Preferred Language
Articles
/
ijs-10111
Linear Feedback Shift Registers-Based Randomization for Image Steganography
...Show More Authors

     Steganography involves concealing information by embedding data within cover media and it can be categorized into two main domains: spatial and frequency. This paper presents two distinct methods. The first is operating in the spatial domain which utilizes the least significant bits (LSBs) to conceal a secret message. The second method is the functioning in the frequency domain which hides the secret message within the LSBs of the middle-frequency band of the discrete cosine transform (DCT) coefficients. These methods enhance obfuscation by utilizing two layers of randomness: random pixel embedding and random bit embedding within each pixel. Unlike other available methods that embed data in sequential order with a fixed amount. These methods embed the data in a random location with a random amount, further enhancing the level of obfuscation. A pseudo-random binary key that is generated through a nonlinear combination of eight Linear Feedback Shift Registers (LFSRs) controls this randomness. The experimentation involves various 512x512 cover images. The first method achieves an average PSNR of 43.5292 with a payload capacity of up to 16% of the cover image. In contrast, the second method yields an average PSNR of 38.4092 with a payload capacity of up to 8%. The performance analysis demonstrates that the LSB-based method can conceal more data with less visibility, however, it is vulnerable to simple image manipulation. On the other hand, the DCT-based method offers lower capacity with increased visibility, but it is more robust.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Using Graph Mining Method in Analyzing Turkish Loanwords Derived from Arabic Language
...Show More Authors

Loanwords are the words transferred from one language to another, which become essential part of the borrowing language. The loanwords have come from the source language to the recipient language because of many reasons. Detecting these loanwords is complicated task due to that there are no standard specifications for transferring words between languages and hence low accuracy. This work tries to enhance this accuracy of detecting loanwords between Turkish and Arabic language as a case study. In this paper, the proposed system contributes to find all possible loanwords using any set of characters either alphabetically or randomly arranged. Then, it processes the distortion in the pronunciation, and solves the problem of the missing lette

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Mar 01 2024
Journal Name
Baghdad Science Journal
Exploring the Challenges of Diagnosing Thyroid Disease with Imbalanced Data and Machine Learning: A Systematic Literature Review
...Show More Authors

Thyroid disease is a common disease affecting millions worldwide. Early diagnosis and treatment of thyroid disease can help prevent more serious complications and improve long-term health outcomes. However, thyroid disease diagnosis can be challenging due to its variable symptoms and limited diagnostic tests. By processing enormous amounts of data and seeing trends that may not be immediately evident to human doctors, Machine Learning (ML) algorithms may be capable of increasing the accuracy with which thyroid disease is diagnosed. This study seeks to discover the most recent ML-based and data-driven developments and strategies for diagnosing thyroid disease while considering the challenges associated with imbalanced data in thyroid dise

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Feb 04 2022
Journal Name
Iraqi Journal Of Science
The State of the Main Basement Features of the Western Desert of Iraq, A New Look
...Show More Authors

The reduction to pole of the aeromagnetic map of the western desert of Iraq has been used to outline the main basement structural features. Three selected magnetic anomalies are used to determine the depths of their magnetic sources. The estimated depths are obtained by using slope half slope method and have been corrected through the application of a published nomogram. These depths are compared with previous published depth values which provide a new look at the basement of the western desert in addition to the thickness map of the Paleozoic formations. The results shed light on the important of the great depths of the basement structures and in turn the sedimentary cover to be considered for future hydrocarbon exploration

View Publication Preview PDF
Publication Date
Sat Jul 31 2021
Journal Name
Iraqi Journal Of Science
AndroidTrack: An Investigation of Using Social Networks’ Applications in Android Platforms
...Show More Authors

     In this paper, time spent and the repetition of using the Social Network Sites (SNS) in Android applications are investigated. In this approach, we seek to raise the awareness and limit, but not eliminate the repeated uses of SNS, by introducing AndroidTrack. This AndroidTrack is an android application that was designed to monitor and apply valid experimental studies in order to improve the impacts of social media on Iraqi users. Data generated from the app were aggregated and updated periodically at Google Firebase Real-time Database. The statistical factor analysis (FA) was presented as a result of the user’s interactions.

View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jun 30 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Eco-friendly and Secure Data Center to Detection Compromised Devices Utilizing Swarm Approach
...Show More Authors

Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the

... Show More
View Publication
Scopus (3)
Scopus Crossref
Publication Date
Fri Jun 01 2018
Journal Name
Research And Islamic Studies Journal
The artistic in the poetry of Kazem Jawad
...Show More Authors

the researchers pointed that the poet relied on several means in the form of poetic images, including analogy, and the metaphor with its various elements, The chromatic component has also been used in the formation of its poetic image,and resorted to the correspondence of the senses and the symbol of two types:Self-code, public code : And we find a variety of symbolic stems from different sources, from these symbols, what is religious, including what is historical and what is legendary, and such symbols, which resorted to the rare places of his poems confined to the myths contained in the Bible, His use of the general symbols was ineffective in the poetic picture, relying on the metaphor and metaphor.

Publication Date
Thu Dec 01 2022
Journal Name
Iraqi Journal Of Physics
Investigation of Radio Frequency Signal Propagation of Wireless Services in Oyo, Oyo State, South Western Nigeria
...Show More Authors

This study reported the investigation of the Radio Frequency (RF) signal propagation of Global System for Mobile Communications (GSM) coverage in Emmanuel Alayande College of Education (EACOED), Oyo, Oyo State, Nigeria. The study aims at amplifying the quality of service and augment end users' sensitivity of the wireless services operation. The drive test method is adopted with estimation of coverage level and received signal strength. The Network Cell Info Lite application installed in three INFINIX GSM mobile phones was employed to take the measurement of the signal strength received from the transmitting stations of different mobile networks. The results of the study revealed that MTN has the maximum signal strength with a mean value

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Iraqi Journal Of Science
Some physical properties of SiO2 laser induced plasma
...Show More Authors

In this work; Silicon dioxide (SiO2) plasma plume was prepared by laser induced plasma (LIP). The electron number density, plasma frequency and Debye length were calculated by reading the data of I-V curve of Langmuir probe which was used as a diagnostic method of measuring plasma properties. Pulsed Nd:YAG laser was used for measuring the electron number density of SiO2 plasma plume under vacuum environment with varying both vacuum pressure and axial distance from the target surface. Some physical properties of the plasma generated such as electron density, plasma frequency and Debye length have been measured experimentally and the effects of vacuum pressure and Langmuir probe distance from the target were studied on those variables. An

... Show More
View Publication Preview PDF
Publication Date
Mon May 15 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Effect of Spot Size on the Fractal Optical Modulation
...Show More Authors

The present paper analyzes the signal emitting from the Reticle during changing the spot size of laser falling on the disk and shows the optimum frequency and the amount of energy window in different patterns of modulator (Reticle).  All results are obtained by establishing   a special program named “Disk optical modulator version 3" using the language visual basic 6 ahich contains many parameters. All models of optical modulator consist of twenty sectors, ten sectors are opaque and other ten sectors are transmitted for the laser. The number of sectors depends on several factors as chopping frequency, power transparent and modulation transfer function.   It has been demonstrated by simulations, the optimal

... Show More
View Publication Preview PDF
Publication Date
Thu Jul 01 2021
Journal Name
Iraqi Journal Of Science
Predicting the Depositional Environments of Mishrif Formation from Seismic Isopach Map in the Dujaila Oil Field, Southeast-Iraq:
...Show More Authors

In this paper, we attempt to predict the depositional environments with associated lithofacies of the main reservoir of the late Cretaceous Mishrif carbonate Formation, depending on the analysis of the created seismic isopach map by integrating seismic and well data. The isopach map was created from a 3D-seismic reflection survey carried out at the Dujaila oil field in southeastern Iraq, which is of an area of 602.26 Km2, and integrated with the data of the two explored wells. Based on the interpretation of the seismic isopach map, the diagram of the 3D-depositional environment model of Mishrif Formation was constructed. It showed three distinguished depositional environments, which were graduated from a back reef lithofacies of a shallo

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (4)
Scopus Crossref