Preferred Language
Articles
/
AxcIfY4BVTCNdQwCLUvg
Neurosurgery theater-based learning: Etiquette and preparation tips for medical students
...Show More Authors

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Feb 07 2022
Journal Name
Cogent Engineering
A partial image encryption scheme based on DWT and texture segmentation
...Show More Authors

View Publication
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Mon May 01 2023
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Comparison hybrid techniques-based mixed transform using compression and quality metrics
...Show More Authors

Image quality plays a vital role in improving and assessing image compression performance. Image compression represents big image data to a new image with a smaller size suitable for storage and transmission. This paper aims to evaluate the implementation of the hybrid techniques-based tensor product mixed transform. Compression and quality metrics such as compression-ratio (CR), rate-distortion (RD), peak signal-to-noise ratio (PSNR), and Structural Content (SC) are utilized for evaluating the hybrid techniques. Then, a comparison between techniques is achieved according to these metrics to estimate the best technique. The main contribution is to improve the hybrid techniques. The proposed hybrid techniques are consisting of discrete wavel

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Enhancement of lsb audio steganography based on carrier and message characteristics
...Show More Authors

Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods

... Show More
Publication Date
Tue Feb 01 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Finger Vein Recognition Based on PCA and Fusion Convolutional Neural Network
...Show More Authors

Finger vein recognition and user identification is a relatively recent biometric recognition technology with a broad variety of applications, and biometric authentication is extensively employed in the information age. As one of the most essential authentication technologies available today, finger vein recognition captures our attention owing to its high level of security, dependability, and track record of performance. Embedded convolutional neural networks are based on the early or intermediate fusing of input. In early fusion, pictures are categorized according to their location in the input space. In this study, we employ a highly optimized network and late fusion rather than early fusion to create a Fusion convolutional neural network

... Show More
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat May 01 2021
Journal Name
Chemical Engineering Research And Design
Ternary glycerol-based deep eutectic solvents: Physicochemical properties and enzymatic activity
...Show More Authors

The present study investigates deep eutectic solvents (DESs) as potential media for enzymatic hydrolysis. A series of ternary ammonium and phosphonium-based DESs were prepared at different molar ratios by mixing with aqueous glycerol (85%). The physicochemical properties including surface tension, conductivity, density, and viscosity were measured at a temperature range of 298.15 K – 363.15 K. The eutectic points were highly influenced by the variation of temperature. The eutectic point of the choline chloride: glycerol: water (ratio of 1: 2.55: 2.28) and methyltriphenylphosphonium bromide:glycerol:water (ratio of 1: 4.25: 3.75) is 213.4 K and 255.8 K, respectively. The stability of the lipase enzyme isolated from porcine pancreas (PPL) a

... Show More
View Publication
Crossref (20)
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Image encryption algorithm based on the density and 6D logistic map
...Show More Authors

One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera

... Show More
View Publication
Scopus (22)
Crossref (10)
Scopus Crossref
Publication Date
Thu Jun 25 2020
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Synthesis, Characterization and Antibacterial Activity Evaluation of New Indole-Based Derivatives
...Show More Authors

A new series of N-acyl hydrazones (4a-g) derived from indole-3-propionic acid (IPA) were synthesized. These N-acyl hydrazones were prepared by the reaction of 3-(1H-indol-3-yl) propane hydrazide and aldehyde in the existence of glacial acetic acid as a catalyst. 1HNMR and FT-IR analyses were used to identify the synthesized compounds and they were in vitro evaluated as antibacterial agents against six different types of microorganisms by using well diffusion method. All the tested N-acyl hydrazones (4a-g) displayed moderate activity against the Gram-negative E.coli, comparable to that of Amoxicillin. Some of the tested N-acyl hydrazones also exhibited intermediate activity ag

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (3)
Scopus Crossref
Publication Date
Fri Feb 10 2023
Journal Name
Dentistry Journal
The Role of Social Media in Communication and Learning at the Time of COVID-19 Lockdown—An Online Survey
...Show More Authors

This study aimed to assess orthodontic postgraduate students’ use of social media during the COVID-19 lockdown. Ninety-four postgraduate students (67 master’s students and 27 doctoral students) were enrolled in the study and asked to fill in an online questionnaire by answering questions regarding their use of social media during the COVID-19 lockdown. The frequency distributions and percentages were calculated using SPSS software. The results showed that 99% of the students used social media. The most frequently used type of social media was Facebook, 94%, followed by YouTube, 78%, and Instagram, 65%, while Twitter and Linkedin were used less, and no one used Blogger. About 63% of the students used elements of social media to l

... Show More
View Publication
Scopus (12)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Wed Oct 21 2015
Journal Name
Integrated Journal Of Engineering Research And Technology
A HYBRID CUCKOO SEARCH AND BACK-PROPAGATION ALGORITHMS WITH DYNAMIC LEARNING RATE TO SPEED UP THE CONVERGENCE (SUBPL) ALGORITHM
...Show More Authors

BP algorithm is the most widely used supervised training algorithms for multi-layered feedforward neural net works. However, BP takes long time to converge and quite sensitive to the initial weights of a network. In this paper, a modified cuckoo search algorithm is used to get the optimal set of initial weights that will be used by BP algorithm. And changing the value of BP learning rate to improve the error convergence. The performance of the proposed hybrid algorithm is compared with the stan dard BP using simple data sets. The simulation result show that the proposed algorithm has improved the BP training in terms of quick convergence of the solution depending on the slope of the error graph.