Preferred Language
Articles
/
ExYh9osBVTCNdQwC--f7
A Proposed Method for Generating a Private Key Using Digital Color Image Features
...Show More Authors

In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a cover that is digital color image for hiding a text in that selected cover for testing a proposed method of generating the private key. The hiding algorithm used is least significant bit (LSB). Finally, the generated key is tested by hiding process and changing the extension of image, after that notice the generated key is not changed or modified. the Matlap language is used to design and implement a proposed method.

Publication Date
Mon Jul 01 2019
Journal Name
Journal Of Engineering
Development of Bridges Maintenance Management System based on Geographic Information System Techniques (Case study: AlMuthanna \ Iraq)
...Show More Authors

A Geographic Information System (GIS) is a computerized database management system for accumulating, storage, retrieval, analysis, and display spatial data. In general, GIS contains two broad categories of information, geo-referenced spatial data and attribute data. Geo-referenced spatial data define objects that have an orientation and relationship in two or three-dimensional space, while attribute data is qualitative data that can be counted for recording and analysis. The main aim of this research is to reveal the role of GIS technology in the enhancement of bridge maintenance management system components such as the output results, and make it more interpretable through dynamic colour coding and more sophisticated vi

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Fri Apr 15 2016
Journal Name
International Journal Of Computer Applications
Hybrid Techniques based Speech Recognition
...Show More Authors

Information processing has an important application which is speech recognition. In this paper, a two hybrid techniques have been presented. The first one is a 3-level hybrid of Stationary Wavelet Transform (S) and Discrete Wavelet Transform (W) and the second one is a 3-level hybrid of Discrete Wavelet Transform (W) and Multi-wavelet Transforms (M). To choose the best 3-level hybrid in each technique, a comparison according to five factors has been implemented and the best results are WWS, WWW, and MWM. Speech recognition is performed on WWS, WWW, and MWM using Euclidean distance (Ecl) and Dynamic Time Warping (DTW). The match performance is (98%) using DTW in MWM, while in the WWS and WWW are (74%) and (78%) respectively, but when using (

... Show More
View Publication
Crossref
Publication Date
Tue Feb 28 2023
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Development prediction algorithm of vehicle travel time based traffic data
...Show More Authors

This work bases on encouraging a generous and conceivable estimation for modified an algorithm for vehicle travel times on a highway from the eliminated traffic information using set aside camera image groupings. The strategy for the assessment of vehicle travel times relies upon the distinctive verification of traffic state. The particular vehicle velocities are gotten from acknowledged vehicle positions in two persistent images by working out the distance covered all through elapsed past time doing mollification between the removed traffic flow data and cultivating a plan to unequivocally predict vehicle travel times. Erbil road data base is used to recognize road locales around road segments which are projected into the commended camera

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Wasit Journal Of Computer And Mathematics Science
Security In Wireless Sensor Networks Based On Lightweight Algorithms : An Effective Survey
...Show More Authors

At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena

... Show More
View Publication
Crossref
Publication Date
Wed Dec 07 2022
Journal Name
في مجلة الدراسات الللغوية والترجمية
Semantic and cultural analysis of phraseological units with the names of wild animals in Russian and Arabic
...Show More Authors

Summary:This article discusses the topic of phraseological units with the names of wild animals in the Russian and Arabic languages in the aspect of their comparative semantic and cultural analysis, since a comparative analysis of the meanings of phraseological units of the Arabic and Russian languages, detection of coincidences and differences in the compared languages, is an important method for studying linguoculturology, since phraseological units represent a reflection of culture in the language

Preview PDF
Publication Date
Sat Jun 15 2024
Journal Name
Iraqi Journal Of Laser
Estimation of mean photon number based on single photon detection of weak coherent pulses
...Show More Authors

The demand for single photon sources in quantum key distribution (QKD) systems has necessitated the use of weak coherent pulses (WCPs) characterized by a Poissonian distribution. Ensuring security against eavesdropping attacks requires keeping the mean photon number (µ) small and known to legitimate partners. However, accurately determining µ poses challenges due to discrepancies between theoretical calculations and practical implementation. This paper introduces two experiments. The first experiment involves theoretical calculations of µ using several filters to generate the WCPs. The second experiment utilizes a variable attenuator to generate the WCPs, and the value of µ was estimated from the photons detected by the BB

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jul 19 2024
Journal Name
Известия Юго-Западного государственного университета. Серия: Лингвистика и педагогика
ACOMPARATIVE ANALYSIS OF THE CONCEPT AND TYPES OF pun IN RUSSIAN AND ARABIC
...Show More Authors

Abstract Purpose of research: The purpose of the article is to conduct a comparative analysis of the concept and types of puns in the Russian and Arabic languages. The main focus is on identifying similarities and differences in the definition of a pun, as well as analyzing its various types in both languages. The purpose of the study is to understand how puns are used to achieve comic or semantic effect in different cultural contexts. Methods: The study includes an analysis of literature providing information about puns in Russian and Arabic. For comparative analysis, methods were used to compare concepts, definitions and types of puns in both languages. The phonetic, semantic and syntactic aspects of the pun are considered, and cultural f

... Show More
Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Review Of International Geographical Education Online
Quality of Transition to E-Learning under Corona pandemic: An Application Study in College of Administration and Economics, Baghdad University
...Show More Authors

E-learning is a lifeline for the educational process, which contributed to the sustainability of working educational organizations and prevented them from stopping, so the study came to measure the compatibility between E-learning quality dimensions (information technology, educational curricula, teaching methods, and intellectual capital of educational institution) as an independent variable, and educational services quality dimensions represented by (safety, tangibility, reliability and Confidence) as a dependent variable. The sample was 150 teachers was drawn from the College of Administration and Economics community of 293 teachers through the use of several statistical methods to measure the degree of correlation and impact between the

... Show More
Scopus
Publication Date
Wed Sep 28 2022
Journal Name
Journal Of The College Of Education For Women
Adapting the Grimms: Going Against Patriarchy in Singh’s Movie Mirror Mirror
...Show More Authors

Many cinematic adaptations were produced for the Grimms’ “Little Snow-White” (1812) including Mirror Mirror movie (2012), the contemporary version adapted by Taresm Singh. Singh’s version was able to depict the modern reality of women and went against patriarchy by embracing feminist ideologies of the fourth-wave feminism. Therefore, he challenged the ideologies of the mainstream cinema dominated by the patriarchal élite’s capitalist mode of production that still adhere to the stereotyped patriarchal image of women’s ‘victimization,’ ‘objectification’ and ‘marginalization,’ which did not represent women’s modern reality anymore. This paper, however, is a qualitative study aimed to prove that the femini

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jul 01 2022
Journal Name
Translation & Linguistics
TO THE QUESTION ABOUT THE USE OF METAPHORS IN THE CREATION OF ART (ON THE EXAMPLE OF THE STORY BY D. RUBINA "YOU AND ME UNDER THE PEACH CLOUDS")
...Show More Authors

The article reflects the results of the analysis of the use of metaphors when creating the image of the main character of the story by D. Rubina "You and me under the peach clouds" - a pet, a dog named Kondraty. Through metaphorization, the image of the dog is filled by the author with purely human qualities, thus passing into the category of a full member of the family. The article is a continuation of the study of the work of D. I. Rubina.