Preferred Language
Articles
/
ijs-401
Robust and Efficient Dynamic Stream Cipher Cryptosystem
...Show More Authors

In this paper a new technique based on dynamic stream cipher algorithm is introduced. The mathematical model of dynamic stream cipher algorithm is based on the idea of changing the structure of the combined Linear Feedback Shift Registers (LFSR's) with each change in basic and message keys to get more complicated encryption algorithm, and this is done by use a bank of LFSR's stored in protected file and we select a collection of LFSR's randomly that are used in algorithm to generate the encryption (decryption) key.

We implement Basic Efficient Criteria on the suggested Key Generator (KG) to test the output key results. The results of applying BEC prove the robustness and efficiency of the proposed stream cipher cryptosystem.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Sep 30 2021
Journal Name
Iraqi Journal Of Science
An Efficient Method for Stamps Recognition Using Histogram Moment with Haar Wavelet Sub-bands
...Show More Authors

     One major problem facing some environments, such as insurance companies and government institutions, is when a massive amount of documents has to be processed every day. Thus, an automatic stamp recognition system is necessary. The extraction and recognition of a general stamp is not a simple task because it may have various shapes, sizes, backgrounds, patterns, and colors. Moreover, the stamp can be printed on documents with bad quality and rotation with various angles. Our proposed method presents a new approach for the preprocessing and recognition of color stamp images. It consists of four stages, which are stamp extraction, preprocessing, feature extraction, and matching. Stamp extraction is achieved to isol

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jun 11 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
An Efficient Single Stage Shrinkage Estimator for the Scale parameter of Inverted Gamma Distribution
...Show More Authors

 The present  paper agrees  with estimation of scale parameter θ of the Inverted Gamma (IG) Distribution when the shape parameter α is known (α=1), bypreliminarytestsinglestage shrinkage estimators using  suitable  shrinkage weight factor and region.  The expressions for the Bias, Mean Squared Error [MSE] for the proposed estimators are derived. Comparisons between the considered estimator with the usual estimator (MLE) and with the existing estimator  are performed .The results are presented in attached tables.

View Publication Preview PDF
Crossref
Publication Date
Fri Jun 24 2022
Journal Name
Iraqi Journal Of Science
The Design of Efficient Algorithm for Face Recognition Based on Hybrid PCA-Wavelet Transform
...Show More Authors

In modern times face recognition is one of the vital sides for computer vision. This is due to many reasons involving availability and accessibility of technologies and commercial applications. Face recognition in a brief statement is robotically recognizing a person from an image or video frame. In this paper, an efficient face recognition algorithm is proposed based on the benefit of wavelet decomposition to extract the most important and distractive features for the face and Eigen face method to classify faces according to the minimum distance with feature vectors. Faces94 data base is used to test the method. An excellent recognition with minimum computation time is obtained with accuracy reaches to 100% and recognition time decrease

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 31 2021
Journal Name
International Journal Of Intelligent Engineering And Systems
Performance Analysis for Hybrid Massive MIMO FSO/RF Links Based on Efficient Channel Codes
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sun Mar 04 2018
Journal Name
Iraqi Journal Of Science
Efficient Method to Segment Objects from Images Based on Enhanced Connected Component Labeling algorithm
...Show More Authors

This paper include the problem of segmenting an image into regions represent (objects), segment this object by define boundary between two regions using a connected component labeling. Then develop an efficient segmentation algorithm based on this method, to apply the algorithm to image segmentation using different kinds of images, this algorithm consist four steps at the first step convert the image gray level the are applied on the image, these images then in the second step convert to binary image, edge detection using Canny edge detection in third Are applie the final step is images. Best segmentation rates are (90%) obtained when using the developed algorithm compared with (77%) which are obtained using (ccl) before enhancement.

View Publication Preview PDF
Publication Date
Tue Dec 01 2020
Journal Name
Baghdad Science Journal
Emergency Messages Dissemination Challenges Through Connected Vehicles for Efficient Intelligent Transportation Systems: A Review
...Show More Authors

Recent growth in transport and wireless communication technologies has aided the evolution of Intelligent Transportation Systems (ITS). The ITS is based on different types of transportation modes like road, rail, ocean and aviation. Vehicular ad hoc network (VANET) is a technology that considers moving vehicles as nodes in a network to create a wireless communication network. VANET has emerged as a resourceful approach to enhance the road safety. Road safety has become a critical issue in recent years. Emergency incidents such as accidents, heavy traffic and road damages are the main causes of the inefficiency of the traffic flow. These occurrences do not only create the congestion on the road but also increase the fuel consumption and p

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sun Sep 01 2024
Journal Name
Journal Of Energy Storage
Nanofluid-assisted enhanced sealing security for efficient geological hydrogen storage in Saudi Arabian basalt
...Show More Authors

The modification of hydrophobic rock surfaces to the water-wet state via nanofluid treatment has shown promise in enhancing their geological storage capabilities and the efficiency of carbon dioxide (CO2) and hydrogen (H2) containment. Despite this, the specific influence of silica (SiO2) nanoparticles on the interactions between H2, brine, and rock within basaltic formations remains underexplored. The present study focuses on the effect of SiO2 nanoparticles on the wettability of Saudi Arabian basalt (SAB) under downhole conditions (323 K and pressures ranging from 1 to 20 MPa) by using the tilted plate technique to measure the contact angles between H2/brine and the rock surfaces. The findings reveal that the SAB's hydrophobicity intensif

... Show More
View Publication
Scopus (6)
Scopus Clarivate Crossref
Publication Date
Wed Nov 16 2016
Journal Name
Eurasip Journal On Wireless Communications And Networking
Evaluation of efficient vehicular ad hoc networks based on a maximum distance routing algorithm
...Show More Authors

Traffic management at road intersections is a complex requirement that has been an important topic of research and discussion. Solutions have been primarily focused on using vehicular ad hoc networks (VANETs). Key issues in VANETs are high mobility, restriction of road setup, frequent topology variations, failed network links, and timely communication of data, which make the routing of packets to a particular destination problematic. To address these issues, a new dependable routing algorithm is proposed, which utilizes a wireless communication system between vehicles in urban vehicular networks. This routing is position-based, known as the maximum distance on-demand routing algorithm (MDORA). It aims to find an optimal route on a hop-by-ho

... Show More
View Publication Preview PDF
Scopus (26)
Crossref (18)
Scopus Clarivate Crossref
Publication Date
Sat Jan 26 2019
Journal Name
Association Of Arab Universities Journal Of Engineering Sciences
Secure Mobile Sink Node location in Wireless Sensor Network using Dynamic Routing Protocol
...Show More Authors

The important device in the Wireless Sensor Network (WSN) is the Sink Node (SN). That is used to store, collect and analyze data from every sensor node in the network. Thus the main role of SN in WSN makes it a big target for traffic analysis attack. Therefore, securing the SN position is a substantial issue. This study presents Security for Mobile Sink Node location using Dynamic Routing Protocol called (SMSNDRP), in order to increase complexity for adversary trying to discover mobile SN location. In addition to that, it minimizes network energy consumption. The proposed protocol which is applied on WSN framework consists of 50 nodes with static and mobile SN. The results havw shown in each round a dynamic change in the route to reach mobi

... Show More
Publication Date
Tue Mar 31 2015
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Performance of Corrosion Inhibitors Blend for Simulated Industrial Cooling Waters under Dynamic Conditions
...Show More Authors

   The inhibitive action of a blend of sodium nitrite/sodium hexametaphosphate (SN+SHMP) on corrosion of carbon steel in simulated cooling water systems (CWS) has been investigated by weight loss and electrochemical polarization technique. The effect of temperature, velocity, and salts concentrations on corrosion of carbon steel were studied in the absence and presence of mixed inhibiting blend. Also the effect of inhibitors blend concentrations (SN+SHMP), temperatures, and rotational velocity, i.e., Reynolds number (Re) on corrosion rate of carbon steel were investigated using Second-order Rotatable Design (Box-Wilson Design) in performing weight loss and corrosion potential approach. Electrochemical polarization measurements

... Show More
View Publication Preview PDF