Preferred Language
Articles
/
BhevNY8BVTCNdQwCXmL3
A new modified differential evolution algorithm scheme-based linear frequency modulation radar signal de-noising
...Show More Authors

The main intention of this study was to investigate the development of a new optimization technique based on the differential evolution (DE) algorithm, for the purpose of linear frequency modulation radar signal de-noising. As the standard DE algorithm is a fixed length optimizer, it is not suitable for solving signal de-noising problems that call for variability. A modified crossover scheme called rand-length crossover was designed to fit the proposed variable-length DE, and the new DE algorithm is referred to as the random variable-length crossover differential evolution (rvlx-DE) algorithm. The measurement results demonstrate a highly efficient capability for target detection in terms of frequency response and peak forming that was isolated from noise distortion. The modified method showed significant improvements in performance over traditional de-noising techniques.

Scopus Clarivate Crossref
View Publication
Publication Date
Thu Jun 27 2019
Journal Name
Molecular Crystals And Liquid Cryst
A New Series of Triazine-core Based Mesogenic Derivatives: Synthesis, Characterization and Mesomorphic Study
...Show More Authors

The synthesis, characterization and mesomorphic properties of two new series of triazine-core based liquid crystals have been investigated. The amino triazine derivatives were characterized by elemental analysis, Fourier transforms infrared (FTIR), 1HNMR and mass spectroscopy. The liquid crystalline properties of these compounds were examined by differential scanning calorimetry (DSC) and polarizing optical microscopy (POM). DSC and POM confirmed nematic (N) and columnar mesophase textures of the materials. The formation of mesomorphic properties was found to be dependent on the number of methylene unit in alkoxy side chains.

Scopus (10)
Scopus
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
A New Fractal Printed Dipole Antenna Based on Tent Transformations for Wireless Communication Applications
...Show More Authors

In this paper, a compact multiband printed dipole antenna is presented as a candidate for use in wireless communication applications. The proposed fractal antenna design is based on the second level tent transformation. The space-filling property of this fractal geometry permits producing longer lengths in a more compact size. Theoretical performance of this antenna has been calculated using the commercially available software IE3D from Zeland Software Inc. This electromagnetic simulator is based on the method of moments (MoM). The proposed dipole antenna has been found to possess a considerable size reduction compared with the conventional printed or wire dipole antenna designed at the same design frequency and using the same substrate

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 01 2019
Journal Name
Iraqi Journal Of Information & Communications Technology
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms
...Show More Authors

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope

... Show More
View Publication Preview PDF
Crossref (22)
Crossref
Publication Date
Sat Jan 01 2005
Journal Name
Journal Of The College Of Languages (jcl)
Etude de I' espace dans un extrait de Les sequestres d' Altona de Jean
...Show More Authors

Etude de I' espace dans un extrait de Les sequestres d' Altona de Jean

View Publication Preview PDF
Publication Date
Thu Mar 05 2020
Journal Name
Irrigation And Drainage
ECONOMIC ASSESSMENT OF DUYRIDGE DAM AS A WATER‐HARVESTING SCHEME IN IRAQ
...Show More Authors
Abstract<p>Iraq, home of the Tigris and Euphrates rivers, has survived an extreme deficiency of surface water assets over the years. The gap is due to the decline of the Iraqi water share every year, as well as a high demand for water use from different sectors, particularly agriculture.</p><p>Dam development has long given significant economic benefits to Iraq in circulating low‐priced electricity and supporting low‐income farmers by supplying them with a free irrigation system (Zakaria et al, 2012). This encouraged domestic consumption and investment.</p><p>Despite the fact that numerous advantages are expected from dam construction, it should be painstakingly assessed, utilizing cost</p> ... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Journal Of The College Of Languages (jcl)
Entre l'Emile de Jean-Jacques Rousseau et Paul et Virginie de Bernardin de Saint Pierre : un refus constant de la civilisation :
...Show More Authors

A la fin du XVIIIe siècle, les penseurs français dont Rousseau et Saint-Pierre, commencent à mettre en question la civilisation européenne. Dans leurs œuvres les plus importantes, ces deux auteurs parlent de la société européenne d'une façon très banale. Ils font, par contre, une invitation à la Solitude et l'isolement dans la nature afin d'éviter la corruption de l'âme par la société mondaine. Ces écrivains-penseurs croient que la société peut gâter l'humanité de l'individu. Ils suggèrent à travers les images innocentes de leurs principaux personnages vivant dans la campagne, un monde idéal où il n'y a que pureté et chasteté.  Dans les deux œuvres que nous avons choisies (Paul et Virginie de Bernardin de

... Show More
View Publication Preview PDF
Publication Date
Sun Aug 11 2024
Journal Name
Al-salam Journal For Medical Science
A review of recent developments in pharmaceutical chemistry on biological evolution of tetrazole derivatives
...Show More Authors

This review sums up the developments in the biological activity of tetrazole active derivatives in recent days. Some of the deliberated derivatives of tetrazole are at present actively scientifically studied; some of them have biological activity that enables them to be studied further in the future as a drug for various biological activities. This review seeks to offer a comprehensive analysis of the efficacy and clinical advantage of biological activity for tetrazole derivatives.

View Publication
Crossref
Publication Date
Fri Apr 30 2010
Journal Name
Journal Of Applied Computer Science & Mathematics
Image Hiding Using Magnitude Modulation on the DCT Coefficients
...Show More Authors

In this paper, we introduce a DCT based steganographic method for gray scale images. The embedding approach is designed to reach efficient tradeoff among the three conflicting goals; maximizing the amount of hidden message, minimizing distortion between the cover image and stego-image,and maximizing the robustness of embedding. The main idea of the method is to create a safe embedding area in the middle and high frequency region of the DCT domain using a magnitude modulation technique. The magnitude modulation is applied using uniform quantization with magnitude Adder/Subtractor modules. The conducted test results indicated that the proposed method satisfy high capacity, high preservation of perceptual and statistical properties of the steg

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More