Preferred Language
Articles
/
0xZUpYsBVTCNdQwCbtUW
Cryptography Using Artificial Neural Network
...Show More Authors

Neural cryptography deals with the problem of “key exchange” between two neural networks by using the mutual learning concept. The two networks exchange their outputs (in bits) and the key between two communicating parties ar eventually represented in the final learned weights, when the two networks are said to be synchronized. Security of neural synchronization is put at risk if an attacker is capable of synchronizing with any of the two parties during the training process.

Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Merge Operation Effect On Image Compression Using Fractal Technique
...Show More Authors

Fractal image compression gives some desirable properties like fast decoding image, and very good rate-distortion curves, but suffers from a high encoding time. In fractal image compression a partitioning of the image into ranges is required. In this work, we introduced good partitioning process by means of merge approach, since some ranges are connected to the others. This paper presents a method to reduce the encoding time of this technique by reducing the number of range blocks based on the computing the statistical measures between them . Experimental results on standard images show that the proposed method yields minimize (decrease) the encoding time and remain the quality results passable visually.

View Publication Preview PDF
Publication Date
Mon Jan 02 2017
Journal Name
European Journal Of Scientific Research
Fast approach for arabic text encryption using genetic algorithm
...Show More Authors

As s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res

... Show More
Publication Date
Wed Jul 01 2015
Journal Name
Journal Of Engineering
Desulfurization of AL-Ahdab Crude Oil using Oxidative Processes
...Show More Authors

Two different oxidative desulfurization strategies based on oxidation/adsorption or oxidation/extraction were evaluated for the desulfurization of AL-Ahdab (AHD) sour crude oil (3.9wt% sulfur content). In the oxidation process, a homogenous oxidizing agent comprising of hydrogen peroxide and formic acid was used. Activated carbons were used as sorbent/catalyst in the oxidation/adsorption process while acetonitrile was used as an extraction solvent in the oxidation/extraction process. For the oxidation/adsorption scheme, the experimental results indicated that the oxidation desulfurization efficiency was enhanced on using activated carbon as catalyst/sorbent. The effects of the operating conditions (contact time, temperat

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
DETERMINATION SKY RADIO EMISSION BACKGROUND USING RADIO JOVE TELESCOPE
...Show More Authors

In This paper, sky radio emission background level associated with radio storm burst for the Sun and Jupiter is determined at frequency (20.1 MHz). The observation data for radio Jove telescope for the Sun and Jupiter radio storm observations data are loaded from NASA radio Jove telescope website, the data of Sunspot number are loaded from National Geophysical Data Center, (NGDC). Two radio Jove stations [(Sula, MT), (Lamy, NM)] are chose from data website for these huge observations data. For the Sun, twelve figures are used to determine the relation between radio background emission, and the daily Sunspot number. For Jupiter a twenty four figures are used to determine the relation between radio background emission and diffraction betwe

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 30 2020
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Removal of Tetracycline from Wastewater Using Circulating Fluidized Bed
...Show More Authors

   In this study, the circulating fluidized bed was used to remove the Tetracycline from wastewater utilizing a pistachio shell coated with ZnO nanoparticles. Several parameters including, Tetracycline solution flowrate, initial static bed height, Tetracycline initial concentration and airflow rate were systematically examined to show their effect on the breakthrough curve and the required time to reach the adsorption capacity and thus draw the fully saturated curve of the adsorbent. Results showed that using ZnO nanoparticles will increase the adsorbent surface area and pores and as a result the adsorption increased, also the required time for adsorbent saturation increased and thus the removal efficiency may be achieved at mi

... Show More
View Publication Preview PDF
Crossref (19)
Crossref
Publication Date
Wed Feb 14 2024
Journal Name
2nd International Conference For Engineering Sciences And Information Technology (esit 2022): Esit2022 Conference Proceedings
Manufacture of wooden furniture paint using pistachio shell waste
...Show More Authors

View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Wed Oct 25 2023
Journal Name
Plos One
Performance enhancement of high order Hahn polynomials using multithreading
...Show More Authors

Orthogonal polynomials and their moments have significant role in image processing and computer vision field. One of the polynomials is discrete Hahn polynomials (DHaPs), which are used for compression, and feature extraction. However, when the moment order becomes high, they suffer from numerical instability. This paper proposes a fast approach for computing the high orders DHaPs. This work takes advantage of the multithread for the calculation of Hahn polynomials coefficients. To take advantage of the available processing capabilities, independent calculations are divided among threads. The research provides a distribution method to achieve a more balanced processing burden among the threads. The proposed methods are tested for va

... Show More
View Publication
Scopus (7)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Jul 25 2023
Journal Name
Journal Of Optical Communications
Design mode filtering interferometer using etched double clad fiber
...Show More Authors
Abstract<p>Mode filtering technique is one of the most desired techniques in optical fiber communication systems, especially for multiple input multiple output (MIMO) coherent optical communications that have mode-dependent losses in communication channels. In this work, a special type of optical fiber sensing head was used, where it utilizes DCF13 that is made by Thorlabs and has two numerical apertures (NA’s). One is for core and 1st cladding region, while the 2nd relates the 1st cladding to the 2nd cladding. Etching process using 40 % hydro-fluoric (HF) acid was performed on the DCF13 with variable time in minutes. Investigation of the correlation between the degree of etching and the re</p> ... Show More
View Publication
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Sun Jan 01 2012
Journal Name
International Journal Of Chemical Engineering
Phosphorus Removal from Wastewater Using Oven-Dried Alum Sludge
...Show More Authors

View Publication
Scopus (31)
Crossref (28)
Scopus Crossref
Publication Date
Fri Sep 24 2021
Journal Name
Proceedings Of Sixth International Congress On Information And Communication Technology
Minimizing Costs of Transportation Problems Using the Genetic Algorithm
...Show More Authors

View Publication
Scopus (16)
Crossref (15)
Scopus Crossref