Preferred Language
Articles
/
ijs-4546
A Proposed Algorithm for Encrypted Data Hiding in Video Stream Based on Frame Random Distribution
...Show More Authors

     The science of information security has become a concern of many researchers, whose efforts are trying to come up with solutions and technologies that ensure the transfer of information in a more secure manner through the network, especially the Internet, without any penetration of that information, given the risk of digital data being sent between the two parties through an insecure channel. This paper includes two data protection techniques. The first technique is cryptography by using Menezes Vanstone elliptic curve ciphering system, which depends on public key technologies. Then, the encoded data is randomly included in the frame, depending on the seed used. The experimental results, using a PSNR within average of 65 and MSE within average of 85, indicate that the proposed method has proven successful in its ability to efficiently embedding data.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Journal Of Engineering
Geomechanical study to predict the onset of sand production formation
...Show More Authors

One of the costliest problems facing the production of hydrocarbons in unconsolidated sandstone reservoirs is the production of sand once hydrocarbon production starts. The sanding start prediction model is very important to decide on sand control in the future, including whether or when sand control should be used. This research developed an easy-to-use Computer program to determine the beginning of sanding sites in the driven area. The model is based on estimating the critical pressure drop that occurs when sand is onset to produced. The outcomes have been drawn as a function of the free sand production with the critical flow rates for reservoir pressure decline. The results show that the pressure drawdown required to

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Wireless Propagation Multipaths using Spectral Clustering and Three-Constraint Affinity Matrix Spectral Clustering
...Show More Authors

This study focused on spectral clustering (SC) and three-constraint affinity matrix spectral clustering (3CAM-SC) to determine the number of clusters and the membership of the clusters of the COST 2100 channel model (C2CM) multipath dataset simultaneously. Various multipath clustering approaches solve only the number of clusters without taking into consideration the membership of clusters. The problem of giving only the number of clusters is that there is no assurance that the membership of the multipath clusters is accurate even though the number of clusters is correct. SC and 3CAM-SC aimed to solve this problem by determining the membership of the clusters. The cluster and the cluster count were then computed through the cluster-wise J

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Jan 04 2022
Journal Name
Iraqi Journal Of Science
Identifying of User Behavior from Server Log File
...Show More Authors

Due to the increased of information existing on the World Wide Web (WWW), the subject of how to extract new and useful knowledge from the log file has gained big interest among researchers in data mining and knowledge discovery topics.
Web miming, which is a subset of data mining divided into three particular ways, web content mining, web structure mining, web usage mining. This paper is interested in server log file, which is belonging to the third category (web usage mining). This file will be analyzed according to the suggested algorithm to extract the behavior of the user. Knowing the behavior is coming from knowing the complete path which is taken from the specific user.
Extracting these types of knowledge required many of KDD

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 01 2019
Journal Name
Journal Of The College Of Languages (jcl)
An Analytical Study of Viewpoint in Parsi Pour's and Ar-Rikabi's Novels: The Dog and the Long Night and Alibaba's Sad Night as Examples: بررسی تحليلی زاویه¬ی دید در رمان¬های پارسی پور و الرکابی باتكيه بر رمان "سگ و زمستان بلند" و "ليل علی بابا الحزین"
...Show More Authors

It is noted in the title that the paper studies the viewpoint in the novel The Dog and the Long Night by the Iranian novelist Shahranoush Parsi Pour and in the novel Alibaba's Sad Night by the Iraqi novelist Abdulkhaliq Ar-Rikabi. Both are well known novelists, and about whose stories and novels many critical books, MA theses, and Ph.D. dissertations have been written. Also, some of their literary works have won prizes. Here, the researcher shed light on the concept of viewpoint, its types, and its importance in novels in general. This was done along with tackling the two viewpoints in both novels, where similarities and differences were identified. For this end, the researcher has adopted the analytic-descriptive appro

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Jan 13 2023
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Detection of Chronic Obstructive Pulmonary Disease among Smokers Aged ≥40 years Attending Primary Health Care Centers in Baghdad-AL-Karkh and AL-Resafa: الكشف عن الالكشف عن مرض الانسداد الرئوي المزمن بين المدخنين الذين تزيد أعمارهم عن 40 عامًا يراجعون مراكز الرعاية الصحية الأولية في بغداد - الكرخ و الرصافة
...Show More Authors

Background: Chronic obstructive pulmonary disease causes permanent morbidity, premature mortality and great burden to the healthcare system. Smoking is it's most common risk factor and Spirometry is for diagnosing COPD and monitoring its progression.

Objectives: Early detection of chronic obstructive pulmonary disease in symptomatic smokers’ ≥ 40years by spirometry.

Methods: A cross sectional study on all symptomatic smokers aged ≥ 40 years attending ten PHCCs in Baghdad Alkarkh and Alrisafa. Those whose FEV1/FVC was <70% on spirometry; after giving bronchodilator, were considered COPD +ve.

Results:  Overall, airway obstruction was seen in

... Show More
View Publication
Crossref
Publication Date
Sun Jun 02 2019
Journal Name
Journal Of The College Of Languages (jcl)
The vision of Hebrew writers and critics of the future of the Jews in their writings at the end of the 19th century and the beginning of the twentieth c: דעותיהם של הסופרים והמבקרים העבריים על עתידם של היהודים לפי כתבותיהם בשלהי המאה ה-19 ובתחילת המאה ה-20
...Show More Authors

It is very known  how great is the  role of the Jewish writers in the system of the Zionist movement. The movement relied on writers and writers to carry out their programs, especially those pertaining to the creation of a "national homeland" for Jews. Most Jewish writers sang of  Palestine even though they were not born there.

    On such a  basis, we have followed closely the writings of writers, critics and others by the end of the nineteenth century and the beginning of the twentieth century. We found that these writings are based on one common question: What is the fate of the Jewish people?

    Most of these writings were accompanied by Theodor Herzl's proj

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Qin Seal Script Character Recognition with Fuzzy and Incomplete Information
...Show More Authors

The dependable and efficient identification of Qin seal script characters is pivotal in the discovery, preservation, and inheritance of the distinctive cultural values embodied by these artifacts. This paper uses image histograms of oriented gradients (HOG) features and an SVM model to discuss a character recognition model for identifying partial and blurred Qin seal script characters. The model achieves accurate recognition on a small, imbalanced dataset. Firstly, a dataset of Qin seal script image samples is established, and Gaussian filtering is employed to remove image noise. Subsequently, the gamma transformation algorithm adjusts the image brightness and enhances the contrast between font structures and image backgrounds. After a s

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Thu Jul 01 2021
Journal Name
Iraqi Journal Of Science
Applying Similarity Measures to Improve Query Expansion
...Show More Authors

The huge evolving in the information technologies, especially in the few last decades, has produced an increase in the volume of data on the World Wide Web, which is still growing significantly. Retrieving the relevant information on the Internet or any data source with a query created by a few words has become a big challenge. To override this, query expansion (QE) has an important function in improving the information retrieval (IR), where the original query of user is recreated to a new query by appending new related terms with the same importance. One of the problems of query expansion is the choosing of suitable terms. This problem leads to another challenge of how to retrieve the important documents with high precision, high recall

... Show More
View Publication Preview PDF
Crossref (1)
Scopus Crossref
Publication Date
Wed Mar 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Euro Dinar Trading Analysis Using WARIMA Hybrid Model
...Show More Authors

The rise in the general level of prices in Iraq makes the local commodity less able to compete with other commodities, which leads to an increase in the amount of imports and a decrease in the amount of exports, since it raises demand for foreign currencies while decreasing demand for the local currency, which leads to a decrease in the exchange rate of the local currency in exchange for an increase in the exchange rate of currencies. This is one of the most important factors affecting the determination of the exchange rate and its fluctuations. This research deals with the currency of the European Euro and its impact against the Iraqi dinar. To make an accurate prediction for any process, modern methods can be used through which

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 18 2022
Journal Name
Iraqi Journal Of Science
Fast Text Analysis Using Symbol Enumeration and Hashing Methodology
...Show More Authors

This paper is focusing on reducing the time for text processing operations by taking the advantage of enumerating each string using the multi hashing methodology. Text analysis is an important subject for any system that deals with strings (sequences of characters from an alphabet) and text processing (e.g., word-processor, text editor and other text manipulation systems). Many problems have been arisen when dealing with string operations which consist of an unfixed number of characters (e.g., the execution time); this due to the overhead embedded-operations (like, symbols matching and conversion operations). The execution time largely depends on the string characteristics; especially its length (i.e., the number of characters consisting

... Show More
View Publication Preview PDF