به جمع مشترکان مگیران بپیوندید!

تنها با پرداخت 70 هزارتومان حق اشتراک سالانه به متن مقالات دسترسی داشته باشید و 100 مقاله را بدون هزینه دیگری دریافت کنید.

برای پرداخت حق اشتراک اگر عضو هستید وارد شوید در غیر این صورت حساب کاربری جدید ایجاد کنید

عضویت
فهرست مطالب نویسنده:

mohammed q. mohammed

  • Rasool Muayad Obaidi, Riam Abdul Sattar, Mayada Abd, Inas Amjed Almani, Tawfeeq Alghazali, Saad Ghazi Talib, Muneam Hussein Ali, Mohammed Q. Mohammed, Tuqaa Abid Mohammad, Mariam Raheem Abdul-Sahib

    An Electrocardiogram (ECG) is a test that is done with the objective of monitoring the heart’s rhythm and electrical activity. It is conducted by attaching a specific type of sensor to the subject’s skin to detect the signals generated by the heartbeats. These signals can reveal significant information about the wellness of the subjects’ heart state, and cardiologists use them to detect abnormalities. Due to the prevalence of heart diseases amongst individuals around the globe, there is an urgent need to design computer-aided approaches to automatically analyze ECG signals. Recently, computer vision-based techniques have demonstrated remarkable performance in medical image analysis in a variety of applications and use cases. This paper proposes an approach based on Convolutional Autoencoders (CAEs) and Transfer Learning (TL). Our approach is an ensemble way of learning the most useful features from both the signal itself, which is the input of the CAE, and the spectrogram version of the same signal, which is fed to a convolutional feature extractor named MobileNetV1. Based on the experiments conducted on a dataset collected from 3 well-known hospitals in Baghdad, Iraq, the proposed method claims good performance in classifying four types of problems in the ECG signals. Achieving an accuracy of 97.3% proves that our approach can be remarkably fruitful in situations where access to expert human resources is scarce.

    Keywords: heart arrhythmia classification, efficientnet, convolutional autoencoders, transfer learning, deep learning
  • Esraa Faiq*, Ali M. Ahmed, Lujain N. Yousif, Mohammed Q. Mohammed

    This research describes the thermopower and electric conductivity of CdTe films produced using thermal evaporation technology; the energy activation value of this electrical and thermoelectrically properties are estimated. CdTe sheets have an electrical resistance of about (107. cm). Conductivity was studied, and it was found that the electrical conductivity increased with temperature. At low temperatures, there are two values of activation energy (Ea1=0.337eV) because of this dependence, but at high temperatures, (Ea2=0.702eV) is the only value of activation energy. The Seebeck coefficient (thermopower) was researched to find that it was temperature-dependent, and it was found that, as the temperature increased, the Seebeck coefficient decreased. The experiment results on thermoelectric power were summarized in a two-paragraph statement. The activation energy was measured to be (ES=0.561eV), and the CdTe film was shown to be p-type conductive.

    Keywords: Energy, CdTe, Thermal Evaporation, Seebeck coefficient
  • Awad Kadhim Hammoud, Hatem Nahi Mohaisen, Mohammed Q Mohammed

    In this research paper, we will present how to hide confidential information in a color image randomly using a mathematical equation; by apply this equation to the number of image bytes after converting the image into a digital image, the number of randomly selected bytes depends on the length of the secret message. After specifying the bytes, we include the secret message in those selected bytes utilizing least significant bit (LSB) of steganography, and return the new bytes in the same place in the original image by using the same mathematical equation, after the hiding process using steganography, and then we encrypt the image and send it to the recipient. Several statistical measures applied to the original image, compared with the image after embedding, and after the image encrypted. The results obtained are very good. The statistical measures were used the histogram, mean square error (MSE) and the peak signal to noise ratio (PSNR). The system is designed to perform these processes, which consists of two stages, hiding stage and extract stage. The first stage contains from four steps, the first step of this stage reading the image and converting it to a digital image and make an index on each byte of the image bytes and the application of the mathematical equation to select the bytes by randomly, second step is the process of hiding the secret message in selected bytes and return those bytes to the original locations, third step is the calculation of the statistical measures to determine the rate of confusion after the inclusion of the confidential message, fourth step to encrypt the image of the message carrier and measure the rate of confusion after the encryption and compare with the original image. The extraction process consists of three steps, the first step is to use the private key to decrypt, and the second step is to apply the same mathematical equation to extract the embedded bytes of the confidential message, third step use the same method of hiding the information and extracting the confidential message.

    Keywords: Steganograph, y Encryption, Decryption, Cryptography, Image, LSB, Randomly
  • MohammedMahdi Hashim, Ali A. Mahmood, Mohammed Q. Mohammed

    The information and communications technology time are essential for the security aspect of processes and methodologies. The security of information should a key priority in the secret exchange of information between two parties. That's to guarantee the information's security, some strategies are used, and they include steganography, watermark, and cryptography. In cryptography, the secrete message is converted into unintelligible text, but the existence of the secrete message is noticed, on the other hand, watermarking and steganography involve hiding the secrete message in a way that its presence cannot be noticed. Presently, the design and development of an effective image steganography system are facing several challenges such as low capacity, poor robustness and imperceptibility. To surmount these challenges, a new secure image steganography work called the Pixels Contrast (PC) method is proposed along with the eight neighbour's method and Huffman coding algorithm to overcome the imperceptibility and capacity issues. In the proposed method, a new image partitioning with a Henon map is used to increase the security part. This method has three main stages (preprocessing, embedding, and extracting) each stage has a different process. In this method, different standard images were used such as medical images and SIPI-dataset. The experimental result was evaluated with different measurement parameters like Histogram Analysis Structural Similarity Index (SSIM), Peak signal-to-noise ratio (PSNR). Compared the proposed method with the previous works then proved to be better than existing methods. In short, the proposed steganography method outperformed the commercially available data hiding schemes, thereby resolving the existing issues.

    Keywords: Eight neighbors, Compression method, Image steganography, Security, imperceptibility
بدانید!
  • در این صفحه نام مورد نظر در اسامی نویسندگان مقالات جستجو می‌شود. ممکن است نتایج شامل مطالب نویسندگان هم نام و حتی در رشته‌های مختلف باشد.
  • همه مقالات ترجمه فارسی یا انگلیسی ندارند پس ممکن است مقالاتی باشند که نام نویسنده مورد نظر شما به صورت معادل فارسی یا انگلیسی آن درج شده باشد. در صفحه جستجوی پیشرفته می‌توانید همزمان نام فارسی و انگلیسی نویسنده را درج نمایید.
  • در صورتی که می‌خواهید جستجو را با شرایط متفاوت تکرار کنید به صفحه جستجوی پیشرفته مطالب نشریات مراجعه کنید.
درخواست پشتیبانی - گزارش اشکال