Preferred Language
Articles
/
iBZQJIwBVTCNdQwCHPhL
A Partial Face Encryption in Real World Experiences Based on Features Extraction from Edge Detection
...Show More Authors

User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract features vectors from user faces. Moreover, the relevance of the suggested generating key is led to a crucial role in security improvement by producing them as difficult to intruders. According to PSNR values, the recommended encryption algorithms provided an adequate outcome in the encryption, they had a lower encrypting duration and a larger encrypting impact.

Scopus Crossref
View Publication
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
A Comparison Between the Theoretical Cross Section Based on the Partial Level Density Formulae Calculated by the Exciton Model with the Experimental Data for (_79^197)Au nucleus
...Show More Authors

In this paper, the theoretical cross section in pre-equilibrium nuclear reaction has been studied for the reaction  at energy 22.4 MeV. Ericson’s formula of partial level density PLD and their corrections (William’s correction and spin correction) have been substituted  in the theoretical cross section and compared with the experimental data for  nucleus. It has been found that the theoretical cross section with one-component PLD from Ericson’s formula when  doesn’t agree with the experimental value and when . There is little agreement only at the high value of energy range with  the experimental cross section. The theoretical cross section that depends on the one-component William's formula and on-component corrected to spi

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Mon Apr 15 2019
Journal Name
Proceedings Of The International Conference On Information And Communication Technology
A steganography based on orthogonal moments
...Show More Authors

View Publication
Scopus (24)
Crossref (19)
Scopus Clarivate Crossref
Publication Date
Tue Dec 16 2008
Journal Name
Journal Of Planner And Development
Housing finance and housing needs in Iraq with reference to some Arab experiences
...Show More Authors

the financial resources represent a basic factor of production ;It is obvious that the housing sector needs the resources to finance the building operation to produce all the housing units. Finance is the cornerstone of any housing strategy , as its successes dependent on the success of the financing methods and the creation of charnels and effective methods for the provision of the required finances for both individuals and instantly concerned with the production of housing units. The kinds of financial institutions vary from one country to another according to the nature of the economic and financial system. The lending conditions also vary as well as the capital cost of the housing units needed The housing operations is concer

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 10 2020
Journal Name
International Journal Of Pharmaceutical Research
Extraction, Purification of Alkaloid Compounds from Anastatica Hierochuntica and Studying its Effect on Liver Cancer Cells
...Show More Authors

The current study included the separation of three alkaloid compounds from Anastatica Hierochuntica and studied the effect of the these compounds on cancerous cells , specifically liver cancer it was found that compound number one is the most influential or inhibiting at 50 percent followed by compound number three when using concentration of 400 μg/mL.

Publication Date
Mon Nov 02 2020
Journal Name
International Journal Of Pharmaceutical Research
Extraction, Purification of Alkaloid Compounds from Anastatica Hierochuntica and Studying its Effect on Liver Cancer Cells
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Mon Jun 30 2014
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Kinetic of Alkaloids Extraction from Plant by Batch Pertraction in Rotating Discs Contactor
...Show More Authors

A liquid membrane process of Alkaloids extraction from Datura Innoxia solution was studied applying pertraction process in rotating discs contactor (RDC). Decane as a liquid membrane and dilute sulphuric acid as stripping solution were used. The effect of the fundamental parameters influencing the transport process, e.g. type of solvent used, effect of disks speed, amount of liquid membrane and effect of pH for feed and strip solution. The transport of alkaloids was analysed on the basis of kinetic laws of two consecutive irreversible first order reactions. Thus, the kinetic parameters (k1, k1, , tmax, and ) for the transport of alkaloids were determined. The effect of organic membrane type on percentage of Alkaloids transport was found

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 30 2014
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Kinetic of Alkaloids Extraction from Plant by Batch Pertraction in Rotating Discs Contactor
...Show More Authors

A liquid membrane process of Alkaloids extraction from Datura Innoxia solution was studied applying pertraction process in rotating discs contactor (RDC). Decane as a liquid membrane and dilute sulphuric acid as stripping solution were used. The effect of the fundamental parameters influencing the transport process, eg type of solvent used, effect of disks speed, amount of liquid membrane and effect of pH for feed and strip solution. The transport of alkaloids was analysed on the basis of kinetic laws of two consecutive irreversible first order reactions. Thus, the kinetic parameters (k1, k1,, tmax, and) for the transport of alkaloids were determined. The effect of organic membrane type on percentage of Alkaloids transport was found to be i

... Show More
Publication Date
Thu Nov 19 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Enhanced Multistage RSA Encryption Model
...Show More Authors

View Publication
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Mon Apr 23 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Detection of tox A gene in Pseudomonas aeruginosa that isolates from different clinical cases by using PCR.
...Show More Authors

       Current study obtained (75) isolate of Pseudomonas aeruginosa collected from different cases included : 28 isolates from otitis media, 23 isolates from burn infections, 10 isolates from wound infections, 8 isolates from urinary tract infections and 6 isolates from blood, during the period between 1/9/2014 to 1/11/2014

       The result revealed that the tox A gene was present in 54 isolates (72%) of Pseudomonas aeruginosa. The gel electrophoresis showed that the molecular weight of tox A gene was 352 bp. The result shows 17 isolates (60.71%) from otitis media has tox A gene, 1

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Cybersecurity And Information Management
Machine Learning-based Information Security Model for Botnet Detection
...Show More Authors

Botnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet

... Show More
View Publication
Scopus (7)
Crossref (4)
Scopus Crossref