Preferred Language
Articles
/
hRd9NY8BVTCNdQwCXmFH
A cluster-based proxy mobile IPv6 for IP-WSNs
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Mon Jul 01 2019
Journal Name
Iop Conference Series: Materials Science And Engineering
On Estimation of the Stress – Strength Reliability Based on Lomax Distribution
...Show More Authors
Abstract<p>The present paper concerns with the problem of estimating the reliability system in the stress – strength model under the consideration non identical and independent of stress and strength and follows Lomax Distribution. Various shrinkage estimation methods were employed in this context depend on Maximum likelihood, Moment Method and shrinkage weight factors based on Monte Carlo Simulation. Comparisons among the suggested estimation methods have been made using the mean absolute percentage error criteria depend on MATLAB program.</p>
View Publication
Scopus (8)
Crossref (4)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Enhancement of lsb audio steganography based on carrier and message characteristics
...Show More Authors

Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods

... Show More
Scopus (17)
Scopus
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
CTJ: Input-Output Based Relation Combinatorial Testing Strategy Using Jaya Algorithm
...Show More Authors

Software testing is a vital part of the software development life cycle. In many cases, the system under test has more than one input making the testing efforts for every exhaustive combination impossible (i.e. the time of execution of the test case can be outrageously long). Combinatorial testing offers an alternative to exhaustive testing via considering the interaction of input values for every t-way combination between parameters. Combinatorial testing can be divided into three types which are uniform strength interaction, variable strength interaction and input-output based relation (IOR). IOR combinatorial testing only tests for the important combinations selected by the tester. Most of the researches in combinatorial testing appli

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
The Ocular Surface
Detecting dry eye from ocular surface videos based on deep learning
...Show More Authors

View Publication
Scopus (20)
Crossref (19)
Scopus Clarivate Crossref
Publication Date
Tue Apr 11 2023
Journal Name
Sensors
EEG Signal Complexity Measurements to Enhance BCI-Based Stroke Patients’ Rehabilitation
...Show More Authors

The second leading cause of death and one of the most common causes of disability in the world is stroke. Researchers have found that brain–computer interface (BCI) techniques can result in better stroke patient rehabilitation. This study used the proposed motor imagery (MI) framework to analyze the electroencephalogram (EEG) dataset from eight subjects in order to enhance the MI-based BCI systems for stroke patients. The preprocessing portion of the framework comprises the use of conventional filters and the independent component analysis (ICA) denoising approach. Fractal dimension (FD) and Hurst exponent (Hur) were then calculated as complexity features, and Tsallis entropy (TsEn) and dispersion entropy (DispEn) were assessed as

... Show More
View Publication
Scopus (27)
Crossref (25)
Scopus Clarivate Crossref
Publication Date
Thu Feb 01 2024
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Wireless channel-based ciphering key generation: effect of aging and treatment
...Show More Authors

Key generation for data cryptography is vital in wireless communications security. This key must be generated in a random way so that can not be regenerated by a third party other than the intended receiver. The random nature of the wireless channel is utilized to generate the encryption key. However, the randomness of wireless channels deteriorated over time due to channel aging which casing security threats, particularly for spatially correlated channels. In this paper, the effect of channel aging on the ciphering key generations is addressed. A proposed method to randomize the encryption key each coherence time is developed which decreases the correlation between keys generated at consecutive coherence times. When compared to the

... Show More
View Publication
Scopus (6)
Crossref (6)
Scopus Crossref
Publication Date
Tue Feb 26 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Use the Style of the Activity Based Cost time Drivine (TDABC) and its Impact on the Untapped Resources: Empirical study in the General Company for Textile Industries - Wasit
...Show More Authors

   The research aims to identify the importance of using the style of the cost on the basis of activity -oriented in time TDABC and its role in determining the cost of products more equitably and thus its impact on the policy of allocation of resources through the reverse of the changes that occur on an ongoing basis in the specification of the products and thus the change in the nature and type of operations . The research was conducted at the General Company for Textile Industries Wasit / knitting socks factory was based on research into the hypothesis main of that ( possible to calculate the cost of activities that cause the production through the time it takes to run these activities can then be re- distributed product cost

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Aug 01 2020
Journal Name
International Journal Of Psychosocial Rehabilitation
Building and legalizing a test for evaluating the tactical learning of the footwork for the foil fencer in the fencing game
...Show More Authors

AA wahid, journal mustansiriyah of sports science, 2023

View Publication
Publication Date
Sun Dec 20 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Negotiating policies for the granting of investment loans: A CASE STUDY ON IRAQI MIDDLE EAST BANK FOR INVESTMENT& COMMERCIAL GULF BANK
...Show More Authors

The negotiation phase is gaining great importance in investment loans due to the magnitude of the amounts awarded and the need to obtain adequate lending guarantees and the development of better conditions, and this requires that negotiating policy with fixed principles that balance between meeting the demands of customers and maintain market share and achieve profits and avoid defaults and losses the bank, and so I have touched Find the concept of investment loans and procedures for granting and the concept of the negotiation process for the granting of loans. The practical side to ensure the preparation of examination form consists of questions commensurate with the methodology developed by the researchers, were directed to the officia

... Show More
View Publication Preview PDF