Ali Kartit

According to our database1, Ali Kartit authored at least 28 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A multi-agent-based approach for community detection using association rules.
Int. J. Data Sci. Anal., October, 2024

2023
AIDSII: An AI-based digital system for intelligent irrigation.
Softw. Impacts, September, 2023

DLDiagnosis: A mobile and web application for diseases classification using Deep Learning.
SoftwareX, July, 2023

2022
Transfer Learning in Keratoconus Classification.
Int. J. Online Biomed. Eng., December, 2022

Impact of regularization on the effectiveness of transfer learning for olive disease classification.
Proceedings of the 11th International Symposium on Signal, Image, Video and Communications, 2022

2020
An Overview of Gradient Descent Algorithm Optimization in Machine Learning: Application in the Ophthalmology Field.
Proceedings of the Smart Applications and Data Analysis - Third International Conference, 2020

2019
Real-world applications and implementation of Keystroke biometric system.
Proceedings of the BDIoT'19: The 4th International Conference On Big Data and Internet of Things, 2019

2018
A Cloud-based Framework to Secure Medical Image Processing.
J. Mobile Multimedia, 2018

A Framework to Secure Medical Image Storage in Cloud Computing Environment.
J. Electron. Commer. Organ., 2018

A Secured Data Processing Technique for Effective Utilization of Cloud Computing.
J. Data Min. Digit. Humanit., 2018

A novel approach based on segmentation for securing medical image processing over cloud.
J. Data Min. Digit. Humanit., 2018

A Cloud Based Solution for Collaborative and Secure Sharing of Medical Data.
Int. J. Enterp. Inf. Syst., 2018

Improving Implementation of Keystroke Dynamics Using K-NN and Manhattan Distance.
Proceedings of the Big Data, Cloud and Applications - Third International Conference, 2018

2017
Techniques to Detect DoS and DDoS Attacks and an Introduction of a Mobile Agent System to Enhance it in Cloud Computing.
Int. J. Interact. Multim. Artif. Intell., 2017

A Novel Approach for Security in Cloud-Based Medical Image Storage Using Segmentation.
Proceedings of the Ubiquitous Networking - Third International Symposium, 2017

Towards Optimizing the Usability of Homomorphic Encryption in Cloud-Based Medical Image Processing.
Proceedings of the Ubiquitous Networking - Third International Symposium, 2017

Ensuring Security in Cloud Computing Using Access Control: A Survey.
Proceedings of the Innovations in Smart Cities and Applications, 2017

Using Homomorphic Encryption in Cloud-Based Medical Image Processing: Opportunities and Challenges.
Proceedings of the Innovations in Smart Cities and Applications, 2017

Simplified and Efficient Framework for Securing Medical Image Processing Over Cloud Computing.
Proceedings of the Innovations in Smart Cities and Applications, 2017

Protecting medical data in cloud storage using fault-tolerance mechanism.
Proceedings of the 2017 International Conference on Smart Digital Environment, 2017

Different Access Control Mechanisms for Data Security in Cloud Computing.
Proceedings of the 2017 International Conference on Cloud and Big Data Computing, ICCBDC 2017, London, United Kingdom, September 17, 2017

Design a Secure Framework for Cloud-Based Medical Image Storage.
Proceedings of the 2nd international Conference on Big Data, Cloud and Applications, 2017

Security in Cloud-Based Medical Image Processing: Requirements and Approaches.
Proceedings of the 2nd international Conference on Big Data, Cloud and Applications, 2017

2016
Improved Methods and Principles for Designing and Analyzing Security Protocols.
Int. J. Netw. Secur., 2016

Secure cloud-based medical image storage using secret share scheme.
Proceedings of the 5th International Conference on Multimedia Computing and Systems, 2016

Towards a secure cloud database using Paillier's homomorphic cryptosystem.
Proceedings of the 5th International Conference on Multimedia Computing and Systems, 2016

Applying homomorphic encryption for securing cloud database.
Proceedings of the 4th IEEE International Colloquium on Information Science and Technology, 2016

2015
Applying Encryption Algorithm for Data Security in Cloud Storage.
Proceedings of the Advances in Ubiquitous Networking, 2015


  Loading...