Preferred Language
Articles
/
ijs-9431
Text Hiding in Color Images Using the Secret Key Transformation Function in GF (2n)
...Show More Authors

Steganography is one of the most popular techniques for data hiding in the different media such as images, audio or video files. This paper introduced the improved technique to hide the secret message using the LSB algorithm inside the RGB true color image by encrypting it using the secret key transformation function. The key is selecting randomly in the GF (2n) with condition it has an inverse value to retrieve the encrypted message. Only two bits are used for the low byte in each pixel (the blue byte) to hide the secret message, since the blue color has a weak effect on human eyes. The message hidden by the suggested algorithm is less vulnerable to be stolen than other similar applications.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
International Journal Of Advance Science And Technology
MR Images Classification of Alzheimer's Disease Based on Deep Belief Network Method
...Show More Authors

Background/Objectives: The purpose of this study was to classify Alzheimer’s disease (AD) patients from Normal Control (NC) patients using Magnetic Resonance Imaging (MRI). Methods/Statistical analysis: The performance evolution is carried out for 346 MR images from Alzheimer's Neuroimaging Initiative (ADNI) dataset. The classifier Deep Belief Network (DBN) is used for the function of classification. The network is trained using a sample training set, and the weights produced are then used to check the system's recognition capability. Findings: As a result, this paper presented a novel method of automated classification system for AD determination. The suggested method offers good performance of the experiments carried out show that the

... Show More
Publication Date
Mon Aug 26 2019
Journal Name
Iraqi Journal Of Science
Medical Image Enhancement to Extract Brain Tumors from CT and MRI images
...Show More Authors

     Always MRI and CT Medical images are noisy so that preprocessing is necessary for enhance these images to assist clinicians and make accurate diagnosis. Firstly, in the proposed method uses two denoising filters (Median and Slantlet) are applied to images in parallel and the best enhanced image gained from both filters is voted by use PSNR and MSE as image quality measurements. Next, extraction of brain tumor from cleaned images is done by segmentation method based on k-mean.  The result shows that the proposed method is giving an optimal solution due to denoising method which is based on multiple filter types to obtain best clear images and that is leads to make the extraction of tumor more precision best.<

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Wed Sep 15 2021
Journal Name
Al-academy
Contemporary experimental currents and its impact on the structure of the contemporary Iraqi theatrical text "The epic theater as a model": هيثم حمزة سلمان الحمداني
...Show More Authors

  In this research study, I tried to trace the epic effect to learn how it was understood and how it was used. Following the descriptive and analytical approach in the research, the first chapter dealt with a presentation of the methodological framework of the problem, the goal, the limits of the research, the importance and the need for it and the definition of terms, as well as the theoretical framework which consisted of two topics, including the impact of the epic theater on the world theater and the second the effect of the epic theater on the Arab theater, This came by tracing the epic impact on the world stage of the Greeks, the Middle Ages, the Renaissance, and the Arab theater of the twentieth century.
As for the second

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2009
Journal Name
Journal Of Engineering
EFFECT OF ZRO2 , WO3 ADDITIVES ON CATALYTIC PERFORMANCE OF PT/HY ZEOLITE COMPARED WITH PT/ΓAL2O3 FOR IRAQI NAPHTHA TRANSFORMATION
...Show More Authors

Light naphtha treatment was achieved over 0.3wt%Pt loaded-alumina, HY-zeolite and Zr/W/HY-zeolite catalysts at temperature rang of 240-370°C, hydrogen to hydrocarbon mole ratio of 1-4 0.75-3 wt/wt/hr, liquid hourly space velocity (LHSV) and at atmospheric pressure. The hydroconversion of light naphtha over Pt loaded catalyst shows two main reactions; hydrocracking and hydroisomerization reactions. The catalytic conversion of a light naphtha is greatly influenced by reaction temperature, LHSV, and catalyst function. Naphtha transformation (hyroisomerization, cracking and aromatization) increases with decreasing LHSV and increasing temperature except hydroisomerization activity increases with increasing of temperature till 300°C then began

... Show More
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Software Protection by Combining Hash Function with Hardware Identifications
...Show More Authors

This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 01 2010
Journal Name
Journal Of Economics And Administrative Sciences
Bayes Estimator as a Function of Some Classical Estimator
...Show More Authors

Maximum likelihood estimation method, uniformly minimum variance unbiased estimation method and minimum mean square error estimation, as classical estimation procedures, are frequently used for parameter estimation in statistics, which assuming the parameter is constant , while Bayes method assuming the parameter is random variable and hence the Bayes estimator is an estimator which minimize the Bayes risk for each value the random observable and for square error lose function the Bayes estimator is the posterior mean. It is well known that the Bayesian estimation is hardly used as a parameter estimation technique due to some difficulties to finding a prior distribution.

The interest of this paper is that

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
The Use of Aquatic Plants in Sewage Treatment/ Using Lily of the Nile in the City of Mosul
...Show More Authors

The sewage water is the main sources of pollution for the Tigris river for that reason this study was done,The ability of nature treatment were examined along the path of alkarazi valley which was covered with reed plant also the phytoremidation were examined at the establish unit(surface flow system) which was vegetative with the plant Eichhornia crassipes .The result shows that elements which can be removed by precipitation efficiency removal like turbidity where its removal percentage at the unit of treatment reached 95.2 %where the percentage of removal through the Alkarazi was 50.4%.The removal percentage of E.coli at the unit was 90.2% where the percentage of removal through the Alkarazi was 52%.The biological oxygen demand removal

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 24 2025
Journal Name
International Journal Of Data And Network Science
Multi-objective of wind-driven optimization as feature selection and clustering to enhance text clustering
...Show More Authors

Text Clustering consists of grouping objects of similar categories. The initial centroids influence operation of the system with the potential to become trapped in local optima. The second issue pertains to the impact of a huge number of features on the determination of optimal initial centroids. The problem of dimensionality may be reduced by feature selection. Therefore, Wind Driven Optimization (WDO) was employed as Feature Selection to reduce the unimportant words from the text. In addition, the current study has integrated a novel clustering optimization technique called the WDO (Wasp Swarm Optimization) to effectively determine the most suitable initial centroids. The result showed the new meta-heuristic which is WDO was employed as t

... Show More
View Publication Preview PDF
Crossref (1)
Scopus Crossref
Publication Date
Mon Apr 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Bayesian Estimators of the parameter and Reliability Function of Inverse Rayleigh Distribution" A comparison study "
...Show More Authors

     In this paper, Bayesian estimator for the parameter and reliability function of inverse Rayleigh distribution (IRD) were obtained Under three types of loss function, namely, square error loss function (SELF), Modified Square error loss function (MSELF) and Precautionary loss function (PLF),taking into consideration the  informative and non- informative  prior. The performance of such estimators was assessed on the basis of mean square error (MSE) criterion by performing a Monte Carlo simulation technique.

View Publication Preview PDF
Crossref
Publication Date
Thu Jun 28 2018
Journal Name
Journal Of The College Of Education For Women
The function and Formation of NORTH ATLANTIC TREATY ORGANZIAITON as (NATO) Post Cold War Period
...Show More Authors

The problem of this study lies in that NATO was formed in the first place to protect Europe from Warsaw Pact. The geographical and military strategy have been changed with the change of its mission and expanding its operation scope with the leadership of the USA in the international scens. The latter has made this organization as the military arm to tighten its control over strategic regions.

            The research supposes that NATO state members confront security concerns and political and military issues that push to expand the organization. The importance of this study lies in knowing the new roles of NATO imposed by the United States. Therefore, the continuity and affi

... Show More
View Publication Preview PDF