Preferred Language
Articles
/
RhfHNI8BVTCNdQwCUGEe
SMS Spam Detection Based on Fuzzy Rules and Binary Particle Swarm Optimization
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Wed Sep 12 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Network Performance Analysis Based on Network Simulator NS-2.
...Show More Authors

     NS-2 is a tool to simulate networks and events that occur per packet sequentially based on time and are widely used in the research field. NS-2 comes with NAM (Network Animator) that produces a visual representation it also supports several simulation protocols. The network can be tested end-to-end. This test includes data transmission, delay, jitter, packet-loss ratio and throughput. The Performance Analysis simulates a virtual network and tests for transport layer protocols at the same time with variable data and analyzes simulation results based on the network simulator NS-2.

View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2017
Journal Name
International Journal Of Recent Trends In Engineering & Research
Password Authentication Based On Modify Bidirectional Associative Memory (MBAM)
...Show More Authors

Password authentication is popular approach to the system security and it is also very important system security procedure to gain access to resources of the user. This paper description password authentication method by using Modify Bidirectional Associative Memory (MBAM) algorithm for both graphical and textual password for more efficient in speed and accuracy. Among 100 test the accuracy result is 100% for graphical and textual password to authenticate a user.

Preview PDF
Publication Date
Thu Nov 02 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Gallium Selective PVC Membrane Electrodes Based on Crown Ethers
...Show More Authors

Gallium  selective  e lectrodes   based  on  12-crown-4  (12C4)  and benzo-15-crown-5   (B15C5)  and  plasticizers   dioctyl  phenyl phosphonate   (DOPP),   dibutyl  phosphate  (DBP),  dibutyl  phthalate (DBPH)  in  PVC  matrix  membranes  are  constructed.  Specific properties  of  the electrodes  are  studied  including  calibration  curve, slope  detection limit, concentration  

+

 
... Show More
View Publication Preview PDF
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Ieee Access
A New Separable Moments Based on Tchebichef-Krawtchouk Polynomials
...Show More Authors

View Publication
Scopus (21)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Fri May 17 2013
Journal Name
International Journal Of Computer Applications
Fast Lossless Compression of Medical Images based on Polynomial
...Show More Authors

In this paper, a fast lossless image compression method is introduced for compressing medical images, it is based on splitting the image blocks according to its nature along with using the polynomial approximation to decompose image signal followed by applying run length coding on the residue part of the image, which represents the error caused by applying polynomial approximation. Then, Huffman coding is applied as a last stage to encode the polynomial coefficients and run length coding. The test results indicate that the suggested method can lead to promising performance.

View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Aug 01 2013
Journal Name
Desalination And Water Treatment
Competitive biosorption of Pb(II), Cr(III), and Cd (II) from synthetic wastewater onto heterogeneous anaerobic biomass in single, binary, and ternary batch systems
...Show More Authors

Biosorption of lead, chromium, and cadmium ions from aqueous solution by dead anaerobic biomass (DAB) was studied in single, binary, and ternary systems with initial concentration of 50 mg/l. The metal-DAB affinity was the same for all systems. The main biosorption mechanisms were complexation and physical adsorption of metallic cations onto natural active functional groups on the cell wall matrix of the DAB. It was found that biosorption of the metallic cations onto DAB cell wall component was a surface process. The main functional groups involved in the metallic cation biosorption were apparently carboxyl, amino, hydroxyle, sulfhydryl, and sulfonate. These groups were part of the DAB cell wall structural polymers. Hydroxyle groups (–O

... Show More
Crossref (13)
Crossref
Publication Date
Mon Mar 30 2020
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Optimization of Hole Cleaning and Cuttings Removal in High Inclined Till Horizontal Well
...Show More Authors

The goal of this experimental study is to determine the effects of different parameters (Flow rate, cuttings density, cuttings size, and hole inclination degree) on hole cleaning efficiency. Freshwater was used as a drilling fluid in this experiment. The experiments were conducted by using flow loop consist of approximately 14 m (46 ft) long with transparent glass test section of 3m (9.84 ft.) long with 4 inches (101.6 mm) ID, the inner metal drill pipe with 2 inches (50.8 mm) OD settled with eccentric position positive 0.5. The results obtained from this study show that the hole cleanings efficiency become better with high flow rate (21 m3/hr) and it increase as the hole inclination angles increased from 60 to 90 degree due to dominated

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jun 02 2013
Journal Name
Baghdad Science Journal
Computational Optimization of the Radial and Spiral Distortion Aberration Coefficients of Magnetic Deflector
...Show More Authors

Abstract:The optimum design of the magnetic deflector with the lowest values of the radial and spiral distortion aberration coefficients was computed. The optimized calculations were made using three models, Glaser bell-shaped, Grivet-lenz and exponential models. By using the optimum axial field distribution, the pole pieces shape which gave rise to those field distributions was found by using the reconstruction method. The calculations show that the results of the three models coincide at the lower values of the excitation parameter. In general the Glaser- bell shaped model gives the optimum results at the whole range of the excitation parameter under investigation.The negative values of the spiral distortion aberration coefficient appears

... Show More
View Publication Preview PDF
Crossref