Preferred Language
Articles
/
oxdAFY4BVTCNdQwCyzER
Streaming video content over NGA (next generation access) network technology‏
...Show More Authors

An approach for hiding information has been proposed for securing information using Slanlet transform and the T-codes. Same as the wavelet transform the Slantlet transform is better in compression signal and good time localization signal compression than the conventional transforms like (DCT) discrete cosine transforms. The proposed method provides efficient security, because the original secret image is encrypted before embedding in order to build a robust system that is no attacker can defeat it. Some of the well known fidelity measures like (PSNR and AR) were used to measure the quality of the Steganography image and the image after extracted. The results show that the stego-image is closed related to the cover image, with (PSNR) Peak Signal to Noise Ratio is about 55dB. The recovered secret image is extracted (100%) if stego-image has no attack. These methods can provide good hiding capacity and image quality. Several types of attacks have been applied to the proposed methods in order to measure the robustness like (compression, add noise and cropping). The proposed algorithm has been implemented by using computer simulation program MATLAB version 7.9 under windows 7 operating system by Microsoft cooperation.

Publication Date
Fri Apr 30 2021
Journal Name
Eastern-european Journal Of Enterprise Technologies
Implementation of artificial neural network to achieve speed control and power saving of a belt conveyor system
...Show More Authors

According to the importance of the conveyor systems in various industrial and service lines, it is very desirable to make these systems as efficient as possible in their work. In this paper, the speed of a conveyor belt (which is in our study a part of an integrated training robotic system) is controlled using one of the artificial intelligence methods, which is the Artificial Neural Network (ANN). A visions sensor will be responsible for gathering information about the status of the conveyor belt and parts over it, where, according to this information, an intelligent decision about the belt speed will be taken by the ANN controller. ANN will control the alteration in speed in a way that gives the optimized energy efficiency through

... Show More
View Publication
Scopus (23)
Crossref (10)
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (25)
Crossref (12)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
Classification of Arabic Alphabets Using a Combination of a Convolutional Neural Network and the Morphological Gradient Method
...Show More Authors

The field of Optical Character Recognition (OCR) is the process of converting an image of text into a machine-readable text format. The classification of Arabic manuscripts in general is part of this field. In recent years, the processing of Arabian image databases by deep learning architectures has experienced a remarkable development. However, this remains insufficient to satisfy the enormous wealth of Arabic manuscripts. In this research, a deep learning architecture is used to address the issue of classifying Arabic letters written by hand. The method based on a convolutional neural network (CNN) architecture as a self-extractor and classifier. Considering the nature of the dataset images (binary images), the contours of the alphabet

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Tue Jun 30 2020
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Using Artificial Neural Network to Predict Rate of Penetration from Dynamic Elastic Properties in Nasiriya Oil Field
...Show More Authors

   The time spent in drilling ahead is usually a significant portion of total well cost. Drilling is an expensive operation including the cost of equipment and material used during the penetration of rock plus crew efforts in order to finish the well without serious problems. Knowing the rate of penetration should help in speculation of the cost and lead to optimize drilling outgoings. Ten wells in the Nasiriya oil field have been selected based on the availability of the data. Dynamic elastic properties of Mishrif formation in the selected wells were determined by using Interactive Petrophysics (IP V3.5) software based on the las files and log record provided. The average rate of penetration and average dynamic elastic propert

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jul 01 2014
Journal Name
Ieee Transactions On Circuits And Systems I: Regular Papers
Crosstalk-Aware Multiple Error Detection Scheme Based on Two-Dimensional Parities for Energy Efficient Network on Chip
...Show More Authors

Achieving reliable operation under the influence of deep-submicrometer noise sources including crosstalk noise at low voltage operation is a major challenge for network on chip links. In this paper, we propose a coding scheme that simultaneously addresses crosstalk effects on signal delay and detects up to seven random errors through wire duplication and simple parity checks calculated over the rows and columns of the two-dimensional data. This high error detection capability enables the reduction of operating voltage on the wire leading to energy saving. The results show that the proposed scheme reduces the energy consumption up to 53% as compared to other schemes at iso-reliability performance despite the increase in the overhead number o

... Show More
View Publication
Scopus (26)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Journal Of The Indian Chemical Society
Inspection the impact of mixing and external resistance on the Microbial Desalination Cell for electricity generation and desalination efficiency by using Macroalgae as a bio-cathode
...Show More Authors

View Publication Preview PDF
Scopus (6)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Thu Jan 13 2011
Journal Name
Tikrit Journal Of Agricultural Sciences
ESTIMATION OF GENE ACTION AND GENETIC PARAMETERS FOR SOME CHARACTERS OF YIELD AND ITS COMPONENTS IN SUMMER SQUASH (Cucurbita pepo L.) BY USING MEAN GENERATION ANALYSIS
...Show More Authors

An experiment was carried out in the vegetables field of Horticulture Department / College of Agriculture / Baghdad University , for the three seasons : spring and Autumn of 2005 , and spring of 2007 , to study the type of gene action in some traits of yield and its components in summer squash crosses (4 x 3 = cross 1 , 3 x 7 = cross 2 , 3 x 4 = cross 3 , 3 x 5 = cross 4 , 5 x 1 = cross 5 , 5 x 2 = cross 6). The study followed generation mean analysis method which included to each cross (P1 , P2 , F1 , F2 , Bc1P1 , Bc1P2) , and those populations obtained by hybridization during the first and second seasons. Experimental comparison was performed in the second (Two crosses only) and third seasons , (four crosses) by using RCBD with three repl

... Show More
View Publication
Publication Date
Mon Jan 01 2018
Journal Name
نسق
Content analysis of the chemistry book for the third intermediate grade according to habits of mind in light of the educational reform project (2061)
...Show More Authors

Preview PDF
Publication Date
Sun Apr 01 2018
Journal Name
Al–bahith Al–a'alami
Investment of Propaganda in Al-Rafidain and Al- Sharqiya News Channels: Content Analysis of News Bulletins from 1/12/2016 to 29/2/2016
...Show More Authors

The technological developments in the field of communication have witnessed considerable impact in the variables which exist in following up and conveying the events which link it’s meaning to political implications. This makes a number of satellite channels depend on the techniques of propaganda and use them in the news bulletins to achieve political aims and ends related to its formational directives where those channels allotted a considerable time in its programming transmission map to concentrate on the security and political status to complete the image of the informational scene according to the logic of its propaganda and styles in processing news for daily events.The technological developments in the field of communication hav

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Al–bahith Al–a'alami
The propaganda content of the elements of expression in the face of the promotion of terrorist thought: (Military information of the popular crowd model)
...Show More Authors

The propaganda war is one of the most dangerous weapons used in various conditions of war and peace within any intellectual, political or military conflict to be targeted by multiple social groups and their effects on the intellectuals to change the viewpoints at the local and global level, including the use of technical treatment of the audio and visual medium, The impact of the psychological dimensions of the arms in the confrontation and spread terror in the ranks of the enemies and in the forefront of what Iraq faces in its battle against the And the use of it as a propaganda content contributes to the development of the spirit of tranquility and tranquility in the hearts of Iraqis and the return of the right to the owners “th

... Show More
View Publication Preview PDF
Crossref