Preferred Language
Articles
/
bsj-6550
Retrieving Encrypted Images Using Convolution Neural Network and Fully Homomorphic Encryption
...Show More Authors

A content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a new dataset. In the second part (online processing), the client sends the encrypted image to the server, which depends on the CNN model trained to extract features of the sent image. Next, the extracted features are compared with the stored features using a Hamming distance method to retrieve all similar images. Finally, the server encrypts all retrieved images and sends them to the client. Deep-learning results on plain images were 97.94% for classification and 98.94% for retriever images. At the same time, the NIST test was used to check the security of CKKS when applied to Canadian Institute for Advanced Research (CIFAR-10) dataset. Through these results, researchers conclude that deep learning is an effective method for image retrieval and that a CKKS method is appropriate for image privacy protection.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 30 2013
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Mass Transfer Enhancement Using Extensions as Turbulence Promoters
...Show More Authors

Mass transfer was studied using a rotating cylinder electrode with different lengths of legs acting as turbulence promoters. Two types of rotating cylinder ,made of brass, were examined : an enhanced cylinder one, with four rectangular extensions 10 mm long, 10 mm wide, and 1mm thick, and an enhanced cylinder two with four longitudes 30 mm long,10 mm wide, and 1mm thick. The best performance was obtained for enhanced cylinder two at low rotation speeds while enhanced cylinder one was realized at high rotation speeds. The mass transfer enhancement as compared with a normal rotating cylinder electrode, devoid of promoters, is 53% or 58% higher. The enhancement percentage decreased as rotation speeds increased further, since, seemingly, ful

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 27 2017
Journal Name
Al-khwarizmi Engineering Journal
Removal of Oil From Wastewater Using Walnut-Shell
...Show More Authors

 

The ability of pulverized walnut-shell to remove oil from aqueous solutions has been studied. It involves two-phase process which consists of using walnut-shell as a filtering bed for the accumulation and adsorption of oil onto its surface. Up to 96% oil removal from synthetic wastewater samples was achieved while tests results showed that 75% of oil can be removed from the actual wastewater discharged from Al- Duara refinery in the south of Baghdad.

 

View Publication Preview PDF
Publication Date
Thu Feb 28 2019
Journal Name
Journal Of Engineering
Digital Color Image Watermarking Using Encoded Frequent Mark
...Show More Authors

With the increased development in digital media and communication, the need for methods to protection and security became very important factor, where the exchange and transmit date over communication channel led to make effort to protect these data from unauthentication access.

This paper present a new method to protect color image from unauthentication access using watermarking. The watermarking algorithm hide the encoded mark image in frequency domain using Discrete Cosine Transform. The main principle of the algorithm is encode frequent mark in cover color image. The watermark image bits are spread by repeat the mark and arrange in encoded method that provide algorithm more robustness and security. The propos

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Using Alternative Cogeneration Plants in Iraqi Petroleum Industry
...Show More Authors

The present paper describes and analyses three proposed cogeneration plants include back pressure steam-turbine system, gas turbine system, diesel-engine system, and the present Dura refinery plant. Selected actual operating data are employed for analysis. The same amount of electrical and thermal product outputs is considered for all systems to facilitate comparisons. The theoretical analysis was done according to 1st and 2nd law of thermodynamic. The results demonstrate that exergy analysis is a useful tool in performance analysis of cogeneration systems and permits meaningful comparisons of different cogeneration systems based on their merits, also the result showed that the back pressure steam-turbine is more efficient than other pro

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Engineering
Face-based Gender Classification Using Deep Learning Model
...Show More Authors

Gender classification is a critical task in computer vision. This task holds substantial importance in various domains, including surveillance, marketing, and human-computer interaction. In this work, the face gender classification model proposed consists of three main phases: the first phase involves applying the Viola-Jones algorithm to detect facial images, which includes four steps: 1) Haar-like features, 2) Integral Image, 3) Adaboost Learning, and 4) Cascade Classifier. In the second phase, four pre-processing operations are employed, namely cropping, resizing, converting the image from(RGB) Color Space to (LAB) color space, and enhancing the images using (HE, CLAHE). The final phase involves utilizing Transfer lea

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Iraqi Journal Of Laser
Urinary Tract Lithotripsy Using Holmium: YAG (2100nm) Laser
...Show More Authors

Background: Laser urinary stone lithotripsy is an established endourological modality. Ho:YAG(2100nm) laser have broadened  the indications for ureteroscopic stone managements  to include larger stone sizes throughout the whole urinary tract.

Purpose: To evaluate the effectiveness and safety of Holmium: YAG(2100nm) laser lithotripsy with a semirigid uretero scope for urinary stone calculi in a prospective cohort of 17 patients.

Patients and Methods: Holmium: YAG(2100nm) laser lithotripsy was performed with a semirigid ureteroscope in 17 patients from September 2016 to December  2016. Calculi were located in the lower ureter in 9 patients (52.9%), the midure

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Euro Dinar Trading Analysis Using WARIMA Hybrid Model
...Show More Authors

The rise in the general level of prices in Iraq makes the local commodity less able to compete with other commodities, which leads to an increase in the amount of imports and a decrease in the amount of exports, since it raises demand for foreign currencies while decreasing demand for the local currency, which leads to a decrease in the exchange rate of the local currency in exchange for an increase in the exchange rate of currencies. This is one of the most important factors affecting the determination of the exchange rate and its fluctuations. This research deals with the currency of the European Euro and its impact against the Iraqi dinar. To make an accurate prediction for any process, modern methods can be used through which

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Improving IoT Applications Using a Proposed Routing Protocol
...Show More Authors

The main objective of this work is to propose a new routing protocol for wireless sensor network employed to serve IoT systems. The routing protocol has to adapt with different requirements in order to enhance the performance of IoT applications. The link quality, node depth and energy are used as metrics to make routing decisions. Comparison with other protocols is essential to show the improvements achieved by this work, thus protocols designed to serve the same purpose such as AODV, REL and LABILE are chosen to compare the proposed routing protocol with. To add integrative and holistic, some of important features are added and tested such as actuating and mobility. These features are greatly required by some of IoT applications and im

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Mar 04 2018
Journal Name
Baghdad Science Journal
Solving Fuzzy Games Problems by Using Ranking Functions
...Show More Authors

In this paper, we deal with games of fuzzy payoffs problem while there is uncertainty in data. We use the trapezoidal membership function to transform the data into fuzzy numbers and utilize the three different ranking function algorithms. Then we compare between these three ranking algorithms by using trapezoidal fuzzy numbers for the decision maker to get the best gains

View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Dec 06 2009
Journal Name
Baghdad Science Journal
Decoding Reed- Muller Codes by Using Hadamard Matrices
...Show More Authors

This paper discusses the problem of decoding codeword in Reed- Muller Codes. We will use the Hadamard matrices as a method to decode codeword in Reed- Muller codes.In addition Reed- Muller Codes are defined and encoding matrices are discussed. Finally, a method of decoding is explained and an example is given to clarify this method, as well as, this method is compared with the classical method which is called Hamming distance.

View Publication Preview PDF
Crossref