Preferred Language
Articles
/
4xa3iIkBVTCNdQwCNorX
Investigating the capability of MCM-41 nanoparticle for COD removal from Iraqi petroleum refinery wastewater
...Show More Authors

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 01 2020
Journal Name
Baghdad Science Journal
Mobile-based Telemedicine Application using SVD and F-XoR Watermarking for Medical Images
...Show More Authors

A medical- service platform is a mobile application through which patients are provided with doctor’s diagnoses based on information gleaned from medical images. The content of these diagnostic results must not be illegitimately altered during transmission and must be returned to the correct patient. In this paper, we present a solution to these problems using blind, reversible, and fragile watermarking based on authentication of the host image. In our proposed algorithm, the binary version of the Bose_Chaudhuri_Hocquengham (BCH) code for patient medical report (PMR) and binary patient medical image (PMI) after fuzzy exclusive or (F-XoR) are used to produce the patient's unique mark using secret sharing schema (SSS). The patient’s un

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sun Mar 07 2010
Journal Name
Baghdad Science Journal
Synthesis, Characterization and Antimicrobial activity Study Via some new Schiff bases for Trimethoprim
...Show More Authors

This search reports the synthesis of some new series of Schiff base compounds for trimetheprim derivatives which known high been known as a medicinal effectiveness. Trimetheprim was condensed with several substituted aldehydes compounds.(4-dimethyl amine benzaldehyde , propanal , salicaldehyde, 2.4 dimethoxy benzaldehyde and 4- methyl benzaldehyde) to obtain Schiff base products(1a-5a) and several substituted ketones compound (4-aminoacetophenone,4-chloroacetophenone, isobutyleketone, acetylacetone and acetophenone) to obtain Schiff base products(6b-10b) in ethanol in the presence of concentrated sulphuric acid as a catalyst to yield the Schiff base. The structure of synthesized compounds has been established on the basis of their Chemical

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Nov 01 2019
Journal Name
2019 1st International Informatics And Software Engineering Conference (ubmyk)
Radial Basis Function (RBF) Based on Multistage Autoencoders for Intrusion Detection system (IDS)
...Show More Authors

In this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to dete

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Thu Feb 07 2019
Journal Name
Journal Of The College Of Education For Women
Build and Implemented Learning Package for Prolog Programming Language Using Visual Basic.Net 2010
...Show More Authors

E-Learning packages are content and instructional methods delivered on a computer
(whether on the Internet, or an intranet), and designed to build knowledge and skills related to
individual or organizational goals. This definition addresses: The what: Training delivered
in digital form. The how: By content and instructional methods, to help learn the content.
The why: Improve organizational performance by building job-relevant knowledge and
skills in workers.
This paper has been designed and implemented a learning package for Prolog Programming
Language. This is done by using Visual Basic.Net programming language 2010 in
conjunction with the Microsoft Office Access 2007. Also this package introduces several
fac

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
New Common Fixed Points for Total Asymptotically Nonexpansive Mapping in CAT(0) Space
...Show More Authors

      Strong and ∆-convergence for a two-step iteration process utilizing asymptotically nonexpansive and total asymptotically nonexpansive noneslf mappings in the CAT(0) spaces have been studied. As well, several strong convergence theorems under semi-compact and condition (M) have been proved. Our results improve and extend numerous familiar results from the existing literature.

View Publication Preview PDF
Scopus (8)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Aug 01 2008
Journal Name
2008 International Symposium On Information Technology
Algebraic strategy to generate pairwise test set for prime number parameters and variables
...Show More Authors

View Publication
Scopus (21)
Crossref (17)
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Cosmetics, Dermatological Sciences And Applications
Tuberculin as Intralesional Therapy for Viral Warts—Single-Blind, Split, Placebo, Controlled Study
...Show More Authors

View Publication
Crossref (3)
Crossref
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Applied Engineering Research
A Proposed Method for Generating a Private Key Using Digital Color Image Features
...Show More Authors

In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c

... Show More
Publication Date
Mon Jan 28 2013
Journal Name
Spie Proceedings
BER performance enhancement for secure wireless communication systems based on chaotic-MIMO techniques
...Show More Authors

The growing interest in the use of chaotic techniques for enabling secure communication in recent years has been motivated by the emergence of a number of wireless services which require the service provider to provide low bit error rates (BER) along with information security. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. While the use of Chaotic maps can enhance security, it is seen that the overall BER performance gets degraded when compared to conventional communication schemes. In order to overcome this limitation, we have proposed the use of a combination of Chaotic modulation and Alamouti Space Time Block Code. The performance of Chaos Shift Keying (CSK) wi

... Show More
View Publication
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Mar 31 2024
Journal Name
Association Of Arab Universities Journal Of Engineering Sciences
Using Solid Waste as A Substitute for Raw Materials in Construction: A Review.
...Show More Authors

The main challenge is to protect the environment from future deterioration due to pollution and the lack of natural resources. Therefore, one of the most important things to pay attention to and get rid of its negative impact is solid waste. Solid waste is a double-edged sword according to the way it is dealt with, as neglecting it causes a serious environmental risk from water, air and soil pollution, while dealing with it in the right way makes it an important resource in preserving the environment. Accordingly, the proper management of solid waste and its reuse or recycling is the most important factor. Therefore, attention has been drawn to the use of solid waste in different ways, and the most common way is to use it as an alternative

... Show More
View Publication