Preferred Language
Articles
/
5RYzuIcBVTCNdQwCcl5Y
Domino, novel steganography system
...Show More Authors

Primary objective of the proposed system is to achieve higher level of confidentiality in absence of standard encryption techniques which add up to complexity of the stego system. In this system the principle of dominoes is adopted in the way of the selection of the pixel of the image to hide the ciphertext. Where domino stones models are prepared in advance, which are two-dimensional matrices (2*6), and selecting one of them and start the projection of the model on the image and hide the ciphertext in the pixel corresponding to the points in the domino model Experimental results show that the proposed system effectively achieve the objective. Even though the proposed system gives good enhancement to the steganoraphy technique and there is no difference between the cover-image and the stego-image can be seen by the human vision system (HVS), so this method can be considered as a success and can be adopted in the field of stege

Publication Date
Sat Dec 30 2023
Journal Name
Traitement Du Signal
Optimizing Acoustic Feature Selection for Estimating Speaker Traits: A Novel Threshold-Based Approach
...Show More Authors

View Publication
Clarivate Crossref
Publication Date
Wed Nov 01 2023
Journal Name
Journal Of Dentistry
The in-vitro development of novel enzyme-based chemo-mechanical caries removal agents
...Show More Authors

Objectives: Bromelain is a potent proteolytic enzyme that has a unique functionality makes it valuable for various therapeutic purposes. This study aimed to develop three novel formulations based on bromelain to be used as chemomechanical caries removal agents. Methods: The novel agents were prepared using different concentrations of bromelain (10–40 wt. %), with and without 0.1–0.3 wt. % chloramine T or 0.5–1.5 wt. % chlorhexidine (CHX). Based on the enzymatic activity test, three formulations were selected; 30 % bromelain (F1), 30 % bromelain-0.1 % chloramine (F2) and 30 % bromelain-1.5 % CHX (F3). The assessments included molecular docking, Fourier-transform infrared spectroscopy (FTIR), viscosity and pH measurements. The efficie

... Show More
Scopus (8)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Thu Jun 29 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Synthesis of Novel Porphyrin Derivatives and Investigate their Application in Sensitized Solar Cells
...Show More Authors

Solar energy has significant advantages compared to conventional sources such as coal and natural gas, including no emissions, no need for fuel, and the potential for installation in a wide range of locations with access to sunlight. In this investigation, heterocyclic derivatives were synthesized from several porphyrin derivatives (4,4',4",4"'-(porphyrin-5,10,15,20-tetrayl) tetra benzoic acid) compound (3), obtained by reaction Pyrrole with 4-formyl benzoic acid. Subsequently, porphyrin derivative-component amides 5a, 5b, and 5c were produced by reacting compound (3) with amine derivatives at a 1:4 molar ratio. These derivatives exhibited varying sensitivities for utilization in solar cells, with compound 5a displaying the highest power

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Engineering
A Novel Analytical Model to Design Piezoelectric Patches Used to Repair Cracked Beams
...Show More Authors

In this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additio

... Show More
View Publication Preview PDF
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Feb 26 2021
Journal Name
Life-cycle Civil Engineering: Innovation, Theory And Practice
Shear performance of a novel demountable connector for reusable steel-concrete composite structures
...Show More Authors

A novel demountable shear connector is proposed to link a concrete slab to steel sections in a way that resulting steel-concrete composite floor is demountable, i.e. it can be easily dismantled at the end of its service life. The proposed connectors consist of two parts: the first part is a hollow steel tube with internal threads at its lower end. The second part is a compatible partially threaded bolted stud. After linking the stud to the steel section, the hollow steel tube can be fastened over the threaded stud, which create a complete demountable shear connector. The connector is suitable for use in both composite bridges and buildings, and using cast in-situ slabs, precast solid slabs, or hollow-core precast slabs. A series of push-off

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Mar 30 2006
Journal Name
College Of Islamic Sciences
The novel of the innovator and its impact on the differences of jurists
...Show More Authors

Praise be to God, Lord of the worlds, and prayers and peace be upon our master and beloved Muhammad, the wise guide and great teacher, the guide to a straight path, the one sent as a mercy to the worlds, and upon his good and chosen family, his chosen companions, the working scholars, and those who follow them in righteousness until the Day of Judgment.

And after:

One of the important controversial topics shared between the sciences of the Noble Hadith and the Fundamentals of God is the issue of the innovator in terms of accepting and rejecting his narration and testimony, and the difference in it leads to disagreement in many branches of jurisprudence that were based on texts narrated by innovated narrators or those accu

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 01 2018
Journal Name
Food Chemistry
Rapid determination of thiabendazole in juice by SERS coupled with novel gold nanosubstrates
...Show More Authors

View Publication
Scopus (115)
Crossref (115)
Scopus Clarivate Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Journal Of Computational Science
Novel approximate solution for fractional differential equations by the optimal variational iteration method
...Show More Authors

View Publication
Crossref (36)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (5)
Scopus Crossref