Preferred Language
Articles
/
bsj-683
linear equivalence determination of key-stream sequence using Z-Transform
...Show More Authors

the research ptesents a proposed method to compare or determine the linear equivalence of the key-stream from linear or nonlinear key-stream

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 13 2017
Journal Name
Al-khwarizmi Engineering Journal
Digital Image Watermarking Using Arnold Scrambling and Berkeley Wavelet Transform
...Show More Authors

Embedding an identifying data into digital media such as video, audio or image is known as digital watermarking. In this paper, a non-blind watermarking algorithm based on Berkeley Wavelet Transform is proposed. Firstly, the embedded image is scrambled by using Arnold transform for higher security, and then the embedding process is applied in transform domain of the host image. The experimental results show that this algorithm is invisible and has good robustness for some common image processing operations.

View Publication Preview PDF
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Image Steganography using Dynamic Threshold based on Discrete Cosine Transform
...Show More Authors

The art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the cente

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (4)
Scopus Crossref
Publication Date
Thu Feb 28 2019
Journal Name
Iraqi Journal Of Science
Assessment of Magnetite Polishing by Using Tigris River Stream Sediments in Baghdad: An Ore Microscopy Application
...Show More Authors

This aim of this study is to assess the Tigris River sediments and utilize them as a new abrasive for the preparation of polished surface of magnetite ore to be studied under reflected light ore microscope. Such polishing process was tested using 250, 125, 71, 45, 25 and 18μm grain sizes of the river sediments. For the completion of the polishing and to obtain a glossy perfect polished surface, the 7 and 2.5 μm sized standard diamond pastes were used. After each polishing stage, the reflectance and roughness of these surfaces were measured as an evaluation step for the polishing efficiency. The reflectance values (R%) of the magnetite surface were found to be reversely proportioned to the abrasive grain size; while the surface roughnes

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 08 2023
Journal Name
Iraqi Journal Of Science
Sequence Variation and Phylogenetic Relationships Among Ten Iraqi Rice Varieties Using RM171 Marker
...Show More Authors

In the present study rice microsatellite marker (RM 171) was used to evaluate the genetic diversity and determining cultivar identity among ten rice varieties (oryza sativa L.) (Seven local and three commercial varieties). PCR technique was performed using two specific primers. The result showed presence of a band (305bp) DNA sequencing was done to PCR product to detect sequence variation between the ten rice varieties. In order to detect the relationship among all varieties, alignment of RM171 marker sequence was carried out for each variety. Amber and Daawat varieties showed the highest similarity with 98% identity, while the difference (2%) consists of two gaps and two transition mutations (T/C) and (C/T). Furthermore, Amber was align

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 22 2023
Journal Name
Iraqi Journal Of Science
New Approach for The Turbidimetric Determination of Iron(III) in Drug Samples of Different Origins Using Homemade Linear Array Ayah 5SX1-T-1D-CFI Analyser
...Show More Authors

A new Turbidimetric method characterized by simplicity, accuracy and speed for determination of iron(III) in drug samples by continuous flow injection analysis. The method was based on the formation of complex for iron(III) with 8-hydroxyquinoline in presence of ammonium acetate as a medium for the formation of deep green precipitate and this precipitate was determined using homemade Linear Array Ayah-5SX1-T-1D continuous flow injection analyser. The optimum parameters were 2.6 mL.min-1 flow rate using H2O as a carrier, 1.9 mL.min-1 (14 mmol.L-1) ammonium acetate, 2.4 mL.min-1 (14 mmol.L-1) 8-hydroxyquinoline, 60 L sample volume and open valve for the purge of the sample segment. Data treatment shows that linear range 0.1-8.0 mmol.L-1

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 01 2008
Journal Name
2008 Ieee International Joint Conference On Neural Networks (ieee World Congress On Computational Intelligence)
Linear block code decoder using neural network
...Show More Authors

View Publication
Scopus (12)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Thu Jan 01 2015
Journal Name
International Journal Of Computer Science And Mobile Computing
Image Compression using Hierarchal Linear Polynomial Coding
...Show More Authors

Publication Date
Sat Jun 01 2013
Journal Name
Engineering And Technology Journal
Performance Improvement of Multi-UserMC-CDMA system Using Discrete Hartly Transform Mapper
...Show More Authors

Future wireless communication systems must be able to accommodate a large number of users and simultaneously to provide the high data rates at the required quality of service. In this paper a method is proposed to perform the N-Discrete Hartley Transform (N-DHT) mapper, which are equivalent to 4-Quadrature Amplitude Modulation (QAM), 16-QAM, 64-QAM, 256-QAM, … etc. in spectral efficiency. The N-DHT mapper is chosen in the Multi Carrier Code Division Multiple Access (MC-CDMA) structure to serve as a data mapper instead of the conventional data mapping techniques like QPSK and QAM schemes. The proposed system is simulated using MATLAB and compared with conventional MC-CDMA for Additive White Gaussian Noise, flat, and multi-path selective fa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Civil Engineering Journal
Effect of Vehicular Stream Characteristics on Traffic Noise
...Show More Authors

Human health can be negatively impacted by exposure to loud noise, which can harm the auditory system. Traffic noise is the leading cause of noise pollution. This paper studies the problem of noise pollution on the roads in Baghdad, Iraq. Due to the increase in vehicle numbers and road network modifications in Baghdad, noise levels became a serious topic to be studied. The aim of the paper was thus to study traffic noise levels and the effect of the traffic stream on noise levels and to formulate a prediction model that identified the guidelines used for designing or developing future roads in the city. Then, the noise levels were measured based on five variables: the functional classification of roads, traffic flow, vehicle speed,

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Mon May 31 2021
Journal Name
Iraqi Journal Of Science
Improving Security of the Crypto-Stego Approach using Time Sequence Dictionary and Spacing Modification Techniques
...Show More Authors

Cryptography steganography is a practical tool for data security. Hybridization of the cryptography with steganography can provide more security by taking advantage of each technique. This work proposes a method for improving the crypto-stego method by utilizing the proposed dictionary method to modified ciphertext. After that, the modified encrypt ciphertext id was hidden in the text by using the proposed method. For cryptography, an Advanced Encryption Standard (AES) was utilized to encrypt the message. The AES employed a 128bit block size and 256bit key size. The ciphertext characters were then replaced by the characters identified by a dictionary list. The dictionary is time-dependent, where each of the equivalent words shift based o

... Show More
View Publication Preview PDF
Crossref