Preferred Language
Articles
/
ixZUJIwBVTCNdQwCUviO
An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments
...Show More Authors

Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions on bits are applied to create a key used for encrypting the edge image. Four randomness tests are passed through NIST randomness tests to ensure whether the generated key is accepted as true. This process is reversible in the state of decryption to retrieve the original image. The encryption image that will be gained can be used in any cyber security field such as healthcare organization. The comparative experiments prove that the proposed algorithm improves the encryption efficiency has a good security performance, and the encryption algorithm has a higher information entropy 7.42 as well as a lower correlation coefficient 0.653.

Scopus Clarivate Crossref
View Publication
Publication Date
Sat Oct 01 2011
Journal Name
Journal Of Engineering
IMPLEMENTATION OF GYPSEOUS SOIL-ASPHALT STABILIZATION TECHNIQUE FOR BASE COURSE CONSTRUCTION
...Show More Authors

The aim of this research work is to study the effect of stabilizing gypseous soil, which covers
vast areas in the middle, west and south parts of Iraq, using liquid asphalt on its strength properties
to be used as a base course layer replacing the traditional materials of coarse aggregate and broken
stones which are scarce at economical prices and hauling distances.
Gypseous soil brought from Al-Ramadi City, west of Iraq, with gypsum content of 66.65%,
medium curing cutback asphalt (MC-30), and hydrated lime are used in this study.
The conducted tests on untreated and treated gypseous soil with different percentages of medium
curing cutback asphalt (MC-30), water, and lime were: unconfined compression strength, and o

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Iaes International Journal Of Artificial Intelligence
Reduced hardware requirements of deep neural network for breast cancer diagnosis
...Show More Authors

Identifying breast cancer utilizing artificial intelligence technologies is valuable and has a great influence on the early detection of diseases. It also can save humanity by giving them a better chance to be treated in the earlier stages of cancer. During the last decade, deep neural networks (DNN) and machine learning (ML) systems have been widely used by almost every segment in medical centers due to their accurate identification and recognition of diseases, especially when trained using many datasets/samples. in this paper, a proposed two hidden layers DNN with a reduction in the number of additions and multiplications in each neuron. The number of bits and binary points of inputs and weights can be changed using the mask configuration

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Mon Oct 09 2023
Journal Name
2023 Ieee 34th International Symposium On Software Reliability Engineering Workshops (issrew)
Semantics-Based, Automated Preparation of Exploratory Data Analysis for Complex Systems
...Show More Authors

View Publication
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Jan 13 2018
Journal Name
Journal Of Engineering
Performance Evaluation of RIPng, EIGRPv6 and OSPFv3 for Real Time Applications
...Show More Authors

In this modern Internet era and the transition to IPv6, routing protocols must adjust to assist this transformation. RIPng, EIGRPv6 and OSPFv3 are the dominant IPv6 IGRP (Interior Gateway Routing Protocols). Selecting the best routing protocol among the available is a critical task, which depends upon the network requirement and performance parameters of different real time applications. The primary motivation of this paper is to estimate the performance of these protocols in real time applications. The evaluation is based on a number of criteria including:  network convergence duration, Http Page Response Time, DB Query Response Time, IPv6 traffic dropped, video packet delay variation and video packet end to end de

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Heliyon
Heterogeneously catalyzed transesterification reaction using waste snail shell for biodiesel production
...Show More Authors

Biodiesel as an attractive energy source; a low-cost and green synthesis technique was utilized for biodiesel preparation via waste cooking oil methanolysis using waste snail shell derived catalyst. The present work aimed to investigate the production of biodiesel fuel from waste materials. The catalyst was greenly synthesized from waste snail shells throughout a calcination process at different calcination time of 2–4 h and temperature of 750–950 ◦C. The catalyst samples were characterized using X-Ray Diffraction (XRD), Brunauer-Emmett-Teller (BET), Energy Dispersive X-ray (EDX), and Fourier Transform Infrared (FT-IR). The reaction variables varying in the range of 10:1–30:1 M ratio of MeOH: oil, 3–11 wt% catalyst loading, 50–

... Show More
View Publication
Scopus (15)
Crossref (18)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Computational Thermal Sciences: An International Journal
EXPERIMENTAL AND NUMERICAL ANALYSIS FOR THERMAL PROBLEM OF FRICTIONAL BRAKE SYSTEM
...Show More Authors

The present work aims to validate the experimental results of a new test rig built from scratch to evaluate the thermal behavior of the brake system with the numerical results of the transient thermal problem. The work was divided into two parts; in the first part, a three-dimensional finite-element solution of the transient thermal problem using a new developed 3D model of the brake system for the selected vehicle is SAIPA 131, while in the second part, the experimental test rig was built to achieve the necessary tests to find the temperature distribution during the braking process of the brake system. We obtained high agreement between the results of the new test rig with the numerical results based on the developed model of the brake

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Dec 04 2023
Journal Name
Aip Conf. Proc
Double LA-transform and their properties for solving partial differential equations
...Show More Authors

Scopus (6)
Scopus
Publication Date
Wed Aug 01 2007
Journal Name
Al-nahrain Journal For Engineering Sciences
Monitoring and Control on Impressed Current Cathodic Protection for Oil Pipelines
...Show More Authors

This research is devoted to design and implement a Supervisory Control and Data Acquisition system (SCADA) for monitoring and controlling the corrosion of a carbon steel pipe buried in soil. A smart technique equipped with a microcontroller, a collection of sensors and a communication system was applied to monitor and control the operation of an ICCP process for a carbon steel pipe. The integration of the built hardware, LabVIEW graphical programming and PC interface produces an effective SCADA system for two types of control namely: a Proportional Integral Derivative (PID) that supports a closed loop, and a traditional open loop control. Through this work, under environmental temperature of 30°C, an evaluation and comparison were done for

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 04 2021
Journal Name
Iium Engineering Journal
RELIABLE ITERATIVE METHODS FOR SOLVING 1D, 2D AND 3D FISHER’S EQUATION
...Show More Authors

In the present paper, three reliable iterative methods are given and implemented to solve the 1D, 2D and 3D Fisher’s equation. Daftardar-Jafari method (DJM), Temimi-Ansari method (TAM) and Banach contraction method (BCM) are applied to get the exact and numerical solutions for Fisher's equations. The reliable iterative methods are characterized by many advantages, such as being free of derivatives, overcoming the difficulty arising when calculating the Adomian polynomial boundaries to deal with nonlinear terms in the Adomian decomposition method (ADM), does not request to calculate Lagrange multiplier as in the Variational iteration method (VIM) and there is no need to create a homotopy like in the Homotopy perturbation method (H

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Sun Mar 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Simulation of five methods for parameter estimation and functionExponential distribution reliability
...Show More Authors
The estimation process is one of the pillars of the statistical inference process as well as the hypothesis test, and the assessment is based on the collection of information and conclusions about the teacher or the community's teachers on the basis of the result
... Show More
View Publication Preview PDF
Crossref