Preferred Language
Articles
/
DRaQi4cBVTCNdQwC21V0
An Efficient Shrinkage Estimators For Generalized Inverse Rayleigh Distribution Based On Bounded And Series Stress-Strength Models
...Show More Authors
Abstract<p>In this paper, we investigate two stress-strength models (Bounded and Series) in systems reliability based on Generalized Inverse Rayleigh distribution. To obtain some estimates of shrinkage estimators, Bayesian methods under informative and non-informative assumptions are used. For comparison of the presented methods, Monte Carlo simulations based on the Mean squared Error criteria are applied.</p>
Scopus Crossref
View Publication
Publication Date
Sat Feb 19 2022
Journal Name
Intelligent Service Robotics
Dynamic performance of a series elastic actuator with variable stiffness logarithmic spiral spring
...Show More Authors

View Publication
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Aug 18 2020
Journal Name
Journal Of Mechanics Of Continua And Mathematical Sciences
THE COMPARISON OF THE METHODS ESTIMATING THE FRACTIONAL DIFFERENCES OF PARAMETER AND ITS DEPENDENCE ON ESTIMATION THE BEST LINEAR MODEL OF TIME SERIES IN THE ENVIRONMENTAL FIELD
...Show More Authors

View Publication
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
The Scientific World Journal
Efficient Removal of Brilliant Green Dye Using Mesoporous Attapulgite Clay: Investigating Adsorption Kinetics, Isotherms, and Mechanisms
...Show More Authors

The study involved the effectiveness of Iraqi attapulgite (IQATP) clay as an environmentally friendly material that easily adsorbs brilliant green (BG) dye from water systems and is identified by various complementary methods (e.g., FTIR, SEM‐EDS, XRD, ICP‐OES, pHpzc, and BET), where the result reported that the IQATP specific surface area is 29.15 m2/g. A systematic analysis was selected to evaluate the impact of different effective adsorption performance variables on BG dye decontamination. These variables included IQATP dosage (0.02–0.8 g/L), solution pH (3.05–8.15), contact time (ranging from 2 to 25 min), and initial BG dye concentration from 20 to 80 mg/L. The parameter

... Show More
View Publication
Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More
Publication Date
Fri Nov 11 2022
Journal Name
Al-mansour Journal
Text Cryptography Based on Three Different Keys
...Show More Authors

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre

... Show More
Publication Date
Sat Feb 01 2025
Journal Name
Iraqi Journal Of Science
Intrusion Detection Approach Based on DNA Signature
...Show More Authors

View Publication
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
Effective Image Watermarking Method Based on DCT
...Show More Authors

Most includeding techniques of digital watermark even now working through the direct inclusion in the pixel without taking into account the level of compression (attack) that can go wrong, which makes digital watermark can be discarded easily. In this research, a method was proposed to overcome this problem, which is based on DCT (after image partitioned into non overlapped blocks with size 8×8 pixel), accompanied by a quantization method. The watermark (digital image) is embedded in DCT frequency domain seeking the blocks have highest standard deviation (the checking is only on the AC coefficients) within a predetermined threshold value, then the covered image will compressed (attacked) varying degrees of compression. The suggested met

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 16 2022
Journal Name
Iraqi Journal Of Science
New Arabic Stemming based on Arabic Patterns
...Show More Authors

Algorithms for Arabic stemming available in two main types which are root-based approach and stem-based approach. Both types have problems which have been solved in the proposed stemmer which combined rules of both main types and based on Arabic patterns (Tafealat1) to find the added letters. The proposed stemmer achieved root exploration ratio (99.08) and fault ratio (0.9).

View Publication Preview PDF
Publication Date
Mon May 08 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Retrieval Based on Coefficient Correlation Index
...Show More Authors

Image retrieval is an active research area in image processing, pattern recognition, and
computer vision. In this proposed method, there are two techniques to extract the feature
vector, the first one is applying the transformed algorithm on the whole image and the second
is to divide the image into four blocks and then applying the transform algorithm on each part
of the image. In each technique there are three transform algorithm that have been applied
(DCT, Walsh Transform, and Kekre’s Wavelet Transform) then finding the similarity and
indexing the images, useing the correlation between feature vector of the query image and
images in database. The retrieved method depends on higher indexing number. <

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposed Steganography Method Based on DCT Coefficients
...Show More Authors

      In this paper an algorithm for Steganography using DCT for cover image and DWT for hidden image with an embedding order key is proposed. For more security and complexity the cover image convert from RGB to YIQ, Y plane is used and divided into four equally parts and then converted to DCT domain. The four coefficient of the DWT of the hidden image are embedded into each part of cover DCT, the embedding order based on the order key of which is stored with cover in a database table in both the sender and receiver sender. Experimental results show that the proposed algorithm gets successful hiding information into the cover image. We use Microsoft Office Access 2003 database as DBMS, the hiding, extracting algo

... Show More
View Publication Preview PDF