Preferred Language
Articles
/
ijs-3607
Chaos-based Color Image Steganography Method Using 3 D Cat Map

     Steganography is a technique to hide a secret message within a different multimedia carrier so that the secret message cannot be identified. The goals of steganography techniques include improvements in imperceptibility, information hiding, capacity, security, and robustness. In spite of numerous secure methodologies that have been introduced, there are ongoing attempts to develop these techniques to make them more secure and robust. This paper introduces a color image steganographic method based on a secret map, namely 3-D cat. The proposed method aims to embed data using a secure structure of chaotic steganography, ensuring better security. Rather than using the complete image for data hiding, the selection of the image band and pixel coordination is adopted, using the 3D map that produces irregular outputs for embedding a secret message randomly in the least significant bit (LSB) of the cover image. This increases the complexity encountered by the attackers. The performance of the proposed method was evaluated and the results reveal that the proposed method provides a high level of security through defeating various attacks, such as statistical attacks, with no detectable distortion in the stego-image. Comparison results ensure that the proposed method surpasses other existing steganographic methods regarding the Mean Square Error (MSE) and Peak Signal-to-Noise Ratio(PSNR).

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
Scopus (3)
Crossref (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Wed May 17 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Evaluation of Thermal Reactor Fission Products Cross Sections

      The production of fission products during reactor operation has a very important effect on  reactor reactivity .Results of neutron cross section evaluations are presented for the main product nuclides considered as being the most important  for reactor calculation and burn-up consideration . Data from the main international libraries considered as containing the most up-to-date nuclear data   and the latest experimental measurements are considered in the evaluation processes, we describe the evaluated cross sections of the fission product nuclides by making inter comparison of the data and point out the discrepancies among libraries.

 

View Publication Preview PDF
Publication Date
Wed Sep 01 2021
Journal Name
Iraqi Journal Of Physics
Theoretical Calculations of the Cross-sections for (n,α) and (n,xα) reactions on the Structural Material for Fusion Reactor 46-50Ti

The biggest problem of structural materials for fusion reactor is the damage caused by the fusion product neutrons to the structural material. If this problem is overcomed, an important milestone will be left behind in fusion energy. One of the important problems of the structural material is that nuclei forming the structural material interacting with fusion neutrons are transmuted to stable or radioactive nuclei via (n, x) (x; alpha, proton, gamma etc.) reactions. In particular, the concentration of helium gas in the structural material increases through deuteron- tritium (D-T) and (n, α) reactions, and this increase significantly changes the microstructure and the properties of the structural materials. T

... Show More
Crossref
View Publication Preview PDF
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
A Comparison between Methods of Laplace Estimators and the Robust Huber for Estimate parameters logistic regression model

The logistic regression model regarded as the important regression Models ,where of the most interesting subjects in recent studies due to taking character more advanced in the process of statistical analysis .                                                

The ordinary estimating methods is failed in dealing with data that consist of the presence of outlier values and hence on the absence of such that have undesirable effect on the result.    &nbs

... Show More
Crossref
View Publication Preview PDF
Publication Date
Fri Mar 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Stability testing of time series data for CT Large industrial establishments in Iraq

Abstract: -
The concept of joint integration of important concepts in macroeconomic application, the idea of ​​cointegration is due to the Granger (1981), and he explained it in detail in Granger and Engle in Econometrica (1987). The introduction of the joint analysis of integration in econometrics in the mid-eighties of the last century, is one of the most important developments in the experimental method for modeling, and the advantage is simply the account and use it only needs to familiarize them selves with ordinary least squares.

Cointegration seen relations equilibrium time series in the long run, even if it contained all the sequences on t

... Show More
Crossref
View Publication Preview PDF
Publication Date
Thu Feb 01 2024
Journal Name
Baghdad Science Journal
Estimating the Parameters of Exponential-Rayleigh Distribution for Progressively Censoring Data with S- Function about COVID-19

The two parameters of Exponential-Rayleigh distribution were estimated using the maximum likelihood estimation method (MLE) for progressively censoring data. To find estimated values for these two scale parameters using real data for COVID-19 which was taken from the Iraqi Ministry of Health and Environment, AL-Karkh General Hospital. Then the Chi-square test was utilized to determine if the sample (data) corresponded with the Exponential-Rayleigh distribution (ER). Employing the nonlinear membership function (s-function) to find fuzzy numbers for these parameters estimators. Then utilizing the ranking function transforms the fuzzy numbers into crisp numbers. Finally, using mean square error (MSE) to compare the outcomes of the survival

... Show More
Scopus Crossref
View Publication Preview PDF
Publication Date
Tue Feb 28 2023
Journal Name
Iraqi Journal Of Science
On the Estimation of Stress-Strength Model Reliability Parameter of Power Rayleigh Distribution

      The aim of this paper is to estimate a single reliability system (R = P, Z > W) with a strength Z subjected to a stress W in a stress-strength model that follows a power Rayleigh distribution. It proposes, generates and examines eight methods and techniques for estimating distribution parameters and reliability functions. These methods are the maximum likelihood estimation(MLE), the exact moment estimation (EMME), the percentile estimation (PE), the least-squares estimation (LSE), the weighted least squares estimation (WLSE) and three shrinkage estimation methods (sh1) (sh2) (sh3). We also use the mean square error (MSE) Bias and the mean absolute percentage error (MAPE) to compare the estimation methods. Both theoretical c

... Show More
Scopus (4)
Crossref (3)
Scopus Crossref
View Publication Preview PDF
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Comparison of Some of Estimation methods of Stress-Strength Model: R = P(Y < X < Z)

In this study, the stress-strength model R = P(Y < X < Z)  is discussed as an important parts of reliability system by assuming that the random variables follow Invers Rayleigh Distribution. Some traditional estimation methods are used    to estimate the parameters  namely; Maximum Likelihood, Moment method, and Uniformly Minimum Variance Unbiased estimator and Shrinkage estimator using three types of shrinkage weight factors. As well as, Monte Carlo simulation are used to compare the estimation methods based on mean squared error criteria.  

Scopus (3)
Crossref (4)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Fri Apr 26 2019
Journal Name
Journal Of Contemporary Medical Sciences
Breast Cancer Decisive Parameters for Iraqi Women via Data Mining Techniques

Objective This research investigates Breast Cancer real data for Iraqi women, these data are acquired manually from several Iraqi Hospitals of early detection for Breast Cancer. Data mining techniques are used to discover the hidden knowledge, unexpected patterns, and new rules from the dataset, which implies a large number of attributes. Methods Data mining techniques manipulate the redundant or simply irrelevant attributes to discover interesting patterns. However, the dataset is processed via Weka (The Waikato Environment for Knowledge Analysis) platform. The OneR technique is used as a machine learning classifier to evaluate the attribute worthy according to the class value. Results The evaluation is performed using

... Show More
Crossref (2)
Crossref
View Publication Preview PDF
Publication Date
Tue Feb 28 2023
Journal Name
Iraqi Journal Of Science
The Effect of Temporal Resolution of Climatic Factors on Agriculture Degradation in Southern Baghdad by Applying Remote Sensing Data

       The climate changes had been recognized as one of the major factors responsible for land degradation, which has a significant impact on diverse aspects. The present study aims to estimate how the climate change can influence land degradation in the south areas of Baghdad province (Al-Rasheed, Al-Mahmudiyah, Al-Yusufiyah, Al-Madaen, and Al-Latifiyah). The Satellite Landsat-8 OLI and satellite Landsat-5 TM sensor imagery were used to extent land degradation for the period (2010-2019). ArcGIS V.10.4 was applied to manage and analysis the satellite image dataset, including the use of climate factors data from the European Center for Climate Forecasts (ECMWF) by reanalyzes and extraction datasets. To achieve work objectives, many

... Show More
Crossref (1)
Scopus Crossref
View Publication Preview PDF