Preferred Language
Articles
/
ABcTeo0BVTCNdQwCgxXf
Stability and Bifurcation in a Prey–Predator–Scavenger System with Michaelis–Menten Type of Harvesting Function
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Tue Dec 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
Deposit insurance system and its role in financial security for the period (2010-2018) Study the experiences of Selected countries with reference to Iraq
...Show More Authors

Founding a System to secure deposits and protecting the depositors is considered one of the important and exchanged subjects out there in the banking system/field in Iraq at the current time, and the reason behind the exchange and spread of this subject is due to the financial crisis of which the banking sector is suffering from and the stumbling of many banks, those factors have had led to the insecurity of the depositors and their mistrust towards banks, thus, it is necessary to create a system to secure deposits in which depositors would be compensated for the losses caused by the banks' failures. in addition, it could be a countermeasure system which maintains the banking stability, protects the rights of depositors and gains

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Mar 02 2019
Journal Name
Biochem. Cell.arch.
EVALUATION OF PRIMARY IMPLANTS STABILITY IN IMMEDIATE AND DELAYED TREATMENT PROTOCOLS ACCORDING TO BONE DENSITY, JAWS, GENDER AND AGE UTILIZING PERIOTEST M DEVICE
...Show More Authors

Publication Date
Wed Apr 01 2020
Journal Name
Biochemical & Cellular Archives
INVESTIGATION OF VITAMIN D, ESTRADIOL AND C-REACTIVE PROTEIN LEVELS IN PRE AND POST-MENOPAUSAL IRAQI TYPE 2 DIABETES MELLITUS IN WOMEN.
...Show More Authors

Diabetes mellitus is a metabolic chronic disease, with global estimation increase in patient (around 100 million in 2030).The aim of the current study is to investigate vitamin D, C-reactive protein and estradiol levels in pre and postmenopausal Iraqi women with type 2 diabetes (T2MD).A total of 176 female distributed into two groups: the first included 90 women withT2MD (43 pre and 47 post-menopausal); the second group included 86 healthy subjects (41 pre and 45 postmenopausal) considered as control. This study has shown that women in premenopausal (20-40 years) had highly significant difference in the estradiol and vitamin D levels in diabetes subjects (62.192 ± 17.643pg/ml, 10.522 ± 1.958ng/ml) compared with healthy (131.793 ± 1

... Show More
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Enhancement Ear-based Biometric System Using a Modified AdaBoost Method
...Show More Authors

          The primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri May 31 2019
Journal Name
Journal Of Engineering
WSN-WCCS: A Wireless Sensor Network Wavelet Curve Ciphering System
...Show More Authors

With wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS).  The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN.  It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
International Journal Of Drug Delivery Technology
Transethosomes a novel transdermal drug delivery system for antifungal drugs
...Show More Authors

Scopus (12)
Scopus
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 31 2017
Journal Name
Al-khwarizmi Engineering Journal
Design an Integral Sliding Mode Controller for a Nonlinear System
...Show More Authors

The goal of this paper is to design a robust controller for controlling a pendulum
system. The control of nonlinear systems is a common problem that is facing the researchers in control systems design. The Sliding Mode Controller (SMC) is the best solution for controlling a nonlinear system. The classical SMC consists from two phases. The first phase is the reaching phase and the second is the sliding phase. The SMC suffers from the chattering phenomenon which is considered as a severe problem and undesirable property. It is a zigzag motion along the switching surface. In this paper, the chattering is reduced by using a saturation function instead of sign function. In spite of SMC is a good method for controlling a nonlinear system b

... Show More
View Publication Preview PDF
Crossref (9)
Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Journal Of Engineering
Securing Physical Layer for FHSS Communication System Using Code andPhase Hopping Techniques in CDMA, System Design and Implementation
...Show More Authors

The Frequency-hopping Spread Spectrum (FHSS) systems and techniques are using in military and civilianradar recently and in the communication system for securing the information on wireless communications link channels, for example in the Wi-Fi 8.02.X IEEE using multiple number bandwidth and frequencies in the wireless channel in order to hopping on them for increasing the security level during the broadcast, but nowadays FHSS problem, which is, any Smart Software Defined Radio (S-SDR) can easily detect a wireless signal at the transmitter and the receiver for the hopping sequence in both of these, then duplicate this sequence in order to hack the signal on both transmitter and receiver messages using the order of the se

... Show More
View Publication Preview PDF
Crossref (1)
Crossref