Preferred Language
Articles
/
LRbBmYcBVTCNdQwCslhV
A Proposed Algorithm for Steganography
...Show More Authors

Publication Date
Mon Dec 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Genetic Algorithm Based PID Controller Design for a Precise Tracking of Two-Axis Piezoelectric Micropositioning Stage
...Show More Authors

 In this paper, an intelligent tracking control system of both single- and double-axis Piezoelectric Micropositioner stage is designed using Genetic Algorithms (GAs) method for the optimal Proportional-Integral-Derivative (PID) controller tuning parameters. The (GA)-based PID control design approach is a methodology to tune a (PID) controller in an optimal control sense with respect to specified objective function. By using the (GA)-based PID control approach, the high-performance trajectory tracking responses of the Piezoelectric Micropositioner stage can be obtained. The (GA) code was built and the simulation results were obtained using MATLAB environment. The Piezoelectric Micropositioner simulation model with th

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Development a Proposed System of Organization Structure to Management Multi Construction Projects
...Show More Authors

The purpose of this study is aimed to lay down an arranged platform suited to Iraqi constructional associations which in charge to carry out multi constructional projects, as it fulfilled management requirements and supervising, so that low - cost projects will be controlled in due term and quality. Based on primary info and observed data collected, the study thesis has been formulated in this way: Iraqi constructional sector bodies which are in charge to implement simultaneously multi constructional projects in need to reformulate its organized structure so that it will be more fitted to management and control of these projects. This thesis includes a
theoretical part contained presenting the most important resources locally and int

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jul 01 2021
Journal Name
University Of Northampton Pue
Validating a Proposed Data Mining Approach (SLDM) for Motion Wearable Sensors to Detect the Early Signs of Lameness in Sheep
...Show More Authors

View Publication
Publication Date
Tue Nov 29 2022
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
A proposed form for the Combined Assurance report and its impact In achieving sustainable development in the Iraqi economic units
...Show More Authors

Despite the importance of sustainable development and its dimensions in developing performance and supporting competitive advantage in economic units, there is a gap and lack of coordination between Combined Assurance  providers (management, internal audit, external audit) to report on sustainable development, and the research aims to propose a model for the Combined Assurance report to achieve development sustainable development in the Iraqi economic units, especially the Baghdad Municipality, enables assurance providers to coordinate efforts that lead to the achievement of Combined Assurance, The research found the proposed model for the Combined Assurance report in achieving sustainable development in the Iraqi economic units, es

... Show More
View Publication Preview PDF
Publication Date
Thu May 10 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
New Steganography System Based on Huffman Coding and Fibonacci Decomposition
...Show More Authors

   Hiding secret information in the image is a challenging and painstaking task in computer security and steganography system. Certainly, the absolute intricacy of attacks to security system makes it more attractive.in this research on steganography system involving information hiding,Huffman codding used to compress the secret code before embedding which provide high capacity and some security. Fibonacci decomposition used to represent the pixels in the cover image, which increase the robustness of the system. One byte used for mapping all the pixels properties. This makes the PSNR of the system higher due to random distribution of embedded bits. Finally, three kinds of evaluation are applied such as PSNR, chi-square attack, a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Image Steganography using Dynamic Threshold based on Discrete Cosine Transform
...Show More Authors

The art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the cente

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (4)
Scopus Crossref
Publication Date
Fri Apr 20 2012
Journal Name
International Journal Of Computer And Information Engineering
An Optimal Algorithm for HTML Page Building Process
...Show More Authors

An Optimal Algorithm for HTML Page Building Process

View Publication Preview PDF
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Multifactor Algorithm for Test Case Selection and Ordering
...Show More Authors

Regression testing being expensive, requires optimization notion. Typically, the optimization of test cases results in selecting a reduced set or subset of test cases or prioritizing the test cases to detect potential faults at an earlier phase. Many former studies revealed the heuristic-dependent mechanism to attain optimality while reducing or prioritizing test cases. Nevertheless, those studies were deprived of systematic procedures to manage tied test cases issue. Moreover, evolutionary algorithms such as the genetic process often help in depleting test cases, together with a concurrent decrease in computational runtime. However, when examining the fault detection capacity along with other parameters, is required, the method falls sh

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Feb 01 2021
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Features of genetic algorithm for plain text encryption
...Show More Authors

The data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed Process

... Show More
View Publication
Scopus (14)
Crossref (4)
Scopus Crossref
Publication Date
Thu Dec 01 2011
Journal Name
2011 Developments In E-systems Engineering
Enhanced Computation Time for Fast Block Matching Algorithm
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref