Preferred Language
Articles
/
iRe2vY0BVTCNdQwC8hrC
A Blind Video Copyright Protection Technique in Maximum and Minimum Energy Frames Based on The Fast Walsh Hadamard Transform (FWHT) and Discrete Wavelet Transform (DWT) and Arnold Map
...Show More Authors

Video copyright protection is the most generally acknowledged method of preventing data piracy. This paper proposes a blind video copyright protection technique based on the Fast Walsh Hadamard Transform (FWHT), Discrete Wavelet Transform (DWT), and Arnold Map. The proposed method chooses only frames with maximum and minimum energy features to host the watermark. It also exploits the advantages of both the fast Walsh Hadamard transform (FWHT) and discrete wavelet transforms (DWT) for watermark embedding. The Arnold map encrypts watermarks before the embedding process and decrypts watermarks after extraction. The results show that the proposed method can achieve a fast embedding time, good transparency, and robustness against various attacks.

Scopus Crossref
View Publication
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Isolate and diagnose some bacteria contaminated minced meat and determine the concentrations of powder and extracts plant cinnamon bark inhibitory and minimum lethal bacteria
...Show More Authors

Powder extracts hot water from local ground beef and studied inhibitory effectiveness of powder and extracts to the concentration of the aqueous extract hot Gulf students

View Publication Preview PDF
Publication Date
Wed Sep 26 2018
Journal Name
Communications In Computer And Information Science
A New RGB Image Encryption Based on DNA Encoding and Multi-chaotic Maps
...Show More Authors

View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Sat Jul 06 2024
Journal Name
Multimedia Tools And Applications
Text classification based on optimization feature selection methods: a review and future directions
...Show More Authors

A substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (3)
Scopus Crossref
Publication Date
Thu Jun 16 2022
Journal Name
Al-khwarizmi Engineering Journal
Path Planning and Obstacle Avoidance of a Mobile Robot based on GWO Algorithm
...Show More Authors

planning is among the most significant in the field of robotics research.  As it is linked to finding a safe and efficient route in a cluttered environment for wheeled mobile robots and is considered a significant prerequisite for any such mobile robot project to be a success. This paper proposes the optimal path planning of the wheeled mobile robot with collision avoidance by using an algorithm called grey wolf optimization (GWO) as a method for finding the shortest and safe. The research goals in this study for identify the best path while taking into account the effect of the number of obstacles and design parameters on performance for the algorithm to find the best path. The simulations are run in the MATLAB environment to test the

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Tue Sep 10 2019
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A classification model on tumor cancer disease based mutual information and firefly algorithm
...Show More Authors

View Publication
Scopus (16)
Crossref (6)
Scopus Crossref
Publication Date
Tue Jul 01 2014
Journal Name
Ieee Transactions On Circuits And Systems I: Regular Papers
Crosstalk-Aware Multiple Error Detection Scheme Based on Two-Dimensional Parities for Energy Efficient Network on Chip
...Show More Authors

Achieving reliable operation under the influence of deep-submicrometer noise sources including crosstalk noise at low voltage operation is a major challenge for network on chip links. In this paper, we propose a coding scheme that simultaneously addresses crosstalk effects on signal delay and detects up to seven random errors through wire duplication and simple parity checks calculated over the rows and columns of the two-dimensional data. This high error detection capability enables the reduction of operating voltage on the wire leading to energy saving. The results show that the proposed scheme reduces the energy consumption up to 53% as compared to other schemes at iso-reliability performance despite the increase in the overhead number o

... Show More
View Publication
Scopus (25)
Crossref (19)
Scopus Clarivate Crossref
Publication Date
Sat Aug 31 2019
Journal Name
Iraqi Journal Of Physics
The Effect of Laser And Thermal Treatment on the Hardness and Adhesion Force on the Cermet Coating By Thermal Spray Technique
...Show More Authors

Ceramic coating compose from a ceramic mixture (MgO, Al2O3) and metall (Al-Ni) were produced by Thermal Spray Technique. The mixed ratio of used materials Al:Ni (50%) and 40% of Al2O3 and 10% MgO. This mixture was spray on a stainless steel substrate of type (316 L) by using thermal spray with flame method and at spraying distances (8, 12, 16 and 20) cm, then the prepared films were treated by laser and thermal treatment. After that performing a hardness and adhesion tests were eximined. The present study shows that the best value of the thermal treatment is 1000 ℃ for 30 mint; the optimum spray distance is 12 cm and most suitable laser is 500 mJ where the microscopic and mechanical character

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Aug 19 2022
Journal Name
International Journal Of Health Sciences
A study of the mechanical and electrical activities of the heart and their relationship to the phosphagenic and lactic energy systems of young basketball players
...Show More Authors

It was found that there was a significant correlation between all tests of the mechanical and electrical activity of the heart (systolic force FC, stroke volume SV, end-diastolic volume, EF volume, and left ventricular volume during diastole LVDD) with the test of the oxygen-phosphating energy system (Markaria). - As safe (Margaria-Kalamen( It was found that there is a significant correlation between all tests of the mechanical and electrical activity of the heart (myocardial systolic force FC, stroke volume SV, end-diastolic volume EDV, and the percentage of heart pumpingEF blood, and left ventricular volume during diastole (LVDD) with the Lactational Oxygen Energy System Test (Wingate Test 30 Second(

View Publication Preview PDF
Crossref