Preferred Language
Articles
/
ijs-6943
An Image Coding and Embedding Strategy Based on Channel Variations and DNA Sequences
...Show More Authors

The digital multimedia systems become standard at this time because of their extremely sensory activity effects and also the advanced development in its corresponding technology. Recently, biological techniques applied to several varieties of applications such as authentication protocols, organic chemistry, and cryptography. Deoxyribonucleic Acid (DNA) is a tool to hide the key information in multimedia platforms.
In this paper, an embedding algorithm is introduced; first, the image is divided into equally sized blocks, these blocks checked for a small amount color in all the separated blocks. The selected blocks are used to localize the necessary image information. In the second stage, a comparison is between the initial image pixel and the watermark bit pixel is done to select the key that represents the location of a specific bit location that exist in all channels with its most dominant. If the compared bits are equal then (0) is added in least significant bit of least dominant color channel otherwise (1) is added. In the last stage, a regeneration process for the key is done. DNA based cryptographic algorithm has been suggested to develop secures image encryption techniques. This algorithm gives a good results, the MSE was (0.0007) for one test also the key generation method is successful.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Apr 01 2017
Journal Name
Al–bahith Al–a'alami
Gender Profiling of ads in Egyptian Channel MBC
...Show More Authors

The study begins with the idea that advertising is a form of culture. Therefore, it is not possible to be surrounded by an actual briefing from one-sided premises such as those that are based solely on the artistic, aesthetic or technical aspects, without linking it to the culture in which it is produced.
The researcher attempts to shed light on the relation between the advertising letter and the concept of gender. And here lies the importance of the research as the content of the ads and their form and implicit values in the text and image reflect the cultural values that must be identified as well as the most important roles that are stereotyped in advertisements and their relationship to the culture of society.
Advertising is

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Feb 04 2022
Journal Name
Iraqi Journal Of Science
AHeuristic Strategy for Improving the Performance of Evolutionary Based Complex Detection in Protein-Protein Interaction Networks
...Show More Authors

One of the most interested problems that recently attracts many research investigations in Protein-protein interactions (PPI) networks is complex detection problem. Detecting natural divisions in such complex networks is proved to be extremely NP-hard problem wherein, recently, the field of Evolutionary Algorithms (EAs) reveals positive results. The contribution of this work is to introduce a heuristic operator, called protein-complex attraction and repulsion, which is especially tailored for the complex detection problem and to enable the EA to improve its detection ability. The proposed heuristic operator is designed to fine-grain the structure of a complex by dividing it into two more complexes, each being distinguished with a core pr

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Science
Automatic Image and Video Tagging Survey
...Show More Authors

     Marking content with descriptive terms that depict the image content is called “tagging,” which is a well-known method to organize content for future navigation, filtering, or searching. Manually tagging video or image content is a time-consuming and expensive process. Accordingly, the tags supplied by humans are often noisy, incomplete, subjective, and inadequate. Automatic Image Tagging can spontaneously assign semantic keywords according to the visual information of images, thereby allowing images to be retrieved, organized, and managed by tag. This paper presents a survey and analysis of the state-of-the-art approaches for the automatic tagging of video and image data. The analysis in this paper covered the publications

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Apr 01 2016
Journal Name
Iosr Journal Of Computer Engineering
Lossless and Lossy Polynomial Image Compression
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Fri Apr 01 2016
Journal Name
Iosr Journal Of Computer Engineering
Lossless and Lossy Polynomial Image Compression
...Show More Authors

Crossref (1)
Crossref
Publication Date
Sun Jun 11 2017
Journal Name
Al-academy
Shape of Round house as an Effective Strategy in the Collection of Art Education Students
...Show More Authors

The two researchers selected the problem of research which represented with the following asking: Does the use of the shape of Round house strategy have effectiveness in the collection of students of the Department of Art Education of the subjectof teaching methods?
The research aims to "measure the effectiveness of Strategy shape of Round house in the collection of students of the Department of Art Education for the material teaching methods" and to verify the aim of the research two zeroassumptions was identified to measure the level of achievement in the subject of teaching methods of third stage students in the Department of Art Education –College of Fine Arts.
The research community included the students of Art Education Dep

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Journal Of Science
An Artificial Intelligence-based Proactive Network Forensic Framework
...Show More Authors

     is at an all-time high in the modern period, and the majority of the population uses the Internet for all types of communication. It is great to be able to improvise like this. As a result of this trend, hackers have become increasingly focused on attacking the system/network in numerous ways. When a hacker commits a digital crime, it is examined in a reactive manner, which aids in the identification of the perpetrators. However, in the modern period, it is not expected to wait for an attack to occur. The user anticipates being able to predict a cyberattack before it causes damage to the system. This can be accomplished with the assistance of the proactive forensic framework presented in this study. The proposed system combines

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Fast and robust approach for data security in communication channel using pascal matrix
...Show More Authors

This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Wed Mar 01 2017
Journal Name
جامعة كرميان
The effect of a training program for chemistry teachers based on the strategy of both sides of the brain together on the thinking patterns of their students
...Show More Authors

Preview PDF
Publication Date
Sat Apr 01 2017
Journal Name
Iosr Journal Of Computer Engineering (iosr-jce)
A New Approach to DNA, RNA, and Protein Motifs Templates Visualization and Analysis via Compilation Technique
...Show More Authors

Motifs template is the input for many bioinformatics systems such codons finding, transcription, transaction, sequential pattern miner, and bioinformatics databases analysis. The size of motifs arranged from one base up to several Mega bases, therefore, the typing errors increase according to the size of motifs. In addition, when the structures motifs are submitted to bioinformatics systems, the specifications of motifs components are required, i.e. the simple motifs, gaps, and the lower bound and upper bound of each gap. The motifs can be of DNA, RNA, or Protein. In this research, a motif parser and visualization module is designed depending on a proposed a context free grammar, CFG, and colors human recognition system. GFC describes the m

... Show More
Preview PDF