Preferred Language
Articles
/
1RZAmYcBVTCNdQwC9Vdv
Hiding Techniques for Dynamic Encryption Text based on Corner Point
...Show More Authors

Hiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Sep 01 2019
Journal Name
Baghdad Science Journal
PWRR Algorithm for Video Streaming Process Using Fog Computing
...Show More Authors

       The most popular medium that being used by people on the internet nowadays is video streaming.  Nevertheless, streaming a video consumes much of the internet traffics. The massive quantity of internet usage goes for video streaming that disburses nearly 70% of the internet. Some constraints of interactive media might be detached; such as augmented bandwidth usage and lateness. The need for real-time transmission of video streaming while live leads to employing of Fog computing technologies which is an intermediary layer between the cloud and end user. The latter technology has been introduced to alleviate those problems by providing high real-time response and computational resources near to the

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Apr 01 2013
Journal Name
International Journal Of Electrical, Electronics And Telecommunication Engineering
Performance Analysis of xPON Network for Different Queuing Models
...Show More Authors

Passive optical network (PON) is a point to multipoint, bidirectional, high rate optical network for data communication. Different standards of PONs are being implemented, first of all PON was ATM PON (APON) which evolved in Broadband PON (BPON). The two major types are Ethernet PON (EPON) and Gigabit passive optical network (GPON). PON with these different standards is called xPON. To have an efficient performance for the last two standards of PON, some important issues will considered. In our work we will integrate a network with different queuing models such M/M/1 and M/M/m model. After analyzing IPACT as a DBA scheme for this integrated network, we modulate cycle time, traffic load, throughput, utilization and overall delay

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 08 2018
Journal Name
Journal Of Al-nahrain University
CALCULATION OF THE PARAMETERS FOR ATMOSPHERICMODEL FOR THE EARTH
...Show More Authors

Publication Date
Fri Jul 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Material Requirements Planning for the Electric Motor in Fuzzy Environment for State Company for Electric Industries
...Show More Authors

ABSTRUCT

This research aims at examining the expected gap between the fact of planning and controlling process of production at the State Company for Electric Industries and implementation of material requirements planning system in fuzzy environment. Developing solutions to bridge the gap is required to provide specific mechanisms subject to the logic of fuzzy rules that will keep pace with demand for increased accuracy and reduced waiting times depending on demand forecast, investment in inventory to reduce costs to a minimum.

The proposed solutions for overcoming the research problem has required some  questions reflecting the problem with its multiple dimensions, which ar

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Apr 16 2019
Journal Name
Proceedings Of The 2019 5th International Conference On Computer And Technology Applications
Four Char DNA Encoding for Anomaly Intrusion Detection System
...Show More Authors

Recent research has shown that a Deoxyribonucleic Acid (DNA) has ability to be used to discover diseases in human body as its function can be used for an intrusion-detection system (IDS) to detect attacks against computer system and networks traffics. Three main factor influenced the accuracy of IDS based on DNA sequence, which is DNA encoding method, STR keys and classification method to classify the correctness of proposed method. The pioneer idea on attempt a DNA sequence for intrusion detection system is using a normal signature sequence with alignment threshold value, later used DNA encoding based cryptography, however the detection rate result is very low. Since the network traffic consists of 41 attributes, therefore we proposed the

... Show More
View Publication
Scopus (7)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun Feb 28 2021
Journal Name
International Journal Of Intelligent Engineering And Systems
Intelligent System for Parasitized Malaria Infection Detection Using Local Descriptors
...Show More Authors

Malaria is a curative disease, with therapeutics available for patients, such as drugs that can prevent future malaria infections in countries vulnerable to malaria. Though, there is no effective malaria vaccine until now, although it is an interesting research area in medicine. Local descriptors of blood smear image are exploited in this paper to solve parasitized malaria infection detection problem. Swarm intelligence is used to separate the red blood cells from the background of the blood slide image in adaptive manner. After that, the effective corner points are detected and localized using Harris corner detection method. Two types of local descriptors are generated from the local regions of the effective corners which are Gabor based f

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Tue Aug 03 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Accounting disclosure of social responsibility and its impact on achieving sustainable development goals: (Applied research in the State Company for Food Industries- Diwaniyah Dairy Factory)
...Show More Authors

The researchers seek to shed light on the importance of accounting disclosure on social responsibility, and the research aims to provide a theoretical approach to social accounting and its disclosure, identify the concept of sustainable development, highlight the theoretical foundations of sustainable development and employ disclosure of social responsibility towards achieving the goals of sustainable development, and identify the impact of The accounting disclosure on social responsibility in achieving sustainable development goals, and the research problem can be reviewed by asking the following question (Does the accounting disclosure of the social responsibility of economic units contribute to achieving sustainable developmen

... Show More
View Publication Preview PDF
Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Physical Education
The effect of e-learning on learning the skills of short Service and front-dimensional blow for badminton players under the age of 15 years.
...Show More Authors

AO Dr. Ali Jihad, Journal of Physical Education, 2021

View Publication
Publication Date
Wed Mar 29 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Effect of Heterogeneity on Capillary Pressure and Relative Permeability Curves in Carbonate Reservoirs. A Case Study for Mishrif Formation in West Qurna/1 Oilfield, Iraq
...Show More Authors

The special core analysis tests were accomplished on a set of core plugs for Mishrif Formation (mA, mB1, and mB2cde/mC units) in West Qurna/1 oilfield, southern Iraq. Oil relative permeability (Kro) data and the Corey-type fit of the data as functions of the brine saturation at the core outlet face for individual samples in the water-oil imbibition process to estimate relative permeability measurements by the centrifuge method were utilized. Identical correlations for oil and water relative permeabilities were extracted by steady-state and unsteady-state methods. For the mA samples, the gas-water capillary pressure curves were within a narrow range (almost identical) indicating that mA is a homogeneous unit. Kro curves for three mB2

... Show More
Crossref (8)
Crossref
Publication Date
Tue Oct 18 2022
Journal Name
Revista Iberoamericana De Psicología Del Ejercicio Y El Deporte.
The effect of HIIT exercises on some physiological and physical indicators in reducing competition anxiety and performance of some offense skills for young Badminton athletes
...Show More Authors

The research aimed to use HIIT exercises, and to know the effect of HIIT exercises on some physiological and physical indicators of the young badminton players, and to identify the degree of competition anxiety and the performance of some offense skills among the young badminton players. The research community (the young badminton players), the research sample and its selection method (the research sample was chosen by the intentional method (8) badminton player from the Athwari Club), the scientific method (the experimental method with pre and post tests), measurement tools: physiological tests (high and low blood pressure) , pulse, and physical exams (explosive force of arms and legs) and the offense skills and the scale of competition an

... Show More
Scopus (8)
Scopus