Preferred Language
Articles
/
jih-1835
Robust Watermarking Scheme for GIS Vector Maps
...Show More Authors

  With the fast progress of information technology and the computer networks, it becomes very easy to reproduce and share the geospatial data due to its digital styles. Therefore, the usage of geospatial data suffers from various problems such as data authentication, ownership proffering, and illegal copying ,etc. These problems can represent the big challenge to future uses of the geospatial data. This paper introduces a new watermarking scheme to ensure the copyright protection of the digital vector map. The main idea of proposed scheme is based on transforming  the digital map to frequently domain using the Singular Value Decomposition (SVD) in order to determine suitable areas to insert the watermark data. The digital map is separated into the isolated parts.Watermark data are embedded within the nominated magnitudes in each part when satisfied the definite criteria. The efficiency of proposed watermarking scheme is assessed within statistical measures based on two factors which are fidelity and robustness. Experimental results demonstrate the proposed watermarking scheme representing ideal trade off for disagreement issue between distortion amount and robustness. Also, the proposed scheme shows  robust resistance for many kinds of attacks.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 02 2021
Journal Name
Iraqi Journal Of Science
An Approach Based on Decision Tree and Self-Organizing Map For Intrusion Detection
...Show More Authors

In modern years, internet and computers were used by many nations all overhead the world in different domains. So the number of Intruders is growing day-by-day posing a critical problem in recognizing among normal and abnormal manner of users in the network. Researchers have discussed the security concerns from different perspectives. Network Intrusion detection system which essentially analyzes, predicts the network traffic and the actions of users, then these behaviors will be examined either anomaly or normal manner. This paper suggested Deep analyzing system of NIDS to construct network intrusion detection system and detecting the type of intrusions in traditional network. The performance of the proposed system was evaluated by using

... Show More
View Publication Preview PDF
Publication Date
Thu Sep 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
BASES PROOF FOR PERIOD (1.1) FOR CORRELATION CONEFFICIENT
...Show More Authors

مفهوم معامل الارتباط كمقياس يربط بين متغيرين هذا يجلب انتباهنا إلى موضوع الإحصاء في كل المستويات. أكثر من ذلك هناك ثلاث نقاط خاصة هي اعتيادياً نشدد عليها كما يأتي:-

(1 معامل الارتباط هو الدليل المعياري والذي قيمته لا تعتمد على قياسات  

    المتغيرات الأصلية.

 (2قيمته تقع في المدى] 1,1-[ .

&nb

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Comparison for estimation methods for the autoregressive approximations
...Show More Authors

Abstract

      In this study, we compare between the autoregressive approximations (Yule-Walker equations, Least Squares , Least Squares ( forward- backword ) and Burg’s (Geometric and Harmonic ) methods, to determine the optimal approximation to the time series generated from the first - order moving Average non-invertible process, and fractionally - integrated noise process, with several values for d (d=0.15,0.25,0.35,0.45) for different sample sizes (small,median,large)for two processes . We depend on figure of merit function which proposed by author Shibata in 1980, to determine the theoretical optimal order according to min

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 14 2021
Journal Name
Iraqi Journal Of Science
On-line Analytical Processing (OLAP) Operation for Outpatient Healthcare
...Show More Authors

This paper presents an architecture for the data warehouse of outpatient healthcare (DWOP) as a data repository collects data from two different sources (Databases of outpatient healthcare and Excel files from hospitals) and provides storage, functionality and responsiveness to queries to meet decision makers requirements.
Successfully supporting managerial decision-making is critically dependent upon the availability of integrated, high quality information organized and presented in a timely and easily understood manner. “On-Line Analytical Processing (OLAP) is utilized for decision support to get interesting information” from the data warehouse with a rapid execution time. OLAP is considered one of Business Intelligence

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
Constructing a Digital Certificate Authentication System for Classified Documents
...Show More Authors

             In this paper, we introduce a new digital authentication certification system to keep the classified documents' information safe. The proposed system is a steganography system divided into two subsystems, the first subsystem is responsible for embedding the information about the person, and it works in the main foundation that issues the documents, while the second subsystem is found in the beneficiary directorates to extract the true information of the person.

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Thu Nov 02 2023
Journal Name
Journal Of Engineering
Prediction Unconfined Compressive Strength for Different Lithology Using Various Wireline Type and Core Data for Southern Iraqi Field
...Show More Authors

Unconfined Compressive Strength is considered the most important parameter of rock strength properties affecting the rock failure criteria.  Various research have developed rock strength for specific lithology to estimate high-accuracy value without a core.  Previous analyses did not account for the formation's numerous lithologies and interbedded layers. The main aim of the present study is to select the suitable correlation to predict the UCS for hole depth of formation without separating the lithology. Furthermore, the second aim is to detect an adequate input parameter among set wireline to determine the UCS by using data of three wells along ten formations (Tanuma, Khasib, Mishrif, Rumaila, Ahmady, Maudud, Nahr Um

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Aug 08 2018
Journal Name
Journal Of Al-nahrain University
CALCULATION OF THE PARAMETERS FOR ATMOSPHERICMODEL FOR THE EARTH
...Show More Authors

Publication Date
Fri Jul 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Material Requirements Planning for the Electric Motor in Fuzzy Environment for State Company for Electric Industries
...Show More Authors

ABSTRUCT

This research aims at examining the expected gap between the fact of planning and controlling process of production at the State Company for Electric Industries and implementation of material requirements planning system in fuzzy environment. Developing solutions to bridge the gap is required to provide specific mechanisms subject to the logic of fuzzy rules that will keep pace with demand for increased accuracy and reduced waiting times depending on demand forecast, investment in inventory to reduce costs to a minimum.

The proposed solutions for overcoming the research problem has required some  questions reflecting the problem with its multiple dimensions, which ar

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 29 2020
Journal Name
Iraqi Journal Of Science
A New Beta Chaotic Map with DNA Encoding for Color Image Encryption
...Show More Authors

Images hold important information, especially in military and commercial surveillance as well as in industrial inspection and communication. Therefore, the protection of the image from abuse, unauthorized access, and damage became a significant demand. This paper introduces a new Beta chaotic map for encrypting and confusing the color image with Deoxyribonucleic Acid (DNA) sequence. First, the DNA addition operation is used for diffusing each component of the plain image. Then, a new Beta chaotic map is used for shuffling the DNA color image. In addition, two chaotic maps, namely the proposed new Beta and Sine chaotic maps, are used for key generation. Finally, the DNA XOR operation is applied between the generated key and shuffled DNA i

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Fri Feb 17 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Deploying Facial Segmentation Landmarks for Deepfake Detection
...Show More Authors

Deepfake is a type of artificial intelligence used to create convincing images, audio, and video hoaxes and it concerns celebrities and everyone because they are easy to manufacture. Deepfake are hard to recognize by people and current approaches, especially high-quality ones. As a defense against Deepfake techniques, various methods to detect Deepfake in images have been suggested. Most of them had limitations, like only working with one face in an image. The face has to be facing forward, with both eyes and the mouth open, depending on what part of the face they worked on. Other than that, a few focus on the impact of pre-processing steps on the detection accuracy of the models. This paper introduces a framework design focused on this asp

... Show More
View Publication Preview PDF
Crossref (1)
Crossref