Preferred Language
Articles
/
mhcUOI8BVTCNdQwCW2NF
Use of learning methods for gender and age classification based on front shot face images
...Show More Authors

Publication Date
Wed Jan 01 2020
Journal Name
Advances In Science, Technology And Engineering Systems Journal
Bayes Classification and Entropy Discretization of Large Datasets using Multi-Resolution Data Aggregation
...Show More Authors

Big data analysis has important applications in many areas such as sensor networks and connected healthcare. High volume and velocity of big data bring many challenges to data analysis. One possible solution is to summarize the data and provides a manageable data structure to hold a scalable summarization of data for efficient and effective analysis. This research extends our previous work on developing an effective technique to create, organize, access, and maintain summarization of big data and develops algorithms for Bayes classification and entropy discretization of large data sets using the multi-resolution data summarization structure. Bayes classification and data discretization play essential roles in many learning algorithms such a

... Show More
View Publication
Scopus Crossref
Publication Date
Sat Jan 31 2026
Journal Name
Journal Of Engineering
Design and Implementation of ICT-Based Recycle-Rewarding System for Green Environment
...Show More Authors

View Publication
Publication Date
Sun Mar 01 2020
Journal Name
Materials Research Express
Spray pyrolysis of graphene oxide based composite for optical and wettability applications
...Show More Authors
Abstract<p>In this study, silica-graphene oxide nano–composites were prepared by sol-gel technique and deposited by spray pyrolysis method on glass substrate. The effect of changing the graphene/silica ratio on the optical properties and wetting of these nano–structures has been investigated. The structural and morphological properties of the thin films have been studied by x-ray diffraction spectroscopy (XRD), field emission scanning electron microscope (FESEM), energy dispersive x-ray spectroscopy (EDS) and atomic force microscope (AFM). XRD results show that silica structures present in the synthesized films exhibit amorphous character and there is a poor arrangement in graphene plates al</p> ... Show More
View Publication
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu Feb 07 2019
Journal Name
Journal Of The College Of Education For Women
Standarized Basics in Depicting Walis in the Early Age of Islam
...Show More Authors

Despite the simplicity that characterized the administration in the era of the Prophet
(peace be upon him), but it put the Muslim community nucleus Administrative Organization
who walked Garret Caliphs (RIP) and came after them, who added to this organization what
they found necessary and dictated by their conditions of life has begun regulation Managing
this appoint leaders and armies of workers on the state and various tribes to spread the Islamic
religion and to teach people the provisions of the Koran and Altfvh in religion and establish
prayer and collect Zakat money so you do not appoint leaders and workers and governors
followed random, but it is in an objective manner takes reasons to meet expectations.

View Publication Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The use of green accounting information systems in the oil sector and its impact on reporting on sustainability - an applied study
...Show More Authors

Abstract

                  The research seeks to shed light on green accounting information systems, analyze them, identify sustainability reporting and how to improve it, as well as study the importance of the Iraqi oil sector, analyze it, and work on applying green accounting information systems in order to improve the quality of sustainability reporting. Oil as a branch of the General Corporation for the Distribution of Oil and Gas Products to apply the practical aspect and prove the hypothesis of the research. Explaining the company's role in improving environmental conditions

View Publication Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A New Cipher Based on Feistel Structure and Chaotic Maps
...Show More Authors

Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,

            While using chaotic maps, in the suggested system, called

... Show More
View Publication Preview PDF
Scopus (22)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Wasit Journal For Pure Sciences
Honeywords Generation Technique based on Meerkat Clan Algorithm and WordNet
...Show More Authors

The efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t

... Show More
View Publication Preview PDF
Crossref