Preferred Language
Articles
/
TBfqN48BVTCNdQwCX2Py
Text image secret sharing with hiding based on color feature
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Tue Mar 25 2014
Journal Name
Sensors
Minimal Camera Networks for 3D Image Based Modeling of Cultural Heritage Objects
...Show More Authors

View Publication
Scopus (39)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Mon Nov 21 2022
Journal Name
Sensors
Deep Learning-Based Computer-Aided Diagnosis (CAD): Applications for Medical Image Datasets
...Show More Authors

Computer-aided diagnosis (CAD) has proved to be an effective and accurate method for diagnostic prediction over the years. This article focuses on the development of an automated CAD system with the intent to perform diagnosis as accurately as possible. Deep learning methods have been able to produce impressive results on medical image datasets. This study employs deep learning methods in conjunction with meta-heuristic algorithms and supervised machine-learning algorithms to perform an accurate diagnosis. Pre-trained convolutional neural networks (CNNs) or auto-encoder are used for feature extraction, whereas feature selection is performed using an ant colony optimization (ACO) algorithm. Ant colony optimization helps to search for the bes

... Show More
View Publication
Scopus (31)
Crossref (26)
Scopus Clarivate Crossref
Publication Date
Tue Apr 01 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
The Impact of Feature Importance on Spoofing Attack Detection in IoT Environment
...Show More Authors

The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr

... Show More
View Publication Preview PDF
Crossref (1)
Scopus Crossref
Publication Date
Sun Nov 09 2025
Journal Name
Journal Of The College Of Education
A New Text from Ur III dynasty on Ba’aga, the fattener
...Show More Authors

يعد هذا النص أحد النصوص المسمارية المصادرة التي بحوزة المتحف العراقي، ويحمل الرقم المتحفي (235869)، قياساته )12،7x 6x 2،5سم). يتضمن مدخولات كميات من الشعير،أرخ النص الى عصر أور الثالثة (2012-2004 ق.م) و يعود الى السنة الثالثة من حكم الملك أبي-سين (2028-2004 ق.م)،أن الشخصية الرئيسة في هذا النص هو)با-اَ-كا مسمن الماشية( من مدينة أري-ساكرك، ومقارنته مع النصوص المسمارية المنشورة التي تعود الى أرشيفه يبلغ عددها (196) نصاً تضمنت نشاطاته م

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 14 2022
Journal Name
Nasaq Journal
The Effect of Co-text on the Comprehensibility of World Englishes
...Show More Authors

MR Younus, Nasaq Journal, 2022

View Publication
Publication Date
Tue Mar 19 2013
Journal Name
Journal Of Semitic Studies
An Aramaic Incantation Text
...Show More Authors

View Publication
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Sun Jan 02 2022
Journal Name
Journal Of The College Of Languages (jcl)
Semantic relations in text and translation: Die semantischen Relationen im Text und Übersetzung
...Show More Authors

       Based on the German language department’s theoretical and practical aspects as well as educational programs, the present study discusses the semantic relations in text sentences and their role in the science of translation.  Through clarifying the semantic relationship between the text sentence and the methods used to express a news item, a situation or an occurrence and through the statement of the multiple theoretical semantic structures of the text’s construction and interrelation, a translator can easily translate a text into the target language.

        It is known that language learners face multiple difficulties in writing and creating an inte

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 31 2019
Journal Name
Journal Of The College Of Education For Women
The Secret Reasons for the Western Scholars Studies The Biography of the prophet
...Show More Authors

Western Scholars have criticized al the material on the point of reliability . Some have taken the unduly Sceptical view that nothing is to be trusted except Quran . The present study is based on opposing view that at least the material in the early biographers is to be accepted as true , except where there are particular reasons for thinking that an anecdote has been distorted ( or invented ) through legal or political motives. It is also assumed that most of the background material culled from a large number of vaired works , is sound . This standpoint .I would claim , leads to a coherent view of Muhammad's life and achievement.

View Publication Preview PDF
Publication Date
Tue Aug 01 2017
Journal Name
International Journal Of Scientific & Engineering Research
Integrated System of Information hiding by Applying Three levels
...Show More Authors

MB Mahmood, BN Dhannoon

View Publication
Publication Date
Mon Jun 01 2015
Journal Name
. International Journal Of Computer Science And Mobile Computing
A Hybrid Lossy Image Compression based on Wavelet Transform, Polynomial Approximation Model, Bit Plane Slicing and Absolute Moment Block Truncation
...Show More Authors