Preferred Language
Articles
/
alkej-3
Microcontroller – Based Spectrum Analyzer
...Show More Authors

This work includes design, implementation and testing of a microcontroller – based spectrum analyzer system. Both hardware and software structures are built to verify the main functions that are required by such system. Their design utilizes the permissible and available tools to achieve the main functions of the system in such a way to be modularly permitting any adaptation for a specific changing in the application environment. The analysis technique, mainly, depends on the Fourier analysis based methods of spectral analysis with the necessary required preconditioning processes. The software required for waveform analysis has been prepared. The spectrum of the waveform has been displayed, and the instrument accuracy has been checked. The basic hardware parts of the analyzer are the processor and the associated logic, storage media, communication to a central master computer and the data acquisition parts. However, the input / output structure is modular and may change according to the application requirements. The basic operating software modules, which are independent of an application, may be used as a part of a software package that can carryout other functions. A complete software development tools package to develop application programs, using IBM-PC and the analyzer instrument, are installed and realized at levels, the PC level and the analyzer instrument level.

 

 

View Publication
Publication Date
Sun Jan 01 2023
Journal Name
Computers, Materials & Continua
Severity Based Light-Weight Encryption Model for Secure Medical Information System
...Show More Authors

View Publication
Scopus (20)
Crossref (35)
Scopus Clarivate Crossref
Publication Date
Sat Jun 01 2024
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Upscale Gray Image using Mixing Transform Generation based on Tensor Product
...Show More Authors

The increased size of grayscale images or upscale plays a central role in various fields such as medicine, satellite imagery, and photography. This paper presents a technique for improving upscaling gray images using a new mixing wavelet generation by tensor product. The proposed technique employs a multi-resolution analysis provided by a new mixing wavelet transform algorithm to decompose the input image into different frequency components. After processing, the low-resolution input image is effectively transformed into a higher-resolution representation by adding a zeroes matrix. Discrete wavelets transform (Daubechies wavelet Haar) as a 2D matrix is used but is mixed using tensor product with another wavelet matrix’s size. MATLAB R2021

... Show More
Preview PDF
Scopus (1)
Scopus
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
Perceptually Important Points-Based Data Aggregation Method for Wireless Sensor Networks
...Show More Authors

The transmitting and receiving of data consume the most resources in Wireless Sensor Networks (WSNs). The energy supplied by the battery is the most important resource impacting WSN's lifespan in the sensor node. Therefore, because sensor nodes run from their limited battery, energy-saving is necessary. Data aggregation can be defined as a procedure applied for the elimination of redundant transmissions, and it provides fused information to the base stations, which in turn improves the energy effectiveness and increases the lifespan of energy-constrained WSNs. In this paper, a Perceptually Important Points Based Data Aggregation (PIP-DA) method for Wireless Sensor Networks is suggested to reduce redundant data before sending them to the

... Show More
View Publication Preview PDF
Scopus (61)
Crossref (52)
Scopus Clarivate Crossref
Publication Date
Mon May 01 2023
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Comparison hybrid techniques-based mixed transform using compression and quality metrics
...Show More Authors

Image quality plays a vital role in improving and assessing image compression performance. Image compression represents big image data to a new image with a smaller size suitable for storage and transmission. This paper aims to evaluate the implementation of the hybrid techniques-based tensor product mixed transform. Compression and quality metrics such as compression-ratio (CR), rate-distortion (RD), peak signal-to-noise ratio (PSNR), and Structural Content (SC) are utilized for evaluating the hybrid techniques. Then, a comparison between techniques is achieved according to these metrics to estimate the best technique. The main contribution is to improve the hybrid techniques. The proposed hybrid techniques are consisting of discrete wavel

... Show More
View Publication
Scopus (3)
Scopus Crossref
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Image encryption algorithm based on the density and 6D logistic map
...Show More Authors

One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera

... Show More
View Publication
Scopus (23)
Crossref (12)
Scopus Crossref
Publication Date
Thu Apr 29 2021
Journal Name
Iraqi Journal Of Science
Capacitance and Resistivity Measurements of Polythiophene /Metallic Nanoparticles-based Humidity Sensors
...Show More Authors

Capacitive–resistive humidity sensors based on polythiophene (P3HT) organic semiconductor as an active material hybrid with three types of metallic nanoparticles (NP) (Ag, Al, and Cu) were synthesized by pulsed laser ablation (PLA). The hybrid P3HT/metallic nanoparticles were deposited on indium-tin-oxide (ITO) substrate at room temperature. The surface morphology of theses samples was studied by using field emission scanning electron micrographs (FE-SEM), which indicated the formation of nanoparticles with grain size of about 50nm. The electrical characteristics of the sensors were examined as a function of the relative humidity levels. The sensors showed an increase in the capacitance with variation in the humidity level.  Whil

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (6)
Scopus Crossref
Publication Date
Sun Sep 01 2019
Journal Name
2019 11th Computer Science And Electronic Engineering (ceec)
ANN based Measurement for No-Reference Video Quality of Experience Metric
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Feb 25 2017
Journal Name
International Journal On Advanced Science, Engineering And Information Technology
A Novel DNA Sequence Approach for Network Intrusion Detection System Based on Cryptography Encoding Method
...Show More Authors

A novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh

... Show More
View Publication
Scopus (9)
Crossref (5)
Scopus Crossref
Publication Date
Mon Apr 01 2019
Journal Name
Journal Of Educational And Psychological Researches
The Teaching Practices of Faculty Members in Northern Border University According to the Brain-Based Learning Theory
...Show More Authors

The present study aims to identify the most and the least common teaching practices among faculty members in Northern Border University according to brain-based learning theory, as well as to identify the effect of sex, qualifications, faculty type, and years of experiences in teaching practices. The study sample consisted of (199) participants divided into 100 males and 99 females. The study results revealed that the most teaching practice among the study sample was ‘I am trying to create an Environment of encouragement and support within the classroom which found to be (4.4623). As for the least teaching practice was ‘I use a natural musical sounds to create student's mood to learn’ found to be (2.2965). The study results also in

... Show More
View Publication Preview PDF