Preferred Language
Articles
/
phb9BIcBVTCNdQwCyi2T
Content Based Image Retrieval Based on Feature Fusion and Support Vector Machine
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Robust Color Image Encryption Scheme Based on RSA via DCT by Using an Advanced Logic Design Approach
...Show More Authors

Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Fri Feb 17 2023
Journal Name
Sustainability
Sustainable Utilization of Machine-Vision-Technique-Based Algorithm in Objective Evaluation of Confocal Microscope Images
...Show More Authors

Confocal microscope imaging has become popular in biotechnology labs. Confocal imaging technology utilizes fluorescence optics, where laser light is focused onto a specific spot at a defined depth in the sample. A considerable number of images are produced regularly during the process of research. These images require methods of unbiased quantification to have meaningful analyses. Increasing efforts to tie reimbursement to outcomes will likely increase the need for objective data in analyzing confocal microscope images in the coming years. Utilizing visual quantification methods to quantify confocal images with naked human eyes is an essential but often underreported outcome measure due to the time required for manual counting and e

... Show More
View Publication
Scopus (7)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Jun 01 2015
Journal Name
. International Journal Of Computer Science And Mobile Computing
A Hybrid Lossy Image Compression based on Wavelet Transform, Polynomial Approximation Model, Bit Plane Slicing and Absolute Moment Block Truncation
...Show More Authors

Publication Date
Sat Apr 30 2022
Journal Name
Revue D'intelligence Artificielle
Performance Evaluation of SDN DDoS Attack Detection and Mitigation Based Random Forest and K-Nearest Neighbors Machine Learning Algorithms
...Show More Authors

Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne

... Show More
View Publication
Scopus (23)
Crossref (12)
Scopus Crossref
Publication Date
Tue Aug 19 2025
Journal Name
Scientific Reports
Predictive modeling of asthma drug properties using machine learning and topological indices in a MATLAB based QSPR study
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Mon Apr 13 2026
Journal Name
Innovative Infrastructure Solutions
Beyond empiricism: a unified physics-based framework for resonance avoidance and carbon-efficient mass optimization of machine foundations
...Show More Authors

Dynamic machine foundations can be considered as a necessary component of the industrial infrastructure. Design of the dynamic equipment foundations has, however, traditionally been grounded on a rule of thumb that is inaccurate and rigid to use at the discretion of the engineers. The conventional rule of thumb, which includes minimum weight ratios and resonance avoidance criteria, has been used singularly with two poles, which can be either conservatively designed systems that are too heavy, or systems that are going to experience too much vibration and fatigue. This paper presents a novel, analytical framework for the reinterpretation of traditional design practices, using a physics-based approach, and results in a single, unified overall

... Show More
View Publication
Scopus Crossref
Publication Date
Wed May 10 2017
Journal Name
Australian Journal Of Basic And Applied Sciences
Block-based Image Steganography for Text Hiding Using YUV Color Model and Secret Key Cryptography Methods
...Show More Authors

Preview PDF
Publication Date
Fri May 01 2020
Journal Name
Journal Of Physics: Conference Series
Pilgrims tracking and monitoring based on IoT
...Show More Authors
Abstract<p>The pilgrimage takes place in several countries around the world. The pilgrimage includes the simultaneous movement of a huge crowd of pilgrims which leads to many challenges for the pilgrimage authorities to track, monitor, and manage the crowd to minimize the chance of overcrowding’s accidents. Therefore, there is a need for an efficient monitoring and tracking system for pilgrims. This paper proposes powerful pilgrims tracking and monitoring system based on three Internet of Things (IoT) technologies; namely: Radio Frequency Identification (RFID), ZigBee, and Internet Protocol version 6 (IPv6). In addition, it requires low-cost, low-power-consumption implementation. The proposed </p> ... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Thu Aug 31 2023
Journal Name
Journal Européen Des Systèmes Automatisés​
Deep Learning Approach for Oil Pipeline Leakage Detection Using Image-Based Edge Detection Techniques
...Show More Authors

Natural gas and oil are one of the mainstays of the global economy. However, many issues surround the pipelines that transport these resources, including aging infrastructure, environmental impacts, and vulnerability to sabotage operations. Such issues can result in leakages in these pipelines, requiring significant effort to detect and pinpoint their locations. The objective of this project is to develop and implement a method for detecting oil spills caused by leaking oil pipelines using aerial images captured by a drone equipped with a Raspberry Pi 4. Using the message queuing telemetry transport Internet of Things (MQTT IoT) protocol, the acquired images and the global positioning system (GPS) coordinates of the images' acquisition are

... Show More
View Publication
Scopus (14)
Crossref (7)
Scopus Crossref
Publication Date
Fri Nov 01 2024
Journal Name
Process Safety And Environmental Protection
Optimized ensemble deep random vector functional link with nature inspired algorithm and boruta feature selection: Multi-site intelligent model for air quality index forecasting
...Show More Authors

View Publication
Scopus (10)
Crossref (11)
Scopus Clarivate Crossref