Preferred Language
Articles
/
bsj-7168
Watermark Based on Singular Value Decomposition
...Show More Authors

Watermarking operation can be defined as a process of embedding special wanted and reversible information in important secure files to protect the ownership or information of the wanted cover file based on the proposed singular value decomposition (SVD) watermark. The proposed method for digital watermark has very huge domain for constructing final number and this mean protecting watermark from conflict. The cover file is the important image need to be protected. A hidden watermark is a unique number extracted from the cover file by performing proposed related and successive operations, starting by dividing the original image into four various parts with unequal size. Each part of these four treated as a separate matrix and applying SVD on it, the diagonal matrix is selected to determine its norm. The four norms will be processed to produce one unique number used as a watermark and this number can be developed  in future by exploiting some other features in constructing watermark number other than SVD process to construct two watermark numbers, each one of them owned special methodology, for avoiding some challenges and changings in the transformation process. 

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Apr 21 2023
Journal Name
Aip Conference Proceedings
Efficient computational methods for solving the nonlinear initial and boundary value problems
...Show More Authors

In this paper, three approximate methods namely the Bernoulli, the Bernstein, and the shifted Legendre polynomials operational matrices are presented to solve two important nonlinear ordinary differential equations that appeared in engineering and applied science. The Riccati and the Darcy-Brinkman-Forchheimer moment equations are solved and the approximate solutions are obtained. The methods are summarized by converting the nonlinear differential equations into a nonlinear system of algebraic equations that is solved using Mathematica®12. The efficiency of these methods was investigated by calculating the root mean square error (RMS) and the maximum error remainder (𝑀𝐸𝑅n) and it was found that the accuracy increases with increasi

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sun Nov 17 2019
Journal Name
Journal Of Interdisciplinary Mathematics
Fuzzy preinvexity via ranking value functions with applications to fuzzy optimization problems
...Show More Authors

View Publication
Scopus (5)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
International Journal Of Research In Social Sciences & Humanities
The effect of the green value chain in reducing environmental failure costs
...Show More Authors

The research aims to apply the activities of the green value chain as one of the modern administrative techniques that economic units resort to develop solutions to the pollution problems that occur due to the activity of economic units and their products that may cause damage to the environment as well as the waste of natural resources and to identify the production of environmentally friendly products and reduce the costs of environmental failure of both types Internal and external that may be borne by economic units such as taxes, fines and compensation due to nonobservance of environmental requirements and the preservation of human health and protection of the environment. To achieve the goal of the research, the researchers rel

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 28 2019
Journal Name
Journal Of The College Of Education For Women
Empowerment of Women… From Value Education to the Creation of Human Morality
...Show More Authors

    This research on women under the title (Empowerment of women…  From value education to the creation of human morality), includes a disclosure of the reasons that prevented women from performing their human role in the development of human societies and treatments that can provide to solve this big problem in the life These communities, especially the Eastern societies and the religious ones, believe that the woman has not received the care and care to raise her human values ​​in order to contribute to the required social contribution, for historical, economic, moral, religious, social and cultural reasons. And by shedding light on specific definitions of the most important rules on which the research relied

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Science International.(lahore)
GALERKIN'S METHOD TO SOLVE THE LINEAR SECOND ORDER DELAY MULTI-VALUE PROBLEMS
...Show More Authors

Publication Date
Sun Jan 01 2023
Journal Name
Aip Conference Proceedings
Efficient computational methods for solving the nonlinear initial and boundary value problems
...Show More Authors

Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sun Apr 30 2017
Journal Name
Ibn Al-haitham Jour. For Pure & Appl. Sci.
Solution of High Order Ordinary Boundary Value Problems Using Semi-Analytic Technique
...Show More Authors

The aim of this paper is to present a method for solving high order ordinary differential equations with two point's boundary condition, we propose semi-analytic technique using two-point oscillatory interpolation to construct polynomial solution. The original problem is concerned using two-point oscillatory interpolation with the fit equal numbers of derivatives at the end points of an interval [0 , 1] . Also, many examples are presented to demonstrate the applicability, accuracy and efficiency of the method by comparing with conventional methods.

View Publication
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
Removal of Congo Red Dye From Aqueous Solution Using Eco-Friendly Adsorbent of Nanosilica
...Show More Authors

            The development of a new, cheap, efficient, and ecofriendly adsorbents has become an important demand for the treatment of waste water, so nano silica is considered a good choice. A sample of nanosilica (NS) was prepared from sodium silicate as precursor and the nonionic surfactant Tween 20 as a template. The prepared sample was characterized using various characterization techniques such as FT-IR, AFM, SEM and EDX analysis. The spectrum of FTIR confirms the presence of silica in the sample, while SEM analysis of sample shows nanostructures with pore ranging (2-100nm).The adsorptive properties of this sample were studied by removing Congo red dye (CR) from aqueous solution. Batch experimental methods were carried o

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Tue Jul 11 2023
Journal Name
Journal Of Educational And Psychological Researches
Functional Engagement and Its Relationship to Hope-Based Thinking for Kindergarten Teachers
...Show More Authors

The research aims to identify the level of functional engagement and hope-based thinking of kindergarten teachers, identify if there is a significant difference in functional engagement and hope-based thinking in terms of specialization and years of service for kindergarten teachers, identify if there is a significant correlation between functional engagement and hope-based thinking of kindergarten teachers. The current research is determined by kindergarten teachers in the Second Rusafa Baghdad Education Directorate for the academic year (2022-2023). In order to achieve the objectives of the research, the researcher prepared a functional engagement scale, which consists of (45) items in three areas: Perceptual and functional engagement

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref