Source: Self-asserted source
Huda Tayyeh