Preferred Language
Articles
/
DxZMgYcBVTCNdQwCA1Qc
American Standard Code for Information Interchange mapping technique for text hiding in the RGB and gray images
...Show More Authors

Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposal for Exchange Text message Based on Image
...Show More Authors

     The messages are ancient method to exchange information between peoples. It had many ways to send it with some security.

    Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.

      To send any message text the sender converts message to ASCII c

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 01 2015
Journal Name
5th International Conference On Energy Aware Computing Systems & Applications
Area efficient test circuit for library standard cell qualification
...Show More Authors

High cost of qualifying library standard cells on silicon wafer limits the number of test circuits on the test chip. This paper proposes a technique to share common load circuits among test circuits to reduce the silicon area. By enabling the load sharing, number of transistors for the common load can be reduced significantly. Results show up to 80% reduction in silicon area due to load area reduction.

View Publication
Scopus Crossref
Publication Date
Mon Sep 03 2018
Journal Name
Al-academy
The Interchange of Sign Transformation between Locality and Universality in the Iraqi Theatre, "Romeo and Juliet in Baghdad Show" - A Model
...Show More Authors

The research deals with the interchange of the sign transformed from the universal to the local in the theatrical show through the direction processing in the production of a communicative artistic discourse and message, thus making the process of reading the speech and recognizing it by taking into account the cultural differences, customs and local rituals of each country, region, or area. The problem of the research was focused on answering the following question: What are the requirements for the sign in terms of its transformation between the universality and locality in the read-out?

               The importance of research is to determine the requiremen

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 03 2023
Journal Name
Misan Journal Of Academic Studies
A review on various methods for dehazing images
...Show More Authors

In this paper, a literature survey was introduced to study of enhancing the hazy images , because most of the images captured in outdoor images have low contrast, color distortion, and limited visual because the weather conditions such as haze and that leads to decrease the quality of images capture. This study is of great importance in many applications such as surveillance, detection, remote sensing, aerial image, recognition, radar, etc. The published researches on haze removal are divided into several divisions, some of which depend on enhancement the image, some of which depend on the physical model of deformation, and some of them depend on the number of images used and are divided into single-image and multiple images dehazing model

... Show More
Publication Date
Sat Jan 10 2015
Journal Name
British Journal Of Mathematics & Computer Science
The Use of Gradient Based Features for Woven Fabric Images Classification
...Show More Authors

View Publication
Crossref
Publication Date
Sun Aug 06 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Calculating Techniques for The Contrast of Images Which Have Different Illuminations
...Show More Authors

      The distortion, which occurs to the image often affects the existing amount of information, weakens its sharpness, decreases its contrast, thus leads to overlapping details of the various regions, and decreases image resolution. Test images are used to determine the image quality and ability of different visual systems, as we depended in our study on test image, half black and half white. Contrast was studied in the petition so as to propose several new methods for different contrasts in the edge of images where the results of technical differences would identify contrast image under different lighting conditions.

View Publication Preview PDF
Publication Date
Wed Sep 16 2020
Journal Name
Route Educational & Social Journal
Effect of applying the QR-Code system for acquisition chemistry and creative thinking in of first class female student at intermediate schools.
...Show More Authors

This research aims at identifying the system of applying the QRcode system for acquisition of chemistry by first class female students studying at intermediate schools knowledge and its effect on creative thinking. The research sample consisted of (63) female students in one of the intermediate schools in Baghdad/Iraq using two equivalents experimental and control groups. The scientific context used was based on the chemistry text book related to the periodic table, (Metals) for the first group of students and Alkaline metals,Nonmetals, Metalloides) for the second group. The research methodology employed consisted of the followings :Measuring students acquisition using (35) issues. The results were verified for their face validity and obtai

... Show More
Publication Date
Tue Aug 15 2023
Journal Name
Alustath Journal For Human And Social Sciences
Autoimmunity and the Terroristic Schemes in Dan Brown's The Da Vinci Code
...Show More Authors

From a medical perspective, autoimmunity reflects the abnormal behaviour of a human being. This state is shaped when the defense of an organism betrays its own tissues. Allegedly, the immune system should protect the body against attacking cells. When an autoimmune disease attacks, it results in perilous actions like self-destruction. However, from a psychological perspective, the French philosopher Jacques Derrida (1930-2004) explains that autoimmunity harms both the self and the other. As a result, the organ disarms the betraying cells, as the immune system cannot provide necessary protection. From a literary perspective, Derrida has termed autoimmunity as deconstruction for almost forty years. Autoimmunity starts with the stage of a norm

... Show More
View Publication Preview PDF
Publication Date
Sat Mar 20 2021
Journal Name
Neuroquantology
XRD and Microscopic Images for Synthesis Graphite Nanoparticles by Oxidation Method
...Show More Authors

Graphite nanoparticles were successfully synthesized using mixture of H2O2/NH4OH with three steps of oxidation. The process of oxidations were analysis by XRD and optics microscopic images which shows clear change in particle size of graphite after every steps of oxidation. The method depend on treatments the graphite with H2O2 in two steps than complete the last steps by reacting with H2O2/NH4OH with equal quantities. The process did not reduces the several sheets for graphite but dispersion the aggregates of multi-sheets carbon when removed the Van Der Waals forces through the oxidation process.

View Publication
Scopus (7)
Crossref (1)
Scopus Crossref
Publication Date
Mon Jan 02 2017
Journal Name
European Journal Of Scientific Research
Fast approach for arabic text encryption using genetic algorithm
...Show More Authors

As s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res

... Show More