Preferred Language
Articles
/
iBZQJIwBVTCNdQwCHPhL
A Partial Face Encryption in Real World Experiences Based on Features Extraction from Edge Detection
...Show More Authors

User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract features vectors from user faces. Moreover, the relevance of the suggested generating key is led to a crucial role in security improvement by producing them as difficult to intruders. According to PSNR values, the recommended encryption algorithms provided an adequate outcome in the encryption, they had a lower encrypting duration and a larger encrypting impact.

Scopus Crossref
View Publication
Publication Date
Tue Oct 26 2021
Journal Name
Remote Sensing Technologies And Applications In Urban Environments Vi
DTM Extraction and building detection in DSMs having large holes
...Show More Authors

View Publication
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Apr 05 2025
Journal Name
Iraqi Journal Of Science
Intrusion Detection Approach Based on DNA Signature
...Show More Authors

View Publication
Publication Date
Thu Feb 28 2019
Journal Name
Multimedia Tools And Applications
Shot boundary detection based on orthogonal polynomial
...Show More Authors

View Publication
Scopus (41)
Crossref (35)
Scopus Clarivate Crossref
Publication Date
Mon Oct 01 2018
Journal Name
2018 International Conference On Advanced Science And Engineering (icoase)
Real-Time Face Tracking and Recognition System Using Kanade-Lucas-Tomasi and Two-Dimensional Principal Component Analysis
...Show More Authors

View Publication
Scopus (12)
Crossref (6)
Scopus Crossref
Publication Date
Sun May 01 2016
Journal Name
2016 Al-sadeq International Conference On Multidisciplinary In It And Communication Science And Applications (aic-mitcsa)
Landsat-8 (OLI) classification method based on tasseled cap transformation features
...Show More Authors

View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Baghdad Science Journal
A Study on Co – odd (even) Sum Degree Edge Domination Number in Graphs
...Show More Authors

 An edge dominating set    of a graph  is said to be an odd (even) sum degree edge dominating set (osded (esded) - set) of G if the sum of the degree of all edges in X is an odd (even) number. The odd (even) sum degree edge domination number  is the minimum cardinality taken over all odd (even) sum degree edge dominating sets of G and is defined as zero if no such odd (even) sum degree edge dominating set exists in G. In this paper, the odd (even) sum degree domination concept is extended on the co-dominating set E-T of a graph G, where T is an edge dominating set of G.  The corresponding parameters co-odd (even) sum degree edge dominating set, co-odd (even) sum degree edge domination number and co-odd (even) sum degree edge domin

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Evaluation Tv- Image Quality for Different Cable Signal Transmission Resistance Based on Contrast Edge Algorithm
...Show More Authors

Some degree of noise is always present in any electronic device that
transmits or receives a signal . For televisions, this signal i has been to s the
broadcast data transmitted over cable-or received at the antenna; for digital
cameras, the signal is the light which hits the camera sensor. At any case, noise
is unavoidable. In this paper, an electronic noise has been generate on
TV-satellite images by using variable resistors connected to the transmitting cable
. The contrast of edges has been determined. This method has been applied by
capturing images from TV-satellite images (Al-arabiya channel) channel with
different resistors. The results show that when increasing resistance always
produced higher noise f

... Show More
View Publication Preview PDF
Publication Date
Thu Feb 01 2024
Journal Name
Baghdad Science Journal
A Kinetic Study on Microwave- assisted Extraction of Bioactive Compounds from Rosmarinus Officinalis L
...Show More Authors

Due to the importance of the extraction process in many engineering and medical industries, in addition to great interest in medicinal plants, in this research, microwave-assisted extraction has been applied to extract some active compounds from Rosmarinus officinalis leaves.  The optimal extraction conditions were then determined by calculating the ratio and extraction efficiency. The process has also been described through kinetic study by applying five  kinetic models, the Hyperbolic diffusion model,  Power low model, the First order reaction  model, Elovich's model, and Fick's second law diffusion model and determining their compatibility with the studies operation, and determining the kinetic constants for each model. The result

... Show More
View Publication Preview PDF
Scopus Crossref