Wasan Awad

Wasan Shaker Awad is an associate professor of Computer Science, College of Information Technology, Ahlia University, Bahrain. Her research areas include information security, computational intelligence, and coding theory. She published a number of papers in computational intelligence, information security, and block codes in a number of international journals and conferences.

Publications

Implementing Computational Intelligence Techniques for Security Systems Design
Yousif Abdullatif Albastaki, Wasan Awad. © 2020. 332 pages.
Recently, cryptology problems, such as designing good cryptographic systems and analyzing them, have been challenging researchers. Many algorithms that take advantage of...
Improving Spam Email Filtering Systems Using Data Mining Techniques
Wasan Shaker Awad, Wafa M. Rafiq. © 2020. 30 pages.
Email is the most popular choice of communication due to its low-cost and easy accessibility, which makes email spam a major issue. Emails can be incorrectly marked by a spam...
Improving the Security of Storage Systems: Bahrain Case Study
Wasan Awad, Hanin Mohammed Abdullah. © 2019. 34 pages.
Developing security systems to protect the storage systems are needed. The main objective of this paper is to study the security of file storage server of an organization....
A Framework for Improving Knowledge Management Using Cloud-Based Business Intelligence: Bahrain Case Study
Wasan Awad, Dalal N. Al-Noaimi. © 2019. 24 pages.
Business environment is becoming more complex which creates a big pressure on organizations to increase the performance and decrease the budget and time. Typical management...
Computational Intelligence in Cryptology
Wasan Awad, El-Sayed M. El-Alfy. © 2017. 17 pages.
Computational intelligence (CI) has attracted the attention of many researchers for its effectiveness in solving different kinds of problems. It has been applied to solve...
Improving Information Security Practices through Computational Intelligence
Wasan Awad, El Sayed M. El-Alfy, Yousif Al-Bastaki. © 2016. 327 pages.
The recent explosion in complex global networking architectures has spurred a concomitant rise in the need for robust information security. Further, as computing power increases...
Computational Intelligence Paradigms: An Overview
El-Sayed M. El-Alfy, Wasan Awad. © 2016. 27 pages.
The evolution of communication networks and information systems, to support wireless access, cloud and grid computing, and big data, provides great business opportunities....
Computational Intelligence in Cryptology
Wasan Awad, El-Sayed M. El-Alfy. © 2016. 17 pages.
Computational intelligence (CI) has attracted the attention of many researchers for its effectiveness in solving different kinds of problems. It has been applied to solve...
Automated Design of Stream Ciphers Using GADS
Wasan Awad, Amal M. Al Hiddi. © 2016. 28 pages.
The main objective of this chapter is to propose a new effective algorithm to design stream cipher systems automatically using simulated annealing algorithm and genetic...
Computational Intelligence Paradigms: An Overview
El-Sayed M. El-Alfy, Wasan Awad. © 2016. 27 pages.
The evolution of communication networks and information systems, to support wireless access, cloud and grid computing, and big data, provides great business opportunities....
Information Hiding Using Ant Colony Optimization Algorithm
Wasan Shaker Awad. © 2013. 13 pages.
This paper aims to find an effective and efficient information hiding method used for protecting secret information by embedding it in a cover media such as images. Finding the...
E-Mail as an Official Communication Tool in Bahrain: Individual and Public Organization Perspectives
Wasan Shaker Awad, Ali Hussein Zolait. © 2013. 26 pages.
This research studies the acceptance of e-mail for communicating official messages among citizens in Bahrain. It also examines the relationships between citizens’ age...
Information Hiding Using Ant Colony Optimization Algorithm
Wasan Shaker Awad. © 2011. 13 pages.
This paper aims to find an effective and efficient information hiding method used for protecting secret information by embedding it in a cover media such as images. Finding the...
International Journal of Technology Diffusion (IJTD)
Ali Hussein Saleh Zolait. Est. 2010.
The International Journal of Technology Diffusion (IJTD) is an international journal publishing original scientific and quality research articles on management information...