Preferred Language
Articles
/
ijs-3919
Identifying Digital Forensic Frameworks Based on Processes Models
...Show More Authors

Digital forensic is part of forensic science that implicitly covers crime related to computer and other digital devices. It‟s being for a while that academic studies are interested in digital forensics. The researchers aim to find out a discipline based on scientific structures that defines a model reflecting their observations. This paper suggests a model to improve the whole investigation process and obtaining an accurate and complete evidence and adopts securing the digital evidence by cryptography algorithms presenting a reliable evidence in a court of law. This paper presents the main and basic concepts of the frameworks and models used in digital forensics investigation.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 14 2021
Journal Name
Iraqi Journal Of Science
Network Authentication Protocol Based on Secure Biometric NIDN
...Show More Authors

In this paper an authentication based finger print biometric system is proposed with personal identity information of name and birthday. A generation of National Identification Number (NIDN) is proposed in merging of finger print features and the personal identity information to generate the Quick Response code (QR) image that used in access system. In this paper two approaches are dependent, traditional authentication and strong identification with QR and NIDN information. The system shows accuracy of 96.153% with threshold value of 50. The accuracy reaches to 100% when the threshold value goes under 50.

View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Journal Of Physics: Conference Series
Improve topic modeling algorithms based on Twitter hashtags
...Show More Authors
Abstract<p>Today with increase using social media, a lot of researchers have interested in topic extraction from Twitter. Twitter is an unstructured short text and messy that it is critical to find topics from tweets. While topic modeling algorithms such as Latent Semantic Analysis (LSA) and Latent Dirichlet Allocation (LDA) are originally designed to derive topics from large documents such as articles, and books. They are often less efficient when applied to short text content like Twitter. Luckily, Twitter has many features that represent the interaction between users. Tweets have rich user-generated hashtags as keywords. In this paper, we exploit the hashtags feature to improve topics learned</p> ... Show More
View Publication
Scopus (18)
Crossref (15)
Scopus Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
Optimum Median Filter Based on Crow Optimization Algorithm
...Show More Authors

          A novel median filter based on crow optimization algorithms (OMF) is suggested to reduce the random salt and pepper noise and improve the quality of the RGB-colored and gray images. The fundamental idea of the approach is that first, the crow optimization algorithm detects noise pixels, and that replacing them with an optimum median value depending on a criterion of maximization fitness function. Finally, the standard measure peak signal-to-noise ratio (PSNR), Structural Similarity, absolute square error and mean square error have been used to test the performance of suggested filters (original and improved median filter) used to removed noise from images. It achieves the simulation based on MATLAB R2019b and the resul

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Apr 23 2017
Journal Name
International Conference Of Reliable Information And Communication Technology
Classification of Arabic Writer Based on Clustering Techniques
...Show More Authors

Arabic text categorization for pattern recognitions is challenging. We propose for the first time a novel holistic method based on clustering for classifying Arabic writer. The categorization is accomplished stage-wise. Firstly, these document images are sectioned into lines, words, and characters. Secondly, their structural and statistical features are obtained from sectioned portions. Thirdly, F-Measure is used to evaluate the performance of the extracted features and their combination in different linkage methods for each distance measures and different numbers of groups. Finally, experiments are conducted on the standard KHATT dataset of Arabic handwritten text comprised of varying samples from 1000 writers. The results in the generatio

... Show More
Scopus (5)
Scopus
Publication Date
Wed Jun 30 2021
Journal Name
Iraqi Geological Journal
Assessment of Groundwater Quality for Drinking Purposes Using Water Quality Index, and Identifying the Affecting Mechanism in Rashdiya, Central Iraq
...Show More Authors

Groundwater is an important resource that can be used for various purposes. Various factors can change the chemistry of the GW, such as the chemical composition of an aquifer as well as the leaching of human waste into groundwater. The study area is a barren land covered by some sabkhas, in addition to some agricultural fields. The study aims to assess groundwater quality for drinking purposes using the Water Quality Index. The groundwater is chemically heterogeneous and has a wide quality range from very poor to excellent. Evaporation appears to be the controlling factor among the other shallow waters, while relatively deep water is related to rock-soil dominance. Rocks, land use and land cover have helped control the groundwater q

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Mon Nov 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
The correlation between identifying needs and choosing the appropriate productive art for use / primary health care centers as an example
...Show More Authors

        The purpose of the study is to identify the need to improve health services in Iraq by determining the efficiency of service in health care centres and working on exploiting limited resources through choosing the most efficient technological art represented by using precast concrete technology to fill the shortfall in the establishment health centres for primary care and to explain the impact of this on saving resources, time, and increasing production efficiency. To achieve this, the quantitative analysis adopted as a methodology in the study by determining the size of the deficit in the infrastructure of health centres for primary care according to the standard of a he

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 30 2012
Journal Name
Al-kindy College Medical Journal
Assessment of Neck Circumference Measurement among Type 2 Diabetic Patients in Identifying: Obesity and the Likelihood of Developing Metabolic syndrome.
...Show More Authors

Background: Obesity is an evolving major health problem in both developed and developing countries. Traditional obesity indices as body mass index, waist circumference, waist-hip-ratio are well known measures to identify obese subjects, however, neck circumference as an index of upper-body obesity was found to be a simple and time-saving screening measure that can be used to identify obesity and the likelihood of developing metabolic syndrome in type 2 diabetic patients.
Aim: to investigate the relationship of neck circumference (NC) to obesity and metabolic syndrome in Iraqi subjects with type 2 diabetes.
Methods: The study group included 90 type 2 diabetic subjects (48 men and 42 women) aged 30-68 years. The subjects were those w

... Show More
View Publication Preview PDF
Publication Date
Thu Apr 13 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Reducing False Notification in Identifying Malicious Application Programming Interface(API) to Detect Malwares Using Artificial Neural Network with Discriminant Analysis
...Show More Authors

 This paper argues the accuracy of behavior based detection systems, in which the Application Programming Interfaces (API) calls are analyzed and monitored. The work identifies the problems that affecting the accuracy of such detection models. The work was extracted (4744) API call through analyzing. The new approach provides an accurate discriminator and can reveal malicious API in PE malware up to 83.2%. Results of this work evaluated with Discriminant Analysis

View Publication Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Ibn Al-haitham Jour. For Pure & Appl. Sci.
Reducing False Notification in Identifying Malicious Application Programming Interface(API) to Detect Malwares Using Artificial Neural Network with Discriminant Analysis
...Show More Authors

Publication Date
Mon Jan 30 2023
Journal Name
Iraqi Journal Of Science
Secure Big Data Transmission based on Modified Reverse Encryption and Genetic Algorithm
...Show More Authors

      The modern systems that have been based upon the hash function are more suitable compared to the conventional systems; however, the complicated algorithms for the generation of the invertible functions have a high level of time consumption. With the use of the GAs, the key strength is enhanced, which results in ultimately making the entire algorithm sufficient. Initially, the process of the key generation is performed by using the results of n-queen problem that is solved by the genetic algorithm, with the use of a random number generator and through the application of the GA operations. Ultimately, the encryption of the data is performed with the use of the Modified Reverse Encryption Algorithm (MREA). It was noticed that the

... Show More
View Publication Preview PDF
Scopus Crossref