Preferred Language
Articles
/
jcoeduw-1015
Ciphered Text Hiding in an Image using RSA algorithm
...Show More Authors

In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original image .

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Feb 09 2023
Journal Name
Artificial Intelligence Review
Community detection model for dynamic networks based on hidden Markov model and evolutionary algorithm
...Show More Authors

Finding communities of connected individuals in complex networks is challenging, yet crucial for understanding different real-world societies and their interactions. Recently attention has turned to discover the dynamics of such communities. However, detecting accurate community structures that evolve over time adds additional challenges. Almost all the state-of-the-art algorithms are designed based on seemingly the same principle while treating the problem as a coupled optimization model to simultaneously identify community structures and their evolution over time. Unlike all these studies, the current work aims to individually consider this three measures, i.e. intra-community score, inter-community score, and evolution of community over

... Show More
View Publication
Scopus (8)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Mon Dec 01 2014
Journal Name
Advances In Engineering Software
System identification and control of robot manipulator based on fuzzy adaptive differential evolution algorithm
...Show More Authors

View Publication
Scopus (50)
Crossref (43)
Scopus Clarivate Crossref
Publication Date
Fri Dec 30 2022
Journal Name
Journal Of Mathematics
Estimation of Parameters of Finite Mixture of Rayleigh Distribution by the Expectation-Maximization Algorithm
...Show More Authors

In the lifetime process in some systems, most data cannot belong to one single population. In fact, it can represent several subpopulations. In such a case, the known distribution cannot be used to model data. Instead, a mixture of distribution is used to modulate the data and classify them into several subgroups. The mixture of Rayleigh distribution is best to be used with the lifetime process. This paper aims to infer model parameters by the expectation-maximization (EM) algorithm through the maximum likelihood function. The technique is applied to simulated data by following several scenarios. The accuracy of estimation has been examined by the average mean square error (AMSE) and the average classification success rate (ACSR). T

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Aug 18 2023
Journal Name
Journal Of Research In Medical And Dental Science
Morphologic Evaluation of the Permanent Mandibular First Molar within an Iraqi Population Using Cone Beam Computed Tomography (Retrospective Study)
...Show More Authors

Preview PDF
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Development of an Optimized Botnet Detection Framework based on Filters of Features and Machine Learning Classifiers using CICIDS2017 Dataset
...Show More Authors
Abstract<p>Botnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper <italic>suggests</italic> a hybrid detection Botnet model using machine learning approach, performed and analyzed to detect Botnet atta</p> ... Show More
View Publication
Scopus (18)
Crossref (12)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
E3s Web Of Conferences
Enhancing the Ability of The Square Footing to Resist Positive and Negative Eccentric Inclined Loading Using an Inclined Skirt
...Show More Authors

Laboratory model tests were performed to investigate the behavior of shallow and inclined skirted foundations placed on sandy soil with R.D%=30 and the extent of the impact of the positive and negative eccentric-inclined loading effect on them. To achieve the experimental tests, it was used a box of (600×600) mm cross-sectional and 600mm in height and a square footing of (50*50) mm and 10 mm in thickness attached to the skirt with Ds=0.5B and various an angle of (10°, 20°, 30°). The results showed that using skirts leads to a significant improvement in load-carrying capacity and decreased settlement. In addition, when the skirt angle increased, the ultimate load improved. Load-carrying capacity decreased with increasing eccentri

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Wed Oct 30 2024
Journal Name
Internet Technology Letters
Using <scp>5G</scp> Standards for Smart Healthcare Applications and Designing an Artificial Intelligence‐Based Industry 4.0 Communication System
...Show More Authors
ABSTRACT<p>The introduction of Industry 4.0, to improve Internet of Things (IoT) standards, has sparked the creation of 5G, or highly sophisticated wireless networks. There are several barriers standing in the way of 5G green communication systems satisfying the expectations for faster networks, more user capacity, lower resource consumption, and cost‐effectiveness. 5G standards implementation would speed up data transmission and increase the reliability of connected devices for Industry 4.0 applications. The demand for intelligent healthcare systems has increased globally as a result of the introduction of the novel COVID‐19. Designing 5G communication systems presents research problems such as optimizing </p> ... Show More
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Dec 31 2020
Journal Name
College Of Islamic Sciences
The most important and important rule in the Quranic perspective "An applied study"
...Show More Authors

Abstract

    All of us are indispensable for this rule (the most important and important) individuals, whether we were groups of leaders or followers of peoples or countries because the rule provides adequate guarantees for the correct positions and drawing the plan for successful decision-makers matching with the balances of Sharia without incompatibility between religious or worldly interests or legal positions and therefore in the framework of the most important appointment And distinguish it from the important from the interests or the appointment of the most important and distinguish from the important from the evils and through this rule we learn about the scientific and practical solutions t

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 29 2021
Journal Name
College Of Islamic Sciences
Almzna given in the consolation of the Prophet)) for women- an objective stu
...Show More Authors

 My research deals with the positions that the Prophet (PBUH) distressed. And condolences to those who lost her father and other problems and calamities that impede the life of women, has been given to the Lord of men, and good qualities, to strike the nation's finest proverbs in ensuring lost and lost of women and children, to be shown to us humanity in its finest form, and the best analyzed, and I hope God help And guidance and Rashad

View Publication Preview PDF
Publication Date
Tue Mar 15 2022
Journal Name
Al-academy
Experimentation in the works of the artist Muhammad Al-Kinani" an anaylytical study"
...Show More Authors

The problem of the tagged research (experimentation in the works of the artist Muhammad al-Kinani is an analytical study) dealt with the nature of the concept of experimentation and its work in the works of Muhammad al-Kinani. Which adopts the removal of the concept of style and artistic style and takes the experience away from the pattern of repetition The importance of the research comes through the identification of the materials founding the artistic work. The current research benefits the specialists in the field of arts from the students of studies with a new and renewed formulation of creativity. The research objectives shed light on the contemporary experiences of the artist Muhammad Al-Kinani and its importance in benefiting res

... Show More
View Publication Preview PDF
Crossref