Preferred Language
Articles
/
gRZ644sBVTCNdQwCKuN3
SENTIMENT RETRIEVAL OF HEALTH RECORDS USING NLP-BASED ALGORITHM
...Show More Authors

Scopus
Publication Date
Mon Dec 01 2014
Journal Name
Advances In Engineering Software
System identification and control of robot manipulator based on fuzzy adaptive differential evolution algorithm
...Show More Authors

View Publication
Scopus (51)
Crossref (44)
Scopus Clarivate Crossref
Publication Date
Sat Nov 05 2022
Journal Name
Sensors
Enhancement of the CAST Block Algorithm Based on Novel S-Box for Image Encryption
...Show More Authors

Background and Aim: due to the rapid growth of data communication and multimedia system applications, security becomes a critical issue in the communication and storage of images. This study aims to improve encryption and decryption for various types of images by decreasing time consumption and strengthening security. Methodology: An algorithm is proposed for encrypting images based on the Carlisle Adams and Stafford Tavares CAST block cipher algorithm with 3D and 2D logistic maps. A chaotic function that increases the randomness in the encrypted data and images, thereby breaking the relation sequence through the encryption procedure, is introduced. The time is decreased by using three secure and private S-Boxes rather than using si

... Show More
View Publication
Crossref (13)
Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Al-khwarizmi Engineering Journal
Pre-Processing and Surface Reconstruction of Points Cloud Based on Chord Angle Algorithm Technique
...Show More Authors

Abstract

Although the rapid development in reverse engineering techniques, 3D laser scanners can be considered the modern technology used to digitize the 3D objects, but some troubles may be associate this process due to the environmental noises and limitation of the used scanners. So, in the present paper a data pre-processing algorithm has been proposed to obtain the necessary geometric features and mathematical representation of scanned object from its point cloud which obtained using 3D laser scanner (Matter and Form) through isolating the noised points. The proposed algorithm based on continuous calculations of chord angle between each adjacent pair of points in point cloud. A MATLAB program has been built t

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Wed Nov 16 2016
Journal Name
Eurasip Journal On Wireless Communications And Networking
Evaluation of efficient vehicular ad hoc networks based on a maximum distance routing algorithm
...Show More Authors

Traffic management at road intersections is a complex requirement that has been an important topic of research and discussion. Solutions have been primarily focused on using vehicular ad hoc networks (VANETs). Key issues in VANETs are high mobility, restriction of road setup, frequent topology variations, failed network links, and timely communication of data, which make the routing of packets to a particular destination problematic. To address these issues, a new dependable routing algorithm is proposed, which utilizes a wireless communication system between vehicles in urban vehicular networks. This routing is position-based, known as the maximum distance on-demand routing algorithm (MDORA). It aims to find an optimal route on a hop-by-ho

... Show More
View Publication Preview PDF
Scopus (27)
Crossref (19)
Scopus Clarivate Crossref
Publication Date
Tue Oct 09 2018
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
COMMON AND NEW RECORDS OF LICHENS FROM IRAQI KURDISTAN REGION, IRAQ
...Show More Authors

Based on collections made during March to September 2012. A totals of 58 species belong to 33 genera were identified from extra north to extra south of Erbil governorate, among them 30 species are registered as a new record to flora of Iraq. Most attention was paid to the most common and abundant lichens that present almost in most locations, which were Collema cristatum, Diploschistes scruposus, Lecanora dispersa, Lecanora murales, Pertusaria flavicunda, Placidium lacinulatum, Thelomma californicum and Verrucaria Maura.

 

View Publication Preview PDF
Publication Date
Tue Dec 20 2022
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
NEW RECORDS OF FREE-LIVING PROTOZOA (SARCODINA) FROM BAGHDAD CITY, IRAQ
...Show More Authors

Studies in Iraq that concerned identification of free-living Protozoa (sarcodina) are scarce; so the current study deals with these protozoan communities inhabiting the Tigris River in Baghdad City. Sampling collection stations have been selected at each of AL-Gheraiˈat and AL-Adhamiyah area adjacent to the river. Monthly intervals sampling with three samples were collected from each station from June to September 2020. Total of 23 sarcodina taxa were listed, out of them 5 taxa were new record to the Tigris River in Baghdad: Difflugia urceolata Carter, 1864 (Arcellinida, Difflugiidae), Heleopera perapetricola Leidy, 1879 (Arcellinida, Heleoperidae), Rhaphidiophrys pallida F.E. Schulze, 1874 (Centrohelida, Raphidiophridae), Saccamoeba sp

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Thu Jun 20 2019
Journal Name
Baghdad Science Journal
A Comparative Analysis of the Zernike Moments for Single Object Retrieval
...Show More Authors

Zernike Moments has been popularly used in many shape-based image retrieval studies due to its powerful shape representation. However its strength and weaknesses have not been clearly highlighted in the previous studies. Thus, its powerful shape representation could not be fully utilized. In this paper, a method to fully capture the shape representation properties of Zernike Moments is implemented and tested on a single object for binary and grey level images. The proposed method works by determining the boundary of the shape object and then resizing the object shape to the boundary of the image. Three case studies were made. Case 1 is the Zernike Moments implementation on the original shape object image. In Case 2, the centroid of the s

... Show More
View Publication Preview PDF
Crossref (2)
Clarivate Crossref
Publication Date
Sun Sep 30 2018
Journal Name
Pharmacy Practice
Measuring the health literacy level of Arabic speaking population in Saudi Arabia using translated health literacy instruments
...Show More Authors

View Publication
Scopus (20)
Crossref (10)
Scopus Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Tue Sep 10 2019
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A classification model on tumor cancer disease based mutual information and firefly algorithm
...Show More Authors

View Publication
Scopus (15)
Crossref (6)
Scopus Crossref