Preferred Language
Articles
/
jih-1835
Robust Watermarking Scheme for GIS Vector Maps
...Show More Authors

  With the fast progress of information technology and the computer networks, it becomes very easy to reproduce and share the geospatial data due to its digital styles. Therefore, the usage of geospatial data suffers from various problems such as data authentication, ownership proffering, and illegal copying ,etc. These problems can represent the big challenge to future uses of the geospatial data. This paper introduces a new watermarking scheme to ensure the copyright protection of the digital vector map. The main idea of proposed scheme is based on transforming  the digital map to frequently domain using the Singular Value Decomposition (SVD) in order to determine suitable areas to insert the watermark data. The digital map is separated into the isolated parts.Watermark data are embedded within the nominated magnitudes in each part when satisfied the definite criteria. The efficiency of proposed watermarking scheme is assessed within statistical measures based on two factors which are fidelity and robustness. Experimental results demonstrate the proposed watermarking scheme representing ideal trade off for disagreement issue between distortion amount and robustness. Also, the proposed scheme shows  robust resistance for many kinds of attacks.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Period of Creative Behavior for personin in Achieving Entrepreneurial for The new Organaization
...Show More Authors

Experienced organizations in recent years, significant challenges , especially with the spread of economic globalization, making it required to provide new and better through experience , creativity and innovation to achieve the quality and high-quality products of all kinds , in order to achieve the objectives of the study and to answer its questions tested the study in the woolen Industries sector in Baghdad . The study was applied to a sample of 30 people in the senior management and the middle and lower in the company (managers of sections  , and  managers of people , and managers of the units , and office managers ) and for the processing of data and information used several statistical methods and extracted result

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Jan 10 2025
Journal Name
Journal Of University Of Anbar For Pure Science (juaps)
Evaluation the Initial Values for Eccentric Anomaly for an Ellipse Orbit: Article Review
...Show More Authors

The equation of Kepler is used to solve different problems associated with celestial mechanics and the dynamics of the orbit. It is an exact explanation for the movement of any two bodies in space under the effect of gravity. This equation represents the body in space in terms of polar coordinates; thus, it can also specify the time required for the body to complete its period along the orbit around another body. This paper is a review for previously published papers related to solve Kepler’s equation and eccentric anomaly. It aims to collect and assess changed iterative initial values for eccentric anomaly for forty previous years. Those initial values are tested to select the finest one based on the number of iterations, as well as the

... Show More
View Publication
Publication Date
Wed Mar 30 2022
Journal Name
Iraqi Journal Of Science
Word Embedding Methods for Word Representation in Deep Learning for Natural Language Processing
...Show More Authors

    Natural Language Processing (NLP) deals with analysing, understanding and generating languages likes human. One of the challenges of NLP is training computers to understand the way of learning and using a language as human.  Every training session consists of several types of sentences with different context and linguistic structures. Meaning of a sentence depends on actual meaning of main words with their correct positions. Same word can be used as a noun or adjective or others based on their position. In NLP, Word Embedding is a powerful method which is trained on large collection of texts and encoded general semantic and syntactic information of words. Choosing a right word embedding generates more efficient result than others

... Show More
View Publication Preview PDF
Scopus (23)
Crossref (15)
Scopus Crossref
Publication Date
Tue Jul 24 2018
Journal Name
Sensors
Adaptive Windowing Framework for Surface Electromyogram-Based Pattern Recognition System for Transradial Amputees
...Show More Authors

Electromyogram (EMG)-based Pattern Recognition (PR) systems for upper-limb prosthesis control provide promising ways to enable an intuitive control of the prostheses with multiple degrees of freedom and fast reaction times. However, the lack of robustness of the PR systems may limit their usability. In this paper, a novel adaptive time windowing framework is proposed to enhance the performance of the PR systems by focusing on their windowing and classification steps. The proposed framework estimates the output probabilities of each class and outputs a movement only if a decision with a probability above a certain threshold is achieved. Otherwise (i.e., all probability values are below the threshold), the window size of the EMG signa

... Show More
View Publication
Crossref (24)
Clarivate Crossref
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Engineering
Develop Proactive System for Risk Management (DPSRM) for Lagging Investment Project in Iraq.
...Show More Authors

To finalize any construction investment project, it would be necessary to identify the most significant problems and obstacles that lead to project reluctance and stalling. Unexpected events and conflicts may have disrupted these strategies and impacted project development. Due to the high initial investment costs of construction projects, crises can have an immediate impact, resulting in significant financial losses. The 2014 financial crisis was one of the most prominent crises that Iraq faced, which prompted the researcher to identify and evaluate those obstacles through this research and questionnaires using Pareto scientific theory to exclude factors that do not contribute to project lag. It was discovered that 28 o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 27 2017
Journal Name
Al-khwarizmi Engineering Journal
A New Approach for Designing Multi Information Management System Using XML Technology
...Show More Authors

 

XML is being incorporated into the foundation of E-business data applications. This paper addresses the problem of the freeform information that stored in any organization and how XML with using this new approach will make the operation of the search very efficient and time consuming. This paper introduces new solution and methodology that has been developed to capture and manage such unstructured freeform information (multi information) depending on the use of XML schema technologies, neural network idea and object oriented relational database, in order to provide a practical solution for efficiently management multi freeform information system.

    

View Publication Preview PDF
Publication Date
Tue May 01 2018
Journal Name
International Journal Of Computer Trends And Technology
Two Phase Approach for Copyright Protection and Deduplication of Video Content in Cloud using H.264 and SHA-512
...Show More Authors

Cloud computing offers a new way of service provision by rearranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in the cloud. Traditional deduplication schemes cannot work on encrypted data. Among these data, digital videos are fairly huge in terms of storage cost and size; and techniques that can help the legal aspects of video owner such as copyright protection and reducing the cloud storage cost and size are always desired. This paper focuses on v

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Apr 18 2019
Journal Name
Iraqi Journal Of Science
Using natural materials as corrosion inhibitors for carbon-steel on phosphoric acid medium
...Show More Authors

The inhibitive action of pomegranate peel as a plant source the corrosion of carbon-steel in phosphoric acid solutions was studied using the weight-loss method. Organic compounds present in natural materials are successfully used to reduce the rate of corrosion because they are cheap, renewable and effective. The results showed that the inhibition potency was enhanced with increasing increasing the amount of the inhibitor and the immersion time but it decreased with the increase of the concentration of the acid solution. The results also revealed a gradual increase in the corrosion rate with the increase of temperature, while the corrosion protection efficiency and surface coverage decreased.

View Publication Preview PDF
Publication Date
Tue Dec 31 2019
Journal Name
Opcion
Analysis of Computer Textbook for the Second Intermediate Grade According to Digital Citizenship
...Show More Authors

The research aims to build a list of digital citizenship axes and standards and indicators emanating from them, which should be included in the content of the computer textbook scheduled for second grade intermediate students in Iraq, and the analysis of the above mentioned book according to the same list using the descriptive analytical method ((method of content analysis)). The research community and its sample consisted of the content of the computer textbook scheduled for the second year intermediate students for the academic year 2018-2019, and the research tool was built in its initial form after reference to a set of specialized literature and previous studies that dealt with topics related to digital citizenship, and the authenticit

... Show More
Preview PDF
Publication Date
Sat Feb 27 2021
Journal Name
Iraqi Journal Of Science
Design and Implementation of an IoT-based Transactional System for Quality Management
...Show More Authors

The spread of Coronavirus has forced populations around the globe to adopt strict measures such as lockdown, home quarantine, and home office. Moreover, in the current development of network communications, people can exploit internet and intranet features in many systems that need to be faster, more efficient, and available on time. Furthermore, with the benefits of using internet-of-things (IoT), through which things are generated, gained, discovered, and proposed without interference, the user could receive the last status without exertion and direct contact (i.e., in a contactless manner). These specifications can be used in a transaction system. This paper proposes an electronic transaction system (ETS) as a replacement for the curr

... Show More
View Publication Preview PDF
Scopus Crossref