Preferred Language
Articles
/
ohfwL48BVTCNdQwCcV5l
An Enhanced Evolutionary Algorithm for Detecting Complexes in Protein Interaction Networks with Heuristic Biological Operator
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Sat Mar 30 2024
Journal Name
Wasit Journal For Pure Sciences
Arabic and English Texts Encryption Using Modified Playfair Algorithm
...Show More Authors

To maintain the security and integrity of data, with the growth of the Internet and the increasing prevalence of transmission channels, it is necessary to strengthen security and develop several algorithms. The substitution scheme is the Playfair cipher. The traditional Playfair scheme uses a small 5*5 matrix containing only uppercase letters, making it vulnerable to hackers and cryptanalysis. In this study, a new encryption and decryption approach is proposed to enhance the resistance of the Playfair cipher. For this purpose, the development of symmetric cryptography based on shared secrets is desired. The proposed Playfair method uses a 5*5 keyword matrix for English and a 6*6 keyword matrix for Arabic to encrypt the alphabets of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Apr 25 2019
Journal Name
Engineering And Technology Journal
Improvement of Harris Algorithm Based on Gaussian Scale Space
...Show More Authors

Features is the description of the image contents which could be corner, blob or edge. Corners are one of the most important feature to describe image, therefore there are many algorithms to detect corners such as Harris, FAST, SUSAN, etc. Harris is a method for corner detection and it is an efficient and accurate feature detection method. Harris corner detection is rotation invariant but it isn’t scale invariant. This paper presents an efficient harris corner detector invariant to scale, this improvement done by using gaussian function with different scales. The experimental results illustrate that it is very useful to use Gaussian linear equation to deal with harris weakness.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Oct 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Estimate The Survival Function By Using The Genetic Algorithm
...Show More Authors

  Survival analysis is the analysis of data that are in the form of times from the origin of time until the occurrence of the end event, and in medical research, the origin of time is the date of registration of the individual or the patient in a study such as clinical trials to compare two types of medicine or more if the endpoint It is the death of the patient or the disappearance of the individual. The data resulting from this process is called survival times. But if the end is not death, the resulting data is called time data until the event. That is, survival analysis is one of the statistical steps and procedures for analyzing data when the adopted variable is time to event and time. It could be d

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (6)
Scopus Crossref
Publication Date
Mon Jan 09 2023
Journal Name
2023 15th International Conference On Developments In Esystems Engineering (dese)
Deep Learning-Based Speech Enhancement Algorithm Using Charlier Transform
...Show More Authors

View Publication
Scopus (11)
Crossref (9)
Scopus Crossref
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
Using Iterative Reweighting Algorithm and Genetic Algorithm to Calculate The Estimation of The Parameters Of The Maximum Likelihood of The Skew Normal Distribution
...Show More Authors

Excessive skewness which occurs sometimes in the data is represented as an obstacle against normal distribution. So, recent studies have witnessed activity in studying the skew-normal distribution (SND) that matches the skewness data which is regarded as a special case of the normal distribution with additional skewness parameter (α), which gives more flexibility to the normal distribution. When estimating the parameters of (SND), we face the problem of the non-linear equation and by using the method of Maximum Likelihood estimation (ML) their solutions will be inaccurate and unreliable. To solve this problem, two methods can be used that are: the genetic algorithm (GA) and the iterative reweighting algorithm (IR) based on the M

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Iop Conference Series: Earth And Environmental Science
Study of the Biological Diversity of Benthic algae in the Tigris River, Baghdad - Iraq
...Show More Authors
Abstract<p>The present work included a study of benthic algae on two substrates: rocks and clay on a section of the Tigris River at the Al-Atifiyah site in the fall of 2018. The result of this study was recorded 89 species belong to 50 genus of benthic algae on both substrates and composed of Bacillariophyceae (59.6%, 61.2%), Chlorophyceae (25.8%, 20.4%) and Cyanophyceae (14.5%, 18.3%) respectively on epilithic and epipelic algae. The present study was recorded the highest total algae cell density (1173.2 cells *10<sup>3</sup>/cm<sup>2</sup>) on epilithic algae while the lowest total algae cell density was recorded on epipelic algae (76.95 cells *10<sup>3</sup>/gm). For measure div</p> ... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Sun Aug 11 2024
Journal Name
Al-salam Journal For Medical Science
A review of recent developments in pharmaceutical chemistry on biological evolution of tetrazole derivatives
...Show More Authors

This review sums up the developments in the biological activity of tetrazole active derivatives in recent days. Some of the deliberated derivatives of tetrazole are at present actively scientifically studied; some of them have biological activity that enables them to be studied further in the future as a drug for various biological activities. This review seeks to offer a comprehensive analysis of the efficacy and clinical advantage of biological activity for tetrazole derivatives.

View Publication
Crossref
Publication Date
Sun Sep 30 2018
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Biological Co-existence of the Microalgae – Bacteria System in Dairy Wastewater using photo-bioreactor
...Show More Authors

Aeration system in the cultivation of Chlorella Sp. Microalgae using dairy wastewater as culture media was addressed in the current study. This research aimed to study the effect of aeration in the bubble column bioreactor on the biological synergy between microalgae and bacteria if they are present in the same place. The results show that the sterilization stage is not the dominant step in the success of microalgae cultivation in water-rich organic waste. There is a clear convergence between the growth rate of Chlorella microalgae in the sterilized and non-sterilized culture media, which gives realism if the proposal is applied industrially. Through the information obtained the aerobic bacteria in the non-sterilized me

... Show More
View Publication Preview PDF
Crossref (3)
Crossref