Preferred Language
Articles
/
bsj-3294
Hiding the Type of Skin Texture in Mice based on Fuzzy Clustering Technique
...Show More Authors

A substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. The approach has been employed to use Fuzzy C-Mean clustering (FCM) to find the robust image regions for hiding the type of skin texture features in mice. The steganography was implemented using Least Significant Bit (LSB) method.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Feb 28 2025
Journal Name
Journal Européen Des Systèmes Automatisés
Decision-Making Model for Aircraft Landing Based on Fuzzy Logic Approach
...Show More Authors

An aircraft's landing stage involves inherent hazards and problems associated with many factors, such as weather, runway conditions, pilot experiences, etc. The pilot is responsible for selecting the proper landing procedure based on information provided by the landing console operator (LCO). Given the likelihood of human decisions due to errors and biases, creating an intelligent system becomes important to predict accurate decisions. This paper proposes the fuzzy logic method, which intends to handle the uncertainty and ambiguity inherent in the landing phase, providing intelligent decision support to the pilot while reducing the workload of the LCO. The fuzzy system, built using the Mamdani approach in MATLAB software, considers critical

... Show More
View Publication
Scopus Crossref
Publication Date
Thu Jan 04 2024
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The impact of performance based costing technology in measuring the cost of consulting services : (an applied study in the Office of Scientific and Consulting Services - University of Technology
...Show More Authors

 

             This research aims to apply the Performance Focused Activity Based Costing System in the offices of scientific and advisory services at the University of Technology for the purpose of measuring the cost of services provided by these offices in order to reduce costs. To test the hypothesis of the research, the research was applied in the consulting offices of the University of Technology through the financial statements for the year ending 12/31/2017 of the Scientific and Consulting Services Office of the University of Technology, because the data of these years were issued and audited by the Federal Office of Financial Supervision.

A number of

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 30 2024
Journal Name
Iraqi Journal Of Science
Gray-Scale Image Compression Method Based on a Pixel-Based Adaptive Technique
...Show More Authors

     Today in the digital realm, where images constitute the massive resource of the social media base but unfortunately suffer from two issues of size and transmission, compression is the ideal solution. Pixel base techniques are one of the modern spatially optimized modeling techniques of deterministic and probabilistic bases that imply mean, index, and residual. This paper introduces adaptive pixel-based coding techniques for the probabilistic part of a lossy scheme by incorporating the MMSA of the C321 base along with the utilization of the deterministic part losslessly. The tested results achieved higher size reduction performance compared to the traditional pixel-based techniques and the standard JPEG by about 40% and 50%,

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Best Proximity Point Theorem for α ̃–ψ ̃-Contractive Type Mapping in Fuzzy Normed Space
...Show More Authors

The best proximity point is a generalization of a fixed point that is beneficial when the contraction map is not a self-map. On other hand, best approximation theorems offer an approximate solution to the fixed point equation . It is used to solve the problem in order to come up with a good approximation. This paper's main purpose is to introduce new types of proximal contraction for nonself mappings in fuzzy normed space and then proved the best proximity point theorem for these mappings. At first, the definition of fuzzy normed space is given. Then the notions of the best proximity point and - proximal admissible in the context of fuzzy normed space are presented. The notion of α ̃–ψ ̃- proximal contractive mapping is introduced.

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Baghdad Science Journal
Building a Statistical Model to Detect Foreground Objects and using it in Video Steganography
...Show More Authors

Video steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Mar 11 2019
Journal Name
Baghdad Science Journal
The Effects of Extracted Peptide from Skin of Iraqi Frog (Rana ridibunda) on Human Leukemic Lymphocytes
...Show More Authors

        The purified frog skin peptides were tested on leukemic patients lymphocytes, which revealed effects of cytotoxicity. Four frogs (Rana ridibunda) were stimulated by single intra-peritoneal injection of norepinephrine-HCl . Five different peptides;1(18) A, 2(19) L, 3(20) I,4(21) E and 5(22) Y were isolated and quantified. The peptide 3(20)I had 5.87% of hemolysis, while healthy human lymphocytes cytotoxic activity was for 2(19)L with inhibition( -10.4%).All peptides were subjected to polyacrylamide gel electrophoresis. The results revealed peptides 1(18)A, 2(19)L, 3(20)I which appeared as low as 10 KDa  marker. Theoretically, the whole polypeptide had a molecular weight 7488.61 Dalt

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Al-khwarizmi Engineering Journal
BER Performance Improvement of Dual Chaotic Maps Based on STBC Communication System
...Show More Authors

Sensitive information of any multimedia must be encrypted before transmission. The dual chaotic algorithm is a good option to encrypt sensitive information by using different parameters and different initial conditions for two chaotic maps. A dual chaotic framework creates a complex chaotic trajectory to prevent the illegal use of information from eavesdroppers. Limited precisions of a single chaotic map cause a degradation in the dynamical behavior of the communication system. To overcome this degradation issue in, a novel form of dual chaos map algorithm is analyzed. To maintain the stability of the dynamical system, the Lyapunov Exponent (LE) is determined for the single and dual maps. In this paper, the LE of the single and dual maps

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Engineering And Technology Journal
Text File Hiding Randomly Using Secret Sharing Scheme
...Show More Authors

Exchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha

... Show More
View Publication
Crossref
Publication Date
Mon Mar 07 2016
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
Determination of mercury level in skin whitening creams: Determination of mercury level in skin whitening creams
...Show More Authors

This study included the determination of mercury level in twelve samples of skin whitening cream available in local market in Baghdad by atomic absorption spectrophotometer ,all the samples analyzed was contained a detectable amount of mercury. The lowest concentration of mercury in the sample C (Top Shirley) was 0.482 μg/g, and the higher concentration was 29.54 μg/g in the sample J (Norseen) .It was also noted that the samples H (whitening speckle removing day cream) and K (whitening speckle removing night cream) did not mention in the label significance the name of the country of origin and date of the validity of the product.

View Publication Preview PDF
Publication Date
Sun Sep 01 2019
Journal Name
Al-khwarizmi Engineering Journal
The Effect of Wind Velocity on the Suppression of Composite Wing Airfoil NACA 0012
...Show More Authors

The first studies on shocks and vibrations were carried out at the beginning of the 1930s to improve the behavior of buildings during earthquakes. Vibration tests on aircraft were developed from 1940 to verify the resistance of parts and equipments prior to their first use. Flutter is a well-known example of dynamic aero elasticity, where when oscillation of structure interacted with unsteady aerodynamic forces the flutter will occur. Vibration on any structure without damping means that self-harmonic oscillation will occur, and in most cases the oscillation may start to increase until structural failure. This behavior is very similar to resonance phenomena if only the oscillation is being studied as a vibration case. In vibration suppre

... Show More
View Publication Preview PDF
Crossref (1)
Crossref