Preferred Language
Articles
/
jih-1947
Cryptography with Dynamic DNA Depending on Edge Detection
...Show More Authors

Making the data secure is more and more concerned in the communication era. This research is an attempt to make a more secured information message by using both encryption and steganography. The encryption phase is done with dynamic DNA complementary rules while DNA addition rules are done with secret key where both are based on the canny edge detection point of the cover image. The hiding phase is done after dividing the cover image into 8 blocks, the blocks that are used for hiding selected in reverse order exception the edge points. The experiments result shows that the method is reliable with high value in PSNR

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Study of Dynamic Sorption in Adsorption Refrigeration Cycle
...Show More Authors

This paper shows the characteristics of temperature and adsorbed (water vapor) mass rate distribution in the adsorber unit which is the key part to any adsorption refrigeration system. The temperature profiles of adsorption/desorption phases (Dynamic Sorption) are measured experimentally under the operating conditions of 90oC hot water temperature, 30oC cooling water temperature, 35oC adsorption temperature and cycle time of 40 min. Based on the temperature profiles, The mass transfer equations for the annulus adsorbent bed are solved to obtain the distribution of adsorption velocity and adsorbate concentration using non-equilibrium
model. The relation between the adsorption velocity with time is investigated during the process of ads

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Feb 01 2025
Journal Name
Journal Of Dentistry
Dynamic navigation-guided robotic placement of zygomatic implants
...Show More Authors

Objectives To assess the feasibility and accuracy of a new prototype robotic implant system for the placement of zygomatic implants in edentulous maxillary models. Methods The study was carried out on eight plastic models. Cone beam computed tomographs were captured for each model to plan the positions of zygomatic implants. The hand-eye calibration technique was used to register the dynamic navigation system to the robotic spaces. A total of 16 zygomatic implants were placed, equally distributed between the anterior and the posterior parts of the zygoma. The placement of the implants (ZYGAN®, Southern Implants) was carried out using an active six-jointed robotic arm (UR3e, Universal Robots) guided by the dynamic navigation coordinate tran

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Jun 07 2009
Journal Name
Baghdad Science Journal
Use of DAF markers (DNA Amplification Fingerprint) to Assess Genetic Diversity of Rice (Oryza satival L.)
...Show More Authors

This study was carried out to assess genetic diversity of ten cultivars of Rice (Oryza sativa L.). One of DNA markers based on Polymerase Chain Reaction (PCR) was used namely DAF markers (DNA Amplification Fingerprint). Six primers were tested, the results showed, that no amplification products using the primers OPD.14 and OPM.5. Two primers (OPX.8 and OPT.2) produced monomorphic band across all cultivars, while only two primers generated polymorphic bands. The number of total bands produced from one of them (OPN.7) were sixteen. Also this primer produced ten polymorphic profiles (DAF patterns) which were unique to the ten cultivars that could be distinguished. The number of total bands generated by primer OPX.1 were thirteen and this prim

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Svu-international Journal Of Engineering Sciences And Applications
Water Quality Detection using cost-effective sensors based on IoT
...Show More Authors

Crossref (1)
Crossref
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Anomaly Detection Approach Based on Deep Neural Network and Dropout
...Show More Authors

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct

... Show More
View Publication Preview PDF
Scopus (25)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Online Sumarians Cuneiform Detection Based on Symbol Structural Vector Algorithm
...Show More Authors

The cuneiform images need many processes in order to know their contents
and by using image enhancement to clarify the objects (symbols) founded in the
image. The Vector used for classifying the symbol called symbol structural vector
(SSV) it which is build from the information wedges in the symbol.
The experimental tests show insome numbersand various relevancy including
various drawings in online method. The results are high accuracy in this research,
and methods and algorithms programmed using a visual basic 6.0. In this research
more than one method was applied to extract information from the digital images
of cuneiform tablets, in order to identify most of signs of Sumerian cuneiform.

View Publication Preview PDF
Publication Date
Thu Jun 29 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Effect of Black Carbon and Alumina Nanofluid on Thermal and Dynamic Efficiency in Upward Spraying Cooling Tower
...Show More Authors

In cooling water systems, cooling towers play a critical role in removing heat from the water. Cooling water systems are commonly used in industry to dispose the waste heat. An upward spray cooling water systems was especially designed and investigated in this work. The effect of two nanofluids (Al2O3/ water, black carbon /water) on velocity and temperature distributions along reverse spray cooling tower at various concentrations (0.02, 0.08, 0.1, 0.15, and 0.2 wt.%) were investigated, beside the effect of the inlet water temperature (35 ,40, and 45 ͦ C) and water to air flow ratio (L/G) of 0.5, 0.75, and 1.  The best thermal performance was found when the working solution contained 0.1 wt.% for each of Al2

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
The Effect of Variable Load on Dynamic Behavior of Thin Pipe by Hamilton Principle and Cfx-Ansys
...Show More Authors

This paper presents the study and analysis, analytically and numerical of circular cylindrical shell pipe model, under variable loads, transmit fluid at the high velocity state (fresh water). The analytical analysis depended on the energy observation principle (Hamilton Principle), where divided all energy in the model to three parts , strain energy, kinetic energy and transmitted energy between flow and solid (kinetic to potential energy). Also derive all important equations for this state and approach to final equation of motion, free and force vibration also derived. the relations between the displacement of model function of velocity of flow, length of model, pipe thickness, density of flowed with location coordinate x-axis and angle

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Sun Nov 01 2020
Journal Name
2020 2nd Annual International Conference On Information And Sciences (aicis)
An Enhanced Multi-Objective Evolutionary Algorithm with Decomposition for Signed Community Detection Problem
...Show More Authors

View Publication
Scopus (4)
Crossref (1)
Scopus Crossref