Preferred Language
Articles
/
1BcH940BVTCNdQwCyioK
BER performance enhancement for secure wireless optical communication systems based on chaotic MIMO techniques
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Fri May 17 2019
Journal Name
Lecture Notes In Networks And Systems
Features Selection for Intrusion Detection System Based on DNA Encoding
...Show More Authors

Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system

... Show More
Scopus (5)
Scopus
Publication Date
Mon Oct 16 2023
Journal Name
Nano And Medical Materials
Preparation and analysis of silver Nanoparticles (Ag Nps) by plant extract techniques of green tea and study optical and structural properties
...Show More Authors

Aqueous root extract has been used to examine the green production of silver nanoparticles (AgNPs) by reducing the Ag+ ions in a silver nitrate solution. UV-Vis spectroscopy, X-ray diffraction, field emission scanning electron microscopy, and Fourier transform infrared spectroscopy (FTIR) were used to analyze the produced AgNPs. The AgNPs that were created had a maximum absorbance at 416 nm, were spherical in form, polydispersed in nature, and were 685 nm in size.The AgNPs demonstrated antibacterial efficacy against Escherichia coli and Staphylococcus. The dengue vector Aedes aegypti's second instar larvae were very susceptible to the AgNPs' powerful larvicidal action.

View Publication
Crossref (5)
Crossref
Publication Date
Mon Jan 28 2019
Journal Name
Soft Computing
Bio-inspired multi-objective algorithms for connected set K-covers problem in wireless sensor networks
...Show More Authors

Scopus (13)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Sun Aug 24 2014
Journal Name
Wireless Personal Communications
Multi-layer Genetic Algorithm for Maximum Disjoint Reliable Set Covers Problem in Wireless Sensor Networks
...Show More Authors

View Publication
Scopus (22)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Mon Sep 30 2024
Journal Name
Journal Of The College Of Education For Women
The Effect of Visual Thinking Strategies on Iraqi EFL Students` Communication Skills
...Show More Authors

الهدف من الدراسة هو معرفة أثر استراتيجيات التفكير البصري (VTS) على تحصيل طلاب الكلية في مهارات الاتصال باللغة الإنكليزية. ولتحقيق هدف الدراسة تم استخدام التصميم البعدي التجريبي. وتمثلت العينة بـ (70) من طلاب المرحلة الثانية بقسم اللغة الإنجليزية بكلية التربية. وقد تم اختيارهم عشوائياً وتقسيمهم إلى مجموعتين: المجموعة التجريبية والضابطة (35) طالباً في كل مجموعة. ولتحقيق هدف الدراسة تم بناء اختبار تحصيلي لمهارا

... Show More
View Publication
Crossref
Publication Date
Mon Apr 01 2024
Journal Name
Wasit Journal Of Engineering Sciences
Analysis attackers’ methods with hashing secure password using CSPRNG and PBKDF2
...Show More Authors

Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha

... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of Engineering
Designing a Secure Software-Defined Radio Transceiver using the Logistic Map
...Show More Authors

The need to exchange large amounts of real-time data is constantly increasing in wireless communication. While traditional radio transceivers are not cost-effective and their components should be integrated, software-defined radio (SDR) ones have opened up a new class of wireless technologies with high security.  This study aims to design an  SDR  transceiver was built using one type of modulation, which is 16 QAM, and adding a  security subsystem using one type of chaos map, which is a  logistic map, because it is a very simple nonlinear dynamical equations that generate a random key and  EXCLUSIVE  OR with the originally transmitted data to protect data through the transmission. At th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 01 2018
Journal Name
International Journal Of Computer Science Trends And Technology
Secure Video Data Deduplication in the Cloud Storage Using Compressive Sensing
...Show More Authors

Cloud storage provides scalable and low cost resources featuring economies of scale based on cross-user architecture. As the amount of data outsourced grows explosively, data deduplication, a technique that eliminates data redundancy, becomes essential. The most important cloud service is data storage. In order to protect the privacy of data owner, data are stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for data storage. Traditional deduplication schemes cannot work on encrypted data. Existing solutions of encrypted data deduplication suffer from security weakness. This paper proposes a combined compressive sensing and video deduplication to maximize

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 31 2021
Journal Name
Research Journal Of Pharmacy And Technology
A Review on Film Forming Drug Delivery Systems
...Show More Authors

Conventional dosage forms for topical and transdermal drug delivery have several disadvantages related mainly to its poor skin permeation and patient compliance. Many approaches have been developed to improve these dosage forms. Film forming drug delivery systems represents a recent advancement in this field. It provides improved patient compliance with enhanced skin permeation of drugs. In its simplest form, these consist of a polymeric solution, usually in a supersaturated state, in a suitable solvent. A plasticizer is usually added to improve the flexibility and enhance the tensile strength to the film. It is also possible to control and sustain the drug release from the films by controlling the polymeric content, concentration o

... Show More
View Publication
Scopus (3)
Crossref (4)
Scopus Crossref
Publication Date
Mon Mar 01 2021
Journal Name
Journal Of Physics: Conference Series
A Review on Arabic Sign Language Translator Systems
...Show More Authors
Abstract<p>Deaf and dumb peoples are suffering difficulties most of the time in communicating with society. They use sign language to communicate with each other and with normal people. But Normal people find it more difficult to understand the sign language and gestures made by deaf and dumb people. Therefore, many techniques have been employed to tackle this problem by converting the sign language to a text or a voice and vice versa. In recent years, research has progressed steadily in regard to the use of computers to recognize and translate the sign language. This paper reviews significant projects in the field beginning with important steps of sign language translation. These projects can b</p> ... Show More
View Publication
Scopus (9)
Crossref (6)
Scopus Crossref