Preferred Language
Articles
/
bBY3SYcBVTCNdQwCFUL8
Sustainability Assessment System for Highrise Buildings in Iraq
...Show More Authors
Abstract<p>This study aims to preparation a standards code for sustainability requirements to contribute in a better understanding to the concept of sustainability assessment systems in the dimensions of Iraqi projects in general and in the high-rise building. Iraq is one of the developing countries that faced significant challenges in sustainability aspects environmental, economic and social, it became necessary to develop an effective sustainability building assessment system in respect of the local context in Iraq. This study presented a proposal for a system of assessing the sustainability requirements of Iraqi high rise buildings (ISHTAR), which has been developed through several integrated steps, begin with investigates the well-known sustainability systems, experts consensus based on the Delphi technique involving 32 experts consider as sustainability world leading and local highly-informed to identify applicable assessment categories and factors for the Iraqi context and its weighting system, then analyze the results using the pairwise comparison and Analytic Hierarchy Process (AHP) technique.</p>
Scopus Crossref
View Publication
Publication Date
Thu Jun 28 2018
Journal Name
2018 4th International Conference On Computer And Technology Applications (iccta)
Improving accuracy of CADx system by hybrid PCA and backpropagation
...Show More Authors

—Medical images have recently played a significant role in the diagnosis and detection of various diseases. Medical imaging can provide a means of direct visualization to observe through the human body and notice the small anatomical change and biological processes associated by different biological and physical parameters. To achieve a more accurate and reliable diagnosis, nowadays, varieties of computer aided detection (CAD) and computer-aided diagnosis (CADx) approaches have been established to help interpretation of the medical images. The CAD has become among the many major research subjects in diagnostic radiology and medical imaging. In this work we study the improvement in accuracy of detection of CAD system when comb

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Engineering
Development an Anomaly Network Intrusion Detection System Using Neural Network
...Show More Authors

Most intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed May 17 2023
Journal Name
Journal Of Engineering
Design of a Differential Chaotic on-off keying communication system
...Show More Authors

Among the available chaotic modulation schemes, differential chaos shift keying (DSCK) offers the perfect noise performance. The power consumption of DCSK is high since it sends chaotic signal in both of 1 and 0 transmission, so it does not represent the optimal choice for some applications like indoor wireless sensing where power consumption is a critical issue. In this paper a novel noncoherent chaotic communication scheme called differential chaos on-off keying (DCOOK) is proposed as a solution of this problem. With the proposed scheme, the DCOOK signal have a structure similar to chaos on-off keying (COOK) scheme with improved performance in noisy and multipath channels by introducing the concept of differential coherency used in DCS

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Apr 20 2021
Journal Name
Journal Of Optical Communications
Analyzing of UVLC system considering the effect of water depth
...Show More Authors
Abstract<p>This paper presents a new approach to discover the effect of depth water for underwater visible light communications (UVLC). The quality of the optical link was investigated with varying water depth under coastal water types. The performance of the UVLC with multiple input–multiple output (MIMO) techniques was examined in terms of bit error rate (BER) and data rate. The theoretical result explains that there is a good performance for UVLC system under coastal water.</p>
View Publication
Scopus (7)
Crossref (7)
Scopus Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series
Modified PRESENT Encryption algorithm based on new 5D Chaotic system
...Show More Authors

Cryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti

... Show More
Scopus (9)
Crossref (7)
Scopus Crossref
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Mar 19 2022
Journal Name
Al-khwarizmi Engineering Journal
Enhancement of System Security by Using LSB and RSA Algorithms
...Show More Authors

A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.

View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Mon Mar 27 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Preparation and Evaluation of Meloxicam Microsponges as Transdermal Delivery System
...Show More Authors

The aim of present study was to develop gel formulation of microsponges of poorly soluble drug meloxicam (MLX) in order to enhance the release and dissolution of MLX which is the limitation for preparation in topical forms. Also skin delivery is an alternative administration for MLX that can minimize gastrointestinal (GI) side effects and improve patient compliance. The microsponges of MLX were prepared by quasi-emulsion solvent diffusion method.  The effects of drug:polymer ratio, stirring time and Eudragit polymer type on the physical characteristics of microsponges were investigated and characterized for production yield, loading efficiency, particle size, surface morphology, and in vitro drug release from microsponges. The selec

... Show More
View Publication
Crossref (7)
Crossref
Publication Date
Fri May 31 2019
Journal Name
Journal Of Engineering
WSN-WCCS: A Wireless Sensor Network Wavelet Curve Ciphering System
...Show More Authors

With wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS).  The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN.  It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Nov 02 2014
Journal Name
Iraqi Journal Of Pharmaceutical Science
preparation and evaluation of meloxicam microsponges as transdermal delivery system
...Show More Authors