Preferred Language
Articles
/
jcois-481
Stances on the damage to manuscripts and ways to address them
...Show More Authors

Humans knew writing and to blog motivated by the need for registration and documentation, and tried from the very beginning of research to find the most suitable material for this purpose, he used many different materials in form, nature, and composition, so it is written on the mud by the ancient Sumerian people in different forms and when the text is long Numbered as the pages of the book at the present time, this research will deal with the damage to manuscripts and then find ways to address them.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 10 2016
Journal Name
British Journal Of Applied Science & Technology
Robust Watermarking for Video Using Modulation Technique on RGB Domain
...Show More Authors

In this paper, a robust invisible watermarking system for digital video encoded by MPEG-4 is presented. The proposed scheme provides watermark hidden by embedding a secret message (watermark) in the sprite area allocated in reference frame (I-frame). The proposed system consists of two main units: (i) Embedding unit and (ii) Extraction unit. In the embedding unit, the system allocates the sprite blocks using motion compensation information. The allocated sprite area in each I–frame is used as hosting area for embedding watermark data. In the extraction unit, the system extracts the watermark data in order to check authentication and ownership of the video. The watermark data embedding method is Blocks average modulation applied on RGB dom

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri May 17 2019
Journal Name
Lecture Notes In Networks And Systems
Features Selection for Intrusion Detection System Based on DNA Encoding
...Show More Authors

Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system

... Show More
Scopus (5)
Scopus
Publication Date
Tue Mar 12 2019
Journal Name
Al-khwarizmi Engineering Journal
Optimization Drilling Parameters of Aluminum Alloy Based on Taguchi Method
...Show More Authors

This paper focuses on the optimization of drilling parameters by utilizing “Taguchi method” to obtain the minimum surface roughness. Nine drilling experiments were performed on Al 5050 alloy using high speed steel twist drills. Three drilling parameters (feed rates, cutting speeds, and cutting tools) were used as control factors, and L9 (33) “orthogonal array” was specified for the experimental trials. Signal to Noise (S/N) Ratio and “Analysis of Variance” (ANOVA) were utilized to set the optimum control factors which minimized the surface roughness. The results were tested with the aid of statistical software package MINITAB-17. After the experimental trails, the tool diameter was found as the most important facto

... Show More
View Publication Preview PDF
Crossref (15)
Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Hiding Techniques for Dynamic Encryption Text based on Corner Point
...Show More Authors

Hiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.

View Publication Preview PDF
Scopus (11)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2012
Journal Name
Conference
Identifying Causes of Variation in Construction Industry Based on Questionnaire
...Show More Authors

Publication Date
Fri Mar 01 2013
Journal Name
Indian Journal Of Applied Research
Optical study of effect of thiourea on CdS thin films
...Show More Authors

Abstract: This paper presents the results of the structural and optical analysis of CdS thin films prepared by Spray of Pyrolysis (SP) technique. The deposited CdS films were characterized using spectrophotometer and the effect of Sulfide on the structural properties of the films was investigated through the analysis of X-ray diffraction pattern (XRD). The growth of crystal became stronger and more oriented as seen in the X-ray diffraction pattern. The studying of X-ray diffraction showed that; all the films have the hexagonal structure with lattice constants a=b=4.1358 and c=6.7156A°, the crystallite size of the CdS thin films increases and strain (ε) as well as the dislocation density (δ) decreases. Also, the optical properties of the

... Show More
Preview PDF
Publication Date
Sat Apr 20 2024
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Study of Irisin in End Stage Renal Disease on Hemodialysis
...Show More Authors

Irisin is a myokine that controls energy metabolism by making adipose tissue brown. The present goal in doing this research was to determine how irisin concentration relates to other biochemical markers of disease. Hemodialysis (HD) for chronic kidney failure. The study included 30 individuals with end-stage renal disease on HD and 30 healthy subjects as the control group. The ages of all patients and the control group ranged from (25 to 60) years. The excluded criteria included patients with viral hepatitis and diabetes. Serum irisin concentration and the level of fasting serum glucose (FSG), urea, creatinine (Cr), total protein (TP), albumin (Alb), albumin to creatinine ratio (ACR), total cholesterol (TC), alanine aminotransferase (ALT),

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2013
Journal Name
International Journal Of Application Or Innovation In Engineering & Management (ijaiem)
Probabilistic Neural Network for User Authentication Based on Keystroke Dynamics
...Show More Authors

Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul

... Show More
Publication Date
Fri Dec 01 2017
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
RESEARCH NOTES ON RECORDING SOME RARE VERTEBRATES FROM KURDISTAN, IRAQ
...Show More Authors

    A mounted specimen of a mustelid animal deposited in the Kurdistan Museum of Natural History, Salahaddin University, Erbil proved to be Mustela erminea (Linnaeus, 1758) and represents a new record for the mammalian fauna of Iraq. Its measurements and some biological noted are provided. Also, two passerine birds; the Red-headed bunting, Emberiza bruniceps Brandt, 1841(Family, Emberizidae) and the Variable wheatear, Oenanthe picata (Blyth, 1847) (Family, Muscicapidae) were recorded for the first time in Iraq. Furthermore, the tree frog Hyla savignyi Audouin, 1829 was found in two locations north east of Iraq with spotted dorsum and having interesting behavior in having the capabil

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Fri May 01 2015
Journal Name
Journal Of Engineering
On Gradient Descent Localization in 3-D Wireless Sensor Networks
...Show More Authors

Localization is an essential demand in wireless sensor networks (WSNs). It relies on several types of measurements. This paper focuses on positioning in 3-D space using time-of-arrival- (TOA-) based distance measurements between the target node and a number of anchor nodes. Central localization is assumed and either RF, acoustic or UWB signals are used for distance measurements. This problem is treated by using iterative gradient descent (GD), and an iterative GD-based algorithm for localization of moving sensors in a WSN has been proposed. To localize a node in 3-D space, at least four anchors are needed. In this work, however, five anchors are used to get better accuracy. In GD localization of a moving sensor, the algo

... Show More
View Publication Preview PDF