Preferred Language
Articles
/
kxfQPo8BVTCNdQwCmWU6
Secure Image Steganography Through Multilevel Security
...Show More Authors

The concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current techniques have not been successful in attaining more improved security caused by the non-encrypted data that only underwent the first layer of concealment through merely a straightforward embedment process of the secret data within the images, thus allowing the extraction of the concealed data to be quite simple for hostile entities. Hence, in the current study, the proposed scheme, we have improved the Bit Inverting Map method to narrow the gap of existing work. Our experimental results indicate that the proposed framework maintains a better balance between image visual quality and security, with relatively less computational and complexity, which assures its effectiveness compared to other state-of-the-art methods.

Publication Date
Wed Jul 31 2019
Journal Name
Journal Of Engineering
A Comparative Study of Various Intelligent Optimization Algorithms Based on Path Planning and Neural Controller for Mobile Robot
...Show More Authors

In this paper, a cognitive system based on a nonlinear neural controller and intelligent algorithm that will guide an autonomous mobile robot during continuous path-tracking and navigate over solid obstacles with avoidance was proposed. The goal of the proposed structure is to plan and track the reference path equation for the autonomous mobile robot in the mining environment to avoid the obstacles and reach to the target position by using intelligent optimization algorithms. Particle Swarm Optimization (PSO) and Artificial Bee Colony (ABC) Algorithms are used to finding the solutions of the mobile robot navigation problems in the mine by searching the optimal paths and finding the reference path equation of the optimal

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Budget Programs and Performance away to enhance the control in government economic units
...Show More Authors

     The control function of important functions in the system of government for several reasons , perhaps the most important of the magnitude of spending and spending in one of the tools adopted in the implementation of the control function.                               

        Perhaps the most prominent stages of the development budget in terms of setup and use in the budget programs and performance , as specialized literature  show its importance in strengthening financial and operationl

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Aug 12 2024
Journal Name
دراسات دولية
Towards formulating a new social contract: The political system in Iraq: the dialectic of continuity and permanence
...Show More Authors

The social contract represents a set of laws and determinants agreed upon by a group of individuals in order to organize society for the better.This agreement guarantees them to live in peace according to the pre-agreed laws, and on the basis of that, it represents the key to resolving the crisis relations between the state and society, and this is what prompted Iraqi society to move towards the formulation of a new social contract through popular protest movements in 2019.To overcome the old social contract that shook the trust between the state and society as a result of its negative outputs at various political, economic and social levels, and many problems emerged that hindered the process of building the social contra

... Show More
View Publication
Publication Date
Wed Jul 15 2020
Journal Name
Modern Physics Letters A
Nuclear matter distributions of neutron rich 6He, 11Li, 14Be and 17B halo nuclei studied by the Bear Hodgson potential
...Show More Authors

The radial wave functions of the Bear–Hodgson potential have been used to study the ground state features such as the proton, neutron and matter densities and the as- sociated rms radii of two neutrons halo 6He, 11Li, 14Be and 17B nuclei. These halo nuclei are treated as a three-body system composed of core and outer two-neutron (Core + n + n). The radial wave functions of the Bear–Hodgson potential are used to describe the core and halo density distributions. The interaction of core-neutron takes the Bear–Hodgson potential form. The outer two neutrons of 6He and 11Li interact by the realistic interaction REWIL whereas those of 14Be and 17B interact by the realistic interaction of HASP. The obtained results show that this model succee

... Show More
View Publication
Publication Date
Tue Dec 01 2020
Journal Name
Baghdad Science Journal
Existence And Controllability Results For Fractional Control Systems In Reflexive Banach Spaces Using Fixed Point Theorem
...Show More Authors

       In this paper, a fixed point theorem of nonexpansive mapping is established to study the existence and sufficient conditions for the controllability of nonlinear fractional control systems in reflexive Banach spaces. The result so obtained have been modified and developed in arbitrary space having Opial’s condition by using fixed point theorem deals with nonexpansive mapping defined on a set has normal structure. An application is provided to show the effectiveness of the obtained result.

View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Tue Nov 04 2025
Journal Name
Актуальные проблемы обучения русскому языку Xiii
ARABIC PHONO-GRAMMAR AND ITS RUSSIAN EQUIVALENTS AS A NEW APPROACH IN FL TEACHING (RUSSIAN AND ARABIC IN RUSSIAN AND ARABIC CLASSROOMS)
...Show More Authors

Central and Eastern European Online Library - CEE journals, documents, articles, periodicals, books available online for download, Zeitschrfitendatenbank, Online Zeitschriften, Online Zeitschriftendatenbank

View Publication
Publication Date
Sat Oct 29 2022
Journal Name
Current Trends In Geotechnical Engineering And Construction
Optimal Bedding Selection with the Specific Soil Type According to the Thrust Forces Generated in the Water Distribution Networks Using the Restraining Joint System
...Show More Authors

A study has been performed to compare the beddings in which ductile iron pipes are buried. In water transmission systems, bends are usually used in the pipes. According to the prescribed layout, at these bends, unbalanced thrust forces are generated that must be confronted to prevent the separation of the bend from the pipe. The bed condition is a critical and important factor in providing the opposite force to the thrust forces in the restraint joint system. Due to the interaction between the native soil and the bedding layers in which the pipe is buried and the different characteristics between them. Also, the interaction with the pipe material makes it difficult to calculate the real forces opposite to the thrust forces and the way they

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Wed Mar 15 2023
Journal Name
Journal Of Baghdad College Of Dentistry
Effect of a novel coating material on the microleakage of glass hybrid restoration in primary teeth – An in vitro study
...Show More Authors

Background: Glass ionomer restorations are widely employed in the field of pediatric dentistry. There is a constant demand for a durable restoration that remains functional until exfoliation. This study aimed to measure and compare the effect of a novel coating material (EQUIA Forte Coat) on the microleakage of glass hybrid restoration (EQUIA Forte HT) in primary teeth. Material and method: Thirty cavitated (class-II) primary molars were allocated randomly into two groups based on the coat application; uncoated (control) and coated group (experimental). Cavities were prepared by the use of a ceramic bur (CeraBur) and restored with EQUIA Forte HT with or without applying a protective coat (EQUIA Forte Coat). Samples went through the therm

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Mon Dec 31 2018
Journal Name
Journal Of Theoretical And Applied Information Technology (jatit)
Factors and Model for Sensitive Data Management and Protection in Information Systems’ Decision of Cloud Environment
...Show More Authors

Journal of Theoretical and Applied Information Technology is a peer-reviewed electronic research papers & review papers journal with aim of promoting and publishing original high quality research dealing with theoretical and scientific aspects in all disciplines of IT (Informaiton Technology

View Publication