Preferred Language
Articles
/
oxdAFY4BVTCNdQwCyzER
Streaming video content over NGA (next generation access) network technology‏
...Show More Authors

An approach for hiding information has been proposed for securing information using Slanlet transform and the T-codes. Same as the wavelet transform the Slantlet transform is better in compression signal and good time localization signal compression than the conventional transforms like (DCT) discrete cosine transforms. The proposed method provides efficient security, because the original secret image is encrypted before embedding in order to build a robust system that is no attacker can defeat it. Some of the well known fidelity measures like (PSNR and AR) were used to measure the quality of the Steganography image and the image after extracted. The results show that the stego-image is closed related to the cover image, with (PSNR) Peak Signal to Noise Ratio is about 55dB. The recovered secret image is extracted (100%) if stego-image has no attack. These methods can provide good hiding capacity and image quality. Several types of attacks have been applied to the proposed methods in order to measure the robustness like (compression, add noise and cropping). The proposed algorithm has been implemented by using computer simulation program MATLAB version 7.9 under windows 7 operating system by Microsoft cooperation.

Publication Date
Mon Jul 11 2022
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
Dynamic Background Subtraction in Video Surveillance Using Color-Histogram and Fuzzy C-Means Algorithm with Cosine Similarity
...Show More Authors

The background subtraction is a leading technique adopted for detecting the moving objects in video surveillance systems. Various background subtraction models have been applied to tackle different challenges in many surveillance environments. In this paper, we propose a model of pixel-based color-histogram and Fuzzy C-means (FCM) to obtain the background model using cosine similarity (CS) to measure the closeness between the current pixel and the background model and eventually determine the background and foreground pixel according to a tuned threshold. The performance of this model is benchmarked on CDnet2014 dynamic scenes dataset using statistical metrics. The results show a better performance against the state-of the art

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Comparison between RSA and CAST-128 with Adaptive Key for Video Frames Encryption with Highest Average Entropy
...Show More Authors

Encryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue May 16 2023
Journal Name
Journal Of Engineering
Statistical Model for Predicting the Optimum Gypsum Content in Concrete
...Show More Authors

The problem of internal sulfate attack in concrete is widespread in Iraq and neighboring countries.This is because of the high sulfate content usually present in sand and gravel used in it. In the present study the total effective sulfate in concrete was used to calculate the optimum SO3 content. Regression models were developed based on linear regression analysis to predict the optimum SO3 content usually referred as (O.G.C) in concrete. The data is separated to 155 for the development of the models and 37 for checking the models. Eight models were built for 28-days age. Then a late age (greater than 28-days) model was developed based on the predicted optimum SO3 content of 28-days and late age. Eight developed models were built for all

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 13 2025
Journal Name
Al–bahith Al–a'alami
ELEMENTS OF BUILDING CONTENT FOR GOVERNMENT WEBSITES: : (An Experimental Study)
...Show More Authors

The study dealt with measuring the impact of the availability of each of the content elements of the interaction, electronic services, and information on the evaluation of the users of the government website for its effectiveness in terms of the site’s functions and for measuring the site’s ability to present the organization’s tasks to customer groups.

Authority is concerned with measuring the confidence of customers in the content of the site, and in the organization as a whole. Validity is related to measuring the effectiveness of employing the site’s content to achieve the goal of its creation and in communicating with customers. Availability It is for measuring the ease of use of the site. The relevance, which means

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Educational And Psychological Researches
The content of intermediate stage biology books for multiple intelligences
...Show More Authors

The aim of current study is to analyze the content of intermediate stage biology books based on multiple intelligences. To do this, the researcher used the descriptive analytical approach. To analyze the three books of the intermediate stage, the author adopted content analysis tool and area unit. They were exposed to group of experts in methods of teaching biology, and measurement and evaluation. The findings of the study have shown a significant difference between what was expected and the observation of the multiple intelligences for the three biology books excluded the (social, musical, and kinetic intelligence), and there is no significant difference between the analysis' result of the biology books and the expectations of b

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 14 2016
Journal Name
Al-academy
Figure role in highlighting and content in the technical poster
...Show More Authors

The poster is one of the means which can be communicate with others through it, to transfer ideas that the designer want to focus on, for its importance to accomplish the poster. It’s a visual mean contact aim to submit an idea to the audience to get a clear idea, and that would be through the shapes and subject to submit the idea. Depend on that our goal in this study is to find out, what follows:1-Finding the relationship between the shape and the idea.And the study comes up with several results, like:1-The drawings that contain themes connected with what the designer want to achieve, through the clearness of idea and to make those elements clear by putting more elements to surround the main shape.2-To assure that the strong connecti

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Al–bahith Al–a'alami
Public confidence in the content of satellite channels during crises
...Show More Authors

Most studies combine that it is important to determine the extent of the public's trust TV for two reasons. First of knowing the impact of satellite TV audience ranges and the second determining public outlets for Information Find regard to the extent of the public's confidence in knowing the contents of the satellite during the occupation of Mosul crisis by organizing the Islamic state in Iraq and the Levant And the researcher developed a questionnaire to find out the public's confidence statement satellite contents provided by the questions related to exposandscale.

 

     The researcher audience chose the city of Baghdad to the suitabil

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 30 2019
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Experimental Study of Iraqi Light Naphtha Isomerization over Ni-Pt/H-Mordenite
...Show More Authors

Hydroisomerization of Iraqi light naphtha was studied on prepared Ni-Pt/H-mordenite catalyst at a temperature range of 220-300°C, hydrogen to hydrocarbon molar ratio of 3.7, liquid hourly space velocity (LHSV) 1 hr-1 and at atmospheric pressure.

The result shows that the hydrisomerization of light naphtha increases with the increase in reaction temperature at constant LHSV. However, above 270 0C the isomers formation decreases and the reaction is shifted towards the hydrocracking reaction, a higher octane number of naphtha was formed at 270 °C.

View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Wed Apr 15 2020
Journal Name
Al-mustansiriyah Journal Of Science
Adaptation Proposed Methods for Handling Imbalanced Datasets based on Over-Sampling Technique
...Show More Authors

Classification of imbalanced data is an important issue. Many algorithms have been developed for classification, such as Back Propagation (BP) neural networks, decision tree, Bayesian networks etc., and have been used repeatedly in many fields. These algorithms speak of the problem of imbalanced data, where there are situations that belong to more classes than others. Imbalanced data result in poor performance and bias to a class without other classes. In this paper, we proposed three techniques based on the Over-Sampling (O.S.) technique for processing imbalanced dataset and redistributing it and converting it into balanced dataset. These techniques are (Improved Synthetic Minority Over-Sampling Technique (Improved SMOTE),  Border

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 04 2016
Journal Name
Baghdad Science Journal
Classification of Elliptic Cubic Curves Over The Finite Field of Order Nineteen
...Show More Authors

Plane cubics curves may be classified up to isomorphism or projective equivalence. In this paper, the inequivalent elliptic cubic curves which are non-singular plane cubic curves have been classified projectively over the finite field of order nineteen, and determined if they are complete or incomplete as arcs of degree three. Also, the maximum size of a complete elliptic curve that can be constructed from each incomplete elliptic curve are given.

View Publication Preview PDF
Crossref