Preferred Language
Articles
/
vxeWNY8BVTCNdQwCJ2Gf
System identification and control of robot manipulator based on fuzzy adaptive differential evolution algorithm
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Sat Jan 01 2011
Journal Name
Iraqi Journal Of Science
A CRYPTOGRAPHIC TECHNIQUE BASED ON AVL TREE
...Show More Authors

Publication Date
Fri Aug 23 2024
Journal Name
Aro-the Scientific Journal Of Koya University
Graphical User Authentication Algorithms Based on Recognition
...Show More Authors

In cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More
Publication Date
Mon Oct 02 2023
Journal Name
Journal Of Engineering
Skull Stripping Based on the Segmentation Models
...Show More Authors

Skull image separation is one of the initial procedures used to detect brain abnormalities. In an MRI image of the brain, this process involves distinguishing the tissue that makes up the brain from the tissue that does not make up the brain. Even for experienced radiologists, separating the brain from the skull is a difficult task, and the accuracy of the results can vary quite a little from one individual to the next. Therefore, skull stripping in brain magnetic resonance volume has become increasingly popular due to the requirement for a dependable, accurate, and thorough method for processing brain datasets. Furthermore, skull stripping must be performed accurately for neuroimaging diagnostic systems since neither no

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Oct 22 2018
Journal Name
Journal Of Biodiversity And Environmental Sciences
The use of asiamic pesticide and black pepper extracted to control the leaf miner Liriomyza trifolii on bean and natural enemies of insects
...Show More Authors

Publication Date
Wed Jan 01 2025
Journal Name
Fusion: Practice And Applications
Enhanced EEG Signal Classification Using Machine Learning and Optimization Algorithm
...Show More Authors

This paper proposes a better solution for EEG-based brain language signals classification, it is using machine learning and optimization algorithms. This project aims to replace the brain signal classification for language processing tasks by achieving the higher accuracy and speed process. Features extraction is performed using a modified Discrete Wavelet Transform (DWT) in this study which increases the capability of capturing signal characteristics appropriately by decomposing EEG signals into significant frequency components. A Gray Wolf Optimization (GWO) algorithm method is applied to improve the results and select the optimal features which achieves more accurate results by selecting impactful features with maximum relevance

... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Mon Jul 01 2019
Journal Name
2019 International Joint Conference On Neural Networks (ijcnn)
A Fast Feature Extraction Algorithm for Image and Video Processing
...Show More Authors

View Publication
Scopus (40)
Crossref (38)
Scopus Clarivate Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Iop Conference Series: Earth And Environmental Science
The Effect of Power Sources in the Agricultural Tractor and the Developed Sprayer System on the Performance of the Electrical and Mechanical Sprayer System and some Performance Indicators of the Engine
...Show More Authors
Abstract<p>An experiment was conducted to study the effect of the sprayer type according to the source of power and the size of the spray nozzle concerning the quality of the spray produced and fuel consumption.Two types of sprayers were used: a conventional boom sprayer (S1) and a modified (electrified) boom sprayer (S2), along with three sizes of the XR TeeJet 110 spray nozzle (N). The following technical performance indicators were examined: Density of coverage (drops/cm2) using ImageJ software, a 600dpi business card scanner, specifically the ScanShell 800N by CSSN, Inc, and water-sensitive paper (WSP), rate of spray nozzles discharge (ml/min), and fuel consumption (liters/hectare) using a c</p> ... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Mon Mar 23 2020
Journal Name
Journal Of Engineering
The Effect of Nano Materials on Lost Circulation Control of Azkand Formation in Khabaz Oil Field
...Show More Authors

Experimental tests were carried to control lost circulation in the Khabaz oil field using different types of LCMs including Nano-materials. A closed-loop circulation system was built to simulate the process of lost circulation into formations. Two dolomite plugs were used from different depths of the formation of Azkand in Khabaz oil field. The experimentations were carried out to study the effect of different types of LCMs, cross-linked copolymer (FLOSORB CE 300 S), SiO2 NP, and Fe2O3 NP, on mud volume losses as a function of time.

The rheological measurements of the nanoparticles-reference mud system showed that both of the SiO2 NP and Fe2O3 NP w

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Tue Feb 01 2011
Journal Name
Iop Conference Series: Materials Science And Engineering
Contour extraction of echocardiographic images based on pre-processing
...Show More Authors

In this work we present a technique to extract the heart contours from noisy echocardiograph images. Our technique is based on improving the image before applying contours detection to reduce heavy noise and get better image quality. To perform that, we combine many pre-processing techniques (filtering, morphological operations, and contrast adjustment) to avoid unclear edges and enhance low contrast of echocardiograph images, after implementing these techniques we can get legible detection for heart boundaries and valves movement by traditional edge detection methods.

View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref