Preferred Language
Articles
/
gReFvY0BVTCNdQwCgBr7
Survey on 3D Content Encryption
...Show More Authors

<p class="0abstract">The rapidly growing 3D content exchange over the internet makes securing 3D content became a very important issue. The solution for this issue is to encrypting data of 3D content, which included two main parts texture map and 3D models. The standard encryption methods such as AES and DES are not a suitable solution for 3D applications due to the structure of 3D content, which must maintain dimensionality and spatial stability. So, these problems are overcome by using chaotic maps in cryptography, which provide confusion and diffusion by providing uncorrelated numbers and randomness. Various works have been applied in the field of 3D content-encryption based on the chaotic system. This survey will attempt to review the approaches and aspects of the structure used for 3D content encryption methods for different papers. It found the methods that used chaotic maps with large keyspace are more robust to various attacks than other methods that used encryption schemes without chaotic maps. The methods that encrypting texture, polygon, and vertices for 3D content provide full protection than another method that provides partial protection.</p>

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Apr 21 2016
Journal Name
Iraqi Journal Of Agricultural Sciences
EFFECT OF SHEEP MANURE EXTRACT ON THE GROWTH AND NUTRIENTS CONTENT OF TOMATO SEEDLINGS
...Show More Authors

The experiment was conducted under shading (with the aid of Saran) condition on a nursery managed by the Baghdad Mayoralty during the season of 2014-2015 to study the effect of composed sheep manure extract on the growth and leaf nutrients content of tomato seedlings var. Wijdan. The experiment was composed of 6 treatments included the extract of sheep manure by hot (425C)and lmbient(205C) temperature water .The extract was diluted to the half by water and foliar applied to seedlings (multible application) or to the soil . Treatments also included the application of NPK chemical fertilizers as recommended and a control treatment through applying distilled water as foliar .The experiment was designed according to the randomized compl

... Show More
Scopus (1)
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Iraqi Journal Of Agricultural Sciences
Effect of sheep manure extract on the growth and nutrients content of tomato seedlingss
...Show More Authors

Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Engineering
Effect of Heat Treatments and Carbon Content on the Damping Properties of Structural Steel
...Show More Authors

Low- and medium-carbon structural steel components face random vibration and dynamic loads (like earthquakes) in many applications. Thus a modification to improve their mechanical properties, essentially damping properties, is required. The present study focuses on improving and developing these properties, significantly dampening properties, without losing the other mechanical properties. The specimens used in the present study are structural steel ribbed bar ISO 6935 subjected to heating temperatures of (850, 950, and 1050) ˚C, and cooling schemes of annealing, normalizing, sand, and quenching was selected. The damping properties of the specimens were measured experimentally with the area under the curve for the loadi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 01 2018
Journal Name
2018 11th International Congress On Image And Signal Processing, Biomedical Engineering And Informatics (cisp-bmei)
3D Head Shape Analysis of Suspected Zika Infected Infants
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Fri Dec 06 2019
Journal Name
Karbala International Journal Of Modern Science
Stereo Photogrammetry vs Computed Tomography for 3D Medical Measurements
...Show More Authors

View Publication
Scopus (7)
Crossref (4)
Scopus Crossref
Publication Date
Sat Nov 26 2022
Journal Name
Sensors
3D Object Recognition Using Fast Overlapped Block Processing Technique
...Show More Authors

Three-dimensional (3D) image and medical image processing, which are considered big data analysis, have attracted significant attention during the last few years. To this end, efficient 3D object recognition techniques could be beneficial to such image and medical image processing. However, to date, most of the proposed methods for 3D object recognition experience major challenges in terms of high computational complexity. This is attributed to the fact that the computational complexity and execution time are increased when the dimensions of the object are increased, which is the case in 3D object recognition. Therefore, finding an efficient method for obtaining high recognition accuracy with low computational complexity is essentia

... Show More
View Publication
Scopus (13)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Mon Apr 03 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A General Overview on the Categories of Image Features Extraction Techniques: A Survey
...Show More Authors

In the image processing’s field and computer vision it’s important to represent the image by its information. Image information comes from the image’s features that extracted from it using feature detection/extraction techniques and features description. Features in computer vision define informative data. For human eye its perfect to extract information from raw image, but computer cannot recognize image information. This is why various feature extraction techniques have been presented and progressed rapidly. This paper presents a general overview of the feature extraction categories for image.

View Publication Preview PDF
Crossref
Publication Date
Tue Feb 14 2023
Journal Name
Journal Of Educational And Psychological Researches
Panic Attacks Over COVID 19 : A Survey Study on An Iraqi University Sample
...Show More Authors

Abstract

The present paper attempts to detect the level of (COVID-19) pandemic panic attacks among university students, according to gender and stage variables.

To achieve this objective, the present paper adopts the scale set up by (Fathallah et al., 2021), which has been applied electronically to a previous cross-cultural sample consisting of (2285) participants from Arab countries, including Iraq. The scale includes, in its final form, (69) optional items distributed on (6) dimensions:  physical symptoms (13) items, psychological and emotional symptoms (12) items, cognitive and mental symptoms (11) items, social symptoms (8) items, general symptoms (13) items and daily living practices (12) items

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 01 2022
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on distributed denial of service attack detection using deep learning: A review
...Show More Authors

Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks

... Show More
View Publication
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref