Preferred Language
Articles
/
jcoeduw-1015
Ciphered Text Hiding in an Image using RSA algorithm
...Show More Authors

In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original image .

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
strong criminal capabilities، Using simulation .
...Show More Authors

The penalized least square method is a popular method to deal with high dimensional data ,where  the number of explanatory variables is large than the sample size . The properties of  penalized least square method are given high prediction accuracy and making estimation and variables selection

 At once. The penalized least square method gives a sparse model ,that meaning a model with small variables so that can be interpreted easily .The penalized least square is not robust ,that means very sensitive to the presence of outlying observation , to deal with this problem, we can used a robust loss function to get the robust penalized least square method ,and get robust penalized estimator and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Speech Compression Using Multecirculerletet Transform
...Show More Authors

Compressing the speech reduces the data storage requirements, leading to reducing the time of transmitting the digitized speech over long-haul links like internet. To obtain best performance in speech compression, wavelet transforms require filters that combine a number of desirable properties, such as orthogonality and symmetry.The MCT bases functions are derived from GHM bases function using 2D linear convolution .The fast computation algorithm methods introduced here added desirable features to the current transform. We further assess the performance of the MCT in speech compression application. This paper discusses the effect of using DWT and MCT (one and two dimension) on speech compression. DWT and MCT performances in terms of comp

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Ssrn Electronic Journal
Sustainable ENERGY by using AI
...Show More Authors

As we live in the era of the fourth technological revolution, it has become necessary to use artificial intelligence to generate electric power through sustainable solar energy, especially in Iraq and what it has gone through in terms of crises and what it suffers from a severe shortage of electric power because of the wars and calamities it went through. During that period of time, its impact is still evident in all aspects of daily life experienced by Iraqis because of the remnants of wars, siege, terrorism, wrong policies ruling before and later, regional interventions and their consequences, such as the destruction of electric power stations and the population increase, which must be followed by an increase in electric power stations,

... Show More
View Publication
Crossref
Publication Date
Sat Mar 10 2012
Journal Name
الدنانير
Cryptography Using Artificial Neural Network
...Show More Authors

Neural cryptography deals with the problem of “key exchange” between two neural networks by using the mutual learning concept. The two networks exchange their outputs (in bits) and the key between two communicating parties ar eventually represented in the final learned weights, when the two networks are said to be synchronized. Security of neural synchronization is put at risk if an attacker is capable of synchronizing with any of the two parties during the training process.

Preview PDF
Publication Date
Sun Nov 01 2020
Journal Name
Journal Of Engineering
Dewatering of Kerosene using Hydrocyclone
...Show More Authors

Water/oil emulsion is considered as the most refractory mixture to separate because of the interference of the two immiscible liquids, water and oil. This research presents a study of dewatering of water / kerosene emulsion using hydrocyclone. The effects of factors such as: feed flow rate (3, 5, 7, 9, and 11 L/min), inlet water concentration of the emulsion (5%, 7.5%, 10%, 12.5%, and 15% by volume), and split ratio (0.1, 0.3, 0.5, 0.7, and 0.9) on the separation efficiency and pressure drop were studied. Dimensional analysis using Pi theorem was applied for the first time to model the hydrocyclone based on the experimental data. It was shown that the maximum separation efficiency; at split ratio 0.1, was 94.3% at 10% co

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 31 2020
Journal Name
Indian Journal Of Forensic Medicine & Toxicology
A comparative study to evaluate the effect of ultrasonic agitation on push-out bond strength of three root-end filling materials: An in vitro study
...Show More Authors

Aim: To evaluate the effect of ultrasonic agitation for retrograde biodceramic root repair, MTA and biodentine filling materials on push-out bond strength to dentine walls. Materials and Methods: Ninety extracted human teeth with single straight roots were selected randomly. After disinfection and cleaning, the coronal portions were sectioned to standardize the root canal length at 15mm. following root canal shaping, obturation and apical roots resection, retrograde cavities were prepared. Teeth were categorized depending on the filling material used into three groups, 30 teeth each. Group A filled with bioceramic root repair material, B with MTA and C with Biodentine material. These groups were divided in to three subgroup (n= 10). Subgrou

... Show More
Scopus (1)
Scopus
Publication Date
Mon Jan 01 2018
Journal Name
Jordan Journal Of Biological Sciences
Expression of biotransformation and antioxidant genes in the liver of albino mice after exposure to aflatoxin B1 and an antioxidant sourced from turmeric (Curcuma longa)
...Show More Authors

The present investigation aims to determine the effects of aflatoxin B1 (AFB1) on biotransformation and antioxidant genes and the protective effects of curcumin, present in turmeric (Curcuma longa) powder (TMP). Specifically, the study included four groups of albino mice were fed for 30 days on diet Group I: Control, Group II: animals fed on the conventional basal diet supplemented with 0.5% food grade TMP that supplied 74 mg/kg total curcuminoids. Group III contained animals reared on conventional basal diet supplemented with 1.0 ppm AFB1 supplied by ground aflatoxin culture material (760 ppm AFB1). Finally, Group IV comprised of albino mice fed with basal diet supplemented with 1.0 ppm AFB1 and 0.5% TMP that supplied 74 mg/kg of the

... Show More
Publication Date
Fri Sep 15 2023
Journal Name
Journal Of Baghdad College Of Dentistry
Investigating the impact of non-nutritive sweeteners on the antifungal potential of alcoholic and aqueous Eucalyptus extracts against salivary candida albicans (An in-vitro study)
...Show More Authors

Background: Eucalyptus extracts and derivatives are natural substances with potent antimicrobial properties. This study investigated the in- vitro effects of non-nutritive sweeteners on the antifungal activity of alcoholic and aqueous Eucalyptus extracts against Candida albicans, a common oral pathogen. Materials and Method: Ten isolates of Candida albicans were isolated from dental students’ salivary samples. The alcoholic and aqueous extracts were prepared from fresh Eucalyptus leaves using maceration. The sensitivity of Candida albicans isolates to various concentrations of Eucalyptus extracts ranging from 50 to 250 (mg/mL) was evaluated via agar well diffusion method, while the agar streaking method  was used to assess the minimum

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Wed Dec 14 2016
Journal Name
Journal Of Baghdad College Of Dentistry
Cell Surface Expression of 70 KDa Heat Shock Proteins and P21 in Normal Oral Mucosa, Oral Epithelial Dysplasia and Squamous Cell Carcinoma (An Immunohistochemical Study)
...Show More Authors

Background: Oral SCC is a complex malignancy where environmental factors, viral infections and genetic alterations most likely interact, and thus give rise to the malignant condition. The HSP70 play a direct role in apoptosis inhibition by aligning the improved integrity of a cell’s proteins with the improved chances of that particular cell’s survival.P21 gene produces p21 protein which is a potent cyclin-dependent kinase inhibitor that plays a significant role in carcinogenesis. The aims of the study were to evaluate and compare the immun-histochemical expression of the HSP70 and cell cycle protein p21in NOM, OED, and OSCC. Correlate both marker expressions with each other. Materials and methods: Forty six formalin-fixed, par

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Jun 15 2017
Journal Name
Journal Of Baghdad College Of Dentistry
The effect of nano-hydroxy apatite on re-mineralize white spot lesions prior to orthodontic adhesive removal by different techniques (An In vitro comparative study)
...Show More Authors

Background: White-spot lesion is one of the problems associated with the fixed orthodontic treatment. The aims of this in-vitro study were to investigate enamel damage depth on adhesive removal when the adhesive were surrounded by sound, demineralized or demineralized enamel that had been re-mineralized prior to adhesive removal using 10% Nano-Hydroxy apatite and to determine the effect of three different adhesive removal techniques. Materials and methods: Composite resin adhesive (3M Unitek) was bonded to 60 human upper premolars teeth which were randomly divided in to three groups each containing ten sound teeth and ten teeth with demineralized and re-mineralized lesions adjacent to the adhesive. A window of 2 mm was prepared on the bucca

... Show More
View Publication Preview PDF
Crossref (2)
Crossref