Preferred Language
Articles
/
BxYD9osBVTCNdQwCpee8
A Proposed Steganographic Method in Digital Media
...Show More Authors

WA Shukur, journal of the college of basic education, 2011 The aim of this research is designing and implementing proposed steganographic method. The proposed steganographic method don’t use a specific type of digital media as a cover but it can use all types of digital media such as audio, all types of images, video and all types of files as a cover with the same of security, accuracy and quality of original data, considering that the size of embedded data must be smaller than the size of a cover. The proposed steganographic method hides embedded data at digital media without any changing and affecting the quality of the cover data. This means, the difference rate between cover before hiding operation and stego is zero. The proposed steganographic method hides embedded data at various locations in cover irregularly or randomly, whereas the locations of cover for information hiding are not constant, this property will increase the level of security for proposed method. In the proposed method, the sender needs sending a file that has small size via any communication channel and that considered as a key while sending a cover is not necessary to recipient if both agree about downloading it from the internet before sending a file. The contents of this file are invaluable for an attacker. The programming language that used in programming this proposed method is C++ language. Steganographically, The proposed steganographic method is strong and robust. It is possible classifying this proposed method as a public key steganography system and substitution system at the same time.

View Publication
Publication Date
Mon Feb 21 2022
Journal Name
Научный форум: Филология, искусствоведение и культурология: сб. ст. по материалам Lvi междунар. науч.-практ. конф. – No 2 (56). – М
Comparative analysis of zoomorphic metaphors in Russian and Arabic as a method for studying linguoculturology
...Show More Authors

: zonal are included in phraseological units, form metaphorical names for a person, give him various emotional and evaluative characteristics. This article examines the topic of zoomorphic metaphors that characterize a person in the Russian and Arabic languages in the aspect of their comparative analysis, since the comparative analysis of the metaphorical meanings of animalisms is an important method for studying cultural linguistics, since zoomorphic metaphors are a reflection of culture in a language.

Preview PDF
Publication Date
Mon Jun 12 2017
Journal Name
Day 3 Wed, June 14, 2017
A New Practical Method for Predicting Equivalent Drainage Area of Well in Tight Gas Reservoirs
...Show More Authors
Abstract<p>The tight gas is one of the main types of the unconventional gas. Typically the tight gas reservoirs consist of highly heterogeneous low permeability reservoir. The economic evaluation for the production from tight gas production is very challenging task because of prevailing uncertainties associated with key reservoir properties, such as porosity, permeability as well as drainage boundary. However one of the important parameters requiring in this economic evaluation is the equivalent drainage area of the well, which relates the actual volume of fluids (e.g gas) produced or withdrawn from the reservoir at a certain moment that changes with time. It is difficult to predict this equival</p> ... Show More
View Publication
Scopus (12)
Crossref (8)
Scopus Crossref
Publication Date
Mon Oct 02 2023
Journal Name
Journal Of Engineering
Transport Assessment Using Bayesian Method to Determine Ride-Hailing in Kula Lumpur: A Case Study
...Show More Authors

This research was designed to investigate the factors affecting the frequency of use of ride-hailing in a fast-growing metropolitan region in Southeast Asia, Kuala Lumpur. An intercept survey was used to conduct this study in three potential locations that were acknowledged by one of the most famous ride-hailing companies in Kuala Lumpur. This study used non-parametric and machine learning techniques to analyze the data, including the Pearson chi-square test and Bayesian Network. From 38 statements (input variables), the Pearson chi-square test identified 14 variables as the most important. These variables were used as predictors in developing a BN model that predicts the probability of weekly usage frequency of ride-hai

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 28 2025
Journal Name
Chemical Papers
New chemiluminometric method for the determination of azithromycin in a continuous flow injection analysis system
...Show More Authors

A novel analytical method is developed for the determination of azithromycin. The method utilizes continuous flow injection analysis to enhance the chemiluminescence system of luminol, H2O2, and Cr(III). The method demonstrated a linear dynamic range of 0.001–100 mmol L-1 with a high correlation coefficient (r) of 0.9978, and 0.001–150 mmol L-1 with a correlation coefficient (r) of 0.9769 for the chemiluminescence emission versus azithromycin concentration. The limit of detection (L.O.D.) of the method was found to be 18.725 ng.50 µL−1 based on the stepwise dilution method for the lowest concentration within the linear dynamic range of the calibration graph. The relative standard deviation (R.S.D. %) for n = 6 was less than 1.2%

... Show More
View Publication
Scopus (1)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed May 18 2022
Journal Name
International Journal Of Early Childhood Special Education
The effectof a proposed strategy according to realistic mathematics theory on the mathematical interrelation of third-grade intermediate students
...Show More Authors

The current study aimed at (identifying the impact of a proposed strategy based on the realistic mathematics theory in the mathematical interrelation among the third intermediate grade students), two samples from the third intermediate grade were tested in a school affiliated to Rusafa I General education Directorate in Baghdad for the academic year (2022-2021)the experimental group will study according to the proposed strategy and it consisted of (30) female students , the control group will study through the traditional method and the number of its students is (30), thus the study sample consisted of (60) female students, the two groups were equalized in the variables (age in months, intelligence, prior knowledge) and to achieve the study

... Show More
View Publication
Publication Date
Mon Nov 01 2021
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Proposed emerged and enhanced routing protocols for wireless networks
...Show More Authors

The problem motivation of this work deals with how to control the network overhead and reduce the network latency that may cause many unwanted loops resulting from using standard routing. This work proposes three different wireless routing protocols which they are originally using some advantages for famous wireless ad-hoc routing protocols such as dynamic source routing (DSR), optimized link state routing (OLSR), destination sequenced distance vector (DSDV) and zone routing protocol (ZRP). The first proposed routing protocol is presented an enhanced destination sequenced distance vector (E-DSDV) routing protocol, while the second proposed routing protocol is designed based on using the advantages of DSDV and ZRP and we named it as

... Show More
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Proposed Audit Program for Automated Clearing House System (ACH)
...Show More Authors

إن استخدام النظم الالكترونية في القطاع المصرفي وبالخصوص نظام مقاصة الصكوك الالكترونية (ACH) في عمليات التحويل الالكتروني للاموال بين المصارف تتضمن تحويلات مالية عالية القيمة  بين  المصارف المشاركة بهذا النظام, وان اي خلل قد يحدث بالنظام يؤدي الى حالات تلاعب في مقاصة الصكوك الالكترونية في المصارف المشاركة وبالتالي حدوث عملية اختلاس, ومن هذا المنطلق تبرز مشكلة البحث في اهمية توافر برنامج تدقيق مقترح ياخ

... Show More
View Publication
Crossref
Publication Date
Sun Mar 07 2010
Journal Name
Baghdad Science Journal
Proposed methods of image recognition depend on the PCA
...Show More Authors

This paper suggest two method of recognition, these methods depend on the extraction of the feature of the principle component analysis when applied on the wavelet domain(multi-wavelet). First method, an idea of increasing the space of recognition, through calculating the eigenstructure of the diagonal sub-image details at five depths of wavelet transform is introduced. The effective eigen range selected here represent the base for image recognition. In second method, an idea of obtaining invariant wavelet space at all projections is presented. A new recursive from that represents invariant space of representing any image resolutions obtained from wavelet transform is adopted. In this way, all the major problems that effect the image and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 23 2011
Journal Name
Ibn Al- Haitham J. For Pure & Appl. Sci.
Image Compression Using Proposed Enhanced Run Length Encoding Algorithm
...Show More Authors

In this paper, we will present proposed enhance process of image compression by using RLE algorithm. This proposed yield to decrease the size of compressing image, but the original method used primarily for compressing a binary images [1].Which will yield increasing the size of an original image mostly when used for color images. The test of an enhanced algorithm is performed on sample consists of ten BMP 24-bit true color images, building an application by using visual basic 6.0 to show the size after and before compression process and computing the compression ratio for RLE and for the enhanced RLE algorithm.

Preview PDF
Publication Date
Mon Feb 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Asymmetry of accounting information - the reasons and proposed treatments
...Show More Authors

The research aims to identify the reasons that lead to asymmetry of information between economic unity administration and the parties that use accounting information such as shareholders, So,  the ability to reach to the solutions that would reduce this problem, these factors have been divided into two types: the first one is the internal factors which represent the administration's desire   in order to expand the self-interest of getting the profits and increase the value and competitive entity and investors to obtaining greater returns for their shares, so the second type is the external factors, which represent the failer that occurs ​​in the laws and regula

... Show More
View Publication Preview PDF
Crossref (3)
Crossref