Preferred Language
Articles
/
wBZVeocBVTCNdQwCY1N8
Efficient Eye Recognition for Secure Systems using Convolutional Neural Network
...Show More Authors

Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 31 2021
Journal Name
Iraqi Journal Of Laser
Hong-Ou-Mandel Dip Measurements of Two Independent Weak Coherent Pulses for Free Space Quantum Key Distribution Systems
...Show More Authors

Preparation of identical independent photons is the core of many quantum applications such as entanglement swapping and entangling process. In this work, Hong-Ou-Mandel experiment was performed to evaluate the degree of indistinguishability between independent photons generated from two independent weak coherent sources working at 640 nm. The visibility was 46%, close to the theoretical limit of 50%. The implemented setup can be adopted in quantum key distribution experiments carried out with free space as the channel link, as all the devices and components used are operative in the visible range of the electromagnetic spectrum.

View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Arab Journal Of Basic And Applied Sciences
Boundary-domain integral method and homotopy analysis method for systems of nonlinear boundary value problems in environmental engineering
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Sat Aug 16 2025
Journal Name
Journal Of Baghdad College Of Dentistry
The influence of cavity design for cusp coverage on fracture strength of weakened maxillary first premolars using two esthetic restorative systems (CAD/CAM hybrid ceramic and nanohybrid composite) (An in vitro study)
...Show More Authors

Background: Maxillary first premolar with wide MOD cavity more susceptible to fracture. The aim of this study was to assess the influence of cavity design for cusp coverage on the fracture resistance of weakened maxillary first premolar restored with CAD/CAM hybrid ceramic versus nanohybide composite. Materials and Methods: Fifty six intact maxillary first premolars of approximately comparable sizes were divided into seven groups eight for each: Group A: Intact teeth (control group); Group B: teeth prepared for MOD inlay; Group C: teeth prepared for MOD onlay covering the lingual cusp; Group D: teeth prepared for MOD covering buccal and lingual cusps ,the previous three groups indirectly restored with nanohybrid composite (3M ESPE Z 250 X

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 25 2021
Journal Name
Engineering And Technology Journal
The Effect of the Number of Key-Frames on the Facial Emotion Recognition Accuracy
...Show More Authors

Key-frame selection plays an important role in facial expression recognition systems. It helps in selecting the most representative frames that capture the different poses of the face. The effect of the number of selected keyframes has been studied in this paper to find its impact on the final accuracy of the emotion recognition system. Dynamic and static information is employed to select the most effective key-frames of the facial video with a short response time. Firstly, the absolute difference between the successive frames is used to reduce the number of frames and select the candidate ones which then contribute to the clustering process. The static-based information of the reduced sets of frames is then given to the fuzzy C-Means algor

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Sep 23 2019
Journal Name
Baghdad Science Journal
A Semi-Supervised Machine Learning Approach Using K-Means Algorithm to Prevent Burst Header Packet Flooding Attack in Optical Burst Switching Network
...Show More Authors

Optical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Sep 30 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Adopting International Financial Reporting Standard No. (9) Financial Instruments - Recognition and Measurement of Accounting for Shares and its Reflection on the Financial Statements of Companies
...Show More Authors

Many financial institutions invest their surplus funds in stocks, either to obtain dividends or for trading purposes and to obtain profits from the difference between the cost and the selling price, and investment in shares represents an important part of the financial position of financial institutions applying to the common accounting system of banks and insurance companies, in addition to their impact It is clear on the result of the activity of these institutions.The aim of the research is to define what the shares and their types are, and to indicate the accounting treatments needed to move towards the process of adopting the International Financial Reporting Standard No. (9) and its reflection on its financial statements. I

... Show More
View Publication Preview PDF
Publication Date
Fri Aug 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Design a Security Network System against Internet Worms
...Show More Authors

 Active worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.

View Publication Preview PDF
Publication Date
Wed Sep 01 2021
Journal Name
International Scientific Congress Of Pure, Applied And Technological Sciences (minar Congress)
Evaluation Of Electromagnetic Pollution Of Cellular Mobile Network
...Show More Authors

Wireless communications are characterized by their fastest growth in history, as they used ever-evolving and renewed technologies, which have allowed them to spread widely. Every day, communication technology introduces a new invention with features that differ from its predecessor. Bell Laboratories first suggested mobile wireless communication services to the general population in the late 1940s. Still, it wasn't easy at that time to use on a large scale due to its high costs. This paper aims to describe the state of cellular mobile networks; by comparing the sources of electromagnetic pollution caused by these networks, measure the level of power density in some residential areas, and compare them with international standards adopted in

... Show More
Publication Date
Sun Sep 01 2013
Journal Name
International Journal Of Computer Applications
Concise Architecture of a Remote Network based Controller
...Show More Authors

The development of microcontroller is used in monitoring and data acquisition recently. This development has born various architectures for spreading and interfacing the microcontroller in network environment. Some of existing architecture suffers from redundant in resources, extra processing, high cost and delay in response. This paper presents flexible concise architecture for building distributed microcontroller networked system. The system consists of only one server, works through the internet, and a set of microcontrollers distributed in different sites. Each microcontroller is connected through the Ethernet to the internet. In this system the client requesting data from certain side is accomplished through just one server that is in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2011
Journal Name
Trends In Network And Communications
Header Compression Scheme over Hybrid Satellite-WiMAX Network
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref