Preferred Language
Articles
/
jcoeduw-1015
Ciphered Text Hiding in an Image using RSA algorithm
...Show More Authors

In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original image .

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Aug 16 2025
Journal Name
Journal Of Physical Education
The Effect of Using Mental Maps On Cognitive Achievement In Rhythmic Gymnastics
...Show More Authors

View Publication
Publication Date
Sun Jan 01 2017
Journal Name
Spe
SPE-188966-MS: Drilling problems detection in Basrah oil fields using smartphones
...Show More Authors

Scopus (1)
Scopus
Publication Date
Thu Oct 15 2020
Journal Name
Iop Conf. Series: Journal Of Physics: Conf. Series
Estimate the Rate of Contamination in Baghdad Soils By Using Numerical Method
...Show More Authors

The aim of this paper is to evaluate the rate of contamination in soils by using accurate numerical method as a suitable tool to evaluate the concentration of heavy metals in soil. In particular, 2D –interpolation methods are applied in the models of the spread the metals in different direction.The paper illustrates the importance of the numerical method in different applications, especially nvironment contamination. Basically, there are many roles for approximating functions. Thus, the approximating of function namely the analytical expression may be expressed; the most common type being is polynomials, which are the easy implemented and simplest methods of approximation. In this paper the divided difference formula is used and extended

... Show More
Preview PDF
Publication Date
Thu Jan 01 2015
Journal Name
The 2d International Conference Of Buildings, Construction And Environmental Engineering (bcee2-2015)
Terrestrial Laser Scanning to Preserve Cultural Heritage in Iraq Using Monitoring Techniques
...Show More Authors

English

View Publication
Publication Date
Sun Feb 03 2019
Journal Name
Iraqi Journal Of Physics
Determination the concentration of radon in human urine using LR-115 detector
...Show More Authors

In the present study twenty samples of human urine were taken
from healthy male and female with different of: ages, occupation and
place of residence. These samples were collected from the hospital to
measure the concentration of radon gas in human urine by using one
of solid state nuclear track detectors LR-115.
The results obtained of the concentrations of radon in healthy human
urine are varying from 2.12×10-3 Bq.l-1 to 4.42×10-3 Bq.l-1 and
these values are less than the allowed limits 12.3×10-3 Bq.l-1.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Fusion: Practice And Applications
Optimizing Task Scheduling and Resource Allocation in Computing Environments using Metaheuristic Methods
...Show More Authors

Optimizing system performance in dynamic and heterogeneous environments and the efficient management of computational tasks are crucial. This paper therefore looks at task scheduling and resource allocation algorithms in some depth. The work evaluates five algorithms: Genetic Algorithms (GA), Particle Swarm Optimization (PSO), Ant Colony Optimization (ACO), Firefly Algorithm (FA) and Simulated Annealing (SA) across various workloads achieved by varying the task-to-node ratio. The paper identifies Finish Time and Deadline as two key performance metrics for gauging the efficacy of an algorithm, and a comprehensive investigation of the behaviors of these algorithms across different workloads was carried out. Results from the experiment

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sat May 30 2020
Journal Name
Neuroquantology
Desertification Monitoring in the South-West of Iraqi Using Fuzzy Inference System
...Show More Authors

In this research, the region in the south-west of Iraq is classified using a fuzzy inference system to estimate its desertification degree. Three land cover indices are used which are the Normalized Difference Vegetation Index, Normalized Multi-Band Drought Index and the top of atmosphere surface temperature to build a fuzzy decision about the desertification degree using eight decision roles. The study covers a temporal period of 38 years, where about every 10 years a sample is elected to verify the desertification status of the region, starting from 1990 to 2018. The results show that the desertification status varied every 10 years, wherein 2000 encountered the highest desertification in the south-west of Iraq.

View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Ssrn Electronic Journal
Increasing Safety in Highways Transit Systems by Using Ethical Artificial Intelligence AI
...Show More Authors

“Smart city” projects have become fully developed and are actively using video analytics. Our study looks at how video analytics from surveillance cameras can help manage urban areas, making the environment safer and residents happier. Every year hundreds of people fall on subway and railway lines. The causes of these accidents include crowding, fights, sudden health problems such as dizziness or heart attacks, as well as those who intentionally jump in front of trains. These accidents may not cause deaths, but they cause delays for tens of thousands of passengers. Sometimes passers-by have time to react to the event and try to prevent it, or contact station personnel, but computers can react faster in such situations by using ethical

... Show More
View Publication
Crossref
Publication Date
Sun Dec 30 2007
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Prevention of Scale Formation in Heat Exchanger Pipes by Using Magnetic Field
...Show More Authors

The possibility of using the magnetic field technique in prevention of forming scales in heat exchangers pipes using
hard water in heat transfer processes, also the studying the effective and controllable parameters on the mechanism of
scale formation.
The new designed heat exchanger experimental system was used after carrying out the basic process designs of the
system. This system was used to study the effect of the temperature (40-90 °C) and water flow rate (0.6-1.2 L/min) on
the total hardness with time as a function of precipitation of hardness salts from water and scale formation.
Different magnetic field designs in the heat exchanger experimental system were used to study the effect of magnetic
field design a

... Show More
View Publication Preview PDF
Publication Date
Fri May 01 2015
Journal Name
Journal Of Nuclear Medicine
Comparison of in vivo uptake of radioactive gold nanoparticles formulated using phytochemicals
...Show More Authors

1267 Objectives Aim to evaluate 198Au nanoparticles (AuNP) biodistribution and uptake in a human prostate model for treatment. Many phytochemicals are known to have anti-tumor properties but have short half-lives in vivo. We hypothesized that using these phytochemicals to formulate and coat AuNP would inhibit enzyme cleavage and enhance their anti-tumor properties. Initial evaluations were performed in SCID mice bearing PC3 tumors. Methods : 198AuNP were formulated with the following gum Arabic, epigalocatechin gallate (EGCg) pomegranate extract and mangiferin extract. The resultant nanoparticles were evaluated in normal mice and in human prostate bearing SCID mice. The tumor bearing mice were injected intratumorally with 3-5 uCi of 198A

... Show More
View Publication