Preferred Language
Articles
/
FRYulocBVTCNdQwCM1ew
New multispectral images classification method based on MSR and Skewness implementing on various sensor scenes
...Show More Authors

Publication Date
Sat Dec 30 2023
Journal Name
Wasit Journal For Pure Sciences
Honeywords Generation Technique based on Meerkat Clan Algorithm and WordNet
...Show More Authors

The efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Sep 01 2016
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Performance evaluation of heterogeneous network based on RED and WRED
...Show More Authors

Scopus (3)
Scopus
Publication Date
Tue Sep 01 2020
Journal Name
Al-khwarizmi Engineering Journal
UAV Control Based on Dual LQR and Fuzzy-PID Controller
...Show More Authors

This paper presents the design of a longitudinal controller for an autonomous unmanned aerial vehicle (UAV). This paper proposed the dual loop (inner-outer loop) control based on the intelligent algorithm. The inner feedback loop controller is a Linear Quadratic Regulator (LQR) to provide robust (adaptive) stability. In contrast, the outer loop controller is based on Fuzzy-PID (Proportional, Integral, and Derivative) algorithm to provide reference signal tracking. The proposed dual controller is to control the position (altitude) and velocity (airspeed) of an aircraft. An adaptive Unscented Kalman Filter (AUKF) is employed to track the reference signal and is decreased the Gaussian noise. The mathematical model of aircraft

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
Towards Accurate Pupil Detection Based on Morphology and Hough Transform
...Show More Authors

 Automatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Fri Oct 01 2021
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Color image compression based on spatial and magnitude signal decomposition
...Show More Authors

<p>In this paper, a simple color image compression system has been proposed using image signal decomposition. Where, the RGB image color band is converted to the less correlated YUV color model and the pixel value (magnitude) in each band is decomposed into 2-values; most and least significant. According to the importance of the most significant value (MSV) that influenced by any simply modification happened, an adaptive lossless image compression system is proposed using bit plane (BP) slicing, delta pulse code modulation (Delta PCM), adaptive quadtree (QT) partitioning followed by an adaptive shift encoder. On the other hand, a lossy compression system is introduced to handle the least significant value (LSV), it is based on

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Crossref
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Anomaly Detection Approach Based on Deep Neural Network and Dropout
...Show More Authors

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct

... Show More
View Publication Preview PDF
Scopus (29)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Thu Jun 25 2020
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Synthesis, Characterization and Antibacterial Activity Evaluation of New Indole-Based Derivatives
...Show More Authors

A new series of N-acyl hydrazones (4a-g) derived from indole-3-propionic acid (IPA) were synthesized. These N-acyl hydrazones were prepared by the reaction of 3-(1H-indol-3-yl) propane hydrazide and aldehyde in the existence of glacial acetic acid as a catalyst. 1HNMR and FT-IR analyses were used to identify the synthesized compounds and they were in vitro evaluated as antibacterial agents against six different types of microorganisms by using well diffusion method. All the tested N-acyl hydrazones (4a-g) displayed moderate activity against the Gram-negative E.coli, comparable to that of Amoxicillin. Some of the tested N-acyl hydrazones also exhibited intermediate activity ag

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (5)
Scopus Crossref
Publication Date
Mon Apr 01 2024
Journal Name
Indonesian Journal Of Chemistry
Synthesis, Structure and Biological Activity Studies of New Metal Ion Complexes Based on 3-[(3-Hydroxynaphthalene-2-yl-ethylidene)-hydrazono]-1,3-dihydro-indol-2-one
...Show More Authors

In the present study, a novel ligand (L) made of 2-hydroxynaphthaldehyde and 3-hydrazone-1,3-dihydro-indole-2-one(3-[(3-hydroxynaphthalen-2-yl-ethylidene)-hydrazono]-1,3-dihydro-indol-2-one). The ligand was characterized by FTIR, UV-vis, mass, 1H-NMR, 13C-NMR, and CHN elemental analysis. New complexes of this ligand were created by treating methanol and a drop of DMF solution of the produced ligand with the hydrated metal salts of Mn(II), Co(II), Ni(II), Cu(II), and Zn(II) in a molar ratio of 2:1 (L:M). As a result, complexes have been emerged and identified FTIR, UV-vis, C.H.N., chloride-containing, molar conductance, magnetic susceptibility, and atomic absorption. The characterization result for each complex indicated complexes wi

... Show More
Scopus (4)
Scopus Clarivate Crossref
Publication Date
Fri Sep 15 2017
Journal Name
Journal Of Baghdad College Of Dentistry
The Effect Of Bracket Ligation Method On Canine Retraction
...Show More Authors

Aim: This study aimed to compare different types of ligation methods to obtain maximum tooth movement with the least undesirable rotation. Methods: Titanium brackets bonded to acrylic canine teeth were ligated to straight stainless steel (SS) archwires using four ligation methods (figure-O and figure-8 elastics, SS ligatures, and Leone Slide ligatures). The teeth with the ligatures in place were stored in a water bath at 37ºC for 1 day, 1 week, 2, 4 or 6 weeks before testing. The teeth were retracted through softened wax along the archwire and the amount of tooth movement and degree of rotation were measured. Results: Slide ligatures showed the highest distance of tooth movement and degree of canine rotation followed by figure-O elastics

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 25 2025
Journal Name
Iet Networks
An Effective Technique of Zero‐Day Attack Detection in the Internet of Things Network Based on the Conventional Spike Neural Network Learning Method
...Show More Authors
ABSTRACT<p>The fast evolution of cyberattacks in the Internet of Things (IoT) area, presents new security challenges concerning Zero Day (ZD) attacks, due to the growth of both numbers and the diversity of new cyberattacks. Furthermore, Intrusion Detection System (IDSs) relying on a dataset of historical or signature‐based datasets often perform poorly in ZD detection. A new technique for detecting zero‐day (ZD) attacks in IoT‐based Conventional Spiking Neural Networks (CSNN), termed ZD‐CSNN, is proposed. The model comprises three key levels: (1) Data Pre‐processing, in this level a thorough cleaning process is applied to the CIC IoT Dataset 2023, which contains both malicious and t</p> ... Show More
View Publication Preview PDF
Crossref