Preferred Language
Articles
/
iRe2vY0BVTCNdQwC8hrC
A Blind Video Copyright Protection Technique in Maximum and Minimum Energy Frames Based on The Fast Walsh Hadamard Transform (FWHT) and Discrete Wavelet Transform (DWT) and Arnold Map
...Show More Authors

Video copyright protection is the most generally acknowledged method of preventing data piracy. This paper proposes a blind video copyright protection technique based on the Fast Walsh Hadamard Transform (FWHT), Discrete Wavelet Transform (DWT), and Arnold Map. The proposed method chooses only frames with maximum and minimum energy features to host the watermark. It also exploits the advantages of both the fast Walsh Hadamard transform (FWHT) and discrete wavelet transforms (DWT) for watermark embedding. The Arnold map encrypts watermarks before the embedding process and decrypts watermarks after extraction. The results show that the proposed method can achieve a fast embedding time, good transparency, and robustness against various attacks.

Scopus Crossref
View Publication
Publication Date
Wed Aug 10 2022
Journal Name
Ibero-american Journal Of Exercise And Sports Psychology
The impact of applying the K-W-L self-scheduling technique on first-year intermediate students' learning of basic volleyball skills
...Show More Authors

The impact of applying the K-W-L self-scheduling technique on first-year intermediate students' learning of basic volleyball skills, Ayad Ali Hussein*, Israa Fouad Salih

View Publication Preview PDF
Scopus (7)
Scopus
Publication Date
Mon Mar 07 2022
Journal Name
Journal Of Educational And Psychological Researches
The Effect of Teaching According to the Augmented Reality Technique on theVisual Thinking Skills to Scientific Fifth-Grade Students for Biology
...Show More Authors

The research aims to identify the effect of teaching according to the augmented reality on the technique of the visual thinking skills among scientific fifth-grade students in a biology course. In order to achieve the goal of the research, the researcher adopted the experimental approach with the partial set of the two equal groups with the dimensional test of visual thinking skills, The research population represented all the scientific students of the fifth grade for morning government schools affiliated to the General Directorate of Education of Baghdad / Karkh II, alshakerin preparatory for boys was chosen intentionally, in which two groups were chosen for this study, one group is chosen randomly as the control group via lottery, whe

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 30 2012
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Numerical Analysis of Laminar Natural Convection in Square Enclosure with and without Partitions and Study Effect of pPartition on the Flow Pattern and Heat Transfer
...Show More Authors

The problem of steady, laminar, natural convective flow in an square enclosure with and without partitions is considered for Rayleigh number (103-106) and Prandtl number (0.7). Vertical walls were maintained isothermal at different temperatures while horizontal walls and the partitions were insulated. The length of partition was taken constant. The number of partitions were placed on horizontal surface in staggered arrangement from (1– 3) and ratio of partition thickness (H/L= 0.033, 0.083, 0.124). The problem is formulated in terms of the vorticity-stream function procedure. A numerical solution based on a program in Fortran 90 with the finite difference method is obtained. Representative results illustrating the effects of the thickn

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 30 2022
Journal Name
Revue D'intelligence Artificielle
Performance Evaluation of SDN DDoS Attack Detection and Mitigation Based Random Forest and K-Nearest Neighbors Machine Learning Algorithms
...Show More Authors

Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne

... Show More
View Publication
Scopus (19)
Crossref (11)
Scopus Crossref
Publication Date
Mon Sep 03 2018
Journal Name
Al-academy
The Technical Treatment for Pottery Body by (Kintsugi) Technique in Japanese Pottery – Analytic Study
...Show More Authors

The aesthetic and technical expertise help  in producing the artistic work and achieving results in aesthetic formulations that reflect the aesthetic and  expressive dimensions and the reflective dimensions of the pottery, surpassing its traditions, asserting  its active presence in life, cherishing it  even when it  breaks  or get damaged   by employing techniques that are originated  from  the Japanese environment.

                       The research problem is to study how ( Kintsugi) technique and similar techniques are used to create  new rebirths of pottery piec

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat May 09 2015
Journal Name
International Journal Of Innovations In Scientific Engineering
USING ARTIFICIAL NEURAL NETWORK TECHNIQUE FOR THE ESTIMATION OF CD CONCENTRATION IN CONTAMINATED SOILS
...Show More Authors

The aim of this paper is to design artificial neural network as an alternative accurate tool to estimate concentration of Cadmium in contaminated soils for any depth and time. First, fifty soil samples were harvested from a phytoremediated contaminated site located in Qanat Aljaeesh in Baghdad city in Iraq. Second, a series of measurements were performed on the soil samples. The inputs are the soil depth, the time, and the soil parameters but the output is the concentration of Cu in the soil for depth x and time t. Third, design an ANN and its performance was evaluated using a test data set and then applied to estimate the concentration of Cadmium. The performance of the ANN technique was compared with the traditional laboratory inspecting

... Show More
View Publication
Publication Date
Mon May 01 2023
Journal Name
WiadomoĊ›ci Lekarskie Medical Advances
EVALUATION OF VEST-OVER-PANT TECHNIQUE IN THE TREATMENT OF POST-HYPOSPADIAS URETHROCUTANEOUS FISTULA
...Show More Authors

The aim: In this study, we present and evaluate the vest-over-pants technique as a simple way to correct urethrocutaneous fistulas after hypospadias. Materials and methods: Between October 2018 and June 2020, twenty male patients aged 5 to 20 years came to us with post hypospadias repair fistula, these patients underwent vest-over-pant repair of their fistula. The size of fistula was ranging between 2.5-5 mm. The distribution of fistula was coronal (3 patients), distal penile (9 patients), midshaft (2 patients) and proximal penile (6 patients). In 14 patients there were single fistula and 6 patients had more than one fistula. Eleven of patients were exposed to a previous failed fistula repair procedure. Results: Six months after the operati

... Show More
Publication Date
Sun Jun 02 2019
Journal Name
International Journal Of Multidisciplinary And Current Research
The security problem in the Gulf Cooperation Council countries Study on internal challenges and future prospects
...Show More Authors

The importance of our research is that it examines the causes and sources of the security challenges in the internal security environment of the GCC countries, and aims to address the most important issues that are of great interest, namely, the issue of inter-GCC differences and addressing the issues of regional security for the Gulf region, After it is one of the most dynamic and more polarized areas for the emergence of threats and challenges because of the multiplicity of sources of threat and their complexity due to the specificity of the strategic environment and the negative repercussions it can have on the Gulf region, especially the issue of regional security of the Gulf Cooperation Council Which has become a magnet for competing i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 07 2010
Journal Name
Baghdad Science Journal
The effect of Allium sativum and Capsicum spp. Watery extracts on the Entamoeba histolytica in vitro.
...Show More Authors

In vitro tests have been carried out to find out the efficacy of watery extracts of garlic Allium sativum and hot pepper Capsicum spp. against the trophozoites of Entamoeba histolytica cultivated in liver infusion agar media at 37 c . The doses of ( 0.01, 0.05 ,0.1, 0.5, 1 ml )of garlic and hot pepper watery extracts were added to certain number of E. histolotica trophozoits for exposure time of 24 hrs., the mortality percentage of trophozoites treated with garlic extract were ( 14.82 %, 31.05% ,46.16% , 64.29% , 92.7%) respectively , these percentages were very close to that obtained from the treatment with the hot peper extract which were (17.86%, 32% , 44% ,66.67% ,100%) respectively . Generally these results showed that the ga

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Analysis of the tax pilot phase strategy and its impact on the tax price in Iraq
...Show More Authors

The research aims to identify the tax policy strategy adopted in Iraq after the change of the tax system in 2003 and beyond, and then make a comparison of the two strategies on corporate data whether they are charged with progressive tax rates and after the change of the system as the tax rates became fixed, and then indicate the changes In the tax proceeds, and knowing the imensions of the approved tax policy, is it a tax reform strategy or a strategy to attract investments.The research started from the problem of exposure of the Iraqi tax system to several changes, as this led to a reflection on the technical organization of taxes, in terms of the tax rate.The descriptive analytical approach was chosen to study the actual reality of th

... Show More
View Publication Preview PDF