Preferred Language
Articles
/
jih-1393
Attack Stream Cipher By Using Cipher System Only
...Show More Authors

Attack  stream  cipher  system  , using cipher  text only  , depends on the  characteristics of  plain  teKt language  and  the randomness of  the key , that used  in encryption , without  having detailed  k.nuwh:dgt:: uf cipher algorithm by benefiting  from the balance between O's and  I' in the key to reduce the probability of key space.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Evaluation and Improvement of Manufacturing System Using Computer Software Arena
...Show More Authors

The main purpose of the paper is to identify the controllability of an existing production system; yogurt production line in Abu Ghraib Dairy Factory which has several machines of food processing and packing that has been studied. Through the starting of analysis, instability in production has been found in the factory. The analysis is built depending on experimental observation and data collection for different processing time of the machines, and statistical analysis has been conducted to model the production system. Arena Software is applied for simulating and analyzing the current state of the production system, and results are expanded to improve the system production and efficiency. Research method is applied to contribute in knowi

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Feb 28 2021
Journal Name
International Journal Of Intelligent Engineering And Systems
Intelligent System for Parasitized Malaria Infection Detection Using Local Descriptors
...Show More Authors

Malaria is a curative disease, with therapeutics available for patients, such as drugs that can prevent future malaria infections in countries vulnerable to malaria. Though, there is no effective malaria vaccine until now, although it is an interesting research area in medicine. Local descriptors of blood smear image are exploited in this paper to solve parasitized malaria infection detection problem. Swarm intelligence is used to separate the red blood cells from the background of the blood slide image in adaptive manner. After that, the effective corner points are detected and localized using Harris corner detection method. Two types of local descriptors are generated from the local regions of the effective corners which are Gabor based f

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Tue Sep 01 2015
Journal Name
Journal Of Engineering
Indoor Positioning and Monitoring System Using Smartphone and WLAN (IPMS)
...Show More Authors

 

Buildings such as malls, offices, airports and hospitals nowadays have become very complicated which increases the need for a solution that helps people to find their locations in these buildings. GPS or cell signals are commonly used for positioning in an outdoor environment and are not accurate in indoor environment. Smartphones are becoming a common presence in our daily life, also the existing infrastructure, the Wi-Fi access points, which is commonly available in most buildings, has motivated this work to build hybrid mechanism that combines the APs fingerprint together with smartphone barometer sensor readings, to accurately determine the user position inside building floor relative to well-known lan

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
International Journal Of Mechanical Engineering
Improving the Performance of the Vehicle Suspension System Using Inerter
...Show More Authors

Preview PDF
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Engineering
Development an Anomaly Network Intrusion Detection System Using Neural Network
...Show More Authors

Most intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Nov 28 2020
Journal Name
Iraqi Journal Of Science
Using Affiliation Rules-based Data Mining Technique in Referral System
...Show More Authors

Referral techniques are normally employed in internet business applications. Existing frameworks prescribe things to a particular client according to client inclinations and former high evaluations. Quite a number of methods, such as cooperative filtering and content-based methodologies, dominate the architectural design of referral frameworks. Many referral schemes are domain-specific and cannot be deployed in a general-purpose setting. This study proposes a two-dimensional (User × Item)-space multimode referral scheme, having an enormous client base but few articles on offer. Additionally, the design of the referral scheme is anchored on the  and  articles, as expressed by a particular client, and is a combination of affi

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
Bioremediation of Petroleum Hydrocarbons Contaminated Soil using Bio piles System
...Show More Authors

This study was focused on biotreatment of soil which polluted by petroleum compounds (Diesel) which caused serious environmental problems. One of the most effective and promising ways to treat diesel-contaminated soil is bioremediation. It is a choice that offers the potential to destroy harmful pollutants using biological activity.

Four bacterial strains were isolated from diesel contaminated soil samples. The isolates were identified by the Vitek 2 system, as Sphingomonas paucimobilis, Pentoae species, Staphylococcus aureus, and Enterobacter cloacae. The potential of biological surfactant production was tested using the Sigma 703D stand-alone tensiometer showed

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Feb 01 2017
Journal Name
International Journal Of Science And Research (ijsr)
Supra-Approximation Spaces Using Mixed Degree System in Graph Theory
...Show More Authors

This paper is concerned with introducing and studying the o-space by using out degree system (resp. i-space by using in degree system) which are the core concept in this paper. In addition, the m-lower approximations, the m-upper approximations and ospace and i-space. Furthermore, we introduce near supraopen (near supraclosed) d. g.'s. Finally, the supra-lower approximation, supraupper approximation, supra-accuracy are defined and some of its properties are investigated.

Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Enhancement Ear-based Biometric System Using a Modified AdaBoost Method
...Show More Authors

          The primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Wed Nov 30 2022
Journal Name
Iraqi Journal Of Science
Prediction of Explicit Features for Recommendation System Using User Reviews
...Show More Authors

    With the explosive growth of data, it has become very difficult for a person to process the data and find the right information from it. So, to discover the right information from the colossal amount of data that is available online, we need information filtering systems. Recommendation systems (RS) help users find the most interesting information among the options that are available. Ratings given by the users play a vital role in determining the purposes of recommendations. Earlier, researchers used a user’s rating history to predict unknown ratings, but recently a user’s review has gained a lot of attention as it contains a lot of relevant information about a user’s decision. The proposed system makes an attempt to deal w

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref