Preferred Language
Articles
/
QBdQPo8BVTCNdQwC_2XJ
Construct an Efficient DDoS Attack Detection System Based on RF-C4.5-GridSearchCV
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Fri May 31 2019
Journal Name
Journal Of Engineering
WSN-WCCS: A Wireless Sensor Network Wavelet Curve Ciphering System
...Show More Authors

With wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS).  The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN.  It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
Bioremediation of Petroleum Hydrocarbons Contaminated Soil using Bio piles System
...Show More Authors

This study was focused on biotreatment of soil which polluted by petroleum compounds (Diesel) which caused serious environmental problems. One of the most effective and promising ways to treat diesel-contaminated soil is bioremediation. It is a choice that offers the potential to destroy harmful pollutants using biological activity. Four bacterial strains were isolated from diesel contaminated soil samples. The isolates were identified by the Vitek 2 system, as Sphingomonas paucimobilis, Pentoae species, Staphylococcus aureus, and Enterobacter cloacae. The potential of biological surfactant production was tested using the Sigma 703D stand-alone tensiometer showed that these isolates are biological surfactant producers. The bet

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Apr 20 2021
Journal Name
Journal Of Optical Communications
Analyzing of UVLC system considering the effect of water depth
...Show More Authors
Abstract<p>This paper presents a new approach to discover the effect of depth water for underwater visible light communications (UVLC). The quality of the optical link was investigated with varying water depth under coastal water types. The performance of the UVLC with multiple input–multiple output (MIMO) techniques was examined in terms of bit error rate (BER) and data rate. The theoretical result explains that there is a good performance for UVLC system under coastal water.</p>
View Publication
Scopus (5)
Crossref (6)
Scopus Crossref
Publication Date
Mon Jan 02 2017
Journal Name
Al-academy
Aesthetics Environmental Art (An analytical study)
...Show More Authors

Find cares studying the aesthetics of environmental art, one of the topics that is one of the problems of the aesthetic side in the arts of postmodernism, so this research came as an attempt to get to know the aesthetic concepts of environmental art that can be learned from functional testing in the formation of the post-modern control. The research involved four chapters: The first chapter discusses the general framework of the research methodology, as it was displayed in itThe research problem and its importance and define its objective to identify the aesthetics of environmental art at the level of the body, meaning, the receiver .ozlk in Iraq and America as the spatial limits of the time limits are period stretching from 1970 to 2006

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Nov 01 2014
Journal Name
I-manager's Journal On Information Technology
AN ENHANCED METHOD FOR SPRITE EXTRACTING
...Show More Authors

The extracting of personal sprite from the whole image faced many problems in separating the sprite edge from the unneeded parts, some image software try to automate this process, but usually they couldn't find the edge or have false result. In this paper, the authors have made an enhancement on the use of Canny edge detection to locate the sprite from the whole image by adding some enhancement steps by using MATLAB. Moreover, remove all the non-relevant information from the image by selecting only the sprite and place it in a transparent background. The results of comparing the Canny edge detection with the proposed method shows improvement in the edge detection.

Publication Date
Wed Aug 01 2007
Journal Name
University Of Baghdad, College Of Education For Pure Science (ibn Al-haitham), Department Of Mathematical
Thesis.On Solvability of an Operator Equation-
...Show More Authors

Publication Date
Tue Oct 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Debt swaps An Islamic Economic Evaluation
...Show More Authors

Introduction:

        Many business owners suffer major financial problems during periods of financial stagnation, the decline of markets and businesses, or under the impact of financial shocks for certain reasons that result in large debts and the consequent financial and legal obligations. This is the beginning of a long and endless path of suffering and the search for a safe exit. It is even worse for financial institutions to facilitate financial solutions that rely on lending as a solution to their financial problem. Debt and its consequences increase, and the problem deepens and becomes complicated until things become entangled and the escape or declaration of bank

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 04 2011
Journal Name
Baghdad Science Journal
An Embedded Data Using Slantlet Transform
...Show More Authors

Data hiding is the process of encoding extra information in an image by making small modification to its pixels. To be practical, the hidden data must be perceptually invisible yet robust to common signal processing operations. This paper introduces a scheme for hiding a signature image that could be as much as 25% of the host image data and hence could be used both in digital watermarking as well as image/data hiding. The proposed algorithm uses orthogonal discrete wavelet transforms with two zero moments and with improved time localization called discrete slantlet transform for both host and signature image. A scaling factor ? in frequency domain control the quality of the watermarked images. Experimental results of signature image

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 01 2012
Journal Name
Iraqi Journal Of Medical Sciences
Lower Gastrointestinal Bleeding: An Etiological Study.
...Show More Authors

Publication Date
Wed May 29 2019
Journal Name
Selected Topics In Facial Nerve Disorders
Introductory Chapter: Facial Nerve - An Overview
...Show More Authors

View Publication Preview PDF
Crossref (1)
Crossref