Preferred Language
Articles
/
Mxe42o0BVTCNdQwCMCdf
Seismic impact on makhool earthdam in flood and drought seasons
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Enhancement of lsb audio steganography based on carrier and message characteristics
...Show More Authors

Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods

... Show More
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Enhancement of lsb audio steganography based on carrier and message characteristics
...Show More Authors

Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods

... Show More
Scopus (17)
Scopus
Publication Date
Tue Jan 03 2023
Journal Name
College Of Islamic Sciences
The position of the Jews on divinity, lordship, names and attributes
...Show More Authors

Judaism followed the approach of monotheism after God Almighty sent Moses (peace be upon him) to convey to them the messages of their Lord, so that they might be on a right guidance and path, but the people did not follow that path.” Love of matter and faith in what is witnessed, so they portrayed the Lord in several images in line with what their souls drew upon them.

View Publication Preview PDF
Publication Date
Sun Dec 09 2018
Journal Name
Baghdad Science Journal
Some Results on the Average Inverse Shadowing Property and Strong Ergodicity
...Show More Authors

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Mon Aug 19 2024
Journal Name
Chalcogenide Letters
Influence of copper on zinc oxide films and solar cell performance
...Show More Authors

Copper doped Zinc oxide and (n-ZnO / p-Si and n-ZnO: Cu / p-Si) thin films thru thickness (400±20) nm were deposited by thermal evaporation technique onto two substrates. The influence of different Cu percentages (1%,3% and 5%) on ZnO thin film besides hetero junction (ZnO / Si) characteristics were investigated, with X-ray diffractions examination supports ZnO films were poly crystal then hexagonal structural per crystallite size increase from (22.34 to 28.09) nm with increasing Cu ratio. The optical properties display exceptional optically absorptive for 5% Cu dopant with reduced for optically gaps since 3.1 toward 2.7 eV. Hall Effect measurements presented with all films prepared pure and doped have n-types conductive, with a ma

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Journal Of Theoretical And Applied Information Technology
A Survey on the Vein Biometric Recognition Systems: Trends and Challenges
...Show More Authors

Vascular patterns were seen to be a probable identification characteristic of the biometric system. Since then, many studies have investigated and proposed different techniques which exploited this feature and used it for the identification and verification purposes. The conventional biometric features like the iris, fingerprints and face recognition have been thoroughly investigated, however, during the past few years, finger vein patterns have been recognized as a reliable biometric feature. This study discusses the application of the vein biometric system. Though the vein pattern can be a very appealing topic of research, there are many challenges in this field and some improvements need to be carried out. Here, the researchers reviewed

... Show More
Publication Date
Wed Mar 01 2023
Journal Name
Iraqi Journal Of Physics
FTIR and Electrical Behavior of Blend Electrolytes Based on (PVA/PVP)
...Show More Authors

Polymer electrolytes were prepared using the solution cast technology. Under some conditions, the electrolyte content of polymers was analyzed in constant percent of PVA/PVP (50:50), ethylene carbonate (EC), and propylene carbonate (PC) (1:1) with different proportions of potassium iodide (KI) (10, 20, 30, 40, 50 wt%) and iodine (I2) = 10 wt% of salt. Fourier Transmission Infrared (FTIR) studies confirmed the complex formation of polymer blends. Electrical conductivity was calculated with an impedance analyzer in the frequency range 50 Hz–1MHz and in the temperature range 293–343 K. The highest electrical conductivity value of 5.3 × 10-3 (S/cm) was observed for electrolytes with 50 wt% KI concentration at room

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Image encryption algorithm based on the density and 6D logistic map
...Show More Authors

One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera

... Show More
View Publication
Scopus (23)
Crossref (12)
Scopus Crossref
Publication Date
Fri Dec 31 2021
Journal Name
Political Sciences Journal
The US-Iranian dispute and its repercussions on Iraq After 2003
...Show More Authors

Receipt date: 8/8/2020 acceptance date: 9/11/2020 Publication date: 31/12/2021

Creative Commons License This work is licensed under a Creative Commons Attribution 4.0 International License.

           The American-Iranian relations have been characterized by tensions since the arrival of the guardian jurist regime in Iran to leadership in 1979, as it was considered a turning point not only in the cont

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
Effect of growth regulators on sex expression and some quantitatve properties
...Show More Authors

This study was conducted in an orchard pomegranate's Department of Horticulture College of Agriculture, University of Baghdad for two seasons 1999-2000 on cultivars pomegranate Salimi and narrators seedless to study the effect spraying Nizant growth in sex ratio of flowers and recipes flowering and winning was selected 27 trees per class 15 years old planted

View Publication Preview PDF
Crossref