Prof. Nadia Mohammed Ghani Al-Saidi
ProfessorUniversity of Technology, Iraq
Highest Degree
PostDoc. in Fractal in Cryptography from University Putra, Malaysia
Share this Profile
Area of Interest:
Selected Publications
- Al-Saidi, N.M.G., A.J. Mohammed and A.H. Ali, 2019. Iris features via fractal functions for authentication protocols. Int. J. Innov. Comput. Inform. Control, 15: 1441-1453.
Direct Link | - Abdul-Rahman, H.N., N.M.G. Al-Saidi, M.R.Md. Said and S. Banerjee, 2019. Dynamics and complexity of a new 4D chaotic laser system. J. Entropy, Vol. 21 10.3390/e21010034.
CrossRef | Direct Link | - Natiq, H., N.M.G. Al-Saidi, M.R.M. Said and A. Kilicman, 2018. A new hyperchaotic map and its application for image encryption. Eur. Phys. J. Plus, Vol. 133. 10.1140/epjp/i2018-11834-2.
CrossRef | Direct Link | - Al-Saidi, N.M.G., S.S. Al-Bundi and N.J. Al-Jawari, 2018. A hybrid of fractal image coding and fractal dimension for efficient retrieval method. Comput. Applied Math., 37: 996-1011.
CrossRef | Direct Link | - Al-Saidi, N.M.G., N.J. Al-Jawari and S.S. Al-Bundi, 2018. Diversity in crowding selection to improve fractal coding technique performance. J. Univ. Karbala, 16: 300-311.
- Al-Saidi, N.M.G., M.A. Magamiss, S.F. Ibraheem and A. Kh. Faraj, 2018. A new algorithm for signed binary representation and application in mobil phones. J. Math. Comput. Sci., 8: 130-152.
Direct Link | - Al-Saidi, N.M.G., S.S. Al-Bundi and N.J. Al-Jawari, 2017. An improved harmony search algorithm for reducing computational time of fractal image coding. J. Theor. Applied Inf. Technol., 95: 1669-1679.
Direct Link | - Al-Saidi, N.M.G. and M.M. Abdulhadi, 2017. E-voting system based on secret sharing scheme. Eng. Tech. J., 35: 13-18.
Direct Link | - Al-Saidi, N.M.G. and M.A. Magamiss, 2017. Nested method for optimizing elliptic curve scalar multiplication. Eng. Tech. J., 35: 105-111.
Direct Link | - Al-Saidi, N.M.G. and H.R. Yassein, 2017. A new alternative to NTRU cryptosystem based on highly dimensional algebra with dense lattice structure. Malaysian J. Math. Sci., 11: 29-43.
- Abduldaim, A.M. and N.M.G. Al-Saidi, 2017. Generalized Π-armendariz authentication cryptosystem. Int. J. Math., Computational Phys. Elect. Comput. Eng., 11: 403-408.
Direct Link | - Al-Saidi, N.M.G., S.S. Al-Bundi and N.J. Al-Jawari, 2016. Crowding optimization method to improve fractal image compressions based iterated function systems. Int. J. Adv. Comput. Sci. Appl., 7: 392-401.
Direct Link | - Al-Saidi, N.M.G., N.J. Al-Jawari1 and S.S. Al-Bundi, 2016. A hybrid of fractal image coding and fractal dimension for an efficient retrieval method. Comput. Applied Math., 2016: 1-16.
CrossRef | Direct Link | - Al-Saidi, N.M.G., A.T. Sadiq and A.A. Majeed, 2016. CQTRU: A commutative quaternions rings based public key cryptosystem. Eng. Tech. J., 34: 901-911.
- Al-Saidi, N.M.G. and N.A. Alwan, 2016. General formula for characteristic polynomials of some special graphs. Eng. Tech. J., 34: 639-650.
Direct Link | - Al-Saidi, N.M.G. and H.R. Yassein, 2016. BITRU: Binary Version of the NTRU Public Key Cryptosystem Via Binary Algebra. Int. J. Adv. Comput. Sci. Appl., 7: 1-6.
Direct Link | - Al-Saidi, N., N.A. Rajab and H.N. Abdul-Rahman, 2016. A new algorithm for induced subgraph isomorphism UPB Sci. Bull., Series A: Applied Math. Phys., 78: 171-180.
- Al-Saidi, N.M.G., N.A. Rajab, M.R. Md. Said and K.A. Kadhim, 2015. Perfect secret sharing scheme based on vertex domination set. Int. J. Comput. Math., 92: 1755-1763.
Direct Link | - Al-Saidi, N.M.G., N.A. Rajab and H.N. Abdul-Rahman, 2015. A zero knowledge authentication protocol based on novel heuristic algorithm of dense induced subgraphs isomorphism. Eng. Tech. J., Vol. 33, Part (B), No. 1. .
Direct Link | - Al-Saidi, N.M.G., A.J. Mohammed and A.M. Ahmed, 2015. Fractal Fourier Coefficients with Application to Identification Protocols. In: IAENG Transactions on Engineering Sciences, Sio-Iong A.O., A. H.-S. Chan, H. Katagiri and L. Xu (Eds.), Chapter 6, Published by World Scientific, USA, ISBN: 978-981-4667-35-7, pp: 67-80.
- Al-Saidi, N.M.G. and W.J. Abdulaal, 2015. An improved differential box counting method to estimate fractal dimension. Eng. Tech. J., 33: 714-722.
Direct Link | - Al-Saidi, N.M.G., N.A. Rajab and K.A. Kadhim, 2014. Construction of a uniform access structure using minimum independent dominating vertices. Eng. Tech. J., Part B, 32: 966-979.
Direct Link | - Al-Saidi, N.M.G., 2014. An efficient signcryption method using fractal image coding scheme. Int. J. Circuits, Syst. Signal Process., 8: 68-76.
Direct Link | - Al-Saidi, N.M.G. and W.K. Hamoudi, 2014. Information Security based Nano and Bio-Cryptography. In: Multidisciplinary Perspectives in Cryptology and Information Security, Al Maliky S.B.S. and N.A. Abbas (Eds.), Chapter 7, IGI-Global, USA, ISBN13: 9781466658080 pp: 179-199.
- Al-Saidi, N.M.G. and M.R. Md. Said, 2014. Biometric identification based local iterated function systems. Eur. Phy. J. Spec. Topics, Chaos, Cryptography Commun., 223: 1647-1662.
CrossRef | Direct Link | - Al-Saidi, N.M.G. and A.J. Mohammed and A.M. Ahmed, 2014. Fuzzy fractal dimension based on escape time algorithm. Applied Math. Sci., 8: 117-129.
Direct Link | - Al-Saidi, N.M.G, 2014. An improved key agreement protocol based on fractal theory. Eng. Tech. J., 32: 127-137.
Direct Link | - Al-Saidi, N.M.G., A.J. Mohammed, A.M. Ahmed, 2013.. Fractal dimension based on pixel covering method. Al-Mustansiriyah J. Sci., Vol. 24. .
Direct Link | - Al-Saidi, N.M.G. and S.H. Salih, 2013. Lattice attack on fractal public key cryptosystem. Eur. J. Sci. Res., 105: 126-133.
Direct Link | - Ariffin, M.R.K., N.M.G. Al-Saidi, M.R.M. Said, Z. Mahad and M.A. Daud, 2012. A New Direction in Utilization of Chaotic Fractal Functions for Cryptosystems. In: Applications of Chaos and Nonlinear Dynamics in Science and Engineering-Vol. 2. Understanding Complex Systems, Banerjee, S., L. Rondoni and M. Mitra (Eds.), Springer, Berlin, Heidelberg, ISBN: 978-3-642-29329-0, pp: 233-248.
CrossRef | - Al-Saidi, N.M.G., 2012. On Fuzzy Fractal Space. LAP Lambert Academic Publishing, Germany.
- Al-Saidi, N.M.G. and M.R. Md. Said, 2012. Password authentication based on fractal coding scheme. J. Applied Math., Vol. 12. .
Direct Link | - Al-Saidi, N.M.G. and A.J. Mohammed, 2012. A new approach for computing multi-fractal dimension based on escape time method. Int. J. Math. Anal., 6: 761-763.
Direct Link | - Al-Saidi, N.M.G., M.R. Md. Said and A.M. Ahmed, 2011. Efficiency analysis for public key systems based on fractal functions.Efficiency analysis for public key systems based on fractal functions. J. Comput. Sci., 7: 526-532.
Direct Link | - Al-Saidi, N.M.G., M.R. Md. Said and A.M. Ahmed, 2011. About fuzzy fixed point theorem in the generalized fuzzy fractal space. Far East J. Math. Sci., 53: 53-64.
- Al-Saidi, N.M.G., 2011. Signature identification scheme based on iterated function systems. Int. J. Math. Comput. Phy. Electr. Comput. Eng., World Acad. Sci., Eng. Technol., 5: 1127-1131.
Direct Link | - Al-Saidi, N.M.G., 2011. On the security of image encoding based on fractal functions. Int. J. Comput. Sci. Eng., 3: 385-392.
Direct Link | - Al-Saidi, N.M.G. and M.R. Md. Said, 2011. On the security of digital signature protocol based on iterated function systems. Int. J. Math. Anal., 5: 1399-1410.
Direct Link | - Al-Saidi, N.M.G. and M.R. Md. Said, 2011. Improved digital signature protocol using iterated function systems. Int. J. Comput. Math., 88: 3613-3625.
Direct Link | - Al-Saidi, N.M.G. and M.R. Md. Said, 2011. A new idea in zero knowledge protocols based on iterated function systems. World Applied Sci. J., 15: 364-371.
Direct Link | - Nadia, M.G., Al-Saidi and M.R. Md. Said, 2010. A new public key cryptosystem based on IFS. Int. J. Cryptol. Res., 2: 1-13.
Direct Link | - Nadia M.G., Al-Saidi and M.R. Md. Said, 2009. IFS on the multi-fuzzy fractal space. Int. J. Comput. Math. Sci., 3: 86-90.
- Al-Saidi, N.M.G. and M.R.M. Said, 2009. A new approach in cryptographic systems using fractal image coding. J. Math. Statist., 5: 183-189.
CrossRef | Direct Link | - Nadia, M.G., Al-Saidi and S.B. Sadkhan, 1997. Study the evaluation parameters of GEFFE and other key generator used with non-linear stream cipher systems. Comput. Res. J., 1: 53-65.
- Nadia, M.G., Al-Saidi, S.B. Sadkhan and H.A. Al-Khatab, 1995. A new method for synthesis a sequence using a hybrid system consisting of Meier-Staffelbach and Berlekamp-Massey. Electron. Comput. J., 18: 58-70.
.