Preferred Language
Articles
/
jih-1433
Combining a Hill Encryption Algorithm and LSB Technique With Dispersed Way for Securing Arabic and English Text Messages Hidden in Cover Image
...Show More Authors

         In this paper a hybrid system was designed for securing transformed or stored text messages(Arabic and english) by embedding the message in a colored image as a cover file depending on LSB (Least Significant Bit) algorithm in a dispersed way and employing Hill data encryption algorithm for encrypt message before being hidden, A key of 3x3 was used for encryption with inverse for decryption, The system scores a good result for PSNR rate      ( 75-86) that differentiates according to  length of message and image resolution.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Sep 30 2021
Journal Name
Iraqi Journal Of Science
Playfair with Multi Strata Encryption
...Show More Authors

     Playfair cipher is a substitution scheme. The classical playfair scheme has a limited matrix size  containing only uppercase letters, so it is prone to hackers and cryptanalysis. To increase the resistance of playfair cipher, a new encipherment and decipherment method is proposed in this work, which depends on the permutation and its inverse, respectively. In addition, a modified  key matrix is utilized, which includes capital and small Alphabets, numbers, and 38 special characters collected from ASCII codes. In the proposed method, both substitution and transposition schemes are used, where the first stratum of the cipher is a substitution by using  key matrix and the second stratum is a transposi

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Sun Feb 17 2019
Journal Name
Iraqi Journal Of Physics
Classification of the galaxy Milky Way using variable precision rough sets technique
...Show More Authors

Astronomy image is regarded main source of information to discover outer space, therefore to know the basic contain for galaxy (Milky way), it was classified using Variable Precision Rough Sets technique to determine the different region within galaxy according different color in the image. From classified image we can determined the percentage for each class and then what is the percentage mean. In this technique a good classified image result and faster time required to done the classification process.

View Publication Preview PDF
Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Journal Of Engineering
Securing Physical Layer for FHSS Communication System Using Code andPhase Hopping Techniques in CDMA, System Design and Implementation
...Show More Authors

The Frequency-hopping Spread Spectrum (FHSS) systems and techniques are using in military and civilianradar recently and in the communication system for securing the information on wireless communications link channels, for example in the Wi-Fi 8.02.X IEEE using multiple number bandwidth and frequencies in the wireless channel in order to hopping on them for increasing the security level during the broadcast, but nowadays FHSS problem, which is, any Smart Software Defined Radio (S-SDR) can easily detect a wireless signal at the transmitter and the receiver for the hopping sequence in both of these, then duplicate this sequence in order to hack the signal on both transmitter and receiver messages using the order of the se

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 02 2021
Journal Name
Journal Of The College Of Languages (jcl)
Pragmatic Analysis of the Translation of English Culture-Specific Proverbs into Arabic
...Show More Authors

Translating culture-specific proverbs (CSPs) is a challenging task since they often occur in a peculiar context. Further, CSPs are intended to imply meanings that extend far beyond the literal meaning of such a kind of proverbs. As far as English and Arabic are concerned, translators often encounter problems in translating CSPs due to cultural differences between the source language(SL) and the target language (TL) as well as what seems to be the lack of equivalence for some CSPs.

In view of this, the present study aims at investigating the translation of CSPs in three English-Arabic dictionaries of proverbs, namely Dictionary of Common English Proverbs Translated and Explained (2004), One thousand and One English Pr

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 11 2021
Journal Name
Journal Of The College Of Languages
Pragmatic Analysis of the Translation of English Culture -specific Proverbs into Arabic
...Show More Authors

Publication Date
Wed Jul 17 2019
Journal Name
Advances In Intelligent Systems And Computing
A New Arabic Dataset for Emotion Recognition
...Show More Authors

In this study, we have created a new Arabic dataset annotated according to Ekman’s basic emotions (Anger, Disgust, Fear, Happiness, Sadness and Surprise). This dataset is composed from Facebook posts written in the Iraqi dialect. We evaluated the quality of this dataset using four external judges which resulted in an average inter-annotation agreement of 0.751. Then we explored six different supervised machine learning methods to test the new dataset. We used Weka standard classifiers ZeroR, J48, Naïve Bayes, Multinomial Naïve Bayes for Text, and SMO. We also used a further compression-based classifier called PPM not included in Weka. Our study reveals that the PPM classifier significantly outperforms other classifiers such as SVM and N

... Show More
View Publication
Scopus (15)
Crossref (7)
Scopus Crossref
Publication Date
Mon Jan 30 2023
Journal Name
Iraqi Journal Of Science
Scene Text Recognition: A Review
...Show More Authors

      The problem of text recognition and its applicability as part of images captured in the wild has gained a significant attention from the computer vision community in recent years. In contrast to the recognition of printed documents, scene text recognition is a difficult problem. Contrary to recognition of printed documents, recognizing a scene text is a challenging problem. Many researches focus on the problem of recognizing text extracted from natural scene images. Significant attempts have been made to address this problem in recent past. However, many of these attempts work on utilizing availability of strong context, which naturally limits the dictionary. This paper presents a review of recent papers related to scene text

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Journal Of Science
Multi-Objective Genetic Algorithm-Based Technique for Achieving Low-Power VLSI Circuit Partition
...Show More Authors

     Minimizing the power consumption of electronic systems is one of the most critical concerns in the design of integrated circuits for very large-scale integration (VLSI). Despite the reality that VLSI design is known for its compact size, low power, low price, excellent dependability, and high functionality, the design stage remains difficult to improve in terms of time and power. Several optimization algorithms have been designed to tackle the present issues in VLSI design. This study discusses a bi-objective optimization technique for circuit partitioning based on a genetic algorithm. The motivation for the proposed research is derived from the basic concept that, if some portions of a circuit's system are deactivated during th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 01 2010
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Proposed Algorithm for Steganography
...Show More Authors