Preferred Language
Articles
/
vRYCBYcBVTCNdQwCWi2j
Fast Shot Boundary Detection Based on Separable Moments and Support Vector Machine
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Construct an efficient distributed denial of service attack detection system based on data mining techniques
...Show More Authors

<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sat Feb 25 2017
Journal Name
International Journal On Advanced Science, Engineering And Information Technology
A Novel DNA Sequence Approach for Network Intrusion Detection System Based on Cryptography Encoding Method
...Show More Authors

A novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh

... Show More
View Publication
Scopus (9)
Crossref (5)
Scopus Crossref
Publication Date
Wed Apr 05 2023
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
A Partial Face Encryption in Real World Experiences Based on Features Extraction from Edge Detection
...Show More Authors

User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Wed Jul 01 2015
Journal Name
Journal Of Engineering
Effect of Plasma Shot Peening on Mechanical Properties and Fatigue life of AL-Alloys 2024-T3
...Show More Authors

An Investigation of estimated Mechanical Properties of AL-Alloys 2024-T3, which is the most commonly used in industrial applications, been established experimentally. A new novel Plasma Peening techniques had applied for the whole surfaces of the material by CNC-Plasma machine for 48 specimen, and then a new investigation were toke over to figure the amount of change in mechanical properties and estimated fatigue life. It found that improvement was showing a nonlinear behavior according to peening duration time, speed, peening distance, peening number, and amount of effected power on the depth of the material thickness. The major improvement was at medium speed long duration time normal peening distance. Which shows up t

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Ieee Access
IFFT-Based Microwave Non-Destructive Testing for Delamination Detection and Thickness Estimation
...Show More Authors

View Publication
Scopus (13)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2005
Journal Name
Iraqi Journal Of Science
Comparison between Zernike moment and central moments for matching problem
...Show More Authors

Moment invariants have wide applications in image recognition since they were proposed.

Publication Date
Fri Jan 01 2021
Journal Name
Artificial Intelligence For Covid-19
An Efficient Mixture of Deep and Machine Learning Models for COVID-19 and Tuberculosis Detection Using X-Ray Images in Resource Limited Settings
...Show More Authors

View Publication
Scopus (27)
Crossref (24)
Scopus Crossref
Publication Date
Wed Mar 01 2017
Journal Name
Archive Of Mechanical Engineering
Using the Lid-Driven Cavity Flow to Validate Moment-Based Boundary Conditions for the Lattice Boltzmann Equation
...Show More Authors
Abstract<p>The accuracy of the Moment Method for imposing no-slip boundary conditions in the lattice Boltzmann algorithm is investigated numerically using lid-driven cavity flow. Boundary conditions are imposed directly upon the hydrodynamic moments of the lattice Boltzmann equations, rather than the distribution functions, to ensure the constraints are satisfied precisely at grid points. Both single and multiple relaxation time models are applied. The results are in excellent agreement with data obtained from state-of-the-art numerical methods and are shown to converge with second order accuracy in grid spacing.</p>
View Publication
Scopus (20)
Crossref (17)
Scopus Crossref
Publication Date
Sun Jun 30 2024
Journal Name
Iraqi Journal Of Science
Detection of Zn Water Pollution by a Biosensor Based on Alkaloids Derived from Iraqi Catharanthus Roseus
...Show More Authors

     In this work, the detection of zinc (Zn) ions that cause water pollution is studied using the CSNPs- Linker-alkaloids compound that was prepared by linking extracted alkaloids from Iraqi Catharanthus roseus plant with Chitosan nanoparticles (CSNPs) using maleic anhydride. This compound is characterized by an X-ray diffractometer (XRD) which shows that it has an orthorhombic structure with crystallite size in the nano dimension. Zeta Potential results show that the CSNPs-Linker-alkaloids carried a positive charge of 54.4 mV, which means it possesses high stability.  The Fourier transform infrared spectroscopy (FTIR) shows a new distinct band at 1708.93 cm-1 due to C=O esterification. Scanning electron microscope (SEM) image

... Show More
Crossref (1)
Scopus Crossref
Publication Date
Mon Mar 18 2019
Journal Name
Al-khwarizmi Engineering Journal
Effect of optimal shot peening time on fatigue life for aluminum alloy 6061-T651
...Show More Authors

The compressive residual stresses generated by shot peening, is increased in a direct proportional way with shot peening time (SPT). For each metal, there is an optimum shot peening time (O.S.T) which gives the optimum fatigue life. This paper experimentally studied to optimize shot peening time of aluminium alloy 6061-T651 as well as using of and analysis of variance (ANOVA).

Two types of fatigue test specimens’ configuration were used, one without notch (smooth) and the other with a notch radius (1,25mm), each type was shot peened at different time. The (O.S.T) was experimentally estimated  to be 8 minutes reaching the surface stresses at maximum peak of -184.94 MPa.

A response surface methodology (RSM) is presen

... Show More
View Publication Preview PDF
Crossref (1)
Crossref