Preferred Language
Articles
/
pkIjXpoBMeyNPGM3B8Cu
DGEN: A Dynamic Generative Encryption Network for Adaptive and Secure Image Processing
...Show More Authors

Cyber-attacks keep growing. Because of that, we need stronger ways to protect pictures. This paper talks about DGEN, a Dynamic Generative Encryption Network. It mixes Generative Adversarial Networks with a key system that can change with context. The method may potentially mean it can adjust itself when new threats appear, instead of a fixed lock like AES. It tries to block brute‑force, statistical tricks, or quantum attacks. The design adds randomness, uses learning, and makes keys that depend on each image. That should give very good security, some flexibility, and keep compute cost low. Tests still ran on several public image sets. Results show DGEN beats AES, chaos tricks, and other GAN ideas. Entropy reached 7.99 bits per pixel, correlation dropped 0.002, and the avalanche effect was 95.4 percent. Encrypting a surveillance frame took 7.5 ms, while the picture quality stayed high, with PSNR 39.7 dB and SSIM 99.2. These numbers suggest the tool can still work in real time and scale up significantly. The study also looks at how DGEN could fit with quantum computers and federated learning, hinting it might be a very big step forward for safe image handling.

Crossref
View Publication
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Linguistic Fuzzy Trust Model over Oscillating Wireless Sensor Networks
...Show More Authors

Simulation  of  the  Linguistic  Fuzzy Trust  Model  (LFTM)  over  oscillating  Wireless  Sensor Networks (WSNs) where the goodness of the servers belonging to them could change along the time is presented in this paper, and the comparison between the outcomes achieved with LFTM model over oscillating WSNs with the outcomes obtained by applying the model over static WSNs where the servers maintaining always the same goodness, in terms of the selection percentage of trustworthy servers (the accuracy of the model) and the average path length are also presented here. Also in this paper the comparison between the LFTM and the Bio-inspired Trust and Reputation Model for Wireless Sensor Network

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 01 2024
Journal Name
Baghdad Science Journal
Hetero-associative Memory Based New Iraqi License Plate Recognition
...Show More Authors

نتيجة للتطورات الأخيرة في أبحاث الطرق السريعة بالإضافة إلى زيادة استخدام المركبات، كان هناك اهتمام كبير بنظام النقل الذكي الأكثر حداثة وفعالية ودقة (ITS) في مجال رؤية الكمبيوتر أو معالجة الصور الرقمية، يلعب تحديد كائنات معينة في صورة دورًا مهمًا في إنشاء صورة شاملة. هناك تحدٍ مرتبط بالتعرف على لوحة ترخيص السيارة (VLPR) بسبب الاختلاف في وجهة النظر، والتنسيقات المتعددة، وظروف الإضاءة غير الموحدة في وقت الحصول

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Journal Of Engineering Science And Technology (jestec)
Predicting Municipal Sewage Effluent Quality Index Using Mathematical Models In The Al-Rustamiya Sewage Treatment Plant
...Show More Authors

Efficient management of treated sewage effluents protects the environment and reuse of municipal, industrial, agricultural and recreational as compensation for water shortages as a second source of water. This study was conducted to investigate the overall performance and evaluate the effluent quality from Al- Rustamiya sewage treatment plant (STP), Baghdad, Iraq by determining the effluent quality index (EQI). This assessment included daily records of major influent and effluent sewage parameters that were obtained from the municipal sewage plant laboratory recorded from January 2011 to December 2018. The result showed that the treated sewage effluent quality from STP was within the Iraqi quality standards (IQS) for disposal and t

... Show More
Publication Date
Wed Jul 01 2020
Journal Name
Journal Of Engineering
Permeability Determination of Tertiary Reservoir/Ajeel Oil Field
...Show More Authors

This paper discusses the method for determining the permeability values of Tertiary Reservoir in Ajeel field (Jeribe, dhiban, Euphrates) units and this study is very important to determine the permeability values that it is needed to detect the economic value of oil in Tertiary Formation. This study based on core data from nine wells and log data from twelve wells. The wells are AJ-1, AJ-4, AJ-6, AJ-7, AJ-10, AJ-12, AJ-13, AJ-14, AJ-15, AJ-22, AJ-25, and AJ-54, but we have chosen three wells (AJ4, AJ6, and AJ10) to study in this paper. Three methods are used for this work and this study indicates that one of the best way of obtaining permeability is the Neural network method because the values of permeability obtained be

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
Mathematical Modelling of Gene Regulatory Networks
...Show More Authors

    This research includes the use of an artificial intelligence algorithm, which is one of the algorithms of biological systems which is the algorithm of genetic regulatory networks (GRNs), which is a dynamic system for a group of variables representing space within time. To construct this biological system, we use (ODEs) and to analyze the stationarity of the model we use Euler's method. And through the factors that affect the process of gene expression in terms of inhibition and activation of the transcription process on DNA, we will use TF transcription factors. The current research aims to use the latest methods of the artificial intelligence algorithm. To apply Gene Regulation Networks (GRNs), we used a progr

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Baghdad Science Journal
Topological Indices Polynomials of Domination David Derived Networks
...Show More Authors

The chemical properties of chemical compounds and their molecular structures are intimately connected. Topological indices are numerical values associated with chemical molecular graphs that help in understanding the physicochemical properties, chemical reactivity and biological activity of a chemical compound. This study obtains some topological properties of second and third dominating David derived (DDD) networks and computes several K Banhatti polynomial of second and third type of DDD.

View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Some K-Banhatti Polynomials of First Dominating David Derived Networks
...Show More Authors

Chemical compounds, characteristics, and molecular structures are inevitably connected. Topological indices are numerical values connected with chemical molecular graphs that contribute to understanding a chemical compounds physical qualities, chemical reactivity, and biological activity. In this study, we have obtained some topological properties of the first dominating David derived (DDD) networks and computed several K-Banhatti polynomials of the first type of DDD.

View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Sun Jan 10 2016
Journal Name
British Journal Of Applied Science & Technology
The Effect of Classification Methods on Facial Emotion Recognition ‎Accuracy
...Show More Authors

The interests toward developing accurate automatic face emotion recognition methodologies are growing vastly, and it is still one of an ever growing research field in the region of computer vision, artificial intelligent and automation. However, there is a challenge to build an automated system which equals human ability to recognize facial emotion because of the lack of an effective facial feature descriptor and the difficulty of choosing proper classification method. In this paper, a geometric based feature vector has been proposed. For the classification purpose, three different types of classification methods are tested: statistical, artificial neural network (NN) and Support Vector Machine (SVM). A modified K-Means clustering algorithm

... Show More
View Publication Preview PDF
Crossref (2)
Crossref