Preferred Language
Articles
/
iBZQJIwBVTCNdQwCHPhL
A Partial Face Encryption in Real World Experiences Based on Features Extraction from Edge Detection
...Show More Authors

User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract features vectors from user faces. Moreover, the relevance of the suggested generating key is led to a crucial role in security improvement by producing them as difficult to intruders. According to PSNR values, the recommended encryption algorithms provided an adequate outcome in the encryption, they had a lower encrypting duration and a larger encrypting impact.

Scopus Crossref
View Publication
Publication Date
Tue Sep 29 2020
Journal Name
Iraqi Journal Of Science
Extraction and Purification of Lipases Enzyme from Germinating Seeds of Four Crops
...Show More Authors

Lipase enzyme has attracted a lot of attention in recent years because of its diverse biotechnological applications. The present study was conducted to screen germinated seeds of four crops, namely sunflower (Helianthus annuus), flaxor linseed (Linum usitatissimum ), peanut (Arachis hypogaea  ) and castor bean (Ricinus communis), for the activity of their lipases. to the study also included the extraction and purification of lipase from the seeds of  the most promising crop using different solvents. The results indicated that the maximum enzymatic activity (0.669 U/ml) was  obtained when 0.1 M Tris-HCl buffer extract was used after 3 days of seed germination of all the tested species, as compared to the other test solvents

... Show More
View Publication
Scopus (10)
Crossref (4)
Scopus Crossref
Publication Date
Fri Mar 30 2012
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Extraction of Pelletierine from Punica granatum L.by Liquid Membrane Technique and Modelling
...Show More Authors

This work was conducted to study the extraction of pelletierine sulphate from Punica granatum L. roots by liquid membrane techniques. Pelletierine sulphate is used widely in medicine. The general behavior of extraction process indicates that pelletierine conversion increased with increasing the number of stages and the discs rotation speed but high rotation speed was not favored because of the increased risk of droplet formation during the operation. The pH of feed and acceptor solution was also important. The results exhibit that the highest pelletierine conversion was obtained when using two stages,(10 rpm) discs speed of stainless steel discs,(pH= 9.5) of feed solution and (pH= 2) of acceptor solution in n-decane. Assuming the existence

... Show More
Publication Date
Fri Mar 30 2012
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Extraction of Pelletierine from Punica granatum L.by Liquid Membrane Technique and Modelling
...Show More Authors

This work was conducted to study the extraction of pelletierine sulphate from Punica granatum L. roots by liquid membrane techniques. Pelletierine sulphate is used widely in medicine. The general behavior of extraction process indicates that pelletierine conversion increased with increasing the number of stages and the discs rotation speed but high rotation speed was not favored because of the increased risk of droplet formation during the operation. The pH of feed and acceptor solution was also important. The results exhibit that the highest pelletierine conversion was obtained when using two stages, (10 rpm) discs speed of stainless steel discs, (pH=9.5) of feed solution and (pH=2) of acceptor solution in n-decane. Assuming the existen

... Show More
View Publication Preview PDF
Publication Date
Fri Oct 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
The economic importance of diversifying income sources in Iraq, experiences of selected countries (Norway and Chile).
...Show More Authors

The research dealt with a study of economic diversification indicators in Iraq and an indication of the extent to which economic diversification events are desirable in its sectors because desirable diversification events are truly the best means of targeting a fair distribution of income. The research included studying the experiences of selected countries for Norway and Chile, and studying economic indicators and policies for each of them in order to benefit From these two experiences, the research has concluded that the Iraqi economy suffers from a large concentration of the oil sector, which made the Iraqi economy unilateral in which oil represents 90% according to the Herfindel-Hirschman Index, either for Norway and Chile, i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jul 01 2014
Journal Name
Computer Engineering And Intelligent Systems
Static Analysis Based Behavioral API for Malware Detection using Markov Chain
...Show More Authors

Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l

... Show More
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Aug 02 2022
Journal Name
Dirasat: Human And Social Sciences
Denotation of Narrative Features in Television Advertising (A Semiotic Approach to Mr. President's Declaration)
...Show More Authors

The research summarizes the knowledge of the dimensions and denotations of T.V advertisement; and its constituents for building it through the semiotic approach of an ad sample represented by the announcement of Zain Kuwait Telecom Company which carries the title "Mr. President" using Roland Barth's approach, starting with the designation, implicit, and linguistic reading to reach the narrative features and their denotations. That makes television advertising as a semiotic and pragmatic discourse in view of the still and motion picture with its efficiency and strength to inform and communicate. And what lies in it of aesthetic, artistic elements; informational and effective power in influencing the recipients by focusing on narratives and a

... Show More
View Publication
Crossref
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Applied Engineering Research
A Proposed Method for Generating a Private Key Using Digital Color Image Features
...Show More Authors

In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c

... Show More
Publication Date
Wed Jun 15 2022
Journal Name
Al-adab Journal
Linguistic features of the semantic translation of the Holy Quran from Arabic into Russian
...Show More Authors

This article discusses some linguistic problems that arise when translating the Holy Quran from Arabic to Russian. We analyze lexical, syntactic and semantic problems and support them with Examples of verses from the Qur'an, since the Qur'an is the word of Allah. It contains prayers and instructions full of both literal representations and figurative comparisons. The identification of linguistic and rhetorical features challenges translators of the Holy Qur'an, especially when translating such literary devices as metaphor, assonance, epithet, irony, repetition, polysemy, metonymy, comparisons, synonymy and homonymy. The article analyzes: metaphor, metonymy, ellipsis, polysemy.

View Publication
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Machine Learning And Data Mining In Pattern Recognition
A New Strategy for Case-Based Reasoning Retrieval Using Classification Based on Association
...Show More Authors

View Publication Preview PDF
Scopus (7)
Crossref (5)
Scopus Clarivate Crossref