Preferred Language
Articles
/
jih-1831
New Steganography System Based on Huffman Coding and Fibonacci Decomposition
...Show More Authors

   Hiding secret information in the image is a challenging and painstaking task in computer security and steganography system. Certainly, the absolute intricacy of attacks to security system makes it more attractive.in this research on steganography system involving information hiding,Huffman codding used to compress the secret code before embedding which provide high capacity and some security. Fibonacci decomposition used to represent the pixels in the cover image, which increase the robustness of the system. One byte used for mapping all the pixels properties. This makes the PSNR of the system higher due to random distribution of embedded bits. Finally, three kinds of evaluation are applied such as PSNR, chi-square attack, and HVS attack.

           

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Sep 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
New Approach for Solving Multi – Objective Problems
...Show More Authors

  There are many researches deals with constructing an efficient solutions for real problem having Multi - objective confronted with each others. In this paper we construct a decision for Multi – objectives based on building a mathematical model formulating a unique objective function by combining the confronted objectives functions. Also we are presented some theories concerning this problem. Areal application problem has been presented to show the efficiency of the performance of our model and the method. Finally we obtained some results by randomly generating some problems.

View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Modern Applied Science
New Combined Technique for Fingerprint Image Enhancement
...Show More Authors

This paper presents a combination of enhancement techniques for fingerprint images affected by different type of noise. These techniques were applied to improve image quality and come up with an acceptable image contrast. The proposed method included five different enhancement techniques: Normalization, Histogram Equalization, Binarization, Skeletonization and Fusion. The Normalization process standardized the pixel intensity which facilitated the processing of subsequent image enhancement stages. Subsequently, the Histogram Equalization technique increased the contrast of the images. Furthermore, the Binarization and Skeletonization techniques were implemented to differentiate between the ridge and valley structures and to obtain one

... Show More
Publication Date
Wed Jul 17 2019
Journal Name
Advances In Intelligent Systems And Computing
A New Arabic Dataset for Emotion Recognition
...Show More Authors

In this study, we have created a new Arabic dataset annotated according to Ekman’s basic emotions (Anger, Disgust, Fear, Happiness, Sadness and Surprise). This dataset is composed from Facebook posts written in the Iraqi dialect. We evaluated the quality of this dataset using four external judges which resulted in an average inter-annotation agreement of 0.751. Then we explored six different supervised machine learning methods to test the new dataset. We used Weka standard classifiers ZeroR, J48, Naïve Bayes, Multinomial Naïve Bayes for Text, and SMO. We also used a further compression-based classifier called PPM not included in Weka. Our study reveals that the PPM classifier significantly outperforms other classifiers such as SVM and N

... Show More
View Publication
Scopus (15)
Crossref (7)
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Bulletin Of Mathematics And Statistics Research
New Approximation Operators Using Mixed Degree Systems
...Show More Authors

This paper is concerned with introducing and studying the first new approximation operators using mixed degree system and second new approximation operators using mixed degree system which are the core concept in this paper. In addition, the approximations of graphs using the operators first lower and first upper are accurate then the approximations obtained by using the operators second lower and second upper sincefirst accuracy less then second accuracy. For this reason, we study in detail the properties of second lower and second upper in this paper. Furthermore, we summarize the results for the properties of approximation operators second lower and second upper when the graph G is arbitrary, serial 1, serial 2, reflexive, symmetric, tra

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
International Conference Of Computational Methods In Sciences And Engineering Iccmse 2021
Some new properties of soft Lc-spaces
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sat Dec 30 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
New Proposed Method For Web Services Security
...Show More Authors

TI1e Web service securi ty challenge is to understand  and  assess the risk  involved  in securing  a web-based  service  today, based on our existing security technology, and at the same time tmck emerging standards and  understand  how they will be used  to offset the risk in

new web services. Any  security model must  i llustrate  how data  can

now  through   an  application   and   network   topology  to  meet  the

requirements  defined  by the busi ness  wi thout exposing  the data  to undue  risk.  In this paper  we propose &n

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Synthesis of New N-Substituted Phenoxazine Derivatives
...Show More Authors

This work comprises the synthesis of new phenoxazine derivatives containing N-substituted phenoxazine starting from phenoxazine (1). Synthesis of ethyl acetate phenoxazine (2) through the reaction of phenoxazine with ethylchloroacetate, which reacted with hydrazine hydrate to give 10-aceto hydrazide phenoxazine (3), then reacted with formic acid to give 10-[N-formyl acetohydrazide] phenoxazine (4). Reaction of compound (4) with phosphorous pentaoxide or phosphorus pentasulphide to gave 10-[N-methylene-1,3,4-oxadiazole] phenoxazine (5) and 10-[N-methylene-1,3,4-thiadiazole] phenoxazine (6).

View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Engineering And Sustainable Development
NEW TRENDS FOR ANGLE OF ARRIVAL ESTIMATION
...Show More Authors

View Publication
Crossref
Publication Date
Tue Aug 03 2021
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
New Travelling Wave Solution of Burgers Equations
...Show More Authors

     In this paper, we studied the travelling wave solving for some models of Burger's equations. We used sine-cosine method to solution nonlinear equation and we used direct solution after getting travelling wave equation.

View Publication Preview PDF
Crossref
Publication Date
Sun Mar 07 2010
Journal Name
Baghdad Science Journal
Antifungal Activity of Some New Binuclear Complexes
...Show More Authors

Three complexes of copper(II) and iron(II) with mixed ligands acetylacetonebis(thio-semicarbazone)- ABTSH2 and benzaldazine- BA have been prepared and characterized using different physico-chemical techniques including the determination of metal contents, mole-cular weight, measurement of molar conductivity, magnetic moment, molar refraction, infrared and electronic spectra. Accordingly, octahedral complexes having general formulaes [Cu2(ABTSH2)2(BA)2Cl2]Cl2 and [M2(ABTSH2)2(BA)2(SO4)2] {M= Cu(II) or (Fe(II)} have been proposed. The resulted complexes screened for antifungal activity in vitro against the citrus pathogen Aspergillus niger and Fusarium sp. which caused root rot of sugar and the beans pathogen Alternaria sp. All the complex

... Show More
View Publication Preview PDF
Crossref