Preferred Language
Articles
/
oBb-e4kBVTCNdQwCDIqA
Arabic and English Texts Encryption Using Proposed Method Based on Coordinates System
...Show More Authors

Preview PDF
Quick Preview PDF
Publication Date
Sun Apr 30 2017
Journal Name
Journal Of Engineering
Implementation of a Proposed Load-Shedding System Using Altera DE2 FPGA
...Show More Authors

A load-shedding controller suitable for small to medium size loads is designed and implemented based on preprogrammed priorities and power consumption for individual loads. The main controller decides if a particular load can be switched ON or not according to the amount of available power generation, load consumption and loads priorities. When themaximum allowed power consumption is reached and the user want to deliver power to additional load, the controller will decide if this particular load should be denied receiving power if its priority is low. Otherwise, it can be granted to receive power if its priority is high and in this case lower priority loads are automatically switched OFF in order not to overload the power generation. The

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 30 2023
Journal Name
International Journal Of Intelligent Engineering And Systems
DeepFake Detection Improvement for Images Based on a Proposed Method for Local Binary Pattern of the Multiple-Channel Color Space
...Show More Authors

DeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detectio

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (7)
Scopus Crossref
Publication Date
Thu Dec 22 2011
Journal Name
Alustath
Phonological Adaptation of English Loanwords into Iraqi Arabic
...Show More Authors

MR Younus, Alustath, 2011

View Publication
Publication Date
Sat Feb 01 2020
Journal Name
Awej For Translation And Literary Studies
Phonological Problems of Translating English Advertisements into Arabic
...Show More Authors

An advertisement is a form of communication intended to promote the sale of a product or service, influence public opinion, gain political support, or to elicit some other response. It consists of various type, including style, target audience, geographic scope, medium, or purpose. An advertisement should catch a person's attention and quickly create a memorable impression. The main aim of the present paper is to investigate the phonological problems of translating English international TV advertisements into Arabic. It deals with the most common and popular TV advertisements. The importance of such advertisements lies not in its information content rather than in the achievement of the desired impact on the receivers. When translating such

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 31 2010
Journal Name
International Journal Of Advancements In Computing Technology
A proposed Technique for Information Hiding Based on DCT
...Show More Authors

The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Feb 25 2017
Journal Name
International Journal On Advanced Science, Engineering And Information Technology
A Novel DNA Sequence Approach for Network Intrusion Detection System Based on Cryptography Encoding Method
...Show More Authors

A novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh

... Show More
View Publication
Scopus (9)
Crossref (5)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
International Journal Of Research In Science And Technology
Encryption of Medical Image Based on Cascaded Design of AES Block Algorithm and Chaotic Map
...Show More Authors

Security concerns in the transfer of medical images have drawn a lot of attention to the topic of medical picture encryption as of late. Furthermore, recent events have brought attention to the fact that medical photographs are constantly being produced and circulated online, necessitating safeguards against their inappropriate use. To improve the design of the AES algorithm standard for medical picture encryption, this research presents several new criteria. It was created so that needs for higher levels of safety and higher levels of performance could be met. First, the pixels in the image are diffused to randomly mix them up and disperse them all over the screen. Rather than using rounds, the suggested technique utilizes a cascad

... Show More
View Publication
Crossref
Publication Date
Fri Jul 12 2024
Journal Name
International Journal Of Advances In Scientific Research And Engineering (ijasre), Issn:2454-8006, Doi: 10.31695/ijasre
A Proposed Blockchain-Based Digital-Identity Management using ERC 725/735
...Show More Authors

In modern technology, the ownership of electronic data is the key to securing their privacy and identity from any trace or interference. Therefore, a new identity management system called Digital Identity Management, implemented throughout recent years, acts as a holder of the identity data to maintain the holder’s privacy and prevent identity theft. Therefore, an overwhelming number of users have two major problems, users who own data and third-party applications will handle it, and users who have no ownership of their data. Maintaining these identities will be a challenge these days. This paper proposes a system that solves the problem using blockchain technology for Digital Identity Management systems. Blockchain is a powerful techniqu

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 05 2021
Journal Name
Research In Intelligent And Computing In Engineering
Implementing Web Testing System Depending on Performance Testing Using Load Testing Method.
...Show More Authors

Web testing is very important method for users and developers because it gives the ability to detect errors in applications and check their quality to perform services to users performance abilities, user interface, security and other different types of web testing that may occur in web application. This paper focuses on a major branch of the performance testing, which is called the load testing. Load testing depends on an important elements called request time and response time. From these elements, it can be decided if the performance time of a web application is good or not. In the experimental results, the load testing applied on the website (http://ihcoedu.uobaghdad.edu.iq) the main home page and all the science departments pages. In t

... Show More
Publication Date
Fri Mar 25 2022
Journal Name
Nasaq Journal
A Linguistic Study of Paronomasia (Al-Jinās ) in Arabic and English
...Show More Authors

Paronomasia is a recognized rhetorical device by which poets could play with words that are similar or identical in form but different in meaning. The present study aims to identify paronomasia in Arabic and English. To achieve the aim of the study, a corpus of selected verses chosen from two famous figures in Arabic and English literatures and analyzed thoroughly. The analysis of data under investigation reveals that paronomasia is a crucial aid used by poets to portrait the real world as imaginative. It further shows that the concept of paronomasia in English is not the same as in Arabic. In English, there are echoes of the Arabic jinās, i.e., there are counterpart usages of similar devices, yet English rhetoricians have not defined or c

... Show More