Preferred Language
Articles
/
FhZFu4sBVTCNdQwCN9mx
Image Steganography Based on Discrete Wavelet Transform and Chaotic Map, IJSR, Call for Papers, Online Journal
...Show More Authors

'Steganography is the science of hiding information in the cover media', a force in the context of information sec, IJSR, Call for Papers, Online Journal

View Publication
Publication Date
Tue Jan 02 2018
Journal Name
Journal Of Educational And Psychological Researches
Self-image addiction (Salafi) and its relation to narcissistic personality disorder among students
...Show More Authors

Abstract The goal of current study was to identify the relationship between addiction of self-images (Selfie) and personality disorder of narcissus, and the difference of significance the relationship between addiction self-images (selfie) and personality disorder narcissus at students of Mustansiriya university, addiction self- images (selfie) defined: a photograph that one has taken of oneself, typically one taken with a smartphone or webcam and shared via social media, edit and down lowed to social networking sites, and over time, the replacement of normal life virtual world, which is accompanied by a lack of a sense of time, and the formation of repeated patterns increase the risk of social and personal problems. To achieve the goals

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 08 2021
Journal Name
J. Inf. Hiding Multim. Signal Process.
Predication of Most Significant Features in Medical Image by Utilized CNN and Heatmap.
...Show More Authors

The growth of developments in machine learning, the image processing methods along with availability of the medical imaging data are taking a big increase in the utilization of machine learning strategies in the medical area. The utilization of neural networks, mainly, in recent days, the convolutional neural networks (CNN), have powerful descriptors for computer added diagnosis systems. Even so, there are several issues when work with medical images in which many of medical images possess a low-quality noise-to-signal (NSR) ratio compared to scenes obtained with a digital camera, that generally qualified a confusingly low spatial resolution and tends to make the contrast between different tissues of body are very low and it difficult to co

... Show More
View Publication Preview PDF
Scopus (3)
Scopus
Publication Date
Sun Dec 09 2018
Journal Name
Journal Of Education In Black Sea Region
Discriminatory and Racist Discourse in American TV Channels: The Image of Arab Immigrants
...Show More Authors

The present study examines critically the discursive representation of Arab immigrants in selected American news channels. To achieve the aim of this study, twenty news subtitles have been exacted from ABC and NBC channels. The selected news subtitles have been analyzed within van Dijk’s (2000) critical discourse analysis framework. Ten discourse categories have been examined to uncover the image of Arab immigrants in the American news channels. The image of Arab immigrants has been examined in terms of five ideological assumptions including "us vs. them", "ingroup vs. outgroup", "victims vs. agents", "positive self-presentation vs. negative other-presentation", and "threat vs. non-threat". Analysis of data reveals that Arab immig

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Jun 06 2020
Journal Name
Journal Of The College Of Education For Women
Image classification with Deep Convolutional Neural Network Using Tensorflow and Transfer of Learning
...Show More Authors

The deep learning algorithm has recently achieved a lot of success, especially in the field of computer vision. This research aims to describe the classification method applied to the dataset of multiple types of images (Synthetic Aperture Radar (SAR) images and non-SAR images). In such a classification, transfer learning was used followed by fine-tuning methods. Besides, pre-trained architectures were used on the known image database ImageNet. The model VGG16 was indeed used as a feature extractor and a new classifier was trained based on extracted features.The input data mainly focused on the dataset consist of five classes including the SAR images class (houses) and the non-SAR images classes (Cats, Dogs, Horses, and Humans). The Conv

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Aug 30 2021
Journal Name
Al-kindy College Medical Journal
Psychological and Physical Correlates of Body Image Dissatisfaction among High School Egyptian Students
...Show More Authors

Background: Body image is one of the most important psychological factors that affects adolescents’ personality and behavior. Body image can be defined as the person’s perceptions, thoughts, and feelings about his or her body.

Objectives: to identify the prevalence of body image concerns among secondary school students and its relation to different factors.

Subjects and methods: A cross-sectional study conducted in which 796 secondary school students participated and body shape concerns was investigated using the body shape questionnaire (BSQ-34).

Results: The prevalence of moderate/marked concern was (21.6%). Moderate/ marked body shape concern was significantly associated

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Indian Journal Of Public Health Research & Development
Body image and Physical Perception of children with Precocious Puberty in Baghdad city
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Mon Dec 25 2023
Journal Name
Ieee Access
ITor-SDN: Intelligent Tor Networks-Based SDN for Data Forwarding Management
...Show More Authors

Tor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Engineering
Enhanced Chain-Cluster Based Mixed Routing Algorithm for Wireless Sensor Networks
...Show More Authors

Energy efficiency is a significant aspect in designing robust routing protocols for wireless sensor networks (WSNs). A reliable routing protocol has to be energy efficient and adaptive to the network size. To achieve high energy conservation and data aggregation, there are two major techniques, clusters and chains. In clustering technique, sensor networks are often divided into non-overlapping subsets called clusters. In chain technique, sensor nodes will be connected with the closest two neighbors, starting with the farthest node from the base station till the closest node to the base station. Each technique has its own advantages and disadvantages which motivate some researchers to come up with a hybrid routing algorit

... Show More
View Publication Preview PDF
Publication Date
Mon Nov 09 2020
Journal Name
Construction Research Congress 2020
Alternative Risk Models for Optimal Investment in Portfolio-Based Community Solar
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Mon Mar 01 2010
Journal Name
Al-khwarizmi Engineering Journal
Bionics-Based Approach for Object Tracking to Implement in Robot Applications
...Show More Authors

In this paper, an approach for object tracking that is inspired from human oculomotor system is proposed and verified experimentally. The developed approach divided into two phases, fast tracking or saccadic phase and smooth pursuit phase. In the first phase, the field of the view is segmented into four regions that are analogue to retinal periphery in the oculomotor system. When the object of interest is entering these regions, the developed vision system responds by changing the values of the pan and tilt angles to allow the object lies in the fovea area and then the second phase will activate. A fuzzy logic method is implemented in the saccadic phase as an intelligent decision maker to select the values of the pan and tilt angle based

... Show More
View Publication Preview PDF