Preferred Language
Articles
/
bsj-3294
Hiding the Type of Skin Texture in Mice based on Fuzzy Clustering Technique
...Show More Authors

A substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. The approach has been employed to use Fuzzy C-Mean clustering (FCM) to find the robust image regions for hiding the type of skin texture features in mice. The steganography was implemented using Least Significant Bit (LSB) method.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun May 10 2020
Journal Name
Baghdad Science Journal
Immunohistochemical Expression of P16 Protein and TGF β1 in Mice Liver Exposed to Fumonisin B1
...Show More Authors

Fumonisin B1 (FB1) is a mycotoxin produced in some grains (mainly corn) by Fusarium species. Due to a structural similarity between FB1 and sphinganine, sphingolipids metabolism is inhibited. Such inhibition plays a critical role in cell to cell singling and structure of lipoprotein; therefore FB1 has been suggested to have a relationship with human and animal cancer. This research is planned to study the effect of FB1 on male mice at two doses (20 and 30 µg/ ml) on the expression of TGF-β1 and p16 in liver cells. Three groups of Swiss albino male mice; each group was orally administrated with FB1 toxin as the following: normal saline (control group); 20 and 30 µg/ ml. All groups were sacrificed after two weeks of oral manage

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Jan 24 2017
Journal Name
Journal Of Madenat Alelem College
Effect of Prey Type on Relationship between Reproductive Performance and Female's Age in Macrocyclops albidus (Jurine 1820)
...Show More Authors

The present study was conducted to investigate effect of prey type on the relationship between age of females of Macrocyclops albidus and reproductive performance, which included each of mean number of nauplii, age at first brood, and age at first clutch. Results revealed that the correlation coefficient between the age at first brood and clutch and age of females fed on Artemia was significant P <0.05, being 0.65 and 0.81 respectively, while the correlations were not significant P>0.05 in females fed on mosquito larvae (Culex quinquefasciatus) and Paramecium nauplii. It was also found that the correlation coefficients between mean number of the nauplii and longevity in M. albidus were significant P<0.05 whereas, the correlations were not s

... Show More
Publication Date
Sun Mar 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Use the Six Sigma technique in a solutionProblems of work (analytical study)
...Show More Authors

The research Concentrates on modern Variable in the organizations that is 6 sigma. The field study is two of Iraqi industrial organizations, The first is state company of …………… , the other is the state company of ……

The problem of the research determines some questions and hypotheses, The data was Collected by question air, which contains 5 dimensions and (10) critical Successful factories  . 

The sample contains (42) who Works in that organizations. The points out many conclusions. The main of it, there is significant differences among the two organizations Then The research concluded with a number of important recommendations serve it's objectives .

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Baghdad Science Journal
Effect of Alstonia Boonei Stem Bark Extracts on the Activity of Liver Maker Enzymes in Rats Induced by Ccl4
...Show More Authors

This study investigated the outcome of Alstonia boonei stem bark on liver enzymes after inducing the Wistar albino rats with carbon tetrachloride (CCl4). This effect of plant extract was compared with silymarin – a drug commonly used for the treatment of chronic hepatocyte disorder. The plant sample was extracted with ethanol; acute toxicity study of the extract was performed on eighteen Wistar mice, while 30 rats were sacrificed for liver enzymes assay. The rats were divided into six clusters: each cluster has five rats, culster 1 served as control and was given 2 mL/kg b.w - distilled water; clusters 2 – 6 were CCl4 induced. Cluster 2 was untreated but served as the negative control while cluster 3 wa

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Sun Dec 31 2017
Journal Name
College Of Islamic Sciences
Mask technique in the poem "Christ after the crucifixion" for Bder Shaker Al_Sayab
...Show More Authors

Research summary

Perhaps the methods of mask that Arab poets resorted to in our time are due to the conditions of oppression and political and social repression that the Arab poet suffered from; So he strived to circumvent it, and it became a justification for hiding behind it. The research is available on a number of topics that lead to the definition of the mask technique and the beginning of its prevalence in Arabic literature after the Second World War, especially in recent decades by benefiting from historical stories, fairy tales and legends of all kinds. As well as defining the mask idiomatically and linguistically, and the beginning of its use in ancient religious rituals, and the special place it had in Greek plays. Poets

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
An Efficient Algorithm for Fuzzy Linear Fractional Programming Problems via Ranking Function
...Show More Authors

In many applications such as production, planning, the decision maker is important in optimizing an objective function that has fuzzy ratio two functions which can be handed using fuzzy fractional programming problem technique. A special class of optimization technique named fuzzy fractional programming problem is considered in this work when the coefficients of objective function are fuzzy. New ranking function is proposed and used to convert the data of the fuzzy fractional programming problem from fuzzy number to crisp number so that the shortcoming when treating the original fuzzy problem can be avoided. Here a novel ranking function approach of ordinary fuzzy numbers is adopted for ranking of triangular fuzzy numbers with simpler an

... Show More
View Publication Preview PDF
Scopus (13)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Proposed Framework for Official Document Sharing and Verification in E-government Environment Based on Blockchain Technology
...Show More Authors

Progression in Computer networks and emerging of new technologies in this field helps to find out new protocols and frameworks that provides new computer network-based services. E-government services, a modernized version of conventional government, are created through the steady evolution of technology in addition to the growing need of societies for numerous services. Government services are deeply related to citizens’ daily lives; therefore, it is important to evolve with technological developments—it is necessary to move from the traditional methods of managing government work to cutting-edge technical approaches that improve the effectiveness of government systems for providing services to citizens. Blockchain technology is amon

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Crossref
Publication Date
Tue Apr 02 2024
Journal Name
Al-iraqia Journal Of Scientific Engineering Research
Prioritise Five Tafseer Translators Using Clustering Technique for Surah Al-Baqarah
...Show More Authors

View Publication Preview PDF
Crossref
Publication Date
Wed May 06 2015
Journal Name
16th Conference In Natural Science And Mathematics
Efficient digital Image filtering method based on fuzzy algorithm
...Show More Authors

Recently, Image enhancement techniques can be represented as one of the most significant topics in the field of digital image processing. The basic problem in the enhancement method is how to remove noise or improve digital image details. In the current research a method for digital image de-noising and its detail sharpening/highlighted was proposed. The proposed approach uses fuzzy logic technique to process each pixel inside entire image, and then take the decision if it is noisy or need more processing for highlighting. This issue is performed by examining the degree of association with neighboring elements based on fuzzy algorithm. The proposed de-noising approach was evaluated by some standard images after corrupting them with impulse

... Show More
View Publication