Preferred Language
Articles
/
jcoeduw-163
Image Hiding Using Discrete Cosine Transform
...Show More Authors

Steganography is a mean of hiding information within a more obvious form of
communication. It exploits the use of host data to hide a piece of information in such a way
that it is imperceptible to human observer. The major goals of effective Steganography are
High Embedding Capacity, Imperceptibility and Robustness. This paper introduces a scheme
for hiding secret images that could be as much as 25% of the host image data. The proposed
algorithm uses orthogonal discrete cosine transform for host image. A scaling factor (a) in
frequency domain controls the quality of the stego images. Experimented results of secret
image recovery after applying JPEG coding to the stego-images are included.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Dec 30 2023
Journal Name
Journal Of Economics And Administrative Sciences
The Cluster Analysis by Using Nonparametric Cubic B-Spline Modeling for Longitudinal Data
...Show More Authors

Longitudinal data is becoming increasingly common, especially in the medical and economic fields, and various methods have been analyzed and developed to analyze this type of data.

In this research, the focus was on compiling and analyzing this data, as cluster analysis plays an important role in identifying and grouping co-expressed subfiles over time and employing them on the nonparametric smoothing cubic B-spline model, which is characterized by providing continuous first and second derivatives, resulting in a smoother curve with fewer abrupt changes in slope. It is also more flexible and can pick up on more complex patterns and fluctuations in the data.

The longitudinal balanced data profile was compiled into subgroup

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Fri May 02 2014
Journal Name
International Journal Of Scientific & Technology Research
Synthesis, Structure And Characterization Of Zns Qds And Using It In Photocatalytic Reaction
...Show More Authors

ZnS nanoparticles were prepared by a simple microwave irradiation method under mild condition. The starting materials for the synthesis of ZnS quantum dots were zinc acetate (R & M Chemical) as zinc source, thioacetamide as a sulfur source and ethylene glycol as a solvent. All chemicals were analytical grade products and used without further purification. The quantum dots of ZnS with cubic structure were characterized by X-ray powder diffraction (XRD), the morphology of the film is seen by scanning electron microscopy (SEM). The particle size is determined by field effect scanning electron microscopy (FESEM), UV-Visible absorption spectroscopy and XRD. UV-Visible absorption spectroscopy analysis shows that the absorption peak of the as-prep

... Show More
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of American Science
Morphohistological study of the tongue in local mice species by using special stain
...Show More Authors

Preview PDF
Publication Date
Sun Feb 17 2019
Journal Name
Iraqi Journal Of Physics
A Study of the electronic structure of CdS Nanocrystals using density functional theory
...Show More Authors

Density Functional Theory at the generalized-gradient approximation level coupled with large unit cell method is used to simulate the electronic structure of (II-VI) zinc-blende cadmium sulfide nanocrystals that have dimensions 2-2.5 nm. The calculated properties include lattice constant, conduction and valence bands width, energy of the highest occupied orbital, energy of the lowest unoccupied orbital, energy gap, density of states etc. Results show that lattice constant and energy gap converge to definite values. However, highest occupied orbital, lowest unoccupied orbital fluctuates indefinitely depending on the shape of the nanocrystal.

View Publication Preview PDF
Crossref
Publication Date
Wed Jul 04 2018
Journal Name
Civil Engineering Journal
Finite Element Analysis of Concrete Beam under Flexural Stresses Using Meso-Scale Model
...Show More Authors

Two dimensional meso-scale concrete modeling was used in finite element analysis of plain concrete beam subjected to bending. The plane stress 4-noded quadrilateral elements were utilized to model coarse aggregate, cement mortar. The effect of aggregate fraction distribution, and pores percent of the total area – resulting from air voids entrapped in concrete during placement on the behavior of plain concrete beam in flexural was detected. Aggregate size fractions were randomly distributed across the profile area of the beam. Extended Finite Element Method (XFEM) was employed to treat the discontinuities problems result from double phases of concrete and cracking that faced during the finite element analysis of concrete beam. Crac

... Show More
Crossref (6)
Clarivate Crossref
Publication Date
Mon Jun 01 2020
Journal Name
Al-khwarizmi Engineering Journal
Developing a Prosthesis Design using A Gearbox to Replicate the Human Hand Mechanism
...Show More Authors

Prosthetic is an artificial tool that replaces a member of the human frame that is  absent because of ailment, damage, or distortion. The current research activities in Iraq draw interest to the upper limb discipline because of the growth in the number  of amputees. Thus, it becomes necessary to increase researches in this subject to help in reducing the struggling patients.  This paper describes the design and development of a prosthesis for people able and wear them from persons who have amputation in the hands. This design is composed of a hand with five fingers moving by means of a gearbox ism mechanism. The design of this artificial hand has 5 degrees of freedom. This artificial hand works based on the principle of &n

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Engineering
Using a New Modification on Wind Turbine Ventilator for Improving Indoor Air Quality
...Show More Authors

This paper describes a newly modified wind turbine ventilator that can achieve highly efficient ventilation. The new modification on the conventional wind turbine ventilator system may be achieved by adding a Savonius wind turbine above the conventional turbine to make it work more efficiently and help spinning faster. Three models of the Savonius wind turbine with 2, 3, and 4 blades' semicircular arcs are proposed to be placed above the conventional turbine of wind ventilator to build a hybrid ventilation turbine. A prototype of room model has been constructed and the hybrid turbine is placed on the head of the room roof. Performance's tests for the hybrid turbine with a different number of blades and different values o

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 26 2022
Journal Name
Iraqi Journal Of Science
Potentiometric Determination of Mebeverine Hydrochloride Using Imprinted Molecular Polymer in PVC Matrix Membrane‏
...Show More Authors

Publication Date
Wed Dec 01 2010
Journal Name
Iraqi Journal Of Physics
An Improved Method for the Determination of Airplane Radial Velocity Using Doppler Shift
...Show More Authors

In this research velocity of moving airplane from its recorded digital sound is introduced. The data of sound file is sliced into several frames using overlapping partitions. Then the array of each frame is transformed from time domain to frequency domain using Fourier Transform (FT). To determine the characteristic frequency of the sound, a moving window mechanics is used, the size of that window is made linearly proportional with the value of the tracked frequency. This proportionality is due to the existing linear relationship between the frequency and its Doppler shift. An algorithm was introduced to select the characteristic frequencies, this algorithm allocates the frequencies which satisfy the Doppler relation, beside that the tra

... Show More
View Publication Preview PDF