Preferred Language
Articles
/
QBdQPo8BVTCNdQwC_2XJ
Construct an Efficient DDoS Attack Detection System Based on RF-C4.5-GridSearchCV
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Telkomnika (telecommunication Computing Electronics And Control)
An efficient method for stamps recognition using Haar wavelet sub-bands
...Show More Authors

View Publication
Scopus (3)
Scopus Crossref
Publication Date
Thu Jan 04 2018
Journal Name
Journal Of Electrical Engineering And Technology
An efficient selective method for audio watermarking against de-synchronization attacks
...Show More Authors

View Publication
Scopus (8)
Scopus
Publication Date
Thu Dec 16 2021
Journal Name
Translational Vision Science & Technology
A Hybrid Deep Learning Construct for Detecting Keratoconus From Corneal Maps
...Show More Authors

View Publication
Scopus (38)
Crossref (35)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Interior Visual Intruders Detection Module Based on Multi-Connect Architecture MCA Associative Memory
...Show More Authors

Most recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Fifth International Conference On Applied Sciences: Icas2023
Facial deepfake performance evaluation based on three detection tools: MTCNN, Dlib, and MediaPipe
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Tue Jan 08 2019
Journal Name
Iraqi Journal Of Physics
Effect of Argon and oxygen pressure on Zn magnetron plasma produced by RF power supply
...Show More Authors

In this work, the plasma parameters (electron temperature and
electron density) were determined by optical emission spectroscopy
(OES) produced by the RF magnetron Zn plasma produced by
oxygen and argon at different working pressure. The spectrum was
recorded by spectrometer supplied with CCD camera, computer and
NIST standard of neutral and ionic lines of Zn, argon and oxygen.
The effects of pressure on plasma parameters were studied and a
comparison between the two gasses was made.

View Publication Preview PDF
Crossref
Publication Date
Thu Jul 01 2021
Journal Name
European Journal Of Dentistry
Effects of Long Durations of RF–Magnetron Sputtering Deposition of Hydroxyapatite on Titanium Dental Implants
...Show More Authors

Objectives Dental implant is a revolution in dentistry; some shortages are still a focus of research. This study use long duration of radiofrequency (RF)–magnetron sputtering to coat titanium (Ti) implant with hydroxyapatite (HA) to obtain a uniform, strongly adhered in a few micrometers in thickness. Materials and Methods Two types of substrates, discs and root form cylinders were prepared using a grade 1 commercially pure (CP) Ti rod. A RF–magnetron sputtering device was used to coat specimens with HA. Magnetron sputtering was set at 150 W for 22 hours at 100°C under continuous argon gas flow and substrate rotation at 10 rpm. Coat properties were evaluated via field emission scanning electron microscopy (FESEM), scanning electro

... Show More
View Publication Preview PDF
Scopus (16)
Crossref (14)
Scopus Crossref