Preferred Language
Articles
/
Sxe3L48BVTCNdQwChV7-
Partial Encryption for Colored Images Based on Face Detection
...Show More Authors

Publication Date
Wed Jan 01 2025
Journal Name
Journal Of Interdisciplinary Mathematics
Double INEM-transform integral for solving second order partial differential equation
...Show More Authors

In this study, a brand-new double transform known as the double INEM transform is introduced. Combined with the definition and essential features of the proposed double transform, new findings on partial derivatives, Heaviside function, are also presented. Additionally, we solve several symmetric applications to show how effective the provided transform is at resolving partial differential equation.

View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Thu Nov 01 2012
Journal Name
Journal Of Computer Science
VOICE ACTIVATION VISUALIZATION FOR ECHOCARDIOGRAPH AND 3D ANGIOGRAPHIC IMAGES IN SURGERY
...Show More Authors

In some cases, surgeons need to navigate through the computer system for reconfirmation patients’ details and unfortunately surgeons unable to manage both computer system and operation at the same time. In this paper we propose a solution for this problem especially designed for heart surgeon, by introducing voice activation system with 3D visualization of Angiographic images, 2D visualization of Echocardiography processed video and selected patient’s details. In this study, the processing, approximation of the 3D angiography and the visualization of the 2D echocardiography video with voice recognition control are the most challenging work. The work involve with predicting 3D coronary three from 2D angiography image and also image enhan

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sat Mar 20 2021
Journal Name
Neuroquantology
XRD and Microscopic Images for Synthesis Graphite Nanoparticles by Oxidation Method
...Show More Authors

Graphite nanoparticles were successfully synthesized using mixture of H2O2/NH4OH with three steps of oxidation. The process of oxidations were analysis by XRD and optics microscopic images which shows clear change in particle size of graphite after every steps of oxidation. The method depend on treatments the graphite with H2O2 in two steps than complete the last steps by reacting with H2O2/NH4OH with equal quantities. The process did not reduces the several sheets for graphite but dispersion the aggregates of multi-sheets carbon when removed the Van Der Waals forces through the oxidation process.

View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
IMPROVED STRUCTURE OF DATA ENCRYPTION STANDARD ALGORITHM
...Show More Authors

The Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene

... Show More
Publication Date
Sat Nov 01 2025
Journal Name
Iop Conference Series: Earth And Environmental Science
Assessing the Bearing Capacity of the Strip Footing Resting on the Slope Face
...Show More Authors
Abstract<p> Infrastructure projects, including buildings, bridges, and towers, in hilly or mountainous areas are frequently constructed on inclined landscapes. This work utilizes finite element limit analysis (FELA) to examine the effect of critical parameters on the ultimate bearing capacity (B.C.) of strip footings (S.F.) situated on slope faces. The analysis examines the impacts of Inclination of the Slope (β), Internal Friction Angle (ϕ), and embedment depth of footing (Df). As the slope angle (β) increased from 10° to 20°, the footing’s ultimate bearing capacity decreased by 55%. Furthermore, the embedded depth shows an important effect on the bearing capacity;</p> ... Show More
View Publication
Scopus Crossref
Publication Date
Sat Mar 01 2008
Journal Name
Iraqi Journal Of Physics
Comparison between Different Data Image Compression Techniques Applied on SAR Images
...Show More Authors

In this paper, image compression technique is presented based on the Zonal transform method. The DCT, Walsh, and Hadamard transform techniques are also implements. These different transforms are applied on SAR images using Different block size. The effects of implementing these different transforms are investigated. The main shortcoming associated with this radar imagery system is the presence of the speckle noise, which affected the compression results.

View Publication Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Machine Learning And Data Mining In Pattern Recognition
A New Strategy for Case-Based Reasoning Retrieval Using Classification Based on Association
...Show More Authors

View Publication Preview PDF
Scopus (7)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Development of an Optimized Botnet Detection Framework based on Filters of Features and Machine Learning Classifiers using CICIDS2017 Dataset
...Show More Authors
Abstract<p>Botnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper <italic>suggests</italic> a hybrid detection Botnet model using machine learning approach, performed and analyzed to detect Botnet atta</p> ... Show More
View Publication
Scopus (23)
Crossref (12)
Scopus Crossref
Publication Date
Sat Dec 02 2017
Journal Name
Al-khwarizmi Engineering Journal
Human Face Recognition Using Wavelet Network
...Show More Authors

 

            This paper presents a study of wavelet self-organizing maps (WSOM) for face recognition. The WSOM is a feed forward network that estimates optimized wavelet based for the discrete wavelet transform (DWT) on the basis of the distribution of the input data, where wavelet basis transforms are used as activation function.

 

 

View Publication Preview PDF