Preferred Language
Articles
/
FRYulocBVTCNdQwCM1ew
New multispectral images classification method based on MSR and Skewness implementing on various sensor scenes
...Show More Authors

Publication Date
Wed Apr 17 2019
Journal Name
Iraqi Journal Of Science
Fabrication and Enhancement UV Photodiode Based on Mg-Doped ZnO Nanorods Films
...Show More Authors

Magnesium-doped Zinc oxide (ZnO: Mg) nanorods (NRs) films and pure Zinc oxide deposited on the p-silicon substrates were prepared by hydrothermal method. The doping level of the Mg concentration (atoms ratio of Mg to Zn was chosen to be 0.75% and 1.5%. X-ray diffraction (XRD) and energy-dispersive X-ray spectroscopy (EDX) were performed to characterize the prepared films. X-ray diffraction analysis showed a decrease in the lattice parameters of the Mg-doped ZnO NRs. Under 10V applied bias voltage, the responsivity of p-n junction UV photodiode based on pure ZnO and Mg: ZnO with doping ratio (0.75% and 1.5%) was 0.06 A/W and (0.15A/W and 0.27A/W) at UV illumination of wavelength 365 nm respectively, 0.071 A/W and (0.084A/W and 0.11A/W) fo

... Show More
View Publication Preview PDF
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Journal Of Science
Image Splicing Detection Based on Discrete Wavelet Transform and co-occurrence Matrix
...Show More Authors

    In this paper a method  to determine whether an image is forged (spliced) or not is presented. The proposed method is based on  a classification model to determine the authenticity of a tested image. Image splicing causes many sharp edges (high frequencies) and discontinuities to appear in the spliced image. Capturing these high frequencies in the wavelet domain rather than in the spatial domain is investigated in this paper. Correlation between high-frequency sub-bands coefficients of Discrete Wavelet Transform (DWT) is also described using co-occurrence matrix. This matrix was an input feature vector to a classifier. The best accuracy of 92.79% and 94.56% on Casia v1.0 and Casia v2.0 datasets respectively was achieved. This pe

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Ieee Access
Fast Shot Boundary Detection Based on Separable Moments and Support Vector Machine
...Show More Authors

View Publication
Scopus (15)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Thu Mar 01 2018
Journal Name
Journal Of Engineering
Implementation of Power System Stabilizer Based on Conventional and Fuzzy Logic Controllers
...Show More Authors

To damp the low-frequency oscillations which occurred due to the disturbances in the electrical power system, the generators are equipped with Power System Stabilizer (PSS) that provide supplementary feedback stabilizing signals. The low-frequency oscillations in power system are classified as local mode oscillations, intra-area mode oscillation, and interarea mode oscillations. A suitable PSS model was selected considering the low frequencies oscillation in the inter-area mode based on conventional PSS and Fuzzy Logic Controller. Two types of (FIS) Mamdani and suggeno were considered in this paper. The software of the methods was executed using MATLAB R2015a package.

 

 

View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Sun Jun 11 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Digital Watermarking in Color Image Based On Joint Between DCT and DWT
...Show More Authors

The massive distribution and development in the digital images field with friendly software, that leads to produce unauthorized use. Therefore the digital watermarking as image authentication has been developed for those issues. In this paper, we presented a method depending on the embedding stage and extraction stag. Our development is made by combining Discrete Wavelet Transform (DWT) with Discrete Cosine Transform (DCT) depending on the fact that combined the two transforms will reduce the drawbacks that appears during the recovered watermark or the watermarked image quality of each other, that results in effective rounding method, this is achieved by changing the wavelets coefficients of selected DWT sub bands (HL or HH), followed by

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 30 2020
Journal Name
Al-kindy College Medical Journal
A Population-Based Study on Agreement between Actual and Perceived Body Image
...Show More Authors

Background: Obesity tends to appear in modern societies and constitutes a significant public health problem with an increased risk of cardiovascular diseases.

Objective: This study aims to determine the agreement between actual and perceived body image in the general population.

Methods: A descriptive cross-sectional study design was conducted with a sample size of 300. The data were collected from eight major populated areas of Northern district of Karachi Sindh with a period of six months (10th January 2020 to 21st June 2020). The Figure rating questionnaire scale (FRS) was applied to collect the demographic data and perception about body weight. Body mass index (BMI) used for ass

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 01 2013
Journal Name
Diyala Journal Of Engineering Sciences
Design and Simulation of parallel CDMA System Based on 3D-Hadamard Transform
...Show More Authors

Future wireless systems aim to provide higher transmission data rates, improved spectral efficiency and greater capacity. In this paper a spectral efficient two dimensional (2-D) parallel code division multiple access (CDMA) system is proposed for generating and transmitting (2-D CDMA) symbols through 2-D Inter-Symbol Interference (ISI) channel to increase the transmission speed. The 3D-Hadamard matrix is used to generate the 2-D spreading codes required to spread the two-dimensional data for each user row wise and column wise. The quadrature amplitude modulation (QAM) is used as a data mapping technique due to the increased spectral efficiency offered. The new structure simulated using MATLAB and a comparison of performance for ser

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 20 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Text Encryption Algorithm Based on Chaotic Neural Network and Random Key Generator
...Show More Authors

This work presents a symmetric cryptography coupled with Chaotic NN , the encryption algorithm process the data as a blocks and it consists of multilevel( coding of character, generates array of keys (weights),coding of text and chaotic NN ) , also the decryption process consists of multilevel (generates array of keys (weights),chaotic NN, decoding of text and decoding of character).Chaotic neural network is used as a part of the proposed system with modifying on it ,the keys that are used in chaotic sequence are formed by proposed key generation algorithm .The proposed algorithm appears efficiency during the execution time where it can encryption and decryption long messages by short time and small memory (chaotic NN offer capacity of m

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 27 2020
Journal Name
Iraqi Journal Of Science
A Framework of APT Detection Based on Packets Analysis and Host Destination
...Show More Authors

So far, APT (Advanced Persistent Threats) is a constant concern for information security. Despite that, many approaches have been used in order to detect APT attacks, such as change controlling, sandboxing and network traffic analysis. However, success of 100% couldn’t be achieved. Current studies have illustrated that APTs adopt many complex techniques to evade all detection types. This paper describes and analyzes APT problems by analyzing the most common techniques, tools and pathways used by attackers. In addition, it highlights the weaknesses and strengths of the existing security solutions that have been used since the threat was identified in 2006 until 2019. Furthermore, this research proposes a new framework that can be u

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Sun Oct 30 2022
Journal Name
Iraqi Journal Of Science
Proposed Hybrid Technique in Cryptanalysis of Cryptosystem Based on PSO and SA
...Show More Authors

     Modern ciphers are one of the more difficult to break cipher systems because these ciphers high security, high speed, non - propagation error and difficulty in breaking it. One of the most important weaknesses of stream cipher is a matching or correlation between the output key-stream and the output of shift registers.

     This work considers new investigation methods for cryptanalysis stream cipher using ciphertext only attack depending on Particle Swarm Optimization (PSO) for the automatic extraction for the key. It also introduces a cryptanalysis system based on PSO with suggestion for enhancement of the performance of PSO, by using Simulated Annealing (SA). Additionally, it presents a comparison for the cryptanal

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Crossref