Preferred Language
Articles
/
oxdAFY4BVTCNdQwCyzER
Streaming video content over NGA (next generation access) network technology‏
...Show More Authors

An approach for hiding information has been proposed for securing information using Slanlet transform and the T-codes. Same as the wavelet transform the Slantlet transform is better in compression signal and good time localization signal compression than the conventional transforms like (DCT) discrete cosine transforms. The proposed method provides efficient security, because the original secret image is encrypted before embedding in order to build a robust system that is no attacker can defeat it. Some of the well known fidelity measures like (PSNR and AR) were used to measure the quality of the Steganography image and the image after extracted. The results show that the stego-image is closed related to the cover image, with (PSNR) Peak Signal to Noise Ratio is about 55dB. The recovered secret image is extracted (100%) if stego-image has no attack. These methods can provide good hiding capacity and image quality. Several types of attacks have been applied to the proposed methods in order to measure the robustness like (compression, add noise and cropping). The proposed algorithm has been implemented by using computer simulation program MATLAB version 7.9 under windows 7 operating system by Microsoft cooperation.

Publication Date
Fri Dec 01 2023
Journal Name
Iop Conference Series: Earth And Environmental Science
Estimation of secondary compounds content of some citrus leaves and their relationship by dietary preference for yellow scale insect Aonidiella. Orientalis (Hemiptera: Diaspididae)
...Show More Authors
Abstract<p>The yellow scale insect <italic>Aonidiella orientalis</italic> is an important pest of citrus trees as it absorbs sap from leaves and fruits, causing leaves to turn yellow and deform fruits and drop them. The results of study showed nutritional preference of the insect over some of studied citrus species, as sour orange was the most preferred, followed by lemon and grapefruit, mandarin and oranges were least preferred, with a rate of 22.3, 13.3, 11.7, 10.8, 3.9, and insect / 2 inch<sup>2</sup>, respectively. while results showed a difference in the content of citrus leaves from the secondary compounds, with highest concentration of phenols and total flavonoids in o</p> ... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Oct 01 2012
Journal Name
Al–bahith Al–a'alami
Dealing of the Providers of Sport Media Content with Crises : (The Department of Media of the Ministry of Youth and Sports a Model)
...Show More Authors

In a report by Transparency Organization in 2010, Iraq has 200 newspapers, magazines, sixty-seven radio stations and 45 satellite TV channels. The increase in these figures is measured in days or weeks and not months and years. This fact confirms the importance of studying content providers, especially youth sports content, for two reasons: the first is that young people constitute the highest percentage in Iraqi society, with all the potential involved in shaping the future aspects; the second reason is that for years sport has become an important pillar in people's lives not only in the entertainment aspect as it was seen in the past; Rather, sport has an influential presence in politi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Oct 12 2017
Journal Name
Iraqi Journal Of Agricultural Sciences
THE BIOLOGICAL EFFECTIVENESS OF GIBBERELLIC ACID SEEDS SOAKING AND FOLIAR TO ABSCISIC ACID IN THE GROWTH , ANISE OIL YIELD AND ITS CHEMICAL CONTENT
...Show More Authors

A field experiment was carried out during two winter season 2013, 2014 at the field of the Department of Field Crops, College of Agriculture, University of Baghdad, to study the effect of seeds soaking with Gibberellic acid and foliar with Abscisic Acid on the growth, yield, and content of Anise oil seeds using factorial experiment within RCBD design with three replicates. The seeds was treated within GA3 were soaked with two concentrations of  30, and 60 mg. litter-1 in addition to without soaking and the code has been B0 , B1 , B2 overlapped these transactions with two concentrations of Abscisic Acid  3, and 6 mg. litter-1 in addition to without foliar A0 , A1 , A2The seeds to be treated  with GA3 are soaked for 24 hours prior

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Mon Aug 25 2014
Journal Name
Biology
Vesicular Trafficking Defects, Developmental Abnormalities, and Alterations in the Cellular Death Process Occur in Cell Lines that Over-Express Dictyostelium GTPase, Rab2, and Rab2 Mutants
...Show More Authors

View Publication
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Tue Dec 22 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of the Office of Financial Supervision in the federal control over health and sustainable development: Applied research in the Baghdad Soft Drinks Company
...Show More Authors

The study aims to indicate the role of strategic financial accounting  in the service investors  to take appropriate decisions in the future, Through what is provided by the strategic accounting, the future of information and data that enable the investor to make future investment decisions appropriate، If no longer traditional financial accounting putting meet all existing and prospective investors Requirements، That reliance on historical data and information already signed and neglected aspect of future, From this point it was to highlight the role of strategic financial accounting to contribute in this area.

View Publication Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
Al–bahith Al–a'alami
Political Use of the Photograph: A Semiotic Study of the Photograph of Al-Kadhimi's Visit to Fallujah on the Anniversary of the Victory Over ISIS
...Show More Authors

The research aims to determine what a photograph intends to convey as a visual text. Photographs are not captured randomly, especially those of politicians. Each photograph carries a message, even if interpretations of that message vary from person to person. The research adopts a methodology based on semiotic analysis, applying Laurent Gervero's model to analyze a photograph of the Iraqi Prime Minister Mustafa Al-Kadhimi's visit to Fallujah on the anniversary of the victory over ISIS. The photographs in question constitute a visual language built upon a sequence of iconic symbols and signs. These elements coalesce to give rise to an image centered around a particular theme, one designed to convey a precise messag

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jun 30 2020
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Using Artificial Neural Network to Predict Rate of Penetration from Dynamic Elastic Properties in Nasiriya Oil Field
...Show More Authors

   The time spent in drilling ahead is usually a significant portion of total well cost. Drilling is an expensive operation including the cost of equipment and material used during the penetration of rock plus crew efforts in order to finish the well without serious problems. Knowing the rate of penetration should help in speculation of the cost and lead to optimize drilling outgoings. Ten wells in the Nasiriya oil field have been selected based on the availability of the data. Dynamic elastic properties of Mishrif formation in the selected wells were determined by using Interactive Petrophysics (IP V3.5) software based on the las files and log record provided. The average rate of penetration and average dynamic elastic propert

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Pertanika Journal Of Science & Technology
Modified Kohonen network algorithm for selection of the initial centres of Gustafson-Kessel algorithm in credit scoring
...Show More Authors

Credit risk assessment has become an important topic in financial risk administration. Fuzzy clustering analysis has been applied in credit scoring. Gustafson-Kessel (GK) algorithm has been utilised to cluster creditworthy customers as against non-creditworthy ones. A good clustering analysis implemented by good Initial Centres of clusters should be selected. To overcome this problem of Gustafson-Kessel (GK) algorithm, we proposed a modified version of Kohonen Network (KN) algorithm to select the initial centres. Utilising similar degree between points to get similarity density, and then by means of maximum density points selecting; the modified Kohonen Network method generate clustering initial centres to get more reasonable clustering res

... Show More
Scopus (9)
Scopus
Publication Date
Sat Jan 01 2022
Journal Name
Ssrn Electronic Journal
The Prospective of Artificial Neural Network (ANN’s) Model Application to Ameliorate Management of Post Disaster Engineering Projects
...Show More Authors

Currently and under the COVID-19 which is considered as a kind of disaster or even any other natural or manmade disasters, this study was confirmed to be important especially when the society is proceeding to recover and reduce the risks of as possible as injuries. These disasters are leading somehow to paralyze the activities of society as what happened in the period of COVID-19, therefore, more efforts were to be focused for the management of disasters in different ways to reduce their risks such as working from distance or planning solutions digitally and send them to the source of control and hence how most countries overcame this stage of disaster (COVID-19) and collapse. Artificial intelligence should be used when there is no practica

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Fri Dec 20 2019
Journal Name
Iet Circuits, Devices &amp; Systems
Multi‐bit error control coding with limited correction for high‐performance and energy‐efficient network on chip
...Show More Authors

In the presence of deep submicron noise, providing reliable and energy‐efficient network on‐chip operation is becoming a challenging objective. In this study, the authors propose a hybrid automatic repeat request (HARQ)‐based coding scheme that simultaneously reduces the crosstalk induced bus delay and provides multi‐bit error protection while achieving high‐energy savings. This is achieved by calculating two‐dimensional parities and duplicating all the bits, which provide single error correction and six errors detection. The error correction reduces the performance degradation caused by retransmissions, which when combined with voltage swing reduction, due to its high error detection, high‐energy savings are achieved. The res

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref