Preferred Language
Articles
/
1RZAmYcBVTCNdQwC9Vdv
Hiding Techniques for Dynamic Encryption Text based on Corner Point
...Show More Authors

Hiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 16 2022
Journal Name
International Journal Of Recent Contributions From Engineering, Science & It
Smart Learning based on Moodle E-learning Platform and Digital Skills for University Students
...Show More Authors

Publication Date
Fri Nov 04 2022
Journal Name
Journal Of Optics
Coreless optical fiber for hemoglobin (HB) sensing with bilayer based on surface plasmon resonance
...Show More Authors

In this work, an optical fiber biomedical sensor for detecting the ratio of the hemoglobin in the blood is presented. A surface plasmon resonance (SPR)-based coreless optical fiber was developed and implemented using single- and multi-mode optical fibers. The sensor is also utilized to evaluate refractive indices and concentrations of hemoglobin in blood samples, with 40 nm thickness of (20 nm Au and 20 nm Ag) to increase the sensitivity. It is found in practice that when the sensitive refractive index increases, the resonant wavelength increases due to the decrease in energy.

View Publication Preview PDF
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Ieee Access
Microwave Nondestructive Testing for Defect Detection in Composites Based on K-Means Clustering Algorithm
...Show More Authors

View Publication
Scopus (64)
Crossref (63)
Scopus Clarivate Crossref
Publication Date
Thu Jul 28 2016
Journal Name
Computer And Information Science
Refinement for Ocular Ultrasound Images Quality by Utilizing Combination of Enhancement Techniques
...Show More Authors

Ultrasound has been used as a diagnostic modality for many intraocular diseases, due its safety, low cost, real time and wide availability. Unfortunately, ultrasound images suffer from speckle artifact that are tissue dependent. In this work, we will offer a method to reduce speckle noise and improve ultrasound image to raise the human diagnostic performance. This method combined undecimated wavelet transform with a wavelet coefficient mapping function: where UDWT used to eliminate the noise and a wavelet coefficient mapping function used to enhance the contrast of denoised images obtained from the first component. This methods can be used not only as a means for improving visual quality of medical images but also as a preprocessing

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 02 2017
Journal Name
Journal Of Educational And Psychological Researches
Effect of Discussion Techniques in Composition performance for The fifth preparatory student
...Show More Authors

The present study aims at knowing the effect of discussion method for students of fifth grade in preparatory school.

Methodology of the Study:

          In order to achieve the objective of the study, the researcher chooses non-randomly the preparatory school affiliated to the District Chamchamal \ Suliemnaniya. The sample attained 64 students in 32 per group (control and experimental) groups. The researcher used the discussion method which was applied on experimental group. She uses the traditional method on the control group.

The researcher matched the two group in ago, intelligence, marks at the Kurdish Language in the previous year , pretest and posts for the indepe

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 05 2015
Journal Name
PrzeglĄd Elektrotechniczny
Power Amplifier Frequency Controller Using feedback control techniques for Bio-implanted Devices
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sun Jul 01 2018
Journal Name
International Journal Of Civil Engineering And Technology (ijciet)
A Proposed Hybird Text Cryptographic Method Using Circular Queue
...Show More Authors

The sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ

... Show More
Publication Date
Mon May 02 2022
Journal Name
Lark Journal
Iraq Wars: From A literary text to Social Context
...Show More Authors

This article investigates Iraq wars presentation in literature and media. The first section investigates the case of the returnees from the war and their experience, their trauma and final presentation of that experience. The article also investigates how trauma and fear is depicted to create an optimized image and state of fear that could in turn show Iraqi society as a traumatized society. Critics such as Suzie Grogan believes that the concept of trauma could expand to influence societies rather than one individual after exposure to trauma of being involved in wars and different major conflicts. This is reflected in Iraq as a country that was subjected to six comprehensive conflicts in its recent history, i.e. less than half a century; th

... Show More
Publication Date
Wed Jun 14 2023
Journal Name
Al-academy
The Written Text in Conceptual Art (An Analytical Study)
...Show More Authors

The tagged research problem (the outputs of the written text in conceptual art) dealt with a comparative analytical study in the concept of conceptual art trends (land art - body art - art - language).

The study consisted of four chapters. The first chapter dealt with the theoretical framework, which was represented in presenting (the research problem), which raised the following question: What is the role of the written text in the transformations of the conceptual arts?

The first chapter included (the importance of research) and (research objectives) seeking to conduct comparative research in the written text within the trends of conceptual art as a moving phenomenon in art, and to reveal the variable written text in the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Cryptography based on retina information
...Show More Authors

The security of message information has drawn more attention nowadays, so; cryptography has been used extensively. This research aims to generate secured cipher keys from retina information to increase the level of security. The proposed technique utilizes cryptography based on retina information. The main contribution is the original procedure used to generate three types of keys in one system from the retina vessel's end position and improve the technique of three systems, each with one key. The distances between the center of the diagonals of the retina image and the retina vessel's end (diagonal center-end (DCE)) represent the first key. The distances between the center of the radius of the retina and the retina vessel's end (ra

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref