Preferred Language
Articles
/
bsj-2629
Building a Reliable Steganography System Using Random Key in a spatial Domain of Image
...Show More Authors

With time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and in practice, through example.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Oct 02 2023
Journal Name
Journal Of Engineering
Controlling the Unbalanced Voltages of a Series-Connected Lead-Acid Batteries in a PV Power Storage System using Dynamic Capacitor Technique
...Show More Authors

Lead-acid batteries have been used increasingly in recent years in solar power systems, especially in homes and small businesses, due to their cheapness and advanced development in manufacturing them. However, these batteries have low voltages and low capacities, to increase voltage and capacities, they need to be connected in series and parallel. Whether they are connected in series or parallel, their voltages and capacities must be equal otherwise the quality of service will be degraded. The fact that these different voltages are inherent in their manufacturing, but these unbalanced voltages can be controlled. Using a switched capacitor is a method that was used in many methods for balancing voltages, but their respons

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
Improving Wireless Sensor Network Security Using Quantum Key Distribution
...Show More Authors

Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jun 30 2023
Journal Name
College Of Islamic Sciences
Belief in the Last Day and its impact on building a Muslim's personality
...Show More Authors

 

Research Summary

        The doctrine of belief in the Last Day is one of the pillars of faith, and the doctrine of resurrection and reckoning are part of this day.

 Belief in the Last Day puts a person in constant control over himself, as this control creates in this person happiness and a decent life, and he renounces the world and turns away from all vices and adorns all virtues.

        On the other hand, we find that the person who does not believe in this day does not stand before his eyes anything that prevents him from doing injustices and corruption in the land. The doctrine of belief in the Last Day alone is

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Ieee Access
A Novel Approach to Improving Brain Image Classification Using Mutual Information-Accelerated Singular Value Decomposition
...Show More Authors

View Publication
Scopus (40)
Crossref (39)
Scopus Clarivate Crossref
Publication Date
Mon Apr 03 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A General Overview on the Categories of Image Features Extraction Techniques: A Survey
...Show More Authors

In the image processing’s field and computer vision it’s important to represent the image by its information. Image information comes from the image’s features that extracted from it using feature detection/extraction techniques and features description. Features in computer vision define informative data. For human eye its perfect to extract information from raw image, but computer cannot recognize image information. This is why various feature extraction techniques have been presented and progressed rapidly. This paper presents a general overview of the feature extraction categories for image.

View Publication Preview PDF
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Periodicals Of Engineering And Natural Sciences
Steganography using dual tree complex wavelet transform with LSB indicator technique
...Show More Authors

Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p

... Show More
Preview PDF
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Proceedings Of The International Conference On Research Advances In Engineering And Technology - Itechcet 2022
Suitability of Iraqi legal system for building operation transfer contract in infrastructure construction projects
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Thu Oct 31 2013
Journal Name
Al-khwarizmi Engineering Journal
Enhancement of a Power System Transient Stability Using Static Synchronous Series Compensator SSSC
...Show More Authors

Static Synchronous Series Compensator (SSSC) is a well known device for effectively regulating the active power flow in a power system. In this paper, the SSSC linearized power flow equations are incorporated into Newton-Raphson algorithm in a MATLAB written program to investigate the control of active poweer flow and the transient stability of a five bus and a thirty bus IEEE test systems, during abnormal conduction (three phase fault near buses). A comparison of the results obtained for the base case without SSSC and with it to investigate the effectiveness of the device on both of the active power flow and the transient stability.

View Publication Preview PDF
Publication Date
Thu Sep 06 2018
Journal Name
Al-khwarizmi Engineering Journal
Performance Augmenting of a Vertical Axis Wind Turbine using Adaptable Convergent Ducting System
...Show More Authors

Developments are carried out to enhance the performance of vertical axis wind turbines (VAWT). This paper studies the performance of the ducted wind turbine with convergent duct (DAWT). Basically, the duct technique is utilized to provide the desired wind velocity facing the turbine. Methodology was developed to estimate the decisive performance parameter and to present the effect of the convergent duct with different inlet angles. The ducted wind turbine was analyzed and simulated using MATLAB software and numerically using ANSYS-Fluent 17.2. Result of both approaches were presented and showed good closeness for the two cases of covering angles 12  and 20 respectively. Results also showed that the convergent duct with an inlet angl

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Feb 05 2011
Journal Name
International Journal Of Chemical Reactor Engineering
Mass Transport Properties of a Flow-Through Electrolytic Reactor Using Zinc Reduction System
...Show More Authors

An electrolytic process for the removal of Zn(II) from aqueous solution using a parallel amalgamated copper screens cathode operated in the flow through mode is proposed. The current-potential curves recorded at a rotating amalgamated copper disc electrode were used to determine diffusion coefficient of Zn(II). The performance of electrolytic reactor was investigated by using different flow rates at initial zinc ion concentration(48 mg/L). Taking into account the residential Zn(II) concentration, the best results were obtained for cathode potential of (-1.35 V vs. SCE) at flow rate (320 L/h). Zinc ion concentration was found to decrease from 48 mg/L to 1 mg/L during 120 min. of electrolysis. The experimental data are well correlate

... Show More
View Publication
Crossref