Preferred Language
Articles
/
ijs-7973
Using Visual Cryptography and hash function for Fragile Watermarking to Detect Electronic Document Forgery
...Show More Authors

     Recent developments in technology and the area of digital communications have rendered digital images increasingly susceptible to tampering and alteration by persons who are not authorized to do so. This may appear to be acceptable, especially if an image editing process is necessary to delete or add a particular scene that improves the quality the image. But what about images used in authorized governmental transactions? The consequences can be severe; any altered document is considered forged under the law and may cause confusion. Also, any document that cannot be verified as being authentic is regarded as a fake and cannot be used, inflicting harm on people. The suggested work intends to reduce fraud in electronic documents using a novel generator. It employs modern encryption methods to conceal the data represented by the watermark and hide it secretly inside the document so that it is easy to check for signs of counterfeiting; thus, allowing for the discovery of forged papers

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Structural imbalance of Iraqi trade balance for the period (2014_1994)
...Show More Authors

Abstract:

     The use of economic resources enjoyed Iraq by especially oil resources, which constitute the main source of financial revenue, would the economic surplus outside the oil sector increases by mobilizing and rallying the labor power and turn it into an access capitalism, , was the cause of "the inaction of the productive sectors of the economy, made the investment planning process and even investment in human capital was not rationality with the increasing number of unemployed, particularly certificates and specializations high campaign, direction of the government towards market liberalism after 2003 through the, was focused not follow a clear economic policies, and the absence of planning

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Implementation of Neural Control for Continuous Stirred Tank Reactor (CSTR)
...Show More Authors

In this paper a dynamic behavior and control of  a jacketed continuous stirred tank reactor (CSTR)  is developed using different control strategies, conventional feedback control (PI and PID), and neural network (NARMA-L2, and NN Predictive) control. The dynamic model for CSTR process is described by a first order lag system with dead time.

The optimum tuning of control parameters are found by two different methods; Frequency Analysis Curve method (Bode diagram) and Process Reaction Curve using the mean of Square Error (MSE) method. It is found that the Process Reaction Curve method is better than the Frequency Analysis Curve method and PID feedback controller is better than PI feedback controller.

The results s

... Show More
View Publication Preview PDF
Publication Date
Wed Jul 31 2019
Journal Name
Journal Of Engineering
Robust Adaptive Sliding Mode Controller for a Nonholonomic Mobile Platform
...Show More Authors

In this paper, a robust adaptive sliding mode controller is designed for a mobile platform trajectory tracking.  The mobile platform is an example of a nonholonomic mechanical system. The presence of holonomic constraints reduces the number of degree of freedom that represents the system model, while the nonholonomic constraints reduce the differentiable degree of freedom. The mathematical model was derived here for the mobile platform, considering the existence of one holonomic and two nonholonomic constraints imposed on system dynamics. The partial feedback linearization method was used to get the input-output relation, where the output is the error functions between the position of a certain point on the platform

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Matching Algorithms for Intrusion Detection System based on DNA Encoding
...Show More Authors

Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o

... Show More
Scopus (2)
Scopus
Publication Date
Fri May 17 2019
Journal Name
Lecture Notes In Networks And Systems
Features Selection for Intrusion Detection System Based on DNA Encoding
...Show More Authors

Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system

... Show More
Scopus (2)
Scopus
Publication Date
Sun May 16 2021
Journal Name
Graphs And Combinatorics
Commuting Involution Graphs for Certain Exceptional Groups of Lie Type
...Show More Authors
Abstract<p>Suppose that <italic>G</italic> is a finite group and <italic>X</italic> is a <italic>G</italic>-conjugacy classes of involutions. The commuting involution graph <inline-formula><alternatives><tex-math>$${\mathcal {C}}(G,X)$$</tex-math><math xmlns:mml="http://www.w3.org/1998/Math/MathML"> <mrow> <mi>C</mi> <mo>(</mo> <mi>G</mi> <mo>,</mo> <mi>X</mi> <mo>)</mo> </mrow> </math></alternatives></inline-formula> is</p> ... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Sep 01 2016
Journal Name
Journal Of Engineering
Sliding Mode Vibration Suppression Control Design for a Smart Beam
...Show More Authors

Active vibration control is the main problem in different structure. Smart material like piezoelectric make a structure smart, adaptive and self-controlling so, they are effective in active vibration control. In this paper piezoelectric elements are used as sensors and actuators in flexible structures for sensing and actuating purposes, and to control the vibration of a cantilever beam by using sliding mode control. The sliding mode controller (SMC) is designed to attenuate the vibration induced by initial tip displacement which is equal to 15 mm.  It is designed based on the balance realization reduction method where three states are selected for the reduced model from the 24th states that describe the c

... Show More
View Publication Preview PDF
Publication Date
Fri Nov 24 2023
Journal Name
Iraqi Journal Of Science
Ambient Turbulence Intensity Calculation for Al-Nasiriyah Province in Iraq
...Show More Authors

Before setting a turbine in a wind farms allocated for power generation, it must be know the appropriate turbine class for that site depending on the turbulence intensity of the winds in the studied area and the IEC-61400 standard. The importance of identifying a class of wind turbine is due to the complex environmental conditions that produce turbulent air which, in turn, may cause damage to the turbine blades and weakness in the performance. Therefore, the ambient turbulence intensity is a very important factor in determining the performance and productivity of the wind turbines.
In this research we calculate Turbulence Intensity "TI" in the province of Nasiriyah, south of Iraq (Lat. 31.052049 , Lon. 46.261021) for the years 2008, 2

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 30 2018
Journal Name
Iraqi Journal Of Physics
N3, N749 dyes effect on the TiO2 for optoelectronic applications
...Show More Authors

The present work aimed to study effect of (N749 & N3) dyes on TiO2 optical and electrical properties for optoelectronic application. The TiO2 paste prepared by using a doctor blade method. The samples were UV-VIS specterophometricall analyzes of TiO2 before and after immersed in dyes (N749 & N3). The results showed absorption spectra shift toward the visible region due to the adsorption of dye molecules on the surface of oxide nanoparticles. It is seen that the Eg determined to give a value of 3.3eV for TiO2 before immersing in dyes, and immersing in dyes (N749 & N3) are (1.4 &1.6 eV) respectively. The structural properties (XRD), (FTIR) and (SEM) for the sample prepared were investigated and (J-V) characteristics was stu

... Show More
View Publication
Crossref
Publication Date
Sun Nov 01 2020
Journal Name
International Journal Of Nonlinear Analysis And Applications
Two Efficient Methods For Solving Non-linear Fourth-Order PDEs
...Show More Authors

This paper studies a novel technique based on the use of two effective methods like modified Laplace- variational method (MLVIM) and a new Variational method (MVIM)to solve PDEs with variable coefficients. The current modification for the (MLVIM) is based on coupling of the Variational method (VIM) and Laplace- method (LT). In our proposal there is no need to calculate Lagrange multiplier. We applied Laplace method to the problem .Furthermore, the nonlinear terms for this problem is solved using homotopy method (HPM). Some examples are taken to compare results between two methods and to verify the reliability of our present methods.

Scopus (9)
Scopus