Preferred Language
Articles
/
kxfQPo8BVTCNdQwCmWU6
Secure Image Steganography Through Multilevel Security
...Show More Authors

The concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current techniques have not been successful in attaining more improved security caused by the non-encrypted data that only underwent the first layer of concealment through merely a straightforward embedment process of the secret data within the images, thus allowing the extraction of the concealed data to be quite simple for hostile entities. Hence, in the current study, the proposed scheme, we have improved the Bit Inverting Map method to narrow the gap of existing work. Our experimental results indicate that the proposed framework maintains a better balance between image visual quality and security, with relatively less computational and complexity, which assures its effectiveness compared to other state-of-the-art methods.

Publication Date
Sun May 01 2022
Journal Name
Journal Of Engineering
Comparative Study between the Behavior of the Concrete Thrust Block and the Restraint Joint in a Water Distribution System; Review
...Show More Authors

Thrust blocks and restraint joints are the two most popular methods of counteracting the thrust force that generated at pipe fittings (bends, Tee, wye, reducers, dead ends, etc…). Both systems perform the same function, which is to prevent the joints from separating from the pipes. The aim of the study is to review previous studies and scientific theories related to the study and design of thrust blocks and restraint joints to study the behavior of both systems under thrust force and to study the factors and variables that affect the behavior of these systems. The behavior of both systems must be studied because they cannot be abandoned, as each system has conditions whose use is more feasible, scientific, and economic

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Science
Dynamical Behavior of Two Predators-One Prey Ecological System with Refuge and Beddington –De Angelis Functional Response
...Show More Authors

     The dynamical behavior of an ecological system of  two predators-one prey updated with incorporating prey refuge and Beddington –De Angelis functional response had been studied in this work, The essential mathematical features of the present model have been studied  thoroughly. The system has local and global stability when certain conditions are met.  had been  proved respectively.  Further, the system has no saddle node bifurcation but transcritical bifurcation and Pitchfork bifurcation are satisfied while the Hopf bifurcation does not occur. Numerical illustrations are performed  to validate the model's applicability under consideration. Finally, the results are included in the form of points in agreement with the obt

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Study of the imperatives of promoting financial inclusion in Iraq: Opportunities and challenges
...Show More Authors

The aim of the research is to provide an analytical study to promote financial inclusion in Iraq by clarifying the opportunities and challenges of the economic and demographic situation in Iraq, studying the structure of the financial system and introducing non-bank financial institutions operating in Iraq, and using the descriptive approach. Analytical in the study of the phenomenon of research, the research reached a number of conclusions, the most prominent of which were:

  • Iraqi society is a young society.
  • The majority of the population is 70 percent. They live almost in urban areas.
  • The coverage of bank branch networks is concentrated in only four provinces, leaving other provinces outside financial

... Show More
View Publication Preview PDF
Publication Date
Wed May 15 2019
Journal Name
Tikrit Journal Of Pure Science
Improvement of Alert System against Tampering and Theft in Surveillance Cameras
...Show More Authors

Use of Surveillance cameras in houses and markets became common, that resulted to minimize theft and make it a difficult task because it let recording and viewing what is going around. The wide application of these cameras, pushed thieves to seek new ways for abolition of the surveillance system and digital recording of events, such as cutting the signal wire between the camera and Digital video recorder or changing the direction of the camera away from the focus spot or damaging the camera or steal the device which means the loss of the recorded media. This paper focuses on such abolitions and fixed it by suggesting a way to notify the administrator immediately and automatically by Email about any violation of the system using MATLAB, whic

... Show More
View Publication
Publication Date
Thu Aug 18 2022
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Resource consumption accounting technique between traditional cost systems and contemporary cost management techniques in measuring the cost of products - A conceptual vision
...Show More Authors

The contemporary business environment is witnessing increasing calls for modifications to the traditional cost system, and a trend towards adopting cost management techniques to provide appropriate financial and non-financial information for senior and executive departments, including the Resource Consumption Accounting (RCA) technique in question, which classifies costs into fixed and variable to support the decision-making process. Moreover, (RCA) combines two approaches to cost estimation, the first based on activity-based cost accounting (ABC) and the second on the German cost accounting method (GPK). The research aims to provide a conceptual vision for resource consumption accounting, after Considering it as an accounting te

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Science
On The Dynamics of Discrete-Time Prey-Predator System with Ratio-Dependent Functional Response
...Show More Authors

In this paper, a discrete- time ratio-dependent prey- predator model is proposed and analyzed. All possible fixed points have been obtained. The local stability conditions for these fixed points have been established. The global stability of the proposed system is investigated numerically. Bifurcation diagrams as a function of growth rate of the prey species are drawn. It is observed that the proposed system has rich dynamics including chaos.

View Publication Preview PDF
Publication Date
Tue Dec 29 2020
Journal Name
Iraqi Journal Of Science
ANALYSIS of INTERFERENCE PATTERN of the FIBER INTERFEROMETER as a MOTION SENCOR
...Show More Authors

The production and analysis of an optimal interference pattern for the optical fiber interferometer of a 193.1THz continuous laser source was simulated by comparing the spectral spectroscopy of the two arms of interferometer to be used as a heterodyne detection in sensing the body range, speed, and direction of movement by delaying the time between the arms.

     The study showed that the fringe pattern can be sensed a range by the free spectral range FSR and the velocity by the fringe separation FS and the direction by the fringe spatial frequency FSF.

View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Jan 30 2021
Journal Name
Iraqi Journal Of Science
Intrusion Detection System Using Data Stream Classification
...Show More Authors

Secure data communication across networks is always threatened with intrusion and abuse. Network Intrusion Detection System (IDS) is a valuable tool for in-depth defense of computer networks. Most research and applications in the field of intrusion detection systems was built based on analysing the several datasets that contain the attacks types using the classification of batch learning machine. The present study presents the intrusion detection system based on Data Stream Classification. Several data stream algorithms were applied on CICIDS2017 datasets which contain several new types of attacks. The results were evaluated to choose the best algorithm that satisfies high accuracy and low computation time.

View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 31 2022
Journal Name
Iraqi Journal Of Science
Influence of Cylindrical Electrode Configuration on Plasma Parameters in a Sputtering System
...Show More Authors

      In the present work, the effect of the cylindrical configurations of the sputtering device electrodes on the plasma parameters (Debye length, electron temperature, electron density, plasma frequency) is studied. Also, the effect of the argon gas pressure on the discharge properties is examined with gas pressures of (0.08, 0.2, 0.4 and 0.6) Torr. The properties of the plasma are diagnosed by optical emission spectrometry. The spectroscopic method is adopted for examining the atomic spectra of argon emission.  The electron temperature is determined by the Boltzmann method. While, the Stark-widening method was employed for calculating the electron number density. The voltage against current curves of the cylindrical sprayer disc

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Sat Oct 01 2011
Journal Name
Iraqi Journal Of Physics
The Electric Energy Generation Approach of the Energy Saving House Using Photovoltaic System
...Show More Authors

This paper describes a research effort that aims of developing solar models for housing suitable for the Arabian region since the Arabian Peninsula is excelled with very high levels of solar radiation.
The current paper is focused on achieving energy efficiency through utilizing solar energy and conserving energy. This task can be accomplished by implementation the major elements related to energy efficiency in housing design , such as embark on an optimum photovoltaic system orientation to maximize seize solar energy and produce solar electricity. All the precautions were taken to minimizing the consumption of solar energy for providing the suitable air-condition to the inhibitor of the solar house in addition to use of energy effici

... Show More
View Publication Preview PDF