Preferred Language
Articles
/
phekRI8BVTCNdQwCJWhr
A novel kite cross hexagonal search algorithm for fast block motion estimation
...Show More Authors

The performance quality and searching speed of Block Matching (BM) algorithm are affected by shapes and sizes of the search patterns used in the algorithm. In this paper, Kite Cross Hexagonal Search (KCHS) is proposed. This algorithm uses different search patterns (kite, cross, and hexagonal) to search for the best Motion Vector (MV). In first step, KCHS uses cross search pattern. In second step, it uses one of kite search patterns (up, down, left, or right depending on the first step). In subsequent steps, it uses large/small Hexagonal Search (HS) patterns. This new algorithm is compared with several known fast block matching algorithms. Comparisons are based on search points and Peak Signal to Noise Ratio (PSNR). According to results obtained in this paper, KCHS needs less search time than others algorithms and gives very acceptable performance quality.

Scopus
Preview PDF
Quick Preview PDF
Publication Date
Fri Aug 01 2008
Journal Name
2008 First International Conference On The Applications Of Digital Information And Web Technologies (icadiwt)
Hybrid canonical genetic algorithm and steepest descent algorithm for optimizing likelihood estimators of ARMA (1, 1) model
...Show More Authors

This paper presents a hybrid genetic algorithm (hGA) for optimizing the maximum likelihood function ln(L(phi(1),theta(1)))of the mixed model ARMA(1,1). The presented hybrid genetic algorithm (hGA) couples two processes: the canonical genetic algorithm (cGA) composed of three main steps: selection, local recombination and mutation, with the local search algorithm represent by steepest descent algorithm (sDA) which is defined by three basic parameters: frequency, probability, and number of local search iterations. The experimental design is based on simulating the cGA, hGA, and sDA algorithms with different values of model parameters, and sample size(n). The study contains comparison among these algorithms depending on MSE value. One can conc

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Aip Conference Proceedings
Fast lightweight encryption device based on LFSR technique for increasing the speed of LED performance
...Show More Authors

LED is an ultra-lightweight block cipher that is mainly used in devices with limited resources. Currently, the software and hardware structure of this cipher utilize a complex logic operation to generate a sequence of random numbers called round constant and this causes the algorithm to slow down and record low throughput. To improve the speed and throughput of the original algorithm, the Fast Lightweight Encryption Device (FLED) has been proposed in this paper. The key size of the currently existing LED algorithm is in 64-bit & 128-bit but this article focused mainly on the 64-bit key (block size=64-bit). In the proposed FLED design, complex operations have been replaced by LFSR left feedback technology to make the algorithm perform more e

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Thu Nov 19 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
CFD Simulation of Velocity Distribution in a River with a Bend Cross Section and a Cubic Bed Roughness Shape
...Show More Authors

View Publication
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Desalination And Water Treatment
A novel forward osmosis for treatment of high-salinity East Baghdad oilfield produced water as a part of a zero liquid discharge system
...Show More Authors

This study investigated a novel application of forward osmosis (FO) for oilfield produced water treatment from the East Baghdad oilfield affiliated to the Midland Oil Company (Iraq). FO is a part of a zero liquid discharge system that consists of oil skimming, coagulation/flocculation, forward osmosis, and crystallization. Treatment of oilfield produced water requires systems that use a sustainable driving force to treat high-ionic-strength wastewater and have the ability to separate a wide range of contaminants. The laboratory-scale system was used to evaluate the performance of a cellulose triacetate hollow fiber CTA-HF membrane for the FO process. In this work, sodium chloride solution was used as a feed solution (FS) with a concentratio

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 22 2023
Journal Name
Iraqi Journal Of Science
Revealed of A novel Allele in Wasit – Iraqi Population
...Show More Authors

The developments in forensic DNA technology have led us to perform this study in Iraqi population as reference database of autosomal Short Tandem Repeat (aSTR) DNA markers . A total of 120 unrelated individuals from Wasit province were analyzed at 15 STR DNA markers. Allele frequencies of DNA typing loci included in the AmpFlSTR1 IdentifilerTM PCR Amplification Kit panel from Applied Biosystems (D3S1358, vWA, FGA, D8S1179, D21S11, D18S51, D5S818, D13S317, D7S820, TH01, TPOX, CSF1PO, D19S433, D2S1338, D16S539) and several forensic efficiency statistical parameters were estimated from all the sample. the combined Matching Probability (CMP) using the 15 STR genetic loci in Iraqi population was estimated at 1 in 2.08286E-18 and the Combined

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 19 2021
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Serum Chitotriosidase level as a Novel Biomarker for Therapeutic Monitoring of Nephropathic Cystinosis among the Iraqi children
...Show More Authors

Background: Cystinosis is a rare autosomal recessive lysosomal storage disease with high morbidity and mortality. It is caused by mutations in the CTNS gene that encodes the cystine transporter, cystinosin, which leads to lysosomal cystine accumulation. It is the major cause of inherited Fanconi syndrome, and should be suspected in young children with failure to thrive and signs of renal proximal tubular damage. The diagnosis can be missed in infants, because not all signs of renal Fanconi syndrome are present during the first months of life. Elevated white blood cell cystine content is the cornerstone of the diagnosis. Since chitotriosidase (CHIT1 or chitinase-1) is mainly produced by activated macrophages both in normal and inflammator

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Environmental Nanotechnology, Monitoring & Management
Synthesis of nano-magnetite and magnetite/synthetic geopolymer nano-porous composite for application as a novel adsorbent
...Show More Authors

In this work magnetite/geopolymer composite (MGP) were synthesized using a chemical co-precipitation technique. The synthesized materials were characterized using several techniques such as: “X-ray diffraction (XRD), Fourier-transform infrared spectroscopy (FTIR), vibrating sample-magnetometer (VSM), field-emission scanning electron microscopy (FE-SEM), energy dispersive X-ray spectroscopy (EDS), Brunauer–Emmett–Teller (BET) and Barrentt-Joyner-Halenda (BJH)” to determine the structure and morphology of the obtained material. The analysis indicated that metal oxide predominantly appeared at the shape of the spinel structure of magnetite, and that the presence of nano-magnetite had a substantial impact on the surface area and pore st

... Show More
View Publication Preview PDF
Crossref (13)
Crossref
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Aip Conference Proceedings
Developing a lightweight cryptographic algorithm based on DNA computing
...Show More Authors

This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of

... Show More
Crossref (7)
Crossref