Preferred Language
Articles
/
oxdAFY4BVTCNdQwCyzER
Streaming video content over NGA (next generation access) network technology‏
...Show More Authors

An approach for hiding information has been proposed for securing information using Slanlet transform and the T-codes. Same as the wavelet transform the Slantlet transform is better in compression signal and good time localization signal compression than the conventional transforms like (DCT) discrete cosine transforms. The proposed method provides efficient security, because the original secret image is encrypted before embedding in order to build a robust system that is no attacker can defeat it. Some of the well known fidelity measures like (PSNR and AR) were used to measure the quality of the Steganography image and the image after extracted. The results show that the stego-image is closed related to the cover image, with (PSNR) Peak Signal to Noise Ratio is about 55dB. The recovered secret image is extracted (100%) if stego-image has no attack. These methods can provide good hiding capacity and image quality. Several types of attacks have been applied to the proposed methods in order to measure the robustness like (compression, add noise and cropping). The proposed algorithm has been implemented by using computer simulation program MATLAB version 7.9 under windows 7 operating system by Microsoft cooperation.

Publication Date
Mon Jan 01 2018
Journal Name
Al–bahith Al–a'alami
News website Analytical: study of news sites (Iraqi Media network, The Seventh Day,Huffington Post Arabic
...Show More Authors

This research focuses on the services provided by news websites (IMN, Youm7, Huffington Post Arabic) to its audience of Internet users, as well as materials posted through its pages, trying to monitor and explain them to identify their types & features, and it›s functions, whether informational or non-informational, to know the technical potential of each of the news sites, with the entry of the latest technology information. The research used the analysis method to achieve the research objectives within the period from 1/1 to 31/1/2017. The researchers used the content analysis tool as a research tool to analyze the news sites and to know the services they provide through their pages. The research was divided into three parts, the

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jan 27 2019
Journal Name
Civil Engineering Journal
Prediction of Sediment Accumulation Model for Trunk Sewer Using Multiple Linear Regression and Neural Network Techniques
...Show More Authors

Sewer sediment deposition is an important aspect as it relates to several operational and environmental problems. It concerns municipalities as it affects the sewer system and contributes to sewer failure which has a catastrophic effect if happened in trunks or interceptors. Sewer rehabilitation is a costly process and complex in terms of choosing the method of rehabilitation and individual sewers to be rehabilitated.  For such a complex process, inspection techniques assist in the decision-making process; though, it may add to the total expenditure of the project as it requires special tools and trained personnel. For developing countries, Inspection could prohibit the rehabilitation proceeds. In this study, the researchers propos

... Show More
View Publication
Scopus (18)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Wed Apr 15 2020
Journal Name
Journal Of Engineering Science And Technology
INFLUENCE OF A RIVER WATER QUALITY ON THE EFFICIENCY OF WATER TREATMENT USING ARTIFICIAL NEURAL NETWORK
...Show More Authors

Publication Date
Mon Apr 09 2018
Journal Name
Al-khwarizmi Engineering Journal
Neural Network Modeling of Cutting Force and Chip Thickness Ratio for Turning Aluminum Alloy 7075-T6
...Show More Authors

The turning process has various factors, which affecting machinability and should be investigated. These are surface roughness, tool life, power consumption, cutting temperature, machining force components, tool wear, and chip thickness ratio. These factors made the process nonlinear and complicated. This work aims to build neural network models to correlate the cutting parameters, namely cutting speed, depth of cut and feed rate, to the machining force and chip thickness ratio. The turning process was performed on high strength aluminum alloy 7075-T6. Three radial basis neural networks are constructed for cutting force, passive force, and feed force. In addition, a radial basis network is constructed to model the chip thickness ratio. T

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Conference: First International Conference On Water Resources
Modeling BOD of the Effluent from Abu-Ghraib Diary Factory using Artificial Neural Network October 2018
...Show More Authors

The proper operation, and control of wastewater treatment plants, is receiving an increasing attention, because of the rising concern about environmental issues. In this research a mathematical model was developed to predict biochemical oxygen demand in the waste water discharged from Abu-Ghraib diary factory in Baghdad using Artificial Neural Network (ANN).In this study the best selection of the input data were selected from the recorded parameters of the wastewater from the factory. The ANN model developed was built up with the following parameters: Chemical oxygen demand, Dissolved oxygen, pH, Total dissolved solids, Total suspended solids, Sulphate, Phosphate, Chloride and Influent flow rate. The results indicated that the constructed A

... Show More
Publication Date
Thu Nov 17 2016
Journal Name
Plos One
Efficient and Stable Routing Algorithm Based on User Mobility and Node Density in Urban Vehicular Network
...Show More Authors

Vehicular ad hoc networks (VANETs) are considered an emerging technology in the industrial and educational fields. This technology is essential in the deployment of the intelligent transportation system, which is targeted to improve safety and efficiency of traffic. The implementation of VANETs can be effectively executed by transmitting data among vehicles with the use of multiple hops. However, the intrinsic characteristics of VANETs, such as its dynamic network topology and intermittent connectivity, limit data delivery. One particular challenge of this network is the possibility that the contributing node may only remain in the network for a limited time. Hence, to prevent data loss from that node, the information must reach the destina

... Show More
View Publication Preview PDF
Scopus (36)
Crossref (30)
Scopus Clarivate Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
AlexNet Convolutional Neural Network Architecture with Cosine and Hamming Similarity/Distance Measures for Fingerprint Biometric Matching
...Show More Authors

In information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sun Dec 15 2024
Journal Name
Arid International Journal For Science And Technology
Effect of Fertilization NPK-Nano and Humic Acid on Some Vegetative Growth Characteristics and Mineral Content of Apple Seedlings (Malus Domestica) Cv. Ibrahimi.
...Show More Authors

The research was carried out in lathhouse on one-year-old apple seedlings of the Ibrahimi variety in the Karma-Fallujah region for the 2021 growing season to study the effect of methods of adding nano-fertilizer and humic acid on seedling growth. A two-factor experiment was designed according to a randomized complete block design, with three replicates and two seedlings per experimental unit, so the number of seedlings was 54. The first factor includes NPK nanofertilizer at three levels (0- and 2-ml L-1 foliar spray and 5 ml L-1 soil application). The second factor is humic acid at three levels (0 and 5 g of seedlings - 1 foliar spray and 10 g of seedlings - 1 soil application). The results of the study show that the NPK nano-fertil

... Show More
View Publication
Crossref
Publication Date
Thu Oct 12 2017
Journal Name
Iraqi Journal Of Agricultural Sciences
THE BIOLOGICAL EFFECTIVENESS OF GIBBERELLIC ACID SEEDS SOAKING AND FOLIAR TO ABSCISIC ACID IN THE GROWTH , ANISE OIL YIELD AND ITS CHEMICAL CONTENT
...Show More Authors

A field experiment was carried out during two winter season 2013, 2014 at the field of the Department of Field Crops, College of Agriculture, University of Baghdad, to study the effect of seeds soaking with Gibberellic acid and foliar with Abscisic Acid on the growth, yield, and content of Anise oil seeds using factorial experiment within RCBD design with three replicates. The seeds was treated within GA3 were soaked with two concentrations of  30, and 60 mg. litter-1 in addition to without soaking and the code has been B0 , B1 , B2 overlapped these transactions with two concentrations of Abscisic Acid  3, and 6 mg. litter-1 in addition to without foliar A0 , A1 , A2The seeds to be treated  with GA3 are soaked for 24 hours prior

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of The College Of Education For Women
The Degree of Availability of Design Thinking Indicators in the content of Arabic Language Curricula at the secondary stage in Syrian Arab Republic
...Show More Authors

The study aimed to identify the degree of availability of design Thinking Indicators in The content of the Arabic Language Curricula at the secondary stage in the Syrian Arab Republic; to achieve the goal of the study. The researcher used the Descriptive Approach based on the analysis method according to the Cognitive Theory. The study tools consist of a list of Design Thinking Indicators and a Content Analysis Tool. The researcher completed the Validity and Reliability procedures for the tools. After applying them, the results of the study resulted in the following: Greater Interest than other sub-skills. The results also showed a Divergence of care for the sub-skills and the Difference in their recurrence rate, and the Omission of some

... Show More
View Publication Preview PDF
Crossref