Preferred Language
Articles
/
Lherso0BVTCNdQwC1RkN
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

Crossref
View Publication
Publication Date
Sat Feb 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
An open cloud-based platform for the creation and delivery of smart applications and services
...Show More Authors
Abstract<p>With the increasing integration of computers and smartphones into our daily lives, in addition to the numerous benefits it offers over traditional paper-based methods of conducting affairs, it has become necessary to incorporate one of the most essential facilities into this integration; namely: colleges. The traditional approach for conducting affairs in colleges is mostly paper-based, which only increases time and workload and is relatively decentralized. This project provides educational and management services for the university environment, targeting the staff, the student body, and the lecturers, on two of the most used platforms: smartphones and reliable web applications by clo</p> ... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Ieee Access
Multichannel Optimization With Hybrid Spectral- Entropy Markers for Gender Identification Enhancement of Emotional-Based EEGs
...Show More Authors

View Publication
Scopus (23)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Wed May 10 2023
Journal Name
Biomass Conversion And Biorefinery
Lactic acid-based deep eutectic solvents and activated carbon for soap removal from crude biodiesel
...Show More Authors

View Publication
Scopus (9)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sun Jun 21 2020
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Nanotechnology-Based Topical Drug Delivery Systems for Management of Dandruff and Seborrheic Dermatitis: An overview
...Show More Authors

Dandruff and seborrheic dermatitis (SD) are common skin disorders affecting the scalp and extending to other body sites in the case of SD. They are associated with pruritus and scaling, causing an esthetical disturbance in the population affected.   Treatment of such conditions involves using a variety of drugs for long terms, thus optimizing drug formulation is essential to improve therapeutic efficacy and patient compliance. Conventional topical formulations like shampoos and creams have been widely used but their use is associated with disadvantages. To overcome such effects, novel topical nanotechnology-based formulations are currently under investigation. In the following article, we highlight recently published formulatio

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (1)
Scopus Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
Measuring Positive and Negative Association of Apriori Algorithm with Cosine Correlation Analysis
...Show More Authors

This work aims to see the positive association rules and negative association rules in the Apriori algorithm by using cosine correlation analysis. The default and the modified Association Rule Mining algorithm are implemented against the mushroom database to find out the difference of the results. The experimental results showed that the modified Association Rule Mining algorithm could generate negative association rules. The addition of cosine correlation analysis returns a smaller amount of association rules than the amounts of the default Association Rule Mining algorithm. From the top ten association rules, it can be seen that there are different rules between the default and the modified Apriori algorithm. The difference of the obta

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Jun 01 2024
Journal Name
Journal Of Engineering
Copy Move Image Forgery Detection using Multi-Level Local Binary Pattern Algorithm
...Show More Authors

Digital image manipulation has become increasingly prevalent due to the widespread availability of sophisticated image editing tools. In copy-move forgery, a portion of an image is copied and pasted into another area within the same image. The proposed methodology begins with extracting the image's Local Binary Pattern (LBP) algorithm features. Two main statistical functions, Stander Deviation (STD) and Angler Second Moment (ASM), are computed for each LBP feature, capturing additional statistical information about the local textures. Next, a multi-level LBP feature selection is applied to select the most relevant features. This process involves performing LBP computation at multiple scales or levels, capturing textures at different

... Show More
Crossref
Publication Date
Sun Sep 24 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Algorithm to Solve Linear Volterra Fractional Integro-Differential Equation via Elzaki Transform
...Show More Authors

In this work, Elzaki transform (ET) introduced by Tarig Elzaki is applied to solve linear Volterra fractional integro-differential equations (LVFIDE). The fractional derivative is considered in the Riemman-Liouville sense. The procedure is based on the application of (ET) to (LVFIDE) and using properties of (ET) and its inverse. Finally, some examples are solved to show that this is computationally efficient and accurate.

View Publication Preview PDF
Publication Date
Mon Sep 25 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Algorithm to Solve Linear Volterra Fractional Integro-Differential Equation via Elzaki Transform
...Show More Authors

       In this work, Elzaki transform (ET) introduced by Tarig Elzaki is applied to solve linear Volterra fractional integro-differential equations (LVFIDE). The fractional derivative is considered in the Riemman-Liouville sense. The procedure is based on the application of (ET) to (LVFIDE) and using properties of (ET) and its inverse. Finally, some examples are solved to show that this is computationally efficient and accurate.

View Publication Preview PDF
Publication Date
Wed Apr 25 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Counting Functions to Generate The Primes in the RSA Algorithm and Diffie-Hellman Key Exchange
...Show More Authors

        The Rivest–Shamir–Adleman (RSA) and the Diffie-Hellman (DH) key exchange are famous methods for encryption. These methods  depended on selecting the primes p and q in order  to be secure enough . This paper shows that the named methods used the primes which are found by some arithmetical function .In the other sense, no need to think about getting primes p and q and how they are secure enough, since the arithmetical function enable to build the primes in such complicated way to be secure. Moreover, this article   gives  new construction  of the  RSA  algorithm and DH key  exchange using the

primes p,qfrom areal number x.

View Publication Preview PDF
Crossref
Publication Date
Thu May 10 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
An Improvement of MRI Brain Images Classification Using Dragonfly Algorithm as Trainer of Artificial Neural Network
...Show More Authors

  Computer software is frequently used for medical decision support systems in different areas. Magnetic Resonance Images (MRI) are widely used images for brain classification issue. This paper presents an improved method for brain classification of MRI images. The proposed method contains three phases, which are, feature extraction, dimensionality reduction, and an improved classification technique. In the first phase, the features of MRI images are obtained by discrete wavelet transform (DWT). In the second phase, the features of MRI images have been reduced, using principal component analysis (PCA). In the last (third) stage, an improved classifier is developed. In the proposed classifier, Dragonfly algorithm is used instead

... Show More
View Publication Preview PDF
Crossref (14)
Crossref