Cyber Security for Medical Image Encryption using Circular Blockchain Technology Based on Modify DES Algorithm DOI Open Access
Abeer Salim Jamil, Abdul Monem S. Rahma

International Journal of Online and Biomedical Engineering (iJOE), Год журнала: 2023, Номер 19(03), С. 99 - 112

Опубликована: Март 14, 2023

Recently, with the requirement for protecting privacy of images transferred over internet and media networks. The need to protect these from hacking by unauthorized persons manipulation has become very important in this research, Block chain technology was used its importance cybersecurity. To maintain confidentiality patient's medical data, as a result, solve problem requires increasing strength key encryption process, which is responsible ensuring security image .In paper, it proposed use block Data Encryption Standard (DES) algorithm purpose degree transmitted enhancing during process encrypting well authentication between sender receiver. Experimental outcomes manifested that gained via suggested higher, performing goal information image, presented results obtained Entropy, MSE, PSNR.

Язык: Английский

Current advances and future perspectives of image fusion: A comprehensive review DOI
Shahid Karim, Geng Tong,

Jinyang Li

и другие.

Information Fusion, Год журнала: 2022, Номер 90, С. 185 - 217

Опубликована: Сен. 29, 2022

Язык: Английский

Процитировано

116

Enhancement of Online Education in Engineering College Based on Mobile Wireless Communication Networks and IOT DOI Open Access
Jaafar Qassim Kadhim,

Ibtisam A. Aljazaery,

Haider TH. Salim ALRikabi

и другие.

International Journal of Emerging Technologies in Learning (iJET), Год журнала: 2023, Номер 18(01), С. 176 - 200

Опубликована: Янв. 10, 2023

The field of Engineering is that which needs a high level analytical thinking, intuitive knowledge, and technical know-how. area communication engineering deals with different components including, wireless mobile services, radio, broadband, web satellites. There rapid decline in the quality students produced by faculties as result sufficient methods frameworks student assessment. production high-potential engineers limited utilization old traditional education methodology frameworks. presentation estimation system institution motionless manual. Usually, assessment student’s performance using to use students’ scores, while failing evaluate their based on activities or practical applications. In addition, such systems do not take cognizance individual knowledge connects within learning environment. Recently, institutions have started paying attention evaluation solutions are networks Internet Things (IoT). Therefore, this study, an automated has been proposed for students. designed IoT aim improving process virtual education. data used study collected through sensors premises college, pre-processed normalization. After was pre-processed, it stored cloud. order enable classification activity, Adaptive Layered Bayesian Belief Network (AL-BBN) classifier work. scores calculated fuzzy logic, Multi-Gradient Boosting Decision Tree (MGBDT) decision making. python simulation tool employed implementation system, benchmarks done well. Based findings conceptual model outperformed existing ones terms online learning.

Язык: Английский

Процитировано

73

MURF: Mutually Reinforcing Multi-Modal Image Registration and Fusion DOI
Han Xu, Jiteng Yuan, Jiayi Ma

и другие.

IEEE Transactions on Pattern Analysis and Machine Intelligence, Год журнала: 2023, Номер 45(10), С. 12148 - 12166

Опубликована: Июнь 7, 2023

Existing image fusion methods are typically limited to aligned source images and have "tolerate" parallaxes when unaligned. Simultaneously, the large variances between different modalities pose a significant challenge for multi-modal registration. This study proposes novel method called MURF, where first time, registration mutually reinforced rather than being treated as separate issues. MURF leverages three modules: shared information extraction module (SIEM), multi-scale coarse (MCRM), fine (F2M). The is carried out in coarse-to-fine manner. During registration, SIEM transforms into mono-modal eliminate modal variances. Then, MCRM progressively corrects global rigid parallaxes. Subsequently, repair local non-rigid offsets uniformly implemented F2M. fused provides feedback improve accuracy, improved result further improves result. For fusion, solely preserving original existing methods, we attempt incorporate texture enhancement fusion. We test on four types of data (RGB-IR, RGB-NIR, PET-MRI, CT-MRI). Extensive results validate superiority universality MURF.

Язык: Английский

Процитировано

72

Secure Chaos of 5G Wireless Communication System Based on IOT Applications DOI Open Access
Haider TH. Salim ALRikabi, Hussein Tuama Hazim

International Journal of Online and Biomedical Engineering (iJOE), Год журнала: 2022, Номер 18(12), С. 89 - 105

Опубликована: Сен. 14, 2022

This research is aimed at planning the manner in which secure 5G communication can be controlled based on traffic floods. To accomplish excellent administration execution of organization observing and directing calculation inescapable, dynamic steering actual equipment isn't reasonable for practical plans action. Accordingly, to bring down functional capital consumption, we propose a strategy called versatile made do with help (Quality Service MANET (Mobile specially appointed Network). A model will fulfilling needs customers simultaneously gives huge investment funds item cost convenience was presented this paper. perform steering, planned geography virtualized climate. We customized CHAOS network flood board goes about as consistent northward API directing. Network infused dynamically from 1MB up 10MB (connect b/w) progressive way similar 10 occurrences. In conclusion, performed applying control hypothetical method assistance calculations. By looking two situations, noticed prominent distinction throughput controlling application MANETs. data refreshed after clockwork.

Язык: Английский

Процитировано

69

A review of image fusion: Methods, applications and performance metrics DOI
Simrandeep Singh, Harbinder Singh, Gloria Bueno

и другие.

Digital Signal Processing, Год журнала: 2023, Номер 137, С. 104020 - 104020

Опубликована: Март 24, 2023

Язык: Английский

Процитировано

42

Dark Web Illegal Activities Crawling and Classifying Using Data Mining Techniques DOI Open Access
Abdul Hadi M. Alaidi,

Roa’a M. Al airaji,

Haider TH. Salim ALRikabi

и другие.

International Journal of Interactive Mobile Technologies (iJIM), Год журнала: 2022, Номер 16(10), С. 122 - 139

Опубликована: Май 24, 2022

Dark web is a canopy concept that denotes any kind of illicit activities carried out by anonymous persons or organizations, thereby making it difficult to trace. The content on the dark constantly updated and changed. collection classification such illegal are challenging tasks, as they time-consuming. This problem has in recent times emerged an issue requires quick attention from both industry academia. To this end, efforts have been made article crawler capable collecting pages, cleaning them, saving them document database, proposed. carries automatic gathered pages into five classes. classifiers used classifying include Linear Support Vector Classifier (SVC), Naïve Bayes (NB), Document Frequency (TF-IDF). experimental results revealed accuracy rate 92% 81% were achieved SVC NB, respectively.

Язык: Английский

Процитировано

63

Security Risks of the Metaverse World DOI Open Access
Tanya Abdulsattar Jaber

International Journal of Interactive Mobile Technologies (iJIM), Год журнала: 2022, Номер 16(13), С. 4 - 14

Опубликована: Июль 11, 2022

An interesting paradigm is a metaverse which represents the next generation of using internet to improve human lives and provide new way communicate by building system that let user represented their avatar work, socialize play virtually integrating multiple technologies such as blockchain, artificial intelligence well virtual augmented reality. However, this may preserve many problems related security privacy starting from data breaches identity theft, in paper an overview world architecture connects real discuss main risks within Metaverse

Язык: Английский

Процитировано

59

Design a system for an approved video copyright over cloud based on biometric iris and random walk generator using watermark technique DOI Open Access

Raghad Abdulaali Azeez,

Mohammad K. Abdul-Hussein, Mohammed Salih Mahdi

и другие.

Periodicals of Engineering and Natural Sciences (PEN), Год журнала: 2021, Номер 10(1), С. 178 - 178

Опубликована: Дек. 30, 2021

Copyright is a tool for preventing anyone forged to copy an electronic work from another person and claim that referred him. Since the identity of always determined by his name biometrics, there concern handle this information, preserve copyright. In paper, new idea copyright technology used prove video copyright, using blind watermarking technique, ownership information hidden inside frames linear congruential generator (LCG) adapted locations vector features extracted biometric image owner instead watermark in Pseudo Noise sequences or any other feature extraction technique. When providing watermarked vector, statistical operation increase randomization state amplifier factors LCG function. provides random positions where owner's stored video. The proposed method not difficult execute can present adaptable imperceptibility robustness performance. output results show approach based on average PSNR embedded 50 around 47.5 dB while remains undetectable. MSSIM values with range (0.83 0.99).

Язык: Английский

Процитировано

55

Face Patterns Analysis and Recognition System Based on Quantum Neural Network QNN DOI Open Access
Haider TH. Salim ALRikabi,

Ibtisam A. Aljazaery,

Jaafar Sadiq Qateef

и другие.

International Journal of Interactive Mobile Technologies (iJIM), Год журнала: 2022, Номер 16(08), С. 34 - 48

Опубликована: Апрель 26, 2022

The past few years have witnessed a huge increase in the application of facial recognition, detection, and analysis technology. However, face recognition systems remain most popular among general public. system can detect presence when exposed to one. accuracy fairness that be derived from such necessitate their use, because humans, particularly security personnel tired target wrong person as suspect. artificial intelligence are properly trained capable efficiently identifying classifying faces without errors. In this work, use Matlab language was employed building software is recognizing differentiating different patterns. proposed equipped with camera serves practical aspect captures shots sent theoretical part special program designed recognize by comparing them database stored within program. work involved Quantum Neural Network. training dataset made up features vectors were obtained well-known set images people. Here, Principle Component Analysis (PCA) used for extraction feature then prepared next step. experimental results revealed efficient achieved through well-trained

Язык: Английский

Процитировано

43

Automated Cheating Detection based on Video Surveillance in the Examination Classes DOI Open Access

Roa’a M. Al airaji,

Ibtisam A. Aljazaery,

Haider TH. Salim ALRikabi

и другие.

International Journal of Interactive Mobile Technologies (iJIM), Год журнала: 2022, Номер 16(08), С. 124 - 137

Опубликована: Апрель 26, 2022

A major issue in the field of education is exam malpractice and other forms academic dishonesty, where efforts made towards assessment students are undercut. In order to address this menace, a cheating detection system has been proposed study. The can detect real-time. uses video surveillance monitor activities student during exams, especially abnormal behavior. development involved use three different techniques, with functions. first technique helps determining direction students’ heads when they move from their initial direction, which script. Some form involves peeping at scripts people writing same exam. Whenever observes deviation that exceeds set threshold, it classifies behavior as abnormal. second works movement student’s iris. It detects iris moves copy answers written documents like mobile phones, books, hands, summary papers. third used identifying contact between hands face, well for shared students, such sharing incriminating materials. When any these detected, an automatic alarm alerts authority about thereby minimizing error rate occur result manual monitoring.

Язык: Английский

Процитировано

29