Preferred Language
Articles
/
jih-1444
Combining a Hill Encryption Algorithm and LSB Technique With Dispersed Way for Securing Arabic and English Text Messages Hidden in Cover Image
...Show More Authors

         In this paper a hybrid system was designed for securing transformed or stored text messages(Arabic and english) by embedding the message in a colored image as a cover file depending on LSB (Least Significant Bit) algorithm in a dispersed way and employing Hill data encryption algorithm for encrypt message before being hidden, A key of 3x3 was used for encryption with inverse for decryption, The system scores a good result for PSNR rate      ( 75-86) that differentiates according to  length of message and image resolution

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 01 2020
Journal Name
Periodicals Of Engineering And Natural Sciences
Employment of the genetic algorithm in some methods of estimating survival function with application
...Show More Authors

Intended for getting good estimates with more accurate results, we must choose the appropriate method of estimation. Most of the equations in classical methods are linear equations and finding analytical solutions to such equations is very difficult. Some estimators are inefficient because of problems in solving these equations. In this paper, we will estimate the survival function of censored data by using one of the most important artificial intelligence algorithms that is called the genetic algorithm to get optimal estimates for parameters Weibull distribution with two parameters. This leads to optimal estimates of the survival function. The genetic algorithm is employed in the method of moment, the least squares method and the weighted

... Show More
Scopus (2)
Scopus
Publication Date
Mon Jan 13 2020
Journal Name
Day 3 Wed, January 15, 2020
Numerical Simulation of Gas Lift Optimization Using Genetic Algorithm for a Middle East Oil Field: Feasibility Study
...Show More Authors
<p>Gas-lift technique plays an important role in sustaining oil production, especially from a mature field when the reservoirs’ natural energy becomes insufficient. However, optimally allocation of the gas injection rate in a large field through its gas-lift network system towards maximization of oil production rate is a challenging task. The conventional gas-lift optimization problems may become inefficient and incapable of modelling the gas-lift optimization in a large network system with problems associated with multi-objective, multi-constrained, and limited gas injection rate. The key objective of this study is to assess the feasibility of utilizing the Genetic Algorithm (GA) technique to optimize t</p> ... Show More
View Publication
Scopus (14)
Crossref (7)
Scopus Crossref
Publication Date
Sat Jun 04 2022
Journal Name
Al–bahith Al–a'alami
Iraq's Image in the British Press An analytical study of the Guardian and The Daily Telegraph for 1 / 1- 31/3/2019: Research extracted from a master's thesis
...Show More Authors

The topic of the research dealt with the image of Iraq in the British press based on a sample of the newspapers (The Guardian and the Daily Telegraph), which are among the most important and largest newspapers in the United Kingdom and the world, because of its active role in guiding local and international public opinion towards important issues and events, Since these two newspapers are interested in the accuracy of sensitive political topics, the message aimed at knowing the media image that these two newspapers painted about Iraq in the period that was limited to the first quarter of 2019, and also to know the nature of the contents promoted by these newspapers about the Iraqi reality, The method of content analysis was used as an ap

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jul 23 2022
Journal Name
Arab World English Journal
Impoliteness Formulas, Triggers, and Purposes to Refusal as Employed by Iraqi English Learners
...Show More Authors

The present study aims at scrutinizing the impoliteness types, causes, and purposes utilized by Iraqi English language learners when refusing marriage proposals. Thus, it attempts to answer the questions: (1) what are the impoliteness formulas used by the Iraqi learners of English in refusing marriage proposals?, and (2) What are their impoliteness triggers/causes and the purposes? The study is significant in bridging the gap that few linguistic types of research concentrate on studying intentionality and emotions allied with impoliteness. Data were collected from 35 Iraqi learners of English responding to 6 situations of marriage. The data were analyzed using Culpeper’s (2011) formulas of impoliteness and Bousfield’s (2007) impolite

... Show More
View Publication
Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Spectral Technique for Baud Time Estimation
...Show More Authors

A new approach for baud time (or baud rate) estimation of a random binary signal is presented. This approach utilizes the spectrum of the signal after nonlinear processing in a way that the estimation error can be reduced by simply increasing the number of the processed samples instead of increasing the sampling rate. The spectrum of the new signal is shown to give an accurate estimate about the baud time when there is no apriory information or any restricting preassumptions. The performance of the estimator for random binary square waves perturbed by white Gaussian noise and ISI is evaluated and compared with that of the conventional estimator of the zero crossing detector.

View Publication Preview PDF
Crossref
Publication Date
Mon May 20 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
New Technique for Solving Autonomous Equations
...Show More Authors

This paper demonstrates a new technique based on a combined form of the new transform method with homotopy perturbation method to find the suitable accurate solution of autonomous Equations with initial condition.  This technique is called the transform homotopy perturbation method (THPM). It can be used to solve the problems without resorting to the frequency domain.The implementation of the suggested method demonstrates the usefulness in finding exact solution for linear and nonlinear problems. The practical results show the efficiency and reliability of technique and easier implemented than HPM in finding exact solutions.Finally, all algorithms in this paper implemented in MATLAB version 7.12.

 

View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Dec 07 2008
Journal Name
Baghdad Science Journal
Improvement of the monochrome image hologram by using a random phase and increasing number of Samples
...Show More Authors

This paper present a study about effect of the random phase and expansion of the scale sampling factors to improve the monochrome image hologram and compared it with previous produced others. Matlab software is used to synthesize and reconstruction hologram.

View Publication Preview PDF
Crossref
Publication Date
Wed May 01 2019
Journal Name
Iraqi Journal Of Science
Trace Metal Contamination in Soils and Waters around the Abandoned Colliery Site of Bagworth Heath, English Midlands
...Show More Authors

Abandoned mines and mining activities are considered one of the most significant sources of trace metal contamination worldwide. Those activities resulted in environmental contamination of particular surrounding ecosystems of abandoned ecosystems. The main aim of this study is to evaluate the trace metal contamination in the vicinity of abandoned mine located in Leicestershire English Midland. Twelve soil samples with two water samples were collected from the abandoned mine site. Test results showed a wide range of soil pH was observed from extremely acid (2.5) to slightly alkaline (7.4) as well as LOI from 8% organic matter content to 40% was found. Moreover, results demonstrated that most elements were below Soil Guideline Values (SGV)

... Show More
View Publication Preview PDF
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Aip Conference Proceedings
Developing a lightweight cryptographic algorithm based on DNA computing
...Show More Authors

This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of

... Show More
Crossref (4)
Crossref