Preferred Language
Articles
/
alkej-137
Design a Security Network System against Internet Worms
...Show More Authors

 Active worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 01 2011
Journal Name
Journal Of Engineering
Image Reconstruction Using Modified Hybrid Transform
...Show More Authors

In this paper, an algorithm for reconstruction of a completely lost blocks using Modified
Hybrid Transform. The algorithms examined in this paper do not require a DC estimation
method or interpolation. The reconstruction achieved using matrix manipulation based on
Modified Hybrid transform. Also adopted in this paper smart matrix (Detection Matrix) to detect
the missing blocks for the purpose of rebuilding it. We further asses the performance of the
Modified Hybrid Transform in lost block reconstruction application. Also this paper discusses
the effect of using multiwavelet and 3D Radon in lost block reconstruction.

View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Journal Of Engineering
Detection and Diagnosis of Induction Motor Faults by Intelligent Techniques
...Show More Authors

This paper presents a complete design and implementation of a monitoring system for the operation of the three-phase induction motors. This system is built using a personal computer and  two types of sensors (current, vibration) to detect some of the mechanical faults that may occur in the motor. The study and examination of several types of faults including (ball bearing and shaft misalignment faults) have been done through the extraction of fault data by using fast Fourier transform (FFT) technique. Results showed that the motor current signature analysis (MCSA) technique, and measurement of vibration technique have high possibility in the detection and diagnosis of most mechanical faults with high accuracy. Subsequently, diagnosi

... Show More
View Publication Preview PDF
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
Towards Accurate Pupil Detection Based on Morphology and Hough Transform
...Show More Authors

 Automatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Wed Jul 19 2017
Journal Name
International Journal Of Advances In Chemical Engineering And Biological Sciences
Detection of Aflatoxin M1 in Pasteurized Canned Milk and Using of UV Radiation for Detoxification
...Show More Authors

The current study was designed to investigate the presence of aflatoxin M1 in 25 samples of pasteurized canned milk which collected randomly from some Iraqi local markets using ELISA technique. Aflatoxin M1 was present in 21 samples, the concentration of aflatoxin M1 ranged from (0.25-50 ppb). UV radiation (365nm wave length) was used for detoxification of aflatoxin M1 (sample with highest concentration /50 ppb of aflatoxin M1 in two different volumes ((25 & 50 ml)) for two different time (15 & 30 min) and 30, 60, 90 cm distance between lamp and milk layer were used for this purpose). Results showed that distance between lamp and milk layer was the most effective parameter in reduction of aflatoxin M1, and whenever the distance increase the

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Tue Oct 01 2019
Journal Name
Journal Of Engineering
Generation and Experimental Stress Analysis of Elliptical Gears with Combined Teeth
...Show More Authors

In this study, generation of elliptical gears with different teeth profiles of crowned involute, double circular arc (DCA), and combined (crowned involute with DCA) has been developed. The resulting mathematical equations have been computerized and feed to CNC end mill machine to manufacture elliptical gear models with different profiles. These models are investigated in plane polariscope to show the resulting stresses under certain load. Comparison of photo-elastic stress results shows that combined elliptical gears with DCA side as a loaded side have a minimum resulting contact stress with a reduction percentage of 40% compare with contact stresses in counterpart elliptical gear of involute profile (which is commonly u

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering Science And Technology
HYBRID CIPHERING METHOD BASED ON CHAOS LOGISTIC MAP AND FINGERPRINT INFORMATION
...Show More Authors

In modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o

... Show More
Publication Date
Thu Jun 20 2019
Journal Name
Baghdad Science Journal
An Analysis on the Applicability of Meta-Heuristic Searching Techniques for Automated Test Data Generation in Automatic Programming Assessment
...Show More Authors

Automatic Programming Assessment (APA) has been gaining lots of attention among researchers mainly to support automated grading and marking of students’ programming assignments or exercises systematically. APA is commonly identified as a method that can enhance accuracy, efficiency and consistency as well as providing instant feedback on students’ programming solutions. In achieving APA, test data generation process is very important so as to perform a dynamic testing on students’ assignment. In software testing field, many researches that focus on test data generation have demonstrated the successful of adoption of Meta-Heuristic Search Techniques (MHST) so as to enhance the procedure of deriving adequate test data for efficient t

... Show More
View Publication Preview PDF
Crossref (2)
Clarivate Crossref
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Medical waste management in Al-Kut City
...Show More Authors

This research investigates solid waste management in Al-Kut City. It included the collection of medical and general solid waste generated in five hospitals different in their specialization and capacity through one week, starting from 03/02/2012. Samples were  collected and analyzed periodically to find their generation rate, composition, and physical properties. Analysis results indicated that generation rate ranged between (1102 – 212) kg / bed / day, moisture content and density were (19.0 % - 197 kg/ m3) respectively for medical waste and (41%-255 kg/ m3) respectively for general waste. Theoretically, medical solid waste generated in Al-Kut City (like any other city), affected by capacity, number of patients in a day, and hosp

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Aug 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
The role of leader-member exchange in the organizational citizenship behavior according to organizational trust Analytical research at the center of Ministry of Migration and Displaced
...Show More Authors

This research aimed to examine the correlation and influence of leader-member exchange in the organizational citizenship behavior in the existence of organizational trust as mediator variable among workers in ministry of migration and displaced, has been collecting data and information relating to research by designing questionnaire was distributed to the stratified random sample included (56) member of the workers in the ministry mentioned, and through the use of several statistical method were the main findings of research was the existence of a correlation relationship and influence between leader- member exchange and organizational trust, while the results confirmed no correlation and influen

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Role of Participatory Budgeting in Improving Performance in light of Covid 19
...Show More Authors

The current research aims to analyze the role of participatory budgeting in improving performance, especially during crises such as the Covid-19 crisis. The research used the descriptive analytical method to reach the results by distributing 100 questionnaires to a number of employees in Iraqi joint stock companies and at multiple administrative levels. The research came to several important conclusions, the most important of which is that the bottom-up approach to budgeting produces more achievable budgets than the top-down approach, which is imposed on the company by senior management with much less employee participation. Additionally, there is a better information flow from the lower levels of the organization to the upper management

... Show More
View Publication Preview PDF