Preferred Language
Articles
/
alkej-853
Secure Seaport Management System using Blockchain Technology
...Show More Authors

Worldwide, shipping documents are still primarily created and handled in the traditional paper manner. Processes taking place in shipping ports as a result are time-consuming and heavily dependent on paper. Shipping documents are particularly susceptible to paperwork fraud because they involve numerous parties with competing interests. With the aid of smart contracts, a distributed, shared, and append-only ledger provided by blockchain technology allows for the addition of new records. In order to increase maritime transport and port efficiency and promote economic development, this paper examines current maritime sector developments in Iraq and offers a paradigm to secure the management system based on a hyper-ledger fabric blockchain platform. The performance evaluation of the proposed system implies two scenarios: one organization and two organizations by examining throughput and latency. High transaction transmission rates on large block sizes produced positive results. Similarly, employing a small block size and higher send rates results in poor performance. Additionally, it was noted that throughput will decrease and latency will rise as the number of organizations increases. Block size and block timeouts should be high in applications with many concurrent transactions in order to maintain good throughput.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 01 2023
Journal Name
Al-khwarizmi Engineering Journal
An Overview of Audio-Visual Source Separation Using Deep Learning
...Show More Authors

    In this article, the research presents a general overview of deep learning-based AVSS (audio-visual source separation) systems. AVSS has achieved exceptional results in a number of areas, including decreasing noise levels, boosting speech recognition, and improving audio quality. The advantages and disadvantages of each deep learning model are discussed throughout the research as it reviews various current experiments on AVSS. The TCD TIMIT dataset (which contains top-notch audio and video recordings created especially for speech recognition tasks) and the Voxceleb dataset (a sizable collection of brief audio-visual clips with human speech) are just a couple of the useful datasets summarized in the paper that can be used to test A

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Thu Nov 01 2012
Journal Name
2012 International Conference On Advanced Computer Science Applications And Technologies (acsat)
Data Missing Solution Using Rough Set theory and Swarm Intelligence
...Show More Authors

This paper presents a hybrid approach for solving null values problem; it hybridizes rough set theory with intelligent swarm algorithm. The proposed approach is a supervised learning model. A large set of complete data called learning data is used to find the decision rule sets that then have been used in solving the incomplete data problem. The intelligent swarm algorithm is used for feature selection which represents bees algorithm as heuristic search algorithm combined with rough set theory as evaluation function. Also another feature selection algorithm called ID3 is presented, it works as statistical algorithm instead of intelligent algorithm. A comparison between those two approaches is made in their performance for null values estima

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2013
Journal Name
Thesis
User Authentication Based on Keystroke Dynamics Using Artificial Neural Networks
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t

... Show More
Publication Date
Tue Dec 28 2021
Journal Name
2021 2nd Information Technology To Enhance E-learning And Other Application (it-ela)
Pedestrian and Objects Detection by Using Learning Complexity-Aware Cascades
...Show More Authors

View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Desalination And Water Treatment
Reducing endotoxin from dialysis water by using different disinfection processes
...Show More Authors

View Publication
Scopus (7)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Wed Jan 15 2020
Journal Name
Iraqi Journal Of Laser
Hole Drilling of High Density Polyethylene using Nd:YAG Pulsed Laser
...Show More Authors

This paper presents the theoretical and experimental results of drilling high density
polyethylene sheet with thickness of 1 mm using millisecond Nd:YAG pulsed laser. Effects of laser
parameters including laser energy, pulse duration and peak power were investigated. To describe and
understand the mechanism of the drilling process Comsol multiphysics package version 4.3b was used to
simulate the process. Both of the computational and experimental results indicated that the drilling
process has been carried out successfully and there are two phases introduced in the drilling process,
vaporization and melting. Each portion of these phases depend on the laser parameters used in the
drilling process

View Publication Preview PDF
Publication Date
Mon Apr 20 2020
Journal Name
Neuroquantology
Evaluating Radon Level in Imported Milk Using CR-39 Detector
...Show More Authors

View Publication
Scopus (8)
Crossref (1)
Scopus Crossref
Publication Date
Thu Jan 23 2020
Journal Name
Iraqi Journal Of Laser
Spider Veins Treatment using 1064 nm Long-Pulse Nd:YAG Laser
...Show More Authors

spider veins are clusters of Ectatic venules & are common finding on the lower limbs generally believed to be caused by multiple factors, including genetic predisposition, hormonal factors, gravity, occupation, pregnancy, becoming increasingly apparent with age, and trauma. Therapeutic options include sclerotherapy, surgical procedures, and treatment with different laser systems.

 Objectives: The purpose of the study was to evaluate the efficacy and safety of long pulsed (Nd:YAG) laser emitting at 1064nm in the treatment of spider veins.

Patients, Materials and Methods: This prospective study was done in the laser medicine research clinics of the Institute of las

... Show More
View Publication Preview PDF
Publication Date
Thu Apr 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Estimate the Partial Linear Model Using Wavelet and Kernel Smoothers
...Show More Authors

This article aims to estimate the partially linear model by using two methods, which are the Wavelet and Kernel Smoothers. Simulation experiments are used to study the small sample behavior depending on different functions, sample sizes, and variances. Results explained that the wavelet smoother is the best depending on the mean average squares error criterion for all cases that used.

 

 

View Publication Preview PDF
Crossref
Publication Date
Tue Jun 06 2023
Journal Name
Journal Of University Of Anbar For Pure Science (juaps)
Approximate Solution of Emden-Fowler Equation Using the Galerkin Method
...Show More Authors