Preferred Language
Articles
/
ijs-6005
Spam Filtering Approach based on Weighted Version of Possibilistic c-Means
...Show More Authors

A principal problem of any internet user is the increasing number of spam, which became a great problem today. Therefore, spam filtering has become a research fo-cus that attracts the attention of several security researchers and practitioners. Spam filtering can be viewed as a two-class classification problem. To this end, this paper proposes a spam filtering approach based on Possibilistic c-Means (PCM) algorithm and weighted distance coined as (WFCM) that can efficiently distinguish between spam and legitimate email messages. The objective of the formulated fuzzy problem is to construct two fuzzy clusters: spam and email clusters. The weight assignment is set by information gain algorithm. Experimental results on spam based benchmark dataset reveal that proper setting of feature-weight can improve the performance of the proposed spam filtering approach. Furthermore, the proposed spam filtering ap-proach performance is better than PCM and Naïve Bayes filtering technique.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 18 2020
Journal Name
Baghdad Science Journal
A Software Defined Network of Video Surveillance System Based on Enhanced Routing Algorithms
...Show More Authors

Software Defined Network (SDN) is a new technology that separate the ‎control plane from the data plane. SDN provides a choice in automation and ‎programmability faster than traditional network. It supports the ‎Quality of Service (QoS) for video surveillance application. One of most ‎significant issues in video surveillance is how to find the best path for routing the packets ‎between the source (IP cameras) and destination (monitoring center). The ‎video surveillance system requires fast transmission and reliable delivery ‎and high QoS. To improve the QoS and to achieve the optimal path, the ‎SDN architecture is used in this paper. In addition, different routing algorithms are ‎used with different steps. First, we eva

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Jan 30 2013
Journal Name
Al-kindy College Medical Journal
Using the Abbreviated Version of Modification of Diet in Renal Disease Formula as A Primary Estimate for the Prevalence of Undiagnosed Chronic Kidney Disease in Patients with Acute Stroke
...Show More Authors

Introduction: The association between acute stroke and
renal function is well known. The aim of this study is to
know which group of patients with acute stroke is more
likely to have undiagnosed Chronic Kidney Disease and
which risk factors are more likely to be associated with.
Methods:We studied 77 patients who were diagnosed to
have an acute stroke.Patients were selected between
April2011andJune 2011 using the " 4-variable
Modification of
Diet in Renal Disease Formula " which estimates
Glomerular Filtration Rate using four variables :serum
creatinine ,age ,race and gender.
Results :The study included 38 male and 39 females
patients ,aged (35-95) years. Glomerular Filtration Rate in
patients wi

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 28 2023
Journal Name
Iraqi Journal Of Science
Applications of the Finite Operator〖 〗_3 E_2 (■(q^(-N),a,b@c,d);q,-fθ) for the Polynomials B_n (a,b,c,d,f,x,y|q)
...Show More Authors

     In this work,   polynomials  and the finite q-exponential operator  are constructed. The operator  is used to combine an operator proof of the generating function with its extension, Mehler's formula with its extension and Roger's formula for the polynomials . The generating function with its extension,  Mehler's formula with its extension and Rogers formula for Al-Salam-Carlitz polynomials  are deduced by giving special values to polynomials .

View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Thu Nov 08 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Health- related quality of life for adult patient with chronic viral hepatitis B and C
...Show More Authors

Objective(s): This study aims to assess health related quality of life among Iraqi patients with chronic viral hepatitis
B and C also to find out the relationship between health related quality of life and patients demographic
characteristic and to design a new measurement scale for assessing QoL among viral hepatitis B and C patients
which can be suitable to be adopted for Iraqi patients
Methodology: A descriptive quantitative study is carried out at Gastroenterology and Hepatology Teaching
Hospital from February, 1st, 2011 to August 30th 2011, Anon probability (purposive sample) of (100) chronic viral
hepatitis B and C persons , who were clients of Gastroenterology and Hepatology Teaching Hospital / outpatient
clin

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 30 2022
Journal Name
Iraqi Journal Of Science
A Review on Face Detection Based on Convolution Neural Network Techniques
...Show More Authors

     Face detection is one of the important applications of biometric technology and image processing. Convolutional neural networks (CNN) have been successfully used with great results in the areas of image processing as well as pattern recognition. In the recent years, deep learning techniques specifically CNN techniques have achieved marvellous accuracy rates on face detection field. Therefore, this study provides a comprehensive analysis of face detection research and applications that use various CNN methods and algorithms. This paper presents ten of the most recent studies and illustrate the achieved performance of each method. 

View Publication Preview PDF
Scopus (10)
Crossref (3)
Scopus Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Hiding Techniques for Dynamic Encryption Text based on Corner Point
...Show More Authors

Hiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.

View Publication Preview PDF
Scopus (10)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Jun 30 2015
Journal Name
Al-khwarizmi Engineering Journal
Multi-Focus Image Fusion Based on Pixel Significance Using Counterlet Transform
...Show More Authors

Abstract

 The objective of image fusion is to merge multiple sources of images together in such a way that the final representation contains higher amount of useful information than any input one.. In this paper, a weighted average fusion method is proposed. It depends on using weights that are extracted from source images using counterlet transform. The extraction method is done by making the approximated transformed coefficients equal to zero, then taking the inverse counterlet transform to get the details of the images to be fused. The performance of the proposed algorithm has been verified on several grey scale and color test  images, and compared with some present methods.

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2019
Journal Name
Gazi University Journal Of Science
Lower Separation Axioms in C ̌ech Fuzzy Soft Closure Spaces
...Show More Authors

View Publication
Scopus (5)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Sep 29 2019
Journal Name
Iraqi Journal Of Science
Intelligent TRIPLE DES with N Round Based on Genetic Algorithm
...Show More Authors

     This work presents an approach for the applying Triple DES (TRIPLE DES) based on using genetic algorithm by adding intelligent feature for TRIPLE DES with N round for genetic algorithm. Encapsulated cipher file with special program which send an acknowledgment to a sender to know who decipher or  broken to  crash it , Thus it is considered as the initial step to improve privacy. The outcome for proposed system gives a good indication that it is a promising system compared with other type of cipher system.

View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More