Preferred Language
Articles
/
bsj-3294
Hiding the Type of Skin Texture in Mice based on Fuzzy Clustering Technique
...Show More Authors

A substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. The approach has been employed to use Fuzzy C-Mean clustering (FCM) to find the robust image regions for hiding the type of skin texture features in mice. The steganography was implemented using Least Significant Bit (LSB) method.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Aug 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Text hiding in text using invisible character
...Show More Authors

Steganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples. This paper presents a new method to hide text in text characters. The systematic method uses the structure of invisible character to hide and extract secret texts. The creation of secret message comprises four main stages such using the letter from the original message, selecting the suitable cover text, dividing the cover text into blocks, hiding the secret text using the invisible character and comparing the cover-text and stego-object. This study uses an invisible character (white space

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Clouds Height Classification Using Texture Analysis of Meteosat Images
...Show More Authors

In the present work, pattern recognition is carried out by the contrast and relative variance of clouds. The K-mean clustering process is then applied to classify the cloud type; also, texture analysis being adopted to extract the textural features and using them in cloud classification process. The test image used in the classification process is the Meteosat-7 image for the D3 region.The K-mean method is adopted as an unsupervised classification. This method depends on the initial chosen seeds of cluster. Since, the initial seeds are chosen randomly, the user supply a set of means, or cluster centers in the n-dimensional space.The K-mean cluster has been applied on two bands (IR2 band) and (water vapour band).The textural analysis is used

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Design of PV Solar Energy Generator using MPPT Technique to Control Single Input/Multiple Outputs (DC-DC) Converter
...Show More Authors

The paper presents the design of a system consisting of a solar panel with Single Input/Multiple Outputs (DC-DC) Buck Converter by using Simulink dialogue box tools in MATLAB software package for simulation the system. Maximum Power Point Tracking (MPPT) technique depending on Perturb and Observe (P&O) algorithm is used to control the output power of the converter and increase the efficiency of the system. The characteristics of the MSX-60 PV module is chosen in design of the system, whereas the electrical characteristics (P-V, I-V and P-I curves) for the module are achieved, that is affected by the solar radiation and temperature variations. The proposed design module has been found to be stable for any change in atmospheric tempera

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
The effect of Nitrofurantoin on liver on Albino mice
...Show More Authors

the current study Included, evaluation the impact of Nitrofurantoin drug on liver in albino mice, 128 male albino mice have been used . Animals treared with (150,200 Mg/Kg) for 8 weeks . NFI caused histological changes in liver represented by , swelling of hepatocytes, disappearance of radial arrangement , vaculation of liver cells , increasing of kupffer cells and appearance of giant cells. NFT caused Congestion of blood vessels and infiltration of inflammatory cells in liver in all used concentrations.

View Publication Preview PDF
Crossref
Publication Date
Mon Aug 01 2011
Journal Name
Journal Of Engineering
DAMAGE DETECTION AND LOCATION FOR IN AND OUT-OFPLANE CURVED BEAMS USING FUZZY LOGIC BASED ON FREQUENCY DIFFERENCE
...Show More Authors

In this study, structures damage identification method based on changes in the dynamic characteristics
(frequencies) of the structure are examined, stiffness as well as mass matrices of the curved
(in and out-of-plane vibration) beam elements is formulated using Hamilton's principle. Each node
of both of them possesses seven degrees of freedom including the warping degree of freedom. The
curved beam element had been derived based on the Kang and Yoo’s thin-walled curved beam theory
in 1994. A computer program was developing to carry out free vibration analyses of the curved
beam as well as straight beam. Comparing with the frequencies for other researchers using the general
purpose program MATLAB. Fuzzy logic syste

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Wed Sep 01 2010
Journal Name
Al-khwarizmi Engineering Journal
Guiding Mobile Robot by Applying Fuzzy Approach on Sonar Sensors
...Show More Authors

This study describes how fuzzy logic control FLC can be applied to sonars of mobile robot. The fuzzy logic approach has effects on the navigation of mobile robots in a partially known environment that are used in different industrial and society applications. The fuzzy logic provides a mechanism for combining sensor data from all sonar sensors which present different information. The FLC approach is achieved by means of Fuzzy Decision Making method type of fuzzy logic controller. The proposed controller is responsible for the obstacle avoidance of the mobile robot while traveling through a map from a home point to a goal point. The FLC is built as a subprogram based on the intelligent architecture (IA). The software program  uses th

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 15 2010
Journal Name
Iraqi Journal Of Laser
Detection and Quantification of Class I Caries with Laser Fluorescence Technique
...Show More Authors

The objective of the present study is to verify the actual carious lesion depth by laser
fluorescence technique using 650 nm CW diode laser in comparison with the histopathological
investigation. Five permanent molar teeth were extracted from adult individuals for different reasons
(tooth impaction, periodontal diseases, and pulp infections); their ages were ranging from 20-25 years
old. Different carious teeth with varying clinical stages of caries progression were examined. An
experimental laser fluorescence set-up was built to perform the work regarding in vitro detection and
quantification of occlusal dental caries and the determination of its actual clinical carious lesion depth by
650 nm CW diode laser (excitat

... Show More
View Publication Preview PDF
Publication Date
Wed May 10 2017
Journal Name
Australian Journal Of Basic And Applied Sciences
Block-based Image Steganography for Text Hiding Using YUV Color Model and Secret Key Cryptography Methods
...Show More Authors

Preview PDF
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Ciphered Text Hiding in an Image using RSA algorithm
...Show More Authors

In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima

... Show More
View Publication Preview PDF
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
The technique of converting multi-choice mathematical programming into linear mathematical programming to find the optimal solution
...Show More Authors

The study deals with the issue of multi-choice linear mathematical programming. The right side of the constraints will be multi-choice. However, the issue of multi-purpose mathematical programming can not be solved directly through linear or nonlinear techniques. The idea is to transform this matter into a normal linear problem and solve it In this research, a simple technique is introduced that enables us to deal with this issue as regular linear programming. The idea is to introduce a number of binary variables And its use to create a linear combination gives one parameter was used multiple. As well as the options of linear programming model to maximize profits to the General Company for Plastic Industries product irrigation sy

... Show More
View Publication Preview PDF
Crossref