Preferred Language
Articles
/
bsj-6550
Retrieving Encrypted Images Using Convolution Neural Network and Fully Homomorphic Encryption
...Show More Authors

A content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a new dataset. In the second part (online processing), the client sends the encrypted image to the server, which depends on the CNN model trained to extract features of the sent image. Next, the extracted features are compared with the stored features using a Hamming distance method to retrieve all similar images. Finally, the server encrypts all retrieved images and sends them to the client. Deep-learning results on plain images were 97.94% for classification and 98.94% for retriever images. At the same time, the NIST test was used to check the security of CKKS when applied to Canadian Institute for Advanced Research (CIFAR-10) dataset. Through these results, researchers conclude that deep learning is an effective method for image retrieval and that a CKKS method is appropriate for image privacy protection.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Oct 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Comparing Between Shrinkage &Maximum likelihood Method For Estimation Parameters &Reliability Function With 3- Parameter Weibull Distribution By Using Simulation
...Show More Authors

The 3-parameter Weibull distribution is used as a model for failure since this distribution is proper when the failure rate somewhat high in starting operation and these rates will be decreased with increasing time .

In practical side a comparison was made between (Shrinkage and Maximum likelihood) Estimators for parameter and reliability function using simulation , we conclude that the Shrinkage estimators for parameters are better than maximum likelihood estimators but the maximum likelihood estimator for reliability function is the better using statistical measures (MAPE)and (MSE) and for different sample sizes.

Note:- ns : small sample ; nm=median sample

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Evaluation of Common Stocks Using The Fama-French Five Factor Model An Applied Study in The Iraq Stock Exchange
...Show More Authors

     The process of stocks evaluating considered as a one of challenges for the financial analysis, since the evaluating focuses on define the current value for the cash flows which the shareholders expected to have. Due to the importance of this subject, the current research aims to choose Fama & French five factors Model to evaluate the common stocks to define the Model accuracy in Fama& French for 2014. It has been used factors of volume, book value to market value, Profitability and investment, in addition to Beta coefficient which used in capital assets pricing Model as a scale for Fama & French five factors Model. The research sample included 11 banks listed in Iraq stock market which have me

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Oct 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
The impact of the RMB exchange rate on the value of Chinese exports For the period (1978-2017) using the Angel-Granger model
...Show More Authors

In this research, we sought to identify the nature of the relationship between the exchange rate of the Chinese yuan and the value of Chinese exports, through the formulation of a standard model based on the model of common integration, and based on the data of the study and using the test "Angel-Granger" It reflects the relationship between the two research variables, through which the relationship between the RMB exchange rate and the value of Chinese exports was estimated during the period 1978-2017.

View Publication Preview PDF
Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Lark Journal
The role of metaphor in the embodiment of female images (In the novel by Ludmila Ulitskaya "Sincerely Yours Shurik" as model)
...Show More Authors

The research deals with metaphors as being one of the primary means used by Lyudmila Ulitskaya when writing the novel " Sincerely Yours Shurik ", to form diverse and multifaceted collective female images of representatives of the classic psychological patterns presented in the work. This research reflects the results of the study related to the work of Lyudmila Yevkinevna Ulitskaya, an actress of modern Russian prose. The novel "The Sincerely to You Shorek" is one of Ludmila Ulitskaya's creations (the year of writing - 2003), which, like her other works, is distinguished by a unique presentation style, rich vocabulary, lexical and semantic diversity, and a special style of writing. writer. The main objective of the research is to look at th

... Show More
Publication Date
Sat Sep 15 2018
Journal Name
Journal Of The College Of Education For Women
Estimation of the Risk of Water Erosion in Jawarta District in Sulaymaniyah Governorate Using the Global Equation for Soil Loss (USLE)
...Show More Authors

The present research deals with the spatial variance analysis in Jwartadistrict and conducting a comparison on the spatial and seasonal changes of the vegetation cover between (2007-2013) in order to deduce the relationship between the vegetation density and the areas which are exposed to the risk of water erosion by using Plant Variation Index  NDVI) C (coefficient and by using Satellite images of Landsat satellite which are taken in 2/7/2007 and Satellite images of Landsat satellite taken in 11/1/ 2013, the programs of remote sensitivity and the Geographic Information Systems.

    The study reveals that there is a variance in the density of vegetation cover of the area under study betwee 2007 and 2013. Howev

... Show More
View Publication Preview PDF
Publication Date
Fri May 15 2009
Journal Name
Journal Of Planner And Development
Study of Change in Regional Land Use Using Remote Sensing Technology and Geographic Information Systems / Study Area (Hawr Al Huweiza) for the Years 1973-1990-2004
...Show More Authors

 

his project try to explain the using ability of spatial techniques for land cover change detection on regional level with the time parameter and did select for explain these abilities study case (Hewaizah marsh ) . this area apply to many big changes with the time. These changes made action on characters and behaviors of this area as well as all activities in it . This Project concerting to recognize the Using importance of remote sensing and GIS Methodology in data collecting for the changes of land use and the methodology for the analyses and getting the results for the next using as a base data for development and drawing the plans as well as in regional planning .This project focus on practical

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 20 2023
Journal Name
Baghdad Science Journal
Study the Chemical Bonding of Heterometallic Trinuclear Cluster Containing Cobalt and Ruthenium: [(Cp*Co) (CpRu)2 (μ3-H) (μ-H)3] using QTAIM Approach
...Show More Authors

 

The topological parameters of the metal-metal and metal-ligand bonding interactions in a trinuclear tetrahydrido cluster [(Cp*Co) (CpRu)2 (μ3-H) (μ-H)3]1 (Cp* = η5 -C5Me4Et), (Cp = η5 -C5Me5), was explored by using the Quantum Theory of Atoms-in-Molecules (QTAIM). The properties of bond critical points such as the bond delocalization indices δ (A, B), the electron density ρ(r), the local kinetic energy density G(r), the Laplacian of the electron density ∇2ρ(r), the local energy density H(r), the local potential energy density V(r) and ellipticity ε(r) are compared with data from earlier organometallic system studies. A comparison of the topological processes of different atom-atom interactions has become possible than

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Mon Jun 01 2020
Journal Name
Journal Of Planner And Development
The Quantitative Analysis To Assess The Efficiency Of The Transport Network In Sader City
...Show More Authors

     This research examines the quantitative analysis to assess the efficiency of the transport network in Sadr City, where the study area suffers from a large traffic movement  for the variability of traffic flow and intensity at peak hours as a result of inside traffic and outside of it, especially in the neighborhoods of population with  economic concentration.                                                           &n

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 30 2017
Journal Name
Al-khwarizmi Engineering Journal
Implementation of Transmitter Zigbee System based on Wireless Sensor Network of IEEE 802.15.4 Standard
...Show More Authors

Abstract

 

Zigbee is considered to be one of the wireless sensor networks (WSNs) designed for short-range communications applications. It follows IEEE 802.15.4 specifications that aim to design networks with lowest cost and power consuming in addition to the minimum possible data rate. In this paper, a transmitter Zigbee system is designed based on PHY layer specifications of this standard. The modulation technique applied in this design is the offset quadrature phase shift keying (OQPSK) with half sine pulse-shaping for achieving a minimum possible amount of phase transitions. In addition, the applied spreading technique is direct sequence spread spectrum (DSSS) technique, which has

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Apr 01 2017
Journal Name
Iracst – International Journal Of Computer Networks And Wireless Communications (ijcnwc)
Optimizing Network Security Considerations with Transition to IPv6 in University of Baghdad, A Prototype
...Show More Authors

It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.