Preferred Language
Articles
/
oxdAFY4BVTCNdQwCyzER
Streaming video content over NGA (next generation access) network technology‏
...Show More Authors

An approach for hiding information has been proposed for securing information using Slanlet transform and the T-codes. Same as the wavelet transform the Slantlet transform is better in compression signal and good time localization signal compression than the conventional transforms like (DCT) discrete cosine transforms. The proposed method provides efficient security, because the original secret image is encrypted before embedding in order to build a robust system that is no attacker can defeat it. Some of the well known fidelity measures like (PSNR and AR) were used to measure the quality of the Steganography image and the image after extracted. The results show that the stego-image is closed related to the cover image, with (PSNR) Peak Signal to Noise Ratio is about 55dB. The recovered secret image is extracted (100%) if stego-image has no attack. These methods can provide good hiding capacity and image quality. Several types of attacks have been applied to the proposed methods in order to measure the robustness like (compression, add noise and cropping). The proposed algorithm has been implemented by using computer simulation program MATLAB version 7.9 under windows 7 operating system by Microsoft cooperation.

Publication Date
Thu Apr 13 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Role of GibberellicAcid and Proline on Some Micronutrients Content of Peas (Pisum sativum)
...Show More Authors

An experiment was conducted in the green garden of Department of Biology/ in College of Education for Pure Sciences Ibn-Al-Haitham/ Baghdad University for the grouth season (2012-2013) to study the effect of three concentrations of gibberellic acid (0, 50, 100) ppm and three concentrations of proline (0, 25, 50) ppm on micronutrients content (Iron (Fe), Zinc (Zn), Manganese (Mn) and Copper (Cu) ppm) in addition to total chlorophyll content (µg. cm-2) for the green part of peas plant (Pisum sativum), pots of (8 kg) soil were used, the experiment was conducted according to complete randomized design (CRD) and three replicates, whereby the experiment included (27) pots, the significant variations were compared between means using least s

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Materials Today: Proceedings
Solving high sulfate content of sand used in concrete by magnetic water process
...Show More Authors

View Publication
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Mar 01 2015
Journal Name
Journal Of Engineering
Effect of Initial Water Content on the Properties of Compacted Expansive Unsaturated Soil
...Show More Authors

Unsaturated soil can raise many geotechnical problems upon wetting and drying resulting in swelling upon wetting and collapsing (shrinkage) in drying and changing in the soil shear strength. The classical principles of saturated soil are often not suitable in explaining these phenomena. In this study, expansive  soil (bentonite and sand) were tested in different water contents and dry unit weight chosen from the compaction curve to examine the effect of water content change on soil properties (swelling pressure, expansion index, shear strength (soil cohesion) and soil suction by the filter paper method). The physical properties of these soils were studied by conducting series of tests in laboratory. Fitting methods

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 02 2017
Journal Name
Journal Of Educational And Psychological Researches
Science book second grade content analysis according to the Dimensions Of Sustainable Development
...Show More Authors

The objective of this research is to analyze the content of science textbook at the elementary level, according to the dimensions of sustainable development for the academic year (2015-2016). To achieve this goal has been to build a list with dimensions of sustainable development to be included in science textbooks in primary school, after seeing the collection of literature and research and studies, as has been reached to the list of the dimensions of the three sustainable development and social, economic and environmental in the initial image consisted of (63) the issue of sub-divided the three-dimensional, the menu and offered a group of arbitrators and specialists in curriculum and teaching methods, and thus the menu consiste

... Show More
View Publication Preview PDF
Publication Date
Thu Aug 01 2024
Journal Name
Iop Conference Series: Earth And Environmental Science
Smart Irrigation Technique in the Fixed Irrigation System Based on Soil Moisture Content
...Show More Authors
Abstract<p>The growing water demand has raised serious concerns about the future of irrigated agriculture in many parts all over the world, changing environmental conditions and shortage of water (especially in Iraq) have led to the need for a new system that efficiently manages the irrigation of crops. With the increasing population growing at a rapid pace, traditional agriculture will have a tough time meeting future food demands. Water availability and conservation are major concerns for farmers. The configuration of the smart irrigation system was designed based on data specific to the parameters concerning the characteristics of the plant and the properties of soil which are measured once i</p> ... Show More
View Publication
Scopus Crossref
Publication Date
Thu Aug 02 2012
Journal Name
International Journal Of Advanced Research In Computer Science
User Authentication based on Keystroke Dynamics Using Backpropagation Network
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi

... Show More
Publication Date
Sat Jan 01 2022
Journal Name
Proceedings Of International Conference On Computing And Communication Networks
Speech Age Estimation Using a Ranking Convolutional Neural Network
...Show More Authors

View Publication
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Lecture Notes In Electrical Engineering
Handling Mobility with Network Virtualization in IoT WAVE Context
...Show More Authors

Realizing robust interconnectivity in a rapidly changing network topology is a challenging issue. This problem is escalating with the existence of constrained devices in a vehicular environment. Several standards have been developed to support reliable communication between vehicular nodes as the IEEE 1609 WAVE stack. Mitigating the impact of security/mobility protocols on limited capability nodes is a crucial aspect. This paper examines the burden of maintaining authenticity service that associated with each handover process in a vehicular network. Accordingly, a network virtualization-based infrastructure is proposed which tackles the overhead of IEEE 1906 WAVE standard on constrained devices existed in vehicular network. The virtualized

... Show More
View Publication
Scopus Crossref
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Generative Adversarial Network for Imitation Learning from Single Demonstration
...Show More Authors

Imitation learning is an effective method for training an autonomous agent to accomplish a task by imitating expert behaviors in their demonstrations. However, traditional imitation learning methods require a large number of expert demonstrations in order to learn a complex behavior. Such a disadvantage has limited the potential of imitation learning in complex tasks where the expert demonstrations are not sufficient. In order to address the problem, we propose a Generative Adversarial Network-based model which is designed to learn optimal policies using only a single demonstration. The proposed model is evaluated on two simulated tasks in comparison with other methods. The results show that our proposed model is capable of completing co

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Fri Jun 01 2007
Journal Name
Al-khwarizmi Engineering Journal
Reduction of the error in the hardware neural network
...Show More Authors

Specialized hardware implementations of Artificial Neural Networks (ANNs) can offer faster execution than general-purpose microprocessors by taking advantage of reusable modules, parallel processes and specialized computational components. Modern high-density Field Programmable Gate Arrays (FPGAs) offer the required flexibility and fast design-to-implementation time with the possibility of exploiting highly parallel computations like those required by ANNs in hardware. The bounded width of the data in FPGA ANNs will add an additional error to the result of the output. This paper derives the equations of the additional error value that generate from bounded width of the data and proposed a method to reduce the effect of the error to give

... Show More
View Publication Preview PDF