Preferred Language
Articles
/
iBZQJIwBVTCNdQwCHPhL
A Partial Face Encryption in Real World Experiences Based on Features Extraction from Edge Detection
...Show More Authors

User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract features vectors from user faces. Moreover, the relevance of the suggested generating key is led to a crucial role in security improvement by producing them as difficult to intruders. According to PSNR values, the recommended encryption algorithms provided an adequate outcome in the encryption, they had a lower encrypting duration and a larger encrypting impact.

Scopus Crossref
View Publication
Publication Date
Thu Feb 24 2022
Journal Name
Journal Of Educational And Psychological Researches
Statistical analysis from a Gender perspective
...Show More Authors

This research is a theoretical study that deals with the presentation of the literature of statistical analysis from the perspective of gender or what is called Engendering Statistics. The researcher relied on a number of UN reports as well as some foreign sources to conduct the current study. Gender statistics are defined as statistics that reflect the differences and inequality of the status of women and men overall domains of life, and their importance stems from the fact that it is an important tool in promoting equality as a necessity for the process of sustainable development and the formulation of national and effective development policies and programs. The empowerment of women and the achievement of equality between men and wome

... Show More
View Publication Preview PDF
Publication Date
Thu Feb 03 2022
Journal Name
Open Access Macedonian Journal Of Medical Sciences
Femtosecond Small Incision Lenticular Extraction in comparison to Femtosecond Laser In situ Keratomileusis Regarding Dry Eye Disease
...Show More Authors

 Abstract Objective: Comparison of femtosecond small incision lenticule extraction (FS-SMILE) versus Femtosecond laser Insitu keratomileusis (FS-LASIK) regarding dry eye disease (DED) and corneal sensitivity (CS) after those refractive surgeries. Methods: A comparative prospective study conducted for a period of 2 years; from March 2017 until February, 2019. Enrolled patients were diagnosed with myopia. Fifty patients (100 eyes) were scheduled for bilateral FS-SMILE and the other 50 patients (100 eyes) had been scheduled for bilateral FS-LASIK. Both groups were followed for six months after surgery. The age, gender, and preoperative refraction for both groups were matched. Complete evaluation of dry eye disease had been

... Show More
Crossref
Publication Date
Thu Feb 03 2022
Journal Name
Open Access Macedonian Journal Of Medical Sciences
Femtosecond Small Incision Lenticular Extraction in comparison to Femtosecond Laser In situ Keratomileusis Regarding Dry Eye Disease
...Show More Authors

 Abstract Objective: Comparison of femtosecond small incision lenticule extraction (FS-SMILE) versus Femtosecond laser Insitu keratomileusis (FS-LASIK) regarding dry eye disease (DED) and corneal sensitivity (CS) after those refractive surgeries. Methods: A comparative prospective study conducted for a period of 2 years; from March 2017 until February, 2019. Enrolled patients were diagnosed with myopia. Fifty patients (100 eyes) were scheduled for bilateral FS-SMILE and the other 50 patients (100 eyes) had been scheduled for bilateral FS-LASIK. Both groups were followed for six months after surgery. The age, gender, and preoperative refraction for both groups were matched. Complete evaluation of dry eye disease had been

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Bulletin Of Electrical Engineering And Informatics
A novel data offloading scheme for QoS optimization in 5G based internet of medical things
...Show More Authors

The internet of medical things (IoMT), which is expected the lead to the biggest technology in worldwide distribution. Using 5th generation (5G) transmission, market possibilities and hazards related to IoMT are improved and detected. This framework describes a strategy for proactively addressing worries and offering a forum to promote development, alter attitudes and maintain people's confidence in the broader healthcare system without compromising security. It is combined with a data offloading system to speed up the transmission of medical data and improved the quality of service (QoS). As a result of this development, we suggested the enriched energy efficient fuzzy (EEEF) data offloading technique to enhance the delivery of dat

... Show More
View Publication
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Sat Jun 01 2024
Journal Name
Iaes International Journal Of Artificial Intelligence (ij-ai)
A novel fusion-based approach for the classification of packets in wireless body area networks
...Show More Authors

This abstract focuses on the significance of wireless body area networks (WBANs) as a cutting-edge and self-governing technology, which has garnered substantial attention from researchers. The central challenge faced by WBANs revolves around upholding quality of service (QoS) within rapidly evolving sectors like healthcare. The intricate task of managing diverse traffic types with limited resources further compounds this challenge. Particularly in medical WBANs, the prioritization of vital data is crucial to ensure prompt delivery of critical information. Given the stringent requirements of these systems, any data loss or delays are untenable, necessitating the implementation of intelligent algorithms. These algorithms play a pivota

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Bulletin Of Electrical Engineering And Informatics
A novel data offloading scheme for QoS optimization in 5G based internet of medical things
...Show More Authors

The internet of medical things (IoMT), which is expected the lead to the biggest technology in worldwide distribution. Using 5th generation (5G) transmission, market possibilities and hazards related to IoMT are improved and detected. This framework describes a strategy for proactively addressing worries and offering a forum to promote development, alter attitudes and maintain people's confidence in the broader healthcare system without compromising security. It is combined with a data offloading system to speed up the transmission of medical data and improved the quality of service (QoS). As a result of this development, we suggested the enriched energy efficient fuzzy (EEEF) data offloading technique to enhance the delivery of dat

... Show More
Publication Date
Thu Nov 02 2023
Journal Name
Al-rafidain Journal Of Medical Sciences ( Issn 2789-3219 )
Appraising the Role of Pharmacists in Medication Reconciliation at Hospital Discharge: A Field-Based Study
...Show More Authors

Objective: To measure the effect of the pharmacist-led medication reconciliation service before hospital discharge on preventing potential medication errors. Methods: This behavioral interventional study took place in a public teaching hospital in Iraq between December 2022 and January 2023. It included inpatients who were taking four or more medications upon discharge from the internal medicine ward and the cardiac care unit. The researcher provided the patients with a medication reconciliation form and reconciliation form (including medication regimen and pharmacist instructions) before discharging them home. Any discrepancies between the patients’ understanding and the actual medication recommendations prescribed by the physici

... Show More
View Publication
Scopus (6)
Crossref (3)
Scopus Crossref
Publication Date
Fri Dec 30 2022
Journal Name
Journal Of The College Of Education For Women
Constructing Imminent Carcinogenic Attack in English and Arabic Scientific Discourse: A Corpus-Based Contrastive Study
...Show More Authors

Cancer is one of the critical health concerns. Health authorities around the world have devoted great attention to cancer and cancer causing factors to achieve control against the increasing rate of cancer. Carcinogens are the most salient factors that are accused of causing a considerable rate of cancer cases. Scientists, in different fields of knowledge, keep warning people of the imminent attack of carcinogens which are surrounding people in the environment and may launch their attack at any moment. The present paper aims to investigate the linguistic construction of the imminent carcinogen attack in English and Arabic scientific discourse. Such an investigation contributes to enhancing the scientists’ awareness of the linguistic co

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 10 2025
Journal Name
Proceedings On Engineering Sciences
WAREHOUSE IN INDUSTRY 4.0 BASED DRONE, COMPUTER VISION, AND ARTIFICIAL INTELLIGENCE TECHNOLOGIES: A LITERATURE REVIEW
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Thu Aug 02 2012
Journal Name
International Journal Of Advanced Research In Computer Science
User Authentication based on Keystroke Dynamics Using Backpropagation Network
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi

... Show More