Preferred Language
Articles
/
_hbaOowBVTCNdQwCRvmN
Hiding Information Using different lighting Color images

Scopus Clarivate Crossref
View Publication
Publication Date
Fri Jul 01 2016
Journal Name
Al–bahith Al–a'alami
The Color and its Semiotic Reflections in Iraqi Newspapers.

The Colour is one of important aspect of human activity, especially in General arts and press, and also is one of the essential elements to achieve and build the idea of design technology in the appropriate places, according to the space of designs work.
In a view of the colour and its relationship with the Semiotics, we can find that the objectives goals at the point of visual formats that’s «oral or written”. In last years, the intellectual concerns of Semiotics through eye contact methods, that’s meaning contact methods for get messages of sense of sight.
The semiotics term Can be defined into: (the sequential feature or network system has relations according agreed language rules, in a particular environment, also is a g

... Show More
View Publication Preview PDF
Publication Date
Thu Oct 01 2015
Journal Name
Al-academy
Color At the artist Fayek Hassan: اخلاص ياس خضير

The shift that caused the fading art schools and the brightness of the other, which dictate the work of art based surface and defect lasting regeneration led the researcher to stop at the color of his study, as an element of fixed and mobile at the same time, hard as a lieutenant of the painting plastic and brick construction that supports a painting, The variable that follows the doctrine of the artist and the philosophy of the community, because of the extrapolation of his biography, especially in modern art and beyond is clear that compose a variety of ways and so as to ensure continuity vital to the process of drawing, color in all modes is responsible for editing shapes on the surface imaging is, without a line, shape and dimensions

... Show More
Crossref
View Publication Preview PDF
Publication Date
Thu Sep 30 2021
Journal Name
Iraqi Journal Of Science
A Proposed Algorithm for Encrypted Data Hiding in Video Stream Based on Frame Random Distribution

     The science of information security has become a concern of many researchers, whose efforts are trying to come up with solutions and technologies that ensure the transfer of information in a more secure manner through the network, especially the Internet, without any penetration of that information, given the risk of digital data being sent between the two parties through an insecure channel. This paper includes two data protection techniques. The first technique is cryptography by using Menezes Vanstone elliptic curve ciphering system, which depends on public key technologies. Then, the encoded data is randomly included in the frame, depending on the seed used. The experimental results, using a PSNR within avera

... Show More
Scopus Crossref
View Publication Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Cryptography based on retina information

The security of message information has drawn more attention nowadays, so; cryptography has been used extensively. This research aims to generate secured cipher keys from retina information to increase the level of security. The proposed technique utilizes cryptography based on retina information. The main contribution is the original procedure used to generate three types of keys in one system from the retina vessel's end position and improve the technique of three systems, each with one key. The distances between the center of the diagonals of the retina image and the retina vessel's end (diagonal center-end (DCE)) represent the first key. The distances between the center of the radius of the retina and the retina vessel's end (ra

... Show More
Scopus (4)
Crossref (2)
Scopus Crossref
View Publication
Publication Date
Wed Jan 01 2020
Journal Name
Technologies And Materials For Renewable Energy, Environment And Sustainability: Tmrees20
Crossref (3)
Crossref
View Publication
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
Detection and Mitigation of Cache Pollution Attack Using Popularity Variation in Information Centric Networking Based on SDN

      Information centric networking (ICN) is the next generation of internet architecture with its ability to provide in-network caching that make users retrieve their data efficiently regardless of their location. In ICN, security is applied to data itself rather than communication channels or devices. In-network caches are vulnerable to many types of attacks, such as cache poisoning attacks, cache privacy attacks, and cache pollution attacks (CPA). An attacker floods non-popular content to the network and makes the caches evict popular ones. As a result, the cache hit ratio for legitimate users will suffer from a performance degradation and an increase in the content’s retrieval latency. In this paper, a popularity variation me

... Show More
Scopus Crossref
View Publication
Publication Date
Sun Jul 07 2013
Journal Name
Journal Of Educational And Psychological Researches
Effect of Using Computer in Getting and Remaining Information at Students of First Stage in Biology Subject

Effect of Using Computer in Getting and Remaining Information at Students of First Stage in Biology Subject MIAAD NATHIM RASHEED LECTURER Abstract The recent research goal is to know the influence of computer use to earn and fulfillment information for students of first class in biology material and to achieve that put many of the zeroing hypothesis by researcher as follow: There were no differences between statistical signs at level (0,05) between the average students' marks who they were study by using computer and between the average student ' marks who they were study in classical method of earning and fulfillment. The researcher chose the intentional of the medical technical institute that included of two branches the first class (A

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 19 2015
Journal Name
Al-academy
Transformations in The Process of Mass Communication Using the International Network of Information (Internet): انتصار رسمي موسى

Summarized the idea of research is marked by "changes in the process of mass communication by using the international network of information" by specifying what data networking and mass communication is the transformation processes in the mass communication network where research aims to:1. Diagnostic data and transformations in the process of mass communication network.2. Provide a contact form commensurate with the characteristic mass of the International Network of electronic information, and research found to provide a communicative model called the (human contact network). In short (HCN) Humanity Communication Net also reached conclusions concerning the search process and communicative transformations and changes that have taken pla

... Show More
Crossref
View Publication Preview PDF
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Improving the Performance of Construction Project Information and Communication Management Using Web-Based Project Management Systems (WPMSs)

This paper presents a brief study undertaken for improving the performance of information and communication management of construction projects through investing in information and communication technologies (ICT). The work aims at first to investigate and diagnose the problems, challenges, weaknesses, and inefficiencies related to information and communication management in projects in the construction industry of Iraq. Studying the diagnosed matters and the different solutions of ICT to improve project management performance is following the investigation process. The research presents a technological system suggested to process a lot of the diagnosed problems, challenges, weakness, and inefficiencies of the construction projects and t

... Show More
Crossref (2)
Crossref
View Publication Preview PDF
Publication Date
Wed Aug 11 2021
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
Image Denoising Using Multiwavelet Transform with Different Filters and Rules

<p class="0abstract">Image denoising is a technique for removing unwanted signals called the noise, which coupling with the original signal when transmitting them; to remove the noise from the original signal, many denoising methods are used. In this paper, the Multiwavelet Transform (MWT) is used to denoise the corrupted image by Choosing the HH coefficient for processing based on two different filters Tri-State Median filter and Switching Median filter. With each filter, various rules are used, such as Normal Shrink, Sure Shrink, Visu Shrink, and Bivariate Shrink. The proposed algorithm is applied Salt&amp; pepper noise with different levels for grayscale test images. The quality of the denoised image is evaluated by usi

... Show More
Scopus (4)
Crossref (2)
Scopus Crossref
View Publication