Preferred Language
Articles
/
jih-1947
Cryptography with Dynamic DNA Depending on Edge Detection
...Show More Authors

Making the data secure is more and more concerned in the communication era. This research is an attempt to make a more secured information message by using both encryption and steganography. The encryption phase is done with dynamic DNA complementary rules while DNA addition rules are done with secret key where both are based on the canny edge detection point of the cover image. The hiding phase is done after dividing the cover image into 8 blocks, the blocks that are used for hiding selected in reverse order exception the edge points. The experiments result shows that the method is reliable with high value in PSNR

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Journal Of Science
Fuzzy Based Clustering for Grayscale Image Steganalysis
...Show More Authors

Fuzzy Based Clustering for Grayscale Image Steganalysis

View Publication Preview PDF
Publication Date
Tue Jun 23 2020
Journal Name
Molecular Biology Reports
The correlation of combined OGG1, CYP1A1 and GSTP1 gene variants and risk of lung cancer of male Iraqi waterpipe tobacco smokers
...Show More Authors

Genetic polymorphisms of genes whose products are responsible for activities, such as xenobiotic metabolism, mutagen detoxification and DNA-repair, have been predicted to be associated with the risk of developing lung cancer (LC). The association of LC with tobacco smoking has been extensively investigated, but no studies have focused on the Arab ethnic- ity. Previously, we examined the association between genetic polymorphisms among Phase I and Phase II metabolism genes and the risk of LC. Here, we extend the data by examining the correlation of OGG1 Ser326Cys combined with CYP1A1 (Ile462Val and MspI) and GSTP1 (Ile105Val and Ala103Val) polymorphisms with the risk of LC. Polymerase chain reaction- restriction fragment length polymorphism (

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
Image Processing Approaches as a Diagnostic Parameter to Determine Pollution by Using Satellite Imagery, Northern Iraq
...Show More Authors

     This work highlights the estimation of the Al-Khoser River water case that disposes of its waste directly into the Tigris River within Mosul city. Furthermore, the work studies the effects of environmental and climate change and the impact of pollution resulting from waste thrown into the Al-Khoser River over the years. Al-Khoser River is located in the Northern Mesopotamia of Mosul city. This study aims to detect the polluted water area and the polluted surrounding area. Temporal remote sensing data of different Landsat generations were considered in this work, specifically Enhanced Thematic Mapper Plus of 2000 and Operational Land Imager of 2015. The study aims to measure the amount of pollution in the study area over 15 years

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Jan 26 2024
Journal Name
Iraqi Journal Of Science
Using Normalized Difference Vegetation Index (Ndvi) To Assessment The Changes Of Vegetations Cover In Surrounding Area Of Himreen Lake
...Show More Authors

The study area lies in the eastern part of Iraq, within Diyala and small parts of Salah Al-Din and Sulamanyah Governorates. The eastern boundary of the map represents Iraqi-Iranian International borders; it covers about 7001 Km2.The present study depends on two scenes of Thematic Mapper (TM5) data of Landsat and one scene of Multi-Spectral Scanner (MSS) data of Landsat, these data are subset and corrected within the ERDAS 9.2 software using UTM N38 projection. Normalized Difference Vegetation Index (NDVI) was adopted as practical tool for monitoring the surrounding area of Himreen Lake. The obtained result shows the distributions of NDVI for period 1976-1992 were positive pattern of (High vegetation density and Moderate vegetation densit

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 11 2022
Journal Name
Iraqi Journal Of Science
Methods and Simulations used to Detect Photons from Exoplanets of a Parent Star
...Show More Authors

The extrasolar planets in the vicinity of stars are expected to be bright enough
and are very difficult to be observed by direct detection. The problem is attributed to
the side loops of the star that created due to the telescope diffraction processing.
Several methods have been suggested in the literatures are being capable to detect
exoplanet at a separation angle of 4λ/D and at a contrast ratio of 10-10. These
methods are more than one parameter function and imposing limitations on the inner
working distance. New simple method based on a circular aperture combined with a
third power Gaussian function is suggested. The parameters of this function are then
optimized based on obtaining a minimum inner working dis

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
RMSRS: Rover Multi-purpose Surveillance Robotic System
...Show More Authors

The development of the internet of things (IoT) and the internet of robotics (IoR) are becoming more and more involved with our daily lives. It serves a variety of tasks some of them are essential to us. The main objective of SRR is to develop a surveillance system for detecting suspicious and targeted places for users without any loss of human life. This paper shows the design and implementation of a robotic surveillance platform for real-time monitoring with the help of image processing, which can explorer places of difficult access or high risk. The robotic live streaming is via two cameras, the first one is fixed straight on the road and the second one is dynamic with tilt-pan ability. All cameras have image processing capabilities t

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Dec 10 2018
Journal Name
Aro-the Scientific Journal Of Koya University
Membrane Computing for Real Medical Image Segmentation
...Show More Authors

In this paper, membrane-based computing image segmentation, both region-based and edge-based, is proposed for medical images that involve two types of neighborhood relations between pixels. These neighborhood relations—namely, 4-adjacency and 8-adjacency of a membrane computing approach—construct a family of tissue-like P systems for segmenting actual 2D medical images in a constant number of steps; the two types of adjacency were compared using different hardware platforms. The process involves the generation of membrane-based segmentation rules for 2D medical images. The rules are written in the P-Lingua format and appended to the input image for visualization. The findings show that the neighborhood relations between pixels o

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Jan 26 2024
Journal Name
Iraqi Journal Of Science
Modify Symmetric Block Cipher Algorithm Using Generated Digital 3D Fractal Image
...Show More Authors

The principal goal guiding any designed encryption algorithm must be security against unauthorized attackers. Within the last decade, there has been a vast increase in the communication of digital computer data in both the private and public sectors. Much of this information has a significant value; therefore it does require the protection by design strength algorithm to cipher it. This algorithm defines the mathematical steps required to transform data into a cryptographic cipher and also to transform the cipher back to the original form. The Performance and security level is the main characteristics that differentiate one encryption algorithm from another. In this paper suggested a new technique to enhance the performance of the Data E

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 31 2022
Journal Name
Iraqi Journal Of Science
Silver Nanoparticles as a selective probe for Mercury Ions: A Review
...Show More Authors

   Nanochemistry is a significant area which involves the synthesis, design, and manipulation of particle structures with dimensions ranging from 1 to 100 nanometres. It is now one of the major concerns of pharmaceutical and biological researchers. The current study discusses recent advances in the use of silver nanoparticles (AgNPs) as a selective sensor for qualitative and colorimetric quantitative detection of mercury ions.   The synthesis of significant noble metal AgNPs is described as a novel, low-cost, quick, and simple method for detecting mercury ions. Due to the seriousness of mercury toxicity to our cells, AgNPs may be successfully employed for the detection of ecologically harmful mercury ions in a wide variety of aqueous

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref