Preferred Language
Articles
/
jcoeduw-1015
Ciphered Text Hiding in an Image using RSA algorithm
...Show More Authors

In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original image .

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 01 2011
Journal Name
Journal Of Engineering
PERFORMANCE CHARACTERISTICS OF METHANOL-DIESEL BLENDS IN CI ENGINES
...Show More Authors

Owing to the energy crisis and pollution problems of today, investigations have concentrated on
decreasing fuel consumption and on lowering the concentration of toxic components in combustion
products by using non-petroleum, renewable, sustainable and non-polluting fuels. While conventional energy sources such as natural gas, oil and coal are non-renewable, alcohol can be coupled to renewable and sustainable energy sources.
In this study, the combustion characteristics of diesel fuel and methanol blends were compared.
The tests were performed at steady state conditions in a four-cylinder DI diesel engine at full load at
1500-rpm engine speed. The experimental results showed that diesel methanol blends provided
12.7% inc

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 05 2023
Journal Name
International Journal Of Building Pathology And Adaptation
Adaptation re-use of traditional cafés in Erbil, Iraq
...Show More Authors
Purpose

This paper aims to shed light on adaptive reuse in traditional architecture (TA) in Erbil, Iraq.

Design/methodology/approach

An inductive approach and qualitative method were used in this study. The inductive research approach was used because there was no clear image of adaptive reuse in traditional cafés (TCs) in Erbil. Besides, there are no studies of TCs in Erbil particularly. Thus, there is a lack of knowledge about what adaptations took place in TCs in Erbil. The qualitative method extracted themes and issues from case studies of four TCs in Erbil citadel'

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Dec 02 2023
Journal Name
Journal Of Engineering
Deep Learning of Diabetic Retinopathy Classification in Fundus Images
...Show More Authors

Diabetic retinopathy is an eye disease in diabetic patients due to damage to the small blood vessels in the retina due to high and low blood sugar levels. Accurate detection and classification of Diabetic Retinopathy is an important task in computer-aided diagnosis, especially when planning for diabetic retinopathy surgery. Therefore, this study aims to design an automated model based on deep learning, which helps ophthalmologists detect and classify diabetic retinopathy severity through fundus images. In this work, a deep convolutional neural network (CNN) with transfer learning and fine tunes has been proposed by using pre-trained networks known as Residual Network-50 (ResNet-50). The overall framework of the proposed

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Mar 28 2022
Journal Name
The Journal Of Political Theory, Political Philosophy And Sociology Of Politics Politeia
State-building and Ethnic Pluralism in Iraq after 2003
...Show More Authors

The research article deals with the process of building or rebuilding the state in Iraq after 2003 in its various dimensions, in light of the vision and foundational procedures that were developed and supervised by the United States in cooperation with the new leaders of Iraq based on the mechanism of sectarianethnic representation, and diagnosing the imbalances that arose out of that vision and the accompanying procedures, which led to the emergence of new variables in the political process, especially in the post-ISIS* phase, which produced important challenges to the political system and the Iraqi state. The political dynamics and balances emerging after ISIS* represented at the same time opportunities and risks in the process of

... Show More
View Publication Preview PDF
Clarivate Crossref
Publication Date
Thu Sep 12 2019
Journal Name
Al-kindy College Medical Journal
The Role of Metformin in patients with Primary Hypothyroidism
...Show More Authors

Background: Insulin resistance is present in 50% or more of patients with primary hypothyroidism. Metformin can decrease TSH levels in these patients by a complex matter, this can be of great help in clinical practice.

Objective: This study was designed to evaluate the effect of metformin in reducing TSH levels in patients with primary hypothyroidism.

Methods: Hundred patients with primary hypothyroidism, 82 females, 18 males were included in this study, everyone was followed up for two months after adding metformin 850 mg twice daily in addition to thyroxin.

Results: 36 patients (36%) have a normal baseline TSH and no change after 2 months, 64 pa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Oct 28 2020
Journal Name
Iraqi Journal Of Science
Hydrogeological System of Injana Formation in Salahaddin Governorate/ Iraq
...Show More Authors

Injana Formation is the most extended geological formation in Salahaddin Governorate/ Iraq. About 10% of the studied area is covered by the outcrops of the formation as a recharge area. The formation is a subsurface within the unsaturated zone in 5% of the total studied area, while it exists within the saturated zone in about 85%; it is a major confined groundwater aquifer. Therefore, the hydrogeological system of the layers needs to be re-evaluated to describe the successions of aquifers and confining layers and their relation with each other.

The lithology, depths, water table, saturated thickness, hydraulic characteristics of the aquifers, and the lateral and vertical variations of these characteristics were adopted to classif

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Mon Jul 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Anatomical features of Fraxinus ornus L. growing in Iraq
...Show More Authors

Fraxinus ornus L. is considered as a special species that is frequently planted as a decorative tree in most of the country. The cross-sections of the root and stem are circular in shape and in the secondary growth stage, the vascular tissue in the root and stem consists of secondary xylem in radial rows and the type of vessels in the xylem are ring pours wood. Epidermal cells of leaves undulate on the upper and lower side, hairs are uniseriate and unicellular and the stomata appeared in the abaxial surface only is anomocytic type. The vertical-section of blade leaf includes upper epidermis and lower epidermis followed by the palisade layer and spongy layers. The cross-section of petiole horseshoe shape and the vascular bundles are cover

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
Integrity and Security in Cloud Computing Environment: A Review
...Show More Authors

Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many

... Show More
View Publication
Crossref (8)
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Water Pollution And Management Practices
Existence of Antibiotics in Wastewater as a Pollution Indicator
...Show More Authors

View Publication
Scopus (2)
Crossref (3)
Scopus Crossref
Publication Date
Tue Dec 01 2015
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
UPDATED LIST OF AMPHIBIANS AND REPTILES IN IRAQ 2014
...Show More Authors

    The present work provides a list of all amphibians and reptiles recorded from Iraq up to 2014. It includes 115 species (105 species of reptiles and 10 species of amphibians) dating back to 25 families (20 families of reptiles and 5 families of amphibians). Conservation status of each species was mentioned.

View Publication Preview PDF