Peer-Reviewed Journal
This paper presents a proposed method for (CBIR) from using Discrete Cosine Transform with Kekre Wavelet Transform (DCT/KWT), and Daubechies Wavelet Transform with Kekre Wavelet Transform (D4/KWT) to extract features for Distributed Database system where clients/server as a Star topology, client send the query image and server (which has the database) make all the work and then send the retrieval images to the client. A comparison between these two approaches: first DCT compare with DCT/KWT and second D4 compare with D4/KWT are made. The work experimented over the image database of 200 images of 4 categories and the performance of image retrieval with respect to two similarity measures namely Euclidian distance (ED) and sum of absolute diff
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreIn the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco
... Show MorePulsatile drug delivery systems are time-controlled dosage forms which are designed to release the active pharmaceutical ingredient after a predetermined lag time to synchronize the disease circadian rhythm. A migraine shows circadian rhythm with a marked increase in attacks between 6 a.m. and 8 a.m.
Sumatriptan is a selective agonist at serotonin (5-Hydroxy tryptamine1 (5-HT1))receptors, is an effective treatment for acute migraine attacks.
The aim of this work is to prepare time-controlled press-coated tablet with a lag time of 5.45 hrs.
Six formulas of fast dissolving core tablets and three formulas of press-coated tablets were prepared by using direct compression method using different variables to prepa
... Show MoreIn a hybrid cooling solar thermal systems , a solar collector is used to convert solar energy into heat energy in order to super heat the refrigerant leaving the compressor, and this process helps in the transformation of refrigerant state from gaseous state to the liquid state in upper two-thirds of the condenser instead of the lower two-thirds such as in the traditional air-conditioning systems and this will reduce the energy needed to run the process of cooling .In this research two systems with a capacity of 2 tons each were used, a hybrid air-conditioning system with an evacuated tubes solar collector and a traditional air-conditioning system . The refrigerant of each type was R22.The comparison was in the amou
... Show MoreWe prepared polythiophene (PTH) with single wall carbon nanotube (SWCNT) nanocomposite thin films for Nitrogen dioxide (NO2) gas sensing applications. Thin films were synthesized via electrochemical polymerization method onto (Indium tin oxide) ITO coated glass substrate of thiophene monomer with magnesium perchlorate and different concentration from SWCNT (0.012 and 0.016) % in the presence130mL of Acetonitrile used. X-ray diffraction (XRD), Field Emission Scanning Electron microscopy (FE-SEM), Atomic Force Microscope (AFM) and Fourier Transform Infrared Spectroscopy (FT-IR) were used to characterized these nanocomposite thin films. The response of these nanocomposite for NO2 gas was evaluated via monitoring the change
... Show MoreHepatitis, an inflammation of the liver, has a number of infectious and non-infectious causes. Two of the viruses that cause hepatitis (hepatitis A and E) can be transmitted through water and food; hygiene is therefore important in their control. First, to assess the importance of HAV and HEV as a possible diagnosis for clinically diagnosed patients with acute viral hepatitis. Second, to assess the prevalence of hepatitis A and E in all provinces of Iraq and study its association with age, gender. This study consisted of two groups: The first group consisted of 2975 patients with a clinical diagnosis of acute viral hepatitis. The second group consisted of a total of 9610 persons, which were recruited by surveying a nationally representative
... Show More