Preferred Language
Articles
/
iRe2vY0BVTCNdQwC8hrC
A Blind Video Copyright Protection Technique in Maximum and Minimum Energy Frames Based on The Fast Walsh Hadamard Transform (FWHT) and Discrete Wavelet Transform (DWT) and Arnold Map
...Show More Authors

Video copyright protection is the most generally acknowledged method of preventing data piracy. This paper proposes a blind video copyright protection technique based on the Fast Walsh Hadamard Transform (FWHT), Discrete Wavelet Transform (DWT), and Arnold Map. The proposed method chooses only frames with maximum and minimum energy features to host the watermark. It also exploits the advantages of both the fast Walsh Hadamard transform (FWHT) and discrete wavelet transforms (DWT) for watermark embedding. The Arnold map encrypts watermarks before the embedding process and decrypts watermarks after extraction. The results show that the proposed method can achieve a fast embedding time, good transparency, and robustness against various attacks.

Scopus Crossref
View Publication
Publication Date
Tue Jan 01 2019
Journal Name
Advances On Computational Intelligence In Energy
A Theoretical Framework for Big Data Analytics Based on Computational Intelligent Algorithms with the Potential to Reduce Energy Consumption
...Show More Authors

Within the framework of big data, energy issues are highly significant. Despite the significance of energy, theoretical studies focusing primarily on the issue of energy within big data analytics in relation to computational intelligent algorithms are scarce. The purpose of this study is to explore the theoretical aspects of energy issues in big data analytics in relation to computational intelligent algorithms since this is critical in exploring the emperica aspects of big data. In this chapter, we present a theoretical study of energy issues related to applications of computational intelligent algorithms in big data analytics. This work highlights that big data analytics using computational intelligent algorithms generates a very high amo

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sun Nov 10 2019
Journal Name
Journal Of Engineering And Applied Sciences
Discrete Fracture Network and Fractured Reservoir Characterization in Khabaz Field-Tertiary Formation
...Show More Authors

View Publication
Crossref
Publication Date
Mon Jul 01 1996
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
NOTES ON SCOLECOPHIDIANS (BLIND SNARES) REPT1LIA SERPENTES, OF IRAQ
...Show More Authors

This work includes the geographical distribution variation and notes for the habitat of Iraqi blind snakes Leptotyphlops macrorhynehus. Typhlops braminus, and Typhlops vermicularis. A key was also given for the identification of these three snakes.

View Publication Preview PDF
Publication Date
Wed Apr 10 2019
Journal Name
Engineering, Technology & Applied Science Research
Content Based Image Clustering Technique Using Statistical Features and Genetic Algorithm
...Show More Authors

Text based-image clustering (TBIC) is an insufficient approach for clustering related web images. It is a challenging task to abstract the visual features of images with the support of textual information in a database. In content-based image clustering (CBIC), image data are clustered on the foundation of specific features like texture, colors, boundaries, shapes. In this paper, an effective CBIC) technique is presented, which uses texture and statistical features of the images. The statistical features or moments of colors (mean, skewness, standard deviation, kurtosis, and variance) are extracted from the images. These features are collected in a one dimension array, and then genetic algorithm (GA) is applied for image clustering.

... Show More
View Publication
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Sun Mar 19 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Minimizing the Total Completion Times, the Total Tardiness and the Maximum Tardiness
...Show More Authors

In this paper, the main work is to minimize a function of three cost criteria for scheduling n jobs on a single machine. We proposed algorithms to solve the single machine scheduling multiobjective problem. In this problem, we consider minimizing the total completion times, total tardiness and maximum tardiness criteria. First a branch and bound (BAB) algorithm is applied for the 1//∑Ci+∑Ti+Tmax problem. Second we compare two multiobjective algorithms one of them based on (BAB) algorithm to find the set of efficient (non dominated) solutions for the 1//(∑Ci ,∑Ti ,Tmax) problem. The computational results show that the algorithm based on (BAB) algorithm is better than the other one for generated the total number of

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 05 2019
Journal Name
Journal Of The College Of Education For Women
Social Safety Nets and its role in the protection of widows (Problems and advancement options) A field study in the Social Welfare Department for Women
...Show More Authors

Current search problem manifested and widows who community harsh to bear hardships and pains، The goals of continuing the sustainability of life and take responsibility, and especially in light of the difficult circumstances in which Iraq is going through, and the displacement of murder and terrorism, which generated huge numbers of widows and orphans Because of the loss of a breadwinner and which became women and children are the most harm to the victim and as a result of wars and armed tendencies So this research is an important and vital topic opens our horizons important for overlapping roles of women widows and their impact on the achievement and status of Iraqi women and that as long as aptly characterized and their ability to end

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science (ijeecs)
A new smart approach of an efficient energy consumption management by using a machine-learning technique
...Show More Authors

Many consumers of electric power have excesses in their electric power consumptions that exceed the permissible limit by the electrical power distribution stations, and then we proposed a validation approach that works intelligently by applying machine learning (ML) technology to teach electrical consumers how to properly consume without wasting energy expended. The validation approach is one of a large combination of intelligent processes related to energy consumption which is called the efficient energy consumption management (EECM) approaches, and it connected with the internet of things (IoT) technology to be linked to Google Firebase Cloud where a utility center used to check whether the consumption of the efficient energy is s

... Show More
Crossref
Publication Date
Sun Sep 01 2024
Journal Name
Results In Engineering
Implementation of a control and monitoring system for a cathodic protection cell to mitigate localized corrosion in fixed and mobile steel structures
...Show More Authors

The current study introduces a novel technique to handle electrochemical localized corrosion in certain limited regions rather than applying comprehensive cathodic protection (CP) treatment. An impressed current cathodic protection cell (ICCPC) was fabricated and firmly installed on the middle of a steel structure surface to deter localized corrosion in fixed or mobile steel structures. The designed ICCPC comprises three essential parts: an anode, a cathode, and an artificial electrolyte. The latter was developed to mimic the function of the natural electrolyte in CP. A proportional-integrated-derivative (PID) controller was designed to stabilize this potential below the ICCPC at a cathodic potential of −850 mV, which is crucial for prote

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Wed May 24 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On Comparison between Radial Basis Function and Wavelet Basis Functions Neural Networks
...Show More Authors

      In this paper we study and design two feed forward neural networks. The first approach uses radial basis function network and second approach uses wavelet basis function network to approximate the mapping from the input to the output space. The trained networks are then used in an conjugate gradient algorithm to estimate the output. These neural networks are then applied to solve differential equation. Results of applying these algorithms to several examples are presented

View Publication Preview PDF
Publication Date
Thu Sep 15 1988
Journal Name
Physical Review B
Effect of doping percentages on the conductivity and energy gap of<i>a</i>-Si thin films
...Show More Authors

View Publication
Scopus (1)
Crossref (3)
Scopus Clarivate Crossref