Preferred Language
Articles
/
Pxd5V5IBVTCNdQwCx6wl
A partial image encryption scheme based on DWT and texture segmentation
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Sat Oct 29 2022
Journal Name
Computers
Intelligent Robotic Welding Based on a Computer Vision Technology Approach
...Show More Authors

Robots have become an essential part of modern industries in welding departments to increase the accuracy and rate of production. The intelligent detection of welding line edges to start the weld in a proper position is very important. This work introduces a new approach using image processing to detect welding lines by tracking the edges of plates according to the required speed by three degrees of a freedom robotic arm. The two different algorithms achieved in the developed approach are the edge detection and top-hat transformation. An adaptive neuro-fuzzy inference system ANFIS was used to choose the best forward and inverse kinematics of the robot. MIG welding at the end-effector was applied as a tool in this system, and the wel

... Show More
View Publication
Scopus (10)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
Retrieving Encrypted Images Using Convolution Neural Network and Fully Homomorphic Encryption
...Show More Authors

A content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Aug 01 2021
Journal Name
Journal Of Engineering
Reuse of Glass waste as a partial replacement to fine aggregates in concrete
...Show More Authors

As human societies grow, the problem of waste management becomes one of the pressing issues that need to be addressed. Recycling and reuse of waste are effective waste management measures that prevent pollution and conserve natural resources. In this study, the possibility of using glass waste as an alternative was used as a partial weight substitute for fine aggregates with replacement ratios of 10, 20, 30, and 40% by the weight, and formed into test models (15 cm * 15 cm ) cube and (15 cm * 30 cm) cylinder, then matured and tested their strength compression and tensile strength at the age of 7 and 28 days and compared with a reference or conventional concrete with a mixing ratio (1: 1.5: 3) as well as testing its worka

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
International Journal Of Nonlinear Analysis And Applications
A general solution of some linear partial differential equations via two integral transforms
...Show More Authors

In this paper, a new analytical method is introduced to find the general solution of linear partial differential equations. In this method, each Laplace transform (LT) and Sumudu transform (ST) is used independently along with canonical coordinates. The strength of this method is that it is easy to implement and does not require initial conditions.

View Publication
Clarivate
Publication Date
Thu Aug 31 2023
Journal Name
Journal Européen Des Systèmes Automatisés​
Deep Learning Approach for Oil Pipeline Leakage Detection Using Image-Based Edge Detection Techniques
...Show More Authors

Natural gas and oil are one of the mainstays of the global economy. However, many issues surround the pipelines that transport these resources, including aging infrastructure, environmental impacts, and vulnerability to sabotage operations. Such issues can result in leakages in these pipelines, requiring significant effort to detect and pinpoint their locations. The objective of this project is to develop and implement a method for detecting oil spills caused by leaking oil pipelines using aerial images captured by a drone equipped with a Raspberry Pi 4. Using the message queuing telemetry transport Internet of Things (MQTT IoT) protocol, the acquired images and the global positioning system (GPS) coordinates of the images' acquisition are

... Show More
View Publication
Scopus (7)
Crossref (1)
Scopus Crossref
Publication Date
Sat Aug 01 2015
Journal Name
Journal Of Engineering
A Real-Time Fuzzy Load Flow and Contingency Analysis Based on Gaussian Distribution System
...Show More Authors

Fuzzy logic is used to solve the load flow and contingency analysis problems, so decreasing computing time and its the best selection instead of the traditional methods. The proposed  method is very accurate with outstanding computation time, which made the fuzzy load flow (FLF) suitable for real time application for small- as well as large-scale power systems. In addition that, the FLF efficiently able to solve load flow problem of ill-conditioned power systems and contingency analysis. The FLF method using Gaussian membership function requires less number of iterations and less computing time than that required in the FLF method using triangular membership function. Using sparsity technique for the input Ybus sparse matrix data gi

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 20 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Hybrid Algorithm to Protect Computer Networks Based on Human Biometrics and Computer Attributes
...Show More Authors

Objective of this work is the mixing between human biometric characteristics and unique attributes of the computer in order to protect computer networks and resources environments through the development of authentication and authorization techniques. In human biometric side has been studying the best methods and algorithms used, and the conclusion is that the fingerprint is the best, but it has some flaws. Fingerprint algorithm has been improved so that their performance can be adapted to enhance the clarity of the edge of the gully structures of pictures fingerprint, taking into account the evaluation of the direction of the nearby edges and repeat. In the side of the computer features, computer and its components like human have uniqu

... Show More
View Publication Preview PDF
Publication Date
Thu May 25 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Physiochemical and Spectral Characterization For a Biological Active, Solanidine&Solasodine Partial Purification Compounds From (Solanum nigrum L)
...Show More Authors

 This study includes a physiochemical and a spectrocpical characterization to some alkaloid compounds in the (ANAB AL- THEAB) plant (Solanum nigrun L.). It’s the most important medicinal herb belonging to the family (Solanaceae). Acid  hydrolysis was performed by using limited conc. of  Hcl and H2SO4, to obtain the aglycon  part of previously separated steroidal componants as (A, B and C).   The characterization of the(A,B and C) compounds indicates that they varied between them as the separated steroidal like-alkaloids, carried by using melting  point (m.p.), thin layer chromatography (TLC), Infra -Red  spectroscopy (IR) and Ultra violet-Visible  spectroscopy (UV - Visible).High perfor

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 04 2017
Journal Name
Baghdad Science Journal
Texture Analysis of smear of Leukemia Blood Cells after Exposing to Cold Plasma
...Show More Authors

Plasma physics and digital image processing technique (DIPT) were utilized in this research to show the effect of the cold plasma (plasma needle) on blood cells. The second order statistical features were used to study this effect. Different samples were used to reach the aim of this paper; the patients have leukemia and their leukocytes number was abnormal. By studying the results of statistical features (mean, variance, energy and entropy), it is concluded that the blood cells of the sample showed a good response to the cold plasma.

View Publication Preview PDF
Scopus (23)
Crossref (1)
Scopus Crossref