Preferred Language
Articles
/
nBcuFY4BVTCNdQwCKTED
Fast and robust approach for data security in communication channel using pascal matrix
...Show More Authors

This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.

Scopus Crossref
View Publication
Publication Date
Wed Sep 29 2021
Journal Name
Al-khwarizmi Engineering Journal
Robust Computed Torque Control for Uncertain Robotic Manipulatorss
...Show More Authors

This paper presents a robust control method for the trajectory control of the robotic manipulator. The standard Computed Torque Control (CTC) is an important method in the robotic control systems but its not robust to system uncertainty and external disturbance. The proposed method overcome the system uncertainty and external disturbance problems. In this paper, a robustification term has been added to the standard CTC. The stability of the proposed control method is approved by the Lyapunov stability theorem.  The performance of the presented controller is tested by MATLAB-Simulink environment and is compared with different control methods to illustrate its robustness and performance.

View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Crossref
Publication Date
Fri Sep 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Robust Estimation OF The Partial Regression Model Using Wavelet Thresholding
...Show More Authors

            Semi-parametric regression models have been studied in a variety of applications and scientific fields due to their high flexibility in dealing with data that has problems, as they are characterized by the ease of interpretation of the parameter part while retaining the flexibility of the non-parametric part. The response variable or explanatory variables can have outliers, and the OLS approach have the sensitivity to outliers. To address this issue, robust (resistance) methods were used, which are less sensitive in the presence of outlier values in the data. This study aims to estimate the partial regression model using the robust estimation method with the wavel

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Annals Of Pure And Applied Mathematics
Linear Regression Model Using Bayesian Approach for Iraqi Unemployment Rate
...Show More Authors

In this paper we used frequentist and Bayesian approaches for the linear regression model to predict future observations for unemployment rates in Iraq. Parameters are estimated using the ordinary least squares method and for the Bayesian approach using the Markov Chain Monte Carlo (MCMC) method. Calculations are done using the R program. The analysis showed that the linear regression model using the Bayesian approach is better and can be used as an alternative to the frequentist approach. Two criteria, the root mean square error (RMSE) and the median absolute deviation (MAD) were used to compare the performance of the estimates. The results obtained showed that the unemployment rates will continue to increase in the next two decade

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Apr 01 2015
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Security For Three -Tired Web Application
...Show More Authors

Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s

... Show More
Preview PDF
Publication Date
Sun Dec 01 2019
Journal Name
Al-nahrain Journal Of Science
Enhancing Sparse Adjacency Matrix for Community Detection in Large Networks
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Water Flow Visualization And Velocity Measurement Using Hydrogen Bubble Generation Technique In Low Speed Open Channel
...Show More Authors

Visualization of water flow around different bluff bodies at different Reynolds number ranging (1505 - 2492) was realized by designing and building a test rig which contains an open channel capable to ensure water velocity range (4-8cm/s) in this channel. Hydrogen bubbles generated from the ionized water using DC power supply are visualized by a light source and photographed by a digital camera. Flow pattern around a circular disk of (3.6cm) diameter and (3mm) thickness, a sphere of (3.8cm) diameter and a cylinder of
(3.2cm) diameter and (10cm) length are studied qualitatively. Parameters of the vortex ring generated in the wake region of the disk and the separation angle of water stream lines from the surface of the sphere are plott

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Mar 13 2021
Journal Name
Al-nahrain Journal Of Science
Hiding Multi Short Audio Signals in Color Image by using Fast Fourier Transform
...Show More Authors

Many purposes require communicating audio files between the users using different applications of social media. The security level of these applications is limited; at the same time many audio files are secured and must be accessed by authorized persons only, while, most present works attempt to hide single audio file in certain cover media. In this paper, a new approach of hiding three audio signals with unequal sizes in single color digital image has been proposed using the frequencies transform of this image. In the proposed approach, the Fast Fourier Transform was adopted where each audio signal is embedded in specific region with high frequencies in the frequency spectrum of the cover image to sa

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Ieee Antennas And Wireless Propagation Letters
Stabilized and Fast Method for Compressive-Sensing-Based Method of Moments
...Show More Authors

View Publication
Scopus (13)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Thu Dec 01 2011
Journal Name
2011 Developments In E-systems Engineering
Enhanced Computation Time for Fast Block Matching Algorithm
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Fri Apr 01 2022
Journal Name
Symmetry
Fast Overlapping Block Processing Algorithm for Feature Extraction
...Show More Authors

In many video and image processing applications, the frames are partitioned into blocks, which are extracted and processed sequentially. In this paper, we propose a fast algorithm for calculation of features of overlapping image blocks. We assume the features are projections of the block on separable 2D basis functions (usually orthogonal polynomials) where we benefit from the symmetry with respect to spatial variables. The main idea is based on a construction of auxiliary matrices that virtually extends the original image and makes it possible to avoid a time-consuming computation in loops. These matrices can be pre-calculated, stored and used repeatedly since they are independent of the image itself. We validated experimentally th

... Show More
View Publication
Scopus (26)
Crossref (27)
Scopus Clarivate Crossref