Preferred Language
Articles
/
bsj-1301
An Embedded Data Using Slantlet Transform
...Show More Authors

Data hiding is the process of encoding extra information in an image by making small modification to its pixels. To be practical, the hidden data must be perceptually invisible yet robust to common signal processing operations. This paper introduces a scheme for hiding a signature image that could be as much as 25% of the host image data and hence could be used both in digital watermarking as well as image/data hiding. The proposed algorithm uses orthogonal discrete wavelet transforms with two zero moments and with improved time localization called discrete slantlet transform for both host and signature image. A scaling factor ? in frequency domain control the quality of the watermarked images. Experimental results of signature image recovery after applying JPEG coding to the watermarking image are included.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Feb 20 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Hybrid Algorithm to Protect Computer Networks Based on Human Biometrics and Computer Attributes
...Show More Authors

Objective of this work is the mixing between human biometric characteristics and unique attributes of the computer in order to protect computer networks and resources environments through the development of authentication and authorization techniques. In human biometric side has been studying the best methods and algorithms used, and the conclusion is that the fingerprint is the best, but it has some flaws. Fingerprint algorithm has been improved so that their performance can be adapted to enhance the clarity of the edge of the gully structures of pictures fingerprint, taking into account the evaluation of the direction of the nearby edges and repeat. In the side of the computer features, computer and its components like human have uniqu

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 26 2024
Journal Name
Iraqi Journal Of Science
Effect of Mhd on Accelerated Flows of A Viscoelastic Fluid with The Fractional Burgers’ Model
...Show More Authors

In this paper, we studied the effect of magnetic hydrodynamic (MHD) on accelerated flows of a viscoelastic fluid with the fractional Burgers’ model. The velocity field of the flow is described by a fractional partial differential equation of fractional order by using Fourier sine transform and Laplace transform, an exact solutions for the velocity distribution are obtained for the following two problems: flow induced by constantly accelerating plate, and flow induced by variable accelerated plate. These solutions, presented under integral and series forms in terms of the generalized Mittag-Leffler function, are presented as the sum of two terms. The first term, represent the velocity field corresponding to a Newtonian fluid, and the se

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Educational And Psychological Researches
The social responsibility to the visual media and its role in spreading the culture of the environment protection / field research to a sample of students of the University of Baghdad
...Show More Authors

        This paper deals with social responsibility visible to the media and the role they play in spreading the culture of environmental protection, and make research on a sample of the University of Baghdad consisting students from 150 students, male and female were distributed questionnaire form on the sample to obtain the required information has been questionnaire included axes distributed questions achieve the objectives of the search, and after the form data were analyzed using statistical program spss results show that the visual media and its role in spreading the culture of environmental protection form averages arithmetic high, indicating a rise in the influence of th

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 22 2017
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
COLLABORATIVE RELATIONSHIP BETWEEN CONSUMER RIGHTS IN THE ALGERIAN MARKET.: COLLABORATIVE RELATIONSHIP BETWEEN CONSUMER RIGHTS IN THE ALGERIAN MARKET.
...Show More Authors

The current study aimed to identify key consumer rights and the nature of the work of organizations and traders in the Algerian market through the opinions of the study sample. To prove the hypotheses the researcher depended on the data obtained by the questionnaire prepared for this purpose. She distributed 384 questionnaires out of which only 300 were returned.
The data were analyzed using several statistical techniques such as the Statistical Package for Social Studies system, in addition to percentages, frequencies, and standard deviation.
And a number of conclusions and recommendations were presented. The most important results are:
- There is a strong correlation between safety and compensation rights.
- There is a st

... Show More
View Publication Preview PDF
Publication Date
Tue Nov 01 2016
Journal Name
Research Journal Of Pharmaceutical, Biological And Chemical Sciences
Treating of oil-based drill cuttings by earthworms
...Show More Authors

This study assessed the advantage of using earthworms in combination with punch waste and nutrients in remediating drill cuttings contaminated with hydrocarbons. Analyses were performed on day 0, 7, 14, 21, and 28 of the experiment. Two hydrocarbon concentrations were used (20000 mg/kg and 40000 mg/kg) for three groups of earthworms number which were five, ten and twenty earthworms. After 28 days, the total petroleum hydrocarbon (TPH) concentration (20000 mg/kg) was reduced to 13200 mg/kg, 9800 mg/kg, and 6300 mg/kg in treatments with five, ten and twenty earthworms respectively. Also, TPH concentration (40000 mg/kg) was reduced to 22000 mg/kg, 10100 mg/kg, and 4200 mg/kg in treatments with the above number of earthworms respectively. The p

... Show More
View Publication
Publication Date
Sun Jul 01 2012
Journal Name
Journal Of Educational And Psychological Researches
Self Protection and it's Relation with the social ignorance OF UNIVERSITY STUDENTS
...Show More Authors

The aim of this research is to find a relation between self-protection and the social - ignorance of the univresity students. In applying the aims of the reaearch, the ressearcher has constructed two scales to measure
self - protection and the social - ignorance. After finding their validity and stability and their discriminative power, the researcher has applied them on a sample of (200) male and female. University students, who were selected randomly. The results of the research has arrived at finding a positive relation between self-protection and social - ignorance.

The researcher has recommended a concentration on the role of parents in raising their childern depending on themselves and making f

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 14 2023
Journal Name
Al-academy
The Cultural Identity in David Gentelman’s Works
...Show More Authors

The study of cultural identity and its data in the designer’s work is considered a cultural nature to highlight the cultural identity and link it to the national culture of their country and society. It provides a reflection and translation of the society’s culture, traditions, social and economic dimensions, the natural environment, and scientific phenomena. Within meanings translated into a variety of methods, including expressive and realistic, which defines the designer’s relationship with his society and the national culture of his country and his connection with the civilization of the country.
The research problem came with the following question: What are the data of cultural identity in the work of designer David Gent

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jul 18 2014
Journal Name
International Journal Of Computer Applications
3-Level Techniques Comparison based Image Recognition
...Show More Authors

Image recognition is one of the most important applications of information processing, in this paper; a comparison between 3-level techniques based image recognition has been achieved, using discrete wavelet (DWT) and stationary wavelet transforms (SWT), stationary-stationary-stationary (sss), stationary-stationary-wavelet (ssw), stationary-wavelet-stationary (sws), stationary-wavelet-wavelet (sww), wavelet-stationary- stationary (wss), wavelet-stationary-wavelet (wsw), wavelet-wavelet-stationary (wws) and wavelet-wavelet-wavelet (www). A comparison between these techniques has been implemented. according to the peak signal to noise ratio (PSNR), root mean square error (RMSE), compression ratio (CR) and the coding noise e (n) of each third

... Show More
View Publication
Crossref
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
Image Compression Techniques on-Board Small Satellites
...Show More Authors

      Raw satellite images are considered high in resolution, especially multispectral images captured by remote sensing satellites. Hence, choosing the suitable compression technique for such images should be carefully considered, especially on-board small satellites, due to the limited resources. This paper presents an overview and classification of the major and state-of-the-art compression techniques utilized in most space missions launched during the last few decades, such as the Discrete Cosine Transform (DCT) and the Discrete Wavelet Transform (DWT)-based compression techniques. The pros and cons of the onboard compression methods are presented, giving their specifications and showing the differences among them to provide uni

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Journal Of Science
Keystroke Dynamics Authentication based on Naïve Bayes Classifier
...Show More Authors

Authentication is the process of determining whether someone or something is,
in fact, who or what it is declared to be. As the dependence upon computers and
computer networks grows, the need for user authentication has increased. User’s
claimed identity can be verified by one of several methods. One of the most popular
of these methods is represented by (something user know), such as password or
Personal Identification Number (PIN). Biometrics is the science and technology of
authentication by identifying the living individual’s physiological or behavioral
attributes. Keystroke authentication is a new behavioral access control system to
identify legitimate users via their typing behavior. The objective of thi

... Show More
View Publication Preview PDF