Preferred Language
Articles
/
bsj-4511
Symmetric- Based Steganography Technique Using Spiral-Searching Method for HSV Color Images
...Show More Authors

Steganography is defined as hiding confidential information in some other chosen media without leaving any clear evidence of changing the media's features. Most traditional hiding methods hide the message directly in the covered media like (text, image, audio, and video). Some hiding techniques leave a negative effect on the cover image, so sometimes the change in the carrier medium can be detected by human and machine. The purpose of suggesting hiding information is to make this change undetectable. The current research focuses on using complex method to prevent the detection of hiding information by human and machine based on spiral search method, the Structural Similarity Index Metrics measures are used to get the accuracy and quality of the retrieved image and to improve its perceived quality.

The values of information measures are calculated through practical experiments of (perceptibility, robustness, capacity) by using interpolation technique and structural similarity measures. Experimental results show that the use of these measures (PSNR, MSE, and SSIM) has improved the image quality by 87% and has produced values of PSNR (38-41 dB), MSE = 0.6537 and SSIM= 0.8255. The results also demonstrate a remarkable progress in the field of hiding information and the increasing difficulty of detecting it by humans and machines.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Apr 01 2024
Journal Name
Telkomnika (telecommunication Computing Electronics And Control)
Classification of grapevine leaves images using VGG-16 and VGG-19 deep learning nets
...Show More Authors

The successful implementation of deep learning nets opens up possibilities for various applications in viticulture, including disease detection, plant health monitoring, and grapevine variety identification. With the progressive advancements in the domain of deep learning, further advancements and refinements in the models and datasets can be expected, potentially leading to even more accurate and efficient classification systems for grapevine leaves and beyond. Overall, this research provides valuable insights into the potential of deep learning for agricultural applications and paves the way for future studies in this domain. This work employs a convolutional neural network (CNN)-based architecture to perform grapevine leaf image classifi

... Show More
View Publication
Scopus (16)
Crossref (13)
Scopus Crossref
Publication Date
Sat Jan 01 2011
Journal Name
Journal Of Engineering
CONSTRUCTION DELAY ANALYSIS USING DAILY WINDOWS TECHNIQUE
...Show More Authors

Delays occur commonly in construction projects. Assessing the impact of delay is sometimes a contentious
issue. Several delay analysis methods are available but no one method can be universally used over another in
all situations. The selection of the proper analysis method depends upon a variety of factors including
information available, time of analysis, capabilities of the methodology, and time, funds and effort allocated to the analysis. This paper presents computerized schedule analysis programmed that use daily windows analysis method as it recognized one of the most credible methods, and it is one of the few techniques much more likely to be accepted by courts than any other method. A simple case study has been implement

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Feb 28 2021
Journal Name
Jurnal Teknologi
HEAT TRANSFER ENHANCEMENT USING PASSIVE TECHNIQUE: REVIEW
...Show More Authors

Preserving and saving energy have never been more important, thus the requirement for more effective and efficient heat exchangers has never been more important. However, in order to pave the way for the proposal of a truly efficient technique, there is a need to understand the shortcomings and strengths of various aspects of heat transfer techniques. This review aims to systematically identify these characteristics two of the most popular passive heat transfer techniques: nanofluids and helically coiled tubes. The review indicated that nanoparticles improve thermal conductivity of base fluid and that the nanoparticle size, as well as the concentrations of the nanoparticles plays a major role in the effectiveness of the nanofluids.

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Aug 01 2017
Journal Name
International Journal Of Advanced Research In Computer And Communication Engineering
Information hiding by using Developed M8PAM Technique
...Show More Authors

Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Removal Color Study of Toluidine Blue dye from Aqueous Solution by using Photo-Fenton Oxidation
...Show More Authors

The degradation of Toluidine Blue dye in aqueous solution under UV irradiation is investigated by using photo-Fenton oxidation (UV/H2O2/Fe+). The effect of initial dye concentration, initial ferrous ion concentration, pH, initial hydrogen peroxide dosage, and irradiation time are studied. It is found put that the removal rate increases as the initial concentration of H2O2 and ferrous ion increase to optimum value ,where in we get more than 99% removal efficiency of dye at pH = 4 when the [H2O2] = 500mg / L, [Fe + 2 = 150mg / L]. Complete degradation was achieved in the relatively short time of 75 minutes. Faster decolonization is achieved at low pH, with the optimal value at pH 4 .The concentrations of degradation dye are detected by spectr

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jul 01 2014
Journal Name
Computer Engineering And Intelligent Systems
Static Analysis Based Behavioral API for Malware Detection using Markov Chain
...Show More Authors

Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l

... Show More
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Application of “LIML_LVR” method practically according to the general formula K-CLASS on suggestion simultaneous equation
...Show More Authors

في هذا البحث نحاول تسليط الضوء على إحدى طرائق تقدير المعلمات الهيكلية لنماذج المعادلات الآنية الخطية والتي تزودنا بتقديرات متسقة تختلف أحيانا عن تلك التي نحصل عليها من أساليب الطرائق التقليدية الأخرى وفق الصيغة العامة لمقدرات K-CLASS. وهذه الطريقة تعرف بطريقة الإمكان الأعظم محدودة المعلومات "LIML" أو طريقة نسبة التباين الصغرى"LVR

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 22 2020
Journal Name
Baghdad Science Journal
Splitting the One-Dimensional Wave Equation. Part I: Solving by Finite-Difference Method and Separation Variables
...Show More Authors

In this study, an unknown force function dependent on the space in the wave equation is investigated. Numerically wave equation splitting in two parts, part one using the finite-difference method (FDM). Part two using separating variables method. This is the continuation and changing technique for solving inverse problem part in (1,2). Instead, the boundary element method (BEM) in (1,2), the finite-difference method (FDM) has applied. Boundary data are in the role of overdetermination data. The second part of the problem is inverse and ill-posed, since small errors in the extra boundary data cause errors in the force solution. Zeroth order of Tikhonov regularization, and several parameters of regularization are employed to decrease error

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Bilinear System Identification Using Subspace Method
...Show More Authors

In this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .

View Publication Preview PDF
Crossref
Publication Date
Thu Feb 07 2019
Journal Name
Iraqi Journal Of Laser
Laser Enhanced Photocatalyic Degradation of Methylene blue using Nanostructured ZnO Catalyst based on Interfacial Charge Transfer
...Show More Authors

In this research, annealed nanostructured ZnO catalyst water putrefaction system was built using sun light and different wavelength lasers as stimulating light sources to enhance photocatalytic degradation activity of methylene blue (MB) dye as a model based on interfacial charges transfer. The structural, crystallite size, morphological, particle size, optical properties and degradation ability of annealed nanostructured ZnO were characterized by X-Ray Diffraction (XRD), Atomic Force Microscopy (AFM) and UV-VIS Spectrometer, respectively. XRD results demonstrated a pure crystalline hexagonal wurtzite with crystalline size equal to 23 nm. From AFM results, the average particle size was 79.25nm. All MB samples and MB with annealed nanostr

... Show More
View Publication Preview PDF