Preferred Language
Articles
/
uBh3yZUBVTCNdQwC5346
Face Recognition and Emotion Recognition from Facial Expression Using Deep Learning Neural Network
...Show More Authors
Abstract<p>Face recognition, emotion recognition represent the important bases for the human machine interaction. To recognize the person’s emotion and face, different algorithms are developed and tested. In this paper, an enhancement face and emotion recognition algorithm is implemented based on deep learning neural networks. Universal database and personal image had been used to test the proposed algorithm. Python language programming had been used to implement the proposed algorithm.</p>
Scopus Crossref
View Publication
Publication Date
Wed Oct 07 2020
Journal Name
Indian Journal Of Forensic Medicine &amp; Toxicology
Effectiveness of Deep Brain Stimulation in Iraqi Patients with Parkinson Disease
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Tue Sep 01 2015
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Kick tolerance control during well drilling in southern Iraqi deep wells
...Show More Authors

The importance of kick tolerance in well operations has recently increased due to its implications in well design, in drilling and well control. To study a simple method for the application of kick tolerance concept in an effective way on the basis of field data, this research purpose is to improve knowledge about Kick Tolerance and represents a technical basis for the discussion on revision of standard procedure. The objective of this work is to review and to present a methodology of determination the kick tolerance parameters using the circulation kicks tolerance concepts. The proposed method allows to know, to evaluate and to analyze the kick tolerance problem in order to make the drilling execution safer and more economical by reducin

... Show More
Publication Date
Sun Nov 10 2019
Journal Name
Journal Of Engineering And Applied Sciences
Discrete Fracture Network and Fractured Reservoir Characterization in Khabaz Field-Tertiary Formation
...Show More Authors

View Publication
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Proceedings Of The 31th Minisymposium
Towards the Requirement-Driven Generation and Evaluation of Hyperledger Fabric Network Designs
...Show More Authors

View Publication
Crossref
Publication Date
Fri Nov 03 2023
Journal Name
Lecture Notes In Electrical Engineering
Towards Space Sensor Network and Internet of Things: Merging CubeSats with IoT
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Oct 05 2025
Journal Name
Mesopotamian Journal Of Computer Science
DGEN: A Dynamic Generative Encryption Network for Adaptive and Secure Image Processing
...Show More Authors

Cyber-attacks keep growing. Because of that, we need stronger ways to protect pictures. This paper talks about DGEN, a Dynamic Generative Encryption Network. It mixes Generative Adversarial Networks with a key system that can change with context. The method may potentially mean it can adjust itself when new threats appear, instead of a fixed lock like AES. It tries to block brute‑force, statistical tricks, or quantum attacks. The design adds randomness, uses learning, and makes keys that depend on each image. That should give very good security, some flexibility, and keep compute cost low. Tests still ran on several public image sets. Results show DGEN beats AES, chaos tricks, and other GAN ideas. Entropy reached 7.99 bits per pix

... Show More
View Publication
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
A Proposed Agent System for Network Monitoring
...Show More Authors

The traditional centralized network management approach presents severe efficiency and scalability limitations in large scale networks. The process of data collection and analysis typically involves huge transfers of management data to the manager which cause considerable network throughput and bottlenecks at the manager side. All these problems processed using the Agent technology as a solution to distribute the management functionality over the network elements. The proposed system consists of the server agent that is working together with clients agents to monitor the logging (off, on) of the clients computers and which user is working on it. file system watcher mechanism is used to indicate any change in files. The results were presente

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Lecture Notes In Networks And Systems
Evaluating the Efficiency of Regional Transport Network
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Baghdad Science Journal
Modeling The Power Grid Network Of Iraq
...Show More Authors

Recently, the theory of Complex Networks gives a modern insight into a variety of applications in our life. Complex Networks are used to form complex phenomena into graph-based models that include nodes and edges connecting them. This representation can be analyzed by using network metrics such as node degree, clustering coefficient, path length, closeness, betweenness, density, and diameter, to mention a few. The topology of the complex interconnections of power grids is considered one of the challenges that can be faced in terms of understanding and analyzing them. Therefore, some countries use Complex Networks concepts to model their power grid networks. In this work, the Iraqi Power Grid network (IPG) has been modeled, visua

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref