Preferred Language
Articles
/
_Rbr9YsBVTCNdQwCr-ZQ
A proposed encryption technique of different texts using circular link lists
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Sun Apr 23 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposed Speech Analyses Method Using the Multiwavelet Transform
...Show More Authors

  Speech is the first invented way of communication that human used age before the invention of writing. In this paper, proposed method for speech analyses to extract features by using multiwavelet Transform (Repeated Row Preprocessing).The proposed system depends on the Euclidian differences of the coefficients of the multiwavelet Transform to determine the beast features of speech recognition. Each sample value in the reference file is computed by taking the average value of four samples for the same data (four speakers for the same phoneme). The result of the input data to every frame value in the reference file using the Euclidian distance to determine the frame with the minimum distance is said to be the "Best Match". Simulatio

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 24 2022
Journal Name
Iraqi Journal Of Science
Steganography Based on Arabic Language Texts by Kashida Using STRI As RNG
...Show More Authors

One of the primary problems in internet is security, mostly when computer utilization is increasing in all social and business areas. So, the secret communications through public and private channels are the major goal of researchers. Information hiding is one of methods to obtain a security communication medium and protecting the data during transmission.
This research offers in a new method using two levels to hide, the first level is hiding by embedding and addition but the second level is hiding by injection. The first level embeds a secret message in one bit in the LSB in the FFT and the addition of one kashida. Subtraction of two random images (STRI) is RNG to find positions for hiding within the text. The second level is the in

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 09 2021
Journal Name
Nanomaterials
Investigation of Heat Transfer Enhancement in a Triple Tube Latent Heat Storage System Using Circular Fins with Inline and Staggered Arrangements
...Show More Authors

Inherent fluctuations in the availability of energy from renewables, particularly solar, remain a substantial impediment to their widespread deployment worldwide. Employing phase-change materials (PCMs) as media, saving energy for later consumption, offers a promising solution for overcoming the problem. However, the heat conductivities of most PCMs are limited, which severely limits the energy storage potential of these materials. This study suggests employing circular fins with staggered distribution to achieve improved thermal response rates of PCM in a vertical triple-tube heat exchanger involving two opposite flow streams of the heat-transfer fluid (HTF). Since heat diffusion is not the same at various portions of the PCM unit,

... Show More
View Publication Preview PDF
Scopus (37)
Crossref (34)
Scopus Clarivate Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Reducing the Mutual Coupling of Cylindrical Circular Microstrip Antennas (CCMAs) Array Using EBG Structure
...Show More Authors

A theoretical study to design a conformal microstrip antennas was introduced in this work. Conformal microstrip antennas define antennas which can be conformed to a certain shape or to any curved surface. It is used in high-speed trains, aircraft, defense and navigation systems, landing gear and various communications systems, as well as in body wearable. Conformal antennas have some advantages such as a wider-angle coverage compared to flat antennas and low radar cross-sectional (RCS) and they are suitable for using in Radome. The main disadvantage of these antennas is the narrow bandwidth. The FDTD method is extremely useful in simulating complicated structures because it allows for direct integration of Maxwell's equations depending o

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue May 04 2021
Journal Name
Journal Of Tribology
Hardened Edges Effects on Wear Characteristics of Cultivator Sweeps Using Circular Soil Bin Test
...Show More Authors
Abstract<p>Tillage tools are subject to friction and low-stress abrasive wear processes with the potential deterioration of the desired soil quality, loss of mechanical weed efficacy, and downtime for replacing worn tools. Limited experimental methods exist to quantify investigate the effect of wear-resistant coatings on shape parameters of soil-engaging tools. ASTM standard sand/rubber wheel abrasion and pin-on-disk tests are not able to simulate wear characteristics of the complex shape of the tillage tools. Even though the tribology of tillage tools can be realistic from field tests, tillage wear tests under field conditions are expensive and often challenging to generate repeatable engineeri</p> ... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Nov 29 2018
Journal Name
Iraqi Journal Of Science
A new Color image Encryption based on multi Chaotic Maps
...Show More Authors

     This paper presents a new RGB image encryption scheme using multi chaotic maps. Encrypting an image is performed via chaotic maps to confirm the properties of secure cipher namely confusion and diffusion are satisfied. Also, the key sequence for encrypting an image is generated using a combination of   1D logistic and Sine chaotic maps. Experimental results and the compassion results indicate that the suggested scheme provides high security against several types of attack, large secret keyspace and highly sensitive.   

View Publication Preview PDF
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
A New Image Encryption Algorithm Based on Multi Chaotic System
...Show More Authors

       In recent years, encryption technology has been developed rapidly and many image encryption methods have been put forward. The chaos-based image encryption technique is a modern encryption system for images. To encrypt images, it uses random sequence chaos, which is an efficient way to solve the intractable problem of simple and highly protected image encryption. There are, however, some shortcomings in the technique of chaos-based image encryption, such limited accuracy issue. The approach focused on the chaotic system in this paper is to construct a dynamic IP permutation and S-Box substitution by following steps. First of all, use of a new IP table for more diffusion of al

... Show More
View Publication Preview PDF
Scopus (14)
Crossref (10)
Scopus Crossref
Publication Date
Mon Apr 01 2024
Journal Name
Journal Of The College Of Basic Education
Symbols and slogans used by electoral lists participating in the 2009 provincial council elections, Baghdad Governorate
...Show More Authors

Publication Date
Thu May 06 2010
Journal Name
Journal Of Engineering
A PROPOSED PROCEDURE FOR ANALYSING REINFORCED EMBANKMENTS
...Show More Authors

Publication Date
Wed Jun 01 2011
Journal Name
Journal Of The College Of Basic Education
A Proposed Steganographic Method in Digital Media
...Show More Authors

WA Shukur, journal of the college of basic education, 2011 The aim of this research is designing and implementing proposed steganographic method. The proposed steganographic method don’t use a specific type of digital media as a cover but it can use all types of digital media such as audio, all types of images, video and all types of files as a cover with the same of security, accuracy and quality of original data, considering that the size of embedded data must be smaller than the size of a cover. The proposed steganographic method hides embedded data at digital media without any changing and affecting the quality of the cover data. This means, the difference rate between cover before hiding operation and stego is zero. The proposed steg

... Show More
View Publication