Preferred Language
Articles
/
iRdCLZIBVTCNdQwCOae5
A survey on video compression fast block matching algorithms
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Sat Mar 01 2014
Journal Name
International Journal Of Computer Science Engineering And Technology
Streaming video content over NGA (next generation access) network technology‏
...Show More Authors

An approach for hiding information has been proposed for securing information using Slanlet transform and the T-codes. Same as the wavelet transform the Slantlet transform is better in compression signal and good time localization signal compression than the conventional transforms like (DCT) discrete cosine transforms. The proposed method provides efficient security, because the original secret image is encrypted before embedding in order to build a robust system that is no attacker can defeat it. Some of the well known fidelity measures like (PSNR and AR) were used to measure the quality of the Steganography image and the image after extracted. The results show that the stego-image is closed related to the cover image, with (PSNR) Peak Si

... Show More
Publication Date
Sun Jul 01 2012
Journal Name
Journal Of Computer Science
Peer-to-Peer Video Conferencing Using Hybrid Content Distribution Model
...Show More Authors

View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Information hiding in digital video using DCT, DWT and CvT
...Show More Authors

Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Information hiding in digital video using DCT, DWT and CvT
...Show More Authors

The type of video that used in this proposed hiding a secret information technique is .AVI; the proposed technique of a data hiding to embed a secret information into video frames by using Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Curvelet Transform (CvT). An individual pixel consists of three color components (RGB), the secret information is embedded in Red (R) color channel. On the receiver side, the secret information is extracted from received video. After extracting secret information, robustness of proposed hiding a secret information technique is measured and obtained by computing the degradation of the extracted secret information by comparing it with the original secret information via calculating the No

... Show More
Scopus (17)
Scopus
Publication Date
Mon Jun 22 2020
Journal Name
Baghdad Science Journal
Using Evolving Algorithms to Cryptanalysis Nonlinear Cryptosystems
...Show More Authors

            In this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack. Genetic Algorithm (GA) and Ant Colony Optimization (ACO) which are used for attacking one of the nonlinear cryptosystems called "shrinking generator" using different lengths of cipher text and different lengths of combined LFSRs. GA and ACO proved their good performance in finding the initial values of the combined LFSRs. This work can be considered as a warning for a stream cipher designer to avoid the weak points, which may be f

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Turkish Journal Of Physiotherapy And Rehabilitation
classification coco dataset using machine learning algorithms
...Show More Authors

In this paper, we used four classification methods to classify objects and compareamong these methods, these are K Nearest Neighbor's (KNN), Stochastic Gradient Descentlearning (SGD), Logistic Regression Algorithm(LR), and Multi-Layer Perceptron (MLP). Weused MCOCO dataset for classification and detection the objects, these dataset image wererandomly divided into training and testing datasets at a ratio of 7:3, respectively. In randomlyselect training and testing dataset images, converted the color images to the gray level, thenenhancement these gray images using the histogram equalization method, resize (20 x 20) fordataset image. Principal component analysis (PCA) was used for feature extraction, andfinally apply four classification metho

... Show More
Publication Date
Sun May 01 2022
Journal Name
Journal Of Engineering
Comparative Study between the Behavior of the Concrete Thrust Block and the Restraint Joint in a Water Distribution System; Review
...Show More Authors

Thrust blocks and restraint joints are the two most popular methods of counteracting the thrust force that generated at pipe fittings (bends, Tee, wye, reducers, dead ends, etc…). Both systems perform the same function, which is to prevent the joints from separating from the pipes. The aim of the study is to review previous studies and scientific theories related to the study and design of thrust blocks and restraint joints to study the behavior of both systems under thrust force and to study the factors and variables that affect the behavior of these systems. The behavior of both systems must be studied because they cannot be abandoned, as each system has conditions whose use is more feasible, scientific, and economic

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sat Apr 23 2022
Journal Name
Research Journal Of Pharmacy And Technology
Effect of Natural/ Synthetic Polymers and Super disintegrants on the Formulation of Zafirlukast Fast Dissolving Film
...Show More Authors

Fast-dissolving films are one of the interested delivery systems for oral solid dosage forms to overcome swallowing difficulty for geriatric and pediatric patients. Zafirlukast (ZLK) is one of the most commonly used oral medication for treatment of asthmatic patients particularly mild to moderate cases. Oral fast dissolving films of ZLK were prepared using two different filming forming polymers, hydroxypropyl methylcellulose (HPMC) and sodium carboxymethyl cellulose (SCMC). Different concentrations of the 2 polymers were used to prepare 10 formulas. Other excipients were also added at various ratios to produce 10 different formulations. These were maltodextrin, crosspivodone, polyvinylpyrrolidone (PVP), and banana powder. In vitro c

... Show More
View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Mon Apr 26 2021
Journal Name
Journal Of Real-time Image Processing
Fast and efficient recursive algorithm of Meixner polynomials
...Show More Authors

View Publication
Scopus (33)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Engineering
Factors Affecting Labor Productivity on Construction in Kurdistan of Iraq: Web Survey
...Show More Authors

This study was set out to investigate factors affecting labor productivity on construction in the north of Iraq (Kurdistan) and to rank all the factors based on engineers, contractors, and designer’s opinions. 76 factors were analyzed based on previous literature and a pilot study. Next, by using online Google Form, a questionnaire form was created and sent to people who have experience in the construction industry. Afterward, the questionnaire form was sent to targeted people by email and social media apps. Factors were divided into nine groups “Management, Technical and Technology, Human and Workforce, Leadership, Motivation, Safety, Time, Material and Equipment, and External”. However, 202 respondents participated in this study,

... Show More
View Publication Preview PDF
Crossref (3)
Crossref