Preferred Language
Articles
/
bsj-6550
Retrieving Encrypted Images Using Convolution Neural Network and Fully Homomorphic Encryption
...Show More Authors

A content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a new dataset. In the second part (online processing), the client sends the encrypted image to the server, which depends on the CNN model trained to extract features of the sent image. Next, the extracted features are compared with the stored features using a Hamming distance method to retrieve all similar images. Finally, the server encrypts all retrieved images and sends them to the client. Deep-learning results on plain images were 97.94% for classification and 98.94% for retriever images. At the same time, the NIST test was used to check the security of CKKS when applied to Canadian Institute for Advanced Research (CIFAR-10) dataset. Through these results, researchers conclude that deep learning is an effective method for image retrieval and that a CKKS method is appropriate for image privacy protection.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Oct 01 2018
Journal Name
2018 Ieee/acs 15th International Conference On Computer Systems And Applications (aiccsa)
Utilizing Hopfield Neural Network for Pseudo-Random Number Generator
...Show More Authors

View Publication
Scopus (11)
Crossref (9)
Scopus Crossref
Publication Date
Fri Aug 27 2021
Journal Name
Human Interaction, Emerging Technologies And Future Systems V: Proceedings Of The 5th International Virtual Conference On Human Interaction And Emerging Technologies, Ihiet 2021, August 27-29, 2021 And The 6th Ihiet: Future Systems (ihiet-fs 2021), October 28-30, 2021, France
Electricity Consumption Forecasting in Iraq with Artificial Neural Network
...Show More Authors

Scopus (16)
Scopus
Publication Date
Fri Mar 31 2017
Journal Name
Al-khwarizmi Engineering Journal
Big-data Management using Map Reduce on Cloud: Case study, EEG Images' Data
...Show More Authors

Database is characterized as an arrangement of data that is sorted out and disseminated in a way that allows the client to get to the data being put away in a simple and more helpful way. However, in the era of big-data the traditional methods of data analytics may not be able to manage and process the large amount of data. In order to develop an efficient way of handling big-data, this work studies the use of Map-Reduce technique to handle big-data distributed on the cloud. This approach was evaluated using Hadoop server and applied on EEG Big-data as a case study. The proposed approach showed clear enhancement for managing and processing the EEG Big-data with average of 50% reduction on response time. The obtained results provide EEG r

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2013
Journal Name
International Journal Of Algebra
Fully extending modules
...Show More Authors

Throughout this paper we introduce the concept of quasi closed submodules which is weaker than the concept of closed submodules. By using this concept we define the class of fully extending modules, where an R-module M is called fully extending if every quasi closed submodule of M is a direct summand.This class of modules is stronger than the class of extending modules. Many results about this concept are given, also many relationships with other related concepts are introduced.

View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Engineering
Water Quality Assessment and Total Dissolved Solids Prediction using Artificial Neural Network in Al-Hawizeh Marsh South of Iraq
...Show More Authors

The Iraqi marshes are considered the most extensive wetland ecosystem in the Middle East and are located in the middle and lower basin of the Tigris and Euphrates Rivers which create a wetlands network and comprise some shallow freshwater lakes that seasonally swamped floodplains. Al-Hawizeh marsh is a major marsh located east of Tigris River south of Iraq. This study aims to assess water quality through water quality index (WQI) and predict Total Dissolved Solids (TDS) concentrations in Al-Hawizeh marsh based on artificial neural network (ANN). Results showed that the WQI was more than 300 for years 2013 and 2014 (Water is unsuitable for drinking) and decreased within the range 200-300 in years 2015 and 2016 (Very poor water). The develope

... Show More
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering/
Water quality assessment and total dissolved solids prediction using artificial neural network in Al-Hawizeh marsh south of Iraq
...Show More Authors

The Iraqi marshes are considered the most extensive wetland ecosystem in the Middle East and are located in the middle and lower basin of the Tigris and Euphrates Rivers which create a wetlands network and comprise some shallow freshwater lakes that seasonally swamped floodplains. Al-Hawizeh marsh is a major marsh located east of Tigris River south of Iraq. This study aims to assess water quality through water quality index (WQI) and predict Total Dissolved Solids (TDS) concentrations in Al-Hawizeh marsh based on artificial neural network (ANN). Results showed that the WQI was more than 300 for years 2013 and 2014 (Water is unsuitable for drinking) and decreased within the range 200-300 in years 2015 and 2016 (Very poor water). The

... Show More
Publication Date
Mon Jan 02 2017
Journal Name
European Journal Of Scientific Research
Fast approach for arabic text encryption using genetic algorithm
...Show More Authors

As s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res

... Show More
Publication Date
Tue Oct 25 2022
Journal Name
Minar Congress 6
HANDWRITTEN DIGITS CLASSIFICATION BASED ON DISCRETE WAVELET TRANSFORM AND SPIKE NEURAL NETWORK
...Show More Authors

In this paper, a handwritten digit classification system is proposed based on the Discrete Wavelet Transform and Spike Neural Network. The system consists of three stages. The first stage is for preprocessing the data and the second stage is for feature extraction, which is based on Discrete Wavelet Transform (DWT). The third stage is for classification and is based on a Spiking Neural Network (SNN). To evaluate the system, two standard databases are used: the MADBase database and the MNIST database. The proposed system achieved a high classification accuracy rate with 99.1% for the MADBase database and 99.9% for the MNIST database

View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Ieee Access
Modified Elman Spike Neural Network for Identification and Control of Dynamic System
...Show More Authors

View Publication
Scopus (25)
Crossref (22)
Scopus Clarivate Crossref
Publication Date
Mon Jul 18 2022
Journal Name
Ieee Access
Moderately Multispike Return Neural Network for SDN Accurate Traffic Awareness in Effective 5G Network Slicing
...Show More Authors

Due to the huge variety of 5G services, Network slicing is promising mechanism for dividing the physical network resources in to multiple logical network slices according to the requirements of each user. Highly accurate and fast traffic classification algorithm is required to ensure better Quality of Service (QoS) and effective network slicing. Fine-grained resource allocation can be realized by Software Defined Networking (SDN) with centralized controlling of network resources. However, the relevant research activities have concentrated on the deep learning systems which consume enormous computation and storage requirements of SDN controller that results in limitations of speed and accuracy of traffic classification mechanism. To fill thi

... Show More
Scopus (17)
Crossref (13)
Scopus Clarivate Crossref