Preferred Language
Articles
/
jRZXJIwBVTCNdQwCG_gG
Design a system for an approved video copyright over cloud based on biometric iris and random walk generator using watermark technique
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
Robust Password Encryption Technique with an Extra Security Layer
...Show More Authors

        People are comfortable with e-banking services, but they are exposed to a great deal of danger these days due to fraudulent acts such as password hacking and personal information theft. Everything individuals do online relies heavily on passwords. Using a password protects one's identity online, in forums, and through email. Online transactions are vulnerable to identity theft if they do not have a secure password. Internet users with critical statements are vulnerable to various assaults, including the theft and exploitation of user IDs and passwords. This paper introduces novel password encryption by fingerprint and a random number to make each password unique and robust against attacks, with a magnificent time elapsed o

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Journal Of Science
A Lightweight Image Encryption Algorithm Based on Elliptic Curves and a 5D Logistic Map
...Show More Authors

    Cryptography can be thought of as a toolbox, where potential attackers gain access to various computing resources and technologies to try to compute key values. In modern cryptography, the strength of the encryption algorithm is only determined by the size of the key. Therefore, our goal is to create a strong key value that has a minimum bit length that will be useful in light encryption. Using elliptic curve cryptography (ECC) with Rubik's cube and image density, the image colors are combined and distorted, and by using the Chaotic Logistics Map and Image Density with a secret key, the Rubik's cubes for the image are encrypted, obtaining a secure image against attacks. ECC itself is a powerful algorithm that generates a pair of p

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 30 2023
Journal Name
Al-kindy College Medical Journal
‘Peacock tail’ Clipping Technique for a Giant Middle Cerebral Artery Aneurysm: A Technical Note
...Show More Authors

Background: Giant middle cerebral artery (MCA) aneurysms are surgically challenging lesions. Because of the complexity and variability of these aneurysms, a customized surgical technique is often needed for each case. In this article, we present a modified clip reconstruction technique of a ruptured complex giant partially thrombosed middle cerebral artery aneurysm.

Case description: The aneurysm was exposed using the pterional approach. Following proximal control, the aneurysm sac was decompressed. Then, we applied permanent clips to reconstruct the aneurysm neck. The configuration of the aneurysm mandated a tailored clipping pattern to account for resi

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Dec 29 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Smartphone -Based Model for Human Activity Recognition
...Show More Authors

Activity recognition (AR) is a new interesting and challenging research area with many applications (e.g. healthcare, security, and event detection). Basically, activity recognition (e.g. identifying user’s physical activity) is more likely to be considered as a classification problem. In this paper, a combination of 7 classification methods is employed and experimented on accelerometer data collected via smartphones, and compared for best performance. The dataset is collected from 59 individuals who performed 6 different activities (i.e. walk, jog, sit, stand, upstairs, and downstairs). The total number of dataset instances is 5418 with 46 labeled features. The results show that the proposed method of ensemble boost-based classif

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Aug 02 2012
Journal Name
International Journal Of Advanced Research In Computer Science
User Authentication based on Keystroke Dynamics Using Backpropagation Network
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi

... Show More
Publication Date
Tue Oct 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Employ Shrinkage Estimation Technique for the Reliability System in Stress-Strength Models: special case of Exponentiated Family Distribution
...Show More Authors

       A reliability system of the multi-component stress-strength model R(s,k) will be considered in the present paper ,when the stress and strength are independent and non-identically distribution have the Exponentiated Family Distribution(FED) with the unknown  shape parameter α and known scale parameter λ  equal to two and parameter θ equal to three. Different estimation methods of R(s,k) were introduced corresponding to Maximum likelihood and Shrinkage estimators. Comparisons among the suggested estimators were prepared depending on simulation established on mean squared error (MSE) criteria.

View Publication Preview PDF
Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
A Unit Plan Based Upon The MI Theory: A theoretical study with an application Inside The Classroom
...Show More Authors

This research basically gives an introduction about the multiple intelligence
theory and its implication into the classroom. It presents a unit plan based upon the
MI theory followed by a report which explains the application of the plan by the
researcher on the first class student of computer department in college of sciences/
University of Al-Mustansiryia and the teacher's and the students' reaction to it.
The research starts with a short introduction about the MI theory is a great
theory that could help students to learn better in a relaxed learning situation. It is
presented by Howard Gardener first when he published his book "Frames of
Minds" in 1983 in which he describes how the brain has multiple intelligen

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 25 2022
Journal Name
Iraqi Journal Of Science
PIM-SM based Multicast Comparison for IPv4 verses IPv6 using GNS3 and JPERF
...Show More Authors

The multicast technology implements a very high-efficiency point-to-multipoint data transmission over IP networks (IPv4 and IPv6). Multicast reduces network load, eliminates traffic redundancy, and saves network bandwidth. Therefore, multicast used widely in LAN/WAN applications such as online games, video conferencing and IPTV. The multicast technology implements varied protocols such as DVMRP(Distance Vector Multicast Routing Protocol), MOSPF(Multicast Open Shortest Path First), or PIM-DM (Protocol Independent Multicast- Dense Mode) which considered source tree type, while PIM-SM (Protocol Independent Multicast- Sparse Mode) and CBT (Core Based Tree) uses shared tree. Current paper focuses on the performance evaluation of the two multi

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 01 2020
Journal Name
Baghdad Science Journal
Mobile-based Telemedicine Application using SVD and F-XoR Watermarking for Medical Images
...Show More Authors

A medical- service platform is a mobile application through which patients are provided with doctor’s diagnoses based on information gleaned from medical images. The content of these diagnostic results must not be illegitimately altered during transmission and must be returned to the correct patient. In this paper, we present a solution to these problems using blind, reversible, and fragile watermarking based on authentication of the host image. In our proposed algorithm, the binary version of the Bose_Chaudhuri_Hocquengham (BCH) code for patient medical report (PMR) and binary patient medical image (PMI) after fuzzy exclusive or (F-XoR) are used to produce the patient's unique mark using secret sharing schema (SSS). The patient’s un

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sun Apr 30 2017
Journal Name
Journal Of Engineering
Implementation of a Proposed Load-Shedding System Using Altera DE2 FPGA
...Show More Authors

A load-shedding controller suitable for small to medium size loads is designed and implemented based on preprogrammed priorities and power consumption for individual loads. The main controller decides if a particular load can be switched ON or not according to the amount of available power generation, load consumption and loads priorities. When themaximum allowed power consumption is reached and the user want to deliver power to additional load, the controller will decide if this particular load should be denied receiving power if its priority is low. Otherwise, it can be granted to receive power if its priority is high and in this case lower priority loads are automatically switched OFF in order not to overload the power generation. The

... Show More
View Publication Preview PDF