Preferred Language
Articles
/
ijs-3024
Concealing a Secret Message in a Colour Image Using an Electronic Workbench
...Show More Authors

Steganography is the art of concealing security data in media, such as pictures, audio, video, text, and protocols. The objective of this paper is hiding a secret message in a colour image to prevent an attacker from accessing the message. This is important because more people use the Internet all the time and network connections are spread around the world. The hidden secret message uses two general algorithms that are embedded and extracted. This paper proposes a new algorithm to conceal a secret message in a colour image in LSB. This algorithm includes three phases: 1) dividing the colour image into a number of blocks, 2) concealing the secret message, and 3) transmitting the stego-image from the sender in a multiplexer network and receiving it through a demultiplexer network using an electronic workbench. The outcome of the new algorithm demonstrates good efficiency, high security, and robustness and is executed quickly. The system is evaluated through the measurements of mean square error, peak signal-to-noise ratio, correlation, histogram, and capacity.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jul 01 2020
Journal Name
Ieee Transactions On Industrial Electronics
Finite-Time Continuous Terminal Sliding Mode Control of Servo Motor Systems
...Show More Authors

In this article, a continuous terminal sliding mode control algorithm is proposed for servo motor systems. A novel full-order terminal sliding mode surface is proposed based on the bilimit homogeneous property, such that the sliding motion is finite-time stable independent of the system’s initial condition. A new continuous terminal sliding mode control algorithm is proposed to guarantee that the system states reach the sliding surface in finitetime. Not only the robustness is guaranteed by the proposed controller but also the continuity makes the control algorithm more suitable for the servo mechanical systems. Finally, a numerical example is presented to depict the advantages of the proposed control algorithm. An application in the rota

... Show More
View Publication
Scopus (155)
Crossref (129)
Scopus Clarivate Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
Optimized Artificial Neural network models to time series
...Show More Authors

        Artificial Neural networks (ANN) are powerful and effective tools in time-series applications. The first aim of this paper is to diagnose better and more efficient ANN models (Back Propagation, Radial Basis Function Neural networks (RBF), and Recurrent neural networks) in solving the linear and nonlinear time-series behavior. The second aim is dealing with finding accurate estimators as the convergence sometimes is stack in the local minima. It is one of the problems that can bias the test of the robustness of the ANN in time series forecasting. To determine the best or the optimal ANN models, forecast Skill (SS) employed to measure the efficiency of the performance of ANN models. The mean square error and

... Show More
View Publication Preview PDF
Scopus (20)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Tue Apr 20 2021
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Bayesian Structural Time Series for Forecasting Oil Prices
...Show More Authors

There are many methods of forecasting, and these methods take data only, analyze it, make a prediction by analyzing, neglect the prior information side and do not considering the fluctuations that occur overtime. The best way to forecast oil prices that takes the fluctuations that occur overtime and is updated by entering prior information is the Bayesian structural time series (BSTS) method. Oil prices fluctuations have an important role in economic so predictions of future oil prices that are crucial for many countries whose economies depend mainly on oil, such as Iraq. Oil prices directly affect the health of the economy. Thus, it is necessary to forecast future oil price with models adapted for emerging events. In this article, we st

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 01 2016
Journal Name
Journal Of Engineering
Analysis of Recorded Inflow Data of Ataturk Reservoir
...Show More Authors

Since the beginning of the last century, the competition for water resources has intensified dramatically, especially between countries that have no agreements in place for water resources that they share. Such is the situation with the Euphrates River which flows through three countries (Turkey, Syria, and Iraq) and represents the main water resource for these countries. Therefore, the comprehensive hydrologic investigation needed to derive optimal operations requires reliable forecasts. This study aims to analysis and create a forecasting model for data generation from Turkey perspective by using the recorded inflow data of Ataturk reservoir for the period (Oct. 1961 - Sep. 2009). Based on 49 years of real inflow data

... Show More
View Publication Preview PDF
Publication Date
Thu Sep 30 2021
Journal Name
Iraqi Journal Of Science
The Dynamics of Biological Models with Optimal Harvesting
...Show More Authors

      This paper aims to introduce a concept of an equilibrium point of a dynamical system which will call it almost global asymptotically stable. We also propose and analyze a prey-predator model with a suggested  function growth in prey species. Firstly the existence and local stability of all its equilibria are studied. After that the model is extended to an optimal control problem to obtain an optimal harvesting strategy. The discrete time version of Pontryagin's maximum principle is applied to solve the optimality problem. The characterization of the optimal harvesting variable and the adjoint variables are derived. Finally these theoretical results are demonstrated with numerical simulations.

View Publication Preview PDF
Scopus (10)
Crossref (4)
Scopus Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Baghdad Science Journal
Topological Indices Polynomials of Domination David Derived Networks
...Show More Authors

The chemical properties of chemical compounds and their molecular structures are intimately connected. Topological indices are numerical values associated with chemical molecular graphs that help in understanding the physicochemical properties, chemical reactivity and biological activity of a chemical compound. This study obtains some topological properties of second and third dominating David derived (DDD) networks and computes several K Banhatti polynomial of second and third type of DDD.

View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Some K-Banhatti Polynomials of First Dominating David Derived Networks
...Show More Authors

Chemical compounds, characteristics, and molecular structures are inevitably connected. Topological indices are numerical values connected with chemical molecular graphs that contribute to understanding a chemical compounds physical qualities, chemical reactivity, and biological activity. In this study, we have obtained some topological properties of the first dominating David derived (DDD) networks and computed several K-Banhatti polynomials of the first type of DDD.

View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sat Jan 10 2015
Journal Name
British Journal Of Applied Science & Technology
The Use of Cubic Bezier Interpolation, Biorthogonal Wavelet and Quadtree Coding to Compress Color Images
...Show More Authors

In this paper, an efficient method for compressing color image is presented. It allows progressive transmission and zooming of the image without need to extra storage. The proposed method is going to be accomplished using cubic Bezier surface (CBI) representation on wide area of images in order to prune the image component that shows large scale variation. Then, the produced cubic Bezier surface is subtracted from the image signal to get the residue component. Then, bi-orthogonal wavelet transform is applied to decompose the residue component. Both scalar quantization and quad tree coding steps are applied on the produced wavelet sub bands. Finally, adaptive shift coding is applied to handle the remaining statistical redundancy and attain e

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Thu May 28 2020
Journal Name
Iraqi Journal Of Science
The Use of HSV Color Model for Subtle Ear Region Extraction
...Show More Authors

Identifying people by their ear has recently received import attention in the literature. The accurate segmentation of the ear region is vital in order to make successful person identification decisions. This paper presents an effective approach for ear region segmentation from color ear images. Firstly, the RGB color model was converted to the HSV color model. Secondly, thresholding was utilized to segment the ear region. Finally, the morphological operations were applied to remove small islands and fill the gaps. The proposed method was tested on a database which consisted of 105 ear images taken from the right sides of 105 subjects. The experimental results of the proposed approach on a variety of ear images revealed that this approac

... Show More
View Publication Preview PDF
Scopus Crossref