Preferred Language
Articles
/
ThYFt4kBVTCNdQwCBYxF
Anemia Blood Cell localization Using Modified K- Means Algorithm
...Show More Authors

View Publication
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Wed May 06 2015
Journal Name
16th Conference In Natural Science And Mathematics
Efficient digital Image filtering method based on fuzzy algorithm
...Show More Authors

Recently, Image enhancement techniques can be represented as one of the most significant topics in the field of digital image processing. The basic problem in the enhancement method is how to remove noise or improve digital image details. In the current research a method for digital image de-noising and its detail sharpening/highlighted was proposed. The proposed approach uses fuzzy logic technique to process each pixel inside entire image, and then take the decision if it is noisy or need more processing for highlighting. This issue is performed by examining the degree of association with neighboring elements based on fuzzy algorithm. The proposed de-noising approach was evaluated by some standard images after corrupting them with impulse

... Show More
View Publication
Publication Date
Wed Jan 01 2020
Journal Name
Aip Conference Proceedings
Developing a lightweight cryptographic algorithm based on DNA computing
...Show More Authors

This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of

... Show More
Crossref (4)
Crossref
Publication Date
Sun Oct 01 2017
Journal Name
International Journal Of Scientific & Engineering Research
Horizontal Fragmentation for Most Frequency Frequent Pattern Growth Algorithm
...Show More Authors

Abstract: Data mining is become very important at the present time, especially with the increase in the area of information it's became huge, so it was necessary to use data mining to contain them and using them, one of the data mining techniques are association rules here using the Pattern Growth method kind enhancer for the apriori. The pattern growth method depends on fp-tree structure, this paper presents modify of fp-tree algorithm called HFMFFP-Growth by divided dataset and for each part take most frequent item in fp-tree so final nodes for conditional tree less than the original fp-tree. And less memory space and time.

View Publication Preview PDF
Publication Date
Sat Mar 01 2008
Journal Name
Iraqi Journal Of Physics
Enforcing Wiener Filter in the Iterative Blind Restoration Algorithm
...Show More Authors

A new blind restoration algorithm is presented and shows high quality restoration. This
is done by enforcing Wiener filtering approach in the Fourier domains of the image and the
psf environments

View Publication Preview PDF
Publication Date
Sat Jul 31 2021
Journal Name
Iraqi Journal Of Science
A Decision Tree-Aware Genetic Algorithm for Botnet Detection
...Show More Authors

     In this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets  namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from

... Show More
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 16 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On the Riesz Means of Expansions by Riesz Bases Formed by Eigenfunctions for the Ordinary Differential Operator of 4-th Order
...Show More Authors

The aim of this paper is prove a theorem on the Riesz mean of expansions with respect to Riesz bases, which extends the previous results of Loi and Tahir on the Schrodinger operator to the operator of 4-th order.

View Publication Preview PDF
Publication Date
Sun May 28 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On the Riesz Means of Expansion by Riesz Bases Formed by Eigen Functions for the Ordinary Differential Operator of 2mth Order
...Show More Authors

  The aim of this paper is to prove a theorem on the Riesz means of expansions with respect to Riesz bases, which extends the previous results of [1] and [2] on the Schrödinger operator and the ordinary differential operator of 4-th order to the operator of order 2m by using the eigen functions of the ordinary differential operator. Some Symbols that used in the paper:     the uniform norm. <,>   the inner product in L2. ï‚¶G   the set of all boundary elements of G. ˆ u   the dual function of u.

View Publication Preview PDF
Publication Date
Sun Mar 30 2014
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Oxidation of Toluene to Benzoic Acid Catalyzed by Modified Vanadium Oxide
...Show More Authors

A variety of oxides were examined as additives to a V2O5/Al2O3 catalyst in order to enhance the catalytic performance for the vapor phase oxidation of toluene to benzoic acid. It was found that the modification with MoO3 greatly promoted the little reaction leading to improve catalyst performance in terms of toluene conversion and benzoic acid selectivity. The effect of catalyst surface area, catalyst promoters, reaction temperature, O2/toluene, steam/toluene, space velocity, and catalyst composition to catalyst performance were examined in order to increase the benzoic acid selectivity and yield.

View Publication Preview PDF
Publication Date
Thu Mar 09 2017
Journal Name
University Of Baghdad
Synthesis of modified Graphene Oxide and its application as Electrochemical Sensor
...Show More Authors

This study involved preparation of Graphene oxide (GO) and reduced graphene oxide (RGO) using Hummer method and chemical method respectively. These carbon nanomaterials were used as starting material to make novel functionalize with thiocarbohydrazide (TCH) which was prepared by reacting CS2 with hydrazine to form GO or RGO- 4-amino,5-substituted 1H,1,2,4 Triazole 5(4H) thion (ASTT) ,(GOT) and( RGOT) respectively via cyclocondensation reaction. Also MnO2 nanorod was prepared to form hybridized with GOT and RGOT. A commercial multiwall carbon nanotube (MWCNT) and functionalization with carboxylic groups' (f-MWCNT) and its nanocomposite with GOT were also prepared. All carbon nanomaterials were characterized with different techniques such as

... Show More
Preview PDF