Preferred Language
Articles
/
kxfQPo8BVTCNdQwCmWU6
Secure Image Steganography Through Multilevel Security
...Show More Authors

The concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current techniques have not been successful in attaining more improved security caused by the non-encrypted data that only underwent the first layer of concealment through merely a straightforward embedment process of the secret data within the images, thus allowing the extraction of the concealed data to be quite simple for hostile entities. Hence, in the current study, the proposed scheme, we have improved the Bit Inverting Map method to narrow the gap of existing work. Our experimental results indicate that the proposed framework maintains a better balance between image visual quality and security, with relatively less computational and complexity, which assures its effectiveness compared to other state-of-the-art methods.

Publication Date
Sat Nov 02 2013
Journal Name
International Journal Of Computer Applications
Mixed Transforms Generated by Tensor Product and Applied in Data Processing
...Show More Authors

Finding orthogonal matrices in different sizes is very complex and important because it can be used in different applications like image processing and communications (eg CDMA and OFDM). In this paper we introduce a new method to find orthogonal matrices by using tensor products between two or more orthogonal matrices of real and imaginary numbers with applying it in images and communication signals processing. The output matrices will be orthogonal matrices too and the processing by our new method is very easy compared to other classical methods those use basic proofs. The results are normal and acceptable in communication signals and images but it needs more research works.

View Publication
Crossref
Publication Date
Wed Jul 31 2019
Journal Name
Journal Of Engineering
A Comparative Study of Various Intelligent Optimization Algorithms Based on Path Planning and Neural Controller for Mobile Robot
...Show More Authors

In this paper, a cognitive system based on a nonlinear neural controller and intelligent algorithm that will guide an autonomous mobile robot during continuous path-tracking and navigate over solid obstacles with avoidance was proposed. The goal of the proposed structure is to plan and track the reference path equation for the autonomous mobile robot in the mining environment to avoid the obstacles and reach to the target position by using intelligent optimization algorithms. Particle Swarm Optimization (PSO) and Artificial Bee Colony (ABC) Algorithms are used to finding the solutions of the mobile robot navigation problems in the mine by searching the optimal paths and finding the reference path equation of the optimal

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Performance Evaluation of Intrusion Detection System using Selected Features and Machine Learning Classifiers
...Show More Authors

Some of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems.  Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic.  Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance.  In this study, two different sets of select

... Show More
View Publication Preview PDF
Scopus (29)
Crossref (18)
Scopus Clarivate Crossref
Publication Date
Fri Feb 10 2023
Journal Name
Journal Of Applied Mathematics
The Dynamics of a Delayed Ecoepidemiological Model with Nonlinear Incidence Rate
...Show More Authors

In this paper, the general framework for calculating the stability of equilibria, Hopf bifurcation of a delayed prey-predator system with an SI type of disease in the prey population, is investigated. The impact of the incubation period delay on disease transmission utilizing a nonlinear incidence rate was taken into account. For the purpose of explaining the predation process, a modified Holling type II functional response was used. First, the existence, uniform boundedness, and positivity of the solutions of the considered model system, along with the behavior of equilibria and the existence of Hopf bifurcation, are studied. The critical values of the delay parameter for which stability switches and the nature of the Hopf bifurcat

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed May 10 2023
Journal Name
Journal Of Engineering
Cross Dipole Antennas Solution for Angle of Arrival Estimation
...Show More Authors

The Multiple Signal Classification (MUSIC) algorithm is the most popular algorithm to estimate the Angle of Arrival (AOA) of the received signals. The analysis of this algorithm (MUSIC) with typical array antenna element ( ) shows that there are two false direction indication in the plan
aligned with the axis of the array. In this paper a suggested modification on array system is proposed by using two perpendiculars crossed dipole array antenna in spite of one array antenna. The suggested modification does not affect the AOA estimation algorithm. The simulation and results shows that the proposed solution overcomes the MUSIC problem without any effect on the performance of the system.

View Publication Preview PDF
Crossref
Publication Date
Thu Nov 21 2019
Journal Name
Journal Of Engineering
Automatic Determination of Liquid's Interface in Crude Oil Tank using Capacitive Sensing Techniques
...Show More Authors

The petroleum sector has a significant influence on the development of multiphase detection sensor techniques; to separate the crude oil from water, the crude oil tank is used. In this paper, a measuring system using a simple and low cost two parallel plate capacitance sensor is designed and implemented based on a Micro controlled embedded system plus PC to automatically identify the (gas/oil) and (oil/water) dynamic multi-interface in the crude oil tank. The Permittivity differences of two-phase liquids are used to determine the interface of them by measuring the relative changes of the sensor’s capacitance when passes through the liquid’s interface. The experiment results to determine the liquid’s interface is sa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Aug 12 2024
Journal Name
دراسات دولية
Towards formulating a new social contract: The political system in Iraq: the dialectic of continuity and permanence
...Show More Authors

The social contract represents a set of laws and determinants agreed upon by a group of individuals in order to organize society for the better.This agreement guarantees them to live in peace according to the pre-agreed laws, and on the basis of that, it represents the key to resolving the crisis relations between the state and society, and this is what prompted Iraqi society to move towards the formulation of a new social contract through popular protest movements in 2019.To overcome the old social contract that shook the trust between the state and society as a result of its negative outputs at various political, economic and social levels, and many problems emerged that hindered the process of building the social contra

... Show More
View Publication
Publication Date
Fri Oct 07 2016
Journal Name
Fourth International Conference On Wireless And Optical Communications, 2016, Beijing, China
ESAM: Endocrine inspired Sensor Activation Mechanism for multi-target tracking in WSNs
...Show More Authors

Target tracking is a significant application of wireless sensor networks (WSNs) in which deployment of self-organizing and energy efficient algorithms is required. The tracking accuracy increases as more sensor nodes are activated around the target but more energy is consumed. Thus, in this study, we focus on limiting the number of sensors by forming an ad-hoc network that operates autonomously. This will reduce the energy consumption and prolong the sensor network lifetime. In this paper, we propose a fully distributed algorithm, an Endocrine inspired Sensor Activation Mechanism for multi target-tracking (ESAM) which reflecting the properties of real life sensor activation system based on the information circulating principle in the endocr

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (1)
Scopus Crossref
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Budget Programs and Performance away to enhance the control in government economic units
...Show More Authors

     The control function of important functions in the system of government for several reasons , perhaps the most important of the magnitude of spending and spending in one of the tools adopted in the implementation of the control function.                               

        Perhaps the most prominent stages of the development budget in terms of setup and use in the budget programs and performance , as specialized literature  show its importance in strengthening financial and operationl

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref