Preferred Language
Articles
/
bsj-2584
Synthesis And Characterization Of Some New Acetylenic Mannich Bases Based On Biphenyl – 4,4 - Dithiol
...Show More Authors

One of the most important , compound which have active hydrogen is the compound possessing (thiol group) Biphenyl-4,4-dithiol is agood example utilized in a wide field for preparation mannich bases , avariety of new acetylenic mannich bases have been Synthesized and all proposed structure were Supported by FTIR , 1H – NMR, 13C-NMR , Elemental analysis and microbial study .

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Image encryption algorithm based on the density and 6D logistic map
...Show More Authors

One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera

... Show More
View Publication
Scopus (22)
Crossref (10)
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Ieee Systems Journal
Intelligent Traffic Management and Load Balance Based on Spike ISDN-IoT
...Show More Authors

An intelligent software defined network (ISDN) based on an intelligent controller can manage and control the network in a remarkable way. In this article, a methodology is proposed to estimate the packet flow at the sensing plane in the software defined network-Internet of Things based on a partial recurrent spike neural network (PRSNN) congestion controller, to predict the next step ahead of packet flow and thus, reduce the congestion that may occur. That is, the proposed model (spike ISDN-IoT) is enhanced with a congestion controller. This controller works as a proactive controller in the proposed model. In addition, we propose another intelligent clustering controller based on an artificial neural network, which operates as a reactive co

... Show More
Scopus (19)
Crossref (17)
Scopus Clarivate Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering Science And Technology
HYBRID CIPHERING METHOD BASED ON CHAOS LOGISTIC MAP AND FINGERPRINT INFORMATION
...Show More Authors

In modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o

... Show More
Publication Date
Mon Feb 07 2022
Journal Name
Cogent Engineering
A partial image encryption scheme based on DWT and texture segmentation
...Show More Authors

View Publication
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Fri May 16 2014
Journal Name
International Journal Of Computer Applications
Lossless Image Compression based on Predictive Coding and Bit Plane Slicing
...Show More Authors

View Publication
Crossref (4)
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Finger Vein Recognition Based on PCA and Fusion Convolutional Neural Network
...Show More Authors

Finger vein recognition and user identification is a relatively recent biometric recognition technology with a broad variety of applications, and biometric authentication is extensively employed in the information age. As one of the most essential authentication technologies available today, finger vein recognition captures our attention owing to its high level of security, dependability, and track record of performance. Embedded convolutional neural networks are based on the early or intermediate fusing of input. In early fusion, pictures are categorized according to their location in the input space. In this study, we employ a highly optimized network and late fusion rather than early fusion to create a Fusion convolutional neural network

... Show More
Publication Date
Tue Jan 01 2019
Journal Name
Ieee Access
Speech Enhancement Algorithm Based on Super-Gaussian Modeling and Orthogonal Polynomials
...Show More Authors

View Publication
Scopus (44)
Crossref (43)
Scopus Clarivate Crossref
Publication Date
Wed May 09 2012
Journal Name
Fuzzy Inference System - Theory And Applications
Some Studies on Noise and Its Effects on Industrial/Cognitive Task Performance and Modeling
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Sun Mar 01 2009
Journal Name
Baghdad Science Journal
Effect of leaves Extracts of Duranta repens on growth and activity of some types of Pathogenic Bacteria and Some types of Fungi
...Show More Authors

A study were conducted to examinate the effect of organic and aqueous (Hot, Cold) Extracts from leaves of Duranta repens on the growth and activities of the following types of Bacteria:- Staphylococcus aureus,Streptococcus pyogens ,Escherichia coli,Klebsilla pneumonia, in addition to the yeast Candida albicans and the fungi Aspergullis niger ,Aspergulls flavus.The result showed that gram Positive Bacteria is more sensitive to the extracts than gram negative bacteria with Minimum inhibitory concentration (MIC) value (50,25,50,100)% and Minimum Bactericidal Concentration (MBC) value (100,50,200,100)% for all types Bacteria respectively . The most active extract against A.niger ,A,flavus was cold and hot aqueous extract from the leaves with d

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 01 2013
Journal Name
Baghdad Science Journal
Synthesis and Theoretical Study of 4-(2-methyl-4-oxoquinazoline-3(4H)-yl) Benzoic acid with Some Transition Metal Ions
...Show More Authors

New complexes of the type [ML2(H2O)2] ,[FeL2(H2O)Cl] and [VOL2] were M=Co(II),Ni(II) and Cu(II) ,L=4-(2-methyl-4-oxoquinazoline-3(4H)-yl) benzoic acid were synthesized and characterized by element analysis, magnetic susceptibility ,molar conductance ,FT-IR and UV-visible. The studies indicate that the L acts as doubly monodentate bridge for metal ions and form mononuclear complexes. The complexes are found to be octahedral except V(IV) complex is square pyrimde shape . The structural geometries of compounds were also suggested in gas phase by theoretical treatments, using Hyper chem-6 program for the molecular mechanics and semi-empirical calculations, addition heat of formation(?Hf ?) and binding energy (?Eb)for the free ligan

... Show More
View Publication Preview PDF
Crossref