Preferred Language
Articles
/
oBb-e4kBVTCNdQwCDIqA
Arabic and English Texts Encryption Using Proposed Method Based on Coordinates System
...Show More Authors

Preview PDF
Quick Preview PDF
Publication Date
Fri Aug 23 2024
Journal Name
Aro-the Scientific Journal Of Koya University
Graphical User Authentication Algorithms Based on Recognition
...Show More Authors

In cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Fri Nov 11 2022
Journal Name
Al-mansour Journal
Text Cryptography Based on Three Different Keys
...Show More Authors

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre

... Show More
Publication Date
Mon Oct 02 2023
Journal Name
Journal Of Engineering
Skull Stripping Based on the Segmentation Models
...Show More Authors

Skull image separation is one of the initial procedures used to detect brain abnormalities. In an MRI image of the brain, this process involves distinguishing the tissue that makes up the brain from the tissue that does not make up the brain. Even for experienced radiologists, separating the brain from the skull is a difficult task, and the accuracy of the results can vary quite a little from one individual to the next. Therefore, skull stripping in brain magnetic resonance volume has become increasingly popular due to the requirement for a dependable, accurate, and thorough method for processing brain datasets. Furthermore, skull stripping must be performed accurately for neuroimaging diagnostic systems since neither no

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Aug 03 2024
Journal Name
Proceedings Of Ninth International Congress On Information And Communication Technology
Offline Signature Verification Based on Neural Network
...Show More Authors

The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o

... Show More
Publication Date
Tue Jan 20 2026
Journal Name
Iraqi Journal Of Science
Intrusion Detection Approach Based on DNA Signature
...Show More Authors

View Publication
Publication Date
Wed Aug 27 2025
Journal Name
Baghdad Science Journal
A Clustering Technique Based on the Hard K-Means (H.KM.) Method to Determine the Governorate That Have More Influence for Spreading COVID-19 in the Kingdom of Saudi Arabia
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Sun Jun 03 2012
Journal Name
Baghdad Science Journal
On The Queuing System M/Er/1/N
...Show More Authors

In this paper the queuing system (M/Er/1/N) has been considered in equilibrium. The method of stages introduced by Erlang has been used. The system of equations which governs the equilibrium probabilities of various stages has been given. For general N the probability of j stages of service are left in the system, has been introduced. And the probability for the empty system has been calculated in the explicit form.

View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Res Militaris
Building the proposed Fama and French Six-Factor Model FF6M-DLE by adding the indebtedness factor and its reflection on the fair value of common stock
...Show More Authors

The research aims to determine the required rate of return according to the Fama and French five-factor model, after strengthening it by adding the indebtedness factor to build the Fama and French six-factor model FF6M-DLE. The effect of the indebtedness factor on the company's profitability and the real value of the ordinary shares calculated according to the (equivalent ascertainment) model and its suitability with the company's situation, and an analysis of the fluctuation between the market value and the real value of the ordinary stocks.

Scopus
Publication Date
Tue Oct 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Effect of irrigation type and method on the cost of producing dunum of wheat crop
...Show More Authors

 

Abstract :  This research is concerned with studying the best type and method of  irrigation as well as the best cultivated area to reduce the cost of producing  dunums of wheat crop in Iraq , and was based on data taken from the Ministry of Planning / Central Statistical Organization About cost of wheat crop production for (12) Iraqi governorates except Kurdistan, Nineveh, Salah al-Din, Anbar) and the sample size (554) according to the cost survey carried out by the Ministry of Planning / Central Statistical Organization for 2017, The results of the research showed that there are significant statistical differences between production costs when using t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jul 30 2024
Journal Name
Iraqi Journal Of Science
Frame-Based Change Detection Using Histogram and Threshold to Separate Moving Objects from Dynamic Background
...Show More Authors

      Detecting and subtracting the Motion objects from backgrounds is one of the most important areas. The development of cameras and their widespread use in most areas of security, surveillance, and others made face this problem. The difficulty of this area is unstable in the classification of the pixels (foreground or background). This paper proposed a suggested background subtraction algorithm based on the histogram. The classification threshold is adaptively calculated according to many tests. The performance of the proposed algorithms was compared with state-of-the-art methods in complex dynamic scenes.

View Publication Preview PDF
Scopus Crossref